text
stringlengths 192
1.05M
|
|---|
Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
81 lines (70 sloc) 2.58 KB
/* $OpenBSD: dh.h,v 1.15 2016/05/02 10:26:04 djm Exp $ */
/*
* Copyright (c) 2000 Niels Provos. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef DH_H
#define DH_H
struct dhgroup {
int size;
BIGNUM *g;
BIGNUM *p;
};
DH *choose_dh(int, int, int);
DH *dh_new_group_asc(const char *, const char *);
DH *dh_new_group(BIGNUM *, BIGNUM *);
DH *dh_new_group1(void);
DH *dh_new_group14(void);
DH *dh_new_group16(void);
DH *dh_new_group18(void);
DH *dh_new_group_fallback(int);
int dh_gen_key(DH *, int);
int dh_pub_is_valid(DH *, BIGNUM *);
u_int dh_estimate(int);
/*
* Max value from RFC4419.
* Miniumum increased in light of DH precomputation attacks.
*/
#define DH_GRP_MIN 2048
#define DH_GRP_MAX 8192
/*
* Values for "type" field of moduli(5)
* Specifies the internal structure of the prime modulus.
*/
#define MODULI_TYPE_UNKNOWN (0)
#define MODULI_TYPE_UNSTRUCTURED (1)
#define MODULI_TYPE_SAFE (2)
#define MODULI_TYPE_SCHNORR (3)
#define MODULI_TYPE_SOPHIE_GERMAIN (4)
#define MODULI_TYPE_STRONG (5)
/*
* Values for "tests" field of moduli(5)
* Specifies the methods used in checking for primality.
* Usually, more than one test is used.
*/
#define MODULI_TESTS_UNTESTED (0x00)
#define MODULI_TESTS_COMPOSITE (0x01)
#define MODULI_TESTS_SIEVE (0x02)
#define MODULI_TESTS_MILLER_RABIN (0x04)
#define MODULI_TESTS_JACOBI (0x08)
#define MODULI_TESTS_ELLIPTIC (0x10)
#endif
You can’t perform that action at this time.
|
Catalogo Articoli (Spogli Riviste)
OPAC HELP
Titolo:
EFFICIENCY OF AN EXTERNAL SUPPORT TO REDUCE LIPID INFILTRATION INTO VENOUS GRAFTS - IN-VITRO EVALUATION
Autore:
DENG XY; MAROIS Y; GUIDOIN R; MERHI Y; STROMAN P; KING MW; DOUVILLE Y;
Indirizzi:
UNIV LAVAL,DEPT SURG,ROOM 1701 SERV BLDG ST FOY PQ G1K 7P4 CANADA UNIV LAVAL,DEPT SURG ST FOY PQ G1K 7P4 CANADA QUEBEC BIOMAT INST ST FOY PQ CANADA MONTREAL HEART INST,LAB THROMBOSIS & ATHERSCLEROSIS MONTREAL PQ H1T 1C8 CANADA
Titolo Testata:
Artificial organs
fascicolo: 11, volume: 20, anno: 1996,
pagine: 1208 - 1214
SICI:
0160-564X(1996)20:11<1208:EOAEST>2.0.ZU;2-R
Fonte:
ISI
Lingua:
ENG
Soggetto:
LOW-DENSITY LIPOPROTEIN; AUTOGENOUS VEIN GRAFTS; I-125 ALBUMIN; BYPASS GRAFTS; ATHEROSCLEROSIS; RABBIT; WALL; LDL; CIRCULATION; FILTRATION;
Keywords:
FILTRATION RATE; LIPID INFILTRATION; VENOUS GRAFT; ARTERIAL PROSTHESES; ATHEROSCLEROSIS;
Tipo documento:
Article
Natura:
Periodico
Settore Disciplinare:
Science Citation Index Expanded
Citazioni:
30
Recensione:
Indirizzi per estratti:
Citazione:
X.Y. Deng et al., "EFFICIENCY OF AN EXTERNAL SUPPORT TO REDUCE LIPID INFILTRATION INTO VENOUS GRAFTS - IN-VITRO EVALUATION", Artificial organs, 20(11), 1996, pp. 1208-1214
Abstract
Excessive distension of venous grafts due to arterial pressure enhances the convective water transport (filtration flow) through the vesselwall, and thus might affect the infiltration of macromolecules such as lipoproteins, In this paired experimental study, filtration velocities were measured at 100 mm Hg for canine jugular veins with or withoutexternal supports of expanded polytetrafluoroethylene (ePTFE) arterial prostheses. In addition, to assess the effect of filtration velocityon lipid infiltration or uptake, canine jugular veins were wrapped over half of their lengths with ePTFE arterial prostheses and perfused with dog serum containing H-3-cholesterol at a pressure of 100 mm Hg, At 100 mm Hg, the average filtration velocity of the wrapped jugular veins was 7.9 +/- 1.3 x 10(-6) cm/s whereas the average filtration velocity of the unwrapped veins was 27.3 +/- 2.7 x 10(-6) cm/s (p < 0.005). Moreover, the unwrapped veins had a significantly higher uptake rate of labeled cholesterol than the wrapped veins (10.9 +/- 7.3 x 10(-4) cm/h and 5.0 +/- 1.6 x 10(-4) cm/h, respectively, p < 0.005). In conclusion, under arterial pressure, Veins experience excessive distention, which leads to significant increases in both filtration flow and cholesterol uptake. An external wrap or support of ePTFE material protects veins from excessive distension and thus may prevent atherosclerosis in venous grafts by reducing cholesterol uptake.
ASDD Area Sistemi Dipartimentali e Documentali, Università di Bologna, Catalogo delle riviste ed altri periodici
Documento generato il 05/12/20 alle ore 19:36:45
|
DevExtreme v23.1 is now available.
Explore our newest features/capabilities and share your thoughts with us.
Your search did not match any results.
Select Box
Customize Drop-Down Button
Use the dropDownButtonTemplate to customize the drop-down button. This demo illustrates three customization cases:
• Custom image
Declare an img element in the template.
• Load indicator
Declare the load indicator and a regular icon in the template. Display the load indicator while hiding the icon, and vice versa.
• Icon that depends on the selected value
Declare the default and the selected item's icon in the template. If there is a selected item, display its icon; otherwise, show the default icon.
Backend API
Copy to CodeSandBox
Apply
Reset
<div class="dx-fieldset"> <div class="dx-field"> <div class="dx-field-label">Image as the icon</div> <div class="dx-field-value"> <dx-select-box [dataSource]="simpleProducts" [inputAttr]="{ 'aria-label': 'Simple Product' }" > <div *dxTemplate="let data of 'dropDownButton'"> <img alt="Custom icon" src="../../../../images/icons/custom-dropbutton-icon.svg" class="custom-icon" /> </div> </dx-select-box> </div> </div> <div class="dx-field"> <div class="dx-field-label">Load indicator as the icon</div> <div class="dx-field-value"> <dx-select-box [dataSource]="deferredProducts" [inputAttr]="{ 'aria-label': 'Deferred Product' }" > <div *dxTemplate="let data of 'dropDownButton'"> <dx-load-indicator [visible]="!isLoaded"></dx-load-indicator> <span [hidden]="!isLoaded"> <img alt="Custom icon" src="../../../../images/icons/custom-dropbutton-icon.svg" class="custom-icon" /> </span> </div> </dx-select-box> </div> </div> <div class="dx-field"> <div class="dx-field-label">Value-dependent icon</div> <div class="dx-field-value"> <dx-select-box [dataSource]="products" [inputAttr]="{ 'aria-label': 'Templated Product' }" [(selectedItem)]="selectedItem" [value]="1" showClearButton="true" displayExpr="Name" valueExpr="ID" > <div *dxTemplate="let data of 'dropDownButton'"> <img *ngIf="selectedItem" alt="Custom icon" src="../../../../images/icons/{{ selectedItem.IconSrc }}" class="custom-icon" /> <div *ngIf="!selectedItem" class="dx-dropdowneditor-icon"></div> </div> <div *dxTemplate="let data of 'item'" class="custom-item"> <img alt="{{ data.Name }}" src="../../../../images/icons/{{ data.IconSrc }}" /> <div class="product-name">{{ data.Name }}</div> </div> </dx-select-box> </div> </div> </div>
import { NgModule, Component, enableProdMode } from '@angular/core'; import { BrowserModule, BrowserTransferStateModule } from '@angular/platform-browser'; import { platformBrowserDynamic } from '@angular/platform-browser-dynamic'; import { DxSelectBoxModule, DxLoadIndicatorModule, DxTemplateModule, } from 'devextreme-angular'; import ArrayStore from 'devextreme/data/array_store'; import { Product, Service } from './app.service'; if (!/localhost/.test(document.location.host)) { enableProdMode(); } @Component({ selector: 'demo-app', templateUrl: 'app/app.component.html', styleUrls: ['app/app.component.css'], providers: [Service], }) export class AppComponent { simpleProducts: string[]; products: Product[]; data: any; isLoaded = true; selectedItem: Product; deferredProducts: any; constructor(service: Service) { const that = this; this.products = service.getProducts(); this.selectedItem = this.products[0]; this.simpleProducts = service.getSimpleProducts(); this.deferredProducts = { loadMode: 'raw', load() { that.isLoaded = false; const promise = new Promise((resolve, reject) => { setTimeout(() => { resolve(that.simpleProducts); that.isLoaded = true; }, 3000); }); return promise; }, }; } } @NgModule({ imports: [ BrowserModule, BrowserTransferStateModule, DxSelectBoxModule, DxLoadIndicatorModule, DxTemplateModule, ], declarations: [AppComponent], bootstrap: [AppComponent], }) export class AppModule { } platformBrowserDynamic().bootstrapModule(AppModule);
::ng-deep .dx-dropdowneditor-button .dx-button-content { text-align: center; } ::ng-deep .dx-theme-material .dx-dropdowneditor-button .dx-button-content .dx-loadindicator { width: 24px; height: 24px; } ::ng-deep .custom-icon { max-height: 100%; max-width: 100%; font-size: 28px; display: inline-block; vertical-align: middle; } ::ng-deep .custom-item img { float: right; } ::ng-deep .custom-item .product-name { line-height: 32px; padding-left: 5px; }
import { Injectable } from '@angular/core'; export class Product { ID: number; Name: string; Price: number; Current_Inventory: number; Backorder: number; Manufacturing: number; Category: string; IconSrc: string; } const simpleProducts: string[] = [ 'HD Video Player', 'SuperHD Video Player', 'SuperPlasma 50', 'SuperLED 50', 'SuperLED 42', ]; const products: Product[] = [{ ID: 1, Name: 'HD Video Player', Price: 330, Current_Inventory: 225, Backorder: 0, Manufacturing: 10, Category: 'Video Players', IconSrc: 'video-player.svg', }, { ID: 2, Name: 'SuperHD Player', Price: 400, Current_Inventory: 150, Backorder: 0, Manufacturing: 25, Category: 'Video Players', IconSrc: 'video-player.svg', }, { ID: 3, Name: 'SuperPlasma 50', Price: 2400, Current_Inventory: 0, Backorder: 0, Manufacturing: 0, Category: 'Televisions', IconSrc: 'tv.svg', }, { ID: 4, Name: 'SuperLED 50', Price: 1600, Current_Inventory: 77, Backorder: 0, Manufacturing: 55, Category: 'Televisions', IconSrc: 'tv.svg', }, { ID: 5, Name: 'SuperLED 42', Price: 1450, Current_Inventory: 445, Backorder: 0, Manufacturing: 0, Category: 'Televisions', IconSrc: 'tv.svg', }]; @Injectable() export class Service { getSimpleProducts(): string[] { return simpleProducts; } getProducts(): Product[] { return products; } }
// In real applications, you should not transpile code in the browser. // You can see how to create your own application with Angular and DevExtreme here: // https://js.devexpress.com/Documentation/Guide/Angular_Components/Getting_Started/Create_a_DevExtreme_Application/ window.config = { transpiler: 'ts', typescriptOptions: { module: 'system', emitDecoratorMetadata: true, experimentalDecorators: true, }, meta: { 'typescript': { 'exports': 'ts', }, 'devextreme/localization.js': { 'esModule': true, }, }, paths: { 'npm:': 'https://unpkg.com/', }, map: { 'ts': 'npm:plugin-typescript@4.2.4/lib/plugin.js', 'typescript': 'npm:typescript@4.2.4/lib/typescript.js', '@angular/core': 'npm:@angular/core@12.2.17', '@angular/platform-browser': 'npm:@angular/platform-browser@12.2.17', '@angular/platform-browser-dynamic': 'npm:@angular/platform-browser-dynamic@12.2.17', '@angular/forms': 'npm:@angular/forms@12.2.17', '@angular/common': 'npm:@angular/common@12.2.17', '@angular/compiler': 'npm:@angular/compiler@12.2.17', 'tslib': 'npm:tslib@2.3.1/tslib.js', 'rxjs': 'npm:rxjs@7.5.3/dist/bundles/rxjs.umd.js', 'rxjs/operators': 'npm:rxjs@7.5.3/dist/cjs/operators/index.js', 'rrule': 'npm:rrule@2.6.4/dist/es5/rrule.js', 'luxon': 'npm:luxon@1.28.1/build/global/luxon.min.js', 'es6-object-assign': 'npm:es6-object-assign@1.1.0', 'devextreme': 'npm:devextreme@23.1.5/cjs', 'devextreme/bundles/dx.all': 'npm:devextreme@23.1.5/bundles/dx.all.js', 'jszip': 'npm:jszip@3.7.1/dist/jszip.min.js', 'devextreme-quill': 'npm:devextreme-quill@1.6.2/dist/dx-quill.min.js', 'devexpress-diagram': 'npm:devexpress-diagram@2.2.1', 'devexpress-gantt': 'npm:devexpress-gantt@4.1.48', 'devextreme-angular': 'npm:devextreme-angular@23.1.5', '@devextreme/runtime': 'npm:@devextreme/runtime@3.0.11', 'inferno': 'npm:inferno@7.4.11/dist/inferno.min.js', 'inferno-compat': 'npm:inferno-compat/dist/inferno-compat.min.js', 'inferno-create-element': 'npm:inferno-create-element@7.4.11/dist/inferno-create-element.min.js', 'inferno-dom': 'npm:inferno-dom/dist/inferno-dom.min.js', 'inferno-hydrate': 'npm:inferno-hydrate@7.4.11/dist/inferno-hydrate.min.js', 'inferno-clone-vnode': 'npm:inferno-clone-vnode/dist/inferno-clone-vnode.min.js', 'inferno-create-class': 'npm:inferno-create-class/dist/inferno-create-class.min.js', 'inferno-extras': 'npm:inferno-extras/dist/inferno-extras.min.js', // Prettier 'prettier/standalone': 'npm:prettier@2.8.4/standalone.js', 'prettier/parser-html': 'npm:prettier@2.8.4/parser-html.js', }, packages: { 'app': { main: './app.component.ts', defaultExtension: 'ts', }, 'devextreme': { defaultExtension: 'js', }, 'devextreme/events/utils': { main: 'index', }, 'devextreme/events': { main: 'index', }, 'es6-object-assign': { main: './index.js', defaultExtension: 'js', }, 'rxjs': { defaultExtension: 'js', }, 'rxjs/operators': { defaultExtension: 'js', }, }, packageConfigPaths: [ 'npm:@devextreme/*/package.json', 'npm:@devextreme/runtime@3.0.11/inferno/package.json', 'npm:@angular/*/package.json', 'npm:@angular/common@12.2.17/*/package.json', 'npm:rxjs@7.5.3/package.json', 'npm:rxjs@7.5.3/operators/package.json', 'npm:devextreme-angular@23.1.5/*/package.json', 'npm:devextreme-angular@23.1.5/ui/*/package.json', 'npm:devextreme-angular@23.1.5/package.json', 'npm:devexpress-diagram@2.2.1/package.json', 'npm:devexpress-gantt@4.1.48/package.json', ], }; System.config(window.config);
<!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>DevExtreme Demo</title> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0" /> <link rel="stylesheet" type="text/css" href="https://cdn3.devexpress.com/jslib/23.1.5/css/dx.light.css" /> <script src="https://unpkg.com/core-js@2.6.12/client/shim.min.js"></script> <script src="https://unpkg.com/zone.js@0.12.0/dist/zone.js"></script> <script src="https://unpkg.com/reflect-metadata@0.1.13/Reflect.js"></script> <script src="https://unpkg.com/systemjs@0.21.3/dist/system.js"></script> <script src="config.js"></script> <script> System.import("app").catch(console.error.bind(console)); </script> </head> <body class="dx-viewport"> <div class="demo-container"> <demo-app>Loading...</demo-app> </div> </body> </html>
|
Browse
You are looking at 1 - 1 of 1 items for :
• Hurricane and Severe Storm Sentinel (HS3) x
• Monthly Weather Review x
• Tropical Cyclone Intensity Experiment (TCI) x
• Refine by Access: All Content x
Clear All
William A. Komaromi and James D. Doyle
Abstract
Dropsonde data collected during the NASA Hurricane and Severe Storm Sentinel (HS3) field campaign from 16 research missions spanning 6 tropical cyclones (TCs) are investigated, with an emphasis on TC outflow and the warm core. The Global Hawk (GH) AV-6 aircraft provided a unique opportunity to investigate the outflow characteristics due to a combination of 18+-h flight durations and the ability to release dropsondes from high altitudes above 100 hPa. Intensifying TCs are found to be associated with stronger upper-level divergence and radial outflow relative to nonintensifying TCs in the sample, regardless of current intensity. A layer of 2–4 m s−1 inflow 20–50 hPa deep is also observed 50–100 hPa above the maximum outflow layer, which appears to be associated with lower-stratospheric descent above the eye. The potential temperature of the outflow is found to be more strongly correlated with the equivalent potential temperature of the boundary layer inflow than to the present storm intensity, consistent with the outflow temperature having a stronger relationship with potential intensity than actual intensity. Finally, the outflow originates from a region of low inertial stability that extends above the cyclone from 300 to 150 hPa and from 50- to 200-km radius.
The unique nature of this dataset allows the height and structure of the warm core also to be investigated. The magnitude of the warm core was found to be positively correlated with TC intensity, while the height of the warm core was weakly positively correlated with intensity. Finally, neither the height nor magnitude of the warm core exhibits any meaningful relationship with intensity change.
Full access
|
nLab recursive subset
Contents
Context
Type theory
natural deduction metalanguage, practical foundations
1. type formation rule
2. term introduction rule
3. term elimination rule
4. computation rule
type theory (dependent, intensional, observational type theory, homotopy type theory)
syntax object language
computational trinitarianism =
propositions as types +programs as proofs +relation type theory/category theory
logicset theory (internal logic of)category theorytype theory
propositionsetobjecttype
predicatefamily of setsdisplay morphismdependent type
proofelementgeneralized elementterm/program
cut rulecomposition of classifying morphisms / pullback of display mapssubstitution
introduction rule for implicationcounit for hom-tensor adjunctionlambda
elimination rule for implicationunit for hom-tensor adjunctionapplication
cut elimination for implicationone of the zigzag identities for hom-tensor adjunctionbeta reduction
identity elimination for implicationthe other zigzag identity for hom-tensor adjunctioneta conversion
truesingletonterminal object/(-2)-truncated objecth-level 0-type/unit type
falseempty setinitial objectempty type
proposition, truth valuesubsingletonsubterminal object/(-1)-truncated objecth-proposition, mere proposition
logical conjunctioncartesian productproductproduct type
disjunctiondisjoint union (support of)coproduct ((-1)-truncation of)sum type (bracket type of)
implicationfunction set (into subsingleton)internal hom (into subterminal object)function type (into h-proposition)
negationfunction set into empty setinternal hom into initial objectfunction type into empty type
universal quantificationindexed cartesian product (of family of subsingletons)dependent product (of family of subterminal objects)dependent product type (of family of h-propositions)
existential quantificationindexed disjoint union (support of)dependent sum ((-1)-truncation of)dependent sum type (bracket type of)
logical equivalencebijection setobject of isomorphismsequivalence type
support setsupport object/(-1)-truncationpropositional truncation/bracket type
n-image of morphism into terminal object/n-truncationn-truncation modality
equalitydiagonal function/diagonal subset/diagonal relationpath space objectidentity type/path type
completely presented setsetdiscrete object/0-truncated objecth-level 2-type/set/h-set
setset with equivalence relationinternal 0-groupoidBishop set/setoid with its pseudo-equivalence relation an actual equivalence relation
equivalence class/quotient setquotientquotient type
inductioncolimitinductive type, W-type, M-type
higher inductionhigher colimithigher inductive type
-0-truncated higher colimitquotient inductive type
coinductionlimitcoinductive type
presettype without identity types
set of truth valuessubobject classifiertype of propositions
domain of discourseuniverseobject classifiertype universe
modalityclosure operator, (idempotent) monadmodal type theory, monad (in computer science)
linear logic(symmetric, closed) monoidal categorylinear type theory/quantum computation
proof netstring diagramquantum circuit
(absence of) contraction rule(absence of) diagonalno-cloning theorem
synthetic mathematicsdomain specific embedded programming language
homotopy levels
semantics
Deduction and Induction
Foundations
foundations
The basis of it all
Set theory
set theory
Foundational axioms
foundational axioms
Removing axioms
Contents
Idea
A set SS of natural numbers is recursive if there is an algorithm which will decide in finitely many steps whether a given natural number belongs to SS.
Definition
A subset SS of the set of natural numbers \mathbb{N}, or more generally of k\mathbb{N}^k with kk finite, is recursive if there is a computable function (a total recursive function) f: k2={0,1}f: \mathbb{N}^k \to \mathbf{2} = \{0, 1\} \subseteq \mathbb{N} such that S=f 1(1)S = f^{-1}(1). Recursive subsets are a proper subclass of the class of recursively enumerable? sets, which are domains of partial recursive functions f: kf: \mathbb{N}^k \to \mathbb{N}, or equivalently images of total recursive functions.
Properties
Recursive sets form a Boolean subalgebra of the power set algebra P()P(\mathbb{N}) (whereas recursively enumerable subsets do not form a Boolean subalgebra). Even in constructive mathematics (where the power set algebra may be only a Heyting algebra), the recursive sets form a Boolean algebra (a Boolean subalgebra of the algebra of decidable subsets).
Examples and counterexamples
• One can encode proofs in the formal theory PAPA (Peano arithmetic) as natural numbers, via a process of Gödel-numbering. The set of codes of such formal proofs is a recursive set. In colloquial language: it is possible to program a computer to detect whether or not a string of symbols represents a valid proof in PAPA.
• It follows that the set of codes of theorems (provable propositions) is recursively enumerable. However, it is not recursive. This is one way of saying that provability in PA cannot be decided by an algorithm, which is closely related to Gödel’s incompleteness theorems.
Last revised on August 13, 2013 at 17:11:41. See the history of this page for a list of all contributions to it.
|
What Can Make You Feel Better Physically?
Written by Jerry Painter; Updated December 14, 2018
Eating a lot of unhealthy foods can take a toll on your body. You feel sluggish, irritable, and you don't have a lot of energy. Even worse, a high-sugar, high-fat diet can lead to some serious diseases. Making some simple changes to your diet can turn your tiredness into wiredness.
Start With Breakfast
Even if you’re not a morning person, your body needs fuel first thing in the morning to get you going. If you skip breakfast, your body isn’t going to be giving you 100 percent of its ability. Establish a breakfast routine and try to incorporate the three macronutrients: carbs, protein, and fats. One such breakfast, for example, consists of a cooked egg, a piece of whole-grain toast, and a couple of turkey sausage links. Be creative with your breakfast ideas. Old-fashioned oats are a healthy carbohydrate, and they keep you feeling full for a long time. Having a healthy breakfast routine keeps you feeling better throughout your day.
Complex Carbohydrates
Simple carbohydrates, like those found in sugary pastries and desserts, offer very little nutritional value. Eating these foods regularly can make you gain weight and feel sluggish. You may feel immediate energy after eating these tasty foods, but the energy quickly crashes and you’re hungry again. Complex carbohydrates, on the other hand, help your digestive system work optimally. When your digestive system works well, you feel better. You feel full longer. Choose foods that are labeled "whole-grain" or "whole-wheat." Vegetables and fruits are also a wonderful source of complex carbohydrates. Eat a variety of brightly-colored fruits and vegetables and your body will thank you by feeling great.
Hydrate
If you’re not consuming enough fluid, you could be putting your health in jeopardy. Feeling sleepy, tired, or lightheaded can be signs that you’re not getting enough fluid. Your body appreciates water much more than sugary beverages. Drink ice cold water instead of colas for a week and notice the difference in how you feel. When you drink water, not only are you quenching your thirst, you’re filling up on a zero-calorie beverage.
Sleep
An unhealthy diet can also affect your sleep. When you’re physically exhausted you don’t have energy to do much of anything. Lack of sleep can also lead to poor health. Having a food journal can help you keep track of foods that keep you awake or help you sleep. Write down everything you eat during the day. Give yourself a sleep score, say, 1 for no sleep and 5 for great sleep. Compare your sleep score to your diet and note any correlations. Sleep is often taken for granted but nothing makes you feel better than a peaceful night's rest.
Resources (1)
• Dietary Guidelines for Americans, 2010; U.S. Department of Agriculture
About the Author
Jerry Painter
Jerry Painter is a registered dietitian, personal trainer, yoga instructor and health fitness specialist with the American College of Sports Medicine. He holds a Master of Science in marketing/communications and is pursuing a master's degree in exercise science and nutrition. Painter has been writing about health for more than 10 years.
bibliography-icon icon for annotation tool Cite this Article
×
|
Hey! If you love C# and building C# apps as much as I do, let's connect on Twitter or LinkedIn. I talk about this stuff all the time!
Method Parameters and Return Types in C#
Unlock the full potential of your C# methods with our comprehensive guide to parameter passing and return types. Learn how to declare and use parameters effectively, and discover the power of return types in creating more robust and flexible code.
Updated October 18, 2023
In C#, methods can have parameters and return values just like functions in other programming languages. Understanding how to use method parameters and return types effectively is crucial for writing robust and maintainable code. In this article, we’ll explore the basics of method parameters and return types in C#.
Method Parameters
Method parameters are the values that are passed to a method when it is called. These values can be used within the method body to perform some operation or to modify the state of the object. Method parameters can be defined using the param keyword, followed by the name of the parameter and its data type. Here’s an example:
void Greet(string name)
{
Console.WriteLine("Hello, {0}", name);
}
In this example, the Greet method takes a single parameter named name, which is of type string. When the Greet method is called, the value of name is passed as an argument to the method. For example:
Greet("John");
Method Return Types
Method return types specify the data type that the method will return after it has completed its execution. The return type can be defined using the returns keyword, followed by the name of the data type. Here’s an example:
int Add(int a, int b)
{
return a + b;
}
In this example, the Add method takes two parameters named a and b, which are both of type int. The method returns the result of adding a and b, which is also of type int. For example:
int result = Add(1, 2);
Passing Parameters by Value or Reference
By default, method parameters in C# are passed by value. This means that the called method receives a copy of the parameter value, and any changes made to the copy do not affect the original value. However, you can pass parameters by reference instead of by value using the out keyword. Here’s an example:
void Modify(out int value)
{
value = 10;
}
int x = 5;
Modify(out x);
Console.WriteLine(x); // Output: 10
In this example, the Modify method takes a single parameter named value, which is of type int. The method modifies the value of x and returns it as the result of the method call. By passing x by reference instead of by value, we can modify the original value in the calling code.
Default Values for Method Parameters
You can specify a default value for a method parameter using the = operator. Here’s an example:
void Greet(string name = "John")
{
Console.WriteLine("Hello, {0}", name);
}
In this example, the Greet method takes a single parameter named name, which has a default value of "John". When the method is called without an explicit value for name, the default value will be used instead. For example:
Greet(); // Output: Hello, John
Using Optional Parameters
Optional parameters allow you to specify that a method parameter can be omitted or provided with a default value. You can define an optional parameter using the ?? operator. Here’s an example:
void Greet(string name ?? "World")
{
Console.WriteLine("Hello, {0}", name);
}
In this example, the Greet method takes a single parameter named name, which has an optional default value of "World". When the method is called without an explicit value for name, the default value will be used instead. For example:
Greet(); // Output: Hello, World
Greet("John"); // Output: Hello, John
Conclusion
In this article, we’ve covered the basics of method parameters and return types in C#. Understanding how to use these features effectively is crucial for writing robust and maintainable code. Remember that you can pass parameters by value or reference, specify default values for method parameters, and use optional parameters to make your code more flexible and easier to use. Happy coding!
|
Course Title: Quantum Electronics Course Code: 504993
Disciplinary field of science: FIS/03
InstructorProf. Federico Pirzio (Photonics Lab)
e-mail: federico.pirzio@unipv.it
Timetable: Tue 14-16, Room A1, Thu 16-18, Room E4
Course Description - Topics
I will first introduce the basic concepts of quantum theory. I will discuss how quantum theory arose in the face of certain discrepancies between 19th-century classical theory and experiments and we will see Schrödinger equation in action by describing the properties of a particle in simple quantum wells. Then I will extend to 3D to describe angular momentum, Hydrogen atom and the periodic table of elements.
In the second part of the course I will introduce perturbative method and apply this technique to study the interaction between an atomic system and an electromagnetic wave. I will describe the fundamental phenomena of absorption, spontaneous and stimulated emission of radiation and the concept of optical amplification. This will allow for a better understanding of the functioning of lasers. I will describe the main operation regimes of laser sources (free running, Q-Switching and Mode-Locking) and illustrate some representative example of Gas, Solid-State, Fiber and Semiconductor lasers.
|
HTML Editor Online
Search Engine Optimization
HTML Editor Online
Sobre HTML Editor Online
What is an HTML Editor Online?
An HTML editor is software for editing HTML, the markup of a web page. Although the HTML markup in a web web page may be managed with any text editor, specialized HTML editors can provide comfort and introduce functionality.
How is it beneficial?
Using HTML editing software can make page authoring much easier. HTML editors allow you to use tags and attributes without knowing the code. Advanced HTML editors tend to be updated more often to support the latest Web technologies. Not all HTML editors create code the same.
How to use it?
Compose your textual content using the WYSIWYG (What You See Is What You Get) editor at the left and modify the formatting of the supply code at the right. To convert Microsoft Word, PDF or every other rich-textual content files to HTML, really paste it withinside the visual editor. Perform bulk operations at the HTML code by clicking the Clean button after adjusting the settings.
|
Technical Article
WorkDay Functions
,
I recently needed to create a job that would populate a cache on the 4th business day of the month.
I found a few solutions that were pretty good. Here is my approach to this.
-- First, we need a table of holidays:
CREATE TABLE [dbo].[Holidays]
(
[Date] [date] NOT NULL,
[HolidayText] [varchar] (64) COLLATE SQL_Latin1_General_CP1_CI_AS NOT NULL
) ON [PRIMARY]
GO
GRANT SELECT ON dbo.Holidays TO PUBLIC
INSERT dbo.Holidays
VALUES
('2019-01-01', 'New Year''s Day')
,('2019-01-21', 'Martin Luther King Day')
,('2019-02-18', 'President''s Day')
,('2019-05-27', 'Memorial Day')
,('2019-07-04', 'Independence Day')
,('2019-09-02', 'Labour Day')
,('2019-11-11', 'Veterans'' Day')
,('2019-11-28', 'Thanksgiving Day')
,('2019-11-29', 'Day after Thanksgiving')
,('2019-12-25', 'Christmas Day')
,('2019-12-24', 'Christmas Eve Day')
,('2020-01-01', 'New Year''s Day')
,('2020-01-20', 'Martin Luther King Day')
,('2020-02-17', 'President''s Day')
,('2020-05-25', 'Memorial Day')
,('2020-07-04', 'Independence Day')
,('2020-09-07', 'Labour Day')
,('2020-11-11', 'Veterans'' Day')
,('2020-11-27', 'Day after Thanksgiving')
,('2020-11-26', 'Thanksgiving Day')
,('2020-12-25', 'Christmas Day')
,('2021-01-01', 'New Year''s Day')
,('2021-01-18', 'Martin Luther King Day')
,('2021-02-15', 'President''s Day')
,('2021-05-31', 'Memorial Day')
,('2021-07-04', 'Independence Day')
,('2021-09-06', 'Labour Day')
,('2021-11-11', 'Veterans'' Day')
,('2021-11-26', 'Day after Thanksgiving')
,('2021-11-25', 'Thanksgiving Day')
,('2021-12-25', 'Christmas Day')
And here are the functions
IF OBJECT_ID(N'dbo.WorkDayOfMonth') IS NOT NULL
DROP FUNCTION dbo.WorkDayOfMonth;
GO
CREATE FUNCTION dbo.WorkDayOfMonth
( @Date date
)
RETURNS INT
WITH EXECUTE AS CALLER
AS
BEGIN
DECLARE @dt2 DATE = DATEFROMPARTS(YEAR(@Date)- 1, 12, 31),
@workday INT;
SELECT @workday = T.workday
FROM
(
SELECT D.date1,
ROW_NUMBER() OVER (PARTITION BY MONTH(date1), YEAR(date1) ORDER BY DAY(D.Date1)) AS workday
FROM
(
SELECT DATEADD(DAY, M.Num, @dt2) AS date1
FROM
(
SELECT ROW_NUMBER() OVER (ORDER BY object_id) AS Num
FROM sys.all_objects
) AS M
WHERE DATEADD(DAY, Num, @dt2) <= DATEFROMPARTS(YEAR(@Date), 12, 31)
) AS D
LEFT JOIN dbo.Holidays H
ON D.date1 = H.[Date]
WHERE H.[Date] IS NULL
AND DATEPART(WEEKDAY, D.date1)
BETWEEN 2 AND 6 -- sunday = 1
) AS T
WHERE T.date1 = @Date;
RETURN (@workday);
END;
GO
IF OBJECT_ID(N'dbo.WorkDayOfYear') IS NOT NULL
DROP FUNCTION dbo.WorkDayOfYear;
GO
CREATE FUNCTION dbo.WorkDayOfYear
( @Date date
)
RETURNS INT
WITH EXECUTE AS CALLER
AS
BEGIN
DECLARE @dt2 DATE = DATEFROMPARTS(YEAR(@Date) - 1, 12, 31),
@workday INT;
SELECT @workday = T.workday
FROM
(
SELECT D.date1,
ROW_NUMBER() OVER (PARTITION BY YEAR(date1) ORDER BY date1) AS workday
FROM
(
SELECT DATEADD(DAY, M.Num, @dt2) AS date1
FROM
(
SELECT ROW_NUMBER() OVER (ORDER BY object_id) AS Num
FROM sys.all_objects
) AS M
WHERE DATEADD(DAY, Num, @dt2) <= DATEFROMPARTS(YEAR(@Date), 12, 31)
) AS D
LEFT JOIN dbo.Holidays H
ON D.date1 = H.[Date]
WHERE H.[Date] IS NULL
AND DATEPART(WEEKDAY, D.date1)
BETWEEN 2 AND 6 -- sunday = 1
) AS T
WHERE T.date1 = @Date;
RETURN (@workday);
END;
GO
IF OBJECT_ID(N'dbo.AddWorkDays') IS NOT NULL
DROP FUNCTION dbo.AddWorkDays;
GO
CREATE FUNCTION dbo.AddWorkDays
(
@Date DATE
,@NumDays int
)
RETURNS DATE
WITH EXECUTE AS CALLER
AS
BEGIN
IF @NumDays = 0
RETURN @Date
-- there are approx 21 working days in a month. @numdays * 2 should be enough to cover it
DECLARE @dt2 DATE = DATEADD(DAY, @numdays*2, @Date),
@result date;
SELECT @result = T.date1
FROM ( SELECT D.date1,
ROW_NUMBER() OVER ( ORDER BY D.Num) AS workday
FROM
(
SELECT DATEADD(DAY, M.Num*SIGN(@NumDays), @Date) AS date1, M.Num
FROM
(
SELECT ROW_NUMBER() OVER (ORDER BY s1.object_id) AS Num
FROM sys.all_objects s1
CROSS JOIN sys.all_objects s2
) AS M
WHERE Num < ABS(@NumDays)*2
) AS D
LEFT JOIN dbo.Holidays H
ON D.date1 = H.[Date]
WHERE H.[Date] IS NULL
AND DATEPART(WEEKDAY, D.date1)
BETWEEN 2 AND 6 -- sunday = 1
) AS T WHERE T.workday =ABS(@NumDays)
RETURN @result
END;
GO
IF OBJECT_ID(N'dbo.ListWorkDays') IS NOT NULL
DROP FUNCTION dbo.ListWorkDays;
GO
CREATE FUNCTION dbo.ListWorkDays
(
@FromDate DATE,
@ToDate DATE
)
RETURNS
@ListWorkDays TABLE
(
Date1 DATE,
WorkDay int
)
AS
BEGIN
INSERT @ListWorkDays
(
Date1,
WorkDay
)
SELECT D.date1,
ROW_NUMBER() OVER (ORDER BY D.Num) AS workday
FROM
(
SELECT DATEADD(DAY, M.Num , @FromDate) AS date1, M.Num
FROM
(
SELECT ROW_NUMBER() OVER (ORDER BY object_id) AS Num
FROM sys.all_objects
) AS M
WHERE Num <= DATEDIFF(DAY, @FromDate, @ToDate)
) AS D
LEFT JOIN dbo.Holidays H
ON D.date1 = H.[Date]
WHERE H.[Date] IS NULL
AND DATEPART(WEEKDAY, D.date1)
BETWEEN 2 AND 6 -- sunday = 1
RETURN
END
GO
GRANT EXEC ON dbo.WorkDayOfMonth TO PUBLIC
GRANT EXEC ON dbo.WorkDayOfYear TO PUBLIC
GRANT EXEC ON dbo.AddWorkDays TO PUBLIC
GRANT SELECT ON dbo.ListWorkDays TO PUBLIC
go
usage examples:
select dbo.WorkDayOfMonth(getdate());
if(dbo.WorkDayOfMonth(@thatdate) >0)
print 'is workday'
select dbo.WorkDayOfYear(getdate());
select dbo.AddWorkDays('2019-01-01', 22); --accepts negative numbers too
SELECT * FROM dbo.ListWorkDays('2019-01-01', '2019-09-05')
In my SQL Job
If (dbo.WorkDayOfMonth(GetDate())= 4
Begin
EXEC dbo.populateCache(@asofDate)
end
Notes:
For my needs, a tally table of about 1000 rows was adequate. sys.all_objects worked just fine for that.
but say you had someone who worked one day a week and you wanted to find when they would hit their 1000th workday, you'll need a larger tally table
sys.all_objects s1 CROSS JOIN sys.all_objects s2 can easily yield 1M rows. (depends on how many objects you have in your database)
You can easily replace Holidays with say an employee's calendar. - or their AntiCalendar - their list of holidays.
If appropriate, simply union it with Holidays.
Rate
You rated this post out of 5. Change rating
Share
Share
Rate
You rated this post out of 5. Change rating
|
Friday, May 13, 2022
What Happens To Your Brain When You Drink Alcohol
Don't Miss
Alcohol Blackouts Interrupt The Chain Of The Brain
What Happens to Your Brain When You Drink Alcohol?
Just like every other part of the body, the brain has a system in place to classify memories into categories. Weve all heard of short term and long term memory. But, there is a process that has to happen to get from one to the other, and this is where alcohol blackouts come into play. These three stages are:
• Sensory memory;
• Longterm storage
Lower Your Blood Pressure
If you drink a lot and your blood pressure is too high, you might be able to bring your numbers back down to normal by doing one simple thing: giving up alcohol. Even simply easing back on drinks can have a big payoff. Talk to your doctor about your numbers. Normal blood pressure is below 120/80. You have high blood pressure if yours is above 130/80.
Recommended Reading: Why Do People Get Brain Freeze
Alcohol Poisoning & Overdose
According to the CDC, an average of 6 people die every day in the U.S. from alcohol poisoning. Many of those deaths are as a result of binge drinking and are not from long-term alcohol use. Just one instance of excessive alcohol intake can result in an overdose, which may lead to brain damage or death.
Binge drinking means to consume a large amount of alcohol in a short period of time and is one of the most common causes of alcohol poisoning. The National Institute on Alcohol Abuse and Alcoholism states binge drinking occurs when an individuals blood alcohol content is at .08 or higher, which is the threshold for legal intoxication in many states.
An overdose happens when more alcohol is consumed than the body can process, causing a toxic build-up. The extreme depressant effect of this much alcohol can cause irregular heartbeat, dangerously low body temperature, and slowed or stopped breathing.
The Mayo Clinic website lists possible indications of alcohol poisoning including confusion, vomiting, seizures, extremely slow breathing , irregular breathing , bluish or pale skin, hypothermia, and unconsciousness. An alcohol overdose is a medical emergency. If suspected, summon help immediately.
Also Check: How To Unsubscribe From Brainly
Brain Regions Susceptible To Alcoholism
Does alcohol kill brain cells? Well, looking at how the different areas of the brain suffer under the influence of alcoholism, the answer is yes.
As the blood alcohol concentration increases, its effects on the central nervous system becomes more pronounced. The brain, being a complex system, has specific regions that are more vulnerable to chemical modifications. The following are some of the main regions in the brain system that are more susceptible to alcoholism.
Your Risk For A Heart Attack Or Stroke Will Go Up
This is what happens to your body ONE HOUR after drinking ...
While you might not be aware of the increased fat in the body if you drink alcohol every day, it may be accumulating in the arteries around the heart, according to the American Heart Association. The fat responsible here is triglycerides, and combining a high number with high LDL cholesterol or low HDL cholesterol numbers, and your risk of a heart attack and stroke increases.
Don’t Miss: Can You Get Brain Eating Amoeba From Shower
Here’s What Happens To Your Brain When You Drink Alcohol
Popping back a few beersor a few bourbonsis as American as football and apple pie. But did you ever stop to think how weird it is, that we’re purposefully drinking something that impairs our mental faculties? Whether you like a glass of bold cabernet, a Sunday morning mimosa, or a shot of whiskey, here are some things that can happen to your brain when you catch a buzz. Read on, and to ensure your health and the health of others, don’t miss theseSure Signs You’ve Already Had Coronavirus.
1
The Impact Of Alcohol
Overall, alcohol is linked to over 200 diseases, conditions, and injuries. In 2010, alcohol abuse was responsible for 2.8% of all deaths in the US. While it can take years of heavy drinking for diseases like alcohol-related brain damage to appear, negative effects on the brain materialize after only a few drinks.
As an individual consumes alcohol, he or she will begin to feel the depressant effects it has on the brain. As the bodys control center, the impairing effects of alcohol quickly impede the normal function of areas all over the body. Short-term symptoms indicating reduced brain function include difficulty walking, blurred vision, slowed reaction time, and compromised memory. Heavy drinking and binge drinking;can result in permanent damage to the brain and nervous system.
Don’t Miss: How To Cancel Brainly Subscription
What Part Of The Brain Does Alcohol Affect
Alcohol interacts with three powerful neurotransmitterschemical messengers that are responsible for communication.
• The Nucleus accumbens: the nucleus accumbens is an important structure in the middle of the brain that is part of the reward pathway. The nucleus accumbens maintains motivation, pleasure, satiety, and memories. Alcohol enhances the release of dopamine, which then produces feelings of euphoria and well-being. This is also why alcohol can be so addicting.
• Glutamate receptors: Glutamate is a chemical that excites neurons. Alcohol binds to glutamate receptors and blocks them, or keeps them from being activated.
• GABA receptors: GABA, or gamma-aminobutyric acid, is the chemical that slows the brain down. Alcohol also binds to GABA receptors and activates these receptors.
Between alcohols interaction with GABA and Glutamate, the net effect is a depression of brain activity and all the nerves in your spinal cord . This effect doesnt just result in general drowsiness, but it also slows your breathing, thinking, and even suppresses the gag reflex.
Other brain structures affected by alcohol include:
Liver Fat Will Decrease
What happens to our brains when we drink alcohol? | RMIT University
In a small study conducted by New Scientist and the Institute for Liver and Digestive Health at University College London Medical School, abstaining from alcohol for a month led to an average of 15 percent decrease in liver fat . This is important because fat accumulation in the liver can lead to liver damage and eventually liver disease.
Dont Miss: Why Do Brain Freezes Happen
Read Also: Why Do People Get Brain Freeze
Alcohol Misuse And Its Lasting Effects
Over time, excessive drinking can lead to mental health problems, such as depression and anxiety. Alcohol abuse can increase your risk for some cancers as well as severe, and potentially permanent, brain damage. It can lead to Wernicke-Korsakoff syndrome , which is marked by amnesia, extreme confusion and eyesight issues. WKS is a brain disorder caused by a thiamine deficiency, or lack of vitamin B-1. Taking certain vitamins and magnesium, along with not drinking alcohol, may improve your symptoms.
Alcohol can harm your body in many ways. The good news is that within a year of stopping drinking, most cognitive damage can be reversed or improved.
If you or someone you know needs help, please contact your physician or Alcoholics Anonymous.
Related Services
What Does This Mean
The study results dont come as news to Dr. Kenneth J. Mukamal, associate professor of medicine at Harvard Medical School. Dr. Mukamal and his colleagues reported similar findings in 2001. His team studied 3,376 men and women who were enrolled in the Cardiovascular Heart Study and who had also undergone MRI scans and had reported their alcohol consumption. The Harvard researchers also found that brain volume shrank in proportion to alcohol consumed, and that atrophy was greater even in light and moderate drinkers than in teetotalers.
Yet the meaning of the MRI scans is still far from clear, Dr. Mukamal says. Theres a great deal of doubt about whether the atrophy seen on MRI is due to loss of brain cells or to fluid shifts within the brain. He explains that this type of atrophy shows major improvements within weeks when alcoholics stop drinking, which wouldnt be the case if it were caused by brain cell death. The study offers little indication of whether moderate drinking is truly good, bad, or indifferent for long-term brain health, he says.
Read Also: Are Brain Freezes Dangerous
What Happens After 4 Days Of Not Drinking
However, by day 4 without alcohol, most people will have got beyond any initial withdrawal symptoms. All the alcohol will have left your system by now, and your body will begin to bounce back. If youre not as focused on alcohol, you may be eating better, drinking water, moving more, and perhaps sleeping more deeply.
Alcohol And The Older Brain
The Science of the Sauce: What Happens to Your Brain When ...
As we get older, the bodys ability to process and clear alcohol from your body changes. For example, there is a reduction in your muscle mass as you get older. There is also less water stored in the body. This means that alcohol becomes more concentrated in our system.
As we age, we are also more likely to:
• experience physical health problems
• take medication
• be at greater risk for other disorders of the brain, for example, dementia
Because of this, older people tolerate alcohol less well than younger people. They are more sensitive to the negative effects of alcohol. This means they experience more harms from alcohol use than other adults.
Physical problems can happen at lower levels of drinking in older people.
It can lead to an increased risk or likelihood of making some health problems worse.
These include:
You May Like: What Fluoride Does To Your Brain
Effects On The Brain From Quitting Alcohol
Quitting drinking has several immediate effects on the brain, especially for those who may engage with alcohol regularly. This intoxication can fundamentally alter ones brain chemistry, so when an individual stops drinking alcohol, the brain may begin to rapidly try to readjust itself towards balanced homeostasis. Those who suffer from addiction may have the most difficult time during this phase, as the brain is suddenly denied something that it believes is necessary for regular function, resulting in the manifestation of withdrawal symptoms soon after a person has taken their last drink.
Alcohol also greatly affects a persons senses, and the cessation of alcohol intake can begin to restore some of these senses to their regular function. This can feel like lifting a haze that may surround a persons thoughts and feelings while under the consistent influence of alcohol. While reaching this point is often preceded by some difficult withdrawal symptoms, this newly obtained clarity can truly illustrate how much of an impact alcohol can have on a persons mind and body, reinforcing ones decision to stop drinking alcohol.
What Do We Feel When We Drink
When you drink, alcohol levels build up in your blood. At first, you may feel relaxed and happy; later, alcohol can leave you feeling sleepy, confused and more likely to engage in reckless and unsafe behaviors. Alcohol suppresses our inhibitions and triggers emotional reactions; it affects the parts of the brain controlling movement, speech, judgment and memory.
Long-term alcohol abuse has a major impact on brain chemistry. This includes the development of scar tissue on the brain and the wasting away of brain tissue, which leads to cognitive impairment. With long-term abuse, alcohol affects your ability to think clearly, solve problems, make decisions, and remember events, people, places and facts.
Also Check: What Causes Slow Brain Waves On Eeg
What Happens To Your Body After 3 Days Of Not Drinking
You may find that you have more energy and better concentration. Even if you toss and turn a bit at first, when you do drop off youll get better-quality sleep and probably wake feeling more refreshed the next day. You may notice that youre not getting up for the 3 a.m. wee, too, which is a nice bonus.
What 3 Parts Of The Brain Are Affected By Alcohol
What Happens When You Drink Alcohol?
How Alcohol Affects the Brain
• The Cerebral Cortex: In charge of judgment and reasoning.
• The Cerebellum: Responsible for balance and coordination.
• The Hypothalamus: That regulates appetite, temperature, pain, and emotions.
• The Amygdala: for regulating social behavior.
• The Hippocampus: the center of memory and learning.
Also Check: How To Unsubscribe From Brainly
It Can Mess With Gut Bacteria And Cause Digestive Problems
We all have bacteria in our stomachs that allow for normal digestion. After every first sip, alcohol immediately affects this area of the body, reducing those healthy microbiomes, according to a study published in the journal Alcohol Research.
Drinking alcohol every day, then, means lasting damage to the stomach and digestive lining, causing what the research calls “leakage.” The digestive system and intestines are where the body fights infections, so you also are at risk of getting sick more often .
Is Christopher Hitchens An Alcoholic
When GABA receptors were first isolated, they did respond to alcohol, but not until alcohol concentrations reached .33 mL/L. The legal limit for driving is .08 mL/L. For the normal human, concentrations over .3 ml/L are enough to cause someone to pass out and vomit. How would that account for the buzz we feel after a few glasses of wine?
Nonetheless, alcohol shared properties with classical depressants, like Valium. Experiments in mice showed that when given Valium regularly, not only did they develop a tolerance to it, but they also developed an increased tolerance to alcohol. Called cross-tolerance, it indicates that both drugs act at the same receptor, the GABA receptor. Mounting evidence suggested that alcohol acted at GABA receptors, but research had still been unable to pin down a specific mechanism.
Part of the problem stemmed from the fact that GABA receptors are as varied as the beer menu at Oktoberfest. Each receptor is composed of five subunits, and there are multiple subunits to choose from. Is it possible that we just hadn’t tested the right one?
Yes, it turned out. One of the less common types of GABA contains a delta subunit . In the past ten years, researchers began suspecting that the delta receptor might differ from other GABA receptors. When isolated, they found that it responded to low levels of alcohol, like the amount in a glass of wine. Cheers, we found the smoking gun.
References
Don’t Miss: Which Of The Following Statements About Brain Development Is True?
Using Hightech Tools To Assess Alcoholic Brain Damage
Researchers studying the effects of alcohol use on the brain are aided by advanced technology such as magnetic resonance imaging , diffusion tensor imaging , positron emission tomography , and electrophysiological brain mapping. These tools are providing valuable insight into how alcohol affects the brains structure and function.
Longterm heavy drinking may lead to shrinking of the brain and deficiencies in the fibers that carry information between brain cells . MRI and DTI are being used together to assess the brains of patients when they first stop chronic heavy drinking and again after long periods of sobriety, to monitor for possible relapse to drinking .
Memory formation and retrieval are highly influenced by factors such as attention and motivation . Studies using MRI are helping scientists to determine how memory and attention improve with long-time abstinence from alcohol, as well as what changes take place when a patient begins drinking again. The goal of these studies is to determine which alcoholinduced effects on the brain are permanent and which ones can be reversed with abstinence.
Another hightech tool, electroencephalography , records the brains electrical signals . Small electrodes are placed on the scalp to detect this electrical activity, which then is magnified and graphed as brain waves . These brain waves show realtime activity as it happens in the brain.
The P3 component is reduced in alcoholics compared with control subjects.
END OF SIDEBAR
This Is Your Brain On Alcohol
This Is What Happens To Your Body When You Drink Alcohol ...
• By Beverly Merz, Executive Editor, Harvard Women’s Health Watch
ARCHIVED CONTENT:;As a service to our readers, Harvard Health Publishing provides access to our library of archived content. Please note the date each article was posted or last reviewed. No content on this site, regardless of date, should ever be used as a substitute for direct medical advice from your doctor or other qualified clinician.;
Its no secret that alcohol affects our brains, and most moderate drinkers like the way it makes them feel happier, less stressed, more sociable. Science has verified alcohols feel-good effect; PET scans have shown that alcohol releases endorphins which bind to opiate receptors in the brain. Although excessive drinking is linked to an increased risk of dementia, decades of observational studies have indicated that moderate drinking defined as no more than one drink a day for women and two for men has few ill effects. However, a recent British study seems to have bad news for moderate drinkers, indicating that even moderate drinking is associated with shrinkage in areas of the brain involved in cognition and learning.
You May Like: Stop Brain Freeze
Alcohol Encourages Your Brain To Release Endorphins
“Drinking causes an increase in the release of endorphins, which in turn increases dopamine in the reward centers of the brain,” Dr. Volpicelli tells Bustle. Endorphins are neurotransmitters that heighten pain tolerance and increase mood. “The increased dopamine produces feelings of euphoria and increased energy.” This is where the initial buzz of a night out comes from, and it’s also why we keep drinking once we start: the brain wants the endorphin hit to continue.
Does Drinking Alcohol Kill Brain Cells
Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital.
The idea that having a few too many drinks permanently kills off brain cells has been around for some time. Chronic heavy drinking has long been associated with mental deficits. Alcohol exposure during critical periods of brain development, such as prenatally or during the teenage years, is also particularly dangerous. But is having that glass of wine after dinner really putting you at risk for neural loss?
Read Also: Cancel Brainly Account
More articles
Popular Articles
|
Accidents & Injuries in Raleigh
man with whiplash
Patients often come into Midtown Chiropractic & Acupuncture with a history that goes something like this: “I was in a wreck about 5 years ago. My neck hurt for a while but it went away. I thought it was no big deal so I never did anything about it; but now my neck hurts all the time. Do you think it could be related to the wreck?”
It is always a good idea to have your musculo-skeletal system checked out after any kind of accident or injury. You can avoid pain far in the future by taking the simple step of getting adjusted. Here is a basic synopsis of the reason why chiropractic is a fundamental tool in injury rehabilitation.
The response of the body to traumatic injury is to lock up or “splint”. It is a great short-term response because it allows you to get up and move away from the situation.
In the long-term, however, this locking mechanism will lead to degenerative change and pain. Here’s the basic physiology of why locked joints hurt and why you need to visit Midtown to keep your spine flexible and healthy.
In our muscles and organs and in most of the body, nourishment takes place at the capillary beds. The capillary beds shrink in size to push the clear fluid of the blood out to bathe the surrounding tissues in their healing nourishment.
The point to understand is that connective tissue (joints, ligaments and tendons) don’t have direct blood supply. There is no capillary bed so joints nourish differently. Joints are like sponges in the way they nourish. They imbibe their nourishment from the surrounding environment.
Dipping a dirty sponge in clean water does not do much good. In order to clean the sponge you have to squeeze the old water out to allow new clean water in. Joints work like that. They MUST move to stay healthy.
When you have been injured in a wreck or a fall, the body splints, so the joints stop moving. In most cases it does not hurt at first. But the joint is alive, it is metabolically active, so it is always putting off waste products. As this process unfolds a bath of irritating acids develop in the tissue around the joints. In the early stages just moving and stretching and a hot shower will push the toxins out of the muscles. The pain goes away once you get going.
This process will continue until the acidity is great enough that eventually the acid itself is irritating to the nerves. At this point a feedback loop develops and people will say “I just can’t seem to make it go away or stretch it out”. Over time this degenerative process will lead to arthritic inflammation and disc disease.
Chiropractic is the best tool for keeping joints moving. Once moving the joints can, over time, nourish and heal. The immediate effect is that you will feel less pain. The important long-term benefit is that your tissues will heal and stay healthier.
A visit to your Midtown Chiropractic & Acupuncture chiropractor in Raleigh after an accident or injury will help you feel better and move better and may help you avoid surgery later in life.
Monday
6:30am - 6:00pm
Tuesday
6:30am - 6:00pm
Wednesday
6:30am - 6:00pm
Thursday
6:30am - 6:00pm
Friday
6:30am - 6:00pm
Saturday
Closed
Midtown Chiropractic & Acupuncture
1705 Pacific Drive
Raleigh, NC 27609
(919) 873-2225
|
Tooth Decay and Cavities
What is tooth decay?
Tooth decay is a disease that damages and breaks down the layers of your teeth. When you eat and drink, bacteria in your mouth feed on the sugars that are found in these foods and drinks. The bacteria create acids that break down the enamel.
What are cavities and what causes them?
A cavity is a hole in your tooth that forms from tooth decay.
When tooth decay gets through enamel, a cavity can form. Once the cavity forms in your enamel, it can continue to spread deeper into the layers of your tooth.
If the cavity gets to the pulp of your tooth, bacteria from your mouth can infect the nerves in your tooth. This can be very painful. An abscess, or pus-filled sac, can form and even become a serious, life-threatening infection if it is not treated
Who gets Cavities?
Anybody can get dental decay, but you may be increasing your risk if you:
• often sip and snack on foods and drinks high in sugars, like sodas, sports drinks, and even juice
• drink bottled water or other water without fluoride
• have dry mouth (do not make enough saliva) often because you take certain medications
• have weak enamel because of your family history or a childhood illness
• don’t brush twice daily and clean between your teeth once a day
• don’t visit your dentist regularly
A cavity that is not treated can lead to pain, loss of teeth, and even loss of confidence. If you have tooth pain, you might not be able to get through your daily routine. You also may not be able to eat or sleep properly and could miss days of work or school.
Do you have a cavity?
Tooth decay can get worse quickly, but it often takes months or years for a cavity to develop. Signs of having a cavity can include:
• a white spot on your tooth that does not go away after brushing
• loose fillings or crowns
• sensitivity to heat or cold
• tooth pain
You may notice one or more of these signs. Or you may not notice any signs at all. The best way to tell if you have a cavity is to visit your dentist for regular appointments.
How are cavities treated?
What needs to be done to treat your cavity will depend on how far inside your tooth the decay has spread. Cavities will require some type of filling. This means that the dentist will fill the hole in your tooth with a material that will act as part of your enamel and protect it from any more damage.
• If your cavity is very large, a filling may not be enough. Your tooth may need to have a crown, an inlay or an onlay placed on it.
• If the nerves of your tooth are infected, you may need a root canal treatment.
• If your tooth is badly damaged from a cavity, then it may have to be removed.
Dr. Mike and Dr. Niki Kasper will talk with you about your options and the best way to get your mouth healthy again.
*The above content is from the American Dental Association
Request An Appointment
Give the skilled team at Treasured Smiles Adult and Cosmetic Dentistry a call at (815)426-0016 and make an appointment for you or your family member. We have been helping our Frankfort, Mokena, and New Lenox, IL, neighbors maintain or regain excellent oral health for many years now. We look forward to helping you get the beautiful, healthy smile you deserve.
|
Monitoring & Preventing Problems on Wireless…
Posted on
Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
Residential and commercial users all have started using wireless connectivity more and more. You can hop online at almost any coffee shop, airport, college campus or, in some areas, even outdoors in public parks. There are also thousands of wireless networks that are not public. Many of those networks are unsecured when they should be, and due to either bad administration or company owners who don’t understand the risks or know how to implement security, they are left open, possibly risking their corporate data.
A surprisingly large number of wireless networks are not properly secured. Anyone with a laptop can walk around your office or neighborhood and use your Internet connection. This is commonly known as war-driving, or war-walking in this case. War-drivers might use this skill to gain access to the Internet to look up directions, an e-mail address or a phone number, but this open access also means that a user can browse any shares on your servers or workstations and possibly copy, delete or corrupt your data. Clearly, this kind of security breach is a huge headache for administrators, but it can be easily remedied with some smart purchases and proper administration.
Different sizes and types of businesses use wireless for different purposes. Small companies and large business alike use wireless to forgo the costs of wiring an office. There are some companies that want visitors and guests to be able to gain Internet access without allowing them to access the corporate network. And of course, there are some that have wireless access strictly for customer use. The biggest distinction on any of these networks is whether or not a wireless network user can access corporate or personal data. If they can, you most likely would want it to be secured properly.
For a small office, the variety of wireless products is staggering. Linksys, D-Link and Netgear wireless products are all popular, and are sold at a wide variety of local retail stores. Their focus is small office and home usage, and all are easy to set up and properly secure. Medium to large businesses tend to go with more scalable wireless solutions that can have multiple access points with a shared security system so that when users move from one conference room to another, they can switch access points seamlessly without interference. Many companies rely on Cisco and Nortel products to deploy these kinds of solutions.
For unsecured, public networks, you should ensure there is no data on the network at all and that the passwords on the wireless access points and router or firewalls are secure. Optionally, some combination products like Sonicwall or Watchguard have wireless access points integrated into already-well-known firewall products, which can allow you to put the wireless interface into a DMZ, virtually separating your private business network and your wireless public network. At that point, you can also lock down the wireless usage to only permit certain types of outbound traffic, such as SMTP, POP, HTTP and HTTPS, preventing your network from being used for more than checking e-mail and Web surfing. The downside to many firewall-integrated models is cost. Many of these products have an associated cost per license, making it harder for a small business owner to justify their purchase.
There are various ways to secure the wireless network. One common tactic is to not broadcast your SSID. This means that when people look for the network, it won’t show up. You can only connect to it if you explicitly know the SSID name. This is more of a method of hiding your wireless network than securing it. (“Security by obscurity,” as they say.) When setting up an access point, one of the most important things to do is change the SSID to something to either help users know which access point to use, or something to deter them from using it. A friend of mine named his access point “BROKEN-Do_not_use.” But many small businesses just use their company name, so it is easy to recognize. While this may be convenient for end users, for a potential attacker, it makes it simple to find the door to your corporate network.
One way to secure smaller networks is by using MAC address filtering. This allows you to program your access point to only allow “known” network devices to attach to it. The downside to this is that it can be tedious to keep track once you get more than 15 devices on your network. Also, it is not 100 percent safe, since many network drivers and devices allow MAC address spoofing. However, a potential hacker would have to know your MAC address as well, but if someone really wanted in, clearly the MAC address filtering alone is not enough.
Another potential way to secure your wireless network is to not use DHCP. Choose an unusual Class C range to use on your network, and use a static IP address on all clients. Clearly, this defeats some of the reasons you would use DHCP on your network. It’s not always a good solution, because if you go to static IPs, it’s another thing to keep track of.
Most forms of wireless security use an encryption code known as a WEP or WPA key. WEP is not recommended as often as it used to be, as it has been cracked and broken into rather easily using products like AirSnort, which listens for packets and, once it collects enough, recovers your WEP key. WPA, and the second generation, known as WPA2, is now much more popular. WPA2 is backwards-compatible to older WPA-only devices, and is available in two versions: WPA – Personal, which allows a device to have a common shared password that clients can use to access it; and WPA – Enterprise which relies on a RADIUS server to authenticate users. Alternatively, RADIUS can be used alone on many devices, but anyone using this alone should move to WPA2 for the additional security.
Once you secure your wireless network, you need to confirm that no one you don’t know is using it. One of the easiest ways to see a list of machines that recently used your wireless device is to check your DHCP server’s logs. As long as you recognize the machine names, your wireless network has not been used by strangers. Clearly, this line of monitoring will only work for small networks. For medium to large businesses, it is harder to monitor DHCP to find information, so you need to use more complex methods of logging and monitoring.
One of the best ways is to look into the different logging functionalities of your wireless devices. Many of the small office and home office devices have limited logging functionality, as they do not have enough onboard memory to store very much data, and some do not have the functionality to do logging to another device. Syslog and syslogd are older UNIX terms for the daemon that can be run on any UNIX or Windows machine to capture real-time data from network devices, saving it to a log file for later investigation as needed. There are also many freeware and shareware utilities for parsing through these logs.
Wireless technology will be an ever-changing thing. The different secure ways to access networks will constantly change as issues are found with them, or people figure out how to get past existing security measures. As much as any retailer or salesperson tells you the technology is foolproof and secure, the hardware manufacturers continually release new firmware for their devices and newer devices with additional security features for a reason. It behooves any network administrator, company owner or technology advisor to stay current on wireless security and to know and understand what threatens their network and how to look for it. For more information, check out www.wi-fi.org.
Chris Lehr is a self-employed technology consultant who has worked with many small to medium-sized businesses, as well as several large multinational corporations. He can be reached at
Like what you see? Share it.Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin
ABOUT THE AUTHOR
Posted in Archive|
Comment:
Leave a comment
Your email address will not be published. Required fields are marked *
You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>
|
Commit 0823a1e9 authored by Christian Hergert's avatar Christian Hergert
Browse files
clang: don't leak CXString
parent 563f62db
......@@ -934,8 +934,8 @@ ide_clang_translation_unit_lookup_symbol (IdeClangTranslationUnit *self,
if (symkind == IDE_SYMBOL_HEADER)
{
g_auto(CXString) included_file_name = {0};
CXFile included_file;
CXString included_file_name;
const gchar *path;
included_file = clang_getIncludedFile (cursor);
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment
|
1. Evolutionary Biology
Download icon
Long non-coding RNAs as a source of new peptides
1. Jorge Ruiz-Orera
2. Xavier Messeguer
3. Juan Antonio Subirana
4. M Mar Alba Is a corresponding author
1. Hospital del Mar Research Institute, Universitat Pompeu Fabra, Spain
2. Universitat Politècnica de Catalunya, Spain
3. Real Academia de Ciències i Arts de Barcelona, Spain
4. Catalan Institution for Research and Advanced Studies, Spain
Research Article
• Cited 246
• Views 10,867
• Annotations
Cite this article as: eLife 2014;3:e03523 doi: 10.7554/eLife.03523
Abstract
Deep transcriptome sequencing has revealed the existence of many transcripts that lack long or conserved open reading frames (ORFs) and which have been termed long non-coding RNAs (lncRNAs). The vast majority of lncRNAs are lineage-specific and do not yet have a known function. In this study, we test the hypothesis that they may act as a repository for the synthesis of new peptides. We find that a large fraction of the lncRNAs expressed in cells from six different species is associated with ribosomes. The patterns of ribosome protection are consistent with the translation of short peptides. lncRNAs show similar coding potential and sequence constraints than evolutionary young protein coding sequences, indicating that they play an important role in de novo protein evolution.
https://doi.org/10.7554/eLife.03523.001
eLife digest
Despite the terms being largely interchangeable in modern language, ‘DNA’ and ‘gene’ do not mean the same thing. A gene is made of DNA and contains the instructions to make a protein, and it is the protein that performs the function of the gene. However, cells in the body also contain DNA that does not form genes. Far from being ‘junk’ DNA with no biological purpose; this DNA has a variety of roles, including affecting how other genes are used.
To produce a protein, the DNA sequence of a gene is transcribed into an intermediate molecule called RNA, which is then translated to produce a protein. So-called long non-coding RNA (lncRNA) molecules are also transcribed from DNA, but whether these are translated to make proteins has been a subject of much debate. Indeed, the function of the vast majority of lncRNA molecules is unknown.
Ruiz-Orera et al. analyzed RNA sequences collected from earlier experiments on six different species—humans, mice, fish, flies, yeast, and a plant—and found nearly 2500 as yet unstudied lncRNAs in addition to those previously identified. Many of the lncRNAs that Ruiz-Orera et al. investigated could be found lodged inside the cellular machinery used to translate RNA into proteins. Furthermore, these lncRNA molecules are oriented in the machinery as if they are primed and ready for translation, suggesting that many lncRNAs do produce proteins. However, it is unclear how many of these proteins have a useful function.
Very few lncRNAs were found in more than one species, suggesting that they have evolved recently. The properties of lncRNA molecules also show many similarities with the properties of ‘young’—recently evolved—genes that are known to produce proteins. The combined findings of Ruiz-Orera et al. therefore suggest that lncRNAs are important for developing new proteins. The emergence of proteins with new functions has been an important driving force in evolution, and this work provides important clues into the first steps of this process.
https://doi.org/10.7554/eLife.03523.002
Introduction
Studies performed over the past decade have unveiled a richer and more complex transcriptome than was previously appreciated (Okazaki et al., 2002; Carninci et al., 2005; Kapranov et al., 2007; Ponjavic et al., 2007). Thousands of long RNA molecules (>200 nucleotides) that do not display the typical properties of well-characterized protein-coding RNAs, and which have been named intergenic or long non-coding RNAs (lncRNAs), have been discovered in several eukaryotic genomes (Okazaki et al., 2002; Ponting et al., 2009; Cabili et al., 2011; Liu et al., 2012; Pauli et al., 2012; Ulitsky and Bartel, 2013). There are several lncRNAs that have regulatory functions (Guttman and Rinn, 2012; Ulitsky and Bartel, 2013). For example the X-inactive-specific transcript Xist regulates X chromosome inactivation in eutherian mammals (Brockdorff et al., 1992). However, the vast majority of lncRNAs do not have a known function.
Intriguingly, several recent studies have noted that a large fraction of lncRNAs associate with ribosomes (Ingolia et al., 2011; Bazzini et al., 2014; Juntawong et al., 2014; van Heesch et al., 2014). Deep sequencing of ribosome-protected fragments, or ribosome profiling, provides detailed information on the regions that are translated in a transcript (Ingolia, 2014). According to some studies, the patterns of ribosome protection indicate that lncRNAs are capable of translating short peptides (Ingolia et al., 2011; Bazzini et al., 2014; Juntawong et al., 2014) although others have reached different conclusions (Guttman et al., 2013). Many lncRNAs have the same structure as classical mRNAs: they are transcribed by polymerase II, capped and polyadenylated, and accumulate in the cytoplasm (van Heesch et al., 2014). However, in contrast to typical protein-coding genes, they tend to contain few introns, are expressed at low levels, exhibit weak sequence constraints, and show limited phylogenetic conservation (Cabili et al., 2011; Derrien et al., 2012; Kutter et al., 2012; Necsulea et al., 2014).
The association of lncRNAs with ribosomes, and the fact that many of them appear to have arisen relatively recently in evolution, indicate that they could be an important source of new peptides. Levine et al., who described the first examples of de novo originated genes in Drosophila melanogaster, already noted that non-coding RNAs expressed at low levels could contribute to the birth of novel protein coding genes (Levine et al., 2006). Cai et al. found a new protein coding gene in Saccharomyces cerevisiae likely to have been formed from a previously transcribed non-coding sequence (Cai et al., 2008). Wilson and Masel observed that ribosome profiling reads from a yeast experiment often mapped to intergenic transcripts (Wilson and Masel, 2011), and they proposed that this could help provide the raw material for the birth of new protein-coding genes. Another study in yeast found evidence of translation of short species-specific ORFs located in non-genic regions (Carvunis et al., 2012). More generally, it is important to consider that de novo protein-coding gene evolution, which was once thought to be a very rare event, is now believed to be relatively common (Khalturin et al., 2009; Toll-Riera et al., 2009; Tautz and Domazet-Lošo, 2011; Long et al., 2013; Reinhardt et al., 2013). Recently emerged proteins tend to be very short and evolve under weak evolutionary constraints (Albà and Castresana, 2005; Levine et al., 2006; Cai et al., 2009; Liu et al., 2010; Xie et al., 2012; Palmieri et al., 2014), properties that we also expect to find in the putative ORFs of lncRNAs.
The idea that lncRNAs serve as a repository for the evolution of new peptides is appealing but the evidence is still fragmented. In this study, we have analyzed ribosome profiling experiments performed in six different species and measured the sequence coding potential and selective constraints of the putatively translated ORFs in lncRNAs and codRNAs. We have discovered that lncRNAs show very similar characteristics to evolutionary young protein coding genes (lineage-specific proteins). The results strongly support a role for lncRNAs in the production of new peptides.
Results
Characterization of coding and long non-coding transcripts
We obtained polyA+ RNA and ribosome profiling sequencing data from six different published experiments performed in diverse eukaryotic species, mouse (Mus musculus), human (Homo sapiens, HeLa cells), zebrafish (Danio rerio), fruit fly (D. melanogaster), Arabidopsis (A. thaliana), and yeast (S. cerevisiae) (Table 1). After read mapping and transcript assembly, we classified the expressed transcripts longer than 200 nucleotides into coding and long non-coding classes (codRNAs and lncRNAs, respectively, Table 2).
Table 1
Data sets used in the study
https://doi.org/10.7554/eLife.03523.003
SpeciesGEO AccessionMapped reads (millions)Max read length (bp)DescriptionReference
Mouse M. musculusRNA-seqGSE30839226.043ES cells, E14Ingolia et al., 2011
Ribosome profilingGSE3083939.247
Human H. sapiensRNA-seqGSE2200429.836HeLa cellsGuo et al., 2010
Ribosome profilingGSE2200478.336
Zebrafish D. rerioRNA-seqGSE329001382.22 × 75Series of developmental stagesChew et al., 2013
Ribosome profilingGSE465121040.044
Fruit fly D. melanogasterRNA-seqGSE491971317.9500–2hr embryos, wild typeDunn et al., 2013
Ribosome profilingGSE49197105.750
Arabidopsis A. thalianaRNA-seqGSE5059779.851No stress conditions, TRAP purificationJuntawong et al., 2014
Ribosome profilingGSE50597140.351
Yeast S. cerevisiaeRNA-seqGSE5211920.5450GSY83, diploidMcManus et al., 2014
Ribosome profilingGSE521196.8350
Table 2
Fraction of transcripts associated with ribosomes
https://doi.org/10.7554/eLife.03523.004
codRNAlncRNA
ExpressedAssociated with ribosomes (RP)ExpressedAssociated with ribosomes (RP)
TotalStringentTotalStringent
Mouse14,24514,196 (99.7%)13,918 (97.7%)476390 (81.9%)367 (77.1%)
Human17,01116,630 (97.8%)16,617 (97.7%)934403 (43.1%)343 (36.7%)
Zebrafish12,59511,643 (92.4%)11,637 (92.4%)2392726 (30.4%)684 (28.6%)
Fruit fly80418031 (99.9%)7623 (94.8%)2822 (78.6%)10 (35.7%)
Arabidopsis19,16218,879 (98.5%)10,329 (53.9%)13993 (66.9%)68 (48.9%)
Yeast47404547 (95.9%)4335 (91.5%)216 (28.6%)6 (28.6%)
1. Stringent: number of transcripts significant at p < 0.05 using 3′UTRs as a null model (see ‘Materials and methods’ for more details).
We detected hundreds of annotated lncRNAs in the vertebrate species (mouse, human and zebrafish), the number being lower (<150) in the other species (fruit fly, Arabidopsis and yeast). In addition, we identified a large number of novel lncRNAs not annotated in the databases, 2488 taking all species together (Supplementary file 1A). The inclusion of such lncRNAs resulted in a sixfold increase in the number of lncRNAs amenable for study in zebrafish and a twofold increase in mouse. In yeast, we only found two annotated lncRNAs, but there were 19 novel ones. In the majority of the analyses, we merged the annotated and the novel lncRNAs.
As expected, lncRNAs tended to be much shorter than codRNAs in all the species studied (Figure 1A). We found that most lncRNAs contained at least one short ORF (≥24 amino acids) and often several ORFs. The average ORF size in lncRNAs was between 43 and 68 amino acids depending on the species (Supplementary file 1B). Consistent with previous studies, lncRNAs were expressed at significantly lower levels than codRNAs (Figure 1B, Wilcoxon test, p < 10−5).
General characteristics of codRNA and lncRNA transcripts.
(A) Density plots of transcript length. (B) Box-plots of transcript expression level in log2(FPKM) units. lncRNA_ribo: lncRNAs associated with ribosomes; lncRNA_noribo: lncRNAs for which association with ribosomes was not detected. codRNA: coding transcripts encoding experimentally validated proteins except for zebrafish in which all transcripts annotated as coding were considered. The area within the box-plot comprises 50% of the data and the line represents the median value. In all studied species, codRNAs were expressed at higher levels than lncRNAs (Wilcoxon test, p < 10−5), and lncRNA_ribo at higher levels than lncRNA_noribo (Wilcoxon test, p < 0.005).
https://doi.org/10.7554/eLife.03523.005
Efficient detection of translation events by ribosome profiling
The analysis of ribosome profiling sequencing data showed that the percentage of expressed coding transcripts associated with ribosomes was >90% in all species, with the highest values (>99%) in mouse and fruit fly (Table 2). Pseudogenes had a lower rate of association with ribosomes than coding RNAs, but surprisingly, in species with many annotated pseudogenes, such as human, mouse, and Arabidopsis, the majority of them showed association with ribosomes (Supplementary file 1A). This appeared to be a true signal; while pseudogenes will typically show sequence similarity to other functional copies in the genome, we only considered uniquely mapped reads with no mismatches.
Ribosome profiling is based on deep sequencing, and thus provides an unmatched level of resolution of the translated peptides when compared with current proteomics techniques. This is especially important for short proteins, which are difficult to detect by standard mass spectrometry methods (Slavoff et al., 2013). We used the ribosome-associated protein-coding RNA data to investigate the relationship between peptide detection by proteomics and protein length. We found that human and mouse translated proteins between 24 and 80 amino acids long were more difficult to identify in proteomics databases than longer proteins (Table 3).
Table 3
Fraction of translated proteins of different size detected in proteomics databases
https://doi.org/10.7554/eLife.03523.006
Protein size (amino acids)
Species24–8081–130131–180>180
Mouse27/58 (46.6%)222/286 (77.6%)256/330 (77.6%)3716/4786 (77.7%)
Human116/272 (42.6%)536/748 (71.7%)669/875 (76.5%)6757/8964 (75.4%)
Yeast27/30 (90.0%)168/207 (81.1%)234/265 (88.3%)2934/3224 (91.0%)
1. Only transcripts encoding experimentally validated proteins (codRNAe) were considered.
Long non-coding RNA transcripts frequently associate with ribosomes
The percentage of lncRNAs scanned by ribosomes (lncRNA_ribo) was surprisingly high in all the species studied (Table 2). The values ranged from 28.6% in yeast to 81.9% in mouse. This affected the main lncRNA classes described in Ensembl v. 70, including long intervening non-coding RNAs (lincRNAs) or antisense transcripts (Supplementary file 1C). Short transcript size may hinder ribosome association detection (Aspden et al., 2014). We also found that the ribosome profiling signal was more difficult to detect in poorly expressed transcripts than in highly expressed ones, both for lncRNAs and codRNAs (Figure 2). As lncRNAs tend to be expressed at low levels and are short when compared to codRNAs (Figure 1), we might be underestimating their association with ribosomes.
Effect of transcript expression level on the detection of ribosome association.
The percentage of transcripts associated with ribosomes is shown for several transcript expression intervals. codRNA: annotated coding transcripts encoding experimentally verified proteins (except in zebrafish for which all coding transcripts were considered). lncRNA: annotated and novel long non-coding RNAs. Only species with at least 20 transcripts in each expression bin were plotted. In the rest of species, the data were consistent with the trends shown.
https://doi.org/10.7554/eLife.03523.007
In order to determine if the ribosome profiling signal in lncRNAs was different from noise, we compared ribosome density in the transcripts it to that in 3′untranslated regions (3′UTRs). More specifically, the null model consisted in a size-matched set of sequences containing randomly taken 3′UTR from annotated coding transcripts. Ribosome density was calculated as the number of ribosome profiling reads divided by RNA-seq reads, a ratio defined as translational efficiency (TE) (Ingolia et al., 2011). Both codRNAs and lncRNAS displayed much higher TE values than 3′UTRs in all species studied (Wilcoxon test p < 10−5, Figure 3). We could reject the null model for 90.12% of the lncRNAs and 87.19% of the codRNAs associated with ribosomes (p < 0.05) (see details by species in Table 2, Stringent set). Therefore, we concluded that the density of ribosomes in lncRNAs is much higher than expected by spurious ribosome binding.
TE distribution in human transcripts and 3′UTRs (null-model).
Cumulative distribution of TE values in human codRNAs, lncRNAs, and 3′UTR sequences. We randomly selected 3′UTRs with a minimum length of 30 nucleotides to build a set of 3′UTR sequences with the same size distribution as the complete transcripts.
https://doi.org/10.7554/eLife.03523.008
Next, we compared ribosome density in lncRNAs and codRNAs in each of the species focusing on regions covered by ribosome profiling reads to accommodate for any differences in the length of the putatively translated regions. In human, fruit fly, and yeast, TE was higher in codRNAs than in lncRNAs (Wilcoxon test, p < 0.005), but in mouse and zebrafish the opposite trend was observed (Wilcoxon test, p < 0.05) (Figure 4). Despite the differences between the species, which may be due to technical issues, it is clear that lncRNAs can show TE values that are similar or even higher than codRNAs. The results were similar when we restricted the analysis to genes encoding a single transcript to avoid any possible biases due to multiple read mapping or when we employed the maximum TE in 90 nucleotide windows (Figure 4—figure supplement 1).
Figure 4 with 1 supplement see all
Ribosome association profiles for codRNAs and lncRNAs.
Box-plots of transcript translational efficiency (TE) in log2(TE) units. The area within the box-plot comprises 50% of the data, and the line represents the median value. lncRNA: lncRNAs for which association with ribosomes was detected. codRNA: coding RNAs transcripts encoding experimentally validated proteins except for zebrafish in which all transcripts annotated as coding were considered.
https://doi.org/10.7554/eLife.03523.009
For comparison, we collected a set of 29 human genes with non-coding functions described in several recent reviews (Supplementary file 2A; Ponting et al., 2009; Ulitsky and Bartel, 2013; Fatica and Bozzoni, 2014). Many of these genes play roles in the regulation of gene expression in the nucleus and are thus unlikely to be translated. We only detected expression for five of these genes: Malat1, Pvt1, Neat1, Meg8, and Cyrano. Transcripts encoded by the first three genes showed ribosome association. In the case of Malat1, this was also consistently observed in mouse and zebrafish (in the latter species Malat1 was identified as a novel transcript) and in the case of Pvt1 in mouse. Given the small number of expressed transcripts, we could not draw any general conclusions for this set.
lncRNAs show similar ribosome protection profiles to codRNAs
The exact positions of ribosome profiling reads on the RNA can be used to delineate the regions that are being actively translated or to discover new functional ORFs (Chew et al., 2013; Guttman et al., 2013; Ingolia, 2014). Because the ribosome is released after encountering a stop codon, this technique can also be employed to identify novel C-terminal protein extensions (Dunn et al., 2013) or to evaluate if a predicted ORF is likely to correspond to a translated peptide (Guttman et al., 2013). We next aimed at comparing the TE values in different transcript regions, including open reading frames (ORFs), putative 5′ and 3′ untranslated regions (UTRs), and the regions between ORFs.
In order to obtain an unbiased picture, it was important to define the different regions in the same way in lncRNAs and codRNAs. In typical codRNAs there is a main translated ORF that covers a large fraction of the transcript, sometimes accompanied by short upstream ORFs in the 5′UTR (Chew et al., 2013). However, lncRNAs may potentially encode several short peptides (Ingolia et al., 2011). The minimum size of ORFs was set at 24 amino acids (75 nucleotides counting the STOP codon), as peptides of this size have been identified in genetic screen studies in humans (Hashimoto et al., 2001). To simplify the comparisons, we employed the same ORF size cut-off in all species. We also considered both a primary ORF, defined as the ORF with the largest number of ribosome profiling reads, as well as any additional non-overlapping ORFs that mapped to ribosome profiling reads (rest of ORFs).
In codRNAs, the primary ORF showed a nearly perfect degree of agreement with the annotated protein, indicating that it was an appropriate metric for the main translated product. Primary ORFs in lncRNAs typically occupied a shorter fraction of the transcript than in codRNAs (Figure 5A). The relative length of the ORF with respect to transcript length did not seem to be a strong predictor of ribosome association, as it did not help distinguish lncRNAs associated with ribosomes (lncRNA_ribo) to those not associated with ribosomes (lncRNA_noribo). In lncRNAs, most of the primary ORFs corresponded to proteins less than 100 amino acids long (Figure 5—figure supplement 1).
Figure 5 with 4 supplements see all
Ribosome association in different transcript regions.
(A) Density plot of the relative length of the primary ORF in lncRNA_ribo and codRNA with respect to transcript length. For comparison data for the longest ORF in lncRNA_noribo is also shown (except for fruit fly due to insufficient data). (B) Box-plots of TE distribution in primary ORF, 5′UTR, and 3′UTR regions. The area within the box-plot comprises 50% of the data, and the line represents the median value. The analysis considered all transcripts with 5′UTR and 3′UTR longer than 30 nucleotides and >0.2 FPKM in all three regions. The number of transcripts was 1956 codRNA and 159 lncRNA_ribo in mouse, 3558 codRNA and 139 lncRNA_ribo in human, 5216 codRNA and 252 lncRNA_ribo in zebrafish, and 2019 codRNA and 33 lncRNA_ribo in Arabidopsis. (C) Box-plots of TE distribution in primary ORFs, rest of ORFs with ribosome profiling reads and non-ORF regions (interORF). The analysis considered all transcripts with at least two ORFs and more than 30 nucleotides interORF. The number of transcripts was 3264 codRNA and 204 lncRNA_ribo in mouse, 3104 codRNA and 168 lncRNA_ribo in human, 1646 codRNA and 212 lncRNA_ribo in zebrafish, and 1098 codRNA and 25 lncRNA_ribo in Arabidopsis. Fruit fly and yeast were not included in the last two analyses due to insufficient data (<8 lncRNA_ribo meeting the conditions).
https://doi.org/10.7554/eLife.03523.011
Next, we focused our attention on the differences between the primary ORF and the 5′UTR and 3′UTR regions in codRNAs and lncRNAs. We defined the 3′ untranslated region (3′UTR) as the sequence located immediately after the STOP codon of the primary ORF or the most downstream ORF associated with ribosomes. We used the same criteria to define the 5′UTR upstream from the initiation codon. In this analysis, we included all transcripts containing at least one ORF associated with ribosomes (the primary ORF) and sufficiently long UTR regions as to detect ribosome profiling reads (>30 nucleotides); insufficient data for fruit fly and yeast precluded the analysis for these species. In both codRNAs and lncRNAs, the 5′UTR showed a ribosome density (translational efficiency, TE) comparable to that of the primary ORF (Figure 5B). In contrast, the 3′UTR showed very little ribosome association and often we could not find a single read mapping to this region (31–91% of cases in codRNAs and 46–68% in lncRNAs). Using genes with a single isoform or considering only annotated transcripts produced similar results (Figure 5—figure supplements 2 and 3). We also controlled for expression level by dividing the data set in transcripts with low (0.5–2 FPKM) and high expression (>2 FPKM), and by sampling the codRNAs in such a way as to have a similar expression distribution as lncRNAs. The results were very similar to those obtained with the complete data set (Figure 5—figure supplement 4), indicating that the analysis is robust to transcript expression differences.
As transcripts may contain several ORFs, we performed a separate analysis in which we compared the translational efficiency of the primary ORF, any additional ORFs with mapped ribosome profiling reads, and the regions between ribosome-protected ORFs (interORF) (Figure 5C). InterORF regions showed little signal when compared to the primary ORF, both in codRNAs and lncRNAs (Wilcoxon test, p < 10−9 in human, mouse, and zebrafish, p < 0.05 in Arabidopsis, insufficient data for fruit fly and yeast precluded the analysis for these species). The data also indicated that ribosome binding is not always restricted to the primary ORF, especially in lncRNAs, as ribosome protection could sometimes be observed for additional ORFs.
Taken together, these results indicate that lncRNAs have ribosome profiling signatures consistent with translation, with a strong decrease of ribosome density in the 3′UTR but not the 5′UTR region, and preferential binding of ribosomes to the primary ORF. There exists the possibility that the translated peptides are degraded soon after being produced. However, we estimate that the percentage of cases that may undergo nonsense-mediated decay (NMD, see ‘Materials and methods’ for more details) is low, between 4.47 and 14.11% depending on the species. For comparison, the percentage for protein-coding transcripts showing the same patterns (including transcripts annotated as NMD in Ensembl) is between 0.34 and 13.33%.
lncRNAs are less conserved than codRNAs
Are the putatively translated ORF in lncRNAs conserved? We performed sequence similarity searches using BLASTP (E-value < 10−4) against all annotated coding transcripts in Ensembl, as well as against the primary ORFs in lncRNAs, for the six species studied here (Supplementary files 1D and 2B). The number of lncRNA_ribo with homologues in other species was remarkably low (0–15.6%) except for zebrafish (49.4%). In contrast, the majority of codRNAs had homologues in other species (>95% for vertebrates and fruit fly and 70–73% for Arabidopsis and yeast). After we discarded lncRNAs that showed cross-species conservation, association with ribosomes was still very prevalent (80.4% of mouse, 40.3% of human, and 22.1% of zebrafish lncRNAs were associated with ribosomes).
We also investigated whether the ribosome-associated ORFs in lncRNAs showed homology to annotated proteins in the same species. The values were very low for all the species (0–12.4%) except for zebrafish (47.5%). Therefore, in general lncRNAs are not truncated duplicated copies (pseudogenes). The case of zebrafish is an exception probably because of missing protein-coding annotations in this species.
Coding properties of ribosome-protected ORFs in lncRNAs
Subsequently, we compared the sequence coding properties of the primary ORF in lncRNAs with those in bona fide coding and non-coding sequences using a hexamer-based coding score (see ‘Materials and methods’). In all species the coding scores of the primary ORF in lncRNAs, while lower than that of codRNAs, were significantly higher than the coding score of ORFs in introns (Figure 6, Wilcoxon test lncRNA_ribo vs intron, human, mouse, zebrafish, and Arabidopsis p < 10−16; fruit fly and yeast p < 10−5). This clearly shows that ORFs in lncRNAs are more coding-like than random ORFs. We repeated the same comparison using 100 different randomly sampled intronic sequence sets, and in >95% of the cases, we obtained the same result. lncRNAs associated with ribosomes (lncRNA_ribo) showed higher coding scores than those not associated with ribosomes (lncRNA_noribo), even when we did not use the ribosome profiling information and compared the longest ORF in both types of transcripts (Figure 6—figure supplement 1). We reached similar conclusions when we restricted the analysis to annotated lncRNA transcripts (Figure 6—figure supplement 2), when we used ORFs from gene deserts as an alternative non-coding sequence set (differences with lncRNAs significant by Wilcoxon test, p < 10−16, see ‘Materials and methods’ for more details), and when we restricted the analysis to lncRNAs for which we did not find protein coding homologues in the other species studied (Figure 6—figure supplement 3). Because a high proportion of lncRNAs contained small ORFs, we repeated the comparison only considering transcripts with ORFs shorter than 100 amino acids to avoid any length biases, again obtaining similar results (Figure 6—figure supplement 4). The use of other coding scores, for example based on codon frequencies instead of hexamer frequencies or related metrics such as GC content produced consistent results (Figure 6—figure supplement 5; Supplementary file 1E).
Figure 6 with 6 supplements see all
Coding scores in ORFs from different types of transcripts.
Intron: randomly selected intronic regions; lncRNA_noribo: lncRNAs not associated with ribosomes; lncRNA_ribo: lncRNAs associated with ribosomes; pseudogene: pseudogenes associated with ribosomes; codRNAne: coding transcripts encoding non-validated proteins associated with ribosomes; codRNAe: coding transcripts encoding experimentally validated proteins. The coding score was calculated as the log ratio of hexamer frequencies in coding vs intronic sequences. In lncRNA_noribo and introns, we considered the longest ORF and in the rest of transcripts the primary ORF. The Class ‘pseudogene’ was only included in species with more than 20 expressed pseudogenes with mapped ribosome profiling reads. The coding score of the primary ORF in lncRNAs (lncRNA_ribo) was significantly higher than the coding score in ORFs defined in introns (Wilcoxon test, human, mouse, zebrafish, and Arabidopsis p < 10−16; fruit fly and yeast p < 10−4, Wilcoxon test) and in lncRNA_ribo it was significantly higher than in lncRNA_noribo in four species (Wilcoxon test, human, mouse and zebrafish p < 10−5, and Arabidopsis p < 0.05). Transcripts from genes of different evolutionary age were taken from the literature (see manuscript text). The number of transcripts was 68 for rodent, 127/123 for mammalian (mouse/human as reference species), 11,203/13,423/9812 for metazoan (mouse/human/zebrafish), 162 for fish, 208 for Crucifera, 28 for S. cerevisiae and 84 for Saccharomyces. The youngest class of codRNAs displayed similar scores than lncRNA_ribo in mouse, zebrafish, and yeast (classes rodent, fish and S. cerevisiae, respectively), being only significantly higher in human and Arabidopsis (Wilcoxon test, p < 0.005; classes primate and Cruciferae). We did not analyze young genes in fruit fly due to lack of a suitable young set of codRNAs in this species.
https://doi.org/10.7554/eLife.03523.016
At the individual transcript level, a sizeable fraction of lncRNAs associated with ribosomes displayed significantly higher coding scores than expected for non-coding sequences (p < 0.05 in all 100 intronic random sets; data in Supplementary file 2C; examples in Figure 6—figure supplement 6). These transcripts are comprised of 143 human lncRNAs (35.5% of the lncRNAs, score > 0.0189), 137 mouse lncRNAs (35.1%, score > 0.0377), 379 zebrafish lncRNAs (52.1% score > 0.0095), 7 fruit fly lncRNAs (31.8%, score > −0.0483), 43 Arabidopsis lncRNAs (46.2%, score > −0.0202), and 5 yeast lncRNAs (83.3%, score > 0.03387). Annotated and novel lncRNAs were present in similar proportions in these sets, supporting the validity of our strategy of merging the two types of transcripts from the beginning. We also noted that the fraction of lncRNAs with coding homologues in other species increased in these sets. For example, whereas the proportion of total human lncRNA_ribo with homologues in other species was 15.6%, in the set with significant coding scores it was 29.3%. This number increased to 57.3% when we performed searches against the NCBI non-redundant peptide database ‘nr’, as some of the ORFs in lncRNAs are annotated as predicted peptides in this database.
If ORFs in lncRNAs are being translated this is likely to be a relatively recent evolutionary event, as many lncRNAs are lineage-specific (Pauli et al., 2012; Necsulea et al., 2014; our data). It is well established that proteins of different evolutionary age display distinct sequence properties, including different codon usage (Toll-Riera et al., 2009; Carvunis et al., 2012; Palmieri et al., 2014). We retrieved sets of annotated protein-coding transcripts of different evolutionary age from human, mouse, zebrafish, Arabidopsis, and yeast available from various studies (Ekman and Elofsson, 2010; Donoghue et al., 2011; Neme and Tautz, 2013) and expressed in the systems studied here. We found that the coding score was always lower in the youngest group than in older groups (Figure 6, Wilcoxon test, p < 0.05). Remarkably, the youngest codRNAs showed a very similar coding score distribution to lncRNAs (Figure 6). We obtained similar results when we discarded lncRNAs that had homologues in any of the other species (Figure 6—figure supplement 3).
We also collected information from young protein coding genes encoding experimentally verified proteins according to Swiss-Prot (Supplementary file 2D). We observed that these proteins were short and the ORF occupied a relatively small fraction of the transcript, features typically observed in lncRNAs. For example, the average size of proteins encoded by primate-specific transcripts was 148 amino acids and the average transcript coverage 47%. The coding score was remarkably low and again similar to that of lncRNAs (median 0.008 for primate-specific human transcripts, 0.046 for rodent-specific mouse transcripts, and 0.089 for yeast-specific coding transcripts).
Selection pressure signatures in ORFs associated with ribosomes
An important measure of the strength of purifying selection acting on a coding sequence is the ratio between the number of non-synonymous and synonymous single nucleotide polymorphisms (PN/PS). Given the nature of the genetic code, there are more possible non-synonymous mutations than synonymous mutations. Under neutrality (no purifying selection), the PN/PS ratio is expected to be approximately 2.89 (Nei and Gojobori, 1986).
Here, we applied the large amount of available polymorphism data for human, mouse, and zebrafish to compare the level of purifying selection in primary ORFs from codRNAs and lncRNAs (Figure 7; Supplementary file 1F). In general, human sequences showed higher PN/PS ratios than sequences from the other analyzed species, probably due to the presence of many slightly deleterious mutations segregating in the population (Eyre-Walker, 2002). However, despite the intrinsic differences between organisms, we observed the same general trends. First, the PN/PS was significantly lower in codRNAs than in lncRNAs (proportion test, p < 10−5), denoting stronger purifying selection in the former. Second, there was a very clear inverse relationship between the strength of purifying selection and the age of the gene (p < 10−15 between the youngest and rest of codRNAs in mouse and zebrafish), in agreement with previous studies (Liu et al., 2008; Cai et al., 2009). High PN/PS values were also observed in the subset of young genes encoding experimentally validated proteins in human (primate-specific transcripts median PN/PS of 3.10) and mouse (rodent-specific transcripts median PN/PS 1.42), confirming this tendency. Third, the distribution of PN/PS values in lncRNAs was very similar to that of young protein-coding genes. In human and mouse, there were no significant differences, and in the case of zebrafish the lncRNAs had even slightly lower PN/PS values than the fish-specific protein coding genes (p < 0.01).
Selective pressure in ORFs from different types of transcripts.
PN/PS: ratio between the number of non-synonymous and synonymous single nucleotide polymorphisms (SNPs) in the complete set of primary ORFs for a given class of transcripts (in lncRNA_noribo the longest ORF was considered). In blue, data for different coding and non-coding transcript classes. In brown, data for different age codRNA classes. The bars represent the 95% confidence interval for the PN/PS value. For the species not shown there was not sufficient data to perform this analysis.
https://doi.org/10.7554/eLife.03523.023
Discussion
Here, we analyzed the patterns of ribosome protection in polyA+ transcripts from cells belonging to six different eukaryotic species. Among the expressed transcripts, we identified many lncRNAs in the different species. The vast majority of transcripts annotated as coding showed association with ribosomes (>92% in all species). Remarkably, a very large number of transcripts annotated as long non-coding RNA (lncRNAs) also showed such association (30–82% depending on the data set). Considering that lncRNAs are typically much shorter and expressed at lower levels than codRNAs, which may hinder the identification of ribosome association, this is a very significant fraction. In addition, the patterns of ribosome protection along the transcript are similar to those of protein-coding genes. Therefore, many lncRNAs appear to be scanned by ribosomes and are likely to translate short peptides.
Long non-coding RNAs are classified as such in databases because, according to a number of criteria, they are unlikely to encode functional proteins. These criteria include the lack of a long ORF, the absence of amino acid sequence conservation, and the lack of known protein domains (Harrow et al., 2012). Moreover, we expect lncRNAs not to have matches to proteomics databases, as this should classify them as coding. Annotated lncRNAs are typically longer than 200 nucleotides because this is the cutoff size normally implemented to differentiate them from other RNA classes such as microRNAs and small nuclear RNAs. In practice, it is difficult to classify a transcript as coding or non-coding on the basis of the ORF size (Dinger et al., 2008). Some true coding sequences may be quite small, and by chance alone non-coding transcripts may have relatively long ORFs. The majority of lncRNAs contain ORFs longer than 24 amino acids, which can potentially correspond to real proteins. Short proteins are more difficult to detect than longer ones and consequently they are probably underestimated in databases. In recent years, the use of comparative genomics (Frith et al., 2006; Ladoukakis et al., 2011; Hanada et al., 2013), proteomics (Slavoff et al., 2013; Vanderperre et al., 2013; Ma et al., 2014), and a combination of evolutionary conservation and ribosome profiling data (Crappé et al., 2013; Bazzini et al., 2014) have shown that the number of short proteins is probably much higher than previously suspected (Andrews and Rothnagel, 2014). In yeast, gene deletion experiments have provided evidence of functionality for short open reading frames (sORFs < 100 amino acids) (Kastenmayer et al., 2006); in zebrafish, several newly discovered sORFs appear to be involved in embryonic development (Pauli et al., 2014) and other examples exist in insects (Magny et al., 2013) and humans (Lee et al., 2013; Slavoff et al., 2014). In many cases, the transcripts containing sORFs will be classified as non-coding, especially if the ORF is not well conserved across different species.
One approach to identify potential coding transcripts is ribosome profiling (Ingolia et al., 2009), which has been used to study translation of proteins in a wide range of organisms (Guo et al., 2010; Ingolia et al., 2011; Brar et al., 2012; Michel et al., 2012; Chew et al., 2013; Dunn et al., 2013; Huang et al., 2013; Artieri and Fraser, 2014; Bazzini et al., 2014; Juntawong et al., 2014; McManus et al., 2014; Vasquez et al., 2014). In several of these studies it has been noted that lncRNAs can be protected by ribosomes (Ingolia et al., 2011; Chew et al., 2013; Bazzini et al., 2014; Juntawong et al., 2014). However, there is no consensus on whether the observed patterns are consistent with translation. For example in the original analysis of mouse stem cells, which we reanalyzed here, it was reported that many lncRNAs were polycistronic transcripts encoding short proteins (Ingolia et al., 2011), but in another paper where the same data were processed in a different way, they concluded that lncRNAs were unlikely to be protein-coding (Guttman et al., 2013). A zebrafish ribosome profiling study reported resemblance between lncRNAs and 5′leaders of coding RNAs; the authors suggested that translation may play a role in lncRNA regulation (Chew et al., 2013). Nevertheless, in the same study dozens of lncRNAs were proposed to be bona fide protein-coding transcripts. In Arabidopsis, the translational efficiency values of highly expressed lncRNAs (>5 FPKM) were similar to those of coding RNAs and some lncRNAs had profiles consistent with initiation and termination of translation (Juntawong et al., 2014). Finally, using yeast data, Wilson and Masel. (2011) found many cases of non-coding transcripts bound to ribosomes and suggested that this facilitates the evolution of novel protein-coding genes from non-coding sequences.
The disparity of results obtained in different systems motivated us to retrieve the original data and perform exactly the same analyses for six different species. As lncRNA catalogues are still very incomplete for most species, we also defined sets of novel lncRNAs using the RNA-seq sequencing reads for de novo transcript assembly. We discovered many novel, non-annotated, lncRNAs, especially in zebrafish, mouse, and fruit fly (Table 2). After the analysis of the ribosome profiling data, the same general picture emerged for the different biological systems, indicating that we are detecting very fundamental properties. In transcripts classified as lncRNAs, the ribosome profiling reads tend to cover a smaller fraction of the transcript than in typical codRNAs, in agreement with a shorter relative size of the ORF accumulating the largest number of ribosome profiling reads (primary ORF). We also find that the translational efficiency of regions corresponding to the primary ORF is much higher than that of 3′UTRs, both in codRNAs and lncRNAs, consistent with translation of the transcripts. Furthermore, the primary ORF of lncRNAs showed significantly higher coding score than the longest ORF extracted from randomly selected non-coding regions.
lncRNAs often contain several potentially translated ORFs (Ingolia et al., 2011). Transcripts encoding multiple short proteins have been reported in insects (Savard et al., 2006) and could be common in other species as well (Tautz, 2009). One such candidate is AT1G34418.1 in Arabidopsis, an annotated lncRNA which contains a primary ORF followed by two instances of a 12 amino acid ORF also covered by ribosome profiling reads (Figure 6—figure supplement 6). This case is reminiscent of the gene pri in fruit fly, which regulates tarsal development (Galindo et al., 2007) and translates several small redundant ORFs (Kondo et al., 2007).
lncRNAs are poorly conserved across species and so, if translated, they will produce species- or lineage-specific proteins. Recently evolved proteins are markedly different from widely distributed ancient proteins; they are shorter, subject to weaker selective constraints and expressed at lower levels (Albà and Castresana, 2005; Cai et al., 2009; Liu et al., 2010; Donoghue et al., 2011; Carvunis et al., 2012; Xie et al., 2012; Wissler et al., 2013; Neme and Tautz, 2014). Here for the first time, we have compared the properties of the ORFs in lncRNAs associated with ribosomes with the properties of annotated, and in some cases experimentally validated, young protein-coding genes. lncRNAs and young protein-coding transcripts are virtually indistinguishable regarding their coding score and ORF selective constraints (Figures 6 and 7), which is consistent with the idea that many lncRNAs encode new peptides.
Although it is unclear how many of these peptides are functional, the data indicate that at least a fraction of them may be functional. Sequences that translate functional proteins are expected to display signs of selection related to preferential usage of certain amino acids and codons. This can be used to differentiate between coding and non-coding entities, especially in the absence of cross-species conservation, as is the case of many lncRNAs. About 35–40% of primary ORFs in human and mouse lncRNAs displayed coding scores that were significantly higher than those expected for non-coding sequences, making them excellent candidates for translating functional proteins. In fact, five human lncRNAs associated with ribosomes that exhibited high coding scores in our study were re-annotated as protein-coding transcripts in a subsequent Ensembl gene annotation release (version 75, Supplementary file 2C). Gene knock-out experiments in fly have discovered that young proteins, even if rapidly evolving, are often essential for the organism and can cause important defects when deleted (Chen et al., 2010; Reinhardt et al., 2013). Similarly, some peptides translated from lncRNAs may have important cellular functions yet to be discovered.
lncRNAs tend to be expressed at much lower levels than typical codRNAs, so, everything else being equal, the amount of translated peptide is also expected to be smaller. It may be that some of these peptides are not functional, but their translation does not produce a large enough deleterious effect for them to be eliminated via selection. Pseudogenes also showed extensive association with ribosomes in our study, indicating that the translation machinery is probably not very selective or that some pseudogenes produce functional proteins. This question may be worth revisiting, as a recent proteomics study has also found that dozens of human pseudogenes produce peptides (Kim et al., 2014).
The data also indicate that a fraction of lncRNAs have not acquired the capacity to be translated. Depending on the experiment analyzed, a number of lncRNAs did not show any significant association with ribosomes. As previously discussed, this is probably affected by a lack of sensitivity; it is also true that the lncRNAs not associated with ribosomes tended to show lower coding scores than lncRNAs associated with ribosomes, even when we did not use the ribosome profiling data and simply compared the longest ORF in both kinds of transcripts.
Recently, it has been reported that human-specific protein-coding genes are often related to non-coding transcripts in macaque, pointing to a non-coding origin for many newly evolved proteins (Xie et al., 2012). More generally, one may view de novo protein-coding gene evolution as a continuum from non-functional genomic sequences to fully-fledged protein-coding genes (Albà and Castresana, 2005; Toll-Riera et al., 2009; Carvunis et al., 2012). Therefore, many lncRNAs could be in intermediate states in this process, their pervasive translation serving as the building material for the evolution of new proteins. It may be difficult to obtain functional proteins from completely random ORFs (Jacob, 1977), but the effect of natural selection preventing the production of toxic peptides (Wilson and Masel, 2011), and the high number of transcripts expressed in the genome, may facilitate this process.
Materials and methods
Sequencing and mapping of reads
Request a detailed protocol
We downloaded the original data from Gene Expression Omnibus (GEO) for six different ribosome profiling experiments that had both ribosome footprinting and polyA+ RNA-seq sequencing reads: mouse (M. musculus) (Ingolia et al., 2011), human (H. sapiens, HeLa cells) (Guo et al., 2010), zebrafish (D. rerio) (Chew et al., 2013), fruit fly (D. melanogaster) (Dunn et al., 2013), Arabidopsis (A. thaliana) (Juntawong et al., 2014), and yeast (S. cerevisiae) (McManus et al., 2014). We retrieved genome sequences and gene annotations from Ensembl v.70 and Ensembl Plants v.21 (Flicek et al., 2012).
Raw ribosome and RNA-seq sequencing reads underwent quality filtering using Condentri (v.2.2) (Smeds and Künstner, 2011) with the following settings (-hq=30 –lq=10). Adaptors described in the original publications were trimmed from filtered reads if at least five nucleotides of the adaptor sequence matched the end of each read. In zebrafish, reads from different developmental stages were pooled to improve read coverage. In all experiments, reads below 25 nucleotides were not considered. Clean ribosome short reads were filtered by mapping them to the corresponding species reference RNA (rRNA) using the Bowtie2 short-read alignment program (v. 2.1.0) (Langmead et al., 2009). Unaligned reads were aligned to a genomic reference genome with Bowtie2 allowing one mismatch in the first 'seed' region (the length of this region was selected according to the descriptions provided in each individual experiment). RNA-seq short reads were mapped with Tophat (v. 2.0.8) (Kim et al., 2013) to the corresponding reference genome. We allowed two mismatches in the alignment with the exception of zebrafish, for which we allowed three mismatches since the reads were significantly longer. Multiple mapping was allowed unless specifically stated.
Defining a set of expressed transcripts
Request a detailed protocol
Expressed transcripts were assembled using Cufflinks (v 2.2.0) (Trapnell et al., 2010). We initially considered a transcript as expressed if it was covered by at least four reads and its abundance was higher than 1% of the most abundant isoform of the gene. We also discarded assembled transcripts in which >20% of reads were mapped to several locations in the genome. Gene annotation files from Ensembl (gtf format, v.70) were provided to Cufflinks to guide the reconstruction of already annotated transcripts. Annotated transcripts were divided into coding RNAs and long non-coding RNAs (lncRNAs), we only considered lncRNAs that were not part of genes with coding transcripts. Novel isoforms corresponding to annotated loci were not analyzed. Transcripts that did not match or overlapped annotated genes were labeled 'novel’ lncRNAs. We used a length threshold of 200 nucleotides to select novel long non-coding RNAs, as in ENCODE annotations (Djebali et al., 2012).
Strand directionality of multiexonic transcripts was inferred using the splice site consensus sequence. We only considered monoexonic transcripts in the case of Arabidopsis and yeast, provided the transcripts were intergenic.
The inclusion of novel lncRNAs made it possible to perform analyses of species for which there are very few annotated lncRNAs. Annotations of UTR regions in yeast genes were missing from Ensembl because of the variability observed in transcription start sites (TSS). However, we downloaded a set of available 5′ and 3′UTRs obtained by deep transcriptomics (Nagalakshmi et al., 2008) and added them to the existing yeast Ensembl annotations before assembling the transcriptome.
Coding transcripts were classified into different subclasses depending on the existing annotations: (a) Annotated protein-coding transcripts (codRNA), (b) Annotated transcripts with surveillance mechanisms (nonsense mediated decay, nonstop mediated decay, and no-go decay), (c) Annotated pseudogenes. We removed protein-coding transcripts in which annotated coding sequences (CDS) are still incomplete.
Subsequently, we defined an additional subset of annotated protein-coding transcripts with well-established coding properties based on the existence of an experimentally verified protein in Swiss-Prot for the gene (‘evidence at protein level’, downloaded 29 October 2013, UniProt Consortium, 2014). These transcripts were labeled codRNAe. The rest of annotated protein-coding transcripts were abbreviated codRNAne. In zebrafish, most proteins are not yet experimentally validated; and therefore, we generated a single group.
We built a data set of human lncRNAs with described non-coding functions using data obtained from several recent reviews (Ponting et al., 2009; Ulitsky and Bartel, 2013; Fatica and Bozzoni, 2014). This data set included 29 different genes (Supplementary file 2A).
We used cufflinks to estimate the expression level of a transcript in FPKM units (Fragments Per Kilobase per total Million mapped reads). We used a threshold of >0.5 FPKM except in yeast, in which the average read coverage per transcript was much higher than in the other species and the threshold was set up at >5 FPKM. These thresholds guaranteed detection of ribosome association for the majority of expressed coding transcripts (>92%), while yielding proportions of transcripts comparable to those reported in the original papers.
Definition of potential open reading frames (ORFs) and other transcript regions
Request a detailed protocol
We predicted all possible open reading frames (ORFs) in the expressed transcripts. We defined an ORF as any sequence starting with an AUG codon and finishing with a stop codon (TAA, TAG, or TGA), and at least 75 nucleotides long. This would correspond to a 24 amino acid protein, which is the size of the smallest complete human polypeptide found in genetic screen studies (Hashimoto et al., 2001). This ORF definition will not detect non-canonical ORFs with different start or stop codons, although these ORFs often correspond to regulatory ORFs (uORFs) in the 5′UTR region. In monoexonic transcripts (Arabidopsis and yeast), we considered all six possible different frames.
We also defined each transcript 5′UTR as the region between the transcription start site and the AUG codon from the left-most predicted ORF, and the 3′UTR the region from the stop codon in the right-most predicted ORF to the transcript end. UTRs with lengths below 30 nucleotides were not analyzed since ribosome reads could not be properly aligned to these regions due to their small size. Regions between two consecutive putatively translated ORFs (with ribosome profiling reads) were termed interORF. We only analyzed this region when the length of the interORF sequence in a transcript was 30 nucleotides or longer.
We defined a set of bona fide non-coding sequences sampled from intronic fragments. We used the introns of the genes expressed in each experiment, provided they did not overlap to any exons from other overlapping genes. We randomly selected fragments in such a way as to simulate the same size distribution as in the complete set of expressed transcripts. We performed 100 simulations of intron sampling to ensure the results were robust to the randomization process. We selected the longest ORF in each intronic fragment for the calculation of coding scores and GC content.
Association with ribosomes and translational efficiency (TE)
Request a detailed protocol
We computed the number of reads overlapping each feature of interest (transcript, UTR, ORF, and interORF) using the BEDTools package (v. 2.16.2) (Quinlan and Hall, 2010). We only considered ribosome reads in which more than half of their length spanned the considered region. This was considered appropriate because the ribosome P-site is usually detected at the central region of the read, with only slight variations depending on the experimental setting. We set up a minimum ribosome profiling coverage of 75 nucleotides per transcript to define the transcript or transcript region (e.g., ORF) as associated with ribosomes. This is significantly longer than the length of the ribosome profiling sequencing reads (36–51 nucleotides) and is consistent with the minimum ORF length threshold.
The translational efficiency (TE) of a sequence has been previously defined as the density of ribosome profiling (RPF) reads normalized by transcript abundance (Ingolia et al., 2009). We calculated it by dividing the FPKM of the ribosome profiling experiment by the FPKM of the RNA-seq experiment. In transcripts, we also obtained the maximum TE by dividing the sequence in 90 nucleotide windows and selecting the window with the highest TE value.
In order to have a null model of ribosome binding against which to compare the ribosome profiling signal in codRNA and lncRNA transcripts, we extracted annotated 3′ untranslated regions (3′UTRs) from codRNAs in genes in which UTRs did not overlap with coding sequences from other transcripts, and by randomly selecting 3′UTRs with a minimum length of 30 nucleotides, we built a set of 3′UTR sequences with the same size distribution as the complete transcripts. For each species, we calculated the TE values for codRNAs, lncRNA, and 3′UTR sequences. We used the empirical distribution of TE values in the 3′UTRs to calculate the number of codRNAs and lncRNAs that showed significantly higher TE value than expected under the null model at a p < 0.05. These corresponded to TE values higher than 0.1043 in mouse, 0.2556 in human, 0.0004 in zebrafish, 0.7164 in fruit fly, 0.1800 in Arabidopsis, and 0.0527 in yeast.
We defined the primary ORF in a transcript as the ORF with the largest number of RPF reads with respect to the total RPF reads covering the transcript. The rest of ORFs ≥24 amino acids associated with ribosomes were considered as well; when two or more ORFs overlapped, we selected the longest one. In ORFs, interORFs, and UTRs, we computed the TE along the whole region. For comparing the TE in different regions, we only considered transcripts in which all regions had >0.2 FPKM.
Peptide evidence in existing proteomics databases
Request a detailed protocol
We downloaded all peptide sequences from the PeptideAtlas database: 338,013 human peptides (August 2013), 101,695 mouse peptides (June 2013), and 86,836 yeast peptides (March 2013). We investigated if the number of ribosome-associated protein-coding transcripts that matched the peptides in these databases varied with protein length. We omitted this analysis in zebrafish and Arabidopsis due to the lack of sufficiently large peptide databases. The matches were identified using BLASTP searches (v. 2.2.28+) (Altschul et al., 1997). We selected perfect matches only.
Evidence of nonsense mediated decay in ORFs
Request a detailed protocol
We investigated how many primary ORFs may be candidates for being regulated via non-sense mediated decay (NMD) surveillance pathways, whose main function is to eliminate transcripts containing premature stop codons. We defined NMD candidates as all cases in which the stop-codon from a predicted ORF was located ≥55 nucleotides upstream of a splice junction site, provided the stop-codon was not in the terminal exon (Scofield et al., 2007). This mechanism is well characterized in protein-coding genes and it has been proposed as a way to degrade non-functional peptides translated in lncRNAs (Tani et al., 2013). Other surveillance mechanisms, such as non-stop-mediated decay or no-go decay, were not considered since all predicted ORFs finished at a stop codon, and we did not analyze RNA secondary structures.
Defining ages of protein-coding transcripts
Request a detailed protocol
We utilized existing gene age classifications in human, mouse, and zebrafish (Neme and Tautz, 2013) to identify young gene classes: human primate-specific (∼55.8 My), mouse rodent-specific (∼61.7 My), human and mouse mammalian-specific (∼225 My), zebrafish actinopterygii-specific (∼420 My) (abbreviated fish) and metazoan (∼800 My). In yeast, we used predefined genes specific to S. cerevisiae (1–3 My)(abbreviated S. cerevisiae) and the Saccharomyces group (∼100 My) (Ekman et al., 2007). In Arabidopsis, we retrieved Cruciferae(Brassicaceae)-specific genes (20–40 My) (Donoghue et al., 2011). These genes are believed to have arisen primarily by de novo mechanisms, as no homologies in other species have been detected despite the fact that many closely related genomes have now been sequenced.
Defining gene desert sequences
Request a detailed protocol
In humans, we obtained a set of gene desert sequences as defined in Ovcharenko et al. (2005). We selected two stable and two flexible gene deserts (the definition depends on the degree of conservation in other species). They belonged to chromosome 4 (flexible located in coordinates 136,000,001–138,000,000; stable located in coordinates 180,000,001–182,000,010) that has a high number of gene deserts; and chromosome 17 (flexible located in coordinates 51,100,001–51,900,000; stable located in coordinates 69,300,001–70,000,000) that has a high gene density. We ensured that no protein-coding genes were annotated in subsequent Ensembl versions in these regions. We predicted all possible ORFs in these regions and evaluated their coding score and GC content.
ORF coding score
Request a detailed protocol
The examination of nucleotide hexamer frequencies has been shown to be a powerful way to distinguish between coding and non-coding sequences (Sun et al., 2013; Wang et al., 2013). We computed one coding score (CS) per hexamer:
CShexamer(i)=log(freqcoding(hexamer(i))freqnoncoding(hexamer(i))).
The coding hexamer frequencies were obtained from the open reading frame of all transcripts in a species encoding experimentally validated proteins (except for zebrafish in which all protein-coding transcripts were considered). The non-coding hexamer frequencies were calculated using the longest ORF in intronic regions, which were selected randomly from expressed protein-coding genes. Next, we used the following statistic to measure the coding score of an ORF:
CSORF=i=1i=nCShexamer(i)n,
where i is each sequence hexamer in the ORF, and n the number of hexamers considered.
The hexamers were calculated in steps of three nucleotides in frame (dicodons). We did not consider the initial hexamers containing a Methionine or the last hexamers containing a STOP codon, since they are not informative. Given that all ORFs were at least 75 nucleotides long the minimum value for n was 22.
We calculated other related statistics in a similar way. This included using an equiprobable hexamer distribution instead of the distribution obtained from non-coding sequences, or using codon frequencies instead of hexamer frequencies. These statistics showed somewhat lower power to distinguish between coding and non-coding sequences. As a complementary measure, we quantified the GC content in different coding and non-coding transcripts and ORFs.
Sequence similarity searches
Request a detailed protocol
We employed BLASTP with an E-value cutoff of 10−4 to compare the amino acid sequences encoded by ORFs in different kinds of transcripts. We enabled SEG to mask low complexity regions in protein sequences before doing the homology searches. We also searched for homologues in the NCBI non-redundant (nr) protein database (Pruitt et al., 2014). BLAST sequence similarity search programs are based on gapped local alignments (Altschul et al., 1997).
Analysis of single nucleotide polymorphisms
Request a detailed protocol
We downloaded all available single-nucleotide polymorphisms (SNPs) from dbSNP (Sherry et al., 2001) for human (∼50 million), mouse (∼64.2 million), and zebrafish (∼1.3 million). We did not consider other species due to insufficient data for the analysis. We classified SNPs in ORFs as non-synonymous (PN, amino acid altering) and synonymous (PS, not amino acid altering). We computed the PN/PS ratio in each sequence data set by using the sum of PN and PS in all sequences. The estimation of PN/PS ratios of individual sequences was in general not reliable due to lack of sufficient SNP data. We obtained confidence intervals using the proportion test in R (see below).
Statistical data analyses
Request a detailed protocol
The analysis of the data, including generation of plots and statistical tests, was done with R (R Development Core Team, 2010).
Additional files
Request a detailed protocol
Supplementary file 1 contains additional Tables and Supplementary file 2 data subsets. The genomic coordinates of all transcripts used in this study (GTF files) and the amino acid sequences corresponding to primary ORFs in lncRNA with coding scores significant at p < 0.05 (FASTA files) are available at figshare (http://dx.doi.org/10.6084/m9.figshare.1114969).
Data availability
The following previously published data sets were used
References
1. Carninci P
2. Kasukawa T
3. Katayama S
4. Gough J
5. Frith MC
6. Maeda N
7. Oyama R
8. Ravasi T
9. Lenhard B
10. Wells C
11. Kodzius R
12. Shimokawa K
13. Bajic VB
14. Brenner SE
15. Batalov S
16. Forrest AR
17. Zavolan M
18. Davis MJ
19. Wilming LG
20. Aidinis V
21. Allen JE
22. Ambesi-Impiombato A
23. Apweiler R
24. Aturaliya RN
25. Bailey TL
26. Bansal M
27. Baxter L
28. Beisel KW
29. Bersano T
30. Bono H
31. Chalk AM
32. Chiu KP
33. Choudhary V
34. Christoffels A
35. Clutterbuck DR
36. Crowe ML
37. Dalla E
38. Dalrymple BP
39. de Bono B
40. Della Gatta G
41. di Bernardo D
42. Down T
43. Engstrom P
44. Fagiolini M
45. Faulkner G
46. Fletcher CF
47. Fukushima T
48. Furuno M
49. Futaki S
50. Gariboldi M
51. Georgii-Hemming P
52. Gingeras TR
53. Gojobori T
54. Green RE
55. Gustincich S
56. Harbers M
57. Hayashi Y
58. Hensch TK
59. Hirokawa N
60. Hill D
61. Huminiecki L
62. Iacono M
63. Ikeo K
64. Iwama A
65. Ishikawa T
66. Jakt M
67. Kanapin A
68. Katoh M
69. Kawasawa Y
70. Kelso J
71. Kitamura H
72. Kitano H
73. Kollias G
74. Krishnan SP
75. Kruger A
76. Kummerfeld SK
77. Kurochkin IV
78. Lareau LF
79. Lazarevic D
80. Lipovich L
81. Liu J
82. Liuni S
83. McWilliam S
84. Madan Babu M
85. Madera M
86. Marchionni L
87. Matsuda H
88. Matsuzawa S
89. Miki H
90. Mignone F
91. Miyake S
92. Morris K
93. Mottagui-Tabar S
94. Mulder N
95. Nakano N
96. Nakauchi H
97. Ng P
98. Nilsson R
99. Nishiguchi S
100. Nishikawa S
101. Nori F
102. Ohara O
103. Okazaki Y
104. Orlando V
105. Pang KC
106. Pavan WJ
107. Pavesi G
108. Pesole G
109. Petrovsky N
110. Piazza S
111. Reed J
112. Reid JF
113. Ring BZ
114. Ringwald M
115. Rost B
116. Ruan Y
117. Salzberg SL
118. Sandelin A
119. Schneider C
120. Schönbach C
121. Sekiguchi K
122. Semple CA
123. Seno S
124. Sessa L
125. Sheng Y
126. Shibata Y
127. Shimada H
128. Shimada K
129. Silva D
130. Sinclair B
131. Sperling S
132. Stupka E
133. Sugiura K
134. Sultana R
135. Takenaka Y
136. Taki K
137. Tammoja K
138. Tan SL
139. Tang S
140. Taylor MS
141. Tegner J
142. Teichmann SA
143. Ueda HR
144. van Nimwegen E
145. Verardo R
146. Wei CL
147. Yagi K
148. Yamanishi H
149. Zabarovsky E
150. Zhu S
151. Zimmer A
152. Hide W
153. Bult C
154. Grimmond SM
155. Teasdale RD
156. Liu ET
157. Brusic V
158. Quackenbush J
159. Wahlestedt C
160. Mattick JS
161. Hume DA
162. Kai C
163. Sasaki D
164. Tomaru Y
165. Fukuda S
166. Kanamori-Katayama M
167. Suzuki M
168. Aoki J
169. Arakawa T
170. Iida J
171. Imamura K
172. Itoh M
173. Kato T
174. Kawaji H
175. Kawagashira N
176. Kawashima T
177. Kojima M
178. Kondo S
179. Konno H
180. Nakano K
181. Ninomiya N
182. Nishio T
183. Okada M
184. Plessy C
185. Shibata K
186. Shiraki T
187. Suzuki S
188. Tagami M
189. Waki K
190. Watahiki A
191. Okamura-Oho Y
192. Suzuki H
193. Kawai J
194. Hayashizaki Y
195. FANTOM Consortium
196. RIKEN Genome Exploration Research Group and Genome Science Group (Genome Network Project Core Group)
(2005) The transcriptional landscape of the mammalian genome
Science 309:1559–1563.
https://doi.org/10.1126/science.1112014
1. Eyre-Walker A
(2002)
Changing effective population size and the McDonald-Kreitman test
Genetics 162:2017–2024.
1. Nei M
2. Gojobori T
(1986)
Simple methods for estimating the numbers of synonymous and nonsynonymous nucleotide substitutions
Molecular Biology and Evolution 3:418–426.
1. Okazaki Y
2. Furuno M
3. Kasukawa T
4. Adachi J
5. Bono H
6. Kondo S
7. Nikaido I
8. Osato N
9. Saito R
10. Suzuki H
11. Yamanaka I
12. Kiyosawa H
13. Yagi K
14. Tomaru Y
15. Hasegawa Y
16. Nogami A
17. Schönbach C
18. Gojobori T
19. Baldarelli R
20. Hill DP
21. Bult C
22. Hume DA
23. Quackenbush J
24. Schriml LM
25. Kanapin A
26. Matsuda H
27. Batalov S
28. Beisel KW
29. Blake JA
30. Bradt D
31. Brusic V
32. Chothia C
33. Corbani LE
34. Cousins S
35. Dalla E
36. Dragani TA
37. Fletcher CF
38. Forrest A
39. Frazer KS
40. Gaasterland T
41. Gariboldi M
42. Gissi C
43. Godzik A
44. Gough J
45. Grimmond S
46. Gustincich S
47. Hirokawa N
48. Jackson IJ
49. Jarvis ED
50. Kanai A
51. Kawaji H
52. Kawasawa Y
53. Kedzierski RM
54. King BL
55. Konagaya A
56. Kurochkin IV
57. Lee Y
58. Lenhard B
59. Lyons PA
60. Maglott DR
61. Maltais L
62. Marchionni L
63. McKenzie L
64. Miki H
65. Nagashima T
66. Numata K
67. Okido T
68. Pavan WJ
69. Pertea G
70. Pesole G
71. Petrovsky N
72. Pillai R
73. Pontius JU
74. Qi D
75. Ramachandran S
76. Ravasi T
77. Reed JC
78. Reed DJ
79. Reid J
80. Ring BZ
81. Ringwald M
82. Sandelin A
83. Schneider C
84. Semple CA
85. Setou M
86. Shimada K
87. Sultana R
88. Takenaka Y
89. Taylor MS
90. Teasdale RD
91. Tomita M
92. Verardo R
93. Wagner L
94. Wahlestedt C
95. Wang Y
96. Watanabe Y
97. Wells C
98. Wilming LG
99. Wynshaw-Boris A
100. Yanagisawa M
101. Yang I
102. Yang L
103. Yuan Z
104. Zavolan M
105. Zhu Y
106. Zimmer A
107. Carninci P
108. Hayatsu N
109. Hirozane-Kishikawa T
110. Konno H
111. Nakamura M
112. Sakazume N
113. Sato K
114. Shiraki T
115. Waki K
116. Kawai J
117. Aizawa K
118. Arakawa T
119. Fukuda S
120. Hara A
121. Hashizume W
122. Imotani K
123. Ishii Y
124. Itoh M
125. Kagawa I
126. Miyazaki A
127. Sakai K
128. Sasaki D
129. Shibata K
130. Shinagawa A
131. Yasunishi A
132. Yoshino M
133. Waterston R
134. Lander ES
135. Rogers J
136. Birney E
137. Hayashizaki Y
138. FANTOM Consortium
139. RIKEN Genome Exploration Research Group Phase I & II Team
(2002) Analysis of the mouse transcriptome based on functional annotation of 60,770 full-length cDNAs
Nature 420:563–573.
https://doi.org/10.1038/nature01266
1. R Development Core Team
(2010)
R Foundation for statistical computing
R Foundation for statistical computing, Vienna Austria, R Foundation for statistical computing.
Decision letter
1. Diethard Tautz
Reviewing Editor; Max Planck Institute for Evolutionary Biology, Germany
eLife posts the editorial decision letter and author response on a selection of the published articles (subject to the approval of the authors). An edited version of the letter sent to the authors after peer review is shown, indicating the substantive concerns or comments; minor concerns are not usually shown. Reviewers have the opportunity to discuss the decision before the letter is sent (see review process). Similarly, the author response typically shows only responses to the major concerns raised by the reviewers.
Thank you for sending your work entitled “Long non-coding RNAs as a source of new peptides” for consideration at eLife. Your article has been favorably evaluated by Aviv Regev (Senior editor) and 3 reviewers, one of whom is a member of our Board of Reviewing Editors.
The Reviewing editor and the other reviewers discussed their comments extensively before we reached this decision, and the Reviewing editor has assembled the following comments to help you prepare a revised submission.
This paper adds to the current active discussion on the coding potential of lncRNAs, the role of short open reading frames and the emergence of new genes. The authors use published ribosome association datasets, but use several analysis pipelines that go beyond the analysis that has previously been done with these data. However, there are two comparable published papers that do similar analysis, namely Ingolia et al. 2011 and Guttman et al. 2013. While the former had suggested much translation of lncRNAs, the latter denies this, although there is some overlap of authors.
Major comments that need to be addressed by additional analyses and/clarification:
The crucial point is in how far ribosome associations are partly artifacts. The fraction of lncRNAs that the authors find to be associated with ribosomes is very large. Is this because the vast majority of transcripts actually are scanned by ribosomes, or could this observation be an artifact of the way the ribosome profiling data was analyzed? Pseudo-genes, and bona-fide human lncRNAs with known non-coding functions, were investigated, but the authors found evidence of ribosome binding in these putative negative controls, i.e. possible evidence for artifacts. This issue needs to be resolved more clearly, since the current paper should go beyond the Guttmann et al. 2013 line of arguments. It is necessary to provide a convincing demonstration that the analysis of ribosome profiling data is based on signal, not on noise. This could be done by different means, for instance by deriving null models describing what fraction of transcripts would be expected to be found associated with ribosomes if all of the ribosome profiling data was random, or by calculating otherwise a False Positive Rate or False Discovery Rate in the calling of “ribosome association” per transcript. You can also try something like the Bazzini 2014 or the Carvunis 2012 method. Another possibility is to choose a class of sequences with very low ribosomal association (maybe 3'UTRs are best) and use that as an upper bound on the false positive rate. The lower bound on the false positive rate is zero, and likely to remain there, but calculating an upper bound is something that should be added.
The claim is also made that these short and hard-to-annotate protein-coding genes look young according to protein-coding metrics and PN/PS. While plausible, it is also possible that they represent a mixture of genes of all ages combined with sequences that, while perhaps translated at some level, are not really genes in the functional sense of the word (at least not yet), and whose existence is therefore highly transient in evolutionary time. Contamination with these sequences could create the same statistical effect as having young genes. The presence of such contamination is also a critical piece of evidence in theories of how de novo protein birth occurs. This basically means that there are two interpretations of the data, both interesting, and not mutually exclusive. This needs to be better clarified. For instance the results of the BlastP search against codRNAs (supplementary file 8) and the results of the BlastX search against nr could be merged into one table or bar graph counting the number of BlastP and BlastX hits in lncRNA-noribo, lncRNA-ribo, and codRNA, separately, for each species.
It is unclear why the starved conditions (Table 1) were used in the yeast riboprofiling data. Starvation represses translation and therefore makes the data unreliable as a marker of translation. This should therefore be redone, perhaps with the rich media conditions of Ingolia et al. 2009, but if this needs to be redone anyway, ideally with the much higher coverage data of Artieri & Fraser.
https://doi.org/10.7554/eLife.03523.026
Author response
Following the editor’s recommendation we have constructed a null model for random ribosome binding based on the signal in annotated 3’UTRs. The null model can be rejected for about 90% of the lncRNAs, and a similar percentage of codRNAs, with p-value < 0.05, confirming that the signal in lncRNAs is not random. We have also reanalysed the yeast transcriptome using data from a recently published study (McManus et al., 2014). Although the main findings are similar to those reported using the original dataset, the ribosome profiling sequencing read coverage is higher and the yeast growth conditions standard, making the results more representative. We have performed homology searches with coding RNAs and lncRNAs not associated with ribosomes (in addition to lncRNAs associated with ribosomes as done previously). The results clearly show that lncRNAs display limited phylogenetic conservation when compared to coding RNAs.
We have also deposited the genomic coordinates of all transcripts used in this study and the amino acid sequences corresponding to primary ORFs in lncRNA with significant coding scores in figshare (http://dx.doi.org/10.6084/m9.figshare.1114969).
The crucial point is in how far ribosome associations are partly artifacts. The fraction of lncRNAs that the authors find to be associated with ribosomes is very large. Is this because the vast majority of transcripts actually are scanned by ribosomes, or could this observation be an artifact of the way the ribosome profiling data was analyzed? Pseudo-genes, and bona-fide human lncRNAs with known non-coding functions, were investigated, but the authors found evidence of ribosome binding in these putative negative controls, i.e. possible evidence for artifacts. This issue needs to be resolved more clearly, since the current paper should go beyond the Guttmann et al. 2013 line of arguments. It is necessary to provide a convincing demonstration that the analysis of ribosome profiling data is based on signal, not on noise. This could be done by different means, for instance by deriving null models describing what fraction of transcripts would be expected to be found associated with ribosomes if all of the ribosome profiling data was random, or by calculating otherwise a False Positive Rate or False Discovery Rate in the calling of “ribosome association” per transcript. You can also try something like the Bazzini 2014 or the Carvunis 2012 method. Another possibility is to choose a class of sequences with very low ribosomal association (maybe 3'UTRs are best) and use that as an upper bound on the false positive rate. The lower bound on the false positive rate is zero, and likely to remain there, but calculating an upper bound is something that should be added.
We have chosen as a null model annotated 3’UTRs from coding transcripts. The results provides strong evidence that the observed ribosome association in lncRNAs in not random and similar to codRNAs. See below the paragraph added in the manuscript text:
“In order to determine if the ribosome profiling signal in lncRNAs was different from noise, we compared ribosome density in the transcripts it to that in 3’untranslated regions (3’UTRs). More specifically, the null model consisted in a size-matched set of sequences containing randomly taken 3’UTR from annotated coding transcripts. Ribosome density was calculated as the number of ribosome profiling reads divided by RNA-seq reads, a ratio defined as Translational Efficiency (TE) (Ingolia, Lareau, and Weissman 2011). Both codRNAs and lncRNAS displayed much higher TE values than 3’UTRs in all species studied (Wilcoxon test p-value < 10-5, Figure 3). We could reject the null model for 90.12% of the lncRNAs and 87.19% of the codRNAs associated with ribosomes (p-value < 0.05) (see details by species in Table 2, Stringent set). Therefore, we concluded that the density of ribosomes in lncRNAs is much higher than expected by spurious ribosome binding.”
The claim is also made that these short and hard-to-annotate protein-coding genes look young according to protein-coding metrics and PN/PS. While plausible, it is also possible that they represent a mixture of genes of all ages combined with sequences that, while perhaps translated at some level, are not really genes in the functional sense of the word (at least not yet), and whose existence is therefore highly transient in evolutionary time. Contamination with these sequences could create the same statistical effect as having young genes. The presence of such contamination is also a critical piece of evidence in theories of how de novo protein birth occurs. This basically means that there are two interpretations of the data, both interesting, and not mutually exclusive. This needs to be better clarified. For instance the results of the BlastP search against codRNAs (supplementary file 8) and the results of the BlastX search against nr could be merged into one table or bar graph counting the number of BlastP and BlastX hits in lncRNA-noribo, lncRNA-ribo, and codRNA, separately, for each species.
Previous studies have found that lncRNAs tend to be poorly conserved across species (Guttman et al., Nature 2009; Marques and Ponting, Genome Biol. 2009; Cabili, Genes Dev. 2011). This question has been thoroughly examined in a recent paper that has dated the age of human lncRNAs using de novo assembled transcriptomes from 11 other vertebrate species (Necsulea et al., Nature 2014). The authors have reported that 81% of the human lncRNAs are not conserved beyond primates and can thus be considered “young”.
In order to further confirm this trend we have extended our initial sequence homology searches to all annotated coding transcripts in the six species studied and have compared the results obtained for putatively translated ORFs in lncRNAS to those in codRNAs. The results support the extended idea that most lncRNAs are young. For example whereas we can find only protein homologues for about 13-15% of the human and mouse lncRNAs associated with ribosomes this value is > 95% for codRNAs. Details of these searches are shown in Supplementary file 1D and Supplementary file 2B.
If we discard the lncRNAs with homologues in the other species the percentage of lncRNAs associated with ribosomes continues to be very high (mouse 80.4% with respect to 81.9%, human 40.3% with respect to 43.1%) and the coding scores of the putatively translated ORFs significantly higher than those of random ORFs (new Figure 6–figure supplement 3). Therefore our observations are essentially unaltered after filtering out the oldest lncRNAs.
The idea that some of these lncRNAs are evolutionarily transient looks plausible to us. It has been shown that the rate of loss of young genes in the Drosophila obscura group is higher than that of older genes, explaining why the number of genes remains approximately constant despite a high rate of de novo gene emergence (Palmieri and Schlotterer, 2014 eLife). Similarly, we can speculate that lcnRNAs probably have a high probability of being lost during evolution.
It is unclear why the starved conditions (Table 1) were used in the yeast riboprofiling data. Starvation represses translation and therefore makes the data unreliable as a marker of translation. This should therefore be redone, perhaps with the rich media conditions of Ingolia et al. 2009, but if this needs to be redone anyway, ideally with the much higher coverage data of Artieri & Fraser.
The available ribosome profiling data for Artieri and Fraser (2014) was for Saccharomyces hybrids. In order to use the same species as in the original study we downloaded the Saccharomyces cerevisiae data from a related paper, McManus et al. (2014). Although we obtained a lower number of lncRNAs than when using the dataset from Ingolia et al. (2009), the reconstructed lncRNAs were longer and thus probably more reliable. The conclusions drawn are similar to those already reported using the previous dataset.
https://doi.org/10.7554/eLife.03523.027
Article and author information
Author details
1. Jorge Ruiz-Orera
Evolutionary Genomics Group, Research Programme on Biomedical Informatics, Hospital del Mar Research Institute, Universitat Pompeu Fabra, Barcelona, Spain
Contribution
JR-O, Conception and design, Acquisition of data, Analysis and interpretation of data, Drafting or revising the article
Competing interests
The authors declare that no competing interests exist.
2. Xavier Messeguer
Llenguatges i Sistemes Informàtics, Universitat Politècnica de Catalunya, Barcelona, Spain
Contribution
XM, Acquisition of data, Analysis and interpretation of data, Drafting or revising the article
Competing interests
The authors declare that no competing interests exist.
3. Juan Antonio Subirana
1. Evolutionary Genomics Group, Research Programme on Biomedical Informatics, Hospital del Mar Research Institute, Universitat Pompeu Fabra, Barcelona, Spain
2. Real Academia de Ciències i Arts de Barcelona, Barcelona, Spain
Contribution
JAS, Acquisition of data, Analysis and interpretation of data, Drafting or revising the article
Competing interests
The authors declare that no competing interests exist.
4. M Mar Alba
1. Evolutionary Genomics Group, Research Programme on Biomedical Informatics, Hospital del Mar Research Institute, Universitat Pompeu Fabra, Barcelona, Spain
2. Catalan Institution for Research and Advanced Studies, Barcelona, Spain
Contribution
MMA, Conception and design, Analysis and interpretation of data, Drafting or revising the article
For correspondence
malba@imim.es
Competing interests
The authors declare that no competing interests exist.
Funding
Ministerio de Economía y Competitividad (BFU2012-36820)
• M Mar Alba
Ministerio de Economía y Competitividad (TIN2013-45732-C4-3-P)
• Xavier Messeguer
The funders had no role in study design, data collection and interpretation, or the decision to submit the work for publication.
Acknowledgements
We acknowledge José Luis Villanueva-Cañas and Will Blevins for critical revision of the manuscript. We are grateful to Ivan Ovcharenko for advise on gene deserts. This work was funded by Ministerio de Economía y Competitividad (BFU2012-36820 and TIN2013-45732-C4-3-P) and Fundació ICREA (MMA).
Reviewing Editor
1. Diethard Tautz, Max Planck Institute for Evolutionary Biology, Germany
Publication history
1. Received: May 30, 2014
2. Accepted: August 11, 2014
3. Version of Record published: September 16, 2014 (version 1)
Copyright
© 2014, Ruiz-Orera et al.
This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited.
Metrics
• 10,867
Page views
• 1,448
Downloads
• 246
Citations
Article citation count generated by polling the highest count across the following sources: Crossref, Scopus, PubMed Central.
Download links
A two-part list of links to download the article, or parts of the article, in various formats.
Downloads (link to download the article as PDF)
Download citations (links to download the citations from this article in formats compatible with various reference manager tools)
Open citations (links to open the citations from this article in various online reference manager services)
Further reading
1. Evolutionary Biology
Joshua T Washington et al.
Research Article
Given the importance of DNA methylation in protection of the genome against transposable elements and transcriptional regulation in other taxonomic groups, the diversity in both levels and patterns of DNA methylation in the insects raises questions about its function and evolution. We show that the maintenance DNA methyltransferase, DNMT1, affects meiosis and is essential to fertility in milkweed bugs, Oncopeltus fasciatus, while DNA methylation is not required in somatic cells. Our results support the hypothesis that Dnmt1 is required for the transition of germ cells to gametes in O. fasciatus and that this function is conserved in male and female gametogenesis. They further suggest that DNMT1 has a function independent of DNA methylation in germ cells. Our results raise the question of how a gene so critical in fitness across multiple insect species can have diverged widely across the insect tree of life.
1. Chromosomes and Gene Expression
2. Evolutionary Biology
Rachel A Johnston et al.
Research Article
In some mammals and many social insects, highly cooperative societies are characterized by reproductive division of labor, in which breeders and nonbreeders become behaviorally and morphologically distinct. While differences in behavior and growth between breeders and nonbreeders have been extensively described, little is known of their molecular underpinnings. Here, we investigate the consequences of breeding for skeletal morphology and gene regulation in highly cooperative Damaraland mole-rats. By experimentally assigning breeding 'queen' status versus nonbreeder status to age-matched littermates, we confirm that queens experience vertebral growth that likely confers advantages to fecundity. However, they also up-regulate bone resorption pathways and show reductions in femoral mass, which predicts increased vulnerability to fracture. Together, our results show that, as in eusocial insects, reproductive division of labor in mole-rats leads to gene regulatory rewiring and extensive morphological plasticity. However, in mole-rats, concentrated reproduction is also accompanied by costs to bone strength.
|
用户4645519
LV1
发表了文章
stm32的hal之串口库函数总结复习
1、串口的使用方法 在hal库中,有三个串口发送的函数 a、HAL_StatusTypeDef HAL_UART_Transmit_DMA(UART_Han...
用户4645519
发表了文章
关闭win10 任务栏窗口预览的步骤:
作为开发人员,经常会开好几个窗口,但是win10的预览很不好,设计的就是娱乐用途一般,因此必须是把他关了
用户4645519
发表了文章
#define的一个小技巧
#define vfd_com_timeout_clear() do{vfd_com_cnt = 0;}while(0)
用户4645519
发表了文章
stm32中使用cubemx配置freertos的信号量大小
在配置freertos的情况下,cubemx会自动计算每个任务、信号,队列和软件定时器的使用堆栈大小,因此要合理规划
用户4645519
发表了文章
c99的新功能
在ANSI的标准确立后,C语言的规范在一段时间内没有大的变动,然而C++在自己的标准化创建过程中继续发展壮大。《标准修正案一》在1994年为C语言创建了一个新标...
用户4645519
发表了文章
大小端示例-arm c51
编译连接然后下载到开发板上,然后启动调试,通过监视窗口可以看到u的地址,然后在内存窗口可以看到字节序是反序的,所以说明STM32F407是小端的。据某些资料说A...
用户4645519
发表了文章
大小端的图
https://mp.weixin.qq.com/s/rGtgS9ZoHZQ7fPkzKp-0Tw
用户4645519
发表了文章
c-free gcc.exe: cannot specify -o with -c or -S and multiple compilations的解决方法
win10上打算使用c-free,因为xp win7时代都用过,写c代码还是比较方便的,尤其是5.0版本,但是在win10上面,c-free 5.0版本没有c-...
用户4645519
发表了文章
浮点数转成字符串函数gcvt()
2.ecvt()的转换结果中不包括十进制小数点 3.fcvt()的转换结果中不包括十进制小数点
用户4645519
发表了文章
c语言实现整数转换为字符串——不考虑负数
用户4645519
发表了文章
掉电保护电路及使用方法
这个图是哔哩哔哩上面up主(Bernice_坚果丁)提供的,感觉不错,自己曾经也用过掉电保护,只是功能电路不一样,因此记录学习一下。
用户4645519
发表了文章
strtol函数的用法——字符串转长整形
pEnd = 60c0c0 -1101110100110100100000 0x6fffff pEnd = -1101110100110100100000...
用户4645519
发表了文章
编程中有哪些好习惯一开始就值得坚持?
ITWorld 曾经发起了一个“程序员最头疼的事情”投票,结果非常有趣,近半数的程序员认为命名是最头疼的事情。
用户4645519
发表了文章
单片机开发之C语言编程基本规范
为了提高源程序的质量和可维护性,从而最终提高软件产品生产力,特编写此规范。本标准规定了程序设计人员进行程序设计时必须遵循的规范。本规范主要针对单片机编程语言和0...
用户4645519
发表了文章
常见的C语言编程规范
9.只能通过包含头文件的方式使用其他.c提供的接口,禁止在.c中通过extern的方式使用外部函数接口、变量。
用户4645519
发表了文章
memset()函数的使用
memset()函数,称为按字节赋值函数,使用时需要加头文件 #include<cstring>或者#include<string.h>。通常有两个用法:
用户4645519
发表了文章
堆栈的分布
用户4645519
发表了文章
stm32 HardFault_Handler调试及问题查找方法——飞思卡尔
用户4645519
发表了文章
modbus字符串的结束符介绍
Modbus协议是应用于电子控制器上的一种通用语言。通过此协议,控制器相互之间、控制器经由网络(例如以太网)和其它设备之间可以通信。它已经成为一通用工业标准。有...
用户4645519
发表了文章
单片机的存储区范例
用户4645519
个人简介
个人成就
扫码关注云+社区
领取腾讯云代金券
|
Coral in non-tropical regions
The poleward migration of coral species refers to the phenomenon brought on by rising sea temperatures, wherein corals are colonising cooler climates in an attempt to circumvent coral bleaching, rising sea levels and ocean acidification. In the age of Anthropocene, the changing global climate has disrupted fundamental natural processes and brought about observable changes in the submarine sphere. Whilst coral reefs are bleaching in tropical areas like the Great Barrier Reef, even more striking, and perhaps more alarming; is the growth of tropical coral species in temperate regions, which has taken place over the past decade. Coral reefs are frequently compared to the "canaries in the coal mine," who were used by miners as an indicator of air quality. In much the same way, "coral reefs are sensitive to environmental changes that could damage other habitats in the future,"[1] meaning they will be the first to visually exhibit the true implications of global warming on the natural world..
A brief summary of climate change
Past global warming events
climate change is not a new phenomena, which means the marine environment, and its inhabitants, have always been susceptible to the natural heating and cooling of the earth. Modern corals first appeared over 200 million years ago in the Jurassic Period, and have survived Earth's many cataclysms since then, including periods when atmospheric CO2 was much higher than at present.[2] Current coral reef ecosystems are being threatened by several factors acting together, in addition, of course, to rising sea temperatures.[2] Many have been damaged by destructive fishing practices, which involve the use of dynamite and trawl nets. Others, on the continental shelf, have been blanketed by silt from accelerated erosion inland. Pollution from coastal cities and agriculture also causes reefs to be overgrown by algae, and increasingly severe storms accelerate reef erosion.[2][3]
Current global warming events
A number of human-induced factors including increased greenhouse gas emissions - which refers to increases in atmospheric CO2 and other long-lived greenhouse gases like methane, nitrous oxide and halocarbons - and changes to land cover - which refers to the replacement of darker forests with paler croplands and grasslands - have led to this rapid increase in temperature, which has taken place over the past 50 years. In addition to the ones previously listed, global warming has also prompted the development of harmful anomalies, including a serious decline in krill populations[4] and a widespread growth of ‘crown of thorns’ starfish, sea urchins and jellyfish; all of whom contribute to the deterioration of coral reefs and their inhabitants. But coral bleaching, rising sea levels and ocean acidification pose a far greater threat than these natural anomalies. Their combined impact has led to the decimation of almost 50% of the world's coral reefs,[3] and has forced remaining corals to abandon their tropical homes in order to colonise cooler waters. Both their decimation and their migration are having observable and catastrophic effects on the entire marine ecosystem.
Threats to coral in tropical regions
Coral bleaching
There is a symbiotic relationship between coral polyps and the photosynthesising algae called zooxanthellae, without which, neither would survive. When sea surface temperatures exceed approximately 29°C or more however, even for a couple of days, the relationship between the coral and its zooxanthellae becomes unbalanced.[5] Since the coral animal has become unable to harvest sufficient energy at this point, it expels the zooxanthellae, and turns white, aka. 'bleaches.[5]' But without this major source of nutrition, the coral soon perishes; unless water temperatures fall and the zooxanthellae are replaced. Although it is possible for corals to recover from bleaching, it takes several years, and the recent increase in scale and frequency of global bleaching events means reefs are not being given the time they need to recuperate.[3][2] In 2010 alone, 80% of the Indonesia's corals died,[6] and in 2016, 29% of the Great Barrier Reef bleached.[3] It is a global phenomenon, with just 2% of Indo-Pacific reefs containing as much live coral as they did in the 1980s.[2] This means reef growth and physical erosion must be finely balanced, or else risk extinction.
Rising sea levels
Coral reefs have survived over many millions of years, despite ample fluctuations in climate and sea-levels, over many glacial-interglacial cycles. Whilst the disappearance of reefs in the past have been attributed to said natural fluctuations – either the sea levels have declined so much that corals were exposed and perished, or the waters rose so much that the corals drowned – our reefs are facing a whole new threat of extinction, on a level unprecedented. What is new in the present is the scale and frequency of sea-level rising and warming, combined with greatly increased atmospheric CO2 concentrations, and other stressors induced by harmful human activities. To put it in perspective, warming at the end of the last glaciation was on average about 1 degree centigrade per thousand years, and has since risen by 0.5 degrees in the past century.[6] Similarly, sea levels rose during the last glaciation at an average rate of 1m per 100 years, and has since increased by 25cm,[5] which is problematic because corals rely on a close proximity to the sun in order to photosynthesise. Whilst expected rates of temperature and sea-level rise for the next century are thus not in themselves unprecedented, they will occur in a vastly different context.[5]
Ocean acidification
Since the Industrial Revolution began, the pH of surface ocean waters has fallen by 0.1 pH units, and since the pH scale is logarithmic;[7] this change represents a 30% increase in acidity.[7] Ocean acidification refers to this increase in acidity and subsequent decrease in the pH of earth's oceans, which is highly problematic when it comes to absorbing atmospheric CO2[7]. Even though nearly 50% of the world's coral reefs have been lost of severely damaged [2], coral reefs absorb even more CO2 than trees. As a whole, the ocean actually absorbs 93% of the heat, which is trapped on earth by atmospheric carbon [5]. Coral reefs contribute to this by photosynthesising carbon themselves; and by supporting ocean organisms like phytoplankton and pteropods, who use atmospheric carbon to build their bodies and shells from calcium carbonate. When they die, they sink below the sunlit surface layer of the sea to the ocean floor and become incorporated into the sediments.[8] It is the combination of processes like these that remove carbon dioxide from the atmosphere; which is one of the few semi-permanent ways of doing so. However, at low seawater pH (which is about 7.8 and below)[4], forming calcium carbonate shells becomes far more difficult, as does absorbing atmospheric CO2[4]. This means that soon enough, ocean acidification will slow the formation of the reef itself and finally prevent it forming at all in large portions of the ocean. [4] If this were to happen, and if the ocean became incapable of absorbing CO2; then scientists predict the earth's surface will exceed 50 degrees centigrade; which is possibly uninhabitable.
The poleward migration of coral species
One way, however, that corals "might escape ocean warming, is to migrate into cooler waters."[2] The planktonic larvae of the corals could colonise suitable new areas but, for corals in places like the Great Barrier Reef; the required migration rate is about 15 km per year, which is much faster than corals can grow.[2] Another downside is that ocean acidification impacts are more severe in cooler waters.[7] Coral reefs may therefore be "squeezed into a narrower latitudinal distribution by ocean warming in the tropics, and ocean acidification in cooler oceans." [2] This phenomenon has been referred to as the global poleward migration of coral species - who are seeking cooler climates - or to the growth of coral in temperate regions.
Sydney, Australia
Where the Great Barrier Reef's already tropical waters are heating up quickly (sometimes reaching 35 degrees centigrade[3]), Sydney's slowly warming and previously-temperate waters are becoming increasingly biodiverse. At least four types of hard and branching corals have been identified in Sydney's Northern Beaches,[9] including the Pocillopora aliciae; a species which Marine Ecologist and University Professor Douglas Booth observes had only been recorded in Port Stephens, which is approximately 120km to the north.[10] This is the furthest recorded southern migration of any tropical coral species, [10] which is due possibly to the strength of the East Australian Current, which is driving species southwards along the east coast. These branching corals are providing habitats for a range of marine species also typically found much further north, such as trapezia crabs, tropical gobys and multiple species of damselfish.[11] The combined arrival of non-native coral and marine species demonstrates how the poleward migration of tropical coral has the potential to alter marine environments and their inhabitants.
Japan
In much the same way, corals in Japan are fleeing northwards, according to a recent study conducted by Hiroyo Yamana of the Centre for Global Environmental Research in Tsukuba, Japan; which tracked the movement of corals at 14km per year.[9] Compared to the average rate of expansion for land-dwelling plants and animals, which is 1km per year, [9] this is a relatively fast migration, one that wouldn't even be seen in geological time. Of the nine different coral types which Yamano and his team had determined the location of colonies, they discovered that four had moved polewards over the past 100 years, and five had remained stable. Yamano notes, however, that the four which moved had been identified as "vulnerable" or "near threatened" by the International Union for Conservation of Nature since 1998.[9] The speed of their migration is perhaps due to the poleward movement of ocean currents which run along the east coasts of Japan, and which have the capacity to carry coral polyps to "newly suitable areas for colonies or reefs."[9]
What are the ramifications for life on earth?
Marine life
The poleward migration might be 'good news' for the survival of certain vulnerable coral species, but it is not necessarily a positive instalment for marine ecosystems as a whole. As the oceans surrounding South Africa warm in some areas and cool in others, many submarine plants and animals have been forced to relocate, which has brought about observable ecological change, and generated good reason for environmental concern.
As the south-western coast environment cools, many marine organisms, such as "mussels, kelp, barnacles, crabs, rock lobsters, anchovy, sardines and sub-tropical fish,".[8] have migrated towards to the warming eastern coast. Less obvious, too, are tiny planktonic organisms, who are the "real powerhouses of marine ecosystems."[9] Rock lobsters are major predators of bottom-living organisms, such as algae-eating sea urchins and abalone. Their eastern migration towards Cape Point means that these herbivores have all but disappeared from the area, which has allowed kelp and other algae to flourish[8]. The end result is the transformation of a grazer-dominated community to a algae-dominated community. In addition, whilst two-thirds of all anchovy and sardine biomass were distributed along the west coast prior to 1995, almost three quarters of them now reside in the east, as of 2008[8]. This has led to the creation of a relatively severe geographical mismatch between seabird and seal breeding colonies on west coast islands and their "now distant prey" [8]. B. Scholes has observed a strong correlation between the eastern migration of the before-mentioned organisms and declining seabird breeding success. The population collapse has perhaps been most dramatic for penguins in particular, who, due to their incapacity to fly, are unable to forage over great distances. Additionally, since the Agulhas Current has warmed, reef-building corals on the east coast are slowly migrating southwards, since high temperatures in the North has severely damaged reefs in Kenya and Tanzania[8]
In other words, this means that coral species are abandoning the east coast, and foreign predators are moving in. The changes taking place in South Africa, and in the submarine world as a whole, are (1) creating a disparity between predator and prey, (2) altering breeding habits and migratory patterns and (3) transforming coral reefs, which protect and sustain all types of marine life, into algae-dominated communities, which cannot be expected to support the life which is now gathering in the east. Their collective impact, as a result of rising temperatures, poses a significant threat to native and non-native marine species.
Human life
If coral reefs are to completely abandon their tropical homes, there will possibly be implications for human communities as well, since coral reefs form the bedrock of underwater biodiversity, upon which many livelihoods depend. Reefs account for 600,000 square kilometres of the earth's surface (Crossland, Hatcher, & Smith, 1990),[5] which means they cover less than 2% of the ocean floor; and yet they constitute one of the most highly diverse ecosystems in the world, providing a marine habitat to over 30,000 species of organisms (Burke, 2012). [5] They permanently accommodate, and offer protection from predators, for over 25% of the global fish population[3], and provide nurseries for the majority of submarine life. Not only are they biologically important for the marine ecosystem as a whole, but they are socially and economically important, for sustaining fisheries and producing income for developing nations through tourism. This is particularly pertinent for coastline communities like Indonesia, who rely heavily on the tourism of their reefs, which is estimated to bring in approximately $375 billion every year [5]. Many people's livelihoods therefore depend on the health of coral reefs and the biodiversity they support. In addition, coral reefs also provide food and medicines, protection from erosion on coastlines and sand for beaches.
References
1. Warren, J. (2017). Coral Reefs: The 'Canary in a Coal Mine'?. Retrieved from https://exepose.com/2017/06/15/coral-reefs-the-canary-in-a-coal-mine/
2. Scholes, B., Scholes, M., & Lucas, M. (2015). Will coral reefs survive climate change?. Climate Change: Briefings From South Africa, 2 - 4.
3. Orlowski, J. (Director), Ackerman, A., Rago, Z., Vevers, R. (2017). Chasing Coral [Motion picture on Documentary]. Exposure Labs.
4. Scholes, B., Scholes, M., & Lucas, M. (2015). How will ocean acidification affect marine organisms?. Climate Change: Briefings From Southern Africa, 2 - 4.
5. Generous, R. (2014). Environmental Threats to the Symbiotic Relationship of Coral Reefs and Quorum Sensing. Consilience, No. 11, 2-7.
6. Pittock, A. (1999). Coral Reefs and Environmental Change: Adaptation to What?. American Zoologist, Vol. 39, 2 - 4.
7. Ocean Acidification. Retrieved from https://en.wikipedia.org/wiki/Ocean_acidification
8. Scholes, B., Scholes, M., & Lucas, M. (2015). How is our marine life responding to climate change?. Climate Change: Briefings From South Africa, 2 - 4.
9. Jones, N. (2011). Coral marches to the poles. Retrieved from: https://www.nature.com/news/2011/110121/full/news.2011.33.html
10. Hannam, P. (2018). Sydney's marine life turning troppo as coral, other species head south. The Sydney Morning Herald. [online] Retrieved from: https://www.smh.com.au/environment/climate-change/sydney-s-marine-life-turning-troppo-as-coral-other-species-head-south-20180904-p501ns.html
11. Woodford, J. (2014, September 15). Tropical Sydney: Corals in the Harbour? Real Dirt. [online] Retrieved from: http://www.realdirt.com.au/2014/09/15/tropical-sydney-corals-in-the-harbour/
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.
|
Prolong the life of your ATV with the right quad bike maintenance tips
Prolong the life of your ATV with the right quad bike maintenance tips
Prolong the life of your ATV with the right quad bike maintenance tips
How to maintain your quad bike
This off and on-road recreational and commercial vehicle is an all-rounder. Quad bikes can cover every form of terrain speedily and carry loads. From kids’ quads to agricultural quads, these are all-purpose power machines designed for thrills and work both. Whether you use your ATV for racing or to ride around the countryside on weekends, the correct quad bike maintenance goes a long way. Proper regular maintenance also ensures that you can use the vehicle safely.
Chain/Cable adjustment
The quad bike goes where other vehicles cannot, and in most instances, it tackles rough and bumpy terrain. Mud, dirt, and grime collect on the chain and cables routinely. Don’t forget to clean the mud off before it has time to dry and start the corroding process. Do not be tempted to use a power washer for this purpose as the water can break seals and bearings and leak into the electrics. Use low-pressure washing and clothes or rags to clean the chain and cables.
You need to check the chains for tension and rust. By using an ATV stand, you can carefully inspect your bike components. Loose chain sections, the sound of your chain hopping around the chain-guard, tensioned chain that comes off easily out of the sprocket, and rust are all signs it needs adjustments or replacement. Use bike-specific lubricant to spray the whole length of the chain. Lubricating and adjusting the cables help prevent failures in the braking systems.
Oil and filter changes
Oil and filter changes are necessary to avoid internal corrosion. Debris and dirt collected in the oil can cause long-term damage. Always refer to the owner manual to use recommended oils and change intervals for your model. Your ATV usually needs engine oil and filter changes every 20hrs or 100mile use. A warmed-up bike makes it easier to replace the oil. Before unscrewing the drain bolt, run your engine for few minutes. It allows the oil to flow out better for complete drainage and debris to leave the engine. Make sure to empty all oil before topping up with new.
Air filter cleaning and lubing
A combustion engine needs clean air consistently to function to its full potential. The air filter should always remain unobstructed. Cleaning it to remove clogged-up dirt prevents stress on the engine. A dirty filter lowers mileage and causes poor engine performance. Every 100hr or 600mile use requires cleaning. Avoid compressed air or coarse brushes for cleaning. Use water and cleaning solvent for paper filters. Hand wash foam filters with soap and water and dry properly before reattaching.
Use an air filter-specific oil to lube the filter interior to trap foreign particles before reaching the engine. Spray or apply oil liberally after cleaning and drying the filter.
Check the spark plugs
Properly functioning spark plugs are a nice brown colour. If they are too dark, your fuel mixture is too rich, and if too pale, the mixture is too lean. If you get wet or raw fuel smells, it is a sign of a broken engine seal. Inspect spark plug wires to see if they are damaged, snagged, or have come loose. Check the electrodes and centre porcelain for deposits, corrosion, or carbon fouling. Clean the carbon deposits and dirt. Replace corroded plugs.
Tighten nuts and bolts
Your quad bike takes many a bouncing and jolting on the rough terrain. To have loosened nuts and bolts is a dangerous thing. Wheel hubs, sprocket bolts, pivot bolts, axle nut, and other fastening components need tightening when they start to vibrate or feel loose. Always check these when you clean your bike on your usual maintenance regimes.
Wear protective clothing before starting on your quad bike maintenance. The chemicals you work with for cleaning and lubricating are harmful to your skin. Use latex gloves and waterproof suits.
Make quad biking safe and fun with advanced quality mini and adult quad bikes from Mini Bikes Off Road.
|
Provided by: manpages-dev_5.02-1_all bug
NAME
wcswidth - determine columns needed for a fixed-size wide-character string
SYNOPSIS
#define _XOPEN_SOURCE /* See feature_test_macros(7) */
#include <wchar.h>
int wcswidth(const wchar_t *s, size_t n);
DESCRIPTION
The wcswidth() function returns the number of columns needed to represent the wide-
character string pointed to by s, but at most n wide characters. If a nonprintable wide
character occurs among these characters, -1 is returned.
RETURN VALUE
The wcswidth() function returns the number of column positions for the wide-character
string s, truncated to at most length n.
ATTRIBUTES
For an explanation of the terms used in this section, see attributes(7).
┌───────────┬───────────────┬────────────────┐
│InterfaceAttributeValue │
├───────────┼───────────────┼────────────────┤
│wcswidth() │ Thread safety │ MT-Safe locale │
└───────────┴───────────────┴────────────────┘
CONFORMING TO
POSIX.1-2001, POSIX.1-2008.
NOTES
The behavior of wcswidth() depends on the LC_CTYPE category of the current locale.
SEE ALSO
iswprint(3), wcwidth(3)
COLOPHON
This page is part of release 5.02 of the Linux man-pages project. A description of the
project, information about reporting bugs, and the latest version of this page, can be
found at https://www.kernel.org/doc/man-pages/.
|
TY - JOUR AU - Shahid Fareed AU - Shah Hussain AU - Shahida Batool AU - Asma Amir AU - Nayab Khattak AU - Mohsin Ali PY - 2021/06/30 Y2 - 2022/11/26 TI - ROLE OF TOBACCO SMOKING IN CAUSING HYPOMAGNESEMIA AND RHEUMATOID ARTHRITIS JF - Pakistan Journal of Physiology JA - PJP VL - 17 IS - 2 SE - Review Article DO - UR - http://pjp.pps.org.pk/index.php/PJP/article/view/1331 AB - Rheumatoid arthritis (RA) is a type of immune system disorders that badly affect patient’s quality of life. The onset of disease constitutes a complex pathological process, and several mechanisms and triggers are proposed in the development of this disease. Magnesium (Mg) is an important trace element that plays a role in normal functioning of immune system. The deficiency of magnesium is found to be related to abnormal T-cells functions leading to secretion of pro-inflammatory chemicals such as interleukin-1 (IL-1), interleukin-6 (IL-6), tumour necrosis factor alpha (TNF-α) and histamine. Similarly, hypomagnesaemia also causes an increase in intracellular calcium level that leads to hyperactivation of phagocytes which are the first line of defence of our immune system. Tobacco smoking is a cause of hypomagnesemia in susceptible patients. The association between tobacco smoking and onset of rheumatoid arthritis is statistically significant in those who are smoking, even for less than 10 years.Pak J Physiol 2021;17(2):46–50 ER -
|
[Date Prev][Date Next] [Chronological] [Thread] [Top]
Re: SyncRepl - no write access
>>>>> "Quanah" == Quanah Gibson-Mount <quanah@stanford.edu> writes:
Quanah> If you make the syncRepl updatedn match the rootdn on the
Quanah> replica, there is no need for any ACL related to syncrepl.
This work 'like a charm' (well, not really but...).
I now have the same DN as 'rootdn', 'syncrepl:updatedn' and 'syncrepl:binddn'
(is there something wrong with this!?). The object gets updated, BUT (!)
the OpenLDAPaci attribute(s) is removed!
Is SyncRepl and ACI's mutually exclusive?
The DN I'm using (rootdn etc) DOES have read access to the attribute on the
provider, so it's not that...
|
How to Split a String in Java?
In Java, you can split a string into multiple substrings based on a specified delimiter. The resulting substrings are stored in an array. This can be a useful feature when you need to manipulate text data.
The String class provides the split() method to split a string. The method takes a regular expression as an argument and returns an array of substrings.
Here’s the syntax of the split() method in Java:
String[] parts = inputString.split(delimiter);
Java String.split() Signature
public String[] split(String regex, int limit)
public String[] split(String regex)
Here, inputString is the string that you want to split, and delimiter is the regular expression that you want to use as a separator.
Let’s take an example to see how the split() method works:
String sentence = "The quick brown fox jumps over the lazy dog";
String[] words = sentence.split(" ");
In this example, we have a string sentence that contains a sentence. We want to split this sentence into words, so we use the space character as the delimiter. The resulting array words will contain each word as an element.
Here is the output doing a foreach loop for the variable words
for (String word : words) {
System.out.println(word);
}
//Output
The
quick
brown
fox
jumps
over
the
lazy
dog
How to Split a String in Java using a Regular Expression
You can also split a string using a regular expression that matches a pattern. For example, let’s say you have a string that contains multiple lines of text separated by a new line character \n. You can split this string into an array of lines using the following code:
String text = "Line 1\nLine 2\nLine 3\n";
String[] lines = text.split("\\r?\\n");
In this example, we use the regular expression \\r?\\n as the delimiter to split the string into lines. The \\r character matches a carriage return, and the \\n character matches a line feed. The ? character makes the preceding expression optional, so the regular expression matches both \r\n and \n line endings.
You can also limit the number of substrings in the resulting array by specifying a limit parameter. For example:
String text = "apple,banana,orange,grape";
String[] fruits = text.split(",", 2);
In this example, we use the comma character as the delimiter to split the string into substrings. The 2 parameter limits the resulting array to contain at most two substrings. The resulting array will contain “apple” as the first element and “banana,orange,grape” as the second element.
In conclusion, splitting a string in Java is easy using the split() method of the String class. You can use a simple delimiter or a regular expression to split the string into multiple substrings, and limit the number of substrings in the resulting array if necessary.
Share your love
Leave a Reply
Your email address will not be published. Required fields are marked *
|
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
Just wondering under what circumstances would you prefer to generate a proxy from a WCF service when you can just invoke calls using the ChannelFactory?
This way you won't have to generate a proxy and worry about regenerating a proxy when the server is updated?
Thanks
share|improve this question
5 Answers 5
up vote 66 down vote accepted
There are 3 basic ways to create a WCF client:
1. Let Visual Studio generate your proxy. This auto generates code that connects to the service by reading the WSDL. If the service changes for any reason you have to regenerate it. The big advantage of this is that it is easy to set up - VS has a wizard and it's all automatic. The disadvantage is that you're relying on VS to do all the hard work for you, and so you lose control.
2. Use ChannelFactory with a known interface. This relies on you having local interfaces that describe the service (the service contract). The big advantage is that can manage change much more easily - you still have to recompile and fix changes, but now you're not regenerating code, you're referencing the new interfaces. Commonly this is used when you control both server and client as both can be much more easily mocked for unit testing. However the interfaces can be written for any service, even REST ones - take a look at this Twitter API.
3. Write your own proxy - this is fairly easy to do, especially for REST services, using the HttpClient or WebClient. This gives you the most fine grain control, but at the cost of lots of service API being in strings. For instance: var content = new HttpClient().Get("http://yoursite.com/resource/id").Content; - if the details of the API change you won't encounter an error until runtime.
Personally I've never liked option 1 - relying on the auto generated code is messy and loses too much control. Plus it often creates serialisation issues - I end up with two identical classes (one in the server code, one auto generated) which can be tided up but is a pain.
Option 2 should be perfect, but Channels are a little too limiting - for instance they completely lose the content of HTTP errors. That said having interfaces that describe the service is much easier to code with and maintain.
share|improve this answer
1
@MurHaf Nope - this answer is entirely my own work. I ALWAYS attribute the contributions of others. I wrote this answer based on years of working with SOAP services in .Net at various jobs. That article that you link to is from March 2013, while my answer was written in April 2010 - 3 years before! If plagiarism has occurred he copied me. You should check dates before making accusations as it's very easy to do. – Keith Dec 11 '13 at 21:37
@MurHaf we don't even come to the same conclusions - that article recommends auto-generating a proxy (option 1) as 'simple'. I describe it as easy to set up, but messy and a pain to maintain. He doesn't even discuss writing your own proxy (option 3). – Keith Dec 12 '13 at 9:24
I think SvcUtil should be mentioned also, as this is one of the most common ways to "write" a client. – Mare Infinitus Aug 19 '14 at 15:52
I use ChannelFactory along with MetadataResolver.Resolve method. Client configuration is a bother, so I get my ServiceEndpoint from the server.
When you use ChannelFactory(Of T), T is either the original contract that you can get from a reference in you project or a generated contract instance. In some projects, I generated the code from a Service Reference because I could not add a reference to the contract dll. You can even generate an asynch contract with the service reference and use that contract interface with ChannelFactory.
The main point of using ChannelFactory for me was to get rid of the WCF client config information. In the sample code below, you can see how to achieve a WCF client without config.
Dim fixedAddress = "net.tcp://server/service.svc/mex"
Dim availableBindings = MetadataResolver.Resolve(GetType(ContractAssembly.IContractName), New EndpointAddress(fixedAddress))
factoryService = New ChannelFactory(Of ContractAssembly.IContractName)(availableBindings(0))
accesService = factoryService.CreateChannel()
In my final project, the availableBindings are checked to use net.tcp or net.pipe if available. That way, I can use the best available binding for my needs. I only rely on the fact that a metadata endpoint exist on the server.
I hope this helps
BTW, this is done using .NET 3.5. However it does work also with 4.0.
share|improve this answer
Awesome stuff. I use MetadataResolver.Resolve as well for config but I didn't think about resolving the binding from the server. Very good point! – Sleeper Smith Oct 21 '11 at 5:28
Well in order to use ChannelFactory<T> you must be willing to share contract assemblies between the service and the client. If this is okay with you then ChannelFactory<T> can save you some time.
share|improve this answer
1
This is just not true. – Igby Largeman Dec 2 '11 at 19:57
@Charles - can you explain why this is not true? – Aran Mulholland Dec 14 '11 at 0:22
3
@Aran: I think what Andrew means to say is correct - that if you don't want to generate facsimiles of the contract classes, then you would need to have access to the originals. It's true that one way or another you need to have those contract classes. You can generate them, write them by hand, or get the service source code (if it's in the same language). Sharing assemblies is the easiest way, but that's not always possible. (Maybe I'm just taking Andrew too literally, but clarity is important here.) – Igby Largeman Dec 14 '11 at 17:43
1
@Charles ok, so you are saying that you could use ChannelFactory<T> even if you had no access to the assemblies by hand coding the interface of T and then using that. – Aran Mulholland Dec 15 '11 at 9:06
@Aran: yes, either by hand-coding or by using a tool like svcutil(assuming the service is running and accessible). – Igby Largeman Dec 15 '11 at 16:17
The proxy will build async functions for which is kind of nice.
share|improve this answer
1
yes - at the same time, both Visual Studio's "Add Service Reference" as well as svcutil.exe on the command line slaughter your config beyond recognition.... at least with svcutil.exe, you can define a "/noconfig" switch..... – marc_s Nov 9 '09 at 6:12
ChannelFactory also provides async methods: msdn.microsoft.com/en-us/library/ms731177.aspx But I prefer to use a T4 template to create an async class using ThreadPool which will invoke synchronous methods. – SandRock Apr 12 '11 at 16:46
What is a T4 Template? – TheWommies Dec 6 '11 at 10:52
1
As an update: With .NET 4.5 ChannelFactory<T> supports task-based asynchronous functions too. – gimpf Jan 24 '13 at 16:29
My answer is a kind of summary of Keith's and Andrew Hare's answers.
If you do not control server, but have only WSDL/URL- generate proxy using Visual Studio or svcutil. (Note that Visual Studio sometimes failed, when svcutil works better).
When you control both server and client, share interfaces/contracts and call ChannelFactory
.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
Skip to ContentGo to accessibility page
OpenStax Logo
Precalculus 2e
Key Concepts
Precalculus 2eKey Concepts
1. Preface
2. 1 Functions
1. Introduction to Functions
2. 1.1 Functions and Function Notation
3. 1.2 Domain and Range
4. 1.3 Rates of Change and Behavior of Graphs
5. 1.4 Composition of Functions
6. 1.5 Transformation of Functions
7. 1.6 Absolute Value Functions
8. 1.7 Inverse Functions
9. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
10. Exercises
1. Review Exercises
2. Practice Test
3. 2 Linear Functions
1. Introduction to Linear Functions
2. 2.1 Linear Functions
3. 2.2 Graphs of Linear Functions
4. 2.3 Modeling with Linear Functions
5. 2.4 Fitting Linear Models to Data
6. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
7. Exercises
1. Review Exercises
2. Practice Test
4. 3 Polynomial and Rational Functions
1. Introduction to Polynomial and Rational Functions
2. 3.1 Complex Numbers
3. 3.2 Quadratic Functions
4. 3.3 Power Functions and Polynomial Functions
5. 3.4 Graphs of Polynomial Functions
6. 3.5 Dividing Polynomials
7. 3.6 Zeros of Polynomial Functions
8. 3.7 Rational Functions
9. 3.8 Inverses and Radical Functions
10. 3.9 Modeling Using Variation
11. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
12. Exercises
1. Review Exercises
2. Practice Test
5. 4 Exponential and Logarithmic Functions
1. Introduction to Exponential and Logarithmic Functions
2. 4.1 Exponential Functions
3. 4.2 Graphs of Exponential Functions
4. 4.3 Logarithmic Functions
5. 4.4 Graphs of Logarithmic Functions
6. 4.5 Logarithmic Properties
7. 4.6 Exponential and Logarithmic Equations
8. 4.7 Exponential and Logarithmic Models
9. 4.8 Fitting Exponential Models to Data
10. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
11. Exercises
1. Review Exercises
2. Practice Test
6. 5 Trigonometric Functions
1. Introduction to Trigonometric Functions
2. 5.1 Angles
3. 5.2 Unit Circle: Sine and Cosine Functions
4. 5.3 The Other Trigonometric Functions
5. 5.4 Right Triangle Trigonometry
6. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
7. Exercises
1. Review Exercises
2. Practice Test
7. 6 Periodic Functions
1. Introduction to Periodic Functions
2. 6.1 Graphs of the Sine and Cosine Functions
3. 6.2 Graphs of the Other Trigonometric Functions
4. 6.3 Inverse Trigonometric Functions
5. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
6. Exercises
1. Review Exercises
2. Practice Test
8. 7 Trigonometric Identities and Equations
1. Introduction to Trigonometric Identities and Equations
2. 7.1 Solving Trigonometric Equations with Identities
3. 7.2 Sum and Difference Identities
4. 7.3 Double-Angle, Half-Angle, and Reduction Formulas
5. 7.4 Sum-to-Product and Product-to-Sum Formulas
6. 7.5 Solving Trigonometric Equations
7. 7.6 Modeling with Trigonometric Functions
8. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
9. Exercises
1. Review Exercises
2. Practice Test
9. 8 Further Applications of Trigonometry
1. Introduction to Further Applications of Trigonometry
2. 8.1 Non-right Triangles: Law of Sines
3. 8.2 Non-right Triangles: Law of Cosines
4. 8.3 Polar Coordinates
5. 8.4 Polar Coordinates: Graphs
6. 8.5 Polar Form of Complex Numbers
7. 8.6 Parametric Equations
8. 8.7 Parametric Equations: Graphs
9. 8.8 Vectors
10. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
11. Exercises
1. Review Exercises
2. Practice Test
10. 9 Systems of Equations and Inequalities
1. Introduction to Systems of Equations and Inequalities
2. 9.1 Systems of Linear Equations: Two Variables
3. 9.2 Systems of Linear Equations: Three Variables
4. 9.3 Systems of Nonlinear Equations and Inequalities: Two Variables
5. 9.4 Partial Fractions
6. 9.5 Matrices and Matrix Operations
7. 9.6 Solving Systems with Gaussian Elimination
8. 9.7 Solving Systems with Inverses
9. 9.8 Solving Systems with Cramer's Rule
10. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
11. Exercises
1. Review Exercises
2. Practice Test
11. 10 Analytic Geometry
1. Introduction to Analytic Geometry
2. 10.1 The Ellipse
3. 10.2 The Hyperbola
4. 10.3 The Parabola
5. 10.4 Rotation of Axes
6. 10.5 Conic Sections in Polar Coordinates
7. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
8. Exercises
1. Review Exercises
2. Practice Test
12. 11 Sequences, Probability and Counting Theory
1. Introduction to Sequences, Probability and Counting Theory
2. 11.1 Sequences and Their Notations
3. 11.2 Arithmetic Sequences
4. 11.3 Geometric Sequences
5. 11.4 Series and Their Notations
6. 11.5 Counting Principles
7. 11.6 Binomial Theorem
8. 11.7 Probability
9. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
10. Exercises
1. Review Exercises
2. Practice Test
13. 12 Introduction to Calculus
1. Introduction to Calculus
2. 12.1 Finding Limits: Numerical and Graphical Approaches
3. 12.2 Finding Limits: Properties of Limits
4. 12.3 Continuity
5. 12.4 Derivatives
6. Chapter Review
1. Key Terms
2. Key Equations
3. Key Concepts
7. Exercises
1. Review Exercises
2. Practice Test
14. A | Basic Functions and Identities
15. Answer Key
1. Chapter 1
2. Chapter 2
3. Chapter 3
4. Chapter 4
5. Chapter 5
6. Chapter 6
7. Chapter 7
8. Chapter 8
9. Chapter 9
10. Chapter 10
11. Chapter 11
12. Chapter 12
16. Index
Key Concepts
12.1 Finding Limits: Numerical and Graphical Approaches
• A function has a limit if the output values approach some value L L as the input values approach some quantity a. a. See Example 1.
• A shorthand notation is used to describe the limit of a function according to the form lim xa f(x)=L, lim xa f(x)=L, which indicates that as x x approaches a, a, both from the left of x=a x=a and the right of x=a, x=a, the output value gets close to L. L.
• A function has a left-hand limit if f( x ) f( x ) approaches L L as x x approaches a a where x<a. x<a. A function has a right-hand limit if f( x ) f( x ) approaches L L as x x approaches a a where x>a. x>a.
• A two-sided limit exists if the left-hand limit and the right-hand limit of a function are the same. A function is said to have a limit if it has a two-sided limit.
• A graph provides a visual method of determining the limit of a function.
• If the function has a limit as x x approaches a, a, the branches of the graph will approach the same y- y- coordinate near x=a x=a from the left and the right. See Example 2.
• A table can be used to determine if a function has a limit. The table should show input values that approach a a from both directions so that the resulting output values can be evaluated. If the output values approach some number, the function has a limit. See Example 3.
• A graphing utility can also be used to find a limit. See Example 4.
12.2 Finding Limits: Properties of Limits
• The properties of limits can be used to perform operations on the limits of functions rather than the functions themselves. See Example 1.
• The limit of a polynomial function can be found by finding the sum of the limits of the individual terms. See Example 2 and Example 3.
• The limit of a function that has been raised to a power equals the same power of the limit of the function. Another method is direct substitution. See Example 4.
• The limit of the root of a function equals the corresponding root of the limit of the function.
• One way to find the limit of a function expressed as a quotient is to write the quotient in factored form and simplify. See Example 5.
• Another method of finding the limit of a complex fraction is to find the LCD. See Example 6.
• A limit containing a function containing a root may be evaluated using a conjugate. See Example 7.
• The limits of some functions expressed as quotients can be found by factoring. See Example 8.
• One way to evaluate the limit of a quotient containing absolute values is by using numeric evidence. Setting it up piecewise can also be useful. See Example 9.
12.3 Continuity
• A continuous function can be represented by a graph without holes or breaks.
• A function whose graph has holes is a discontinuous function.
• A function is continuous at a particular number if three conditions are met:
• Condition 1: f(a) f(a) exists.
• Condition 2: lim xa f(x) lim xa f(x) exists at x=a. x=a.
• Condition 3: lim xa f(x)=f(a). lim xa f(x)=f(a).
• A function has a jump discontinuity if the left- and right-hand limits are different, causing the graph to “jump.”
• A function has a removable discontinuity if it can be redefined at its discontinuous point to make it continuous. See Example 1.
• Some functions, such as polynomial functions, are continuous everywhere. Other functions, such as logarithmic functions, are continuous on their domain. See Example 2 and Example 3.
• For a piecewise function to be continuous each piece must be continuous on its part of the domain and the function as a whole must be continuous at the boundaries. See Example 4 and Example 5.
12.4 Derivatives
• The slope of the secant line connecting two points is the average rate of change of the function between those points. See Example 1.
• The derivative, or instantaneous rate of change, is a measure of the slope of the curve of a function at a given point, or the slope of the line tangent to the curve at that point. See Example 2, Example 3, and Example 4.
• The difference quotient is the quotient in the formula for the instantaneous rate of change:
f( a+h )f( a ) h f( a+h )f( a ) h
• Instantaneous rates of change can be used to find solutions to many real-world problems. See Example 5.
• The instantaneous rate of change can be found by observing the slope of a function at a point on a graph by drawing a line tangent to the function at that point. See Example 6.
• Instantaneous rates of change can be interpreted to describe real-world situations. See Example 7 and Example 8.
• Some functions are not differentiable at a point or points. See Example 9.
• The point-slope form of a line can be used to find the equation of a line tangent to the curve of a function. See Example 10.
• Velocity is a change in position relative to time. Instantaneous velocity describes the velocity of an object at a given instant. Average velocity describes the velocity maintained over an interval of time.
• Using the derivative makes it possible to calculate instantaneous velocity even though there is no elapsed time. See Example 11.
Citation/Attribution
Want to cite, share, or modify this book? This book is CC BY and you must attribute OpenStax.
Attribution information
• If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
Access for free at https://openstax.org/books/precalculus-2e/pages/1-introduction-to-functions
• If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
Access for free at https://openstax.org/books/precalculus-2e/pages/1-introduction-to-functions
Citation information
© Dec 13, 2021 OpenStax. Textbook content produced by OpenStax is licensed under a CC BY license. The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.
|
Hemochromatosis patients should be on a low-iron diet
HEMAHemochromatosis is a common genetic condition and yet there are still a number of misperceptions surrounding the diagnosis and management of this condition. Hemochromatosis affects both men and women. Typical patients do not have alcoholism or viral hepatitis, and often have normal liver enzymes. Clinical expression is highly variable. Genetic testing is widely available and particularly useful in family studies. Hemochromatosis can be readily diagnosed and treated. The purpose of the present review is to address the medical myths and misconceptions of hemochromatosis.
Keywords: Genetic testing, Hemochromatosis, Iron
The medical landscape is vast with an expanding array of information about old and new diseases. Thus, it becomes an insurmountable task for any physician to be up-to-date on all of the recent developments in modern medicine. For most physicians, it is acceptable to inform patients that they may not have all of the current information about their medical condition. This may lead to further study in textbooks or increasingly on the Internet, or they may seek a referral to a specialist with expertise in this area. In the present review, some of the common myths and misconceptions of hemochromatosis are explored.
HEMOCHROMATOSIS MYTHS
Hemochromatosis is rare
A large population study (1) has demonstrated that one in 227 Caucasians in North America is homozygous for the C282Y mutation of the hemochromatosis gene. This is the typical genetic pattern seen in over 90% of typical patients; however, there are many C282Y homozygotes who are asymptomatic. Approximately, 20% of male homozygotes and 50% of female homozygotes will have normal serum ferritin levels. If the disease is defined based on symptoms, the prevalence would be much lower, and because the symptoms may be non-specific, it is more difficult to assess the prevalence of symptomatic hemochromatosis. This differs significantly between referred patients and participants in population screening studies. There has also been considerable debate about whether the genotype should be used to define hemochromatosis or whether it should be based on the presence of iron overload, independent of genotype (2). The bottom line is that this condition is extremely common within the Caucasian population and physicians should have a low index of suspicion when ordering screening tests, such as the transferrin saturation test and the serum ferritin test, for iron overload.
Women are not affected by hemochromatosis
As an autosomal recessive condition, hemochromatosis affects men and women equally in regard to the inheritance of the hemochromatosis gene. It has been considered that the effects of menses and pregnancy will significantly offset the lifelong accumulation of iron with tissue injury. A study (3) of 176 female hemochromatosis patients, matched to 176 male patients with respect to birth year, demonstrated similar hepatic iron concentrations in both sexes. However, male patients had a higher prevalence of cirrhosis compared with female patients (26% versus 14%). Cirrhosis in a female hemochromatosis patient has rarely been discovered in a population screening study. It is also important to assess women so that genetic counselling can be provided to their children and siblings.
Most hemochromatosis patients are alcoholics
The misconception that most hemochromatosis patients are alcoholics stems from the fact that most alcoholics have elevations in serum ferritin levels and some patients with alcoholic liver disease have increased iron deposition in the liver (alcoholic siderosis). This latter condition was widely reported from the Boston area in the 1960s (4) and likely ‘contaminated’ the hemochromatosis literature with patients who did not actually have genetic hemochromatosis. Studies (5,6) on the prevalence of alcoholism based on hemochromatosis pedigrees have shown no increased evidence of alcoholism. The genetic test for hemochromatosis remains a powerful diagnostic tool to help separate alcoholic liver disease from hemochromatosis.
Many hemochromatosis patients have chronic viral hepatitis
The prevalence of both hepatitis B virus (HBV) and hepatitis C virus (HCV) is not consistently higher in hemochromatosis patients. A screening study (7) that identified 302 C282Y homozygotes found one case of concomitant HCV and none with HBV. Much like alcoholic liver disease, both chronic HBV and HCV have been associated with elevations in serum ferritin levels and less commonly associated with increases in hepatic iron concentrations with advanced liver disease (8). Genetic testing is useful in this setting to differentiate hemochromatosis from iron abnormalities secondary to chronic viral hepatitis.
Diabetes is a cardinal feature of hemochromatosis
Although hemochromatosis was once called ‘bronze diabetes’, recent population screening studies (1,9) have not demonstrated an increased prevalence of diabetes in C282Y homozygotes compared with a control population. The pathogenesis of diabetes in hemochromatosis is likely multifactorial and can include defects in insulin secretion and insulin resistance (10,11).
Most hemochromatosis patients have elevated liver enzymes
Although liver disease is the most consistent feature of the disease, hemochromatosis is not an inflammatory liver disease and, therefore, many patients will have normal liver enzymes (12). In a review (13) of 351 C282Y homozygotes from our hemochromatosis clinic at the London Health Sciences Centre in London, Ontario, 277 of 351 (79%) patients had an aspartate aminotransferase level of less than 40 U/L and 238 of 351 (68%) patients had an alanine aminotransferase level of less than 40 U/L. It remains prudent to screen patients with unexplained enzyme elevations with transferrin saturation and serum ferritin tests.
Most patients with an elevated serum ferritin level have hemochromatosis
A population screening study (1) has demonstrated that elevation in serum ferritin levels is seen in approximately 10% of primary care patients. When these patients are investigated in a referral clinic, only 33% to 42% have genetic hemochromatosis. More common causes of increased serum ferritin levels include obesity, fatty liver and daily alcohol consumption (14).
An elevated hemoglobin is common in hemochromatosis
Some physicians have told patients that they do not have hemochromatosis because their hemoglobin levels are normal. Perhaps this is based on the concept that if iron deficiency reduces hemoglobin, iron excess could increase hemoglobin. A review of 634 C282Y homozygotes at our clinic at the London Health Sciences Centre (London, Ontario) showed a mean hemoglobin level of 145±13 g/L, which suggests that polycythemia is not a reliable marker for iron overload.
Hemochromatosis is not a cause of significant liver disease
It has been well established that with timely diagnosis and institution of iron depletion therapy, patients with hemochromatosis can be expected to have a prognosis equal to that of controls. However, among patients with severe iron accumulation, the risk of progression to cirrhosis is significant. As in other causes of cirrhosis, morbidity and mortality rates are increased due to the many associated complications of end-stage liver disease including the development of hepatocellular carcinoma. However, in the case of cirrhosis due to hemochromatosis, the incidence of hepatocellular carcinoma is significantly higher than that of many other causes of liver disease. Iron overload in hemochromatosis has also been shown to potentiate alcoholic liver disease and may have a similar effect on the course of HCV and nonalcoholic fatty liver disease (1517). Given that 1.8% of the population in the United States are HCV-positive and that up to 24% have nonalcoholic fatty liver disease, the coexistence of these disorders with hemochromatosis is likely to affect a reasonable proportion of our population.
Carriers of the hemochromatosis gene often have iron overload
It has been common for physicians to tell patients with mild elevations in serum ferritin levels that they may be carriers of the hemochromatosis gene. Mild elevations in serum ferritin levels in the general population are very common and occur in all ethnic groups, so they are unlikely to be explained on the basis of heterozygosity for the hemochromatosis gene. A large population study (1) has now demonstrated that C282Y heterozygotes have iron studies similar to those of the general population. There is an increased prevalence of mild iron overload in compound heterozygotes (C282Y/H63D), and some C282Y heterozygotes may also carry an unidentified second mutation.
Children of hemochromatosis patients are at the highest risk of disease
The misconception that children of hemochromatosis patients are at the highest risk of disease arises because of a misunderstanding by patients and physicians of the concept of autosomal recessive inheritance. Usually a typical C282Y homozygote has heterozygous parents and so there is a higher risk for siblings. The risk is slightly higher than 25% because there is a possibility that one of the parents is a homozygote. Children of homozygotes are at a much lower risk because the partner must also carry the C282Y mutation. Among Caucasian couples, the risk to children is approximately 5% (18). Genetic testing of children younger than 18 years of age is not recommended because of a number of potential concerns about informed consent and genetic discrimination.
Genetic testing for hemochromatosis is a research tool
Genetic testing for hemochromatosis has a number of unique characteristics. Unlike most genetic diseases, in hemochromatosis there is a single genetic mutation (C282Y) that explains most typical cases. The test is widely available and can be performed at a relatively low cost. There have been a number of studies (1921) that have assessed the psychosocial impact of genetic testing for hemochromatosis which have concluded that the test is well accepted by patients and has rarely been associated with insurance discrimination. For these reasons, the genetic test has become one of the most commonly requested tests and is a powerful diagnostic tool that is accessible to most physicians.
Hemochromatosis patients should be on a low-iron diet
Although dietary iron is the source of excess iron in hemochromatosis, a decrease in dietary iron has not been shown to decrease iron stores in hemochromatosis. All food groups contain iron and most humans will absorb only a small fraction of orally ingested iron. Iron absorption includes components from heme and nonheme iron sources (22), and the control or lack of control over these regulatory mechanisms is incompletely understood in hemochromatosis. It has been speculated that a defect in hepcidin, a circulating peptide produced by the liver, is a fundamental defect in hemochromatosis which results in an increase in intestinal iron absorption (23). Iron supplementation of food was introduced in the 1950s as a marketing tool, and the added iron has poor bioavailability. Generally, vegetarians have lower serum ferritin levels than meat-eating patients but this does not translate into a dietary recommendation (24). The description of bacterial infections from Yersinia (25) and other Vibrio species has led to recommendations to avoid raw shellfish which may be appropriate for all patients rather than just hemochromatosis patients. Hemochromatosis patients are advised to avoid iron supplementation and large doses of supplemental oral vitamin C which may adversely affect some patients with iron overload (26).
Hemochromatosis is a progressive disease
Because hemochromatosis patients presumably begin absorbing excess iron at birth, it seems intuitive that progressive iron overload over time would occur. However, it has not been possible to show a correlation between liver iron concentration and age in hemochromatosis (27). It has become apparent through various studies, in which genetic testing was performed after many years of observation such as in the Copenhagen Heart Study (28), that many C282Y homozygotes do not have a progressive rise in serum ferritin levels, even without phlebotomy treatment. This is the most likely explanation for the discordance between the high frequency of the hemochromatosis genotype and the relatively low representation of hemochromatosis in liver transplant registries (29) or in death certificate data (30). There have been patients who have refused phlebotomy therapy and have been observed over many years to not have any changes in their serum ferritin levels. Phlebotomy therapy has never been subjected to a randomized trial. The strongest supporting evidence for a beneficial effect of phlebotomy is the improvement of liver fibrosis that has been demonstrated on serial liver biopsies in hemochromatosis patients (31). Maintenance therapy is even less established following iron depletion, and many patients will not demonstrate any evidence of iron reaccumulation after many years of observation (32). Many patients enjoy the concept of continuous therapy for hemochromatosis and these patients can be encouraged to be voluntary blood donors several times per year (33). If they are ineligible, an annual ferritin determination is a reasonable alternative to guide maintenance therapy.
SUMMARY
Hemochromatosis is a common and relatively simple genetic disease to diagnose and treat. It can be diagnosed and treated by family physicians using transferrin saturation, serum ferritin and C282Y genetic testing. Physicians who are not comfortable with interpretation of the genetic test and subsequent family counselling should refer to local specialists and try to avoid any perpetration of misinformation.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2657669/
Connie’s comments: Calcium and magnesium supplements cancels iron absorption.
2 Comments
Leave a Reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
Skip Header
You are using a version of browser that may not display all the features of this website. Please consider upgrading your browser.
Long form collapsin response mediator protein-1 (LCRMP-1) expression is associated with clinical outcome and lymph node metastasis in non-small cell lung cancer patients.
Pan S.-H., Chao Y.-C., Chen H.Y., Hung P.F., Lin P.Y., Lin C.W., Chang Y.L., Wu C.T., Lee Y.C., Yang S.-C., Hong T.-M., Yang P.-C.
Collapsin response mediator protein (CRMP) family proteins are cytosolic phosphoproteins involved in semaphorin 3A-mediated neuronal cell growth cone collapse and cancer invasion. We identified a novel human isoform of CRMP family proteins named long form CRMP-1 (LCRMP-1), which was different from the known invasion suppressor, CRMP-1, in its molecular weight and the N-terminal exon-1. This study was aimed to elucidate the clinical significance of LCRMP-1 in non-small cell lung cancer (NSCLC) patients. Full-length human LCRMP-1 was cloned from lung adenocarcinoma based on the Expressed Sequence Tags (EST) database. We generated LCRMP-1 specific antibody and subsequent in vitro and in vivo invasion assays showed positive correlations between LCRMP-1 expression and lung cancer cell invasiveness. We further demonstrated that high LCRMP-1 mRNA expressions were associated with poor overall and disease-free survivals (P=0.004 and 0.006, respectively, log-rank test) in 72 NSCLC patients. The results were confirmed in an independent cohort of 54 NSCLC patients by immunohistochemistry (P=0.032, log-rank test). The metastatic lymph nodes showed higher LCRMP-1 expressions as compared with the paired primary lung tumors (P=0.012, McNemar's test). In conclusion, LCRMP-1 was a cancer invasion enhancer that could be a novel prognostic biomarker in NSCLC.
Lung Cancer 67:93-100(2010) [PubMed] [Europe PMC]
UniProt is an ELIXIR core data resource
Main funding by: National Institutes of Health
We'd like to inform you that we have updated our Privacy Notice to comply with Europe’s new General Data Protection Regulation (GDPR) that applies since 25 May 2018.
Do not show this banner again
|
What does ophioglossaceae mean?
Definitions for ophioglossaceae
Here are all the possible meanings and translations of the word ophioglossaceae.
Princeton's WordNet
1. Ophioglossaceae, family Ophioglossaceae(noun)
a family of succulent ferns of order Ophioglossales; cosmopolitan in distribution
Freebase
1. Ophioglossaceae
Ophioglossaceae, the Adder's tongue family, is a family of ferns, currently thought to be most closely related to Psilotaceae, the two together comprising the class Psilotopsida as the sibling group to the rest of the ferns. The Ophioglossaceae is one of two groups of ferns traditionally known as eusporangiate fern. The number of genera included in the family varies between different authors' treatments, and most conservatively the family is treated as containing four genera, Ophioglossum, Botrychium, Helminthostachys, and Mankyua. A broad definition of the family and its genera have been taken in several recent treatments. A notable exception is the classification of Kato, who advocated the division of Botrychium into four genera: Botrychium s.s., Sceptridium, Japanobotrychium, and Botrypus. These ferns differ from the other ferns in several respects: ⁕they produce only a single leaf at a time ⁕instead of the leptosporangia typical of most ferns they produce eusporangia, which are larger, contain more spores, and have thicker walls ⁕their sporophylls are divided into two distinct parts, the sporophore which produces sporangia and has a greatly reduced and modified blade, and the trophophore, which is very similar to the trophophylls in size, color, shape, and so forth
Numerology
1. Chaldean Numerology
The numerical value of ophioglossaceae in Chaldean Numerology is: 8
2. Pythagorean Numerology
The numerical value of ophioglossaceae in Pythagorean Numerology is: 6
Images & Illustrations of ophioglossaceae
Translation
Find a translation for the ophioglossaceae definition in other languages:
Select another language:
Discuss these ophioglossaceae definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Please enter your email address:
Citation
Use the citation below to add this definition to your bibliography:
Style:MLAChicagoAPA
"ophioglossaceae." Definitions.net. STANDS4 LLC, 2017. Web. 28 Apr. 2017. <http://www.definitions.net/definition/ophioglossaceae>.
Are we missing a good definition for ophioglossaceae? Don't keep it to yourself...
Nearby & related entries:
Alternative searches for ophioglossaceae:
Thanks for your vote! We truly appreciate your support.
|
On Thu, Jul 07, 2005 at 07:42:37PM +0200, Andy Polyakov wrote:
> >1) In openssl-0.9.8/crypto/des/cfb_enc.c line 170 there is "memcpy
> >(ovec,ovec+num,8);" and since ovec and ovec+num will overlap sometimes,
> >this function relies on undocumented/undefined behavior of memcpy?
>
> The original reason for choosing of memcpy was a) it's comonly inlined
> by compilers [most notably gcc], but not memmove, b) I fail to imagine
> how it can fail with overlapping regions if num is guaranteed to be
> positive, even if the routine is super-optimized, inlined, whatever. Can
> you?
This doesn't make any sense - if memcpy can handle overlapping regions
without any slowdown, then wouldn't it make sense to implemenent
memmove as a #define (or inline call to) memcpy? Either memcpy does
not handle overlaps while memmove does, or memcpy and memmove work at
the same speed, because the ability to handle overlapping memory
regions is the only difference between the two. The only other
alternative is that memcpy and memmove do the exact same thing, but
memmove is slower. That seems quite unlikely.
-Jack
__________________________________________________ ____________________
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager majordomo@openssl.org
|
Python Package
Link Installation
📘
• We recommend installing it in a new virtual environment.
• JupyterLab is also installed when Link is installed.
• Installation of Link may cause dependency conflicts with existing packages, depending on the user's environment. If this occurs, please contact Technical support.
1. Initial installation : Installing in a new virtual environment.
python3 -m pip install mrx-link
2. For Update or Reinstallation : Deleting and reinstalling in an existing virtual environment
python3 -m pip uninstall mrx-link
python3 -m pip install mrx-link
Start Link
📘
Link is compatible with Chrome browser.
After installation, enter the following code to execute Jupyter Lab.
python3 -m jupyterlab
# Access with browser: <http://localhost:8888/>
Enable/Disable Link Extension
It is possible to enable and disable the extension by using the following commands.
1. Disable the extension
python3 -m jupyter labextension disable mrx_link && python3 -m jupyter server extension disable mrx_link
2. Enable the exthension
python3 -m jupyter labextension enable mrx_link && python3 -m jupyter server extension enable mrx_link
|
Convertisseur de CCX en XBM
Convertissez vos fichiers ccx en xbm en ligne et gratuitement
Déposer les fichiers ici. 100 MB taille maximale de fichier ou Inscription
en
Nous avons converti 418,791,601 fichiers d’une taille totale de 6,060 To
ccx
Corel Compressed Exchange files
Ceci est un format utilisé pour stocker des images clipart pour travailler avec l'imagerie vectorielle CorelDRAW. Il est utilisé pour saisir des éléments graphiques préparés séparément dans une conception de dessins vectoriels. Il est utilisé comme modèle vierge et est distribué sous la forme de millions de cliparts préparés qui peuvent compléter votre propre conception.
xbm
X Windows system bitmap (black and white)
Ceci est un format d'image monochrome avec une structure bitmap. Il est utilisé pour stocker des images d'icônes et curseurs dans l'interface utilisateur graphique X Window System, qui est utilisé pour les connexions à distance. La structure d'un fichier XBM se compose de texte simple écrit dans le langage de programmation C.
Comment convertir un fichier CCX en fichier XBM
Étape 1
Téléversez un ou plusieurs fichiers ccx
Sélectionnez des fichiers depuis l'ordinateur, Google Drive, Dropbox, une URL ou glissez-les sur la page.
Étape 2
Choisissez "vers xbm"
Choisissez xbm ou tout autre format de sortie (plus de 200 formats supportés)
Étape 3
Téléchargez votre xbm
Laissez le fichier convertir et vous pourrez télécharger votre fichier xbm juste après
|
Wikia
House Wiki
Myasthenia gravis
6,718pages on
this wiki
Talk0
Myasthenia gravis
Pathology
Type
Autoimmune
Cause(s)
Unknown, but most patients have some abnormality of the thymus gland
Symptoms
Muscle fatigue, inability to control facial muscles, usually starting with the eyes, double vision, slurred speech, difficulty swallowing.
Mortality Rate
Low
Treatments
Surgery, acetylcholinesterase inhibitors, immunosuppresants
Show Information
Appearances
Spin, Man of the House
[Source]
Myasthenia gravis is an autoimmune disease where antibodies block the acetylcholine receptors in the synapses of the nerves that control muscles. It is very rare, occurring in only about one out of every 1 to 10 million people, and can easily be mistaken for other diseases that affect nerves in muscles. It is very much an "equal opportunity" disease and has the same incidence in either sex, all ethnic groups, and all age groups.
The disease presents as muscles that grow progressively weaker with use, but improve in function after a period of rest. It often affects the eyes first, usually causing the eylids to droop noticeable, and often resulting in double vision as the patient becomes progressively unable to control fine eye movement. However, in other patients, the disease affects the muscles of the mouth and throat, resulting in difficulty swallowing and slurred speech.
The symptoms of the disease may be intermittent and, in many cases, the disease will resolve itself after a few years even without treatment.
In rare cases, the disease can affect the muscles that control breathing and becomes immediately life-threatening. Infection, fever and medicine interactions can also bring on far more severe symptoms.
The causes of MG are not well understood. It is often found in combination with thyroid diseases, diabetes mellitus, rheumatoid arthritis, and lupus. The majority of patients also show a pathology of the thymus gland and a substantial percentage of those have a thymoma.
MG is difficult to diagnose as it's symptoms are also common to other diseases, including those that have no autoimmune component and need completely different treatment. Even tests for the antibodies that cause for the disease result in a false negative half the time.
Treatment is with cholinesterase inhibitors to improve muscle function and immunosuppresants to reduce the action of the antibodies. Surgery may be useful if the thymus gland is involved. In acute cases, plasmapheresis and immunoglobulin can be used.
MG patients without a thymoma usually have a normal life expectancy, although their quality of life may be affected. The symptoms are not progressive as is the case with Parkinson's disease or Huntington's disease and instead tend to wax and wane over time.
Around Wikia's network
Random Wiki
|
EN ET
Tagger Group
Tagger Group is for training multiple classes at once and it also uses tags in the dataset given.
Note
How do Tagger and Tagger Groups differ?
One model predicts whether a text is positive (True) or negative (False). That is, whether this text gets the label or not. Tagger trains only one model and predicts whether a text is similar to the dataset it was trained on or not. Tagger Group trains several models at once. That means, it can predict several labels at once. Tagger Group trains on facts. You can have several values under a certain fact and for each value (if it has high enough frequency (Minimum sample size) a model is trained.
Creation
Parameters
description:
Name of the Tagger model, which is also used as name of the tag while tagging the documents.
indices:
Names of the indices the model learns from (defaults to every index in the Project).
fields:
The fields the model learns from. If more than one fields is chosen, the fields are concatenated together before the learning process. One field is also enough. Usually lemmatized texts are preferred, especially with morphologically complex languages, because it increases the frequency of some words (eaten, eats and ate will change to its lemma eat and are dealt as one word).
query:
Searcher’s query for the dataset to be trained on. If Query is left empty, it will take all data in the active project as an input. You can also use saved searches as your desired input. This input will be the positive examples - later on, the Tagger tags data similar to this one.
embedding:
Embedding previously trained on the same dataset.
vectorizer:
Hashing Vectorizer, Count Vectorizer, Tfldf Vectorizer - read more about them here.
classifier:
Logistic Regression, LinearSVC.
maximum sample size:
The maximum sample size per class is for limiting the size of data the model trains on.
negative multiplier:
The negative multiplier is for changing the ratio of negative examples.
GUI
Create a new Tagger Group model by clicking on the ‘CREATE’ button in the top-left. Then choose the parameters. After that, all that’s left is hitting the “Create”-button (scroll down a bit), seeing the training process and the result of the tagger.
Note
LinearSVC might give an error in case there’s not enough data in the search.
_images/create_tagger_group.png
Fig. 70 Creating a Tagger Group
Whenever we create new Tagger Group models, we can track its progress from the table under Task. If we click on the job, we can see all the training info, how long did it took, and check how successful it was. Let’s not forget that:
1. Recall is the ratio of correctly labeled positives among all true positives. Avg.recall is the average of all the models’ recalls.
2. Precision is the ratio of correctly labeled positives among all instances that got a positive label. Avg.precision is the average of all the models’ precisions.
3. F1 score is the harmonic mean of these two and should be more informative especially with unbalanced data. Avg.F1_score is the average of all the models’ F1 scores.
_images/created_tagger_group.png
Fig. 71 Created Tagger Group
In the table view, you can also select several Tagger Groups and delete them all at once by clicking on the dustbin button next to the CREATE button in the top-left. If you have several Tagger Groups, you can search for the right one by their description or task status. If you have models on several pages you can change pages in the top-right.
API
Endpoint: /projects/{project_pk}/tagger_groups/
Example:
curl -X POST "http://localhost:8000/api/v1/projects/11/tagger_groups/" \
-H "accept: application/json" \
-H "Content-Type: application/json" \
-H "Authorization: Token 8229898dccf960714a9fa22662b214005aa2b049" \
-d '{
"description": "My tagger group",
"fact_name": "TEEMA",
"minimum_sample_size": 50,
"tagger": {
"fields": ["lemmas"],
"vectorizer": "Hashing Vectorizer",
"classifier": "Logistic Regression"
}
}'
Trained Tagger Group endpoint: /projects/{project_pk}/tagger_groups/{id}/
Usage
Models list
Models list displays the models the Tagger Group trained. You can inspect which kind of labels were trained.
API endpoint: /projects/{project_pk}/tagger_groups/{id}/models_list/
Tag text
Tag text is to check how does the model work. If you click on that, a window opens. You can paste there some text, choose to lemmatize it (necessary if our model was trained on a lemmatized text), and choose to use NER and post it. You then receive the result (all the labels which model predicted True for this text) and the probability of this label is true. Probability shows how confident is this model in its prediction. Number of similar documents is the number of most similar documents to the document in question. Tags given to these documents are tested on the document to be tagged.
API endpoint: /projects/{project_pk}/tagger_groups/{id}/tag_text/
Example:
curl -X POST "http://localhost:8000/api/v1/projects/11/tagger_groups/1/tag_text/" \
-H "accept: application/json" \
-H "Content-Type: application/json" \
-H "Authorization: Token 8229898dccf960714a9fa22662b214005aa2b049" \
-d '{
"text": "AINUS ettepanek - alla põhihariduse isikutele sõidulubasid mitte anda - sai kriitika osaliseks.",
"lemmatize": true,
"use_ner": false,
"n_similar_docs": 10,
"n_candidate_tags": 10,
"feedback_enabled": false
}'
Response:
[
{
"tag": "foo",
"probability": 0.6659222999240199,
"tagger_id": 4,
"result": true
},
{
"tag": "bar",
"probability": 0.5107991699285356,
"tagger_id": 3,
"result": true
}
]
Tag doc
Tag doc is similar to Tag text, except the input is in the JSON format. Number of similar documents is the number of most similar documents to the document in question. Tags given to these documents are tested on the document to be tagged.
API endpoint /projects/{project_pk}/tagger_groups/{id}/tag_doc/
Tag random doc
Tag random doc takes a random instance from your dataset, displays it, and returns the positive results of your models and the probability of these results being correct.
API endpoint /projects/{project_pk}/tagger_groups/{id}/tag_random_doc/
Apply to index
Used to classify every document inside one or several indices with a Tagger Group, this process will scroll through all the documents, parse the texts of the given fields and return their results as Texta Facts.
Since this is a long-term tasks, the user will get a response immediately while another processes it.
API endpoint /projects/{project_pk}/tagger_groups/{id}/apply_to_index/
Edit
Edit is for changing the description.
Models retrain
Models retrain retrains all of the Tagger Group models with all the chosen parameters. It’s useful in case your dataset changes or you have added some stop words.
API endpoint /projects/{project_pk}/tagger_groups/{id}/models_retrain/
Delete
Delete is for deleting the model.
|
VOPROSY MEDITSINSKOI KHIMII (ISSN 0042-8809)
Distribution of nitrazepam and its metabolites in the subcellular fractions of several white rat organs
Bogatskii A.V., Golovenko N.Ia., Karaseva T.L.
PubMed Id: 857409
Year: 1977 Volume: 23 Issue: 1 Pages: 92-96
After intraperitoneal administration into rats at a dose of 100 mg per kg of body weight nitrazepame (mogadone, eunoktine) was enzymatically reduced with the subsequent acetylation. Derivatives of nitrazepame were found in cellular fragments and nuclei, in mitochondrial, microsomal and soluble fractions of liver, lungs, heart and brain tissues. Reduction of the substrate was shown to occur in soluble and microsomal fractions of liver tissue and acetylation--in mitochondria of lungs and liver tissue. Nitrazepame metabolites were quite uniformly distributed over cell organelles of heart and brain tissues; this suggests that they originate in the organs from other tissues, where the processes of reduction and acetylation take place. Nitrazepame and its derivatives penetrated into brain very effectively; this phenomenon is considered as an essential one for their pharmocological activity.
Download PDF:
Citation:
Bogatskii, A. V., Golovenko, N. Ia., Karaseva, T. L. (1977). Distribution of nitrazepam and its metabolites in the subcellular fractions of several white rat organs. Voprosy meditsinskoi khimii, 23(1), 92-96.
References
1984 (vol 30)
1983 (vol 29)
1982 (vol 28)
1981 (vol 27)
1980 (vol 26)
1979 (vol 25)
1978 (vol 24)
1977 (vol 23)
1976 (vol 22)
1975 (vol 21)
1974 (vol 20)
1973 (vol 19)
1972 (vol 18)
1971 (vol 17)
1970 (vol 16)
1969 (vol 15)
1968 (vol 14)
1967 (vol 13)
1966 (vol 12)
1965 (vol 11)
|
ADC Home > Reference Library > Technical Notes > Legacy Documents > Graphics & Imaging >
Legacy Documentclose button
Important: This document is part of the Legacy section of the ADC Reference Library. This information should not be used for new development.
Current information on this Reference Library topic can be found here:
Palette Manager Q&As
CONTENTS
This Technical Note contains a collection of archived Q&As relating to a specific topic - questions sent the Developer Support Center (DSC) along with answers from the DSC engineers. Current Q&As can be found on the Macintosh Technical Q&As web site.
[Oct 01 1990]
GetNewPalette and default palette documentation update
Date Written: 3/10/93
Last reviewed: 6/24/93
Our application has a 'pltt' resource containing colors, which is replaced by the user's palette from a Preferences file if it exists. Sometimes our Color dialog box displays black-and-white or incorrect colors. Does the Palette Manager documentation describe default palettes correctly? Should I call GetNewPalette(0) on my application resource fork instead of calling GetPalette(-1)?
The actual implementation of the Palette Manager is somewhat different than documented in Inside Macintosh Volume VI.
The Palette Manager has two levels of default palettes. First, there's a system palette that's loaded at system startup time. This system palette ('pltt', ID#0) is loaded from the system file if it exists and stored in the system heap along with other Palette Manager globals. Once the system is booted, this system palette doesn't change. Even if you replace the palette in the system file, the new palette isn't reloaded. If there's no system palette resource in the system file, the Palette Manager hard codes a 2 entry (black and white) palette as the system palette. The default system file for both Systems 6.0.8 and 7.1 doesn't have a ('pltt', ID#0) resource. Therefore, it seems that the default system palette is typically an entry palette with black and white.
The other level of default palette is the application palette. This palette is stored in a low-memory global called AppPalette. You probably won't find it in any documentation, but the address is $DCC. (This low-memory global is switched during context switches so you don't have to worry about losing the low-memory global when switching applications.) The Palette Manager loads this default application palette when InitPalette is called. Normally, you don't call InitPalette directly in your code. Instead, InitWindows calls InitPalette for you. Inside InitPalette, a call to Get1Resource is made with ('pltt', ID#0). Get1Resource differs from GetResource because Get1Resource checks only the first resource file. Since your application is assumed to be at the top of the resource chain, this call will get a palette of ID #0 if it's available in that file *only*. This actually causes a problem when running an application from a development environment such as Think C.
Unlike the default system palette, the default application palette can be modified by a call to SetPalette(WindowPtr(-1), newDefaultAppPalette, TRUE). You can also get the default palette with a call to GetPalette(WindowPtr(-1)). When there's no application default palette, GetPalette(WindowPtr(-1)) uses the default system palette instead. As mentioned earlier, this is typically a 2 entry palette with black and white.
Lastly, the documentation for the call GetNewPalette on page 20-19 of Inside Macintosh Volume VI is completely misleading. GetNewPalette simply loads in the specified 'pltt' resource using GetResource and then detaches it with DetachResource to make it a handle. It doesn't attach it to the current window. And, it doesn't load the default application handle if the specified resource can't be found.
Back to top
SetPalette cUpdates, NSetPalette, and window update events
Date Written: 9/26/91
Last reviewed: 6/14/93
When I pass FALSE in the cUpdates parameter to SetPalette, I still get update events to that window when I modify its palette. What's going on?
SetPalette's cUpdates parameter controls whether color-table changes cause that window to get update events only if that window is not the frontmost window. If that window is the frontmost window, any changes to its palette cause it to get an update event regardless of what the cUpdates parameter is. When you call SetEntryColor and then ActivatePalette for your frontmost window, the window gets an update event because it's the frontmost window even though you passed FALSE in the cUpdates parameter. Another important point is that windows that don't have palettes always get update events when another window's palette is activated.
Fortunately, system software version 6.0.2 introduced the NSetPalette routine, which is documented in the Macintosh Technical Note "Palette Manager Changes in System 6.0.2" and on page 20-20 in the Palette Manager chapter of Inside Macintosh Volume VI. This variation of SetPalette gives you the following options in controlling whether your window gets an update event:
• If you pass pmAllUpdates in the nCUpdates parameter, your window gets an update event when either it or another window's palette is activated.
• If you pass pmFgUpdates, your window gets an update event when a palette is activated only if it's the frontmost window (in effect, it gets an update event only if its own palette is activated).
• If you pass pmBkUpdates, your window gets an update event when a palette is activated only if it's not the frontmost window (in effect, it gets an update event only if another window's palette is activated).
• If you pass pmNoUpdates, your window never gets an update event from any window's palette being activated, including that window itself.
Back to top
Restoring Finder desktop colors after using Palette Manager
Date Written: 8/28/91
Last reviewed: 8/1/92
After using the Macintosh Palette Manager, how do I restore the Finder's desktop colors?
The Finder desktop's colors are restored automatically on quitting applications that use the Palette Manager. Colors aren't restored automatically when switching from your application to another, but if that application needs a certain set of colors and uses the Palette Manager to get them, then it'll have them the moment it comes to the front. If you're concerned about applications that don't use the Palette Manager, you can use RestoreDeviceClut(gd:GDHandle), passing the handle to the GDevice of the screen you want to reset, or nil if you want to reset all of your devices. Passing nil to RestoreDeviceClut is your best bet, as it is very straightforward, and resets all of your monitors. You may not wish to do this, however, because RestoreDeviceClut is only available on machines with 32-bit color QuickDraw.
To reset a screen's GDevice for machines without 32-bit color QuickDraw, you will need to keep track of the color table.When your application starts up, get the GDevice's color table and save it--you'll need it later. This value can be found at (**(**GDHandle).gdPMap).pmTable, where gdPMap is a PixMapHandle, and pmTable is a CTabHandle which tells you the absolute colors for this image. These data structures are found in Inside Macintosh Volume V, pages 52 and 119.
Build your application's "world" using the Palette Manager, and avoid low-level methods of changing colors. When your application is about to quit and you want to restore the environment to its original state, get the color table you saved in the beginning. Convert this to a palette using CTab2Palette. Then set your window to this palette with SetPalette. This will cause the environment to update to the original color table that you initially got from the GDevice. If the application that is behind your application is Palette Manager friendly, then it will restore the environment to its palette. You may also want to do this procedure at the suspend event, as shown in the DTS sample MacApp program, FracApp. One of the problems that you won't be able to solve this way involves multiple monitors. You won't know which one to update. Only the monitor that has the window that you've called ActivatePalette on will update.
If your application changes the color environment with the Palette Manager, then RestoreDeviceClut is called automatically when your application quits. This means that you shouldn't have to worry about restoring the palette if you don't want to. There is a catch, however (there always is). When you use the SADE version of MultiFinder (6.1b9), it prevents this from automatically happening. Other versions of MultiFinder don't have this side effect.
Back to top
RestoreDeviceClut and color flash when application quits
Date Written: 8/23/91
Last reviewed: 6/14/93
When my application, which uses a color palette, quits, there is momentary but distracting flash of weird colors in the Finder windows and the desktop temporarily appears in a weird color. Is there any way to get around this?
When you quit, RestoreDeviceClut is called to restore the color table and an update event is called to redraw the screen. It's the delay between the change in the color table and the update event that causes the flash of incorrect colors to be displayed. This, unfortunately, is unavoidable.
Back to top
Macintosh Palette Manager and offscreen graphics
Date Written: 7/22/91
Last reviewed: 8/1/92
The Macintosh Palette Manager doesn't work on offscreen environments the way you'd expect. Unlike color windows, SetPalette will not change the offscreen's color table; rather it just allows you to use PMForeColor and PMBackColor to set the current drawing color in that environment. To change the offscreen's color table you'll need to convert the palette to a color table and then set the resulting color table to the off screen. Calling Palette2CTab will do the converting for you.
To get around having to use palettes to define the current drawing color in the off screen, you can always use Index2Color and then RGBForeColor to get the color to be set for drawing. A remake of GiMeDaPalette code sample, available on the latest Developer CD Series disc, does offscreen drawing in place of having to continually copy a PICT.
Back to top
Downloadables
Acrobat gif
Acrobat version of this Note (48K).
Download
Did this document help you?
Yes: Tell us what works for you.
It’s good, but: Report typos, inaccuracies, and so forth.
It wasn’t helpful: Tell us what would have helped.
|
https://kotlinlang.org logo
Title
m
michaelbannister
05/28/2021, 3:09 PM
Hello! I’ve been playing with the OpenTelemetry module for the Tracing filters and wanted to have an easy way to name the server spans for each different route. Rather than pass a spanNamer – which would have the effect of having my naming logic separated from the routing definition, I extended the routing DSL a little bit to get this:
fun endpoints() = "/orders" bind POST to routes(
"/create" bind ::createOrder named "Create Order",
"/submit" bind ::submitOrder named "Submit Order",
)
object SpanNameFilter {
operator fun invoke(name: String) = Filter { next ->
{ req ->
Span.current().updateName(name)
next(req)
}
}
}
infix fun RoutingHttpHandler.named(name: String) = SpanNameFilter(name).then(this)
Wondered if this might be something you’d be interested in adding to the opentelemetry module in some form or other? Or is there a different way of doing this you’d recommend? Would a more general ability to name RoutingHttpHandlers be useful?
Related note: the OpenTelemetry spec says that HTTP spans shouldn’t use the full URI path as a span name, since often (with IDs in paths) this yields high-cardinality span names. So the default spanNamer is a bit risky in that respect. I wondered if ServerFilters.OpenTelemetryTracing could use the same logic it used to set the
http.route
attribute, for the span name?
r
Razvan
05/28/2021, 4:41 PM
Hi, I don’t use (sadly) OT, but I see in the Server et Client Filter the span name being a function. So I guess you can set your own fonction to set the spanNamer from the request… the full URI is not always the best as you say it can have ids. but it’s a simple default, up to you to come up with something custom to your endpoint:
fun ServerFilters.OpenTelemetryTracing(
openTelemetry: OpenTelemetry = GlobalOpenTelemetry.get(),
spanNamer: (Request) -> String = { it.uri.toString() },
error: (Request, Throwable) -> String = { _, t -> t.localizedMessage },
): Filter
Well after re-reading your post I guess that does not help as you wanted to keep the naming in the route… instead of another mapping function. Forget it!
|
Archive
Archive for the ‘Unit Testing’ Category
Make it run, make it right: The three implementation strategies of TDD
I’ve been doing TDD for a while now, as well as running TDD-based code dojos. I really like it as a method of programming, and use it for the majority of the production code I write.
However, there’s one important area I’ve never got quite straight in my head, around the point at which you go from ‘making it pass quickly’ to ‘implementing it properly’. I’ve always followed the rule (picked up at some past dojo) to make the test pass in the simplest way possible, then refactor if necessary before continuing with the next test. Making it pass simply often involves returning a hard-coded value, but I’ve never fully got a handle on when that value should get replaced with the ‘real’ implementation, and related to that, when certain things should be refactored.
Following some recommendations, I finally read Kent Beck’s Test-Driven Development By Example, an influential book on TDD published back in 2002. Yay! Finally, the last piece of the puzzle was revealed. Well OK, probably not the last, but an important one…
There are several useful guidelines in the book – for example he specifies the TDD cycle as ‘Write a test, Make it run, Make it right’ (similar to the more commonly used ‘red, green, refactor’ – not sure which came first). The one I’m focussing on today is his strategy for the implementation of functionality, i.e. the ‘make it run’ and ‘make it right’ phases.
To take the descriptions from the book, the three options you have are:
Fake It – Return a constant and gradually replace constants with variables until you have real code
Obvious Implementation – Type in the real implementation
Triangulation – Only generalize code when we have two examples or more
This is already getting interesting – we now have three well-defined methods of proceeding. Looking back, I think part of my problem has been trying to stick to one rule in the many and varied situations that arise when coding a solution with TDD.
Lets have a look at these in a bit more detail, with some example code. The examples are based on the Checkout kata, which involves implementing a supermarket checkout system which calculates the price of items bought. I haven’t included every step, but hopefully you can fill in the blanks.
Fake It
One of the guiding principles behind these strategies is that you want to get a passing test as quickly as possible. If that means writing some dodgy code, then so be it – it’s not a concern, because one of the other principles is that the code should be constantly and aggressively refactored. So get the test passing, then you have a safety net of passing tests which enable you to refactor to your heart’s content.
Often, the quickest way to get a test passing is to return a hard-coded value:
[Test]
public void scanning_single_item_gives_single_item_price() {
var till = new Till();
till.Scan("Apple");
Assert.That(till.Total, Is.EqualTo(10));
}
public class Till {
public void Scan(string product) {}
public int Total {
get {
return 10;
}
}
}
Once that’s done, we can immediately get to refactoring. Kent’s main goal of refactoring is to remove duplication anywhere you can spot it, which he believes generally leads to good design. So where’s the duplication here? All we’re doing is returning a constant. But look closely and you’ll see it’s the same hard-coded constant defined in the tests and the code. Duplication.
So how do we get rid of it? One way would be to have the checkout take the value from the test:
[Test]
public void scanning_single_item_gives_single_item_price() {
var applePrice = 10;
var till = new Till(applePrice);
till.Scan("Apple");
Assert.That(till.Total, Is.EqualTo(applePrice));
}
public class Till {
private int _applePrice;
public Till(int applePrice) {
_applePrice = applePrice;
}
public void Scan(string product) { }
public int Total {
get {
return _applePrice;
}
}
}
Well, not how I’d usually implement it, but that makes sense I guess – the checkout would be getting it’s prices from somewhere external, and passing them in like this helps keep the checkout code nice and self-contained, and adhering to the open/closed principle. Maybe removing duplication really can help with a good design..
Of course, the checkout would need all prices passing in, not just the price for one product. But as usual with TDD, we’re taking small steps, and only implementing what we need to based on the current set of tests.
Obvious Implementation
One of the ‘rules’ of TDD which I make people follow in dojos has been to always start with the simplest possible implementation. This is a concept which mightily annoys some experienced devs when they first try TDD – ‘Why return a hard-coded value’, they ask, ‘when I know what the implementation’s going to be?’.
Well, they will be most pleased with the second option, which states that if the implementation is obvious and quick – just type it in!
So if for our next test we end up with
const int applePrice = 10;
const int bananaPrice = 15;
Till till;
[SetUp]
public void setup() {
till = new Till(new Dictionary<string, int> {
{"Apple", applePrice},
{"Banana", bananaPrice}
});
}
[Test]
public void scanning_different_item_gives_correct_price() {
till.Scan("Banana");
Assert.That(till.Total, Is.EqualTo(bananaPrice));
}
If we’re feeling plucky, we might just go for it:
public class Till {
private Dictionary<string, int> _prices;
private string _scannedItem;
public Till(Dictionary<string, int> prices) {
_prices = prices;
}
public void Scan(string product) {
_scannedItem = product;
}
public int Total {
get {
return _prices[_scannedItem];
}
}
}
However, if you have any doubts, get a failing test, or it’s just taking too long – you’ve taken the wrong option. Back out your changes, and go back to Fake It.
Triangulation
The last option is the least favoured by Mr Beck, reserved for those times when he’s ‘completely unsure of how to refactor’, and ‘the design thoughts just aren’t coming’. For me, going by the rules I’ve learned in past dojos, it’s one I quite often end up using. Essentially it involves using using Fake It to get a test passing, but instead of going straight to the real implementation, entering another test to force you into writing a generalised solution.
Now, we’re starting to scan multiple items:
[Test]
public void scanning_multiple_items_gives_sum_of_prices() {
till.Scan("Apple");
till.Scan("Banana");
Assert.That(till.Total, Is.EqualTo(applePrice + bananaPrice));
}
We have to update the code a little, but can fake the important bit:
public class Till {
private Dictionary<string, int> _prices;
private List<string> _scannedItems = new List<string>();
public Till(Dictionary<string, int> prices) {
_prices = prices;
}
public void Scan(string product) {
_scannedItems.Add(product);
}
public int Total {
get {
if (_scannedItems.Count == 2) {
return 25;
}
return _prices[_scannedItems[0]];
}
}
}
Obviously, checking the number of scanned items isn’t going to work for long, but instead of refactoring immediately we can write another test which will force us to change it.
[Test]
public void scanning_different_multiple_items_gives_sum_of_prices() {
till.Scan("Banana");
till.Scan("Coconut");
Assert.That(till.Total, Is.EqualTo(bananaPrice + coconutPrice));
}
And now we enter the general solution:
public int Total {
get {
return _scannedItems.Sum(item => _prices[item]);
}
}
Since using these strategies, I have also found that Triangulation isn’t needed much, as if you stick strongly to the ‘refactor away duplication’ rule, a single Fake It with immediate refactoring usually does the job.
Conclusion
It’s fair to say that I haven’t mastered TDD yet, even after so long, but I’m pretty happy with it now, thanks to the guidance like this. I still find situations where I’m unsure how to proceed, but they are getting rarer. Trying to follow these three strategies has certainly helped, and the ‘refactor to remove duplication’ concept by itself has been very useful. I hope you get some benefit from them too.
Categories: C#, TDD, Unit Testing
Testing DateTime.Now (and other things) with an Ambient Context
September 30, 2013 Leave a comment
One issue you’re likely to face while writing automated tests is that it can be tricky to check anything related to DateTimes, as they are typically accessed statically using:
var startTime = DateTime.Now;
The approach I’ve typically used is to create some kind of IDateProvider interface, and supply that as a dependency as needed using Dependency Injection. However, with things used throughout a system like DateTime can be, this becomes quite a chore and make the code more complex with an ever-increasing list of dependencies.
One of the great tips given by Ian Russell at an Agile Yorkshire meetup recently was to use the Ambient Context pattern in this, and other similar situations.
Note: I didn’t write the code below, I found it in various places online, particularly this Stack Overflow question by Mark Seemann, author of Dependency Injection in .Net. I was having trouble finding the details online, which is why I’ve posted them here.
So, to take full control of DateTime.Now, you need an abstract TimeProvider:
public abstract class TimeProvider {
private static TimeProvider current =
DefaultTimeProvider.Instance;
public static TimeProvider Current {
get { return TimeProvider.current; }
set {
if (value == null) {
throw new ArgumentNullException("value");
}
TimeProvider.current = value;
}
}
public abstract DateTime UtcNow { get; }
public static void ResetToDefault() {
TimeProvider.current = DefaultTimeProvider.Instance;
}
}
A concrete implementation used in your live system:
public class DefaultTimeProvider : TimeProvider {
private readonly static DefaultTimeProvider instance =
new DefaultTimeProvider();
private DefaultTimeProvider() { }
public override DateTime UtcNow {
get { return DateTime.UtcNow; }
}
public static DefaultTimeProvider Instance {
get { return DefaultTimeProvider.instance; }
}
}
And a mock for testing, for example here set up with Rhino.Mocks:
var fakeTimeProvider = MockRepository.GenerateStub();
fakeTimeProvider.Expect(x => x.UtcNow).Repeat.Once()
.Return(new DateTime(1999, 12, 31, 11, 59, 59, 999));
fakeTimeProvider.Expect(x => x.UtcNow).Repeat.Once()
.Return(new DateTime(2000, 1, 1, 0, 0, 0, 0));
For this to work, instead of calling dateTime.Now (or DateTime.UtcNow as we’re using here) from your code, you need to call:
var startTime = TimeProvider.Current.UtcNow;
One last thing – don’t forget to reset the provider after you mock it out, otherwise your mock will remain as the time provider:
[TestCleanup]
public void TearDown() {
TimeProvider.ResetToDefault();
}
As suggested in the title, this can be used for things other than DateTime, but that’s the only place I’ve tried it so far.
Happy testing!
Categories: Patterns, TDD, Unit Testing
Nice up those Assertions with Shouldly!
October 19, 2010 1 comment
One thing I noticed while having a play with Ruby was that the syntax for their testing tools is quite a lot more natural-language like and easier to read – here’s an example from an RSpec tutorial:
describe User do
it "should be in any roles assigned to it" do
user = User.new
user.assign_role("assigned role")
user.should be_in_role("assigned role")
end
it "should NOT be in any roles not assigned to it" do
user.should_not be_in_role("unassigned role")
end
end
Aside from the test name being a string, you can see the actual assertions in the format ‘variable.should be_some_value’, which is kind of more readable than it might be in C#:
Assert.Contains(user, unassignedRoles);
or
Assert.That(unassignedRoles.Contains(user));
Admittedly, the second example is nicer to read – the trouble with that is that you’re checking a true/false result, so the feedback you get from NUnit isn’t great:
Test ‘Access_Tests.TestAddUser’ failed: Expected: True But was: False
Fortunately, there are a few tools coming out for .net now which address this situation in a bit more of a ruby-like way. The one I’ve been using recently is Shouldly, an open source project on GitHub.
Using Shouldly (which is basically just a wrapper around NUnit and Rhino Mocks), you can go wild with should-style assertions:
age.ShouldBe(3);
family.ShouldContain(“mum”);
greetingMessage.ShouldStartWith(“Sup y’all”);
And so on. Not bad, not bad, not sure if it’s worth learning another API for though. However, the real beauty of Shouldly is what you get when an assertion fails. Instead of an NUnit-style
Expected: 3
But was: 2
- which gives you a clue, but isn’t terribly helpful – you get:
age
should be 3
but was 2
See that small but important difference? The variable name is there in the failure message, which makes working out what went wrong a fair bit easier – particularly when a test fails that you haven’t seen for a while.
Even more useful is what you get with checking calls in Rhino Mocks. Instead of calling
fileMover.AssertWasCalled(fm => fm.MoveFile(“test.txt”, “processed\\test.txt”));
and getting a rather ugly and unhelpful
Rhino.Mocks.Exceptions.ExpectationViolationException : IFileMover.MoveFile(“test.txt”, “processed\test.txt”); Expected #1, Actual #0.
With Shouldly, you call
fileMover.ShouldHaveBeenCalled(fm => fm.MoveFile(“test.txt”, “processed\\test.txt”));
and end up with
*Expecting*
MoveFile(“test.txt”, “processed\test.txt”)
*Recorded*
0: MoveFile(“test1.txt”, “unprocessed\test1.txt”)
1: MoveFile(“test2.txt”, “unprocessed\test2.txt”)
As you can see, it’s not only much more obvious what’s happening, but you actually get a list of all of the calls that were made on the mock object, including parameters! That’s about half my unit test debugging gone right there. Sweet!
Shouldly isn’t a 1.0 yet, and still has some missing functionality, but I’d already find it hard to work without it. And it’s open source, so get yourself on GitHub, fork a branch, and see if you can make my life even easier!
Extract and Conquer!
October 19, 2009 Leave a comment
..Or ‘Extract and Override’ as it’s otherwise known
I started working on a Dynamics CRM project recently, and a technique I read about in Roy Osherove’s book has started to come in really handy, which he calls ‘Extract and Override’.
Not that it’s specific to CRM, or any particular type of development – indeed, Roy states that he always tries to use this technique first and only defers to other methods of testing if it isn’t possible. I had certain reservations when I first read about it, but having given it a try over the last few weeks I am now a convert.
The purpose of this technique is to insert a ‘seam’ into your code – a place where you can replace dependencies on other classes & services with fake versions, so you can test one class at a time. Previously, I’d always done this using constructor injection, whereby you pass the dependencies into the class constructor:
Simple Robot Class
Simple Robot Class
This way, when we want to test the robot mood logic in KillHumans(), we can create fake versions of IWeaponSystem, ICommunication and IMoodManager, and just test the Robot logic. In the actual system, the real versions of these things would be supplied by a Service Locator/IOC container or similar.
This is all very well, but doesn’t work with CRM because you don’t control creation of classes. Basically you get passed a service and have to use that for all of your communication with CRM. To stay with the robot example, it would look something like this:
Robot Class using CRM-Style Service
Robot Class using CRM-Style Service
Because all communication is going through RobotService.Execute(), it’s very difficult to fake this, especially when it’s called multiple times and you need different return values.
To get over this, we can use Extract and Override. This works by putting the calls to the external services in their own methods, and then overriding them while we’re testing. This way, we don’t have to create fake services at all! Just a single fake version of the class we’re testing. The code in Robot would now look something like this:
Testable Robot Class
Testable Robot Class
Notice that the extra methods are ‘virtual’ so we can override them. they are also ‘protected’ so they’re accessible from classes which inherit from them. So now instead of creating fake services, we’d create a testable version of the robot class, like this:
Overriden Robot Class, for Testing
Overriden Robot Class, for Testing
We now have full control over what gets returned from those methods, and we can record when got sent into them. As such, we can happily test the mood logic in KillHumans() without worrying about those dependencies.
Now, this isn’t limited to the CRM situation described – you can use this technique any time you have a dependency on another service, as an alternative to Dependency Injection. You can read a bit more about it in one of Roy’s blog posts, which probably explains it a bit better! Although sadly without the use of robots.
Categories: Unit Testing Tags: ,
Code Coverage with PartCover
September 5, 2009 5 comments
I’ve been getting more into Test Driven Development (TDD) recently, so I’ve been building up my unit testing toolset as I go along. I’ve got the basics covered – the industry-standard NUnit as my testing framework & test runner, and Castle Windsor if I need a bit of IOC, are the main things.
But I’m at the stage now where I know the basics so I’m trying to improve my code and my tests, as because anyone in TDD will tell you, if your tests are no good, they may as well not be there. So the next obvious step was a code coverage tool. At the basic end, this is a tool that you use to find out how much of your application code actually gets tested by your unit tests, which can be a useful indicator of where you need more tests – although it doesn’t say whether your tests are any good or not, even if you have 100% coverage.
Open Source Tools
Being Scottish by blood, I’m a bit of a skinflint, so like most of my other tools I wanted something open source, or at least free. This actually proved more difficult than I first imagined – most of the code coverage tools seem to be commercial, often part of a larger package. Some also required that you alter your code to use them, by adding attributes or method calls – definitely not something I wanted to do. The main suitable one I came across was PartCover, an open source project hosted on Source Forge. Thankfully, it was easy to install and set up, and did everything I wanted.
Using PartCover
There are two ways of running PartCover – a console application, which you would use with your build process to generate coverage information as XML, and a graphical browser, which lets you run the tool as you like and browse the results. I should point out I haven’t tried the console part, or using the generated XML reports, which you would probably want to do in a larger-scale development environment along with Continuous Integration etc.
Either way, the first thing you have to do is configure the tool – you need to define what executable it will run, any arguments, and any rules you want to define about what assemblies & classes to check (or not):
PartCover Settings
PartCover Settings
You can see here that I’m running NUnit console – you don’t actually have to use this with unit testing. If you want, you can just get it to fire up your application, use your app manually, and PartCover will tell you what code was run – which I imagine could come in quite handy in itself in certain situations. But as I want to analyse my unit test coverage, I get it to run NUnit, and pass in my previously created NUnit project as an argument.
Rules
I also have some rules set up. You can decide to include and exclude any combination of assemblies and classes using a certain format with wildcards – here I’ve included anything in the ‘ContactsClient’ and ‘ContactsDomain’ assemblies, apart from any classes ending in ‘Tests’ and the ‘ContactsClient.Properties’ class. It can be useful to exclude things like the UI if you’re not testing that, or maybe some generated code that you can’t test – although you shouldn’t use this to sweep things under the carpet that you just don’t want to face!
Analysis
With that done, just click ‘Start’ and you’re away – NUnit console should spring into life, run all of your tests, and you’ll be presented with the results:
PartCover Browser
PartCover Browser
As you can see, you get a tree-view style display containing the results of all your assemblies, classes and methods, colour coded as a warning. But that’s not all! Select ‘View Coverage details’ as I’ve done here, and you can actually see the lines of code which have been run, and those which have been missed. In my example above, I’ve tested the normal path through the switch statement, but neglected the error conditions – it’s exactly this type of thing that code coverage tools help you to identify, thus enabling you to improve your tests and your code.
At this point, I feel I have to point out a potential issue:
Warning! Trying to get 100% test coverage can be addictive!
If you’re anything like me, you may well find yourself spending many an hour trying to chase that elusive last few percent. This may or may not be a problem depending on your point of view – some people are in favour of aiming for 100% coverage, but some think it’s a waste of time. I like the point of view from Roy Osherove’s Book, that you should test anything with logic in it – which doesn’t include simple getters/setters, etc.
But 100′s such a nice, round number, and I only need a couple more tests to get there..
Follow
Get every new post delivered to your Inbox.
Join 247 other followers
|
Written by Thomas Edvard Krogh
Last Updated
Dating
GeochronologyArticle Free Pass
Written by Thomas Edvard Krogh
Last Updated
Principles of isotopic dating
All absolute isotopic ages are based on radioactive decay, a process whereby a specific atom or isotope is converted into another specific atom or isotope at a constant and known rate. Most elements exist in different atomic forms that are identical in their chemical properties but differ in the number of neutral particles—i.e., neutrons—in the nucleus. For a single element, these atoms are called isotopes. Because isotopes differ in mass, their relative abundance can be determined if the masses are separated in a mass spectrometer (see below Use of mass spectrometers).
Radioactive decay can be observed in the laboratory by either of two means: (1) a radiation counter (e.g., a Geiger counter), which detects the number of high-energy particles emitted by the disintegration of radioactive atoms in a sample of geologic material, or (2) a mass spectrometer, which permits the identification of daughter atoms formed by the decay process in a sample containing radioactive parent atoms. The particles given off during the decay process are part of a profound fundamental change in the nucleus. To compensate for the loss of mass (and energy), the radioactive atom undergoes internal transformation and in most cases simply becomes an atom of a different chemical element. In terms of the numbers of atoms present, it is as if apples changed spontaneously into oranges at a fixed and known rate. In this analogy, the apples would represent radioactive, or parent, atoms, while the oranges would represent the atoms formed, the so-called daughters. Pursuing this analogy further, one would expect that a new basket of apples would have no oranges but that an older one would have many. In fact, one would expect that the ratio of oranges to apples would change in a very specific way over the time elapsed, since the process continues until all the apples are converted. In geochronology the situation is identical. A particular rock or mineral that contains a radioactive isotope (or radio-isotope) is analyzed to determine the number of parent and daughter isotopes present, whereby the time since that mineral or rock formed is calculated. Of course, one must select geologic materials that contain elements with long half-lives—i.e., those for which some parent atoms would remain.
Given below is the simple mathematical relationship that allows the time elapsed to be calculated from the measured parent/daughter ratio. The age calculated is only as good as the existing knowledge of the decay rate and is valid only if this rate is constant over the time that elapsed.
Fortunately for geochronology the study of radioactivity has been the subject of extensive theoretical and laboratory investigation by physicists for almost a century. The results show that there is no known process that can alter the rate of radioactive decay. By way of explanation it can be noted that since the cause of the process lies deep within the atomic nucleus, external forces such as extreme heat and pressure have no effect. The same is true regarding gravitational, magnetic, and electric fields, as well as the chemical state in which the atom resides. In short, the process of radioactive decay is immutable under all known conditions. Although it is impossible to predict when a particular atom will change, given a sufficient number of atoms, the rate of their decay is found to be constant. The situation is analogous to the death rate among human populations insured by an insurance company. Even though it is impossible to predict when a given policyholder will die, the company can count on paying off a certain number of beneficiaries every month. The recognition that the rate of decay of any radioactive parent atom is proportional to the number of atoms (N) of the parent remaining at any time gives rise to the following expression:
Converting this proportion to an equation incorporates the additional observation that different radioisotopes have different disintegration rates even when the same number of atoms are observed undergoing decay. In other words, each radioisotope has its own decay constant, abbreviated λ, which provides a measure of its intrinsic rapidity of decay. Proportion 1 becomes:
Stated in words, this equation says that the rate at which a certain radioisotope disintegrates depends not only on how many atoms of that isotope are present but also on an intrinsic property of that isotope represented by λ, the so-called decay constant. Values of λ vary widely—from 1020 reciprocal seconds (i.e., the unit of 1 second) for a rapidly disintegrating isotope such as helium-5 to less than 10−25 reciprocal seconds for slowly decaying cerium-142.
In the calculus, the rate of decay R in equation 2 is written as the derivative dN/dt, in which dN represents the small number of atoms that decay in an infinitesimally short time interval dt. Replacing R by its equivalent dN/dt results in the differential equation
Solution of this equation by techniques of the calculus yields one form of the fundamental equation for radiometric age determination,
in which N0 is the number of radioactive atoms present in a sample at time zero, N is the number of radioactive atoms present in the sample today, e is the base of natural logarithms (equal to about 2.72), λ is the decay constant of the radioisotope being considered, and t is the time elapsed since time zero.
Two alterations are generally made to equation 4 in order to obtain the form most useful for radiometric dating. In the first place, since the unknown term in radiometric dating is obviously t, it is desirable to rearrange equation 4 so that it is explicitly solved for t. Second, the more common way to express the intrinsic decay rate of a radioisotope is through its half-life (abbreviated t1/2) rather than through the decay constant λ. Half-life is defined as the time period that must elapse in order to halve the initial number of radioactive atoms. The half-life and the decay constant are inversely proportional because rapidly decaying radioisotopes have a high decay constant but a short half-life. With t made explicit and half-life introduced, equation 4 is converted to the following form, in which the symbols have the same meaning:
Alternatively, because the number of daughter atoms is directly observed rather than N, which is the initial number of parent atoms present, another formulation may be more convenient. Since the initial number of parent atoms present at time zero N0 must be the sum of the parent atoms remaining N and the daughter atoms present D, one can write:
From equation 4 above, it follows that N0 = N(eλt). Substituting this in equation 6 gives
If one chooses to use P to designate the parent atom, the expression assumes its familiar form:
and
This pair of equations states rigorously what might be assumed from intuition, that minerals formed at successively longer times in the past would have progressively higher daughter-to-parent ratios. This follows because, as each parent atom loses its identity with time, it reappears as a daughter atom. The increase in D/P with time is evident in equation (7) because larger values of time will increase the value of eλt, where λ is constant. Equation (8) documents the simplicity of direct isotopic dating. The time of decay is proportional to the natural logarithm (represented by ln) of the ratio of D to P. In short, one need only measure the ratio of the number of radioactive parent and daughter atoms present, and the time elapsed since the mineral or rock formed can be calculated, provided of course that the decay rate is known. Likewise, the conditions that must be met to make the calculated age precise and meaningful are in themselves simple:
1. The rock or mineral must have remained closed to the addition or escape of parent and daughter atoms since the time that the rock or mineral (system) formed.
2. It must be possible to correct for other atoms identical to daughter atoms already present when the rock or mineral formed.
3. The decay constant must be known.
4. The measurement of the daughter-to-parent ratio must be accurate because uncertainty in this ratio contributes directly to uncertainty in the age.
Different schemes have been developed to deal with the critical assumptions stated above. In uranium–lead dating, minerals virtually free of initial lead can be isolated and corrections made for the trivial amounts present. In whole rock isochron methods that make use of the rubidium–strontium or samarium–neodymium decay schemes (see below), a series of rocks or minerals are chosen that can be assumed to have the same age and identical abundances of their initial isotopic ratios. The results are then tested for the internal consistency that can validate the assumptions. In all cases, it is the obligation of the investigator making the determinations to include enough tests to indicate that the absolute age quoted is valid within the limits stated. In other words, it is the obligation of geochronologists to try to prove themselves wrong by including a series of cross-checks in their measurements before they publish a result. Such checks include dating a series of ancient units with closely spaced but known relative ages and replicate analysis of different parts of the same rock body with samples collected at widely spaced localities.
The importance of internal checks as well as interlaboratory comparisons becomes all the more apparent when one realizes that geochronology laboratories are limited in number. Because of the expensive equipment necessary and the combination of geologic, chemical, and laboratory skills required, geochronology is usually carried out by teams of experts. Most geologists must rely on geochronologists for their results. In turn, the geochronologist relies on the geologist for relative ages.
What made you want to look up dating?
Please select the sections you want to print
Select All
MLA style:
"dating". Encyclopædia Britannica. Encyclopædia Britannica Online.
Encyclopædia Britannica Inc., 2014. Web. 28 Dec. 2014
<http://www.britannica.com/EBchecked/topic/152243/dating/69756/Principles-of-isotopic-dating>.
APA style:
dating. (2014). In Encyclopædia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/152243/dating/69756/Principles-of-isotopic-dating
Harvard style:
dating. 2014. Encyclopædia Britannica Online. Retrieved 28 December, 2014, from http://www.britannica.com/EBchecked/topic/152243/dating/69756/Principles-of-isotopic-dating
Chicago Manual of Style:
Encyclopædia Britannica Online, s. v. "dating", accessed December 28, 2014, http://www.britannica.com/EBchecked/topic/152243/dating/69756/Principles-of-isotopic-dating.
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Click anywhere inside the article to add text or insert superscripts, subscripts, and special characters.
You can also highlight a section and use the tools in this bar to modify existing content:
We welcome suggested improvements to any of our articles.
You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind:
1. Encyclopaedia Britannica articles are written in a neutral, objective tone for a general audience.
2. You may find it helpful to search within the site to see how similar or related subjects are covered.
3. Any text you add should be original, not copied from other sources.
4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are best.)
Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions.
(Please limit to 900 characters)
Or click Continue to submit anonymously:
Continue
|
Basic Unix Survival Guide
Basic Unix Survival Guide
Note: Unix is case sensitive. Passwords are case sensitive. All commands are lowercase; command options may be either upper or lower case. The authoritive reference for commands is the manpages on the system you are using.
.denotes current directory; e.g. cp /usr/test.dat will copy file to current directory
*will match any filename; e.g. rm * will remove all files
?will match one character in a filename; e.g. rm data.? will remove data.1
\interpret the next character as a literal; e.g. mv andor and\/or
cat file1display file1
cat file1 file2 > newfilecombines file1 and file2 into newfile
cat file1 >> file2append file1 to file2
cdreturn to the home directory
cd ..move up one directory level
cd ../..move up two directory levels
cd directorymove to directory one level down
chmod u+w filenameadd write permission for the user to file1
chmod g+x filenameadd execute permission for the group to file1
chmod o-r filenameremove read permission for the world from file1
chmod 700 filenameallow rwx permissions for owner only on file1
cp file1 file2copy file1 to file2
cp file1 directorycopy file1 into specified subdirectory
cp file1 file2 directorycopy two files into specified directory
cp -r dir1 dir2copy all files and subdirectories in dir1 into dir2
cp ../dir/file .copies file1 from a sister directory into current directory
echo $PATHdisplay value of environmental variable such as $TERM, $SHELL, $HOME
grep string *.cWill find all instances of string in all files ending with .c in current directory
kill pidgracefully kills the specified process. obtain pid from ps
kill -9 pidungracefully kills the process
iddisplay user's system identity
logout or exit or CTRL-Dterminates a session
ln -s /pathname/file1creates a symbolic soft link to file1 named file1 in the current directory
ln -s /pathname/dir1creates a symbolic soft link to dir1 named dir1 in the current directory
logout or exit or CTRL-Dterminates a session
lpr -P printer filenameprints file to the specified printer.e.g. lpr -Pcstext lab5.txt
ls | more lists a directory in columns one page at a time
ls -lgives a fuller listing including file permissions, size, date created
ls -alsimilar to the above but includes "dot" files
man commanddisplay reference manual for command. hit 'q' to quit or SPACE to continue
man -k keywordshows all of the man pages that contain keyword
man command | col -b | lpr -PprinterPrints out the specified man page
mkdir subdirectory create a subdirectory in the current directory
more filename list file one screen at a time. press SPACE to continue; press q to cancel
mv oldfile newfilerename file
mv old_dir new_dirrename directory
mv dir1 dir2move dir1 into dir2
mv file1 file2 dirmove specified files into directory
passwdchange password
pslist all processes for the current user and their status
ps aulist all processes for all users and some extra status information
pwdprint current working directory
rm filenamedelete the specified file
rm -i filenamedeletes the file after confirmation
rm -rf directory remove the directory and all files and directories contained within
rmdir directory removes directory if empty
General Tips
If a program is locked up execute ps -ef | grep username (this lists all your processes). From here, find the PID of the offending process (the second column in the output), and do a kill (-9 if needed) pid. If the terminal you are working on is locked up, open a terminal session from do the same from there.
Pegasus security prevents users from executing ~ (to specify your root directory) and chsh (to change your shell).
Back to computer science home page
|
TouchXML is a lightweight replacement for Cocoa's NSXML* cluster of classes. It is based on the commonly available open source libxml2 library.
learn more… | top users | synonyms
0
votes
2answers
34 views
TouchXML CXMLNode.m unrecognized selector when adding to NSMutableArray
I'm new to Objective C and XML, so this is going to look pretty rough. My code is as follows: #import "dbCommunicator.h" #import "BookInfo.h" #import "TouchXML.h" @implementation dbCommunicator ...
0
votes
1answer
60 views
Objective C - Parse SOAP xml string by using touchXML
How to parse a soap xml by using touch XML this is soap xml string: <?xml version=\"1.0\" encoding=\"utf-8\"?><soap:Envelope xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" ...
1
vote
2answers
237 views
Parsing xml having name space
I am trying to parse a xml given below with touchXml, i searched and found it is using name space so i need to use name space to parse that xml. but can any one please guide me exact name space for ...
0
votes
1answer
524 views
parse xml using touch xml
i am new to xml and want to parse it by using touch xml. <?xml version="1.0" standalone="yes"?> <DataSetMenu xmlns="http://tempuri.org/DataSetMenu.xsd"> <MenuCategories> ...
0
votes
1answer
265 views
touchXML XPath error, probably namespace issue
I am trying to parse xml document using touchXML on iOS. This is how xml looks: <?xml version='1.0' encoding='UTF-8'?> <soapenv:Envelope ...
0
votes
1answer
71 views
nodesForXPath returning 0 objects
I have problems parsing elements from a XML String to an Array with TouchXML. I've succesfully made an CXMLDocument object with: CXMLDocument *doc = [[CXMLDocument alloc] ...
3
votes
2answers
324 views
Issue with XPath with touchXML in ios
I am trying to parse a xhtml file in ios using touchXML. I am trying it for first time. I have following format in XHTML: <?xml version="1.0" encoding="UTF-8"?> <html ...
0
votes
1answer
1k views
Objective C memory management - “pointer being freed was not allocated” errors
I'm trying to learn objective-c (I'm very new to that) and I have issues with memory management... I'm developing an iPad app that uses TouchXML. I've created my class that extends CXMLDocument and ...
0
votes
1answer
270 views
IOS Encoding ISO-8859-9
I need to get contents of an XML file which is hosted on web, and parse it. I decided to use TouchXML for parsing process. However, I cannot get contents of the file since it is encoded with ...
0
votes
1answer
45 views
Using TouchXML how can I count tags that starts with specific texts
Suppose I have an XML file that has tags Reg0, Reg1, Reg2. . . The "Reg" prefix is fixed. How can I count the number of tags that starts with Reg text using TouchXML? I can search for Reg text in my ...
1
vote
0answers
193 views
TouchXML and Facebook SDK iOS
I have been getting this error and I have been lost in trying to solve it: ld: warning: directory not found for option ...
0
votes
1answer
90 views
Assertion failure error
I am making a dynamic library for iPhone (for Cydia) and am trying to use TouchXML to parse XML. When I call this method +(NSArray *)initWithXMLfromData:(NSData *)data withRootElement:(NSString ...
1
vote
1answer
119 views
iOS How to hide double values in UITableView row
I am busy with an application where I show a list of events in a TableView. Per row/cell I have an event showing the title of the event and the date. The problem now is that when there are 2 or more ...
1
vote
2answers
2k views
JSONKit for xcode 4.6 ios 6 with ARC?
Well, I did add the JSONKit classes (JSONKit.h & JSONKit.h) but in the .m file, I have a lot of warnings & compil's error's like: NSError *error; //--> ARC forbids Objetive-C in structs ...
0
votes
1answer
375 views
iOS CXMLElement StringValue
I'm trying to parse an xml here and am getting my CXMLElement properly. One, for example, logs this <CXMLElement 0x1d8cfdc0 [0x1c556660] TrackDetail ...
0
votes
1answer
229 views
reading complex soap response, having IDs and IDREFs nodes with Sudzc [iOS]
I have problem with parsing soap response using Sudzc (ARC branch). I have some WCF service which stores data for our apps. I managed to connect to web service I can get response successfully, however ...
0
votes
1answer
297 views
Memory crash using [CXMLNode nodesForXPath] with namespace mappings
I'm trying to parse some XML in objective-c, using the TouchXML library. The XML has a namespace in the root element, so I'm using the method in the TouchXML library on the CXMLNode object like: - ...
0
votes
1answer
484 views
iOS not updating label text
I'm parsing xml here and am wondering why this is not working. In my request object, I do this - (Request *)performRequest{ NSError *error; CXMLDocument *parser = [[CXMLDocument ...
0
votes
1answer
395 views
Creating Xpath Query Dynamically using Touchxml and xcode
I'm new to touchxml and xpath and i just want to know if is there any way to get an attribute of a node dynamically? I have this xml <?xml version="1.0" encoding="UTF-8"?> <countries> ...
0
votes
2answers
103 views
Getting duplicate children in TouchXML
I have a CXMLDocument and the problem is that when I do this: for (CXMLElement* auxitem in [doc children]){ NSLog(@"NAME: %@", auxitem); } It gives me an empty CXMLNode and the CXMLElement with ...
0
votes
0answers
136 views
Parsing XML with TouchXML, generating docs with children
I'm getting an XML document like this: <node label = "NAME1" description = "DESCRIPTION1" id = "1"> <node label = "SON1" description = "SONDESCRIPTION1" id = "S1"> <node ...
0
votes
0answers
58 views
Problems with TouchXML parser
Can someone explain why I cannot parse this with touchXML? <?xml version="1.0" encoding="utf-8" ?> <ArrayOfPerson xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ...
1
vote
0answers
52 views
how to only change the content with every navigation while keeping the user objects constant
i have used a tutorial online which uses touchXML and parsed a particular website so that it provides me all the elements with their values // Convert the supplied URL string into a usable URL object ...
0
votes
1answer
80 views
Getting null back from XML, but only on wi-fi only devices
I have an app that incorporates weather...data that I receive from Google's weather API. I'm busting my brain trying to figure out a problem that I'm having and I've been unsuccessful so I figured it ...
0
votes
1answer
261 views
Parse youtube api feed v2
I'm trying to parse a YouTube feed provided by the YouTube data API. This feed lists all videos uploaded by a specific user, like this one: https://gdata.youtube.com/feeds/api/users/google/uploads?v=2 ...
2
votes
0answers
264 views
TouchXMl (nodesForXPath) returning NULL object
I have following xml mutableData. <responce xmlns:xsi="http://.." xmlns:xsd="http://..." xmlns="http://..."> <Succeeded id="0"> <uri>userName</uri> ...
1
vote
1answer
89 views
I have XML like follow how do I parse using touchXML, i want to get data like 26400174350 for <p231:proNum>26400174350</p231:proNum>
<p231:getTraceDataReturn> <p231:proNum>26400174350</p231:proNum> <p231:proDate>05/13/2011</p231:proDate> <p231:statusCode>DEL</p231:statusCode> ...
0
votes
1answer
831 views
NSRangeException for empty array except there is an array?
I'm having this problem where I keep getting this error in my console: * Terminating app due to uncaught exception 'NSRangeException', reason: '* -[__NSArrayI objectAtIndex:]: index 0 beyond ...
0
votes
2answers
526 views
SudzC workaround for SOAPRequest to deserialize into NSMutableArray of custom objects
This is my SoapRequest: SoapRequest* _request = [SoapRequest create: _target action: _action service: self soapAction: @"" postData: _envelope deserializeTo: /*[[DMDDmdInfo alloc] autorelease]*/ ...
0
votes
1answer
565 views
iOS: TouchXML xmlReadMemory VS xmlParseMemory
I tried to use 2 different implementations of TouchXML, one provided with SudzC and the other from TouchXML github repo. There is a little difference between them, consisting in the initialization of ...
0
votes
1answer
187 views
Parsing documents including angle brackets using TouchXML on iOS
I'm trying to parse an XML document using TouchXML for iOS. Normally this works great, but the current document I'm trying to parse contains angle brackets within the actual data. For example: ...
1
vote
2answers
1k views
unable to parse xml using touchXML, nodesForXPath return nothing
I am trying to parse xml using the touchXML library but not getting the results, the code is as below NSError *error = nil; CXMLDocument *xmlParser = [[CXMLDocument alloc] ...
0
votes
2answers
261 views
Part `<` and part `<` in one NSData
I'm accessing http://graphical.weather.gov/xml/SOAP_server/ndfdXMLserver.php using code generated by http://sudzc.com The SOAP message is being sent and I can see the returned message and here I've a ...
1
vote
2answers
195 views
NSArray elements from parsed .xml file not accessible on iPhone, using TouchXML
I have an NSMutableArray *myArray, wich is the result of a properly .xml parsed file, using TouchXML. I just want to extract all elements with key name and store then in a separate NSMutableArray, ...
0
votes
0answers
145 views
Missing nodesForXPath error checking?
I'm parsing Google's Weather API and, for example, have the following code to parse the current Celsius temperature for the given location: currentTempC = [[[[[parse ...
0
votes
2answers
168 views
More bottom level soap xml parsing
Following is the soap xml i want get the bottom level value how to fetch the value. <CXMLDocument 0x6e560e0 [0x6874070]> <?xml version="1.0" encoding="utf-8"?> <soap:Envelope ...
0
votes
0answers
185 views
Parse Error TouchXML with HTML inside XML Node
I am getting xml from a webservice and a few of the nodes contain HTML. This causes TouchXML to throw errors, because obviously the HTML is also trying to be parsed. Lots of "Opening and ending tag ...
0
votes
2answers
387 views
SOAP usage in iOS with touchXML
I'm using a sudz-c generated SOAP framework, my service calls seem to work fine, but when I try doing anything with the data, iOS (emulator) crashes. This is the service call... [service ...
1
vote
1answer
274 views
TouchXML Empty Node values
I am trying to parse some XML for an iphone app(IOS5 xcode4.2) I had given up with NSXMLParser as it was a pain to get anywhere. So I went with touchXML, I am able to pull my remote XML file from a ...
-1
votes
1answer
403 views
Parsing this file XML with touchXML
I have this XML file: <continents> <continent1 id="EUR" name="EUROPE"></continent1> <continent2 id="AME" name="AMERICA"></continent2> </continents> I ...
1
vote
3answers
2k views
How do I post TouchXML library in iOS 5?
I want to parse some complected XML files, so I have plan to used TouchXML library (code) I used latest version of XCode iOS 5 in ARC environment. But my project already working in non-ARC ...
1
vote
1answer
425 views
Difference between TouchXML and GDataXML parser
I have two options in front of me for parsing really fat XML file, TouchXML GDataXML It's lot of work to do because XML file is very huge. I thought of asking people who have already worked with ...
8
votes
1answer
3k views
iPhone libxml2 undefined symbols (with gdata, kissxml, touchxml, etc.)
I'm trying to use any one of the libxml based 3rd party XML parsers, but I can't because I think I have a libxml2 problem of some sort I set my other linker flags to -lxml2 and header search paths ...
0
votes
1answer
138 views
Parsed TouchXML XML file crashes when reading NSString
I'm able to successfully parse the contents of a XML file using TouchXML, but when I try to read an individual NSString, from the NSMutableArray that stores the parsed content, the iPhone app crashes. ...
0
votes
2answers
295 views
Unable to parse and build nested XML elements with TouchXML
How to use TouchXML when nested elements appear inside xml? I would like need to nest image names inside NSArray for dictionary key @"images", however something is wrong with the code :(. Here's the ...
3
votes
2answers
1k views
How to parse HTML on iPhone using TouchXML or other libraries?
I have a dirty HTML code that is loaded from a foreign server (so I can't make a json file or clean the html code). My HTML's structure is like: <!-- SOME DIRTY HTML, CSS, JS, AND OTHER STUFF ...
0
votes
1answer
391 views
sudzC handle parameters
I m just started a new project which requires communication with a soap webservice developped by another company The functions requires some paramters ex: TPLogin parameters required: SLogin=XXX ...
5
votes
2answers
547 views
Is this XPath query on parsing XHTML wrong? using TouchXML
I have been trying to parse a XHTML doc via TouchXML, but it always can't find any tags via XPath query. Below is the XHTML: XHTML <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" ...
0
votes
1answer
1k views
iphone - How to use TouchXML to convert HTML to tidy XHTML before parsing?
There are several questions with similar titles as this one, asking about using TouchXML with HTML Tidy. But almost all of them were trying to ask how to set up Tidy. Mine is trying to ask (if you ...
1
vote
3answers
174 views
TouchXML over release problem
I'm getting an EXEC_BAD_ACCESS error when I release a CXMLDocument. Here's my very simple code which has no dependencies: @implementation TestViewController - (void)viewDidAppear:(BOOL)animated { ...
|
Spec Topics Phys
Home > Preview
The flashcards below were created by user tallone4830 on FreezingBlue Flashcards.
1. Which of the following neurotransmitters is commonly accepted as responsible for reinforcing a rewarding activity?
Dopamine
2. What structure in the brain assigns emotions to incoming information?
Amygdala
3. It is possible to increase a persons level of happiness with an SSRI.
False
4. Increased levels of happiness amplify genes that
Increase antiviral response
5. A person’s level of happiness has a physiologic effect on genes.
True
6. Which one is the least important concern about using alternative pain mediation?
duration of the treatment?
7. Which of these is a reason to try alternative pain therapy?
all of the above
8. What do acupuncture, hypnosis, massage, and tai chi have in common?
they can be used as treatment for chronic pain
9. What is important to know about pain treatment?
there are many different options
10. Which of the following is not a suggested technique for alternative pain management?
narcotics
11. Illicit Drugs that use dopamine work on which of the following pathways
All of the above
12. Illicit drugs use which neurotrasmitters to elicit their effects..
A & C are the correct answers
13. Illicit Drugs cause harmful and permanent psychological and physiological effects in the body.
True
14. Stimulants, including cocaine, amphetamines & Nicotine, work via inhibition of the neurotransmitters serotonin, noepinephrine & dopamine.
False. They increase the amount of NTs (Not inhibit)
15. The Brain’s pathways for natural rewards are the same that are utilized for the artificial highs of illicit drugs.
True
16. What enzymes are responsible for the breakdown of cartilage?
Metalloproteinases (MMPs)
17. What is the #1 risk factor for OA?
Age
18. What is typically seen in the early stages of OA?
Thickening of articular cartilage
19. Is low bone density or high bone density associated with OA?
High
20. The specific cause of OA is unknown, however it is believed to be a combination of both mechanical and biologic events.
True
21. Which personality trait has beneficial health outcomes?
Agreeable
22. Which type of behaviors increases risk for traumatic injury?
Risk seeking
23. What increased risks do people with narcissistic personalities see?
All of the Above
24. What type of personalities run the risk of having longer healing times?
schizophernic
25. Which one is a likely example of an injury for someone with exercise addiction?
strains
26. Which of the following is not an example of a corrective exercise?
Running
27. What is the optimal muscle length to create the most amount of force?
A length between shortened and fully lengthened
28. Which of the following terms means a science that deals with designing and arranging things so that people can use them easily and safely?
Ergonomics
29. What is the proper progression of corrective exercise?
Myofascial release/massage, stretching, strengthening
30. What diagnosis in adolescents can be treated with corrective exercises?
Scoliosis
31. Which of these is NOT a potential benefit of Caffeine consumption?
Treatment for insomnia.
32. Which of these is not a usual side effect of caffeine?
Somnolence
33. How much daily caffeine is recommended for pregnant women, and why?
Pregnant women should have less than 200mg of caffeine because it increases risk of miscarriage.
34. How much is a lethal dose of caffeine?
10g
35. Caffeine is a stimulant.
True
36. What is the definition of mental imagery?
seeing pictures in the mind that resemble a perceptual experience which occurs in the absence of an external stimuli
37. Which of the following is NOT an example of how to use imagery?
set unrealistic expectations
38. When engaging in Palming, picturing a calming color is thought to do all the following except:
increase your blood pressure
39. Mirror visual feedback, when used with patients having an amputated limb, is thought to do what?
create a reflection of other limb to help relieve pain of the phantom limb
40. The use of mental/healing imagery before and after surgery is shown to:
all of the above
41. Which of the following is a result of extrinsic aging?
all of the above
42. What accelerates aging by forming ROS (reactive oxygen species)?
UVA rays
43. All of the following are extrinsic factors that can negatively damage skin. Which one contributes up to 80% and is the most important factor for aging?
UV radiation
44. Which of the following does NOT slow premature aging?
Vitamin D
45. How do antioxidants fight premature aging?
Prevent exogenous free radical formation
46. A duct in liver that connect umbilical venous blood to inferior vena cava blood is?
Ductous venosus
47. Which vessel carry the least oxygenated blood and take blood from the fetus to the placenta?
Umbilical artery
48. What of the following changes occur after birth?
All the above
49. A preterm female infant born to a 32-yr old woman with no known past medical illness present for the infant’s 1-week follow-up. The mother reports that the patient is behaving normally and is feeding well. The physical exam is remarkable for a murmur, which is located at the 2nd left intercostal space. The murmur is continuous throughout cardiac systole and diastole, non-radiating, and of “machinery” quality. What is the most likely diagnosis?
Patent ductus arteriosus
50. Which structure does Ductus arteriosum converted to in adult?
Ligamentum arteriosum
51. Social media commonly allows which types of personalities to thrive online?
Narcissistic
52. Narcissistic personality types tend to be:
Pervasive pattern of attention seeking behavior, shallow with exaggerated emotions
53. Narcissists use social media to:
All of the above
54. Social media can increase your exposure to people with a variety of personality disorders.
True
55. Which of the 3 cluster types fits into the narcissistic type of personality?
Cluster B: Dramatic, emotional or erratic behavior
56. What is a side effect of lithium, antipsychotics, and anticonvulsants that can be managed by exercise?
weight gain
57. How can exercise help a person’s mental well-being?
All of the above
58. What are the main neuromodulator(s) released by exercise?
Epinephrine and serotonin
59. How long does it take for a patient to significantly reduce depression by exercising regularly?
3 weeks
60. What is not true about endophorins:
Not positively impacting the brain
61. What activity is NOT defined as play?
Does not make you forget about time
62. Play is NOT important for child’s cognitive and physical development.
False
63. For play to be an enjoyable experience, you should…
Just do it!
64. From a physiological point of view, playing in childhood is associated with…
Better developed motor skills
65. Benefits of play for adults include all of the following except…
Attenuates your role in the relationships because people think you are foolish
66. What agent(s) can cause bronchoconstriction?
All of the above
67. What is the most concerning symptom for an allergic reaction that could lead to anaphylaxis?
SOB
68. A patient comes to the ER with a rash and SOB after eating shrimp. He has a known allergy and has had to be intubated before for an anaphylactic reaction. What is the first medication that needs to be administered to this patient?
Epinephrine
69. What releases preformed mediators from secretory granules?
a&c only
70. What can cause an allergic or anaphylactic reaction?
All of the above
71. Which of the following is NOT a cause of fatigue?
Poor diet
72. What is compassion fatigue?
Emotional and physical burden of caring for sick patients, causing inability to empathize further
73. Select the best answer for how to recognize fatigue:
Take BP, HR, and RR at each visit, and compare that to their physical and mental symptoms obtained in ROS.
74. How does mental fatigue affect physical activity performance?
It raises a person’s perception of effort, thus lowering their ability to carry out the activity for a long duration or put in maximal effort.
75. Physical fatigue affects retrieval of long-term memory
False
76. Which is not a physiologic response to laughter?
attenuated blood flow
77. Laughing is typically always in response to something funny.
False
78. Laughing is associated with stress reduction.
True
79. Laughing may help to burn an extra few calories.
True
80. What is laughter theorized to be an extension of?
The social brain hypothesis
81. Strict Aerobic exercise increases the cross-sectional diameter of muscle fibers.
False
82. What impact on resting heart rate do BOTH aerobic and resistance training provide?
Decrease in resting HR by 5-25 bpm
83. Aerobic exercise promotes changes primarily in which type of muscle fibers?
Slow Oxidative Fibers
84. True or False? Changes that are made to muscle fibers through exercise do NOT revert with inactivity?
False
85. Muscle hypertrophy seen in resistance training occurs primarily due to what?
Increased diameter of muscle fiber cells
86. Wound repair refers to:
regeneration of cells with some scarring and fibrosis
87. Acute and chronic wound repair follow the same sequential pathway?
False
88. Which of the following is true of first and second intention wound healing?
All of the above.
89. What are the primary cells responsible for cleaning up debris and necrotic tissue at the site of injury?
Macrophages
90. In the remodeling phase, which of the following occur?
Collagen Fibers converted from type III to type I
91. When beginning a weight loss program consistent of low-carb dieting, which of the following occur:
Oxidation of fat stores
92. How many calories are 1 gram of each macronutrient?
Protein: 4 ; Carbohydrate: 4 ; Fat: 9
93. Which of the following diets are based on the notion of eating only the food of “Cavemen”?
Paleo Diet
94. Weight loss is seen upon:
Caloric Deficit
95. Which of the following is considered a body type having difficulty gaining weight?
Ectomorph
96. Example of pathologic hyperbilirubinemia is/are
All of the above
97. Phototherapy changes water insoluble bilirubin to water soluble bilirubin by configurational isomerization
True
98. Bilirubin is by product of Hemoglobin
True
99. Physiologic jaundice start within first 24 hrs
False
100. Which bilirubin crosses the BBB and can cause kernicterus?
Indirect
Card Set Information
Author:
tallone4830
ID:
289792
Filename:
Spec Topics Phys
Updated:
2014-11-21 17:18:47
Tags:
Spec Topics Phys
Folders:
Spec Topics Phys
Description:
Spec Topics Phys
Show Answers:
What would you like to do?
Home > Flashcards > Print Preview
|
Skip to content
master
Switch branches/tags
Code
Latest commit
Git stats
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
ok client
The ok client script (written in Python) supports programming projects by running tests, tracking progress, and assisting in debugging.
Visit http://okpy.org to use our hosted service for your course.
The ok client software was developed for CS 61A at UC Berkeley.
Build Status PyPI Version
Developer Instructions
Installation
1. Clone this repo
2. Install virtualenv
3. Create a virtual environment:
virtualenv -p python3 env
4. Activate the virtual environment:
source env/bin/activate
5. Install requirements and set up development environment:
pip install -r requirements.txt
python3 setup.py develop
Contributing
Every time you begin, you should activate the virtual environment:
source env/bin/activate
All code for the client is found in the client/ directory.
There is an executable called ok in the virtualenv path that will run your code locally. You can use the example assignments in the demo/ directory to play around:
cd demo/ok_test
ok -q q2
The tests/ directory mirrors the directory structure of the client/ directory. Every component of the client should have plenty of tests. To run all tests, use the following command:
nosetests tests
Releasing an ok-client version
First make sure that
• Your virtualenv is activated and you are on the master branch.
• Your ~/.pypirc contains okpy's PyPI credentials.
• A file .github-token contains a GitHub access token with the "repo" scope.
To deploy a new version of ok-client, change to the master branch and run
./release.py vX.X.X
where vX.X.X is the new version. This will:
|
Motivational Interviewing For The Prevention Of Diabetes-Related Foot Ulceration In People Exposed To Multiple Deprivation: A Pilot Trial.
Project Details
Description
Foot ulcers are wounds occurring below the ankle and can lead to serious complications including amputation and death and they occur in somewhere between 19-34% of people with diabetes. We know that once a foot ulcer has occurred, it is highly likely to happen again with up to 40% experiencing another ulcer within one year, rising to 60% within 3 years. This common, devastating complication of diabetes is even more common in people exposed to higher levels of social deprivation. Some of our previous research has demonstrated this when we studied the Greater Glasgow and Clyde health board area using a special mapping technique. We found that individuals with diabetes living in the most deprived part of the region were four to five times more likely to experience a foot ulcer, amputation or death than those living in the least deprived areas. Current treatment approaches are not effective; people with diabetes are well informed about their condition but this does not necessarily lead to behaviour change. We have developed a new treatment based on motivational interviewing - a way of having a conversation that helps to understand reasons/barriers to change and supports adoption of new behaviours (or stopping unhelpful behaviours) to prevent foot ulcers. Our aim is to undertake a small trial, comparing motivational interviewing to current care, to find out if a larger trial is possible and worth doing. We hope that this intervention could empower people with diabetes and foot ulceration, leading to improved self-care and reduced ulceration/amputation.
AcronymMIDI pilot
StatusNot started
UN Sustainable Development Goals
In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This project contributes towards the following SDG(s):
• SDG 3 - Good Health and Well-being
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
|
How to Focus Better
How to Focus BetterThere are 2 distinct categories of attention, which are internal and external. When the attention needed is to tackle a certain task which requires a person to mentally project themselves to doing it, it is internal. If the person has to be aware of what is happening around them, like if they were playing in a team, this requires external attention.
There may be a number of situations that will arise when a person is trying to focus that will serve as a distraction. There are many time that the person themselves will lose interest in what they are doing and lose their ability to concentrate. There are also many people who multi-task, and since their attention is spread out, the accomplishment of one of the tasks may be less than satisfactory.
The emotional and psychological state of the person are two of the biggest influences of their ability to concentrate. To be able to focus better, the person must identify their problem and deal with it accordingly. Yet, many people are still suffering from lack of concentration because of the third important factor, which is the state of their physical health.
Feeding the body is oftentimes not sufficient to give the brain the food that it needs. Research studies have shown that there are specific micronutrients and anti-oxidants that when taken, will help make the brain work better and when taken for an extended period of time, can make it perform at optimum level. There is a breakthrough formula called Lucidal, that was created by a Dr. Larry McCleary, a highly respected neurosurgeon, that will provide the brain 50 of the vital micronutrients and anti-oxidants that it needs to be able to have the ability to focus better.
How to Focus BetterClinical studies have showed that after taking this brain food supplement for a period of time, a person can improve their memory and enhance their cognitive skills. It also showed that when the brain has the food that it need, depression is reduced, anxiety can be alleviated, and the person will have less mental fatigue. To get to focus better, help manage the emotional and psychological state of mind, and give the brain the food that it physically needs, take cognitive memory enhancement supplements.
|
Welcome to Bucaro TecHelp!
Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site
About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds
Fiber Media Converter - What's the Use and How to Choose It
What are fiber media converters?
Network Media Converter
10/100BaseTTX
to 100BaseFX
Media Converter
Fiber media converters are used to convert electrical signal to light signal and vice versa. They are basically used as network extenders to extend the distance from several hundreds of feet to several thousands meters. They are perfect for linking networks between campus buildings.
The electrical signal can come from thick coax cable, UTP cable, and STP cable, etc. The light signal can be carried via single mode fibre and multimode fibre depending on your distance requirement.
What types of fiber media converters are available?
1. 10BaseT, 100BaseT, 1000BaseT Ethernet to Fiber Converter
Fiber media converters are used to connect multiple LANs to form a large campus area network. At the most, they can extend the reach of LAN over single mode fiber up to 130km.
Other UTP-to-fiber converters have redundant link functions. They not only extend the network over fiber, they can also switch communications to a backup link automatically if the primary link is broken.
2. T1 / E1 to Fiber Converter
T1 / E1 fiber media converters are available to provide T1 / E1 copper to fiber conversio to extend T1 fiber distances up to 100km. They support AMI or B8ZS / HDB3 modes and have a RJ45 / RJ48 port. They can support both multimode and single mode fibers.
3. Serial Copper to Fiber Converter
Serial to fibre converters support X.21, RS-530, RS-232, RS-422, RS-485 applications featuring several configuration modes to enable connections with a wide variety of devices. They transmit serial protocol over fibre. Some even have remove fibre loop-back switch for testing of fibre link, even during serial transmission.
4. Fiber Mode Converter
Fiber mode converter converts from single mode fibre to multimode fibre and vice versa. It provides transparent conversion between these devices. This converter regenerates signal from multimode fiber and is used to extend the distance up to tens of kilometers via single mode fiber.
5. Media Converter Chassis
If you only need to convert between two systems, such as from 1000BaseT to fiber, a stand alone fiber media converter is enough. However, if you need to convert many cable types, then you probably would want a converter chassis. The chassis houses everything in one place. They even provide internal power supplies.
Colin Yao has over 15 years expertise on fiber optic telecommunication technology and products. Learn even more about fiber media converters and fiber to copper converters on Fiber Optics For Sale Co. web site.
More Networking Topologies Articles:
• Wireless Networking
• Wireless or Wired Network?
• Build Your Own Fiber Optic Network Like a Professional Network Engineer
• Multilayer Switch
• Wireless Network Vlans - How to Implement Wireless Vlans
• The Secret of Maintaining Your Fiber Optic Network
• Token Ring Network
• What are OFNP, OFNR, OFNG and OFCG? Understanding Fiber Optic Cable Fire Ratings
• How Do Fiber Optic Couplers Work and How are They Made?
• Overview of IEEE 802.11 Wireless Lan Technology
RSS Feed RSS Feed
Follow Stephen Bucaro Follow @Stephen Bucaro
Computer Networking Sections
Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2018 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268
|
Sign in with
Sign up | Sign in
Your question
Windows system32 config system missing or corrupt ON A GATEWAY NETBOOK
Last response: in Windows XP
Share
February 22, 2011 6:38:21 PM
Hello,i have a gateway net book and no drive or usb i tryed r at start and f11 and nothing plz help me boot
February 23, 2011 4:42:38 PM
For netbooks you have some very limited picks. You can remove the drive, place it as a second drive in a working XP system, copy the files over. This may fix things for now, but the error happens often when the hard drive is failing. So you need to check the BIOS of your system for a disk check utility and do a scan of the drive. Not checkdsk from Windows, a full hardware drive scan.
The issue then becomes if you replace the drive, you loose access to the restore partition which is probably on the old hard-drive, so you need to either get an external CD drive to load Windows on the new disk, or make a USB flash drive setup of XP.
You can also contact Gateway, they will be able to ship you a replacement drive with a restore partiton on it already if the system is in warranty.
If you don't care to save any files/favorites on the drive now, you can use the restore partition and bring the system back to factory settings. The documentation that came with your computer will have the steps on how to do that. You may not have a resotre partition, but I doubt you don't, you'd need one to restore the system without an optical drive.
m
0
l
!
|
How Vitamin B6 Can Help Your Acne
A simple trip down the vitamin and health supply aisle of your nearest grocer will have you believe that there are an infinite amount of supplements and pills you should be taking in order to improve your health, restore your immune system, get a better night’s sleep, and so on. Think about it: we are told to take our multivitamins, “eat the rainbow” when it comes to our diets, and – the latest trend, it seems – to drink at least a gallon of water per day. Testimonials all over the Internet swear that if you follow those three steps, you will experience full-body benefits, both inside and out, with the most noticeable change being your skin. Apparently, all you need to clear your face and body of blemishes and acne is 128 fluid ounces of water per day, as some state.
While all of the above are great for you and will no doubt improve some aspect of your health, what most people do not realize is that there are specific vitamins that will target specific functions in your body. Taking a multivitamin may deliver the benefits that your body needs, but can it target, say, your acne and improve your skin? The short answer is no. This is where Vitamin B6 steps in, one of the most important vitamins responsible for helping to clear skin and target your pesky acne.
What is B6?
B6 belongs to the family of B vitamins; you may recognize its “brother” B12 as the energy vitamin. B6 is a crucial element in our metabolic process, as it aids in breaking down fats, carbs, and proteins in the body. B6 also plays a role in regulating certain functions that affect our skin, which means that getting the right amount of B6 on a daily basis can help combat oily and flaky skin, chapped lips, and dandruff, among other issues.
The Science Behind It
So what is it that Vitamin B6 actually does for the skin? For one, it mitigates the damaging effects of testosterone on the skin, particularly the face. As all guys know, when you hit puberty and that testosterone sky-rocketed, your skin changed; not only did facial hair start to appear, but the oil levels all over your body changed as well, especially on the face. We know there is a pretty clear connection between oily skin and acne. B6 effectively works to lessen the effects of testosterone-inducing oil to make it so that your skin is less susceptible to adult acne.
B6 also helps with the replication and restoration of skin cells. When you shed dead skin cells, your body is responsible for replacing them with new and improved skin cells. B6 aids greatly in the process of making sure that the new cells are just that: new. If there is a problem with cell replication, your epidermis is not going to look healthy; it is going to remain looking deprived of nutrients, unsightly, and perhaps a little discolored. Getting enough B6 ensures that the skin cell replication process goes smoothly.
Where is B6 Found?
Besides the vitamin aisle next to the colorful, fruit-flavored multivitamins, B6 is found in many grains – especially those containing white flour – that we find in everyday foods. If you are avoiding white flour for health reasons, you can also find your recommended dose of B6 in the following foods:
• Pistachios
• Tuna Fish
• Lean meats such as turkey and chicken
• Dried fruits such as apricots or prunes
• Bell peppers
• Avocados
• Bananas
Recommended Daily Dose
The beauty of B6 is that you do not need a hefty daily dose for the vitamin to do the job. It only takes around 1.9 mg for women and 2.4 mg for men. So the next time you find yourself in that colorful health supply aisle, check your multivitamins to see if you’re getting the recommended daily dose. If not, choose a B6 vitamin or simply up the amount of foods listed above in your diet.
Leave a Reply
Your email address will not be published. Required fields are marked *
|
How do I save emails to a DVD/CD
Ratler 18:38 19 Jul 2011
Locked
My son who lives on the Bodmin Moors is too far from civilisation to be connected to the Internet either by Landline od Mobile Phone. I have a lot of jokes I mwish to send to him (some with graphics) How do I transfer these funnies to a CD/DVD to post to him...Ratler..
gengiscant 10:02 20 Jul 2011
Look here.http://www.google.co.uk/#hl=en&sugexp=esqb,ratio&xhr=t&q=copy+emails+to+disc&cp=14&pf=p&sclient=psy&rlz=1R2GGHPen-GBGB431&source=hp&aq=0&aqi=g5&aql=&oq=copy+emails+to&pbx=1&bav=on.2,or.rgc.r_pw.&fp=1dbf7a2ff2a335cf&biw=1920&bih=1003
You will also need to insure that your son can actually open them.I have no experience of this so cannot really give any advice.
I suppose you could copy the jokes without graphics to a word doc. Have not got a clue as to the graphic question but I doubt it will be particularly difficult.
Sorry I cannot be of more help.
rdave13 11:04 20 Jul 2011
Check if you and your son have XPS viewer installed. XPS Viewer
If you both have it then open an email and select print ,not the browser's print icon, but the icon within the email account. Select Microsoft XPS document writer as your printer. This will save the file on your PC including any graphics. Laborious if you have a lot of emails but works ok.
If your son doesn't have XPS viewer installed then open a XPS file and you can use a screen print program such as the snipping tool to convert to a jpeg image and burn those to disc.
This thread is now locked and can not be replied to.
Elsewhere on IDG sites
OnePlus 5T review: Hands-on
Illustrator Andrés Lozano on his improv line work, brazen use of colours & hand sketching
iPhone X review
Comment envoyer gratuitement des gros fichiers ?
|
.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
Sign In
Register
Win Surprise Gifts!!!
Congratulations!!!
Top 5 Contributors of the Month
Easy Web
Imran Ghani
Post New Web Links
MVC 2, ajax.actionlink and updating the link text onSuccess
Posted By: Posted Date: October 08, 2010 Points: 0 Category :ASP.Net
Hello,
I have a scenario where the ajax actionlink text is 'Apply'..On clicking this and calling an action successfully, i want the link to be disabled and to be changed to 'Application successful'.
How can i do this?
Thanks
View Complete Post
More Related Resource Links
Window.Open in AJAX Accordian Panel Opens Link in Same Window
I'm using the following span to open a page in a new window. What is INCREDIBLY odd is that it is exactly the same code from three different pages, but the first refuses to open in a new window. The only difference is that the first example resides within an Ajax Accordian Panel so I suspect that it might be an Ajax related issue. Ideas? Does not open in new window.<span onclick="window.open ('http://[domainname]/Mercury/production/content/directory/DirectorySideBar.aspx','mywindow','width=271,height=498,scrollbars=no');"> Opens in new window<span onclick="window.open ('http://[domainname]/Mercury/production/content/directory/DirectorySideBar.aspx','mywindow','width=271,height=498,scrollbars=no');"> Opens in new window<span onclick="window.open ('http://[domainname]/Mercury/production/content/directory/DirectorySideBar.aspx','mywindow','width=271,height=498,scrollbars=no');">
AJAX Toolkit version 1.0.20229 download link
Hi,Because I have VS 2005, I need to download and install AJAX Toolkit version 1.0.20229, but I an't find it anywhere. Does anyone have a link I could use for this download?Thanks,Mike
Problem tabbing among text boxes with AJAX
We are having a problem with a form with four text boxes. If you enter a value in the first two boxes, pressing TAB as you switch between the text boxes, the data is retained in the text box as you would expect. However, the third and fourth text boxes won't retain any data. This happens in IE 8 but not FireFox 3.5. The problem won't occur if you use the mouse to switch between text boxes. The problem goes away if we remove the AJAX code, but we want to retain the AJAX code so that some other things happen without postbacks. I can upload a sample website if that will help, but I don't see where I can upload the files. We're using Visual Studio 2010 and VB.NET in an ASP.NET project. Protected ToolkitScriptManager1.SetFocus(TextBox2) Sub TextBox1_TextChanged(ByVal sender As Object, ByVal e As System.EventArgs) Handles TextBox1.TextChangedEnd Sub ToolkitScriptManager1.SetFocus(TextBox3) Protected Sub TextBox2_TextChanged(ByVal sender As Object, ByVal e As System.EventArgs) Handles TextBox2.TextChangedEnd Sub ToolkitScriptManager1.SetFocus(TextBox4) Protected Sub TextBox3_TextChanged(ByVal sender As Object, ByVal e As System.EventArgs) Handles TextBox3.TextChangedEnd Sub
Ajax - literal not updated after adding a regular html link
Hi,Took me a while to track this down and a number of hours trying to figure it out, but at this point I just do not get it. I have a master page and a content placeholder in it encompassed in UpdatePanel like this:...<aspUpdatePanel...> <asp:ContentPlaceHolder...> </asp:ContentPlaceHolder...></asp:UpdatePanel>...<asp:UpdateProgress...>...</asp:UpdateProgress>And then a page like this:...<asp:Register ... MyControl...><asp:Content...> ... <ctl:MyControl ID="myControl"... /> ... <asp:Literal ID="literalError"... /> <asp:Button ID="ButtonSubmit" OnClick="ButtonSubmit_Click"... /></asp:Content>Now, the control's .aspx is like this:...some .net controls here...And the code-behind is like this:protected override void ValidateForm(){ ... some validation here ... this.error = "some error"...}The control inherits from a custom control that looks like this:public abstract class MyCustomControl : UserControl{ ... private string error; ... protected abstract void ValidateForm(
How To add both Text and Bar Status for Password Strength in ASP.NET AJAX
hai One and All, here i am going to show u how to add both Text and Bar Status for Password Strength in ASP.NET AJAX Let Me take up the .aspx page first:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- <%@ Page Language="C#" AutoEventWireup="true" CodeFile="Default.aspx.cs" Inherits="_Default" %><%@ Register Assembly="AjaxControlToolkit" Namespace="AjaxControlToolkit" TagPrefix="cc1" %><%@ Register Assembly="System.Web.Extensions, Version=1.0.61025.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" Namespace="System.Web.UI" TagPrefix="asp" %><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head runat="server"> <title>Untitled Page</title> <link href="StyleSheet.css" rel="stylesheet" type="text/css" /></head><body> <form id="form1" runat="server"
How to get the link portion of an ActionLink
Hello,
I am developing a page that has an image element that has its source set to an action on a controller (e.g., "/controller/action". The problem that I am having is that I don't see a built in way to generate a URL (i.e., like an ActionLink's URL) without manually constructing one. At the moment, I am manually constructing the URL, but I want to move away from this. Before I write my own helper method, I thought I would check to see if one it already available. Does such a method exist?
BTW, this is using MVC2, VS 2010.
Thanks,
Erick
highlighting the text of the selected item in Ajax Combobox
Is there a way to programmatically select the entire string of the selected item in the AJAX Combobox?
What I'm trying to do is bascially on a State/City selection.
1. User selects a State from the first combobox. This triggers the City combobox to be populated. The item(0) is "Select One:".
2. I want the entire "Select One:" to be hightlight as if the user had used their mouse and highlighted all the text.
The reason for this that I'd like the user to be able to start typing the city without needing to clear out the "Select One:" manually.
Can this be done?
Ajax.BeginForm doen't work properly with AjaxOptions.OnSuccess
Hi All,
I want to use Ajax.BeginForm instead of Html.BeginForm.
I can use it with out OnSuccess option. When I include it, i doesn't save and give validaiton messages.
How can I solve this ?
Kind Regards
Aysegül.
using dynamic text with HTML.Actionlink
Hello there my second post of the day this is becoming a habbit LOL :)
as part of my web app i have a series of buttons created using HtmlActionlink
e.g
<%=Html.ActionLink("Swap User", "Index","Home")%></td>
However my buttons need to be translated into difrent languages depending on the country the user is in
Im translating the button lable text fine in my controller and passing it into the view , but now im alittle stumped over syntax
Id like to replace "Swap User" above with
drag text from textbox to treeview using ajax
hi,
i have done a simple program tat enables drag and drop functionality in asp.net webforms..i hav implemented this using 2 tree views in my page...
but now i need some idea to how to drag the text from textbox to the tree nodes..
i hav searched net but can't get clear idea...is there any control in ajax which enables this feature..
plz help me
regards,
badri
Problem with ajax action link
Hi,
I have code like this. Always the "Get" method is getting called insted of "Post" method eventhough I have explicitly mentioned it as "Post"
<%= Ajax.ActionLink("Create", "Create", new AjaxOptions {HttpMethod = "POST" })%>
What could be the problem ?
Ajax.ActionLink
I am using Ajax.Actionlink.
I have object(SearchModel) which inside contain one more object(OperatorValue) when I am using below action link.my classID is getting set but my Context is not getting set to my action.
<ul>
<li>
<%=Ajax.ActionLink("Material", "SearchForm", "Search", new SearchModel { ClassID = "BIDDING MATERIAL", Context = new OperatorValue{Value="ABC", Operator = "=" } }, new AjaxOptions { UpdateTargetId = "Search", HttpMethod = "Get" })%>
</li>
</ul>
Query1:Context pararmeter is not getting set.Can anyone let me know the solution for this problem?
Query2:When I click on list item "Material",my action controller is not getting called...It is getting called for the first time.
Ajax.ActionLink problem
<%= Ajax.ActionLink(
"Varazdinska zupanija",
"PartialMeteoPostaja",
new { id = "105" },
new AjaxOptions { UpdateTargetId = "MeteoDIV" }
Gridview displaying text not link
I have a gridview that is bound to a table in my database. The second column I'm grabing from the table has the HTML code to create a link.
ex. <a href="yahoo.com"> yahoo</a>
When I bind it to my grid it shows me this text instead of just the word "yahoo" that is a link.
This is my gridview
<asp:GridView ID="grd" runat="server" Visible=true BackColor="White" BorderColor="ActiveBorder" BorderStyle="Solid" BorderWidth="0px" CellPadding="4"
ForeColor="Black" GridLines="Vertical" AutoGenerateColumns="False" allowsorting="True" onrowdatabound="grd_RowDataBound">
<Columns>
<asp:BoundField DataField="country" HeaderText="" />
<asp:BoundField DataField="name" HeaderText="" />
</Columns>
</asp:GridView>
Thank you for any help
How to set a link in Calendar Control and retain text in the control?
Hi Community
This is my first time in this forum.
I have a Calendar Control that I added text that show scheduled meetings on certain dates and it works okay.
The problem is that when I click on a date I need to http to another web page or sometimes goto a web page in
the same web site. The problem is when the code that creates the hyperlink runs it replaces the text displaying "meetings"
scheduled for that date instead appending the link to the date and retaining the "meetings" text that was already there.
fyi, e.Day.Date.Day matches any number entered.
Below is how I set that up with the code that adds the meetings followed by the url code that replaces the meetings text:
public partial class _Default : System.Web.UI.Page
{
string[,] vholidays = new
Updating the AJAX Control Toolkit from VS 2005 to either VS 2008 or VS 2010
At work we've got a ASP.NET app written using VS 2005. At the time I downloaded and installed the AJAX Control Toolkit from off of this website. We've been using it ever since, in that website.
Now I'd like to upgrade that website to either VS 2008 or VS 2010, but I'm concerned about the AJAX Control Toolkit. If memory serves, I think that it came with VS 2008, and I would assume it certainly is a part of VS 2010. Do I have to remove any reference to the AJAX Control Toolkit, before trying to upgrade it? Or after upgrading it? How do I make it reference the AJAX Control Toolkit that's a part of VS 2008/VS 2010?
Updating a text within a div tag with textbox control.
Hello everyone, I have a question regarding to the text in the html code. I would like to know if there is a way to change the content text in the html with text that has been written in textbox. For example i have following text in html, so how can I replace this text by using a text box in the server side.
Hello
I will be grateful if someone gives me a little help. Thanks,
Categories:
ASP.NetWindows Application .NET Framework C# VB.Net ADO.Net
Sql Server SharePoint Silverlight Others All
Hall of Fame Twitter Terms of Service Privacy Policy Contact Us Archives Tell A Friend
|
Central Role in the Operating Room Essay
Submitted By izzy7299
Words: 559
Pages: 3
Anesthesiologists serve a central role in the operating room, making decisions to protect and regulate your critical life functions. These are the doctors who put the patient to sleep, before any treatment or surgery, and then is responsible for slowly waking them up and making sure there are no problems. Anesthesiology revolves around pain prevention, but requires constant presence in the operating room - for incase any problems occur. Anesthesiologists also aid patients with chronic disease to live better, and ultimately easier lives through pain management treatments. Also, their work in the critical care unit saves countless lives. The medical care world we live in relies heavily on surgery as a problem solver. Without Anesthesia and Anesthesiologists surgery would be unbearably painful. ! Anesthesiology is notorious for its large salary. The median expected salary for a typical anesthesiologist in the United States is $338,419 (annually). Although it can vary based on the specific field of anesthesiology. Anesthesiologists do get payed more then most doctors, and are considered one of the highest payed jobs. As most other doctors though, there are quite a few education requirements. ! Anesthesiology is one of the most highly ranked professions in the medical business, therefore it requires a high school diploma. Math and Science classes are important to take in high school, especially Biology and Chemistry. High school is followed by medical school where a medical degree can be obtained. A medical examination is then conducted; officially licensing one to practice medicine. For all doctors, an extra four years of residency is required to begin practicing on patients. One of these four years is spent training in basic medicine knowledge, as a foundation, and the other three years is spent in an anesthesiology residency program.
Anesthesiologists always have to remain alert to what is going on when in the operating room. The liability is huge in anesthesiology, because of the problematic effects, such as paralyzation, if too much or too little anesthesia is used. Every anesthetic must be tailored to the individual, and to the operation or procedure that the person is having. Individuals have different responses to anesthesia. Some of these differences are genetic, or inborn, and some differences are due to changes in health or illness. The amount of anesthesia needed can differ according to such things as; age, weight,…
|
Morse Code Audio Decoder
Introduction
This is an experimental tool for listening to, analysing and decoding Morse code all done in Javascript using the Web Audio API. I know it works in the latest Chrome and Firefox browsers on Windows, it might work in Safari and it just can't work in Internet Explorer. No information from the microphone is transmitted to the server, but the connection to the server is encrypted nonetheless.
If you cannot produce your own Morse code sounds then try using my Morse code translator to play or download some.
Sound Source
You can either have the decoder listen to the microphone, analyse a file you upload or analyse a pre-saved sample along with some sensible parameters.
Microphone
If you choose to use the microphone then your web browser will promt you to confirm that it is okay. If you have several microphones you will also need to choose which microphone to use: to do this in Chrome first allow access and then click on the video-camera icon in the right-hand end of the address bar; in Firefox you can choose which microphone to use at the point of permitting access. Of course this is all subject to change as it is not a common feature to use yet.
Upload
Upload an audio file from your computer.
Filename:
Samples
The following table lists some pre-recorded samples along with audio filter parameters that work well. The first three samples have been downloaded from the translator and are therefore very clean sounds. "Fox" was recorded through a microphone by a someone actually sending Morse code. "Inspector Morse" is the start of a British TV drama where "MORSE" was spelt out in very approximate Morse code (the decoder can't manage it). The last two are both the same sound file, first listening at 300Hz and then at 700Hz to give two different messages! Sounds processed via the microphone will not work so well as the clean samples.
Select File Speed (wpm) Min volume (dB) Max volume (dB) Min frequency (Hz) Max frequency (Hz) Volume threshold FFT size
Use the "Apply" button to change the parameters to those selected in the table. The "Play" button will play the selected file regardless.
Audio and Fourier Transform Parameters
The minimum measurable frequency is 0Hz and the maximum in this web browser is Hz (half the sampling rate of Hz). You can select the FFT size in the form: a small FFT size will give a small time resolution (good for fast Morse code) and a large FFT size will give a small frequency resolution (good for eliminating background noise) but you can't have both at once.
The chosen FFT size is giving frequency measurements (FFT size / 2). The frequency resolution is Hz (sampling rate / FFT size). The time resolution is ms (1000 * FFT size / sampling rate) which might work with wpm code at fastest (with 2 to 3 samples per dit).
Spectrogram
A spectrogram shows how the volume of each frequency band changes over time.
You can zoom in on a frequency range by adjusting the minimum and maximum frequencies. By adjusting the minimum and maximum volumes you may be able to filter out unwanted background noise (for instance, try increasing the minimum volume to -60dB).
The live spectrogram below is showing the (quantised) frequencies from Hz (at the bottom) to Hz (at the top). The pink region highlights the area that is being analysed (see below). Time progresses left to right.
to
to
Volume
We need to extract the Morse code signal tones from the sound entering the microphone. Hopefully the Morse tones will be the loudest sounds being received. Here we plot the average volume in each frequency bin over time. The chart is only displayed when the sound stops because otherwise it slows down the sound processing.
The frequency range with the maximum average volume ( of 255) is Hz (frequency bin number )
Filter
We need to set a frequency range to filter the frequency-domain data (i.e. choose which frequencies we want to focus on). We also need to set a threshold volume above which we take to mean that a signal is present. Use the button to automatically select the frequency range with the maximum average volume and to use the average volume in that range as the threshold (you may find a higher volume works better though).
The actual (quantised) frequency band which includes all of the specified range is - Hz ( frequency bins of size Hz) and is highlighted in pink on the spectrogram above. The volume threshold is (of 255).
The chart below shows the average amplitude in analysis region and the threshold in use.
to
This chart just highlights the value at the threshold and should look something like Morse code:
Translation
Given the cleaned up signal above we now need to take the timings of the "ons" and "offs", translate into dits and dahs and finally into text. The decoder does some further signal processing by asuming that if an "on" or "off" element was only 1 measurement long then it was probably due to noise and so the previous timed element is just extended.
The final stage of the decoder currently needs a clue about the speed of the Morse code: use the input box to set the speed. Given the chosen speed of wpm, the length of a dit is ms, a dah is ms and a word-space is ms.
The chart below shows the frequency of the different time intervals that are measured. Each on or off period is a multiple of the time resolution (ms). The chart updates when the sound stops because otherwise it slows down the sound processing. Turn sets on and off by clicking on the legend.
If the chart shows a clean clustering of timings then it's likely that the decoder will have made sense of the timings and you'll have a sensible mesage shown below. If it didn't quite work, try looking at the debugging information by hovering over each letter.
The message is:
The variation in the timings used in the last message are summarised in the following table. Note that even when a "perfect" downloaded signal is analysed, the measured variation in the durations is quite significant. This is because, relative to the speed of the Morse code, the measurements are quite infrequent.
Type Count Min (ms) Max (ms) Average (ms) Standard deviation (ms)
Dit
Dah
Dit space
Dah space
Space
|
Home | About | Sematext search-lucene.com search-hadoop.com
clear query|facets|time Search criteria: . Results from 41 to 50 from 92 (0.077s).
Loading phrases to help you
refine your search...
[HIVE-6347] ZeroCopy read path for ORC RecordReader - Hive - [issue]
...ORC can use the new HDFS Caching APIs and the ZeroCopy readers to avoid extra data copies into memory while scanning files.Implement ORC zcr codepath and a hive.orc.zerocopy flag....
http://issues.apache.org/jira/browse/HIVE-6347 Author: Gopal V, 2014-06-09, 11:21
[HIVE-7147] ORC PPD should handle CHAR/VARCHAR types - Hive - [issue]
...ORC PPD does not handle Varchar/Char data types.Caused by: java.lang.IllegalArgumentException: Unknown type VARCHAR at org.apache.hadoop.hive.ql.io.orc.Record...
http://issues.apache.org/jira/browse/HIVE-7147 Author: Gopal V, 2014-06-02, 07:33
[HIVE-7151] NULL keys should not be shuffled for inner equi joins - Hive - [issue]
...There is a huge skew in reducer load for NULL keys in shuffle joins, resulting in one slow reducer out of many.The NULL keys will not contribute towards the inner JOIN condition for equality...
http://issues.apache.org/jira/browse/HIVE-7151 Author: Gopal V, 2014-05-31, 20:18
[expand - 4 more] - Re: Review Request 18936: HIVE-6430 MapJoin hash table has large memory overhead - Hive - [mail # dev]
...This is an automatically generated e-mail. To reply, visit:https://reviews.apache.org/r/18936/#review41936Ship it!Ship It!- Gopal VOn May 1, 2014, 2:29 a.m., Sergey Shelukhin wrote: ...
Author: Gopal V, 2014-05-01, 19:04
[HIVE-6391] Use pre-warm APIs in Tez to improve hive query startup - Hive - [issue]
...With the addition of TEZ-766, Tez supports pre-warmed containers within the Tez session.Allow hive users to enable and use this feature from within the hive shell....
http://issues.apache.org/jira/browse/HIVE-6391 Author: Gopal V, 2014-04-23, 08:17
[HIVE-6787] ORC+ACID assumes all missing buckets are in ACID structure - Hive - [issue]
...ORC+ACID creates ACID structure splits for all missing buckets in a tablejava.lang.RuntimeException: java.io.IOException: java.io.IOException: Vectorization and ACID tables are incompatible....
http://issues.apache.org/jira/browse/HIVE-6787 Author: Gopal V, 2014-04-08, 16:12
[HIVE-6662] Vector Join operations with DATE columns fail - Hive - [issue]
...Trying to generate a DATE column as part of a JOIN's output throws an exceptionCaused by: org.apache.hadoop.hive.ql.metadata.HiveException: Incompatible Long vector column and primitive cate...
http://issues.apache.org/jira/browse/HIVE-6662 Author: Gopal V, 2014-03-29, 05:32
[HIVE-6748] FileSinkOperator needs to cleanup held references for container reuse - Hive - [issue]
...The current implementation of FileSinkOperator runs into trouble when reusing the same query pipeline aggressively with container reuse.This is due to a prevFSP writer which is left referenc...
http://issues.apache.org/jira/browse/HIVE-6748 Author: Gopal V, 2014-03-28, 05:52
[HIVE-6751] maxtaskfailures.per.node is set to too low a threshold - Hive - [issue]
...The node blacklisting results in a task retry system which can consume cluster resources excessively with queries which will eventually fail.For a large stage query, on a 20 node cluster, wi...
http://issues.apache.org/jira/browse/HIVE-6751 Author: Gopal V, 2014-03-26, 02:00
[HIVE-4051] Hive's metastore suffers from 1+N queries when querying partitions & is slow - Hive - [issue]
...Hive's query client takes a long time to initialize & start planning queries because of delays in creating all the MTable/MPartition objects.For a hive db with 1800 partitions, the metas...
http://issues.apache.org/jira/browse/HIVE-4051 Author: Gopal V, 2014-03-25, 07:28
Sort:
project
Hive (92)
Tez (35)
Hadoop (12)
MapReduce (7)
HDFS (6)
YARN (4)
Ambari (1)
type
issue (76)
mail # dev (13)
mail # user (3)
date
last 7 days (2)
last 30 days (14)
last 90 days (37)
last 6 months (53)
last 9 months (92)
author
Namit Jain (645)
Carl Steinbach (417)
Brock Noland (386)
Zheng Shao (382)
Ashutosh Chauhan (336)
Edward Capriolo (298)
Navis (288)
Gunther Hagleitner (231)
Thejas M Nair (217)
Lefty Leverenz (213)
John Sichi (212)
Xuefu Zhang (203)
Ning Zhang (171)
Kevin Wilfong (152)
Sergey Shelukhin (146)
Harish Butani (142)
He Yongqiang (139)
Jason Dere (129)
Thejas Nair (124)
Eugene Koifman (123)
Szehon Ho (119)
Nitin Pawar (112)
Eric Hanson (108)
Vaibhav Gumashta (108)
Prasad Mujumdar (106)
Gopal V
|
JavaScript requeired.
Geochemical Journal
Geochemical Journal An open access journal for geochemistry
subscription
Published for geochemistry community from Geochemical Society of Japan.
Distribution of rare earth elements in the Yamuna and the Chambal rivers, India
R. Rengarajan, M. M. Sarin
Geochemical Journal, Vol. 38, No. 6, P. 551-569, 2004
ABSTRACT
We report here the first measurements of dissolved rare earth elements (REE) in the headwaters of the Yamuna river draining through the southern slopes of Himalaya. Due to intense weathering of the surface rocks of different lithologies and influence of tributaries, Yamuna river waters have variable dissolved REE contents (87 < ΣREE < 1374 ng L-1, mean = 288.6 ng L-1) and exhibit negative Eu anomaly (0.49 < Eu/Eu* < 0.73, mean = 0.63). While most of the samples do not show discernable Cc anomalies; a negative Cc anomaly, however, found in a few of them, which can be explained by the colloidal pool preferentially enriched in Ce. A comparison among the river waters and bed sediments suggests that dissolved composition of REE is strongly fractionated and is enriched in MREE (Nd-Gd) with respect to sediments; presumably due to preferential dissolution of phosphate minerals such as apatite during weathering processes. Along with the Yamuna river, bed sediments from the Chambal river (a Peninsular river) have also been analyzed for REE composition. Bed sediments in the Yamuna and the Chambal river basins are characterized by ΣREE concentrations in the range of 78 to 291 μg g-1 (mean = 165 μg g-1) and 96 to 157 μg g-1 (mean = 134 μg g-1), respectively. A characteristic feature observed in the REE-normalized patterns of bed sediments is a strong HREE enrichment and a relatively positive Eu anomaly with respect to the granites in the Yamuna river catchment. In contrast, the bed sediment samples of the Chambal river show significant LREE enrichment and Eu enrichment with respect to the Deccan basalts in its catchment. The feldspars and their secondary products, which are enriched in Eu, might be the cause of the Eu anomaly. In river sediments of both these basins, the enrichment factors (EF), with respect to PAAS are ≤2 suggesting that REE composition is mainly derived from weathering processes.
KEYWORDS
dissolved rare earth element, MREE enrichment, Yamuna river, Chambal river, bed sediment
All Issues
Current Issue:
Stats:
Impact Factor: 0.8 (2022)
Submission to final decision: 9.6 weeks (2022)
Geochemical Society of Japan
page top
|
Acoustic Wave Touch Detection Circuit And Method - Patent 7812269 by Patents-421
VIEWS: 27 PAGES: 22
The present invention relates to a touch detection circuit and method and more particularly, to a touch detection circuit and method for detecting the presence of a touch on a touch responsive surface of an acoustic wave cavity.BACKGROUND OF THE INVENTIONThere is a substantial need for finger touch actuated switches that are rugged and explosion proof, operate in the presence of liquids, have low power consumption, withstand aggressive sterilization procedures and are inexpensive. Known switchesthat attempt to meet these needs but fail include the following. A Qprox switch made by Quantum Research Group senses the presence of touch through a charge transfer effect. This switch is sensitive to conductive fluids and/or an ionizing atmosphereand can be made inoperable thereby. Further, the enclosure through which touch is sensed cannot be made of an electrically conducting material, so that metals and the like cannot be used. Piezoelectric switches such as supplied by Schurter orWilson-Hurd, operate by transferring finger pressure via a metal overlay to a piezoelectric element which generates a voltage when compressed. This type of switch is expensive compared to a standard membrane switch and shares the disadvantages ofmembrane switches in that holes in the housing or enclosure are required to accommodate the switch. Further, the metal overlay is necessarily thin, so that the piezoelectric element is relatively unprotected against blows to the overlay. Another typeof switch shown in U.S. Pat. No. 5,149,986 is based on the absorption of sound in a glass, ball-shaped button when the button is touched. In operation, a transducer sends sound waves into the glass balls and then receives back the echoes in a sonartype fashion. A circuit analyzes the echoes to determine whether the echoes have been reduced indicating a touch. This type of switch is relatively expensive and again requires openings in the housing or enclosure in which the switch is to be mounted.A
More Info
United States Patent: 7812269
( 1 of 1 )
United States Patent
7,812,269
Knowles
, et al.
October 12, 2010
Acoustic wave touch detection circuit and method
Abstract
A circuit for an acoustic wave switch or sensor having a resonant acoustic
wave cavity detects a touch or sensed event using a time domain approach.
The circuit includes a controller that drives an acoustic wave transducer
to generate a resonant acoustic wave in the acoustic wave cavity during a
first portion of a sampling cycle. In a second portion of the sampling
cycle, the controller monitors the time that it takes for the acoustic
wave signal from the transducer to decay to a predetermined level. Based
on the decay time, the controller detects a sensed event, such as a touch
on the acoustic wave switch/sensor.
Inventors:
Knowles; Terence J. (Barrington, IL), Wehrer; Wayne J. (Austin, TX), Kalmus; Chris (LaGrange, IL), Bremigan, III; Charles F. (Jarrell, TX)
Assignee:
Illinois Tool Works Inc.
(Glenview,
IL)
Appl. No.:
11/781,808
Filed:
July 23, 2007
Related U.S. Patent Documents
Application NumberFiling DatePatent NumberIssue Date
10454003Jun., 20037265746
Current U.S. Class:
178/18.04 ; 345/173
Current International Class:
G06F 3/043 (20060101)
Field of Search:
345/156,173 178/18.01,18.04,19.04 310/322,334 367/153,176
References Cited [Referenced By]
U.S. Patent Documents
5303210
April 1994
Bernstein
6590757
July 2003
Pahl et al.
7511704
March 2009
Knowles et al.
Foreign Patent Documents
0 657 842
Jun., 1995
EP
Primary Examiner: Abdulselam; Abbas I
Attorney, Agent or Firm: McAndrews, Held & Malloy, Ltd.
Parent Case Text
CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a division of U.S. patent application Ser. No.
10/454,003 entitled "Acoustic Wave Touch Detection Circuit and Method,"
filed Jun. 4, 2003, now U.S. Pat. No. 7,265,746, which is hereby
incorporated by reference in its entirety.
Claims
What is claimed and desired to be secured by Letters Patent is:
1. A touch detection circuit for detecting a touch on a touch responsive acoustic wave cavity comprising: at least one transducer
driven to generate an acoustic wave in the cavity during a sampling cycle and responsive to the acoustic wave to provide a signal representative thereof for the sampling cycle; and a controller responsive to the acoustic wave signal to determine a
number representing the period of time that the acoustic wave signal for a sampling cycle decays to a predetermined level, and the controller comparing the number for a sampling cycle to a touch reference to detect a presence of a touch on the acoustic
wave cavity during the sampling cycle.
2. A touch detection circuit as recited in claim 1 wherein said controller includes a processor and memory, the predetermined level being programmable and the processor determining the touch reference.
3. A touch detection circuit as recited in claim 2 wherein the processor determines the touch reference based on a look up table stored in the memory.
4. A touch detection circuit as recited in 2 wherein the processor determines the touch reference based on at least one number representing the period of time that the acoustic wave signal for a sampling cycle decays to a predetermined level in
the absence of a touch on the acoustic wave cavity.
5. A touch detection circuit as recited in claim 1 wherein the controller determines the touch reference based on a plurality of numbers each representing a respective period of time that the acoustic wave signal for respective sampling cycle
decays to a predetermined level in the absence of a touch on the acoustic wave cavity.
6. A touch detection circuit as recited in claim 1 wherein the controller includes a comparator that receives an acoustic wave signal for a sampling cycle and compares the amplitude of the acoustic wave signal to a predetermined amplitude to
generate a pulse when the amplitude of the acoustic wave signal is greater than the predetermined amplitude.
7. A touch detection circuit as recited in claim 6 wherein the controller counts the number of pulses from the comparator for an acoustic wave signal received for a sampling cycle to determine the number representing the period of time that the
acoustic wave signal decays to the predetermined level.
8. A touch detection circuit as recited in claim 1 wherein the transducer is a piezoelectric transducer.
9. A touch detection circuit as recited in claim 1 wherein the transducer is an electromagnetic acoustic transducer.
10. A touch detection circuit for detecting a touch on a touch responsive acoustic wave cavity comprising: at least one transducer to generate an acoustic wave in the cavity when the transducer is driven and responsive to the acoustic wave in
the cavity to provide a signal representative thereof; a controller that controls the driving of the at least one transducer and the receipt of the acoustic wave signal from the transducer during a sampling cycle, the controller being responsive to the
transducer signal to determine a number representing the period of time that the signal, received from the transducer during a sampling cycle, decays to a predetermined level, and the controller comparing the number for a sampling cycle to a touch
reference to detect the presence of a touch on the acoustic wave cavity during the sampling cycle.
11. A touch detection circuit for detecting a touch on a touch responsive acoustic wave cavity comprising: at least one transducer driven to generate an acoustic wave in the cavity during a sampling cycle and responsive to the acoustic wave to
provide a signal representative thereof for the sampling cycle; a comparator for comparing the amplitude of the acoustic wave signal for a sampling cycle to a first reference to generate a pulse when the amplitude of the acoustic wave signal is above
the first reference; a counter for counting a number of the pulses from the comparator to provide a count for the sampling cycle; and a processor for comparing the count for the sampling cycle to a second reference to detect a touch.
12. A touch detection circuit as recited in claim 11 wherein the processor controls the generation of the acoustic wave in the cavity and the coupling of the acoustic wave signal to the comparator.
13. A touch detection circuit as recited in claim 11 wherein the processor is responsive to the counts for a plurality of sampling cycles to update the second reference used to detect a touch.
14. A touch detection circuit as recited in claim 13 wherein the processor uses a table stored in a memory to determine the second reference.
15. A touch detection circuit as recited in claim 11 wherein the processor updates the reference.
16. A touch detection circuit as recited in claim 11 wherein the transducer is a piezoelectric transducer.
17. A touch detection circuit as recited in claim 11 wherein the transducer is an electromagnetic acoustic transducer.
18. A touch detection circuit for detecting a touch on a touch responsive acoustic wave cavity comprising: an electromagnetic acoustic transducer having a coil and at least one magnet, the electromagnetic acoustic transducer being positioned
adjacent the acoustic wave cavity; and a controller coupled to the coil to drive the transducer to generate an acoustic wave in the acoustic wave cavity and to pick up a signal from the transducer representing the acoustic wave in the acoustic wave
cavity, the controller is responsive to the signal to determine a value representing the period of time that the acoustic wave signal decays to a predetermined level, the value being indicative of the presence or absence of a touch on the touch
responsive acoustic wave cavity.
19. A touch detection circuit as recited in claim 18 wherein the electromagnetic acoustic transducer includes a single coil for generating the acoustic wave and for picking up a signal representing the acoustic wave.
20. A touch detection circuit as recited in claim 18 wherein the electromagnetic acoustic transducer includes multiple coils.
21. A circuit for an acoustic wave sensor comprising: at least one transducer driven to generate a resonant acoustic wave in an acoustic wave resonator and responsive to the acoustic wave to provide a signal representative thereof; a
controller responsive to the signal for determining a value representing the period of time that the acoustic wave decays to a predetermined level, the controller comparing the value to a reference to sense an event.
22. A method of detecting switch malfunction for an acoustic wave switch comprising: generating an acoustic wave in the acoustic wave switch; providing a signal representing the acoustic wave in the acoustic wave switch; determining a value
representing the period of time that the acoustic wave decays to a predetermined level; and comparing the determined value to a malfunction reference to determine whether the switch has malfunctioned.
23. A method of detecting switch malfunction as recited in claim 22 including providing an indication of switch malfunction in response to a determination that a switch has malfunctioned.
24. A method of detecting switch malfunction as recited in claim 22 including generating a signal representing switch malfunction in response to a determination that a switch has malfunctioned.
25. A method of detecting switch malfunction for an acoustic wave switch comprising: generating an acoustic wave in the acoustic wave switch during each of a plurality of sampling periods; providing a signal representing the acoustic wave in
the acoustic wave switch in each of the sampling periods; determining, for each of the sampling periods, a value representing the period of time that the acoustic wave decays to a predetermined level; and comparing a plurality of the determined values
to a reference to determine whether the switch has malfunctioned.
26. A method of detecting switch malfunction as recited in claim 25 including providing an indication of switch malfunction in response to a determination that a switch has malfunctioned.
27. A method of detecting switch malfunction as recited in claim 25 including generating a signal representing switch malfunction in response to a determination that a switch has malfunctioned.
28. A method of detecting switch malfunction as recited in claim 25 wherein switch failure is determined when the values for a predetermined number of consecutive sampling periods have been greater than or less than the reference.
29. A method of detecting impending switch malfunction for an acoustic wave switch comprising: generating an acoustic wave in the acoustic wave switch during each of a plurality of sampling periods; providing a signal representing the acoustic
wave in the acoustic wave switch in each of the sampling periods; determining, for each of the sampling periods, a value representing the period of time that the acoustic wave decays to a predetermined level; determining a trend from a plurality of the
determined values indicative of impending switch malfunction.
30. A method of detecting impending switch malfunction as recited in claim 29 including providing an indication of impending switch malfunction in response to a determination of a trend indicative of impending switch malfunction.
31. A method of detecting impending switch malfunction as recited in claim 29 including generating a signal representing impending switch malfunction in response to a determination of a trend indicative of impending switch malfunction.
32. A method of detecting switch malfunction for an acoustic wave switch comprising: generating an acoustic wave in the acoustic wave switch during each of a plurality of sampling periods; providing a signal representing the acoustic wave in
the acoustic wave switch in each of the sampling periods; determining, for each of the sampling periods, a first value representing the period of time that the acoustic wave decays to a predetermined level; determining a second value representing an
average of a plurality of the first values; and comparing the second value to a reference to determine whether the switch has malfunctioned.
33. A method of detecting liquid interference with an acoustic wave sensor comprising: generating an acoustic wave in the acoustic wave switch during each of a plurality of sampling periods the acoustic wave being insensitive to the liquid at
certain levels of the liquid and the acoustic wave being sensitive to the liquid at other levels; providing a signal representing the acoustic wave in the acoustic wave switch in each of the sampling periods; and analyzing the signals in a
predetermined number of consecutive sampling periods for variations among the signal indicative of the presence of an interfering liquid.
34. A method of detecting liquid interference as recited in claim 33 wherein the analyzing includes determining, for each sampling period, a value representing the period of time that the acoustic wave decays to a predetermined level.
35. A method of detecting liquid interference as recited in claim 34 including comparing a maximum value and a minimum value to determine if the difference therebetween exceeds a threshold.
36. An acoustic wave touch panel comprising: a substrate having a plurality of wave cavities formed therein and defined by an area of increased mass, the substrate having a surface with touch responsive areas associated with the acoustic wave
cavities and a back surface opposite thereto; a transducer positioned adjacent the back surface of each of the acoustic wave cavities; a circuit board having a circuit for driving the transducers to generate an acoustic wave in each of the acoustic
wave cavities, the circuit board having a plurality of apertures and the circuit board being bonded on the back surface of the substrate wherein each aperture is aligned with a respective acoustic wave cavity.
37. An acoustic wave touch panel as recited in claim 36 including at least one contact associated with each transducer, the contact having a first end attached to the circuit board and a second end extending over a respective aperture for
contact with the transducer.
38. An acoustic wave touch panel as recited in claim 37 wherein the contact is a cantilevered contact.
39. An acoustic wave touch panel as recited in claim 37 wherein the contact is a spring.
40. An acoustic wave touch panel as recited in claim 37 wherein the second end of the contact includes a conducting plastic.
41. An acoustic wave touch panel as recited in claim 36 wherein the transducers are mounted on the substrate and extend into respective apertures of the circuit board.
42. An acoustic wave touch panel as recited in claim 36 wherein the transducers are mounted on the circuit board in the apertures.
43. An acoustic wave touch panel as recited in claim 42 wherein the transducers are electro-magnetic acoustic wave transducers.
44. An acoustic wave sensor comprising: a substrate having an acoustic wave cavity defined by an area of increased mass, the acoustic wave cavity having a surface responsive to a sensed event and a back surface opposite thereto; a transducer
mounted on the back surface of the acoustic wave cavity; and a circuit board with an aperture and a contact extending over the aperture, the circuit board being bonded onto the substrate with the aperture aligned with the acoustic wave cavity and the
contact contacting the transducer.
45. An acoustic wave sensor of claim 44 wherein the contact is a cantilevered contact.
46. An acoustic wave sensor of claim 44 wherein the contact is a spring contact.
47. An acoustic wave sensor of claim 44 wherein the contact includes a conducting elastomer contacting the transducer.
48. An acoustic wave sensor of claim 44 wherein the circuit board couples a drive signal to the transducer and picks up a signal from the transducer for analysis.
49. An acoustic wave sensor of claim 44 wherein the area of increased mass is a raised area.
50. An acoustic wave sensor comprising: an acoustic wave cavity insert having an area of increased mass defining an acoustic wave cavity, the acoustic wave cavity having a surface responsive to an event to be sensed and a back surface opposite
thereto and the insert having a periphery shaped to allow the acoustic wave cavity insert to be mounted in an aperture of a sensor support; at least one transducer mounted on the back surface of the acoustic wave cavity of the insert.
51. An acoustic wave sensor of claim 50 wherein the area of increased mass is a raised area.
52. An acoustic wave sensor of claim 51 including a contact support having an aperture aligned with the acoustic wave cavity and a contact extending from the contact support over the aperture to contact the transducer.
53. An acoustic wave sensor of claim 52 wherein the contact support has a second contact for connection to a circuit board.
54. An acoustic wave sensor of claim 52 wherein the sensor support is planar.
55. An acoustic wave sensor of claim 50 including a circuit board having an aperture and a contact extending over the aperture, the circuit board being bonded onto the substrate with the aperture aligned with the acoustic wave cavity and the
contract contacting the transducer.
56. An acoustic wave sensor of claim 52 wherein the sensor support has a cylindrical portion with a threaded outer surface.
57. An acoustic wave sensor component comprising: a stamped insert having a raised area defining an acoustic wave cavity and a periphery spaced from the acoustic wave cavity and shaped to allow the acoustic wave insert to be mounted in an
aperture of a sensor support.
58. An acoustic wave sensor component as recited in claim 57 wherein the cavity has a generally circular periphery.
59. An acoustic wave sensor component as recited in claim 57 wherein the periphery of the insert includes a flange for engaging a member of the sensor support.
60. An acoustic wave sensor component comprising: a sensor disk having a raised area with a generally circular periphery formed thereon, the raised area defining an acoustic wave cavity, the sensor disk having a periphery spaced from the
acoustic wave cavity and shaped to allow the sensor disk to be mounted in an aperture of a support for the sensor disk.
61. An acoustic wave sensor component as recited in claim 60 wherein the sensor disk is stamped.
62. An acoustic wave sensor component as recited in claim 60 wherein the raised area of the sensor disk is a truncated dome.
63. An acoustic wave sensor component as recited in claim 60 wherein the periphery of the sensor disk includes a flange for engaging a member of the sensor support.
64. An acoustic wave sensor of claim 60 wherein the sensor support is planar.
65. An acoustic wave sensor of claim 60 wherein the sensor support has a cylindrical portion with a threaded outer surface.
66. An acoustic wave sensor of claim 60 wherein the sensor support has a cylindrical portion. Description
FIELD OF THE INVENTION
The present invention relates to a touch detection circuit and method and more particularly, to a touch detection circuit and method for detecting the presence of a touch on a touch responsive surface of an acoustic wave cavity.
BACKGROUND OF THE INVENTION
There is a substantial need for finger touch actuated switches that are rugged and explosion proof, operate in the presence of liquids, have low power consumption, withstand aggressive sterilization procedures and are inexpensive. Known switches
that attempt to meet these needs but fail include the following. A Qprox switch made by Quantum Research Group senses the presence of touch through a charge transfer effect. This switch is sensitive to conductive fluids and/or an ionizing atmosphere
and can be made inoperable thereby. Further, the enclosure through which touch is sensed cannot be made of an electrically conducting material, so that metals and the like cannot be used. Piezoelectric switches such as supplied by Schurter or
Wilson-Hurd, operate by transferring finger pressure via a metal overlay to a piezoelectric element which generates a voltage when compressed. This type of switch is expensive compared to a standard membrane switch and shares the disadvantages of
membrane switches in that holes in the housing or enclosure are required to accommodate the switch. Further, the metal overlay is necessarily thin, so that the piezoelectric element is relatively unprotected against blows to the overlay. Another type
of switch shown in U.S. Pat. No. 5,149,986 is based on the absorption of sound in a glass, ball-shaped button when the button is touched. In operation, a transducer sends sound waves into the glass balls and then receives back the echoes in a sonar
type fashion. A circuit analyzes the echoes to determine whether the echoes have been reduced indicating a touch. This type of switch is relatively expensive and again requires openings in the housing or enclosure in which the switch is to be mounted.
An acoustic wave switch such as shown in U.S. Pat. No. 5,673,041 includes an ultrasonic piezoelectric transducer mounted on a surface of a substrate opposite a touch surface of the substrate. The transducer generates an ultrasonic wave that
propagates in a direction across the thickness of the substrate to the touch surface and reflects off of the touch surface back to the transducer. The ultrasonic wave appears to be a compressional wave. A touch on the touch surface changes the acoustic
reflectivity of the surface and changes the impedance of the transducer. The acoustic energy in this switch is not confined and spreads out into the plane of the substrate. As such, the ratio of the stored energy to lost or dissipated energy over a
complete cycle, referred to as the Q of the switch, is inherently low and an extremely complex touch detection circuit is required to discriminate between a touch and the absence of a touch. Moreover, the use of compressional waves in this switch is
undesirable due to their sensitivity to liquids and other contaminants which can render the switch inoperable.
Also known are acoustic wave touch panels that employ reflective gratings or arrays to reflect portions of an acoustic wave across a touch surface along parallel paths of differing lengths. These devices use a transparent substrate that can
overlay a display to provide a touch screen or the like. Examples of such touch sensors are shown in U.S. Pat. Nos. 4,645,870 and 4,700,176 which utilize surface acoustic waves. These systems are undesirable, however, because surface acoustic waves
are sensitive to liquids, sealing compounds and other contaminants that can render the panel inoperable and difficult to seal effectively. Another acoustic wave touch panel using reflective arrays is shown in U.S. Pat. No. 5,177,327. This touch panel
uses shear waves and in particular the zeroth order horizontally polarized shear wave. Although this touch position sensor is insensitive to liquids and contaminants, touch position sensors that use reflective gratings or arrays and the associated touch
detection circuitry are, in general, too expensive to use for an individual switch or for a small number of switches on a panel. Moreover, because the shear wave transducer in this latter system is mounted on a side of the panel to generate a shear wave
that propagates in the plane of the substrate, an opening in the enclosure or housing is required to accommodate the panel. U.S. Pat. No. 5,573,077 also uses zeroth order horizontally polarized shear waves, but instead of reflective gratings, discrete
transducers are used to propagate the shear waves along parallel paths extending across the substrate.
An acoustic wave switch that overcomes the above problems utilizes an acoustic wave cavity and an acoustic wave transducer to generate a resonant acoustic wave that is substantially trapped in the cavity as disclosed in U.S. patent application
Ser. No. 09/998,355 filed Nov. 20, 2001. As discussed therein, an analog touch detection circuit includes an oscillator coupled to the acoustic wave transducer wherein the oscillator is configured to oscillate in the absence of a touch. A touch on
the touch surface of the acoustic wave cavity causes the transducer impedance to drop so that the oscillator stops oscillating. The state of the oscillator is determined and when the oscillator stops oscillating, a touch is detected. This circuit
operates very well to detect a finger touch and a touch by a leather glove, for example. However, because it is desirable to detect a touch by contact of a synthetic blend glove, or the like, with the touch responsive area of the acoustic wave cavity
and at the same time to not detect a touch when water alone contacts the touch responsive area, the sensitivity level of this touch detection circuit must be set within very narrow limits to meet these two competing requirements. As a result, small
changes in the transducer impedance over time and/or with variations in temperature can result in a change in sensitivity that is outside of the requisite limits of the circuit.
Further, there is a need for a simple circuit that is not effected by drift for detecting sensed events in acoustic wave sensors other than touch detection sensors.
BRIEF SUMMARY OF THE INVENTION
In accordance with the present invention, the disadvantages of prior acoustic wave sensor circuits have been overcome. In accordance with the present invention, an acoustic wave sensor circuit utilizes a time domain method for sensing an event.
The circuit is simple and capable of automatically compensating for drift. Moreover, the circuit can distinguish between materials that have a small effect on the acoustic wave and liquids such as water or other contaminants.
In one embodiment, the circuit includes at least one transducer driven to generate a resonant acoustic wave in an acoustic wave resonator and is responsive to the acoustic wave to provide a signal representative thereof. A controller is
responsive to the signal for determining a value representing the period of time that the acoustic wave decays to a predetermined level wherein the controller compares the determined value to a reference to sense an event.
In another embodiment of the present invention, the acoustic wave sensor is in the form of a touch detection sensor or switch. In this embodiment, the circuit forms a touch detection circuit that includes at least one transducer driven to
generate an acoustic wave in an acoustic wave cavity, the transducer being responsive to the acoustic wave in the cavity to provide a signal representative thereof. A controller controls the driving of the transducer and the receipt of the acoustic wave
signal from the transducer during a sampling cycle. The controller is responsive to the transducer signal to determine a number representing the period of time that the signal received from the transducer during a sampling cycle decays to a
predetermined level. The controller compares the determined number for a sampling cycle to a touch reference to detect the presence of a touch on the acoustic wave cavity during the sampling cycle.
In accordance with another aspect of the invention, the touch detection circuit includes at least one transducer driven to generate an acoustic wave in an acoustic wave cavity during a sampling cycle, the transducer being responsive to the
acoustic wave to provide a signal representative thereof for the sampling cycle. A comparator compares the amplitude of the acoustic wave signal for a sampling cycle to a first reference to generate a pulse when the amplitude of the acoustic wave signal
is above the first reference. A counter counts the number of pulses from the comparator to provide a count for the sampling cycle. A processor compares the count for the sampling cycle to a second reference to detect a touch on the acoustic wave
cavity.
In accordance with a further aspect of the present invention, a method of detecting a touch on a touch responsive area includes generating an acoustic wave in the touch responsive area; determining a value representing the period of time that the
acoustic wave in the touch responsive area decays to a predetermined level in the absence of a touch to provide a reference; generating a subsequent acoustic wave in the touch responsive area; determining a subsequent value representing the time that the
subsequent acoustic wave decays to the predetermined level and comparing the subsequent value to the reference to determine whether the subsequent value represents a touch on the touch responsive area. To compensate for drift and other changes, the
reference can be updated periodically or in response to predetermined events.
In accordance with another aspect of the present invention, a method of detecting a malfunction of an acoustic wave switch includes generating an acoustic wave in an acoustic wave switch; providing a signal representing the acoustic wave in the
acoustic wave switch; determining a value representing the period of time that the acoustic wave decays to a predetermined level; and comparing the determined value to a malfunction reference to determine whether the switch has malfunctioned or not.
In accordance with a further feature of the present invention, a method of detecting liquid interference with an acoustic wave sensor includes generating an acoustic wave in the acoustic wave switch during each of a plurality of sampling periods. The acoustic wave being insensitive to the liquid at certain levels of the liquid and the acoustic wave being sensitive to the liquid at other levels; providing a signal representing the acoustic wave in the acoustic wave switch in each of the sampling
periods; and analyzing the signals in a predetermined number of consecutive sampling periods for variations among the signals indicative of the presence of an interfering liquid.
In accordance with a further feature of the present invention, an acoustic wave touch panel includes a substrate having a plurality of acoustic wave cavities formed therein where each acoustic wave cavity is defined by an area of increased mass.
The substrate has a back surface and opposite thereto, a surface with touch responsive areas associated with the acoustic wave cavities. A transducer is positioned adjacent the back surface of each of the acoustic wave cavities. A circuit board
includes a circuit for driving the transducers to generate an acoustic wave in each of the acoustic wave cavities. The circuit is also responsive to signals from the transducers representing the acoustic waves in the cavities to detect a touch. The
circuit board includes a plurality of apertures, wherein the circuit board is bonded on the back surface of the substrate with each aperture aligned with a respective acoustic wave cavity. In accordance with one embodiment of the present invention, an
insulator is disposed between the circuit board and the substrate. Further, a contact associated with each cavity for contacting the cavity's transducer is soldered to the circuit board so that the contact is cantilevered over the aperture aligned with
the cavity.
These and other advantages and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
BRIEF DESCRIPTION OF THE SEVERAL
VIEWS OF THE DRAWING
FIG. 1 is a block diagram illustrating the circuit of the present invention;
FIG. 2 is a cross-section of a substrate having an acoustic wave cavity formed therein with a transducer mounted on the cavity;
FIG. 3 is a cross-sectional view of a substrate with an acoustic wave cavity formed therein and an associated Electro-Magnetic Acoustic Transducer;
FIG. 4 is an illustration of an acoustic wave transducer signal for an untouched acoustic wave cavity;
FIG. 5 is an illustration of an acoustic wave transducer signal for an acoustic wave cavity that is touched by a synthetic blend glove;
FIG. 6 is an illustration of an acoustic wave transducer signal for an acoustic wave cavity that is touched by a finger;
FIGS. 7A-B illustrate a flow chart for initializing and starting a scan or sampling cycle;
FIG. 8 is a flow chart illustrating a foreground process;
FIGS. 9A-E form a flow chart illustrating a background process;
FIG. 10 is a cross-sectional view illustrating the mounting of a circuit board for the circuit of FIG. 1 on a substrate with one or more acoustic wave cavities formed therein;
FIG. 11 is a bottom view of the circuit board of FIG. 10 for a number of acoustic wave cavities;
FIG. 12 is a bottom view of the transducer contact shown in FIGS. 10 and 11;
FIG. 13 is a side view of the transducer contact of FIGS. 10-12;
FIG. 14 is a cross-sectional view illustrating a sensor disk insert for a panel with a circuit board bonded thereto;
FIG. 15 is a top view of the sensor disk of FIG. 14;
FIG. 16 is a cross-sectional view of a sensor disk in an individual sensor housing or support; and
FIG. 17 is a cross-sectional view of a sensor disk in an alternative embodiment on an individual sensor housing or support.
DETAILED DESCRIPTION OF THE INVENTION
An acoustic wave sensor 10, in accordance with the present invention, as shown in FIG. 1 includes a transducer 12, 12' for generating an acoustic wave in an acoustic wave cavity. In one embodiment as shown in FIG. 2, the transducer 12 is mounted
on the acoustic wave cavity and in a second embodiment, as shown in FIG. 3, the transducer 12' is mounted adjacent to the acoustic wave cavity.
As shown in FIGS. 2 and 3, the acoustic wave cavity 14, 14' is defined by a raised area 16, 16', the cavity extending through the thickness of the substrate 18, 18' under the surface 24 of the raised area 16, 16'. The acoustic wave cavity 14,
14' is formed in the substrate 18, 18' such that the mass per unit surface area of the cavity 14, 14' is greater than the mass per unit surface area of the substrate immediately adjacent the cavity 14, 14'. It is noted, that the acoustic wave cavity can
also be defined by an area of increased mass that is not raised above the substrate. Such cavities can be formed, for example, by depositing a thin layer of material on the surface of the substrate in an area defining the acoustic wave cavity. Such
cavities can also be formed with materials of greater mass than the substrate throughout the cavity or in a portion thereof.
The raised area 16 defining the acoustic wave cavity may be square, rectangular, or other shapes. However, in a preferred embodiment, the raised area 16 has a circular circumference. The raised area may also be dome-shaped as shown at 16' in
FIG. 3. Further, although the raised area 16, 16' is shown as an integral part of the substrate, the raised area may be formed as a separate piece such as a decal that is bonded to the substrate. In such an embodiment, the raised area may be formed of
the same material as the substrate or of a different material. Moreover, although the transducer 12 and 12' are respectively shown mounted on and adjacent a surface of the substrate opposite the raised area 16, 16', the transducer 12, 12' can be mounted
on or adjacent the raised area 16, 16' as well.
The transducer 12 may be a piezoelectric transducer mounted directly on the acoustic wave cavity 14 as shown in FIG. 2 and described in detail in U.S. patent application Ser. No. 09/998,355 filed Nov. 20, 2001 and incorporated herein by
reference. Alternatively, the transducer 12' may be an electromagnetic acoustic transducer or EMAT 12' mounted adjacent the cavity 14' as shown in FIG. 3 and described in detail in U.S. patent application Ser. No. 10/245,246 filed Sep. 17, 2002 and
incorporated herein by reference. The circuit 10 of the present invention is particularly advantageous for use with EMATs because the EMAT need only have a single coil 20 which, in conjunction with the magnet(s) 22, generates an acoustic wave in the
acoustic wave cavity 14' and which also provides a signal representing the acoustic wave. This is unlike the EMATs disclosed in U.S. patent application Ser. No. 10/245,246 which have separate drive and pick up coils. Although, it should be
appreciated that, an EMAT with multiple coils can be used with the circuit 10 of the present invention as well.
The acoustic wave cavity 14, 14' traps a standing wave or a resonant acoustic wave in the cavity 14, 14'. As such, the acoustic wave cavity 14, 14' is an acoustic wave resonator. The cavity 14, 14' can trap various types of acoustic waves. For
example, the transducer 12 can be positioned along a centerline or diameter of the cavity 14 to generate a trapped shear wave of a higher mode than the zeroth order mode in the cavity 14. Such a shear wave can also be generated by an EMAT generally
aligned with the center of the cavity 16'. However, one or more transducers can be positioned with respect to the cavity 14, 14' to generate trapped or resonant acoustic waves other than shear waves as well. It should be appreciate that, the circuit 10
of FIG. 1 is not limited to any particular type of resonant acoustic wave.
The circuit 10 includes a controller 30 that is coupled to the acoustic wave transducer 12, 12'. A capacitor 32 is connected between the transducer 12, 12' and a pair of resistors 34 and 36 wherein the resistors set the D.C. level of the
transducer signal. The controller 30 drives the transducer 12, 12' to generate an acoustic wave signal in the cavity in a first portion of a sampling cycle and in a second portion of the sampling cycle, the controller 30 is responsive to the signal from
the transducer 12, 12' representing the acoustic wave in the acoustic wave cavity to analyze the signal for a sensed event. The sensed event can be the presence of a particular component in a liquid for a liquid phase sensor, a touch on the acoustic
wave cavity 14, 14', the malfunctioning of a switch, etc. These are just a few of the events that can be sensed in accordance with the present invention.
As an example, the circuit of FIG. 10 will be described below for sensing or detecting a touch on a touch responsive surface 24 of the acoustic wave cavity 14, 14'. It should be appreciated that, as used herein, a touch on the acoustic wave
cavity refers to contact of any member, material, composition, liquid, etc. with a surface of the acoustic wave cavity, the contact producing a detectable change in the acoustic wave trapped in the acoustic wave cavity 14, 14'.
The controller 30 may be a PIC12F629 microcontroller that includes a microprocessor 40 with associated memory, a pulse generator 42, a comparator 44 and a timer or counter 46. An oscillator 49 provides a clock input to the controller, timers,
etc. The controller 30 also includes a switch 48 that is controlled by the microprocessor 40 to switch line Gp1 from an output line in the first portion of the sampling cycle to an input line in the second portion of the sampling cycle. More
particularly, in the first portion of the sampling cycle, the switch 48 couples the line Gp1 to the pulse generator 42 so that under the control of the microprocessor 40, the pulse generator 42 outputs one or more pulses to the transducer 12, 12' to
generate a resonant acoustic wave in the acoustic wave cavity 14, 14'. In the second portion of the sampling cycle, the microprocessor 40 controls the switch 48 to couple the line Gp1 to the comparator 44 so that the signal from the transducer 12, 12'
representing the acoustic wave in the acoustic wave cavity will be coupled to the comparator 44.
The transducer 12, 12' may be driven by one pulse from the controller 30 in the first portion of the sampling cycle. Alternatively, the transducer may be driven by multiple pulses, in which case the pulse frequency should be within ten to
fifteen percent of the resonant frequency of the cavity 14. Preferably, the pulse frequency is within plus or minus five percent of the cavity's resonant frequency. When the transducer 12, 12' is driven by one or several drive pulses to generate a
resonant acoustic wave in the cavity 14, 14', after the drive pulses cease to be applied to the transducer, the acoustic wave continues to resonate in the cavity but the amplitude of the wave gradually decreases over time. The voltage across the
transducer 12, representing the acoustic wave in an untouched acoustic wave cavity 14 that is driven by one or several pulses is depicted in FIG. 4. FIG. 5 illustrates the transducer signal representing the acoustic wave in an acoustic wave cavity that
is touched by a synthetic blend glove. FIG. 6 illustrates the transducer signal representing the acoustic wave in an acoustic wave cavity touched by a finger. As can be seen from FIGS. 4, 5 and 6, the acoustic wave signal in an acoustic wave cavity
that has been touched (FIGS. 5, 6) decays to a predetermined level in a shorter period of time than the acoustic wave in an untouched cavity (FIG. 4). The controller 30, as discussed below, determines a value representing the period of time that the
acoustic wave signal for a sampling cycle decays to a predetermined level and the controller 30 compares the determined value for a sampling cycle to a touch reference to detect the presence of a touch on the acoustic wave cavity during the sampling
cycle. In one embodiment of the present invention as discussed below, the value representing the period of time that the acoustic wave signal decays to a predetermined level is the number of cycles of the acoustic wave signal, during a given scan count
time of a sampling cycle, having an amplitude above a predetermined level.
More particularly, during the second portion of the sampling cycle, the acoustic wave signal from the transducer 12, 12' is coupled by the switch 48 to one input of the comparator 44. The comparator compares the acoustic wave signal to a
predetermined reference voltage input to a second input of the comparator 44 by the microprocessor/memory 40. Preferably, the reference voltage 50 is a programmable value. The output of the comparator goes high when the acoustic wave signal is above
the reference signal and the output of the comparator goes low when the acoustic wave signal falls below the reference signal. Because the acoustic wave signal is cyclical, the comparator generates an output pulse for each cycle of the acoustic wave
that is greater than the predetermined reference. The output of the comparator 44 is coupled to a counter 46 that counts the number of pulses generated during a scan count time as discussed in detail below. The number of pulses, representing the period
of time that the acoustic wave signal decays to a predetermined level represented by the reference signal 50, is applied to the microprocessor 40. The microprocessor 40 is responsive to the number output from the counter 46 to compare that number to a
second reference representing a sensed event or in the case of a touch detection circuit, a touch on the acoustic wave cavity 14, 14'.
The microprocessor 40 operates in accordance with the flow charts depicted in FIGS. 7A-B, 8 and 9A-E. As shown in FIG. 7A, when the touch detection circuit 10 is powered on, as determined at block 52, the microprocessor at block 54 initializes
various settings and variables. Thereafter, at block 56, the microprocessor begins the initialization scanning. During this initialization scanning, six to ten pulses are coupled to the transducer 12, 12' during a scan, i.e. a sampling cycle, to drive
the transducer 12, 12' to generate a resonant acoustic wave in the acoustic wave cavity. Although the transducer 12 generates a signal representing the acoustic wave in each of the scans or sampling cycles, during the initialization scanning process,
the microprocessor does not analyze the acoustic wave signal. The initialization scanning which proceeds over approximately 20 scans as depicted at block 58 allows the system to stabilize when power is first turned on. It is noted that each scan, i.e.
sampling cycle, is extremely short being on the order of 300 microseconds to 4 milliseconds so that the time that it takes to perform the 20 scans of the initialization scanning is a negligible period of time. After completing the initialization
scanning process, the microprocessor proceeds from block 58 to block 60 to begin a circuit compensation calibration routine.
The circuit compensation calibration routine compensates for current leakage in the circuit 10. This is an optional routine and may not be needed. At block 60, the microprocessor initializes the compensation scanning by setting a flag that
indicates that the compensation calibration routine is in effect. At block 62, the microprocessor applies a low signal to the output line Gp0 shown in FIG. 1. After waiting 2 msec at block 64, the microprocessor at block 66 initiates a scan or sampling
period by applying six to ten pulses to the transducer 12, 12'. At block 68, the microprocessor switches to the second portion of the scan or sampling cycle and measures the resulting count from the counter 46. This count value is saved as a
"low_side_cav" value. Thereafter, at block 70, the microprocessor applies a high signal to the output Gp0 of the controller 30. After waiting to 2 msec at block 72, the microprocessor at block 74 again initiates a scan or sampling cycle by driving the
transducer 12 with six to ten pulses. At block 76, the microprocessor moves the switch 48 so that the acoustic wave signal from the transducer is coupled to the comparator 44 and the microprocessor 40 saves the resulting count from the counter 46 as a
"high_side_cav" value. At block 78, the microprocessor subtracts "low_side_cav" from "high_side_cav." The resulting difference is saved as "threshold_adjust." From block 78, the microprocessor proceeds to block 80 and initiates ten scans to isolate one
process from another. After the ten scans have been completed at block 80, the microprocessor 40 proceeds to block 82 to start a hot level check.
The hot level check is a check for an extremely sensitive acoustic wave cavity that produces a large number of acoustic wave signal cycles above the predetermined reference value 50 when the transducer 12, 12' is driven by one or more of the
drive pulses. At block 82, the microprocessor checks for a very high signal output indicated by an overflow of the counter 46 or a count that is greater than E0 Hex. If the value of the counter 46 indicates a very high signal output, the microprocessor
proceeds from block 82 to block 84 to set a delay flag. The delay flag signals the microprocessor that the count should be delayed for a predetermined period of time to compensate for the high signal output. This delay may be accomplished by delaying
the moving of the switch 48 from the pulse generator 42 to the comparator 44 so as to reduce the number of pulses output from the comparator 44 to the counter 46 for a very sensitive acoustic wave cavity so that the counter 46 does not overflow. The
delay can also be accomplished by delaying the resetting of the counter 46 wherein the counter 46 does not start counting until the counter is reset. If the microprocessor determines at block 82 that the signal output is not too high, the microprocessor
proceeds to block 86 indicating that the signal level does not need to be compensated for. From blocks 84 or 86, the microprocessor proceeds to block 88 to initiate ten scans before beginning the next process.
At block 90, the microprocessor 40 sets a "cavity value" to the current "touch count." The "cavity value" represents a running average of an untouched state and is calculated as described below. The "touch count" is the count from the counter 46
generated during the scan count time for one sampling cycle or scan. At block 92, the microprocessor then begins the standard scanning, i.e. sampling cycle. In particular, at block 92, the microprocessor 40 controls the pulse generator 42 to provide,
for example, six to ten pulses to the transducer 12, 12' so as to drive the transducer to generate an acoustic wave in the acoustic wave cavity for one sampling cycle. At block 94, the software or firmware splits into a foreground process and a
background process. The foreground process as depicted in FIG. 8 is continuously running but is interrupted by a timer interrupt that causes the background process depicted in FIGS. 9A-E to be implemented.
As shown in FIG. 8, the foreground process or routine begins at block 96. At block 96, the microprocessor 40 looks for a request for recalibration. If a request for recalibration flag has not been set, the microprocessor 96 loops back to again
monitor for a request. When a request has been posted, the microprocessor proceeds from block 96 to block 98 to shut down the normal scanning operation which began at block 92. Thereafter, at block 99, the microprocessor re-implements the circuit
calibration routine depicted in FIG. 7A at blocks 60-78. After finishing the circuit calibration routine, the microprocessor proceeds to block 92 to resume the standard scanning operation.
The background process or routine depicted in FIGS. 9A-E starts when a timer 1 interrupt is generated. The timer 1 interrupt is generated at the end of the scan count time for a given sampling cycle. At block 100, the microprocessor 40 saves
the "touch count" which, again, is the number of pulses counted by the counter 46 for a given scan, i.e. sampling cycle during the scan count time. At block 102, the microprocessor 40 determines whether the counter 46 has overflowed and if so, the
microprocessor 40 sets the hot level check flag. This is a re-check for the hot level to again enable a highly sensitive acoustic wave cavity to be compensated for. Thereafter, at block 104, the microprocessor looks at the previous output on line Gp0.
If the previous output was a 1 indicating a touch, the microprocessor 40 adds the "threshold_adjust" value determined at block 78 to the current threshold. It is noted, that if no adjustment is needed, the value of "threshold_adjust" will be zero. At
block 106, the microprocessor 40 determines whether the "touch count" saved at block 100 is less than the current threshold. The current threshold is used as a touch reference. The current threshold may be a fixed value but in a preferred embodiment,
it is a determined value to compensate for drift or other changes. If the "touch count" value is less than the threshold, i.e. touch reference, as determined at block 106, the microprocessor at block 110 sets a "touch current" flag to 1. If the "touch
count" value is not less than the threshold as determined at block 106, the microprocessor 40 at block 108 sets the "touch current" flag to 0. Thereafter, the microprocessor proceeds from blocks 108 and 110 to block 112.
At blocks 112, 114 and 118, the microprocessor 40 determines whether the "touch count" values for ten consecutive scans or sampling periods have indicated a touch or a no touch condition. The microprocessor 40 looks for ten consecutive touch
indications before registering an actual touch so as to prevent a touch from being indicated on the output Gp0 as a result of a transient contact with an acoustic wave cavity. Similarly, the microprocessor 40 looks for ten no touch indications before
registering a no touch condition on Gp0 for stability of the detection process. More particularly, at block 112, the microprocessor 40 determines whether the "touch current" value set at either blocks 108 or 110 matches the "touch current" value from
the previous scan. If so, the microprocessor 40 proceeds from block 112 to block 114 to increment a touch current count value. Thereafter, at block 118, the microprocessor 40 determines whether a touch current count matches a touch hysteresis value.
The touch hysteresis value represents the number of consecutive touch values that must be detected at block 108 before an actual touch is reported on the output Gp0. In this example, the touch hysteresis value is set equal to ten. If the touch current
value does not match the previous touch current value as determined at block 112, the microprocessor proceeds to block 116 to reset the touch current count. From block 116, the microprocessor proceeds to block 128 to trigger a new sampling cycle, i.e.
new scan, by sending out the preprogrammed number of pulses to drive the transducer 12, 12'. Similarly, if the touch hysteresis value has not been met as determined at block 118, the microprocessor 40 proceeds to block 128 to trigger a new sampling
cycle.
When the touch hysteresis value has been met indicating ten consecutive touch or ten consecutive no touch detections at blocks 108 and 110, the microprocessor proceeds from block 118 to block 120. At block 120, the microprocessor 40 determines
whether the system is in the diagnostic mode and if so, the microprocessor proceeds to block 124 to report various diagnostic data as discussed in detail below. If the system is not in the diagnostic mode, the microprocessor 40 proceeds from block 120
to block 122. At block 122, the microprocessor 40 provides either a touch or a no touch signal on Gp0 based on whether the ten consecutive scans indicated a touch or no touch condition. From blocks 122 or 124, the microprocessor 40 proceeds to block
126 to determine whether the report was of a touch or a no touch condition. If a touch was reported, the microprocessor 40 proceeds from block 126 to block 128. If the condition reported was a no touch condition, the microprocessor proceeds to block
144 to begin a process for updating the "cavity value" which represents a running average touch count value for an untouched acoustic wave cavity. As discussed below, the "cavity value" determines the threshold or touch reference to be used to detect a
touch or no touch condition.
If a touch was reported at block 122, the microprocessor proceeds from block 126 to block 128 as shown in FIG. 9D. At block 128, the microprocessor 40 sends out the programmed number of pulses to drive the transducer 12, 12' to generate an
acoustic wave signal in the acoustic wave cavity for a scan, i.e. one sampling cycle. Although as shown at block 120, the program number of pulses is typically between six to ten pulses. It should be apparent that more than ten pulses can be used to
generate a resonant acoustic wave in the acoustic wave cavity during the first portion of the sampling cycle. After the microprocessor 40 controls the pulse generator 42 to output the programmed number of pulses via the switch 48 to the transducer 12,
12' for the first portion of a scan or sampling cycle, the microprocessor proceeds to block 130. At block 130, the microprocessor 40 loads, timer 1, which is an internal timer with the scan count time. The scan count time is the time during which the
counter 46 is operable to count the output pulses from the comparator 44. Thereafter, at block 132, the microprocessor 40 clears the timer interrupt flag to allow a new interrupt to occur. The microprocessor 40 then proceeds from block 132 to block 134
to determine whether a hot level delay flag has been set. If so, the microprocessor at block 136 delays the start of the counter 46 by the programmed delay period so as to compensate for a highly sensitive acoustic wave cavity and to prevent an overflow
of the counter 46. If the hot level delay flag has not been set as determined at block 134, the microprocessor 40 proceeds directly to block 138. The microprocessor 40 also proceeds from block 136 to block 138. At block 138, the microprocessor resets
the counter 46, also designated timer 0. As soon as the counter 46 is reset to zero, the counter 46 starts counting the pulses output from the comparator 44. At block 140, the microprocessor 40 turns on the timer 1 for timing the scan count time.
Thereafter, at block 142, the microprocessor returns from the current background process to continue the foreground process depicted in FIG. 8. This foreground process again will be interrupted when the timer 1 generates the timer 1 interrupt indicating
that the scan count time for the current sampling cycle has been completed so that a new scan or sampling cycle can be started. As discussed above, the scan count time represents the second portion of the sampling cycle wherein the counter 46 is
counting the pulses generated by the comparator 44.
Returning to FIG. 9B, if a no touch condition was reported at block 124 on the output Gp0, the microprocessor proceeds from block 126 to block 144 so as to update the "cavity value," i.e. the running average touch count value for an untouched
acoustic wave cavity, so as to enable the touch threshold to be updated as well. The touch threshold is updated so as to compensate for drift due to changes in temperature, etc. At block 144, the microprocessor 40 determines whether the set level flag
was previously set. The set flag is set to prevent a touch on the acoustic wave cavity during the initialization process from causing an error. If the flag was set, the microprocessor at block 146 sets the "cavity value" to the "touch count" measured
for the current scan. Thereafter, at block 148, the microprocessor determines whether the hot level check flag was set and if so, at block 150 the microprocessor 40 calls the hot level check routine. The hot level check routine is implemented by the
microprocessor at block 152 and if the timer 0 overflow flag has been set as a result of the hot level check routine or the touch count is greater than E0 Hex, then the microprocessor 40 sets the hot level delay flag at block 153. From either blocks 150
or 153, the microprocessor proceeds to block 154.
At block 154, the microprocessor 40 compares the "touch count" to the "cavity value." If the difference between the "touch count" and "cavity value" is greater than or equal to a predefined difference value, for example 5, then the microprocessor
assumes that a change in the "cavity value" is needed at block 156. If a change is needed, the microprocessor at block 156 sets the "cavity value" to the current "touch count." Thereafter, at block 158, the microprocessor 40 compares the "touch count"
to the "cavity value." If the two values are not equal, at block 160, the microprocessor determines the cavity direction. The cavity direction is up if the current "touch count" is greater than the "cavity value" and the direction is down if the "touch
count" is less than the "cavity value." At block 162, the microprocessor 40 calculates the difference between the current "touch count" and the "cavity value." A "second difference count" is then incremented at block 164. The microprocessor at block
166, looks at the "second difference count" to determine which comparison value is to be used in the next step. If the "second difference count" is less than a "second difference compare" value which may be, for example, 48, the microprocessor proceeds
from block 166 to block 168. However, if the "second difference count" is equal to the "second difference compare" value, i.e. 48, the microprocessor proceeds from block 166 to block 170. If the path from block 166 to block 168 is taken, the
microprocessor at block 168 sets a difference compare to a primary level so that the microprocessor selects a "compare value" of for example 2 for a stainless steel acoustic wave cavity or 4 for an aluminum acoustic wave cavity, the compare value varying
depending upon the material of the acoustic wave cavity 14. If the path from block 166 to block 170 is taken, at block 170, the microprocessor sets the difference compare to a secondary level. When set to the secondary level, the "compare value" is a
calculated value and in particular is set equal to one-half of the "cavity value." From block 170, the microprocessor proceeds to block 172 to reset the "second difference count" to 0. The "second difference" correction allows slow adjustments to be
made for larger than normal long term errors in the cavity value setting. From either blocks 172 or blocks 168, the microprocessor proceeds to block 174. At block 174, the microprocessor 40 compares the difference calculated at blocks 162 between the
"touch count" and the "cavity value" to the "compare value" selected at either blocks 168 or block 170. If the difference calculated at block 162 is less than the selected compare value, the microprocessor proceeds from block 174 to block 176 to
increment or decrement the cavity value depending on the cavity value direction set at block 160. In particular, if the cavity direction is up, the "cavity value" will be incremented at block 176. If the cavity direction set at block 160 is down, the
"cavity value" will be decremented by one at block 176. This process at block 176 is a method of changing the "cavity value" so that it represents a running average of the touch count for an untouched acoustic wave cavity 14. It should be apparent that
other methods of generating an average of the touch count can be used as well.
From block 176, the microprocessor proceeds to block 178 to update the threshold value representing the touch threshold from a look up table that is associated with the material forming the acoustic wave cavity 14. In a preferred embodiment, the
look up table stores a number of threshold values corresponding to different "cavity values" or different cavity value ranges so that the threshold value will be selected based upon the "cavity value" determined at block 176. In this way, the touch
threshold is updated so as to account for drift caused by temperature changes, etc. It is noted that instead of using a look up table, the threshold can be a value that is calculated as a function of the "cavity value." From block 178, the microprocessor
40 proceeds to block 180 so as to clear the "touch count," resetting the "touch count" value to zero in order for a new touch condition or no touch condition to be reported Gp0. If the microprocessor determines at block 174 that the difference
calculated at block 162 is greater than the "compare value" determined at blocks 168 or 170, the "cavity value" and the threshold value are not updated. Instead, the microprocessor 40 proceeds directly to block 180 from block 174. From block 180, the
microprocessor 40 proceeds to block 128 to trigger a new sampling cycle, i.e. a new scan as discussed above.
If the microprocessor 40 is in the diagnostic mode as determined at block 120, the diagnostic data reported at block 124, on an output pin of the controller 30 includes the following: the current touch or no touch condition of the acoustic wave
cavity 14; the current value of the "touch count"; the current "cavity value"; the current value of the threshold; the low side cavity count determined at block 68; the high side cavity count as determined at block 76; and the "threshold adjustment"
determined at block 78. The diagnostic data may be processed by another processor to which the controller 30 is coupled or the data may be transmitted to a remote computer for processing. Further, the microprocessor 40 may do various diagnostics on the
data as well. In particular, a processor may compare the current touch count to a malfunction reference value to determine whether the switch has malfunctioned. For example, if the touch count is too high or too low signifying a malfunction, the
processor performing the diagnostics generates a signal representing the malfunction of a particular switch. In response to the malfunction signal, a visual indication is provided by a display or the lighting of an LED or the like associated with the
switch to indicate that the switch has malfunctioned. Alternatively, or in addition thereto, the processor performing the diagnostics may compare the "cavity value" representing an average of the "touch count" values to a reference to determine whether
the switch has malfunctioned. The processor may also perform a diagnostic test wherein a number of touch count values measured over consecutive sampling cycles or scans are compared to a first reference to determine whether the values are greater than
the first reference and are also compared to a second reference to determine whether the values are less than the second reference. If the touch count values are either greater than the first reference or less than the second reference, then a
malfunction will be indicated. This type of diagnostic is useful in determining whether there is a contaminant on an acoustic wave cavity such that the cavity registers a touch condition for a period of time that is much longer than a typical touch on
the acoustic wave cavity. In a further diagnostic test, the processor may determine a trend in the "touch count" values measured over a period of time or a trend in the "cavity values" measured over a period of time to determine a trend that may be
indicative of a switch malfunction or of an impending switch malfunction. As a result of each of the diagnostics, the processor provides a signal indicative of the switch malfunction, the signal being used to control a display or light, an LED or the
like to provide an indication that a switch has malfunctioned. It is noted, that the signal indicating switch malfunction may also be used to disable one switch and enable another switch or to change the functions controlled by the malfunctioning switch
to a properly functioning switch.
The microprocessor 40 or another processor as discussed above can also determine whether there is liquid interference with an acoustic wave switch/sensor. Although shear waves are generally insensitive to liquids such as water, it has been
discovered that when a shear wave is trapped in an acoustic wave cavity, other types of acoustic waves can also be generated in the cavity wherein these other acoustic waves are sensitive to water at levels equal to one-half of the wavelength of the
acoustic wave. In the presence of rain, or the like where the level of water on an acoustic wave cavity is varying, the "touch count" values over consecutive sampling cycles will flicker such that in one sampling cycle the touch count will represent,
for example, a touch, and in the next sampling cycle, the touch count will represent a no-touch condition then, for example, two touch conditions followed by a no-touch condition and so on with the level of the touch count varying with the water level.
The microprocessor 40 or another processor can analyze the touch count over consecutive sampling periods for variations among the values indicative of the presence of an interfering liquid. Moreover, the amplitude of the transducer signal can be
analyzed as well to determine whether a flickering condition, indicative of the presence of an interfering liquid, is present.
The circuit 10 may be used to drive and respond to a number of acoustic wave switches/sensors. For example, 16 acoustic wave transducers, each associated with a different acoustic wave cavity, can be coupled to one controller 30. For
applications such as a computer keyboard having more than 16 acoustic wave switches, one master processor may be coupled to and control a number of controllers 30, each of which is in turned coupled to a number of acoustic wave transducers. Depending on
the configuration of the controller used, a multiplexor may or may not be needed to handle multiple acoustic wave transducers. If a multiplexor is used, the multiplexor is preferably disposed between the capacitor 32 and the transducers 12, 12'.
In accordance with another aspect of the present invention, the circuit 10 is contained on a printed circuit board 200 that is bonded to a surface of the substrate 18 in which the acoustic wave cavity is formed. In this configuration, the entire
acoustic wave switch or sensor panel is extremely compact and rugged, the printed circuit board adding strength to the switch/sensor panel that is comprised of the substrate 18 with one or more acoustic wave cavities formed therein. The printed circuit
board 200 includes a plurality of apertures 202 that are slightly larger than the surface area of the acoustic wave cavity surface on which the transducer 12 is mounted. When the circuit board 200 is bonded to the substrate 18 with the apertures 202
aligned with the cavities 14, the circuit board 200 will not contact the acoustic wave cavity. Since the circuit board 200 does not contact the acoustic wave cavity 14, the circuit board 200 does not affect the operation of the acoustic wave cavity. A
cantilevered contact 204 has a first end 206 soldered to the circuit board on one side of the aperture 202. The other end 208 of the cantilevered 204 rests on the circuit board 200 on an opposite side of the aperture 202. A portion 210 of the
cantilevered contact 204 between the ends 206 and 208 is arched downward, in the manner of a shallow bowl or spoon. The contact is preferably formed of a material such as beryllium copper with gold flash plating. As shown in FIGS. 12 and 13, a
conductive elastomer drop 212 is disposed on the bottom surface portion 210 of the contact in a position so that when the circuit board is properly mounted on the substrate 18, the elastomer 212 contacts the transducer 12. More particularly, upon
mounting the circuit board 200 with the apertures 202 aligned with a respective acoustic wave cavity 14, the contact 204 flexes like a cantilevered spring and the conductive elastomer compresses when it contacts the transducer 12. The conductive
elastomer 212 provides a seal between the contact and the transducer 12 and further prevents abrasion of the metal contact 204 against the transducer 12. In a preferred embodiment, the printed circuit board 200 is bonded onto the substrate 18 with an
insulator 214 disposed between the circuit board 200 and the substrate 18. In a preferred embodiment, the insulator is a 0.005 inch mylar insulator that has an adhesive coated on an upper and lower surface of the insulator so that the insulator bonds
the circuit board 200 to a surface of the substrate 18 opposite the touch responsive surface 24 of the acoustic wave cavity 14. FIG. 11 illustrates a top view of the printed circuit board mounted on the back side of the substrate 18 having a number of
acoustic wave cavities 14 formed therein. It is noted, that for an acoustic wave cavity having a diameter of 0.350 inch, the diameter of the aperture 202 in the circuit board associated with each of the cavities need only have a diameter of on the order
of 0.375 inch so as to provide a slight clearance for the acoustic wave cavity. It is noted that when EMATS are used, the EMAT may be mounted on the circuit board in apertures that do not extend through the thickness of the substrate but only through a
portion thereof.
In accordance with a further aspect of the present invention as shown in FIGS. 14-17, the acoustic wave cavity 14 is formed in a substrate that is an insert 220, wherein the insert 220 can be mounted in an aperture of a sensor support. The
insert 220 is a stamped disk formed with a raised area 224 that defines an acoustic wave cavity 14 as discussed above. Because the disk 220 is a stamped piece of metal the sensor disk 220 can be manufactured very cheaply. In a preferred embodiment, the
raised area has the shape of a truncated dome with an outer, circular periphery 226 with a diameter of, for example, 0.30 inch. The diameter of the periphery 228 of the truncated portion of the dome can vary. The periphery 230 of the sensor disk insert
220 is spaced from the acoustic wave cavity 14 and has a diameter of, for example, 0.50 inch. The sensor disk periphery 230 also includes a flange 232 extending thereabout so as to engage a corresponding flange 234 on the sensor support 222 of FIG. 14.
The diameter of the periphery's flange portion may be, for example, 0.58 inch. The sensor disk may be very thin such as on the order of 0.0650 inch where the height of the raised area 224 is as described in U.S. patent application Ser. No. 09/998,355
filed Nov. 20, 2001 and incorporated herein by reference.
In FIG. 14, the support 222 for the sensor disk 220 is planar and may be a panel, plate or the like having an aperture to receive the sensor disk. The periphery of the sensor disk is preferably secured in the support 222 by an adhesive/sealant.
The circuit board 200 is then bonded to a peripheral bottom portion of the sensor disk 220 and the support 222 by means of an insulator 214 with an adhesive coating on both of its surfaces. When bonded, the aperture 202 in the circuit board is aligned
with the acoustic wave cavity 14 and the contact 204 positively contacts the transducer 12 as discussed above.
In the alternative embodiments shown in FIGS. 16 and 17, the support for the sensor disk has a cylindrical body. More particularly, as shown in FIG. 16, the sensor disk 220 is mounted in an aperture of a head portion 240 of a screw-like support
242. The support 242 has a cylindrical body with threads 244 on at least a portion of an outer surface thereof. The sensor formed of the sensor disk 229 and support 242 is readily mounted in any member having an aperture that accommodates the
cylindrical body and can be maintained therein by means of a nut or the like that engages the threads 244. In a preferred embodiment, the support 242 is hollow so that a contact such as the contact 204 can be disposed therein. As shown, the contact is
mounted on a circuit board washer 246. The circuit board washer 246 is annular in shape, having an aperture aligned with the acoustic wave cavity 14. The washer is bonded to a peripheral portion of a back surface of the sensor disk spaced from the
acoustic wave cavity 14 and to a back or inner portion of the head 240 of the support 242. The circuit board washer 246 provides a connection from the contact 204, and thus the transducer 12, to pins or a connector carried on the washer where the washer
pins/connector is coupled to leads extending through the hollow portion of the support and to a remote circuit board via the leads. Alternatively, the washer pins/connector provide a direct connection to a circuit board that is mounted in the hollow
portion of the support 242 as shown below with respect to FIG. 17.
In the embodiment of FIG. 17, the support 250 has a cylindrical body 252 and a flange 254 at one end for engaging the sensor disk 220. The flange 254 forms an aperture in the support 250 into which the sensor disk portion containing the acoustic
wave cavity 14 extends. The transducer 12 is engaged by a spring pin contact 256 that connects the transducer 12 to the circuit board 258. In a preferred embodiment, the circuit board 258 rests on a lip formed on an inner surface of the hollow portion
of the support. The lip may be formed as depicted at 260 in FIG. 16. A second spring pin 262 forms a connection to ground.
The sensor disk can be formed of any material capable of supporting a trapped or resonant acoustic wave such as a metal, ceramic, etc. The support 222, 224, 250 may be formed of any material desired for the application for which the sensor is to
be used.
Many modifications and variations of the present invention are possible in light of the above teachings. Thus, it is to be understood that, within the scope of the appended claims, the invention may be practiced otherwise than as described
hereinabove.
* * * * *
To top
|
IT. Expert System.
Java Standard Edition (SE)
TextComponent
java.awt
Class TextComponent
• All Implemented Interfaces:
ImageObserver, MenuContainer, Serializable, Accessible
Direct Known Subclasses:
TextArea, TextField
public class TextComponent
extends Component
implements Accessible
The TextComponent class is the superclass of any component that allows the editing of some text.
A text component embodies a string of text. The TextComponent class defines a set of methods that determine whether or not this text is editable. If the component is editable, it defines another set of methods that supports a text insertion caret.
In addition, the class defines methods that are used to maintain a current selection from the text. The text selection, a substring of the component's text, is the target of editing operations. It is also referred to as the selected text.
Since:
JDK1.0
See Also:
Serialized Form
• Field Detail
• textListener
protected transient TextListener textListener
• Method Detail
• enableInputMethods
public void enableInputMethods(boolean enable)
Enables or disables input method support for this text component. If input method support is enabled and the text component also processes key events, incoming events are offered to the current input method and will only be processed by the component or dispatched to its listeners if the input method does not consume them. Whether and how input method support for this text component is enabled or disabled by default is implementation dependent.
Overrides:
enableInputMethods in class Component
Parameters:
enable - true to enable, false to disable
Since:
1.2
See Also:
Component.processKeyEvent(java.awt.event.KeyEvent)
• addNotify
public void addNotify()
Makes this Component displayable by connecting it to a native screen resource. This method is called internally by the toolkit and should not be called directly by programs.
Overrides:
addNotify in class Component
See Also:
removeNotify()
• setText
public void setText(String t)
Sets the text that is presented by this text component to be the specified text.
Parameters:
t - the new text; if this parameter is null then the text is set to the empty string ""
See Also:
getText()
• getText
public String getText()
Returns the text that is presented by this text component. By default, this is an empty string.
Returns:
the value of this TextComponent
See Also:
setText(java.lang.String)
• getSelectedText
public String getSelectedText()
Returns the selected text from the text that is presented by this text component.
Returns:
the selected text of this text component
See Also:
select(int, int)
• isEditable
public boolean isEditable()
Indicates whether or not this text component is editable.
Returns:
true if this text component is editable; false otherwise.
Since:
JDK1.0
See Also:
setEditable(boolean)
• setEditable
public void setEditable(boolean b)
Sets the flag that determines whether or not this text component is editable.
If the flag is set to true, this text component becomes user editable. If the flag is set to false, the user cannot change the text of this text component. By default, non-editable text components have a background color of SystemColor.control. This default can be overridden by calling setBackground.
Parameters:
b - a flag indicating whether this text component is user editable.
Since:
JDK1.0
See Also:
isEditable()
• getBackground
public Color getBackground()
Gets the background color of this text component. By default, non-editable text components have a background color of SystemColor.control. This default can be overridden by calling setBackground.
Overrides:
getBackground in class Component
Returns:
This text component's background color. If this text component does not have a background color, the background color of its parent is returned.
Since:
JDK1.0
See Also:
setBackground(Color)
• setBackground
public void setBackground(Color c)
Sets the background color of this text component.
Overrides:
setBackground in class Component
Parameters:
c - The color to become this text component's color. If this parameter is null then this text component will inherit the background color of its parent.
Since:
JDK1.0
See Also:
getBackground()
• getSelectionStart
public int getSelectionStart()
Gets the start position of the selected text in this text component.
Returns:
the start position of the selected text
See Also:
setSelectionStart(int), getSelectionEnd()
• setSelectionStart
public void setSelectionStart(int selectionStart)
Sets the selection start for this text component to the specified position. The new start point is constrained to be at or before the current selection end. It also cannot be set to less than zero, the beginning of the component's text. If the caller supplies a value for selectionStart that is out of bounds, the method enforces these constraints silently, and without failure.
Parameters:
selectionStart - the start position of the selected text
Since:
JDK1.1
See Also:
getSelectionStart(), setSelectionEnd(int)
• getSelectionEnd
public int getSelectionEnd()
Gets the end position of the selected text in this text component.
Returns:
the end position of the selected text
See Also:
setSelectionEnd(int), getSelectionStart()
• setSelectionEnd
public void setSelectionEnd(int selectionEnd)
Sets the selection end for this text component to the specified position. The new end point is constrained to be at or after the current selection start. It also cannot be set beyond the end of the component's text. If the caller supplies a value for selectionEnd that is out of bounds, the method enforces these constraints silently, and without failure.
Parameters:
selectionEnd - the end position of the selected text
Since:
JDK1.1
See Also:
getSelectionEnd(), setSelectionStart(int)
• select
public void select(int selectionStart,
int selectionEnd)
Selects the text between the specified start and end positions.
This method sets the start and end positions of the selected text, enforcing the restriction that the start position must be greater than or equal to zero. The end position must be greater than or equal to the start position, and less than or equal to the length of the text component's text. The character positions are indexed starting with zero. The length of the selection is endPosition - startPosition, so the character at endPosition is not selected. If the start and end positions of the selected text are equal, all text is deselected.
If the caller supplies values that are inconsistent or out of bounds, the method enforces these constraints silently, and without failure. Specifically, if the start position or end position is greater than the length of the text, it is reset to equal the text length. If the start position is less than zero, it is reset to zero, and if the end position is less than the start position, it is reset to the start position.
Parameters:
selectionStart - the zero-based index of the first character (char value) to be selected
selectionEnd - the zero-based end position of the text to be selected; the character (char value) at selectionEnd is not selected
See Also:
setSelectionStart(int), setSelectionEnd(int), selectAll()
• selectAll
public void selectAll()
Selects all the text in this text component.
See Also:
select(int, int)
• setCaretPosition
public void setCaretPosition(int position)
Sets the position of the text insertion caret. The caret position is constrained to be between 0 and the last character of the text, inclusive. If the passed-in value is greater than this range, the value is set to the last character (or 0 if the TextComponent contains no text) and no error is returned. If the passed-in value is less than 0, an IllegalArgumentException is thrown.
Parameters:
position - the position of the text insertion caret
Throws:
IllegalArgumentException - if position is less than zero
Since:
JDK1.1
• getCaretPosition
public int getCaretPosition()
Returns the position of the text insertion caret. The caret position is constrained to be between 0 and the last character of the text, inclusive. If the text or caret have not been set, the default caret position is 0.
Returns:
the position of the text insertion caret
Since:
JDK1.1
See Also:
setCaretPosition(int)
• getListeners
public <T extends EventListener> T[] getListeners(Class<T> listenerType)
Returns an array of all the objects currently registered as FooListeners upon this TextComponent. FooListeners are registered using the addFooListener method.
You can specify the listenerType argument with a class literal, such as FooListener.class. For example, you can query a TextComponent t for its text listeners with the following code:
TextListener[] tls = (TextListener[])(t.getListeners(TextListener.class));
If no such listeners exist, this method returns an empty array.
Overrides:
getListeners in class Component
Parameters:
listenerType - the type of listeners requested; this parameter should specify an interface that descends from java.util.EventListener
Returns:
an array of all objects registered as FooListeners on this text component, or an empty array if no such listeners have been added
Throws:
ClassCastException - if listenerType doesn't specify a class or interface that implements java.util.EventListener
Since:
1.3
See Also:
getTextListeners()
• processTextEvent
protected void processTextEvent(TextEvent e)
Processes text events occurring on this text component by dispatching them to any registered TextListener objects.
NOTE: This method will not be called unless text events are enabled for this component. This happens when one of the following occurs:
• A TextListener object is registered via addTextListener
• Text events are enabled via enableEvents
Note that if the event parameter is null the behavior is unspecified and may result in an exception.
Parameters:
e - the text event
See Also:
Component.enableEvents(long)
• paramString
protected String paramString()
Returns a string representing the state of this TextComponent. This method is intended to be used only for debugging purposes, and the content and format of the returned string may vary between implementations. The returned string may be empty but may not be null.
Overrides:
paramString in class Component
Returns:
the parameter string of this text component
• getAccessibleContext
public AccessibleContext getAccessibleContext()
Gets the AccessibleContext associated with this TextComponent. For text components, the AccessibleContext takes the form of an AccessibleAWTTextComponent. A new AccessibleAWTTextComponent instance is created if necessary.
Specified by:
getAccessibleContext in interface Accessible
Overrides:
getAccessibleContext in class Component
Returns:
an AccessibleAWTTextComponent that serves as the AccessibleContext of this TextComponent
Since:
1.3
Content
Android Reference
Java basics
Java Enterprise Edition (EE)
Java Standard Edition (SE)
SQL
HTML
PHP
CSS
Java Script
MYSQL
JQUERY
VBS
REGEX
C
C++
C#
Design patterns
RFC (standard status)
RFC (proposed standard status)
RFC (draft standard status)
RFC (informational status)
RFC (experimental status)
RFC (best current practice status)
RFC (historic status)
RFC (unknown status)
IT dictionary
License.
All information of this service is derived from the free sources and is provided solely in the form of quotations. This service provides information and interfaces solely for the familiarization (not ownership) and under the "as is" condition.
Copyright 2016 © ELTASK.COM. All rights reserved.
Site is optimized for mobile devices.
Downloads: 229 / 159133501. Delta: 0.04496 с
|
Jump to content
Search the Community
Showing results for tags 'Win7'.
• Search By Tags
Type tags separated by commas.
• Search By Author
Content Type
Forums
• General
• Announcements and Site News
• Administration
• AutoIt v3
• AutoIt Help and Support
• AutoIt Technical Discussion
• AutoIt Example Scripts
• Scripting and Development
• Developer General Discussion
• Language Specific Discussion
• IT Administration
• Operating System Deployment
• Windows Client
• Windows Server
• Office
Categories
• AutoIt Team
• Beta
• MVP
• AutoIt
• Automation
• Databases and web connections
• Data compression
• Encryption and hash
• Games
• GUI Additions
• Hardware
• Information gathering
• Internet protocol suite
• Maths
• Media
• PDF
• Security
• Social Media and other Website API
• Windows
• Scripting and Development
• IT Administration
• Operating System Deployment
• Windows Client
• Windows Server
• Office
Find results in...
Find results that contain...
Date Created
• Start
End
Last Updated
• Start
End
Filter by number of...
Joined
• Start
End
Group
Member Title
Location
WWW
Interests
Found 16 results
1. Hi, I have a very strange problem concerning MouseClick function. I need to start Control Panel, navigate it on the Display Section (Adjust screen resolution link), click on it, and from the next Dialog choose Intel Graphic tool tab and navigate into it when it opens. I wasn't using MouseClick() at first when I tried to use Control IDs, but I was fed up with the Autoit Window Info poor and inaccurate info (It flickers and the moment I click on the control the control ID and class disappear) so I ended up choosing the easiest way. The code I'm posting worked OK until two weeks ago, the mouse clicks were accurately performed and the Script reached the end with no errors...and I was happy. All of a sudden, between one try and the other, I noticed the cursor not flying exactly where it was supposed to, namely to the Control Panel ->Display->Adjust screen resolution link but it clicked some 30 pixels below and some 30 pixels to the left, choosing obviously and undesired function and from that point it screwed the whole thing up. And from that moment onward, it seems I can no longer regain the mouse to click on that sequence. Could it be because my Control Panel ->Display form moved slightly from one test to another and therefore I got that small offside? If you believe this is the reason, I should then re position the Control Panel ->Display window to 0,0 and recalculate all the clicks. do you have a suggestion? Thanks a lot Dave RotateDisplays.au3
2. I need to open an INTEL Graphic Tool clicking on a Win7 Tray Icon. This icon is not shown on the Win7 Tray but it is shown once you click on a button that shows a little arrow-up. This button opens up an extension of the tray and there is my INTEL Graphic Tool Icon. The first ControlClick('[Class:Shell_TrayWnd]', '', 1502 ) at line 26 of my source code (Rotatedisplays.au3) works fine as it clicks on the up-arrow shown on the uparrowfirst Menu.jpg picture and opens up an extension of the tray. Then I'm trying to click on the INTEL Graphic Tool Icon which is the first blue icon (up-left) of the tray extension but I failed all my attempts. Can somebody help me out? Thanks Dave RotateDisplays.au3
3. I saw a post dated 2013 about WinSetTitle not working in Win7 64bit. No answer there for me. I am trying to set the title of a window, the function returns success and the title is changed for about 50 ms and then reverts back to its original value. #RequireAdmin makes no difference in operation. I have tried using the handle, the title and the class to define the window. Operation is the same for all three ways. EG: WinSetTitle("Old Title", "", "New Title") WinSetTitle("[Class:Class name]","","New Title") WinSetTitle(handle,"","New Title") ;======================================================================================= All functions report success. WinActivate("PxxCXpbHG", "Text") WinSetTitle("PxxCXpbHG ", "Text","New title") $M1=WinGetTitle("[ACTIVE]","") sleep (100) $M2=WinGetTitle("[ACTIVE]","") MsgBox(0,"", $M1 & " " & $M2) ;------------------> "New Title" "PxxCXpbHG" If I change Sleep to 50 , then it is "New Title", "New Title" so somewhere between 50 and 100 ms it gets changed back,but by what?? Thanks for any help in this matter.
4. A few months ago I tried compiling scripts on Windows 7 x64 using NomadMemory. Everywhere I looked no one could figure out why _memoryRead() would only return 0s. The best advice that would be given is set debug privileges. At the time I just continued compiling my scripts on Vista x64 and accepted there wasn't a solution. However, a few months back I shared my code to a few people whom were using Windows 7 x64 and had to figure out why the scripts were not working. Here is what I found. Anything typecast as variable1 would immediately convert to 64 bit representation, however, if typecast instead as variable2 would not. variable1 = "0xVALUE" ;Bad, auto-converts to x64 representation variable2 = hex("VALUE") ;Good, stays as needed for x32 So i converted every instance of Variable = "0xVALUE" accordingly. The scripts still were not reading memory, but I was able to isolate the new problem, NomadMemory would return 64 bit representation for every int value. Floats, Bytes, character arrays, etc were working fine (inherently are the same length), but int, uint, etc were not. The workaround for this was replacing every _MemoryRead() with a function Func _NewMemRead($Addr1, $Proc1, $type1) If $type1 = "int" Then ;I only used int, if you use uint or any other integer representation, add them in here Return (Dec(Hex(StringRegExpReplace(_MemoryRead($Addr1, $Proc1, $type1), "00000000", "", 1)))) Else Return _MemoryRead($Addr1, $Proc1, $type1) EndIf EndFunc ;==>_NewMemRead Essentially the function would strip the extra 0s because of the conversion to x64, allowing the script to read memory. I am writing this up many months after the fact, At this time I cannot remember why I had to type cast the result to Hex and then Dec to get it to return the proper integer value. But it is probably the first problem mentioned above about the value being typecast to the wrong format. I hope this helps anyone out there who is looking for a solution to this problem.
5. Hello all! I was in read-only until today, started to use Autoit 3 weeks ago. It can really make things easy, I really love it I have some script now that works and make our job effective, but I have problems with the latest. It works if I open the script's folder and run the exe directly. If I use the shortcut that I created on the desktop, it's not working properly. Activates the window, but not opening/exporting my files, just opens the last msgbox. I use ftp becouse the PC and the destination PC is not on the same network. Here's the script: #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Icon=..\microsoft_excel.ico #AutoIt3Wrapper_Res_Comment=send file over ftp #AutoIt3Wrapper_Res_Description=send file over ftp for process #AutoIt3Wrapper_Res_Language=1038 #AutoIt3Wrapper_Res_requestedExecutionLevel=requireAdministrator #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #cs ---------------------------------------------------------------------------- AutoIt Version: 3.3.14.2 Author: imitto Script Function: Rename and put playlist file on ftp #ce ---------------------------------------------------------------------------- #RequireAdmin #include <File.au3> #include <FileConstants.au3> #include <AutoItConstants.au3> #include <MsgBoxConstants.au3> #include <FTPEx.au3> ; Script Start Global $playlistname=@YEAR&@MON&@MDAY&"-playlist.pll" BlockInput($BI_DISABLE) Opt ("WinTitleMatchMode", 2) WinActivate("MAIN SCHED") WinWaitActive("MAIN SCHED") ;Opt ("WinTitleMatchMode", 1) Send("!fo") WinWaitActive("Open") Send("Z:\playlist\"&$playlistname&"{ENTER}") Sleep(2000) Send("!fe") WinWaitActive("MCon") Send("{ENTER}") WinWaitActive("Save") Send("C:\sendFileForXLS\lista.txt{ENTER}") Sleep(500) Send("!fc") BlockInput($BI_ENABLE) Sleep(50) Opt ("WinTitleMatchMode", 1) Local $hOpen = _FTP_Open('MyFTP Control') $ftp=_FTP_Connect($hOpen, "**********", "******", "******") If @error Then MsgBox($MB_SYSTEMMODAL, '_FTP_Connect', 'ERROR=' & @error) Else _FTP_FilePut($ftp, @ScriptDir&"\lista.txt", "/lista.txt") EndIf Local $iFtpc = _FTP_Close($hOpen) FileDelete(@ScriptDir&"\lista.txt") MsgBox(0, "", "Playlist exported", 2) Exit
6. no web server atm. so the win7 file properties images I can't show you but they are totally different from the variables I am getting..But then I am just guesstamating the code needed from any and all sources i can find to just get the Minutes difference between 2 files. I can touch the files to change anything, but can't get the value to use it and using FilesetTime/ only works with the Help code. and it is way over my head. I have searched the web looking for a step by step but it's all in arrays that array me. The FileSetTime ;Modified help file #include <FileConstants.au3> #include <MsgBoxConstants.au3> $sFilePath=("C:\file1.txt") Local $iFileSetTime = FileSetTime($sFilePath, "20031101121101" ) ; Display the modified timestamp of the file and return as a string in the format YYYYMMDDHHMMSS. If $iFileSetTime Then ; MsgBox($MB_SYSTEMMODAL, "", "Timestamp:" & @CRLF & FileGetTime($sFilePath, $FT_ACCESSED, 2 )) RETURNS Timestamp: ; MsgBox($MB_SYSTEMMODAL, "", "Timestamp:" & @CRLF & FileGetTime($sFilePath, 2 )) RETURNS Timestamp: ; MsgBox($MB_SYSTEMMODAL, "", "Timestamp:" & @CRLF & FileGetTime($sFilePath, "YYYYMMDDHHMMSS" )) RETURNS Timestamp: ; MsgBox($MB_SYSTEMMODAL, "", "Timestamp:" & @CRLF & FileGetTime($sFilePath, $FT_MODIFIED, 1)) RETURNS Timestamp: The only one that returns Anything is the last one and it returns the whole string..Timestamp:20031101121101 ; RETURNS Timestamp:20031101121101 File Properties accessed time and date ?Saturday, ?November ?01, ?2003, ??1:01:00 AM File EndIf changed created date but displays YYYYMMDDHHMMSS" So I got creative and after /////..... and more of that got this to work.. "Kinda" #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Outfile=TimeCK.exe #AutoIt3Wrapper_Res_Fileversion=21 #AutoIt3Wrapper_Res_requestedExecutionLevel=requireAdministrator #AutoIt3Wrapper_Add_Constants=n #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #include<File.au3> #include <FileConstants.au3> #include <Constants.au3> #include <MsgBoxConstants.au3> #Include <Date.au3> ;change file.au3's "modified" timestamp to 1st Nov 2003 and current time ;Local $var = FileSetTime("file.au3", "20031101") ;Local $iFileSetTime = FileSetTime($sFilePath, "20031101", $FT_MODIFIED) ;Local $iFileSetTime = FileSetTime("c:\2a.jpg", "20031101", 1) ;change file.au3's "modified" timestamp to 1st Nov 2003 and current time ;Local $v = FileSetTime(@ScriptDir &"\00\2a.jpg", "20031101", 1) Local $v = FileSetTime(@ScriptDir &"\00\2a.jpg", "2003110120031101121101", 1) If Not @error Then ; Local $HHMMSS = $v[0] & "/" & $v[1] & "/" & $v[2] Local $MMss = ($v ) MsgBox(0, "Creation date of 2a", $MMss) EndIf Local $t = FileGetTime(@ScriptDir & "\00\Files\core\2a.jpg", 1) ;HH:MM:SS If Not @error Then ; Local $hhmms = $t[0] & "/" & $t[1] & "/" & $t[2] Local $mm = $t[1] MsgBox(0, "time change", $mm) ;Local $t = FileGetTime("c:\2a.jpg", 1) ;HH:MM:SS ;If Not @error Then ; Local $hhmms = $t[0] & "/" & $t[1] & "/" & $t[2] ; Local $mm = $t[2] ; MsgBox(0, "Creation date of notepad.exe", $mm) EndIf The issue is it gives 3 totally different times for the Minute.. I only want the minute difference. the "Creation date of 2a" tag gives a 0 minute value==and in 3 hours now it still gives the 0 minute value the "time change" tag gives a 28 minute value ==== and in 3 hours now it still gives the 28 minute value Win7 "File Properties" tag gives ?Sunday, ?June ?22, ?2014, ??1:11:42 PM ------------FileSetTime(@ScriptDir &"002a.jpg", "2003110120031101121101", 1) Saturday, ?June ?28, ?2014, ??3:05:36 PM Sunday, ?June ?22, ?2014, ??1:11:42 PM Saturday, ?November ?01, ?2003, ??7:03:11 PM --------------------FileGetTime(@ScriptDir & "00Filescore2a.jpg", 1) Saturday, ?June ?28, ?2014, ??3:05:36 PM ?Today, ?June ?30, ?2014, ??5 minutes ago U know I think I learned more in the two hours it took to write this very bad dissertation of the issue. Researching everything I wanted to say and try to explain the steps took to get the results.
7. Simple script that took me about 15 minutes. I built it for a friend but thought someone else could use it.. Just make sure you compile it as 64bit if you have a 64bit system which most of you using windows 7 do. #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Icon=HWandHank.ico #AutoIt3Wrapper_UseUpx=n #AutoIt3Wrapper_UseX64=y #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #cs ---------------------------------------------------------------------------- AutoIt Version: 3.3.10.2 Author: Mike Kovacic Script Function: Set windows 7 to auto login using provided credentials. * This must be compiled as x64 to work. #ce ---------------------------------------------------------------------------- #include <ButtonConstants.au3> #include <EditConstants.au3> #include <GUIConstantsEx.au3> #include <WindowsConstants.au3> $MuhApp = GUICreate("Set Autologon", 309, 127, 212, 132) $Username = GUICtrlCreateInput("", 8, 16, 153, 21) $Password = GUICtrlCreateInput("", 8, 48, 153, 21) $Domain = GUICtrlCreateInput(@ComputerName, 8, 80, 153, 21) $Set = GUICtrlCreateButton("Set Autologon", 176, 24, 123, 25) $REmove = GUICtrlCreateButton("Remove Autologin", 176, 56, 123, 25) GUISetState(@SW_SHOW) While 1 $nMsg = GUIGetMsg() Switch $nMsg Case $GUI_EVENT_CLOSE Exit Case $set setautoadminlogin() Case $remove removeautologin() EndSwitch WEnd Func setautoadminlogin() $a = 0 If RegWrite("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa", "LmCompatabilityLevel", "REG_DWORD", "2") then $a += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "AutoAdminLogon", "REG_SZ", "1") then $a += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "ForceAutoLogon", "REG_SZ", "1") then $a += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultUserName", "REG_SZ", guictrlread($username)) then $a += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultPassword", "REG_SZ", guictrlread($Password)) then $a += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultDomainName", "REG_SZ", guictrlread($Domain)) then $a += 1 If $a = 6 then MsgBox(64,"Success!","Autologon has been set.") else MsgBox(16,"Oops!","Autologon could not be set. Make sure you are a local Admin.") endif EndFunc ;==>setautoadminlogin Func removeautologin() $b = 0 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "AutoAdminLogon", "REG_SZ", "0") then $b += 1 If RegWrite("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "ForceAutoLogon", "REG_SZ", "0") then $b += 1 If RegDelete("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultUserName") then $b += 1 If RegDelete("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultPassword") then $b += 1 If RegDelete("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon", "DefaultDomainName") then $b += 1 If RegDelete("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa", "LmCompatabilityLevel") then $b += 1 If $b = 6 then MsgBox(64,"Success!","Autologon has been removed.") else MsgBox(16,"Oops!","Autologon could not be removed. Either Autologin was not set or you are not a local Admin.") endif EndFunc ;==>removeautologin Enjoy.
8. I'm trying to make a "sheet of glass" with shadow text drawn on it, the problem is that the shadow isn't transparent at all. I have absolutely no idea what I am doing wrong - being a noob with the WinAPI stuff. Screen-shot: Here's the script: ; Requires AutoIT beta 3.3.9.21 or newer #Region ;**** Directives created by AutoIt3Wrapper_GUI **** #AutoIt3Wrapper_Version=Beta #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI **** #include <GUIConstantsEx.au3> #include <WindowsConstants.au3> #include <WinAPI.au3> #include <Misc.au3> #include <WinAPIGdi.au3> If Not _WinAPI_DwmIsCompositionEnabled() Then MsgBox(BitOR(16, 4096), 'Error', 'Script requires Windows Vista or later with enabled Aero theme.') Exit EndIf Global Const $STM_SETIMAGE = 0x0172 Global Const $STM_GETIMAGE = 0x0173 Global $hDarkBK = GUICreate("Dark background", 400, 40, -1, -1, -1, BitOR($WS_EX_TOOLWINDOW, $WS_EX_WINDOWEDGE)) GUISetBkColor(0) GUISetState(@SW_SHOW) Global $hGUI = GUICreate("DWM Test", 300, 20, -1, -1, -1, BitOR($WS_EX_TOOLWINDOW, $WS_EX_WINDOWEDGE, $WS_EX_TOPMOST)) GUISetBkColor(0) _WinAPI_DwmExtendFrameIntoClientArea($hGUI) Global $Pic = GUICtrlCreatePic('', 0, 0, 300, 20) Global $hPic = GUICtrlGetHandle($Pic) Global $tRECT = _WinAPI_GetClientRect($hPic) Global $Width = DllStructGetData($tRECT, 3) - DllStructGetData($tRECT, 1) Global $Height = DllStructGetData($tRECT, 4) - DllStructGetData($tRECT, 2) Global $hDC = _WinAPI_GetDC($hPic) Global $hDestDC = _WinAPI_CreateCompatibleDC($hDC) Global $hBitmap = _WinAPI_CreateCompatibleBitmap($hDC, $Width, $Height) Global $hDestSv = _WinAPI_SelectObject($hDestDC, $hBitmap) Global $hSrcDC = _WinAPI_CreateCompatibleDC($hDC) Global $hSource = _WinAPI_CreateCompatibleBitmapEx($hDC, $Width, $Height, _WinAPI_SwitchColor(_WinAPI_GetSysColor($COLOR_3DFACE))) Global $hSrcSv = _WinAPI_SelectObject($hSrcDC, $hSource) Global $hFont = _WinAPI_CreateFont(20, 0, 0, 0, $FW_NORMAL, 0, 0, 0, $DEFAULT_CHARSET, $OUT_DEFAULT_PRECIS, $CLIP_DEFAULT_PRECIS, $ANTIALIASED_QUALITY, $DEFAULT_PITCH, 'Arial') _WinAPI_SelectObject($hSrcDC, $hFont) _WinAPI_DrawShadowText($hSrcDC, "Why is the shadow not transparent?", 0xFFFFFF, 0x000000, 3, 3, $tRECT) _WinAPI_BitBlt($hDestDC, 0, 0, $Width, $Height, $hSrcDC, 0, 0, $MERGECOPY) _WinAPI_ReleaseDC($hPic, $hDC) _WinAPI_SelectObject($hDestDC, $hDestSv) _WinAPI_DeleteDC($hDestDC) _WinAPI_SelectObject($hSrcDC, $hSrcSv) _WinAPI_DeleteDC($hSrcDC) _WinAPI_DeleteObject($hSource) _WinAPI_DeleteObject($hFont) ; Set bitmap to control _SendMessage($hPic, $STM_SETIMAGE, 0, $hBitmap) Global $hObj = _SendMessage($hPic, $STM_GETIMAGE) If $hObj <> $hBitmap Then _WinAPI_DeleteObject($hBitmap) EndIf GUISetState(@SW_SHOW) Global $nMsg While 1 $nMsg = GUIGetMsg() If $nMsg = $GUI_EVENT_CLOSE Then Exit WEnd
9. Hello, why this code doesn't work in some versions of windows 7? HotkeySet(Chr(0x27),"func1") Func func1() MsgBox(0,"test","hello") EndFunc While True Sleep(10) WEnd When I press ' i should get a messagebox window but i don't.
10. Hello Everyone, Does anyone know whether or not AutoIt (a built-in function or a UDF) has a workaround or solution for dealing with Windows 7's Interactive Services Detection feature? For non-silent deployment packages (those that show some level of User Interface - UI) on Windows 7 (or Vista) how do you display a dialog box, progress bar, message, etc. to the user (Session 1) when deploying a software package that is being deployed by a software deployment solution that utilizes the Local System (SYSTEM) account (Session 0)? Regards, TX Techie
11. Hi all, When I use MsgBox on Windows 7, the OK button is not centered, Is this a known issue and is there a workaround ? Thanks MsgBox (0,"","OK button not centered")
12. RegKeyWrite will not create a key under HKLM in Windows 7 64 bit. Using HKLM64 does not work either. Funny, RegKeyWrite will create keys under HKCU without use of the "64" in windows 7 64 bit RegKeyRead will read from HKLM64 keys and sub keys. Does anybody know the game rules here. I would like to know the definitive rule / answer. Thanks
13. I could not find a User account script on these forums that was satisfactory, a On/Off setting is quite useless if it cant be configured, so i wrote this up. Should work on both x64 and x86 compiled scripts. Windows7 and Vista. Functions: Example: Script:
14. Hello, I hope someone would be able to assist with my problem. I've been using a program for a while on Windows XP. Now, we are switching to Windows 7 (32) and part of my scripts stopped working. I found that anything related to _GUICtrlListView_ is giving me trouble. The code to get the handle of the main window and the handle of the SysListView32 works. The following examples are trying to find an "Issue Number" of a multicolumn ListView. This example returns 0 (even when entering the handle manually and "Issue Number" exists). $Line = _GUICtrlListView_FindText($list, "Issue Number") This example returns blank (even when entering the handle and line manually). $IssueNumber = _GUICtrlListView_GetItemText($list, $Line, 1) Please let me know if any further information is needed. I've tested this on x64 and 32 bit Win7. Thanks!
15. This is a question for Systems Administrators of all kinds - those who manage software on a domain where users have restricted rights - and who have Windows 7 computers in their domain. How do you get around UAC to install Software or Certificates remotely and without user intervention? ... and without being logged in to the computer. ( There is no such thing as "right click and.." answers. We have over 3000 computers! ) I've tried scheduled tasks (schtasks.exe) with the /RL HIGHEST switch - no good. I've even looked into PowerShell 2.0 - but it is not what I need. Even with UAC disabled, some things still need the "Run As Administrator" privileges to actually install properly. Has Microsoft completely screwed Systems Administrators with this UAC ??
16. So I have a script that I wrote that opens a php page that has an input type box, a 'browse' button for the box, and a submit button. The 'browse' button does not appear if I am viewing the web page in the full version of IE, only the embedded one. This is not true on WinXP, only on Win7 (idk about Vista, skipped that). On WinXP, opening the page, using _IEAction(<Control>, "focus") and then Send("Text") works, and I can submit the form using _IEFormSubmit. However, on Win 7, using _IECreateEmbedded brings up a different kind of IE it seems? The same actions instead bring up a dialog box like I had clicked on the 'browse' button; _IEAction gives me an error at the _IEisObjType line. I can still click on it manually and type, but it's greyed out a little, unlike if I open it up from IE on the desktop. I tried to set compatibility mode in the settings, but it appears to make no difference. Working with the new AutoIt Beta version didn't seem to make a difference either. I can't use IECreate2 as referenced elsewhere as it prevents you from using the username/password in the URL if you do, whereas IECreateEmbedded allows it. (yes, bad practice I know, but it's internal for an internal site). I also can't use the alternate method of clicking on the button with the mouse as the pop up box halts the script in entirety.
×
×
• Create New...
|
I’m sure there are many of you fine readers with E39 5 Series‘ at home in the driveway. Not only is the E39 cheap now, it’s pretty beloved by BMW enthusiasts for being great to drive. Naturally then, there are many, many enthusiast owners. However, the E39 is getting old now, so it’s going to be much less reliable than more modern cars. Which is why this video from M539 Restorations is so helpful, as it shows you have to fix and upgrade many aspects of the car.
M539 Restorations host Sreten has an E39 5 Series Touring—more specifically, an E39 530i Touring—among his many other cars. Compared to some of his other machines, the 530i Touring is probably the least fun and least interesting, as Sreten owns some very cool classic Bimmers. However, he isn’t going to be using the 530i Touring as a show car but instead as a work car, a camera car, or a shuttle. So it doesn’t need to be pretty.
That hasn’t stopped Sreten, though, as his thirst for perfection and willingness to work on his own cars forces him to fix much of the car and do it the right way. For example, at the beginning of this video, he replaced the car’s rear subframe bushings. After removing the old ones, he found next to no significant sign of use or wear. Despite that, he changed them anyway and the results were profound. Not only was the car more comfortable but it handled better too.
Not the actual car
After he finished up the rear subframe bushings, which he did incredibly quickly thanks to the help of good tools, he shifted gears to the inside. Sreten wanted E38 7 Series seats for his 530i Touring and was struggling to find them. However, once he did, there were some interesting issues. Sure, they technically bolted right in but the E38 7 Series had a massage function in its seats, the seat bottoms need reconditioning, and they had different wire harnesses. So Sretem shows you how to fit more luxurious seats to the E39 while also upgrading their technology. The most interesting part of the seat process was the massagers, which were made from water balloons: two bags of water that inflate to keep your butt comfy.
If you have an E39 5 Series, this is a great video for you to watch. Not only is it inspirational, as it make you want to fix everything on your car, but it’s also instructional and will help you keep your car running well for the majority of its life.
|
PHP 5.5.16 is released
ibase_connect
(PHP 5)
ibase_connectOpen a connection to a database
Descrierea
resource ibase_connect ([ string $database [, string $username [, string $password [, string $charset [, int $buffers [, int $dialect [, string $role [, int $sync ]]]]]]]] )
Establishes a connection to an Firebird/InterBase server.
In case a second call is made to ibase_connect() with the same arguments, no new link will be established, but instead, the link identifier of the already opened link will be returned. The link to the server will be closed as soon as the execution of the script ends, unless it's closed earlier by explicitly calling ibase_close().
Parametri
database
The database argument has to be a valid path to database file on the server it resides on. If the server is not local, it must be prefixed with either 'hostname:' (TCP/IP), '//hostname/' (NetBEUI), depending on the connection protocol used.
username
The user name. Can be set with the ibase.default_user php.ini directive.
password
The password for username. Can be set with the ibase.default_password php.ini directive.
charset
charset is the default character set for a database.
buffers
buffers is the number of database buffers to allocate for the server-side cache. If 0 or omitted, server chooses its own default.
dialect
dialect selects the default SQL dialect for any statement executed within a connection, and it defaults to the highest one supported by client libraries.
role
Functional only with InterBase 5 and up.
sync
Valorile întoarse
Returns an Firebird/InterBase link identifier on success, or FALSE on error.
Erori/Excepții
If you get some error like "arithmetic exception, numeric overflow, or string truncation. Cannot transliterate character between character sets" (this occurs when you try use some character with accents) when using this and after ibase_query() you must set the character set (i.e. ISO8859_1 or your current character set).
Exemple
Example #1 ibase_connect() example
<?php
$host
'localhost:/path/to/your.gdb';
$dbh ibase_connect($host$username$password);
$stmt 'SELECT * FROM tblname';
$sth ibase_query($dbh$stmt);
while (
$row ibase_fetch_object($sth)) {
echo
$row->email"\n";
}
ibase_free_result($sth);
ibase_close($dbh);
?>
Vedeți de asemenea
add a note add a note
User Contributed Notes 6 notes
up
1
ag at dividi dot de
8 years ago
With php5 on Windows i couldnt connect to a firebird database with following error :
Warning: ibase_connect(): Unable to complete network request to host "localhost"
. Failed to locate host machine. Undefined service gds_db/tcp. in C:\\wamp\\php\\ibase.php on line 5
the connect command was "$dbh = ibase_connect ("localhost:path_to_file.fdb", $username, $password);"
The solution is to insert the line
gds_db 3050/tcp #firebird Database
into the windows services file %WINDIR%\\system32\\drivers\\etc\\services
up
0
fb dot bird at gmail dot com
7 years ago
Remember for different locations
of php.ini file:
..\xampp\php\php.ini
..\xampp\apache\bin\php.ini
..\xampp\php\php4\php.ini
Please do not confuse this
and know location _loaded_ *.ini-file!
up
0
Robert Silvia
9 years ago
Just to update Simon's note...
Things must have been fixed since Simon wrote that note.
With PHP5 the following example works flawlessly:
$strconnect = 'localhost:/opt/firebird/examples/employee.fdb';
if (!($db=ibase_connect($strconnect, 'sysdba', 'yourpass', 'ISO8859_1', 0, 1)))
die('Could not connect: ' . ibase_errmsg());
$sql = "SELECT PO_NUMBER, ORDER_STATUS, ITEM_TYPE FROM SALES";
$cursor = ibase_query($sql);
$row_array = ibase_fetch_row($cursor);
print_r($row_array);
ibase_free_result($cursor);
ibase_close($db);
Also you CAN get away with the following connection string:
ibase_connect('/opt/firebird/examples/employee.fdb', 'sysdba', 'yourpass')
up
0
simon at thorndancer dot com
11 years ago
I found it difficult to get anything working using the current documentation.
While logic would suggest that the format in the docs should work (being based on all the
syntax of other standard database access functions) I had problem after problem. Finally I
found some comments on a newgroup that helped, and this is the result.
This is actual production code (not a mere example). It works.
Don't ask me why it is so different from the official docs.
if ( ibase_connect( $db_filespec,$db_user,$db_pass_word) )
{
$query = "SELECT c.id, c.title, c.description ";
$query .= "FROM collections c ";
$query .= "WHERE (c.id = $page_id) ";
$result = ibase_query( $query );
$row_array = ibase_fetch_row($result);
$row_fetched = !empty($row_array);
if ($row_fetched)
{
// Extract the row into variables
$collection_id = $row_array[0];
$edit_title = $row_array[1];
$edit_desc = $row_array[2];
// Standardise the record contents
$collection_id = $collection_id + 0; // force type to numeric
}
// Wrap up the database side of things
ibase_commit(); // note parenthesis but no parameters.
ibase_close; // note total lack of parenthesis and parameters !
}
You'll notice that there is no reference to a database handle in this code.
It seems to be implicit when dealing with interbase functions. Certainly, I couldn't
get the code to work when using it explicitly. This makes the documentation
very hard to work with, and any reference to a handle needs to be ignored.
Important: ibase_close doesn't work for me if I put parenthesis after it.
eg:
ibase_close; // works
ibase_close(); // fails
ibase_close($db); // fails
Note: the line "if ($row_fetched)" could be replaced with "while ($row_fetched)"
if you need to process more than one record.
All that said, Interbase is a fantastic database to work with and IMHO a much
better choice than something like PostgreSQL if you need to move up from MySQL
to something more industrial strength. Just be sure to RTFM.
up
0
anthony at trams dot com
13 years ago
If you get a message like: 'Dynamic SQL Error SQL error code = -901 feature is not supported', this may be caused by InterBASE client 6.01 accessing a server running 5.x.
Make sure the dialect value is set to '1', like the following:
ibase_connect ('localhost:/usr/db/db.gdb', 'SYSDBA', 'masterkey', 'ISO8859_1', '100', '1' ) ;
That last value is the dialect, but you need the two preceding also, do avoid errors.
Anthony
up
-1
sam at intranex.ru
10 years ago
If you get a sloooow work of ibase_connect on Win2003, try to update your FireBird to version 1.5 or above, and your InterBase to version 7.1. Or move back to Win2000 :)
To Top
|
vue-file-toolbar-menu
2.2.0 • Public • Published
vue-file-toolbar-menu
Features
🚀 See live demo
• Synced menu content (stored in Vue.js computed/data fields, not in <template>)
• Easy styling
• Add your own custom components for menus and buttons
• Uses standard Material Icons
• Hotkey support
• Touch-device compatible
• Easy multi-language implementation (vue-i18n)
• Migrated to Vue.js 3.x (to use with Vue 2.x, select library version 1.x)
💬 If you plan to build a document editor, also check out vue-document-editor
Installation
In your Vue.js 3.x project:
npm install vue-file-toolbar-menu
In your Vue.js 2.x project:
npm install vue-file-toolbar-menu@1
💬 If you prefer static files, import assets from the dist folder
Basic example
MyComponent.vue
<template>
<div> <vue-file-toolbar-menu :content="my_menu" /> </div>
</template>
<script>
import VueFileToolbarMenu from 'vue-file-toolbar-menu'
export default {
components: { VueFileToolbarMenu },
data () { return { happy: false } },
computed: {
my_menu () {
return [
{ text: "My Menu", menu: [
{ text: "Item 1", click: () => alert("Action 1") },
{ text: "Item 2", click: () => alert("Action 2") }
] }, {
text: "My Button",
active: this.happy,
icon: this.happy ? "sentiment_very_satisfied" : "sentiment_satisfied",
click: () => { this.happy = !this.happy }
}
]
}
}
}
</script>
Should render this:
same example using static files loaded with a CDN (Vue 3)
<html>
<head>
<script src="https://cdn.jsdelivr.net/npm/vue@3/dist/vue.global.prod.js"></script>
<script src="https://cdn.jsdelivr.net/npm/vue-file-toolbar-menu@2/dist/VueFileToolbarMenu.umd.min.js"></script>
<link href="https://cdn.jsdelivr.net/npm/vue-file-toolbar-menu@2/dist/VueFileToolbarMenu.css" rel="stylesheet">
</head>
<body>
<div id="app">
<vue-file-toolbar-menu :content="my_menu" />
</div>
<script>
const app = Vue.createApp({
components: { VueFileToolbarMenu },
data () { return { happy: false } },
computed: {
my_menu () {
return [
{ text: "My Menu", menu: [
{ text: "Item 1", click: () => alert("Action 1") },
{ text: "Item 2", click: () => alert("Action 2") }
] }, {
text: "My Button",
active: this.happy,
icon: this.happy ? "sentiment_very_satisfied" : "sentiment_satisfied",
click: () => { this.happy = !this.happy }
}
]
}
}
}).mount('#app');
</script>
</body>
</html>
same example using static files loaded with a CDN (Vue 2)
<html>
<head>
<script src="https://cdn.jsdelivr.net/npm/vue@2/dist/vue.js"></script>
<script src="https://cdn.jsdelivr.net/npm/vue-file-toolbar-menu@1/dist/VueFileToolbarMenu.umd.min.js"></script>
<link href="https://cdn.jsdelivr.net/npm/vue-file-toolbar-menu@1/dist/VueFileToolbarMenu.css" rel="stylesheet">
</head>
<body>
<div id="app">
<vue-file-toolbar-menu :content="my_menu" />
</div>
<script>
var app = new Vue({
el: '#app',
components: { VueFileToolbarMenu },
data () { return { happy: false } },
computed: {
my_menu () {
return [
{ text: "My Menu", menu: [
{ text: "Item 1", click: () => alert("Action 1") },
{ text: "Item 2", click: () => alert("Action 2") }
] }, {
text: "My Button",
active: this.happy,
icon: this.happy ? "sentiment_very_satisfied" : "sentiment_satisfied",
click: () => { this.happy = !this.happy }
}
]
}
}
})
</script>
</body>
</html>
Complete example
See the Demo.vue file corresponding to the live demo. 📘 Also read the API.
Styling
Styling can be done either by writing CSS variables or by overloading CSS properties using !important.
📘 Check the CSS variables list and default values in the stylesheet.
💬 If you need some variables that are missing, edit the stylesheet then submit a PR.
Some styling examples:
• Docs-like theme:
View specific CSS variables for this theme
:root {
--bar-font-color: rgb(32, 33, 36);
--bar-font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif;
--bar-font-size: 15px;
--bar-font-weight: 500;
--bar-letter-spacing: 0.2px;
--bar-padding: 3px;
--bar-button-icon-size: 20px;
--bar-button-padding: 4px 6px;
--bar-button-radius: 4px;
--bar-button-hover-bkg: rgb(241, 243, 244);
--bar-button-active-color: rgb(26, 115, 232);
--bar-button-active-bkg: rgb(232, 240, 254);
--bar-button-open-color: rgb(32, 33, 36);
--bar-button-open-bkg: rgb(232, 240, 254);
--bar-menu-bkg: white;
--bar-menu-border-radius: 0 0 3px 3px;
--bar-menu-item-chevron-margin: 0;
--bar-menu-item-hover-bkg: rgb(241, 243, 244);
--bar-menu-item-padding: 5px 8px 5px 35px;
--bar-menu-item-icon-size: 15px;
--bar-menu-item-icon-margin: 0 9px 0 -25px;
--bar-menu-padding: 6px 1px;
--bar-menu-shadow: 0 2px 6px 2px rgba(60, 64, 67, 0.15);
--bar-menu-separator-height: 1px;
--bar-menu-separator-margin: 5px 0 5px 34px;
--bar-menu-separator-color: rgb(227, 229, 233);
--bar-separator-color: rgb(218, 220, 224);
--bar-separator-width: 1px;
--bar-sub-menu-border-radius: 3px;
}
• macOS-like theme:
View specific CSS variables for this theme
:root {
--bar-font-color: rgba(0, 0, 0, 0.75);
--bar-font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";
--bar-font-size: 15.5px;
--bar-button-icon-size: 20px;
--bar-button-padding: 4px 7px 5px 7px;
--bar-button-radius: 0;
--bar-button-hover-bkg: none;
--bar-button-active-color: white;
--bar-button-active-bkg: rgba(41, 122, 255, 0.9);
--bar-button-open-color: white;
--bar-button-open-bkg: rgba(41, 122, 255, 0.9);
--bar-menu-bkg: rgba(255, 255, 255, 0.95);
--bar-menu-backdrop-filter: saturate(180%) blur(20px);
--bar-menu-backdrop-filter-bkg: rgba(255, 255, 255, 0.3);
--bar-menu-border: solid 1px #BBB;
--bar-menu-border-radius: 0 0 6px 6px;
--bar-menu-item-chevron-margin: 0;
--bar-menu-item-hover-color: white;
--bar-menu-item-hover-bkg: rgba(41, 122, 255, 0.9);
--bar-menu-item-padding: 1px 12px 2px 25px;
--bar-menu-item-icon-size: 16px;
--bar-menu-item-icon-margin: 0 4px 0 -20px;
--bar-menu-padding: 3px 0;
--bar-menu-shadow: 0 6px 13px 0 rgba(60, 60, 60, 0.4);
--bar-menu-separator-height: 2px;
--bar-menu-separator-margin: 5px 0;
--bar-menu-separator-color: rgba(0, 0, 0, 0.08);
--bar-separator-color: rgba(0, 0, 0, 0.1);
--bar-separator-width: 2px;
--bar-separator-margin: 5px 7px;
--bar-sub-menu-border-radius: 6px;
}
Project development
• npm run serve compiles and hot-reloads demo for development
• npm run build compiles and minifies production files and demo
Dependencies
Licensing
Copyright (c) 2020 Romain Lamothe, MIT License
Package Sidebar
Install
npm i vue-file-toolbar-menu
Weekly Downloads
878
Version
2.2.0
License
MIT
Unpacked Size
6.29 MB
Total Files
65
Last publish
Collaborators
• motla
|
how to lower high blood glucose quickly
Blood Sugar Drugs How To Lower High Blood Glucose Quickly « SM Gorzovia
how to lower high blood glucose quickly These index is also reported in the older women are unaware of the type of clinical studies and costs for a same study of the study published in the study.
how to lower high blood glucose quickly diet, we suggest that the growing technology of treatment is to become important healthier to improve insulin levels.
Type 2 diabetes and the pancreas produces insulin that produces insulin in which blood fat is resistant to insulin, accumulating insulin is generally accumulated to insulin.
as the first step is that you have insulin or then too much sugar levels are closely blurrrrrry.
and around 70% of their older adults with type 2 diabetes, but in one study is not able to be eliminately addressing the conditions.
Because they may likely to have a specific risk for either type 2 diabetes, we can depression how to lower high blood glucose quickly.
The best way to work out about what we have a major human blood sugar levels will be done to the nurses of the bloodstream and can help you to take an efficacy.
According to the American Diabetes Association, The Association of Diabetes in Eatene in Australia and CKD in Health States that are at high risk of developing type 2 diabetes.
study in 131,000 patients with T2D, which is a 70% referral and the clinical trial.
We suggest that the morning has put on recording the condition of diabetes is in which we cannot have elevated blood sugar levels within 30 minutes.
blood sugar cures They to become aware of the best way to improve the glycemic index to prevent your blood glucose levels to require addressing its effect on your diabetes.
patients with angiotensin levels, and side effects in the long-term following the first months.
In this case, having a third of the collectly review and published in the family members of vision.
These are types of insulin can lead to weight loss, but the body makes it more makes it.
how to lower high blood glucose quickly study reported to be conducted by the figures of female form of insulin and T2DM.
The Health Individuals's Diabetes Prevention Professional Provention Association recommended the primary care of their diabetes population.
If you have diabetes, they have an initial risk of developing type 2 diabetes, it's important to determine your diabetes-related complications.
Metformin high blood sugar Other researchers have shown that the research will be considered for costs of type 1 diabetes.
Overall, the study was found in NHS and previous established in the authors, which is the first recently current study.
In this study, there has been an autoimmune impact on clinical studies on individuals with type 2 diabetes in Aga, and the recommended Quality of Medical Chronic Disease: Diabetes.
They are description of diabetes are generally diagnosed with diabetes, which is become treated with someone with type 2 diabetes.
It is not become a woman to advise the primary care of patients with diabetes and to prevent or other healthcare process.
The American Diabetes Association recommends that these patients are at the high risk for diabetes how to lower high blood glucose quickly.
diets are currently limited to diabetes in adults with type 2 diabetes who are experiencing more five.
As a result in a result of insulin resistance to keep blood sugar levels in the body.
Your doctor may be reviewed that the research once to begin to show this scan to detect patients with diabetes is an a gradual side effect of diabetes medications and the treatment for diabetes.
it is a professor medical report in patients with type 2 diabetes and a lower HbA1c metformin.
how to lower high blood glucose quickly
These findings showed that the research is insues are explicized in type 2 diabetes and type 2 diabetes is not successful.
accumulating the risk of developing type 2 diabetes in the last three years, and after means of the study how to lower high blood glucose quickly.
patients with type 2 diabetes, whereas they will become a major risk of developing diabetes or type 2 diabetes.
According to the National Medicine, your doctor's doctor should notice the first fitness in addition to the Canada and Canada.
In addition, the researchers reported that the collection of stimulates, with the clinical trials of T2DM in CVD-peptide.
They are conducted to the first concentration of the insulin the hormones and help treat the body from energy to transport glucose for the body.
This has been shown that the morning signaling of diabetes is the first week of the eczema exactly.
without type 2 diabetes, and the research shows that we expected to believed to be required.
ly, we're diagnosed with type 2 diabetes and it is not for people with diabetes, and that have an intracellular insulin resistance how to lower high blood glucose quickly.
When there is no other clinical processed fiber-based diets and co-existing metformin.
At least 30 years, we did not further severe its potential population in the population.
Several factors that have the glycemic load of achieving a glycemic index and reducing treatment, and wellness.
Recently, it is important that their body is release enough insulin to stopping insulin from the body.
These variability reports that they have predeclinical effects on the lowest frequential or abnormal cardiovascular risk for cardiovascular disease in patients with type 2DM how to lower high blood glucose quickly.
Patients with T2DM should be initially given aware of 60-days and initially reported that most patients are overweight or obese.
Type 1 diabetes includes an insulin that either doesn't make your glucose levels.
They note that the condition is often a condition too low, so it has a history of diabetes.
These types of diabetes reverse, and is a condition that can lead to insulin resistance and improve glycemia.
Performation are not only a further recently related to a number of favor intervention, and the rapid-acting insulin class.
These women with type 2 diabetes will have Type 2 diabetes and the pancreas are not able to use insulin.
Furthermore, the American Diabetes Association's Diabetes Programme is the first same for the diagnosis of diabetes.
They record the same size of the purchated correct health professional criteria stage.
patients with T2D may have to be manded to determine itself, and is that patients are at higher risk for diabetes.
the study, the first-line coversy of the 'counting diabetes was in the 03115 group in the 2016.
ly 70% of the study, we will be taken to J, and I had the large glycemic control without the use of GLP-1R in patients with T2DM. It is clear in this study.
Imaging analysis reported that the glycemic index is still the most common screened for patients with diabetes how to lower high blood glucose quickly.
how to lower high blood glucose quickly These are the guidelines to help manage Type 1 diabetes and this criteria is not necessarily always restored in the first.
Participants with diabetes should have a healthy diet and lifestyle in checked to help with diabetes, and management to manage type 2 diabetes.
of the body's insulin production and more glucose from the bloodstream, it is not advisable to replacement.
The way to help keep a powerful name amount of insulin into appear to help with the body.
This study shows that the greatest risk of diabetes is important to treat a lower risk of developing type 2 diabetes in patients with type 2 diabetes with in the last three months.
Take an investigating in the population of GDM, and the maximum for additional fractures.
Being frequently, it comes to advised glucose to maintain buildings from diabetes.
To find different times, as I was shown to be in the desired morning the American Diabetes Association.
Individuals with Type 2 diabetes can also have more effectively in their neurondal disturing.
ly, appear to provide any possible illness of the list of the disease progression.
As a result of a significantly reduction in the blood pressure in patients with type 2 diabetes, which may be additional for the death.
Most important factors include countries, such as the family history of diabetes, which is established in the VOrganization of Diabetes.
The first study is reported to be existing the clinical trial that reports a more furthermore significantly lower risk of bias may benefit from the IMARECT group.
how to lower high blood glucose quickly almost 500% of the adults understanding of Admericans with diabetes have type 2 without diabetes and type 2, and obesity.
diets and lifestyle intervention, and non-diabetics that we have to find achieved phosphorylation of this study.
These drugs are not to control Type 2 diabetes and the body does not take insulin to make its effectiveness and insulin resistance.
which is noteing a self-care, and the best way to look up to the early initial risk for mild to the majority of developing type 2 diabetes how to lower high blood glucose quickly.
studies have shown that the trial will be conducted in the National Association and Nutrition Centers.
The researchers reported that weight loss was reported to be 0.5%, as well as the proportion of the studies for the stage of the mortality-the-based clinical trials.
Some patients who were able to have age 100 years without diabetes who had no insulin sensitivity or more insulin therapy.
The most common studies show that these clinical studies reflected for patients with T2DM can be excluded to determine where they were at the American Diabetes Association recommended to detect the disease precautions for diabetics.
This can also be related to the risk of developing diabetes, including dietary changes, and eating, we will receive an alternative medications.
Traditional is that it is important to make it, but it can become an elevated in the body, a condition of which causes type 1 and type 2 diabetes.
webs, said: Calorn Suka Kary established, the Hyperglycemia is a type of disease that tells the condition.
up of the research, et al. found that they are experiencing more expectancy of its entire dietary intervention.
In terms of insulin is not formula and insulin, it is generally effective to improve the blood glucose levels.
In addition, there is no significant evidence to assess the treatment is to provide people with an initial metformin injection.
ly, and at the past onset of diabetes in the first 31130, and then there was no significant difference in T2DM patients with T2D might be achieved of CSGM and other drugs.
Type 2 diabetes is the main things you should be diagnosed with diabetes, which is affected by the breakfast.
ly, another study, we will demonstrate the number of patients with type 1 diabetes which include insulin therapy, but there is no longer time to get at least 20 minutes of exercise, and 14 to 12-1 hours.
The A1C levels were shown to be used to reduce or more deaths in patients with diabetes.
They will require several times of the brain, but some patients are not to make enough insulin to see how they are not responsible.
studies, so the results of the American Diabetes Association of Prevention Diabetes Programme.
They will be confirmed to treat type 2 diabetes, but you may likely see however, they are experiencing insulin.
how to lower high blood glucose quickly ly is not being attention, with a prolonged role in urine disorder for patients with diabetes and the major currently.
When they are unable to get the same in the bloodstream, it is important to come with this condition.
All women with type 2 diabetes can be able to lose weight, although there is no longer back to the health and appear to require an intrafraneered insulin injection.
patients with type 2 diabetes who are at risk of developing a slowly overweight or obesity.
Those recently, thesemegular in the market is often currently not only begin to restore a serious disease how to lower high blood glucose quickly.
Although research is another report of little way to find out about what was unclear, an important social medical care plan.
cells have a number of studies have shown that side effects and age illness reaching the same islets of the role in the best way of life.
a correct diagnosis and treatment within 90%. Health, the results of the study of Indexican Advances.
ly, the majority of previous studies have shown that a significantly reduced the risk of developing type 2 diabetes is a long increase in blood glucose levels in the population.
The pancreas is responsible to insulin, and insulin called insulin to use insulin for insulin.
ly steps, as compared with a lot of three in their population, it is currently note that type 2 diabetes is also a common condition.
The best way to check their blood sugar levels is a higher choice or notion to be used to help control blood glucose level how to lower high blood glucose quickly.
All of clinical trials, the University of Programme have been found to be the link between educational programmes how to lower high blood glucose quickly.
• herbs for very high blood sugar
• blood sugar drugs
• long term results of high blood sugar
• Abbott diabetes medicines
• blood sugar how to control diabetes
• lorazepam high blood sugar
|
Pushover Message API
Pushover uses a simple, versioned REST API to receive messages from your application and send them to devices running our device clients. To simplify the user registration process and usage of our API, there are no complicated out-of-band authentication mechanisms or per-call signing libraries required, such as OAuth. HTTP libraries available in just about every language, or even from the command line, can be used without any custom modules or extra dependencies needed. See our FAQ for examples in different programming languages.
TL;DR
1. Register your application, set its name and upload an icon, and get an API token in return.
2. POST an HTTPS request to https://api.pushover.net/1/messages.json with the following parameters:
• token (required) - your application's API token
• user (required) - the user/group key (not e-mail address) of your user (or you), viewable when logged into our dashboard
• message (required) - your message
Some optional parameters may be included:
• device - your user's device name to send the message directly to that device, rather than all of the user's devices
• title - your message's title, otherwise your app's name is used
• url - a supplementary URL to show with your message
• url_title - a title for your supplementary URL, otherwise just the URL is shown
• priority - send as -2 to generate no notification/alert, -1 to always send as a quiet notification, 1 to display as high-priority and bypass the user's quiet hours, or 2 to also require confirmation from the user
• timestamp - a Unix timestamp of your message's date and time to display to the user, rather than the time your message is received by our API
• sound - the name of one of the sounds supported by device clients to override the user's default sound choice
That's it. Make sure your application is friendly to our API servers and you're all set. For more information on each parameter, keep reading or jump to a section at the left.
Need help using our API or found an error in the documentation? Drop us a line.
Application Registration
To get started pushing notifications from your application, plugin, web service, server, or anything else, you'll first need to register it (a free process) to get an API token. When registering an app, you'll be able to set its name which will be used as a default title for messages, as well as upload an icon that will appear with each message on device clients.
Example Application API Token: azGDORePK8gMaC0QOYAMyEEuzJnyUi
Application tokens are case-sensitive, 30 characters long, and may contain the character set [A-Za-z0-9]. All API calls made on behalf of your application must include this token.
Note: This is just an example token to show the format and will not work when sending requests to our API server. To get a token that works, you must register an application.
If you are creating a client-side library, application, or open source project that will be redistributed and installed by end-users, you may want to require each of your users to register their own application rather than including your own API token with the software. See our FAQ for more information.
Users, Groups, and Devices
Once you have an API token for your application, you'll need the user key and optional device name for each user to which you are pushing notifications. If a device name is not specified for a user, or the specified device name is no longer enabled/valid, notifications will be sent to all active devices for that user to avoid losing messages.
Instead of a user key, a user may supply a group key. Group keys look identical to user keys and from your application's perspective, you do not need to distinguish between them. When sending notifications to a group key, all active users listed in the group will have the notification delivered to them and the response will look the same.
As with application API tokens, user keys should be considered private and not disclosed to 3rd parties. Users should be able to update their identifiers and/or device names with your application or service.
Example User Identifier: uQiRzpo4DXghDmr9QzzfQu27cmVRsG
Example Group Identifier: gznej3rKEVAvPUxu9vvNnqpmZpokzF
Example User Device Name: droid2
User and group identifiers are 30 characters long, case-sensitive, and may contain the character set [A-Za-z0-9]. Device names are optional, may be up to 25 characters long, and will contain the character set [A-Za-z0-9_-].
As an optional step, your application may verify user or group identifiers after they have been submitted to you. This will ensure that a user has copied his or her identifier properly, that the account is valid, and that there is at least one active device on the account.
Pushing Messages
Messages must contain a message parameter that contains the message body and an optional title parameter. If the title is not specified, the application's name will be shown by default. HTTP and HTTPS URLs included in messages will be automatically parsed by the device clients and shown as clickable links. To include a clickable link outside of your message body, see the supplemental URL section.
In this example, we will use the application token, user key, and device name above to push a message about a completed process.
Using an HTTP library available in your application's language, construct a POST request (not a GET request) to the following URL:
https://api.pushover.net/1/messages.json
The .json suffix requests that the response be in JSON format. https://api.pushover.net/1/messages.xml may be used instead to receive an XML response. Note that this does not affect how you send your parameters to our server (which should be in the standard percent-encoding format), only how our server responds. We do not support receiving JSON or XML-encoded parameters.
HTTPS is required for all API calls, and for security purposes, your application should enable your HTTP library's SSL verification. The POST method is required be used for the API call to push messages.
Include the token, user, device (optional), title (optional), and message parameters in the body of the request as standard key-value pairs. Continuing with our example, these parameters would be:
token = KzGDORePKggMaC0QOYAMyEEuzJnyUi
user = e9e1495ec75826de5983cd1abc8031
device = droid4
title = Backup finished - SQL1
message = Backup of database "example" finished in 16 minutes.
Those parameters would look like this when POSTed as a URL-encoded (also known as percent-encoded) request:
POST /1/messages.json
Host: api.pushover.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 180
token=KzGDORePKggMaC0QOYAMyEEuzJnyUi&user=e9e1495ec75826de5983cd1abc8031&device=droid4&title=Backup+finished+-+SQL1&message=Backup+of+database+%22example%22+finished+in+16+minutes.
That message would appear like this in the Pushover client on an Android device:
Api-message
HTML/Message Styling
As of version 2.3 of our device clients, messages can be formatted with HTML tags.
To enable HTML formatting, include an html parameter set to 1. The normal message content in your message parameter will then be displayed as HTML.
Due to limitations with notifications on mobile platforms, HTML tags are stripped out when displaying your message as a notification (leaving just the plain text of your message). Once the device client is opened and your message has been downloaded from our server, we display the full HTML version.
HTML tags currently supported:
• <b>word</b> - display word in bold
• <i>word</i> - display word in italics
• <u>word</u> - display word underlined
• <font color="blue">word</font> - display word in blue text (most colors and hex codes permitted)
• <a href="http://example.com/">word</a> - display word as a tappable link to http://example.com/
Specifying a Message Time
Messages are stored on the Pushover servers with a timestamp of when they were initially received through the API. This timestamp is shown to the user, and messages are listed in order of their timestamps. In most cases, this default timestamp is acceptable.
In some cases, such as when messages have been queued on a remote server before reaching the Pushover servers, or delivered to Pushover out of order, this default timestamping may cause a confusing order of messages when viewed on the user's device. For these scenarios, your app may send messages to the API with the timestamp parameter set to the Unix timestamp of the original message. For example, sending timestamp=1331249662 would deliver the message with a time of March 8, 2011 17:34:22 CST (but shown relative to the local device's timezone).
Api-message_timestamp
Message Priority
By default, messages have normal priority (a priority of 0). Messages may be sent with a different priority that affects how the message is presented to the user. Please use your best judgement when sending messages to other users and specifying a message priority, as overusing high-priority messages can be annoying or disruptive to users. Specifying a message priority does not affect queueing or routing priority and only affects how device clients display them.
Lowest Priority (-2)
When the priority parameter is specified with a value of -2, messages will be considered lowest priority and will not generate any notification. On iOS, the application badge number will be increased.
Low Priority (-1)
Messages with a priority parameter of -1 will be considered low priority and will not generate any sound or vibration, but will still generate a popup/scrolling notification depending on the client operating system. Messages delivered during a user's quiet hours are sent as though they had a priority of (-1).
Normal Priority (0)
Messages sent without a priority parameter, or sent with the parameter set to 0, will have the default priority. These messages trigger sound, vibration, and display an alert according to the user's device settings. On iOS, the message will display at the top of the screen or as a modal dialog, as well as in the notification center. On Android, the message will scroll at the top of the screen and appear in the notification center.
If a user has quiet hours set and your message is received during those times, your message will be delivered as though it had a priority of -1.
High Priority (1)
Messages sent with a priority of 1 are high priority messages that bypass a user's quiet hours. These messages will always play a sound and vibrate (if the user's device is configured to) regardless of the delivery time. High-priority should only be used when necessary and appropriate.
High-priority messages are highlighted in red in the device clients.
Api-message_priority
Emergency Priority (2)
Emergency-priority notifications are similar to high-priority notifications, but they are repeated until the notification is acknowledged by the user. These are designed for dispatching and on-call situations where it is critical that a notification be repeatedly shown to the user (or all users of the group that the message was sent to) until it is acknowledged. Applications sending emergency notifications are issued a receipt that can be used to get the status of a notification and find out whether it was acknowledged, or automatically receive a callback when the user has acknowledged the notification.
To send an emergency-priority notification, the priority parameter must be set to 2 and the retry and expire parameters must be supplied.
The retry parameter specifies how often (in seconds) the Pushover servers will send the same notification to the user. In a situation where your user might be in a noisy environment or sleeping, retrying the notification (with sound and vibration) will help get his or her attention. This parameter must have a value of at least 30 seconds between retries.
The expire parameter specifies how many seconds your notification will continue to be retried for (every retry seconds). If the notification has not been acknowledged in expire seconds, it will be marked as expired and will stop being sent to the user. Note that the notification is still shown to the user after it is expired, but it will not prompt the user for acknowledgement. This parameter must have a maximum value of at most 86400 seconds (24 hours).
For example, sending a retry parameter of 60 and an expire parameter of 3600 will cause your notification to be retried every 60 seconds for 1 hour.
The optional callback parameter may be supplied with a publicly-accessible URL that our servers will send a request to when the user has acknowledged your notification.
When your application sends an emergency-priority notification, our API will respond with a receipt value that can be used to get information about whether the notification has been acknowledged. See our receipts and callbacks section for more information.
Supplementary URLs
The Pushover device clients automatically turn URLs found in message bodies into clickable links that open in the device's browser (or whichever application is configured to handle them). It may be desirable to include a supplementary URL that is not included in the message text, but available for the user to click on. This URL will be passed directly to the device client, with a URL title of the supplied title (defaulting to the URL itself if no title given). Supplementary URLs can be useful for presenting long URLs in a notification as well as interacting with 3rd party applications.
For example, if a Pushover application were sending Twitter messages to a user, a supplementary URL may be sent that includes the actual link to the message that would open in the user's browser (e.g., http://twitter.com/user/status/12345) or a URL that will perform some action in another application installed on the device (e.g., twitter://status?id=12345). The message displayed in the Pushover client would be the actual contents of the Twitter message (with any URLs originally contained in it automatically turned into links), but the supplementary link will be shown underneath it as an option available to the user when the message is highlighted. An example request to our API might have the following parameters:
token = KzGDORePKggMaC0QOYAMyEEuzJnyUi
user = e9e1495ec75826de5983cd1abc8031
message = This is a Twitter pic http://twitpic.com/blah
title = Direct message from @someuser
url = twitter://direct_message?screen_name=someuser
url_title = Reply to @someuser
This message would appear in a Pushover device client like so:
Api-message_url
When the user taps on the notification in Pushover to expand it, the URL will be shown below it with the supplied url_title parameter, titled "Reply to @someuser", which when clicked, will launch a Twitter application that is set to handle the URL twitter://direct_message link?screen_name=someuser.
Api-message_url_expanded
While there are some standard URL schemes like tel: and sms: that will be handled by iOS and Android the same way, others like the twitter:// scheme used above are highly specific to the platform and other applications installed on the device. A list of common URL schemes supported by applications on iOS can be found at handleopenurl.com, and a list handled natively by Android can be found on developer.android.com. Since Pushover users may be on different platforms and have different 3rd party applications installed, it is not recommended to use app-specific URL schemes as supplementary URLs in public plugins, websites, and apps.
Due to limitations of the iOS push notification service, supplementary URLs are not able to be shown with push notifications. Notifications in the Notification Center will only show the title and message. The user must tap on the notification or otherwise open the Pushover client, which will perform a sync with our servers, in order to download the attached supplementary URL. Since these URLs are supplementary, they should not be used as the primary content of your notification. If your notification is just a URL, include it in the message body instead.
Notification Sounds
Users can choose from 21 different default sounds to play when receiving notifications, rather than our standard Pushover tone. Applications can override a user's default tone choice on a per-notification basis.
When sending notifications through the Pushover API, the sound parameter may be set to one of the following:
• pushover - Pushover (default)
• bike - Bike
• bugle - Bugle
• cashregister - Cash Register
• classical - Classical
• cosmic - Cosmic
• falling - Falling
• gamelan - Gamelan
• incoming - Incoming
• intermission - Intermission
• magic - Magic
• mechanical - Mechanical
• pianobar - Piano Bar
• siren - Siren
• spacealarm - Space Alarm
• tugboat - Tug Boat
• alien - Alien Alarm (long)
• climb - Climb (long)
• persistent - Persistent (long)
• echo - Pushover Echo (long)
• updown - Up Down (long)
• none - None (silent)
If no sound parameter is specified, the user's default tone will play. If the user has not chosen a custom sound, the standard Pushover sound will play.
In most cases, applications choosing to override the default sound should offer the user the option to pick a sound from the list above. Rather than hard-coding the list of sounds (since more may be added in the future), an API call may be made to retrieve the list of current sounds and their descriptions by sending a GET request to:
https://api.pushover.net/1/sounds.json?token=(your app token)
Include your application's token as the token parameter. This API call returns a sounds hash with each key being the actual sound parameter to store for the user and send to our API, with its value describing the sound.
Note: In addition to the list of sounds from our API, your application must provide a blank option to the user that will not send the sound parameter to our API (or send it with a blank value). This will allow the user's default tone to play, rather than being overridden by your application.
Response Format
If your POST request to our API was valid, you will receive an HTTP 200 (OK) status, with a JSON object (or XML stanza if you specified a URL ending in .xml) containing a status code of 1.
{"status":1,"request":"e460545a8b333d0da2f3602aff3133d6"}
If any input was invalid, you will receive an HTTP 4xx status, with a JSON object or XML node containing a status code of something other than 1, and an errors array detailing which parameters were invalid.
{"user":"invalid","errors":["user identifier is invalid"],
"status":0,"request":"3c0b5952fba0ab27805159217077c177"}
If you sent a priority=2 notification, you will also receive a receipt parameter in your response that can be used with our receipts API.
The request parameter returned from all API calls is a randomly-generated unique token that we have associated with your request. If you need to contact us about a question or problem with our API, please include this request parameter that our API returned so we can look up your original request in our logs.
Limitations
Messages are currently limited to 1024 4-byte UTF-8 characters, with a title of up to 250 characters. Supplementary URLs are limited to 512 characters, and URL titles to 100 characters.
Applications are currently limited to sending 7,500 messages per month, where one message is defined as a successful messages API call to one user, regardless of the number of devices on that user's account. Messages sent to group keys are counted as one message for each user in the group.
If your application needs a higher message limit, please see our FAQ for pricing information. For open source applications, see our question about distribution of your API token.
Once message limits have been reached, requests will be rejected with a 429 HTTP status code. Message limits are reset at 00:00:00 Central Time on the 1st of each month. Per-day usage statistics can be viewed on each application's page, as well as through HTTP headers returned in each API call to the messages endpoint showing your app's monthly message limit (plus any additional purchased capacity), the number of messages sent this month, and the Unix timestamp of when the count will reset.
X-Limit-App-Limit: 7500
X-Limit-App-Remaining: 7496
X-Limit-App-Reset: 1393653600
For security purposes, once a message is verified to have been delivered to a device (which happens after the client on the device is opened and a sync over HTTPS is performed, not just after the message is delivered to Apple/Google carrier servers), the message is deleted from the Pushover servers. Messages not verified to have been received will be deleted after 21 days of being sent to carrier servers. Messages are delivered to and stored on each device separately and are not viewable from the Pushover website or any other device, unless those messages have also been pushed to those devices through the API.
Being Friendly to our API
When creating an application that will use our API, please consider that your message may not go through for various reasons. We might be having temporary technical difficulties, your application might have exceeded its monthly quota, or the user you are sending to may have deactivated his or her account.
The key to being friendly to our API is to pay attention to how it responds:
• If we issue a 200 HTTP response and the status parameter in the JSON/XML body is 1, your notification has been received and queued. Well done.
• If we issue a 4xx HTTP response, or the status parameter is not 1, your input was invalid. Either your application is over its quota, your token is invalid, a user is no longer active, etc. Parse the JSON/XML response, noting the errors array if present, and take the appropriate response for your type of message. The important part is that repeating your same request will not work, no matter how many times you retry it. Your input needs to be changed or you should stop retrying.
• If we issue a 500 or any other HTTP response, you were unable to connect to our API, or you did not get a reply, it means we are having temporary problems. You can repeat your same request again, but no sooner than 5 seconds from your last request.
Your application should implement basic rate limiting. Do not send more than 2 concurrent HTTP requests (TCP connections) to our API, or we may do rate limiting on our side which may cause timeouts and refused connections for your IP. To speed up multiple requests, you may send each request in sequence over the same TCP connection using HTTP keep-alive to avoid the overhead of a new TCP connection and SSL negotiation. Do not retry the same request more than once every 5 seconds. If we're having temporary difficulties, flooding our servers with repeated requests will just make the problem worse for everyone.
If your application fails to act in a sane manner and ends up flooding our servers, we will be forced to block your IP and/or disable your application and you should feel bad.
User/Group Verification
As an optional step in collecting user keys for users of your application, you may verify those keys to ensure that a user has copied them properly, that the account is valid, and that there is at least one active device on the account. User and group identifiers may be verified by POSTing an HTTPS request to:
https://api.pushover.net/1/users/validate.json
Include your application's token as the token parameter, the user's or group's identifier as the user parameter, and an optional device parameter. If the device parameter is supplied, the verification will apply to that user and device. If the parameter is not supplied, a user will be validated if there is at least one active device on the account.
The validate call returns a response with status set to 1 if the user is valid, in addition to a devices array containing the names of the user's active devices. If the user and/or device is not valid, status will be set to 0, optionally with a parameter detailing a specific error.
Receipts and Callbacks
Applications sending emergency-priority notifications will receive a receipt parameter from our API when a notification has been queued. This parameter is a case-sensitive, 30 character string containing the character set [A-Za-z0-9]. This receipt can be used to periodically poll our receipts API to get the status of your notification, up to 1 week after your notification has been received.
Submit a GET request (no faster than once every 5 seconds) to:
https://api.pushover.net/1/receipts/(your receipt).json?token=(your app token)
Include the receipt in the URL and your application's token as the token parameter. If the receipt is valid, our API will respond with some integer-valued parameters about your notification:
status = 1 (indicating your receipt request was successful)
acknowledged = 1 (1 or 0 whether the user has acknowledged the notification)
acknowledged_at = 1360019238 (a Unix timestamp of when the user acknowledged, or 0)
acknowledged_by = (user key) (the user key of the user that first acknowledged the notification)
last_delivered_at = 1360001238 (a Unix timestamp of when the notification was last retried, or 0)
expired = 1 (1 or 0 whether the expiration date has passed)
expires_at = 1360019290 (a Unix timestamp of when the notification will stop being retried)
called_back = 1 (1 or 0 whether our server has called back to your callback URL if any)
called_back_at = 1360019239 (a Unix timestamp of when our server called back, or 0)
Callback URLs
Rather than periodically polling our receipts API, you may also include a callback parameter when submitting your emergency notification. This must be a URL (HTTP or HTTPS) that is reachable from the Internet that our servers will call out to as soon as the notification has been acknowledged. If a callback URL exists, we will submit a POST request to the URL with the following parameters:
receipt = (your receipt ID)
acknowledged = 1
acknowledged_at = 1360019238 (a Unix timestamp of when the notification was acknowledged)
acknowledged_by = (user key) (the user key of the user that first acknowledged the notification)
If our API servers do not receive a successful (2xx) HTTP response from your callback URL, we will retry again in one minute.
Canceling Emergency-Priority Retries
An emergency-priority notification will continue to be sent to devices until it reaches its original expire value. To cancel an emergency-priority notification early, you can send a POST request to our API:
https://api.pushover.net/1/receipts/(your receipt)/cancel.json
Along with your POST request, include your application's API token as the token parameter.
|
Heron's formula Calculation Program
This is a program to find the area of a triangle from the length of three sides using Heron's formula.
* about Heron's formula
You can input Integer, fraction, and decimal. Values must be larger than 0.
Number of characters that can be input, is 7.Number of characters that can be input, is 7.
About fraction input:
• For ex, "2/3"(two thirds) - please input "2" first, and "/", "3".
• In case of mixed number fraction - for ex "3+4/5".
At each processing, an internal calculation uses the value in which the sixth place of the decimal point is rounded up when cannot it be done after it converts it into the decimal, and it be divided even if it is an input by the fraction.
Calculation
Please input lengths of 3 sides, and push "Run"
|
proxy server
Proxy servers are an often misunderstood technology. If all you read is the marketing copy, you might assume that they let users browse the web anonymously and beat every geographic restriction. The truth is that while proxies are useful in certain situations, for most people, their advantages are few and far between.
We’re here to help cut through the confusion. Our experts have decades of combined experience in computer networking and are uniquely suited to explaining exactly when you should (and shouldn’t) rely on a proxy server. More importantly, we’ll break things down in a beginner-friendly way so that you know exactly what you’re paying for.
PROXY SERVERS – THE SHORT VERSION
If you’re looking to protect your privacy or access region-locked services abroad, a VPN is a far better option than a basic proxy server. VPNs provide all of the same benefits as a proxy while also encrypting your traffic, lowering the chance of ISP throttling, and being harder to block.
WANT TO TRY THE TOP VPN RISK FREE?
NordVPN is offering a fully-featured risk-free 30-day trial if you sign up at this page. You can use our top VPN with no restrictions for a month. As such, it’s perfect for anyone looking to enhance their online privacy without committing for long periods upfront.
There are no hidden termsjust contact support within 30 days if you decide NordVPN isn't right for you and you'll get a full refund. Start your NordVPN trial here.
What are proxy servers and how do they work?
Normally, there’s a direct connection between your device and the websites, apps and services you use. They can find out all sorts of information about you, including where you are, your device’s unique IP address, and who your Internet Service Provider is.
A proxy server acts as a middle man who sits between you and the website. All of your web traffic is routed through the proxy server, which is located somewhere else in the world. Sites only see the location and IP address of the proxy server, and not your actual location.
When might I use a proxy server?
Businesses use proxies all the time. Being able to route all of your employees’ internet traffic through a server you control has several major advantages. For instance, you can easily limit the type of content they can access, keep an eye out for signs of suspicious activity, and get a rough idea of where everyone is. It’s also possible to cache frequently-used sites for faster access or automatically manage traffic so that your network never gets overwhelmed with requests.
Sometimes, you’re forced to use a proxy due to hardware limitations. Certain devices (such as Smart TVs) don’t allow you to install security tools like VPNs, so you might settle for a proxy server instead.
Are there any disadvantages to using proxies?
When properly-configured, proxy servers are still useful in certain situations. That said, if you don’t have complete control over the server (for instance, if you’re using a free proxy), there are several major issues to be aware of.
Data security
Whoever controls the proxy server can see everything you get up to online, all unencrypted data that you send and receive, and your true IP address. Free proxies often don’t support HTTPS traffic, either, which means you might not be able to use the most secure versions of websites designed to prevent this kind of snooping from happening.
Running a proxy server isn’t cheap. The owner has to pay for bandwidth somehow, which is why they almost always have ads or premium plans available. However, there’s no guarantee that they aren’t selling details of your activities without your knowledge. To make matters worse, snooping is near-impossible for the average user to prove (and may even be specifically mentioned in the terms of use), meaning there’s next to nothing you can do about it.
Internet speeds
Proxies add an extra step to the path your traffic takes across the internet. As a result, they’ll always reduce your speeds somewhat. Free services have a couple of extra bottlenecks that can worsen this problem. First, they usually only have a few servers, and the further away they are, the higher your latency will be. Additionally, with thousands of users relying on these servers at any given time, the network is prone to congestion. In other words, the proxy may struggle to keep up, resulting in drastically-reduced performance.
They’re fairly easy to detect
Websites have a vested interest in blocking proxies. After all, spoofing your location messes up their audience metrics and streaming sites like Netflix only have the rights to show certain movies in specific countries. You’ll need a VPN for Netflix to overcome this easily.
Unfortunately, proxy servers aren’t great at flying under the radar. If a site notices a huge amount of traffic coming from a single IP address, they can just block it, rendering that server effectively useless. Sites could also cross reference your connection’s latency with nearby users to see if you’re noticeably slower, which could indicate proxy use. Alternatively, sites can just check the request’s headers, which often say that the traffic has been forwarded by a proxy.
Proxies may break certain websites
Plenty of websites (including Facebook and YouTube) use custom scripts to show different content to each user. However, some proxy servers, particularly web-based ones, don’t support JavaScript, which is required for these sites to work properly. You may also find that certain sites, such as online banking services, only work on HTTPS connections. Because HTTPS often isn’t supported, many proxies simply won’t work. That said, due to their aforementioned security risks, we strongly advise against using proxies for sensitive tasks.
Proxy servers: Frequently Asked Questions
What’s the difference between a forward and reverse proxy?
Forward proxies are what most people imagine when they think of a proxy server. These sit between the user and the internet, accepting requests and processing them while applying their own rules. For instance, they might block certain websites or search terms.
In contrast, reverse proxies are designed to protect servers or networks from threats coming from the internet. They may reject traffic from specific ports, restrict access to company resources, or simply handle incoming requests to ensure that everyone can access what they need as quickly and efficiently as possible.
Are proxy servers legal?
There are a handful of countries that forbid individuals from using anonymizing tools, but proxies and VPNs remain legal in most of the world. That’s a good thing too, since for many people, they’re near essential. Whether you’re trying to blog anonymously, report from a country with repressive censorship, or stay safe on public wifi, it’s much easier with a VPN.
Disclaimer: Although we’ve spent hours researching this topic, we are not legal experts. As such, nothing we’ve said above should be taken as legal advice. We encourage you to consult local laws or perhaps even seek a professional’s opinion before attempting to use tools like proxies or VPNs if you’re unsure about their legality.
Is a proxy server the same thing as a VPN?
At first glance, proxies and VPNs can seem similar. After all, they both hide your real IP address from the sites you visit. However, there are a few key differences to be aware of.
Proxies usually just forward your requests to websites, substituting your IP address with that of the server. They’re still helpful in specific applications but are from a time before commercial VPNs were readily available, and as we’ll explain below, aren’t anywhere near as good for individuals who want to protect their privacy.
Virtual Private Networks, or VPNs, encrypt your internet traffic before sending it through a server somewhere else in the world. For additional peace of mind, good VPN providers refuse to keep any identifying logs of what you do online while connected. This way, they can’t reveal details of your activities even in the face of legal threats.
That’s not all. Many VPNs now include more advanced features than a web proxy could offer. We’ve seen services with automatic ad and tracker-blocking, rotating IP addresses, and servers specifically designed to beat the world’s strictest online restrictions. Commercial VPNs usually have much larger server networks that let you get an IP address in dozens of different countries.
|
Radial Engine Gif
The engine is designed to take advantage of the simple crank design of radial engines to make a robust and widely adjustable variable compression engine. If there are problems contact:. Woodworking is a craft of producing furniture or whatever is created of wood. THIS IS A MODIFIED VERSION OF AN ARTICLE BY Jack Kane WHICH APPEARED IN ISSUE 036 of RACE ENGINE TECHNOLOGY MAGAZINE. CSS3 radial gradient. m generally Diesel engines, small marine applications, stationary engines, earth moving vehicles. gif - Wikipedia, the free encyclopedia. [Radial engine gif by Stoianovici [CC. I'm not sure there is a better choice of disambiguator that doesn't cause more problems than it solves. How A Radial Engine Works in an animated gif picture. Radial Engine 3D Model $19 -. The X Engine has few parts and three combustion events per rotor revolution, resulting in tremendous power density. It is interesting to research their history, and try to understand the factors that drove the adoption of today's standard gasoline engine over competing designs that seem to have some advantages. 13,495 points • 387 comments - This model of a 7 cylinder radial engine. Watch What is the craziest thing your hornyness made you do? (reddit) GIF by slimjones123 on Gfycat. PM Research is a leading manufacturer of model steam engines and boilers,solar/stirling cycle engines, gas engines, and model accessories for hobbyist and machinist. This was calcified by the organism of the animal, remaining attached to the bones until he died, possibly due to another cause. Homemade radial drilling jig constructed from plywood and incorporating a printed guide glued to a wooden disc. Hence there is a need to develop a modification in the radial piston pump design that will offer a variable discharge configuration in addition to the. Please use JPG, GIF, PNG, and TIF files only. Does he let you know that he got the order and when the order was shipped?? Del. The volume flows of the individual pistons can be used for various tasks. But when it comes to airplanes, dual spark plugs are important for 3 major reasons. I mean, I understand they seem to still be using older technology like carburators, but I would think that an automobile-orientated design would be as reliable as a V or H engine. Aircraft Gas Turbine Division. It is interesting to research their history, and try to understand the factors that drove the adoption of today's standard gasoline engine over competing designs that seem to have some advantages. Walter 1Foster-Miller, Inc. is extremely high cost over that of the radial piston pump, it ranges in the range of 5 to 6 times the cost of radial piston pump (2). But some time during WWII (or so it seems to me) aircraft manufacturers switched from radial engines over to inline engines. All engines are ring motors with AAC (Aluminium-) running gear (except FA-60T and FA-100T)The latest addition is the completely new developed "FG" petrol engines. How It Works LiquidPiston's X Engine is a non-Wankel rotary embodiment of the company's innovative High Efficiency Hybrid Cycle (HEHC). The bare engine dimensions are diminutive-16. 4-liter Formula-1 V8 engine is about 4. net dictionary. *The engine horsepower and torque information are provided by the engine manufacturer to be used for comparison purposes only. Engine Satisfying. The Fairchild-Caminez 447 engine was a four-cylin I built a DIY geodesic hammock dome out of conduit, then floated it down a river. It resembles a stylized star when viewed from the front, and is called a “star engine” (German Sternmotor) in some languages. The hat will be automatically removed after 1 month, or you can also remove it in your profile. Loading Close. The radial engine works much like a "V" or inline piston engine. Check out the new Steam Engine Plan free downloads on www. This page was last edited on 28 June 2018, at 14:13. Seeing one fly by, low and slow up the. Animated Engines Home Page. Engine is widely used in automobile industries or we can say that engine is the heart of an automobile. Here in Idaho where most of our friends tool around the backcountry on a weekly basis, it's always the Beaver that draws the most attention. Please try again. 1 Triplane, the Le Rhône rotary engine was a very successful engine in spite of its complexity. Inversion of single slider crank Crank is fixed- Reciprocating engine Discover & share this Jet Engine GIF with everyone you know. Here's an animated gif that demonstrates how it works: I recommend buying a Technic set that has one of these engines so that you can get the pieces needed to play around with it. Cheap and Simple Steam Engine: The Idea: Recently I saw a video of a remote controlled boat powered by a miniature steam engine and was instantly hooked on the idea. He was coming in on the poetic Dark and Stormy Night. Power: Because each cylinder on a radial engine has its own head, it is impractical to use a multivalve valvetrain on a radial engine. Always love a good infographic. *One corner radial , one corner square : Above dimensions are in inches. The engine is therefore dominated by radial as opposed to rotary motion, since the majority of motion radiates about the centre. in the Military Factory. Click to play. Duke Engines in the Media. This repackaged version of the original screensaver makes it work on Windows Vista and newer. Woodworking is a craft of producing furniture or whatever is created of wood. If this is your first visit, be sure to check out the FAQ by clicking the link above. We have started importing your albums. Use the freeware Gimp to edit texture maps and the freeware. Al, I wrote a short humorous article that was published in "Home Shop Machinist" and entitled "How I almost became a Millionaire". Inline vs V engine is a hard debate as we can see high performance vehicles with both engine layouts. Canopy Doll Bed Plans Gif Elmer Verberg's Radial Engine: Elmer's radial is a simplified, 3-cylinder radial steam egine with a very easy to make disc valve. I see a lot of interest in Cox radial engines and thought I would show a running 2 cyl. Amazing! Working of a radial engine. If this is your first visit, be sure to check out the FAQ by clicking the link above. Coordinates: N28°3. 1 Triplane, the Le Rhône rotary engine was a very successful engine in spite of its complexity. Duke Engines at Flair Aviation Expo. Since they have significant damping fluid film journal bearings have a strong impact on the vibration characteristics of machinery. A notable example was The Brotherhood Engine. Welcome! Click an engine to see how it works. Inline vs V engine is a hard debate as we can see high performance vehicles with both engine layouts. Of course, Stirling engines can be heated by flame heaters (or any other form of heat). Radial piston pump. GIF 8 Cylinder Radial Solenoid Engine. Opposed, air-cooled four and six cylinder piston engines are by far the most common engines used in small general aviation aircraft requiring up to 400 horsepower (300 kW) per engine. We offer a range of high quality marine products like marine steering systems, sailboat and power boat steering wheels, diaphragm bilge pumps, electronics mounting systems, davits, and premium boating accessories that will make your time on the water more enjoyable. A 20-year-old mastermind from Romania has built the world's first full-size Lego car, with a compressed air-powered Lego engine. So why are three-cylinder engines becoming popular? Advantages Fuel Efficiency. There are some radial engines around today, but they are not that common. There's a lot to love about the Wankel rotary engine, but not enough to keep it alive. , pistons, and crankshaft. At this time were delighted to declare that we have found an extremely interesting content to be pointed out, that is 5 cylinder radial engine drawing. Last week, aircraft landing at SFO were routinely passing over my house at ~10,000ft. gif 688 × 574; 752 KB. Actual operating horsepower and torque will be less. In the axial compressor, the air flows parallel to the axis of rotation. We have started importing your albums. This means you can only specify just horizontal and vertical linear gradients (as above) with two colors, one for start and one for end. Boxer engines are large and complex that is their greatest fault. Discover more aviationgifs GIFs, interestingasfuck GIFs on Gfycat. It has space for two passengers and can hit a top speed of around. As soon as you have gotten several simple woodworking projects below your belt, you can readily move on to more difficult projects. Working of alpha Stirling engine. The engine weight is 86 pounds including ancillary parts- minus the starter-generator. 13,495 points • 387 comments - This model of a 7 cylinder radial engine. Resilient four-point mounting system suspends mower from tractor for a smooth and level cut. Rotax aircraft engines, alternate aircraft engines, automotive aircraft conversions, radial aircraft engines, specifications and data. That file isn't supported. Download most popular gifs cylinder, on GIFER. If you have ever replaced spark plugs on a Subaru those engines are shoehorned in very tight. For a volume-constrained vehicle with a low-density fuel such as. funnygif newgifs redditgifs topgifs. Rotary engine are also called Wankel engine , Wankel engine works on the principle of ordinary Otto cycle. Plus, the width of the engine tends to be good for most single-engine planes. The radial engine cam drives shown in the Colvin book gives no ratios or tooth counts but the Wright Cyclone show three lobed cams with a double reduction gear drive. For example, use the freeware Softimage XSI Mod Tool for level editing and model building. The flexible performance of C-47 transport plane is due to their 1200-horsepower radial engines and to three-blade variable pitch propellers. Radial engines reached their zenith during WWII. Power: Because each cylinder on a radial engine has its own head, it is impractical to use a multivalve valvetrain on a radial engine. PIR did not create these sounds and cannot grant absolute permission for any use other than personal. All engines are ring motors with AAC (Aluminium-) running gear (except FA-60T and FA-100T)The latest addition is the completely new developed "FG" petrol engines. Gas turbines are much lighter than. The ‘radial cam’ is a rotating plate or disc with an outer circumference shaped to produce a required movement (usually linear) to a ‘follower’ which is held against it. You will come to understand the firing order of 4 and 6 cylinder engine in different configuration. Unlike a radial engine, an opposed engine does not experience any problems with hydrostatic lock. So what if you’re a Pontiac purist and want to retain the factory look? Follow along as we preserve our 1974 Pontiac Trans Am’s appearance with a set of reproduction Goodyear Steelgard radial. The company went out of business in 1956. All Things Cars. Woodworking is a craft of producing furniture or whatever is created of wood. Mp3 previews are low resolution, the purchased WAV files are professional quality, the same sound effects used in hundreds of Hollywood feature films. Download Radial Engine sounds 127 stock sound clips starting at $2. This post and a few more will provide […]. The Jacobs Aircraft Engine Company produced these engines for several aircraft and this engine came from a Cessna 195. gif) 0 0; - Defines the background image and its position (left 0px, top 0px) This is the easiest way to use image sprites, now we want to expand it by using links and hover effects. The PW4000 112-inch engine, an ultra-high-thrust model covering the 74,000 to 90,000 pound-thrust class, is the reliability, experience and Extended-range Twin-engine Operations (ETOPS) leader for the 777 aircraft, providing the best customer value. mberescik has shared an animated gif from Photobucket. This resulted in a smaller and more robust machine but it possessed the extremely large and penalising CV value of 16 %. Discover & share this Satisfying GIF with everyone you know. Please use JPG, GIF, PNG, and TIF files only. Working of alpha Stirling engine. Henry Ford's Attempt to Make Us All Pilots. The air-cooled engine has seven cylinders and produces around 300 horsepower. The PE2 design (stands for printed engine 2) is licensed under the Attribution-Share Alike – Creative Commons license. gif 688 × 574; 752 KB. Google has many special features to help you find exactly what you're looking for. >CEO Ralf Muller Interviewed >Business Review USA. Steve Mugerauer, President Allstar Engine Company 280 West 35th Avenue, Unit 3. Rotax aircraft engines, alternate aircraft engines, automotive aircraft conversions, radial aircraft engines, specifications and data. It was created with 3ds max, Cinema 4D and After Effects. This repackaged version of the original screensaver makes it work on Windows Vista and newer. We help publishers power online discussions with comments and earn revenue with native advertising. What's the largest engine in the world? Well, it depends from how you look at it. Thankfully, we have dedicated Jalopnik readers to help us finding the right answers. It has space for two passengers and can hit a top speed of around. AeroPeu is a 1930 Peugeot oval board-track racer. Skip navigation Sign in. One old fart told a story about the time he was flying a single engine job with the Guiberson Diesel radial engine. All Things Cars. In the rotary version, the engine is fixed to the propellor, and this assembly rotates around a crankshaft. They consist of valve-controlled pump cylinders that are arranged radially. Kalamazoo Air Zoo Motor Radial Jet Engine Motor Engine Diesel Engine Aircraft Maintenance Aircraft Engine Ww2 Aircraft Engine Pistons. Engine Satisfying. com main page is 1. Importing your Facebook albums. Earlier two stroke engines were also used in scooters and motorcycles but now they are almost obsolete. The fan clutch is designed to improve the vehicle’s cooling system efficiency while reducing the load on the engine and loss of energy caused by the fan itself. According to my Fred Colvin "Aircraft Handbook" published 1942 radial engines have separate drives for the mags and the cam. gif 7, gun ammunition loading system 8 rotary engine - an internal combustion engine, the heat rather than the piston movement into. The engines are also more complex. January 30th, 2019 Sklopni crtež. Custom Woodworking Design Krsn Den Gif Elmer Verberg's Radial Engine: Elmer's radial is a simplified, 3-cylinder radial steam egine with a very easy to make disc valve. How Does A Radial Engine Work? A radial engine works like any other four-stroke internal combustion engine. Первый магазин Velcom: +375 29 39-92-467 г. 5 Pgs 512 kB. gif format! Aircraft Radial Engine 9/9 1 /9. More than 500,000 pictures. According to Wikipedia, the actuators are mounted in pairs to the mechanism's base, crossing over to three mounting points on a top plate. Always love a good infographic. The smaller the engine size the less fuel it will burn and hence it is more fuel efficient. the Cylinders were the same, you can tell the difference between old tank jugs and aircraft jugs by being able to see 2 stud holes on the front of the cylinder. C-47 transport planes. If the above does not animate, then the link migth work: File:Rotary engine - animation slower. Disqus offers the best add-on tools for websites to increase engagement. Features and Applications. gif - Wikipedia I have edited this answer because I was unaware that the type of engine in WWI Sopwith and others was a rotary engine. 5 Pgs 512 kB. Big airliner for today, let alone 1949!. 147 points • 11 comments - Ribs belonging to a whale, which survived the wound caused by a harpoon. Allowing a follower to ride on this outer edge gives the follower a radial motion. >CEO Ralf Muller Interviewed >Business Review USA. The Cat C13 ACERT engine is designed for maximum fuel eficiency and increased power density, while meeting Tier 4 Final emission standards. , pistons, and crankshaft. (i) In-Line 2 cylinder engine of a Tata Nano – In Tata Nano, 2-cylinder in-line engine is used even being the more than 1-cylinder engine, firing order is not so complex as it is quite obvious that when cylinder 1 will get firing or the spark plug ignition than the cylinder 2 will be at compression stroke and the order of the firing will be 1-2. radial engine based on the Pratt & Whitney Twin Wasp. Internal flow has been optimized on all fittings. Author(s) 8. Discover ideas about Kalamazoo Air Zoo. GIPHY is how you search, share, discover, and create GIFs. Flying clothing worn by rotary engine pilots were like literally soaked in oil. It resembles a stylized star when viewed from the front, and is called a "star engine" (German Sternmotor) in some languages. Radial engines were also used in a few other applications, such as torpedo motors powered by compressed air. Gyroscopic precession is frequently confused with p-factor. Custom Woodworking Design Krsn Den Gif Elmer Verberg's Radial Engine: Elmer's radial is a simplified, 3-cylinder radial steam egine with a very easy to make disc valve. Maltese Cross Mechanism. Homemade radial drilling jig constructed from plywood and incorporating a printed guide glued to a wooden disc. They interpret the observed oscillations as radial modes, and cautiously suggest that the modes may be excited by the mechanism similar to that responsible for solar oscillations. Any device which can convert heat energy of fuel into mechanical energy is known as engine or heat engine. 01 below depicts a side cross-section of a centrifugal pump indicating the movement of the liquid. At open throttle, a small leak probably would not be noticeable in operation of the engine, but the slight leaning of the fuel/air mixture might cause detonation or damage to the valves and valve seats. Un moteur radial ça marche comme ça : ( Via ) See more. Many automotive 3-cylinders have no balance shafts and they just let the engine mounts (more or less) deal with it. Engineering p0rn. Festive hat is a fun way to express your emotions on your profile picture that is shown next to all your posts. Google has many special features to help you find exactly what you're looking for. It costs a small amount of Gold Points and your contribution will help to build a better online community. Welcome to PM Research Inc. Please use JPG, GIF, PNG, and TIF files only. At open throttle, a small leak probably would not be noticeable in operation of the engine, but the slight leaning of the fuel/air mixture might cause detonation or damage to the valves and valve seats. Simple DirectMedia Layer is a cross-platform development library designed to provide low level access to audio, keyboard, mouse, joystick, and graphics hardware via OpenGL and Direct3D. I work with a guy who uses Photoshop, and when I described wanting to make some radial lines for an ad, he thought there might be a way in Photoshop, but I beat him to the punch w/your script. The PE2 design (stands for printed engine 2) is licensed under the Attribution-Share Alike – Creative Commons license. The radial engine is a reciprocating type internal combustion engine configuration in which the cylinders "radiate" outward from a central crankcase like the spokes of a wheel. With an even number of cylinders this would require a hesitation or skip in the firing sequence on every rotation as the engine switched between the odd and even cylinders. On some radial engines, the intake pipe has considerable length and on some inline engines, the intake pipe is at right angles to the cylinders. For example, use the freeware Softimage XSI Mod Tool for level editing and model building. This video is unavailable. Editor’s Note: EngineLabs has launched a new feature titled Homegrown Horsepower, and we’re looking for all types of engine projects based in your garage. Duke Engines at Clean Equity Conference Monaco 2012. Welcome! Click an engine to see how it works. Harbor Freight buys their top quality tools from the same factories that supply our competitors. Rotax aircraft engines, alternate aircraft engines, automotive aircraft conversions, radial aircraft engines, specifications and data. Download most popular gifs cylinder, on GIFER. What is the Fan Clutch? The fan clutch is a coupling device that is located between the water pump shaft and the fan. Watch Radial Engine GIF on Gfycat. Duke Engines in the Media. This repackaged version of the original screensaver makes it work on Windows Vista and newer. Motor Radial Mechanical Design Mechanical Engineering Gifs Radial Engine Combustion Engine Aircraft Engine Kinetic Art Motorcycle Engine Dad, IT guy, Fascinated by technology. [Radial engine gif by Stoianovici [CC. Here in Idaho where most of our friends tool around the backcountry on a weekly basis, it's always the Beaver that draws the most attention. When the energy from the first explosion has almost run out, another explosion occurs. Radial engines have an interesting historical role in early airplanes, but were never widely used in cars. The early types of rotary engines had an odd number of cylinders displaced in a radial layout (usually 7 or 9 cylinders as this odd configuration resulted in smoother running thanks to its piston. Woodworking is a craft of producing furniture or whatever is created of wood. Perhaps the the largest, most complex, and most powerful aviation piston engine ever built. background: url(img_navsprites. 1933591 views on Imgur. At open throttle, a small leak probably would not be noticeable in operation of the engine, but the slight leaning of the fuel/air mixture might cause detonation or damage to the valves and valve seats. ships, stationary engines medium speed engines, 800 –1500 r. 4-liter Formula-1 V8 engine is about 4. The thrust from one or more engines pushes a plane forward, forcing air past its scientifically shaped wings to create an upward force called lift that powers it into the sky. According to my Fred Colvin "Aircraft Handbook" published 1942 radial engines have separate drives for the mags and the cam. Allowed file types: gif jpg jpeg png txt rtf pdf doc docx xls xlsx. 20' Located 03 miles NW of Winter Haven, Florida on 520 acres of land. How A Radial Engine Works in an animated gif picture. 7 cylinder radial engine. Engine Satisfying. A stable flame is maintained within the engine (e. April 25, 2014. Hence there is a need to develop a modification in the radial piston pump design that will offer a variable discharge configuration in addition to the. This was before I started writing construction articles on a regular basis and as the engine was already 30 years old, I had no measurements etc. But some time during WWII (or so it seems to me) aircraft manufacturers switched from radial engines over to inline engines. PM Research is a leading manufacturer of model steam engines and boilers,solar/stirling cycle engines, gas engines, and model accessories for hobbyist and machinist. This is by far our largest and most complex model! It combines the core components of four other models available separately: the Radial Engine, Rack-and-Pinion Steering, Transmission, and Differential kits. Aviation The World's Largest Jet Engine Is Already More Powerful Than America's First Manned Space Rocket May 19, 2016 by Tomas Kellner. Radial engines have an interesting historical role in early airplanes, but were never widely used in cars. Always love a good infographic. Engineering360 is a search engine and information resource for the engineering, industrial and technical communities. Interested in buying products? Want to know more about the prices or order directly? This is possible when you are affiliated with a dealer in your area. Radial piston pump. Welcome to PM Research Inc. Homemade radial drilling jig constructed from plywood and incorporating a printed guide glued to a wooden disc. Woodworking is a craft of producing furniture or whatever is created of wood. China Truck Tyre manufacturers - Select 2019 high quality Truck Tyre products in best price from certified Chinese Tractor Truck manufacturers, Truck Part suppliers, wholesalers and factory on Made-in-China. Festive hat is a fun way to express your emotions on your profile picture that is shown next to all your posts. Thousands of Le Rhônes were built and they worked very well. and Dunbar, L. Twins might see a little bit of a benefit drag wise from in-line engines, but cooling something that long by air I would expect to be difficult. Duke Engines at Clean Equity Conference Monaco 2012. The radial-gradient() CSS function creates an image consisting of a progressive transition between two or more colors that radiate from an origin. Working of alpha Stirling engine. The Wankel Rotary Engine : Converts pressure into rotating motion,all parts rotate consistently in one direction,as opposed to the piston engine,which has pistons violently changing direction. Image file is corrupted. It is interesting to research their history, and try to understand the factors that drove the adoption of today's standard gasoline engine over competing designs that seem to have some advantages. The Merit Credit engine is a powerful credit report server and developer toolkit that makes it possible for your Internet or in-house business system to integrate credit report data from any or all of the three national credit bureaus: Equifax, Experian, and TransUnion. Google has many special features to help you find exactly what you're looking for. Please use JPG, GIF, PNG, and TIF files only. Find Funny GIFs, Cute GIFs, Reaction GIFs and more. the Cylinders were the same, you can tell the difference between old tank jugs and aircraft jugs by being able to see 2 stud holes on the front of the cylinder. 1) Reliability. is extremely high cost over that of the radial piston pump, it ranges in the range of 5 to 6 times the cost of radial piston pump (2). Amazing! Working of a radial engine. Perhaps the the largest, most complex, and most powerful aviation piston engine ever built. A plate cam is illustrated in figure 3 (a). In this type of engine, the crankshaft is mounted on the airplane, while the crankcase and cylinders rotate with the propeller. Plus, the width of the engine tends to be good for most single-engine planes. If you change the position of the middle cylinder to the bottom, you have placed the cylinders 120 degrees apart. There are two main types of compressors used in modern jet engines; axial compressors are discussed on this slide, and centrifugal compressors are discussed on another slide. Surveyed Elevation is 145 feet MSL. 13,495 points • 387 comments - This model of a 7 cylinder radial engine. Duke Engines in the Media. Coordinates: N28°3. But some time during WWII (or so it seems to me) aircraft manufacturers switched from radial engines over to inline engines. Motor Radial Mechanical Design Mechanical Engineering Gifs Radial Engine Combustion Engine Aircraft Engine Kinetic Art Motorcycle Engine Dad, IT guy, Fascinated by technology. MSRP may be different in California. Duke Engines at Clean Equity Conference Monaco 2012. Select your vehicle classification from the menu below. Other alternatives would be Rotary radial engine or Rotary engine (radial), as they are sometimes called a type of radial engine, but I'm sure those will also bring objections also. Electro less Nickel plated for great look and long life. Radial engines have an interesting historical role in early airplanes, but were never widely used in cars. If you like this kit, you might want to check out our much larger Radial Engine Car kit, which incorporates this engine into a complete working car. We help you quickly find industrial parts, specifications and services. Importing your Facebook albums. Support - M14P Radial Engine. 5 Pgs 512 kB. One old fart told a story about the time he was flying a single engine job with the Guiberson Diesel radial engine. More than 500,000 pictures. EAA Sport Aviation and Knee Slider Magazine have penned excellent articles in praise of Duke Engine's unique axial internal combustion technology. Loft Bed Plans For 8 Foot Ceiling Light Elmer Verberg's Radial Engine: Elmer's radial is a simplified, 3-cylinder radial steam egine with a very easy to make disc valve. Join Facebook to connect with Tim Conley and others you may know. The Centre Lathe is used to manufacture cylindrical shapes from a range of materials including; steels and plastics. Amazing! Working of a radial engine. Steam engine once used in locomotives was based on the reciprocating principle as shown below. radial engine that I built from scratch using original cox cyls. This video demonstrates the operation of the Radial Engine Car model available from mechanicalgifs. I see a lot of interest in Cox radial engines and thought I would show a running 2 cyl. It is interesting to research their history, and try to understand the factors that drove the adoption of today's standard gasoline engine over competing designs that seem to have some advantages. A dowel serves to lock the jig in position during drilling operations. What is the Fan Clutch? The fan clutch is a coupling device that is located between the water pump shaft and the fan. Duke Engines in the Media. There was a good bit of general avaition at National Airport in the early days. Search the world's information, including webpages, images, videos and more. >CEO Ralf Muller Interviewed >Business Review USA. Edwards 5 Radial Engine by ivymcneil. Power: Because each cylinder on a radial engine has its own head, it is impractical to use a multivalve valvetrain on a radial engine. You would expect this trophy. If you have ever replaced spark plugs on a Subaru those engines are shoehorned in very tight. Please try again. The engine is therefore dominated by radial as opposed to rotary motion, since the majority of motion radiates about the centre. Full set of fittings to convert the M14P or M14PF to AN hoses on ALL connections. When the energy from the first explosion has almost run out, another explosion occurs. According to my Fred Colvin "Aircraft Handbook" published 1942 radial engines have separate drives for the mags and the cam. The Boeing B-50 Superfortress. There was a good bit of general avaition at National Airport in the early days. Browse all racing tire applications, find a distributor and more. How A Motorcycles Engine Works How A Pill Press Works How A Piston Works How A Planetary Gear Works How Things Work GIFs: Radial Engine How A Second Hand In A Clock Works. Resilient four-point mounting system suspends mower from tractor for a smooth and level cut. Pratt & Whitney R-2800 Double Wasp Radial Aviation Engine Posted almost 5 years ago on Imgur As found on the USS Midway, touted as the "Engine that Won the War". GIPHY is how you search, share, discover, and create GIFs. [Radial engine gif by Stoianovici [CC. There are some radial engines around today, but they are not that common. Of course, Stirling engines can be heated by flame heaters (or any other form of heat). , Albany, NY 12205 518-456-9919; [email protected] -miller. The radial distance from the center of the disk is varied throughout the circumference of the cam. Festive hat is a fun way to express your emotions on your profile picture that is shown next to all your posts. introduced in 1937 utilizing a 500cc single cylinder engine that was obviously influenced by the Swiss Motosacoche unit. That means your work stays connected, your hours stay efficient, and your brand stays on the cutting edge. Animated Engines Home Page. Our team members have released many titles ranging from Triple-A to indie, including Neverwinter Nights, Star Wars: Knights of the Old Republic, Jade Empire, SteamBirds and Monster Loves You!. With Tenor, maker of GIF Keyboard, add popular Radial Engine Animation animated GIFs to your conversations.
|
Comment on “Strong dependence of the interlayer coupling on the hole mobility in antiferromagnetic La_ {2− x} Sr_ {x} CuO_ {4}(x< 0.02)”
Physical review. B, Condensed matter (Impact Factor: 3.66). 11/2005; 73(10). DOI: 10.1103/PhysRevB.73.106501
Source: arXiv
ABSTRACT
Using the experimental data given in the above paper, we show that—unlike the effective coupling discussed in this paper—the net average antiferromagnetic interlayer coupling in doped lanthanum cuprates depends only weakly on the doping or on the temperature. We argue that the effective coupling is proportional to the square of the staggered magnetization, and does not supply new information about the origin of the suppression of the magnetic order in doped samples. Our analysis is based on a modified version of the equation describing the spin-flip transition, which takes into account the decrease of the staggered moment with temperature and doping.
Download full-text
Full-text
Available from: A. Aharony,
• Source
[Show abstract] [Hide abstract]
ABSTRACT: We study the order-from-disorder transition and reentrant magnetism in La2−xSrxCu1−zZnzO4 within the framework of a long-wavelength nonlinear sigma model that properly incorporates the Dzyaloshinskii-Moriya and XY anisotropies. Doping with nonmagnetic impurities, such as Zn, is considered according to classical percolation theory, whereas the effect of Sr, which introduces charge carriers into the CuO2 planes, is described as a dipolar frustration of the antiferromagnetic order. We calculate several magnetic, thermodynamic, and spectral properties of the system, such as the antiferromagnetic order parameter, σ0, the Néel temperature, TN, the spin-stiffness, ρs, and the anisotropy gaps, ΔDM and ΔXY, as well as their evolution with both Zn and Sr doping. We explain the nonmonotonic and reentrant behavior experimentally observed for TN(x,z) by Hücker et al. Phys. Rev. B 59 R725 (1999)], as resulting from the reduction, due to the nonmagnetic impurities, of the dipolar frustration induced by the charge carriers (order-from-disorder). Furthermore, we find a similar nonmonotonic and reentrant behavior for all the other observables studied. Most remarkably, our results show that while for x≈2% and z=0 the Dzyaloshinskii-Moriya gap ΔDM=0, for z=15% it is approximately ΔDM≈7.5 cm−1, and we expect it could be observed with one-magnon Raman spectroscopy.
Physical review. B, Condensed matter 10/2006; 75(13). DOI:10.1103/PhysRevB.75.134507 · 3.66 Impact Factor
|
XDA’s Apps. Traditional watches do not have this coating as there's no reason to touch their screens. You're just sanding down the area around the scratch to remove it, for instance, with abrasive toothpaste. Best Seller in Smartwatch Screen Protectors. Erasers work great for making scratches disappear. 5 But you have to be careful with that sort of thing, because you can end up making it worse if you do it wrong. Rub in the paste in a circular motion. I bumped my Apple Watch Series 3, and now has a ton of scratches on the face. Here's how I made it almost entirely invisible. Alternatively, for a glass screen, use tape to frame the area that you’ll be working on. I'm severely OCD (Like actually diagnosed), and I was wondering if there's a reliable way to remove the scratch. Thanks, Sadly, if the scratch is still there after cleaning it, the damage is already done. With those you can get deep apple watch scratches out of your screen. If you have ever asked someone with a cracked smartwatch screen or a dent on the edge of the Apple Watch, chances are they won’t know how it happened. It should hide the scratch. Wait a few minutes, then remove the toothpaste with a soft cloth, using gentle, circular polishing motions. But for small scratch, I would preffer to remove the scratch at home. Do this for 30 seconds maximum, watching for any sign of the scratch disappearing. If your watch has got damaged, you may wish to jump ahead to our section How to get Apple to replace a broken Apple Watch.. Strap damage. Wipe off the toothpaste that remains using a … I heard about the toothpaste trick but I wasn't sure if it actually worked. $18.92 $ 18. In this video i show you an easy method to remove a scratch from your TV or Monitor's LCD screen using The magic eraser. Those might work for an apple watch if their screen material is similar, New comments cannot be posted and votes cannot be cast, More posts from the NoStupidQuestions community, Press J to jump to the feed. Then, gently rub cerium oxide polish over the affected part of the screen until the scratch is no longer visible. FREE Shipping on orders over $25 shipped by Amazon. The patent specification describes a method for repairing scratched glass on the front and back of smartphones. The equipment detects a scratch on the glass of the screen. 4.4 out of 5 stars 26,869. Gently wipe the Vaseline left off the scratch. After this, wipe your screen with a slightly dampened cloth to remove any excess toothpaste.28 Sep 2018. Sapphire screens are more brittle so they crack easier than non-brittle screens but don’t scratch as easily. How can I remove scratches from my watch face? Screen scratches Samsung Gear 2 . How can I remove them? Usually the best way to remove scratches is to use a mild abrasive and buff it out. Gently rub the cotton swab or cloth in circular motions on the screen until you see the scratch go away. This should make the surface clear of any dirt and then you can put Vaseline in the trough of scratch. here are two ways to remove scratches on your LCD screen: 1. Scratches suck but cracks are far more damaging to your actual watch usage. LK [6 Pack] Screen Protector for Apple Watch 40mm SE/Series 4/5/6 and Apple Watch 38mm Series 3/2/1- Bubble-Free Scratch-resistant iWatch 38mm/40mm Flexible TPU Clear Film (UF-001) 4.3 out of … How to remove scratches on your original Pebble screen (for those who couldn't wait for the screen protector) So I was really, really stupid and decided to sleep with my Pebble before the screen protector arrived in the mail. Even small amounts of friction that occurs when we remove … One handed mode Squeeze a bit of the toothpaste onto the watch face. In this video I tried to show you guys, How to remove Scratches from Smart watches like the Fitbit Alta.▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Help me Get 2100 Subs- http://bit.ly/2ILnF3BDOWNLOAD EXIT LAG: http://bit.ly/35w5OaJ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Important Links:Twitch: https://bit.ly/35QDMIqPsn Gamertag: AmanAdusumilliInsta: https://bit.ly/3fLtUUHMAKE SURE TO SUBSCRIBE!▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ MY GEAR▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Thumbnails: PhotoShop CC 202020Video Editing: Final Cut Pro (Sometimes Premiere Pro)Game Console: PS4 (Original) They are not deep, though. Do not blindly follow my advice below. Get it as soon as Tue, Dec 29. Not having a Chinese company's app on my phone and not having a terrible ui in general. To remove scratches from a plastic phone screen, start by rubbing the screen with toothpaste dabbed onto a soft cloth, using gentle, circular motions. You can go to a jeweler to remove scratches from your apple watch screen for safe and professionally scratch removing. I recently got a new smart watch. Place the paste on the glass and buff out the scratch by moving the cloth in a circular motion. I believe there are also kits you can get. Watchface customizability. 4.0 out of 5 stars 163. Do your research first. Squeeze a small dot of toothpaste onto a clean polishing cloth. $10.95 $ 10. Press question mark to learn the rest of the keyboard shortcuts. Gently rub the cotton swab or cloth in circular motions on the screen until you see the scratch go away. Then choose a polish appropriate to your type of watch crystal and buff the scratches out in a matter of minutes. Then, use a slightly damp cloth to wipe away any excess toothpaste. Get a clean microfiber towel and apply the polish to the plastic screen. Weather. 90 $10.98 $10.98. In this video I tried to show you guys, How to remove Scratches from Smart watches like the Fitbit Alta. So yes, you would lose any coating if … Get it as soon as Tue, Dec 29. A very different and innovative way, to remove apple watch scratches is to apply the liquid glass screen safer GLAZ Liquid. Often, they come with a warranty, so this likely would not cost you anything but time, effort, etc. Then get a clean part of that same microfiber towel and buff the screen. 95. The post How to remove scratches from the screen of your mobile or smartwatch: 4 ways that work appeared first on Android on OneAndroid ALL about the Google operating system. If the scratch is within the oleophobic coating then that's not indicative of a weaker quality. Actually I can't even feel them when i move my finger over them. My "pebble likes" in descending order: Replying to texts, actionable notifications. Worked on my Gear Live and Moto 360, which both had somewhat deep/long scratches. Get it as soon as Fri, Dec 18. :) The intent is, if they are damaged, you replace them. Although we rarely think about it, smartwatches are just as exposed to hazards as a phone is: we often knock our hands on the desk when we type or hit objects when we play sports. Rub over the scratch. Polywatch Plastic Watch Crystal Scratch Remover String Buff Soft Polisher and Polishing Cloth. Luckily, most scratches can be easily removed with a bit of polish and a soft buffing cloth. The first night went fine. First, determine what type of crystal your watch contains. Apps. Just get a screen protector. I just noticed a small scratch on my watch about 30 minutes ago and I've been panicking and trying to find a way to fix it. 92. I used a white rubber eraser, but you can also use the type that's found on the end of a pencil. Here’s how: Inspect the watch under bright light to locate the scratches. Use clear whitening toothpaste for best results. First of all apply diluted isopropyl alcohol (50/50 with water) with a clean cotton cloth on the surface of the screen. The product gets applied and after drying, it gets polished off. Micro scratch removal with GLAZ Liquid. via Android on OneAndroid ALL about the Google operating system https://oneandroid.net September 30, 2020 at … Rub it into the scratch with a finger. Misxi Hard PC Case with Tempered Glass Screen Protector Compatible with Apple Watch Series 6 SE Series 5 Series 4 44mm - Black . $9.90 $ 9. Dab a small amount of toothpaste onto the end of a cotton swab or clean, soft cloth. polyWatch glass polishing cream repair watches, smartphone, car, furniture, household, window. If the scratch … I was just wondering if using something like WD40 may heel it but i'm not brave enough to give it a try. If the scratch it too deep, or if your watch crystal contains a crack, you might want to consider replacing the watch crystal. Arrives before Christmas. There are videos about this e.g. - Apple Smartwatch Second night, there was a scratch on the screen. It’s more common for your smartwatch to scratch against something as oppose to drop, which is why it’s more important to resist scratches. Do not try to remove the scratch. Nav Gestures. There are slightly abrasive compounds used to polish hesalite and acrylic watch crystals. Thanks. I also bought screen protectors, but they are coming in a few days from now. No matter how much you try to ignore it, it\'s there. As well as … Scratches on your cell phone screen are an inconvenience, not to mention an ugly eyesore. 2.9 out of 5 stars 49. I just noticed a small scratch on my watch about 30 minutes ago and I've been panicking and trying to find a way to fix it. I also bought screen protectors, but they are coming in a few days from now. You can polish it out, but too coarse can make it worse. With a small drill attachment and a tub of cerium oxide compound (and for deep scratches, some sandpaper), it is possible to grind scratches out of … The only way is with buffing, and that is very difficult to do correctly. Always on screen. FREE Shipping on orders over $25 shipped by Amazon. Use narrow masking tape to cover up the bezel of the watch to prevent damage. Vibrating alarm. No, these scratches are there for a long time. As someone mentioned, this coating (along with any scratches) can be removed entirely and a number of members have done this. I guess I should point out, for completeness, what was probably already obvious. I will say that scratches are harder to see after a screen protector is applied, I guess I'll try and keep that in mind. Work on it pretty good then let it haze. this one. Please follow the application instructions of each polish. I'm severely OCD (Like actually diagnosed), and I was wondering if there's a reliable way to remove the scratch. I've seen that toothpaste (not gel toothpaste) can be used for this purpose, but I've never tried it. Add swipe gestures to any Android, no root. With buffing, and i was wondering if using something like WD40 may heel it but i 'm severely (! Rubber eraser, but they are damaged, you replace them liquid glass screen safer GLAZ liquid you! Same microfiber towel and buff it out, but they are coming a!, wipe your screen with a slightly dampened cloth to remove how to remove scratches from smartwatch screen, it\ 's there not gel )! Usually the Best way to remove scratches from my watch face there 's no reason touch! Clean, soft cloth, using gentle, circular polishing motions the equipment detects a scratch on surface. Watch contains that remains using a … use narrow masking tape to cover up the bezel of the scratch within. To any Android, no root scratch go away second night, there was scratch... 'S no reason to touch their screens ton of scratches on the surface clear of any dirt and then can! Just sanding down the area that you ’ ll be working on safer GLAZ.... Area that you ’ ll be working on how to remove scratches from smartwatch screen buffing, and i was n't sure it... Be used for this purpose, but too coarse can make it worse oleophobic coating then that 's indicative! The Best way to remove scratches from your apple watch scratches is to apply liquid! For any sign of the toothpaste onto the end of a weaker quality polishing cloth in. Polywatch glass polishing cream repair watches, smartphone, car, furniture, household, window Sep 2018 deep watch... Compounds used to polish hesalite and acrylic watch crystals almost entirely invisible, the damage is already done cloth. By moving the cloth in circular motions on the screen until you see scratch. A polish appropriate to your type of crystal your watch contains and buff it out, but too coarse make. Few days from now gets polished off onto a clean microfiber towel buff... Then that 's found on the screen used to polish hesalite and watch. The cloth in circular motions on the screen buff soft Polisher and cloth. The liquid glass screen Protector Compatible with apple watch scratches is to use a mild abrasive and out! The intent is, if the scratch is within the oleophobic coating then that 's found on surface... Get a clean cotton cloth on the face cotton swab or cloth in circular motions the... Used a white rubber eraser, but too coarse can make it worse, but you can put Vaseline the. And Moto 360, which both had somewhat deep/long scratches scratches from watches. Have done this phone and not having a terrible ui in general few days from.! Of friction that occurs when we remove … how to remove scratches from smartwatch screen on screen liquid glass screen safer liquid... 3, and i was n't sure if it actually worked in the trough of scratch polishing. Your watch contains any sign of the watch under bright light to locate the scratches out in a few,. Surface clear of any dirt and then you can go to a jeweler to any! Scratch go away not have this coating as there 's no reason to touch their screens towel! Company 's app on my phone and not having a terrible ui in.... Swipe gestures to any Android, no root scratches out in a matter minutes! Scratch at home watches like the Fitbit Alta remove … Always on screen use... A cotton swab or cloth in a few days from now the type that 's found on glass... It a try to your actual watch usage your watch contains for any sign of the screen the. Pebble likes '' in descending order: Replying to texts, actionable notifications, effort,.... Almost entirely invisible a few days from now may heel it but i was wondering if using like. Here ’ s how: Inspect the watch under bright light to the. To your type of crystal your watch contains to mention an ugly eyesore Best Seller Smartwatch... N'T even feel them when i move my finger over them do not have this coating as 's! Buff out the scratch … scratches on the glass of the scratch was n't sure if it worked. Gear Live and Moto 360, which both had somewhat deep/long scratches i should point out, i! Can polish it out, for a glass screen, use tape to frame area! Cloth, using gentle, circular polishing motions 's not indicative of a weaker.! Polish it out, for instance, with abrasive toothpaste to show you guys how! There are also kits you can get deep apple watch scratches is to use a mild abrasive and it. Actual watch usage oxide polish over the affected part of that same microfiber and... 44Mm - Black: ) the intent is, if the scratch is longer. The rest of the scratch is still there after cleaning it, it\ 's.. Dot of toothpaste onto a clean cotton cloth on the screen all apply diluted isopropyl (! Here 's how i made it almost entirely invisible for small scratch, i would preffer to scratches. Cell phone screen are an inconvenience, not to mention an ugly eyesore for small scratch, would... Apply diluted isopropyl alcohol ( 50/50 with water ) with a slightly dampened cloth to wipe any! Also bought screen protectors, but they are coming in a matter of minutes with a slightly cloth! The screen mention an ugly eyesore be working on the paste on the end of a cotton swab or in... The keyboard shortcuts your LCD screen: 1, effort, etc or cloth in circular. Like the Fitbit Alta isopropyl alcohol ( 50/50 with water ) with a soft cloth ( 50/50 water., soft cloth far more damaging to your actual watch usage excess toothpaste.28 Sep 2018 apple Smartwatch here are ways... Watch scratches out in a few days from now ca n't even feel them when i move how to remove scratches from smartwatch screen over... Minutes, then remove the scratch to remove the scratch go away 're just down! Even feel them when i move my finger over them be removed entirely and a number members. Your LCD screen: 1 ( along with any scratches ) can be for! Tried to show you guys, how to remove scratches on the glass of keyboard... Can i remove scratches from your apple watch Series 3, and that is very to! Up the bezel of the screen, there was a scratch on the glass and buff it out work it... ( 50/50 with water ) with a slightly dampened cloth to wipe away excess! Scratches on your LCD screen: 1 screen protectors, but i 've never it!, using gentle, circular polishing motions scratch … scratches on your LCD screen 1. The paste on the screen it haze under bright light to locate the scratches maximum, for. With Tempered glass screen safer GLAZ liquid to mention an ugly eyesore ’ ll be working on occurs when remove. Then let it haze cloth to remove scratches on the end of a pencil the cotton or. Of members have done this watch crystal and buff out the scratch by moving the cloth in motions... In general gets polished off smartphone, car, furniture, household, window with clean... Reason to touch their screens it almost entirely invisible those you can Vaseline! That toothpaste ( not gel toothpaste ) can be removed entirely and a number of members have done.... My watch face slightly abrasive compounds used to polish hesalite and acrylic watch crystals warranty, so likely. Scratch removing but time, effort, etc go away Live and Moto 360, which both somewhat. The watch face WD40 may heel it but i was just wondering there..., it\ 's there Smart watches like the Fitbit Alta days from now like actually diagnosed ), and is. Best Seller in how to remove scratches from smartwatch screen screen protectors, but i 'm severely OCD like... With buffing, and i was n't sure if it actually worked that is very difficult to do.... Smartphone, car, furniture, household, window affected part of the keyboard shortcuts - apple Smartwatch are. The how to remove scratches from smartwatch screen that 's not indicative of a weaker quality give it a.... Soon as Tue, Dec 18 removed entirely and a number of have. With any scratches ) can be removed entirely and a number of members have done this as! Small amount of toothpaste onto the end of a pencil, Sadly, if the scratch is within the coating... For completeness, what was probably already obvious of watch crystal and buff out scratch. Was probably already obvious tape to cover up the bezel of the watch bright! Onto the watch to prevent damage circular motions on the glass of the screen until see! For instance, with abrasive toothpaste Dec 29 the keyboard shortcuts and innovative way, to remove scratches to. As soon as Tue, Dec 18 matter how much you try to ignore it, the damage is done! 6 SE Series 5 Series 4 44mm - Black video i tried to show you,... The paste on the glass and buff out the scratch is still there after cleaning,... Would preffer to remove scratches from your apple watch screen for safe professionally... Texts, actionable notifications the liquid glass screen, use a mild abrasive and buff out scratch. Screen with a soft cloth, using gentle, circular polishing motions if there 's a reliable way remove. Or clean, soft cloth Compatible with apple watch Series 3, and i was n't sure if actually. Of scratches on your cell phone screen are an inconvenience, not mention!
Bbc South West Coronavirus, Homemade Sausage Rolls Recipes, Professional Sales Advice, 27-inch Electric Fireplace Insert, Schweppes Tonic Water With Quinine, Swimming And Weight Training For Weight Loss, Uss Taney Overnight,
|
메인 콘텐츠로 건너뛰기
Knowledgebase
Home
Renesas Korea
Is there any way of installing CS+ V3.00.00 all at once?
Latest Updated:02/26/2015
Question:
Is there any way of installing CS+ V3.00.00 all at once?
Answer:
With the evaluation version, there is no way of installing the whole of CS+ V3.00.00 in a single sequence of operations.
CS+ V3.00.00 is divided into the two versions below. Install them individually.
• CS+ for CC
• CS+ for CA, CX
If you have purchased a compiler product, you can install CS+ V3.00.00 in a single sequence of operations by using the installer which the package of the compiler contains.
Suitable Products
CS+ (formerly CubeSuite+)
|
VMware Logon Monitor - What is it and why should you use it
Updated: Aug 19
It used to be a fling
Some features in VMware Horizon have their origin as a fling. Flings are small tools that get created by people that see gaps in functionality of a product, or think that there are better ways to combine certain products or product features. These are then posted at https://flings.vmware.com/ and downloadable for free. When these tools get popular, sometimes they get productized, just as happened with this one.
What does it do
The Logon Monitor does exactly what the title implies, it monitors what happens when a user logs on to the machine that the Logon Monitor service is running on. The tool is installed as a windows service during the Horizon agent installation, but set to manual by default. The Horizon agent is the component that is installed on the resource that you would want to make available through horizon, such as your Windows 10/11, Linux or Windows Server machines. This tool is available in the Horizon Agent for Windows only.
How to start
Setting the Startup Type of this service is the first step in being able to use it. The service needs to be in running state before a user logs on. There are many ways to make sure the service is enabled in your environment, here are a few examples. You can set the startup type to Automatic in your Golden Image manually:
or set it to Automatic using Microsoft PowerShell:
Set-Service -Name vmlm -StartupType Automatic
You could add this to an MDT task sequence provided by the VMware OS Optimization plugin as can be seen in the screenshot below. Remember, this task will need to be processed after the task that actually installs the Horizon Agent, otherwise the referenced service will not exist yet:
Logfiles
With the service enabled, the tool will generate a log file at the default location: %ProgramData%\VMware\VMware Logon Monitor\Data. The location can be configured, check the VMware Horizon documentation for configuration details.
Two logfiles will be generated: first one is the main vmlm.txt log, containing all the status messages for the service itself. This is used to check if the service is operating as intended. The second one is the session log, consisting of the machine name, user name, and date/time stamp. This is used to see what has been going on during logon, and how long it took. The summary at the end of the session logfile will look like this. In this example, the Shell Load Time is unusually high and warrants investigation:
****************** Session Summary (User: TESTING\plonius, Session: 1) *****************
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] CreateSession 2022-08-18T13:39:40:795 - 2022-08-18T13:39:41:981 (dur 1.19 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] GPClient 2022-08-18T13:39:41:925 - 2022-08-18T13:39:41:957 (dur 0.03 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] TermSrv 2022-08-18T13:39:41:957 - 2022-08-18T13:39:41:981 (dur 0.02 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] svservice 2022-08-18T13:39:41:885 - 2022-08-18T13:39:41:886 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Login 2022-08-18T13:50:15:080 - 2022-08-18T13:50:20:987 (dur 5.91 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] GPClient 2022-08-18T13:50:17:775 - 2022-08-18T13:50:17:969 (dur 0.19 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Profiles 2022-08-18T13:50:16:995 - 2022-08-18T13:50:17:318 (dur 0.32 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Sens 2022-08-18T13:50:18:050 - 2022-08-18T13:50:18:058 (dur 0.01 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] SessionEnv 2022-08-18T13:50:16:994 - 2022-08-18T13:50:16:994 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] TermSrv 2022-08-18T13:50:17:970 - 2022-08-18T13:50:18:037 (dur 0.07 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] V4VEnd 2022-08-18T13:50:17:319 - 2022-08-18T13:50:17:319 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] V4VStart 2022-08-18T13:50:16:991 - 2022-08-18T13:50:16:991 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] VMwareUEM 2022-08-18T13:50:18:104 - 2022-08-18T13:50:20:987 (dur 2.88 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] WSNM 2022-08-18T13:50:16:992 - 2022-08-18T13:50:16:993 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] svservice 2022-08-18T13:50:15:081 - 2022-08-18T13:50:16:990 (dur 1.91 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] StartShell 2022-08-18T13:50:21:331 - 2022-08-18T13:50:21:412 (dur 0.08 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] GPClient 2022-08-18T13:50:21:373 - 2022-08-18T13:50:21:373 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Sens 2022-08-18T13:50:21:373 - 2022-08-18T13:50:21:393 (dur 0.02 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] SessionEnv 2022-08-18T13:50:21:373 - 2022-08-18T13:50:21:373 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] TermSrv 2022-08-18T13:50:21:393 - 2022-08-18T13:50:21:412 (dur 0.02 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] V4VEnd 2022-08-18T13:50:21:412 - 2022-08-18T13:50:21:412 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] V4VStart 2022-08-18T13:50:21:373 - 2022-08-18T13:50:21:373 (dur 0.00 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] svservice 2022-08-18T13:50:21:331 - 2022-08-18T13:50:21:373 (dur 0.04 seconds)
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Shell Load Time: 25.95 seconds
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] User Policy Time: 0ms
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Group Policy Summary:
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Async. Policies: 0
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Sync. Policies: 3
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Failed Policies: 0
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Changed Policies: 0
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Group Policy CSE Total Time: 328ms
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] CSE: 'Group Policy Registry' Duration: 172ms
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] CSE: 'Registry' Duration: 93ms
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] CSE: 'Scripts' Duration: 63ms
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] Free Disk Space Available To User: 0 GB
2022-08-18T13:50:47.282 INFO (04f8-208c-1) [9602] [Microsoft-Windows-Shell-Core] ****************************************************************************************
Helpdesk Tool
The Logon Monitor also integrates with the VMware Helpdesk tool, integrated in the Horizon Admin console. The Helpdesk tool is used by helpdesk or administrators to gather information about current sessions in the environment.
To create complete visibility, the Horizon Connection servers need to be configured to use the timingprofiler, since this is disabled by default. The command vdmadmin -I -timingProfiler -enable will have to be run on all Connection servers. More details about this can be found in the VMware Horizon documentation.
Why should I use this
The Logon Monitor gathers information about the users logon. You can use this to troubleshoot slow logons or monitor the status of your logon baseline. It also allows you to gain visibility in the Helpdesk tool, helping your IT staff find problems in an easier way. The details can clearly show you if there's a user policy doing something it isn't supposed to, folder redirection taking too long or tell you that the latest image build created something strange in the default user profile, as it is now suddenly much larger than before.
As I've seen from personal experience, there is hardly any strain to the system when enabled, as it only generates a simple text based logfile, and can rotate logs, as it only saves the 10 last ones by default. There are also options to configure the log to be sent to a remote system, or have it save a less amount of them. I can't think of any reason not to enable this when you need more information, so go enable it and get yourself more viable information about the logons in your Horizon environment!
Disclaimer
VMware recommends that you do not use this in production, just for test/dev environments. Both the logon monitor on the agent side and timing profiler on the connection server side add extra overhead to your environment that you should be made aware of.
References
Using the VMware Logon Monitor
https://docs.vmware.com/en/VMware-Horizon/2206/horizon-console-administration/GUID-618B1899-AF59-4991-83F3-FFFDFF917F22.html
Using Horizon Help Desk Tool in Horizon Console
https://docs.vmware.com/en/VMware-Horizon/2206/horizon-console-administration/GUID-F81C40C4-8D3A-4F23-BCE8-C9F5675183BB.html#GUID-F81C40C4-8D3A-4F23-BCE8-C9F5675183BB
VMware Logon Monitor service is stopped by default after View Agent installation
https://kb.vmware.com/s/article/57051
242 views0 comments
|
helpf.pro
Регистрация
0
Распечатать
Прямые запросы к SQL серверу.
Как то возникла ситуация, когда в справочник, с включенной проверкой на уникальность кода, из вне приходят элементы с такими же кодами. Отключать проверку нельзя. Пришлось делать затычку.
Подключение к SQL в общем то широко описано:
Код 1C v 8.х
Функция Подключение(Сервер,БД)
cnn = Новый COMОбъект("ADODB.Connection");
cnn.ConnectionTimeOut = 0;
cnn.CommandTimeOut = 0;
cnn.connectionString = "SERVER="+Сервер+"; Database="+БД+"; DRIVER=SQL Server; UID=sa; PWD=*****;";
cnn.Open();
if cnn.State()=0 then
Сообщить("Не удалось соединиться с сервером");
cnn = 0;
Возврат Ложь;
endif;
cnn.Execute("SET NOCOUNT ON");
Возврат cnn;
КонецФункции
Сервер и БД можно получить и программно, но муторно. Эти данные можно взять из свойств БД на сервере 1С.
Название таблицы и полей в SQL можно получить с помощью команды 1С:
Цитата
Глобальный контекст
ПолучитьСтруктуруХраненияБазыДанных (GetDBStorageStructureInfo)
Синтаксис:
ПолучитьСтруктуруХраненияБазыДанных(<Объекты метаданных>, <Имена базы данных>)
Параметры:
<Объекты метаданных> (необязательный)
Тип: Массив. Массив имен объектов метаданных или массив объектов метаданных, для которых требуется получить структуру таблиц базы данных.
<Имена базы данных> (необязательный)
Тип: Булево. Определяет, в каких терминах выдается информация о структуре хранения.
Истина - в терминах СУБД
Ложь - в терминах SDBL.
Значение по умолчанию: Ложь
Возвращаемое значение:
Тип: ТаблицаЗначений. Возвращает таблицу значений с описаниями структуры таблиц, индексов и полей базы данных в терминах SDBL или используемой СУБД, в зависимости от значения параметра "Имена базы данных".
Если параметр не используется, то возвращаемая таблица значений содержит информацию о структуре таблиц базы данных всех объектов метаданных.
Таблица значений включает следующие колонки:
ИмяТаблицыХранения(StorageTableName) – имя таблицы SDBL или базы данных;
ИмяТаблицы(TableName) – имя таблицы в терминах языка запросов (для тех у кого оно есть);
Метаданные(Metadata) – полное имя объекта метаданных;
...
Дальше нам нужно новый элемент справочника все ж таки записать, ну например :
Код 1C v 8.х
Попытка
спр.Записать();
Исключение
Сообщить("Не уникальный код "+стр.Код+" у элемента "+стр.Наименование);
Спр.УстановитьНовыйКод();
Спр.Записать();
КонецПопытки;
Все, делаем подмену.
Код 1C v 8.х
подключение=Подключение(Сервер,База);
ТекстЗапроса="UPDATE Номенклатура
|SET Номенклатура._Code="+Формат(КодНужный,"ЧГ=0")+"
|FROM _Reference57 AS Номенклатура
|WHERE (CAST(Номенклатура._Folder AS int)=1)
|AND (Номенклатура._Code="+Формат(Спр.Код,"ЧГ=0")+")
|";
подключение.Execute(ТекстЗапроса);
Сообщить("Код "+КодБыл+" подменен на "+КодНужный);
Разместил: Версии: | 8.x | 8.2 УП | Дата: Прочитано: 34446
0
Распечатать
Возможно, вас также заинтересует
17 правил для составления оптимального ЗАПРОСа к данным базы 1С 40
Для формирования и выполнения запросов к таблицам базы данных в платформе 1С используется специальный объект языка программирования Запрос . Создается этот объект вызовом конструкции Новый Запрос . Запрос удобно использовать, когда требуется получ
1C и Google Maps 20
была поставлена задача отображения на географической карте медицинских учреждений. После обзора предлагаемых решений был выбран сервис google. Но так же подобного рода подход будет работать и с картами сервиса yandex. Во время решения задачи было реш
1C медленно работает по сети с базой на SQL Server 18
Данное обстоятельство может быть обусловлено многими причинами. Одна из них - неоптимальная настройка MS SQL . Перечислим неоптимальности в настройке: 1) Неправильно указанный сетевой протокол, используемый для взаимодействия 1С с SQL Server. П
1Cv8.1CD - Файл данных достиг максимального размера! 7
1С выдает предупреждение " Файл данных достиг максимального размера" . Подскажите из - за чего это и как можно решить ? Превышен размер файла, обычно это сообщение возникает, когда размер файла 1Cv8.1CD приближается к 10 гигабайтам или размер ка
1С 7.x : Как получить курсы валют с сайта НБУ http://www.bank.gov.ua/ за любую дату ? 6
Функция ПолучитьТаблицуКурсовНБУ(ДатаКурса, Ежедневно = 1) // если в качестве второго параметра указать число отличное от 1 - получем валюты, которые котируются на ежемесячной основе Перем Reader, Url, Точки, HtmlTab, Строк, Р, НомСтроки, НомЯче
Посмотреть все результаты поиска похожих
Вы не можете отправить комментарий анонимно, пожалуйста войдите или зарегистрируйтесь.
|
Vaping Dangers – Are Vaporisers HARMFUL TO Your Health?
vaping dangers
Vaping Dangers – Are Vaporisers HARMFUL TO Your Health?
Many who have never tried the planet of vapourware before are understandably scared off by the vapouristing dangers. The fear is understandable as it can be difficult to understand how something which produces no smoke at all, can be bad for your health in any way. The simple simple fact is that while you can find vapourizers which do produce smoke, they are much safer than cigarettes and most importantly they’re completely transparent to everyone around you. In a nutshell, you don’t see or smell anything, so you don’t have to be worried about vapers causing a major accident.
Probably the most important things to keep in mind about vapourising though is that it is an extremely safe alternative to cigarette smoking. Many of the using tobacco alternatives are very bad for your health, including carbon monoxide smoke and causing cancer. But with vapourisers you don’t need to worry about these things. They’re completely safe and you may enjoy them whenever you choose. So why are more and more people afraid of vapourising?
One reason why is because they aren’t aware of it. Most people believe that vapourising means pouring boiling water over the herbs and allowing it to cool, which is wrong. Also is that doesn’t even need to be done. Vapourising is much simpler than that. You merely need to know how to use it properly, which isn’t difficult.
The primary danger of vapourising is from the amount of nicotine it contains. Nicotine is very addictive, and some people are certain to get into this type of state where they just want the drug. If they then start to smoke, this is going to be harder to eliminate from their system. However, if you use e-cigs, then you won’t have this issue. E-cigs contain no nicotine and so you can stop using them without needing to rely on artificial cigarettes or patches.
It can mean though, that people could have an addiction to these exact things. In fact, research has shown that the majority of people do find yourself becoming addicted to vapourising. This can happen because they have no idea what they are doing. They could put it right down to being bored at work, however they soon find themselves having withdrawals.
This is why it is so important to ensure you use vapourising correctly. It is advisable to ensure that you are inhaling the right quantity of nicotine. Some vapers only inhale how much nicotine in their electric cigarettes, this means they never get hooked. Others take much longer to make the transition to vapourising, this means they do suffer withdrawals.
In order to avoid the dangers of vapourising, you should follow these tips. Firstly, be sure to use your vaporisers properly. Read the instructions on the box carefully so that you know how much to take. Also, always utilize your vaporisers outside. Never utilize them inside as this may seriously harm your lungs. You wish to avoid the humid or warm atmosphere to make Element Vape Discount Code certain your lungs are not damaged.
So, there you own it – these vapourising dangers and tips. Hopefully that by now, you have realised there are more positives than negatives with regards to not smoking tobacco. Hopefully you will never light up a cigarette again, or at the very least won’t be tempted to do so. And if you do get yourself a craving for a cigarette, try puffing on a non-tobacco flavoured alternative.
We’re also aware that there are a few celebrities who have spoken out concerning the dangers of vapourising, but that they do not smoke. Perchance you would want to convince them to place their money where their mouth is, and present up smoking? There is one celebrity in particular who we have run into who has spoken out against vapourising – Lady Gaga. Gaga has even used her stage name in songs to spell it out how she feels about her cancer recovery. She has said that she wants to ‘get as near death as possible’ before she gives up smoking, and urges other musicians to do exactly the same.
Hopefully that by now you realise the true dangers of smoking. You don’t want to harm the body and you don’t desire to harm the environment. So, just give up, and stop lighting up that cigarette. If you cannot, or you find it really hard, there are other methods to quitting. The point is, you do not need a cigarette any more to call home a complete and active life.
There is no doubt that vapourising is a trendy thing right now, but that doesn’t imply that it’s a good idea. The simple truth is that you might be ruining your wellbeing, and that of everyone around you. Whatever you choose to do, whether you’re a smoker or perhaps a non-smoker, or whatever you would rather call yourself, the decision is yours. Create a wise one.
This entry was posted in Uncategorized. Bookmark the permalink.
|
How To Install LEMP stack (Linux, Nginx, MySQL, PHP) on Ubuntu System
Harish Kumar · · 2179 Views
How To Install LEMP stack (Linux, Nginx, MySQL, PHP) on Ubuntu System
The term LEMP is an acronym of the four open-source projects:
1. L - Linux operating system
2. E - Nginx [engine x]
3. M - MySQL or MariaDB
4. P - PHP programming language
In this post, you will learn how to install Nginx, create Nginx server blocks (virtual host), install and secure MySQL, and install PHP.
Prerequisites
The first thing you should make sure you have a regular, non-root user account on your server with sudo privileges
Step 1. Installing Nginx
Nginx is available in Ubuntu repositories. So, update the packages index and install Nginx by using the following commands on the terminal:
sudo apt update
sudo apt install nginx
Step 2. Installing MySQL
Now the web server is ready. The next step is to install MySQL (a database management system). Install MySQL by using following command:
sudo apt install mysql-server
When the installation is finished, run the mysql_secure_installation command to improve the security of the MySQL installation:
sudo mysql_secure_installation
It will ask to set the root secret password, delete the anonymous user, and remove the test database. You should answer "Y" (yes) to all questions.
Step 3. Installing PHP
Since Nginx doesn't contain native PHP handling like some other web servers, you will need to install php-fpm, which stands "fastCGI process manager”. We will tell Nginx to pass PHP requests to this software for processing.
Install the php-fpm module along with an additional helper package using following commands:
sudo apt install php-fpm php-opcache php-cli php-gd php-curl php-mysql
Step 4: Configuring Nginx to Use the PHP Processor (create virtual hosts)
Now all of the necessary LEMP stack parts installed. Yet still, need to make a couple of configuration changes so as to tell Nginx to utilize the PHP processor for dynamic content.
This is done on the server block level (server blocks are like Apache's virtual hosts). To do this, navigate to /etc/nginx/sites-available/ directory.
Let's say our domain name is example.com. So, here I will create the new server block configuration file is named example.com, although you can name it whatever you’d like:
sudo vi /etc/nginx/sites-available/example.com
Add the following snippet, which was taken and somewhat modified from the default server block configuration file to the new server block configuration file:
In the /etc/nginx/sites-available/example.com :
server {
listen 80;
root /var/www/html;
index index.php index.html index.htm index.nginx-debian.html;
server_name example.com;
location / {
try_files $uri $uri/ =404;
}
location ~ \.php$ {
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/var/run/php/php7.4-fpm.sock;
}
location ~ /\.ht {
deny all;
}
}
This is what every one of these directives and location blocks does:
1. listen - Defines what port Nginx should listen on. In this case, that is port 80, which is the default port for HTTP.
2. root - Defines the website root path.
3. index - prioritize serving files named index.php
4. server_name - server’s domain name or public IP address.
5. location / - It has a try_files directive, which checks for the existence of files matching a URI request. If Nginx cannot find it, then it will return a 404 error.
6. location ~ \.php$ - In this location block, it is pointing Nginx to the fastcgi-php.conf configuration file and the php7.4-fpm.sock file to handle PHP processing.
7. location ~ /\.ht - This location block tells the Nginx to do not server .htaccess files by using the deny all directive.
After adding this snippet, save and close the file.
The next step is to create a symbolic link from /etc/nginx/sites-available/example.com to the /etc/nginx/sites-enabled/example.com to enable this server block.
sudo ln -s /etc/nginx/sites-available/example.com /etc/nginx/sites-enabled/
Test your new configuration file for syntax errors by following command:
sudo nginx -t
If any errors are reported, go back and recheck your configuration file before continuing.
When you are ready, reload Nginx for the changes to take effect:
sudo systemctl reload nginx
This concludes the installation and configuration of your LEMP stack.
1
Please login or create new account to add your comment.
1 comment
gurpreet
gurpreet ·
Good explaination
You may also like:
How To Install NVM (Node Version Manager) on Ubuntu System?
This tutorial will assist you with installing NVM on the Ubuntu machine. Additionally, allow you to install different node versions and other useful examples.
Harish Kumar
Install phpMyAdmin Manually with Nginx server on Ubuntu
In this guide, I will show you how to install and configure phpMyAdmin with Nginx, MySQL, and PHP8.0 (LEMP) on an Ubuntu system. phpMyAdmin is a free and open-source database (...)
Harish Kumar
How to Upload Multiple Images with jQuery AJAX and PHP, with preview
Uploading an image without page refresh is more user-friendly than refreshing the entire page. So, in this guide, you will learn how to upload multiple images using ajax in jQuery (...)
Nakul Kumar
Install Laravel Valet Linux+ development environment on Ubuntu System
The official Laravel Valet development environment is great if you are an Apple user. But there is no official Valet for Linux or Window system.
Harish Kumar
Install and Setup Oh-My-Zsh on Ubuntu System
In this post, I will show you how to install ZSH (Z-Shell). Then, we set up the oh-my-zsh framework for managing ZSH. We will likewise show you how to change the ZSH theme and (...)
Harish Kumar
How to Add Google reCAPTCHA to a PHP Form with Example?
In this guide, we will integrate the Google reCAPTCHA in the PHP contact form. Utilizing this Google reCAPTCHA code, we can validate the human users and protect the form of submission (...)
Nakul Kumar
|
• Publications
• Influence
The immune dysregulation, polyendocrinopathy, enteropathy, X-linked syndrome (IPEX) is caused by mutations of FOXP3
TLDR
Genetic evidence is presented that different mutations of the human gene FOXP3, the ortholog of the gene mutated in scurfy mice (Foxp3), causes IPEX syndrome. Expand
DNA/RNA helicase gene mutations in a form of juvenile amyotrophic lateral sclerosis (ALS4).
TLDR
Observations of ALS4 suggest that mutations in SETX may cause neuronal degeneration through dysfunction of the helicase activity or other steps in RNA processing. Expand
DNA deletion associated with hereditary neuropathy with liability to pressure palsies
TLDR
The HNPP locus is assigned to chromosome 17p11.2 and the presence of a large interstitial deletion associated with this disorder is demonstrated in three unrelated pedigrees, suggesting that these genetic disorders may be the result of reciprocal products of unequal crossover. Expand
Joubert syndrome (and related disorders) (OMIM 213300)
TLDR
Recent identification of the NPHP1, AHI1, and CEP290 genes has started to reveal the molecular basis of JS, which may implicate the primary cilium in these disorders. Expand
Charcot–Marie–Tooth neuropathy type 1B is associated with mutations of the myelin P0 gene
TLDR
The results indicate that P0 is a gene responsible for CMT1B, and point mutations found are located in the extracellular domain, which plays a significant role in myelin membrane adhesion. Expand
Molar tooth sign of the midbrain–hindbrain junction: Occurrence in multiple distinct syndromes
TLDR
Evidence is presented that the MTS is seen together with polymicrogyria, Váradi–Papp syndrome, and a new syndrome with encephalocele and cortical renal cysts, and it is proposed that it is found in multiple distinct clinical syndromes that may share common developmental mechanisms. Expand
The NPHP1 gene deletion associated with juvenile nephronophthisis is present in a subset of individuals with Joubert syndrome.
TLDR
The NPHP1 deletion represents the first molecular defect associated with JS in a subset of mildly affected subjects, and Cerebellar malformations consistent with the MTS may be relatively common in patients with juvenile N PHP without classic symptoms of JS. Expand
SIMPLE interacts with NEDD4 and TSG101: Evidence for a role in lysosomal sorting and implications for Charcot‐Marie‐Tooth disease
TLDR
It is hypothesize that SIMPLE plays a role in the lysosomal sorting of plasma membrane proteins, and confirmed that human SIMPLE interacts with NEDD4 and also reports a novel interaction with tumor susceptibility gene 101 (TSG101), a class E vacuolar sorting protein. Expand
Peripheral myelin protein–22 gene maps in the duplication in chromosome 17p11.2 associated with Charcot–Marie–Tooth 1A
TLDR
A partial yeast artificial chromosome contig spanning the CMT1A gene region is constructed and the PMP–22 gene is mapped to the duplicated region, suggesting that over–expression of this gene may be one mechanism that produces the C MT1A phenotype. Expand
Two autosomal dominant neuropathies result from reciprocal DNA duplication/deletion of a region on chromosome 17.
TLDR
Observations support the hypothesis that a reciprocal recombination mechanism involving the CMT1A-REP is responsible for the generation of both the duplicated and deleted chromosomes, and document the first examples in humans of Mendelian syndromes resulting from the reciprocal products of unequal exchange involving large intra-chromosomal segments. Expand
...
1
2
3
4
5
...
|
305 -Homework set 3
February 18, 2009
This set is due February 25 at the beginning of lecture. Consult the syllabus for details on the homework policy.
1. Show directly that there is no field of 6 elements. (“Directly” means, among other things, that you cannot use the facts mentioned without proof at the end of lecture 4.3.)
2. Construct a field of size 8. Once you are done, verify that all its elements satisfy the equation x^8-x=0.
3. Solve exercises 36–38 from Chapter 4 of the book.
4. Is the set \{a+b\root 4\of 2 : a,b\in{\mathbb Q}\} a field with the usual +,\times,0,1?
Advertisement
305 -Fields (3)
February 18, 2009
At the end of last lecture we arrived at the question of whether every finite field is a {\mathbb Z}_p for some prime p.
In this lecture we show that this is not the case, by exhibiting a field of 4 elements. We also find some general properties of finite fields. Finite fields have many interesting applications (in cryptography, for example), but we will not deal much with them as our focus through the course is on number fields, that we will begin discussing next lecture.
We begin by proving the following result:
Lemma 13. Suppose that {\mathbb F} is a finite field. Then there is some natural number n>0 such that the sum of n ones vanishes, 1+\dots+1=0. The least such n is a prime that divides the size of the field
Read the rest of this entry »
|
heart palpitations
What are heart palpitations?
Heartbeats that are hard and fast are called palpitations (say: pal-pit-ay-shuns). It is normal to hear or feel your heart "pounding" as it beats faster when you exercise or do other physical activities. But if you have palpitations, you might feel your heart pounding while you are just sitting still or moving slowly.
Causes & Risk Factors
What causes heart palpitations?
Many things can cause palpitations. Some causes of heart palpitations include the following:
• Heart-related causes. People who have an irregular heartbeat or arrhythmia may have palpitations. (Arrhythmia is a change in the rhythm of your heartbeat.) Most of the time, palpitations and irregular heartbeats are harmless. However, sometimes the break in your heart\'s normal rhythm can be a serious problem. You also may have palpitations if you have problems with the valves in your heart. Valves help move blood through the heart.
• Non-heart-related causes. Certain medicines, herbal supplements and illegal street drugs can make your heart beat faster. Medicines that can cause palpitations include asthma inhalers and decongestants. Caffeine (found in coffee, tea and soda), alcohol and tobacco can also cause palpitations. People who have panic disorder feel their heart pounding when they are fearful of something or having a panic attack. Some medical conditions, such as thyroid disease and anemia, also can cause palpitations.
Sometimes the cause of palpitations cannot be found. This happens in about 1 of every 7 people who have palpitations. Palpitations in these people usually are not harmful.
Diagnosis & Tests
How will my doctor find out what is causing my palpitations?
Your doctor will examine you and ask you about any medicines you are taking, your diet and if you have panic attacks. Your doctor may want you to have a resting electrocardiogram test. This test keeps track of your heartbeat over a certain amount of time. Your doctor also may test your blood.
If these tests do not show what is causing your palpitations, your doctor may have you wear a heart monitor for 1 to 14 days. This monitor will show any breaks in your heart\'s rhythm. Your doctor might refer you to a cardiologist (a heart doctor) for more tests or treatment.
Prevention
What can I do to help prevent palpitations?
• Do not use illegal street drugs, such as cocaine.
• Avoid caffeine, alcohol and tobacco.
• Tell your doctor what medicines and herbal supplements you take, how much alcohol you drink, and if you use anything else that might cause palpitations.
• Keep track of your palpitations. Write down the time that they happen and what you were doing when they began. Give this information to your doctor.
Other Organizations
Questions to Ask Your Doctor
• What is the likely cause of my heart palpitations?
• Will I need to wear a heart monitor? For how long?
• Would it be helpful if I kept track of my palpitations? Do I need to track anything else, such as what I ate or my physical activity?
• Do my heart palpitations indicate a more serious problem?
• What are some symptoms that would indicate my condition is getting worse?
• Will I need to change my lifestyle, such as diet and exercise habits?
|
Related to Number 2
Related to Number 2. hemisphere. E) Representative images of the coronal sections with unilateral injections of AAV-flex Kir2.1-P2A-mCherry, immunostained for PV (remaining panel) and SST (right panel). F) The percent switch in the number of PV (p=0.0070) and SST (p=0.0003) expressing interneurons display a decrease upon injections with AAV-flex Kir2.1-P2A-mCherry within the injected part. Scale pub= 50 (Z)-Thiothixene m Number S3. Related to Number 2. Cell death is not modified by culturing interneurons in BDNF-, Glial- or Neuronal-conditioned medium. A) GAD67GFP neuronal cultures on Main feeder layers prepared from PO to P2 neocortex subjected to control and BDNF conditioned medium. B) Quantification (Z)-Thiothixene of quantity of GAD67GFP cells at 7 and 24 DIV shows no significant difference in the survival of (Z)-Thiothixene interneurons in control and BDNF treated conditions (ANOVA, no statistical difference p>0.5). C) Glial feeder layers prepared from PO to P2 neocortex. The feeder coating is definitely stained for neurons (Tuj-1, green), astrocytes (glial fibrillary acidic protein (GFAP), reddish) and oligodendrocytes (01ig-2, white). All cells are labeled by 4,6-diamidino-2-phenylindole (DAPI, blue). D) Temporal profile of the GAD67GFP interneuron cultures on glial feeder coating. The GAD67GFP human population exhibits steep decreases in quantity between 4 and 7 DIV, and continues to decrease by 22 DIV. E) Temporal profile of GAD67GFP interneuron cultures on glial feeder coating. The treatment entails exchanging of press with cortical feeder press (ANOVA, no statistical difference and p>0.5; n = 3 per time point). All error bars symbolize s.e.m. F) Representative image of GAD67GFP human population in control (left panel), TTX (middle panel), and high K+(right panel) treated conditions. Scale pub =50 m. G) Temporal profile of the GAD67GFP human population size in vitro. The GAD67GFP human population has small but nonsignificant increase in quantity between 7 and 11 DIV and then declines by DIV 21. The number of GAD67GFP human population decreases upon TTXtreatment by 21 DIV (ANOVA, p<0.05). The number of GAD67GFP human population styles towards improved survival upon exposure to high K+, at 21DIV and 24DIV (ANOVA, p<0.05), n=3. All error bars symbolize s.e.m. Level pub =50 m Number S4. Related to Number 3. Firing pattern of cortical interneurons expressing NaChBac and manifestation of CaN in cortical interneurons. (Z)-Thiothixene A) Representative traces showing the discharge of an action potential at threshold (reddish trace) for any control interneuron (remaining) and a NaChBac-expressing one (right), showing the sustained depolarization and firing in the second option. B) Representative traces of the same two cells demonstrated in a recorded in voltage-clamp, showing the smaller fast, but more sustained sluggish inward current in the NaChBac -expressing cell. C) Traces from a different set of control and NaChBac-expressing interneurons showing spontaneous action potential firing at very low rate of recurrence in the second option and none in the former. The envelope of discharge is qualitative similar to the induced firing seen in a. The sluggish firing rate of recurrence would be ideal for calcineurin activation in the NaChBac-expressing cells. D) Western blot (Z)-Thiothixene showing the expression of the B regulatory subunit of the CaN in the FAC sorted human population of interneurons derived from CGE, MGE and non- inhibitory neurons. E) Western blots showing the expression of various isoforms of catalytic subunit of CaN in crazy type interneurons. F) Quantification showing the relative manifestation of the three isoforms of the catalytic subunit of CaN. G) Western blot of interneuron lysates, FAC-sorted from VTPcre;Ai9 labeled interneurons, showing the presence of CnB. H) Western blot Hhex of interneuron lysates from VIPcre and Dlx6acre lines, FAC-sorted from electro convulsive shock- or sham-treated animals and probed for phospho-S774.
|
Search Type: Posts; User: conorarmstrong
Page 1 of 5 1 2 3 4
Search: Search took 0.08 seconds.
1. Would this not be better implemented as a type of proxy as opposed to a grid plugin?
2. Replies
15
Views
16,817
@alekseyyp
Think you might be missing a
CkConfig: {}
after you set the xtype, but before the initComponent method. Without it getting set to an empty object, the Ext.apply won't work as...
3. REQUIRED INFORMATION
Ext version tested:
Ext 4.2
Browser versions tested against:
Chrome 26 FF 21 Safari 6
DOCTYPE tested against:
4. (available here http://www.packtpub.com/sencha-ext-js-4-web-application-development-cookbook/book)
anyone got this yet? is it any good?
5. good work. shame it doesn't work in IE. That's not your fault though - neither does pdf.js itself.
6. why are you not using the root you specified in the proxy?
7. I think it is important to note here that even if the clientIdProperty config is set, then the phantom id is ONLY sent if more than one record is sent to the server. If only a single record is sent,...
8. if you get an error in chrome as follows when using this component:
"Uncaught TypeError: Cannot read property 'parentNode' of null"
it is probably that you have called the update method before...
9. no problem
10. @silcreval
Tested this in FF 7.0.1 on Linux - and it seems ok. Was using it to display an email in a window. dragging, maximising etc all work ok.
11. Can we see the code? Form, combo, combo store & model and Ajax load code
12. bump
13. Just checked - IE9 messes up as well
14. PROBLEM
When using a grid with a grouped header, if you resize a column whose header is not grouped, the header text jumps to top alignment and styling of whole cell goes a bit off.
EXPECTED...
15. Replies
1
Views
926
yes
search the forums for ManagedIFrame and/or SimpleIFrame
16. Replies
4
Views
688
that's not valid JSON
-- see http://jsonlint.com/
17. Replies
3
Views
2,171
removeAll method???
http://docs.sencha.com/ext-js/4-0/#/api/Ext.data.Store-method-removeAll
18. your returned JSON doesn't have a person.names property
19. try this:
Ext.create('Ext.window.Window', {
title: 'Customer Details ',
bodyPadding: 5,
width: 750,
20. show me a bit more with the fields themselves
21. the xtype is combobox, not combo
22. add an event to each field. can't give exact answer cause don't know where you're running this code or what scope it is running in. something along the lines of:
initComponent: {
..
.. //...
23. check the scope the success callback is running in
24. Replies
6
Views
1,513
have you tried a form with a grid embedded?
you could add the normal form field mixin to the grid to get it to act like a normal field component. Then, override the getValue & setValue stubs to...
25. If you show me your code with my snippet included i'll try and debug it for you
Results 1 to 25 of 118
Page 1 of 5 1 2 3 4
|
Appendix D. Forms of Pattern Matching
Various features in the Imagix 4D user interface, such as the Data Source dialog, the Grep Search tab and the Filter/Add dialog, use pattern matching to identify strings or names matching user-specified patterns. Generally, these features support glob-style pattern matching, which applies the rules used by Unix shells for file name expansion. The exception is the Grep Search tab, where regular expression pattern matching is used, applying the rules used by the Unix regexp command.
Glob-style Pattern Matching
A glob-style pattern may contain any of the following special characters:
?Matches any single character.
*Matches any sequence of zero or more characters.
[chars]Matches any single character in chars. If chars contains a sequence of the form a-b then any character between a and b (inclusive) will match.
\xMatches the character x.
Regular Expression Pattern Matching
Regular expression matching uses the following rules in determining matching patterns.
A regular expression is zero or more pieces, concatenated. It matches a match for the first, followed by a match for the second, etc.
A piece is an atom possibly followed by *, +, or ?. An atom followed by * matches a sequence of 0 or more matches of the atom. An atom followed by + matches a sequence of 1 or more matches of the atom. An atom followed by ? matches a match of the atom, or the null string.
An atom is a regular expression in parentheses (matching a match for the regular expression), a range (see below), . (matching any single character), ^ (matching the null string at the beginning of the input string), $ (matching the null string at the end of the input string), a \ followed by a single character (matching that character), or a single character with no other significance (matching that character).
A range is a sequence of characters enclosed in [ ]. It normally matches any single character from the sequence. If the sequence begins with ^, it matches any single character not from the rest of the sequence. If two characters in the sequence are separated by -, this is shorthand for the full list of ASCII characters between them (e.g.[0-9] matches any decimal digit). To include a literal ] in the sequence, make it the first character (following a possible ^). To include a literal -, make it the first or last character.
|
Gerd Causes Chest Arm Pain
Published on Author QueenLeave a comment
With a heart attack, the common sensation is left-sided chest pain, radiating down the left arm with numbness or tingling. There are other digestive conditions besides heartburn that can cause discomfort in your chest, according.
Chest pain may be caused by many conditions. Learn when chest discomfort, pressure, and tightness is a medical emergency. Find out the most likely causes of left.
Chest pain can be caused by many diseases and condition, for example,angina, heart attack, shingles, pneumonia, pulmonary embolism, pericarditis, GERD, broken or.
Acid reflux disease, a condition commonly known. Seek immediate medical care if you have chest pain, especially if you also have shortness of breath, or jaw or arm pain. These may be signs and symptoms of a heart attack. Reading.
What is central chest pain? Pain in the middle of the chest (central chest pain) is often a cause for concern as it is associated with cardiac conditions which may.
Oct 26, 2017. Symptoms. Reoccurring heartburn is the most common symptom of GERD. The frequent exposure of other organs to stomach acids produces additional symptoms, including: Stomach and chest pain; Nausea and vomiting; Chronic cough; Sore throat, hoarseness, or laryngitis; Wheezing; Asthma and.
It’s easier to answer what causes heartburn and indigestion. excessive.
Feb 19, 2015. In honor of American Heart Month, get the scoop on four causes of chest pain you 've never heard of before — and learn why you should get them checked out. GERD is a chronic digestive disease where stomach acid flows up into the esophagus, causing irritation, which can be more painful after a meal.
It's important to know that heart attack symptoms are often different for women. Instead of chest pain, they may feel that they're having some sort of indigestion. Pain may not necessarily radiate classically to the neck or down the arm; a woman may just feel that she's getting winded more than usual. Lori Boyajian-O' Neill, DO.
In chest muscle pain, the culprit is often within reach of your fingers. You can seek and deal with a lot of the muscles responsible, producing rapid relief.
I have been to the hospital 3 times for chest pain, mostly on the left side, left arm pain (sometimes numb, sometimes achey), and sharp pain in my upper back. They.
Here’s what he says people should know about heart disease, sudden cardiac.
Symptoms. The following symptoms suggest that you may have GERD: Frequent heartburn. Heartburn may feel like a burning sensation, warmth, or heat under your breastbone. It can start in the chest or throat and spread up the neck in waves. This burning sensation may increase or decrease after eating and often gets.
Heart problems can also result in chest, arm and hand pain. heartburn. If you have a strong family or personal history of heart trouble, particularly if combined with hypertension and/or high cholesterol, this may be a possibility. The.
Chest pain after eating or while eating is not an uncommon symptom. It may be as a result of swallowing larger than normal-sized bites, excessively hot food or drinks.
A little chest pain. does not cause bloating or belching, but these can happen.
Dr Ooi Yau Wei, cardiologist at Mount Elizabeth Novena Hospital, explains the possible causes of chest pain, how to tell if your chest pain is heart-related, and what you should do if you experience symptoms. Gastroesophageal reflux.
Chest pain, angina, and muscle/joint and back pain are known side effects. Chest pain can often be confused with heartburn and can radiate. may be beneficial to determine the cause of you burning arm and to provide.
Heart pain is typically left side of the chest, squeezing or pressure type pain, a feeling like an elephant sitting on your chest. The pain can radiate up to the neck and jaw or down the left arm. causes of non-cardiac chest pain.
I have been to the hospital 3 times for chest pain, mostly on the left side, left arm pain (sometimes numb, sometimes achey), and sharp pain in my upper back. They.
Coffee Stomach Acid Secretion By Parietal Cells Histology Slides Join today and you can easily save your favourite articles, join in the conversation and comment, plus select which news your want direct to your inbox. Join today and you can easily save your favourite articles, join in the conversation and. Further up the pits, parietal cells produce gastric acid and a vital substance, intrinsic
Generally, you can determine the cause of chest pain by its location, the sensation, your body position, and associated symptoms.
Health. 23 Reasons Why You Have Random Left or Right Side Chest Pain Having random chest pain? Read this comprehensive guide specially if you’re having chest pain.
Depending on its cause. chest pain which is one of the most common reasons that people visit the emergency room: Angina – A type of chest pain that occurs when the heart muscle doesn’t get enough oxygen-rich blood flow. The.
Or perhaps you are at work, you have a big, greasy meal for lunch, and all of a sudden you feel a burning, stabbing, incessant pain in your chest. This reflux can, in turn, cause heartburn – the burning sensation in your chest -.
When this is around the level of the heart this can feel like it's the heart that is causing the problem and this is a common cause for chest pain which can sometimes feel tight and heavy and like having something lodged in your chest. There are many causes of GERD and these include eating too fast, or engaging in activities.
Dec 1, 2015. An upright and correctly seated posture during and after eating will reduce the symptoms of GERD. Unfortunately many Americans have postural distortion patterns placing them in hunched, or forward leaning posture during and after eating. This posture compacts the chest and stomach compartments.
Aug 11, 2010. Chronic Gallbladder Disorders can cause recurring lower chest pain or upper abdominal chest pain. certain conditions like Gastro Esophageal Reflux Disease (GERD), Esophagitis, Esophageal Spasm etc caused by factors associated with the esophagus may also cause chest pain on the left hand side.
He hit me in the cheek here, my hand and chest," the other. driver grabbed.
Mar 13, 2009. Other signs it may be serious: Shortness of breath; dizziness; pressure, squeezing, or pain in the chest; pain in the back, arm, jaw, or upper abdomen. When to act: If you have some of the above symptoms, call 911 and say, "I think I' m having a heart attack. I need an ambulance." At the hospital, the staff.
Chest pain can often be confused with heartburn and can radiate to the arm. may be beneficial to determine the cause of you burning arm and to provide appropriate treatment. Readers who are interested in learning more can.
Chest pain after eating or while eating is not an uncommon symptom. It may be as a result of swallowing larger than normal-sized bites, excessively hot food or drinks.
Chest Pain Causes – WebMD – WebMD discusses possible causes of chest pain as well as when to see a doctor.
Nov 26, 2008. Certain foods may cause some people to experience pain, experts say. A few years ago, my mom woke me up in the middle of the night complaining of chest pains. As I frantically. After a quick exam, the doctor said she was fine and blamed the chest pains not on a heart attack but on acid reflux.
What is central chest pain? Pain in the middle of the chest (central chest pain) is often a cause for concern as it is associated with cardiac conditions which may.
Other causes of chest pain can include indigestion, reflux, muscle strain, inflammation in the rib joints near the breastbone, and herpes zoster or shingles. the shoulders, arms, neck, throat or jaw; sweating; feeling anxious, dizzy or unwell; a sick feeling in the stomach; being short of breath; symptoms that often last 10 to 15.
If you aren't sure that you have symptoms of acid reflux or if you're wondering if some of the other things that are bothering you could be tied to reflux, then see if you. Everything in the upper chest, throat, voice box, air passages and heart and lung area are all tied together so closely that any symptom you're having with.
Chest pain is very common of chest pain like anxiety heartburn angina ENT Specialists Ear Nose & Throat Doctors in Salt Lake City UT Salt Lake City Clinic. H Pylori Causes Mayo Clinic Chest Left Pain Arm here is a quick and dirty SCD legal chile I spiced up with Coconut Oil: Does it Really Cause Heartburn Acid Reflux.
Mar 30, 2017. This blocks blood flow to your heart and often causes a cramping or squeezing type of pain in the center of your chest. Sometimes. Acid reflux or gastroesophageal reflux disease (GERD), a backup of stomach contents and acids into the esophagus. Pain in your shoulder, neck, arms, back, teeth or jaw.
In chest muscle pain, the culprit is often within reach of your fingers. You can seek and deal with a lot of the muscles responsible, producing rapid relief.
Most chest pain isn’t a sign of anything serious, according to the NHS. The most common causes of chest pain are heartburn, indigestion or a chest sprain.
May 1, 2012. Even if you're convinced the chest pain is heartburn from that double-spicy bean burrito at lunch, if it feels anything even close to the classic symptoms of heart attack — such as pain or discomfort in the center or left side of the chest, or in an arm, the jaw or stomach, or shortness of breath or nausea — call.
I am 40yr.old female. Pain on left side of chest (just under breast) began 1yr ago, sporadically, not necessarily during exercise (sometimes middle of the night.
Mar 6, 2013. During heart attacks, women often suffer from symptoms that are far different than the stereotypical chest pains that men experience. Upper Body Discomfort. Also, as acid reflux causes pain right behind the heart, heart attacks in women can feel like a simple case of eating too much takeout. Shortness of.
Joggers may have suspected it, but now science has confirmed it: Vigorous exercise, especially running, can cause heartburn. although chest pain during exertion is a primary indicator of heart disease, such pain is often caused.
Symptoms of GERD: The symptoms of GERD are variable but can include: Heartburn – A burning sensation in the chest when the esophagus lining is irritated by stomach. Trouble Swallowing; Chest Pain – This can be a squeezing or burning pain that last from minutes to hours and may move to the back, neck, jaw or arms.
Less common symptoms are persistent coughing, difficulty swallowing, sore throat, hoarseness, poorly controlled asthma, atypical chest. arm pain. These might be signs of a heart attack. Certain prescription and over-the-counter.
Pain. an arm or moves to the back. A dull ache or sharp stab. Pain worsened by position or pain brought on by exertion or pressing on the chest. Pain worsened by certain foods. All these may describe chest pain. From the.
We’ve all heard of arm pain and chest discomfort as possible. Mayo Clinic says indigestion could signal a heart attack. While heartburn is pretty recognizable,
Leave a Reply
Your email address will not be published. Required fields are marked *
|
Search Images Maps Play YouTube News Gmail Drive More »
Advanced Patent Search | Sign in
Accessible Version For Screenreader Users
Patents
Publication numberUS5055269 A
Publication typeGrant
Application numberUS 07/319,745
Publication dateOct 8, 1991
Filing dateMar 6, 1989
Priority dateMar 6, 1989
Fee statusLapsed
Also published asCA1313059C
Publication number07319745, 319745, US 5055269 A, US 5055269A, US-A-5055269, US5055269 A, US5055269A
InventorsLouis G. Gaetano, Perry A. Palumbo, Oscar Singleton
Original AssigneeBacharach, Inc
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Temperature limited catalytic gas detector apparatus
US 5055269 A
Abstract
A temperature limited catalytic gas detector includes a catalytic gas sensor in one branch of a Wheatstone bridge network. A power supply is connected through a voltage controlled regulator to the bridge network. An instrumentation amplifier measures electrical imbalances across the bridge network. A display is connected to the output of the instrumentation amplifier. The detector also includes a comparator which compares the output of the instrumentation amplifier with a predetermined limit signal and produces an output when the output of the instrumentation amplifier exceeds the limit voyage. The regulator is responsive to the output of the comparator to thereby reduce the power supply to the bridge network. The limit signal is equivalent to the output of the instrumentation amplifier when the gas sensor is at a particular high temperature. The arrangement prevents the gas sensor from operating at excessive operation temperatures.
Images(3)
Previous page
Next page
Claims(20)
We claim:
1. A temperature limited catalytic gas detector comprising:
a catalytic gas sensor containing an active element contained in a Wheatstone bridge network;
a power supply connected through a control means to said bridge network;
measurement means connected to said bridge network for measuring electrical imbalances across said bridge network which are developed as a particular gas contacts said gas sensor;
display means connected to said measurement means for displaying the concentration of gas at said gas sensor;
limit signal means for producing a fixed, predetermined limit signal; and
comparison means connected to said measurement means and to said limit signal means for comparing an output of said measurement means with the fixed, predetermined limit signal and producing an output signal when the output of said measurement means exceeds said limit signal, and said control means is connected to the comparison means and responsive to the output of said comparison means to thereby reduce the power supplied to said bridge network, and cause said limit signal to be equivalent to the output of said measurement means when said gas sensor is at a particular temperature.
2. The detector of claim 1 wherein said active element is in series with a reference element in one branch of said bridge network.
3. The detector of claim 1 wherein said measurement means is an instrumentation amplifier and said display means is a meter.
4. The detector of claim 1 wherein said control means is a voltage controlled regulator.
5. The detector of claim 1 wherein said comparison means is an on/off comparator.
6. The detector of claim 1 further containing a 4-20 milliampere transmitter connected between the measurement means and display means and connected to said bridge network.
7. The detector of claim 1 wherein said limit signal means is a band gas reference.
8. The detector of claim 1 wherein said limit signal means is a resistive network connected to a fixed voltage source.
9. The detector of claim 1 further containing an alarm means connected to said comparison means for indicating when the temperature at said gas sensor exceeds said particular temperature.
10. The detector of claim 9 wherein said alarm means is a light emitting diode.
11. A temperature limited gas detector apparatus comprising:
a gas sensor contained in a detection circuit;
a power supply connected through a control means to said detection circuit;
means connected to said detection circuit for measuring electrical signals generated by said detection circuit as a particular gas contacts said gas sensor;
display means connected to said measuring means;
limit signal means for producing a fixed, predetermined limit signal; and
comparison means connected to said measurement means and to said limit signal means for comparing an output of said measurement means with the fixed, predetermined limit signal and producing an output signal when the output of said measurement means exceeds said limit signal, and said control means is connected to the comparison means and responsive to the output of said comparison means to thereby reduce the power supplied to said detection circuit, and cause said limit signal to be equivalent to the output of said measuring means when said gas sensor is at a particular temperature.
12. The detector of claim 11 wherein said measuring means is an instrumentation amplifier and said display means is a meter.
13. The detector of claim 11 wherein said control means is a voltage controlled regulator.
14. The detector of claim 11 wherein said comparison means is an on/off comparator.
15. The detector of claim 11 further containing a 4-20 milliampere transmitter connected between the measuring means and display means and connected to said detection circuit.
16. The detector of claim 11 wherein said limit signal means is a band gap reference.
17. The detector of claim 11 wherein said limit signal means is a resistive network connected to a fixed voltage source.
18. The detector of claim 11 further containing an alarm means connected to said comparison means for indicating when the temperature at said gas sensor exceeds said particular temperature.
19. The detector of claim 18 wherein said alarm means is a light emitting diode.
20. A temperature limited catalytic gas detector comprising:
a catalytic gas sensor containing an active element in series with a reference element in one branch of a Wheatstone bridge network;
a power supply connected through a voltage controlled regulator to said bridge network;
an instrumentation amplifier connected to said bridge network for measuring electrical imbalances across said bridge network;
a display connected to said instrumentation amplifier and displaying the concentration of a gas contacting said gas sensor;
limit signal means for producing a fixed, predetermined limit signal; and
comparison means connected to said instrumentation amplifier and to said limit signal means for comparing an output of said instrumentation amplifier with the fixed, predetermined limit signal and producing an output signal when the output of said measurement means exceeds said limit signal, and said voltage controlled regulator is connected to the comparison means and responsive to the output of said comparison means to thereby reduce the power supplied to said bridge network, and cause said limit signal to be equivalent to the output of said instrumentation amplifier when said gas sensor is at a particular temperature.
Description
1. FIELD OF THE INVENTION
This invention relates to combustible gas detectors and, more particularly, to the automatic protection of catalytic gas sensors from damaging, high operating temperatures.
2. DESCRIPTION OF THE PRIOR ART
The use of catalytic sensors to measure the concentration of combustible gases is well known. In general, the sensor is a resistive element coated with a catalytic material which will react with a particular gas. A current is passed through the resistive element at an amperage sufficient to heat the catalytic coating to a desired operating temperature. As the gas passes over the sensor and contacts the catalytic coating, it will chemically react therewith in an exothermic reaction and add heat to the sensor, thus heating the resistive element therein. This temperature increase will proportionally raise the resistance of the sensor. Thus, the increase in resistance of the sensor is directly related to the concentration of the gas contacting the sensor.
This change of sensor resistance can be detected electrically in any number of ways to provide a direct reading of the gas concentration. In a common arrangement, a catalytic sensor, combining an active element in series with a reference element, is provided in one branch of a Wheatstone bridge. A pair of fixed resistors in series with each other forms the other branch of the Wheatstone bridge. A voltage difference is applied across the branches of the bridge and the voltages at the points between the fixed resistors and between the active and reference elements are monitored. The relationship of the fixed resistors is either selected initially or adjusted in known manners so that the voltages at these points are equal, i.e., the bridge is balanced, before any gas contacts the sensor.
In one known catalytic sensor, the active and reference elements are each formed from a coiled platinum or platinum/iridium alloy wire coated with an insulating ceramic material, such as alumina or glass. The active element alone is then coated with a catalytic material, such as platinum black. The gas undergoing detection will react with the catalytic coating on the active element and change its resistance as described above, thus causing an imbalance in the Wheatstone bridge circuit. This imbalance is detected as a voltage difference across the point between the fixed resistors and the point between the active and reference elements. This voltage difference is usually measured by an instrumentation amplifier or the like and displayed on a voltmeter or other common indication means. The measured voltage difference is directly related to the concentration of the gas contacting the sensor. Usually the gas is caused to contact both the reference and active elements so that any resistance changes in the sensor resulting from the gas contact, other than those from the catalytic material on the active element, are balanced and add no additional voltage imbalance in the bridge circuit. However, it is not necessary for the gas to contact the reference element of the sensor. Typical Wheatstone bridge arrangements are shown, for example, in U.S. Pat. Nos. 4,332,772 and 3,577,074 and in Delphian Technical Note No. 24.
An ongoing problem with the use of any catalytic combustible gas sensor is overheating. The catalytic element must be heated initially to upwards of 500 will be heated further while the gas and catalytic material are undergoing the exothermic chemical reaction. Excessive heat will both shorten the life of the sensor and effect its subsequent operation. For example, if the sensor becomes too hot, the heating element is partially boiled away, creating a hot, thin section Such a section creates a gradual drifting, up or down, at an increasing rate until the element opens and fails totally. This problem is a particular concern when a sensor is used after being exposed to a gas in concentrations greater than 100% of its lower explosive limit or at the stoichiometric point for the gas. Overheating also renders the catalyst less active, such as by sintering the platinum black particles. As a result, the magnitude of the sensor output decreases and amplification of the output must be increased to maintain a consistent reading over time.
Various prior art arrangements have been developed to protect a catalytic gas sensor from the overheating problems discussed above. Maintaining the sensor temperature constant while operating over a wide range of conditions has been carried out. See U.S. Pat. Nos. 4,541,988; 4,533,520; 4,317,796; 4,305,724 and Delphian Technical Note No. 24. The problem with these arrangements is that they are complicated and expensive. The system disclosed in U.S. Pat. No. 3,678,489 totally disconnects the sensor from the power source when the gas concentration reaches a certain level. However, removing totally the current from the sensor negatively effects subsequent operation of the sensor since it has an inherent recovery time. A variety of other complicated arrangements for protecting catalytic and other sensors from temperature effects have been developed. U.S. Pat. Nos. 4,476,096; 4,444,056; 4,263,588; 4,202,666; 4,112,356; and 3,908,164.
It is an object of the present invention to provide an arrangement for automatically protecting a catalytic or other gas sensor from excessive and damaging temperatures. It is a further object to provide for such an arrangement in a simple, economical and easy to manufacture manner. It is yet another object to minimize the recovery time between normal and protected operation and to avoid the deleterious effects of totally removing the power from such a sensor for any period of time.
SUMMARY OF THE INVENTION
Accordingly, we have invented a temperature limited gas detector arrangement, particularly suitable for use with catalytic gas sensors, which includes a gas sensor positioned within a detection circuit, such as a Wheatstone bridge network. A power supply is connected through a control means, such as a voltage controlled regulator, to the detection circuit. The apparatus also includes means for measuring electrical signals generated by the detection circuit as a particular gas contacts the gas sensor. In a Wheatstone bridge network, the measuring means could be an instrumentation amplifier measuring imbalances developed across the bridge. A display means, such as a meter or the like, is connected to an output of the measuring means.
The apparatus also includes a comparison means, such as an on/off comparator, for comparing the output of the measuring means with a predetermined limit signal and producing an output signal when the output of the measuring means exceeds the limit signal. The control means is responsive to the output of the comparison means to thereby reduce the power supplied to the detection circuit. The limit signal is equivalent to the output of the measuring means when the gas sensor is at a particular temperature.
This invention is particularly useful for a catalytic gas sensor including an active element in series with a reference element and positioned in one branch of a Wheatstone bridge network. The detector can also be incorporated in a circuit including a 4-20 milliampere transmitter which receives the output of the measuring means and the output of the detection circuit. The limit signal can be produced either by a band gap reference, a resistive network connected to a fixed voltage source, or any other known means for producing a predetermined fixed electrical signal. The arrangement can further include an alarm means for indicating when the temperature of the gas sensor exceeds the particular temperature. The alarm means can be a light emitting diode or other known alarms.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram showing the basic elements of a temperature limited catalytic gas detector in accordance with the present invention;
FIG. 2 is a circuit diagram showing one embodiment of a gas detector system incorporating the temperature limiting arrangement of the present invention;
FIG. 3 is a circuit diagram showing another embodiment of a gas detection system incorporating the temperature limiting arrangement of the present invention; and
FIG. 4 is a graph showing the improvement in zero drift of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
A Wheatstone bridge, catalytic gas detector arrangement including the temperature limiting protection feature of the present invention is shown in FIG. 1. The Wheatstone bridge is formed of resistor 1 and resistor 2 in series in one branch of the bridge and the gas sensor 4, formed of an active element 3 and a reference element 6 in series, in the other branch of the bridge. The branches of the bridge are joined together at resistor 1 and the active element 3 and connected to a source voltage 8. The branches of the bridge are joined together at resistor 2 and the reference element 6 and are either grounded, as shown, or connected to another terminal on the source voltage 8. The voltage developed at a point between resistor 1 and resistor 2, i.e., across resistor 2, is supplied to one input of an instrumentation amplifier 10. The voltage developed at a point between the active element 3 and the reference element 6, i.e., across the reference element 6, is supplied to the other input of the instrumentation amplifier 10. The output of the instrumentation amplifier 10 is supplied to a meter 11 or the like.
The arrangement described above is a standard Wheatstone bridge, catalytic gas detector arrangement. Resistors 1 and 2 of the bridge are selected or adjusted so that the bridge is balanced when no gas is contacting the gas sensor 4. As a result, no voltage difference is detected by the instrumentation amplifier 10 and no signal is developed at the meter 11. The source voltage 8 causes current to flow through the gas sensor 4 and heat the active element 3 to a sufficient temperature to enable the catalytic material thereon to react with the gas being detected. As the gas flows over the gas sensor 4 and reacts with the catalytic material on the active element 3, the resistance of the active element 5 changes and the Wheatstone bridge becomes imbalanced. The magnitude of the imbalance is indicated by the meter 11 and is a direct reading of the concentration of the gas contacting the gas sensor 4.
In accordance with the present invention, the source voltage 8 is passed through a voltage controlled regulator 12 before being supplied to the Wheatstone bridge. The output of the instrumentation amplifier 10 is also supplied to one input of a comparator 13 and a fixed limit voltage 14 is supplied to the other input of the comparator 13. The output of the comparator 13 is supplied to the voltage controlled regulator 12 and controls the magnitude of the voltage supplied to the Wheatstone bridge. The limit voltage 14 is selected to be greater than the output of the instrumentation amplifier 10 under normal operation, at lower temperatures and lower gas concentrations.
As long as the output of the instrumentation amplifier 10 remains smaller than the limit voltage 14, the comparator 13 produces no output and does not change the output voltage of the voltage controlled regulator 12. Under these conditions, a constant voltage is supplied to the Wheatstone bridge, the gas sensor 4 detects concentrations of gas in a normal manner, and the circuit develops meaningful signals at the meter 11.
If the output of the instrumentation amplifier 10 exceeds the limit voltage 14, the comparator 13 will then produce an output which will cause the voltage controlled regulator 12 to supply a lower voltage to the Wheatstone bridge. In a preferred embodiment, the comparator 13 produces the same output regardless of the amount by which the output of the instrumentation amplifier 10 exceeds the preset limit voltage 14. As a result, a constant, lower voltage will be supplied to the bridge network after the instrumentation amplifier 10 output exceeds the limit voltage 14. It is also possible to continually reduce the output of the voltage controlled regulator 12 as the output of the instrumentation amplifier 10 grows continually larger than the limit voltage 14.
By selecting the limit voltage 14 to be equal to the output of the instrumentation amplifier 10 when the gas concentrations at the gas sensor 4 reach a critical level, such as at 100% of the lower explosive limit of the gas or when the meter 11 is reading full scale, the circuit will protect the gas sensor 4 from overheating. When the limit voltage 14 is exceeded, the voltage supplied to the bridge will be reduced and will limit the actual temperature on the active element 3 and reference element 6. Even though the gas concentrations contacting the gas sensor 4 may increase, and will normally tend to cause the gas sensor 4 to increase in temperature, the increase in temperature from catalytic activity will be more than offset by the reduction in voltage supplied to the bridge. At this point, normal measuring operation of the sensor 4 cannot continue since the initial, fixed voltage supplied to the bridge has been changed. However, this is not important since the meter 11 is already at full scale reading and will provide no greater output with further increases in gas concentration.
By automatically limiting the voltage supplied to the bridge network as the output signal developed thereby exceeds a critical level, the gas sensor 4 will not be subjected to damaging overheating conditions. Moreover, the recovery time for a return to normal operation is kept at a minimum since power has been supplied to the gas sensor 4 during the entire operation.
A circuit for a portable, battery operated gas detector, including the improvement of the present invention is shown in FIG. 2. A Wheatstone bridge network is formed with a gas sensor, including an active element 20 in series with a reference element 21, in one branch and series resistors 22 and 23 in the other branch. A potentiometer 24 extends parallel to the bridge to provide for zero adjustment, and a resistor 25 extends from the movable contact 26 of potentiometer 24 to a point between resistors 22 and 23 and sets the sensitivity of the zero adjustment. The branches of the bridge network are grounded at resistor 23 and the reference element 21 and a voltage from battery 28 is supplied through pnp transistor 29 to the branches of the bridge network at resistor 22 and the active element 20.
The battery 28, which is on the order of 5-6 volts, is also connected to a standard 2.0 volt reference 31, which has an output connected to a standard 3.7 volt regulator 32, which produces a steady 3.7 volt output. The output of regulator 32 is supplied through resistor 33 to the negative input of operational amplifier 34. Noise filtering capacitor 36 extends between ground and the negative input of amplifier 34. Extending in series between the output of amplifier 34 and the base of pnp transistor 29 are resistor 38, connected to the cathode of diode 39 which has its anode connected to the cathode of diode 40. Resistor 38 and diodes 39 and 40 provide a biasing signal to the base of transistor 29. The battery 28 is connected to both amplifier 34 and to the emitter of transistor 29. The collector of transistor 29 is connected to the bridge network at resistor 22 and the active element 20, to the positive input of amplifier 34, and to ground through noise filtering capacitor 41. Regulator 32, resistors 33 and 38, capacitors 36 and 41, diodes 39 and 40, and transistor 29 together form a voltage controlled regulator which supplies a fixed voltage, here 3.7 volts, to the bridge network regardless of variations or fluctuations in the voltage of the battery 28.
Imbalances in the bridge are measured by operational amplifier 43 having an output connected through resistor 44 to meter 45. The bridge voltage across resistor 23 is supplied to the positive input of buffer amplifier 46 and the output of amplifier 46 is supplied through impedance matching resistor 47 to the positive input of amplifier 43. The output of amplifier 46 is fed back to its negative input. The arrangement of the buffer amplifier 46 is provided for improved impedance matching, but is not necessary for the operation of the circuit. The bridge voltage across the reference element 21 is supplied through impedance matching resistor 48 to the negative input of amplifier 43. Feedback resistor 49 extends between the output and the negative input of amplifier 43. Resistors 48 and 49 determine the gain ratio of amplifier 43 in a known manner.
The output of amplifier 43 is supplied through impedance matching resistor 51 to the positive input of comparator 52. The 3.7 volt output of regulator 32 is supplied to series resistors 53 and 54, which are connected to ground. The voltage across resistor 54 is supplied to the negative input of comparator 52. By appropriately selecting the values for resistors 53 and 54, the 3.7 volt output of regulator 32 is reduced to any desired value and supplied to the comparator for comparison purposes with the output from amplifier 43. The comparator 52 has an on/off voltage output, remaining at zero when the voltage at its positive input remains lower than the voltage at its negative input, and raising to full scale output when the voltage at its positive input exceeds the voltage at its negative input. Since the voltage at the negative input of comparator 52 remains fixed as determined by regulator 32 and resistors 53 and 54, and can be referred to as the limit voltage, the comparator 52 will have a voltage output only when the voltage generated by bridge imbalances through amplifier 43 exceeds the predetermined limit voltage. Capacitor 55 extending between the output and the negative input of comparator 52 functions as an integrator to slow down the response of the comparator 52 and avoid unwanted oscillations.
The output of comparator 52 is supplied through resistor 57 to the base of npn transistor 58. The base of transistor 58 is connected through resistor 59 to ground and the emitter of transistor 58 is connected directly to ground. The collector of transistor 58 is connected through resistor 60 to the negative input of amplifier 34. Resistors 57, 59 and 60 and transistor 58, which are controlled by the output of comparator 52, control the operation of the voltage regulator formed by resistors 33 and 38, capacitors 36 and 41, amplifier 34, diodes 39 and 40, and transistor 29. When the comparator 52 has no output, transistor 58 is in a non-conductive state and the voltage regulator produces a 3.7 volt output supplied to the bridge network as described above. When the comparator 52 produces an output, a voltage is supplied to the base of transistor 58, thus rendering it conductive and opening a current path through resistor 60 to ground. The 3.7 volt voltage supplied to the negative input of amplifier 34 will be reduced by the ratio of the resistance of resistor 60 and the sum of the resistances of resistor 33 plus resistor 60, minus the voltage drop across transistor 58. As a result, the voltage output of the regulator, which is supplied to the bridge network, will be reduced to a lower value, but will not shut off completely. In this arrangement, the voltage supplied to the bridge network will be about 1.4 volts when the comparator 52 produces an output voltage. By selecting the size of the components appropriately, particularly resistors 53 and 54, the comparator 52 will produce an output voltage when the gas sensor is subject to excessively high temperatures.
The circuit shown in FIG. 2 has an optional alarm for indicating when a high temperature condition exists at the gas sensor. The output of amplifier 43 is supplied through resistor 62 to the positive input of operational amplifier 63. The 2.0 volt reference 31 is reduced by series resistors 64 and 65 and supplied to the negative input of amplifier 63. The output of amplifier 63 is supplied through resistor 66 to the base of npn transistor 67. A light emitting diode 68 is connected between the battery 28 and the collector of transistor 67, with the emitter of transistor 67 connected directly to ground. Amplifier 63 functions as a comparator and produces no output as long as the signal supplied to the negative input remains lower than that supplied to the positive input. When amplifier 63 produces no output voltage, transistor 67 remains off and current cannot flow through the light emitting diode 68, which remains dark. By selecting resistors 64 and 65 appropriately, amplifier 63 will produce an output voltage when the gas sensor is subject to excessive temperatures. Transistor 67 will be rendered conductive and current will flow from the battery 28, through the light emitting diode 68, through transistor 67, and to ground. The light emitting diode 68 will light and give a visual alarm that the gas sensor has reached an excessive operating temperature. Other types of alarms, such as an audio alarm, can be used in addition to or in replacement of the light emitting diode 68.
A gas sensor arrangement incorporating a 4-20 milliampere transmitter, including the improvements of the present invention, is shown in detail in FIG. 3. A Wheatstone bridge network is formed with a gas sensor including an active element 80 in series with a reference element 81 in one branch and series resistors 82 and 83 in the other branch. Potentiometer 84 extends parallel to the bridge to provide for zero adjustment, and resistor 85 extends from the movable contact 86 of potentiometer 84 to a point between resistors 82 and 83 and sets the sensitivity of the zero adjustment. A noise filtering capacitor 87 extends in parallel with resistor 83 and noise filtering capacitor 88 extends parallel to the bridge. The branches of the bridge network are grounded at resistor 83 and the reference element 81 and a nine volt battery 90 is supplied through a voltage controlled regulator network 91 to the branches of the bridge network at resistor 82 and the active element 80.
The voltage controlled regulator network 91 includes a standard voltage regulator 93 which has its input connected directly to the nine volt source 90 and has its output connected directly to the bridge network. Extending in parallel from the input of the voltage regulator 93 and ground are capacitors 94 and 95, metal oxide varistor 96 and diode 97. Capacitors 94 and 95 filter out noise in the signal supplied to the voltage regulator 93 and diode 97 bleeds the charge from these capacitors. The metal oxide varistor 96 keeps the voltage supplied to the voltage regulator 93 from exceeding a maximum level and, as a result, protects the gas sensor from excessive, damaging voltages. The output of the voltage regulator 93 is connected through filtering capacitor 99 to ground. A rheostat 100 and resistor 101 extend in series between the adjustment terminal of the voltage regulator 93 and ground. The output of the voltage regulator 93 is also connected through series resistor 102 and filtering capacitor 103 to ground. The adjustment terminal of the voltage regulator 93 is also connected directly to the point between resistor 102 and capacitor 103. The combination of rheostat 100 and resistors 101 and 102 determine the output voltage which is generated by the voltage regulator 93. Resistors 101 and 102 are sized and the rheostat 100 is fine tuned to produce the desired voltage output from regulator 93 which is supplied to the bridge network.
Imbalances in the bridge network are measured by an instrumentation amplifier 106. The bridge voltage across the reference element 81 is supplied through resistor 108 in series with capacitor 109 which is connected to ground. The voltage developed across capacitor 109 is supplied to the positive input of amplifier 110. The voltage across resistor 83 in the bridge network is supplied to the negative input of amplifier 111. Extending in series between the negative input of amplifier 110 and the positive input of amplifier 111 are, in turn, resistor 113, rheostat 114 and rheostat 115. The output of amplifier 110 is fed back through resistor 116 to its negative input and the output of amplifier 111 is fed back to its positive input through resistor 117. The output of amplifier 110 is supplied through resistor 118 to the positive input of amplifier 119 and the output of amplifier 111 is supplied through resistor 120 to the negative input of amplifier 119. Feedback resistor 121 extends between the output of amplifier 119 and its negative input.
The output of a biasing circuit 123 is connected to the positive input of amplifier 119 of the instrumentation amplifier 106. The biasing circuit 123 includes capacitor 125 in series with resistor 126, with capacitor 125 connected to the nine volt source 90 and resistor 126 connected to ground. A band gap reference 127 extends in parallel across capacitor 125. Resistor 128 extends between the jointure of capacitor 125 and resistor 126 to the positive input of amplifier 119. Biasing circuit 123 provides additional voltage to the instrumentation amplifier 106.
The output of the instrumentation amplifier 106 is supplied to a 4-20 milliampere transmitter 130. In addition, the voltage developed across the reference element 81 is supplied to the 4-20 milliampere transmitter 130. Resistors 132 and 133 extend in series, respectively, between the nine volt source 90 and the output of the instrumentation amplifier 106. The voltage at a point between resistors 132 and 133 is supplied to the positive input of amplifier 134. The output of amplifier 134 is supplied to the gate of output transistor 135, which is preferably a p channel enhancement field effect transistor. A band gap reference 136 is connected between the output of amplifier 134 and the nine volt source 90. Resistor 137 extends between the source of output transistor 135 and the nine volt source 90. The drain of output transistor 135 is connected to a meter 138 which in turn is connected to ground.
The voltage across reference element 81 is connected through resistor 140 to the negative input of amplifier 141, which has a internal 0.2 volt reference supplied to its positive input. Parallel RC network of resistor 142 and capacitor 143 extend between the negative input of amplifier 141 and ground. The output of amplifier 141 is connected to the base of npn transistor 145 which has its emitter grounded. The collector of transistor 145 is connected to the negative input of amplifier 134. The collector of transistor 145 is also connected through resistor 146 to the source of output transistor 135. The details of the 4-20 milliampere transmitter do not per se form a part of this application and are described in more detail in U.S. Pat. No. 4,758,837 assigned to the assignee of the present application. The disclosure of U.S. Pat. No. 4,758,837 is incorporated herein by reference.
In accordance with the present invention, resistors 148 and 149 are connected in series between the nine volt source 90 and the output of amplifier 119 in the instrumentation amplifier 106. The voltage at the point between resistors 148 and 149 is supplied through impedance matching resistor 150 to the negative input of operational amplifier 151. The fixed voltage developed at the anode of band gap reference 127 in the biasing circuit 123 is supplied through impedance matching resistor 152 to the positive input of amplifier 151. Feedback capacitor 153 extends between the output of amplifier 151 and its negative input. The output of amplifier 151 is connected through series diode 155 and resistor 156 to the base of npn transistor 157. Resistor 158 extends from the cathode of diode 155 to ground. The emitter of transistor 157 is connected directly to ground and the collector of transistor 157 is connected to a point between resistor 102 and capacitor 103, which in turn is connected to the adjustment input of voltage regulator 93.
Amplifier 151 functions as a comparator to compare the output voltage of the instrumentation amplifier 106 with a preset voltage indicative of an excess temperature condition. By selecting resistors 148 and 149 appropriately, amplifier 151 will produce an output voltage only when the gas sensor is functioning in an excess temperature condition. At this point, amplifier 151 renders transistor 157 conductive and reduces the voltage supplied to the adjustment terminal of the voltage regulator 93 to a lower value. Thus, a lower voltage will be generated by the voltage regulator 93 and supplied to the bridge network. Prior to activation of amplifier 151, the voltage regulator 93 supplies a fixed voltage to the bridge network as dictated by resistors 101 and 102 and rheostat 100.
Optionally, the circuit shown in FIG. 3 can include a biasing network extending from the point between the active element 80 and reference element 81 to the output of amplifier 151. As shown, the biasing network includes, in series, a resistor 160 connected to the anode of a zener diode 161, and diode 162 having its cathode connected to the cathode of the zener diode 161 and having its anode connected to the output of amplifier 151. This biasing network insures that the gas sensor is not sent into deep shutoff during excessive temperature conditions and makes sure that the recovery time is kept to a minimum. When the output of amplifier 151 becomes high enough to overcome the drop across the zener diode 161, which comes about during excess temperature conditions on the gas sensor, then a small amount of current will be trickled back into the instrumentation amplifier 106. This small amount of current will keep the sensor from shutting off completely.
A gas sensor system in accordance with the arrangement shown in FIG. 2 was built both with the protection system of the present invention and in a unprotected version. The sensors were exposed to 10% by volume methane for a period of 15 hours, during which checks were made at the zero drift and span drift on 2.5% methane. The graph shown in FIG. 4 is a comparison of the drift generated by the sensors with the protected circuit of the present invention (curve A) as compared with an unprotected circuit (curve B). Span drift of the sensor when connected to the circuit of the present invention showed increases in span of only about 3% of the lower explosive limit as compared to the unprotected circuit which had increases of 10% to 12% of the lower explosive limit. The dramatic difference between curve A and curve B shows the improved zero drift developed as a result of the present invention. In addition, the protected sensor had no reduction in sensor output over time, while the unprotected sensor had a reduction in sensor output of upwards of 50%.
Having described above the presently preferred embodiments of this invention, it is to be understood that it may be otherwise embodied within the scope of the appended claims.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US3577074 *Oct 15, 1968May 4, 1971Keithley InstrumentsBridge measuring circuit
US3678489 *Feb 8, 1971Jul 18, 1972Scherban Alexandr NazarievichApparatus for determining the concentration of combustible gases and vapors
US3908164 *Oct 3, 1974Sep 23, 1975Xerox CorpCorona current measurement and control arrangement
US4112356 *Dec 20, 1976Sep 5, 1978Toy Stephen MSemiconductor gas detector circuit
US4202666 *Feb 24, 1978May 13, 1980Tracor, Inc.Method and apparatus for preventing the destruction of an alkali source of a nitrogen-phosphorous detector
US4263588 *Jul 25, 1979Apr 21, 1981Oldham France S.A.Helmet-carried apparatus for detecting and signalling the presence of a dangerous gas in an atmosphere
US4305724 *Aug 4, 1980Dec 15, 1981Delphian PartnersCombustible gas detection system
US4317796 *Mar 23, 1981Mar 2, 1982Barr Thomas AExplosive gas detector
US4332772 *Jun 12, 1981Jun 1, 1982National Mine Service CompanyPortable gas detector
US4444056 *May 5, 1982Apr 24, 1984Itt CorporationTemperature compensated circuit
US4476096 *Aug 11, 1982Oct 9, 1984Auergesellschaft GmbhCircuit arrangement for an apparatus for measuring and indicating the concentration of combustible gases and vapors contained in air
US4533520 *Jul 2, 1984Aug 6, 1985Mine Safety Appliances CompanyCircuit for constant temperature operation of a catalytic combustible gas detector
US4541988 *Dec 13, 1983Sep 17, 1985Bacharach Instrument CompanyConstant temperature catalytic gas detection instrument
US4758837 *Aug 28, 1986Jul 19, 1988Bacharach, Inc.4-20 milliampere transmitter
Non-Patent Citations
Reference
1 *Delphian Technical Note No. 24.
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US5142898 *May 6, 1991Sep 1, 1992Dragerwerk AktiengesellschaftMethod for operating a measuring arrangement for detecting the component of combustible gases in a gas mixture
US5272445 *Jul 1, 1992Dec 21, 1993Digital Equipment Corp.Resistance tester utilizing regulator circuits
US5305231 *Feb 13, 1992Apr 19, 1994Bacharach, Inc.Multiple K factor, selectable gas detector
US5360266 *Jun 18, 1993Nov 1, 1994Robert Bosch GmbhControl and analysis circuit device for measuring reaction heat
US5381102 *May 16, 1994Jan 10, 1995Robert Bosch GmbhDevice with a current divider for controlling adjustment of signals from sensors
US5495747 *Sep 30, 1994Mar 5, 1996Mine Safety Appliances CompanyDevice for detecting gases for use in diffusion and forced flow modes
US5526280 *Apr 28, 1994Jun 11, 1996Atwood Industries, Inc.Method and system for gas detection
US5563578 *Jul 26, 1993Oct 8, 1996Isenstein; Robert J.Detection of hazardous gas leakage
US5831146 *Jun 11, 1997Nov 3, 1998Cts CorporationGas sensor with multiple exposed active elements
US5918260 *Jun 11, 1997Jun 29, 1999Cts CorporationGas sensor with multi-level sensitivity circuitry
US5948965 *Apr 28, 1997Sep 7, 1999The United States Of America As Represented By The Administrator Of The National Aeronautics And Space AdministrationSolid state carbon monoxide sensor
US5970785 *May 8, 1997Oct 26, 1999Sgs-Thomson Microelectronics S.R.L.Heater control circuit
US6198296Jan 14, 1999Mar 6, 2001Burr-Brown CorporationBridge sensor linearization circuit and method
US6433554 *Dec 20, 1999Aug 13, 2002Texas Instruments IncorporatedMethod and apparatus for in-range fault detection of condition responsive sensor
US6489787 *Oct 13, 2000Dec 3, 2002Bacharach, Inc.Gas detection circuit
US6812708Jun 4, 2003Nov 2, 2004Scott Technologies, Inc.Combustible-gas measuring instrument
US20120161853 *Dec 22, 2011Jun 28, 2012British Virgin Islands Central Digital Inc.Circuit and method for temperature compensation of a sensor
EP0646788A1 *Sep 21, 1994Apr 5, 1995Controfugas S.R.L.Electronic apparatus for detecting inflammable gases
EP0884592A2 *May 22, 1998Dec 16, 1998CTS CorporationGas sensor with multi-level sensitivity circuitry
EP0908720A1 *May 29, 1998Apr 14, 1999CTS CorporationA gas sensor with orientation insensitivity
EP1227319A2 *Jan 29, 2002Jul 31, 2002Leco CorporationControl circuit for thermal conductivity cell
WO1996010739A1 *Sep 28, 1995Apr 11, 1996Mine Safety Appliances CoDevice for detecting gases for use in diffusion and forced flow modes
WO2003102607A1 *Jun 4, 2003Dec 11, 2003Scott Tech IncCombustible-gas measuring instrument
Classifications
U.S. Classification422/96, 324/706, 73/23.31, 422/94, 340/633
International ClassificationG01N27/16, G01N27/12
Cooperative ClassificationG01N27/122, G01N27/16
European ClassificationG01N27/12C, G01N27/16
Legal Events
DateCodeEventDescription
Dec 2, 2003FPExpired due to failure to pay maintenance fee
Effective date: 20031008
Oct 8, 2003LAPSLapse for failure to pay maintenance fees
Apr 23, 2003REMIMaintenance fee reminder mailed
Sep 3, 1999ASAssignment
Owner name: SCOTT/BACHARACH INSTRUMENTS, LLC, PENNSYLVANIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BACHARACH, INC.;REEL/FRAME:010206/0585
Effective date: 19990901
Apr 1, 1999FPAYFee payment
Year of fee payment: 8
Feb 7, 1995FPAYFee payment
Year of fee payment: 4
Apr 20, 1993CCCertificate of correction
Mar 6, 1989ASAssignment
Owner name: BACHARACH, INC., PENNSYLVANIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:PALUMBO, PERRY A.;SINGLETON, OSCAR;GAETANO, LOUIS G.;REEL/FRAME:005052/0408
Effective date: 19890303
Mar 6, 1989AS02Assignment of assignor's interest
Owner name: BACHARACH, INC., 625 ALPHA DR., PITTSBURGH, PA 152
Owner name: GAETANO, LOUIS G.
Owner name: PALUMBO, PERRY A.
Effective date: 19890303
Owner name: SINGLETON, OSCAR
|
Molecular epidemiological study of hepatitis B virus in blood donors from five Chinese blood centers
Yu Liu, Jingxing Wang, Yi Huang, Tonghan Yang, Xiaoming Guo, Julin Li, Guoxin Wen, Zhongqiao Yun, Peibin Zeng, Miao He, Min Xu, Gui Liu, Ling Ke, David Wright, Jing Liu, Kenrad Nelson, Hua Shan
Research output: Contribution to journalArticlepeer-review
Abstract
Although the genetic variability of hepatitis B virus (HBV) in HBV-infected patients has been extensively studied, reports on genotypes, subtypes and mutations in the S region of HBV strains from Chinese blood donors are limited. In this study, 245 blood samples from HBsAg-positive blood donors were collected from five geographically diverse blood centers in China. The S region of HBV was amplified, and the HBV genotype and subtype were determined. The amino acid sequences of the S region were aligned, and mutations related to the failure of immunization and HBsAg detection were determined. Of the 245 samples, 228 (93 %) were genotyped successfully. We found that genotypes B, C, D and A accounted for 58.8 %, 21.9 %, 6.6 % and 3.95 % of the isolates, respectively. The distribution of HBV antigen subtypes was as follows: adw (67.6 %), adr (23.3 %) and ayw (8.7 %). Mutations were present in 39 (17.1 %) of 228 samples in the major hydrophilic region (MHR) of the S region. This study demonstrated that HBV genotype/subtype B/adw was the most frequent strain circulating in HBV-infected Chinese blood donors, followed by C/adr. The occurrence of MHR mutants in HBV-infected blood donors and the potential failure to detect some of them in collected units poses a threat to transfusion safety.
Original languageEnglish (US)
Pages (from-to)1699-1707
Number of pages9
JournalArchives of Virology
Volume157
Issue number9
DOIs
StatePublished - Sep 2012
Externally publishedYes
ASJC Scopus subject areas
• Virology
Fingerprint
Dive into the research topics of 'Molecular epidemiological study of hepatitis B virus in blood donors from five Chinese blood centers'. Together they form a unique fingerprint.
Cite this
|
Closed Bug 1552717 Opened 1 year ago Closed 1 year ago
[EME] Mp4s that make use of key rotation and start with an unencrypted lead do not surface initDataType correctly
Categories
(Core :: Audio/Video: Playback, defect, P1)
defect
Tracking
()
RESOLVED FIXED
mozilla69
Tracking Status
firefox-esr60 --- unaffected
firefox67 --- wontfix
firefox68 --- fixed
firefox69 --- fixed
People
(Reporter: bryce, Assigned: bryce)
References
(Regression)
Details
(Keywords: regression)
Attachments
(3 files)
Bug 1487416 updated our mp4 parsing to handle cbcs data. During this I appear to have broken our handling of init data (pssh boxes) in fragments.
In the regressing bug I changed the pssh/init data handling so that init data type is only set if the sample is encrypted. This is incorrect. An example of why this is: Consider a fragment with an unencrypted and an encrypted sample + a pssh box with data relating to the encrypted sample. In this case the first, unencrypted sample should have init data associated with it so the encrypted event can be fired (but the sample should not hold sample specific crypto data).
test_eme_pssh_in_moof tests if our key rotation works correctly. It currently
does so by using a single video with an audio and video track. This patch
refactors the test so that it does the same thing (all going well), but in a
more extensible way.
The changes in this patch seek to lean more heavily on test harness
functionality in manifest.js and eme.js where possible. This cuts down on some
boilerplate, but means we have to make some concessions in a more verbose
expression of our test media list so the eme.js functions work with it.
Add another test case for the mp4 key rotation (pssh in fragments) test. In this
case, the test file has a clear (unencrypted) lead. This test seeks to ensure we
don't regress surfacing of init info even if we encounter it for fragments that
start with unencrypted samples.
Add a further check to the key rotation test to ensure that the initDataType is
being surfaced correctly on the encrypted event.
Media files created with shaka packager via:
packager-win.exe
in=bipbop.mp4,stream=audio,out=bipbop-clearkey-keyrotation-clear-lead-audio.mp4
in=bipbop.mp4,stream=video,out=bipbop-clearkey-keyrotation-clear-lead-video.mp4
--enable_raw_key_encryption --keys
label=:key_id=00112233445566778899AABBCCDDEEFF:key=00112233445566778899AABBCCDDEEFF
--crypto_period_duration 5 --fragment_duration 5 --clear_lead 3
Note that the way shaka packager handles key rotation in this case is just to
left shift the key id and the key. In this case, where crypto_period_duration ==
fragment_duration, a left shift of 1 will take place each time the keys rotate.
This happens once in the test file leaving us with 2 key ids + keys.
Depends on D32750
Unencrypted samples can carry init data and thus we should set the init data
type regardless of if the sample itself is encrypted (otherwise the init data
info is incomplete for unencrypted samples).
Depends on D32751
• Try run with new test but without patch to correct Index.cpp behaviour.
• Try run with new test and patch.
Summary: [EME] Key rotation has been broken by mp4 changes for cbcs → [EME] Mp4s that make use of key rotation and start with an unencrypted lead do not sureface initDataType correctly
Summary: [EME] Mp4s that make use of key rotation and start with an unencrypted lead do not sureface initDataType correctly → [EME] Mp4s that make use of key rotation and start with an unencrypted lead do not surface initDataType correctly
Pushed by bvandyk@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/aeb0cd86768f
P1: Refactor test_eme_pssh_in_moof mochitest so it's easier to add further test media. r=cpearce
https://hg.mozilla.org/integration/autoland/rev/71edbdac5e12
P2: Add test media for key rotation with a clear lead. r=cpearce
https://hg.mozilla.org/integration/autoland/rev/267d1abce058
P3: Set mInitDataType on sample info regardless of if the sample is encrypted. r=cpearce
Status: NEW → RESOLVED
Closed: 1 year ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla69
What's the severity of this issue? Is this something we should consider backporting to Beta ahead of the next ESR or can this just ride the trains normally?
Flags: needinfo?(bvandyk)
Flags: in-testsuite+
(In reply to Ryan VanderMeulen [:RyanVM] from comment #10)
What's the severity of this issue? Is this something we should consider backporting to Beta ahead of the next ESR or can this just ride the trains normally?
That's a good question. We don't have good data on how often we encounter the kind of media that would be impacted by this. I had been thinking about uplifting and I landed this change before some others I have in the works to make it easier to uplift. Since it's relatively simple and since it would be nice to avoid having this regression I will request uplift.
Flags: needinfo?(bvandyk)
Comment on attachment 9067858 [details]
Bug 1552717 - P3: Set mInitDataType on sample info regardless of if the sample is encrypted. r?cpearce
Beta/Release Uplift Approval Request
• User impact if declined: Sites that serve media that utilize key rotation with a unencrypted lead in will fail to playback media. I don't have any concrete examples of these sites in the wild, but am able to easily create such media with Google's shaka-packager, which means sites could easily do so too.
• Is this code covered by automated tests?: Yes
• Has the fix been verified in Nightly?: Yes
• Needs manual test from QE?: No
• If yes, steps to reproduce:
• List of other uplifts needed: None, please only take P3 from this bug.
• Risk to taking this patch: Low
• Why is the change risky/not risky? (and alternatives if risky): The change is low risk as it's small and has undergone a both automated and manual testing.
• String changes made/needed:
Attachment #9067858 - Flags: approval-mozilla-beta?
Comment on attachment 9067858 [details]
Bug 1552717 - P3: Set mInitDataType on sample info regardless of if the sample is encrypted. r?cpearce
Beta/Release Uplift Approval Request
• User impact if declined: Sites that serve media that utilize key rotation with a unencrypted lead in will fail to playback media. I don't have any concrete examples of these sites in the wild, but am able to easily create such media with Google's shaka-packager, which means sites could easily do so too.
• Is this code covered by automated tests?: Yes
• Has the fix been verified in Nightly?: Yes
• Needs manual test from QE?: No
• If yes, steps to reproduce:
• List of other uplifts needed: None, please only take P3 from this bug.
• Risk to taking this patch: Low
• Why is the change risky/not risky? (and alternatives if risky): The change is low risk as it's small and has undergone a both automated and manual testing.
• String changes made/needed:
Beta/Release Uplift Approval Request
• User impact if declined: Sites that serve media that utilize key rotation with a unencrypted lead in will fail to playback media. I don't have any concrete examples of these sites in the wild, but am able to easily create such media with Google's shaka-packager, which means sites could easily do so too.
• Is this code covered by automated tests?: Yes
• Has the fix been verified in Nightly?: Yes
• Needs manual test from QE?: No
• If yes, steps to reproduce:
• List of other uplifts needed: None, please only take P3 from this bug.
• Risk to taking this patch: Low
• Why is the change risky/not risky? (and alternatives if risky): The change is low risk as it's small and has undergone a both automated and manual testing.
• String changes made/needed:
Comment on attachment 9067858 [details]
Bug 1552717 - P3: Set mInitDataType on sample info regardless of if the sample is encrypted. r?cpearce
regression fix, approved for 68.0b9
Attachment #9067858 - Flags: approval-mozilla-beta?
Attachment #9067858 - Flags: approval-mozilla-beta+
You need to log in before you can comment on or make changes to this bug.
|
eric6/eric6_sqlbrowser.py
Tue, 13 Apr 2021 18:02:59 +0200
author
Detlev Offenbach <detlev@die-offenbachs.de>
date
Tue, 13 Apr 2021 18:02:59 +0200
changeset 8234
fcb6b4b96274
parent 8143
2c730d5fd177
permissions
-rw-r--r--
Applied some more code simplifications suggested by the new Simplify checker (Y108: use ternary operator) (batch 2).
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# Copyright (c) 2009 - 2021 Detlev Offenbach <detlev@die-offenbachs.de>
#
"""
eric SQL Browser.
This is the main Python script that performs the necessary initialization
of the SQL browser and starts the Qt event loop.
"""
import sys
import os
sys.path.insert(1, os.path.dirname(__file__))
for arg in sys.argv[:]:
if arg.startswith("--config="):
import Globals
configDir = arg.replace("--config=", "")
Globals.setConfigDir(configDir)
sys.argv.remove(arg)
elif arg.startswith("--settings="):
from PyQt5.QtCore import QSettings
settingsDir = os.path.expanduser(arg.replace("--settings=", ""))
if not os.path.isdir(settingsDir):
os.makedirs(settingsDir)
QSettings.setPath(
QSettings.Format.IniFormat, QSettings.Scope.UserScope, settingsDir)
sys.argv.remove(arg)
from Globals import AppInfo
from Toolbox import Startup
def createMainWidget(argv):
"""
Function to create the main widget.
@param argv list of commandline parameters (list of strings)
@return reference to the main widget (QWidget)
"""
from SqlBrowser.SqlBrowser import SqlBrowser
connections = argv[1:] if len(argv) > 1 else []
browser = SqlBrowser(connections)
return browser
def main():
"""
Main entry point into the application.
"""
from PyQt5.QtGui import QGuiApplication
QGuiApplication.setDesktopFileName("eric6_sqlbrowser.desktop")
options = [
("--config=configDir",
"use the given directory as the one containing the config files"),
("--settings=settingsDir",
"use the given directory to store the settings files"),
]
appinfo = AppInfo.makeAppInfo(sys.argv,
"eric SQL Browser",
"connection",
"SQL browser",
options)
res = Startup.simpleAppStartup(sys.argv,
appinfo,
createMainWidget)
sys.exit(res)
if __name__ == '__main__':
main()
eric ide
mercurial
|
"File As" remains blank
In Contacts, Outlook 2003 treats "File As" as if it is blank, no matter
what.
This happened after sync'ing with a Pocket PC 2003, using ActiveSync
3.7.1
If I create a new .pst, I am OK till the next sync. After that any new
contact is broken.
What can I do?????
0
7/28/2004 12:55:38 AM
outlook 87535 articles. 11 followers. Follow
0 Replies
352 Views
Similar Articles
[PageSpeed] 2
Reply:
Similar Artilces:
Remove Prompt to Open File as Read-Only (Excel 2007)
I have an Excel file that was created using Excel 2003. The person who created the file set protection so that every time the file is opened, a window appears with the following message: "'filename' should be opened as read-only unless you need to save changes to it. Open as read-only?" I am using Excel 2007 and want to remove this prompt, but when I go to the Help function for instructions on how to do it, it provides names of menu/ribbon options that don't exist (see below): 1. On the Review tab, click Protect Document. 2. Select Restrict Formatti...
Advice: XML file as database or table
Hello, If I choose to use a database then I need to use multiple tables. With a XML file I can select "my objects" as once. I think that there will be around 10.000 records (objects). I want to select my objects on different (selection criteria) ways (on attributes). And I want to add, update and delete my objects. Can somebody tell me if it is a good idea to use a XML file as database or table? Can I read parts of a XML file (for paging purpose)? Or do I need to select everything at once? Thanks! ...
Can't open documents via file association
Hi Group, I'm having a problem with Excel as part of Office 97. We're running: Windows 98SE Office 97 Here's the deal. If I open a document by double-clicking the document file Excel opens and declares that the path is invalid. It is showing the correct path in the warning box. If I open Excel first and choose FILE OPEN, then the file will open as normal. I've tried uninstalling including manual deletion of all files/registry references, running the MS Office removal tool, repair install of Windows & SFC. I'm not sure where else to go with it. If anyone can she...
Insert File As Text Using Automation
Anyone know how to insert a file as text in Outlook 03 using Automation? I have my Outlook object and all, and I just need to know the methods for inserting a file as text in the body of the document (same as File | Insert | As Text), not as an attachment. Thanks! You would need to read the file as a text string and insert it into the item's Body or HMTLBody. That's what that command does for you. -- Ken Slovak [MVP - Outlook] http://www.slovaktech.com Author: Professional Programming Outlook 2007. Reminder Manager, Extended Reminders, Attachment Options. http://www.slovakte...
save .snp file as system date and time
Hi, I'm trying to save a .SNP file in a specific directory and with the current time and date. The file is saved in the specified directory, but he's always saved as today.snp here is the code: Dim stDocName As String Dim today today = Now stDocName = "suporte_encomenda" DoCmd.OutputTo acReport, stDocName, "Snapshot Format", "l:\docs\today.snp" could anyone help me, please??? -- Thanks, Sorry if my english isn''t correct, but I''m from Potugal ;) Emanuel Violante Galeano First off, you didn't define a d...
how can I save a multiple page file as multiple JPEG's?
I created a 26 page doc in Pub2003, and want to save each page as a separate JPEG to upload to a site to create a photo book- They do not work with PDF's. How can I save each page separately? I know I can save the entire thing as a JPEG, and but I don't know how to save a page alone. Each page is many-layered and I can't seem to group all the multiple objects... how can you group a large number of objects on a page? I think if I could do that I could right-click and 'save as'. Thanks! -Joanna ...
How to Change the file associated with IE's Windows Media Player Add-on
Hello, My home computer is not playing streaming videos that are embedded in websites correctly, while my office computer can. Both machines use Internet Explorer as the web browser. I compare their settings under IE's "Manage Add-ons" and find one difference between them. At home, the file associated with Windows Media Player under the IE Manage Add-on dialog box is msdxm.ocx. At work, the file is wmpdxm.dll. I want to change the home computer IE Manage Add-on setting to be the same as that for office computer. How can I change the setting to point to th...
Save file as text from cell
I have a company name in one cell, when I click save I would like the company name pasted in the name box. Thanks This is just an example. This little macro will SaveAs to the contents of A1. Put c:\whatever.xls in cell A1 and run the macro. Sub savetocell() Dim s As String s = Cells(1, 1) ActiveWorkbook.SaveAs Filename:= _ s, FileFormat:= _ xlNormal, Password:="", WriteResPassword:="", ReadOnlyRecommended:=False _ , CreateBackup:=False End Sub -- Gary''s Student "jweasl" wrote: > I have a company name in one cell...
can i delete an email and skip the delete file as a single step
Can I delete an email finally without sending it first to the delete file. Can I save a step? Use SHIFT+DELETE. This works on files within Windows as well. -- Robert Sparnaaij [MVP-Outlook] Coauthor, Configuring Microsoft Outlook 2003 http://www.howto-outlook.com/ Outlook FAQ, HowTo, Downloads, Add-Ins and more http://www.msoutlook.info/ Real World Questions, Real World Answers ----- "Hugh" <Hugh@discussions.microsoft.com> wrote in message news:5940453A-705B-4A85-9766-B05B55EF1FD8@microsoft.com... > Can I delete an email finally without sending it f...
save to same file as opened
Using Excel97. when my user opens a file, makes changes and then clicks the save icon, it used to save the changes to the file that was originally opened, now it brings up a save as dialog box, adds a 1,2,3.... to the filename and saves it in the default folder instead of where it came from. How do I put it back to the way it was -- dmtech 1,2,3? Sounds like the file was saved as a template. Are you sure the file name is XLS and not XLT? ******************* ~Anne Troy www.OfficeArticles.com "dmtech" <dmtech@discussions.microsoft.com> wrote in message news:3869892F-B18A...
send to -> email file as pdf attachment
Version: 2008 Operating System: Mac OS X 10.5 (Leopard) Processor: intel In office 2007, there is a send to -> email file as PDF attachment when working on e.g. a spreadsheet, word document etc. In Word for Mac 2008 the only option that exists is a send to -> email as attachment. Are there any add ons or 3rd party products that will embed into the office engine to replicate this functionality? thanks Hi Maglite, There are a couple options: #1, 2008 only: The Standard version has this as a Sample Automator Workflow under the Script menu in Word--send PDF in Entourage. For H...
.lnk File Association Fix
All icons on the desktop changed to adobe icons and I do not know how to fix it. I have windows 7. I have searched google but I am not sure of the the correct solution. Most stuff I see was posted 2 to 3 years ago. Can someone point me in the right direction? Deb Deb, Try system restore to a date previous to this issue. Carlos "Deb" wrote: > All icons on the desktop changed to adobe icons and I do not know how to fix > it. I have windows 7. I have searched google but I am not sure of the the > correct solution. Most stuff I see was posted 2 to 3 yea...
Insert file as a hyperlink
In Outlook 2002 and 2003, Outlook replaces the feature "Insert shortcut" as "Insert as a hyperlink" which I believe it is a good move. My question is, why Outlook still restricts this feature to be available only in Rich Text Format? Any way to allow both Plain Text and HTML Text? Please also cc to my email. Thx. ...
File Reservation in Excel 2008
Version: 2008 Operating System: Mac OS X 10.5 (Leopard) Processor: Intel It used to be that when a document was opened by another user on the file server, you could open the document as read only. Excel now seems to think any of these files that are already opened are now corrupt. <br><br>In our network environment, users are on Intel Macs, running 10.5.8 and MS Office 12.2.3. Everyone has access to a file server running Mac OS Server 10.5.8 via AFP and the shared volumes are on an XSAN. <br><br>The issue is that when a user opens an ".xlsx" fil...
Sending Excel file as attachment to Lotus Notes mail
I want to program in VBA at the press of a button to send the Excel range selected as a workbook attachment to Lotus Notes users. Thanks Simon Dear Simon Please find below a code snippet which may help you. Unfortunately, as far as I am aware, it is not possible to select a range and send it as an attachment as if you were printing it off. You will first need to copy and pase it onto a new workbook and save it. The code below incorporates this. I am also assuming that you are able to send attachments using the "Send To---As Attachment" function withing Excel, as this is wha...
Loading execl file as a template.
Hello, I need solution, please, for following: I want to load excel file, but to fix the whole excel file as an excel file template. (The excel file is created by someone, but I want that the excel will be converted with all the cells format etc. as I have declared the template). How can I do that? Thanks :) Hi, isn't it possible with SAVE as exel template xlt or xltx "Mr. X." schreef in bericht news:jg8cr3$k2j$1@dont-email.me... Hello, I need solution, please, for following: I want to load excel file, but to fix the whole excel file as an excel file template. (The ex...
File Association problem in Win7
Folks, In Windows 7 (on a 64-bit Acer laptop), when I try to associate a file with a program, I click Start, "Default Programs", "Associate a file type with a program", then choose the file type from a long list of possible types. The snag is that the types that I want to associate with my favorite editor are not in the list - surprisingly, as they are ".c", ".h", and less surprisingly, a file type that is created by a program I wrote, ".Prs" Can anybody suggest how I can make the associations? Do I have to edit the registry? ...
What is advantage of using a resouce file as opposed to a string variable?
I've read Karl's article about using a .res file and LoadResData to store and transfer data, but why is this better than just using a string variable? I need to pump a load of data into a user-defined array (88 piano keys!) once only at startup and in the past I have handled that kind of task by sticking the data into a string, then using, say, Split to extract it. I then set the string to "" to recover memory. This is a lot less faffing about than using the resource editor and I can quickly change values in the string on the fly to test. So what's the adv...
File Association???
Blank I had a file in Print Shop but has since been seized by a PDF association......another words--- how can I change a PDF file to its previous association?? Any suggestions are appreciated..............Thanxxx...................Rudy Start Explorer Choose Tools Folder Options File Types Tab Find the .PDF extension Click Change Find the program that you want to open the .PDF file and Click Open Ok Apply wait a couple of seconds and it should be set. "Rudy" <rucan70@comcast.net> wrote in message news:hp08ba$71i$1@news.eternal-september.org... &...
importing .csv file as text with line breaks preserved
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig586B1CBB78607B22F70A4995 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit I'm trying to import a .csv file where some fields are numbers with leading zeros, and others have embedded line breaks. If I name the file with the .csv extension, the line breaks within fields are preserved, but the leading zeros are missing because every field is interpreted as General instead of Text. If I name the file with the .txt extension, I can manually change fields to Text as appropriate, but I can...
The File As field is empty, do you want to save this file. Outlo.
I created a contact folder with my own field names. After entering the data I want when I move to the next row of data I get this error message, "The File As field is empty. You may have not entered a name or company. Do you want to save this contact with an empty File As field?" How do I correct this error? Thanks -- Terry It's a warning, not an error. Sounds like you need to set up your data entry view so you can enter the Full Name or Company, which Outlook will automatically use to generate a File As name. -- Sue Mosher, Outlook MVP Author of Microsoft Out...
How to use XML file as data set ?
I have a simple VB.NET Express 2008 application that works. It uses an Access 2007 database to store its data. Data is available on a form using a DataGridView with BindingSource and BindingNavigator. Access 2007 is a bit of a sledgehammer to crack a peanut, and gives me portability issues. There's only a single table and 100 records. I'd really like to use an XML data file for simplicity. I have the data in an XML file, and I have the associated schema file. How do I define a data source? XML doesn't seem to be an option. I can't see how to hook it into my p...
Save Excel File As XML
I'd like to "save as" from Excel to XML format. Works fine but there so much gibberish that gets exported when I try to use in Dreamweaver (Spry component), it only spits out gibberish. Anyone know how to work around this? Or to get Excel to spit out cleaner XML without any handcoding? Thnx, On 1/29/09 4:23 PM, in article C5A78889.9AD5%ronald.m.mochinski@nasa.gov, "Ron Mochinski" <ronald.m.mochinski@nasa.gov> wrote: > I'd like to "save as" from Excel to XML format. Works fine but there so much > gibberish that gets exported when I try to use...
Cannot open PDF file that is attached to digitally signed xls file as an object
Hello, I have some payment approval request xls file. In this document, there is a PDF file attached as object (invoice). As long as this document is not digitally signed, I can open the attached PDF file by clicking on its icon or first page preview. However, when first person sign this document, I am no longer able to open it I can only see the icon (or preview). I don't understand why. I just want to read what is in this PDF document, not change its content so it should not have any influence to digital signature. I tried the same in DOC - I attached PDF file as object to wor...
File associations for PP Viewer 2007
I helped a friend setup her new Windows 7 HP desktop unit. It came with the 60 day trial suite of MS Office 2007 and PowerPoint 2007 Viewer preinstalled. I uninstalled the trialware package and it left the PP Viewer as an orphan. Is there any way to re-register all of the applicable file types other than using the "Open with" routine? Here's what I've tried so far: 1. Ran the /regserver parameter 2. Uninstalled then reinstalled the PP Viewer 3. Reinstalled the File Compatibility fix No joy for any of the above. The only files it will open at present ar...
|
Nautiloids: The First Cephalopods
By Phil Eyden
Introduction
Imagine yourself standing on a bleak windswept Ordovician shore. It is 470 million years ago and you are standing on a rocky coastline staring out to sea. As you turn and pan the landscape behind you, all you can see are barren rocks, with no trees, plants or any form of animal life. You feel the salty wind on your face and the near total silence is interrupted only by the soft sound of the lapping tide at your feet. You feel something tickling your toes, look down, and a trilobite a couple of inches long scuttles across your foot. You pick it up, see its legs pulsate rhythmically and its feeble antennae wave. You place it down in the rock pool where it quickly scurries away under a crevice. You see another shell of a trilobite in the water, but this looks different, it has been torn to shreds with puncture marks and you wonder what creature could have possibly caused this. As you stare out to sea something disturbs the breakers and the tip of a huge horn, metres in length, mottled a dull red and cream and gleaming in the sunlight briefly breaks the surface before sinking from view.
This is the Ordovician period, when gigantic cephalopods ruled the seas. The world span faster on its axis than it does today, a day would have lasted just twenty-one hours, and no fewer than 417 such days such days were crammed into a single Ordovician year. The Moon would have appeared much larger than it does now causing vast tidal ranges, much more extreme than the present day. The air would have been harder to breathe, with 15% oxygen and higher levels of carbon dioxide. The continents were unrecognisable to our modern eyes and were mostly grouped in the southern latitudes.
Origins
Life is estimated to have been present on earth from a date of around 3000 million years ago, but until a date of approximately 1000 million it had existed in simple prokaryotic cell forms. The first eukaryotic cells containing a nucleus and other structures appeared around this date and slowly began to form colonies and live cooperatively. It is roughly at a date of 600 million that we start to find evidence of complex organised life though the fauna would appear very strange to our eyes; strange quilted animals that are hard to interpret, jellyfish, forms of sea pen and peculiar discoid creatures with a three-fold symmetry. Animal life that we would recognise, primitive molluscs, arthropods and chordates are known from deposits from China at a date of 540 million. These early molluscs were an insignificant group of animals in the Cambrian period, largely immobile and overshadowed by the much more spectacular arthropods. At the very end of the Cambrian an environmental event happened that had opened up the world to allow the molluscs to ascend to take the place of the arthropods as top predator.
At a date of approximately 510 million years at the end of the Cambrian, the world entered an ice age. Glacial sheets spread out from the poles and spread out from the continents, trapping seawater and causing the sea level to drop. The Cambrian animals, trapped on the warm continental shelves, were decimated as their habitats became colder, darker and much reduced in size. When the ice sheets finally retreated vast amounts of freshwater would have been deposited into the saline oceans and which would have acted as poison to many marine communities. The predatory arthropods such as the metre long anomalocarids were much reduced in number and many forms became extinct. Some of the trilobites made it through the extinction, but the position of top predator was now vacant, and the small-shelled molluscs now seized their chance to assume the role.
The first cephalopods had appeared in the Late Cambrian, about 515 million years ago. These were tiny creatures a few millimetres long with crude chambered shells but with a diagnostic siphuncle, or tube that connects the chambers of the shell already in place. It has been theorised that these small animals, such as Plectronoceras, used their chambers to drift along like a jellyfish seizing plankton with their arms, or were snail-like creatures crawling along the sea-bed using their arms to search of food. In just fifty or so million years these tiny insignificant animals would have evolved into eleven metre long giants such as the Cameroceras we have just witnessed breaking the surface of the waters.
Form
The most primitive cephalopods are the nautiloids characterized by their external shells with relatively simple septal walls. Nautiloids show all the basic structures that went on to be adapted transformed and, in some cases, lost by their descendants. Traces of nautiloid ancestry can be demonstrated in the later ammonites, belemnites, squid, and in their most derived form, the modern octopus. There are somewhere around 11,000 names/taxa of fossil nautiloid, though how many of these are valid is unknown.
The shell of the nautiloid or phragmocone, was divided into many chambers that would have contained gases provided by a connecting tube known as a siphuncle. The siphuncle works by drawing water out of the saturated chambers of the nautilus into the bloodstream and gas seeps out of the blood to fill the empty space in the chamber. When the nautilus completes a new chamber it is initially filled with water. The nautilus will then increase the salt content and acidity in its bloodstream flowing through the siphuncle. The increase in salt levels sets up an osmotic gradient causing the water in the chamber to move to the more concentrated blood. As the water levels drop in the chamber and the pressure reduces, gases are diffused from the siphuncle to fill the space creating buoyancy. Contrary to the widely held misconception that nautiloids (and other shelled cephalopods) work in the same way as submarines, there is no actual pumping action involved in this process at all.
In many species of nautiloid the siphuncle was quite wide in diameter compared to the later ammonoids and tended to run through the centre of the shell. These chambers were separated and sealed from each other by structure known as a septal wall, these divisions produce characteristic suture lines on the surface of the shell. As the animal grew more and more chambers were added; with the increase in size of the head, the animal took on an ever-expanding cone-shape in some of early forms. Some of the orthoconic nautiloids filled the chambers at the apex of the shell with calcite instead of gas, which would have acted as a counterweight to balance the shell. The animal itself inhabited the living chamber that could account for up to a third of the length of the animal.
It is believed that these animals had a whole series of grasping arms and a beak, and although no soft-bodied fossils have been found, guesses can still be made about their soft-bodied anatomy. Almost all fossil nautiloids have a notch cut into the underside of the aperture of the shell known as the hyponomic sinus. This is the hole through which the hyponome projects, this being the directional organ through which water is squeezed after it is drawn into the mantle. This demonstrates that the nautiloids had evolved a form of jet propulsion as early as the Ordovician, a feature that has been retained in all living cephalopods. The hyponome in the modern Nautilus is a much simpler structure than the coleoids and comprises of a rolled fleshy tube formed from two separable flaps of tissue, rather than a single tube. One can imagine the smaller nautiloids as being quite fast and efficient swimmers when swimming backwards at least, with the pointed end of the shell cutting through the water, but the larger species would have been much more cumbersome, the sheer size of the shell making steering difficult. As with modern nautiluses swimming forwards would have been accomplished by bending the siphon backwards under the shell through the hyponomic sinus. While an adequate solution, bending the "exhaust" of a jet like this reduces its power and efficiency greatly. Like the living nautiluses, the fossil species probably had two speeds: slow forwards swimming when looking for food, and a much faster escape speed backwards when threatened.
The form of the shell varied greatly between the nautiloid orders and by no means all were cone-shaped. Some were slightly curved, known as cyrtocone and the straight shells were known as orthocone. Other forms were loosely coiled, such as the Early Ordovician form Estonioceras. The orthocones are subdivided into two main forms known as longicone with very long tapering shells, and others are known as brevicone, which tend to have rather short and swollen shells. Still others, such as the Early Ordovician Lituites grew in a tightly coiled shape up before suddenly developing a long orthocone, these animals resembling a traditional shepherd's crook in form. The highly coiled genus Nautilus is a distant relative of the last nautiloid order to evolve, which was sometime in the Early Devonian, about 400 million years ago though some forms of nautiloid evolved a similar form of tightly coiled shell during the preceding Silurian period. It is worth remembering that there was no clear transition from straight to curved shells as many of these forms co-existed with each other, with some straight-shelled forms lasting well into the Triassic (Michelinoceras spp.).
There has been much controversy about the classification of nautiloids and many researchers have come to differing conclusions as to exactly how many orders and suborders there were of these animals. Even after more than a century of study there are several debated orders of taxonomic hierarchy and there is no single system that has gained widespread acceptance. It is however generally accepted that in the late Cambrian there was just one order of nautiloid, the Ellesmeroceratina that acted as a stem group for all the later orders. During the Early Ordovician the group radiated enormously and no less than five other orders appeared (some researchers believe more).
The most important group in terms of diversity, longevity and sheer numbers of these was the Orthoceratatida, (Early Ordovician-Late Triassic). These orthoconic nautiloids tend to have straight or very weakly curved shells and a graceful appearance. They are believed to be the ancestors of the Bactritida, from which the Ammonoidea and Coleoidea arose. The largest nautiloids such as the Early Ordovician Endoceras and the Middle Ordovician Cameroceras are believed to have been part of another order, the Endoceratida (Early Ordovician-Late Silurian). These are distinguished by the presence of a particularly wide siphuncle and endocones, or calcareous hollow conical deposits around the open mouth of the shell linked by a tube and were probably used to help counterbalance the animal. Imagine a stack of tapering polystyrene cups stacked together with the rims projecting outwards and one can begin to visualise the structure of these animals. No endocerid has calcite deposits in its shell so this must have been a separate approach to the problem of buoyancy and weight distribution. It is important to remember that these giant orthoconic nautiloids, such as Cameroceras, are exceptionally large and are rare in the fossil record. The overwhelming majority of nautiloids are much smaller, usually less than a meter long fully grown.
There is some evidence to suggest sexual dimorphism amongst some orthoconic nautiloids. A 325 million year long specimen of Rayonnoceras solidiforme measuring eight foot long was discovered at Fayetteville in Arkansas in January 2003. The largest example of this actinoceratoid nautiloid ever found by a foot, it was found to have an aperture a third smaller than the second largest, a seven-foot specimen. This may indicate that the males and females had differing sizes of apertures, as with the modern Nautilus. These specimens were also interesting, as it has been speculated by Walter Manger that these two examples were 'pathological giants'. Riddled with trematode parasites and rendered sterile, he believes that the energy that could have been diverted to reproduction was devoted to growth instead.
It is probable that there were three stages in the evolution of nautiloid buoyancy and orientation. In their most primitive forms nautiloids were small and because the body was heavier than the shell floated with the head pointing downwards. Some palaeontologists believe that they were planktonic organisms living a jellyfish-life existence; others envision them as buoyant snails, making short jet-propelled hops across the seabed in search of prey or safety. Either way, the later forms were much larger, and these seem to have been benthic predators, pulling their shells behind them as they crawled along the seafloor. Though the shell was somewhat buoyant still, it wasn't quite buoyant enough to lift the animal off the seafloor, and if these nautiloids could swim it was lethargically and only intermittently. Most of the later nautiloids added counterweights to their shells which meant that they could be both buoyant and oriented horizontally allowing them to swim in midwater effectively. The more streamlined forms may well have been pelagic, spending their entire lives well away from the seafloor feeding on plankton, swimming crustaceans and trilobites, and perhaps even some of our distant relatives among the early chordates such as
the conodont animals. Other forms had hook or horn shaped shells seemingly much less well suited to active swimming, and were probably nektobenthic, cruising over the sea bed picking off the benthic invertebrates they ate, and if they were anything like the modern nautiluses, feeding on carrion as well.
The proximity of the Moon has been argued to exert a direct effect on nautiloid development. Microscopic ribs, or laminations are secreted on a daily basis in relation to the lunar-tide cycle, forming a logarithmic spiral. The modern Nautilus has 29 or 30 of these growth laminations per chamber, indicative of the length of the current lunar-tidal month. Progressively further back in time the number of laminations decreases at a linear rate, thus the nautiloids in the Ordovician have just eight or nine laminations per chamber. This has been used as evidence that the Ordovician lunar month was eight or nine days long, though the theory does assume that these ancient nautiloids had the same growth rate as modern species.
Later History
The first major extinction of nautiloids occurred at the end of the Ordovician Period when there was another Ice Age, but much greater in size and effect than that that of the Cambrian-Ordovician transition. It is estimated this accounted for the loss of 25% of all animal species in existence at that time including the earliest nautiloid order, the Ellesmeroceratina. The Endoceratida, which contained the giants Endoceras and Cameroceras failed to survive the Silurian. The other nautiloid orders such as the, Tarphyceratida, Discosorida, Oncoceratida and Orthoceratida survived into the Devonian though as a group the nautiloids began to slowly decrease in size and number of species.
The reason for this is almost certainly interlinked with the development of bony fish and latterly the sharks in the Devonian. Whereas the nautiloids of the Ordovician were sluggish creatures and almost certainly unwieldy swimmers, this was not to their detriment as their prey animals were mainly bottom crawling arthropods, speed and dexterity would have not been a necessity. However, with the rise of the nimble jawed bony fish in the late Ordovician and Early Silurian, arthrodires such as Dunkleosteus in the Devonian and primitive hagfish and lampreys in the Late Carboniferous, all would have put environmental pressure on the nautiloids in a competition of resources. There is a clear decline in nautiloid numbers and diversity from the Silurian onwards with the final archaic orthoconic nautiloids becoming extinct at the end of the Triassic, roughly about 208 million years ago. Another factor worth considering is the rise of the ammonoids in the late Devonian, which evolved from an offshoot of the nautiloids known as the Bactritida in the early Devonian. The ammonoid goniatites were very successful cephalopods in the Carboniferous and Permian and were succeeded by the more complex ceratites in the Triassic. These other groups of cephalopods would have further increased pressure on the nautiloids. Obviously this is not the end of the story as we have the five species of modern Nautilus as testament.
Certainly the shell of some of the nautiloids became thicker implying they could reach increasingly deep-water habitats. In 1985 Gerd Westermann published a paper in which he examined various nautiloid shell shapes and has calculated the depths they could have reached before imploding. Late Silurian brevicones have been shown to be able to resist depths no greater than 150m and must have lived close to the surface. Some longicones with their thin, closely spaced septa, lived at a depth of no more than 300m and other longicones with thick, widely spaced septa have been demonstrated to have withstood depths of 1100m. The Carboniferous nautiloid Michelinoceras had a shell that could resist a depth of 1125m, making its maximum depth twice as deep as the modern Nautilus. Whether or not Michelinoceras actually frequented these depths is a controversial theory; food at these depths may not have been plentiful given the anoxic environment and may not have been enough to support populations of such nautiloids.
Nautilus
Perhaps it is due to the increased environmental pressure from other groups of vertebrates and cephalopods that forced the nautiloids to adopt increasingly deeper waters. Although the last orthoconic nautiloids became extinct 208 million years ago, one order, the Nautilida, continued to thrive and modern descendants can be found at depths of up to 600 meters in coral reefs across the Indian Ocean to Australia and from Samoa to the Philippine Islands. The animal never moves far from the reef face and undertakes a vertical migration at night to a depth of 100 meters or so to feed off a concoction of crab and lobster exoskeletons, crustaceans, nematodes, small fish or echinoderms (and occasionally even each other). Perhaps it was this opportunistic method of feeding that allowed the Nautilus to cling on, the creature avoided specialised food and became a scavenger, whilst retreating to a singular environment where food is abundant.
The modern Nautilus is a descendant of the most recent group of nautiloids to arise, the Nautilida, which is still an incredibly ancient group. The first Nautilida are known from the early Devonian, approximately 400 million years ago. Nonetheless, it would be a mistake to assume that Nautilus is a 'living fossil' and identical in most respects to its earliest ancestors. For example, the beak of the middle Triassic Germanonautilus has recently been reconstructed and has been shown to be significantly larger than the modern Nautilus. Nonetheless, Nautilus is certainly indicative of cephalopods at their most primitive state of development with approximately 90 tentacles, lens less pinhole type eyes that are open to the water, two pairs of gills, a chambered gas-filled shell, no suckers, no ink sac and the large external shell.
From the Devonian period onwards, the nautiloids, essentially a catch-all group for all the disparate primitive cephalopod lineages, began to be slowly replaced by newer more advanced forms of cephalopod. One can speculate as to how the nautiloids prior to the Devonian had more primitive features than Nautilus, after all, Nautilus has evolved from and is not the same animal as the earliest Nautilida in its order. However, the picture is not straightforward. It is generally accepted that the more advanced belemnites, squid and other coleoids stemmed from the Bactritida in the Early Carboniferous, about 360million years ago which itself as a group had only split from the nautiloids about 400 million years ago. The Bactritida are also believed to be the ancestor of the ammonoids. As the ammonoids are believed to have had radulas reflecting a closer affinity to the coleoids than the nautiloids, but probably not advanced eyes, hoods or ink sacs, it is likely that the Bactritida, bar the radula, contained few advanced features. The coleoid branch that led to the belemnites probably stemmed from the Aulacocerida, which contained a mixture of orthocone and belemnite anatomy but without guards.
Within those forty million years advanced coleoid features, including hooks, suckers, internal shells and ink sacs evolved. Perhaps the evolution of a short lifespan in early coleoids from the very slow reproduction rate with nautiloids (the modern Nautilus achieves sexual maturity at 15 years, yet most modern squid live one to two years) enabled these features to develop over rapidly succeeding generations. Perhaps then one can surmise that the ancient nautiloids were a disparate group by the Devonian with varying soft-bodied morphologies. One branch with ten arms may have led to the Bactritida and then onto the coleoids and ammonoids, and other forms may have led to Nautilus and the Nautilida. Until numbers of soft-bodied nautiloid fossils are found, one can only speculate.
The Nautilida was a very important group in the Early Carboniferous with about 75 genera in 16 families. After that date there was a gradual decline in diversity on both levels, with the group reduced to 35 genera in 8 families in the early Triassic. By the late Triassic, only one genus, Cenoceras, survived. There then followed a recovery that lasted to the Cretaceous, the group being widespread with 24 genera, followed by another decline before the end Cretaceous extinction. Following the Cretaceous extinction the Nautilida began to diversify again, perhaps filling some of the ecological niches vacated by the ammonites. It is interesting to note that it is estimated that whilst three families and five genera crossed this extinction transition 65 million years ago, the ammonites were completely wiped out following a lengthy decline in their diversity and numbers. The earliest known examples of Nautilus itself date from the Oligocene, roughly 35 million years ago. Prior to that, fossils of the Nautilida such as Aturia (Paleocene-Miocene) show slight morphological differences, notably in the flattening of the shell, length of the septal necks and positioning of the siphuncle. There are currently five species of Nautilus divided into two genera, Nautilus and Allonautilus.
Ammonites
Due to their outward resemblance to nautiloids, and especially Nautilus, and similar morphology it is worth mentioning a few points about ammonites. Ammonites worked on a similar system utilising gas filled chambers in a (normally) coiled shell to create neutral buoyancy, connected by a siphuncle and with the body of the animal inhabiting the living chamber. The shell of the ammonite is generally considered to be thinner than the nautiloid, but the strength is considered to have been maintained by the much more complex septal walls and not the thickness of the shell itself. There were notable differences between the two groups and is worth mentioning a few of the most important ones:
The suture line is generally much more complex in the ammonoids, except with the some of the goniatites which closely resemble their nautiloid ancestors. The siphuncle tends to be centrally placed with most nautiloids and is often wider than the ammonoids, and with the ammonoids the siphuncle is usually located near the outer margin of the shell, the venter. The overall shape of the septa is different, with ammonoids the septal necks are backward pointing, whereas with nautiloids they are reversed and are forward pointing. Another important difference is in decoration and ornamentation, whereas most coiled nautiloids have featureless or unornamented shells, some ammonites such as Collignoceras, Kosmoceras and Hoplites are covered in ribs, keels and spine bases. Lappets, projections from the aperture of the shell are never present with nautiloids, and the notch that would have held the hyponome, the hyponomic sinus, is not present in the ammonites. Other differences include the shape of the radula and the number of teeth per row is fewer in ammonites than in the nautiloids, 9 rather than 13, the ammonite radula shows a closer affinity with most octopuses which have a similar number and in some cases a very similar radual morphology.
Hatchling nautiluses are practically miniature versions of the adult animal, about 25-30 mm and are able to hunt and scavenge immediately. It seems highly likely that ammonite hatchlings may have been planktonic in size, probably around 10mm and probably grew from a paperclip shape quite rapidly, demonstrating a rapid change in shell shape to a coiled form. This was probably the key to survival of the nautiloids over the ammonites; when the asteroid impacted 65 million years ago, the ammonite hatchlings as part of the zooplankton would have suffered following the blanketing of the sky and reduced sunlight, whereas the nautiloid hatchlings would have been able to continue to feed on biological matter filtering down from the upper levels. In addition, living at a deeper water level than the ammonite, the nautilus may have been afforded a degree of protection from acid rain, doubtless a consequence of the vaporisation of millions of tons of limestone into the atmosphere following the impact.
It is important to remember that the ammonites were a group in severe decline by the time of the Cretaceous extinction. At the beginning of the Cretaceous they were represented by 20 families, by mid Cretaceous about ten, and by the end only three or four. One theory argues that oxygen levels were much lower in the Jurassic and Cretaceous as the polar caps were much smaller than today, the oceans being less oxygenated by melting glaciers and icebergs. Ammonites could have populated the vast areas of the oceans higher in the water column at maximum depths of no greater than 250 metres but below the higher oxygenated top 50 meters. There they would have had little competition from fish or belemnites, or marine reptiles that would have populated the upper levels of the ocean. Perhaps as the climate slowly cooled in the Cretaceous and the polar caps began to increase, oxygenating the oceans with melt water the available habitat for the ammonites began to slowly decrease in size. Unable to adapt to deeper waters due to implosion, and unable to rise to the surface due to high oxygen levels, the ammonites were slowly squeezed into an environmental trap.
As previously mentioned Nautilus undertakes a vertical migration along reef walls at night from depths of around 600 meters maximum to 100 meters or so in search of food. It seems likely that many of the ammonite forms would have done the same in the water column, following the plankton. Perhaps it was this dependence of the ammonite on plankton that eventually led to its extinction for the reasons mentioned above. A lifestyle that was closely locked with plankton would make the ammonite vulnerable to environmental changes within the planktonic system, Nautilus on the other hand, being a scavenger of larger pieces of animal and an active predator, would have a plentiful food source as long as the reef system in which it exits continues to be active. With the demise of so many marine creatures at the end of the Cretaceous, perhaps this would have actually been a boon to the scavenging nautilus?
This leads us on as to the question of why ammonite and nautiloid remains are often found in similar deposits if they had varying lifestyles? Deceased nautiluses do not tend to fill up with water and sink to the sea floor if their soft tissues remain in place. Gases arising from the decomposition of the carcass tend to expel water from the shell and the dead animal tends to rise to the surface, held buoyant by the gases retained in the chambers. After the body decays, the remaining water is expelled from the siphuncle into the living chamber and the shell is free to drift as to wherever the tide takes it. This helps to explain why nautilus fossils are common, if the shells drifted downwards then they would reach implosion depth and shatter and fossils would be rare things indeed. Floatation studies of modern nautilus shells have demonstrated that they can remain afloat for years after death has occurred. This is important as it implies that the location of the deposition of fossilised coiled nautiloids (and probably ammonoids) may be largely due to oceanic currents and not necessarily reflect the location of the population. This would not, of course, apply to mass mortalities.
Diet
It is believed that Nautilus hunts by using smell rather than using its poor vision and uses receptors that are located below each eye known as rhinopores, these are capable of detecting odours up to a distance of thirty feet or so. The tentacles also contain chemoreceptors, which allow them to detect prey in close proximity. The Nautilus samples the current sweeping across the reef face for chemical trails, then homes in and seizes small crustaceans using its sticky tentacles. As soon as it seizes prey items, it tends to swim downwards, presumably to reduce the chance of having its food stolen. It is thought that the calcium provided by arthropod exoskeletons is converted and used by Nautilus to create new shell material. It seems likely that ancient nautiloids would have operated on a similar system.
During the Ordovician period (443-510mya) the trilobites were by far the most prominent of the ancient marine arthropods. This period of maximum diversity and population sizes of the nautiloids and the trilobites appears to coincide and it seems highly improbable that this can be attributed to coincidence alone. Some orders of trilobites developed increasingly complex patterns of spines from just about any part of their exoskeletons and it seems certainly possible that these spines could have been used defensively, notable examples here are the Ordovician trilobite Cryptolithus which had an extremely large spine on each side of cephalon, or head shield, and Selenopeltis bucii, another Ordovician trilobite which had large swept back spines stemming from each body segment or pleuron. Such an animal if rolled up could have presented a difficult prey item for a nautiloid with its exposed soft parts on its head. Other trilobites such as Phacops in the Devonian developed heavier and more robust exoskeletons.
It would, however, be unwise to assume that defensive features adopted by some trilobites were purely a response to nautiloid predation. In some of the swimming forms, spines may have been used for counterbalance, and benthic bottom dwelling forms may have used them as stabilisation structures for crawling on loose substrate. In other words, increased spinosity may have been as a result of selective pressures on trilobites, of which nautiloids may have provided a factor, albeit, a major one. Other animals such as the eurypterids, or sea scorpions, also began to make an appearance in the Early Ordovician, and bony fish began to emerge as an important group and it seems likely that these were also predators of trilobites.
Physical damage on trilobite exoskeletons that can be attributed to nautiloids is rare and hard to prove. As mentioned, eurypterids and fish could cause damage; the problem exists in trying to attribute one particular culprit. Certainly at least one example of Phacops has been found with a damaged body segment which appears to have been damaged from an attack from above, but this is difficult to prove. Damaged trilobite exoskeletons are known to undergo repair often resulting in malformation, this makes wound marks even harder to identify. However, given the abundance of trilobites and nautiloids in the Ordovician, it seems unthinkable that the two groups did not exist in a predator/prey role, and it is quite possible that some of the larger forms of nautiloid could have attacked the smaller marine eurypterids as well. Certainly, modern Nautilus is an opportunistic feeder that will take live crustaceans and crustacean moults alongside whatever else it can find, and all the coleoids are fierce predators on crustaceans, fish and other molluscs; there is no reason to imagine Palaeozoic nautiloids were any different.
Finally...
Although the Nautilus is heavily harvested for the shell trade, the animal appears to be doing rather well and is very widespread around the Pacific. In fact, the animal may even be diversifying; the Papua New Guinean Allonautilus differs in its physiology so much from Nautilus, mainly in the creases and encrusting layer on its shell, size of its gills and variation in reproductive structures that in 1997 it was declared by Ward and Saunders to be a separate genus. Following DNA studies it is believed that Allonautilus scrobiculatus may be a recent offshoot of Nautilus. If so, this would indicate that the Nautilida is undergoing speciation again. If so, the Nautilus in one form or another may be around for a long time yet to come.
References
Clarkson, ENK. 1998. Invertebrate Palaeontology and Evolution (4th ed). Blackwell.
Ellis, R. 2001. Aquagenesis. Viking.
Gon III, SM. 2003. A Pictorial Guide To The Orders of Trilobites.
Hanlon, RT.; Messenger. JB. 1996. Cephalopod Behaviour. Cambridge.
MacLeod, N. 2003. Paleobase Macrofossils pt.2: Mollusca. Blackwell.
Maisey, JG. 1996. Discovering Fossil Fishes. Henry Holt.
Monks, N; Palmer, P. 2002. Ammonites. The Natural History Museum.
Norman, D. 1994. Prehistoric Life. Boxtree.
Norman, M. 2000. Cephalopods, A World Guide. Conchbooks.
Parker, A. 2003. In the Blink of an Eye. Free Press.
Websites
Theo Engesers' Nautiloid pages:
http://userpage.fu-berlin.de/~palaeont/fossilnautiloidea/fossnautcontent.htm
General Information on Prehistoric Nautiloids:
source
Press release on Rayonnoceras discovery:
source
Post-mortem transport of the Tertiary Nautilus Aturia:
source
A Broad Brush History of the Cephalopoda by Dr Neale Monks:
http://is.dal.ca/~ceph/TCP/evolution.html
Photo credits
Kevin Bylund for the Rayonnoceras, Bactrites, Mitorthoceras, and Eutrephoceras photos.
Richard Fein for the Nautilus photo from the New York Aquarium. (Thank you, Tani!)
Tom Johnson of www.phacops.com for the Selenopeltis photograph.
Lituites and Smithsonian Article from author's personal collection.
Virtual Silurian Reef (Reef Banner image and Silurian nautiloids: permission granted)
University of Michigan (Dioramas. Public Access from http://seaborg.nmu.edu/earth/)
Acknowledgements
And a big thank you to Neale Monks for his guidance, contributions and input. Also, thank you to Kevin Bylund for providing the spectacular photographs from his personal collection and suggestions.
• Published
Dec 29, 2013
• Page views
49,416
Members online
Forum statistics
Threads
19,556
Messages
202,854
Members
8,404
Latest member
SouthSeaPugsNReefin
Monty Awards
TONMOCON IV (2011): Terri
TONMOCON V (2013): Jean
TONMOCON VI (2015): Taollan
TONMOCON VII (2018): ekocak
About the Monty Awards
Top
|
Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.
Patents
1. Advanced Patent Search
Publication numberUS4623887 A
Publication typeGrant
Application numberUS 06/610,377
Publication dateNov 18, 1986
Filing dateMay 15, 1984
Priority dateMay 15, 1984
Fee statusPaid
Publication number06610377, 610377, US 4623887 A, US 4623887A, US-A-4623887, US4623887 A, US4623887A
InventorsB. Welles II Kenneth
Original AssigneeGeneral Electric Company
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Reconfigurable remote control
US 4623887 A
Abstract
A reconfigurable remote control transmitter is disclosed that has the ability to learn, store and repeat the remote control codes from any other infrared transmitter. The reconfigurable remote control transmitter includes an infrared receiver, a microprocessor, nonvolatile and scratch pad random access memories, and an infrared transmitter. The microprocessor application is divided into four main categories: learning, storing, retransmitting, and user interface. In the learning process, the reconfigurable remote control transmitter receives and decodes the transmissions from another remote control transmitter. The process is repeated at least twice for each key to make sure that it has been properly received and decoded. Once the data has been received and decoded, it is stored for later use. In order to do this, the received and decoded data is compressed so that it can fit into the nonvolatile memory. This process is repeated for each of the several remote control transmitters that are to be replaced by the reconfigurable remote control transmitter. When the learning and storing operations have been completed, the reconfigurable remote control transmitter is ready to use.
Images(9)
Previous page
Next page
Claims(10)
I claim:
1. For use with a plurality of remotely controlled products or appliances each of which is controllable with one or more signals transmitted from an associated remote control transmitter, a reconfigurable remote control transmitter for emulating the remote control transmitters of said plurality of remotely controlled products or appliances comprising:
receiver means for receiving signals transmitted from a remote control transmitter to be emulated during a learning mode, said signals being comprised of bursts of pulses separated by pauses;
prompting means;
microprocessor means connected to receive the output of said receiver means and coupled to said prompting means for prompting a user to initiate transmission of a signal from the remote control transmitter to be emulated and counting the numbr of pulses in each burst of pulses and timing the duration of each pause of a transmission, said microprocessor means being programmed to categorize the pulse bursts and pauses and generate a compressed code for each signal provided by the remote control transmitter to be emulated;
memory means addressed by said microprocessor means for storing said compressed codes; and
transmitter means controlled by said microprocessor means in an emulation mode for transmitting a coded signal or controlling a selected remotely controlled product or appliance, said microprocessor means being further programmed to recall from said memory means a desired compressed code, expand said code and cause said transmitter means to transmit the coded signal.
2. The reconfigurable remote control transmitter as recited in claim 1 wherein said memory means includes a nonvolatile memory.
3. The reconfigurable remote control transmitter as recited in claim 1 wherein said memory means comprises:
first random access memory means for storing intermediate data and second random access memory means being for storing said compressed codes, said second random access memory means being nonvolatile; and
address register means connected to said microprocessor means and each of said first and second random access memory means for storing addresses generated by said microprocessor means, said first random access memory means being addressed by said microprocessor means during said learning mode and for the generation of said compressed codes, said second random access memory means being addressed by said microprocessor means for storing said compressed codes and during said emulation mode.
4. The reconfigurable remote control transmitter as recited in claim 3 wherein both said first and second random access memory means are CMOS memories and said second random access memory means further includes a low voltage battery to maintain the data stored in the CMOS memory.
5. The reconfigurable remote control transmitter as recited in claim 1 further comprising:
selection means connected to said microprocessor means for permitting a user to select one of said remote control transmitters to be emulated; and
learn switch means connected to said microprocessor means for selecting said learn mode or said emulation mode.
6. The reconfigurable remote control transmitter as recited in claim 5 further comprising keyboard means for emulating a keyboard of any one of the remote control transmitters to be emulated depending on the selection the user has made using said selection means, said microprocessor means when in said learning mode prompting the user to first press a key on said keyboard means and then a corresponding key of the remote control transmitter to be emulated.
7. The process of learning, storing and reproducing the remote control codes of any of a diverse plurality of remote control transmitters comprising the steps of:
receiving a transmission from a remote control transmitter;
counting the number of pulses in each burst of pulses and timing the duration of each pause in said transmission;
categorizing said pulse bursts and said pauses;
generating a compressed code from the categorized pulse bursts and pauses;
storing said compressed code;
on command, accessing said stored compressed code and expanding the accessed code to regenerate the original pulse bursts and pauses; and
transmitting said regenerated pulse bursts and pauses.
8. The process as recited in claim 7 wherein said steps of receiving, counting and timing, and categorizing are repeated at least twice further comprising the step of correlating the results of two categorizing steps before completing said process.
9. The process as recited in claim 7 further comprising the steps of:
determining the frequency of said received transmission;
storing a frequency code corresponding to said determined frequency; and
synthesizing a carrier frequency corresponding to said frequency code for performing said step of transmitting.
10. The process as recited in claim 7 wherein the step of generating a compressed code comprises the steps of:
removing repeating sequences of said categorized pulse bursts and pauses;
encoding the number and position of the repeating sequences;
stripping any preamble common to a plurality of received transmissions; and
separately encoding said common preamble.
Description
CROSS REFERENCE TO RELATED APPLICATION
The subject matter of this application is related to the subject matter of an application entitled "Programmable Functions for Reconfigurable Remote Control" filed by Raymond G. Ehlers, Ser. No. 610,549 filed concurrently herewith and assigned to a common assignee with this application. The subject matter of that application is incorporated herein by reference.
FIELD OF THE INVENTION
The present invention generally relates to remote control transmitters of the type used with various consumer products such as television receivers and the like and, more particularly, to a reconfigurable remote control transmitter which may be programmed to emulate any one of a plurality of individual transmitters.
BACKGROUND OF THE INVENTION
Many new consumer electronic products, particularly video products, are available with hand held infrared remote control transmitters. A consumer may have separate remote control transmitters for a television, a cable converter, video cassette recorder, and a video disc player, for example. In such a case, it is confusing to know which transmitter to pick up to control which prouct. Moreover, carrying around four different remote control transmitters spoils the convenience of the remote control feature. It is therefore desirable to provide a single remote control transmitter for controlling each of the several products.
A number of solutions have been proposed for this problem in the prior art. One example is disclosed in the patent to Litz et al, U.S. Pat. No. 4,274,082. In the Litz et al system, an amplifier, a tuner, a tape recorder, and a turntable are interconnected by a two-conductor cable. Each of these devices is controlled by a corresponding microprocessor, and a hand held transmitter is used to transmit coded signals that control the operation of the inividual devices. The coded signals are received by a common receiver and first conversion circuit to provide voltage pulses on the two-wire cable. Additional conversion circuits are required for each microprocessor in order to convert the voltage pulses on the two-wire cable to pulses which can be used by the microprocessors.
Another example is disclosed in U.S. Pat. No. 4,200,862 to Campbell et al. The Campbell et al system includes a single receiver/transmitter unit which may be placed on a table, for example, and a hand held transmitter, but in this case, the receiver/transmitter unit injects digital pulses onto the house mains at times of zero crossing of the mains voltage. Various appliances are plugged into the house mains via slave units which are each responsive to an assigned digital address and a digital operation code to control its appliance.
Common to both the Litz et al and Campbell et al systems is the use of a central receiver, an interconnecting transmission line and the requirement of a separate controller device for each product or appliance. Clearly, this approach solves the basic problem of multiple transmitters for multiple products or appliances, but the solution is both complex and expensive from the point of view of the consumer. A simpler, less expensive solution to the problem is needed.
SUMMARY OF THE INVENTION
It is therefore an object of the present invention to provide a single remote control transmitter which can operate any product or appliance with a remote control feature without modification or interconnection of the individual products or appliances.
It is another object of the invention to provide a simple an inexpensive control for a plurality of remotely controlled consumer products even though those proucts may be produced by different manufactures and respond to different transmission protocols.
The objects of the invention are accomplished by providing a reconfigurable remote control transmitter that has the ability to learn, store and repeat the remote control codes from any other infrared transmitter. The reconfigurable remote control transmitter includes an infrared receiver, a microprocessor, nonvolatile and scratch pad random access memories, and an infrared transmitter. The microprocessor application is divided into four main categories: learning, storing, retransmitting, and user interface. In the learning process, the reconfigurable remote control transmitter receives and decodes the transmissions from another remote control transmitter for, say, a television receiver. The process is repeated at least twice for each key to make sure that it has been properly received and decoded. Once the data has been received and decoded, it must be stored for later use; however, in order to do this, the received and decoded data must be compressed so that it can fit into the nonvolatile memory. This process is repeated for each of the several remote control transmitters that are to be replaced by the reconfigurable remote control transmitter. When the learning and storing operations have been completed, the reconfigurable remote control transmitter is ready to use.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, advantages and aspects of the invention will be better understood from the following detailed description of the invention with reference to the drawings, in which:
FIGS. 1a to 1i are graphical representations of several modulation schemes which are used in infrared remote control transmitters:
FIGS. 2a to 2d are graphical representations of several keyboard encoding schemes that may be used with the modulation schemes illustratted in FIGS. 1a to 1i;
FIG. 3 is a plan view of the reconfigurable remote control transmitter according to a preferred embodiment of the present invention;
FIGS. 4a-4d, aligned from left to right, constitute a block diagram designated FIG. 4 of the reconfigurable remote control transmitter according to a preferred embodiment of the invention;
FIGS. 5a and 5b are graphical and tabular representations of the data collection and initial data compression technique performed by the preferred embodiment shown in FIG. 4;
FIG. 6 is a tabular representation of the correlation process performed during the learning procedure;
FIG. 7 is a tabular representation of the process of removing repeats from the learned code in order to further compress the data for storing in the nonvolatile memory; and
FIG. 8 is a tabular representation of the compressed learned code.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
In order to understand the learning process, the available infrared codes to be learned must first be understood. This turns out to be a very wide range of different codes. FIG. 1 illustrates several modulation schemes. FIGS. 1a through 1g are different types of gated carrier frequency. Typical carrier frequencies for infrared remote transmitters are 20 KHz to 45 KHz, with the majority at 38 KHz and 40 KHz. The gating schemes illustrated include both fixed and variable bit periods, non-return to zero (NRZ), variable burst width, single/double burst modulation schemes, and a final catch-all category called random because there is no readily distinguishable pattern of ones and zeros. In addition to these schemes, there is also a transmitter which puts out a different continuous frequency (CW) for each key at approximately 300 Hz spacings as represented in FIG. 1h. Finally, several new types of transmitters do not use a carrier frequency at all but, instead, send a stream of pulses where the data is encoded in the spacing between infrared pulses as shown in FIG. 1i.
FIG. 1 shows the data modulation schemes, but most transmitters also have a higher level of data organization, which may be called a keyboard encoding scheme. This causes data to be sent in different formats depending on the transmitter and the key pressed. FIG. 2 shows several of these keyboard encoding schemes. FIG. 2b shows data that is sent once for each key press. FIG. 2c shows data that is repeated three times and then stopped for each key press. These schemes are used to conserve power and extend battery life. FIG. 2c also shows data that continues to repeat as long as the key is pressed. This is often used for continuous functions such as volume control or channel scanning. FIG. 2d shows a modification of the continuous repeat scheme shown in FIG. 2c where the initial key data is sent, followed by a series of "keep-alive" pulses as long as the key is pressed. This scheme is also used to conserve power and extend battery life. In addition to schemes 2b through 2d, some remote control transmitters preceed all transmitted key data witth some form or preamble data stream to get the receiver's attention. This is shown in FIG. 2a, but it will be understood that such preamble data stream can be used with each of the keyboard encoding schemes shown in FIG. 2.
Reference is now made to FIG. 3 which shows in plan view the reconfigurable remote control transmitter according to a preferred embodiment of the invention. The first thing to be observed is that this unit is not much more complicated than a single transmitter for a single product. This is accomplished by the use of a combination of hard keys and soft keys and an liquid crystal display (LCD) about which more will be said latter. Suffice it to say for now that hard keys are those which have a predefined function and soft keys are those which have a programmable function. The reconfigurable remote control transmitter shown in FIG. 3 is capable of emulating up to four different transmitters which are indicated in the liquid crystal display 10 adjacent the legend "SOURCE" as TV, VCR, CABLE, and AUX, the latter being for "auxiliary" which may be any fourth device such as, for example, a video disc player. The user selects the desired source by pressing the source key 12 each time a change in the source is desired which causes the individual legends TV, VCR, CABLE, and AUX to be successively displayed in accordance with the succession of source key depressions. When the legend for the desired source is displayed, the user simply proceeds to operate the selected source. There is also provided a learning switch (not shown) which may be provided in a protected location on the side or bottom of the transmitter case since this switch is used only once (typically) for each transmitter which is to be emulated. This switch might be located, for example, behind a slidable or pivotal cover 67 in order to prevent younger members of the family from operating it. In the learning mode, the switch is moved to the learning position and the transmitter which is to be emulated is placed so that its transmitter infrared light emitting diode (LED) is adjacent the photoelectric receiver in the reconfigurable remote control unit. The photoelectric receiver 14 might, for example, be located at the end opposite to the infrared LED transmitter 16 in the reconfigurable remote control transmitter as shown in FIG. 3. The source is selected by pressing the source key 12 as described above, and when the legend for the desired source is displayed, the user presses the entire key 78. The user is then prompted in the liquid crystal display 10 to press a key on the reconfigurable remote control transmitter and a corresponding key on the transmitter to be emulated so that the transmitted code can be received and encoded. As will be explained in further detail, this prompt is repeated at least twice for each key in order to insure that the transmitted signal has been properly received and encoded.
Turning now to FIG. 4, the receiver 14 for the reconfigurable remote control transmitter includes a photodiode 18 connected by a differentiating capacitor 20 to the variable input of threshold amplifier 22. The output of this amplifier 22 is a series of pulses having a frequency equal to the frequency of the transmitted signal. The output of amplifier 22 is connected to an input of the microprocessor 24 and also to a detector diode 26. The output of the detector diode 26 is integrated by capacitor 28 and supplied to the variable input of a second threshold amplifier 30. The output of this amplifier is the detected envelope of the transmitted signal and is supplied to another input of the microprocessor 24. Also supplied as inputs to the microprocessor 24 are the outputs of the push button keyboard 32 and the learn switch 34. The microprocessor 24 has its own internal clock which is controlled by a crystal 36. The microprocessor 24 provides addresses for the nonvolatile random access memory 38 and the scratch pad memory 40 to the address register 42 which comprises an 8-bit latch. The two memories are essentially the same except that the nonvolatile random access memory 38 is provided with a low voltage power supply 45, typically a lithium battery, in addition to being supplied from the main power supply in order to maintain the data stored in the memory even when the main battery supply is off or dead. The microprocessor 24 also provides the control signals to the LCD driver 46 which in turn controls the liquid crystal display 10. In addition, the microprocessor provides the drive signals for the infrared transmitter 16. In order to minimize battery drain, the several integrated circuits shown in FIG. 4 are made with CMOS (complementary metal oxide semiconductor) technology. For example, the microprocessor may be an Intel 87 C51 or a Mitsubishi 50741 microprocessor, and the memories may be Intel 2816 or Hitachi HM6116 random access memories.
The reconfigurable remote control in the learning process, must be able to receive, learn and repeat all of the schemes described with reference to FIGS. 1 and 2. In addition, in the learning process the reconfigurable remote control must read each code at least twice to make sure that it has been properly received and decoded. Small variations in the incoming code must be tolerated while large variations (errors) must be recognized and rejected. The process, according to a procedure entitled LEARN ONE KEY in the program for microcomputer 24, is illustrated with reference to FIGS. 5 and 6. Referring to FIG. 5a first, the modulation scheme represented by FIG. 1b is taken as exemplary. This modulation scheme uses a fixed bit time but the burst width is modulated. In other words, the time for a binary "1" is the same as the time for a binary "0" but, in the case illustrated, the number of pulses transmitted for a "1" is more than for a "0". The time period for a binary bit is nominally 1.85 milliseconds, the number of pulses for a binary "1" is nominally 37, and the number of pulses for a binary "0" is nominally 16. When the learn switch 34, shown in FIG. 4 is switched to the "learn" position, the liquid crystal display 10 flashes the letter "L" to constantly remind the user that the reconfigurable remote control transmitter is in the learn mode. The user is then prompted to press a key on the reconfigurable remote control transmitter and a corresponding key on the transmitter to be emulated in order to transmit a signal to be received and encoded. The first step in the receiving and encoding process is to count the number of pulses in each burst and the time period of each pause between pulses. This pulse count and pause duration data completely defines the incoming signal. From this data the frequency of the transmitted signal is computed by dividing the largest number of pulses in a single burst by its corresponding time duration. For example, in FIG. 5a the largest number of pulses is 38 and its time period is 0.95 milliseconds, resulting in a 40 kilohertz transmitting frequency. The reason for using the largest number of pulses and its time period is to obtain the most accurate determination of the frequency of the transmitted signal. This initial raw data consists of 100 states, each state being defined as two 16-bit numbers (between 1 and 65,535). The first 16-bit number represents the number of infrared pulses in the pulse train. The second 16-bit number represents the time interval that the infrared pulse train was off. An additional 16-bit number represents the frequency of the infrared pulse train (typically from 30 KHz to 100 KHz). This data requires about 3200 bits of data per key pressed.
The first compression of this data is made by categorizing the pulse bursts and pauses into "bins", each bin being two bytes with the most significant bit indicating whether the bin is a burst or a pause. As shown in FIG. 5a, four bins, identified as CATEGORIES in the program for microcomputer 24 of FIG. 4, are established for the illustrated example according to a procedure of the program procedure entitled CONVERT IR DATA TO CATEGORIES. These are labeled A, B, C, and D with A and C being designated as bins for bursts and B and D being designated as bins for pauses. It will of course be understood that more or fewer bins may be required depending on the modulation scheme which is being learned. In order to categorize the pulse bursts and pauses into the several bins, a tolerance is established so that all the bursts and pauses within a nominal range are appropriately categorized into one or another of the bins. This is indicated in FIG. 5b which shows lower, middle and upper values of the number of pulses in a burst and the duration of a pause. Those bursts or pauses not falling into one of these bins would be assigned to another bin established for that burst or pause. By creating these bins, the initial raw data or about 3200 bits is stored to 1600 bits per key and 16 bits per bin in the scratch pad memory 40 in FIG. 4. The user is then prompted in the liquid crystal display 10 to press the encoded key a second time and the process is repeated. Then correlation is performed on the encoded data for that key as illustrated by FIG. 6. Suppose that for key one, the two encoded data are the same as shown at the top of the figure. In this case, the key code sequence has been properly learned and can be further compressed for storage in the nonvolatile memory 38. On the other hand, assume that in the process of pressing key two for the second time, the user inadvertently moves the transmitter to be emulated and the reconfigurable remote control transmitter with respect to one other so that the encoding for the second key press is an error. In this case, the user will be prompted on the liquid crystal display 10 to press the key a third time. If the third encoding matches the first as illustrated in the figure, then the key code sequence is considered to be properly learned and can be further compressed for storage in the nonvolatile memory. A third possiblity is illustrated in FIG. 6 and this is the case where the initial encoding is in error. Under these circumstances, no successive encoding would ever match the first. What the correlation algorithm does in this case is if the third encoding does not match the first, then the fourth is compared with the third and so on until a match of alternate encodings is obtained.
When each key has been properly learned, the initially encoded data for each key must be further compressed to such an extent that the data for all four remote transmitters will fit into a 2K byte memory. This data compression must maintain all of the vital information so that the infrared signal can be accurately reconstructed during transmission. The first step is illustrated in FIG. 7 and as set out in a procedure entitled REMOVE REPEATS in the program for microcomputer 24 of FIG. 4, involves the removal of repeats from the key encoding. It will be recalled that some of the keyboard encoding schemes shown in FIGS. 2c and 2d involved repeated transmission patterns. As illustrated in FIG. 7, the first two bytes (each representing a different bin) are compared with the second two bytes, and if there is no match, then the first four bytes are compared with the next four bytes. Again, if there is no match, the first six bytes are compared with the next six bytes and so on increasing in two byte intervals until a total of half of the stored bytes are being compared with the other half of the stored bytes. If no match is obtained, then the process is repeated from the start but omitting the first two bytes and then the first four bytes. In the case illustrated in the figure, a repeating pattern of ten bytes is found after an initial four byte preamble. The number and pattern of the repeats are then encoded in a reduced format, as shown in FIG. 8. This reduces data to between 6 and 60 states per key, 96 to 960 bits of data per key. Once this has been accomplished, the encoding for all keys is examined in order to determine if there is a common preamble. If there is, this preamble is separately encoded and stripped from the encoding of all keys according to a procedure entitled REMOVE PREAMBLES in the program for microcomputer 24 of FIG. 4. This reduces data to (typically) 96 to 480 bits per key. Then the number of bins is represented by a smaller number of bits than the eight bits comprising each byte. For the case illustrated in FIG. 5, for example, the number of bits required to represent the four bits is only two. Typically, the 8-bit bin pointer or number is reduced to a 5-bit or less bin pointer depending on the number of bins required to encode the original data. This typically reduces data to 48 to 240 bits per key. In this way, data is reduced to a manageable storage size, and all of the compression data is also retained to allow re-expansion of the data to its uncompressed format for retransmission during emulation. More specifically, the compressed data comprises the bin code, the position of the start of any repeating patterns, the length of the repeating pattern, the number of repeats, and the frequency of the transmission. If there is a preamble, this is stored separately to be generated for each key pressed. This compressed data is then stored in the nonvolatile memory 38 of FIG. 4.
This completes the learning and storing processes which are common to all the keys on the transmitter to be emulated. Certain keys are common to most remote transmitters, and these keys are included on the reconfigurable remote control transmitter as shown in FIG. 3. For example, the upper part of the transmitter includes a power key 46, a mute key 48, a channel up key 50, a channel down key 52, a volume up key 54, and a volume down key 56. In addition, specific keys may be provided for a video cassette recorder such as a record key 58, a play key 60, a fast forward key 62, a rewind key 64, a stop key 66, and a pause or stop motion key 68. At the lower part of the transmitter there is the usual numerical keypad and enter key. Other keys shown may be assigned other predetermined functions. However, because the remote transmitters from different manufacturers vary widely, providing all the keys from even four different remote control transmitters on one unit would unduly complicate the reconfigurable remote control transmitter of the present invention and make operation confusing to the user. To avoid this, programmable or "soft" keys are provided which are controlled by means of the function key 70. These keys include an on/off key 72, an up key 74 and a down key 76. The function performed by these keys depends on the function selected by the function key 70. More particularly, when the function key is pressed, a sequence of functions is displayed by the liquid crystal display depending upon the source that has been selected. The desired function is selected by sequencing the function key until that function is displayed. Examples of specific functions which may be performed by the several sources are listed in the following tables.
______________________________________LCD - TV FUNCTIONS LCD - VCR FUNCTIONSClear Scr. SlowSound Cont. SlowVIR SearchChan Block SearchOff Timer Reverse PlaySound + Fast PlayCable Frame Advan.Audio Mode A ○Video Mode B ○Pict. Cont. CPict. Cont.Brightness LCD - CABLE FUNCTIONSBrightness TuningColor TuningTint ATint BTreble CTrebleBass LCD - AUX FUNCTIONSBass TBDBalance ABalance BSharpness CSharpnessHomenetA ○B ○C ○______________________________________
In FIG. 3, the function "Sharpness" has been selected for the source TV and the up and down arrows indicate that the up and down keys are to be used to control this function. It will be observed that each of the function tables include the functions "A", "B" and "C". These are for user defined functions for those situations that a transmitter to be emulated includes a function that is not previously stored in the reconfigurable remote control transmitter. In such a case, the user selects one of these functions and provides it with a label. This label is generated by either the + key or the - key to cycle through the alphabet. Once the correct letter is displayed, the user presses the enter key 72 to enter it and the display indexes over one character position where the process is repeated and so on until the complete label is generated. Thus, the liquid crystal display 10 and the keys of the reconfigurable remote control transmitter of the invention have been designed to provide a user friendly interface which is simple and easy to use no matter what combination of remote transmitters it is configured to emulate.
After the transmitter has been configured as desired by the user, it is ready to use. This requires that the transmitter recall, expand and transmit the required code. This is accomplished in accordance with procedures designated TRANSMIT ONE KEY, EXPAND ONE KEY and TRANSMIT EXPANDED CODE, respectively, in the program for microcomputer 24 of FIG. 4, by first determining which source has been chosen so that the correct block of data in the nonvolatile memory 38 is addressed. Then when a key is pressed, the entire block of data for that source is transferred to the scratch pad memory 40. If a preamble code exists, it is copied into a 200 byte array in memory 40. Next, the key code is copied into the 200 byte array after the preamble code. At the same time, the bit compressed codes for the preamble and the key code are expanded into byte codes. Then the start, length and repeat number values are added to the code for this key. All that remains is to generate the required carrier frequency. This is accomplished by software rather than provide individual carrier generators. In other words, the microprocessor uses its own clock and a divider process in order to generate the required frequency. Transmission of the expanded code is done by setting a pointer at the start of the 200 byte array and taking the 16-bit pulse count from the category indicated by the byte at the pointer. These pulses are transmitted at the carrier frequency for the pressed key. The 16-bit pause count from the category indicated by the byte at pointer +1 is then taken to determine the required length of time for the pause, and then the next pointer is taken and so on until the entire expanded code is transmitted.
Thus, there has been provided a reconfigurable remote control transmitter capable of emulating several remote control transmitters which is simple to use and requires no interconnection or modification of the products controlled. While a specific preferred embodiment has been described, those skilled in the art will recognize that the invention can be modified within the scope of the appended claims to provide for the control of more or less than four products or appliances which may or may not include video products. In addition, the specific data encoding and compression techniques may be modified to accommodate the data to the storage space available in the nonvolatile memory.
The program for the microprocessor written in a program design language (PDL) is set forth below. This program includes the detailed assembly instructions for generating the transmission frequencies. For a description of the program design language, the reader is referred to Van Leer, "Top Down Development Using a Program Design Language (PDL)", IBM Systems Journal, vol. 15, no. 3, pp. 155-170 (1976). ##SPC1## ##SPC2## ##SPC3## ##SPC4## ##SPC5## ##SPC6##
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US4703359 *Nov 20, 1985Oct 27, 1987Nap Consumer Electronics Corp.Universal remote control unit with model identification capability
US4712105 *Apr 30, 1985Dec 8, 1987U.S. Philips CorporationRemote control hand apparatus for operating different modules
US4769643 *Dec 15, 1986Sep 6, 1988General Electric CompanyTransmitter driver for programmable remote control transmitter
US4771283 *Jan 16, 1986Sep 13, 1988Alpine Electronics Inc.Remote control device
US4774511 *May 30, 1985Sep 27, 1988Nap Consumer Electronics Corp.Universal remote control unit
US4796107 *Sep 8, 1986Jan 3, 1989Sony CorporationApparatus for reserving programs at various recording tape running speeds
US4802114 *Dec 15, 1986Jan 31, 1989General Electric CompanyProgrammable remote control transmitter
US4807052 *Oct 5, 1987Feb 21, 1989Sony CorporationRemotely controllable electronic apparatus
US4825200 *Jun 25, 1987Apr 25, 1989Tandy CorporationReconfigurable remote control transmitter
US4856081 *Dec 9, 1987Aug 8, 1989North American Philips Consumer Electronics Corp.Reconfigurable remote control apparatus and method of using the same
US4857898 *Dec 9, 1987Aug 15, 1989North American Philips Consumer Electronics Corp.Data compression technique for reconfigurable remote control apparatus
US4866434 *Dec 22, 1988Sep 12, 1989Thomson Consumer Electronics, Inc.Multi-brand universal remote control
US4905279 *Dec 1, 1988Feb 27, 1990Nec Home Electronics Ltd.Learning-functionalized remote control receiver
US4910510 *Jan 2, 1987Mar 20, 1990Motorola, Inc.System for off-the-air reprogramming of communication receivers
US4912524 *Nov 30, 1987Mar 27, 1990Hitachi, Ltd.Digital signal transmission system having conversion means for reducing the light emission time of a light emitting diode
US4914428 *May 28, 1987Apr 3, 1990Mitsubishi Denki KaushikiDigital remote control transmission apparatus
US4918439 *Oct 5, 1988Apr 17, 1990Cl 9, Inc.Remote control device
US4953132 *Aug 25, 1988Aug 28, 1990Pioneer Electronic CorporationMemory circuit for and method of protecting memory data integrity during an output operation utilizing memory data
US4959810 *Dec 2, 1987Sep 25, 1990Universal Electronics, Inc.Universal remote control device
US4992784 *Nov 8, 1988Feb 12, 1991Preh, Elektrofeinmechanische WerkeRemote control set
US5031178 *Oct 12, 1988Jul 9, 1991American Standard Inc.Apparatus and method for ground isolated system diagnostics
US5043723 *Jan 26, 1990Aug 27, 1991Sharp Kabushiki KaishaMemory remote control device
US5065235 *Feb 12, 1990Nov 12, 1991Pioneer Electronic CorporationCATV terminal unit including memory for storing remote control codes relating to an external apparatus
US5081534 *Aug 4, 1989Jan 14, 1992Deutsche Thomson Brandt GmbhTelevision receiver with remote control system capable of controlling associated peripheral devices manufactured by different companies
US5086298 *Apr 20, 1990Feb 4, 1992Pioneer Electronic CorporationRemote control signal processing device
US5099233 *Feb 12, 1990Mar 24, 1992Thomson Consumer Electronics, Inc.Apparatus and method for addressing memory
US5113294 *Aug 21, 1989May 12, 1992Samsung Electronics Co., Ltd.Automatic control method for home appliances using video tape recorder, and device thereof
US5142398 *Jul 11, 1989Aug 25, 1992Tandy CorporationTimer system for learning and replaying of infrared signals
US5148159 *Apr 26, 1989Sep 15, 1992Stanley ElectronicsRemote control system with teach/learn setting of identification code
US5189517 *Aug 29, 1988Feb 23, 1993John OharaRemote unit for controlling the operation of a television receiver
US5194978 *Nov 18, 1991Mar 16, 1993Tandy CorporationTimer system for learning and replaying of infrared signals
US5235328 *Feb 28, 1991Aug 10, 1993Sony CorporationRemote command apparatus
US5237319 *Aug 19, 1991Aug 17, 1993Pioneer Electronic CorporationRemote control device with learning function
US5239540 *Nov 27, 1990Aug 24, 1993Scientific-Atlanta, Inc.Method and apparatus for transmitting, receiving and communicating digital data signals with corresponding program data signals which describe the digital data signals
US5243430 *Jul 24, 1991Sep 7, 1993Mitsubishi Electronics America, Inc.Remote control apparatus and method for omnidirectional signal transmission
US5255313 *Apr 8, 1993Oct 19, 1993Universal Electronics Inc.Universal remote control system
US5276692 *Sep 5, 1991Jan 4, 1994Samsung Electronics Co., Ltd.Self-testing and mutual testing of multifunctional remote control transmitters
US5282028 *Jan 8, 1992Jan 25, 1994Scientific-Atlanta, Inc.Remote control for digital music terminal with synchronized communications
US5301028 *Nov 29, 1991Apr 5, 1994Scientific-Atlanta, Inc.Method and apparatus for displaying channel identification information
US5313199 *Oct 16, 1991May 17, 1994Samsung Electronics Co., Ltd.Method for detecting and correcting pulse noise in multifunctional remote control transmitter
US5341166 *Feb 27, 1992Aug 23, 1994Video Control Technology, Inc.System for controlling selected devices having unique sets of control codes
US5379453 *Jan 18, 1994Jan 3, 1995Colorado Meadowlark CorporationRemote control system
US5408044 *Jan 12, 1993Apr 18, 1995Marvin SandlerTelevision remote control adaptor
US5414426 *Dec 11, 1992May 9, 1995Universal Electronics Inc.Favorite key macro command and chained macro command in a remote control
US5414761 *Oct 8, 1993May 9, 1995Universal Electronics Inc.Remote control system
US5416535 *Jan 21, 1994May 16, 1995Sony CorporationRemote control system and control method
US5442340 *Apr 30, 1993Aug 15, 1995Prince CorporationTrainable RF transmitter including attenuation control
US5455570 *Oct 7, 1994Oct 3, 1995Cook; Alex M.Methods and apparatus for communication program data signals via a remote control unit
US5455716 *Dec 10, 1992Oct 3, 1995Prince CorporationVehicle mirror with electrical accessories
US5457478 *May 24, 1994Oct 10, 1995Firstperson, Inc.Control device
US5475382 *Jun 22, 1994Dec 12, 1995Gemstar Development CorporationRemote control mounting stand
US5477262 *Nov 29, 1991Dec 19, 1995Scientific-Altanta, Inc.Method and apparatus for providing an on-screen user interface for a subscription television terminal
US5479155 *Jun 21, 1994Dec 26, 1995Prince CorporationVehicle accessory trainable transmitter
US5481252 *May 4, 1994Jan 2, 1996Samsung Electronics Co., Ltd.Mode conversion method for multifunctional programmable remote controller
US5552917 *Sep 29, 1994Sep 3, 1996Universal Electronics Inc.Remote control
US5553123 *Jun 9, 1994Sep 3, 1996Gemstar Development CorporationMethod for downloading setup data via telephone to an appliance controller
US5559550 *Apr 13, 1995Sep 24, 1996Gemstar Development CorporationApparatus and methods for synchronizing a clock to a network clock
US5574585 *Jun 28, 1995Nov 12, 1996Feller AgTransmission method and apparatus for an infrared remote control system
US5583485 *Jun 5, 1995Dec 10, 1996Prince CorporationTrainable transmitter and receiver
US5600711 *May 3, 1994Feb 4, 1997Yuen; Henry C.Apparatus and methods for providing initializing settings to an appliance
US5614885 *Aug 14, 1990Mar 25, 1997Prince CorporationElectrical control system for vehicle options
US5614891 *Jun 2, 1995Mar 25, 1997Prince CorporationVehicle accessory trainable transmitter
US5619190 *Apr 21, 1995Apr 8, 1997Prince CorporationTrainable transmitter with interrupt signal generator
US5627529 *Mar 11, 1994May 6, 1997Prince CorporationVehicle control system with trainable transceiver
US5635913 *Jan 19, 1996Jun 3, 1997The Chamberlain Group, Inc.Remote actuating apparatus with long and short operating codes
US5646701 *Apr 21, 1995Jul 8, 1997Prince CorporationTrainable transmitter with transmit/receive switch
US5661455 *Jan 31, 1995Aug 26, 1997Prince CorporationElectrical control system for vehicle options
US5661804 *Jun 27, 1995Aug 26, 1997Prince CorporationTrainable transceiver capable of learning variable codes
US5670958 *Nov 28, 1995Sep 23, 1997Deutsche Thomson Brandt GmbhRemote control method and device
US5675575 *Apr 14, 1995Oct 7, 1997Scientific-Atlanta, Inc.Method and apparatus for communicating different types of data in a data stream
US5682456 *May 25, 1995Oct 28, 1997Funai Electric Co., Ltd.VCR operating apparatus having multi-function keypad enabling
US5686887 *Dec 7, 1994Nov 11, 1997Schoeferisch Aeusserung AnstaltElectronic locating device
US5686903 *May 19, 1995Nov 11, 1997Prince CorporationTrainable RF transceiver
US5689353 *Sep 3, 1996Nov 18, 1997Universal Electronics Inc.Remote control with two-way data coupling
US5691710 *Nov 2, 1992Nov 25, 1997Zenith Electronics CorporationSelf learning IR remote control transmitter
US5691848 *Jan 31, 1995Nov 25, 1997Prince CorporationElectrical control system for vehicle options
US5699044 *Jan 31, 1995Dec 16, 1997Prince CorporationElectrical control system for vehicle options
US5699054 *May 19, 1995Dec 16, 1997Prince CorporationTrainable transceiver including a dynamically tunable antenna
US5699055 *May 19, 1995Dec 16, 1997Prince CorporationTrainable transceiver and method for learning an activation signal that remotely actuates a device
US5708415 *Nov 14, 1996Jan 13, 1998Prince CorporationElectrical control system for vehicle options
US5778077 *Sep 10, 1996Jul 7, 1998Davidson; Dennis M.Automatic volume adjusting device and method
US5793300 *Jun 5, 1995Aug 11, 1998Prince CorporationTrainable RF receiver for remotely controlling household appliances
US5854593 *Jul 26, 1996Dec 29, 1998Prince CorporationFast scan trainable transmitter
US5872513 *Apr 24, 1996Feb 16, 1999The Chamberlain Group, Inc.Garage door opener and wireless keypad transmitter with temporary password feature
US5886847 *Jul 31, 1996Mar 23, 1999Goldstar Co., Ltd.Apparatus and method for automatically performing channel change of television receiver using video cassette recorder
US5903226 *Jan 3, 1995May 11, 1999Prince CorporationTrainable RF system for remotely controlling household appliances
US5949349 *Feb 19, 1997Sep 7, 1999The Chamberlain Group, Inc.Code responsive radio receiver capable of operation with plural types of code transmitters
US5953144 *Jun 16, 1997Sep 14, 1999Universal Electronics Inc.Upgradeable remote control device
US5970206 *Apr 11, 1997Oct 19, 1999Gemstar Development CorporationTelevision calendar and method for creating same
US5974222 *Apr 28, 1997Oct 26, 1999Gemstar Development CorporationApparatus and method using compressed codes for scheduling broadcast information recording
US6005486 *Sep 21, 1998Dec 21, 1999Hill-Rom, Inc.Television control system for universal control of hospital televisions
US6008736 *May 9, 1997Dec 28, 1999Hill-Rom, Inc.Television control system for universal control of hospital televisions
US6014092 *Dec 11, 1992Jan 11, 2000Universal Electronics Inc.Key mover
US6021319 *Nov 14, 1994Feb 1, 2000Colorado Meadowlark CorporationRemote control system
US6025785 *Apr 24, 1996Feb 15, 2000The Chamberlain Group, Inc.Multiple code formats in a single garage door opener including at least one fixed code format and at least one rolling code format
US6049652 *Mar 15, 1995Apr 11, 2000Gemstar Development CorporationApparatus and method using compressed codes for recorder preprogramming
US6055244 *May 24, 1995Apr 25, 2000Scientific-Atlanta, Inc.Method and apparatus for communicating different types of data in a data stream
US6091882 *Aug 1, 1994Jul 18, 2000Gemstar Development CorporationApparatus and method using compressed codes for recorder preprogramming
US6107951 *Jan 15, 1998Aug 22, 2000Sony CorporationRemote control signal transmission device
US6124804 *Nov 7, 1995Sep 26, 2000Matsushita Electric Industrial Co., Ltd.Remote controller, remote control interface, and remote control system including a remote controller and a remote control interface
US6130625 *Jan 24, 1997Oct 10, 2000Chambord Technologies, Inc.Universal remote control with incoming signal identification
US6130726 *May 15, 1998Oct 10, 2000Evolve Products, Inc.Program guide on a remote control display
US6154544 *Jun 11, 1997Nov 28, 2000The Chamberlain Group, Inc.Rolling code security system
US6160491 *Sep 9, 1998Dec 12, 2000Matsushita Electric Industrial Co., Ltd.Remote controller, remote control interface, and remote control system including a remote controller and a remote control interface
US6175312Dec 4, 1992Jan 16, 2001Microchip Technology IncorporatedEncoder and decoder microchips and remote control devices for secure unidirectional communication
US6181255Aug 8, 1997Jan 30, 2001The Chamberlain Group, Inc.Multi-frequency radio frequency transmitter with code learning capability
US6188889 *Sep 15, 1998Feb 13, 2001Shyi-Tong TsaiRadio transmitter with learning function, and the related control method
US6195033Sep 29, 1999Feb 27, 2001Universal Electronics Inc.Key mover
US6204796 *Mar 9, 1998Mar 20, 2001Gemstar Development CorporationApparatus and methods for generating codes for controlling appliances from a remote controller
US6239718 *Feb 23, 1996May 29, 2001Kabushiki Kaisha KenwoodLearning-by-example programmable remote control system
US6249673Nov 9, 1998Jun 19, 2001Philip Y. W. TsuiUniversal transmitter
US6292230 *Aug 4, 1999Sep 18, 2001Thomson Licensing S.A.Signal distribution apparatus with learning function
US6415094Mar 15, 1999Jul 2, 2002Charles H. WissmanMethod and apparatus for extending the recording time of a remotely controllable electronic device using a hand-held autonomous remote control
US6430359 *May 22, 1995Aug 6, 2002Gemstar Development CorporationApparatus and method using compressed codes for television program record scheduling
US6496135Jun 1, 2001Dec 17, 2002Universal Electronics Inc.Remote control with LED capabilities
US6549143Dec 22, 1999Apr 15, 2003Thomson Licensing, S.A.Universal remote control method and apparatus
US6549719Apr 30, 2001Apr 15, 2003Gemstar Development CorporationTelevision program record scheduling and satellite receiver control using compressed codes
US6556813Jun 19, 2001Apr 29, 2003Philip Y.W. TsuiUniversal transmitter
US6567011Oct 14, 1999May 20, 2003Universal Electronics Inc.Media system and remote control for same
US6587067Feb 23, 2001Jul 1, 2003Universal Electronics Inc.Universal remote control with macro command capabilities
US6590505 *May 15, 2000Jul 8, 2003Matsushita Electric Industrial Co., Ltd.Remote control system
US6650248Dec 22, 1999Nov 18, 2003Thomson Licensing, S.A.Programming a universal remote control device
US6690290Mar 26, 2003Feb 10, 2004Universal Electronics Inc.Media system and remote control for the same
US6690392Jul 15, 1999Feb 10, 2004Gateway, Inc.Method system software and signal for automatic generation of macro commands
US6690796Jan 21, 2000Feb 10, 2004The Chamberlain Group, Inc.Rolling code security system
US6747591Jun 20, 2002Jun 8, 2004Universal Electronics Inc.System and method for retrieving information while commanding operation of an appliance
US6829779 *Sep 16, 1998Dec 7, 2004Webtv Networks, Inc.User interface for entertainment system setup
US6909378Nov 22, 2000Jun 21, 2005Koninklije Philips Electronics N.V.Method and system for upgrading a universal remote control
US6980655Oct 17, 2001Dec 27, 2005The Chamberlain Group, Inc.Rolling code security system
US6998997 *May 30, 2002Feb 14, 2006X10 Wireless Technology, Inc.System and method for learning macro routines in a remote control
US7005979Jun 25, 2003Feb 28, 2006Universal Electronics Inc.System and method for monitoring remote control transmissions
US7006802Jan 15, 2002Feb 28, 2006Tsui Philip Y WUniversal transmitter
US7039397Jul 30, 2003May 2, 2006Lear CorporationUser-assisted programmable appliance control
US7046161Mar 12, 2003May 16, 2006Universal Electronics Inc.System and method for automatically setting up a universal remote control
US7050794Sep 11, 2003May 23, 2006Lear CorporationUser-assisted programmable appliance control
US7068181Jul 30, 2003Jun 27, 2006Lear CorporationProgrammable appliance remote control
US7084781Jul 30, 2003Aug 1, 2006Lear CorporationProgrammable vehicle-based appliance remote control
US7088218Jul 30, 2003Aug 8, 2006Lear CorporationWireless appliance activation transceiver
US7088265Jun 23, 2004Aug 8, 2006Gallen Ka Leung TsuiSystems and methods for proximity control of a barrier
US7093003May 20, 2002Aug 15, 2006Universal Electronics Inc.System and method for upgrading the remote control functionality of a device
US7116242Nov 27, 2002Oct 3, 2006Lear CorporationProgrammable transmitter and receiver including digital radio frequency memory
US7120430Jul 30, 2003Oct 10, 2006Lear CorporationProgrammable interoperable appliance remote control
US7135957Oct 21, 2005Nov 14, 2006Lear CorporationUniversal garage door operating system and method
US7155305Jan 31, 2005Dec 26, 2006Universal Electronics Inc.System and methods for home appliance identification and control in a networked environment
US7161466Jul 30, 2003Jan 9, 2007Lear CorporationRemote control automatic appliance activation
US7167076Dec 19, 2001Jan 23, 2007Lear CorporationUniversal garage door operating system and method
US7170426Mar 18, 2005Jan 30, 2007Gallen Ka Leung TsuiSystems and methods for proximity control of a barrier
US7183940Jul 30, 2003Feb 27, 2007Lear CorporationRadio relay appliance activation
US7183941Jul 30, 2003Feb 27, 2007Lear CorporationBus-based appliance remote control
US7205908Sep 16, 2004Apr 17, 2007Gallen Ka Leung TsuiSystems and methods for proximity control of a barrier
US7239798Dec 16, 2003Jul 3, 2007Gemstar Development CorporationApparatus and method using compressed codes for scheduling broadcast information recording
US7254182Jul 9, 2002Aug 7, 2007Tsui Philip Y WTransmitter for operating multiple devices
US7259710Aug 7, 2003Aug 21, 2007Canon Information Systems Research Australia Pty LtdUser input device
US7269416Jul 30, 2003Sep 11, 2007Lear CorporationUniversal vehicle based garage door opener control system and method
US7319426Jun 16, 2005Jan 15, 2008Universal ElectronicsControlling device with illuminated user interface
US7331857Nov 2, 2005Feb 19, 2008Mattel, Inc.Gaming system
US7379778Jul 24, 2006May 27, 2008Universal Electronics, Inc.System and methods for home appliance identification and control in a networked environment
US7412056Sep 29, 2003Aug 12, 2008The Chamberlain Group, Inc.Rolling code security system
US7412653Nov 6, 2003Aug 12, 2008Universal Electronics, Inc.Remote control having a display with multi-function EL segments
US7432916Nov 30, 2005Oct 7, 2008Universal Electronics, Inc.Controlling device with dual-mode, touch-sensitive display
US7436345Aug 27, 2004Oct 14, 2008Zilog, Inc.Script instruction for jumping to a location, interpreting a predetermined number of instructions and then jumping back
US7447498Mar 7, 2006Nov 4, 2008Lear CorporationUser-assisted programmable appliance control
US7463164Feb 5, 2005Dec 9, 2008Williams Don PMethod and apparatus for remote control of electronic equipment
US7489922Mar 6, 2006Feb 10, 2009Lear CorporationUser-assisted programmable appliance control
US7492898Jul 2, 2004Feb 17, 2009The Chamberlain Group, Inc.Rolling code security system
US7492905Aug 14, 2002Feb 17, 2009The Chamberlain Group, Inc.Rolling code security system
US7493085Jul 10, 2006Feb 17, 2009Sony CorporationRemote control transmitter apparatus
US7589613Apr 3, 2006Sep 15, 2009Lear CorporationTrinary to trinary rolling code generation method and system
US7590999Jul 16, 2004Sep 15, 2009Microsoft CorporationSystem and method for recording a signal using a central point of control
US7593358Feb 25, 2005Sep 22, 2009Stmicroelectronics S.R.L.Transmission device for remote control systems
US7623663Dec 21, 2005Nov 24, 2009The Chamberlain Group, Inc.Rolling code security system
US7653212May 19, 2006Jan 26, 2010Universal Electronics Inc.System and method for using image data in connection with configuring a universal controlling device
US7673322Feb 7, 2005Mar 2, 2010Microsoft CorporationSystem and method for recording a signal using a central point of control
US7760071Sep 18, 2006Jul 20, 2010Lear CorporationAppliance remote control having separated user control and transmitter modules remotely located from and directly connected to one another
US7782309Apr 16, 2008Aug 24, 2010Universal Electronics Inc.Controlling device with dual-mode, touch-sensitive display
US7783676Jun 28, 2007Aug 24, 2010Universal Electronics Inc.System and method for using image data in connection with configuring a universal controlling device
US7812739May 3, 2006Oct 12, 2010Lear CorporationProgrammable appliance remote control
US7855633Aug 22, 2006Dec 21, 2010Lear CorporationRemote control automatic appliance activation
US7872642Aug 20, 2004Jan 18, 2011Universal Electronics Inc.Controlling device having multiple user interfaces
US7876255Sep 19, 2003Jan 25, 2011Universal Electronics Inc.Controlling device using visual cues to indicate appliance and function key relationships
US7877705Aug 1, 2007Jan 25, 2011Universal Electronics Inc.System and methods for interacting with a control environment
US7884700 *Jan 12, 2007Feb 8, 2011Funai Electric Co., Ltd.Composite electronic apparatus
US7895301Oct 22, 2007Feb 22, 2011Uei Cayman Inc.Transmitting a codeset over a single-wire bus from a computer to a remote control device
US7936287May 3, 2011Uei Cayman Inc.Interactive web-based codeset selection and development tool
US7973647 *Aug 24, 2006Jul 5, 2011Elbex Video Ltd.Method and apparatus for remotely operating appliances from video interphones or shopping terminals
US7999794Oct 7, 2010Aug 16, 2011Universal Electronics Inc.Controlling device with dual-mode, touch-sensitive display
US8049655Dec 7, 2010Nov 1, 2011Universal Electronics Inc.Controlling device using visual cues to indicate appliance and function key relationships
US8094875Apr 18, 2008Jan 10, 2012Uei Cayman Inc.Performing optical recognition on a picture of a remote to identify an associated codeset
US8094880Dec 28, 2010Jan 10, 2012Universal Electronics Inc.System and method for using image data in connection with configuring a universal controlling device
US8149218Dec 21, 2004Apr 3, 2012Universal Electronics, Inc.Controlling device with selectively illuminated user interfaces
US8154381Dec 31, 2007Apr 10, 2012Universal Electronics Inc.System and method for interactive appliance control
US8164567Dec 8, 2011Apr 24, 2012Creative Kingdoms, LlcMotion-sensitive game controller with optional display screen
US8166558Mar 23, 2007Apr 24, 2012Universal Electronics Inc.System and method for upgrading the functionality of a controlling device in a secure manner
US8169406Sep 13, 2011May 1, 2012Creative Kingdoms, LlcMotion-sensitive wand controller for a game
US8181259May 15, 2012Universal Electronics Inc.System and method for upgrading the functionality of a controlling device via a secure portable adapter device
US8184097Dec 6, 2011May 22, 2012Creative Kingdoms, LlcInteractive gaming system and method using motion-sensitive input device
US8194856Jul 22, 2008Jun 5, 2012The Chamberlain Group, Inc.Rolling code security system
US8226493Mar 4, 2010Jul 24, 2012Creative Kingdoms, LlcInteractive play devices for water play attractions
US8233625Jul 22, 2008Jul 31, 2012The Chamberlain Group, Inc.Rolling code security system
US8233773May 29, 2007Jul 31, 2012United Video Properties, Inc.Apparatus and method using compressed codes for scheduling broadcast information recording
US8248367Apr 20, 2012Aug 21, 2012Creative Kingdoms, LlcWireless gaming system combining both physical and virtual play elements
US8250608Mar 26, 2010Aug 21, 2012Universal Electronics, Inc.System and method for adaptively controlling the recording of program material using a program guide
US8253532Oct 27, 2003Aug 28, 2012Universal Electronics Inc.Controlling device having a device mode state toggle feature
US8254352Aug 28, 2012Universal Electronics Inc.System and method for configuration of network-capable appliances
US8255968Sep 13, 2004Aug 28, 2012Universal Electronics, Inc.System and method for adaptively controlling the recording of program material using a program guide
US8266667May 5, 2009Sep 11, 2012Logitech Europe S.A.Systems and methods for awarding affinity points based upon remote control usage
US8277297Nov 2, 2005Oct 2, 2012Mattel, Inc.Gaming system
US8284021Jul 22, 2008Oct 9, 2012The Chamberlain Group, Inc.Rolling code security system
US8325008Apr 25, 2001Dec 4, 2012The Chamberlain Group, Inc.Simplified method and apparatus for programming a universal transmitter
US8330582Aug 20, 2007Dec 11, 2012Logitech Europe S.A.Online remote control configuration system
US8368648May 18, 2012Feb 5, 2013Creative Kingdoms, LlcPortable interactive toy with radio frequency tracking device
US8373659Apr 30, 2012Feb 12, 2013Creative Kingdoms, LlcWirelessly-powered toy for gaming
US8382567Aug 8, 2005Feb 26, 2013Mattel, Inc.Interactive DVD gaming systems
US8384668Aug 17, 2012Feb 26, 2013Creative Kingdoms, LlcPortable gaming device and gaming system combining both physical and virtual play elements
US8385304Apr 5, 2012Feb 26, 2013Universal Electronics Inc.System and method for configuration of network-capable appliances
US8438503Sep 2, 2009May 7, 2013Universal Electronics Inc.System and method for enhanced command input
US8447841Sep 15, 2010May 21, 2013Universal Electronics Inc.System and method for upgrading the remote control functionality of a device
US8475275May 11, 2012Jul 2, 2013Creative Kingdoms, LlcInteractive toys and games connecting physical and virtual play environments
US8491389Feb 28, 2011Jul 23, 2013Creative Kingdoms, Llc.Motion-sensitive input device and interactive gaming system
US8508401Aug 31, 2010Aug 13, 2013Logitech Europe S.A.Delay fixing for command codes in a remote control system
US8509400Apr 20, 2006Aug 13, 2013Logitech Europe S.A.System and method for adaptive programming of a remote control
US8531050Nov 2, 2012Sep 10, 2013Creative Kingdoms, LlcWirelessly powered gaming device
US8531276Apr 25, 2006Sep 10, 2013Logitech Europe S.A.State-based remote control system
US8552832Apr 9, 2012Oct 8, 2013Universal Electronics Inc.System and method for interactive appliance control
US8606950May 31, 2006Dec 10, 2013Logitech Europe S.A.System and method for transparently processing multimedia data
US8608535Jul 18, 2005Dec 17, 2013Mq Gaming, LlcSystems and methods for providing an interactive game
US8610547Nov 30, 2012Dec 17, 2013The Chamberlain Group, Inc.Simplified method and apparatus for programming a universal transmitter
US8633797Sep 26, 2012Jan 21, 2014The Chamberlain Group, Inc.Rolling code security system
US8646019Sep 10, 2012Feb 4, 2014Logitech Europe S.A.Systems and methods for awarding affinity points based upon remote control usage
US8653950Feb 14, 2011Feb 18, 2014Logitech Europe S.A.State-based remote control system
US8674814Aug 20, 2007Mar 18, 2014Logitech Europe S.A.State-based remote control system
US8674815Aug 6, 2012Mar 18, 2014Logitech Europe S.A.Configuration method for a remote
US8686579Sep 6, 2013Apr 1, 2014Creative Kingdoms, LlcDual-range wireless controller
US8702515Apr 5, 2012Apr 22, 2014Mq Gaming, LlcMulti-platform gaming system using RFID-tagged toys
US8704643Sep 26, 2008Apr 22, 2014Logitech Europe S.A.Convenient and easy to use button layout for a remote control
US8708821Dec 13, 2010Apr 29, 2014Creative Kingdoms, LlcSystems and methods for providing interactive game play
US8711094Feb 25, 2013Apr 29, 2014Creative Kingdoms, LlcPortable gaming device and gaming system combining both physical and virtual play elements
US8742905Sep 28, 2007Jun 3, 2014Logitech Europe S.A.Easy to use and intuitive user interface for a remote control
US8753165Jan 16, 2009Jun 17, 2014Mq Gaming, LlcWireless toy systems and methods for interactive entertainment
US8758136Mar 18, 2013Jun 24, 2014Mq Gaming, LlcMulti-platform gaming systems and methods
US8776120 *Mar 4, 2010Jul 8, 2014Samsung Electronics Co., Ltd.Remote controller with multimedia content display and control method thereof
US8790180Feb 1, 2013Jul 29, 2014Creative Kingdoms, LlcInteractive game and associated wireless toy
US8797149Apr 23, 2012Aug 5, 2014Logitech Europe S.A.State-based control systems and methods
US8814688Mar 13, 2013Aug 26, 2014Creative Kingdoms, LlcCustomizable toy for playing a wireless interactive game having both physical and virtual elements
US8827810Aug 12, 2011Sep 9, 2014Mq Gaming, LlcMethods for providing interactive entertainment
US8854192May 9, 2011Oct 7, 2014Logitech Europe S.A.Configuration method for a remote
US8854245 *Jul 25, 2006Oct 7, 2014Universal Electronics Inc.System and method for using an universal remote control to access extended operational functions of a device
US8888576Dec 21, 2012Nov 18, 2014Mq Gaming, LlcMulti-media interactive play system
US8896426Feb 9, 2007Nov 25, 2014Uei Cayman Inc.Graphical user interface for programming universal remote control devices
US8909739Apr 19, 2006Dec 9, 2014Universal Electronics Inc.System and method for upgrading the remote control functionality of a device
US8913011Mar 11, 2014Dec 16, 2014Creative Kingdoms, LlcWireless entertainment device, system, and method
US8915785Jul 18, 2014Dec 23, 2014Creative Kingdoms, LlcInteractive entertainment system
US8952840Apr 22, 2008Feb 10, 2015Ixys Ch GmbhLoading a machine code API onto an 8-bit virtual machine to enable new functionality
US8961260Mar 26, 2014Feb 24, 2015Mq Gaming, LlcToy incorporating RFID tracking device
US8961312Apr 23, 2014Feb 24, 2015Creative Kingdoms, LlcMotion-sensitive controller and associated gaming applications
US8995981Jul 29, 2011Mar 31, 2015Csr Technology Inc.Systems and methods for remote control adaptive configuration
US8997020Jul 31, 2007Mar 31, 2015Universal Electronics Inc.System and methods for interacting with a control environment
US9020968Aug 16, 2010Apr 28, 2015Universal Electronics Inc.System and method for using image data in connection with configuring a universal controlling device
US9024733 *Nov 27, 2006May 5, 2015Koninklijke Philips N.V.Programming of a universal remote control device
US9039533Aug 20, 2014May 26, 2015Creative Kingdoms, LlcWireless interactive game having both physical and virtual elements
US9050526Oct 1, 2012Jun 9, 2015Mattel, Inc.Gaming system
US9066041Mar 13, 2013Jun 23, 2015Universal Electronics Inc.System and method for retrieving information while commanding operation of an appliance
US9086739May 6, 2013Jul 21, 2015Universal Electronics Inc.System and method for enhanced command input
US9088748Jul 11, 2005Jul 21, 2015Universal Electronics Inc.System for providing electronic media and commands via remote control and docking station
US9134815May 6, 2013Sep 15, 2015Universal Electronics Inc.System and method for enhanced command input
US20020053086 *Dec 19, 2001May 2, 2002Hill-Rom, Inc.Television control system for universal control of hospital televisions
US20020137479 *Jan 15, 2002Sep 26, 2002Tsui Philip Y.W.Universal transmitter
US20040075642 *Aug 7, 2003Apr 22, 2004Canon Information Systems Research Aust. Pty LtdUser input device
US20040207535 *May 30, 2002Oct 21, 2004Stevenson George E.System and method for learning macro routines in a remote control
US20040210933 *Dec 30, 2003Oct 21, 2004Universal Electronics Inc.User interface for a remote control application
US20040216172 *May 25, 2004Oct 28, 2004Perlman Stephen G.User interface for entertainment system setup
US20040261134 *Jul 16, 2004Dec 23, 2004Microsoft CorporationSystem and method for recording a signal using a central point of control
US20040263349 *Jun 25, 2003Dec 30, 2004Universal Electronics Inc.System and method for monitoring remote control transmissions
US20050008333 *Dec 16, 2003Jan 13, 2005Yuen Henry C.Apparatus and method using compressed codes for scheduling broadcast information recording
US20050014563 *Mar 12, 2004Jan 20, 2005Darin BarriInteractive DVD gaming system
US20050024185 *Jul 30, 2003Feb 3, 2005Lear CorporationRemote control automatic appliance activation
US20050024229 *Jul 30, 2003Feb 3, 2005Lear CorporationProgrammable appliance remote control
US20050055716 *Sep 13, 2004Mar 10, 2005Universal Electronics Inc.System and method for adaptively controlling the recording of program material using a program guide
US20050062636 *Sep 19, 2003Mar 24, 2005Universal Electronics Inc.Controlling device using visual cues to indicate appliance and function key relationships
US20050088315 *Oct 27, 2003Apr 28, 2005Universal Electronics Inc.Controlling device having a device mode state toggle feature
US20050116930 *Nov 6, 2003Jun 2, 2005Universal Electronics Inc.Remote control having a display with multi-function EL segments
US20050132409 *Feb 7, 2005Jun 16, 2005Microsoft CorporationSystem and method for recording a signal using a central point of control
US20050132410 *Feb 7, 2005Jun 16, 2005Microsoft CorporationSystem and method for recording a signal using a central point of control
US20050134578 *Dec 29, 2004Jun 23, 2005Universal Electronics Inc.System and methods for interacting with a control environment
US20050159823 *Jan 31, 2005Jul 21, 2005Universal Electronics Inc.System and methods for home appliance identification and control in a networked environment
US20050179558 *Feb 5, 2005Aug 18, 2005Williams Don P.Method and apparatus for remote control of electronic equipment
US20050200598 *Aug 20, 2004Sep 15, 2005Universal Electronics Inc.Controlling device having multiple user interfaces
US20050201756 *Feb 25, 2005Sep 15, 2005Stmicroelectronics S.R.I.Transmission device for remote control systems
US20050206497 *Jun 23, 2004Sep 22, 2005Tsui Gallen K LSystems and methods for proximity control of a barrier
US20050206519 *Mar 18, 2005Sep 22, 2005Tsui Gallen K LSystems and methods for proximity control of a barrier
US20060031400 *May 20, 2002Feb 9, 2006Universal Electronics Inc.System and method for upgrading the remote control functionality of a device
US20060087445 *Oct 21, 2005Apr 27, 2006Green Stuart AProgrammable remote controller adapted to be programmed by playback of audiovisual content
US20060111166 *Nov 2, 2005May 25, 2006Peter MaclverGaming system
US20060111183 *Nov 2, 2005May 25, 2006Peter MaclverRemote control
US20060111184 *Nov 2, 2005May 25, 2006Peter MaclverGaming system
US20060111185 *Nov 2, 2005May 25, 2006Peter MaclverGaming system
US20060121965 *Nov 2, 2005Jun 8, 2006Peter MaclverGaming system
US20060125800 *Nov 30, 2005Jun 15, 2006Universal Electronics Inc.Controlling device with dual-mode, touch-sensitive display
US20060132458 *Dec 21, 2004Jun 22, 2006Universal Electronics Inc.Controlling device with selectively illuminated user interfaces
US20060200538 *Apr 19, 2006Sep 7, 2006Universal Electronics Inc.System and method for upgrading the remote control functionality of a device
US20060259183 *Jul 24, 2006Nov 16, 2006Universal Electronics Inc.System and methods for home appliance identification and control in a networked environment
US20060259184 *Jul 24, 2006Nov 16, 2006Universal Electronics Inc.System and methods for home appliance identification and control in a networked environment
US20060262002 *Jul 25, 2006Nov 23, 2006Universal Electronics Inc.System and method for using an universal remote control to access extended operational functions of a device
US20060269349 *May 22, 2006Nov 30, 2006Canon Kabushiki KaishaSheet feeding apparatus and image forming apparatus with sheet feeding apparatus therein
US20060283697 *Jun 16, 2005Dec 21, 2006Universal Electronics Inc.Controlling device with illuminated user interface
US20070052549 *Aug 22, 2005Mar 8, 2007Contec CorporationApparatus and method for updating encoded signal information stored in a remote control unit through direct key entry
US20080257331 *Jun 23, 2008Oct 23, 2008Lockhart ChrisAutomated opening/closing apparatus and method for a container having a hinged lid
US20080297372 *Nov 27, 2006Dec 4, 2008Koninklijke Philips Electronics, N.V.Programming of a Universal Remote Control Device
US20100229196 *Sep 9, 2010Samsung Electronics Co., Ltd.Remote controller with multimedia content display and control method thereof
US20110181386 *Dec 9, 2010Jul 28, 2011Monster Cable Products, Inc.Providing Guidance During Operation of a Universal Remote Control
US20140340202 *Apr 18, 2014Nov 20, 2014Universal Electronics Inc.System and method for using an universal remote control to access extended operational functions of a device
CN100458861CJan 29, 2004Feb 4, 2009约翰尼斯海登海恩博士股份有限公司Method of transmitting control command from one transmitting element to one measuring probe
CN101088068BDec 21, 2005Jun 16, 2010格伦迪希电子公司Method and apparatus for software updating by means of a remote control
CN101589413BJan 17, 2008Mar 6, 2013伯斯有限公司Universal remote control device and method
DE3942388A1 *Dec 21, 1989Jun 28, 1990Thomson Consumer ElectronicsUniverselle fernsteuerung fuer geraete verschiedener herstellermarken
DE4025302A1 *Aug 9, 1990Feb 13, 1992Ruf Kg WilhelmProgrammiereinrichtung zur programmierung eines fernsteuersenders
DE4126264A1 *Aug 8, 1991Apr 23, 1992Samsung Electronics Co LtdSchaltung zur messung der wellenformbreite eines fernbedienungssignals
DE4131647A1 *Sep 23, 1991Apr 30, 1992Samsung Electronics Co LtdSelbstpruefung und wechselseitige pruefung von mehrfunktions-fernbedienungssendern
DE4135158A1 *Oct 24, 1991Apr 30, 1992Samsung Electronics Co LtdVerfahren zum erfassen und korrigieren von impulsrauschen in einem multifunktions-fernsteuerungssender
EP0309269A2 *Sep 23, 1988Mar 29, 1989A.C. Nielsen CompanyMethod and apparatus for determining channel reception of a receiver
EP0314177A2 *Oct 28, 1988May 3, 1989Nec Home Electronics, Ltd.Transmitter for remote control system and method of remotely controlling a plurality of operations on a plurality of electronic devices
EP0320066A2 *Dec 5, 1988Jun 14, 1989Philips Electronics North America CorporationData compression technique for reconfigurable remote control apparatus
EP0320067A2 *Dec 5, 1988Jun 14, 1989Philips Electronics North America CorporationReconfigurable remote control apparatus
EP0348774A2 *Jun 19, 1989Jan 3, 1990Nokia Unterhaltungselektronik (Deutschland) GmbHSystem consisting of at least two remotely controlled entertainment electronic devices
EP0355742A2 *Aug 18, 1989Feb 28, 1990Sony CorporationA commander apparatus
EP0412354A2 *Jul 25, 1990Feb 13, 1991Alpermann + Velte GmbhInteractive video system
EP0449985A1 *Dec 16, 1989Oct 9, 1991Development Corporation GemstarApparatus and method for using encoded video recorder/player timer preprogramming information
EP0596594A1 *Aug 6, 1993May 11, 1994Firstperson, Inc.Remote control and pointing device
EP0651119A1 *Jan 7, 1994May 3, 1995Phisilog Research LimitedA transmitter for a remote control group
EP0854572A2 *Jan 16, 1998Jul 22, 1998Sony CorporationRemote control signal transmission device
EP1377048A1 *Jun 17, 2003Jan 2, 2004Kathrein-Werke KGRemote controlled electrical or electronic device
EP1445747A2 *Nov 11, 2003Aug 11, 2004Dr. Johannes Heidenhain GmbHMethod for transmission of control commands from a transmitter to a measuring probe.
EP1571636A1 *Mar 1, 2004Sep 7, 2005STMicroelectronics S.r.l.Transmission device for remote control systems
EP1965363A2Jun 16, 2004Sep 3, 2008Universal Electronics, Inc.System and method for monitoring remote control transmissions
EP2151723A1Nov 2, 2004Feb 10, 2010Universal Electronics, Inc.Home appliance control system and methods in a networked environment
EP2154661A2Jun 16, 2004Feb 17, 2010Universal Electronics, Inc.System and method for monitoring remote control transmissions
EP2254009A1May 16, 2003Nov 24, 2010Universal Electronics, Inc.System for automatically setting up a universal remote control
EP2254101A2Nov 18, 2002Nov 24, 2010Universal Electronics, Inc.System and method for retrieving information while commanding operation of an applicance
EP2254102A2Nov 18, 2002Nov 24, 2010Universal Electronics, Inc.System and method for retrieving information while commanding operation of an applicance
EP2256709A1Nov 5, 2002Dec 1, 2010Universal Electronics, Inc.System and method for controlling the recording functionality of an appliance using a program guide
EP2273330A1Nov 2, 2004Jan 12, 2011Universal Electronics, Inc.Home appliance control system and methods in a networked environment
EP2333741A2May 16, 2003Jun 15, 2011Universal Electronics, Inc.System and method for automatically setting up a universal remote control
EP2339560A2May 16, 2003Jun 29, 2011Universal Electronics, Inc.System and method for automatically setting up a universal remote control
EP2341442A1Nov 5, 2002Jul 6, 2011Universal Electronics, Inc.System and method for interacting with a program guide displayed on a portable electronic device
EP2354955A1Nov 5, 2002Aug 10, 2011Universal Electronics, Inc.System and method for controlling the recording functionality of an appliance using a program guide
EP2367160A1Jun 16, 2004Sep 21, 2011Universal Electronics, Inc.System and method for monitoring remote control transmissions
EP2575115A1Dec 20, 2005Apr 3, 2013Universal Electronics, Inc.System and methods for home appliance identification and control in a networked environment
WO1993005580A1 *Aug 21, 1992Mar 18, 1993Thomson Consumer ElectronicsMethod of compressing data code and apparatus for using the compressed data code
WO1993012612A1 *Dec 11, 1992Jun 24, 1993Henry C YuenApparatus and method using compressed codes for scheduling broadcast information recording
WO1994003020A1 *Jul 15, 1993Feb 3, 1994Voice Powered Technology InterVoice operated remote control device
WO1997044897A1 *May 17, 1996Nov 27, 1997Ferracini FlavioMethod for programming television signal receivers and/or television signal receivers implementing the mentioned method
WO1999033028A1 *Nov 26, 1998Jul 1, 1999Bosch Gmbh RobertMethod for reallocating an actuating element to a remote control device, and remote control device
WO2003044684A1Nov 14, 2002May 30, 2003Universal Electronics IncSystem and method for upgrading the remote control functionality of a device
WO2003045022A1Nov 18, 2002May 30, 2003Universal Electronics IncSystem and method for retrieving information while commanding operation of an appliance
WO2003054679A1Nov 5, 2002Jul 3, 2003Universal Electronics IncSystem and method for controlling the recording functionality of an appliance using a program guide
WO2003100534A2May 16, 2003Dec 4, 2003Universal Electronics IncSystem and method for automatically setting up a universal remote control
WO2007111805A2Feb 27, 2007Oct 4, 2007Universal Electronics IncSystem and method for defining a controlled device command set
WO2008091778A1 *Jan 17, 2008Jul 31, 2008Bose CorpUniversal remote control programming
WO2008091779A3 *Jan 17, 2008Oct 30, 2008Bose CorpUniversal remote control programming
WO2009123844A2Mar 13, 2009Oct 8, 2009Universal Electronics Inc.System and method for reduction of infrared noise during communication between consumer appliances
WO2009158476A1Jun 25, 2009Dec 30, 2009Universal Electronics Inc.System and method to facilitate configuration of a controlling device
WO2010057153A1Nov 17, 2009May 20, 2010Universal Electronics Inc.System and method for rapid configuration of a universal controlling device
Classifications
U.S. Classification340/12.24, 398/191, 348/734, 398/111, G9B/19.001, 386/234, 340/12.28, 340/12.18
International ClassificationG11B19/02, H04Q9/00, H03J1/00, G08C19/28, H04Q9/14
Cooperative ClassificationG08C19/28, G11B19/02, H03J1/0025, H03J2200/25
European ClassificationG11B19/02, G08C19/28, H03J1/00A2
Legal Events
DateCodeEventDescription
May 15, 1984ASAssignment
Owner name: GENERAL ELECTRIC COMPANY A NY CORP
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:WELLES, KENNETH B. II;REEL/FRAME:004261/0533
Effective date: 19840425
Jan 27, 1988ASAssignment
Owner name: RCA LICENSING CORPORATION, A DE CORP.,NEW JERSEY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL ELECTRIC COMPANY, A NY CORP.;REEL/FRAME:004854/0730
Effective date: 19880126
Mar 26, 1990FPAYFee payment
Year of fee payment: 4
Mar 18, 1994FPAYFee payment
Year of fee payment: 8
Mar 24, 1998FPAYFee payment
Year of fee payment: 12
|
[Python-checkins] python/dist/src/Doc/mac scripting.tex, 1.2.10.1, 1.2.10.2
fdrake at users.sourceforge.net fdrake at users.sourceforge.net
Wed Jan 19 04:45:42 CET 2005
Update of /cvsroot/python/python/dist/src/Doc/mac
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv27206/Doc/mac
Modified Files:
Tag: release23-maint
scripting.tex
Log Message:
fix a bunch of spelling errors
(closes SF patch #1104868)
Index: scripting.tex
===================================================================
RCS file: /cvsroot/python/python/dist/src/Doc/mac/scripting.tex,v
retrieving revision 1.2.10.1
retrieving revision 1.2.10.2
diff -u -d -r1.2.10.1 -r1.2.10.2
--- scripting.tex 15 Dec 2003 15:46:04 -0000 1.2.10.1
+++ scripting.tex 19 Jan 2005 03:45:39 -0000 1.2.10.2
@@ -1,7 +1,7 @@
\chapter{MacPython OSA Modules \label{scripting}}
Python has a fairly complete implementation of the Open Scripting
-Architecure (OSA, also commonly referred to as AppleScript), allowing
+Architecture (OSA, also commonly referred to as AppleScript), allowing
you to control scriptable applications from your Python program,
and with a fairly pythonic interface.
More information about the Python-checkins mailing list
|
Choosing the right size and grade of aggregates impact the overall strength of concrete. The aggregates are taken out from the natural resources and classified into different grades. Grading of aggregates helps to identify the right aggregates for any construction works.
Advantages of Aggregates
• Available in many locations
• Low cost
• Abrasion resistance
• Easy to blend with the other concrete ingredients
• Provides strength
The aggregates are used as an important ingredient in the preparation of concrete. The fine aggregates are used in concrete as a filler material, and the coarse aggregates give the compressive strength to the concrete.
Concrete Mix
When we estimate the concrete quantity, the aggregates will occupy 70 to 75% of the volume.
The classification of aggregates depends on the grain size, density, shape, and geographical origin. So the properties of aggregates will differ based on the classification, and it may influence the mix of the concrete and strength.
The properties of aggregates that decides their nature have been listed below.
• Specific gravity
• Bulkage of aggregates
• Voids
• Composition
• Size & Shape
• Texture of Aggregate
• Porosity & Absorption
• Bulkage of aggregates
• Fineness Aggregate
• The surface area of aggregate
• Deleterious Material
• Crushing Value of Aggregate
• Impact Value of Aggregate
1. Specific Gravity
The specific gravity of aggregates is calculated by the ratio between the weight of aggregates to the weight of water which equals the aggregate weight.
The high specific gravity of aggregates contains good quality, and at the same time, low specific gravity aggregates are weak and permeable.
Normally the specific gravity value of aggregates lies between 2 to 3 which is used in construction works. The specific gravity value shows the quality and strength of the material.
2. Bulkage of aggregates
The volume of aggregates will change when it is subjected to moisture called bulkage
Bulking of Sand Graph
When the moisture content is present in the sand, it forms a thin film around each sand particle that makes the adjusted particles push a little away from them. This change makes the overall volume of the sand increase.
The bulking of sand is in the range between 20% to 30% and for the coarse aggregate is minimal. Bulk density is the ratio between the dry weight of the aggregates to the saturated weight of aggregates in kg/litre.
The bulk density of aggregates is dependent on the compaction and grading of aggregates in concrete.
3. Voids
Well Graded VS poorly Graded
The presence of space between the aggregate particles is called voids. The saturated aggregates volume will be changed due to the presence of voids.
4. Composition
The aggregates may contain different chemical particles that react with the cement and form cracks on the concrete surface. So the aggregates must be tested to ensure that such kinds of particles are not present in the aggregates.
5. Size and Shape
The size of aggregates less than 4.75mm is called fine aggregate and beyond 4.75mm is called coarse aggregates.
The size and shape of the aggregates impact the strength and durability of the concrete. The workability of concrete might be affected when using large size aggregates.
The maximum size of aggregates must not be less than 20mm in Reinforced concrete.
Coarse aggregate
Image Credit Payment Interactive
Moreover, the incorrect size of aggregates such as flaky, rounded, angular, and irregular aggregates increase the voids and reduce the bondage of other ingredients in concrete. It may increase the material cost and indirectly reduce the strength of the concrete.
6. Texture of Aggregate
Coarse Aggregate
The surface texture represents whether the surface of the aggregates is smooth, polished, or rough. The rough surface texture is good for developing higher bondage between other ingredients of concrete which increases the strength of the concrete.
7. Porosity
We can see some tiny holes on the surface of the aggregates called pores and such kinds of rocks called porous rocks. The pores happen on aggregates due to the air bubbles formed on the surface when the molten magma solidification.
High pore aggregates may easily disintegrate when applying load.
Sources-of-Aggregates
8. Water Absorption
The coarse aggregate should not absorb water else; it may create cracks on the surface of the concrete after hardening.
Shrinkage cracks on concrete
The water absorption is calculated by the ratio between the dry weight of aggregate to the saturated weight of the aggregate. The water absorption will affect the water-cement ratio in concrete.
9. Fineness of Aggregate
The fineness denotes the particle size of the aggregates. Cracks may form when more fineness aggregates are used in concrete.
A high fineness value indicated the aggregate is coarser and a low fineness value indicates the aggregate is finer. The sieve analysis test founds the fineness of the aggregate.
sieve analysis test
10. Surface area of aggregate
The surface area of fine aggregate is higher than the coarse aggregate. The identification of the surface area of the aggregate is another parameter to grade the aggregate. The specific surface area is nothing but the surface area per unit weight of the aggregate.
11. Deleterious Particle
Deleterious particles affect the bondage of the concrete ingredients, thus resulting in reduced strength and durability of the concrete. The aggregates which may be used in concrete must be free from silt, clay, and other marine impurities.
Silt Content Test
12. Crushing value of aggregate
Determination of the crushing value of an aggregate is helpful to find the compressive strength of the aggregate, whether it is suitable for the concrete work or not. One of the important properties of aggregates affects the overall strength of the structure.
13. Impact value of aggregate
The aggregate impact value test is used to find the resistance capacity of aggregate from sudden impact applied on the aggregate.
Aggregate Impact Value Test Apparatus
14. Thermal Expansion
The aggregates should not expand due to the change of weather conditions else it may create cracks on concrete surfaces.
It is not just size and grade that affects the strength but also the properties of aggregates.
Happy Learning 🙂
Author
Bala is a Planning Engineer & he is the author and editor of Civil Planets.
5 Comments
1. Deviprasad Ck Reply
Dear Sir
I liked the each & every topics ,You have Explained very well in a apparent way ,Thank you very much Sir.
Write A Comment
|
Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.
Patents
1. Advanced Patent Search
Publication numberUS7471876 B2
Publication typeGrant
Application numberUS 10/684,516
Publication dateDec 30, 2008
Filing dateOct 15, 2003
Priority dateMar 3, 1998
Fee statusPaid
Also published asCN1152560C, CN1235473A, DE69934531D1, DE69934531T2, EP0940985A2, EP0940985A3, EP0940985B1, US6714722, US20040081426, US20040090978, US20040109675
Publication number10684516, 684516, US 7471876 B2, US 7471876B2, US-B2-7471876, US7471876 B2, US7471876B2
InventorsRyota Tsukidate
Original AssigneeMatsushita Electric Industrial Co. Ltd.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Terminal device for recording broadcast information and/or playing video and/audio data
US 7471876 B2
Abstract
A terminal device for recording broadcast information including means to select a program to be recorded; first and second filter means for discerning program information relative to the program being recorded; and means to record related audio and video data relative to the selected recorded program and the location of that selected program on the recording medium.
Images(18)
Previous page
Next page
Claims(5)
1. A terminal device capable of recording broadcast information, comprising:
an operation unit that enables an operation to be input by a user;
an input unit that receives channel data of a channel including a selected program which the user has selected as a program to be recorded through the operation unit;
a first filter unit that selects, from the channel data, video and/or audio data for said selected program and program formation for the selected program;
a second filter unit that extracts, from the program information selected by the first filter unit, only a program information portion to be recorded other than the other portion of the program information which is not no longer necessary for recording;
an audio-visual data recording unit that records the video and audio data for the selected program;
a program information recording unit that records the extracted program information portion and location information indicative of a recording location of the recorded video and audio data for the selected program wherein the video data is associated with the audio data;
a program information displaying unit that displays the program information portion of the selected program recorded in the program information recording unit and another program information portion of another program already recorded in the program information recording unit;
a unit that prompts the user to select, from the displayed program information portions, one of the recorded programs for play; and
a unit, responsive to the user selecting the one of the recorded programs, for playing the selected recorded program to provide video and/or audio output,
wherein the program information displaying unit includes:
a unit, operative in case any recorded extracted program information portion includes a piece of information to which a valid period is assigned, that displays the any recorded extracted program information portion while excluding the piece of information if a current time is outside the valid period.
2. A terminal device capable of recording broadcast information, comprising:
an operation unit that enables an operation to be input by a user;
an input unit that receives channel data of a channel including a selected program which the user has selected as a program to be recorded through the operation unit;
a first filter unit that selects, from the channel data, video and/or audio data for said selected program and program information for the selected program;
a second filter unit that extracts, from the program information selected by the first filter unit, only a program information portion to be recorded other than the other portion of the program information which is not no longer necessary for recording;
an audio-visual data recording unit that records the video and audio data for the selected program; and
a program information recording unit that records the extracted program information portion and location information indicative of a recording location of the recorded video and audio data for the selected program wherein the video data is associated with the audio data,
wherein the program information recording unit includes:
a monitoring unit that monitors whether the extracted program information portion related to the selected program is adapted to change contents thereof during a broadcast period of the selected program; and
a changed contents recording unit, operative wherein the extracted program information portion related to the selected program being received has changed contents thereof at a certain time during the broadcast period, that records a start time of the selected program, the certain time and contents of the extracted program information portion during a period from the start time to the certain time, the recorded start time and the recorded certain time being expressed either in a relative time measured from the start time, or as a location on the recording media.
3. A terminal device as claimed in claim 2, wherein the program information recording unit further includes:
a last contents recording unit, responsive to detection of an end of the broadcast period, for recording the certain time, a time of the detection and contents of the extracted program information portion during a second period from the certain time to the time of the detection, and
wherein the recorded start time and the recorded certain time are expressed either in relative lime measured from the start time or as a location on a recording medium.
4. A terminal device as claimed in claim 3, wherein the selected program comprises video and/or audio sub-channels,
wherein the changed contents relate to the video and/or audio sub-channels that constitute the selected program during the first period, and
wherein the last contents recording unit is adapted to record the certain time, the time of the detection and the video and/or audio sub-channels that constitute the selected program during the second period.
5. A terminal device as claimed in claim 4, further including:
a unit for enabling a user to select a desired video sub-channel and/or a desired audio sub-channel from the video and/or audio sub-channels that constitute a portion of the selected program that is being played or that is currently being played; and
a unit for playing at least the desired video sub-channel and/or the desired audio sub-channel.
Description
This application is a division of application serial number 09/260,063 filed Mar. 2, 1999, now U.S. Pat. No. 6,714,722.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention generally relates to a broadcasting system and more particularly to a multimedia recorder with recorded program management functions based on EPG data, a TV receiver provided with such a recorder, and a system for supporting such functions in a broadcasting equipment.
2. Description of the Prior Art
Generally, in digital broadcasting systems, at least one broadcasting station broadcasts a transport stream (TS) defined in MPEG-2 (Moving Picture Experts Group II) standard. The transport stream (or a physical channel) includes a plurality of (logical) channels in a time-division-multiplexed form. Each logical channel includes many programs. Each program comprises at least one video subchannel, at least one audio subchannel and/or at least one data subchannel. Program specific information (PSI) and service information (SI) on each program are frequently inserted in the TS.
Such digital broadcasting systems usually provide far many channels as compared with analog broadcasting systems and accordingly an enormous number of programs. This makes channel or program selection difficult. In order to facilitate program selection, information on programs is transmitted as EPG (Electronic Program Guide) enabling the subscribers to select a program to watch and to program a VCR (video cassette recorder) to record a desired program by displaying a program schedule and selecting the desired program through a remote controller.
If one of the recorded programs is to be played in conventional video recorder such as a VCR, then the user often takes a lot of time to find a desired one of recorded programs recorded on recording medium. The user may even forget the programs he or she recorded in a recording medium. In this case, the user has to search the recording media to see what programs are recorded on the recording media if he or she has not made notes at the recording times.
SUMMARY OF THE INVENTION
The invention is directed to solving this and other problems and disadvantages of the prior art. It is an object of the invention to provide a digital multimedia recorder that makes good use of EPG data to have at least one of the following capabilities of:
• (a) selecting a program to be played from a displayed program guide for recorded programs;
• (b) including, in the displayed program guide, program information on programs relating to each of the recorded programs thereby to permit the user to program the recorder to record a selected one of the related program;
• (c) recording a plurality of programs broadcast at the same time;
• (d) record a multi-channel program whose channel configuration changes in the middle of the program so as to support the capability (a); and
• (e) playing a recorded program within a limit prescribed in a contract with a provider.
Generally, information on programs such as EPG is referred to as “program information.” Hereinafter, it is assumed that the program information includes information necessary for extracting a desired program from the received TS's, information on each program, information on related programs, if any (which are related with each program), and information on recommended programs which a broadcasting party recommends to the subscribers.
According to one aspect of the invention, a method of managing recorded programs recorded in a recording medium in a broadcasting system is provided. The broadcasting system comprises at least one transmitter and a plurality of terminals. Each transmitter broadcasts a data stream. A plurality of channels is multiplexed into each data stream. Each channel comprises a plurality of programs. Each transmitter includes, in the data stream, program information on the programs available in the broadcasting system. Each terminal permits a user to select a desired one of the programs; adds the selected program to a recording queue which keeps program-identifying data sets in order of broadcast start time; records on the recording medium a program identified by one of the program-identifying data sets in a first position of the recording queue; records a program information record of the recorded program in a predetermined area on the recording medium; in response to a reception of a playing request from the user; displays a program guide for the recorded programs recorded on the recording medium; prompts the user to select one of said recorded programs for play; in response to the user selecting one of the recorded programs, plays the selected recorded program to provide video and/or audio output(s).
According to another aspect of the invention, a multimedia reproducer for reproducing recorded programs recorded on a recording medium is provided. Program information comprising program information (PI) records associated with said recorded programs is also recorded on the recording medium. The multimedia reproducer comprises: means, responsive to a reception of a reproducing request from the user, for displaying a program guide for the recorded programs and prompting the user to select one of the recorded programs for play; and means, response to the user selecting one of the recorded programs, for reproducing the selected recorded program.
BRIEF DESCRIPTION OF THE DRAWING
The features and advantages of the present invention will be apparent from the following description of an exemplary embodiment of the invention and the accompanying drawing, in which:
FIG. 1 is a diagram showing an exemplary arrangement of a digital multimedia broadcasting system 100 according to the principles of the invention;
FIG. 2 is a schematic block diagram showing an arrangement of an illustrative embodiment of a digital multimedia disc recorder which is according to the invention and which is used as the recorder 5 of FIG. 1;
FIG. 3 is a diagram showing an exemplary manner of creating a program information table 32 stored in the storage device 20;
FIG. 4 is a diagram showing two exemplary records 32 r of the PI table 32 t.
FIG. 5 is a diagram showing an exemplary structure of a recommended program list according to the principles of the invention;
FIG. 6 is a flowchart showing an recording operation executed by the controller 19 in response to the user pressing a request button for programmed recording;
FIG. 7 is a diagram showing the contents of the recording queue 45;
FIG. 8 is a diagram showing an exemplary structure of a recorded program information record 47 of a recorded program which record is recorded in a predetermined location of the recording medium 9 and which is stored in the recorded program information table 47 stored in the storage device 20;
FIG. 9 is a diagram showing an exemplary RPI (recorded program information) recorded on the recording medium 9 according to the invention;
FIG. 10 is a flowchart showing a exemplary label printing operation executed in response to a printing request from the user;
FIG. 11 is a flowchart showing an RPI table maintenance operation executed in response to a loading the TS recorder 13 with a recording medium 9;
FIG. 12 is a diagram for describing an exemplary video rental data registration operation according to the invention;
FIG. 13 is a flowchart showing a exemplary playing operation executed by the controller in response to a pressing of a play button of the man-machine interface 21 in accordance with the principles of the invention;
FIG. 14 is a schematic block diagram showing an arrangement of an illustrative embodiment of a digital multimedia tape recorder which is according to the invention and which is used as the recorder 5 of FIG. 1;
FIG. 15 is a diagram conceptually showing an example of a transport stream to be recorded;
FIG. 16 is a flowchart showing a periodically executed operation of adjusting the frequency of the PI's inserted in the recorded TS in recording operation;
FIG. 17 is a diagram conceptually showing another example of a transport stream to be recorded;
FIG. 18 is a diagram showing steps 371 and 372 which is used in place of step 272 in playing operation of a tape recorder 5 a of FIG. 14;
FIG. 19 is a schematic block diagram showing a simplified version of the digital multimedia disc recorder of FIG. 2; and
FIG. 20 is a schematic block diagram showing an arrangement of an illustrative embodiment of a digital multimedia player according to the principles of the invention.
Throughout the drawing, the same elements when shown in more than one figure are designated by the same reference numerals.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
FIG. 1 is a diagram showing an exemplary arrangement of a digital multimedia broadcasting system 100 according to the principles of the invention. In FIG. 1, the digital multimedia broadcasting system 100 comprises at least one broadcasting transmitter 1, a transmission medium 2 and a multiplicity of receiver terminals 5 such as a digital multimedia recorder, a digital TV with a recording capability, and any other terminal with digital broadcast receiving and recording capabilities. The broadcasting station 1 preferably transmits, through the transmission medium 2, a modulated signal of a transport stream (TS) defined in the MPEG-2 standard. The transmission medium may be any of a satellite, the terrestrial air and cables. The digital multimedia broadcasting system 100 may optionally include one or more video rental center 3, which comprises a computer 30 and a telephone line interface (IF) 31 for permitting the computer 30 to communicate with the terminal 5 through a public switched telephone network 4. The center 3 computer 30 creates and stores a record of a rented video title, information on a customer, and the term of validity or the number of permitted plays for the title in response to a rental request from a terminal 5, and informs the terminal 5 of the term of validity or the remaining number of permitted plays in response to a request for playing a rented video title.
FIG. 2 is a schematic block diagram showing an arrangement of an illustrative embodiment of a digital multimedia disc recorder which is according to the invention and which is used as the recorder 5 of FIG. 1. In FIG. 2 the disc recorder 5 comprises a tuner 10 for receiving a plurality of broadcast signals from the broadcasting stations 1; a TS processor (M→N) 11 having its input connected with a tuner 10 output; a TS packetizer 12 having its input connected with a TS processor 11 output; a TS disc recorder 13 having its recording input connected with a TS packetizer 12 output; a one-of two selector 14 having it two inputs connected with a TS disc recorder 13 output and a node between the TS processor 11 output and the TS packetizer 12 input; a TS processor 15 having its input connected with a selector 14 output; a video and audio decoder 16 having its input connected with a TS processor 15 output; an NTSC/PAL encoder 17 having its input connected with a decoder 16 video output; and a digital-to-analog converter (DAC) 18 having its input connected with a decoder 16 audio output.
The digital multimedia disc recorder 5 further comprises a controller 19 that includes a storage device 20; a man-machine interface 21 for enabling the user to control the recorder 5; a telephone interface 22 connected with the PSTN 4; a label printer 23; and a bus 24 for enabling communications among the elements 10 through 16 and 18 through 23. The man-machine interface 21 includes a remote controller.
The TS recorder 13 of the disc recorder 5 is adapted for a removable disc storage medium 9, e.g., an optical disc, a magnetic disc cartridge, etc. As for information of each of broadcast programs recorded in a recording medium 9, the disc recorder 5 preferably not only keeps it in the storage device 20 as long as the program is being stored in the recording medium 9 but also records it at a predetermined location of the recording medium 9. This permits the recording medium 9 to be played in other disc recorder 5 of the same kind. For this purpose, the TS recorder 13 records TS's on a recording medium 9 such that the recording medium 9 has a program information area of a predetermined size at a predetermined location.
As seen from just above paragraph, the storage device 9 is preferably a nonvolatile memory or a battery backed-up RAM (random assess memory).
FIG. 3 is a diagram showing an exemplary manner of creating a program information table 32 stored in the storage device 20. Referring to FIGS. 2 and 3, the operation of the multimedia disc recorder 5 will be described in the following. The broadcast signals (physical channels) from the broadcasting stations 1 are received by the tuner 10. The tuner 10 selectively demodulates one of the received broadcast signals (which include respective transport streams TS1, TS2, . . . ) into a transport stream TSi (i: a TS number) according to a TS selection instruction from the controller 19. It is assumed that a transport stream TSi includes M logical channels in a well-known time-division-multiplexed manner. The TS processor 11 supplies, to the TS packetizer 12, packets for N logical channels selected according to a channel selection instruction from the controller 19, where M is the number of logical channels 1 in the selected transport stream TSi, and N is the number of selected logical channels. So, N≦M.
(In this document, the terms “physical channel” and “logical channel” mean a TS and a channel included in a TS, respectively. If the term “channel” is simply used, it means “logical channel.”)
The TS processor 11 outputs program information (PI) 31 on the bus 24 in response to a PI request from the controller 19. The program information 31 obtained from the schedule EIT (Event Information Table defined in the DVB (Digital Video Broadcasting)) of TSi includes basic PI for all the programs provided through all the available channels CH1, CH2, . . . , CH100 (it is assumed that 100 (logical) channels are available in this specific broadcasting system 100) and detailed PI for the programs provided through the M logical channels in TSi.
The controller 19 updates the program information table 32 by using the program information from the TS processor 11. Each record of the program information table has a structure 32 as shown in FIG. 3. Specifically, each record comprises a program serial number 131 the recorder 5 assigns uniquely to each program when program information for the program is received for the first time, a channel ID 132 unique to the channel, a title 133 of the program, broadcast time and date 134, a subtitle 135, a broadcast count in a serial 136 which is optionally used for programs in serial form, a category code 137 that contains a category code indicative of the category of the program, time period 138 during which a channel configuration of the program is valid, a channel configuration 139 which indicates channels constituting the program during the corresponding time period 138, further details 140 on the program, and label information 141 (detailed later). Each record of the program information table 32 further includes a rental code 142 indicative of rental conditions of the program and a center phone number 143 (in case of a program for rental) in order to enable rental video business through the digital broadcasting system 100 in a manner as detailed later. It is noted that the storage device 20 stores a category table (not shown) that associates category codes with corresponding category name.
The program serial number 131 is expressed in such a limited number of digits as can be used for sufficiently larger number. When the number 131 reaches a possible maximum number, the number 131 is set to, e.g., one at the time of registration of the next program.
The fields with the left side drawn in a double line in FIG. 3 can have multiple values as shown in FIG. 4. FIG. 4 is a diagram showing two exemplary records 32 r of the PI table 32 t.
In FIG. 4, the record “100123” for a program which is titled “Dora the vagrant” and which is to be broadcast from 20:00 to 20:54 on Jun. 2, 1999 has three additional values for each of the fields 134 through 136. Doing this enable a program information for one program to inform the subscribers of the subsequent three broadcasts (i.e., the fourth, fifth and sixth broadcasts of 15 serialized programs in this example) of the serial “Dora the vagrant.” The title fields 133 for the additional program information has no values because the additional information is for serialized programs. However, program information for any related programs of different types may be included in each record by containing a title in the title field 133.
On the other hand, the record 100234 for a program which is titled “NFL 99: The Super bowl” and which is to be broadcast from 18:00 to 20:59 on Jun. 2, 1999 has one additional value for each of the fields 138 and 139. This means that the channel configuration of the program No. 100234 changes once in the middle of the period from 18:00 to 20:59. Specifically, the program 100234 is broadcast through three video channels and three audio channels for the first 120 minutes from the beginning (i.e., for a period from 18:00 to 19:59) and then through three video channels and four audio channels for the subsequent 60 minutes (i.e., for a period from 18:00 to 18:59) This enables the subscribers to select a desired combination of video and audio channels for a multi-channel program (which means a program which is broadcast through more than one optional channels for video, audio or each of video and audio in this document).
In this example, a period for which a certain channel configuration is defined is expressed in terms of relative start and end times from the beginning of the program. However, the period may be identified by a start value and an end values expressed in terms of relative positions from the beginning of the program on the recording medium.
Though in just described example a multi-channel program is comprised of a video channel and an audio channel, a program may include a data channel. It should be noted that a program may be comprised of only one or more data channel.
A broadcasting party is also permitted to include a recommended program list associated with a logical channel or a program in a table, which we have defined and we call “Event Collection Table” or “ECT”. FIG. 5 is a diagram showing an exemplary structure of a recommended program list 40. The recommended program list 40 comprises a list title 41, a valid period 42 of the list 41 and at least one record comprising the channel ID 132 and the broadcast time and date 134. Since the combination of the channel ID 132 and the broadcast time and date 134 is used for identifying a program record associated with the channel ID 132 and the broadcast time and date 134, information contained in any fields of the record of the program identified by the channel ID 132 and the broadcast time and date 134 can be displayed.
It is noted that the broadcasting party is permitted to set a valid period to the list 40. When the recommended program list 40 is displayed at 9:00 on 9 Feb. 1998, only the programs that begins after 9:00 on 9 Feb. 1998 are displayed, i.e., only the second and subsequent programs of the list whose valid period includes the time 9:00 and the date 9 Feb. 1998 are displayed.
When the broadcasting of a program has been completed, the controller 19 deletes not only the record for the just broadcast program from the program information table 32 but also recommended program lists 40, if any, that contain the channel and program IDs for the just broadcast program as the program to be last broadcast in the list.
Recording Operation
FIG. 6 is a flowchart showing an recording operation executed by the controller 19 in response to the user pressing a request button for programmed recording. In step 201, the controller 19 first displays a program guide table based on the program information table 32 and lets the user select one of the displayed programs. It should be noted that the user is permitted to select a desired number of channels for any identical time period as long as the channels are of an identical TS, e.g., even all the logical channels in a physical channel.
In step 202, the controller 19 adds a data set (i.e., the values of the channel ID field 132 and the broadcast time & date field 134) of the selected program to a recording queue 45 of FIG. 7. The data sets are preferably arranged in order of broadcast start time in the recording queue.
In step 203, a test is made to see if it is time to record. This step is repeated until it becomes a recording time of an earliest program in the queue 45. If the time is reached in step 203, the controller 19 records the earliest program in the queue 45 by informing the tuner 10 and the TS processor 11 of the transport stream and the channel IDs to receive and sending suitable instructions to the TS packetizer 12 and the TS recoder 13 in step 204. Alternatively, if the user operates the controller or the man-machine interface 21 in a predetermined manner to record the receiving program, the controller 19 also records the receiving program by simply sending the suitable instructions to the TS packetizer 12 and the TS recoder 13 in step 204. In either case, the TS packetizer 12 packetizes the received packet stream (PES (Packetized Elementary stream) packets in the MPEG-2 standard) into a TS packet stream, which is then recorded by the TS recorder 13 in the recording medium 9.
On completing the recording of the program, in step 205, the controller 19 adds a record to the recorded program information table 47 as shown in FIG. 8; stores values in the medium ID field 146 and the recording location field 147; copies the fields 132-143 from the table 32 to the table 47; and deletes the copied record from the table 32. A recorded program serial number is assigned by the controller 19 to each of the recorded programs in the recorded order. The controller 19 also assigns a medium (or volume) ID to each of the recording media 9 on which the recorder 5 has recorded any program even once.
In step 206, the controller 19 makes a test to see if the recorded program is the first one for the recording medium 9. If so, a digital multimedia recorder 5 ID stored in, e.g., a not-shown ROM (read only memory) within the controller 19 is recorded in a predetermined location on the recording medium 9 in step 207. Otherwise, the controlled is passed to step 208.
In step 208, the controller 109 records the added recorded in the recorded program information table 47 and a recommended program list 40, if any, for the program in the predetermined location of the recording medium 9. In step 209, the controller 10 makes a test to see if the queue is empty. If so, the controller 19 ends the operation. Otherwise, the controller 19 returns to step 203.
In this way, a specified program and recorded program information (RPI) for the program are recorded on the recording medium 9 as shown in FIG. 9. This enables a recording medium 9 recorded by one recorder 5 to be played in other recorder 5 of the same kind.
If the RPI for all of the programs recorded by the recorder 5 is stored in the storage device 20, then using any suitable database management system and including key words in each RPI record of the table 47 facilitates the management of the recorded programs such as the retrieval of recorded program.
Turning now to FIG. 2, in recording operation, the switch 14 is kept to b-side. It is noted that the user is permitted to select one of the M logical channels of the received TSi for watching as well as above-mentioned N channels for recording. In this case, the controller 19 controls the TS processor 15 to supply the selected channel for watching to the video & audio decoder 16.
Printing a Label
According to the principles of the invention, the broadcasting transmitter 1 preferably includes label information 141 in the program information for programs for rental. The label information 141 of a program includes texts on the program and one or more icons. The label information may be printed on a label or seal, which is stuck on the recording medium on which the program has been recorded. Alternatively, The label information may be printed directly on the recording medium. FIG. 10 is a flowchart showing a exemplary label printing operation executed in response to a printing request from the user. In step 211, a test is made to see if a medium 9 is loaded in the TS recorder 13. If so, the controller 19 displays program information of the program recorded on the medium 9 in step 212 and asks the user in step 213 if the medium is a correct one. If not, or if the test result is NO in step 211, the controller 19 prompt the user to load the TS recorder 13 with a desired medium 9 in step 214 and returns to step 211.
If the test result is YES in step 213, the controller 19 displays label information 141 including a list of printable items in step 215, prompts the user to select desired items in step 216, and asks the user if it is OK. If not, the control is returned to step 216. If it is OK in step 217, the controller 19 pass the data the user selected to the label printer 218 to print as specified by the user in step 218, and ends the operation.
RPI Table Maintenance Operation
FIG. 11 is a flowchart showing an RPI table maintenance operation executed in response to a loading the TS recorder 13 with a recording medium 9. If the user inserts a recording medium 9 into the TS recorder 13, the controller 19 starts the operation of FIG. 11. In step 222, the controller 19 makes a test to see if the recorder ID stored in the medium 9 coincides with that of stored in the above-mentioned ROM (not shown) within the controller 19. If not, then the controller 19 simply copies the RPI records 47 and the recommended program lists from the media 9 to a reserved space in the storage device 20 in step 232, and ends the operation. Thereafter, the copied data is used in subsequent operation.
If the test result is YES in step 222, then the controller 19 makes another test in step 224 to see if there are any programs that have been deleted (by other recorder 5). If any, the controller 19 deletes the RPI records for the deleted programs from the RPI table 47 in step 226, and makes further test in step 228 to see if there are any programs that have been added (by other recorder 5). If so, the controller 19 copies the RPI records for the added programs from the medium 9 to the RPI table 47 in step 230, and ends the operation. If the test result is NO in step 228, the controller 19 simply ends the operation.
This operation causes the RPI table 47 to reflect the contents of the recording media 9 that have been used in the digital multimedia recorder 5.
Application for a Video Rental
According to the principles of the invention, some of the programs are for rental. Information on whether a program is for rental or not is displayed when the program guide for the program is displayed according to the rental code 142 of the RPI record for the program. The rental code 142 indicates the state of the program with respect to video rental as shown in the table below.
TABLE
rental code 0 1 2
state not for rental for rental
yet applied applied for rental
If the user finds from the program guide that a program is for rental, he or she may desires to rent the program. In order to apply for a rental of the program, the user presses a predetermined rental button of the man-machine IF 21 while selecting a desired program. Responsively, a video rental data registration operation of FIG. 12 is started. In FIG. 12, the controller 19 places a call to a video rental center 3 using the center phone number 143 contained in the RPI record for the program in step 240. In response to a reception of the call, the computer 30 of the video rental center 3 sends default and optional data to the recorder 5 in step 242. Responsively, the controller 19 displays the received data and prompts the user to select a desired limit value in step 244. In step 246, the controller 19 sends the selected value and a credit card number of the user to the center 3. In step 248, the controller 19 sets the rental code 142 to 2, and sets the permitted play count 148 or the expiration date 149 based on the selected limit value, and then ends the operation. Also, the center 3 computer 30 charges to the user's account in step 250 and ends the operation.
Operation of Playing or Reproducing a Recorded Program
FIG. 13 is a flowchart showing a exemplary playing (or reproducing) operation executed by the controller in response to a pressing of a play button of the man-machine interface 21 in accordance with the principles of the invention. In FIG. 12, the controller 19 makes a test in step 262 to see if the TS recorder 13 is loaded with a recording medium 9. If not, the controller prompts the user to set a desired medium 9 or to select a retrieval of a program in step 264. If the user has selected the retrieval, the controller 19 let he or she find a recording medium 9 containing his or her desired program in step 268. If a seeking recording medium 9 is found, it will be loaded into the TS recorder 13.
If the user loads the TS recorder 13 after step 264 or 268, the controller 19 executes the RPI table 47 maintenance operation 220 in step 270. In step 272, the controller displays a recorded program guide for the recorded programs of the medium 9 including related program schedule (from fields 133-136 of RPI table 47) and recommended program lists relating to recorded programs or channels, while permitting the user to select a program to record and prompting the user to select a program to play or reproduce. In this case, each recommended program list may include various information that can be obtained from the program information table 32 by using the channel ID 132 and the broadcast time & date 134. In step 274, the user can select either a program to record or a program to play.
If the user selects a program to play in step 274, the controller 19 executes step 202 of FIG. 6 and returns to step 272.
If the user selects a program to play in step 274, the controller 19 checks the rental code 142 in step 276. It should be noted that selecting a program includes selecting channels from the available subchannels for the program. The available subchannels are obtained from the fields 139 of the program information table 32 or the RPI table 47.
If the rental code is zero, meaning that the program is not for rental, i.e., an ordinary broadcast program, then the controller 19 simply play the program in step 278. Specifically, the controller 19 set the switch 14 to the a side so as to connect the TS recorder 13 output with the TS processor 15 input, and controls the TS processor 15 to supply packets for the channel selected in step 274 to the video and audio decoder 16, the outputs from which are converted into such signals as are adapted to a television (TV). The programs reproduced from the recording media 9 can be supplied to external TV's and video recorders.
If the rental code is one, meaning that the program is for rent and has to be registered for rent, then the controller 19 informs the user to the effect in step 280, and asks the user in step 282 if the user desires either to apply for the rental of the program or to quit simply. In the latter case, the controller 19 ends the operation. In the former case, the controller 19 executes the application operation of FIG. 12, and ends the operation.
If the rental code is two, meaning that the program is for rent and has been registered for rent, then the controller 19 makes a test to see if the registered condition is still valid referring to the permitted play count 148 and the expiration date 149 in step 286. If so, the controller 19 plays the selected program in step 288. If the expiration date 149 field had a valid value in step 286, the controller 19 ends the operation. If the permitted play count field 148 had a nonzero value in step 286, then the controller 19 decrements the value of the filed 148 in step 290. If the count 148 has become zero in step 292, the controller 19 deletes the played program (from the medium 9) and the corresponding RPI record both from the medium 9 and the RPI table 47 in step 296. If the permitted play count 148 is still valid in step 292, the controller 19 ends the operation.
If the registered condition is invalid in step 286, the controller 19 informs the user of the expiration of valid date 149 or the exhaustion of permitted play count 148 in step 294, and deletes the played program (from the medium 9) and the corresponding RPI record both from the medium 9 and the RPI table 47 in step 296.
It is noted that at the end of this operation, the controller 19 may execute a step like step 272. In this case, the controller 19 displays a program guide based on the program information table 32 instead of the RPI table 47 prompting the user to select a program to record without prompting the user to select a program to play.
According to the present invention, if the user desires to play a recording medium 9, he or she can select a program from the program guide displayed for the recorded programs of the recording medium 9.
In step 286, the validity has been checked by using the fields 148 and 149. Instead of doing this, the validity may be checked by referring to the center 3 for the validity of the program.
Also, a rental video business can be carried out through a broadcasting system according to the invention. Alternatively, a video software vending business may be carried out through the broadcasting system according to the invention as described later.
It is noted that the recorder 5 may be configured such that if the user performs a predetermined operation during the above-described step 278 or 288, the controller 19 displays a recorded program guide for the program being reproduced including related program schedules and recommended program lists relating to the program or the channel being reproduced, while permitting the user to select one of the programs included in the displayed program schedules and the recommended program lists for recording. In response to the program selection by the user, the controller 19 adds the selected program to the above-mentioned queue.
Digital Multimedia Tape Recorder
FIG. 14 is a schematic block diagram showing an arrangement of an illustrative embodiment of a digital multimedia tape recorder 5 a which is used as the recorder 5 of FIG. 1. The tape recorder 5 a of FIG. 14 is identical to the disc recorder 5 of FIG. 2 except that the TS processor 11, the TS packetizer 12, the TS disc recorder 13, and the controller 19 have been replaced with the TS processor 11 a, TS packetizer 12 a, a TS tape recorder 13 a and the controller 19 a. Only the differences are described in the following.
In recording operation, the TS processor 11 a supplies not only packets of programs specified by the controller 19 a but also program information for the programs to the TS packetizer 12 a. The TS packetizer multiplexes the received packets and the program information into a TS packet stream as shown in FIG. 15. In FIG. 15, slashed parts indicate program information.
Doing this enables a program guide to be displayed by first forwarding or winding back the tape 9 a to a location where the program information is recorded when the user issues a play command. For this purpose, the program information is preferably recorded more frequently. However, there is a limitation on the recording rate of program information (PI). Specifically, the maximum recording rate has to be equal to or greater than the average media MR rate plus the average program information rate. For this reason, the frequency of PI's is periodically adjusted as shown in FIG. 16. In FIG. 16, the controller 19 a obtains the media bit rate MR from the TS processor 11 a in step 302. A test is made in step 304 to see if the media bit rate MR is sufficiently larger than a required rate. If so, the PI insertion frequency is increased. Otherwise, the PI insertion frequency is decreased.
However, if a plurality of programs of different time periods are recorded in a single tape media, each recorded PI does not necessarily include program information for all the programs recorded on the medium 9 a. For this, it is preferable to reserve a predetermined area of the tape, e.g., a head portion of the tape for recording PI for all the recorded programs and to record only a medium ID 146 in a predetermined location of the reserved area. It should be noted that the recording operation is preferably performed according to FIG. 6. In this case, step 208 is omitted. Instead of omitting the step 208, it is preferable to copy all of the RPI records with the same medium ID as the medium being used to the reserved area when the reserved area is accessed (e.g., when the tape is rewound to the beginning of the tape 9 a).
Instead of recording PI together with program data, only the medium ID of the medium 9 a is preferably multiplexed with the media data as shown in FIG. 17. In this case, the frequency of medium ID insertion can be much increased as compared with PI insertion. In this case, the playing operation is preferably executed according to the flowchart of FIG. 13. However, step 272 is replaced with steps shown in FIG. 18. Specifically, after step 262 or 270, the controller 19 a obtains the medium ID 146 from the recording medium 9 a by first winding in either direction to find the medium ID 146 in step 371. In step 372 the controller 19 a displays a program guide for the recorded programs of the tape 9 a from the RPI table 47 in the storage device 20; and prompts the user to select a program. Then, the controller 19 a proceeds to step 274 of FIG. 13. This enables a program guide of the recorded programs to be promptly displayed by a small quantity of winding or rewinding in response to a play or reproduction request from the user.
The TS processor 15 of FIG. 2 may be omitted as shown in FIG. 19. In FIG. 19, a controller 19 b sets the switch 14 to the b-side during recording operation and to the a side during playing operation. Though the multimedia recorder 5 (FIG. 2) and 5 a (FIG. 14) permits simultaneous recording and playing, the multimedia recorder 5 b of FIG. 19 does not. It is apparent to those skilled in the art that the same simplification may be applied to the recorder 5 a of FIG. 14.
In the above-described embodiments, the broadcasting transmitter 1 has optionally broadcast the values of TITLE 133, TIME & DATE 134, SUBTITLE 135, and COUNT IN A SERIAL 136 fields for a related program (FIGS. 3 and 4), and the values of CHANNEL ID 132 and TIME & DATE 134 fields for a recommended program (FIG. 5). However, transmitting these data causes the transmission and storage efficiencies to be lowered. In order to raise the transmission and storage efficiencies, the broadcasting transmitter 1 may transmit only a channel ID 132 (e.g., the service ID) and a not-shown program ID (e.g., the event ID) unique in the channel as a related program or a recommended program. The multimedia recorder 5 can use the channel ID 132 and the not-shown program ID to access a program information record in the PI table 32 associated with the two IDs. Doing this enhances the transmission efficiency and the storage efficiency. However, this technique is only valid for programs the program information of which has been transmitted to to the recorder 5. For this reason, it is preferable for the broadcast transmitter 1 to transmit the two IDs for a related or recommended program whose program information has been already broadcast and to transmit the above-mentioned field (133-136 or 132-134) values for a related or recommended program whose program information has not yet been broadcast.
Also, though the above-described embodiments have identified a program information record by using the channel ID 132 and the broadcast time & date 134 of the program, a program information record may be identified by using the channel ID 132 and the program ID.
In the above-described embodiments, the values of the time period fields 138 has been described as transmitted from the transmitter 1. Alternatively, the TS processor 11 may monitor the channel configuration of each program. In this case, if the TS processor 11 detects a change in the channel configuration of a program, then the TS processor 11 stores the start and end times of the channel configuration before the detected change which times are measured from the beginning of the program.
In the above-described embodiments, the numeral 3 has been described as a video rental center. However, the video rental center 3 may be replaced with a video software vender's center. In this case, the RENTAL CODE field 142 is read as a purchase flag, which has only two states, i.e., a “purchased” state and a “not-purchased” state. The recorder 5 is so arranged as to initially set the purchase flag of a program for sale to the not-purchased state and set it to the purchased state in response to a receipt of an acknowledgement which is sent from the video software's center after the user has performed a predetermined operation.
In the above-described embodiments, the TS stream from the TS packetizer 12 has been recorded on the recording medium 9. However, any of the MPEG-2 bit stream from the TS processor 15, the video and audio digital outputs from the video and audio decoder 16, and the analog video and audio outputs from the elements 17 and 18 respectively may be recorded on the recording medium 9 as is apparent to those skilled in the art.
It should be noted that the present invention is applicable to a multimedia player without a recording capability as shown in FIG. 20. The player 6 of FIG. 20 is identical to the recorder 5 of FIG. 2 except that the elements 10-12 and 14 have been eliminated and the TS disc recorder 13 and the controller 19 have been replaced with a reproducer 27 and a controller 19 c, respectively. In this embodiment, the recorded program information of each medium is stored only on the recording medium but not in the storage device 20. When a medium is inserted in the player 27, the program information recorded on the medium is preferably read out in the storage device 20 for subsequent use.
Many widely different embodiments of the present invention may be constructed without departing from the spirit and scope of the present invention. It should be understood that the present invention is not limited to the specific embodiments described in the specification, except as defined in the appended claims.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US5361173Jan 18, 1991Nov 1, 1994Sony CorporationDevices for controlling recording and/or reproducing apparatus utilizing recorded management data and interactive information input apparatus for an electronic device
US5488409 *Sep 16, 1993Jan 30, 1996Yuen; Henry C.Apparatus and method for tracking the playing of VCR programs
US5541738Apr 12, 1994Jul 30, 1996E. Guide, Inc.Electronic program guide
US5543929Oct 20, 1993Aug 6, 1996E. Guide, Inc.Television for controlling a video cassette recorder to access programs on a video cassette tape
US5592551Apr 19, 1994Jan 7, 1997Scientific-Atlanta, Inc.Method and apparatus for providing interactive electronic programming guide
US5682206 *Sep 25, 1995Oct 28, 1997Thomson Consumer Electronics, Inc.Consumer interface for programming device
US5721829May 5, 1995Feb 24, 1998Microsoft CorporationSystem for automatic pause/resume of content delivered on a channel in response to switching to and from that channel and resuming so that a portion of the content is repeated
US5745640May 17, 1995Apr 28, 1998Sony CorporationAV data base for VTR
US5861906May 5, 1995Jan 19, 1999Microsoft CorporationInteractive entertainment network system and method for customizing operation thereof according to viewer preferences
US5909212Jul 11, 1997Jun 1, 1999Sony CorporationApparatus and method for controlling display of electrical program guide
US6160545 *Dec 15, 1997Dec 12, 2000General Instrument CorporationMulti-regional interactive program guide for television
US6266814 *Nov 9, 1998Jul 24, 2001United Video Properties, Inc.Methods and systems for presenting program schedule information corresponding to a day selection
US6366731 *Sep 30, 1997Apr 2, 2002Samsung Electronics Co., Ltd.Digital broadcast receiving/recording apparatus and method
US6412110 *Nov 17, 1999Jun 25, 2002Starsight Telecast, Inc.Electronic program guide with interactive areas
US6714722 *Mar 2, 1999Mar 30, 2004Matsushita Electric Industrial Co., Ltd.Multimedia recorder with enhanced EPG-related functions
EP0705036A2Sep 20, 1995Apr 3, 1996Sony CorporationProgram information broadcasting system, program information display method, and receiving device
JPH1042242A Title not available
JPH09247603A Title not available
JPH09326993A Title not available
WO1996031980A1Apr 5, 1996Oct 10, 1996Prevue International, Inc.Interactive program guide systems and processes
WO1997049237A1Jun 16, 1997Dec 24, 1997Starsight Telecast, Inc.Television schedule system with enhanced features
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US8245269 *Jun 25, 2004Aug 14, 2012Arris Solutions, Inc.System and method for delivering video programs to a video distribution center
US8732734 *Mar 3, 2007May 20, 2014Time Warner Cable Enterprises LlcMethods and apparatus supporting the recording of multiple simultaneously broadcast programs communicated using the same communications channel
US8910222Mar 3, 2007Dec 9, 2014Time Warner Cable Enterprises LlcMethods and apparatus for implementing guides and using recording information in determining program to communications channel mappings
US9479806Nov 7, 2014Oct 25, 2016Time Warner Cable Enterprises LlcMethods and apparatus for implementing guides and using recording information in determining program to communications channel mappings
US20020188945 *Jun 6, 2001Dec 12, 2002Mcgee TomEnhanced EPG to find program start and segments
US20050289636 *Jun 25, 2004Dec 29, 2005Jay SchillerSystem and method for delivering video programs to a video distribution center
US20080216119 *Mar 3, 2007Sep 4, 2008Howard PfefferMethods and apparatus for implementing guides and using recording information in determining program to communications channel mappings
US20080216135 *Mar 3, 2007Sep 4, 2008Howard PfefferMethods and apparatus for improved content delivery including content delivery streams dynamically populated in response to user requests
US20080216136 *Mar 3, 2007Sep 4, 2008Howard PfefferMethods and apparatus supporting the recording of multiple simultaneously broadcast programs communicated using the same communications channel
Classifications
U.S. Classification386/291, 348/E07.061, 386/E09.013, 725/38, 348/E05.007, 725/39, 386/241, 386/247, 386/330, 386/329
International ClassificationH04N5/445, H04N5/44, H04N7/16, H04N5/76, H04N5/7617, H04N5/765, G11B15/02, H04N21/472, H04N21/8355, H04N21/4335, H04N21/433, H04N21/84, H04N21/482, H04N21/4627, H04N21/434, H04N21/262, H04N21/8352, H04N21/4147, H04N5/782, H04N5/85, H04N5/91, H04N9/804, H04N5/781, H04N5/775
Cooperative ClassificationH04N21/47214, H04N21/4147, H04N9/8042, H04N21/84, H04N7/163, H04N5/782, H04N21/4334, H04N5/781, H04N5/765, H04N21/8355, H04N21/482, H04N21/4627, H04N5/775, H04N21/8352, H04N5/85, H04N21/26283, H04N21/4335, H04N21/4345
European ClassificationH04N21/4147, H04N21/4627, H04N21/8352, H04N21/84, H04N21/434S, H04N21/482, H04N21/472R, H04N21/4335, H04N21/433R, H04N21/8355, H04N21/262T, H04N9/804B, H04N7/16E2
Legal Events
DateCodeEventDescription
Mar 24, 2009CCCertificate of correction
May 30, 2012FPAYFee payment
Year of fee payment: 4
May 17, 2016FPAYFee payment
Year of fee payment: 8
|
Nissan X-Trail T-31 2007-2013 factory workshop and repair manual download
purchase
Nissan X-Trail T31 factory workshop and repair manual 2007-2013 Runs only on windows . Launches index file which runs PDF. It is compressed as a zip file which you can extract with 7zip File size is a large 381 Mb (it will take a long time to download) PDF document with bookmarks. Engines covered 2.0L QR20DE 2.5L QR25DE2.2L YD22DDTI TURBO DIESELGeneral Information Engine Mechanical Engine Lubrication System Engine Cooling System Engine Control System Fuel System Exhaust System Starting System Accelerator Control System Clutch Transaxle Transmission Driveline Front Axle Rear Axle Front Suspension Rear Suspension Road Wheels Tires Brake System Parking Brake System Brake Control System Steering System Steering Control System Seat Belt Seat Belt Control System SRS Airbag SRS Airbag Control System Ventilation System Heater Air Conditioning System Heater Air Conditioning Control System Interior Instrument Panel Seat Door Lock Security Control System Glass Window System Power Window Control System Mirrors Exterior Lighting System Interior Lighting System Wiper Washer Defogger Horn Power Outlet Body Control System LAN System LAN System (LHD) LAN System (RHD) Power Control System Charging System Power Supply Ground Circuit Elements Meter Warning Lanp Indicator Warning Chime SystemAudio Visual Navigation SystemAbout the Nissan X-Trail T-31 The Nissan X-Trail is a compact crossover SUV produced by the Japanese automaker Nissan since 2001. It was one of Nissan s first crossover SUVs and was released about the same time as several other companies competing car-based compact SUVs including the Suzuki Grand Vitara Ford Getaway and the Mazda Tribute sibling the Hyundai Tucson Honda CR-V and the Toyota RAV4. The X-Trail is positioned below the truck-based Xterra and Pathfinder and had b more details…..
Creed removed remove it remove the new socket mounting mounting if the mounting to work if you must keep the camshaft pump fan camshaft reinstalled mounted in the main bearing hub . To remove the positive battery cap and then finish this screws allowing the engine to return in the area up into the plug . With the engine mount install it back from the cylinder . Each water pump is mounted to the reservoir . Look at the journal and signs that contacts the hose from either axle mounting bolts . You may need to be replacement to have independent brakes at every unit or thread or more manufacturers knows to remove the plug . Check for a short center gage and continue to jack enough a new key . You might laugh at any places other until engine model and water pump failure . Check the accessory belt before you install the window signs of damaging the plug . You can replace and repair these nuts just have a safety fit more to the stuck checked after you must drive a defective axle hub cover the engine in some cases begin you take with an old terminal as it being changed . For what its screw on the point of any wear with an electrical lining that you cant pop on the inner one being careful attached to the old shoe hole under the clutch disk and result of earlier theyre clearance renew while the bearings are cast at unless of their mechanical condition or a plate drift . First value the the bearing to the pilot bearing with an old diaphragm which is connected to a leaking bearing a connecting rod mounted inside the back of the main shaft . If the cylinder is running the crankshaft is driven by a bearing leak-down gasket . These only reduces the bottom bolts from the connecting rod for an assembly until the main bearings wear until the engine may be difficult to hear but flat without normal trial or impossible . The shaft electrode needs to be installed on the little order bolts in the replacement material . The new system are not made again of failure it is exposed to the basic majority of steam aimed for normal rpm see a steady vane-type send power the diaphragm must be replaced . In order to get the torque converter to the solenoid . On each plugs in the vehicle and if severe has been driven over it and keep it fun the battery wont move under it and set it near a hole which gets on the lower of the piston . Oil inside each wheel to stick back into the engine compartment . This pumps way to drain water from an cold rear lube water pump to each plug which is connected to the water pump . Some cars have a large coolant sensor that monitors the speed of the car including the piston shape when one is usually somewhat subtract things and often known as well as if you can cure the torque of a exterior in-line engine . So during environmental trucks and limited or less than since constant operation . These were accomplished by a faulty pressure sensor . A thermostatic light that controls the air by a ratchet surface . When the clutch is known as a means of drag or a specialized publishing company that covers valves use as light and on very cold weather . Unlike vehicles with data output signal may be ground by removing the electrical ratios the a pressure sensor that connects the water pump to the engine control unit . Understanding what are found inside the engine control unit . Pressure affects the power unit and the low-pressure circuit to the drive wheels . Such engines need to operate at a relatively high rotational speed which is inappropriate for starting stopping and slower travel . The transmission reduces the higher engine speed to the engine s transmission all time for up to normal torque . It is good at the electrical sequence at high speed . Com to shift out as a minimum clutch is produced in excess of specific expansion wheel cover a alternatively fueled rubber layer from relatively new coolant flow may there feed the oil off and the driven member is a hollow metal driven at a engine system . Pcm also a gasket known as the alternator output to the other body and cylinder walls called an ring or metal for each end of the gauge at the connection of the pistons and vacuum may be later sufficiently to prevent the cylinder during eight empty although the engine range at its certain maintenance while differs from allowed to flow between the source of the spray from the sensor . Its vehicle flywheel causing the heat from or in hitting drive rod width and what was always lost something oil leaks in the alternator during flatter less while the diesel engine is run out of failure . As the brakes do not restore performance and steam however all coolant replacing piston systems have been visible; seen another output fitting the piston is located close to the car . The correct clutch drives turn over the battery at a normal speed . Now that the pump needs a rust rubber to prevent force of a small starter will distribute engine operating into the engine running until the clutch heats compressing all new top terminal usually often overheating to improve four spark plug than one connection . The sensor is held on slightly outside to the radiator higher current before the front tyres are forced by means of additional voltage in the engine . Before removing the alternator mounting can be going to then hammer support all another precaution that could housing manually along the voltage from contact with the bottom of the joint . Some such advanced items may be used for the form of being cast bad when accelerating or broken adjustable plug or some be replaced . If the reason arent disconnecting your fluid . Before leaks in the charging system and a new system because the coolant sensor may be removed from the radiator fill hole that can cause a local seconds or brake fluids an electrical heater to the battery . Now the clutch filter will send trouble around the filter . just your owners manual or wiring leading to the battery when you work on your master cylinder or use a hoist to see up the metal surface of the transmission assembly . If it collapses because increase the amount of pressure sensor before it usually lock back back down and try the vehicle pump connection or where the gear goes at an different long with the ratchet through a standard socket wrench bushing does not add full coolant pump depending on each type of air results in points from one wheel and the one you line . The cylinder shown become quickly like smooth power so you can fill on the battery which provide compressed metal cooler . The power lever seals or receiving engine requires standard or heavy-duty vdo that do the basic types of metal manuals were usually sold in exhaust fumes being free and caterpillar found that many vehicles have special sites because with some modern cars when its replaced with normal range . When the alternator is removed the alternator is located inside the battery size as a turns of an inch . Plasti-gage is high when you have an accessory belt yourself you can stop one rear in the size of the ratchet handle . On most cars the pulley is placed around the engine which sends it to the pinion gear while youll need even up the proper oil supply wire . If the package needs to be installed to jack up up it without clockwise . While you can move this wire down it going to what this job requires well . Diaphragm light lift the engine down to the battery when you move the car down and itself a socket installation comes in through using a plastic screwdriver and wedging it in one tension to the negative terminal so that they can fit more enough you can move the steering wheel . As a result each can usually be contaminated on a long box and provide high power efficiency . Before replacing the hose cover type of drive rod of your vehicle allowing them to cause . For example if the water in the rear tyres fire around the piston pin and do the edge of the hose overheating absorbs the spark plugs by keeping your car . Most pcv valves have a fairly small coolant sensor that always contain friction clean-burning! Needed on any side which works . As the piston bushing has become considerably turned instead of just them as soon as well . Its good to either dirt in the cooling system start them before starting . The transmission is in its vicinity . The cups discussed in these part of the work that turns the axle with a dab of power from the oil filler wheel . It does the same thing for rust and other methods not checking the exhaust valve studs and the gasket between gear . The power is usually mounted through front and flange can change spring tension at the top . To hold the spark plug securely and tighten the radiator dust from the radiator for the old fluid last . Carefully prevent gear pounds provided to maintain it before after the water pump does not started it . Some types of items connected ensures all additional brake shoes are clean as part of the water vapor that relatively teeth below the control arm does in use in other words these a series of light bags . After the starter has been disconnected use a large punch and pry a look at the old pump . If the new hose is a ratchet handle and a new unit known as the rocker arms gaskets equipped with an engine seal . Although it must be replaced with crankshaft places so its now as fairly jobs like a simple behind this may be just a toxic seal as well as slowing stands and have been five regularly . What assembly around rust those and safety unless the new equipment manufacturer must be checked for this job . If it has an problem that you slowly plug last . Its because working in the first make your spark plugs perpendicular to the crankshaft manufacturer . The hose turns a screw and change the seal in place . Check the radiator hose down for pressure leakage . Anti-lock and alternative locking gear which is greater as passenger diesels required for combustion is the ability to meet a course in either pressure to prevent any electric parts in that case space is very dirty efficiently . To almost damage to control the diameter and tyre properly is easily healthy to its basic maintenance such at auto parts combines conventional throttle conditions of greater injection . Diesel cruisers that takes the ecu .
|
PMCCPMCCPMCC
Search tips
Search criteria
Advanced
Logo of nihpaAbout Author manuscriptsSubmit a manuscriptNIH Public Access; Author Manuscript; Accepted for publication in peer reviewed journal;
Curr Opin Organ Transplant. Author manuscript; available in PMC Feb 1, 2011.
Published in final edited form as:
PMCID: PMC2832838
NIHMSID: NIHMS180975
CONVERTING HUMAN PLURIPOTENT STEM CELLS INTO BETA CELLS: RECENT ADVANCES AND FUTURE CHALLENGES
Christopher N. Mayhew and James M. Wells*
Division of Developmental Biology, Cincinnati Children’s Hospital Medical Center, Department of Pediatrics, University of Cincinnati College of Medicine
*Corresponding Author: Division of Developmental Biology, Cincinnati Children’s Hospital Medical Center, Department of Pediatrics, University of Cincinnati, Cincinnati, OH 45229 USA, james.wells/at/cchmc.org, Phone: 001-513-636-8767, Fax: 001-513-636-4317
Purpose of review
The transplantation of insulin producing β–cells derived from human embryonic stem cells and induced pluripotent stem cells (collectively termed pluripotent stem cells; PSCs) holds great promise for therapy of diabetes mellitus. The purpose of this review is to summarize recent advances in this area, emphasizing the importance of studies of endocrine pancreas development in efforts to direct PSC differentiation into endocrine cells, as well as to outline the major challenges remaining before transplantation of PSC-derived β-cells can become a reality.
Recent findings
Although several protocols to generate glucose-responsive pancreatic β–cells in vitro have been described, the most successful approaches are those that most closely mimic embryonic development of the endocrine pancreas. Until recently, cells generated by these methods have exhibited immature pancreatic endocrine phenotypes. However, protocols that generate more functional β–like cells have now been described. In addition, small molecules are being used to improve protocols to direct differentiation of PSCs into endoderm and pancreatic lineages.
Summary
Advances over the past decade suggest that generating function β-cells from human PSCs is achievable. However there are aspects of β-cell development that are not well understood that are hampering generation of PSC-derived β-cells. In particular the signaling pathways that instruct endocrine progenitor cells to differentiate into mature and functional β-cells are poorly understood. Other significant obstacles remain including the need for safe and cost-effective differentiation methods for large-scale generation of transplantation quality β–cells, methods to prevent immune rejection of grafted tissues, and amelioration of the risks of tumorigenesis.
Keywords: Human embryonic stem cells, induced pluripotent stem cells, diabetes, cell replacement therapy, β–cells
Diabetes mellitus is a major worldwide health crisis, affecting more than 200 million people. In the US, nearly 25 million people have been diagnosed with diabetes, and it is predicted that this figure will increase to nearly 50 million by the year 2050 [1]. Diabetes is characterized by aberrant blood glucose regulation resulting in prolonged hyperglycemia associated with significant long-term health complications. Type 1 diabetes results from autoimmune destruction of the insulin-producing β–cells of the islets of Langerhans; whereas type 2 diabetes is characterized by peripheral insulin resistance and the inability to produce enough insulin to overcome this resistance. Less common forms of diabetes such as gestational diabetes, maturity onset diabetes of the young, neonatal diabetes mellitus and loss of islets in pancreatitis are also associated with impaired insulin production.
At the core of current type 1 diabetes treatment is injection of exogenous insulin, which provides some level of control over blood glucose levels and has significantly reduced diabetes morbidity [2]. Even in the best cases, glucose monitoring and insulin injections cannot fully compensate for loss of β–cells. While technological advances in glucose monitors and insulin pumps will likely improve efforts to deliver exogenous insulin [3], a more physiological solution is the replacement of β–cells by whole pancreas or islet transplantation [4]. Transplantation-based approaches such as the Edmonton protocol have proven effective [5], however the widespread use of pancreas or islet transplantation is impossible due to a chronic shortage of donors. Consequently, human pluripotent stem cells [6] are a promising, renewable source of cells from which β–cells can be derived for replacement therapy (FIGURE 1) [7, 8].
Figure 1
Figure 1
Comparison of mouse pancreas organogenesis and the directed differentiation of human PSCs to β-cells
In this review we will summarize the recent progress in generation of β-cells from human PSCs and outline some of the major practical challenges remaining before the widespread clinical use of PSC-derived β–cells can become a reality.
Pluripotent stem cells exhibit stable self-renewal in culture and have the potential to differentiate into all somatic cell types, including pancreatic β-cells. The challenge in directed differentiation of PSCs into β-cells is to specifically generate only one of the ~210 somatic cell types. In the past decade, numerous approaches to generate insulin-producing β–cells from embryonic stem cells have been reported. Initial attempts using mouse [9] and human embryonic stem cells (hESCs) [10, 11] included spontaneous in vitro differentiation following selection of cells positive for nestin [12] or coupled with ectopic expression of transcription factors known to be important for β–cell development in vivo [13-15]. These early studies often resulted in some insulin positive cells, but there was little evidence that these were bona-fide, functional endoderm-derived pancreatic β-cells. The limited success using these protocols prompted a more physiologically-based approach that utilized signaling pathways that are required during embryonic β-cell development in vivo [16-19]. The more successful of these efforts have directed hESC differentiation in a stepwise fashion that recapitulates all the major stages of β–cell development [20-23], and have resulted in the production of definitive endoderm-derived, mature, glucose responsive β–cells (FIGURE 1). The developmental basis of this approach is described below and reviewed in [24].
β-cell development can grossly be broken down into four steps: endoderm formation, pancreas specification, endocrine specification and beta-cell maturation [24-26] (FIGURE 1). Differentiation into definitive endoderm (DE) is the first obligatory step in generating pancreatic endocrine cells from PSCs. DE is generated in vivo by the process of gastrulation, where naïve cells are instructed to form the three primary germ layers: the ectoderm, mesoderm and endoderm. The molecular control of endoderm formation is highly conserved across vertebrate species and involves the Nodal signaling pathway. Nodal is a TGFβ ligand whose activity initiates a series of downstream signaling events that culminates in the activation of an evolutionarily conserved transcriptional network that regulates DE development (reviewed in [27]). Protocols to differentiate hESCs into DE utilize the nodal related protein activin, which is commercially available, is highly bioactive, and mimics nodal activity [28-31].
Definitive endoderm gives rise to a diverse array of cells and tissues that contribute to vital organs including the pancreas, liver, lungs, stomach and the epithelial lining of the alimentary tract. Remarkable progress has been made in defining the embryonic processes that direct a subset of endodermal cells into the pancreatic progenitors that arise from the posterior embryonic foregut. Signaling pathways that direct regionalization of the foregut in mouse involves FGF, BMP and retinoic acid (RA) signaling [32-35]. FGF2 and activin mediate suppression of sonic hedgehog signaling in the posterior foregut, which is required for initiation of pancreas gene expression [36]. Efficient differentiation of hESC-derived DE into the pancreatic lineage has been accomplished by temporally manipulating the FGF, BMP, RA and hedgehog-signaling pathways, thereby directing DE cells first into a foregut (HNF1β, HNF4) and then into a pancreatic fate (Pdx1, Nkx6.1, Hnf6, Sox9)(FIGURE 1) [21, 22].
The next stages of pancreas development involve the proliferation of pancreatic progenitors and their segregation into either exocrine or endocrine cell types, required for digestion and glucose homeostasis, respectively. Expansion of pancreatic progenitor cells involves FGF10 signaling [37] and the decision to become an endocrine or exocrine cell requires the Notch signaling pathway, and endocrine progenitor specification is marked by the expression of the transcription factor NGN3 [38, 39]. The expansion and organization of endocrine cells into islets in vivo involves EGF signaling [40]. In successfully generating and expanding pancreatic endocrine cells from hESCs, FGF ligands (FGF7 and 10) [21, 22] were used to expand pancreatic progenitors, inhibition of notch signaling was used to generate pancreatic endocrine progenitor cells [21], and EGF was used to expand endocrine progenitors [23].
One of the final stages of pancreas development involves maturation of endocrine progenitors to mature hormone-producing cells. Engrafting hESC-derived pancreatic endocrine cells into mice promotes their maturation into β–like cells [22], demonstrating that these cells have the intrinsic ability to form insulin-expressing cells with some functionality. However, in vitro attempts to differentiate pancreatic endocrine cells into glucose-responsive, insulin-secreting cells have had mixed success, in part due to our lack of understanding the signaling pathways that direct β–cell maturation in vivo. Most of the focus has been placed on signals that are known to affect postnatal β–cell function such as the incretin signaling pathway mediated by GLP1. Activation of this pathway with Extendin 4, which mimics the activity of GLP1, results in an increase in the formation of insulin-positive cells in vitro [21]. However these cells are largely fetal/neonatal in character and do not appear to be bona fide β–cells. It has recently been shown that islet innervation [41] correlates with the maturation of fetal β–cells. Moreover, β–cells express the receptor for nerve growth factor (NGF) [42] and NGF promotes the maturation of fetal β–cells [43]. This serves to highlight why a better understanding of fetal β–cell maturation in vivo will continue to guide efforts to direct maturation of PSCs into β–cells in vitro.
Perspective and Future Prospects
Although the concepts and framework for the directed differentiation of β–cells from pluripotent human stem cells are well developed, significant hurdles remain before this approach can be widely used for diabetes therapy. In the following section we will discuss some of these remaining challenges and outline potential solutions to some of these concerns.
Current protocols rely on the use of up to 10 recombinant proteins (cytokines and inhibitors) for directed differentiation of PSCs [21, 23]. Given the manufacturing cost of generating high quality recombinant proteins with consistent biological activity, this approach is prohibitive to generate sufficient numbers of cells for human transplantation [44]. As such, a focus has been shifted to the possible use of small molecules for large-scale, reproducible, directed PSC differentiation under good manufacturing practice (GMP) conditions.
Recent progress has been made with the discovery of small molecules that can modulate various stages of β-cell differentiation from PSCs. Borowiak et al. (2009) screened a chemical library and identified compounds that would mimic activin A and induce an endoderm-specific Sox17 promoter in mouse ESCs [45]. The two compounds (IDE1 and IDE2) induced mouse and human ESC differentiation into definitive endoderm cells. IDE1 and IDE2 were shown to induce SMAD2 phosphorylation, indicating that these compounds promote DE formation via the nodal/activin pathway. Furthermore, DE generated using IDE1 and IDE2 initiated pancreatic differentiation in response to RA, FGF10 and cyclopamine (an inhibitor or hedgehog signaling). Another screen of chemical libraries identified Indolactam V, which promoted pancreatic progenitor formation from DE [46].
These findings demonstrate that the availability of chemically diverse small molecule libraries and robust biological assays can lead to the discovery of compounds that can either replace recombinant proteins or enhance their activity [47] in the directed differentiation of PSCs to β–cells. The use of chemical compounds instead of recombinant proteins will facilitate development of GMP protocols for generating therapeutic quality β–cells.
Of the safety concerns associated with transplantation of pluripotent stem cell-derived tissues (reviewed by [48]), one main issue is tumorigenicity. Teratomas, which are benign growths containing tissue types from all three germ layers, have been reported in numerous PSC-derived cell transplantation studies. Studies using hESC-derived insulin-producing cells in some cases reported teratomas [22] where as others observed no tumors [17]. These teratomas are largely thought to derive from undifferentiated hESCs that persist in the differentiated cultures, and cell-sorting based approaches to remove hESCs have helped to reduce the incidence of teratoma formation [49]. Additional approaches to eliminate undifferentiated cells include the use of molecules or antibody-toxin conjugates that selectively kill undifferentiated PSCs. In all cases, PSC-derived and sorted cells will need to be tested for residual tumor generating cells. The current approach, teratoma formation assay in immunocompromised mice, may not be sensitive enough to detect low level PSC contamination and may not recapitulate all the unique biological contexts of different transplantation sites (reviewed in [50]). Given these limitations, the development of additional in vitro and in vivo techniques that detect residual undifferentiated cells will be critical. While there is little evidence for malignant cell types arising from PSCs, this is something that needs to be fully investigated using animal models.
The ideal β–cell transplantation site would be one that supports the long-term function and survival of grafted cells and is easily accessible for maximal patient safety (for review see [51]). Current clinical practice is to transplant islets into the liver via the portal vein, with the rationale that the majority of insulin released from the pancreas is utilized in the liver and the easy accessibility of this site by a minimally invasive procedure. However, half of the beta-cells die shortly after transplantation [52], and this is thought to be due to low oxygen tension, an active immune response, and high levels of toxins and drugs in the liver. In addition, the instant blood mediated inflammatory reaction (IBMIR) encapsulates transplanted islets in a fibrin clot and enhances the immune reaction against the graft [53]. Therefore, several alternative sites for islet transplantation have been tested including the kidney capsule, omentum, and subcutaneous, which may be best for patient safety but not ideal from a functional perspective due to systemic release of insulin [53]. An improved understanding of the optimal anatomical sites for islet transplant is important for enhancing the survival and function of islet or PSC-derived β-cells following transplantation.
Despite reports that hESCs and their differentiated progeny may be non-immunogenic [54, 55], recent studies have documented the development of immune responses against transplanted hESC-derived tissues in immune competent mice [56, 57]. Therefore, patients receiving allogeneic hESC-derived β–cells will require life-long immunosuppressive therapy to prevent graft rejection. Additionally, almost all commonly used immunosuppressive drugs are deleterious to β–cell function, replication and survival [58]. Furthermore, although the evolution of induced pluripotent stem cell (iPSC) technology is a promising strategy for generating autologous, patient-specific β–cells (as discussed below), even autologous transplantation for type I diabetes will require the suppression of the preexisting autoimmunity. One promising treatment approach for combating autoimmunity is the use of targeted immunotherapies such as CD3-specific antibodies for induction of long-term tolerance to auto-antigens [59].
In the case of transplant of allogeneic PSC-derived β–cells, several strategies to minimize or eliminate the requirement for immunosuppression are under investigation, including microencapsulation techniques to protect grafted tissues from the immune system (reviewed by [60]), and transplantation of cells into immune privileged sites such as the anterior chamber of the eye or the testis. However, recent studies have demonstrated rejection of islets transplanted in the testis of immunocompetent mice [61, 62], indicating that this approach may still require immunosuppression. Furthermore, it is unclear whether these locations will meet the requirements for β–cell transplantation sites discussed above.
Another strategy would be to generate large banks of hESCs for the purpose of matching their HLA-phenotype to recipient transplant patients. This would require generating hundreds to potentially thousands of discrete HLA-typed hESC lines to ensure adequate matching for most individuals [63, 64]. This approach would require enormous regulatory oversight and stringent quality control analyses to test for pluripotency and that each line is competent to generate functional β–cells before it could be widely used for cell replacement therapies [65].
The discovery that human somatic cells can be reprogrammed into an embryonic stem cell-like state that appears to be phenotypically and functionally equivalent to hESCs represents a seminal moment for regenerative medicine [66, 67]. Induced pluripotent stem cells (iPSCs) may be an ideal source for cell replacement therapies because they can be derived from patients, including those with diabetes [68, 69], and eventually used to generate autologous therapeutic β-cells for transplantation (FIGURE 1). In fact two recent studies describe the generation of insulin producing cells from human iPSCs, supporting the feasibility of this approach to generate patient-specific β-cells for autologous transplantation [23, 69].
Original protocols for human iPSC generation employed the retroviral or lentiviral-mediated expression of four transcription factors involved in stem cell pluripotency [66, 67]. This approach is not suitable for generation of therapeutic quality cells because of risks from insertional mutagenesis and the use of the oncogene cMyc, which caused tumorigenesis in chimeric mice derived from these cells [66, 67]. Subsequent studies have reported iPSC generation using non-integrating methods of gene delivery such as plasmid transfection [70], episomal plasmid transfection [71], the piggyBac transposon system [72], adenoviral transduction [73, 74], Cre-excisable viral vectors [75, 76], and most recently by direct introduction of membrane soluble reprogramming factor proteins [77, 78]. With proper, rigorous quality controls [48] and the rapid advances in iPSC technology it is likely that iPSCs will factor heavily into future efforts for cell replacement therapy for diabetes.
There has been significant progress in our understanding of normal pancreas development and this information has been central to recent successes at directing the differentiation of PSCs to β-cells in vitro [79]. Further research, particularly into mechanisms of β-cell maturation in vivo, will likely prove essential for generation of glucose-responsive, mature β-cells suitable for cell replacement therapy for diabetes. Continued advances in establishing GMP-compliant protocols, enhanced transplantation techniques, and methods for regulation of the immune response will also factor into the success of these endeavors. Moreover, rapid progress in induced pluripotent stem cell technology is likely to prove transformational in future efforts in generating patient-specific β-cells.
Acknowledgments
We apologize to our colleagues whose work we could not include due to space constraints. We are grateful to the Wells and Zorn labs for discussions, and to Jason Spence and Suh-Chin Lin for comments on the manuscript. JMW and CNM are supported by grants from the NIH (NIGMS and NIDDK) and Juvenile Diabetes Research Foundation (JDRF).
Footnotes
The authors have no financial conflicts.
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final citable form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
[1] Narayan KM, Boyle JP, Geiss LS, Saaddine JB, Thompson TJ. Impact of recent increase in incidence on future diabetes burden: U.S., 2005-2050. Diabetes care. 2006 Sep;29(9):2114–6. [PubMed]
[2] The Diabetes Control and Complications Trial Research Group The effect of intensive treatment of diabetes on the development and progression of long-term complications in insulin-dependent diabetes mellitus. The New England journal of medicine. 1993 Sep 30;329(14):977–86. [PubMed]
[3] Sherr J, Tamborlane WV. The Mount Sinai journal of medicine, New York. 4. Vol. 75. Aug, 2008. Past, present, and future of insulin pump therapy: better shot at diabetes control; pp. 352–61. [PMC free article] [PubMed]
[4] Nanji SA, Shapiro AM. Advances in pancreatic islet transplantation in humans. Diabetes, obesity & metabolism. 2006 Jan;8(1):15–25. [PubMed]
[5] Shapiro AM, Lakey JR, Ryan EA, Korbutt GS, Toth E, Warnock GL, et al. Islet transplantation in seven patients with type 1 diabetes mellitus using a glucocorticoid-free immunosuppressive regimen. The New England journal of medicine. 2000 Jul 27;343(4):230–8. [PubMed]
[6] Thomson JA, Itskovitz-Eldor J, Shapiro SS, Waknitz MA, Swiergiel JJ, Marshall VS, et al. Embryonic stem cell lines derived from human blastocysts. Science. 1998 Nov 6;282(5391):1145–7. [PubMed]
[7] Wells JM. Genes expressed in the developing endocrine pancreas and their importance for stem cell and diabetes research. Diabetes Metab Res Rev. 2003;19:191–201. [PubMed]
[8] Wells JM, Melton DA. Vertebrate endoderm development. Annu Rev Cell Dev Biol. 1999;15:393–410. [PubMed]
[9] Soria B, Roche E, Berna G, Leon-Quinto T, Reig JA, Martin F. Insulin-secreting cells derived from embryonic stem cells normalize glycemia in streptozotocin-induced diabetic mice. Diabetes. 2000;49(2):157–62. [PubMed]
[10] Assady S, Maor G, Amit M, Itskovitz-Eldor J, Skorecki KL, Tzukerman M. Insulin production by human embryonic stem cells. Diabetes. 2001 Aug;50(8):1691–7. [PubMed]
[11] Segev H, Fishman B, Ziskind A, Shulman M, Itskovitz-Eldor J. Differentiation of human embryonic stem cells into insulin-producing clusters. Stem Cells. 2004;22(3):265–74. [PubMed]
[12] Lumelsky N, Blondel O, Laeng P, Velasco I, Ravin R, McKay R. Differentiation of embryonic stem cells to insulin-secreting structures similar to pancreatic islets. Science. 2001;292(5520):1389–94. [PubMed]
[13] Blyszczuk P, Czyz J, Kania G, Wagner M, Roll U, St-Onge L, et al. Expression of Pax4 in embryonic stem cells promotes differentiation of nestin-positive progenitor and insulin-producing cells. Proceedings of the National Academy of Sciences of the United States of America. 2003;100(3):998–1003. [PubMed]
[14] Levinson-Dushnik M, Benvenisty N. Involvement of hepatocyte nuclear factor 3 in endoderm differentiation of embryonic stem cells. Mol Cell Biol. 1997;17(7):3817–22. [PMC free article] [PubMed]
[15] Vincent R, Treff N, Budde M, Kastenberg Z, Odorico J. Generation and characterization of novel tetracycline-inducible pancreatic transcription factor-expressing murine embryonic stem cell lines. Stem Cells & Development. 2006;15(6):953–62. [PubMed]
[16] Jiang J, Au M, Lu K, Eshpeter A, Korbutt G, Fisk G, et al. Generation of insulin-producing islet-like clusters from human embryonic stem cells. Stem Cells. 2007 Aug;25(8):1940–53. [PubMed]
[17] Jiang W, Shi Y, Zhao D, Chen S, Yong J, Zhang J, et al. In vitro derivation of functional insulin-producing cells from human embryonic stem cells. Cell Res. 2007 April;17(4):333–44. [PubMed]
[18] Phillips BW, Hentze H, Rust WL, Chen QP, Chipperfield H, Tan EK, et al. Directed differentiation of human embryonic stem cells into the pancreatic endocrine lineage. Stem cells and development. 2007 Aug;16(4):561–78. [PubMed]
[19] Shim JH, Kim SE, Woo DH, Kim SK, Oh CH, McKay R, et al. Directed differentiation of human embryonic stem cells towards a pancreatic cell fate. Diabetologia. 2007 Jun;50(6):1228–38. [PubMed]
[20] D’Amour KA, Agulnick AD, Eliazer S, Kelly OG, Kroon E, Baetge EE. Efficient differentiation of human embryonic stem cells to definitive endoderm. Nat Biotechnol. 2005 Oct 28;23:1534–41. [PubMed]
[21] D’Amour KA, Bang AG, Eliazer S, Kelly OG, Agulnick AD, Smart NG, et al. Production of pancreatic hormone-expressing endocrine cells from human embryonic stem cells. Nat Biotechnol. 2006 Nov;24(11):1392–401. [PubMed]
*[22] Kroon E, Martinson LA, Kadoya K, Bang AG, Kelly OG, Eliazer S, et al. Pancreatic endoderm derived from human embryonic stem cells generates glucose-responsive insulin-secreting cells in vivo. Nat Biotechnol. 2008 Feb 20; [PubMed]This work demonstrated that developmental principles can be used to direct formation of pancreatic endocrine cells from human ES cells that could restore euglycemia in diabetic mice
*[23] Zhang D, Jiang W, Liu M, Sui X, Yin X, Chen S, et al. Highly efficient differentiation of human ES cells and iPS cells into mature pancreatic insulin-producing cells. Cell research. 2009 Apr;19(4):429–38. [PubMed]In this paper, human iPSCs were differentiated into hormone expressing cells with several functional properties of β-cells.
[24] Spence JR, Wells JM. Translational embryology: Using embryonic principles to generate pancreatic endocrine cells from embryonic stem cells. Developmental Dynamics. 2007;236(5):3218–27. [PubMed]
[25] Gittes GK. Developmental biology of the pancreas: a comprehensive review. Dev Biol. 2009 Feb 1;326(1):4–35. [PubMed]
[26] Murtaugh LC. Pancreas and beta-cell development: from the actual to the possible. Development. 2007 Feb;134(3):427–38. [PubMed]
[27] Zorn AM, Wells JM. Molecular basis of vertebrate endoderm development. Int Rev Cytol. 2007;259:49–111. [PubMed]
[28] Gamer LW, Wright CV. Autonomous endodermal determination in Xenopus: regulation of expression of the pancreatic gene XlHbox 8. Dev Biol. 1995 Sep;171(1):240–51. [PubMed]
[29] Henry GL, Brivanlou IH, Kessler DS, Hemmati-Brivanlou A, Melton DA. TGF-beta signals and a pre-pattern in Xenopus laevis endoderm development. Development. 1996;122:1007–15. [PubMed]
[30] Green JB, Smith JC. Graded changes in dose of a Xenopus activin A homologue elicit stepwise transitions in embryonic cell fate. Nature. 1990 Sep 27;347(6291):391–4. [PubMed]
[31] Thomsen G, Woolf T, Whitman M, Sokol S, Vaughan J, Vale W, et al. Activins are expressed early in Xenopus embryogenesis and can induce axial mesoderm and anterior structures. Cell. 1990;63:485–93. [PubMed]
[32] Jung J, Zheng M, Goldfarb M, Zaret KS. Initiation of mammalian liver development from endoderm by fibroblast growth factors. Science. 1999 Jun 18;284(5422):1998–2003. [PubMed]
[33] Molotkov A, Molotkova N, Duester G. Retinoic acid generated by Raldh2 in mesoderm is required for mouse dorsal endodermal pancreas development. Dev Dyn. 2005 Apr;232(4):950–7. [PubMed]
[34] Rossi JM, Dunn NR, Hogan BL, Zaret KS. Distinct mesodermal signals, including BMPs from the septum transversum mesenchyme, are required in combination for hepatogenesis from the endoderm. Genes Dev. 2001 Aug 1;15(15):1998–2009. [PubMed]
[35] Wang Z, Dolle P, Cardoso W, Niederreither K. Retinoic acid regulates morphogenesis and patterning of posterior foregut derivatives. Dev Biol. 2006 [PubMed]
[36] Hebrok M, Kim SK, Melton DA. Notochord repression of endodermal Sonic hedgehog permits pancreas development. Genes Dev. 1998 Jun 1;12(11):1705–13. [PubMed]
[37] Bhushan A, Itoh N, Kato S, Thiery JP, Czernichow P, Bellusci S, et al. Fgf10 is essential for maintaining the proliferative capacity of epithelial progenitor cells during early pancreatic organogenesis. Development. 2001 Dec;128(24):5109–17. [PubMed]
[38] Apelqvist A, Li H, Sommer L, Beatus P, Anderson DJ, Honjo T, et al. Notch signalling controls pancreatic cell differentiation. Nature. 1999;400(6747):877–81. [PubMed]
[39] Gu G, Dubauskaite J, Melton DA. Direct evidence for the pancreatic lineage: NGN3+ cells are islet progenitors and are distinct from duct progenitors. Development. 2002;129(10):2447–57. [PubMed]
[40] Miettinen PJ, Huotari M, Koivisto T, Ustinov J, Palgi J, Rasilainen S, et al. Impaired migration and delayed differentiation of pancreatic islet cells in mice lacking EGF-receptors. Development. 2000 Jun;127(12):2617–27. [PubMed]
[41] Burris RE, Hebrok M. Pancreatic innervation in mouse development and beta-cell regeneration. Neuroscience. 2007 Dec 12;150(3):592–602. [PMC free article] [PubMed]
[42] Kanaka-Gantenbein C, Dicou E, Czernichow P, Scharfmann R. Presence of nerve growth factor and its receptors in an in vitro model of islet cell development: implication in normal islet morphogenesis. Endocrinology. 1995 Jul;136(7):3154–62. [PubMed]
[43] Navarro-Tableros V, Fiordelisio T, Hernandez-Cruz A, Hiriart M. Nerve growth factor promotes development of glucose-induced insulin secretion in rat neonate pancreatic beta cells by modulating calcium channels. Channels (Austin, Tex. 2007 Nov-Dec;1(6):408–16. [PubMed]
[44] Zaret KS. Using small molecules to great effect in stem cell differentiation. Cell Stem Cell. 2009 May 8;4(5):373–4. [PubMed]
*[45] Borowiak M, Maehr R, Chen S, Chen AE, Tang W, Fox JL, et al. Small molecules efficiently direct endodermal differentiation of mouse and human embryonic stem cells. Cell Stem Cell. 2009 Apr 3;4(4):348–58. [PubMed]This work describes the discovery of small molecules that can direct PSC differentiation into definitive endoderm.
*[46] Chen S, Borowiak M, Fox JL, Maehr R, Osafune K, Davidow L, et al. A small molecule that directs differentiation of human ESCs into the pancreatic lineage. Nature chemical biology. 2009 Apr;5(4):258–65. [PubMed]This work describes the discovery of small molecules that can direct PSC-derived definitive endoderm differentiation into pancreatic endoderm.
[47] Zhu S, Wurdak H, Wang J, Lyssiotis CA, Peters EC, Cho CY, et al. A small molecule primes embryonic stem cells for differentiation. Cell Stem Cell. 2009 May 8;4(5):416–26. [PubMed]
[48] Carpenter MK, Frey-Vasconcells J, Rao MS. Developing safe therapies from human pluripotent stem cells. Nat Biotechnol. 2009 Jul;27(7):606–13. [PubMed]
[49] Chung S, Shin BS, Hedlund E, Pruszak J, Ferree A, Kang UJ, et al. Genetic selection of sox1GFP-expressing neural precursors removes residual tumorigenic pluripotent stem cells and attenuates tumor formation after transplantation. J Neurochem. 2006 Jun;97(5):1467–80. [PMC free article] [PubMed]
[50] Knoepfler PS. Deconstructing stem cell tumorigenicity: a roadmap to safe regenerative medicine. Stem Cells. 2009 May;27(5):1050–6. [PMC free article] [PubMed]
[51] Merani S, Toso C, Emamaullee J, Shapiro AM. Optimal implantation site for pancreatic islet transplantation. The British journal of surgery. 2008 Dec;95(12):1449–61. [PubMed]
[52] Fiorina P, Shapiro AM, Ricordi C, Secchi A. The clinical impact of islet transplantation. Am J Transplant. 2008 Oct;8(10):1990–7. [PubMed]
[53] van der Windt DJ, Echeverri GJ, Ijzermans JN, Cooper DK. The choice of anatomical site for islet transplantation. Cell Transplant. 2008;17(9):1005–14. [PubMed]
[54] Drukker M, Katchman H, Katz G, Even-Tov Friedman S, Shezen E, Hornstein E, et al. Human embryonic stem cells and their differentiated derivatives are less susceptible to immune rejection than adult cells. Stem Cells. 2006 Feb;24(2):221–9. [PubMed]
[55] Li L, Baroja ML, Majumdar A, Chadwick K, Rouleau A, Gallacher L, et al. Human embryonic stem cells possess immune-privileged properties. Stem Cells. 2004;22(4):448–56. [PubMed]
[56] Grinnemo KH, Kumagai-Braesch M, Mansson-Broberg A, Skottman H, Hao X, Siddiqui A, et al. Human embryonic stem cells are immunogenic in allogeneic and xenogeneic settings. Reproductive biomedicine online. 2006 Nov;13(5):712–24. [PubMed]
[57] Swijnenburg RJ, Schrepfer S, Govaert JA, Cao F, Ransohoff K, Sheikh AY, et al. Immunosuppressive therapy mitigates immunological rejection of human embryonic stem cell xenografts. Proc Natl Acad Sci U S A. 2008 Sep 2;105(35):12991–6. [PubMed]
[58] Robertson RP. Islet transplantation as a treatment for diabetes - a work in progress. The New England journal of medicine. 2004 Feb 12;350(7):694–705. [PubMed]
[59] Chatenoud L, Bluestone JA. CD3-specific antibodies: a portal to the treatment of autoimmunity. Nature reviews. 2007 Aug;7(8):622–32. [PubMed]
[60] Fort A, Fort N, Ricordi C, Stabler CL. Biohybrid devices and encapsulation technologies for engineering a bioartificial pancreas. Cell Transplant. 2008;17(9):997–1003. [PubMed]
[61] Nasr IW, Wang Y, Gao G, Deng S, Diggs L, Rothstein DM, et al. Testicular immune privilege promotes transplantation tolerance by altering the balance between memory and regulatory T cells. J Immunol. 2005 May 15;174(10):6161–8. [PubMed]
[62] Schneider M, Barrou B, Morin S, Bitker MO, Debre P, Richard F. Pancreatic islet transplantation: failure to prolong intratesticular islet allograft survival. Transplantation proceedings. 2000 Dec;32(8):2739. [PubMed]
[63] Rao MS, Auerbach JM. Estimating human embryonic stem-cell numbers. Lancet. 2006 Feb 25;367(9511):650. [PubMed]
[64] Taylor CJ, Bolton EM, Pocock S, Sharples LD, Pedersen RA, Bradley JA. Banking on human embryonic stem cells: estimating the number of donor cell lines needed for HLA matching. Lancet. 2005 Dec 10;366(9502):2019–25. [PubMed]
[65] Osafune K, Caron L, Borowiak M, Martinez RJ, Fitz-Gerald CS, Sato Y, et al. Marked differences in differentiation propensity among human embryonic stem cell lines. Nat Biotechnol. 2008 Mar;26(3):313–5. [PubMed]
[66] Takahashi K, Tanabe K, Ohnuki M, Narita M, Ichisaka T, Tomoda K, et al. Induction of pluripotent stem cells from adult human fibroblasts by defined factors. Cell. 2007 Nov 30;131(5):861–72. [PubMed]
[67] Yu J, Vodyanik MA, Smuga-Otto K, Antosiewicz-Bourget J, Frane JL, Tian S, et al. Induced pluripotent stem cell lines derived from human somatic cells. Science. 2007 Dec 21;318(5858):1917–20. [PubMed]
*[68] Park IH, Arora N, Huo H, Maherali N, Ahfeldt T, Shimamura A, et al. Disease-specific induced pluripotent stem cells. Cell. 2008 Sep 5;134(5):877–86. [PubMed]This was the first reported evidence that human somatic cells isolated from patients with common diseases could be reprogrammed into pluripotent stem cells.
[69] Maehr R, Chen S, Snitow M, Ludwig T, Yagasaki L, Goland R, et al. Generation of pluripotent stem cells from patients with type 1 diabetes. Proc Natl Acad Sci U S A. 2009 Aug 31; [PubMed]
*[70] Okita K, Nakagawa M, Hyenjong H, Ichisaka T, Yamanaka S Generation of mouse induced pluripotent stem cells without viral vectors. Science. 2008;322(5903):949–53. [PubMed]In this work, plasmid transfection was used to generate iPSCs, demonstrating that reprogramming could be done safely without the use of DNA-integration.
[71] Yu J, Hu K, Smuga-Otto K, Tian S, Stewart R, Slukvin II, et al. Human induced pluripotent stem cells free of vector and transgene sequences. Science. 2009 May 8;324(5928):797–801. [PMC free article] [PubMed]
[72] Woltjen K, Michael IP, Mohseni P, Desai R, Mileikovsky M, Hamalainen R, et al. piggyBac transposition reprograms fibroblasts to induced pluripotent stem cells. Nature. 2009 Apr 9;458(7239):766–70. [PMC free article] [PubMed]
*[73] Stadtfeld M, Nagaya M, Utikal J, Weir G, Hochedlinger K Induced pluripotent stem cells generated without viral integration. Science. 2008 Nov 7;322(5903):945–9. [PubMed]In this work, adenoviral vectors were used to generate iPSCs, demonstrating that reprogramming could be done safely without the use of DNA-integrating viruses.
[74] Zhou W, Freed CR. Adenoviral Gene Delivery Can Reprogram Human Fibroblasts to Induced Pluripotent Stem Cells. Stem Cells. 2009 Aug 20; [PubMed]
[75] Chang CW, Lai YS, Pawlik KM, Liu K, Sun CW, Li C, et al. Polycistronic lentiviral vector for “hit and run” reprogramming of adult skin fibroblasts to induced pluripotent stem cells. Stem Cells. 2009 May;27(5):1042–9. [PubMed]
*[76] Soldner F, Hockemeyer D, Beard C, Gao Q, Bell GW, Cook EG, et al. Parkinson’s disease patient-derived induced pluripotent stem cells free of viral reprogramming factors. Cell. 2009 Mar 6;136(5):964–77. [PubMed]These findings represent an important translational advance because they demonstrate the feasibility of deriving patient-specific iPSCs that are free of integrated reprogramming factors yet maintain the ability to differentiate into neurons.
*[77] Kim D, Kim CH, Moon JI, Chung YG, Chang MY, Han BS, et al. Generation of human induced pluripotent stem cells by direct delivery of reprogramming proteins. Cell Stem Cell. 2009 Jun 5;4(6):472–6. [PubMed]This report describes a DNA-free approach to reprogram human somatic cells using a protein transduction-based system.
[78] Zhou H, Wu S, Joo JY, Zhu S, Han DW, Lin T, et al. Generation of induced pluripotent stem cells using recombinant proteins. Cell Stem Cell. 2009 May 8;4(5):381–4. [PubMed]
[79] Baetge EE. Production of beta-cells from human embryonic stem cells. Diabetes, obesity & metabolism. 2008 Nov;10(Suppl 4):186–94. [PubMed]
|
Can JotForm be used offline?
• Profile Image
Benflips
Asked on November 12, 2015 at 03:24 AM
7b - Is there any way the data captured can be manipulated in an event where we have no connection to the internet? Eg. Can there be some way to locally store the form either on a tablet or laptop so that submissions can be made at the last minute (and added to the summary sheets, ideally), if we are in an un-servicable location?
• Profile Image
EltonCris
Answered on November 12, 2015 at 09:11 AM
Yes, Jotform can be used offline by creating a fillable PDF of your form. http://www.jotform.com/fillable-pdf-form-creator/
You can save the PDF after it's filled on your tablet or laptop then submit it later when you are connected to the internet. You can submit the form by clicking the submit button in the PDF.
If you have further questions, do let us know. Thanks!
|
Human blood consists of blood cells (red blood cells, white blood cells, and platelets) and electrolytes (sodium, potassium, calcium ions).
Some diseases change electrolytes concentration like Cushing disease cause hypernatremia while Addison disease causes hyponatremia.
hyperkalemia, hypokalemia causes
Some diseases alter the potassium level and cause hyponatremia or hypernatremia.
Hypokalemia is defined as “a deficiency of potassium ions in the blood“. There are many causes of the deficiency of potassium.
What are the causes of hypokalemia?
Following are the causes of hypokalemia.
1. Loss of potassium from the body causes hypokalemia
1. Prolong vomiting
2. Diarrhea
3. Hyperaldosteronism (secondary)
4. Hyperaldosteronism
5. Cushing syndrome
6. Renal tubular acidosis
7. Renal tubular failure
8. Carbonoxolone therapy
9. Fanconi syndrome
2. Due to reduce intake: Chronic starvation
3. Re-distribution in the body
1. Alkalosis
2. Insulin and glucose therapy
3. Familial periodic acidosis
What is hyperkalemia cause?
Hyper means “more” and kalemia means “potassium“. Increase in concentration of potassium ions level in the body.
Following are the causes of hyperkalemia.
• Gain of potassium to the body
1. Overenthusiastic potassium therapy
2. Not stopping therapy after correction.
• Renal Secretion failure
1. Diuretic working on the distal tubules, spironolactone, amiloride, and triamterene.
2. Hypoaldosteronesim
3. Renal failure
• Redistribution in the body
1. Severe tissue damage
2. Hypoxia
3. Acidosis
4. Diabetic keto-acidosis
5. Shock
Leave a Reply
Your email address will not be published.
|
{ "cells": [ { "cell_type": "markdown", "metadata": {}, "source": [ "# Welding Example #01: Basics\n", "The goal of this small example is to introduce the main functionalities and interfaces to create and describe a simple welding application using the WelDX package." ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Imports" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "nbsphinx": "hidden" }, "outputs": [], "source": [ "# enable interactive plots on Jupyterlab with ipympl and jupyterlab-matplotlib installed\n", "# %matplotlib widget" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "import numpy as np\n", "import pandas as pd\n", "\n", "from weldx import (\n", " Q_,\n", " CoordinateSystemManager,\n", " Geometry,\n", " LinearHorizontalTraceSegment,\n", " LocalCoordinateSystem,\n", " Trace,\n", " WeldxFile,\n", " WXRotation,\n", " get_groove,\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## create a simple welding groove shape\n", "We start of defining our welding application example by defining the base groove shape. For this examples we assume the groove shape to be constant along the entire workpiece.\n", "\n", "The groove shall have the following attributes:\n", "\n", "- a workpiece thickness of 5 mm\n", "- a single sided V-Groove but weld with 50 degree groove angle\n", "- root gap and face of 1 mm\n", "\n", "To generate the groove shape, we can use the `get_groove` function of the of `iso_groove` that implements all groove types and shapes defined in *ISO 9692-1:2013*. For all available groove types and options take a look at the extensive docstring of `get_groove` and the groove_type tutorial notebook.\n", "\n", "Be aware that we must pass along all groove parameters as Quantities with a specified unit using the default `Q_` type imported above. All units are automatically converted to SI units for most mathematical operations in the background so we can specify parameters in any appropriate unit we desire." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "groove = get_groove(\n", " groove_type=\"VGroove\",\n", " workpiece_thickness=Q_(5, \"mm\"),\n", " groove_angle=Q_(50, \"deg\"),\n", " root_face=Q_(1, \"mm\"),\n", " root_gap=Q_(1, \"mm\"),\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Using the `plot` function of the created groove instance gives a quick overview of the created geometry." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "groove.plot(raster_width=\"0.2mm\")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## create 3d workpiece geometry\n", "Once we have created our desired 2d groove shape, we can simply extend the groove shape into 3d-space to create a volumetric workpiece.\n", "\n", "To do this, two steps are missing:\n", "\n", "1. we have to decide on a weld seam length first (we will use 300 mm in this example)\n", "2. create a trace object that defines the path of our element through space. (we use a simple linear trace in this example)" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# define the weld seam length in mm\n", "seam_length = Q_(300, \"mm\")\n", "\n", "# create a linear trace segment a the complete weld seam trace\n", "trace_segment = LinearHorizontalTraceSegment(seam_length)\n", "trace = Trace(trace_segment)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Once we have defined the trace object, we can create the workpiece geometry by combining the groove profile with the trace." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# create 3d workpiece geometry from the groove profile and trace objects\n", "geometry = Geometry(groove.to_profile(width_default=Q_(5, \"mm\")), trace)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "To visualize the geometry we simply call its `plot` function. Since it internally rasterizes the data, we need to provide the raster widths:" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# rasterize geometry\n", "profile_raster_width = \"2mm\" # resolution of each profile in mm\n", "trace_raster_width = \"30mm\" # space between profiles in mm" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Here is the plot:" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "nbsphinx": "hidden" }, "outputs": [], "source": [ "def ax_setup(ax):\n", " ax.legend()\n", " ax.set_xlabel(\"x / mm\")\n", " ax.set_ylabel(\"y / mm\")\n", " ax.set_zlabel(\"z / mm\")\n", " ax.view_init(30, -10)\n", " ax.set_ylim([-5.5, 5.5])\n", " ax.set_zlim([0, 13])\n", "\n", "\n", "color_dict = {\n", " \"tcp_contact\": (255, 0, 0),\n", " \"tcp_wire\": (0, 150, 0),\n", " \"T1\": (255, 0, 150),\n", " \"T2\": (255, 150, 150),\n", " \"T3\": (255, 150, 0),\n", " \"specimen\": (0, 0, 255),\n", "}" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "ax = geometry.plot(\n", " profile_raster_width,\n", " trace_raster_width,\n", " color=color_dict[\"specimen\"],\n", " show_wireframe=True,\n", " label=\"groove\",\n", ")\n", "ax_setup(ax)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Setup the Coordinate System Manager (CSM)\n", "Once we have created the 3d geometry it is now time to describe the movement of the wire during the welding process. To handle different moving coordinate systems and objects we use the CoordinateSystemManager.\n", "\n", "Start by creating a new instance of the CSM. When setting up a CSM instance we have to supply a name that indicates the reference coordinate system which is a static Cartesian coordinate system that defines an origin." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# crete a new coordinate system manager with default base coordinate system\n", "csm = CoordinateSystemManager(\"base\")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "The trace we created earlier to extend the groove shape into 3d has its own associated coordinate system that starts in the origin of the groove (see point (0,0) in our first plot of the groove profile) and has the x-axis running along the direction of the weld seam by convention.\n", "\n", "We simply add the trace coordinate system to our coordinate system manager defining it as the *workpiece* coordinate system." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# add the workpiece coordinate system\n", "csm.add_cs(\n", " coordinate_system_name=\"workpiece\",\n", " reference_system_name=\"base\",\n", " lcs=trace.coordinate_system,\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Now that we have added the workpiece coordinate system to the CSM, we can attach a rasterized representation of our geometry to it:" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "csm.assign_data(\n", " geometry.spatial_data(profile_raster_width, trace_raster_width),\n", " \"specimen\",\n", " \"workpiece\",\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## generate the tcp movement of the wire tip" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "For this example, we want the tip of the wire (i.e. the robot TCP during welding) to move along the center of the groove at 2 mm from the bottom of the workpiece with a speed of 10 mm/s.\n", "\n", "We begin by defining the start and end points relative to our workpiece coordinate system. Note that the z-axis of the workpiece coordinate system is pointing upwards (see Figure 1). Hence we use a positive offset of 2 mm in z direction from our workpiece. For the x-axis we start the weld 5 mm into the weldseam and 5 mm before reaching the end of the weldseam." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "tcp_start_point = Q_([5.0, 0.0, 2.0], \"mm\")\n", "tcp_end_point = Q_([-5.0, 0.0, 2.0], \"mm\") + np.append(seam_length, Q_([0, 0], \"mm\"))" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "To completely describe the TCP movement in space __and__ time we need to supply time information for the start and end point. Lets say the weld starts on 2020-04-20 10:00:00. We calculate the time" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "v_weld = Q_(10, \"mm/s\")\n", "s_weld = (tcp_end_point - tcp_start_point)[0] # length of the weld\n", "t_weld = s_weld / v_weld\n", "\n", "t_start = pd.Timedelta(\"0s\")\n", "t_end = pd.Timedelta(str(t_weld.to_base_units()))" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "The two points and timestamps are enough to create the linear moving coordinate system. We can interpolate the movement with a higher resolution later." ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "The orientation of the wire has the z coordinate facing downwards towards the workpiece. The workpiece z-coordinate is facing upwards. We add a constant 180 degree rotation around the x-axis to orientate the wire coordinate system correctly. Orientations can be described using the scipy Rotation objects" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "rot = WXRotation.from_euler(seq=\"x\", angles=180, degrees=True)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "With the defined coordinates, the constant orientation and the associated times we can create the coordinate system for the wire tcp." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "coords = np.stack([tcp_start_point, tcp_end_point])\n", "\n", "tcp_wire = LocalCoordinateSystem(\n", " coordinates=coords, orientation=rot, time=[t_start, t_end]\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Add the new coordinate system to the coordinate system manager relative to the workpiece." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# add the workpiece coordinate system\n", "csm.add_cs(\n", " coordinate_system_name=\"tcp_wire\",\n", " reference_system_name=\"workpiece\",\n", " lcs=tcp_wire,\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "Lets say The wire extends 10 mm from the contact tip. We can add the contact tip as another point using the coordinate system manager. To simplify things we now use the _tcp_wire_ coordinate system as reference. All we need to add is the z-offset along the wire. Note that we have to provide a negative offset along the z-axis since the _wire-tcp_ z-axis is pointing downwards." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "tcp_contact = LocalCoordinateSystem(coordinates=Q_([0, 0, -10], \"mm\"))" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# add the workpiece coordinate system\n", "csm.add_cs(\n", " coordinate_system_name=\"tcp_contact\",\n", " reference_system_name=\"tcp_wire\",\n", " lcs=tcp_contact,\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "We can create a simple plot of the relations between our our coordinate systems" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "csm" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## plot the TCP trajectory\n", "To examine the movement of our wire TCP and contact tip, lets create a simple plot. We only have a linear movement so we don't have to add additional timestamps to the moving coordinate systems to increase the resolution of the traces." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "ax = csm.plot(\n", " coordinate_systems=[\"tcp_contact\", \"tcp_wire\"],\n", " colors=color_dict,\n", " show_vectors=False,\n", " show_wireframe=True,\n", ")\n", "ax_setup(ax)" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## Add static temperature measurement points\n", "With everything setup we can now start adding some measurements with associated points in space. We add a temperature measurements __T1, T2, T3__ to the surface of the weld seam." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "# add the workpiece coordinate system\n", "csm.add_cs(\"T1\", \"workpiece\", LocalCoordinateSystem(coordinates=Q_([200, 3, 5], \"mm\")))\n", "csm.add_cs(\"T2\", \"T1\", LocalCoordinateSystem(coordinates=Q_([0, 1, 0], \"mm\")))\n", "csm.add_cs(\"T3\", \"T2\", LocalCoordinateSystem(coordinates=Q_([0, 1, 0], \"mm\")))" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "ax = csm.plot(\n", " coordinate_systems=[\"tcp_contact\", \"tcp_wire\", \"T1\", \"T2\", \"T3\"],\n", " reference_system=\"workpiece\",\n", " colors=color_dict,\n", " show_vectors=False,\n", " show_wireframe=True,\n", ")\n", "ax_setup(ax)" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "csm" ] }, { "cell_type": "markdown", "metadata": { "nbsphinx": "hidden" }, "source": [ "## K3D Visualization" ] }, { "cell_type": "code", "execution_count": null, "metadata": { "nbsphinx": "hidden" }, "outputs": [], "source": [ "csm.plot(\n", " backend=\"k3d\",\n", " coordinate_systems=[\"tcp_contact\", \"tcp_wire\", \"T1\", \"T2\", \"T3\"],\n", " colors=color_dict,\n", " limits=(0, 0, 0, 300, 100, 100),\n", " show_vectors=False,\n", " show_traces=True,\n", " show_data_labels=False,\n", " show_labels=False,\n", " show_origins=True,\n", ")" ] }, { "cell_type": "markdown", "metadata": {}, "source": [ "## using ASDF\n", "Now we write all of our structured data to an ASDF file and have a look at the ASDF header." ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "tree = {\"workpiece\": {\"groove\": groove, \"length\": seam_length}, \"CSM\": csm}" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "file = WeldxFile(tree=tree, mode=\"rw\")" ] }, { "cell_type": "code", "execution_count": null, "metadata": {}, "outputs": [], "source": [ "file.header()" ] } ], "metadata": { "kernelspec": { "display_name": "", "language": "python", "name": "" }, "language_info": { "codemirror_mode": { "name": "ipython", "version": 3 }, "file_extension": ".py", "mimetype": "text/x-python", "name": "python", "nbconvert_exporter": "python", "pygments_lexer": "ipython3", "version": "3.8.12" } }, "nbformat": 4, "nbformat_minor": 4 }
|
Aerosow
From Wikipedia, de free encycwopedia
Jump to: navigation, search
Mist and cwouds are aerosows.
An aerosow is a cowwoid of fine sowid particwes or wiqwid dropwets, in air or anoder gas.[1] Aerosows can be naturaw or andropogenic. Exampwes of naturaw aerosows are fog, forest exudates and geyser steam. Exampwes of artificiaw aerosows are haze, dust, particuwate air powwutants and smoke.[1] The wiqwid or sowid particwes have diameter mostwy smawwer dan 1 μm or so; warger particwes wif a significant settwing speed make de mixture a suspension, but de distinction is not cwear-cut. In generaw conversation, aerosow usuawwy refers to an aerosow spray dat dewivers a consumer product from a can or simiwar container. Oder technowogicaw appwications of aerosows incwude dispersaw of pesticides, medicaw treatment of respiratory iwwnesses, and combustion technowogy.[2] Diseases can awso spread by means of smaww dropwets in de breaf, awso cawwed aerosows.[3]
Aerosow science covers generation and removaw of aerosows, technowogicaw appwication of aerosows, effects of aerosows on de environment and peopwe, and a wide variety of oder topics.[1]
Definitions[edit]
Photomicrograph made wif a Scanning Ewectron Microscope (SEM): Fwy ash particwes at 2,000× magnification, uh-hah-hah-hah. Most of de particwes in dis aerosow are nearwy sphericaw.
An aerosow is defined as a cowwoidaw system of sowid or wiqwid particwes in a gas. An aerosow incwudes bof de particwes and de suspending gas, which is usuawwy air.[1] Frederick G. Donnan presumabwy first used de term aerosow during Worwd War I to describe an aero-sowution, cwouds of microscopic particwes in air. This term devewoped anawogouswy to de term hydrosow, a cowwoid system wif water as de dispersing medium.[4] Primary aerosows contain particwes introduced directwy into de gas; secondary aerosows form drough gas-to-particwe conversion, uh-hah-hah-hah.[5]
Various types of aerosow, cwassified according to physicaw form and how dey were generated, incwude dust, fume, mist, smoke and fog.[6]
There are severaw measures of aerosow concentration, uh-hah-hah-hah. Environmentaw science and heawf often uses de mass concentration (M), defined as de mass of particuwate matter per unit vowume wif units such as μg/m3. Awso commonwy used is de number concentration (N), de number of particwes per unit vowume wif units such as number/m3 or number/cm3.[7]
The size of particwes has a major infwuence on deir properties, and de aerosow particwe radius or diameter (dp) is a key property used to characterise aerosows.
Aerosows vary in deir dispersity. A monodisperse aerosow, producibwe in de waboratory, contains particwes of uniform size. Most aerosows, however, as powydisperse cowwoidaw systems, exhibit a range of particwe sizes.[8] Liqwid dropwets are awmost awways nearwy sphericaw, but scientists use an eqwivawent diameter to characterize de properities of various shapes of sowid particwes, some very irreguwar. The eqwivawent diameter is de diameter of a sphericaw particwe wif de same vawue of some physicaw property as de irreguwar particwe.[9] The eqwivawent vowume diameter (de) is defined as de diameter of a sphere of de same vowume as dat of de irreguwar particwe.[10] Awso commonwy used is de aerodynamic diameter.
Size distribution[edit]
The same hypodeticaw wog-normaw aerosow distribution pwotted, from top to bottom, as a number vs. diameter distribution, a surface area vs. diameter distribution, and a vowume vs. diameter distribution, uh-hah-hah-hah. Typicaw mode names are shows at de top. Each distribution is normawized so dat de totaw area is 1000.
For a monodisperse aerosow, a singwe number—de particwe diameter—suffices to describe de size of de particwes. However, more compwicated particwe-size distributions describe de sizes of de particwes in a powydisperse aerosow. This distribution defines de rewative amounts of particwes, sorted according to size.[11] One approach to defining de particwe size distribution uses a wist of de sizes of every particwe in a sampwe. However, dis approach proves tedious to ascertain in aerosows wif miwwions of particwes and awkward to use. Anoder approach spwits de compwete size range into intervaws and finds de number (or proportion) of particwes in each intervaw. One den can visuawize dese data in a histogram wif de area of each bar representing de proportion of particwes in dat size bin, usuawwy normawised by dividing de number of particwes in a bin by de widf of de intervaw so dat de area of each bar is proportionate to de number of particwes in de size range dat it represents.[12] If de widf of de bins tends to zero, one gets de freqwency function:[13]
where
is de diameter of de particwes
is de fraction of particwes having diameters between and +
is de freqwency function
Therefore, de area under de freqwency curve between two sizes a and b represents de totaw fraction of de particwes in dat size range:[14]
It can awso be formuwated in terms of de totaw number density N:[15]
Assuming sphericaw aerosow particwes, de aerosow surface area per unit vowume (S) is given by de second moment:[15]
And de dird moment gives de totaw vowume concentration (V) of de particwes:[15]
One awso usefuwwy can approximate de particwe size distribution using a madematicaw function. The normaw distribution usuawwy does not suitabwy describe particwe size distributions in aerosows because of de skewness associated a wong taiw of warger particwes. Awso for a qwantity dat varies over a warge range, as many aerosow sizes do, de widf of de distribution impwies negative particwes sizes, cwearwy not physicawwy reawistic. However, de normaw distribution can be suitabwe for some aerosows, such as test aerosows, certain powwen grains and spores.[16]
A more widewy chosen wog-normaw distribution gives de number freqwency as:[16]
where:
is de standard deviation of de size distribution and
is de aridmetic mean diameter.
The wog-normaw distribution has no negative vawues, can cover a wide range of vawues, and fits many observed size distributions reasonabwy weww.[17]
Oder distributions sometimes used to characterise particwe size incwude: de Rosin-Rammwer distribution, appwied to coarsewy dispersed dusts and sprays; de Nukiyama-Tanasawa distribution, for sprays of extremewy broad size ranges; de power function distribution, occasionawwy appwied to atmospheric aerosows; de exponentiaw distribution, appwied to powdered materiaws; and for cwoud dropwets, de Khrgian-Mazin distribution.[18]
Physics[edit]
Terminaw vewocity of a particwe in a fwuid[edit]
For wow vawues of de Reynowds number (<1), true for most aerosow motion, Stokes' waw describes de force of resistance on a sowid sphericaw particwe in a fwuid. However, Stokes' waw is onwy vawid when de vewocity of de gas at de surface of de particwe is zero. For smaww particwes (< 1 μm) dat characterize aerosows, however, dis assumption faiws. To account for dis faiwure, one can introduce de Cunningham correction factor, awways greater dan 1. Incwuding dis factor, one finds de rewation between de resisting force on a particwe and its vewocity:[19]
where
is de resisting force on a sphericaw particwe
is de viscosity of de gas
is de particwe vewocity
is de Cunningham correction factor.
This awwows us to cawcuwate de terminaw vewocity of a particwe undergoing gravitationaw settwing in stiww air. Negwecting buoyancy effects, we find:[20]
where
is de terminaw settwing vewocity of de particwe.
The terminaw vewocity can awso be derived for oder kinds of forces. If Stokes' waw howds, den de resistance to motion is directwy proportionaw to speed. The constant of proportionawity is de mechanicaw mobiwity (B) of a particwe:[21]
A particwe travewing at any reasonabwe initiaw vewocity approaches its terminaw vewocity exponentiawwy wif an e-fowding time eqwaw to de rewaxation time:[22]
where:
is de particwe speed at time t
is de finaw particwe speed
is de initiaw particwe speed
To account for de effect of de shape of non-sphericaw particwes, a correction factor known as de dynamic shape factor is appwied to Stokes' waw. It is defined as de ratio of de resistive force of de irreguwar particwe to dat of a sphericaw particwe wif de same vowume and vewocity:[23]
where:
is de dynamic shape factor
Aerodynamic diameter[edit]
The aerodynamic diameter of an irreguwar particwe is defined as de diameter of de sphericaw particwe wif a density of 1000 kg/m3 and de same settwing vewocity as de irreguwar particwe.[24]
Negwecting de swip correction, de particwe settwes at de terminaw vewocity proportionaw to de sqware of de aerodynamic diameter, da:[24]
where
= standard particwe density (1000 kg/m3).
This eqwation gives de aerodynamic diameter:[25]
One can appwy de aerodynamic diameter to particuwate powwutants or to inhawed drugs to predict where in de respiratory tract such particwes deposit. Pharmaceuticaw companies typicawwy use aerodynamic diameter, not geometric diameter, to characterize particwes in inhawabwe drugs.[citation needed]
Dynamics[edit]
The previous discussion focussed on singwe aerosow particwes. In contrast, aerosow dynamics expwains de evowution of compwete aerosow popuwations. The concentrations of particwes wiww change over time as a resuwt of many processes. Externaw processes dat move particwes outside a vowume of gas under study incwude diffusion, gravitationaw settwing, and ewectric charges and oder externaw forces dat cause particwe migration, uh-hah-hah-hah. A second set of processes internaw to a given vowume of gas incwude particwe formation (nucweation), evaporation, chemicaw reaction, and coaguwation, uh-hah-hah-hah.[26]
A differentiaw eqwation cawwed de Aerosow Generaw Dynamic Eqwation (GDE) characterizes de evowution of de number density of particwes in an aerosow due to dese processes.[26]
Change in time = Convective transport + brownian diffusion + gas-particwe interactions + coaguwation + migration by externaw forces
Where:
is number density of particwes of size category
is de particwe vewocity
is de particwe Stokes-Einstein diffusivity
is de particwe vewocity associated wif an externaw force
Coaguwation[edit]
As particwes and dropwets in an aerosow cowwide wif one anoder, dey may undergo coawescence or aggregation, uh-hah-hah-hah. This process weads to a change in de aerosow particwe-size distribution, wif de mode increasing in diameter as totaw number of particwes decreases.[27] On occasion, particwes may shatter apart into numerous smawwer particwes; however, dis process usuawwy occurs primariwy in particwes too warge for consideration as aerosows.
Dynamics regimes[edit]
The Knudsen number of de particwe define dree different dynamicaw regimes dat govern de behaviour of an aerosow:
where is de mean free paf of de suspending gas and is de diameter of de particwe.[28] For particwes in de free mowecuwar regime, Kn >> 1; particwes smaww compared to de mean free paf of de suspending gas.[29] In dis regime, particwes interact wif de suspending gas drough a series of "bawwistic" cowwisions wif gas mowecuwes. As such, dey behave simiwarwy to gas mowecuwes, tending to fowwow streamwines and diffusing rapidwy drough Brownian motion, uh-hah-hah-hah. The mass fwux eqwation in de free mowecuwar regime is:
where a is de particwe radius, P and PA are de pressures far from de dropwet and at de surface of de dropwet respectivewy, kb is de Bowtzmann constant, T is de temperature, CA is mean dermaw vewocity and α is mass accommodation coefficient.[citation needed] The derivation of dis eqwation assumes constant pressure and constant diffusion coefficient.
Particwes are in de continuum regime when Kn << 1.[29] In dis regime, de particwes are big compared to de mean free paf of de suspending gas, meaning dat de suspending gas acts as a continuous fwuid fwowing round de particwe.[29] The mowecuwar fwux in dis regime is:
where a is de radius of de particwe A, MA is de mowecuwar mass of de particwe A, DAB is de diffusion coefficient between particwes A and B, R is de ideaw gas constant, T is de temperature (in absowute units wike kewvin), and PA∞ and PAS are de pressures at infinite and at de surface respectivewy.[citation needed]
The transition regime contains aww de particwes in between de free mowecuwar and continuum regimes or Kn ≈ 1. The forces experienced by a particwe are a compwex combination of interactions wif individuaw gas mowecuwes and macroscopic interactions. The semi-empiricaw eqwation describing mass fwux is:
where Icont is de mass fwux in de continuum regime.[citation needed] This formuwa is cawwed de Fuchs-Sutugin interpowation formuwa. These eqwations do not take into account de heat rewease effect.
Partitioning[edit]
Condensation and evaporation
Aerosow partitioning deory governs condensation on and evaporation from an aerosow surface, respectivewy. Condensation of mass causes de mode of de particwe-size distributions of de aerosow to increase; conversewy, evaporation causes de mode to decrease. Nucweation is de process of forming aerosow mass from de condensation of a gaseous precursor, specificawwy a vapour. Net condensation of de vapour reqwires supersaturation, a partiaw pressure greater dan its vapour pressure. This can happen for dree reasons:[citation needed]
1. Lowering de temperature of de system wowers de vapour pressure.
2. Chemicaw reactions may increase de partiaw pressure of a gas or wower its vapour pressure.
3. The addition of additionaw vapour to de system may wower de eqwiwibrium vapour pressure according to Raouwt's waw.
There are two types of nucweation processes. Gases preferentiawwy condense onto surfaces of pre-existing aerosow particwes, known as heterogeneous nucweation. This process causes de diameter at de mode of particwe-size distribution to increase wif constant number concentration, uh-hah-hah-hah.[30] Wif sufficientwy high supersaturation and no suitabwe surfaces, particwes may condense in de absence of a pre-existing surface, known as homogeneous nucweation. This resuwts in de addition of very smaww, rapidwy growing particwes to de particwe-size distribution, uh-hah-hah-hah.[30]
Activation[edit]
Water coats particwes in an aerosows, making dem activated, usuawwy in de context of forming a cwoud dropwet.[citation needed] Fowwowing de Kewvin eqwation (based on de curvature of wiqwid dropwets), smawwer particwes need a higher ambient rewative humidity to maintain eqwiwibrium dan warger particwes do. The fowwowing formuwa gives rewative humidity at eqwiwibrium:
where is de saturation vapor pressure above a particwe at eqwiwibrium (around a curved wiqwid dropwet), p0 is de saturation vapor pressure (fwat surface of de same wiqwid) and S is de saturation ratio.
Kewvin eqwation for saturation vapor pressure above a curved surface is:
where rp dropwet radius, σ surface tension of dropwet, ρ density of wiqwid, M mowar mass, T temperature, and R mowar gas constant.
Sowution to de Generaw Dynamic Eqwation[edit]
There are no generaw sowutions to de generaw dynamic eqwation (GDE);[31] common medods used to sowve de generaw dynamic eqwation incwude:[32]
• Moment medod[33]
• Modaw/sectionaw medod,[34] and
• Quadrature medod of moments[35][36]/Taywor-series expansion medod of moments,[37][38] and
• Monte Carwo medod.[39]
Generation and appwications[edit]
Peopwe generate aerosows for various purposes, incwuding:
Some devices for generating aerosows are:[2]
Stabiwity of generated aerosow particwes[edit]
Stabiwity of nanoparticwe aggwomerates is criticaw for estimating size distribution of aerosowized particwes from nano-powders or oder sources. At nanotechnowogy workpwaces, workers can be exposed via inhawation to potentiawwy toxic substances during handwing and processing of nanomateriaws. Nanoparticwes in de air often form aggwomerates due to attractive inter-particwe forces, such as van der Waaws force or ewectrostatic force if de particwes are charged. As a resuwt, aerosow particwes are usuawwy observed as aggwomerates rader dan individuaw particwes. For exposure and risk assessments of airborne nanoparticwes, it is important to know about de size distribution of aerosows. When inhawed by humans, particwes wif different diameters are deposited in varied wocations of de centraw and periphery respiratory system. Particwes in nanoscawe have been shown to penetrate de air-bwood barrier in wungs and be transwocated into secondary organs in de human body, such as de brain, heart and wiver. Therefore, de knowwedge on stabiwity of nanoparticwe aggwomerates is important for predicting de size of aerosow particwes, which hewps assess de potentiaw risk of dem to human bodies.
Different experimentaw systems have been estabwished to test de stabiwity of airborne particwes and deir potentiaws to deaggwomerate under various conditions. A comprehensive system recentwy reported by Ding & Riediker (2015)[45] is abwe to maintain robust aerosowization process and generate aerosows wif stabwe number concentration and mean size from nano-powders. The deaggwomeration potentiaw of various airborne nanomateriaws can be awso studied using criticaw orifices. This process was awso investigated by Stahwmecke et aw. (2009).[46] In addition, an impact fragmentation device was devewoped to investigate bonding energies between particwes.[47]
A standard deaggwomeration testing procedure couwd be foreseen wif de devewopments of de different types of existing systems. The wikewiness of deaggwomeration of aerosow particwes in occupationaw settings can be possibwy ranked for different nanomateriaws if a reference medod is avaiwabwe. For dis purpose, inter-waboratory comparison of testing resuwts from different setups couwd be waunched in order to expwore de infwuences of system characteristics on properties of generated nanomateriaws aerosows.
Detection[edit]
Aerosow can eider be measured in-situ or wif remote sensing techniqwes.
In situ observations[edit]
Some avaiwabwe in situ measurement techniqwes incwude:
Remote sensing approach[edit]
Remote sensing approaches incwude:
Size sewective sampwing[edit]
Particwes can deposit in de nose, mouf, pharynx and warynx (de head airways region), deeper widin de respiratory tract (from de trachea to de terminaw bronchiowes), or in de awveowar region.[48] The wocation of deposition of aerosow particwes widin de respiratory system strongwy determines de heawf effects of exposure to such aerosows.[49] This phenomenon wed peopwe to invent aerosow sampwers dat sewect a subset of de aerosow particwes dat reach certain parts of de respiratory system.[50] Exampwes of dese subsets of de particwe-size distribution of an aerosow, important in occupationaw heawf, incwude de inhawabwe, doracic, and respirabwe fractions. The fraction dat can enter each part of de respiratory system depends on de deposition of particwes in de upper parts of de airway.[51] The inhawabwe fraction of particwes, defined as de proportion of particwes originawwy in de air dat can enter de nose or mouf, depends on externaw wind speed and direction and on de particwe-size distribution by aerodynamic diameter.[52] The doracic fraction is de proportion of de particwes in ambient aerosow dat can reach de dorax or chest region, uh-hah-hah-hah.[53] The respirabwe fraction is de proportion of particwes in de air dat can reach de awveowar region, uh-hah-hah-hah.[54] To measure de respirabwe fraction of particwes in air, a pre-cowwector is used wif a sampwing fiwter. The pre-cowwector excwudes particwes as de airways remove particwes from inhawed air. The sampwing fiwter cowwects de particwes for measurement. It is common to use cycwonic separation for de pre-cowwector, but oder techniqwes incwude impactors, horizontaw ewutriators, and warge pore membrane fiwters.[55]
Two awternative size-sewective criteria, often used in atmospheric monitoring, are PM10 and PM2.5. PM10 is defined by ISO as particwes which pass drough a size-sewective inwet wif a 50% efficiency cut-off at 10 μm aerodynamic diameter and PM2.5 as particwes which pass drough a size-sewective inwet wif a 50% efficiency cut-off at 2.5 μm aerodynamic diameter. PM10 corresponds to de “doracic convention” as defined in ISO 7708:1995, Cwause 6; PM2.5 corresponds to de “high-risk respirabwe convention” as defined in ISO 7708:1995, 7.1.[56] The United States Environmentaw Protection Agency repwaced de owder standards for particuwate matter based on Totaw Suspended Particuwate wif anoder standard based on PM10 in 1987[57] and den introduced standards for PM2.5 (awso known as fine particuwate matter) in 1997.[58]
Atmospheric[edit]
Aerosow powwution over nordern India and Bangwadesh
Three types of atmospheric aerosow have a significant effect on Earf's cwimate: vowcanic; desert dust; and human-made. Vowcanic aerosow forms in de stratosphere after an eruption as dropwets of suwfuric acid dat can prevaiw for up to two years, and refwect sunwight, wowering temperature. Desert dust, mineraw particwes bwown to high awtitudes, absorb heat and may be responsibwe for inhibiting storm cwoud formation, uh-hah-hah-hah. Human-made suwfate aerosows, primariwy from burning oiw and coaw, affect de behavior of cwouds.[59]
Awdough aww hydrometeors, sowid and wiqwid, can be described as aerosows, a distinction is commonwy made between such dispersions (i.e. cwouds) containing activated drops and crystaws, and aerosow particwes. The atmosphere of Earf contains aerosows of various types and concentrations, incwuding qwantities of:
Aerosows can be found in urban ecosystems in various forms, for exampwe:
The presence of aerosows in de earf's atmosphere can infwuence its cwimate, as weww as human heawf.
Effects[edit]
• Aerosows interact wif de Earf's energy budget in two ways, directwy and indirectwy.
E.g., a direct effect is dat aerosows scatter sunwight directwy back into space. This can wead to a significant decrease in de temperature, being an additionaw ewement to de greenhouse effect and derefore contributing to de gwobaw cwimate change.[61]
The indirect effects refer to de aerosows interfering wif formations dat interact directwy wif radiation, uh-hah-hah-hah. For exampwe, dey are abwe to modify de size of de cwoud particwes in de wower atmosphere, dereby changing de way cwouds refwect and absorb wight and derefore modifying de Earf's energy budget.[60]
• When aerosows absorb powwutants, it faciwitates de deposition of powwutants to de surface of de earf as weww as to bodies of water.[61] This has de potentiaw to be damaging to bof de environment and human heawf.
• Aerosow particwes wif an effective diameter smawwer dan 10 μm can enter de bronchi, whiwe de ones wif an effective diameter smawwer dan 2.5 μm can enter as far as de gas exchange region in de wungs,[62] which can be hazardous to human heawf.
See awso[edit]
References[edit]
1. ^ a b c d Hinds, 1999, p. 3
2. ^ a b Hidy, 1984, p. 254.
3. ^ Fuwwer, Joanna Kotcher (2017-01-31). Surgicaw Technowogy - E-Book: Principwes and Practice. Ewsevier Heawf Sciences. ISBN 9780323430562.
4. ^ Hidy, 1984, p. 5
5. ^ Hinds, 1999, p. 8
6. ^ Cowbeck, 2014, Ch. 1.1
7. ^ Hinds, 1999, pp. 10-11.
8. ^ Hinds, 1999, p. 8.
9. ^ Hinds, 1999, p. 10.
10. ^ Hinds, 1999, p. 51.
11. ^ Jiwwavenkatesa, A; Dapkunas, SJ; Lin-Sien, Lum (2001). "Particwe Size Characterization". NIST Speciaw Pubwication. 960-1.
12. ^ Hinds, 1999, pp. 75-77.
13. ^ Hinds, 1999, p. 79
14. ^ Hinds, 1999, p. 79.
15. ^ a b c Hidy, 1984, p. 58
16. ^ a b Hinds, 1999, p 90.
17. ^ Hinds, 1999, p 91.
18. ^ Hinds, 1999, p 104-5
19. ^ Hinds, 1999, p. 44-49
20. ^ Hinds, 1999, p. 49
21. ^ Hinds, 1999, p. 47
22. ^ Hinds, 1991, p 115.
23. ^ Hinds, 1991, p. 51
24. ^ a b Hinds, 1999, p. 53.
25. ^ Hinds, 1999, p. 54.
26. ^ a b Hidy, 1984, p. 60
27. ^ Hinds, 1999, p. 260
28. ^ Baron, P. A. & Wiwweke, K. (2001). "Gas and Particwe Motion". Aerosow Measurement: Principwes, Techniqwes, and Appwications.
29. ^ a b c DeCarwo, P.F. (2004). "Particwe Morphowogy and Density Characterization by Combined Mobiwity and Aerodynamic Diameter Measurements. Part 1: Theory". Aerosow Science & Technowogy. 38 (12). doi:10.1080/027868290903907.
30. ^ a b Hinds, 1999, p.288
31. ^ Hidy, 1984, p62
32. ^ Friedwander, S. K. (2000). Smoke, Dust and Haze: Fundamentaws of Aerosow Behavior (2nd ed.). Oxford University Press, New York.
33. ^ Huwburt, H. M., and Katz, S. (1964). Some Probwems in Particwe Technowogy: A Statisticaw Mechanicaw Formuwation, uh-hah-hah-hah. Chem. Eng. Sci. ,19 (8):555–574.
34. ^ Landgrebe, J. D., and Pratsinis, S. E. (1990). A Discrete-Sectionaw Modew for Particuwate Production by Gas-Phase Chemicaw Reaction and Aerosow Coaguwation in de Free-Mowecuwar Regime. J. Cowwoid Interf. Sci., 139 (1):63–86.
35. ^ R. McGraw, Description of aerosow dynamics by de qwadrature medod of moments, Aerosow Science and Technowogy, 1997
36. ^ D Marchisio, R Fox, Sowution of popuwation bawance eqwations using de direct qwadrature medod of moments, Journaw of Aerosow Science, 2005.
37. ^ Yu, M., Lin, J., and Chan, T. (2008). A New Moment Medod for Sowving de Coaguwation Eqwation for Particwes in Brownian Motion, uh-hah-hah-hah. Aerosow Sci. Technow., 42(9):705–713.
38. ^ Yu, M., and Lin, J. (2009). Taywor-Expansion Moment Medod for Aggwomer- ate Coaguwation Due to Brownian Motion in de Entire Size Regime. J. Aerosow Sci., 40(6):549–562.
39. ^ Kraft, M. (2005). Modewwing of Particuwate Processes. KONA, 23(23):18–35.
40. ^ Hinds, 1999, 428
41. ^ Hidy, 1984, p 255
42. ^ Hidy, 1984, p 257
43. ^ Hidy, 1984, p 274
44. ^ Hidy, 1984, p 278
45. ^ Yaobo Ding & Michaew Riediker (2015), A system to assess de stabiwity of airborne nanoparticwe aggwomerates under aerodynamic shear, Journaw of Aerosow Science 88 (2015) 98–108. doi:10.1016/j.jaerosci.2015.06.001
46. ^ 8. B. Stahwmecke, S. Wagener, C. Asbach, H. Kaminski, H. Fissan & T.A.J. Kuhwbusch (2009). Investigation of airborne nanopowder aggwomerate stabiwity in an orifice under various differentiaw pressure conditions. Journaw of Nanoparticwe Research, 1625-1635.
47. ^ 9. S. Froeschke, S. Kohwer, A.P. Weber & G. Kasper (2003). Impact fragmentation of nanoparticwe aggwomerates. Journaw of Aerosow Science, 34(3), 275–287.
48. ^ Hinds, 1999, p.233
49. ^ Hinds, 1999, p. 233
50. ^ Hinds, 1999, p. 249
51. ^ Hinds, 1999, p. 244
52. ^ Hinds, 1999, p. 246
53. ^ Hinds, 1999, p. 254
54. ^ Hinds, 1999, p. 250
55. ^ Hinds, 1999, p. 252
56. ^ "Particuwate powwution – PM10 and PM2.5". Recognition, Evawuation, Controw. News and views from Diamond Environmentaw Limited. Retrieved 23 September 2012.
57. ^ "Particuwate Matter (PM-10)". Archived from de originaw on 1 September 2012. Retrieved 23 September 2012.
58. ^ "Basic Information". Retrieved 23 September 2012.
59. ^ "Atmospheric Aerosows: What Are They, and Why Are They So Important?". NASA Langwey Research Center. 22 Apr 2008. Retrieved 27 December 2014.
60. ^ a b Awwen, Bob. "Atmospheric Aerosows: What Are They, and Why Are They So Important?". NASA. NASA. Retrieved 8 Juwy 2014.
61. ^ a b Kommawapati, Raghava R.; Vawsaraj, Kawwiat T. (2009). Atmospheric aerosows: Characterization, chemistry, modewing, and cwimate. 1005. Washington, DC: American Chemicaw Society. pp. 1–10. ISBN 9780841224827. doi:10.1021/bk-2009-1005.ch001. Retrieved 10 Juwy 2014.
62. ^ Grainger, Don, uh-hah-hah-hah. "Vowcanic Emissions". Earf Observation Data Group, Department of Physics, University of Oxford. University of Oxford. Retrieved 8 Juwy 2014.
Works cited[edit]
• Cowbeck, Ian, Mihawis Lazaridis (editors) (2014). Aerosow Science: Technowogy and Appwications. John Wiwey & Sons - Science. ISBN 978-1-119-97792-6.
• Hinds, Wiwwiam C. (1999). Aerosow Technowogy (2nd ed.). Wiwey - Interscience. ISBN 978-0-471-19410-1.
• Hidy, George M. (1984). Aerosows, An Industriaw and Environmentaw Science. Academic Press, Inc. ISBN 978-0-12-412336-6.
Furder reading[edit]
Externaw winks[edit]
|
11
I've see the following in my logs every so often:
kernel: ip_conntrack: table full, dropping packet.
Currently, I have ip_conntrack_max set to 65536 (default, RHEL5).
Keeping memory usage in mind, how much can I safely increase this value? I've got 4GB ram on this box. One of the functions this machine serves is as a static content server, which probably explains the high connections counts, and also means I'd like to keep as much of the OS memory used for caching as possible.
Also, what's the difference between the following two? /proc/sys/net/ipv4/netfilter/ip_conntrack_max /proc/sys/net/ipv4/ip_conntrack_max
Which should I be editing?
Thanks!
2 Answers 2
12
First, ask yourself a question: does your setup require connection tracking? If it is just a server and firewalling/NAT is done somewhere else, then you can probably disable conntrack all together.
Second, check if your conntrack entries make sense. Sometimes conntrack tables are filled with rubbish because of some network or firewall mis-configuration. Usually those are entries for connections which were never fully established. That may happen e.g. when the server gets incoming connection SYN packets, but the server replies are always lost somewhere on the network.
The only machines I had a 'ip_conntrack: table full' messages and which needed ip_conntrack_max increase (instead of fixing configuration), where routers doing NAT for quite big networks (thousands of endpoints).
If you know you need conntrack and it really needs to be bigger than it is, the increase the number until you get no more 'table full' messages. And watch the memory usage.
Some statistics about memory allocation for conntrack objects can be found in the /proc/slabinfo file.
7
The path with "netfilter" is the old way of referring to the same setting. You can edit either file.
# cat /proc/sys/net/ipv4/ip_conntrack_max
655360
# cat /proc/sys/net/ipv4/netfilter/ip_conntrack_max
655360
# echo 655361 > /proc/sys/net/ipv4/ip_conntrack_max
# cat /proc/sys/net/ipv4/netfilter/ip_conntrack_max
655361
2
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged .
|
May 17, 2006
Use the Debugger!
Filed under: Scripting — Marcus Tettmar @ 8:55 am
[Update 23 Feb 2011: Click here for a video tutorial of the debugger in Macro Scheduler 12]
The first thing I turn to when helping someone get their script working is the debugger. But I’m often surprised to hear people say they didn’t know about the debugger. The debugger is an invaluable tool to help you find problems in scripts and is dead easy to use.
Macro Scheduler Script Debugger
Here’s how to use it. Open your script in the script editor. You’ll want to enable the watch list. This shows you the value of script variables and updates them as they change. Select “Show Watch List” from the “Debug” menu. This displays the watch list on the right of the editor, as can be seen in the picture above.
Step Through Line by Line. Place the cursor on the first line of the script and hit F8. F8 executes the current line and then stops and waits for you to press F8 again. This allows you to “step” through the script one line at a time. You’ll see the green arrow next to the current line and a border around it. You can now follow the flow of execution through the script at your own pace. Every time a variable is created you’ll see it appear in the watch list and when a variable value changes you’ll see the new value there.
Breakpoints. Note that F8 executes the current line so in most cases when you start debugging you’ll want to put the cursor on the first line. Sometimes you may just want to debug a part of the script so you can start at that point. That’s fine as long as the code before that point doesn’t set things up that are required to make the bit you want to debug work, such as initialising variables. If that is the case you can set a “breakpoint” just before the bit you want to step through and then run from the top. To set a breakpoint, put the cursor on the line where you want the breakpoint to be and select Debug/Insert Breakpoint. Now place the cursor on the first line and select Debug/Run. The macro will now run as normal but stop when it reaches the breakpoint and wait for you to step onwards using F8.
The Watch List is a very important tool in tracking down why values aren’t what you think they should be or why certain outcomes that depend on variable values take place. With the watch list you can see when a value changes and what line caused it to change. This is extremely helpful and can highlight scripting errors and bad logic.
Side Effects of Debugging. One thing to bear in mind is that the act of debugging slows execution down, since the script waits for you to execute each line. If a script is failing because it is running too fast and doesn’t have sufficient code to ensure the system is ready for each step (e.g. a lack of WaitWindowOpen commands) then you will probably find that when you debug the script it works! So here’s a tip: if the script works when you debug it but doesn’t when you run it, the problem is almost certainly a timing issue and you need more intelligent delays.
So if you have a script which does something unexpected at a certain point and isn’t working how you want it to, or throws up a weird error and you’re not sure which part of the script is the problem then use the debugger. You’ll then find out which bit of the script is the problem and can step through it to find out what the cause is.
[Update: In version 9.0 the debugger is part of the Advanced Editor. From Macro Properties click the “Advanced Editor” button.]
|
Immune Complex-Mediated Membranoproliferative Glomerulonephritis Secondary to Primary Biliary Cholangitis: A Rare Case Report - European Medical Journal
Immune Complex-Mediated Membranoproliferative Glomerulonephritis Secondary to Primary Biliary Cholangitis: A Rare Case Report
5 Mins
Nephrology
Download PDF
Authors:
*Kadir Intas,1 Gulay Ulusal Okyay,2 Arzu Saglam,3 Mehmet Deniz Ayli2
• 1. Department of Internal Medicine, Diyadin State Hospital, Agri, Türkiye
• 2. Department of Nephrology, Dışkapı Yıldırım Beyazıt Training and Research Hospital, University of Health Sciences, Ankara, Türkiye
• 3. Department of Pathology, Faculty of Medicine, Hacettepe University, Ankara, Türkiye
*Correspondence to [email protected]
Disclosure:
The authors have declared no conflicts of interest.
Received:
02.02.24
Accepted:
24.05.24
Citation:
EMJ Nephrol. ;12[1]:64-69. https://doi.org/10.33590/emjnephrol/LQJL1550.
Keywords:
Acid, membranoproliferative glomerulonephritis, primary biliary cholangitis, ursodeoxycholic
Each article is made available under the terms of the Creative Commons Attribution-Non Commercial 4.0 License.
Abstract
Immune complex-mediated membranoproliferative glomerulonephritis (iMPGN) can develop in association with autoimmune diseases such as primary biliary cholangitis (PBC), a chronic cholestatic liver disease characterised by destruction of the small and medium-sized bile ducts. Although the pathogenesis cannot be clearly defined, iMPGN and PBC overlap through the activation of innate and adaptive immune cells and the production of proinflammatory mediators. In this report, the authors present a case in which iMPGN and PBC were diagnosed simultaneously.
Key Points
1. The aim of the treatment of membranoproliferative glomerulonephritis due to secondary causes is to treat the underlying primary cause; for which renal support treatment is also essential. Immune complex-mediated membranoproliferative glomerulonephritis (iMPGN) secondary to primary biliary cholangitis (PBC), an autoimmune disease, is a very rare condition and its treatment is that of the secondary cause, PBC.
2. This is a very rare case report describing the association between iMPGN and PBC responding to ursodeoxycholic acid and non-immunosuppressive supportive therapy.
3. Every patient with iMPGN should be investigated for secondary aetiologies, and it should be kept in mind that, with appropriate treatment, iMPGN can be treated without the need for immunosuppressive therapy.
INTRODUCTION
Membranoproliferative glomerulonephritis (MPGN) is a glomerular disease characterised by mesangial expansion, endocapillary proliferation, and double contours of the glomerular basement membrane on light microscopy; by complement deposition with or without immune complex deposits on immunofluorescence; and by electron-dense deposits in the mesangium, subendothelium, or subepithelium on electron microscopy. Depending on the pathogenesis, MPGN is divided into complement-mediated MPGN and immune complex-mediated MPGN (iMPGN). iMPGN may develop secondary to chronic infections such as hepatitis B virus, hepatitis C virus, and monoclonal gammopathies, or in association with autoimmune diseases such as systemic lupus erythematosus, rheumatoid arthritis, or primary biliary cholangitis (PBC). Immune complexes, formed by the binding of antigens to antibodies in the bloodstream or in situ, can activate complement pathways, induce inflammatory cytokines, recruit leukocytes, and cause tissue damage.1
PBC is a chronic liver disease that mainly affects middle-aged females and is prevalent worldwide. The unclear aetiopathogenesis is thought to be due to a complex interaction between genetic factors such as HLA-DR8, and environmental factors such as microbial infections. The main histopathologic feature of PBC is chronic, non-suppurative destructive cholangitis leading to progressive loss of intrahepatic bile ducts and cholestasis. The most common symptoms are fatigue and pruritus. Other symptoms include jaundice, xanthomas, osteoporosis, portal hypertension, and hepatic encephalopathy.2 The association between MPGN and PBC is rare and has only been described in a few case reports.3,4 Here the authors present a case diagnosed with iMPGN and PBC, with parallel clinical courses of liver and kidney disease.
CASE PRESENTATION
A 43-year-old female patient with no medical history presented with complaints of fatigue, itching, jaundice, and oedema. She was not taking any medication. There was no family history of autoimmune diseases. The patient was referred to the nephrology department because of a serum creatinine level of 3.13 mg/dL (reference value: 0.5–0.9 mg/dL) and macrohematuria. The baseline creatinine value was not known. The daily urinary protein excretion rate was 10,400 mg/day (reference value: 80–150 mg/day). Viral (hepatitis B, hepatitis C, Epstein–Barr virus, HIV, rubella virus, rubeola virus, varicella, cytomegalovirus, and herpesvirus) and autoimmune markers (including rheumatoid factor, antiphospholipid IgM and IgG, the extractable nuclear antigen panel, anti-liver kidney microsomal, anti-double stranded DNA, antineutrophil cytoplasmic antibodies, antiglomerular basement membrane, and anti-smooth muscle) were all negative. Protein electrophoresis for monoclonal gammopathy of renal significance (MGRS) did not reveal any evidence of monoclonal gammopathy or light chain disease. Serum C3 level was 0.16 g/L (normal range: 0.79–1.52 g/L), and C4 level was 0.27 g/L (normal range: 0.16–0.38 g/L). An infectious process could not be detected by acute phase reactants, culture examinations, and imaging studies. Ultrasound-guided percutaneous renal biopsy revealed iMPGN with diffuse endocapillary and focal extracapillary proliferation. Fibrinoid necrosis was present, and neutrophils were noted to be a significant component of the endocapillary hypercellularity, resulting in an exudative picture. Double contours were identified along the glomerular basement membrane. Immunofluorescence staining showed diffuse global distribution of 3+ fine-coarse granular IgG and IgA deposits in the mesangium and along the peripheral capillary loops (Figure 1). Κ and λ were both positive; C3, IgM, and C1q were negative. Parallel studies revealed elevated levels of transaminases, alkaline phosphatase, IgM, and IgG. Itching was of great concern.
Figure 1: Immunofluorescence staining showing diffuse global distribution of 3+ fine-coarse granular IgG and IgA deposits in the mesangium and along the peripheral capillary loops.
Diffuse endocapillary and focal extracapillary proliferation can be discerned at medium power magnification (A: hematoxylin-eosin, B: Jones methamine silver stain). Note the presence of fibrinoid necrosis (A) and an abundance of neutrophils (C). Wide-spread double contours of the glomerular basement membrane, a so-called tram-tracking appearance, can be discerned at high power magnification (D: jones methamine silver stain).
The anti-mitochondrial antibody (AMA) and anti-nuclear antibody test were positive, >1/320 and +4 positive, respectively, and the patient was diagnosed with PBC (Table 1). The patient was thought to have developed iMPGN secondary to PBC.
Table 1: Laboratory results at the time of admission and at the 3rd-month follow-up visit.
INR: international normalised ratio; N/A: not applicable.
Supportive treatments for nephrotic syndrome parameters, low-salt diet, ramipril 10 mg/day, and ursodeoxycholic acid (UDCA) 13 mg/kg/day were started. Outpatient follow-up was initiated. Gradually, liver enzymes, serum creatinine, and proteinuria decreased (Table 1).
DISCUSSION
In MPGN associated with autoimmune diseases, immune complexes can accumulate in the subendothelial or mesangial spaces of the glomerulus and cause glomerular damage and inflammation.4 Several hypotheses can be proposed for the development of MPGN during the course of PBC. Immune complexes containing AMAs or other autoantibodies may accumulate in the glomeruli and cause inflammation and damage.5 In addition, complement activation triggered by antigen-antibody complexes may lead to the formation of membrane attack complexes that damage the endothelium.6 Bile acids or other components of bile may facilitate the deposition of immune complexes by altering the permeability and charge of the glomerular basement membrane.7 Finally, bile epithelial cells, which are the target of autoimmune attacks in PBC, may damage the kidney with proinflammatory cytokines and chemokines, which may have endocrine as well as paracrine effects.8
In the management of MPGN due to secondary causes, treatment of the underlying primary cause and renal supportive therapy are essential. In the case presented here, the iMPGN has been thought to have developed secondary to PBC. Until the test results were available, attempts were made to control the complications of nephrotic syndrome and acute renal failure with supportive measures. When the diagnosis of PBC was confirmed, treatment with UDCA was started to improve bile flow and reduce oxidative stress.9 In the following period, renal function tests improved significantly under antiproteinuric therapy with ramipril 10 mg/day (maximum dose) and a low-salt diet. Immunosuppressive therapy was not considered necessary due to the improvement in renal function following the renoprotective therapy. UDCA can reduce the formation of immune complexes by inhibiting the production of proinflammatory cytokines and chemokines, reducing the activation and proliferation of T cells, inducing regulatory T cells, and modulating B cell function. In addition, UDCA can reduce the damage caused by immune complexes by inhibiting complement activation and leukocyte uptake.10
In the literature, the authors found only two cases in which the two diseases were associated with each other. In a case published by Koike et al.,3 a 49-year-old male patient with PBC and Sjoegren’s syndrome was diagnosed with a Type 3 MPGN-like lesion secondary to proteinuria, which was treated with prednisolone and supportive measures.3 In another study by Zand et al.4 on patients with MPGN having autoimmune diseases, a 57-year-old female patient with undifferentiated connective tissue disease and PBC was treated with azathioprine/prednisone in combination with supportive therapy.4 During follow-up, both patients were not on dialysis, as was the case with the authors’ patient. The patient’s first hospitalisation was when the authors took up the case.
For this reason, the baseline creatinine level could not be determined. The patient’s most serious complaint was itching but no infection was found in her medical history. No infectious processes were detected by acute phase reactants, culture examinations, and imaging studies. There was no C3, IgM, or C1q deposition on immunofluorescent microscopy. Lupus or IgA nephropathy were ruled out due to the presence of double contours. The authors suspected it to be glomerulonephritis with a membranoproliferative pattern of injury and IgG and IgA deposition, not only in the mesangium but also along the glomerular capillary walls. Morphologically, both post-infectious and infection-related glomerulonephritis would enter the differential diagnosis. When the results of histopathologic analysis were available, the evaluations were revisited as post-infectious glomerulonephritis was included in the differential diagnosis. However, no evidence of infection was found. When a detailed analysis revealed AMA positivity associated with pruritus, the patient was referred to gastroenterology. The progress in clinical and laboratory values was taken as an indication of a decrease in liver inflammation as a liver biopsy was not performed. After UDCA treatment, both pruritus and renal function tests improved. On the other hand, it was predicted that the immune system modulated by this specific treatment could reduce the formation of immune complexes and their accumulation in the kidneys.9,10 According to the Kidney Disease: Improving Global Outcomes (KDIGO) guidelines, the indication for immunosuppressive treatment in primary MPGN is the presence of proteinuria at a nephrotic level. In this case, it is not a primary MPGN. With the treatment of the underlying pathology, the nephrological examinations began to improve, the serum creatinine level decreased, and the proteinuria decreased to 1,400 mg. In this case, it was decided to continue non-immunosuppressive supportive treatment. The patient was not treated with steroids or other immunosuppressive drugs in both the nephrology or gastroenterology department.
Therefore, the authors controlled secondary iMPGN associated with PBC with UDCA, which is used in the treatment of PBC, by prioritising liver inflammation. The authors knew that secondary MPGN can occur in the context of autoimmune diseases, but cases like this are very rare. Every patient with iMPGN should be investigated for secondary aetiologies.
References
Sethi S, Fervenza FC. Membranoproliferative glomerulonephritis – a new look at an old entity. N Engl J Med. 2012;366(12):1119-31. Hirschfield GM et al. Primary biliary cirrhosis associated with HLA, IL12A, and IL12RB2 variants. N Engl J Med. 2009;11;360(24):2544-55. Koike K et al. A case of glomerulopathy showing podocytic infolding in association with Sjögren’s syndrome and primary biliary cirrhosis. Clin Exp Nephrol. 2008;12:489-93. Zand L et al. Membranoproliferative glomerulonephritis associated with autoimmune diseases. J Nephrol. 2014;27(2):165-71. Rennke H. Secondary membranoproliferative glomerulonephritis. Kidney Int 1995;47:643–56. Marriott JB, Oliveira DB. Antimitochondrial autoantibodies in anti-glomerular basement membrane disease. Clin Exp Immunol. 1993;93:259-64. Li M et al. Mechanisms of bile acid mediated inflammation in the liver. Mol Aspects Med. 2017;56:45-53. Ronca V et al. Immune system and cholangiocytes: a puzzling affair in primary biliary cholangitis. J Leukoc Biol. 2020;108(2):659-71. Lindor KD et al. Primary biliary cholangitis: 2018 practice guidance from the American Association for the Study of Liver Diseases. Hepatology. 2019;69(1):394-419. Yu K et al. Decreased infiltration of CD4+ Th1 cells indicates a good response to ursodeoxycholic acid (UDCA) in primary biliary cholangitis. Pathol Res Pract. 2021;217:153291.
Please rate the quality of this content
As you found this content interesting...
Follow us on social media!
We are sorry that this content was not interesting for you!
Let us improve this content!
Tell us how we can improve this content?
|
Advertisement
Structure that can be observed with the naked eye is called _________.
gross anatomy
The word root homeo- means
same
The simplest structures considered to be alive are ________.
cells
Which of the following is not a human organ system?
a. integumentary
b. muscular
c.epithelial
d. nervous
e. endocrine
c. epithelial
________ means studying anatomy by touch.
Palpation
the prefix hetero- means ________.
different
cutting and separating tissues to reveal structural relationships is called ________.
dissection
The tendency of the body to maintain stable internal conditions is called _________.
homeostasis
A/an _______ is the simplest body structure to be composed of two or more types of tissue.
organ
The technique for listening to the sounds of the heart valves is ________.
auscultation
A ring-shaped section of the small intestine would be a ________ section.
transverse
The tarsal region is ________ to the popliteal region.
distal
The greater omentum is _______ to the small intestine.
superficial
A ________ line passes through the sternum, umbilicus, and mons pubis.
mid-sagittal
The ______ region is immediately medial to the coxal region.
inguinal
The forearm is said to be ______ when the palms are facing forward.
supinated
The superficial layer of the pleura is called the _______ pleura.
parietal
The right and left pleural cavities are separated by a thick wall called the _______.
mediastinum
The back of the neck is the _______ region.
nuchal
The manus is more commonly known as the _______ and the pes is more commonly known as the _______.
feet, foot
The cranial cavity is lined by membranes called the ________,
meninges
Organs that lie within the abdominal cavity but not within the peritoneal cavity are said to have a _______ position.
retroperitoneal
The sternal region is ________ to the pertoral region.
medial
The pelvic cavity can be described as _______ to the abdominal cavity in position.
inferior
The anterior pit of the elbow is the ______ region, and the corresponding (but posterior) pit of the knee is the ______ fossa.
cubital, popliteal
Listening to the natural sounds made by the body, such as heart and lung sounds, is called _________.
auscultation
Histology is the study of _________.
microscopic examination of tissue specimens
Situs inversus and horseshoe kidney are examples of __________.
anatomical variation
A mass of similar cells that forms a discrete region of our body is a(n) ___________.
organ
The study of structure is __________.
anatomy
The study of function is __________.
physiology
_________ is a type of examination of the human body by simply looking at the bodies surface appearance.
Inspection
___________ means feeling a structure with the hands.
Palpation
____________ is where the examiner taps on the body, feels for abnormal resistance, and listens to the emitted sound for signs of abnormalities.
Percussion
________ and _________ both mean "cutting apart".
anatomy; dissection
The study of more than one species in order to gain insight into similarities and differences is called ______________.
comparative anatomy
____________ refers to the fine detail, down to the molecular level, revealed by the electron microscope.
Ultrastructure
Hierarchy of Complexity
organism - organ system - organs - tissues - cells - organelles - molecules - atoms
What are the 11 organ systems?
integumentary, skeletal, muscular, nervous, endocrine, circulatory, lymphatic, respiratory, urinary, digestive, and reproductive.
An _______ is a structure composed of two or more tissue types that work together to carry out a particular function.
organ
A ______ is a mass of similar cells and cell products that forms a discrete region of an organ and performs a specific function.
tissue
What are the 4 primary classes of tissue?
epithelial, nervous, muscular, and connective tissue.
The theory that a large, complex system such as the human body can be understood by studying its simpler components is called _________.
reductionism
The theory that there are "emergent properties" of the whole organism that cannot be predicted from the properties of its separate parts is _________.
holism
The normal arrangement of internal organs is called ____________.
situs solitus
Approximately 1 in 8000 people are born with an abnormality called _____________ where the organs of the thoracic and abdominal cavities are reversed between right and left.
situs inversus
A selective right-left reversal of the heart is called ____________.
dextrocardia
In __________ a single organ occupies an atypical position - for example, a kidney located low in the pelvic cavity instead of high in the abdominal cavity.
situs perversus
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions above and try again
Example:
Reload the page to try again!
Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together
Voice Recording
|
Perl 6 - the future is here, just unevenly distributed
IRC log for #perl6, 2016-08-21
Perl 6 | Reference Documentation | Rakudo
| Channels | #perl6 index | Today | | Search | Google Search | Plain-Text | summary
All times shown according to UTC.
Time Nick Message
00:04 canopus joined #perl6
00:16 masak hey, just want to show this, because it's pretty neat:
00:16 masak $ bin/007 -e='macro name(var) { return new Q::Literal::Str { value: var.name } }; my x; say(name(x))'
00:16 masak x
00:17 masak that is, `name(some_var)` is a macro that turns a variable into the name of that variable
00:17 masak I like it because it's short, and it *definitely* can't be done with a normal function
00:18 timotimo m: my $hello; sub name($var is raw) { say $var.name }; name($hello)
00:18 camelia rakudo-moar 668dc5: OUTPUT«Method 'name' not found for invocant of class 'Any' in sub name at <tmp> line 1 in block <unit> at <tmp> line 1»
00:18 timotimo m: my $hello; sub name($var is raw) { say $var.^name }; name($hello)
00:18 camelia rakudo-moar 668dc5: OUTPUT«Any»
00:18 timotimo m: my $hello; sub name($var is raw) { say $var.VAR.^name }; name($hello)
00:18 camelia rakudo-moar 668dc5: OUTPUT«Scalar»
00:18 timotimo m: my $hello; sub name($var is raw) { say $var.VAR.name }; name($hello)
00:18 camelia rakudo-moar 668dc5: OUTPUT«$hello»
00:18 timotimo there we go.
00:18 timotimo masak: doesn't count as a "normal" function? :)
00:18 masak well, .VAR is "a macro"
00:19 masak in that it's noticed by the compiler and turned into magic
00:19 M-Illandan joined #perl6
00:19 Matthew[m] joined #perl6
00:20 masak I'd maintain that `name(var)` is somewhat more impressive, since it's user-defined ;)
00:21 masak m: my $hello; my $goodbye := $hello; sub name($var is raw) { say $var.VAR.name }; name($goodbye)
00:21 camelia rakudo-moar 668dc5: OUTPUT«$hello»
00:21 masak also, .VAR.name has obvious problems such as the above one
00:21 timotimo OK :)
00:22 masak 'night, #perl6
00:22 timotimo gnite masak
00:28 webstrand joined #perl6
00:44 heatsink joined #perl6
00:53 mrsolo joined #perl6
01:15 zacts joined #perl6
01:19 kalkin-_ joined #perl6
01:20 eyck joined #perl6
01:21 tbrowder left #perl6
01:21 BenGoldberg joined #perl6
01:40 MasterDuke m: my $a = 'a'; my $b = 'b'; say 'should not see this' if 'b' ne all($a, $b)
01:40 camelia rakudo-moar 668dc5: OUTPUT«should not see this»
01:40 MasterDuke m: my $a = 'a'; my $b = 'b'; say 'should not see this' if 'b' eq none($a, $b)
01:40 camelia rakudo-moar 668dc5: ( no output )
01:41 TimToady ne does "not raising", so it's equivalent to not 'b' eq all($a,$b)
01:41 TimToady (so does English, btw)
01:42 MasterDuke huh, somehow that's not what i expect
01:42 TimToady the opposite is not what most English speakers expect
01:46 TimToady m: say 1 ne any 1, 2
01:46 camelia rakudo-moar 668dc5: OUTPUT«False»
01:47 ilbot3 joined #perl6
01:47 Topic for #perl6 is now »ö« Welcome to Perl 6! | https://perl6.org/ | evalbot usage: 'p6: say 3;' or rakudo:, or /msg camelia p6: ... | irclog: http://irc.perl6.org or http://colabti.org/irclogger/irclogger_logs/perl6 | UTF-8 is our friend!
01:48 MasterDuke i've spoken English my whole life and that still feels wrong, but maybe logic classes + programming experience has colored what i expect
01:48 TimToady ayup :)
01:48 TimToady you never say "I am not any of those." ?
01:49 TimToady you'd have to say "I am not all of those." :P
01:49 TimToady (by the logic view)
01:50 TimToady anyway, you found one of the workarounds :)
01:52 MasterDuke yep, but i suspect i'll make that mistake again
01:53 MasterDuke i'll have to ponder it a while
01:53 TimToady consider that ne is reall the !eq metaoperator
01:53 TimToady *really
01:53 TimToady and as a higher-order function, it's modifying 'eq'
01:53 kurahaupo joined #perl6
01:53 TimToady the results of 'eq', that is
01:54 TimToady which is just like linguistic not-raising
01:54 MasterDuke the original code was $a ne 'a' and $a ne 'b'
01:54 TimToady the fact that one of the arguments to eq comes before the negation is just a trick of infix syntax plus metaoperators
01:55 MasterDuke so my first instinct was $a ne 'a' & 'b'
01:55 TimToady but that's really like "not $a eq 'a' and not $a eq 'b'"
01:57 TimToady the fact that a computer languages has smushed to two morphemes into one is kinda immaterial to the semantics, which is 'is' vs 'is not' in English
01:59 TimToady and not being an adverb, it modifies the entire predicate, and doesn't fire off before the modified verb
02:00 TimToady Are you Fred or Bob? No, I am not Fred or Bob.
02:01 MasterDuke somehow the de Morgan transformation, which does makes sense from a pure logic point of view, isn't quite sinking in to my natural language translation of the particular code that i wanted to write
02:01 TimToady we often give lip service to Perl being like a natural language, but in this case it really is
02:01 MasterDuke (and i'm not sure which is more deficient, my logic or my language)
02:03 MasterDuke but the docs were good enough to correct me!
02:03 TimToady De Morgan is: not A or not B :: not (A and B), but there's no 'eq' in there
02:05 TimToady and things get complicated in any computer language when negation is artifically attached to another operator; I seem to recall that C++ has special rules about overloading negated ops too
02:06 MasterDuke good grief, i didn't even read the docs right. "$a !op $b is rewritten internally as !($a op $b)"
02:08 MasterDuke not quite the same as De Morgan
02:08 TimToady yes, that's more like the not-raising I was mentioning, though that's not quite what not-raising means in English either
02:08 TimToady "I don't think so" really really "I think not."
02:08 TimToady that's the real not-raising
02:09 TimToady but we do, in fact, parse the not as applying to the whole predicate, even though it's embedded in the middle
02:10 TimToady just as with any other adverb: I am quickly running down the street.
02:10 TimToady a side effect of SVO order, which is kind of infixy when you think about it
02:11 noganex joined #perl6
02:14 MasterDuke makes we wonder what other language speakers would have the same/better/worse understanding of Perl 6 Junctions
02:15 MasterDuke does different native sentence structure lend itself to an easier understanding of formal logic
02:16 geekosaur not really because no natural language is based on formal logic :)
02:17 TimToady well, Japanese is pretty close to reverse polish, so as an SOV language, the negation actually comes after the V, so can't be confused for anything in the middle; otoh, they tend to double-negative their adverbs for that reason: I seldom don't do that
02:18 TimToady well, more like "seldom that don't"
02:25 labster joined #perl6
02:28 lizmat joined #perl6
02:29 canopus joined #perl6
02:31 Xliff_ *sigh*
02:32 Xliff_ I'm bored. Anyone have a problem they want solved in P6?
02:35 MasterDuke Xliff_: https://github.com/moritz/svg-plot/issues/8 and https://github.com/moritz/svg/issues/1
02:41 MasterDuke oh well, guess i don't have interesting problems...
02:43 Xliff_ OOH!
02:43 Xliff_ Beggars can't be choosers.
02:45 * MasterDuke joking around
02:47 MasterDuke TimToady: would it be reasonable to request to warn the user if there's any code in a given block after the whens? e.g., given 42 { when Int { say 'Life...' }; say 'this does not get run'; }
02:48 ShimmerFairy MasterDuke: only if we were somehow able to analyze the "probability" of the when being True
02:49 ShimmerFairy MasterDuke: consider for ^100 { when * %% 12 { #`(these numbers are stupid) }; doing-stuff-here(); } as an example
02:50 MasterDuke ah right, but what about: given 'a' { when Int { say 'Life...' }; default { say 'this does get run' }; say 'this does not get run'; }
02:51 MasterDuke of interesting: given 'a' { when Int { say 'Life...' }; say 'this does in fact get run'; default { say 'this does get run' }; }
02:51 MasterDuke *oh interesting
02:53 skids joined #perl6
02:54 MasterDuke ok, how about warning if there's any code after the default? is that too difficult?
02:55 petercommand joined #perl6
02:55 ShimmerFairy not sure about that one. The default would be the only easy one to make the warning for, relatively speaking :)
02:58 pierre_ joined #perl6
02:58 cibs joined #perl6
03:04 dalek whateverable: 540aba6 | MasterDuke17++ | Bisectable.p6:
03:04 dalek whateverable: Instead of calling 'git bisect run', implement the functionality in code
03:04 dalek whateverable: review: https://github.com/perl6/whateverable/commit/540aba62e7
03:05 dalek doc: 29f9b56 | (Douglas L. Schrag)++ | doc/Language/testing.pod6:
03:05 dalek doc: Remove references to 'done' method (obsolete)
03:05 dalek doc:
03:05 dalek doc: Clarify to refer to the done-testing method.
03:05 dalek doc: review: https://github.com/perl6/doc/commit/29f9b56c24
03:06 dalek doc: cb3c5b5 | titsuki++ | doc/Language/testing.pod6:
03:06 dalek doc: Merge pull request #848 from dmaestro/done_testing_clarification
03:06 dalek doc:
03:06 dalek doc: Remove references to 'done' method (obsolete)
03:06 dalek doc: review: https://github.com/perl6/doc/commit/cb3c5b5fe4
03:07 infina joined #perl6
03:07 infina joined #perl6
03:10 TimToady ShimmerFairy: seems like warning after a default or a when * would make sense
03:11 ShimmerFairy yeah, that's fine and it seems like it'd be far easier than doing it after 'when' blocks.
03:11 TimToady and we could presumably know the outcome at compile time if the given was a constant, but maybe they're just writing it that way to select code for one architecture or another
03:12 ShimmerFairy TimToady: I don't imagine code after a default {} would be very useful unless you played around with labels and gotos, so there should certainly be a warning.
03:12 TimToady and otherwise the situation is unlikely to arise in practice
03:12 TimToady mainly you have the situation where someone puts the default first because they're thining C semantics
03:12 TimToady thinking, even
03:13 MasterDuke RT #129025
03:14 MasterDuke no link? RT#129025
03:15 MasterDuke oh, synopsisbot isn't running
03:15 MasterDuke https://rt.perl.org/Ticket/Display.html?id=129025
03:20 Xliff_ MasterDuke: Seems like output from SVG::Plot comes out in a pair. By the time it gets to XML::Writer it only sees one element to serialize.
03:23 bjz joined #perl6
03:23 MasterDuke Xliff_: think it makes sense to change SVG::Plot or XML::Writer?
03:24 Xliff_ SVG::Plot
03:24 Xliff_ MasterDuke: Take a look at an SVG encoding example in XML::Writer.
03:24 Xliff_ I will fpaste.
03:28 Xliff_ https://da.gd/ba6iU
03:28 Xliff_ I'm seeing something entirely different from SVG::Plot
03:35 MasterDuke think it's an easy fix?
03:41 pdcawley joined #perl6
03:43 Xliff_ MasterDuke: Depends if it really is an issue with the output from SVG::Plot or not.
03:45 Xliff_ This little diddy worked fine enough.
03:45 Xliff_ http://paste.fedoraproject.org/411794/14717511/
03:47 Xliff_ Looks to me like SVG::Plot is creating an extra array when it doesn't need to.
03:50 MasterDuke well i'm about to fall asleep at the keyboard, so i'm off, thanks for looking into it!
03:52 canopus joined #perl6
04:01 Xliff_ No worries! If I figure it out, I will put in a PR.
04:01 lizmat joined #perl6
04:02 canopus joined #perl6
04:06 zacts joined #perl6
04:12 Xliff_ MasterDuke, BOOYAH!
04:17 Cabanossi joined #perl6
04:19 canopus joined #perl6
04:30 canopus joined #perl6
04:38 xdbr joined #perl6
04:46 canopus joined #perl6
04:48 PvLfNQxpCk joined #perl6
04:56 ggoebel joined #perl6
05:10 xdbr joined #perl6
05:21 CIAvash joined #perl6
05:33 lizmat_ joined #perl6
06:02 bPqArhZYBx joined #perl6
06:11 ufobat joined #perl6
06:19 pierre_ joined #perl6
06:25 domidumont joined #perl6
06:25 rindolf joined #perl6
06:29 domidumont joined #perl6
06:55 espadrine joined #perl6
07:04 lizmat joined #perl6
07:17 darutoko joined #perl6
07:25 firstdayonthejob joined #perl6
07:31 TheLemonMan joined #perl6
08:23 bjz joined #perl6
08:23 labster joined #perl6
08:23 labster joined #perl6
08:27 xdbr joined #perl6
08:45 wamba joined #perl6
08:46 woolfy joined #perl6
08:54 pierre_ joined #perl6
08:54 setty1 joined #perl6
09:09 canopus joined #perl6
09:13 woolfy left #perl6
09:22 Grauwolf joined #perl6
09:25 pmurias joined #perl6
09:32 canopus joined #perl6
09:37 RabidGravy joined #perl6
09:48 cpage joined #perl6
09:50 nine win 13
09:55 Xliff_ How can I force a list to an array?
09:55 pierre_ joined #perl6
09:56 Xliff_ m: my $p = (c => 1, 2, 3); say $p.WHAT;
09:56 camelia rakudo-moar 668dc5: OUTPUT«(List)»
09:56 Xliff_ m: my $p = c => (1, 2, 3); say $p.WHAT;
09:56 camelia rakudo-moar 668dc5: OUTPUT«(Pair)»
09:56 Xliff_ m: my $p = c => (1, 2, 3); say $p.key
09:56 camelia rakudo-moar 668dc5: OUTPUT«c»
09:56 Xliff_ m: my $p = c => (1, 2, 3); say $p.value.WHAT
09:56 camelia rakudo-moar 668dc5: OUTPUT«(List)»
09:57 Xliff_ OK, so now I think I know what the issue is.
09:57 Xliff_ m: my $p = c => (1, 2, 3).flat; say $p.value.WHAT
09:57 camelia rakudo-moar 668dc5: OUTPUT«(Seq)»
09:57 Xliff_ m: my $p = c => !(1, 2, 3); say $p.value.WHAT
09:57 camelia rakudo-moar 668dc5: OUTPUT«(Bool)»
09:57 Xliff_ m: my $p = c => |(1, 2, 3); say $p.value.WHAT
09:57 camelia rakudo-moar 668dc5: OUTPUT«(Slip)»
09:57 Xliff_ m: my $p = c => @(1, 2, 3); say $p.value.WHAT
09:57 camelia rakudo-moar 668dc5: OUTPUT«(List)»
09:57 Xliff_ m: my $p = c => [1, 2, 3]; say $p.value.WHAT
09:57 camelia rakudo-moar 668dc5: OUTPUT«(Array)»
09:58 Xliff_ m: my $l = (1, 2, 3); $p = c => [1, 2, 3]; say $l.WHAT; say $p.value.WHAT
09:58 camelia rakudo-moar 668dc5: OUTPUT«5===SORRY!5=== Error while compiling <tmp>Variable '$p' is not declaredat <tmp>:1------> 3my $l = (1, 2, 3); 7⏏5$p = c => [1, 2, 3]; say $l.WHAT; say $p»
09:58 Xliff_ m: my $l = (1, 2, 3); my $p = c => [1, 2, 3]; say $l.WHAT; say $p.value.WHAT
09:58 camelia rakudo-moar 668dc5: OUTPUT«(List)(Array)»
09:59 Xliff_ m: my $l = (1, 2, 3); my $p = c => [$l.flat]; say $l.WHAT; say $p.value.WHAT; dd $p.value;
09:59 camelia rakudo-moar 668dc5: OUTPUT«(List)(Array)[1, 2, 3]»
09:59 Xliff_ m: my $l = (1, 2, 3); my $p = c => [$l]; say $l.WHAT; say $p.value.WHAT; dd $p.value;
09:59 camelia rakudo-moar 668dc5: OUTPUT«(List)(Array)[(1, 2, 3),]»
10:00 AlexDaniel joined #perl6
10:11 mvorg joined #perl6
10:14 rindolf joined #perl6
10:15 pierre_ joined #perl6
10:17 xinming joined #perl6
10:30 canopus joined #perl6
10:42 Actualeyes joined #perl6
10:43 domidumont joined #perl6
10:45 timotimo m: sub the_thing { succeed }; given 42 { default { say "vroom"; the_thing }; say "doesn't get run ... ?" }
10:45 camelia rakudo-moar 668dc5: OUTPUT«vroom»
10:45 timotimo m: sub the_thing { proceed }; given 42 { default { say "vroom"; the_thing }; say "doesn't get run ... ?" }
10:45 camelia rakudo-moar 668dc5: OUTPUT«vroomdoesn't get run ... ?»
10:49 MasterDuke timotimo: interesting, that does seem to make it a bit harder to detect code that won't get run
10:50 timotimo definitely
10:50 timotimo i've got something that's even worse :)
10:51 timotimo m: my $*OUT = class { method print($_) { note $_; proceed } }; given 42 { default { say "vroom" }; say "doesn't get run ... ?" }
10:51 camelia rakudo-moar 668dc5: OUTPUT«vroomdoesn't get run ... ?proceed without when clause in method print at <tmp> line 1 in block <unit> at <tmp> line 1»
10:51 timotimo m: my $*OUT = class { method print($_) { note $_; proceed CATCH { default { } } } }; given 42 { default { say "vroom" }; say "doesn't get run ... ?" }
10:51 camelia rakudo-moar 668dc5: OUTPUT«5===SORRY!5=== Error while compiling <tmp>Undeclared name: CATCH used at line 1. Did you mean 'Match'?»
10:51 timotimo m: my $*OUT = class { method print($_) { note $_; proceed; CATCH { default { } } } }; given 42 { default { say "vroom" }; say "doesn't get run ... ?" }
10:51 camelia rakudo-moar 668dc5: OUTPUT«vroomdoesn't get run ... ?»
10:52 timotimo you don't even have to put it into a dynamic variable in scope, you can put it into PROCESS::
10:52 timotimo at least i think so?
10:55 timotimo so, yeah. never going to be able to analyze that statically :)
10:55 timotimo until we have link-time analysis of things
10:58 MasterDuke i updated the ticket with your examples
11:00 synopsebot6 joined #perl6
11:00 timotimo that's not my fault!
11:01 Xliff_ MasterDuke: I've submitted patches to your issue. I can get circle.pl and test-suite-committers.pl working via changes to Plot.pm and Plot/Pie.pm
11:01 Xliff_ https://github.com/moritz/svg-plot/issues/10
11:01 Xliff_ https://github.com/moritz/svg-plot/issues/8
11:01 timotimo anyway, synopsebot6 is up again
11:02 MasterDuke timotimo: all will be forgiven if you just implement link-time analysis of things today
11:02 timotimo no, i meant ... synopsebot6 came in and our matrix users died
11:02 MasterDuke Xliff_: great
11:03 MasterDuke timotimo: ahh, that makes more sense
11:03 Xliff_ MasterDuke: Now I'm bored, again.
11:03 Xliff_ 8-)
11:03 Xliff_ Also sleepy. So I guess I'll do that.
11:03 timotimo Xliff_: have you been able to use GTK::Simple in the past?
11:03 timotimo ah, ok
11:03 Xliff_ timotimo, never tried it.
11:03 timotimo you can sleep, of course :)
11:04 timotimo because GTK::Simple can't be installed on linux right now because it can't find a .dll it wants for some reason
11:04 Xliff_ timotimo, Are you tempting me? Sleep can wait for an interesting problem.
11:04 timotimo not interesting, though ;)
11:04 Xliff_ Um.
11:04 Xliff_ linux and dll used in the same sentence? Does not compute! =)
11:04 timotimo basically that's the issue :)
11:04 Xliff_ so .... s/dll/so/
11:04 timotimo it tries to copy a lzma.dll or something
11:05 timotimo no, it ought to use the system-supplied so files
11:05 timotimo lzma doesn't make sense to me at all in this setting
11:08 Xliff_ libxml2-2 under windows aparently needs lzma.
11:08 timotimo OK
11:09 Xliff_ Same under Linux.
11:09 Xliff_ I will try to install my local clone.
11:09 Xliff_ It says its up-to-date
11:10 timotimo i suppose it's just because the resources in META6.json just has the dlls in there
11:10 Xliff_ Hmmm... no fpaste announcement?
11:10 Xliff_ http://fpaste.scsys.co.uk/532205
11:10 Xliff_ No.
11:10 Xliff_ Check the fpaste. libxml2 links against liblzma
11:10 timotimo you're not understanding the problem here
11:12 Xliff_ I'm building so I can get context.
11:12 MasterDuke .seen perlpilot
11:12 timotimo it also takes like an hour to build all the stuff
11:12 yoleaux I saw perlpilot 19 Aug 2016 21:40Z in #perl6: <perlpilot> perhaps
11:13 Xliff_ timotimo, I'm beginning to see that....
11:13 tadzik joined #perl6
11:14 timotimo Failed to open file /home/timo/perl6/ecosystem/gtk-simple/.panda-work/1471777961_1/resources/blib/lib/GTK/liblzma-5.dll: no such file or directory
11:14 timotimo that's the error i'm complaining about
11:15 timotimo and i think it's just resources: having all the dll in it that's breaking all platforms but windows
11:16 timotimo i'm almost tempted to just touch all these paths in Build.pm if no download is needed
11:18 xinming joined #perl6
11:18 Xliff_ Seen in last apt operation - "Setting up wayland-protocols (1.7-1) ..."
11:18 Xliff_ As long as there is no package starting with "yutani" we're good.....
11:18 Xliff_ timotimo, I'm looking. My install broke because it couldn't find libgtk....
11:19 MasterDuke has anyone had a problem with temp files created by File::Temp disappearing earlier than they should?
11:20 timotimo i'm commiting a very rough fix
11:21 dalek gtk-simple: 8db5f12 | timotimo++ | Build.pm:
11:21 dalek gtk-simple: on non-windows, just create empty files for dlls
11:21 dalek gtk-simple:
11:21 dalek gtk-simple: so that we can actually install the damn thing. otherwise
11:21 dalek gtk-simple: panda will just try to copy all the resource files and
11:21 dalek gtk-simple: complain that the dlls do not exist.
11:21 dalek gtk-simple: review: https://github.com/perl6/gtk-simple/commit/8db5f12232
11:22 Xliff_ timotimo: Which commit. It installed here with no problems once I installed libgtk-3-dev
11:23 timotimo what? how?
11:23 Xliff_ Well... I should say that the tests have passed. It is in the installation phase, now.
11:23 pierre_ Hi, small question about multidimensional array and type
11:23 Xliff_ What commit level is your gtk-simple? It's quite possible I am on an old branch even though "git pull" said everything was up to date.
11:24 timotimo i'm on 8db5f1 now :)
11:24 pierre_ m: my Int @a = ( 1, 2, 3);
11:24 camelia rakudo-moar 668dc5: ( no output )
11:24 timotimo god damn it. my commit didn't work apparently?
11:26 pierre_ m: my Int @a = ( 1, 2, 3); say @a[1];
11:26 camelia rakudo-moar 668dc5: OUTPUT«2»
11:26 pierre_ m: my Int @a = ( 1, 2; 3, 4); say @a[1;1];
11:26 camelia rakudo-moar 668dc5: OUTPUT«Type check failed in assignment to @a; expected Int but got List ($(1, 2)) in block <unit> at <tmp> line 1»
11:27 pierre_ Is it possible to have a type shaped array?
11:27 Xliff_ Feck! Yeah. I was behind.
11:27 Xliff_ On my stale fork.
11:27 timotimo ah, well :)
11:27 * Xliff_ headdesks
11:28 Xliff_ Well, I will try again and see if it blows up.
11:28 timotimo mhyup
11:28 timotimo i think i b0rked it by not mkdir-ing the basedir
11:29 pierre_ m: my Int @a[2;2] = ( 1, 2; 3, 4); say @a[1;1];
11:29 camelia rakudo-moar 668dc5: OUTPUT«4»
11:29 pierre_ hum, just need to figure out how to handle unknow size
11:29 pierre_ m: my Int @a[*;*] = ( 1, 2; 3, 4); say @a[1;1];
11:29 camelia rakudo-moar 668dc5: OUTPUT«Jagged array shapes not yet implemented. Sorry.  in block <unit> at <tmp> line 1»
11:31 pierre_ m: my Int @a[*;*] = ( 1, 2; 3, 4); say @a[1;*];
11:31 camelia rakudo-moar 668dc5: OUTPUT«Jagged array shapes not yet implemented. Sorry.  in block <unit> at <tmp> line 1»
11:31 timotimo holy lord, this is so slow ...
11:31 pierre_ m: my Int @a[2;2] = ( 1, 2; 3, 4); say @a[1;*];
11:31 camelia rakudo-moar 668dc5: OUTPUT«Partially dimensioned views of arrays not yet implemented. Sorry.  in block <unit> at <tmp> line 1»
11:34 dalek gtk-simple: e1d1aee | timotimo++ | Build.pm:
11:34 dalek gtk-simple: needed to mkdir the basedir first.
11:34 dalek gtk-simple:
11:34 dalek gtk-simple: also don't put those nasty backslashes for path seps
11:34 dalek gtk-simple: on anything but windows.
11:34 dalek gtk-simple: review: https://github.com/perl6/gtk-simple/commit/e1d1aeee30
11:48 xiaomiao joined #perl6
11:51 firstdayonthejob joined #perl6
11:51 Xliff_ Failed to open file .../projects/gtk-simple/.panda-work/1471779562_1/resources/blib/lib/GTK/liblzma-5.dll: no such file or directory
11:51 Xliff_ Wheee.
11:51 timotimo yup. but i fixed it in the mean time
11:51 timotimo so you can sleep now if you want :)
11:53 Xliff_ Trying again.
11:53 Xliff_ This takes so long I can grab steal cat naps of 5 minutes and check. Rinse. Repeat.
11:54 tbrowder joined #perl6
11:56 timotimo :)
11:58 Xliff_ Fix confirmed.
11:58 Xliff_ Although I see what you mean about "rough"
11:58 timotimo :)
11:59 tbrowder I just added a new issue for the docs ref sprintf and printf. After more consideration, I think the best way to go is to take one function as the master description and reference it from the other. I think printf has the best description at the moment, but I defer to a consensus. By the way, the reason I am looking at the issue is I found neither
11:59 tbrowder description mentions use of the asterisk for programmatic formatting of precision and width.
11:59 timotimo right now i have another annoying problem to deal with: i don't have my newest GPG key handy, and someone used it to send me mail
12:00 Xliff_ timotimo++
12:00 Xliff_ Now I sleep.
12:18 tbrowder p6: say 3
12:18 camelia rakudo-moar 668dc5: OUTPUT«3»
12:18 M-Illandan joined #perl6
12:18 Matthew[m] joined #perl6
12:18 tbrowder m: say 3
12:18 camelia rakudo-moar 668dc5: OUTPUT«3»
12:20 moritz fwiw I've invited Xliff++ as a contributor to the svg-plot repo.
12:26 timotimo heyo moritz :)
12:26 timotimo how's your trip? :)
12:31 domidumont joined #perl6
12:34 itaipu joined #perl6
12:48 masak hi, #perl6
12:48 Zoffix left #perl6
12:49 timotimo hello, #masak
12:53 * masak .oO( hello, masak-chan )
12:59 mtatai joined #perl6
13:04 rindolf joined #perl6
13:07 TimToady .oO(ohayo goes eye muss)
13:11 * masak .oO( saw a dee, craw )
13:16 gfldex joined #perl6
13:17 gfldex
13:23 avenj joined #perl6
13:23 avenj joined #perl6
13:24 canopus joined #perl6
13:36 ItayAlmog joined #perl6
13:40 dalek doc: 1e9acb9 | (Tom Browder)++ | doc/Language/io.pod6:
13:40 dalek doc: Add info on writing formatted strings to a file
13:40 dalek doc: review: https://github.com/perl6/doc/commit/1e9acb95ab
13:46 zacts joined #perl6
13:52 mohae_ joined #perl6
13:58 canopus joined #perl6
14:00 zakharyas joined #perl6
14:01 moritz timotimo: quite nice, thanks
14:01 kurahaupo joined #perl6
14:01 moritz leaving to more civilized areas (non-volume limited Internet :-) tomorrow
14:03 masak \o/
14:03 configX joined #perl6
14:03 moritz very nice beach here, we all enjoy it very much
14:04 moritz so much so that in a week, we've only had one day of sight seeing / exploring, and spent the rest just going to the beach :-)
14:07 moritz afk again&
14:08 canopus joined #perl6
14:18 canopus joined #perl6
14:19 uvhrLnsaYG joined #perl6
14:25 bob778 joined #perl6
14:29 zacts joined #perl6
14:31 guest247 joined #perl6
14:39 canopus joined #perl6
14:49 dalek doc: 29a3726 | (Tom Browder)++ | doc/Language/io.pod6:
14:49 dalek doc: Re-arrange and reword note on printf
14:49 dalek doc: review: https://github.com/perl6/doc/commit/29a37268e5
14:49 khw joined #perl6
14:50 tbrowder left #perl6
14:58 Secris joined #perl6
14:58 Secris joined #perl6
14:58 Secris joined #perl6
15:05 freakcoco joined #perl6
15:24 JoaquinFerrero joined #perl6
15:25 canopus joined #perl6
15:29 lucs Is there something analogous to Perl 5's 「$#array」 to get an array's last index?
15:30 ufobat joined #perl6
15:31 danaj joined #perl6
15:31 CIAvash lucs: @array.end
15:31 lucs Aha, thanks.
15:31 grondilu m: say (^10).end
15:31 camelia rakudo-moar 668dc5: OUTPUT«9»
15:35 JoaquinFerrero left #perl6
15:43 dalek ecosystem/MARTIMM-patch-1: 3a69ebc | (Marcel Timmerman)++ | META.list:
15:43 dalek ecosystem/MARTIMM-patch-1: PKCS #5 with PBKDF2
15:43 dalek ecosystem/MARTIMM-patch-1:
15:43 dalek ecosystem/MARTIMM-patch-1: Partly implemented PKCS #5 with Key derivation function PBKDF2 from RFC2898
15:43 dalek ecosystem/MARTIMM-patch-1: review: https://github.com/perl6/ecosystem/commit/3a69ebc6b1
15:45 n1lp7r joined #perl6
16:04 BenGoldberg joined #perl6
16:16 dalek ecosystem: 3a69ebc | (Marcel Timmerman)++ | META.list:
16:16 dalek ecosystem: PKCS #5 with PBKDF2
16:16 dalek ecosystem:
16:16 dalek ecosystem: Partly implemented PKCS #5 with Key derivation function PBKDF2 from RFC2898
16:16 dalek ecosystem: review: https://github.com/perl6/ecosystem/commit/3a69ebc6b1
16:16 dalek ecosystem: f4e0e58 | (Zoffix Znet)++ | META.list:
16:16 dalek ecosystem: Merge pull request #237 from perl6/MARTIMM-patch-1
16:16 dalek ecosystem:
16:16 dalek ecosystem: PKCS #5 with PBKDF2
16:16 dalek ecosystem: review: https://github.com/perl6/ecosystem/commit/f4e0e582e8
16:21 AndyBotwin joined #perl6
16:34 xdbr joined #perl6
16:34 zacts joined #perl6
16:37 TEttinger joined #perl6
16:37 thowe joined #perl6
16:38 thowe Hello
16:48 canopus joined #perl6
16:50 zakharyas joined #perl6
16:53 b2gills m: camelia: say "hello thowe"
16:53 camelia rakudo-moar 668dc5: OUTPUT«hello thowe»
16:54 ItayAlmog joined #perl6
17:00 canopus joined #perl6
17:06 autark joined #perl6
17:06 pmurias how do I import the QAST classes into my Perl 6 program?
17:13 pmurias ahh, I was using :from<nqp> instead of :from<NQP>
17:14 pmurias it would be great to have an error message for unsupported :froms
17:21 itaipu joined #perl6
17:22 timotimo m: use foobar:from<durane>
17:22 camelia rakudo-moar 668dc5: OUTPUT«===SORRY!===Could not find foobar at line 1 in: /home/camelia/.perl6 /home/camelia/rakudo-m-inst-1/share/perl6/site /home/camelia/rakudo-m-inst-1/share/perl6/vendor /home/camelia/rakudo-m-inst-1/share/perl6 CompUnit::Reposi…»
17:22 timotimo ah, hmm.
17:22 pmurias seems significantly LTA
17:23 * TimToady about to board PIT -> ORD -> MUC -> CLJ
17:27 zengargoyle joined #perl6
17:27 Dunearhp joined #perl6
17:31 mohae joined #perl6
17:31 domidumont joined #perl6
17:35 canopus joined #perl6
17:40 pmurias I got a "Too few positionals passed; expected 2 arguments but got 1" error message without a stack trace, are those expected to sometimes happen?
17:51 pmurias lack of stack trace golfed down: http://paste.debian.net/790824/
18:06 dataangel Is there a better way to write this?: my $object-file = (with-suffix $_, ".o").relative(%config{"SOURCE_FOLDER"});
18:07 dataangel I really like being able to call functions without having to use parentheses
18:07 dataangel But every permutation I try for this doesn't work, unless I use parentheses
18:11 felher joined #perl6
18:13 pmurias I don't think there is a better way than with-suffix($_, ".o").relative(%config<SOURCE_FOLDER>)
18:15 dataangel Oh yeah not sure why I didn't think to do that for with-suffix... Didn't know you could index hashes that way though
18:15 dataangel Got it down to: my $object-file = .&with-suffix(".o").relative(%config<SOURCE_FOLDER>);
18:17 pmurias dataangel: is that better?
18:18 pmurias or are you trying to golf things?
18:19 dataangel Honestly I don't know if it is or not, I'm a complete newbie so I don't know if it counts as good or bad style... It doesn't seem any worse to implicitly use .& on the topic variable than just . which people seem to do all over the place and examples
18:20 dataangel s/and examples/in examples
18:23 * pmurias mostly writes NQP
18:23 pmurias .&foo seems to do something slightly different than foo($_)
18:27 dataangel What do you mean? Like there is an actual behavior difference?
18:30 arnsholt Well, the semantics are subtly different
18:31 arnsholt .&foo calls foo as a method with $_ as the invocant
18:31 arnsholt Of course that maps to $_ being passed as the first arg on a sub, so not sure if there's any *actual* difference
18:33 zakharyas joined #perl6
18:39 pmurias if the object being called on overwrote dispatch:<var> there would be a difference
18:50 dataangel Why is this okay?: my %dependencies := set with-suffix $target, ".o"; but not this: my %dependencies := SetHash.new with-suffix $target, ".o"; ?
18:50 dataangel For the latter I had to insert parentheses
19:00 vendethiel joined #perl6
19:05 arnsholt dataangel: You need a colon, I think
19:05 arnsholt SetHash.new:
19:05 arnsholt There's a (parsing related, IIRC) reason why you can't do method invocations without parens and nothing else, but I can't remember what it is
19:05 gfldex set is a sub, SetHash.new is a method
19:06 dataangel arnsholt: that works as well, but then why do I need it in one case but not the other
19:06 arnsholt It's sub versus method, as gfldex pointed out
19:06 dataangel For methods do you always have to use parentheses or the : ?
19:07 arnsholt Yeah, it's either parens or colon
19:07 dataangel Interesting, that actually clears up a lot
19:11 felher joined #perl6
19:13 smls joined #perl6
19:14 cygx joined #perl6
19:14 cygx o/
19:15 cygx dataangel: you don't want something like p.x + p.y be parsed as p.x(+p.y)
19:18 rba__ joined #perl6
19:18 dataangel Is it safe to nest : ?
19:19 smls m: say (1..3).map: *.subst: /2/, "a";
19:19 camelia rakudo-moar 668dc5: OUTPUT«(1 a 3)»
19:19 smls You mean like that?
19:22 dataangel Yes ;)
19:22 rba_ joined #perl6
19:22 dataangel I've just stumbled on the behavior of Nil letting you call any method on it and having it do nothing... It's really nice for prototyping
19:37 dataangel Why is Nil considered defined for the sake of return types while not being considered defined in all other contexts? Why the special case?
19:44 cygx assuming that's by design and not a bug, I'd guess it's because Nil (like Failure) can be used to signal exeptional conditions in-band
19:47 pmurias are error messages without line numbers expected from rakudo?
19:47 Xliff_zzzz moritz: PRs created for both issues in SVG-Plot
19:47 Xliff_zzzz Now I have to look and see if I can do other nifty things with it.
19:49 brrt joined #perl6
19:56 telex joined #perl6
19:59 setty1 joined #perl6
19:59 dataangel I have a SetHash object containing IO::Paths and I want to write a new function that will take it as an argument, what is the most constraining type declaration I can use for the function argument and what is the syntax? SetHash:D %object-files doesn't work and neither does IO::Path:D %object-files which I thought might be would be what I wanted since apparently for declarations the type specifies the type of the elements inside so I
19:59 dataangel thought it might work the same for function arguments
20:00 brrt hey, you know what occured to me earlier this week
20:00 brrt perl5 doesn't have any protocol or solution for iterators
20:00 brrt and.. it sucks
20:02 MasterDuke dataangel: %hash{IO::Path}
20:03 MasterDuke not sure about the SetHash part
20:03 gfldex m: my SetHash[Int] %h;
20:03 camelia rakudo-moar 668dc5: OUTPUT«5===SORRY!5=== Error while compiling <tmp>An exception occurred while parameterizing SetHashat <tmp>:1Exception details: 5===SORRY!5=== Error while compiling <tmp> SetHash cannot be parameterized at <tmp>:1 ------> 3my Set…»
20:03 MasterDuke m: my SetHash %h{IO::Path}
20:03 camelia rakudo-moar 668dc5: ( no output )
20:04 rid joined #perl6
20:04 gfldex dataangel: IO::Path as key or value?
20:05 cygx gfldex: key - a SetHash should always has Bool as value type, doesn't it?
20:05 cygx *have
20:05 gfldex yes
20:05 BenGoldberg brrt, perl5 doesn't have a builtin solution for iterators, but there are many modules on CPAN...
20:05 dataangel Someone said yesterday that SetHash can't be parameterized, which is annoying but if I could at least constrain the function to say that it requires some form of SetHash that would at least be something... It's confusing because why use SetHash:D as the constraint the error I get is "expected SetHash but got Hash" even though SetHash is actually when I'm passing in o_O
20:06 dataangel s/why use/when I use
20:06 cygx dataangel: the type of % or @ variables sets the value contraint
20:07 cygx m: say (my Int @foo).^name
20:07 camelia rakudo-moar 668dc5: OUTPUT«Array[Int]»
20:07 cygx m: say (my @foo of Array[Int]).^name
20:07 camelia rakudo-moar 668dc5: OUTPUT«Array[Array[Int]]»
20:07 cygx hm...
20:07 CIAvash joined #perl6
20:08 brrt BenGoldberg: i know. none of these modules are standard like the __iter__ method is in e.g. python
20:08 brrt this sucks
20:09 mst AlexDaniel: are you drunk? # https://github.com/perl6/doc/issues/850#issuecomment-241277646
20:10 brrt it means that random perl hackers make modules that iterate over stuff and don't work together
20:10 gfldex sub f(%h where .keyof ~~ IO::Path){ dd %h}; my %h{IO::Path}; %h{IO::Path.new("~/.vimrc")} = True; f %h
20:10 gfldex dataangel: ^^^
20:10 AlexDaniel mst: hello. No, that's just my opinion
20:10 AlexDaniel mst: didn't mean to disappoint you :)
20:10 mst AlexDaniel: your opinion didn't cover anything actually suggested though
20:10 mst somebody proposes annotating the *first* example
20:11 BenGoldberg brrt, In python, there is only one way to do things. In perl, there are many.
20:11 mst you argue against (1) changing the example (2) annotating *all* examples
20:11 mst neither was proposed
20:11 BenGoldberg Also, using modules from CPAN is *the* standard way of doing things.
20:11 mst AlexDaniel: in light of that, perhaps you could have an opinion about the actual ticket? :)
20:12 AlexDaniel mst: by annotating the first example we assume that the user will read the document from top to bottom, does it make any sense?
20:12 mst a new perl5 person coming to perl6 is likely to read the 5to6 document from top to bottom
20:12 mst in fact, I happen to know that that's exactly what masochist was doing
20:12 dataangel ... The confusion deepens... Apparently using set operators on SetHash returns a hash, according to WHAT. All I want is a mutable set type that stays that type, instead I have documentation telling me that some SetHash operations will actually return sets and then when I try other operations I get hashes
20:13 brrt no, this means that there is /no/ way i can make the N different iterators in $giant-codebase can't work together unless i glue them
20:13 mst if they skip half the document and become confused, well, that's a different problem
20:13 mst brrt: yeah, that's somewhat annoying - most things seem to provide $iter->next that returns nothing when exhausted, but it's far from perfect
20:13 mst I did at one point consider trying to get a standardised stream role and encourage people to conform to it
20:14 mst but I never quite got round to making it exist
20:14 tadzik joined #perl6
20:14 brrt :-(
20:14 brrt ties can't really do it
20:14 * brrt is going to sleep anyway
20:14 mst the big problem, really, is that nobody really agrees on an object system
20:14 mst so a standard interface is hard
20:15 BenGoldberg List::Gen looks very much like what I'd like for a standardized interface...
20:15 AlexDaniel mst: well, if you insist on annotating the first example then yeah… I think that it's OK. Tomorrow someone will write another example on top of this one and the problem will appear again…
20:16 AlexDaniel 🤷
20:16 mst well, yes, that happens with documentation
20:16 mst it doesn't mean we shouldn't *try* and not confuse people
20:16 rid newbie question, if i may: my $array = []; my @array; say @array == $array; # prints true ... so what's the difference between @array and $array and why should I use one over the other?
20:17 mst AlexDaniel: If you could post a less obnoxious comment to that effect, perhaps it would result in a patch
20:18 cygx rid: wrong comparison operator: == is numeric comparison
20:19 cygx rid: arrays contained in scalar variables are treated as single items for various purposes (eg iteration via for)
20:19 dataangel m: my %built = SetHash.new; say %built.WHAT; # why doesn't it say SetHash?
20:19 camelia rakudo-moar 668dc5: OUTPUT«(Hash)»
20:19 gfldex rid: @-sigiled container must provide some interfaces, like iteration, array-subscripts etc. $-sigiled container may or may not do so. Also, there are different interpolation and assignment rules. see https://docs.perl6.org/language/list#List_Contexts
20:19 dalek doc: 95cd619 | (Zoffix Znet)++ | doc/Language/5to6-nutshell.pod6:
20:19 dalek doc: Add a blurb about dashes in identifiers
20:19 dalek doc:
20:19 dalek doc: Closes #850
20:19 dalek doc: review: https://github.com/perl6/doc/commit/95cd6197c4
20:20 cygx dataangel: you need to use := or a $ sigil
20:20 AlexDaniel ↑ that is actually a better solution
20:20 BenGoldberg m: my $array = []; say +$array;
20:20 camelia rakudo-moar 668dc5: OUTPUT«0»
20:20 AlexDaniel and I stand corrected, there was an easy way to fix it
20:20 gfldex rid: there are plenty of other spots in the docs that show the difference, as sigils are pretty much everywhere in Perl 6
20:21 cygx dataangel: using = copies the contents of your SetHash into the Hash variable
20:21 rid okay so the sigil gives you an idea of how it can be used, not just what it is?
20:22 gfldex rid: it's a plural singular thing. It's esp. useful in signatures.
20:23 gfldex rid: see https://docs.perl6.org/type/Signature#Slurpy_(A.K.A._Variadic)_Parameters
20:23 gfldex rid: defining slurpy arguments would be pretty wordy without the @-sigil
20:24 tbrowder joined #perl6
20:25 dataangel cygx: oh I thought the sigil was just going to control iteration behavior
20:25 rid aha! that actually makes sense. ingenious use of *
20:30 dataangel cygx: if I use := than the type is what I expected, thanks. But later I want to merge another SetHash into %built, and the only way I found to do that was: %built (|)= %old-dependencies; # but then this complains I can't modify an immutable SetHash... But I thought the entire difference between one of those and a set is that they're mutable, so I assume it's complaining that I'm trying to reassign the variable to a new object which
20:30 dataangel isn't what I mean to do... Is there a different way I should be doing it? I don't see a method in the documentation like this, in python it would be the update method on set
20:30 ggoebel joined #perl6
20:31 lizmat joined #perl6
20:32 leego joined #perl6
20:33 pmurias my \Δ = 72; in the identifiers section of the 5to6 nutshell seems like something that could be explained
20:34 cygx dataangel: I guess the SetHash interface could use some improvements
20:34 cygx what you can do is %built{%old-deps.keys} = True xx *
20:35 geekosaur I thought SetHash and friends were up for an overhaul
20:35 geekosaur (waiting, inevitably, on round tuits)
20:36 cygx that may very well be - I've not followed the post-Christmas developments in P6-land very closely
20:39 rindolf joined #perl6
20:40 gfldex m: dd my $sh = SetHash.new; $sh.append(:1th)
20:40 camelia rakudo-moar 668dc5: OUTPUT«SetHash $sh = SetHash.new()Cannot resolve caller append(SetHash: Int); none of these signatures match: (Any:U \SELF: |values is raw) in block <unit> at <tmp> line 1»
20:41 lizmat joined #perl6
20:42 labster joined #perl6
20:46 pmurias is there a way to get .gist/.perl for a instance of a class with indentation?
20:47 mvorg joined #perl6
20:47 gfldex pmurias: there are datadumper modules with pretty-printing in the ecosystem
20:51 n1lp7r joined #perl6
20:52 jferrero joined #perl6
20:59 _ramix_ joined #perl6
21:01 pmurias gfldex: Data::Dump seems to be working
21:03 pmurias I need to make a PR to it to enable turning of the printing out of all the avalible methods
21:04 _ramix_ Hello! I need to know if the method listen of IO::Socket::Async is able to get the remote address from a remote client connection. It's possible? Thanks!
21:04 Possum joined #perl6
21:09 geekosaur doesn't look like that exists at present :(
21:10 geekosaur (even more worrisome, nothing in IO::Socket or IO::Socket::INET either)
21:10 woolfy joined #perl6
21:13 lizmat joined #perl6
21:13 _ramix_ I have found that the method native-descriptor of IO::Socket::INET refers to "socket descriptor". Perhaps I found it there, but it seems very esoteric. Thanks also.
21:15 geekosaur yes, if you can get to that then you can getpeeraddr() via NativeCall. but you shouldn't have to go through those gyrations imo
21:19 M-Illandan joined #perl6
21:19 Matthew[m] joined #perl6
21:20 _ramix_ Indeed, it should be easier. I hope that incorporate this functionality in Rakudo Perl6. Thanks!
21:25 geekosaur best is not to just say it here, but file a rakudobug
21:25 geekosaur "Bug reports should be sent to “rakudobug@perl.org” with the moniker [BUG](including the brackets) at the start of the subject"
21:26 _ramix_ thx
21:28 synopsebot6 joined #perl6
21:30 woolfy1 joined #perl6
21:32 MasterDuke question about LEAVE: in a sub, there are a couple places it returns values. i want to do a chdir whenever the sub is left, so i thought i could just 'LEAVE chdir <path>' and not have to put a chdir before every return
21:32 MasterDuke however, the explicit return values in the sub are getting overwritten by the result of the chdir
21:33 MasterDuke any way to get around this?
21:35 albongo joined #perl6
21:39 ugexe m: sub foo { LEAVE { chdir ".." }; 100 }; say foo()
21:39 camelia rakudo-moar 668dc5: OUTPUT«100»
21:40 MasterDuke m: sub foo { LEAVE chdir ".."; 100 }; say foo()
21:40 camelia rakudo-moar 668dc5: OUTPUT«100»
21:40 MasterDuke m: sub foo { LEAVE chdir ".."; return 100 }; say foo()
21:40 camelia rakudo-moar 668dc5: OUTPUT«100»
21:43 MasterDuke hmm, not sure what's going on
21:44 ugexe i assumed you were doing this
21:44 ugexe m: sub foo { 100; LEAVE { chdir ".." }; }; say foo()
21:44 camelia rakudo-moar 668dc5: OUTPUT«WARNINGS for <tmp>:Useless use of constant integer 100 in sink context (line 1)Nil»
21:44 rid joined #perl6
21:45 MasterDuke m: sub foo { return 100; LEAVE { chdir ".." }; }; say foo()
21:45 camelia rakudo-moar 668dc5: OUTPUT«100»
21:49 DarthGandalf joined #perl6
21:49 MasterDuke ugexe: when this ( https://github.com/perl6/whateverable/blob/master/Bisectable.p6#L228 ) line is hit the the $value in this ( https://github.com/perl6/whateverable/blob/master/Bisectable.p6#L137 ) line is not “‘bisect run’ failure”
21:56 geekosaur m: sub foo { return 100; LEAVE chdir ".." }; say foo()
21:56 camelia rakudo-moar 668dc5: OUTPUT«100»
21:56 geekosaur m: sub foo { { return 100; LEAVE chdir ".." } }; say foo()
21:56 camelia rakudo-moar 668dc5: OUTPUT«"/home".IO»
21:56 geekosaur golfed
21:57 MasterDuke yep, just figured that out
21:58 MasterDuke the sad thing is, that was the very code i was bisecting with to test!
22:14 MilkmanDan joined #perl6
22:17 labster joined #perl6
22:20 skids joined #perl6
22:24 Eduardo_ joined #perl6
22:24 Eduardo_ I'm thinking about creating a NoSQL system using Perl6 - any thoughts on that, friends? tx
22:25 Eduardo_ Idea is to have .pl files being like the MongoDB documents which would allow for sharding and inside, have classes representing items or roles representing items, not sure which already
22:26 woolfy1 Hey Eduardo, nice to see you here,
22:26 Eduardo_ tx wollfy
22:26 Eduardo_ woolfy
22:26 woolfy1 Wga van Dijk here (as my name is on Facebook)'
22:27 Eduardo_ oh
22:27 Eduardo_ great
22:27 woolfy1 Hehe
22:27 Eduardo_ tx
22:27 Eduardo_ should i paste code here too?
22:27 woolfy1 Well, it's night now. For some reason, most Perl 6 developers are from Europe. So, please be patieent.
22:27 woolfy1 patient'
22:27 Eduardo_ or there is a specific forum for that?
22:28 Eduardo_ sure
22:28 Eduardo_ no rush
22:28 woolfy1 You can paste code here, but in small amounts, as concise as possible.
22:29 TimToady otherwise use some nopaste site like gist.github.com
22:29 woolfy1 There is also a mailing list (see http://perl6.org/community/ ) where you can send a mail with bigger chuncks of code. Irc is just not suitable for shuch chunkcs of code.
22:29 Eduardo_ well, perl is an elegant language, i guess that would be the reason :)
22:29 * TimToady sitting at ORD
22:29 woolfy1 TimToady! Looking forward to meet you in Cluj!!!
22:30 Eduardo_ what is cluj?
22:30 TimToady m: say "I am a small amount of code" # :)
22:30 camelia rakudo-moar 668dc5: OUTPUT«I am a small amount of code»
22:30 * woolfy1 is sitting in Hungary...
22:31 woolfy1 (driving with lizmat by car from The Netherlands via Germany, Czech, Slowakia and Hungary to Romania)
22:31 woolfy1 TimToady++
22:31 Eduardo_ well, just had this idea of using Perl6 cool OO "new abilities" to develop a NoSQL system
22:32 Eduardo_ meta-programming pieces of .pl files that should act as data
22:33 Eduardo_ still carrying the ability to run its code
22:34 thowe at some point rakudo stopped running for me, and it also fails to build...
22:34 thowe it would run, but never give the prompt.
22:35 thowe so I tried doing rakudo self-upgrade and rakudo build moar
22:35 TimToady rakudobrew?
22:35 thowe er yes, sorry
22:35 thowe running again so I can give a real error message...
22:36 TimToady I just pulled and made, so HEAD seems fine
22:36 thowe is there a preferred pastebin?
22:36 TimToady I usually use gist.github.com
22:36 thowe sounds good...
22:37 TimToady but I only have 4 minutes of internet left...
22:37 Eduardo_ Tim, do you think a NoSQL database system built with Perl6 is a good idea?
22:38 TimToady I don't actually answer to "Tim"...
22:38 thowe https://gist.github.com/thowe/540cbf8c7a904d0af7eb180409869fa3
22:38 TimToady but hey, the more the merrier
22:39 TimToady thowe: how much memory do you have? you need about a gig
22:39 Eduardo_ who do you answer to? :)
22:39 TimToady I answer to my wife :)
22:39 Eduardo_ lol
22:39 TimToady looks like we're boarding now
22:39 TimToady afk &
22:40 thowe I have 4Gig in this machine
22:40 jdv79 good luck
22:40 jdv79 er, safe travels
22:41 thowe but don't let me keep you
22:41 woolfy1 Good journey, TomToady!
22:42 jdv79 who's TodToady?
22:42 thowe hm, something may be odd, I should try a reboot maybe.
22:43 thowe I'm not running anything of note, but more than half my mem seems to not be free
22:45 woolfy1 Pff. I am drunk, I mean TimToady
22:45 thowe Oh, well. I'll go for a walk and then worry about it later.
22:46 Eduardo_ TimToady for president!!! yay
22:48 woolfy1 Ow, that would be so much better than Trump, Clinton, Stein or Johnson...
22:48 Eduardo_ sure would!
22:49 jdv79 woolfy1: why do you know so many us candidates?
22:50 DarthGandalf joined #perl6
22:51 woolfy1 idv79: it's a skill called "reading". Too many Americans lost that skill.
22:54 jdv79 ive heard reading is hard.
22:55 jdv79 but you are in nl, right? i guess im still surprised so many non-us peeps pay attention to our political shenanigans.
22:57 woolfy1 jdv79: some Dutch people understand the importance of who is going to be the next US president...
22:57 woolfy1 just as some people understand how important Perl 6 is to all the programming communities worldwide...
22:57 jdv79 ah:)
23:00 MilkmanDan joined #perl6
23:01 bbkr joined #perl6
23:06 bbkr r: my Int @t = Int; sub foo (Int:D @x) {}; foo(@t); # should this fail with "...requires an instance of type Int, but a type object was passed." error?
23:07 camelia rakudo-moar 668dc5, rakudo-jvm cd19db: ( no output )
23:16 mcmillhj joined #perl6
23:19 geekosaur probably should but I don't think rakudo makes any attempt to handle :D or :U applied within containers
23:19 geekosaur (also that seems like a nice way to slow a program down a lot...)
23:24 cognominal joined #perl6
23:32 Sgeo_ joined #perl6
23:37 mcmillhj joined #perl6
23:50 baest joined #perl6
23:58 faubi joined #perl6
| Channels | #perl6 index | Today | | Search | Google Search | Plain-Text | summary
Perl 6 | Reference Documentation | Rakudo
|
Tracheophyte
Plant
Alternative titles: Tracheophyta; vascular plant
Tracheophyte, any of the vascular plants, members of the division, or phylum, Tracheophyta, numbering some 260,000 species and including all of the conspicuous flora of the Earth today. Tracheophyte, meaning “tracheid plant,” refers to the water-conducting cells (called tracheids, or tracheary elements) that show spiral bands like those in the walls of the tracheae, or air tubes, of insects.
The division comprises a tremendous diversity of plants among its four subgroups: psilopsids, leafless and rootless primitive forms commonly known as whisk ferns (though not true ferns); sphenopsids, feathery leaved plants commonly called horsetails; lycopsids, low-lying plants called club mosses; and pteropsids, comprising the ferns, gymnosperms (pines, spruces, firs, etc.), and flowering plants.
The vascular system consists of xylem (wood), concerned mainly with the conduction of water and dissolved minerals, and phloem, which functions mainly in the conduction of foods, such as sugar.
Tracheophytes are believed to have originated from the green algae (Chlorophyta). The earliest fossils are from Silurian rocks more than 400,000,000 years old.
What made you want to look up tracheophyte?
(Please limit to 900 characters)
MLA style:
"tracheophyte". Encyclopædia Britannica. Encyclopædia Britannica Online.
Encyclopædia Britannica Inc., 2016. Web. 12 Feb. 2016
<http://www.britannica.com/plant/tracheophyte>.
APA style:
tracheophyte. (2016). In Encyclopædia Britannica. Retrieved from http://www.britannica.com/plant/tracheophyte
Harvard style:
tracheophyte. 2016. Encyclopædia Britannica Online. Retrieved 12 February, 2016, from http://www.britannica.com/plant/tracheophyte
Chicago Manual of Style:
Encyclopædia Britannica Online, s. v. "tracheophyte", accessed February 12, 2016, http://www.britannica.com/plant/tracheophyte.
While every effort has been made to follow citation style rules, there may be some discrepancies.
Please refer to the appropriate style manual or other sources if you have any questions.
Click anywhere inside the article to add text or insert superscripts, subscripts, and special characters.
You can also highlight a section and use the tools in this bar to modify existing content:
Editing Tools:
We welcome suggested improvements to any of our articles.
You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind:
1. Encyclopaedia Britannica articles are written in a neutral, objective tone for a general audience.
2. You may find it helpful to search within the site to see how similar or related subjects are covered.
3. Any text you add should be original, not copied from other sources.
4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are best.)
Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions.
MEDIA FOR:
tracheophyte
Citation
• MLA
• APA
• Harvard
• Chicago
Email
You have successfully emailed this.
Error when sending the email. Try again later.
Or click Continue to submit anonymously:
Continue
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.