text
stringlengths 19
2.62M
|
---|
Field
The application relates in general to a three-dimensional image display apparatus, method, and system, and in particular to a three-dimensional image display apparatus, method, and system for forming a virtual image by projecting a plurality of color depth images to corresponding reflecting plates.
Description of the Related Art
For providing a better visual effect, image display technologies have advanced from providing a two-dimensional image to being able to provide a three-dimensional image with telepresence. When generating a three-dimensional image, the technology in common use segments the original image into two images—one for the left eye and one for the right eye—and then produces a virtual image by using specially treated glasses to receive the images, which are combined in the brain and interpreted as a 3D image. An alternative technology employs the Leia Display System (LDS), which forms a virtual image using a curtain of water. However, there are a lot of limitations with using the above methods. For one thing, each image must be segmented into two images for the left and right eyes. Also, the screen may be unstable, and use of the water curtain is limited by the surroundings. Thus, finding an easy way to display a virtual image at different visual angles is a problem which needs to be solved immediately. |
Alimentary tract cytopathology in human immunodeficiency virus infection: a review of experience in Los Angeles.
In the past decade, over 100,000 cases of the acquired immunodeficiency syndrome (AIDS) have been reported in the United States. Conservative estimates suggest that 1.5 million people are infected with the human immunodeficiency virus (HIV), the etiologic agent of AIDS. Major metropolitan areas, such as Los Angeles, have experienced a rapid increase in the number of AIDS cases. At the Los Angeles County-University of Southern California Medical Center, we have gained significant insight into the cytologic findings associated with HIV infection. Based on our experience, we herein review the technical and morphologic evaluation of alimentary tract cytology specimens from this patient population. |
-module(basiccoin_sup).
-behaviour(supervisor).
-export([start_link/0, init/1, stop/0]).
-define(CHILD(I, Type), {I, {I, start_link, []}, permanent, 5000, Type, [I]}).
-define(keys, [sync_kill, sync_mode, keys, recent_blocks, block_hashes, headers, block_absorber, block_organizer, tx_pool, tx_pool_feeder, mine, sync, tree_data, potential_block, push_block, found_block_timer]).
start_link() ->
supervisor:start_link({local, ?MODULE}, ?MODULE, []).
child_killer([]) -> [];
child_killer([H|T]) ->
supervisor:terminate_child(?MODULE, H),
child_killer(T).
stop() ->
child_killer(lists:reverse(?keys)).
child_maker([]) -> [];
child_maker([H|T]) -> [?CHILD(H, worker)|child_maker(T)].
tree_child(Id, KeySize, Size) ->
tree_child(Id, KeySize, Size, 0).
tree_child(Id, KeySize, Size, Meta) ->
Amount = 2000000,
Sup = list_to_atom(atom_to_list(Id) ++ "_sup"),
{Sup, {trie_sup, start_link, [KeySize, Size, Id, Amount, Meta, constants:hash_size(), hd]}, permanent, 5000, supervisor, [trie_sup]}.
init([]) ->
HS = constants:hash_size(),
Trees = [tree_child(accounts, HS, constants:account_size())],
Children = child_maker(?keys),
io:fwrite("basiccoin sup"),
{ok, { {one_for_one, 50000, 1}, Trees ++ Children} }.
|
I'm not sure if it would look better or not, but I'm wondering what it would look like with the textures scaled smaller (or higher resolution to make the pixels smaller). Just wondering, not trying to throw you off or anything ;p |
Simon Cowell Confirms He's Getting Busy With Carmen Electra
Simon Cowell typically isn’t the most open celebrity about his personal life, but after brushing off rumors about his relationship with Carmen Electra for weeks, the X Factor judge finally decided to meet the speculation head on in the form of a friendly chit-chat with a former co-worker.
Speaking to Ryan Seacrest during a phone call taped for the affable American Idol host’s radio show, Cowell confirmed he and Electra are dating but refused to say whether or not the model/ actress is his full-on girlfriend. Here’s an actual quote, as per Zap2It…
”We're people who date. She's adorable, isn't she?"
It’s a well known fact that Simon likes riling people up. In fact, there’s nothing he loves more than stirring the pot a bit; so, something tells me he knew exactly what he was doing when he used this wild “people who date” turn of phrase. That might piss off a certain percentage of girls, but given Electra’s long history with strange relationships involving people like Dennis Rodman, something tells me she’s not exactly going to lose sleep over how Simon chooses to define what they have at this early juncture.
As for whether or not this has any long-term potential, it actually might. Cowell is well known to like women (and people for that matter) willing to push back, and with her sassy personality and been-there-done-that demeanor, Electra might be exactly what the cynical judge needs at this point in his life. We’ll keep you updated. |
HOUSTON – For the second time this season, Mauro Manotas’ name was heavily mentioned in transfer talks, and once again, the Houston Dynamo opted not to pull the trigger.
On Sunday, national and longtime Houston commentator and soccer radio host Glenn Davis broke the news that the Orange had received an offer for Manotas.
Sources tell me that @HoustonDynamo have received a significant offer from a European club for forward @MauroManotas19 just prior to this weekends game. With the window in Europe closing this likely lead to Manotas not being used against @SportingKC #SoccerMatters — Glenn Davis (@GlennDavisSoc) September 1, 2019
How close did Manotas come to joining that unnamed European team?
“I saw myself over there already, I saw myself in Europe,” Manotas told The Bayoucitian after Wednesday’s Dynamo training session.
The offer from the European team came two hours before the Dynamo faced off against Sporting KC Saturday night, which led to Manotas not being in the starting lineup, and not playing in the match at all.
Only, Manotas was unaware that that was the reason he didn’t play in that match.
“I was very angry because I didn’t play but then I got over it, everything’s good,” Manotas said. “That’s how things stayed, there was no chance to go and here I am.”
Leading up to the game against Sporting KC, the Colombian forward spoke with Davy Arnaud, the Dynamo’s interim head coach, who mentioned to him that he wanted to give Christian Ramirez an opportunity.
Manotas understood, saying everything was good.
“I was preparing to enter the second half because I have earned that right to be able to play,” the forward said. “Obviously, I am the team’s goalscorer and the goalscorer always has to play — that’s normal.”
Manotas found out why he didn’t feature in the match after the game when Dynamo vice president and general manager Matt Jordan, along with Arnaud, told Manotas of the offer, and the forward was all in.
“I told them it was ok, that I thought it was a good option,” Manotas said. “Matt Jordan also said that possibly the next day [Sunday] everything would come together for me to leave.”
In the end, the transfer didn’t materialize and Manotas will finish the Major League Soccer season with the Dynamo. And he’s happy about that.
“I am here, I am happy in Houston,” Manotas said. “I told him [Matt Jordan] if I leave that’s fine and if I stay that’s fine too. And now just go to keep working.”
Arnaud said the deal was close to finalizing but ultimately didn’t. That a European team made an offer for Manotas didn’t surprise Arnaud one bit.
“Mauro [Manotas] is a great player. He’s a goalscorer, which is attractive to everybody,” Arnaud said.
“And we’re happy to still have him. It was close to happening and it didn’t work out this time, so we keep plugging away with Mauro here and he’s going to be a big help to us here these last six weeks.”
The offer from the unnamed European club was reported to be north of the supposed $8.5 million that Liga MX side Cruz Azul offered for Manotas during the Summer transfer window.
One thing to add to this: Source tells https://t.co/QqWAi38GbI that the transfer offer from the unnamed European club is greater than the $8.5m proposal that Cruz Azul sent the Dynamo earlier in the season for Manotas. No deal is done yet. #ForeverOrange https://t.co/qmZFFqgzDE — Tom Bogert (@tombogert) September 2, 2019
At first, it was a team from Liga MX that came knocking on the Dynamo’s door for Manotas, and this time, it was a European club looking to bolster its team with the Colombian forward.
How does Manotas feel about having teams across different leagues, show interest in acquiring his services?
“Very happy. I spoke with Matt, and Davy also, and said that any moment I would have to go and that’s something very normal in soccer, that today we are here and tomorrow we can be somewhere else,” Manotas said.
“I have the desire to stay here for the three years but if there’s an offer from Europe and a big team, obviously, I will want to leave. But I am here, I will finish well here and we’ll see what happens the following year.”
Manotas may one day leave to a bigger league, but for the time being, he’s a Dynamo player, and he’s happy to be in Houston.
Late Wednesday night, the forward uploaded a photo to his Instagram Story showing his love and dedication to the Orange.
How can you not love @MauroManotas19? Even after all the rumors that he’s off to Mexico or Europe, he says he’s #ForeverOrange 🧡 pic.twitter.com/XNevGeqOMq — Web 🕸 Tilton (@webtilton) September 5, 2019 |
#include "FindClosestEdge.hpp"
#include <Eigen/Core>
#include <Eigen/Dense>
#include <array>
#include "logging/LogMacros.hpp"
#include "math/barycenter.hpp"
#include "math/differences.hpp"
#include "mesh/Edge.hpp"
#include "mesh/Vertex.hpp"
#include "utils/assertion.hpp"
namespace precice {
namespace query {
FindClosestEdge::FindClosestEdge(
const Eigen::VectorXd &searchPoint)
: _searchPoint(searchPoint),
_vectorToProjectionPoint(Eigen::VectorXd::Constant(searchPoint.size(), std::numeric_limits<double>::max())),
_parametersProjectionPoint({_shortestDistance, _shortestDistance})
{
PRECICE_ASSERT((_searchPoint.size() == 2) || (_searchPoint.size() == 3),
_searchPoint.size());
}
const Eigen::VectorXd &FindClosestEdge::getSearchPoint() const
{
return _searchPoint;
}
bool FindClosestEdge::hasFound() const
{
return _closestEdge != nullptr;
}
double FindClosestEdge::getEuclidianDistance()
{
return _shortestDistance;
}
mesh::Edge &FindClosestEdge::getClosestEdge()
{
PRECICE_ASSERT(_closestEdge != nullptr);
return *_closestEdge;
}
const Eigen::VectorXd &FindClosestEdge::getVectorToProjectionPoint() const
{
return _vectorToProjectionPoint;
}
double FindClosestEdge::getProjectionPointParameter(
int index) const
{
return _parametersProjectionPoint[index];
}
//double FindClosestEdge:: getFirstParameterProjectionPoint () const
//{
// return _parametersProjectionPoint[0];
//}
//
//double FindClosestEdge:: getSecondParameterProjectionPoint () const
//{
// return _parametersProjectionPoint[1];
//}
void FindClosestEdge::find(mesh::Edge &edge)
{
PRECICE_TRACE(edge.vertex(0).getCoords(), edge.vertex(1).getCoords());
// Methodology of book "Computational Geometry", Joseph O' Rourke, Chapter 7.2
auto &a = edge.vertex(0).getCoords();
auto &b = edge.vertex(1).getCoords();
auto &norm = edge.getNormal();
auto ret = math::barycenter::calcBarycentricCoordsForEdge(a, b, norm, _searchPoint);
PRECICE_ASSERT(ret.barycentricCoords.size() == 2);
bool inside = not(ret.barycentricCoords.array() < -math::NUMERICAL_ZERO_DIFFERENCE).any();
// if valid, compute distance to triangle and evtl. store distance
if (inside) {
Eigen::VectorXd distanceVector = ret.projected;
distanceVector -= _searchPoint;
double distance = distanceVector.norm();
if (_shortestDistance > distance) {
_shortestDistance = distance;
_vectorToProjectionPoint = distanceVector;
_parametersProjectionPoint[0] = ret.barycentricCoords[0];
_parametersProjectionPoint[1] = ret.barycentricCoords[1];
_closestEdge = &edge;
}
}
}
} // namespace query
} // namespace precice
|
Q:
Is every sentence we write or utter either true or false?
Please read the complete description before putting any answer / comment, Thank you.
I've been just thinking through this question which I can frame it like this:
Can I write or utter any sentence which is neither false nor true?
Ok, after I've seen couple of answers (Thanks for the contributions), I want to edit my question.
one of the answers I've got:
A question is neither true nor false.
Understand, that sentence can be described as interrogative, but let's follow this:
If I utter May I know your name? now, what I just uttered has come out of the truth hood which indicates that I don't know your name, so in this case, the sentence I uttered is a by product of the truth I have
Next thing I've got
self-referential sentences such as This sentence is false.
It reminds me a paradox (forgot its name), nonetheless, This sentence is false even though the truth value of your example is undetermined..it is true that your example is self-referential, which in-turn created with a true intention.
So far things have fallen under truth...
More edits:
There are couple of things I want to share, first is to address what I mean by the word "sentence": a thing (in language) created using words to describe my thoughts (a brain activity) or sometimes use to describe my (r)eality that I am seeing or the reality that is accessible to me.
Secondly, I spent some more time to think through my question, the more I think, I've come to this conclusion. there is no bi-valance and there is no true or false, there is just only one thing and that one thing is the origin of everything that follows....And that thing is
The Truth.
Because think of this, even if I ever were to lie (lies formed out of falsity), In-order for a lie to be a lie, it is has to come from The Truth.
it is true that I am lying.
it is true that the lie I told doesn't bear the truth.
it is true that my intention is true enough to form a lie.
it is true that the falsity used in my lie is truly false.
it is true that a lie can't become true.
And it is true that the true premises never form a false conclusion
So I just see only one thing: The Truth and I wonder were you people seeing it?
To mention: A comment I put as a reply to one person has been silently deleted (been there for a day) and I think, it got to be pretty uncomfortable for whoever did it-- Remember, The Truth is on you, can't escape.
What I commented: "you need to read the description too before comment".
A:
Various candidates would be:
self-referential sentences such as
"This sentence is false."
opinion-based sentences such as
"Chocolate is the most delicious ice cream flavor."
sentences where the truth value depends on the referents:
"I am awake right now." (indexical) "The team went on to win the cup." (context)
sentences with metaphor / poetry / nonsense:
"Anger reflects the clouds."
some counterfactual sentences:
"If the match hadn't ended in a draw, the away team would have won."
See also Are all non self-referential statements true or false?
A:
The OP asks the following:
Can I write or utter any sentence which is neither false nor true?
Yes. An example would be Tomorrow I will rise at precisely 6 am. That sentence today is neither true nor false. However, I will know tomorrow, but by then I will have a different sentence, perhaps: Today I rose at 6:30. That sentence could be viewed as either true or false since it is in the immediate past.
The logic textbook forallx describes three kinds of sentences that grammatically count as sentences although they are neither true nor false: questions, imperatives and exclamations. (pages 4-5)
That text also goes into detail about the kind of sentences to which logicians are interested in assigning truth-values. This is a subset of all possible sentences. These are the ones that logically count: (page 4)
To be perfectly general, we can define an argument as a series of sentences. The sentences at the beginning of the series are premises. The final sentence in the series is the conclusion. If the premises are true and the argument is a good one, then you have a reason to accept the conclusion.
In logic, we are only interested in sentences that can figure as a premise or conclusion of an argument. So we will say that a sentence is something that can be true or false.
What counts in logic are arguments. Arguments are composed of sentences on which one can assign a truth-value.
The OP also asks about self-referential sentences. These are sentences that should logically count. One should be able to assign a truth-value to them and yet when we do we run into paradoxes. These paradoxes are important. They challenge how we deal with that subset of sentences to which we want to assign truth-values. We not only want to assign truth-values. We also want to consistently do so.
P. D. Magnus, Tim Button with additions by J. Robert Loftis remixed and revised by Aaron Thomas-Bolduc, Richard Zach, forallx Calgary Remix: An Introduction to Formal Logic, Fall 2019. http://forallx.openlogicproject.org/forallxyyc.pdf
A:
Is every sentence we write or utter either true or false?
NO. A sentence is "a textual unit consisting of one or more words that are grammatically linked. [... The] words [are] grouped meaningfully to express a statement, question, exclamation, request, command or suggestion.
A question is neither true nor false.
|
.TH "cmark" "1" "November 30, 2014" "LOCAL" "General Commands Manual"
.SH "NAME"
\fBcmark\fR
\- convert CommonMark formatted text to HTML
.SH "SYNOPSIS"
.HP 6n
\fBcmark\fR
[\fB\-\-ast\fR]
file*
.SH "DESCRIPTION"
\fBcmark\fR
acts as a pipe, reading from
\fRstdin\fR
or from the specified files and writing to
\fRstdout\fR.
It converts Markdown formatted plain text to HTML (or groff man or
an abstract representation of the AST), using the conventions
described in the CommonMark spec.
If multiple files are specified, the contents of the files are simply
concatenated before parsing.
.SH "OPTIONS"
.TP 12n
\-\-to, \-t \f[I]FORMAT\f[]
Specify output format (\f[C]html\f[], \f[C]man\f[], \f[C]ast\f[]).
.TP 12n
\-\-sourcepos
Include source position attribute.
.TP 12n
\-\-hardbreaks
Treat newlines as hard line breaks.
.TP 12n
\-\-normalize
Consolidate adjacent text nodes.
.TP 12n
\-\-help
Print usage information.
.TP 12n
\-\-version
Print version.
.SH "AUTHORS"
John MacFarlane
|
Changing lifestyle and prevalence of malnutrition among settled pastoral Fulani children in Southwest Nigeria.
This paper reports the results of a cross-sectional study on the growth of Fulani children, aged 6 months-15 years, living in Kwara, Ogun and Oyo States, South western Nigeria. This population of Fulani are fully settled pastoralists whose economy and culture are now centred on cattle and farming. There is a dearth of information on the prevalence of malnutrition in this group. We measured the heights and weights of 164 girls and 167 boys and determined their anthropometric indices, height-for-age (HA), weight-for-height (WH), and weight-for-age (WA) Z-scores. The prevalence of stunting (HAZ < -2), wasting (WHZ < -2) and underweight (WAZ < - 2) was 38.7 % , 13.6 % , and 38.7 % , respectively, when compared to the reference NC HS WHO standard used for defining stunting, wasting and underweight. Boys were more malnourished than girls, but this was not statistically significant (stunting: chi(2)=0.36; df=1; p=0.54); (underweight: chi(2)=1.10; df=1; p=0.29); and (wasting: chi(2)=0.00; df=1; p=0.98) The mean of Z- scores of height-for-age, weight-for-age and weight-for-height in the study population were -1.502, -1.634 and - 0.931, respectively. The SD was 1.52, 1.09 and 1.20, respectively. Using WHO Malnutrition Classification systems, 38.7 % of the children were found to be malnourished. It was concluded that malnutrition among children in this population could be linked to changing food habits and lifestyle from nomadic to sedentary living. |
Years ago, I was first exposed to North Face gear, and thought that it was the most amazing stuff in the world. I was blown away by the quality, and I fell in love with stores like REI. Hey…we don’t have a ‘local’ gear shop of that nature in my neck of the woods.
A couple years back, I was looking for a new raincoat/shell to replace a North Face jacket that had met its Waterloo. In the course of my search, I started looking at Arcteryx. I ended up settling on an Alpha SV jacket, which I’ll talk about someday. It is bombproof. The best jacket ever.
But today, let’s talk about the Atom. I have had the opportunity to spend some time with the Atom LT Vest and LT Hooded Jacket. Both share Coreloft insulation in the front and back and Polartec Power Stretch exterior for a bit of water resistance and good durability. They have a drop back hem, for a little extra butt coverage. The vest has fleece side panels (for ventilation). (The newest version of the jacket also has this feature).
I’m a little over 6′ tall and around 145#. Arcteryx gear is cut athletically, and true to their measurements. Even with my long arms, I have no issues with sleeve length on their smaller sizes. I wear a medium in all of their tops/jackets.
Here’s the vest:
Breathable side panel.
Trim design.
Here’s the hooded jacket:
Not vented; no pit zips.
Stretchy cuff detail on jacket.
Full coverage hood almost covers my German schnoz.
One interior pocket.
Two exterior pockets, nicely placed. Note that unlike many Arcteryx jackets that have high pockets to clear backpack waist straps, these are set at hip level.
While it doesn’t look roomy, the hood is plenty roomy for a massive ski-helmet to cover your noggin.
This is both jackets, layered. They’re low enough profile that the vest doesn’t really show.
We haven’t had super-cold weather here in Illinois yet, so my reviews are a bit limited in that regard at present…this is my first year with the Atom. I’ve worn the jacket, over short-sleeves, in temps down to the low 30s in comfort. For as thin as the jacket is, it is AMAZINGLY warm for normal activities. I’m not talking about sitting around…but if you’re moving, it is warm. It traps all of your warmth.
The jackets are rated to be water resistant, not waterproof…but I’ve had the hooded jacket in downpours and it beads up admirably. I haven’t washed it, so we’ll see how it holds up long term, but short-term, rain clouds don’t scare me off.
The fabric finish is soft and comfortable, but has been durable thus far. It does not catch or snag easily.
The vest is very unobtrusive, and fits under just about any jacket. By itself, it’s a nice layer for when you need to keep just a little extra torso warmth…when you’re doing outdoor activities in the low 50s or upper 40s and need a smudge of Coreloft.
I can’t say enough good things about the Coreloft…I don’t have a ton of previous experience with it, but it performs amazingly. Very thin, non-bunching, non-stinky, and super-warm.
You can see that they don’t have huge gusseted features, but it is amazing how comfortable they are and how easily you can move in them. There is no restriction in arm or torso movement. The zippers are high-quality, and both have a stormflap behind the zipper to keep you warm and dry.
For me, I’ve basically abandoned the traditional ‘three season’ combination ski coats with zip-in liners, and replaced them with a high-quality liner jacket and high quality shell. I’ll be pairing the Atoms with my Alpha SV, for what I think will be the ultimate in jackets. More to come later.
However, after a test fit, not all is well in the world. The center lugs on the Lou hit the yoke between the chainstays on the Muk at 10psi. At 15psi, the lugs completely lock-up on the yoke. They’ll clear at 7psi or less…right now (but I’m advised that they grow significantly over a couple of weeks at pressure). This is using 82mm Holy Rolling Darryls.
1450 grams
Lookin’ Beefy.
Pretty wide on 82mm Rolling Darryls.
Even with my modified cassette, the bottom 1/2 of the cassette is useless in the smallest chainring.
I can’t wait for SRAM to release their integrated drop bar system with hydraulic brakes.
Dear SRAM,
I’d like a complete set of your integrated hydraulic brakes for drop bar bikes. SRAM Red, for the Vaya. Please also include a 2013 Red front and rear derailleur, and a rear cassette. (And of course, the brake lines and calipers.)
On Saturday, I had a chance to do a ride with and a brief ride on a demo Krampus.
There was my Muk, BPaul’s Necromancer, the Krampus, and Nevdal’s Ti Mariachi, hittin’ the trails.
The flat, flat, flat trails.
We rode trails, did a bit of fatbike bushwacking, and otherwise had a blast. The Krampus demo was courtesy of the folks at North Central Cyclery, who tend to be the origin of all things cool in the Northern Illinois cycling scene.
As for the Krampus, riding it makes you want to be more radical.
Tobie, airing it out.
Giant BMX Bike.
I am greatly intrigued by the one-piece bottom bracket area yoke. It’s a pretty elegant piece of design, and shows a commitment to doing things right. Instead of weirdly bent tubing or hacked together weldments, Surly designed and built a specific piece for this application. It looks elegant, and is perfect for the requirements of this bike. I like parts of bikes that show forethought and consideration. The yoke is pretty high up there on both elements.
Nice little frame details abound.
1x up front with a Paul chainkeeper.
1×10 SLX in the back…11-36t.
Knards look Knardley.
Along with the Rabbit Holes.
Definitely rocking the short stem/long bars combination.
Ample fork clearance for Knard.
I didn’t get a chance to weigh it, but reviews show it around 30#…I’d guess it’s just a bit heavier than my pretty heavily modded Mukluk, heavier than a Beargrease, but lighter than most stock fatbikes.
The short stem/wide bars coupled with the view of the tall 29+ tire up front dominate the handling of the bike. It’s quick handling but not twitchy. It wants to turn. It wants to roll over things. It wants to hop little berms in the trail.
I can see a temptation to put a set of riser bars and a taller stem on the Krampus, but I think that would kill its BMX-y vibe. Geometry is more BMX/mountain oriented (think Pugsley) than the relaxed riding position of a Mukluk.
I didn’t get a chance to do a ton of riding on the Krampus, so my impressions are pretty limited. In the fatbike world, there are people that are going to go ga-ga over the Krampus, and add it to their fleet. I also think it will be a gateway drug for people who are intrigued about Fat, but for whom the 3″ tires on the Krampus make more sense than 3.8 or wider tires. The Knards roll fast and are great trail tires. The rumored 3.8″ knards should be well received. I’m very pleased with my current Husker Düs, and I think the Huskers will do better in show, but I can see a place in the world for the Knards.
Am I going to run out for a Krampus? No…it wouldn’t replace my Mukluk, and I’m not hard core enough to need another trailbike. That’s where I think the Krampus is oriented…trailriding. The lack of a double or triple chainring is going to hold it back as an exploration or race bike. Yes–there have been times that I’ve been geared out in the Mukluk with a triple up front. Barry Roubaix’s downhills come to mind, as do some strong tailwind/gravel road situations. But I do think the Krampus occupies a unique niche…and its playful handling characteristics are likely to sell a lot of bikes. It’s a bike you should ride to experience. I think the perfect home for one would be some alpine trails with log crossings, rocks, creek crossings, and some banked corners to rail.
Of note, one of the demo Krampii that NCC had was set up with 29er wheels and some regular 29er tires (2.2s?), showing that the frame does have quite a bit of flexibility. I can see this as a bike that woudl kill with a suspension fork.
They’ve been in Outside twice, and now this. (Judging by the angle of the bike, it looks like she’s about 0.3 seconds from wiping out.) Public acceptance of fatbikes = end of the world.
What do I think it really means? I think that it really means that Fatbikes are catching on. There may come a time when they are not a niche. I’ve seen bike shops try to hop on the trend, like a local bike shop that stocked one Surly fatbike (but didn’t pay attention to chainline alignment and has some serious assembly issues). I’m glad to see Fatbikes growing in popularity, but am hopeful that people will look before they leap, and find a shop with expertise in Fatbikes as I’ve blogged about in the past…rather than just someone who ordered a novelty from the QBP catalog.
After a quick ‘go fast’ potion from my chief princess, I was ready to go.
I started off near the back of the pack (close to 100), and finished in 44th. There was a lot of passing.
Out of the gate, there was a nice start, a few gentle curves, a few tight curves, and then things funneled into a slight hillclimb. The hillclimb had railroad ties set across it for erosion control, and on the far right side of the course was a gentle ramp for CX bikes to roll up the ties. That pushed almost all of the bikes into a single line…which cued me up. Riding a full-suspension 29er felt like cheating. I took a line right up the middle, passing the other riders in clumps. There were a couple of spots with the railroad tie climbing, and the Superfish dominated in each.
There were also a series of off-camber switchbacks. People were wiping out left and right on those. On the ‘back’ set of switchbacks, I only had 1 lap in 4 where someone didn’t crash out in front of me. I was quite pleased to be able to not only ride the course cleanly, but to do so without stepping out or dabbing. The only time I was off the bike was over the barriers. Even when I had a guy wipeout immediately in front of me, I was able to stop, turn 60 degrees right, and continue uphill. Riding the mountain bike felt a bit like cheating a times like that. Wide bars, wide tires, big hydraulic brakes. I was able to rail the corners, and I just kept hearing Chad in my head: NO BRAKES NO BRAKES NO BRAKES.
At one point on the course, there was a paved downhill that turned to dirt with an off-camber, decreasing radius turn into a little wooded singletrack section with a couple little rollers. After the rollers, there were some rough roots, and then you were dumped immediately into a series of steep gooseneck curves. That section was my favorite part of the course.
Guys on CX bikes were braking and swinging wide for the turn into the singletrack. I would fly down the hill, brake late, and turn aggressively, passing on the inside–flow through the single track–full suspension across the roots–wide bars to manhandle the bike around the goosenecks. Here are the rollers:
Here’s one part of the goosenecks:
And here’s some prairie scenery.
The bike couldn’t have been better suited for the course. It was really, really fun to ride it on the Superfish–far more fun than the Vaya would have been. Everything on the Superfish performed perfectly. I didn’t need the full range of gears, but it was nice to have the double chainring, so I could drop into the little chainring for the tightest/steepest areas, and then shift once and hammer out of them. The 2.2″ tires let me sneak steeper, faster turns than the CX bikes, and let me carry more momentum throughout the course.
As far as my riding went, I rode hard. I was very pleased with how I did, and the passing I did. After the race, I felt as if I hadn’t held anything back. For my third cyclocross race ever, coming up through the ranks as I did was pretty sweet.
The Superfish is an incredibly versatile bike. I cannot think of a single thing to improve or upgrade on it for today’s race, or for 99% of the riding that I do on it. It’s that good. Thanks, Tobie.
Best part of the race? Hearing my two cheerleaders hollering for me. It was pretty awesome–and I felt pretty lucky all around.
Worst part? I need to work on my barriers. Dismounts were ok, remounts were good, but I was basically coming to a stop at the actual barrier. I should have practiced more with the Superfish before the race.
And in answer to the gentleman at the gooseneck curves who shouted questions each time I passed:
1. Yes, my mother does know I ride a full squish. She likes it.
2. Yes, I can track stand, and no, I was not trackstanding during the race…except for when you saw me trying to not run over the guy who crashed immediately in front of me. |
Introduction
============
Kim Norris (Figure [1](#F1){ref-type="fig"}) is the President and co-founder of the Lung Cancer Foundation of America (LCFA) \[[@B1]\], an advocacy group for lung cancer patients that seeks to raise research funding and the national profile of lung cancer to increase support for research. She became a patient advocate after her husband died of lung cancer at the age of 47 in 1999, following a suggestion from her husband's clinician. In 2007, after experiencing difficulties in obtaining public funds for research on lung cancer, she and two lung cancer survivors, Lori Monroe and David Sturges, co-founded LCFA to raise funds from the private sector. Kim Norris shares her views on how genomic profiling is changing the role of patients in healthcare.
{#F1}
What are the challenges and highlights in your role as President of the Foundation?
-----------------------------------------------------------------------------------
The highlights are always the patients and their families. When I hear a success story or I hear that we have made a difference, whether it is in a patient's life or their family's life, that just touches me to the core and makes me realize that this is what I should be doing.
The challenges are enormous. Lung cancer is underfunded, both from a public and a private standpoint. It is very difficult to obtain research funding. This is probably for two reasons. The first is the stigma associated with lung cancer: there is a belief that the patients did it to themselves, and many people think, 'Well, if you have lung cancer, then you smoked.' This is despite over 60% of new lung cancer diagnoses being in non-smokers. Overcoming the societal bias about lung cancer is very difficult.
The second reason I think it is hard to get funding for lung cancer research is that the 5-year survival rate is only 15%, compared with, for example, 88% and 99% for breast or prostate cancer, respectively. Both breast and prostate cancer have a large number of survivors who raise awareness of these diseases; lung cancer does not have a legion of survivors. So it's really up to the family members and friends to make a difference.
What is a patient advocate and how do you become one?
-----------------------------------------------------
There are many different types of patient advocate. A patient advocate can range from someone who works with patients and helps them through chemotherapy to someone who works with local hospitals to make sure patients are getting the care, the treatment and the support that they need. Being a patient advocate can also mean working with researchers and helping set up clinical trials, making sure that the recruiting process is appropriate and that the patient's point of view is considered. Patient advocacy can also be activism for research funding or getting involved with organizations to raise awareness, or to help educate the public. So patient advocacy comes in all shapes, sizes and flavors.
For example, my co-founder, Lori Monroe, was a registered nurse. She became a patient advocate after being diagnosed with stage IV lung cancer in 2001: she used her own medical knowledge and experience to advocate for herself in a way that few lung cancer patients could. She recognized the importance of medical research in the development of new options for lung cancer patients, and became a patient advocate with the National Cancer Institute's (NCI) Lung Specialized Programs of Research Excellence (SPORE) initiative at Vanderbilt University and with other programs.
How will the role of cancer patient advocacy groups change as we move towards genomic profiling and personalized medicine?
--------------------------------------------------------------------------------------------------------------------------
The role of the patient advocacy groups is more critical than ever before. For example, in lung cancer, targeted therapy and personalized medicine are progressing rapidly, and this is very exciting. However, genomic information is mostly confined to academics - 85% of patients are treated in community hospitals and do not have access to academic centers. Getting one's tumor tested for its genomic profile is essential for assessing treatment options, but it is not a widespread practice in non-academic centers. I think that this is where advocacy organizations can play a role to help educate patients, to liaise with the research community and patients, and make people aware of their options. They can also work with community hospitals, organizations and doctors to help inform them about the importance of getting their tumor tested. I think the role of the advocacy organizations is pivotal.
Will advocacy groups for non-cancer diseases also experience this change?
-------------------------------------------------------------------------
I think the role of patient advocacy groups is important whether it is lung cancer or any other disease. All advocacy organizations can play a very important role in educating themselves and their patients, working closely with researchers, and also stepping up in case there are any regulatory issues. I think this applies to just about any disease-specific advocacy organization.
How has lung cancer research been transformed by genomics profiling?
--------------------------------------------------------------------
In the past 5 years I've started to get really excited about genomic profiling. The Cancer Genome Atlas project has provided a wealth of genomic information, and luckily lung cancer was one of the first cancers that was investigated by researchers \[[@B2]\]. Before, if you had lung cancer, you would undergo chemotherapy and it was a one-size-fits-all approach, whereas now we realize that tumors are different from person to person \[[@B2]-[@B5]\]. By identifying those unique characteristics, it is possible to develop and create targeted therapies, thereby increasing the chance of killing the tumor. That is really game-changing in the world of lung cancer, and I think in the world of cancer in general.
The other important change is in clinical management. As a result of genomic profiling, we are shifting the way we look at cancer in general. Cancers are now thought of as chronic diseases, and rather than necessarily curing them, we are looking at ways of taking medication to manage the disease for the rest of a patient's life.
Do you think the relationship between patient advocacy groups, researchers and clinicians is changing?
------------------------------------------------------------------------------------------------------
Yes, because each group has to be aware of new research and changes that are happening so quickly. There is also a difference in mind set, which is bypassing the organ-specific view of cancers to an idea that they are molecular diseases. This has an impact on models for raising research funds.
As a patient advocate, what are your thoughts on participatory medicine?
------------------------------------------------------------------------
The model of participatory medicine is coming into its own. It is now critical for patients to be more involved in their healthcare and more engaged in their disease. The days when your primary care physician or the doctor who you have been seeing for 30 to 40 years knows it all are gone. The patient needs to go to their doctor armed with the right questions and information. I also think that the traditional paradigm of a single doctor managing a disease is changing; it's likely to be a team of doctors who are working with a single patient.
As an example, recently I was on a panel with pathologists, and the message I was trying to give is that pathologists were traditionally the ones in the background that analyzed the tissue and reported back. The patients have no idea who or what a pathologist is. But now a pathologist plays a really critical role in the whole notion of genomic profiling. They are part of the patient's team, and they should be more involved with the patients. In fact, they may be more educated about unique mutations than the general clinicians who are treating the patients.
What do you think are the remaining challenges for the implementation of this model of healthcare?
--------------------------------------------------------------------------------------------------
I think this model of healthcare still has many challenges to overcome. I know that this not true for all countries, but in the United States a lot of it has to do with the issue of insurance and healthcare coverage. So, I think that the change is happening faster than the societal model that goes with it.
In the case of genomic profiling for lung cancer, more than 200 genomic mutations have been identified. So, do clinicians perform a genomic profile searching for all of them, or only for the top few, even though there are not necessarily FDA-approved treatments but many exciting clinical trials going on to target them? Part of the issue is what do you test for and who is going to pay for it.
Regarding participatory medicine, the more a patient can be informed and knowledgeable about their disease the better; the more a patient can question and challenge their doctor, get second, third or fourth opinions, and have a key role in their own healthcare the better. I think these are the important aspects for the future of participatory medicine.
Abbreviations
=============
LCFA: Lung cancer foundation of America
Competing interests
===================
The author declares that she has no competing interests.
Acknowledgements
================
Shortly after this article was written, Lori Monroe, one of LCFA's co-founders, died, 12 years after she was first diagnosed with lung cancer. Lori's loss is profound, not just for me, personally, but for the entire lung cancer advocacy community. She was a tireless and selfless advocate for lung cancer patients. LCFA and the lung cancer community have lost a dear friend, mentor, warrior and someone who was extraordinary in all of our eyes. We will remember Lori always for her energy, her passion and her commitment, but also for her incredible warmth, charm, humor and compassion. Her memory will continue to be a source of guidance and inspiration for us, and we will continue to work as diligently as she did to keep patients alive and healthy.
|
The astronomers found glycolaldehyde, a sugar compound described as essential to the existence of life, in the gas surrounding the star, located some 400 light-years from Earth, it said.
The discovery "shows that the building blocks of life are in the right place, at the right time, to be included in planets forming around the star."
Because the star is similar to our sun, the finding "shows that some of the chemical compounds needed for life existed in this (solar) system at the time of planet formation," the ESO said.
The discovery was made possible by the high sensitivity of the Atacama Large Millimeter/submillimeter Array (ALMA), an international project still under construction and slated for completion in 2013.
ALMA has 66 antennas exploring the universe via radio waves emitted by galaxies, stars and other bodies not captured by optical and infrared telescopes, which only receive light.
The ESO operates three sites in Chile.
The Very Large Telescope (VLT) array -- a cluster of four telescopes that can view objects four billion times fainter than those visible to the naked eye -- is housed at the ESO's Paranal site in Chile's Atacama Desert. |
[Role of human olfaction in detection of space vehicle air contamination by gases emitted during thermal destruction of polymers].
The paper deals with the ability of human olfaction to identify odours associated with thermal destruction of polymers. The investigations confirmed the ability of early detection of equipment overheating and subjective odour evaluation using the 5-point intensity scale and calculating the relation of odour intensity to the maximum admissible concentration of volatile chemical contaminants aboard piloted space vehicles. Emission of gases by polymers in electrical equipment starts with heating temperature rise to 100 degrees C. A new odour smelled by only some of humans due to individual perception signifies typically that emitted gases are below MAC for space vehicle. Odour sensed by everyone though not irritating signifies, as a rule, of chemical contamination above MAC but not contingency. Symptoms of irritation by products of thermal destruction of polymers signify contingency and require the use of personal protection equipment. |
Polyaniline synthesis and its biosensor application.
In this study, five polyaniline compounds were synthesized using different protonic acids and incorporated into a conductometric biosensor used for bovine viral diarrhea virus detection. The biosensor was developed and evaluated by the authors for bacterial pathogen detection in previous studies. The biosensor consisted of two parts: the immunosensor and the electronic data collection system. Liquid sample moved through the immunosensor surface by capillary action. The specificity of the biosensor was based on the unique binding characteristics of the polyclonal and monoclonal antibodies immobilized on the immunosensor. Polyaniline was used in the biosensor architecture as the transducer due to its electronic and bio-molecular properties. Results showed that the biosensor was sensitive at a concentration of 10(3) cell culture infective dose per milliliter (CCID/ml) of BVDV antigens. The promising results on the BVDV detection demonstrated that the conductometric biosensor was interchangeable for different target molecules of detection. Further modification could be implemented to evaluate the biosensor as a rapid diagnostic device to detect other infectious disease outbreaks in livestock population. |
Q:
Did Samba participate in Mahabharata war against lord Krishna's wishes?
When Narayani sena was given to Duryodhana, Was shri krishna's son samba was the head of that army?
If yes, then in-spite of being a son of lord Krishna, did Samba go against him in Mahabharatha war?
How did he die?
Related: How many from the battle were alive after the war in Mahabharata?
A:
There is no reference found of Samba participating in the great war.
Kritavarma was the head of Narayani sena and not Krishna's son Samba.
In the left foot, O monarch, was stationed Kritavarma accompanied by the Narayana troops, and those invincible warriors, the gopalas. In the right foot, O king, was Gotama's son of prowess incapable of being baffled, surrounded by those mighty bowmen viz., the Trigartas and by the Southerners. In the left hind-foot was stationed Shalya with a large force raised in the country of Madras. In the right (hind-foot), O monarch, was Sushena of true vows, surrounded by a 1,000 cars and 300 elephants. In the tail were the two royal brothers of mighty energy, viz., Citra and Citrasena surrounded by a large force. [Karna Parva]
In fact after 36 years from the war, Samba was killed in an internal fight among the Yadava-s clan which was intoxicated with power and wine. Other sons of Krishna were also killed:
Knowing that the hour of destruction had come, the mighty-armed Keshava stood there, eyeing everything. Indeed, the slayer of Madhu stood, raising a bolt of iron formed of a blade of grass. Beholding that Samva was slain, as also Charudeshna and Pradyumna and Aniruddha, Madhava became filled with rage. [Mausala Parva]
|
The traditional Jewish blessings over wine and bread, the Kiddush and the Motzi, echoed through the sanctuary at 10 HaRav Kook Street in Jerusalem. It was a room of striking simplicity - with just one small cross in brown wood.
Four Catholic priests wearing white robes and green stoles stood at the altar, as one of them recited these blessings. But unlike the blessings at a festive Jewish meal, these were blessings of consecration, transforming the bread and the wine into the body and blood of Christ. Just before taking Communion, church members exchanged the greetings of Pax Christi, Peace of Christ, saying to one another, "Shalom HaMashiach."
At the Church of Sts. Simeon & Anna, all the prayers are in Hebrew, as was this Evening Mass for the community known as the Hebrew-speaking Catholic community of Israel.
This is not a messianic Christian gathering, but neither is it just another Catholic Church serving the country's 22,000 Roman Catholics, most of whom are Arab.
Active since 1955, the Hebrew-speaking Catholic Vicariate, also known as the Association of St. James, was founded mainly to serve European-Catholic immigrants to the new Jewish state - many of whom are married to Jews - shortly after its founding in 1948. With branches in Jerusalem, Tel Aviv, Haifa and Beersheba, the association is fully welcomed by the same society that bristles at the missionizing of Jews for Jesus. But in some ways, the backgrounds of several of its most prominent members are no less provocative.
They include strongly identified Jews - including several Holocaust survivors - who converted to Catholicism and view themselves as a philosemitic redoubt of advocacy for love of Jews and Israel within the church.
"We see ourselves rooted in Israeli society with a real respect for Jews as they see themselves, and we follow the Jewish liturgical calendar and observe many of their holidays, like Sukkot and Hanukkah," explained the Rev. David Mark Neuhaus, the vicar for the Hebrew Speaking Community in the Latin Patriarchate of Jerusalem. Neuhaus also gives lectures about Judaism and the Bible to Palestinian and Jordanian Arabs training for the priesthood at Beit Jala Seminary and Bethlehem University.
The primary objective of the Hebrew-speaking Catholic community, he explained, is to sharpen the church's awareness of its Jewish origins and the Jewish identity of Jesus and his apostles.
The association's population peaked at several thousand in the 1950s and '60s. Today it has about 400 members. Many left to get better Catholic educations for their children. But despite dwindling numbers, this Roman Catholic community shows a robust spiritual commitment.
Most of the immigrants come from mixed Catholic-Jewish marriages in which the wife is a practicing Catholic and the husband a non-observant Jew. Children of these mixed marriages are often raised as Catholics. Some of the original members were Jews who had been baptized to survive the Holocaust and wanted to remain Catholic after settling in Israel.
One of the early Jewish members of the Hebrew-speaking Catholic community was Brother Daniel, whose status as a Hebrew-speaking, Jewish-born Zionist Catholic priest created legal history in Israel when he sought citizenship there under the country's Law of Return, the statute guaranteeing citizenship on request to virtually all Jews who enter Israel.
Born Oswald Rufeisen into an Orthodox Jewish family in the Polish town of Oswiecim - known in Yiddish as Auschwitz - the future priest was a member of the Zionist Bnei Akiva youth group during his teenage years. Rufeisen fled Poland eastward when Germany invaded in 1939, but he ended up as a slave laborer for the Nazis in Lithuania. Escaping again, he used his language skills to obtain a false identity and employment as a translator for the police in the town of Mir in what is today Belarus. There, he is credited with having saved several hundred Jews by warning them of the Nazis' impending plan to liquidate the Mir ghetto and helping engineer their escape. He himself hid out for the remainder of the war in a local convent, during which time he decided to convert to Catholicism.
On his arrival in Israel in 1959, Rufeisen, by then a Carmelite monk, requested citizenship under the Law of Return. Amid great controversy, the government denied his application, narrowing the Law of Return to apply only to Jews who had not embraced another religion. Rufeisen's case went to the Supreme Court, which ruled 4-1 against the priest. Instead, Rufeisen became an Israeli citizen through naturalization, and lived there, a key member of the Hebrew-Catholic community?s Haifa branch, until his death in 1998.
Due to the Brother Daniel ruling, the Rev. Gregorcz Pawlowski did not even try to come to Israel under the Law of Return. Born Zvi Griner to an observant Jewish family, Pawlowski, now 78, was an 11-year-old boy in Zamosc, Poland, when the German army arrived and slaughtered his parents and his younger sisters. He managed to escape, and survived the war with a forged Catholic baptismal certificate, begging local peasants for food and shelter. He was near death from disease and starvation when the Russians drove the Germans from Poland in late 1944.
Pawlowski was placed in a Catholic orphanage, where he attended a school run by nuns. He became a priest after surviving the Holocaust. A longtime member of the Hebrew-speaking Catholic Vicariate, he also ministers to a Polish-Catholic community in Jaffa. Nevertheless, he plans to be buried in the Jewish cemetery in Izbica, Poland, where his mother and sisters were murdered. The slightly built, white-haired priest has asked Rabbi Michael Schudrich, Poland's chief rabbi, to recite the Kaddish, the Jewish prayer for the dead, at his funeral. He also fasts on Yom Kippur.
His simply furnished apartment at 4 Ben Zvi Street has two names on the door: Gregorcz Pawlowski in Latin letters, and beneath it, in Hebrew, Zvi Griner - two different names for a man of seemingly incompatible religious identities.
Speaking in Polish through an interpreter, Pawlowski told his story to this reporter in a monotone, his face expressionless. The trauma of his boyhood appeared to drain all emotion from his lengthy narration. He never smiled.
Neuhaus, the community's vicar, is a 46-year-old Jesuit priest raised as a Jew in South Africa. His path to Catholicism began when his parents sent him to study in a yeshiva in Jerusalem as a teenager.
Neuhaus told of how in Jerusalem, he met a Russian-Orthodox nun related to the family of the last tsar of Russia, Nicholas II. "I was 15, and she was 89," Neuhaus carefully explained. "She had an incredible influence over me from a spiritual standpoint. She radiated the presence of God. Her influence raised many spiritual questions about my faith."
Neuhaus promised his parents that he would discuss his religious direction with them and wait 10 years before making a final decision. He did as he promised, converting and becoming ordained at the age of 26.
"I attend a Reform synagogue regularly," said Neuhaus. "I go to the synagogue as an expression of who I am historically, socially and, to a certain extent, spiritually. The melodies of the synagogue are much closer to my heart than the chants in a Benedictine monastery, because I grew up with those melodies. Many of our members attend synagogue as an act of solidarity."
Neuhaus points out that Israel is the only society where Jews constitute a majority. The Jewish religion, history and culture establish the rhythm of life for the Catholic community, he said.
"For us, the universal Catholic reflection on the Jewish identity of Jesus and the Jewish roots of our faith is not just one element in our renewal after the Second Vatican Council," Neuhaus said in an interview with Zenit, the Catholic news service that covers the Vatican. "It is also part of our daily existence."
In an interview at the Pontifical Bible Institute, Neuhaus said that some members of the Hebrew-speaking Catholic community helped formulate the reforms of the Second Vatican Council, which repudiated charges of deicide against the Jews, denounced anti-Semitism and ruled that Mass may be offered in the vernacular. These reforms were contained in the founding charter of the Hebrew-speaking Catholic community 10 years before Vatican II convened, Neuhaus said.
Neuhaus views his community as one that led the way for Catholics to see Jews as brothers, not as evil people determined to subvert Christianity. Its members live according to the words spoken by Pope John Paul II when he visited the Great Synagogue of Rome on April 13, 1986: "You are our dear brothers or, we might say, our elder brothers."
Haaretz.com, the online edition of Haaretz Newspaper in Israel, and analysis from Israel and the Middle East. Haaretz.com provides extensive and in-depth coverage of Israel, the Jewish World and the Middle East, including defense, diplomacy, the Arab-Israeli conflict, the peace process, Israeli politics, Jerusalem affairs, international relations, Iran, Iraq, Syria, Lebanon, the Palestinian Authority, the West Bank and the Gaza Strip, the Israeli business world and Jewish life in Israel and the Diaspora. |
Cloud provisioning generally refers to a process for the integration and deployment of cloud computing resources for an enterprise infrastructure. This may incorporate policies, procedures, business rules, and enterprise objectives in sourcing cloud services from a cloud service provider. The provisioning process may define how, when, and what an enterprise customer will receive from the cloud-based service. These services may be internal and accessible by the enterprise customer itself, or may be public/hybrid cloud applications that are available to clients of the enterprise customer. From the perspective of the cloud-based service, the provisioning process may include the supply and assignment of required cloud resources (hardware/software) to the customer as a resource instance. For example, this may include the creation of virtual machines, the allocation of storage memory devices, and/or the granting of access to restricted cloud resources. |
# Ensure that plugins export only what is needed to load them.
# Everything else should be omitted to keep binary size low.
set(CMAKE_WINDOWS_EXPORT_ALL_SYMBOLS OFF)
set(CMAKE_CXX_VISIBILITY_PRESET hidden)
set(CMAKE_VISIBILITY_INLINES_HIDDEN YES)
function(add_autoscheduler)
set(options)
set(oneValueArgs NAME)
set(multiValueArgs SOURCES)
cmake_parse_arguments("arg" "${options}" "${oneValueArgs}" "${multiValueArgs}" ${ARGN})
add_library(Halide_${arg_NAME} MODULE ${arg_SOURCES})
add_library(Halide::${arg_NAME} ALIAS Halide_${arg_NAME})
target_compile_definitions(Halide_${arg_NAME} PRIVATE Halide_EXPORTS)
target_link_libraries(Halide_${arg_NAME} PRIVATE Halide::Plugin)
string(TOLOWER "${arg_NAME}" name_lower)
set_target_properties(Halide_${arg_NAME} PROPERTIES
EXPORT_NAME ${arg_NAME}
OUTPUT_NAME autoschedule_${name_lower})
endfunction()
add_subdirectory(common)
add_subdirectory(adams2019)
add_subdirectory(li2018)
add_subdirectory(mullapudi2016)
|
Q:
Java putting set into map
Whats the quickest way to put a set into a map?
public class mySet<T>
{
private Map<T, Integer> map;
public mySet(Set<T> set)
{
Object[] array = set.toArray();
for(int i =0; i< array.length; i++)
{
T v = (T)array[i];
map.put(v, 1);
}
}
}
Right now, I just converted set into an array and loop through the array and putting them in one by one. Is there any better way to do this?
A:
One options would be this:
for (T value : set) {
map.put(value, 1);
}
|
When it comes to costume designs in comic books, art often imitates life. Marvel and DC Comics often modify costume designs in the comics to match whatever costume their live action counterparts are wearing in film and television. DC unveiled several new costume designs for their comic line in recent weeks, many of which bear at least some similarity to the costumes appearing in Batman V. Superman: Dawn of Justice, The Flash or Arrow. Let’s compare some of DC’s upcoming costume changes to the costumes appearing in DC’s television and movie slate to see if there’s any similarities.
Wonder Woman
There are several similarities between Wonder Woman's new comic costume and her upcoming attire in Batman V. Superman: Dawn of Justice. Both costumes have red chest pieces with golden metal trim around the breastplate and belt area and a loincloth/skirt that covers the groin and rear while exposing the thigh. However, Wonder Woman’s new comic costume more elaborate, with shoulder armor and thicker bracelets that have retractable blades. Wonder Woman’s new comic costume is also a bit more practical, with a long sleeve undergarment covering the skin that’s not protected by her armor.
Flash
The Flash’s new duds features a darker color scheme that brings it closer in line with the costume appearing on CW’s The Flash. The Flash’s new threads also have lightning-themed trim around the hips, biceps, shoulders and thighs that resemble the gold trim on the Flash’s television outfit. There are differences, though, such as different colored boots and the use of a darker red accent color around the shoulders and legs on the comic costume.
Aquaman
Aquaman’s costume has probably changed the most to resemble its movie counterparts. Aquaman’s hair is longer, and his chest armor has a tribal pattern design that match Jason Momoa’s tattoos in the upcoming Batman v. Superman: Dawn of Justice film. He’s also sporting a heavier set of wristguard that bear some similarity to his movie counterpart’s costume. Not everything is the same though. Aquaman’s comic costume has a breastplate (Aquaman’s movie version is bare chested) and has a much larger belt, that almost resembles a wrestling championship belt or weightlifter’s belt. Aquaman’s pants retain the character’s traditional orange and gold color scheme while the movie version’s pants appear to be made of black leather, although it’s possible the pants will appear similar when shown in full color.
Green Arrow
Green Arrow’s costume has also shifted closer to the character’s appearance on Arrow, with a hood and domino mask similar to his look on the CW show. The Arrow’s hood is fastened to the rest of his costume via a short vest that extends over the top of his shoulder to the end of the pectorals. Similarly, Green Arrow’s new comic outfit also has a vest that appears to connect to his chest. Green Arrow’s new costume has bare arms and appears to be made of a sort of armor-like material, whereas the Arrow’s television costume is made almost entirely of leather.
Arsenal
Arsenal’s new getup is a throwback to the 1990s, with bulky armor, pouches and a hard plastic domino mask. His costume on Arrow also has the pouches fastened to the belt as well as a simpler version of the domino mask. The color schemes are similar, with red on the chest and arms and black pants. Both costumes also have several straps that fasten around the thigh. In the costume version, the straps are connected to a leg holster that holds several throwing knives. I’m not sure what the straps are used for in the comic costume and it’s possible they could just be for show.
Professor Zoom/The Reverse Flash
Eobard Thrawne returns to the pages of the Flash in June, wearing a new variation of his classic yellow costume. The new costume appears to incorporate a few elements of the character’s costume from CW’s Flash series, including kneepads, black gloves, and black accents around the sides of the chest and legs. Traditionally, the Reverse Flash’s secondary color is red, so the black accents and lightning is a new twist. The new comic costume also has a sort of chinstrap that looks similar to the Reverse Flash’s cowl design on the television show.
What do you think of DC Comics' new costumes? Do you think they match their live-action counterparts? Let us know in the comments! |
The Centre back situation
watcha Gregster. The omen is that at least we're having a shit time pre-season. Last season it was thrashing anyone that came our way and then we we're left with Darren Bent to score ALL the goals at the start. Which, of course, failed miserably. At least we've got some strikers this time. So it'll be 4-4 rather than lose all the time |
Q:
Как в WPF MVVM сделать привязку данных к ComboBox
Здравствуйте. Столкнулся с проблемой. Делаю приложение на WPF с использованием паттерна MVVM. Работу с базой данных осуществляю с помощью Entity Framework. Есть 2 таблицы: Сотрудники(ФИО, id должности) и Должности(id, название). Я хочу, чтобы на форме с сотрудниками, когда я выбираю одного из них, выводилась вся информация о нём (ФИО, должность и тд). Это я осуществил, создав класс EmployeesViewModel:
class EmployeesViewModel : INotifyPropertyChanged
{
OpticsEntities db;
private Employee selectedEmployees;
public ObservableCollection<Employee> Employees { get; set; }
public Employee SelectedEmployees
{
get { return selectedEmployees; }
set
{
selectedEmployees = value;
OnPropertyChanged("SelectedEmployees");
}
}
public EmployeesViewModel()
{
db = new OpticsEntities();
db.Employees.Load();
Employees = db.Employees.Local;
}
public event PropertyChangedEventHandler PropertyChanged;
public void OnPropertyChanged([CallerMemberName]string prop = "")
{
if (PropertyChanged != null)
PropertyChanged(this, new PropertyChangedEventArgs(prop));
}
private RelayCommand addCommand;
private RelayCommand saveCommand;
private RelayCommand removeCommand;
private RelayCommand changeCommand;
public RelayCommand AddCommand
{
get
{
return addCommand ??
(addCommand = new RelayCommand(obj =>
{
Employee employees = new Employee();
Employees.Insert(0, employees);
SelectedEmployees = employees;
}));
}
}
public RelayCommand SaveCommand
{
get
{
return saveCommand ??
(saveCommand = new RelayCommand(obj =>
{
Employee employees = obj as Employee;
if (employees != null)
{
db.Employees.Add(employees);
db.SaveChanges();
}
}));
}
}
public RelayCommand ChangeCommand
{
get
{
return changeCommand ??
(changeCommand = new RelayCommand(obj =>
{
Employee employees = obj as Employee;
if (employees != null)
{
var changeEmployees = db.Employees.Find(employees.id);
employees = changeEmployees;
db.SaveChanges();
}
}));
}
}
}
и представление:
<ListBox Grid.Column="0" ItemsSource="{Binding Employees}"
SelectedItem="{Binding SelectedEmployees}" Margin="0,0,17,0">
<ListBox.ItemTemplate>
<DataTemplate>
<StackPanel Margin="5">
<TextBlock FontSize="18" Text="{Binding Path=lastname}" />
</StackPanel>
</DataTemplate>
</ListBox.ItemTemplate>
</ListBox>
<StackPanel Grid.Row="1" Orientation="Horizontal">
<Button Command="{Binding AddCommand}">Add</Button>
<Button Command="{Binding SaveCommand}" CommandParameter="{Binding SelectedEmployees}">Save</Button>
</StackPanel>
<StackPanel Grid.Column="1" DataContext="{Binding SelectedEmployees}">
<TextBlock FontWeight="Bold" Text="Имя" />
<TextBox>
<TextBox.Text>
<Binding Path="firstname" NotifyOnValidationError="True">
<Binding.ValidationRules>
<DataErrorValidationRule />
</Binding.ValidationRules>
</Binding>
</TextBox.Text>
</TextBox>
<TextBlock FontWeight="Bold" Text="Фамилия" />
<TextBox>
<TextBox.Text>
<Binding Path="lastname" NotifyOnValidationError="True">
<Binding.ValidationRules>
<DataErrorValidationRule />
</Binding.ValidationRules>
</Binding>
</TextBox.Text>
</TextBox>
<TextBlock FontWeight="Bold" Text="Должность" />
<TextBox>
<TextBox.Text>
<Binding Path="post" NotifyOnValidationError="True">
<Binding.ValidationRules>
<DataErrorValidationRule />
</Binding.ValidationRules>
</Binding>
</TextBox.Text>
</TextBox>
</StackPanel>
Всё отлично работает. Можно добавить нового сотрудника и сохранить.
Но проблема вот в чем. Поле "Должность" связано с таблицей "Должности" по внешнему ключу (id). И я хочу, чтобы вместо текстового поля с id должности был ComboBox, в котором бы находились названия всех должностей из таблицы "Должности". По умолчанию в нем была бы та должность, которой соответствует сотрудник, но можно было бы открыть ComboBox и присвоить ему другую. После нажатия на Save всё сохранилось бы в базе.
Максимум, что я смог сделать, это создать ComboBox, в котором будут отображаться эти должности. Но для этого пришлось сделать еще одну коллекцию во ViewModel и обращаться уже к ней в ItemsSource. Естественно, что бы я в ней не выбрал, никакой связи с сотрудником не будет, так как данные не связаны получается.
Как мне сделать, чтобы в ComboBox отображались должности из таблицы Должности, и при выборе одной из них она бы присваивалась полю Должность у Сотрудника? Напомню, что таблицы связаны внешним ключом по id должности.
A:
Тут достаточно много вариантов реализации, красивых и не очень, но если попробовать сделать с участием дополнительной коллекции моделей представления для каждой должности, как вы описали.
Пример искусственный, написан для демонстрации подхода к использованию тонкостей привязки ComboBox к данным, ни в коем случае не является примером реализации правильного MVVM.
Модели сущностей предметной области:
public class Employee
{
public string Name { get; set; }
public int PostID { get; set; }
}
public class Post
{
public int ID { get; set; }
public string Name { get; set; }
}
Модели представления:
public class EmployeeViewModel : NotificationObject
{
public EmployeeViewModel(Employee model, IEnumerable<Post> posts)
{
Model = model;
var postViewModels = new List<PostViewModel>();
foreach (var post in posts)
{
postViewModels.Add(new PostViewModel(post));
}
PostViewModels = postViewModels;
}
public Employee Model { get; set; }
public IEnumerable<PostViewModel> PostViewModels { get; private set; }
}
public class PostViewModel : NotificationObject
{
public PostViewModel(Post model)
{
Model = model;
}
public Post Model { get; set; }
}
Класс NotificationObject просто реализует INotifyPropertyChanged. В DataContext окна попадает EmployeeViewModel.
Разметка:
<StackPanel>
<TextBlock Text="{Binding Model.Name}" />
<ComboBox ItemsSource="{Binding PostViewModels}"
DisplayMemberPath="Model.Name"
SelectedValue="{Binding Model.PostID}"
SelectedValuePath="Model.ID" />
</StackPanel>
Пример работающий, в Combobox будут отображаться названия должностей, при этом в объект Employee при выборе в ComboBox будет присваиваться валидный идентификатор должности.
У ComboBox есть несколько крайне полезных свойств.
DisplayMemberPath - путь к свойству сущности в DataContext элемента списка ComboBox, который будет отображаться в выпадающем списке и в основном теле ComboBox.
SelectedValue - наравне с SelectedItem можно биндиться к свойству SelectedValue, значение которого берётся по определённому пути из SelectedItem.
SelectedValuePath - путь от SelectedItem, по которому берётся SelectedValue.
В моём примере при выборе в ComboBox в его свойство SelectedItem попадает PostViewModel, а в свойство SelectedValue попадает уже искомый идентификатор должности. Это свойство и забиндено на PostID сущности Employee.
Надеюсь, принцип понятен и удастся перенести это на ваш случай.
|
Q:
How windows update agent WUA identify KB's to be installed?
I was trying to find what updates can be applicable to the given system? I saw WUA Api calls page. I was wondering how Windows update agent works? How windows decides which KB's they need to install? Is there any central place like registry where I know different components installed or default with version information? and then decides patches?
For example, to install dot net KB's or IE KB's how do I find dot net, IE, vbscript like components first on the system?
Any idea?
A:
The IUpdateSearcher interface of the WUA API in the Client invokes a remote communication protocol (based on SOAP XML over HTTP) which communicates with the Windows Update Server or WSUS.
A part of this protocol involves the transmission of OS Configuration data and a categorized list of already installed updates (and hardware) to the Server. See the RegisterComputer and SynchUpdates messages of this communication protocol, which are described at:
https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-WUSP/%5bMS-WUSP%5d.pdf
Based on the information provided in these messages by the Client to the update Server, the Server replies with the list of the applicable updates in the
SyncUpdates Response message.
...and if the WUA is using the local WSUSSCN2.CAB scan-package through the IUpdateServiceManager.AddScanPackageService() API method to discover the applicable updates offline, then it uses the XML files contained in this package to determine the applicability. For example, see the XML tags <upd:ApplicabilityRules> and <upd:IsInstallable> from a fragment of the WSUSSCN2.CAB file below:
<upd:Update xmlns:pub="http://schemas.microsoft.com/msus/2002/12/Publishing" xmlns:cmd="http://schemas.microsoft.com/msus/2002/12/UpdateHandlers/CommandLineInstallation" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" xmlns:lar="http://schemas.microsoft.com/msus/2002/12/LogicalApplicabilityRules" xmlns:upd="http://schemas.microsoft.com/msus/2002/12/Update">
<upd:UpdateIdentity UpdateID="e55001a2-1fdd-4472-9c3c-b1e301460985" RevisionNumber="106" />
<upd:Properties DefaultPropertiesLanguage="en" UpdateType="Software" Handler="http://schemas.microsoft.com/msus/2002/12/UpdateHandlers/CommandLineInstallation" PublicationState="Published" CreationDate="2009-04-27T21:44:22.464Z" PublisherID="395392a0-19c0-48b7-a927-f7c15066d905" MaxDownloadSize="6528440" MinDownloadSize="0">
<upd:InstallationBehavior RebootBehavior="CanRequestReboot" />
<upd:Language>zh-cn</upd:Language>
</upd:Properties>
<upd:LocalizedPropertiesCollection>
<upd:LocalizedProperties>
<upd:Language>en</upd:Language>
<upd:Title>CHS</upd:Title>
</upd:LocalizedProperties>
</upd:LocalizedPropertiesCollection>
<upd:Relationships>
<upd:Prerequisites>
<upd:AtLeastOne>
<upd:UpdateIdentity UpdateID="5b56a815-2aef-40dc-9960-36bac15d1818" />
<upd:UpdateIdentity UpdateID="cf3b8086-5954-4857-b492-339cbdeba89b" />
</upd:AtLeastOne>
<upd:AtLeastOne>
<upd:UpdateIdentity UpdateID="59653007-e2e9-4f71-8525-2ff588527978" />
<upd:UpdateIdentity UpdateID="aabd43ad-a183-4f0b-8eee-8dbbcd67687f" />
<upd:UpdateIdentity UpdateID="3e0afb10-a9fb-4c16-a60e-5790c3803437" />
</upd:AtLeastOne>
<upd:AtLeastOne>
<upd:UpdateIdentity UpdateID="3b4b8621-726e-43a6-b43b-37d07ec7019f" />
<upd:UpdateIdentity UpdateID="dbf57a08-0d5a-46ff-b30c-7715eb9498e9" />
<upd:UpdateIdentity UpdateID="26997d30-08ce-4f25-b2de-699c36a8033a" />
</upd:AtLeastOne>
</upd:Prerequisites>
</upd:Relationships>
<upd:ApplicabilityRules>
<upd:IsInstalled>
<lar:And xmlns:lar="http://schemas.microsoft.com/msus/2002/12/LogicalApplicabilityRules">
<bar:FileExists Path="Microsoft.NET\Framework\v1.0.3705\System.Web.dll" Csidl="36" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
<bar:FileVersion Path="Microsoft.NET\Framework\v1.0.3705\System.Web.dll" Comparison="GreaterThanOrEqualTo" Version="1.0.3705.6060" Csidl="36" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
<bar:RegKeyExists Key="HKEY_LOCAL_MACHINE" Subkey="Software\Microsoft\Active Setup\Installed Components\{3351022E-A2D8-4B52-B84D-491279866457}" RegType32="true" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
</lar:And>
</upd:IsInstalled>
<upd:IsInstallable>
<lar:And xmlns:lar="http://schemas.microsoft.com/msus/2002/12/LogicalApplicabilityRules">
<bar:RegKeyExists Key="HKEY_LOCAL_MACHINE" Subkey="Software\Microsoft\Active Setup\Installed Components\{3351022E-A2D8-4B52-B84D-491279866457}" RegType32="true" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
<lar:Not>
<bar:RegDword Key="HKEY_LOCAL_MACHINE" Subkey="SYSTEM\WPA\TabletPC" Value="Installed" Comparison="EqualTo" Data="1" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
</lar:Not>
<lar:Not>
<bar:RegDword Key="HKEY_LOCAL_MACHINE" Subkey="SYSTEM\WPA\MediaCenter" Value="Installed" Comparison="EqualTo" Data="1" xmlns:bar="http://schemas.microsoft.com/msus/2002/12/BaseApplicabilityRules" />
</lar:Not>
</lar:And>
</upd:IsInstallable>
</upd:ApplicabilityRules>
<upd:Files>
<upd:File Digest="oYIv8m/lHbAFWB1MhR14EjvPIzc=" DigestAlgorithm="SHA1" FileName="NDP1.0sp3-KB928367-X86-Chs.exe" Size="6528440" Modified="2007-06-29T14:59:22.47" />
</upd:Files>
<upd:HandlerSpecificData xsi:type="cmd:CommandLineInstallation" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:pub="http://schemas.microsoft.com/msus/2002/12/Publishing">
<cmd:InstallCommand Arguments="-q" Program="NDP1.0sp3-KB928367-X86-Chs.exe" RebootByDefault="false" DefaultResult="Failed" xmlns:cmd="http://schemas.microsoft.com/msus/2002/12/UpdateHandlers/CommandLineInstallation">
<cmd:ReturnCode Reboot="false" Result="Succeeded" Code="0" />
<cmd:ReturnCode Reboot="true" Result="Succeeded" Code="3010" />
<cmd:ReturnCode Reboot="true" Result="Succeeded" Code="1641" />
</cmd:InstallCommand>
</upd:HandlerSpecificData>
Additional notes:
The WUA does not keep its database in the Registry. It keeps it in a JetBlue ESE database file at: %SystemRoot%\SoftwareDistribution\DataStore\DataStore.edb.
The WUA does NOT identify updates by KnowledgeBase (KB) numbers but by SHA1 based GUIDs that look like this: "5b56a815-2aef-40dc-9960-36bac15d1818". You can see these GUIDs in the XML fragment above and you can obtain them via the WUA API IUpdate.get_Identity().
|
Information systems are deployed by businesses to improve workflow and organizational efficiencies. Historically such information systems are designed to make it easy for the service providers such as hospitals, financial institutions or insurers to manage the services they provide. In these prior art service delivery models, Information systems are built and paid for by the organization for the benefit of the organization. The organizations' employees or staffs are the primary users of such systems. These systems are designed with input from such users with the focus being to improve their user experience and operational efficiencies. While the customer or consumer (hereafter “consumer” is understood to include customer, patient and other “users”) is the beneficiary of such organizational services, the information technology platforms are not primarily designed for the consumer but are designed for the benefit of the organizational employees.
As such information systems have evolved, the organizations have decided to allow the consumers to access some of the information stored in the system. The organization may add services or modules to the system to grant the consumer access to some of the features of the service. These features have grown over time into what is known as self-service delivery of capabilities for the consumers. This is where the consumers begin performing some of the functions, like setting up an appointment, updating personal information like mailing address, or reviewing a bill or making a payment, using the system. Here the consumer is taking the role of an employee to do what an employee was doing with the system to manage a small part of data for his/her own data.
In case of financial systems, this delivery model is seen in online banking services where “consumers” are given self-service capabilities. In healthcare, this model is seen in the Personal Health Record (PHR) and/or Patient Portal module available with some hospitals or practice management systems as an extension of the Electronic Health Record initiatives. Over time, these information systems have performed their intended function of serving the employees and organization well. They help them deliver medical care or other services they provide to their “consumers”, patients or customers. They have also made good progress in the areas of self-service for consumers. However, as such organizations deploy and control their own systems, they also retain control and ownership of underlying data and analytics from such data. The customer is required to re-register and re-enter data at each organization to open an account at the institution or to enter as a patient at a facility. The organization may have good business and security reasons to safe guard the data and limit sharing of such information within and outside of the organization. However, sharing of such data across organizations has many benefits for the consumers. These benefits are not achieved when such systems are not inter-operable by design and by choice.
Recognizing these limitations and opportunities, the financial industry tried to develop data exchange standards like Open Financial Exchange—OFX. This standard has evolved over time and it is used by the industry. It does provide some degree of inter-operability with data transfer among the financial institutions. However it has seen limited adoption with limited data transfer control by end-users. Also, for example only, there are no methods for transferring initial account setup information from one institution to another.
The healthcare industry has its own history with Health Level 7 (HL7) and its members that provide a framework and related standards for the exchange, integration, sharing, and retrieval of electronic health information. While HL7 is used by various technology providers in the industry, interoperability among service providers and platforms remains very illusive. Some of the healthcare participants, including government organizations, are spending hundreds of millions of dollars to build information exchanges to share patient data across multiple organizations and various systems within an organization. Such sharing via exchanges has seen limited if any success. There is no accepted standard based practice of sharing data and registering a patient among EHR platforms, hospital management systems (HMS), practice management systems (PMS) and healthcare providers. A patient has to re-register at each facility at each visit to receive service from the provider with various levels of personal information and medical history required to be updated.
In all these attempts at sharing of the data, the focus has remained on the data that an organization collects and what the organization wishes to achieve in terms of delivery of service and benefit to its own business. What data the organization is willing and able to share remains in its control. Such sharing of data, if any, is not designed for the direct benefit of the patients, for example only and not by way of limitation. The patients remain as secondary beneficiaries of such investments in information technologies by the organizations. There is inherent conflict in such system design between patient interests in data and institutional interest in such data. With latest technology, availability of networks and growing understanding and interest by the consumers and patients, it is now possible to change the dynamics of information system model and data ownership and sharing. The following sections describe a process and method to solve this problem and put the patient or consumer in control of information while improving organizational efficiencies and reducing data entry errors. For the first time Applicants' invention makes it possible for a patient and/or consumer to open communication with healthcare providers and other organizations as real-time data sharing becomes available.
With availability of thousands of health related apps for smart phones, consumers are getting unprecedented tools in their hands to keep track of their fitness activities such as exercise and monitoring of calories consumed and more. Personal monitoring devices such as fall detection are increasingly deployed as patient population ages as well as more tech savvy users become users of medical services. However, the limitations of the medical service delivery platforms that are described above only become more pronounced when patient monitoring is recommended or otherwise available for monitoring vital physiological and disease status frequently. Consumer focused platforms like Microsoft Health Vault or Google Health offer patients a place to store personal information made available to them by certain EHR platforms and fitness devices that support their exchange protocol, but the consumer becomes an island of her own information. There is presently no available platform or solution for a patient to communicate effectively with their healthcare providers, for example only, with such information. Similarly, financial industry platforms like Mint or Quicken offer a place for a consumer to aggregate financial data in one place with no effective means to share that data when opening a new account at a new institution.
The Patient Centric Platform
The present disclosure addresses the above problems by describing a platform in a designated computer system developed for the benefit of the patient that changes the dynamics of system design and delivery of information technology for healthcare industry, again for example only and not by way of limitation. One objective of the present disclosure is to provide a method for a patient to interface with healthcare providers using personal computers, tablets and smart phones, for example.
According to this invention, for the first time, the patients are in charge of their own data, both from a data entry point of view as well as for management and use of this data. The patients are not required to ‘sign-up’, ‘register’ or ‘open an account’ manually at each healthcare provider facility each time they wish to receive service from them. According to the present invention, all patient data—both static and dynamic—is entered and/or collected in a patient managed platform that stores all the relevant information needed for the patient to acquire services from any healthcare institution.
Once a patient has created such a data repository, she can update it any time as needed and share the latest information and/or history with any one she chooses at any time. The recipient organization or person can continue to use the platform they may have invested in per the traditional model and simply ‘take’ or ‘accept’ the information authorized to be provided by the patient by means of the present invention to improve the quality of data in their own systems.
This disclosure further describes methods for various processes involved in establishing such service for the benefit of a patient and her healthcare services providers. As described more fully hereafter, it will be seen that this same approach works equally well in many other settings for consumers in dealing with other service providers such as financial institutions, insurance services, retail or online stores or educational and governmental institutions.
The present invention further addresses the recording of various readings of recommended or desired physiological and other readings by the patient manually or by using devices that communicate with the invention platform for the patient and for the patient to share selected data with medical service providers. As can be understood by those of ordinary skill in the art, the same approach also works for non-medical recording of data and reporting.
By way of example only and not by limitation, Applicant has identified several benefits of the present invention's patient centric platform for patients as follows:
Benefits for a Patient:
1) Patient builds and retains complete medical history and control of information 2) Patient gets a life time medical history depository with ease and accuracy of data 3) Patient has an easy to use environment that is available online—anywhere, on any device 4) Patient can submit her medical and personal data to selected recipients such as, for example only, her primary care provider online or via mobile device 5) Patient can collect specialty specific data prior to a visit and submit the data online or via mobile device 6) Patient can work on incomplete parts of the requested information at home or while waiting at medical facility 7) Patient has to enter data once or import data from any other platforms once and it remains available to use again and again for sharing with any other providers 8) Streamlines registration and check-in process at the front desk 9) Delights patients by reducing wait-time in front office—easy to register and check-inBenefits for the Healthcare Providers: 1) For patient authorized recipients of selected data the invention provides better tool to front desk staff—easy to admit/check-in patient, easy to see what data is missing and complete it on the spot, upload data into existing systems 2) Provides a better tool to back-office—automatically import that data from the invention in to EHR and no need to type/re-enter data manually 3) Have complete and accurate data while reducing data-entry time and errors 4) Improve staff efficiency and morale 5) Reduce cost of operations without investing in new servers 6) The invention is a fully secure platform, compliant with laws and regulations 7) Enabled by this invention to monitor patient data as “Medical Home” and reduction in hospital re-admission work flows develop in the organization 8) Enabled by this invention to support/participate in sensor based data gathering and services as adoption of such devices and applications become part of a practice 9) Move to 21st century interaction with medical office and patient and make the office visit experience match with patient expectations 10) The present invention does not replace existing EHR/PHR/PMS/HMS platforms but enhances the value of existing investment and extends utilization 11) Engages patient in managing healthcare data by providing them a reason to enter it once and use it oftenThe Methods
By way of continued description, the present invention is understood by example in the medical arena to provide methods for a patient to request and setup an account with the invention platform (here “platform” is understood to include a computer system in the form of a programmable device configured to utilize a computer processor to process data as described more fully herein), the platform performing activation, completing authentication, verification and identification, presenting personal, general and specialty medical profiles status, recorded reading status, completing personal information consisting of demographics, payments and other information, entering medical history information consisting of immunization, medicine taken, family and social history and other information, entering medical review of systems such as cardiovascular, respiratory, etc., completing primary care data such as prior hospitalization, prior illness history etc., auto selecting right questions based on age and gender of the patient, and tracking percentage complete for each profile. Further, the platform enables continuing completion of information as and when needed for medical specialist specific data such as cardiology, surgery and all other specialties, entering purpose of visit and date of visit, and recording prior tests and, if available, entering or uploading test results. The present invention also provides a method to upload documents like a copy of the patient's—authorized user's—insurance card, identity card, like driver license, health directive proxy or living will. In addition, the invention provides methods for recording of data such as blood pressure, blood glucose level, blood oxygen level, body temperature, pulse rate, urine output volume etc. The present invention enables an authorized user to review the data, print the forms and share selected data with authorized recipients by means of a filtering matrix. This filtering matrix is based on criteria set by the recipient organization for each type of data, and there can be one or more such matrix filter for each organization or each department or service provider. To address the concern of filling out endless forms for each specialty and organization, the forms are removed from the data entry side. The present invention instead presents data requests in a series of questions for each different specialty and once a question is answered in one place, the same data, if requested in another place or form, is used in reading or printing various forms without the requirement of duplicate data entry by the patient. According to one aspect of the invention, a slider control presents data gathering in a series of question and answer modes, with a slider changing color, for example only and not by way of limitation, to show all (e.g. green slider) or only incomplete (e.g red slider) or some other filter based (e.g. orange slider for critical items) set of questions to gather data and improve user experience and data normalization.
Additionally the above described method for data recording may further include devices that reside with the patient and automatically generate readings and use various networking techniques to report the data to the invention platform. This may further include an optional local hub that aggregates data from one or more devices and one or more patients before reporting to the invention platform, thereby improving performance and localization.
On the medical service provider staff side, additional invention methods allow the authorized recipient user role to be defined based on job functions and/or expertise and provides tools to filter patients and organize work queues so as to help those with incomplete data to complete necessary information, receive the patient data and review, print, import or export information as needed, all only as authorized by the patient.
According to another aspect, the invention offers extra security to ensure that only an intended authorized recipient gets the data by providing for use of a token. When a patient sends the data to an authorized recipient healthcare provider, not only a notification—email or other message—goes to the authorized recipient but also a token is generated for the patient/sender, who can deliver that token to the healthcare provider over phone, via text message or in person at the time of visit. This also serves another benefit of protecting the healthcare provider against medical liability on the part of the recipient as by holding the data in a wait queue until patient visit time, and not having access to the data until the token is redeemed. This ensures that the healthcare providers are not assuming responsibility of treatment prior to a visit and avoids liability for any failure to treat or any complications that may occur prior to a visit.
Similarly with real time or near real time frequent recording of device based data, the invention platform offers a method to collect and hold data, and to generate filter based boundary conditions that may trigger an alert to a patient or a care provider or a healthcare professional based on the workflow method selected as will be described more fully hereafter.
In another aspect, the invention further allows a patient to share her full profile with any family member to co-manage their affairs or for a parent and/or guardian to manage data for another person using various profiles, thus making it a data repository for an entire family while at the same time, allowing the data owner to take away profile sharing as and when needed.
According to a further aspect of the invention, the method takes this patient-medical service provider approach to other industries where the “patient” is the consumer who by the present invention is enabled to manage personal data for financial, insurance, retail and other services and respective service providers that are authorized recipients of consumer provided data to offer service, where the consumer no longer has to fill-out forms for each service but only has to enter data in her specialty profile once in one place—her authorized user data repository—all as will be described more fully hereafter.
The above advantages, as well as many other advantages, of the present invention will be readily apparent to one skilled in the art to which the disclosure pertains from the reading of the claims, the appended drawings, and the following description. |
/*
* ProFTPD - FTP server daemon
* Copyright (c) 2001-2016 The ProFTPD Project team
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Suite 500, Boston, MA 02110-1335, USA.
*
* As a special exemption, The ProFTPD Project team and other respective
* copyright holders give permission to link this program with OpenSSL, and
* distribute the resulting executable, without including the source code for
* OpenSSL in the source distribution.
*/
/* Regular expression management */
#ifndef PR_REGEXP_H
#define PR_REGEXP_H
/* We define our own wrapper struct, pr_regex_t, in order to abstract the
* differences between POSIX regexes and PCRE regexes from the calling
* code.
*/
#ifdef PR_USE_PCRE
# include <pcre.h>
# include <pcreposix.h>
/* Make sure that we are using PCRE-7.0 or later. */
# if defined(PCRE_MAJOR) && PCRE_MAJOR >= 7 && \
defined(PCRE_MINOR) && PCRE_MINOR >= 0
# define PR_USE_REGEX 1
# else
# error "pcre-7.0 or later required"
# endif /* PCRE-7.0 or later */
#else
# ifdef HAVE_REGEX_H
# include <regex.h>
# ifdef HAVE_REGCOMP
# define PR_USE_REGEX 1
# endif /* HAVE_REGCOMP */
# endif /* HAVE_REGEX_H */
#endif /* !PR_USE_PCRE */
typedef struct regexp_rec pr_regex_t;
pr_regex_t *pr_regexp_alloc(module *m);
void pr_regexp_free(module *m, pr_regex_t *pre);
/* Callers wishing to explicitly use POSIX regular expressions, regardless
* of PCRE support, should use this function.
*/
int pr_regexp_compile_posix(pr_regex_t *pre, const char *pattern, int flags);
/* If PCRE support is enabled, the given pattern will be compiled as a
* PCRE regular expression, otherwise it will be compiled as a POSIX
* regular expression.
*/
int pr_regexp_compile(pr_regex_t *pre, const char *pattern, int flags);
size_t pr_regexp_error(int res, const pr_regex_t *pre, char *buf, size_t bufsz);
/* Returns the original pattern used to compile the regular expression, if
* present.
*/
const char *pr_regexp_get_pattern(const pr_regex_t *pre);
int pr_regexp_exec(pr_regex_t *pre, const char *str, size_t nmatches,
regmatch_t *matches, int flags, unsigned long match_limit,
unsigned long match_limit_recursion);
/* Used to set default limits on the matching, if no such limits are
* explicitly provided by the calling code. These limits can be set e.g.
* for the entire vhost/daemon.
*
* NOTE: The match limits are only properly honored when PCRE support is
* enabled.
*/
int pr_regexp_set_limits(unsigned long match_limit,
unsigned long match_limit_recursion);
/* For internal use only */
void init_regexp(void);
#endif /* PR_REGEXP_H */
|
1. Introduction {#sec1-pharmacy-04-00004}
===============
There is growing emphasis on the demonstration of achieved competencies in the health professions \[[@B1-pharmacy-04-00004]\]. As health care becomes increasingly complex, pharmacists must ensure that they develop and maintain the clinical knowledge and skills necessary to navigate the health care system and optimize patient outcomes \[[@B2-pharmacy-04-00004]\]. Competency development in the workplace is an ongoing issue for the profession of pharmacy, with discussions ranging from assessment of core competencies in pharmacy education to competency-based continuing professional development.
Identifying best practices for assessing the achievement of competencies continues to be a priority for pharmacists and pharmacy education. Assessment and learning are intimately related, as what is assessed can influence what is learned \[[@B3-pharmacy-04-00004]\]. Further, effective assessment can increase learner engagement, motivation, and knowledge. Given the integrated nature of assessment and learning, it is critical that those developing and implementing assessment programs in the workplace understand how employees experience competency assessments and the extent to which the quality of the assessment program encourages or inhibits workplace learning.
The American Society of Health-System Pharmacists (ASHP) defines core competencies for pharmacy residents and endorses a tool that pharmacy faculty can use to document competency achievement \[[@B4-pharmacy-04-00004]\]. While providing assessment tools and guidelines, ASHP allows each health system to design its own assessment program for pharmacy residents, using a wide range of assessment approaches best suited for the health system (e.g., verbal feedback, midpoint evaluation, portfolio, mentoring). While this approach allows for flexibility and diversity of assessment approaches at residency programs across the country, the quality of the assessment programs in pharmacy resident training remains incompletely understood. Evaluating how residents and preceptors experience an assessment program can highlight gaps between teaching and learning, demonstrate inefficiencies, identify program strengths and weaknesses, and ultimately inform approaches to workplace learning and competency development. Improving assessment programs to accurately measure competency achievement and empower self-regulated learning will enable employers to trust that a pharmacy practice residency certificate holder is competent in defined competencies and would be able to better assess an employee's strengths and needs.
The purpose of this study was to evaluate the assessment program for pharmacy residents at an academic medical center in the United States. Specifically, this study examined resident and preceptor perceptions of the quality of the assessment program and examined differences in perceptions between groups. This work is an important step towards understanding how the program's assessment practices align with desired competency outcomes and demonstrates a process for evaluating stakeholder perceptions of assessments in workplace learning.
2. Experimental Section {#sec2-pharmacy-04-00004}
=======================
This study took place at a large academic medical center in the United States (greater than 800 beds and approximately 37,500 admissions per year) that trains pharmacy residents in one of 12 different residency programs: a Post-Graduate-Year 1 (PGY1) pharmacy practice residency; 10 Post-Graduate Year 2 (PGY2) pharmacy specialty programs; and a combined PGY1 and PGY2 health system pharmacy administration residency. Pharmacy residency is a competitive training program for graduates holding a Doctor of Pharmacy (PharmD) degree. Since 2007, the residency programs have largely utilized PharmAcademic (formerly known as Resitrak) \[[@B5-pharmacy-04-00004]\], a McCreeadieGroup web-based tool which enables scheduling and documentation of evaluation of resident learning experiences. Through this platform, residency preceptors are able to utilize a variety of assessment strategies to evaluate and document resident competencies each month, including direct observation of skills and outcomes to documentation of experiences. Residency completion certificates are presented to residents upon verified completion (e.g., marked as achieved) of at least 85% of Resitrak goals by the residency program director.
2.1. Data Collection {#sec2dot1-pharmacy-04-00004}
--------------------
The Competency Assessment Program (CAP) framework uses 12 quality criteria to evaluate the perceived value of an assessment program: Acceptability; Authenticity; Cognitive Complexity; Comparability; Costs and Efficiency; Educational Consequences; Fairness; Fitness for Purpose; Fitness for Self-Assessment; Meaningfulness; Reproducibility of Decisions; and Transparency ([Table 1](#pharmacy-04-00004-t001){ref-type="table"}) \[[@B6-pharmacy-04-00004],[@B7-pharmacy-04-00004],[@B8-pharmacy-04-00004],[@B9-pharmacy-04-00004]\]. Educational Consequences, for example, concerns the impact of the assessment program on learning and instruction, including how the individuals view the goals of education and adjust their learning activities accordingly. Transparency reflects the extent to which a CAP is clear and understandable, including the purpose, assessors, and scoring criteria while Meaningfulness indicates the value of the CAP and emphasizes the perceived link between the assessment task and personal needs or goals \[[@B8-pharmacy-04-00004]\]. One strength of this framework is its representation of assessment programs as a comprehensive system, since evaluating one single assessment method fails to fully consider the complex and integrated nature of competency development. To-date, the CAP framework has been implemented and studied in various educational settings, validated in various contexts, and adapted to meet the needs of an institution \[[@B6-pharmacy-04-00004],[@B7-pharmacy-04-00004],[@B8-pharmacy-04-00004],[@B9-pharmacy-04-00004]\].
pharmacy-04-00004-t001_Table 1
######
Description of the twelve quality criteria for a Competency Assessment Program (CAP), adapted from Baartman and colleagues \[[@B6-pharmacy-04-00004]\].
Criterion Description
-------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------
*Acceptability* The extent to which all stakeholders (e.g., students, teachers, employers) approve of the assessment criteria and the way the CAP is carried out
*Authenticity* The degree of resemblance of a CAP to the future workplace
*Cognitive-Complexity* The extent to which the assessments reflect the presence of the cognitive skills and enable the judgment of thinking processes
*Comparability* The extent to which a CAP is conducted consistently and responsibly
*Costs and Efficiency* The time and resources needed to develop and carry out the CAP, compared to the benefits
*Educational Consequences* The degree to which the CAP yields positive effects on learning and instruction, and the degree to which negative effects are minimized
*Fairness* The extent to which learners get a fair chance to demonstrate their competences, for example by limiting assessor bias
*Fitness for Purpose* The degree to which standards, curriculum, instruction and assessment are aligned
*Fitness for Self-Assessment* The degree to which a CAP stimulates self-regulated learning of students, including fostering self-assessment and giving and receiving feedback
*Meaningfulness* The value of the CAP for all stakeholders involved (e.g., students, teachers, employers)
*Reproducibility of Decisions* The extent to which decisions made from results of CAP are accurate and constant over situations and assessors
*Transparency* The extent to which the CAP is clear and understandable to all stakeholders (e.g., students, teachers, employers)
The CAP survey is a validated instrument that evaluates these 12 quality criteria, each measured with 4 items on a scale from 0 to 100 \[[@B9-pharmacy-04-00004]\]. In this study, the CAP survey was adapted to align with the context of the residency assessment program and written for two sets of participants: (a) past and current residents of the residency program (survey \#1); and (b) preceptors of the residency program (survey \#2). Each survey also included demographic questions (e.g., *role in program, year of residency completion, residency experience outside of the institution,* and *numbers of years of experience*) and a list of assessment methods for respondents to identify as methods currently utilized in the program, chosen based on ASHP's *Resident's Guide to the Residency Learning System* (RLS) \[[@B5-pharmacy-04-00004]\]. The survey went through three rounds of review by the research team for appropriateness and face validity.
In fall 2013, the survey was distributed via email to pharmacy residents in the program between 2010 and 2013 (*n =* 41) and to pharmacy preceptors that precepted residents at any time between 2010 and 2013 (*n =* 53). The timeframe of 2010--2013 was chosen in hopes of having a greater number of participants while limiting recall bias. The survey was left open for a period of 1 month, and two emails were sent as reminders for the survey. Preceptors were also reminded to complete the survey during a staff meeting. All data was collected anonymously.
2.2. Data Analysis {#sec2dot2-pharmacy-04-00004}
------------------
Responses with less than 75% completion were excluded from all analyses. Pairwise deletion was used for responses where all 4 indicators for a single quality criterion were left blank and mean substitution was used for other data missing at random. Descriptive statistics were calculated for the components of the residency program, the composite 12 quality criteria, and each individual indicator within each quality criterion. Cronbach's alpha was calculated for each of the 12 quality criteria, with α \> 0.60 considered acceptable and indicating an analysis of the composite quality criteria from each of the four indicator questions to be appropriate \[[@B10-pharmacy-04-00004]\]. A standard of α ≤ 0.60 was used to indicate that the construct lacked internal consistency. Composite scores for each of the 12 quality criteria were created by averaging the four indicators within the criteria. Due to small sample sizes, comparisons between groups were made using the Mann-Whitney U for 2 groups and Kruskal-Wallis one-way analysis of variance (ANOVA) for 3 or more groups. Group comparisons were made to examine differences in responses between residents and preceptors, between those that completed residency at the institution only and those that completed a residency elsewhere, and between groups based on number of years of precepting, year of residency completion, or experience precepting elsewhere. Descriptive statistics are represented in the text by median, range. Statistical significance was established at α = 0.05. Given the lack of power to detect anything but large differences due to small sample sizes, any p value less than 0.20 was used to generate hypotheses for future research. Survey responses were analyzed with IBM SPSS Statistics for Windows (Version 21.1. Armonk, NY: IBM). The study received exemption from full review by the Institutional Review Board.
3. Results and Discussion {#sec3-pharmacy-04-00004}
=========================
3.1. Demographic Results {#sec3dot1-pharmacy-04-00004}
------------------------
The survey was completed by 23 residents (56.1% response rate) and 28 preceptors (52.8% response rate). Sixteen residents completed PGY1 training at the institution, 20 completed PGY2 training at the institution, and 13 residents completed both PGY1 and PGY2 training at the institution ([Table 2](#pharmacy-04-00004-t002){ref-type="table"}). In addition to residency experience at this institution, seven residents completed one year of residency training at a different institution. A majority of respondents participated in residency training at the institution in 2012 (*n =* 14) and 2013 (*n =* 15), with 4 residents receiving training in 2011.
Of the 28 preceptor respondents, nine completed PGY1 and PGY2 training at the institution. Eleven preceptor respondents completed PGY1 and nine completed PGY2 training at the institution, with 14 preceptors completing a residency experience at another institution. In addition to his or her current precepting role, 18 of the 28 preceptors had precepting experience at another institution. Four preceptors reported having less than three years of precepting experience, 13 preceptors between three and 10 years, and 11 preceptors with more than 10 years of precepting experience.
pharmacy-04-00004-t002_Table 2
######
Demographic characteristics and perceived presence of assessment methods.
Characteristic Residents (*n =* 23) Preceptors (*n =* 28)
----------------------------------------------------- ---------------------- -----------------------
*Residency Experience*
PGY1 at the institution 16 (70) 11 (39)
PGY2 at the institution 20 (87) 9 (32)
PGY1 and PGY2 at the institution 13 (57) 9 (32)
Completed a residency elsewhere 7 (30) 14 (50)
Completed residency in 2011 4 (17) N/A
Completed residency in 2012 14 (61) N/A
Completed residency in 2013 15 (65) N/A
Currently practicing at the institution 14 (61) N/A
*Preceptor Experience*
Precepted elsewhere N/A 18 (64)
Precepted less than 3 years N/A 4 (14)
Precepted 3 to 10 years N/A 13 (46)
Precepted more than 10 years N/A 11 (39)
*Assessment Method ^a,b^*
Verbal Feedback 23 (100) 26 (93)
Assigning Goals and Objectives to Learning Outcomes 19 (83) 23 (82)
Snapshot Evaluations 3 (13) 8 (29)
Mentor Relationship 22 (96) 18 (64)
Quarterly Self Evaluations 18 (78) 13 (46)
Quarterly Program Director Evaluations 16 (70) 11 (39)
Monthly Summative Self Evaluations 22 (96) 20 (71)
Monthly Summative Preceptor Evaluations 21 (91) 21 (75)
Monthly Evaluation of Preceptor 21 (91) 21 (75)
Learning Experience Evaluation 10 (43) 10 (36)
Midpoint Evaluation 16 (70) 23 (82)
Midpoint Self-Evaluation 9 (39) 8 (29)
Observation in Simulated Situations 3 (13) 5 (18)
Observation in Workplace 11 (48) 18 (64)
Portfolio 5 (22) 3 (11)
Proof of Competency Assessments 3 (13) 4 (14)
Assessment Interview 1 (4) 2 (7)
All data presented as *n* (%); ^a^ Assessment Methods drawn from Resident's Guide to Residency Learning System \[[@B5-pharmacy-04-00004]\]; ^b^ *Which of the following were included in the residency assessment program during your residency experience.*
When asked to identify the assessment methods utilized within the residency assessment program, all residents agreed that *verbal feedback* was a part of the residency assessment program. At least 90% of residents also agreed that *mentor relationship*, *monthly summative self evaluations*, *monthly summative preceptor evaluations,* and *monthly evaluations of preceptors* was part of the residency assessment program. Although 93% of preceptors agreed that *verbal feedback* was an assessment method used in the program, the remaining methods received less than 90% agreement, with *assigning goals and objectives to learning outcomes* (82%) and *midpoint evaluations* (82%) the only others above 80% agreement. Few residents and preceptors identified *snapshot evaluations, portfolio,* and *assessment interviews* as part of the residency assessment program.
3.2. CAP Responses {#sec3dot2-pharmacy-04-00004}
------------------
[Table 3](#pharmacy-04-00004-t003){ref-type="table"} describes the combined resident and preceptor composite scores for the 12 quality criteria used to assess the residency assessment program. Eleven of the 12 quality criterion demonstrated acceptable Cronbach's alpha (α \> 0.60), indicating an analysis of the composite quality criteria from each of the four indicator questions to be appropriate \[[@B10-pharmacy-04-00004]\]. Cronbach's alpha for Costs and Efficiency (α = 0.35) suggests that the four items used to measure this construct lacked internal consistency. Baartman and colleagues regarded criteria receiving scores at 65 or higher to be of good quality, scores between 30 and 64 to be of medium quality, and scores below 30 to be poor \[[@B9-pharmacy-04-00004]\]. Median composite scores for the 12 quality criteria ranged from 43.00 to 84.75, with Comparability (84.75, 25.00--100.00) and Transparency (82.50, 25.50--100.00) rated the highest. Educational Consequences (43.00, 10.75--96.50) and Costs and Efficiency (64.25, 37.00--95.25) were the only two composite quality criteria that fell below a score of 65. While median responses tended to exceed 65, the ranges for composite scores and individual items showed wide variability in responses.
pharmacy-04-00004-t003_Table 3
######
Resident and preceptor evaluation of the residency assessment program based on the 12 quality criteria of the CAP. Two example items for each four-item criterion (taken from the resident survey) are provided.
Criterion ^a^ N Mean, Median (Range) α
----------------------------------------------------------------------------------------------------------------------------------------------------- ---- ----------------------------- ------
Acceptability 51 69.28, 69.25 (8.25--100) 0.90
The criteria I was evaluated on as a part of the residency assessment program were appropriate for my training 51 75.25, 76.00 (13.00--100)
All methods used to evaluate me during residency were appropriate 51 65.86, 68.00 (0.00--100)
Authenticity 51 74.92, 80.13 (41.75--100) 0.87
The working conditions in which I was assessed during residency resemble the conditions of the workplace 51 72.49, 80.00 (0.00--100)
The competencies on which I was assessed during my residency program are those I need to be successful in the workplace 51 72.29, 76.00 (0.00--100)
Cognitive Complexity 51 73.09, 73.25 (31.25--100) 0.91
The assessment program placed an emphasis on the thought processes involved in my process for providing patient care 51 70.65, 73.00 (25.00--100)
My reasoning and thought process was assessed within the assessment program 51 75.24, 75.00 (37.00--100)
Comparability 49 78.62, 84.75 (25.00--100) 0.92
The activities I was evaluated on were the same from month to month for a similar type of rotation 49 79.41, 75.00 (37.00--100)
The process by which I was evaluated for each criterion was the same from month to month for a similar type of rotation 49 81.67, 87.00 (25.00--100)
Costs and Efficiency 51 64.27, 64.25 (37.00--95.25) 0.35
I believe the time required for each assessment method utilized during my residency was appropriate. 51 56.59, 53.00 (11.00--100)
I would have been willing to put in more time towards the assessment and feedback aspects of residency if I perceived them to have a greater value. 51 73.84, 79.00 (4.00--100)
Educational Consequences 51 45.26, 43.00 (10.75--96.50) 0.66
The assessment process during residency motivated me to learn more during residency 51 44.29, 45.00 (0.00--97.00)
My assessment during residency impacted the objectives of subsequent learning experiences during my residency 51 43.68, 50.00 (0.00--100)
Fairness 51 76.59, 78.88 (36.50--100) 0.71
The residency assessment program during my residency was fair 51 75.98, 77.00 (0.00--99.00)
I was evaluated with various assessment methods (*i.e*., verbal feedback, midpoint evaluations, portfolio) 51 81.00, 87.00 (31.00--100)
Fitness for Purpose 51 72.68, 75.50 (25.50--100) 0.75
The activities I was assessed on matched stated educational goals 51 76.82, 76.00 (31.00--100)
The assessment program covered assessment of all competency areas required in my residency training 51 69.67, 75.00 (0.00--100)
Fitness for Self-Assessment 51 69.43, 72.75 (10.50--100) 0.77
The assessment methods during my residency stimulated me to self- assess my learning 51 67.19, 70.00 (11.00--100)
I received feedback that fostered my personal development 51 66.35, 70.00 (0.00--100)
Meaningfulness 49 72.39, 75.13 (3.75--100) 0.85
The assessment methods used during my residency enhanced my learning 49 65.35, 70.00 (4.00--100)
The competencies I was assessed on are meaningful to me 49 69.94, 76.00 (5.00--100)
Reproducibility of Decisions 46 76.02, 77.88 (37.50--100) 0.80
My evaluations were consistent throughout the year 46 67.20, 72.50 (3.00--100)
I am assessed the same way in several different work situations 46 83.72, 82.00 (12.00--100)
Transparency 46 77.19, 82.50 (25.50--100) 0.93
I was aware of the assessment criteria used during my residency 46 79.24, 88.50 (22.00--100)
I was aware of the assessment methods used during my residency 46 76.35, 89.50 (0.00--100)
^a^ All items measured on a continuous scale ranging from 0 (*Not at all)* to 100 (*Completely*); Each criterion consists of four survey items.
Mann-Whitney U tests were used to examine responses between residents and preceptors and between individuals who completed residency training only at the institution and those that completed residency training elsewhere ([Table 4](#pharmacy-04-00004-t004){ref-type="table"}). When compared to those who completed residency training only at the academic medical center, those who completed residency training elsewhere scored the assessment program higher on Meaningfulness (83.13, 32.75--100.00 *versus* 70.88, 3.75--90.00, *p* = 0.01) and Comparability (90.00, 55.00--100.00 *versus* 77.38, 25.00--100.00, *p* = 0.04). No significant differences were found based on number of years of precepting, year of residency completion, or experience precepting elsewhere.
3.3. Discussion {#sec3dot3-pharmacy-04-00004}
---------------
Competency development in the workplace is a priority for the pharmacy profession, with emphasis on identifying best practices for assessing the achievement of professional competencies. In this study, the perceived quality of the assessment program for pharmacy residents at an academic medical center in the United States was studied as an important step towards improving assessment strategies and understanding how assessment practices align with desired outcomes. The results of the 48-item, 12 quality criteria survey demonstrated the strengths of the assessment program, identified opportunities to focus improvement efforts on specific aspects of the residency assessment program, and provides a framework for replicating assessment program evaluations in other workplace settings.
Based on resident and preceptor scores, it appears that the assessment program could benefit from strategies that improve the Educational Consequences of the assessments. Low scores for this quality indicator suggest that the current assessments provide little motivation for residents to learn more, may hinder achievement of desired learning outcomes, and offer limited incentive for learners to incorporate feedback from faculty. More broadly, Educational Consequences concerns the impact of the competency assessment program on learning and instruction, including how the individuals view the goals of education and adjust their learning activities accordingly \[[@B8-pharmacy-04-00004]\]. In the absence of educational consequences, it is difficult for assessments to exert much influence on learning. Given the integrated nature of assessment and learning, priority should be placed on improving the quality of education consequences and improving the effects of the assessment program on participants.
The quality criteria Costs and Efficiency scored below 65, varied widely at the item level, and lacked internal consistency. As a construct, Costs and Efficiency broadly relates to the time and resources needed to carry out the assessment program compared to the benefits, meaning that any additional time spent on the assessment program should be justified by the positive effects of assessment, including improvements in learning, teaching, and motivation \[[@B5-pharmacy-04-00004]\]. The results of this study suggest that, although the current residency assessment process is perceived as time-intensive, participants may be willing to invest more time for better value. In making improvements to workplace learning, re-evaluating how time is spent on the assessment program could be advantageous with specific consideration to the benefit that the assessment provides to the learner.
Remaining quality criteria were generally rated highly by the study participants. Comparability and Transparency were ranked the highest by residents and preceptors, indicating a consistency in working conditions and criteria evaluated and understanding by all parties (e.g., learners, preceptors, program directors, mentors) involved. In general, these quality criteria are strengths of the pharmacy residency assessment program and should be embraced while considering programmatic changes. At the same time, however, large ranges in responses at the criteria and item level suggest that not all of these criteria may be equally agreed upon. This variability indicates differing perceptions of what constitutes assessment quality at the individual level, suggesting that those overseeing workplace learning should consider approaches to ensuring that individuals are getting what they need from assessments to achieve desired competencies.
Group comparisons in this study provide additional insight into the quality of the assessment program. First, no significant differences were found in perceived quality of the assessment program between residents and preceptors, suggesting that residents and preceptors view the quality of the assessment program similarly. However, significant differences were found between individuals who had residency training outside of the institution versus those who did not. Those who completed residency elsewhere perceived the assessment program as more meaningful and comparable than those who completed residency training at the academic medical center. Meaningfulness relates to the value that all stakeholders place in the assessment program (e.g., learners, leaders, employers) and these findings suggest that those that trained elsewhere found the academic medical center's assessment program to be more meaningful and valuable to learners. Comparability concerns the extent to which a CAP is conducted consistently and responsibly and these findings suggest that those with training elsewhere perceived the assessment program at the academic medical center as more consistent and responsible. Soliciting the experience of residents and preceptors with experience at other institutions may help uncover the source of these differences.
pharmacy-04-00004-t004_Table 4
######
Group comparisons for scores on the 12 quality criteria of the CAP, by position (resident, preceptor) and training location (at the institution, elsewhere).
Criterion Residents (*n* = 23) Preceptors (*n* = 28) Residency Only at Institution (*n* = 30) Residency Training Elsewhere (*n* = 21)
------------------------------ ---------------------- ----------------------- ----------- ------------------------------------------ ----------------------------------------- ---------------
Median (Range) Median (Range) *p*-value Median (Range) Median (Range) *p*-value ^a^
Acceptability 76.50 (8.75--100) 67.50 (52.50--95.00) 0.08 67.50 (8.75--95.00) 75.00 (52.50--100.00) 0.12
Authenticity 81.75 (43.75--100) 78.25 (41.75--95.25) 0.72 77.50 (43.75--95.25) 83.75 (41.75--100.00) 0.09
Cognitive Complexity 77.25 (50.75--100) 71.75 (31.25--94.50) 0.17 74.38 (31.25--94.50) 72.25 (50.00--100.00) 0.32
Comparability 76.12 (25.00--100) 88.75 (59.25--100) 0.09 77.38 (25.00--100.00) 90.00 (55.00--100.00) 0.04
Costs and Efficiency 59.62 (37--95.25) 68.12 (38.25--85.00) 0.21 62.50 (39.75--78.50) 76.25 (37.00--95.25) 0.16
Educational Consequences 43.75 (10.75--96.50) 42.25 (12.25--79.25) 0.91 43.75 (12.25--83.75) 42.38 (10.75--96.50) 0.83
Fairness 75.75 (36.50--100) 80.75 (43.00--100.00) 0.41 78.75 (36.50--100.00) 83.00 (43.00--100.00) 0.87
Fitness for Purpose 80.87 (25.50--100) 74.87 (45.00--92.75) 0.42 75.00 (25.50--92.75) 76.25 (45.00--100.00) 0.53
Fitness for Self- Assessment 69.75 (10.50--100) 74.00 (26.25--93.75) 0.89 68.75 (10.50--93.75) 75.75 (37.25--100.00) 0.13
Meaningfulness 75.00 (3.75--100) 75.25 (32.75--91.00) 0.91 70.88 (3.75--90.00) 83.13 (32.75--100.00) 0.01
Reproducibility of Decisions 80.00 (37.50--100) 76.00 (62.50--99.75) 0.96 75.25 (37.50--99.75) 80.38 (41.75--100.00) 0.42
Transparency 86.50 (34.00--100) 78.00 (25.50--98.75) 0.08 78.00 (25.50--100.00) 87.78 (51.25--100.00) 0.15
^a^All group comparisons examined using Mann-Whitney U. Significance set at *p* \< 0.05.
This study had several limitations. Due to the uniqueness of assessment programs and variability associated with each institution, the study was limited to a single institution. While this may limit generalizability to other institutions, this study provides a framework and process for evaluating the quality of the assessment program that other institutions could implement. The length of the survey tool itself appears to be a limitation as there were 7 incomplete responses excluded from the study. A more accurate representation of the time required for the survey or designated work time to complete the survey may have improved response rates and increased the sample size. The small sample size may have limited the ability to detect differences in subsets of this sample due to a lack of power and *p* values ≤ 0.20 may warrant additional study. Despite these limitations, it is believed that the results from this study provide critical insight into the CAP and will be useful for informing programmatic improvement.
This work is a first step in fully understanding the quality and impact of the assessment program for trainees at an academic medical center in the United States. Future work should extend this study to evaluate how assessment feedback is incorporated into practice (e.g., patient care) or intermediary outcomes. In addition, this research evaluated the residency assessment program at the program level and provided limited information about individual assessment methods or instruments, leaving additional work to be done toward identify gaps and weaknesses associated with single assessment approaches or instruments. Future research should also extend this framework and process to additional institutions in an effort to identify trends and differences in assessment program quality that could inform the profession moving forward.
4. Conclusions {#sec4-pharmacy-04-00004}
==============
Interest in processes that support demonstration of achieved competencies in the pharmacy workplace is growing. Overall, the assessment program used to evaluate workplace learning in this study was perceived to be effective by pharmacy residents and preceptors. Results suggest that the focus of improvement in the residency assessment program should target Educational Consequences, ensuring that assessments promote motivation and incentives. Further, workplace learning programs should consider differences associated with training outside of the institution, as those with experiences in other workplace environments are likely to perceive assessments differently than those with training only at the institution.
SS took the lead on designing and implementing the study, conducting data analyses, and writing the manuscript; JEM provided oversight for the design and implementation of the study, provided support for data analysis and interpretation, and contributed to writing the manuscript; SE provided support for the study by way of the partnership between the UNC Eshelman School of Pharmacy and UNC Medical Center and engaged in critical review and edits to the manuscript; JM participated in study design and implementation and provided critical review and edits to the manuscript; EH participated in study design and implementation and provided critical review and edits to the manuscript.
The authors declare no conflict of interest.
|
The Original Gangster Kush was created in California, near Los Angeles, in San Fernando Valley, after 3 generations of crossing and stabilization. It is the most popular strain in south California and it has become the #1 in the U.S.A.
OG Kush Feminized cannabis plant
The term Original Gangster refers to someone that has gone up on the scale of producers/vendors of cannabis until reaching the top to become the boss. This strain is the boss of the biggest cannabis market in the world.
World class flavor
It has a world class flavor, like lemon mixed with gasoline. It is an exotic blend of indica and sativa and this taste is one of the reasons that people get to pay up to $30 per gram. Another reason is that rappers, actors and VIPs in California demandthis strain more than any other.
Overwhelmingly potent cannabis
It is overwhelmingly potent, up to 24% THC and 0,23% CBD, analysis carried out by laboratories in California. It is 75% Indica and genetically is composed by Lemon Thai / Pakistani crossed with the famous ChemDawg. Leaves are neon green and totally trichome covered. In Europe is not so famous, even though it is starting to be so. Now you can try the Californian flavor.
Feminized cannabis seeds
Contents: 10 cannabis seeds
Feminized
Genetic background: Lemon Thai / Pakistani x ChemDawg
Production: 550 gram cannabis
Flowering: 55 days
Approx. date of harvest: approx. october 10th
THC level: Extremely high
CBD level: Low
Outdoor height: approx. 3 m
Dinafem Seeds
Dinafem is a Spanish company that worldwide only sells the best selection of cannabis seeds from their own, and other seed banks. Originally the people who work at Dinafem are, themselves, growers; for many years they were able to study the cannabis genetics before they started growing their own seed lines. Throughout the world they are famous for their great accomplishments in the field. |
Spreading of partially coherent beams in random media.
Some published computational work has suggested that partially coherent beams may be less susceptible to distortions caused by propagation through random media than fully coherent beams. In this paper this suggestion is studied quantitatively by examining the mean squared width of partially coherent beams in such media as a function of the propagation distance. The analysis indicates under what conditions, and to what extent, partially coherent beams are less affected by the medium. |
Atypical protein kinase C iota is an oncogene in human non-small cell lung cancer.
Protein kinase C (PKC) isozymes have long been implicated in carcinogenesis. However, little is known about the functional significance of these enzymes in human cancer. We recently showed that the atypical PKC (aPKC) isozyme PKCiota is overexpressed in human non-small cell lung cancer (NSCLC) cells and that PKCiota plays a critical role in the transformed growth of the human lung adenocarcinoma A549 cell line in vitro and tumorigenicity in vivo. Here we provide compelling evidence that PKCiota is an oncogene in NSCLC based on the following criteria: (a) aPKCiota is overexpressed in the vast majority of primary NSCLC tumors; (b) tumor PKCiota expression levels predict poor survival in patients with NSCLC; (c) the PKCiota gene is frequently amplified in established NSCLC cell lines and primary NSCLC tumors; (d) gene amplification drives PKCiota expression in NSCLC cell lines and primary NSCLC tumors; and (e) disruption of PKCiota signaling with a dominant negative PKCiota allele blocks the transformed growth of human NSCLC cells harboring PKCiota gene amplification. Taken together, our data provide conclusive evidence that PKCiota is required for the transformed growth of NSCLC cells and that the PKCiota gene is a target for tumor-specific genetic alteration by amplification. Interestingly, PKCiota expression predicts poor survival in NSCLC patients independent of tumor stage. Therefore, PKCiota expression profiling may be useful in identifying early-stage NSCLC patients at elevated risk of relapse. Our functional data indicate that PKCiota is an attractive target for development of novel, mechanism-based therapeutics to treat NSCLC. |
Coronary sinus mapping to differentiate left versus right ventricular outflow tract tachycardias.
Outflow tract ventricular tachycardia (OT-VT) can originate from several different segments of the outflow tract. Various ECG criteria have been proposed for localization of OT-VTs. We present two patients, one with left and one with right OT-VT. We used local ventricular electrograms in the coronary sinus to localize the focus of the OT-VT. Mapping of local ventricular electrograms in the coronary sinus may be a simple and effective method for differentiating right versus left ventricular outflow tract tachycardias. However, the diagnostic value and precision of this method should be evaluated in a series of patients before its implementation in the OT-VT ablation decision algorithm. |
Nursing students' spiritual talks with patients - evaluation of a partnership learning programme in clinical practice.
To evaluate the impact of a partnership learning programme designed to support undergraduate nursing students' competence in speaking with patients about spiritual issues. Spiritual care is an oft-neglected and underexposed area of nursing practice. Despite the increasing amount of research on spiritual care in educational programmes, little is known about nursing students' experiences with existential/spiritual talks and the process of learning about spiritual care in the clinical placement. The project used a qualitative evaluation design to evaluate the impact of a partnership-initiated intervention focusing on student learning of spiritual care in a hospital ward. Data were collected through three focus group interviews with bachelor of nursing students from one Norwegian university college and supplemented with notes. Data were analysed by means of qualitative interpretative content analysis. The intervention was found to enhance students' competence in spiritual talks. The students developed an extended understanding of spirituality, became more confident in speaking with patients about spiritual issues and more active in grasping opportunities to provide spiritual care. Participating nurses significantly contributed to the students' learning process by being role models, mentoring the students and challenging them to overcome barriers in speaking with patients about spiritual issues. The partnership learning programme proved to be a useful model in terms of enhancing students' confidence in speaking with patients about spiritual concerns. Collaboration between nursing university colleges and clinical placements could help nursing students and clinical nurses to develop competencies in spiritual care and bridge the gap between academic education and clinical education, to the benefit of both. |
1. Introduction {#sec1}
===============
Overactive bladder (OAB) syndrome covers several symptoms: urinary urgency, which is the cornerstone symptom \[[@B1]\], usually associated with urinary frequency and nocturia, and with or without urgency urinary incontinence (UUI). The term of OAB applies if there is no proven infection or other obvious pathology \[[@B2], [@B3]\]. OAB is correlated with reduced health-related quality of life (HRQoL) and affects patients with different profiles. Patients with OAB may be children, premenopausal and postmenopausal women, men with benign prostate hypertrophy (BPH), or frail elderly patients. Their symptoms are known to be bothersome and treatable \[[@B4]\]. Patients have different needs and also specific expectations, which are sometimes challenging for the physician in charge, but must be set right. Gynecologists often care for women with urinary symptoms of urgency and frequency, but they may not always be recognized as OAB.
We report three main clinical pictures of OAB: a male patient presenting with lower urinary tract symptoms (LUTS), including urgency; a young woman with comorbidities; and an elderly woman with mixed urinary incontinence, with the aim of highlighting the specific features of these real-life cases, discussing the most appropriate management, and assessing how fesoterodine treatment may meet these patients\' expectations.
Fesoterodine possesses four key pharmacological properties \[[@B5]--[@B8]\]. Firstly, it is immediately and completely metabolized into its active form, the 5-hydroxymethyl tolterodine (5-HMT) by ubiquitous plasma esterases. Thus, its activation is not affected by genetic variability in hepatic enzymes \[[@B5]\]. This may explain the dose-response relationship observed clinically. Secondly, fesoterodine has a very low risk of crossing the blood brain barrier, and has no significant effect on cognitive function, which has been confirmed in clinical trials \[[@B6]\]. Thirdly, it possesses a well-balanced affinity ratio on detrusor M2 and M3 receptors, which explains its further actions on contraction and on relaxation, increasing the bladder capacity \[[@B9]\]. Finally, the 7--9-hour half-life of fesoterodine allows a single daily dose to be taken, avoiding the risk of accumulation of the active ingredient \[[@B10]\].
As mentioned in the product specifications (Toviaz® SPCs) \[[@B11]\], two doses, 4 and 8 mg, are available. The recommended starting dose is 4 mg once daily. Fesoterodine 8 mg has proven its superiority compared to 4 mg in reducing UUI episodes in a head-to-head comparison in OAB patients; the 8 mg dose was also more effective in controlling frequency and nocturia \[[@B12]\].
2. First Case: Mr. LUTS and OAB {#sec2}
===============================
The first case reported the history of "Mr. LUTS and OAB", who is 72 years of age, has had LUTS for five years, has a weak and variable stream, complains of painful micturition if he waits too long between micturitions, and also of frequency, urgency, and nocturia. There were no signs of bladder outlet obstruction or other identified etiology. He has been diagnosed with hypertension and type 2 diabetes. He takes several medications: a beta-blocker, a selective AT1-subtype angiotensin II receptor antagonist, a calcium antagonist, and an oral biguanide antihyperglycemic agent. His International Prostate Symptom Score (IPSS) is 15, and the QoL question was scored as 4. Digital rectal examination revealed a slight increase in the size of the prostate, with an estimated volume of 50--60 ml. He has been offered transurethral resection of the prostate (TURP) but declined. The European Association of Urology (EAU) guidelines \[[@B13]\] state that prostate-specific antigen (PSA) should be tested if a diagnosis of prostate cancer will change management or if it assists in the treatment and/or decision-making process; his PSA was within the normal range, at 2.6 ng/ml. His IPSS value for storage symptoms was higher than his score for voiding symptoms. He was prescribed an alpha blocker (tamsulosin) as a first-line treatment. Six weeks later, at the next visit, he reported a slight improvement in frequency and stream, with no change in nocturia or urgency, and some ongoing rare UUI episodes and dysuria. His QoL score, which was linked to urgency, was not improved. Uroflowmetry was performed and showed a Qmax of 11 ml/s, a voiding volume (VV) of 140 ml, and a postvoiding residual (PVR) of 45 ml. Transrectal ultrasound confirmed an enlarged prostate (68 ml).
"Mr. LUTS and OAB" was offered a combination treatment with tamsulosin and dutasteride to try to control his symptoms and reduce the weight of his prostate. Three months later, he came back for a follow-up visit and declared he had stopped dutasteride after two weeks because of erectile dysfunction. He was still complaining of nocturia and urgency. The control of PVR indicated a residue lower than 100 ml.
A frequency-volume chart (FVC) that collects the time and volume of micturitions can be a useful tool to obtain a real assessment of nocturia. Van Haarst et al. \[[@B14]\] analyzed two different ways of measuring nocturia and showed that in 50% of the patients the IPSS nocturia score was found to be higher than nocturia calculated from the FVC, indicating that the IPSS overestimates nocturia in most patients.
The analysis of the patient\'s voiding diary revealed a night-time urine output of 800--950 ml and a 24-hour urine output of 2,600--2,900 ml. Therefore, an adjustment of fluid intake was advised. The clinical picture led to the prescription of a combination treatment of tamsulosin 0.4 mg plus fesoterodine 4 mg, and the patient agreed to enroll in a telephone and ambulatory clinic follow-up program.
One point of concern was nocturia. Weiss et al. \[[@B15]\] showed that significant improvements were observed with fesoterodine compared to placebo in the number of micturition-related nocturnal urgency episodes (--1.28 versus --1.07,*p* = 0.003), in the number of nocturnal micturitions per 24 hours (--1.02 versus --0.85,*p* = 0.011), and in the nocturnal frequency urgency sum, defined as the sum of Urinary Sensation Scale (USS) ratings recorded for all nocturnal micturitions (--4.01 versus --3.42,*p* \< 0.003). Additionally, HRQoL measures were improved with fesoterodine.
A further six weeks later, the patient came back with no change in nocturia, a slight improvement in urgency, and complained of minimal dry mouth. Consequently, the fesoterodine dose was increased to 8 mg per day and the patient was kept in the follow-up study. His IPSS improved to 10 and his QoL score on the IPSS improved to 2.
2.1. Discussion {#sec2.1}
---------------
This interesting case highlights important clinical aspects leading to useful conclusions:The patient related his symptoms to BPH and was at the beginning treated as a BPH patient only. However, as storage symptoms and nocturia were also present, the patient needed a customized (nonfixed) combination.In clinical studies, fesoterodine has demonstrated efficacy on nocturia unrelated to nocturnal polyuria; nocturnal polyuria should be managed by reducing the urine output at night.Urgency was actually the major cause of the QoL deterioration but was treated last.An appropriate follow-up program kept the patient on treatment.
3. Second Case: Mrs. Young OAB {#sec3}
==============================
The second case refers to a 48-year-old woman, a busy manager with a history of depression and sleep disturbance. She has had three terminations of pregnancy and one delivery by cesarean section. She smokes approximately ten cigarettes per day and has high cholesterol serum levels. She takes several medications: a selective serotonin reuptake inhibitor (escitalopram), two benzodiazepines (delorazepam and clonazepam), and a statin. She reports a four-year history of urinary symptoms: daily UUI episodes, mild stress urinary incontinence (SUI), and two episodes of nocturia per night. She wears pads every day. The urology consultation revealed some degree of pelvic pain, especially during vaginal examination. The urine dipstick was negative and there was no PVR. No specific causes of the symptoms such as urine tract infection were identified. The patient also complained of mild dyspareunia and occasional constipation. The urine culture turned out to be sterile, with no blood in urine, and the pelvic ultrasound scan and urine cytology were also negative. The cystoscopy, which was performed as a result of the presence of storage symptoms and to rule out a bladder tumor in this current smoker, was normal.
In OAB patients, it is of utmost importance to consider all comorbidities. Anxiety and depression may play a role, feeding a vicious circle. Moreover, medications to treat neurological or psychiatric disorders can influence OAB and be responsible for side effects \[[@B16], [@B17]\]. Gastrointestinal disorders are frequently associated with OAB, such as constipation in this case, but patients rarely raise the topic. An overlap exists between irritable bowel syndrome and OAB \[[@B18]\].
The patient was prescribed a *β*3 agonist, pelvic floor muscle training (PFMT) and bladder retraining. Four months later, she noticed some degree of improvement, but had stopped the treatment as she felt that she had no time for PFMT. She was not compliant with the bladder drill either, and soon stopped the *β*3 agonist because she did not sense any real improvement. She also felt that she did not have the time to complete a bladder diary. She was prescribed fesoterodine 8 mg for three months. In parallel, her general practitioner asked for vaginal and urethral culture swabs, which were negative. After three months, her urinary urgency improved, but she said that the few remaining episodes of urgency were "killing her life" and that she did not want to be on pills for her whole life. Therefore, she refused to continue the treatment and requested an "easy fix". Her reaction highlights the need for careful consideration of the consequences of incontinence in terms of QoL. A publication from Vaughan et al. \[[@B19]\] reported that OAB and incontinence synergize to reduce QoL, especially in the domains of sleep, elimination, usual activities, discomfort, distress, vitality, and sexual activity.
Consistent efficacy on urgency symptoms with a significant decrease in UUI and urgency episodes has been reported with fesoterodine at doses of 4 and 8 mg compared to placebo ([Table 1](#tab1){ref-type="table"}) \[[@B12], [@B22], [@B20], [@B21]\]; however, some patients may react differently. Patient satisfaction is an important driver of treatment success \[[@B23]\]. Patient expectations should be considered carefully in the context of OAB management. The achievement of patients\' goals was measured in the Study Assessing FlexIble-dose fesoterodiNe in Adults (SAFINA study) \[[@B24]\], a 12-week multicenter open label study with 331 OAB adults, using the Self-Assessment Goal Achievement (SAGA) questionnaire. Fesoterodine treatment resulted in 81.3% of patients declaring that their goals were "somewhat achieved/achieved" or that the result "exceeded/greatly exceeded their expectation".
Our case patient had very specific expectations; she refused to have an implant (neuromodulation), saying "I\'m not going to be an android!" She accepted botox injections, and so a first set of injections was performed under local anesthesia. She found the injections "a little painful" and "a big annoyance", but at the one-month follow-up visit after botox injection she reported no more UUI episodes and an improvement in frequency and the number of urgency episodes, as well as in QoL. Even though she stated that she did not like the idea of being a patient for the rest of her life, she accepted subsequent injections.
3.1. Discussion {#sec3.1}
---------------
The clinical points that can be learned from this case are as follows:All OAB cases are different, and a thorough evaluation is mandatory to adequately address each case.It is important to assess other aspects, such as functional and psychological disorders that may influence symptoms, and to consider nonneurogenic OAB as a multifactorial disease.The major goal of initial therapy is to meet the patient\'s expectations regarding the reason for their visit, to improve their satisfaction, and their QoL.Due to fesoterodine\'s characteristics and flexible dosage, improvement of symptoms and achievement of the patients\' goal are usually high with this medication.When patients have specific requirements, all options should be discussed and the patient\'s agreement obtained.A customized approach is a crucial factor for treatment success.OAB management should be personalized; beware of a simplistic application of a standardized treatment algorithm.
4. Third Case: Mrs. Mixed Urinary Incontinence {#sec4}
==============================================
The third case concerns a 73-year-old retired schoolteacher who had had two children, born by forceps-assisted vaginal delivery. She complained of ten episodes of daytime frequency with small frequent voids, a constant desire to void, and three nocturia episodes per night, resulting in poor sleep. More recently, things had deteriorated with a sudden urge to void and occasional urinary incontinence with exercise. She changed pads three times a day and complained of superficial dyspareunia. She took medication (doxazosin and furosemide) for well-controlled hypertension but did not take hormone replacement therapy. She complained of mild constipation and had had three lower urinary tract infections (UTIs) in the last 12 months. During her consultation with her general practitioner, she emphasized that urgency was the most important problem for her. She was referred to a gynecologist, who confirmed a subjective diagnosis of mixed urinary incontinence with superficial dyspareunia and vulval discomfort. The physical examination detected a marked urogenital atrophy, a grade I uterine prolapse, a grade I cystocele, and grade I rectocele. She was initially prescribed vaginal estrogen, as supported by evidence from Cochrane reviews \[[@B25], [@B26]\], and referral to a urogynecologist was considered.
The urogynecologist confirmed the mixed urinary symptoms with urgency and UUI, SUI, recurrent UTIs, and mild constipation. The clinical examination also confirmed urogenital atrophy, demonstrable SUI, and a urogenital prolapse without evidence of neuropathy or specific etiology of the symptoms.
The PVR was found to be 95 ml, urinalysis was negative, and flexible cystoscopy was normal. The patient noticed an improvement of vulval discomfort and dyspareunia with local estrogen therapy. The physician provided lifestyle advice, prescribed PFMT training and oxybutynin 5 mg three times a day, and undertook a medication review. The alpha blocker doxazosin, which may aggravate the symptoms of SUI, was switched to an angiotensin II receptor antagonist, losartan, and furosemide was discontinued. The International Consultation on Incontinence Modular Questionnaire (ICIQ) and a bladder diary were completed. They showed that the patient leaked a moderate amount of urine several times a day, generating moderate bother. Incontinence occurred before she could get to the toilet and was also associated with exercise, coughing, and sneezing. She complained of ten frequency episodes per day, three nocturia episodes with moderate bother, and had a total VV at 2,190 ml. The night volume was 490 ml, with no evidence of nocturnal polyuria. This led to the symptomatic diagnosis of mixed incontinence, which is an important common symptom and is particularly difficult to treat. It has been defined by Haylen et al. \[[@B27]\] as being "the complaint of involuntary loss of urine associated with urgency and also with effort or physical exertion or on sneezing or coughing".
After six weeks, the patient returned and reported that she had taken oxybutynin for six weeks and then stopped due to persistent dry mouth and worsening constipation. She had also performed bladder retraining and PFMT for two weeks and then stopped. She noticed a mild improvement in urgency and UUI, but no change in nocturia, and her SUI was still troublesome. The urogynecologist suggested switching to fesoterodine 4 mg once a day and explained that she could increase the dose if required \[[@B22], [@B28], [@B29]\].
What are the reasons to consider using fesoterodine, here as a second line therapy, in a 73-year-old elderly woman? Fesoterodine is the only OAB medication classified as B (Beneficial) by the Fit fOR The Aged (FORTA) classification \[[@B30]\]. LUTS-FORTA results from a systematic review of drugs treating LUTS in the elderly in order to evaluate their efficacy, safety, and tolerability. Darifenacin, mirabegron, oxybutynin ER, solifenacin, tolterodine, and trospium were classified as FORTA C (Questionable; Caution), while oxybutynin IR and propiverine were classified as FORTA D (Avoid; Do not). This classification suggests that fesoterodine may have better efficacy and tolerability in elderly patients.
Moreover, the combination of fesoterodine with vaginal estrogen may act synergistically. Chugtai et al. \[[@B31]\] have studied the results of combining fesoterodine with vaginal estrogen and showed that this combination improved OAB symptoms and sexual function in postmenopausal women, and importantly, produced greater improvement in QoL.
At 12 weeks the urogynecologist reviewed her clinical picture. Fesoterodine 4 mg was well tolerated and there was no need for a dose increase, her urgency and urgency incontinence symptoms were improved, and the number of voids per day had decreased to seven, but remained at two per night. Her symptoms of urogenital atrophy and dyspareunia had improved and there was no reported UTI. Constipation improved with dietary advice and possibly by stopping oxybutynin as well. While her urogenital prolapse remained asymptomatic, her SUI remained troublesome. With regard to adverse effects, the fact that patients cope better with dry mouth with fesoterodine compared to oxybutynin may lie in the selectivity of 5-HMT for the bladder over the salivary glands. An*in vitro* and*in vivo* study, using radioligand binding, has demonstrated that oxybutynin has a threefold higher affinity for the salivary glands over the bladder \[[@B32]\] and therefore has a greater propensity to induce dry mouth.
At the 24-week visit, the urogynecologist\'s review was in favor of continuing with fesoterodine 4 mg since the patient\'s urgency and UUI were much improved. However, there was still some SUI limiting her physical activity. The urodynamic investigations performed while the patient was on fesoterodine showed a cystometric capacity of 500 ml, no evidence of detrusor overactivity, moderate urodynamic SUI, and no evidence of voiding dysfunction. Hence, as suggested by the 6th International Consultation on Incontinence \[[@B33]\], the urogynecologist discussed the possibility of surgery for SUI and continued the current pharmacological treatment.
4.1. Discussion {#sec4.1}
---------------
This clinical case illustrates some important take-home messages:It is important to treat the most bothersome symptoms first.In case of mixed urinary symptoms, there is a need to look for a possible urogenital prolapse; this particular patient had demonstrable genital prolapse but did not find it troublesome.Fesoterodine is effective and well tolerated in the elderly, and is rated B (beneficial) by the LUTS-FORTA classification.Vaginal estrogen is effective in the management of urogenital atrophy and recurrent UTIs.There is evidence to support the combined use of estrogen and antimuscarinics.Nocturia secondary to nocturnal polyuria does not respond to antimuscarinic medication and should benefit from lifestyle advice and consideration of desmopressin treatment.
Finally, the conclusions were that, firstly, the cornerstone symptom of OAB, urgency, is very common, and that many OAB patients may not be diagnosed appropriately. Secondly, when urgency is diagnosed, the use of antimuscarinics should be considered. Thirdly, fesoterodine has the benefit of flexible dosing and can be titrated accordingly; therefore, before switching to another medication, increasing the dose for further efficacy should be considered. Finally, the patient should not be considered as a passive subject but as a real actor in the treatment process; involving her/him in the treatment plan increases her/his adherence and the improvement of treatment outcomes.
Participation in the satellite symposium "They Have a Common Urgent Problem" at the International Continence Society 47^th^ Annual Meeting in September 2017 in Florence, Italy, and writing assistance were sponsored by Pierre Fabre (Castres, France).
Conflicts of Interest
=====================
A. Tubaro has received support as a consultant/lecturer or for scientific studies from Allergan, Astellas, Bayer, Boston Scientific, Pfizer, Pierre Fabre, and Takeda Millennium. J. Heesakkers has received support as an investigator from Astellas, Boston Scientific, Ipsen, Bluewind, and UrogynBV; and as consultant from Astellas, Allergan, Bluewind, UrogynBV, Ixaltis, and Pierre Fabre. J.N. Cornu has received support as a consultant from Allergan, Astellas, Boston Scientific, Bouchara-Recordati, Coloplast, Cousin Biotech, Medtronic, Mundipharma, Pfizer, Pierre Fabre Medicament, SAP, and Takeda; and as investigator from Astellas, GT Urological, Medtronic, Ipsen, and Coloplast. D. Robinson has received support for research from Astellas, Pfizer, Allergan, and Ferring; for consultancy from Astellas, Pfizer, Ferring, Allergan, and Ixaltis; and as speaker from Astellas, Pfizer, Contura, Ferring, and Pierre Fabre.
######
Percentage decrease in urinary urgency incontinence and urgency episodes according to different studies with fesoterodine at 4 and 8 mg.
**UUI decrease** **(**%**) 4/8 mg** **Urgency episode decrease (**%**) 4/8 mg**
-------------------------- ------------------------------------- ---------------------------------------------
Chapple, 2007 \[[@B22]\] 80.8/87.5 17.6/19.1
Chapple, 2014 \[[@B12]\] 74.4/79.5 37.8/45.5
Kaplan, 2010 \[[@B23]\] 75.0 43.3
Dubeau, 2014 \[[@B24]\] 69.3 41.5
[^1]: Academic Editor: Mohammad H. Ather
|
Sézary disease
Sézary disease is a type of cutaneous lymphoma that was first described by Albert Sézary. The affected cells are T-cells (so it is a T-cell lymphoma) that have pathological quantities of mucopolysaccharides. Sézary disease is sometimes considered a late stage of mycosis fungoides with lymphadenopathy.
Signs and symptoms
Sézary syndrome and mycosis fungoides are T-cell lymphomas whose primary manifestation is in the skin. The disease's origin is a peripheral CD4+ T-lymphocyte, although rarer CD8+/CD4- cases have been observed. Epidermotropism by neoplastic CD4+ lymphocytes with the formation of Pautrier's microabscesses is the hallmark sign of the disease. Although the condition can affect people of all ages, it is commonly diagnosed in adults over age 60. The dominant symptoms of the disease are:
Generalized erythroderma
Lymphadenopathy
Atypical T-cells ("Sézary cells") in the peripheral blood
Hepatosplenomegaly
Palmoplantar keratoderma
Diagnosis
Those who have Sézary disease often present with skin lesions that do not heal with normal medication. A blood test generally reveals any change in the levels of lymphocytes in the blood, which is often associated with a cutaneous T-cell lymphoma. Finally, a biopsy of a skin lesion can be performed to rule out any other causes.
The immunohistochemical features are very similar to those presented in mycosis fungoides except for the following differences:
More monotonous cellular infiltrates (large, clustered atypical pagetoid cells) in Sézary syndrome
Sometimes absent epidermotropism
Increased lymph node involvement with infiltrates of Sézary syndrome.
Treatment
Treatment typically includes some combination of photodynamic therapy, radiation therapy, chemotherapy, and biologic therapy.
Treatments are often used in combination with phototherapy and chemotherapy, though pure chemotherapy is rarely used today. No single treatment type has revealed clear-cut benefits in comparison to others, treatment for all cases remains problematic.
Radiation therapy
A number of types of radiation therapy may be used including total skin electron therapy. While this therapy does not generally result in systemic toxic effects it can produce side effects involving the skin. It is only available at a few institutions.
Chemotherapy
Romidepsin, vorinostat and a few others are a second-line drug for cutaneous T-cell lymphoma. Mogamulizumab has been approved in Japan and is awaiting FDA approval in the United States. There are dozens of clinical trials, with a few in Phase III.
Epidemiology
In the Western population, there are around 3 cases of Sézary syndrome per 1,000,000 people. Sézary disease is more common in males with a ratio of 2:1, and the mean age of diagnosis is between 55 and 60 years of age.
See also
Cutaneous T-cell lymphoma
List of cutaneous conditions
References
External links
Illustration of Sezary cells
Sezary Syndrome lymphoma information
Category:Lymphoma
Category:Lymphoid-related cutaneous conditions
Category:Syndromes |
Bhattacharya's annual salary is Rs 28.95 lakh while ICICI Bank CEO Chanda Kochchar is paid Rs 7.85 crore annual salary. To earn as much as Kochchar, SBI's Arundhati Bhattacharya will have to work 604 hours a day at her present salary. Bhattacharya will have to work 876 hours a day to earn as much as Aditya Puri, the managing director of HDFC Bank who gets Rs 10.06 crore annual salary.
The salary gap appears too large considering the huge market share of SBI. After merger with its subsidiary banks, SBI caters to 42.04 crore customers with a market share of 23.07 per cent and 21.16 per cent in deposits and advances, as opposed to 18.05 per cent and 17.02 per cent respectively, before the merger. The private sector banks don't come anywhere close to this.
Low remuneration at the top echelons of public-sector banks has been a cause of concern. Last year, speaking about public sector banks at a banking conference in Mumbai, then RBI governor Raghuram Rajan had said public-sector banks tended to overpay at the bottom but underpay their top executives.
He jokingly said he himself was underpaid and the disparity made it harder to attract talent from outside at the top level in public-sector banks.
High disparity in compensation makes it difficult for the government to hire top managers laterally at public sector banks. It also impacts the motivation of public-sector managers who have to fiercely compete with their private-sector peers these days.
Sponsored Stories
Subscribe to our Newsletters
In an interview with ETCIO, Kedar Upadhye, Jt President & Global CFO, Cipla, throws light on some innovative IT projects that Cipla has implemented,as part of its digital transformation strategy, to fuel business growth.
Sudhanshu Pokhriyal, President of Textiles at Raymond, firmly believes that digital transformation is a top-down approach. Taking the lead on the initiative, he has devised an innovative digital strategy that enhances customer experience while helping retailers in their business. |
DICE admit Bad Company faults
DICE creative director Lars Gustavsson has said that his firm had been creating PC titles for so long, that they underestimated the console audience that would buy the first Battlefield: Bad Company title.
Speaking with GI.biz, the director assured that his team have learned their lessons from the first release, and that Bad Company 2 will be better.
"To me, Battlefield: Bad Company was an eye-opener, and for a very long time I think the PC audience was seen as the hardcore, the most competitive and dedicated audience. Maybe at one time that was partially true, but now we definitely see a fanatic shooter audience on console," the big cheese offered.
"I think one of our biggest mistakes with Battlefield: Bad Company for example was that when we started making it, laying out the plans, the view on the gamer was that it's a console audience, and we need to treat them a bit more gently, since they're less experienced..." |
It's simple really.. you take the quest, then cancel it. you still have the item to change look.. you keep repeating this until you have the desired amount. Just remember they expire after 24hrs so if you don't use them, you lose them |
Galina has been using the Japanese Candlesticks in trading since 2004. Meanwhile, she has wrote dozens of articles about these patterns, because nowadays it's possible to see a lot of things that couldn't be discovered in the good old days. Everyday Galina share her expert opinion about EUR/USD and USD/JPY on the fxBazooka.com.
EUR/USD: bears broke through "Window"
The price has been falling down since a “Harami” was formed at the local high. However, the pair has achieved a support line. So, if any bullish pattern arrives, there’ll be opportunity to have an upward correction in the short term. As we can see on the Daily chart, we don’t have any reversal pattern, so bears will probably try to reach the nearest support.
The closest “Window” acted as a resistance, but there isn’t any bullish pattern. So, the price is likely going to test the “Window” during the day. If a pullback from this level happens, there’ll be an opportunity to have another decline. |
In 2011, as part of the Silk Road research, I ordered 10x100mg Modalert (5btc) from a seller. I also asked him about his sourcing, since if it was bad, it’d be valuable to me to know whether it was sourced from one of the vendors listed in my table. He replied, more or less, I get them from a large Far Eastern pharmaceuticals wholesaler. I think they’re probably the supplier for a number of the online pharmacies. 100mg seems likely to be too low, so I treated this shipment as 5 doses:
Brain Pill is an original, safe and effective nootropic agent. Unlike the many agents available in the market that do not guarantee their effectiveness, Brain Pill bases its working abilities in clinical research and trials done to the product. You should, therefore, prioritize purchasing this product if you fall in the fold. Ken Jennings, a 74-game Jeopardy champion recommends this product for enhanced* brain functioning.
at first impression it took a while to kick in... then a burst of creativity... after 15 days of taking it, I noticed a plateau affect... I kept taking it... took the two daily in one dose and I noticed I was very awake but lacked the initiative to do anything, I noticed an increase in libido which kind of sucked because I'm single but that boost of creativity that was experienced the firs couple of days was not there... I don't know if it has to do with the fact that I skipped a couple of days. I still have maybe like 10 doses left... I purchased a bottle of Accellerin and I noticed that it's the same bottle with the same lettering... is this a newer version of Addium? Anyway, I'm going to keep on taking the product to finish the bottle and I'll give a second review within the next 15 days.
Before you try nootropics, I suggest you start with the basics: get rid of the things in your diet and life that reduce cognitive performance first. That is easiest. Then, add in energizers like Brain Octane and clean up your diet. Then, go for the herbals and the natural nootropics. Use the pharmaceuticals selectively only after you’ve figured out your basics.
In my last post, I talked about the idea that there is a resource that is necessary for self-control…I want to talk a little bit about the candidate for this resource, glucose. Could willpower fail because the brain is low on sugar? Let’s look at the numbers. A well-known statistic is that the brain, while only 2% of body weight, consumes 20% of the body’s energy. That sounds like the brain consumes a lot of calories, but if we assume a 2,400 calorie/day diet - only to make the division really easy - that’s 100 calories per hour on average, 20 of which, then, are being used by the brain. Every three minutes, then, the brain - which includes memory systems, the visual system, working memory, then emotion systems, and so on - consumes one (1) calorie. One. Yes, the brain is a greedy organ, but it’s important to keep its greediness in perspective… Suppose, for instance, that a brain in a person exerting their willpower - resisting eating brownies or what have you - used twice as many calories as a person not exerting willpower. That person would need an extra one third of a calorie per minute to make up the difference compared to someone not exerting willpower. Does exerting self control burn more calories?
An unusual intervention is infrared/near-infrared light of particular wavelengths (LLLT), theorized to assist mitochondrial respiration and yielding a variety of therapeutic benefits. Some have suggested it may have cognitive benefits. LLLT sounds strange but it’s simple, easy, cheap, and just plausible enough it might work. I tried out LLLT treatment on a sporadic basis 2013-2014, and statistically, usage correlated strongly & statistically-significantly with increases in my daily self-ratings, and not with any sleep disturbances. Excited by that result, I did a randomized self-experiment 2014-2015 with the same procedure, only to find that the causal effect was weak or non-existent. I have stopped using LLLT as likely not worth the inconvenience.
The makeup of the brain is about 29% fat, most of which is located in myelin (which itself is 70–80% fat).[8] Specific fatty acid ratios will depend in part on the diet of the animal it is harvested from. The brain is also very high in cholesterol. For example, a single 140 g (5 oz) serving of "pork brains in milk gravy" can contain 3500 mg of cholesterol (1170% of the USRDA).[9]
Christopher, love your heart for Pete’s security in who he is to The Lord. So cool. Brother, God does judge. Jesus is even referred to as “the righteous judge” (2 Timothy 4:8). In the first 5 verses of Romans 2, the judgment of God is even mentioned 3 times. Matthew 25:46 speaks of what will happen when God judges – that some “will go away into eternal punishment, but the righteous into eternal life.” Those who believe in Jesus Christ as their Lord and Savior who died for their sins and rose again will be and are “by grace… saved through faith” (Ephesians 2:8-9) in Jesus as such, having their sins forgiven and the righteousness of Jesus credited to them. (Romans 4:22-25) Thank you, Lord!
Some people aren’t satisfied with a single supplement—the most devoted self-improvers buy a variety of different compounds online and create their own custom regimens, which they call “stacks.” According to Kaleigh Rogers, writing in Vice last year, companies will now take their customers’ genetic data from 23andMe or another source and use it to recommend the right combinations of smart drugs to optimize each individual’s abilities. The problem with this practice is that there’s no evidence the practice works. (And remember, the FDA doesn’t regulate supplements.) Find out the 9 best foods to boost your brain health.
Avocados. Avocados are almost as good as blueberries in promoting brain health, says Pratt. "I don't think the avocado gets its due," agrees Kulze. True, the avocado is a fatty fruit, but, says Kulze, it's a monounsaturated fat, which contributes to healthy blood flow. "And healthy blood flow means a healthy brain," she says. Avocados also lower blood pressure, says Pratt, and as hypertension is a risk factor for the decline in cognitive abilities, a lower blood pressure should promote brain health. Avocados are high in calories, however, so Kulze suggests adding just 1/4 to 1/2 of an avocado to one daily meal as a side dish.
Nothing happened until I was falling asleep, when I became distinctly aware that I was falling asleep. I monitored the entire process and remained lucid, with a measure of free will, as I dreamed, and woke up surprisingly refreshed. While I remembered many of my dreams, some of which were quite long, I couldn't recall how my underpants ended up around my ankles.
The ‘Brain-Gut Axis’ is a term used to describe the two-way communication system between our digestive tract and the brain. A growing body of research into this axis demonstrates how much influence the gut can have over the brain and vice versa (1). When we speak about reactions to foods, we most commonly understand them as immediate and often dangerous allergic responses, such as the constriction of the throat and trouble breathing, or dizziness and fainting. It is usually easy to pinpoint the food that causes these reactions because of the immediate immune system response, caused by a type of immune cell known as IgE antibodies. In contrast to this, food intolerances are mediated by IgG antibodies and these reactions can take up to 48 hours to have an effect. Symptoms related to IgG reactions can often be manifested as chronic issues like joint ache, IBS and depression or anxiety, which are often overlooked and not associated with what we eat.
Recent findings also suggest that taking extra vitamins could help preserve memory, especially as we age. Researchers at Australia's University of Sydney tested 117 people in a retirement home by putting them through a battery of mental tests that included remembering a string of words, listing as many words as possible that begin with a certain letter of the alphabet, and doing mental addition and subtraction. Those who regularly took vitamin C, they found, scored higher on the tests.
Microdosing with Iboga: Native to the rainforests in Central Africa, Iboga is an evergreen shrub, with high concentrations found in the root bark. It has a rich history amongst practitioners in the indigenous Bwiti religion in Africa and has recently found its way into Western practices, primarily for extremely effective therapy for drug addictions, but also for physical energy, cognitive performance in smaller microdoses, and a surge in positive emotions (See additional studies here and here.). To microdose with Iboga, you will want to find it in tincture or root bark form (the root bark form is typically encapsulated). If using a tincture, find a source that has the root bark extracted into its purest form, combined with Iboga alkaloids, which keeps the full spectrum of the plant untouched. Just a single drop of an Iboga tincture equates to about 0.5 milligrams and suffices as a microdose. For the root bark of Iboga, a dose of 300-500 milligrams is also an effective dose. I’ve personally found Iboga to be most useful prior to a workout or an effort that combines both brain and body demands, such as tennis or basketball – but it makes you hyperactive and jittery if taken prior to a day of desk work. This makes sense when you consider that African tribes traditionally whipped themselves into a frenzied pre-battle state on Iboga.
Potassium citrate powder is neither expensive nor cheap: I purchased 453g for $21. The powder is crystalline white, dissolves instantly in water, and largely tasteless (sort of saline & slightly unpleasant). The powder is 37% potassium by weight (the formula is C6H5K3O7) so 453g is actually 167g of potassium, so 80-160 days’ worth depending on dose.
Brain enhancing drug – the steroids of the mental world, these are compounds that can be both artificial or natural that are not recommended for casual consumption. If taken over a long period of time, they can and will result in permanent and debilitating damage, and if taken wrongly, they can and will result in injury, illness, and death. So far from being the best brain pill that they loop around and punch the actual best brain pill in the face.
As I am not any of the latter, I didn’t really expect a mental benefit. As it happens, I observed nothing. What surprised me was something I had forgotten about: its physical benefits. My performance in Taekwondo classes suddenly improved - specifically, my endurance increased substantially. Before, classes had left me nearly prostrate at the end, but after, I was weary yet fairly alert and happy. (I have done Taekwondo since I was 7, and I have a pretty good sense of what is and is not normal performance for my body. This was not anything as simple as failing to notice increasing fitness or something.) This was driven home to me one day when in a flurry before class, I prepared my customary tea with piracetam, choline & creatine; by the middle of the class, I was feeling faint & tired, had to take a break, and suddenly, thunderstruck, realized that I had absentmindedly forgot to actually drink it! This made me a believer.
For the moment, people looking for that particular quick fix have a limited choice of meds. But given the amount of money and research hours being spent on developing drugs to treat cognitive decline, Provigil and Adderall are likely to be joined by a bigger pharmacopoeia. Among the drugs in the pipeline are ampakines, which target a type of glutamate receptor in the brain; it is hoped that they may stem the memory loss associated with diseases like Alzheimer's. But ampakines may also give healthy people a palpable cognitive boost. A 2007 study of 16 healthy elderly volunteers found that 500mg of one particular ampakine "unequivocally" improved short-term memory, though it appeared to detract from episodic memory - the recall of past events. Another class of drugs, cholinesterase inhibitors, which are already being used with some success to treat Alzheimer's patients, have also shown promise as neuroenhancers. In one study the drug donepezil strengthened the performance of pilots on flight simulators; in another, of 30 healthy young male volunteers, it improved verbal and visual episodic memory. Several pharmaceutical companies are working on drugs that target nicotine receptors in the brain in the hope that they can replicate the cognitive uptick that smokers get from cigarettes.
So I eventually got around to ordering another thing of nicotine gum, Habitrol Nicotine Gum, 4mg MINT flavor COATED gum. 96 pieces per box. Gum should be easier to double-blind myself with than nicotine patches - just buy some mint gum. If 4mg is too much, cut the gum in half or whatever. When it arrived, my hopes were borne out: the gum was rectangular and soft, which made it easy to cut into fourths.
According to the official website, Cognizin is based on Citicoline, which is a highly beneficial nutrient that’s useful for assisting certain brain functions that are related to mental focus and cognitive processing. What’s more, it’s shown to improve your brain’s metabolism regarding the use of acetylcholine, which is an important neurotransmitter involved in the storage and processing of memory.
Discussions of PEA mention that it’s almost useless without a MAOI to pave the way; hence, when I decided to get deprenyl and noticed that deprenyl is a MAOI, I decided to also give PEA a second chance in conjunction with deprenyl. Unfortunately, in part due to my own shenanigans, Nubrain canceled the deprenyl order and so I have 20g of PEA sitting around. Well, it’ll keep until such time as I do get a MAOI.
I asked him if piracetam made him feel smarter, or just more alert and confident - a little better equipped to marshal the resources he naturally had. "Maybe," he said. "I'm not sure what being smarter means, entirely. It's a difficult quality to measure. It's the Gestalt factor, all these qualities coming together - not only your ability to crunch some numbers, or remember some figures or a sequence of numbers, but also your ability to maintain a certain emotional state that is conducive to productive intellectual work. I do feel I'm more intelligent with the drugs, but I can't give you a number of IQ points."
Alpha GPC + AC-11 + Bacopa Monniera + Huperzine: This combination is found in the supplement Alpha Brain, created by the company Onnit. According to a clinical trial that was conducted by the Boston Center for Memory, this combination has demonstrated a notable increase in cognitive performance for healthy individuals and shows particular potential to boost the memory and learning capacity of users. AC-11 is derived from a rainforest herb, and studies have found that it may be able to help people in a variety of ways such as slowing the growth of cancer due to its DNA repairing antioxidant properties. This stack seems to work best if you take it daily for at about two weeks. After that, effects become more pronounced over time, so, similar to the Gingko, Bacopa, Lion’s Mane stack above you need to allow this blend to build up in your system before you judge its overall effectiveness.
Alpha Lipoic Acid is a vitamin-like chemical filled with antioxidant properties, that naturally occur in broccoli, spinach, yeast, kidney, liver, and potatoes. The compound is generally prescribed to patients suffering from nerve-related symptoms of diabetes because it helps in preventing damage to the nerve cells and improves the functioning of neurons.
Armodafinil is sort of a purified modafinil which Cephalon sells under the brand-name Nuvigil (and Sun under Waklert21). Armodafinil acts much the same way (see the ADS Drug Profile) but the modafinil variant filtered out are the faster-acting molecules22. Hence, it is supposed to last longer. as studies like Pharmacodynamic effects on alertness of single doses of armodafinil in healthy subjects during a nocturnal period of acute sleep loss seem to bear out; anecdotally, it’s also more powerful, with Cephalon offering pills with doses as low as 50mg. (To be technical, modafinil is racemic: it comes in two forms which are rotations, mirror-images of each other. The rotation usually doesn’t matter, but sometimes it matters tremendously - for example, one form of thalidomide stops morning sickness, and the other rotation causes hideous birth defects.)
Alpha GPC + AC-11 + Bacopa Monniera + Huperzine: This combination is found in the supplement Alpha Brain, created by the company Onnit. According to a clinical trial that was conducted by the Boston Center for Memory, this combination has demonstrated a notable increase in cognitive performance for healthy individuals and shows particular potential to boost the memory and learning capacity of users. AC-11 is derived from a rainforest herb, and studies have found that it may be able to help people in a variety of ways such as slowing the growth of cancer due to its DNA repairing antioxidant properties. This stack seems to work best if you take it daily for at about two weeks. After that, effects become more pronounced over time, so, similar to the Gingko, Bacopa, Lion’s Mane stack above you need to allow this blend to build up in your system before you judge its overall effectiveness.
Of course, as you can probably imagine, the antioxidant content of coffee (which you’ll learn how to maximize below) may not be the only smoking savior here. And no, it’s not the tobacco and nasty chemicals in a cigarette that’s working the magic: as other studies have gone on to prove, it’s the nicotine folks – and the nicotine is pretty powerful stuff, not only enhancing locomotor and cognitive performance when combined with coffee but also ramping up exercise performance by 18-21% all on its own!
I’ve been actively benefitting from nootropics since 1997, when I was struggling with cognitive performance and ordered almost $1000 worth of smart drugs from Europe (the only place where you could get them at the time). I remember opening the unmarked brown package and wondering whether the pharmaceuticals and natural substances would really enhance my brain.
To understand further about how food intolerances can impact our mental health, it is important to explain the relationship between our gut microbiome, the immune system and our brain in a little more detail. The walls of our digestive tract provide a barrier between what we eat and the rest of our body and an unhealthy gut microbiome can lead to increased levels of inflammation, leaving the walls vulnerable to structural damage (4). Our intestinal wall is composed of cell junctions that prevent bacteria and large food molecules from entering the bloodstream, however, if these become damaged, proteins from foods that should not be circulating in our bloodstream can enter and an immune response is mounted as a reaction. This response is mediated by IgG, an antibody, that helps to protect against bacterial and viral infections as well as food antigens and is the most abundant immune cell in the body. Whilst food antigens are usually quickly cleared by an intelligent system called the reticuloendothelial system, with structural damage and a poor gut microbiome, this immune response can keep reoccurring. It is suggested that a chronic immune response such as this can have a negative impact on the brain, damaging its own structural barrier, called the Blood Brain Barrier (5).
I’m wary of others, though. The trouble with using a blanket term like “nootropics” is that you lump all kinds of substances in together. Technically, you could argue that caffeine and cocaine are both nootropics, but they’re hardly equal. With so many ways to enhance your brain function, many of which have significant risks, it’s most valuable to look at nootropics on a case-by-case basis. Here’s a list of 13 nootropics, along with my thoughts on each.
Apart from the risks that accompany drugs with dopaminergic effects, amphetamines, even when used to treat neurological disorders like ADHD, have been known to frequently and predictably cause anorexia, weight loss and insomnia. High doses can cause psychotic behavior, and even normal doses have been known to produce psychosis that ranged from the loss of short-term memory to horrific visual and auditory hallucinations. Are you getting the impression that using synthetic stimulants to flood your brain short-term with excessive or unnaturally high levels of hormones and neurotransmitters may not be a good idea, especially when done frequently or in excess?
This article is for informational purposes only and does not constitute medical advice. Quartz does not recommend or endorse any specific products, studies, opinions, or other information mentioned in this article. This article is not intended to be used for, or as a substitute for, professional medical advice, diagnosis, or treatment. Always seek the advice of a physician or other qualified health provider with any questions you may have before starting any new treatment or discontinuing any existing treatment.Reliance on any information provided in this article or by Quartz is solely at your own risk.
Took pill 12:11 PM. I am not certain. While I do get some things accomplished (a fair amount of work on the Silk Road article and its submission to places), I also have some difficulty reading through a fiction book (Sum) and I seem kind of twitchy and constantly shifting windows. I am weakly inclined to think this is Adderall (say, 60%). It’s not my normal feeling. Next morning - it was Adderall.
This is a small water plant native to India. Bacopa is an adaptogen – it helps your body adapt to stress. It also improves memory in healthy adults[12] and enhances attention and mood in people over 65. [13] Scientists still don’t fully understand how Bacopa works, but they do know it takes time to work; study participants didn’t feel its memory-enhancing effects until they’d been supplementing with it daily for 4 weeks, so if you try Bacopa, stick with it for a month before you give up on it.
Does absolutely nothing it says it does....taking the pill is jus no effects at all, good or bad. its not a limitless effect its a pointless effect and a waste of money.I very rarely give an review and if i do its more likely a good one but this one i jus felt the need to let people know they're wasting their money buying these supplements. Im jus tired of these supplement companies getting rich of fraudulent advertisement. Its 2015 if your product is good people will continue to buy if its not don't go the fraud way about you'll have a very short good run before word gets out and people are not coming back for more compared to the run it could have had if it really does what it says it does. waste of time with this s*** people TRUST ME.
One curious thing that leaps out looking at the graphs is that the estimated underlying standard deviations differ: the nicotine days have a strikingly large standard deviation, indicating greater variability in scores - both higher and lower, since the means weren’t very different. The difference in standard deviations is just 6.6% below 0, so the difference almost reaches our usual frequentist levels of confidence too, which we can verify by testing:
Dr Hart talked through food intolerance tests that are available through a number of well known companies, including York Test for whom she is Scientific Director. A possible strategy could be to use such testing to identify intolerances, follow an elimination protocol, temporarily removing on foods triggering an IgG response; and then work to improve your gut health to support longer term well-being. Foods that are rich in collagen and its amino acids, like glycine and proline, are great for healing connective tissue, which is what the intestines are made up of. A traditional food, rich in these amino acids, that has made its way into our kitchens again after rediscovering its therapeutic properties is bone broth. Another example of a group of traditional foods that can be used therapeutically in building digestive health, are fermented foods such as kefir, sauerkraut and kimchi. These are abundant in probiotics, which are the ‘good’ bacteria our digestive system needs to help keep a good balance and protect the intestinal barrier from pathogens, toxins and parasites. Once these foods have been introduced on an everyday basis along with eating a healthy nutrient-dense diet and the possible use of supplements to help restore balance, you may be able to reintroduce foods that were previously triggering an IgG response carefully, one at a time, whilst monitoring symptoms.
The word “nootropic” was coined in 1972 by a Romanian scientist, Corneliu Giurgea, who combined the Greek words for “mind” and “bending.” Caffeine and nicotine can be considered mild nootropics, while prescription Ritalin, Adderall and Provigil (modafinil, a drug for treating narcolepsy) lie at the far end of the spectrum when prescribed off-label as cognitive enhancers. Even microdosing of LSD is increasingly viewed as a means to greater productivity.
The first night I was eating some coconut oil, I did my n-backing past 11 PM; normally that damages my scores, but instead I got 66/66/75/88/77% (▁▁▂▇▃) on D4B and did not feel mentally exhausted by the end. The next day, I performed well on the Cambridge mental rotations test. An anecdote, of course, and it may be due to the vitamin D I simultaneously started. Or another day, I was slumped under apathy after a promising start to the day; a dose of fish & coconut oil, and 1 last vitamin D, and I was back to feeling chipper and optimist. Unfortunately I haven’t been testing out coconut oil & vitamin D separately, so who knows which is to thank. But still interesting.
There are many studies that suggest that Creatine helps in treating cognitive decline in individuals when combined with other therapies. It also helps people suffering from Parkinsons and Huntingtons disease. Though there are minimal side effects associated with creatine, pretty much like any nootropic, it is not absolutely free of side-effects. An overdose of creatine can lead to gastrointestinal issues, weight gain, stress and anxiety.
In addition to this, privilege also plays an important role in this epidemic. "Not everyone has access to eat healthily", she mentions. In fact, she recalls an anecdote in which a supermarket owner noticed how people living off food stamps rarely use them to buy fruits and vegetables. Curious about this trend, the owner approached someone with food stamps, to which she admitted she didn't buy them because she didn't know the price prior to weighing them and felt ashamed of asking. His solution? Pre-cutting and packaging fruits in order to make them more accessible to those with lower incomes.
So I eventually got around to ordering another thing of nicotine gum, Habitrol Nicotine Gum, 4mg MINT flavor COATED gum. 96 pieces per box. Gum should be easier to double-blind myself with than nicotine patches - just buy some mint gum. If 4mg is too much, cut the gum in half or whatever. When it arrived, my hopes were borne out: the gum was rectangular and soft, which made it easy to cut into fourths.
The desire to improve cognitive functioning has probably existed since the dawn of human consciousness. Throughout our evolution, increased mental agility has been associated with fitness and improved odds of survival and success. Although concoctions to stimulate brainpower have existed in Chinese and Indian medicine for hundreds of years, Western nootropics were not developed until 1964.
And if you obtain your vitamin C from a multivitamin, you receive other key nutrients that many studies over the years have linked to healthy brain function, including beta carotene, iron, zinc, B12 and folic acid. In the June 1999 issue of the Journal of Biology and Psychiatry, for instance, researchers at Sweden's Gotenborg University reported that older people were more likely to score poorly on word memory tests if they had low levels of folic acid.
Because smart drugs like modafinil, nicotine, and Adderall come with drawbacks, I developed my own line of nootropics, including Forbose and SmartMode, that’s safe, widely available, and doesn’t require a prescription. Forskolin, found in Forbose, has been a part of Indian Ayurvedic medicine for thousands of years. In addition to being fun to say, forskolin increases cyclic adenosine monophosphate (cAMP), a molecule essential to learning and memory formation. [8]
The principal metric would be mood, however defined. Zeo’s web interface & data export includes a field for Day Feel, which is a rating 1-5 of general mood & quality of day. I can record a similar metric at the end of each day. 1-5 might be a little crude even with a year of data, so a more sophisticated measure might be in order. The first mood study is paywalled so I’m not sure what they used, but Shiotsuki 2008 used State-Trait of Anxiety Inventory (STAI) and Profiles of Mood States Test (POMS). The full POMS sounds too long to use daily, but the Brief POMS might work. In the original 1987 paper A brief POMS measure of distress for cancer patients, patients answering this questionnaire had a mean total mean of 10.43 (standard deviation 8.87). Is this the best way to measure mood? I’ve asked Seth Roberts; he suggested using a 0-100 scale, but personally, there’s no way I can assess my mood on 0-100. My mood is sufficiently stable (to me) that 0-5 is asking a bit much, even.
Wild salmon. Deep-water fish, such as salmon, are rich in omega-3 essential fatty acids, which are essential for brain function, says Kulze. Both she and Pratt recommend wild salmon for its "cleanliness" and the fact that it is in plentiful supply. Omega-3s also contain anti-inflammatory substances. Other oily fish that provide the benefits of omega-3s are sardines and herring, says Kulze; she recommends a 4-ounce serving, two to three times a week.
These pills don’t work. The reality is that MOST of these products don’t work effectively. Maybe we’re cynical, but if you simply review the published studies on memory pills, you can quickly eliminate many of the products that don’t have “the right stuff.” The active ingredients in brain and memory health pills are expensive and most companies sell a watered down version that is not effective for memory and focus. The more brands we reviewed, the more we realized that many of these marketers are slapping slick labels on low-grade ingredients.
✅ YOUR COMPLETE ALL-IN-ONE BRAIN SOLUTION - rather than drink coffee and energy drinks to help you stay productive and struggle to get thru the day - AND instead of having to buy several different products to help with stress, memory, concentration, energy and Brain Support, Neuro Brain Clarity offers you the benefits of several different brain pills and supplements in one package, which is cheaper and more convenient for you.
I tried taking whole pills at 1 and 3 AM. I felt kind of bushed at 9 AM after all the reading, and the 50 minute nap didn’t help much - I was sleep only around 10 minutes and spent most of it thinking or meditation. Just as well the 3D driver is still broken; I doubt the scores would be reasonable. Began to perk up again past 10 AM, then felt more bushed at 1 PM, and so on throughout the day; kind of gave up and began watching & finishing anime (Amagami and Voices of a Distant Star) for the rest of the day with occasional reading breaks (eg. to start James C. Scotts Seeing Like A State, which is as described so far). As expected from the low quality of the day, the recovery sleep was bigger than before: a full 10 hours rather than 9:40; the next day, I slept a normal 8:50, and the following day ~8:20 (woken up early); 10:20 (slept in); 8:44; 8:18 (▁▇▁▁). It will be interesting to see whether my excess sleep remains in the hour range for ’good modafinil nights and two hours for bad modafinil nights.
Nootropics still exist largely in an unregulated gray area, which makes users somewhat hesitant to discuss their regimens. But I did speak to several people who told tales of increased productivity and sharpened focus. Bob Carter, a financial analyst for a start-up called LendingHome, says that nootropics have replaced his other morning stimulant. “I basically think of it as a substitute for coffee,” he says. “I think the problem with a cappuccino from Starbucks is that it gives you the feeling of being jittery. Whereas with this particular supplement, I feel more calm.”
This article is for informational purposes only and does not constitute medical advice. Quartz does not recommend or endorse any specific products, studies, opinions, or other information mentioned in this article. This article is not intended to be used for, or as a substitute for, professional medical advice, diagnosis, or treatment. Always seek the advice of a physician or other qualified health provider with any questions you may have before starting any new treatment or discontinuing any existing treatment.Reliance on any information provided in this article or by Quartz is solely at your own risk.
Reason: Besides keeping cells intact, this membrane performs vital functions. These actions include moving nutrients into cells and pumping waste products out of them. Investigators in one study determined that phosphatidyl serine shaved 12 years off the normal expected decline. This result was present in specific aspects of memory performance. Phosphatidyl serine is shown in studies to boost cognitive function. This occurs by increasing communication between brain cells. Those who took 100 mg of phosphatidyl serine three times a day, with meals for 12 weeks scored 30% higher on memory and learning tests.
Blinding stymied me for a few months since the nasty taste was unmistakable and I couldn’t think of any gums with a similar flavor to serve as placebo. (The nasty taste does not seem to be due to the nicotine despite what one might expect; Vaniver plausibly suggested the bad taste might be intended to prevent over-consumption, but nothing in the Habitrol ingredient list seemed to be noted for its bad taste, and a number of ingredients were sweetening sugars of various sorts. So I couldn’t simply flavor some gum.)
You would have heard this advice from top achievers in any field, “Work Smarter, not Harder.” Then why not extend the same philosophy in all areas of your life? Are you smarting from a situation wherein no matter how much you exercise, eat healthy, and sleep well, you still find it a struggle to focus and motivate yourself? If yes, you need smart help that is not hard on you. Try ‘Smart Drugs’, that could help you come out of your situation, by speeding up your thought process, boosting your memory, and making you more creative and productive.
Because it’s so nutrient-dense — packing loads of vitamins, minerals and nutrients with very little calories — it’s a great snack option if you’re looking to shed pounds. And while we often eat celery stalks, don’t skip the seeds and leaves; both provide extra health benefits and taste great in things like stir fries and soups. Not sure where to begin with eating more celery? Try my easy Ants on a Log or refreshing Super Hydrator Juice recipes.
Beans. Beans are "under-recognized" and "economical," says Kulze. They also stabilize glucose (blood sugar) levels. The brain is dependent on glucose for fuel, Kulze explains, and since it can't store the glucose, it relies on a steady stream of energy -- which beans can provide. Any beans will do, says Kulze, but she is especially partial to lentils and black beans and recommends 1/2 cup every day.
Your co-worker in the cubicle next to you could now very likely be achieving his or her hyperfocus via a touch of microdosed LSD, a hit of huperzine or a nicotine-infused arm patch. The fact is, concepts such as microdosing, along with words like “nootropic” and “smart drug” (yes, there’s a difference between the two, as you’re about to discover) are quickly becoming household terms, especially due to all the recent media hype that has disclosed how popular compounds such as smart drugs and psychedelics are among Silicon Valley CEOs and college students, along with the smart drug movies “Limitless” and “Lucy“ and popular TV shows like “Limitless”, “Wormwood” and “Hamilton’s Pharmacopeia”.
Nootropics still exist largely in an unregulated gray area, which makes users somewhat hesitant to discuss their regimens. But I did speak to several people who told tales of increased productivity and sharpened focus. Bob Carter, a financial analyst for a start-up called LendingHome, says that nootropics have replaced his other morning stimulant. “I basically think of it as a substitute for coffee,” he says. “I think the problem with a cappuccino from Starbucks is that it gives you the feeling of being jittery. Whereas with this particular supplement, I feel more calm.”
Low level laser therapy (LLLT) is a curious treatment based on the application of a few minutes of weak light in specific near-infrared wavelengths (the name is a bit of a misnomer as LEDs seem to be employed more these days, due to the laser aspect being unnecessary and LEDs much cheaper). Unlike most kinds of light therapy, it doesn’t seem to have anything to do with circadian rhythms or zeitgebers. Proponents claim efficacy in treating physical injuries, back pain, and numerous other ailments, recently extending it to case studies of mental issues like brain fog. (It’s applied to injured parts; for the brain, it’s typically applied to points on the skull like F3 or F4.) And LLLT is, naturally, completely safe without any side effects or risk of injury.
The word “nootropic” was coined in 1972 by a Romanian scientist, Corneliu Giurgea, who combined the Greek words for “mind” and “bending.” Caffeine and nicotine can be considered mild nootropics, while prescription Ritalin, Adderall and Provigil (modafinil, a drug for treating narcolepsy) lie at the far end of the spectrum when prescribed off-label as cognitive enhancers. Even microdosing of LSD is increasingly viewed as a means to greater productivity.
Subjects with a history or presence of clinically important cardiac, renal, hepatic, endocrine (including diabetes mellitus), pulmonary, biliary, gastrointestinal, pancreatic, or neurologic disorders that, in the judgment of the Investigator, would interfere with the subject's ability to provide informed consent, comply with the study protocol (which might confound the interpretation of the study results), or put the subject at undue risk.
Dr. Mosconi’s book is keystone book for advancing the dialogue and practice of integrative brain health. This is the book I’ve been waiting for. As someone who is obsessed with nutrition, it’s very hard to find REAL research and sound logic. There’s a lot of people who proclaim to be health experts, but few people who can say they are trained in both scientific and holistic approaches. Dr. Mosconi’s book FINALLY gets to the bottom of what we all need to know to take care of our brains.
The hormone testosterone (Examine.com; FDA adverse events) needs no introduction. This is one of the scariest substances I have considered using: it affects so many bodily systems in so many ways that it seems almost impossible to come up with a net summary, either positive or negative. With testosterone, the problem is not the usual nootropics problem that that there is a lack of human research, the problem is that the summary constitutes a textbook - or two. That said, the 2011 review The role of testosterone in social interaction (excerpts) gives me the impression that testosterone does indeed play into risk-taking, motivation, and social status-seeking; some useful links and a representative anecdote:
Is 200 enough? There are no canned power functions for the ordinal logistic regression I would be using, so the standard advice is to estimate power by simulation: generating thousands of new datasets where we know by construction that the binary magnesium variable increases MP by 0.27 (such as by bootstrapping the original Noopept experiment’s data), and seeing how often in this collection the cutoff of statistical-significance is passed when the usual analysis is done (background: CrossValidated or Power Analysis and Sample Size Estimation using Bootstrap). In this case, we leave alpha at 0.05, reuse the Noopept experiment’s data with its Magtein correlation, and ask for the power when n=200
Apart from the risks that accompany drugs with dopaminergic effects, amphetamines, even when used to treat neurological disorders like ADHD, have been known to frequently and predictably cause anorexia, weight loss and insomnia. High doses can cause psychotic behavior, and even normal doses have been known to produce psychosis that ranged from the loss of short-term memory to horrific visual and auditory hallucinations. Are you getting the impression that using synthetic stimulants to flood your brain short-term with excessive or unnaturally high levels of hormones and neurotransmitters may not be a good idea, especially when done frequently or in excess?
There are a number of treatments for the last. I already use melatonin. I sort of have light therapy from a full-spectrum fluorescent desk lamp. But I get very little sunlight; the surprising thing would be if I didn’t have a vitamin D deficiency. And vitamin D deficiencies have been linked with all sorts of interesting things like near-sightedness, with time outdoors inversely correlating with myopia and not reading or near-work time. (It has been claimed that caffeine interferes with vitamin D absorption and so people like me especially need to take vitamin D, on top of the deficits caused by our vampiric habits, but I don’t think this is true35.) Unfortunately, there’s not very good evidence that vitamin D supplementation helps with mood/SAD/depression: there’s ~6 small RCTs with some findings of benefits, with their respective meta-analysis turning in a positive but currently non-statistically-significant result. Better confirmed is reducing all-cause mortality in elderly people (see, in order of increasing comprehensiveness: Evidence Syntheses 2013, Chung et al 2009, Autier & Gandini 2007, Bolland et al 2014).
She reveals where she went astray. In a lecture she gave, she lamented the failure of science to offer a cure for Alzheimer’s or even an effective treatment. Someone in the audience asked, “How about olive oil?” She realized she didn’t know anything about the effects of nutrition on Alzheimer’s. She seems to have assumed that diet must be crucially important, and for some reason instead of studying conventional nutrition science, she got a degree in Holistic Nutrition. She bills herself as a certified Integrative Nutritionist and holistic healthcare practitioner. I couldn’t find where she studied, but Stephen Barrett has criticized the Institute for Integrative Nutrition on Quackwatch. Its training is not based on scientific nutrition. It seems most programs in Integrative Nutrition are 6- to 8-month correspondence courses with no prerequisites. I wonder what she was taught.
“It is surprising and encouraging that it may be possible to predict the magnitude of a placebo effect before treatment,” says Tor Wager, a neuroscientist at the University of Colorado Boulder, who was not involved in the research. More work is needed to see how the predictive features hold up in other populations and for different pain conditions, he says.
…Phenethylamine is intrinsically a stimulant, although it doesn’t last long enough to express this property. In other words, it is rapidly and completely destroyed in the human body. It is only when a number of substituent groups are placed here or there on the molecule that this metabolic fate is avoided and pharmacological activity becomes apparent.
Be patient. Even though you may notice some improvements right away (sometimes within the first day), you should give your brain supplement at least several months to work. The positive effects are cumulative, and most people do not max out their brain potential on a supplement until they have used it for at least 90 days. That is when the really dramatic effects start kicking in!
In the study, which evaluated the eating habits and mental ability of more than 950 older adults for an average of five years, those adults who ate a serving of leafy green veggies once or twice a day experienced slower mental deterioration than those who ate no vegetables, even when factors like age, education and family history of dementia were factored in.
The fact is, many of these compounds in small amounts and less frequent use can be relatively safe, but as you’re probably not surprised to hear, I’m not 100% convinced of the overall long-term safety or efficacy of most smart drugs used frequently or in moderate to high dosages for the reasons stated above. It is true that some are slightly less risky than others and are increasing in popularity among biohackers and medical professionals. They’re also becoming used with high frequency by students, athletes and e-gamers, three populations for which smart drug “doping control” is becoming more frequently banned and considered to be illegal use of performance-enhancing drugs. Yes, “brain doping” and “brain PED’s” (brain Performance Enhancing Drugs) are now a thing. But I’d consider carefully the use of smart drugs as daily go-to brain enhancing supplements, especially in light of the safer alternative you’re about to discover: the entire category of natural and synthetic nootropic compounds.
For starters, it’s one of the highest antioxidant-rich foods known to man, including vitamin C and vitamin K and fiber. Because of their high levels of gallic acid, blueberries are especially good at protecting our brains from degeneration and stress. Get your daily dose of brain berries in an Omega Blueberry Smoothie, Pumpkin Blueberry Pancakes or in a Healthy Blueberry Cobbler.
-Water [is also important]. Over 80% of the brain’s content is water. Every chemical reaction that takes place in the brain needs water, especially energy production. The brain is so sensitive to dehydration that even a minimal loss of water can cause symptoms like brain fog, fatigue, dizziness, confusion and, more importantly, brain shrinkage. The longevity and well-being of your brain are critically dependent upon consuming hard water. This refers to plain water that is high in minerals and natural electrolytes. Most people don’t realize that the water they’re drinking is not actually “water”.
I took the pill at 11 PM the evening of (technically, the day before); that day was a little low on sleep than usual, since I had woken up an hour or half-hour early. I didn’t yawn at all during the movie (merely mediocre to my eyes with some questionable parts)23. It worked much the same as it did the previous time - as I walked around at 5 AM or so, I felt perfectly alert. I made good use of the hours and wrote up my memories of ICON 2011.
More than once I have seen results indicating that high-IQ types benefit the least from random nootropics; nutritional deficits are the premier example, because high-IQ types almost by definition suffer from no major deficiencies like iodine. But a stimulant modafinil may be another such nootropic (see Cognitive effects of modafinil in student volunteers may depend on IQ, Randall et al 2005), which mentions:
I split the 2 pills into 4 doses for each hour from midnight to 4 AM. 3D driver issues in Debian unstable prevented me from using Brain Workshop, so I don’t have any DNB scores to compare with the armodafinil DNB scores. I had the subjective impression that I was worse off with the Modalert, although I still managed to get a fair bit done so the deficits couldn’t’ve been too bad. The apathy during the morning felt worse than armodafinil, but that could have been caused by or exacerbated by an unexpected and very stressful 2 hour drive through rush hour and multiple accidents; the quick hour-long nap at 10 AM was half-waking half-light-sleep according to the Zeo, but seemed to help a bit. As before, I began to feel better in the afternoon and by evening felt normal, doing my usual reading. That night, the Zeo recorded my sleep as lasting ~9:40, when it was usually more like 8:40-9:00 (although I am not sure that this was due to the modafinil inasmuch as once a week or so I tend to sleep in that long, as I did a few days later without any influence from the modafinil); assuming the worse, the nap and extra sleep cost me 2 hours for a net profit of ~7 hours. While it’s not clear how modafinil affects recovery sleep (see the footnote in the essay), it’s still interesting to ponder the benefits of merely being able to delay sleep19.
The above are all reasons to expect that even if I do excellent single-subject design self-experiments, there will still be the old problem of internal validity versus external validity: an experiment may be wrong or erroneous or unlucky in some way (lack of internal validity) or be right but not matter to anyone else (lack of external validity). For example, alcohol makes me sad & depressed; I could run the perfect blind randomized experiment for hundreds of trials and be extremely sure that alcohol makes me less happy, but would that prove that alcohol makes everyone sad or unhappy? Of course not, and as far as I know, for a lot of people alcohol has the opposite effect. So my hypothetical alcohol experiment might have tremendous internal validity (it does prove that I am sadder after inebriating), and zero external validity (someone who has never tried alcohol learns nothing about whether they will be depressed after imbibing). Keep this in mind if you are minded to take the experiments too seriously.
This is a small water plant native to India. Bacopa is an adaptogen – it helps your body adapt to stress. It also improves memory in healthy adults[12] and enhances attention and mood in people over 65. [13] Scientists still don’t fully understand how Bacopa works, but they do know it takes time to work; study participants didn’t feel its memory-enhancing effects until they’d been supplementing with it daily for 4 weeks, so if you try Bacopa, stick with it for a month before you give up on it.
Too much caffeine may be bad for bone health because it can deplete calcium. Overdoing the caffeine also may affect the vitamin D in your body, which plays a critical role in your body’s bone metabolism. However, the roles of vitamin D as well as caffeine in the development of osteoporosis continue to be a source of debate. Significance: Caffeine may interfere with your body’s metabolism of vitamin D, according to a 2007 Journal of Steroid Biochemistry & Molecular Biology study. You have vitamin D receptors, or VDRs, in your osteoblast cells. These large cells are responsible for the mineralization and synthesis of bone in your body. They create a sheet on the surface of your bones. The D receptors are nuclear hormone receptors that control the action of vitamin D-3 by controlling hormone-sensitive gene expression. These receptors are critical to good bone health. For example, a vitamin D metabolism disorder in which these receptors don’t work properly causes rickets.
“In this fascinating investigation, Lisa Mosconi presents research that crosses disciplines to argue that what goes on in your brain—from your mood to your cognitive abilities—is very closely tied to what you put on your plate. In addition to being a compelling read, readers will find tips and outlines on ways they can change their diets for optimal brain health.”
Like everything else in your body, the brain cannot work without energy. The ability to concentrate and focus comes from an adequate, steady supply of energy - in the form of glucose in our blood to the brain. Achieve this by choosing wholegrains with a low-GI, which release glucose slowly into the bloodstream, keeping you mentally alert throughout the day. Opt for 'brown' wholegrain cereals, granary bread, rice and pasta.
Some work has been done on estimating the value of IQ, both as net benefits to the possessor (including all zero-sum or negative-sum aspects) and as net positive externalities to the rest of society. The estimates are substantial: in the thousands of dollars per IQ point. But since increasing IQ post-childhood is almost impossible barring disease or similar deficits, and even increasing childhood IQs is very challenging, much of these estimates are merely correlations or regressions, and the experimental childhood estimates must be weakened considerably for any adult - since so much time and so many opportunities have been lost. A wild guess: $1000 net present value per IQ point. The range for severely deficient children was 10-15 points, so any normal (somewhat deficient) adult gain must be much smaller and consistent with Fitzgerald 2012’s ceiling on possible effect sizes (small).
Potassium citrate powder is neither expensive nor cheap: I purchased 453g for $21. The powder is crystalline white, dissolves instantly in water, and largely tasteless (sort of saline & slightly unpleasant). The powder is 37% potassium by weight (the formula is C6H5K3O7) so 453g is actually 167g of potassium, so 80-160 days’ worth depending on dose.
Still, putting unregulated brain drugs into my system feels significantly scarier than downing a latte or a Red Bull—not least because the scientific research on nootropics’ long-term effects is still so thin. One 2014 study found that Ritalin, modafinil, ampakines, and other similar stimulants could eventually reduce the “plasticity” of some of the brain’s neural networks by providing them with too much dopamine, glutamate and norepinephrine, and potentially cause long-term harm in young people whose brains were still developing. (In fact, in young people, the researchers wrote, these stimulants could actually have the opposite effect the makers intended: “Healthy individuals run the risk of pushing themselves beyond optimal levels into hyperdopaminergic and hypernoradrenergic states, thus vitiating the very behaviors they are striving to improve.”) But the researchers found no evidence that normal doses of these drugs were harmful when taken by adults.
Drugs such as Adderall can cause nervousness, headaches, sleeplessness and decreased appetite, among other side-effects. An FDA warning on Adderall's label notes that "amphetamines have a high potential for abuse" and can lead to dependence. (The label also mentions that adults using Adderall have reported serious cardiac problems, though the role of the drug in those cases is unknown.) Yet college students tend to consider Adderall and Ritalin as benign, in part because they are likely to know peers who have taken the drugs since childhood for ADHD. Indeed, McCabe reports, most students who use stimulants for cognitive enhancement obtain them from an acquaintance with a prescription. Usually the pills are given away, but some students sell them.
Increase your memory, alertness, energy and focus with the most revolutionary “limitless” pill ever created. As we age, our brains start to slow down both in reaction time and in the recalling of memories. That’s why we need to not only regain our mental capacity, we need to enhance it to such heights that we go well beyond where we started. When you use the dietary supplement Addium, you can total replenish and revitalize your mental alertness in a safe, all-natural way. Made of some of the most powerful brain enhancing ingredients on the market, Addium can be used each day to increase memory function, enhance brain power, increase physical energy and stay sharper and more focused. Don’t just settle for feeling like everyone else; it’s time to take your mind to a limitless state of mental preparedness. Addium Brain Enhancing Dietary Supplement also contains the following benefits: • Boosts your capacity for learning • Increases your alertness and focus • Safe and all natural • Promotes strong brain function • Enhances memory and performance Addium contains: Vitamin B6 - An economical source for cardio health and energy metabolism. Addium contains a Proprietary Blend of: Acetyl L-Carnitine - Energizes the mind and promotes concentration. L-Theanine - Enhances endocrine function, stimulating some brain waves and leaving others unaffected. Caffeine - Increase mental alertness. Rhodiola Rosea Extract - Fights the physical and mental effects of stress. Bacopa Monnieri Extract – This ingredient increases cerebral blood flow and cognitive function at the same time.
A randomized non-blind self-experiment of LLLT 2014-2015 yields a causal effect which is several times smaller than a correlative analysis and non-statistically-significant/very weak Bayesian evidence for a positive effect. This suggests that the earlier result had been driven primarily by reverse causation, and that my LLLT usage has little or no benefits.
Nootropics include natural and manmade chemicals that produce cognitive benefits. These substances are used to make smart pills that deliver results for enhancing memory and learning ability, improving brain function, enhancing the firing control mechanisms in neurons, and providing protection for the brain. College students, adult professionals, and elderly people are turning to supplements to get the advantages of nootropic substances for memory, focus, and concentration.
The human drive to be smarter is a familiar theme on the big screen. In 2011, Oscar-nominated actor Bradley Cooper played struggling writer Eddie Morra in the sci-fi thriller Limitless. In the film, Morra acquires a (fictitious) nootropic NZT-48 that allows him to access 100 percent of his mind. Although he finds himself in lots of trouble, his use of the nootropic transforms him from a desperate writer to a multimillionaire who ultimately runs for the U.S. Senate. The film is a testament to a dream deeply entrenched in the American psyche – that an everyman can become superhuman and lead an extraordinary life.
Maybe you are you new to nootropics? The word, “Nootropic” is a very broad term describing a supplement or drug that increases mental performance. There are several different groups of nootropics including herbal supplements and a class of research chemicals known as racetams. Below are some of the many common benefits that may potentially be experienced with nootropic supplements.
The NIDA research study focused on 10 healthy male participants. The men were subjected to two rounds of PET brain scans after consuming either Provigil (200 mg or 400 mg) or a placebo. The scans demonstrated that the Provigil users had an increase in the amount of dopamine in the brain. Dopamine is a key neurological messenger in the brain’s reward system. Cocaine and methamphetamine have a similar effect on the brain, but they are more potent and faster-acting than Provigil. As cocaine and amphetamines are addiction-forming, the reasoning here is that Provigil may also be addictive.
* These statements have not been evaluated by the Food and Drug Administration. The products and information on this website are not intended to diagnose, treat, cure or prevent any disease. The information on this site is for educational purposes only and should not be considered medical advice. Please speak with an appropriate healthcare professional when evaluating any wellness related therapy. Please read the full medical disclaimer before taking any of the products offered on this site. |
Combined restraint and cold stress in rats: effects on memory processing in passive avoidance task and on plasma levels of ACTH and corticosterone.
The effect of restraint stress combined with water immersion (IMO+C), applied at various intervals before and after the acquisition of a passive avoidance task, was studied in rats. The procedure started with two pre-training trials. On the single training trial the rats received a footshock (0.3 mA, 3s) after they entered the preferred dark compartment. The exposure to IMO+C lasting 1 h terminated 4 or 1 h before application of the footshock or started immediately or 3 h after this aversive stimulus. Retention tests were performed 1 and 2 days after the acquisition trial. In an attempt to relate the behavioural responses to the stressor with plasma levels of two stress hormones we measured ACTH and corticosterone under similar conditions as were used in the behavioural experiments. IMO+C exposure terminating 1 h before the training resulted in very short avoidance latencies during retention testing. A similar impairment of retention test performance was found in animals exposed to the stressor immediately after training. When IMO+C exposure terminated 4 h before training the stressed rats exhibited comparably long avoidance latencies as shown by the controls. IMO+C presented 3 h after acquisition trial also did not influence retention of avoidance learning. The hormones were estimated 1 and 4 h after IMO+C, both in the absence and presence of footshock. Both ACTH and corticosterone were significantly increased 1 h after IMO+C termination, and their plasma levels returned to control values within 4 h. Footshock alone increased plasma corticosterone, however, the hormone levels were significantly lower than those estimated after IMO+C terminating 1 h before blood collection. Footshock substantially increased ACTH levels in rats exposed to IMO+C 1 h before footshock, but not in stressed rats with already high levels of corticosterone. In conclusion, IMO+C represents a strong stress stimulus exerting amnesic effect when applied shortly before or after the acquisition trial. Further, the findings indicate the restraint and cold stressor to interfere with consolidation of passive avoidance response. We suggest that the moderate circulating levels of corticosterone found after footshock may be positively related to the memory consolidation, while the exceedingly high levels have an opposite effect. |
They didn’t have a registered youth team until a fortnight ago, but Ynysddu Welfare have progressed to the next round of the FAW Youth Cup.
Ynysddu entered the competition by accident and were tasked with putting together a youth side in the short space of time.
But a social media campaign which viral saw players applying from all across England and Wales to take part in a first-ever youth fixture for Ynysddu.
The game was won on penalties and now means that the makeshift Youth side, who don’t currently play in a league, could play against 12-time winners Swansea City or eight-time winners Cardiff City.
The Caerphilly based team put together a squad of twenty players. Major broadcasters like BBC, ITV and Sky Sports have covered the game.
Their opponents Briton Ferry currently play in the Welsh League Youth Division, sitting seventh, having won two games and lost two games.
Billy Evans, who plays senior football for Marshfield AFC levelled things up for the Gwent side, having initially trailed in the first half. Ynysddu Welfare then took a shock lead, before being pegged back.
The game went into extra time, but neither side could make a breakthrough, resulting in penalties.
Unbelievabl!! We only went and done it!! Final score 2-2 (7-6) pens UPPADDUS — Ynysddu Welfare FC (@ynyswelfare) October 7, 2018
Ynysddu Welfare fans thought their team were through when their keeper saved the last but one penalty, but Welfare were unable to put their name into the hat just yet. However, Briton Ferry missed again and this time Ynysddu put theirs away to register a historic victory.
Jubilant scenes followed immediately after the victory. Players were held aloft on the shoulders of the Ynysddu supporters after their act of giant-killing.
Ynysddu will now await the draw for the next round of the competition, having played their first game in the Youth Cup.
Swansea City were the last victors of the FAW Youth Cup, having beaten South Wales rivals Cardiff City on penalties, earlier this year.
(Featured Image: Ynysddu Welfare) |
// Copyright 2010 the V8 project authors. All rights reserved.
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above
// copyright notice, this list of conditions and the following
// disclaimer in the documentation and/or other materials provided
// with the distribution.
// * Neither the name of Google Inc. nor the names of its
// contributors may be used to endorse or promote products derived
// from this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
// Flags: --expose_gc
// This test makes sure that we do flush code with heap allocated locals.
// This can be a problem if eval is used within the scope.
// See: http://code.google.com/p/v8/issues/detail?id=747
(function() {
var x = 42;
this.callEval = function() {eval('x');};
})();
try {
callEval();
} catch (e) {
assertUnreachable();
}
gc();
gc();
gc();
gc();
gc();
gc();
try {
callEval();
} catch (e) {
assertUnreachable();
}
|
// Copyright 2014 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Package jwt implements the OAuth 2.0 JSON Web Token flow, commonly
// known as "two-legged OAuth 2.0".
//
// See: https://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-12
package jwt
import (
"encoding/json"
"fmt"
"io"
"io/ioutil"
"net/http"
"net/url"
"strings"
"time"
"golang.org/x/net/context"
"golang.org/x/oauth2"
"golang.org/x/oauth2/internal"
"golang.org/x/oauth2/jws"
)
var (
defaultGrantType = "urn:ietf:params:oauth:grant-type:jwt-bearer"
defaultHeader = &jws.Header{Algorithm: "RS256", Typ: "JWT"}
)
// Config is the configuration for using JWT to fetch tokens,
// commonly known as "two-legged OAuth 2.0".
type Config struct {
// Email is the OAuth client identifier used when communicating with
// the configured OAuth provider.
Email string
// PrivateKey contains the contents of an RSA private key or the
// contents of a PEM file that contains a private key. The provided
// private key is used to sign JWT payloads.
// PEM containers with a passphrase are not supported.
// Use the following command to convert a PKCS 12 file into a PEM.
//
// $ openssl pkcs12 -in key.p12 -out key.pem -nodes
//
PrivateKey []byte
// PrivateKeyID contains an optional hint indicating which key is being
// used.
PrivateKeyID string
// Subject is the optional user to impersonate.
Subject string
// Scopes optionally specifies a list of requested permission scopes.
Scopes []string
// TokenURL is the endpoint required to complete the 2-legged JWT flow.
TokenURL string
// Expires optionally specifies how long the token is valid for.
Expires time.Duration
}
// TokenSource returns a JWT TokenSource using the configuration
// in c and the HTTP client from the provided context.
func (c *Config) TokenSource(ctx context.Context) oauth2.TokenSource {
return oauth2.ReuseTokenSource(nil, jwtSource{ctx, c})
}
// Client returns an HTTP client wrapping the context's
// HTTP transport and adding Authorization headers with tokens
// obtained from c.
//
// The returned client and its Transport should not be modified.
func (c *Config) Client(ctx context.Context) *http.Client {
return oauth2.NewClient(ctx, c.TokenSource(ctx))
}
// jwtSource is a source that always does a signed JWT request for a token.
// It should typically be wrapped with a reuseTokenSource.
type jwtSource struct {
ctx context.Context
conf *Config
}
func (js jwtSource) Token() (*oauth2.Token, error) {
pk, err := internal.ParseKey(js.conf.PrivateKey)
if err != nil {
return nil, err
}
hc := oauth2.NewClient(js.ctx, nil)
claimSet := &jws.ClaimSet{
Iss: js.conf.Email,
Scope: strings.Join(js.conf.Scopes, " "),
Aud: js.conf.TokenURL,
}
if subject := js.conf.Subject; subject != "" {
claimSet.Sub = subject
// prn is the old name of sub. Keep setting it
// to be compatible with legacy OAuth 2.0 providers.
claimSet.Prn = subject
}
if t := js.conf.Expires; t > 0 {
claimSet.Exp = time.Now().Add(t).Unix()
}
payload, err := jws.Encode(defaultHeader, claimSet, pk)
if err != nil {
return nil, err
}
v := url.Values{}
v.Set("grant_type", defaultGrantType)
v.Set("assertion", payload)
resp, err := hc.PostForm(js.conf.TokenURL, v)
if err != nil {
return nil, fmt.Errorf("oauth2: cannot fetch token: %v", err)
}
defer resp.Body.Close()
body, err := ioutil.ReadAll(io.LimitReader(resp.Body, 1<<20))
if err != nil {
return nil, fmt.Errorf("oauth2: cannot fetch token: %v", err)
}
if c := resp.StatusCode; c < 200 || c > 299 {
return nil, fmt.Errorf("oauth2: cannot fetch token: %v\nResponse: %s", resp.Status, body)
}
// tokenRes is the JSON response body.
var tokenRes struct {
AccessToken string `json:"access_token"`
TokenType string `json:"token_type"`
IDToken string `json:"id_token"`
ExpiresIn int64 `json:"expires_in"` // relative seconds from now
}
if err := json.Unmarshal(body, &tokenRes); err != nil {
return nil, fmt.Errorf("oauth2: cannot fetch token: %v", err)
}
token := &oauth2.Token{
AccessToken: tokenRes.AccessToken,
TokenType: tokenRes.TokenType,
}
raw := make(map[string]interface{})
json.Unmarshal(body, &raw) // no error checks for optional fields
token = token.WithExtra(raw)
if secs := tokenRes.ExpiresIn; secs > 0 {
token.Expiry = time.Now().Add(time.Duration(secs) * time.Second)
}
if v := tokenRes.IDToken; v != "" {
// decode returned id token to get expiry
claimSet, err := jws.Decode(v)
if err != nil {
return nil, fmt.Errorf("oauth2: error decoding JWT token: %v", err)
}
token.Expiry = time.Unix(claimSet.Exp, 0)
}
return token, nil
}
|
Q:
Rubinus or MRI 1.9.3 (YARV)?
So, I have a few questions that I have to ask, I did browse the internet, but there weren't too many reliable answers. Mostly blog posts that would cancel each-other out because they both praised different things and had benchmarks to "prove their viewpoint" (I have never seen so many contradicting benchmarks in my life).
Anyway, my questions are:
Is Rubinius really faster? I was pretty impressed by this apparently honest pro-Rubinius presentation. Another thing that confuses me a little is that a lot of Rubinius is written in Ruby itself, yet somehow it is faster than C-Ruby? It must be a pretty damn good implementation of the language, then!
Does EventMachine work with Ruinius? As far as I know, EventMachine partially relies on Fibers (correct me if I'm wrong) which weren't implemented until 1.9. I know Rubinius will eventually support 1.9, too; I don't mind waiting a little.
Do C extensions work in Rubinius? I have written a C extension which "serializes" binary messages received from a TCP stream into Ruby Objects and vice-versa (I suppose the details are not important, but if it helps answer this question I will update the post). This can be a lot of messages! I managed to write the same code in Ruby (although, it made little sense after a month), but it proved to be a real bottle-neck in the application. So, I had to use C as a "solution" to my problem.
EDIT: I just remembered, I use C for another task, it is a hit-test method for Arrays. Basically it just checks if a "point" is inside an a polygon, it was impossibly slow in CRuby.
If the previous answer was a "No," is there then an alternative for C extensions in Rubinus? I gather the VM is written in C++, so that then.
A few "bonus" questions:
Will C-Ruby (2.0+, YARV) ever get rid of GIL? Or at least modify it so CRuby supports true parallelism?
What is exactly mruby? I see matz is working on it, and as far as the description goes it seems pretty awesome. How different is it from CRuby (performance-wise)?
I apologize for this text-storm I unleashed upon you! ♥
A:
Is Rubinius really faster?
In most benchmarks, yes.
But benchmarks are... dumb. Apps are what we really care about. So the best thing to do is benchmark your app & see how well it performs. The 2 areas where Rubinius will real shine over MRI are parallelism & memory usage. Rubinius has no GIL, so you can utilize all available threads. It also has a much more sophisticated GC, so in general it could perform better with respect to GC.
I did those benchmarks back in Oct '11 for my talk on MagLev at RubyConf
Does EventMachine work with Rubinius?
Yes, and if there are parts that don't work, then the issue should be reported. With that said, currently the EM tests don't pass on any Ruby implementation.
Do C extensions work in Rubinius?
Yes. I maintain the compatibility issue for C-exts, so if there is one you have that is tested on Travis, Rubinius would like to see it pass against rbx. Rubinius has historically had good support for the C-api and C-exts, though it would be nice if someday Rubinius could run Ruby so fast one would not need C-exts or the C-api.
Will C-Ruby (2.0+, YARV) ever get rid of GIL? Or at least modify it so CRuby supports true parallelism?
No, most likely not. Jesse Storimer has a succinct writeup of Matz's opinion (or lack thereof) on threads from RubyConf 2012. Koichi Sasada tried to remove the GIL once and MRI perf just tanked. Evan Phoenix also tried once, before he created Rubinius, but didn't have good results.
What is exactly mruby?
An embeddable Ruby interpreter, akin to Lua. Matt Aimonetti has a few articles that might shed some light for you.
A:
I am not too much into Ruby but I might be able to answer the first question.
Is Rubinius really faster?
I've seen different Benchmarks telling different things. However, the fact that Rubinius is partially written in Ruby does not have to mean that it is slower. I thought the same about PyPy which is Python in Python. After some research and the right classes in college I knew why.
As far as I know both are written in a subset of their language which should be much simpler. An (e.g. C) interpreter can be be optimized much easier for such a subset than the whole language.
Writing the Ruby/Python interpreter in its own language allows much more flexibility and quicker prototyping of new interpretation algorithms. The whole point of the existence of Ruby and Python are among others that algorithms can be implemented much quicker than in e.g. C or even assembler. A faster algorithm outweighs the little overhead of an interpreter a lot of the time.
Btw. writing an interpreter for a language in the same language is also a common academic practice to show how mighty the language is. In one class we've written Lisp in Lisp in Lisp.
|
service:
type: NodePort
externalPort: 80
deploy:
annotations:
sidecar.istio.io/inject: "true"
sidecar.istio.io/rewriteAppHTTPProbers: "true"
ctrl:
tmpDirSizeLimit: 1Gi
resources:
limits:
memory: 96Mi
cpu: 100m
requests:
memory: 32Mi
cpu: 80m
internalPort: 8080
statusPort: 8081
# enable/disable docs topics support for helm controller
documentationEnabled: true
uploadServiceURL: "http://rafter-upload-service.kyma-system.svc.cluster.local:80"
broker:
resources:
limits:
memory: 256Mi
cpu: 60m
requests:
memory: 96Mi
cpu: 30m
tillerTLSInsecure: true
tillerTLSEnabled: true
internalPort: 8070
statusPort: 8071
metricsPort: 8072
defaultAddonsRepository: "https://github.com/kyma-project/addons/releases/download/0.14.0/index.yaml"
# A map of additional addons repositories to configure. The key is used as the name of the created ClusterAddonsConfiguration.
# additionalAddonsRepositories:
# myRepo1: "github.com/myOrg/myRepo//addons/index.yaml?ref=0.x.0"
# myRepo2: "https://github.com/myOrg/myRepo/releases/download/0.x.0/index.yaml"
additionalAddonsRepositories: {}
global:
containerRegistry:
path: eu.gcr.io/kyma-project
# develop mode allows use insecure (http) url for addons configuration
isDevelopMode: false
# image pull policy for helm broker broker/controller containers
image:
pullPolicy: IfNotPresent
# paths to docker images
helm_broker:
dir: "develop/"
version: "579b3ffc"
helm_controller:
dir: "develop/"
version: "579b3ffc"
# etcd port uses by helm broker
etcdClientPort: 2379
# Additional values for sub-charts and extras
istio:
gateway:
name: kyma-gateway
urlRepoPrefixes:
default:
- "https://"
- "hg::"
- "git::"
- "s3::"
- "github.com/"
- "bitbucket.org/"
additionalDevelopMode:
- "http://"
ingress:
domainName: "TBD"
helm:
tls:
crt: "TBD"
key: "TBD"
|
Q:
Hartshorne: Definition of $K^*$ where $K$ a function field of scheme.
Let $X$ be a noetherian integral separated scheme which is regular of codimension one. Let $K$ be the function field of $X$.
Now let $f \in K^*$, (I am interpreting $K^*$ to be the set of field automorphisms from $K \to K$) be any nonzero rational function on $X$.
I am very confused by the statement after the parenthesis. I thought a rational function on $X$ was an element of the function field $K$.
How can $f \in K$ and $f \in K^{*}$ ?
It is likely that I am not interpreting $K^*$ correctly.
A:
The intended interpretation is that $K^*=K\setminus\{0\}$ (the group of multiplicative units of $K$), so an element of $K^*$ is just a nonzero element of $K$. Another common notation for this set is $K^\times$.
|
Heroku slowdown? - hownowbrowncow
Status page still hasn't changed
======
iamakimmer
yes, im timing out
|
Q:
If $\alpha$, $\beta$, $\gamma$, the angles made by a vector with $x, y, z$ axes, are in the ratio 1:2:3 then their values are?
This is a question asked in a book:
If $\alpha$, $\beta$, $\gamma$ are angles made by a vector $x, y, z$ axes respectively, and $\alpha$:$\beta$:$\gamma$ = 1:2:3 then values of $\alpha$, $\beta$, $\gamma$ are?
I tried the obvious by taking $\alpha$ = k; $\beta$=2k; $\gamma$ = 3k; and substituting in $cos^2\alpha$+$cos^2\beta$+$cos^2\gamma$ = 1
but its complicating things. I'm must be missing something simple and obvious but I can't figure out what.
A:
If
$\cos^2 x +\cos^2(2x)+\cos^2(3x)=1
$,
then,
since
$\cos^2(z)
=(\cos(2z)+1)/2
$,
$1
=(\cos(2x)+\cos(4x)+\cos(6x)+3)/2
$
or
$\cos(2x)+\cos(4x)+\cos(6x)
= -1
$.
Letting
$y = 2x$,
$\begin{array}\\
-1
&=\cos(y)+\cos(2y)+\cos(3y)\\
&=\cos(y)+2\cos^2y-1+4\cos^3(y)-3\cos(y)\\
&=4\cos^3(y)+2\cos^2y-2\cos(y)-1\\
\end{array}
$
or
$4\cos^3(y)+2\cos^2y-2\cos(y)
=0
$.
Letting
$z = \cos y$,
$\begin{array}\\
0
&=2z^3+2z^2-z\\
&=z(2z^2+z-1)\\
&=z(z+1)(2z-1)
\qquad\text{just fixed an error here}\\
\end{array}
$
so
$z = 0, -1, \frac12
$.
Therefore
$y=\pi/2, \pi, \pi/3$
so
$x
= y/2
=\pi/4, \pi/2, \pi/6
$.
|
LUXE takes EXO's trademark style of unique and innovative touring and elevates it with touches of luxury, exclusivity and opulence that will ensure guests are treated to superlative comfort, service and amenities every step of the way.
Your browser does not support the HTML5 video tag. Try updating your browser or using a different one.
Culinary
Email
Email Addresses (comma separated):
Title:
Message:
Select some products to compare first
Travel, One Dish at a Time
The only thing bigger than the continent of Asia is the reputation of its culinary traditions. From Japanese sushi and Chinese dim sum to Singaporean chili crab, Asia’s spices and flavours are among the world’s finest. Experience them from their source with in-depth culinary tours designed by local foodie experts. |
By Arab News
By Rashid Hassan
Saudi Arabia and Greece ushered in a new era of relations as King Salman and Greek President Prokopis Pavlopoulos held bilateral talks to enhance cooperation.
“I consider this a historic visit,” Greek Ambassador Polychronis Polychroniou told Arab News on the final day of the visit. “Our two people enjoy friendly relations and share the same principles on almost every issue.”
He added: “During this visit, the president met the Custodian of the Two Holy Mosques as well as many senior officials, and the meetings were very productive, paving the way for a new era in our already close relations.”
However, he pointed out that visits at the top level are needed to further enhance cooperation and “specify certain areas where we can work together even more closely.”
The envoy said: “We signed two agreements, one on technological and scientific cooperation, and the other in the field of satellite technology and its applications.”
In addition, a joint ministerial committee between the two governments was convened, giving the two sides the opportunity to agree on many pending issues, he said.
Ilias Andronikos Klouvatos, deputy head of mission at the Greek Embassy, told Arab News that on Wednesday, the president met Gulf Gulf Cooperation Council (GCC) Secretary-General Abdullatif Al-Zayani. The two leaders discussed relations with Greece and various ways to enhance cooperation between the EU and the GCC.
The president and his accompanying delegation also visited the King Abdulaziz City for Science and Technology (KACST), where he met KACST President Prince Turki bin Saud bin Mohammed. The president was briefed on activities and research projects.
An agreement on satellite applications was signed between Prince Turki and Greek Minister of Foreign Affairs Nikolaos Kotzias. Prince Turki and George Katrojals, Greek minister of state for international economic relations and foreign trade, signed another accord for scientific and technical cooperation. |
New silica nanostructure for the improved delivery of topical antibiotics used in the treatment of staphylococcal cutaneous infections.
In this paper, we report the synthesis, characterization (FT-IR, XRD, BET, HR-TEM) and bioevaluation of a novel γ-aminobutiric acid/silica (noted GABA-SiO₂ or γ-SiO₂) hybrid nanostructure, for the improved release of topical antibiotics, used in the treatment of Staphylococcus aureus infections. GABA-SiO₂ showed IR bands which were assigned to Si-O-Si (stretch mode). The XRD pattern showed a broad peak in the range of 18-30° (2θ), indicating an amorphous structure. Based on the BET analysis, estimations about surface area (438.14 m²/g) and pore diameters (4.76 nm) were done. TEM observation reveals that the prepared structure presented homogeneity and an average size of particles not exceeding 10nm. The prepared nanostructure has significantly improved the anti-staphylococcal activity of bacitracin and kanamycin sulfate, as demonstrated by the drastic decrease of the minimal inhibitory concentration of the respective antibiotics loaded in the GABA-SiO₂ nanostructure. These results, correlated with the high biocompatibility of this porous structure, are highlighting the possibility of using this carrier for the local delivery of the antimicrobial substances in lower active doses, thus reducing their cytotoxicity and side-effects. |
Sir,
Singh *et al*.\[[@ref1]\] studied the association between leisure-time physical activity and the cross-sectional prevalence of depression among the youth of Kangra district in Himachal Pradesh. Although this was a prospective study, they used only a single measure of physical activity and only a single measure of depression, and they examined very few confounding and mediating variables. Given that the association between physical activity and mental health has been known for decades,\[[@ref2][@ref3]\] their study breaks no new ground.
Curiously, although they sampled adults, they administered the Center for Epidemiologic Studies Depression Scale for Children. Besides being inappropriate for adults, this instrument has not been validated in the Indian population, and there is no support for the validity of the score used to define caseness in the Kangra sample. This scale has also been criticized for being non-specific, with ill-defined cut-off values.\[[@ref4]\]
Further, by excluding persons with diagnosed mental health problems, the authors might have excluded depression, which was the very outcome that they sought to identify using their screening instrument.
Finally, they operationalized leisure-time physical activity and depression scores as categorical variables instead of as continuous variables; categorization of continuous data in statistical analysis has many limitations and should not be performed unless there are specific reasons to do so.\[[@ref5][@ref6]\]
Financial support and sponsorship {#sec2-1}
=================================
Nil.
Conflicts of interest {#sec2-2}
=====================
There are no conflicts of interest.
|
Sir,
We appreciate the keen interest\[[@CIT1]\] in our case report "Allograft and prostatic involvement in a renal transplant recipient with disseminated tuberculosis: a case report"\[[@CIT2]\] and very relevant issues raised. In this regard, we would like to bring to your attention that:
The KDIGO clinical practice guidelines for the care of kidney transplant recipients\[[@CIT3]\] recommend susceptibility testing on all isolates of *Mycobacterium tuberculosis* from kidney transplant recipients because the recipients may belong to diverse geographic locations where the prevalence of drug resistance may vary. Identifying drug susceptibility is all the more important in transplant recipients in view of the limited drug options available for them due to significant interaction of rifamycins with calcinurin inhibitors (CNIs) and mTOR inhibitors. The current recommendation for treatment of tuberculosis in kidney transplant recipient is to use the same treatment regimen as used in local general population who require therapy.\[[@CIT3]\] Rifampicin may be substituted with rifabutin with close monitoring of CNI drug levels, or a fluoroquinolone may be used instead of rifamycins. The efficacy of rifamycin sparing regimen in kidney transplant recipients has been reported from our center in the past.\[[@CIT4][@CIT5]\] The duration of therapy has not been defined, but it may be prudent to consider the experience from rifampicin-free regimen used in general population, which in general are 9 months or more in duration.Aguado *et al*.\[[@CIT6]\] has reported that treatment duration less than 9 months was associated with greater mortality, and Park *et al*.\[[@CIT7]\] reported that the only factor that was significantly associated with greater recurrence of TB was duration of treatment: no recurrence was observed in patients who received more than 12 months treatment, irrespective of whether the treatment regimen included rifampicin. The Spanish Society of Infectious Disease and Clinical Microbiology recommends\[[@CIT8]\] duration of at least 12-18 months in solid organ transplant recipients.The prostatic abscess in our patient was asymptomatic and was picked up only on imaging; he had no evidence of bladder outlet obstruction. Hence, an intervention for draining the same was not considered necessary. A repeat CT scan after 3 months of antitubercular chemotherapy showed complete resolution of the abscess.
|
529 F.Supp.2d 1190 (2007)
Mary VALVANIS, John Valvanis and George Valvanis, Plaintiffs,
v.
Robert B. MILGROOM and Nada Martl aka Nada R. Milgroom, Defendants.
Civil No. 06-00144 JMS-KSC.
United States District Court, D. Hawai`i.
November 13, 2007.
*1191 *1192 Alexis M. McGinness, Gregory J. Knoll, Mark G. Valencia, Ted N. Pettit, Case Lombardi & Pettit, R. Patrick Jaress, Jaress & Leong, Honolulu, HI, for Plaintiffs.
Brian A. Duus, David J. Gierlach, Honolulu, HI, for Defendants.
Robert B. Milgroom, Boca Raton, FL, pro se.
ORDER DENYING DEFENDANTS' MOTIONS TO DISMISS AND/OR FOR SUMMARY JUDGMENT
J. MICHAEL .SEABRIGHT, District Judge.
I. INTRODUCTION
Plaintiffs Mary, John, and George Valvanis ("Plaintiffs" or "Valvanis Family") allege that Defendants Robert B. Milgroom ("Milgroom") and Nada Martl ("Martl"), (collectively, "Defendants"), engaged in a scheme to hide and shield assets from Milgroom's creditors, including Plaintiffs. Defendants married in 2001, and in 2002 purchased real property located in Honolulu, Hawaii (the "Hawaii Property") to be held as tenants by the entirety. In 2003, Milgroom transferred his interest in the property to Martl, and the two divorced in 2005. Plaintiffs allege that the property transfer to Martl was fraudulent, and seek damages and equitable relief, including avoidance of the Hawaii Property transfer to Martl. Martl and Milgroom filed Motions to Dismiss, or in the Alternative, for Summary Judgment on August 15, 2007, and August 24, 2007, respectively. A hearing was held on October 29, 2007. For the reasons stated herein, the court DENIES Defendants' Motions to Dismiss and/or for Summary Judgment.
II. BACKGROUND
A. Factual Background
The factual background, for purposes of these Motions to Dismiss and/or for Summary Judgment,[1] are as follows:
*1193 1. Plaintiffs' Claims as Creditors of Milgroom
Plaintiffs allege that they became Milgroom's creditors from business dealings that occurred in the 1980s, and which are the basis of litigation spanning from. through the present. In April 1987, Plaintiffs filed a lawsuit against Milgroom in Massachusetts (the "Massachusetts Action") alleging that he "wrongfully used his influence as attorney `and certified public accountant over the Valvanis Family business" to shift for his benefit business worth $2,000,000 and real estate worth $2,000,000. Am. Compl. ¶ 9; see also Martl Ex. B-1 (reciting factual background of Massachusetts Action).
In 1994, a Special Master in the Massachusetts Action issued a report finding that the Valvanis Family owed Milgroom $150,000. Martl Ex. B-1 at 12. After this report, both parties participated in the Massachusetts Action. The parties filed motions for extensions to file objections, Pls.' Ex. J, Milgroom's attorney filed a motion to withdraw, id., and Milgroom appeared pro se. Pls.' Exs. F, M ¶¶ 12, 18. The Massachusetts Action stalled for several years, but on October 18, 2005, the court entered a judgment against Milgroom after he failed to participate. Am. Compl. ¶ 42; Martl Ex. D at 1. On July 3, 2007, the Massachusetts Court issued a Memorandum of Decision on Damages Trial and Order for Judgment, ordering judgment and damages in favor of Plaintiffs. See Martl Ex. D.
2. Milgroom and Martl
Milgroom married Martl on September 11, 2001, six months after his first wife passed away. Am. Compl. ¶ 18; Pls.' Ex. K (listing wedding date). Prior to their marriage, Defendants were involved together in two Florida real estate investment companies. Am. Compl. ¶¶ 14-17; Pls.' Exs. A at 317-20, B (listing Milgroom's income from "Elegant Homes of Florida" in 1999 and "Martl Int'l" in 2000). Martl agreed to marry Milgroom and give up her real estate business in exchange for half of Milgroom's net worth, which was estimated to be at least $10 million. Am. Compl. ¶¶ 19-20; Martl Ex. C at 111-12. In lieu of giving Martl $5 million, Milgroom added her name to all of his financial accounts. Am. Compl. ¶ 21; Pls.' Ex. A at 136. Martl later opened a bank account in Germany and transferred "a significant portion" of Milgroom's money to it. Am. Compl. ¶ 23; see also Pls. Ex. A at 113; Martl Decl. ¶ 13 (noting that the German bank account may have included "some funds I received in sharing Milgroom's property in consideration for giving up" the business).
On August 2, 2002, Defendants purchased the Hawaii Property, located at 253 Puuikena Drive, Honolulu, Hawaii 96821, for $5.2 million cash. Am. Compl. ¶ 24; Martl Ex. A-1. Martl alleges that "the funds used to purchase the Hawaii Property were solely my own, and were wired to Hawaii from a German bank account solely under my name and control." Martl Decl. ¶ 4. Plaintiffs allege that the Hawaii Property payment did not come directly from the German bank account and these funds are traceable to Milgroom's $10 million net worth. Am. Compl. ¶ 26. On July 12, 2002, $6,499,982 was wire transferred from a German bank account to First Hawaiian Bank and deposited into Defendants' joint checking account. Ueno Decl. ¶ 17; Pls.' Ex. L. Milgroom then drew a check from this account for $7,125,000 payable to Milgroom, and deposited it into Defendants' *1194 joint savings account. Ueno Decl. ¶ 17; Pls.' Ex. L. Milgroom then used these funds to purchase the Hawaii Property. Ueno Decl. ¶ 17; Pls.' Ex. L.
On May 13, 2003, Milgroom transferred his interest in the Hawaii Property to Martl for no consideration. Am. Compl. ¶ 29; Martl Exs. C at 193, A3. Plaintiffs allege that as a result, Milgroom became insolvent. Am. Compl. ¶ 30; see also Pls.' Ex. P (stating that Milgroom declared bankruptcy in 2005).
On June 14, 2005, Martl filed for divorce against Milgroom. Am. Compl. ¶ 33; Pls.' Ex. K. Plaintiffs allege that, Defendants provided "false, incomplete, and misleading information" to expedite the divorce process, Am. Compl. ¶ 36, as the divorce was granted only two weeks later, on June 28, 2005. Pls.' Ex. K. In the divorce papers, signed under penalty of perjury, neither Defendant listed any income, expenses, cash, credit union accounts, bank and savings accounts, securities, or any. other major assets, other than a 2005 BMW vehicle and the Hawaii Property. Id. Milgroom also signed a release of marital interest in the Hawaii Property. Am. Compl. ¶ 36; Pls.' Ex K. After the divorce, Martl continued to financially support Milgroom. Am. Compl. ¶ 38; Pls.' Ex. X ¶ 130.
3. Milgroom Declares Bankruptcy
On July 11, 2005, only two weeks after the divorce decree, Milgroom filed a Chapter 7 bankruptcy petition in the United States Bankruptcy Court for the District of Hawaii. Am. Compl. ¶ 40; Pls.' Ex. S ¶ 1. In August 2005, Milgroom converted his bankruptcy case to Chapter 13, in part, to "to avoid investigation and action by the Chapter 7 trustee." Am. Compl. ¶ 41; Pls.' Ex. S ¶ 17.
Plaintiffs subsequently learned of Milgroom's bankruptcy action and began to participate as creditors. Am. Compl. ¶ 44; Pls.' Ex. G. As part of discovery, the bankruptcy court issued a subpoena for Martl's examination on November 30, 2005. Pls.' Ex. I. In 2006, Martl left the United States without participating in the bankruptcy action. Am. Compl. ¶ "64; Pls.' Prelim. Inj. Opp'n Ex. 14.[2] In March 2006, Milgroom was ordered to execute bank authorizations and produce his laptop for examination, Am. Compl. ¶ 45, Pls.' Ex. P, after he testified that certain computer files may have been deleted by himself, Martl, or someone else in the house. Pls.' Ex. A at 337-38. Milgroom failed to comply with the bankruptcy court's orders and left Hawaii. Am. Compl. ¶ 65; Pls.' Ex. S ¶ 28.
On May 12, 2006, the bankruptcy court entered an order (1) finding. Milgroom in contempt of court, (2) awarding sanctions, (3) granting Plaintiffs relief from the automatic stay nunc pro tune, and (4) denying the request for a bench warrant. Am. Compl. ¶ 47; Pls.' Ex. R. The bankruptcy court noted that Plaintiffs had "submitted substantial evidence concerning questionable transfers of [Milgroom's] interest in real property in Florida and in Hawaii to Martl during a four-year period prior to [Milgroom's] bankruptcy petition, including without limitation, the transfer of the Debtor's interest in the [Hawaii Property] in 2003 for no consideration." Pls.' Ex. S at 8.
4. Martl Attempts to Sell the Hawaii Property Below Market Value
After leaving Hawaii, Martl listed the Hawaii Property for sale with an asking *1195 priceof $6,500,000. Am. Compl. ¶ 54; Plat' Prelim. Inj. Opp'n Ex. 16. This listing' price is less than the 2005 tax assessed value of $7,442,800, and comparable homes in the area listing for $8,000,000. Am. Compl. ¶ 54; Pls.' Prelim. Inj. Opp'n Ex. 16.
B. Procedural Background
The Amended Complaint, filed on May 23, 2006, alleges the following causes of action against Defendants:
1. Fraudulent Conveyance Under Hawaii Revised Statutes ("HRS") ch. 651C, Hawaii Uniform Fraudulent Transfer Act ("HUFTA");
2. Civil Conspiracy to Defraud;
3. Common Law Fraudulent Transfer;
4. Constructive and/or Resulting Trust and/or Equitable Lien;
5. Injunction Against Further Disposition of the Hawaii Property;
6. Appointment of Receiver;
7. Spoliation of Evidence; and
8. Enforcement of Contempt Order and Judgment.
Martl first filed a Motion to Dismiss, or, in the Alternative, for Summary Judgment on August 21, 2006, which was ultimately deemed withdrawn when this action was stayed from September 27, 2006 to August 2, 2007 to allow the Massachusetts Action to complete through trial.
Martl and Milgroom filed the present motions on August 15, 2007 and August 24, 2007 respectively.[3] Plaintiffs filed a response to both motions on October 11, 2907; Martl and Milgroom filed replies on October 18, 2007 and October 19, 2007, respectively. Defendants argue that all counts of the Amended Complaint should be dismissed for failure to plead fraud with particularity pursuant to Fed.R.Civ.P. 9(b), or alternatively, that summary judgment is appropriate. Based on the following, the court DENIES Defendants' motions.
III. STANDARDS OF REVIEW
A. Federal Rule of Civil Procedure 9(b)
Federal Rule of Civil Procedure 9(b) requires that "Din all averments of fraud or mistake, the circumstances constituting fraud or mistake shall be stated with particularity." "Rule 9(b) requires particularized allegations of the circumstances constituting fraud." In re GlenFed, Inc. Sec. Litig., 42 F.3d 1541, 1547-48 (9th Cir.1994) (en banc), superseded on other grounds by 15 U.S.C. § 78u-4.
In their pleadings, Plaintiffs must include the time, place, and nature of the alleged fraud; "mere eonclusory allegations of fraud are insufficient" to satisfy this requirement. Id (citation and quotation signals omitted). However, "[m]alice, intent, knowledge, and other condition of mind of a person may, be averred generally." Fed.R.Civ.P. 9(b); see also In re GlenFed, Inc. Sec. Litig., 42 F.3d at 1547" ("We conclude that plaintiffs may aver scienter . . . simply by saying that scienter existed."); Walling v. Beverly' Enter., 476 F.2d 393, 397 (9th Cir.1973) (Rule 9(b) "only requires the identification of the circumstances *1196 constituting fraud so that the defendant can prepare an adequate answer from the allegations." (citations omitted)).
A motion to dismiss for failure to plead with particularity is the functional equivalent of a motion to dismiss under Fed.R.Civ.P. 12(b)(6). Vess v. Ciba-Geigy Corp. USA, 317 F.3d 1097, 1107 (9th Cir. 2003). In considering a motion to dismiss, the court is not deciding the issue of "whether a plaintiff will ultimately prevail but whether the claimant is entitled to offer evidence to support claims." Hydrick v. Hunter, 449 F.3d 978, 988 (9th, Cir.2006) (quoting Scheuer v. Rhodes, 416 U.S. 232, 236, 94 S.Ct. 1683, 40 L.Ed.2d 90 (1974)).
B. Motion for Summary Judgment
Summary judgment is proper where there is no genuine issue of material fact and the moving party is entitled to judgment as a matter of law. Fed.R.Civ.P. 56(c). The burden initially lies with the moving party to show that there is no genuine issue of material fact. T.W. Elec. Serv., Inc. v. Pac. Elec. Contractors Ass'n, 809 F.2d 626, 630 (9th Cir.1987). Nevertheless, "summary judgment is mandated if the non-moving party `fails to make a showing sufficient to establish the existence of an element essential to that party's case." Broussard v. Univ. of Cal. at Berkeley, 192 F.3d 1252, 1258 (9th Cir. 1999) (quoting Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986)).
An issue of fact is genuine "if the evidence is such that a reasonable jury could return a verdict for the nonmoving party." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). An issue is material if the resolution of the factual dispute affects the outcome of the claim or defense under substantive law governing the case. See Arpin v. Santa Clara Valley Transp. Agency, 261 F.3d 912, 919 (9th Cir.2001). When considering the evidence on a motion for summary judgment, the court must draw all reasonable inferences on behalf of the nonmoving party. Matsushita Elec. Indus. Co. v. Zenith Radio, 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986).
IV. ANALYSIS
A. Rule 9(b) Analysis of Plaintiffs' HUFTA Claim
Defendants argue that Plaintiffs have failed to plead their HUFTA claim with particularity, and that this claim, along with the rest of the Amended Complaint (which relies on the HUFTA claim), should be dismissed. The court disagrees.
1. HUFTA's Legal Framework
HUFTA describes "fraudulent transfers" at HRS §§ 6510-4 and 651C-5. Section 651C-4 describes fraudulent transfers as to present and future creditors:
(a) A transfer made or obligation incurred by a debtor is fraudulent as to a creditor, whether the creditor's claim arose before or after the transfer was made or the obligation was incurred, if the debtor made the transfer or incurred the obligation:
(1) With actual intent to hinder, delay, or defraud any creditor of the debtor; or
(2) Without receiving a reasonably equivalent value in exchange for the transfer or obligation, and the debtor:
(A) Was engaged or was about to engage in a business or a transaction for which the remaining assets of the debtor were unreasonably small in relation to the business or transaction; or
(B) Intended to incur, or believed or reasonably should have believed that the debtor would incur, debts beyond *1197 the debtor's ability, to pay as they became due.
HRS § 651C-4(a).[4] Section 651C-5 describes fraudulent transfers as to present creditors:
(a) A transfer made or obligation incurred by a debtor is fraudulent as to a creditor whose claim arose before the transfer was made or the obligation was incurred if the debtor made the transfer or incurred the obligation without receiving a reasonably, equivalent value in exchange for the transfer `or obligation and the debtor was insolvent at that time or the debtor becomes insolvent as a result of the transfer or obligation.
(b) A transfer made by a debtor is fraudulent as to a creditor whose claim arose before the transfer was made if the transfer was made to = insider for other than a present, reasonably equivalent value, the debtor was insolvent at that time, and the insider had reasonable cause to believe that the debtor was insolvent."
As used by HUFTA, a creditor' means a person who has a claim against a debtor." HRS § 651C-1. A "claim" is "a right to payment, whether or not the right is reduced to judgment, liquidated, unliquidated, fixed, contingent, matured, unmatured, disputed, undisputed, legal, equitable, secured, or unsecured." Id.
To protect transferees of fraudulent conveyances, HUFTA provides several defenses and' protections, depending on which HUFTA subpart governs the conveyance. Relevant to § 651C-4(a), "[a] transfer or obligation is not voidable . . . against a person who took in good faith and for, a reasonably equivalent value or against any subsequent transferee or obligee." Id § 651C-8(a). Transfers under § 651C-5(b) will not be voidable:
(1) To the extent the insider gave new value to or for the benefit of the debtor after the transfer was made unless the new value was secured by a valid lien;
(2) If made in the ordinary course of business or financial affairs of the debtor and the insider; or
(3) If made pursuant to a good-faith effort to rehabilitate the debtor and the transfer secured present value given for that purpose as well as an antecedent debt of the debtor.
Id. § 651C-8(1).[5]
Courts have interpreted HUFTA to provide two possible theories of recovery: *1198 "1) actual `intent intent to defraud; and 2) reasonably equivalent value." In re Agric. Research & Tech. Group, Inc., 916 F.2d 528, 534 (9th Cir.1990). Under this second theory, "any transfer whereby the transferee gives less than `reasonably equivalent value' in exchange for the transfer from the debtor [] and has the effect of reducing the [debtor's] assets by a certain sum may also be avoided." Id.
The Allegations in the Amended Complaint Satisfy Rule 9(b)
Plaintiffs have pled facts with sufficient particularity to support a cause of action for fraudulent conveyance under HRS §§ 651C-4(a)(1), 651C-4(a)(2)(b), and 651C-5(a).[6]
To state a claim pursuant to HRS § 651C-4(a)(1), Plaintiffs must plead that they are creditors of Milgroom, that Milgroom transferred the Hawaii Property before or after Plaintiffs' claim arose, and that Milgroom "acted with actual intent to hinder, delay, or defraud" his creditors. In support of their creditor status, Plaintiffs allege that they filed the Massachusetts Action in 1987 seeking approximately $4,000,000 in damages. Am. Compl. ¶ 9. The Massachusetts Action continued for many years and no final judgment was entered at any time prior to the Hawaii Property transfer to Martl.[7]Id. ¶¶ 9, 42. Given that the definition of "creditor" includes individuals whose right to payment is not yet reduced to judgment, Plaintiffs under these facts may be afforded creditor status under HUFTA. See HRS § 651C-1 (defining a "claim" of a creditor as "a right to payment, whether or not the right is reduced to judgment, liquidated, =liquidated, fixed, contingent, matured, =matured, disputed, undisputed, legal, equitable, secured, or unsecured.").
In describing the "conveyance," Plaintiffs have alleged that:
(1) Milgroom and Martl purchased the Hawaii Property on August 2, 2002 with $5.2 million cash, Am. Compl. ¶¶ 24, 26; (2) the $5.2 million cash is traceable to Milgroom's $10 million net worth, id. ¶ 26; (3) Milgroom transferred the Hawaii Property to Martl on May 13, 2003, id. ¶ 29; and (4) during their divorce, Milgroom signed a release of marital interest in the Hawaii Property. Id. ¶ 36. Finally, Plaintiffs have alleged that Milgroom transferred the Hawaii Property to Martl with actual intent to hinder, delay or defraud the Valvanis Family with respect to their claims raised in the Massachusetts Action. Id. ¶ 69.
Plaintiffs' specific allegations regarding their creditor status and the Hawaii Property transfer meet the "who, what, when, where, and how" requirements of Fed. R.Civ.P. 9(b) and are "specific enough to give defendants notice of the particular misconduct . . . so that they can defend against the charge and not just deny that they have done anything wrong." Vess, 317 F.3d at 1106 (citation and quotation signals omitted). Further, Plaintiffs' general averment that Milgroom transferred the property with actual intent is sufficient for Rule 9(b). See GlenFed, Inc. Sec. Litig. *1199 42 F.3d at 1547 ("We conclude that plaintiffs may aver scientei" . . . simpiy by saying that scienter existed.").
To state a claim under HRS § 651c-4(a)(2)(B), Plaintiffs, in addition to pleading their creditor status and that Milgroom transferred property, must plead that Milgroom (1) did not receive "a reasonably equivalent value in exchange for the transfer," and (2) "[Untended to incur, or believed or reasonably should have believed that the debtor would incur, debts beyond the debtor's ability to pay as they became due." Similar to HRS § 651C-4(a)(2)(B), HRS § 651C-5(a) requires that (1) Milgroom did not receive a reasonably equivalent value in exchange for the Hawaii Property transfer, (2) Milgroom was insolvent at the time of the Hawaii Property transfer, or became insolvent as a result of the transfer, and (3) Plaintiffs were present creditors of Milgroom at the time of the Hawaii Property transfer. In support of both these claims, Plaintiffs have alleged that (1) in return for the 2003 Hawaii Property transfer, Martl paid no consideration, "or, in the alternative, Milgroom did not receive reasonably equivalent value in exchange for the transfer," Am. Compl. ¶ 29; and (2) as a result of the Hawaii Property to transfer to Martl, Milgroom became insolvent. Id ¶ 30. Further, since Plaintiffs'"claim" arose prior to the Hawaii Property transfer, Plaintiffs have alleged that they are present creditors of Milgroom. Like the claim under HRS § 651C-4(a)(1), these allegations in support of claims under HRS §§ 651C-4(a)(2)(B) and 651C-5(a) are specific enough to meet the requirements of Rule 9(b). For these reasons, the court DENIES Defendants' motions to dismiss.
B. Summary Judgment
I. Summary Judgment Is Denied for' Count I
Defendants raise several factual and legal arguments for summary judgment of Count I. The court finds none of them persuasive.
a. Martl's knowledge and/or intent
Martl argues that the Amended Complaint is deficient as to her because Plaintiffs did not specifically allege that she acted with intent to defraud, and that Plaintiffs have no evidence of intent.[8] These arguments are legally deficient.
In describing the elements of a fraudulent transfer, HUFTA only addresses the intent of the debtor: "A transfer made or obligation incurred by a debtor is fraudulent as to a creditor . . . if the debtor made the transfer or incurred the obligation . . . [w]ith actual intent to hinder, delay, or defraud any creditor of the debtor." HRS § 651C-4(a)(1) (emphasis added).[9] The intent of the transferee, therefore, is not a necessary element of a HUFTA claim. The transferee's knowledge, however, becomes relevant in determining the available defenses to a HUFTA claim. See, e.g., HRS § 651C-8 ("A transfer or obligation is not voidable under section 651C-4(a)(1) against a person who took in good faith and for a reasonably equivalent value or against any subsequent transferee or obligee.").
The transferee is nonetheless a necessary party to a HUFTA action. "[A] transferee who retains title to the suited property or who claims an interest in the property or its proceeds . . . is a necessary party to any action seeking to set aside the *1200 transfer. Such an action for relief against a transfer alleged to be fraudulent should be brought pursuant to [HUFTA]. . . ." Tanaka v. Nagata, 76 Hawaii 32, 36, 868 P.2d 450, 454 (1994). The transferee must be a party because "[f]undamental principles of due process require that transferees who claim an interest in real property or its proceeds have a full and fair opportunity to contest claims of fraudulent transfer." Id. at 37, 868 P.2d at 455.
Plaintiffs seek to avoid the Hawaii Property transfer from Milgroom to Martl. As Martl is the transferee, Plaintiffs need not prove Martl's intent to maintain their HUFTA claim. Martl is a necessary party to this action.
b. Milgroom's knowledge and/or intent
Defendants argue that Plaintiffs cannot prove that Milgroom had the requisite intent necessary for a HUFTA claim.[10] Milgroom contends that he had no knowledge of Plaintiffs' claims from 1994-2005 because a Special Master in the Massachusetts Action found in Milgroom's favor in 1994. According to his declaration, the Massachusetts Action remained inactive from 1994-2005 such that Milgroom had no reason to believe that Plaintiffs were creditors. Milgroom Decl. ¶ 3(a). This argument lacks merit.
"When an issue requires determination of state of mind, it is unusual that disposition may be made by summary judgment." Consol. Elec. Co. v. U.S. for Use and Benefit of Gough Indus., Inc., 355 F.2d 437, 438 (9th Cir.1966); see also SEC v. Koracorp Indus., Inc., 575 F.2d 692, 699 (9th Cir. 1978) ("The courts have long recognized that summary judgment is singularly inappropriate where credibility is at issue."). However, "[a] party' opposing summary judgment may not simply question the credibility of the movant to foreclose summary judgment. Instead, the non-moving party must go beyond the pleadings and by its own evidence `set forth specific facts showing that there is a genuine issue for trial." Far Out Prods., Inc. v. Oskar, 247 F.3d 986, 997 (9th Cir.2001) (quoting Fed. R.Civ.P. 56(e)).
Plaintiffs have set forth specific facts raising a genuine issue of fact of Milgroom's knowledge of his creditors. The Special Master's Report in the Massachusetts Action was not a final decision. Plaintiffs pressed on in the Massachusetts Action, and Milgroom knew of and participated in the Massachusetts Action after the Special Master's Report. Specifically, both parties filed motions for extensions to file objections, Pls.' Ex. J, Milgroom's attorney filed a motion to withdraw, id., and Milgroom appeared pro se. Pls.' Ex. F, M ¶¶ 12, 18. Given this evidence, there is a question of fact whether Milgroom knew of Plaintiffs' creditor status, and, as required by HRS § 651C-4(a)(1), intended to defraud his creditors. See In re Agric. Research and Tech. Group, Inc., 916 F.2d at 534 (noting that "a court may make a finding of fraudulent intent . . . on the basis of circumstantial evidence; direct proof . . . will rarely be available." (citation and quotation signals omitted.)) Accordingly, the court DENIES summary judgment on this basis.
c. The Hawaii Property held in tenancy by the entirety
Defendants argue that because they initially purchased the Hawaii Property as tenants by the entirety, the Hawaii Property cannot properly be subject to the claims of Milgroom's creditors. The court rejects this argument.
In a tenancy by the entirety, "neither husband nor wife has a separate divisible *1201 interest in the property held by the entirety that can be conveyed or reached by execution." Sawada v. Endo, 57 Haw. 608, 614, 561 P.2d 1291, 1295 (1977). Therefore, "an estate by the entireties is not subject to the claims of his or her individual creditors during the joint lives of the spouses." Id. at 612, 561 P:2d at 1295. This rule creates no Unfairness to creditors: "If the debt arose prior to the creation of the estate, the property was not a basis of credit, and if the debt arose subsequently the creditor presumably had notice of the characteristics of the estate which limited his right to reach the property." Id. at 616, 561 P.2d at 1296. (citations omitted).
Despite the general protection against creditors that a tenancy by the entirety enjoys, "the creation of the tenancy by the entirety may not be used as a device to defraud existing creditors." Id. (citations omitted); see also In re Estate of Wall, 440 F.2d 215, 219 (D.C.Cir.1971) ("This is not to say, however, that rights and remedies of existing creditors can be obliterated by the simple expedient of erecting a tenancy by the entireties in property that is otherwise vulnerable.").
Plaintiffs argue that the creation of the tenancy by the entirety was for the purpose of defrauding the Valvanis Family,[11]see Pls.' Br. at 28-30, and they have submitted evidence to support this allegation. As discussed above, it is a question of fact whether Milgroom knew of the Massachusetts Action and Plaintiffs' creditor status. Further, the circumstances of the Hawaii Property transfer and Defendants' mar riage raise a fact question whether Defendants purchased the Hawaii Property as tenants by the entirety for the purpose of defrauding Milgroom's creditors. See In re Agric. Research & Tech. Group, Inc., 916 F.2d at 534 (noting that "a court may make a finding of fraudulent intent . . . on the basis of circumstantial evidence; direct proof . . . will rarely be available." (citation and quotation signals omitted.))
Plaintiffs have submitted evidence raising questions about the source of the funds used to purchase the Hawaii Property.[12] Martl alleges that "the funds used to purchase the Hawaii Property were solely my own, and were wired to Hawaii from a German bank account solely under my name and control." Martl Decl. ¶ 4. Martl also admits, however, that this German bank account may have included "some funds I. received in sharing Milgroom's property in consideration for giving up" her real estate business.[13]Id. ¶ 13. *1202 Moreover, the Hawaii Property payment did not come directly from the German bank account. On July 12, 2002, $6,499,982 was wire transferred from a German bank account to First Hawaiian Bank and deposited into a joint checking account of Defendants. Ueno Decl. ¶ 17, Ex. E. Milgroom then drew a check from this account for $7,125,000 payable to Milgroom. Id. This check was deposited into a different joint savings account of Defendants, from which funds to pay for the Hawaii Property were drawn. Id.
Milgroom later transferred his interest in the Hawaii Property to Martl on May 13, 2003, and signed a release of marital interest in the Hawaii Property during their divorce in 2005, each time for no consideration. Martl Ex. C; Pls.' Ex. K. During their divorce (which became final in only two weeks), Defendants declared under penalty of perjury that they had no expenses, income, or any other major assets other than a 2005 BMW and the Hawaii Property. Pls.' Ex. K. Just two weeks after the divorce decree, Milgroom declared bankruptcy. Pls.' Exs. K, P. After the divorce, Martl continued to support Milgroom financially. Pls.' Ex. X, ¶ 130. These facts raise an issue whether Defendants divorced to evade Milgroom's creditors, and therefore calls into question the validity of the original Hawaii Property purchase. Indeed, based on the evidence before it, the bankruptcy court found that Plaintiffs "produced compelling evidence that [Milgroom] has engaged in fraudulent real estate and financial transactions with his wife, and then, ex-wife Martl, between 2002 and the present." Pls.' Ex. S at 12.
Under these circumstances, whether the creation of the tenancy by the entirety was for the purpose of defrauding Milgroon's creditors is a question of fact.
d. Defendants' remaining arguments
The court addresses and dismisses Defendants' remaining arguments that the Hawaii Property transfer to Martl is insulated as a matter of law.
First, Defendants argue that Plaintiffs cannot prove that the conveyance of the Hawaii Property caused them any injury. See Martl Br. at 20 (quoting Mehrtash v. Mehrtash, 93 Cal.App.4th 75, 80, 112. Cal. Rptr.2d 802 (2001)). What Plaintiffs can ultimately prove is a question of fact: Milgroom transferred his interest in the Hawaii Property for no consideration, and declared bankruptcy only two weeks after his divorce to Martl became final. Pls.' Exs. K, P; Martl Ex. C. Based on these facts, the Hawaii Property transfer may very well have caused injury by putting beyond Plaintiffs' reach property they otherwise would be able to subject to the payment of their debt.
Martl also argues that the Hawaii Property transfer was in the ordinary course of business pursuant to HRS § 651C-8(f)(2). This defense applies only to transfers pursuant to HRS § 651C-5(b), which Plaintiffs apparently do not assert. See HRS § 651C-8(f)(2) (listing scenarios under which a transfer pursuant to HRS § 651C-5(b) is not voidable).
Finally, Defendants argue that Martl takes benefit of the "preferential transfer" doctrine. Specifically, Martl contends she had "claim" to Milgroom's money due to her agreement to marry him for half his worth, and Milgroom was entitled to prefer her as a creditor over Plaintiffs. Under the preferential transfer doctrine, "it is not fraudulent for a debtor in failing circumstances to prefer one or more of his bona fide creditors to the exclusion of other creditors. . . ." Kekona v. Abastillas, *1203 ¶ 13 Hawaii 174, 183 n. 7, 150 P.3d 823, 832 n. 7 (2006) (quoting In re Application of Sec. Inv. Co., 33 Haw. 364 (1935)). This rule, however, applies only to those transfers that are bona fide. See Kekaluto 113 Hawaii at 183, 150 P.3d at 832 (noting that preferential transfers may be fraudulent and subject to HUFTA). As discussed above, whether Defendants engaged in a scheme to purchase the Hawaii Property, transfer Milgroom's interest to Martl, and divorce, are issues of fact. Accordingly, summary judgment must be. DENIED.
2. The Remaining Counts of the Complaint
Defendants argue that if summary judgment is granted on the HUFTA claim, the remaining claims of the complaint must similarly fall. Because the court finds that the HUFTA claim stands, this argument is without merit. Below, the court addresses Defendants' remaining summary judgment arguments on each claim.
a Count IIcivil conspiracy
Defendants argue that summary judgment must be granted for this count because (1) Plaintiffs have failed to plead conspiracy with particularity, and (2) there is no probative evidence of intent to conspire to defraud Plaintiffs. The Court disagrees with both of these arguments.
"[T]he tort of conspiracy has not been clearly defined" in Hawaii case law. Weinberg v. Mauch, 78 Hawai`i. 40, 49, 890 P.2d 277, 286 (1995) (citation and quotation signals omitted). Nonetheless, "it is clear that there can be no civil claim based upon a conspiracy alone. [If a plaintiff does] not set forth any actionable claim based upon deceit, there can be no claim against any alleged joint tortfeasor based solely upon conspiracy to deceive." Id. (citation and quotation signals omitted); Moore v. Brewster, 96 F.3d 1240, 1245 (9th Cir. 1996); see also Kidron v. Movie Acquisition Corp., 40 Cal.App.4th 1571, 47 Cal. Rptr.2d 752 (1995) ("The indispensable elements of civil conspiracy include a wrongful act and knowledge on the part of the alleged conspirators of [the conspiracy's] unlawful objective.").
Determining "whether defendants were involved in an unlawful conspiracy is generally a factual issue and should be resolved by the jury, so long as there is a possibility that the jury can infer from the circumstances that the alleged conspirators had a meeting of the minds and thus reached an understanding to achieve the conspiracy's objectives." Radcliffe v. Rainbow Const. Co., 254 F.3d 772, 790 (9th Cir.2001) (citation and quotation signals omitted); see also Joseph E. Seagram & Sons, Inc. v. Hawaiian Oke & Liquors, Ltd., 416 F.2d 71, 85 (9th Cir.1969) (noting that "conscious parallel action, standing alone, is [in]sufficient to support a finding of conspiracy, in the absence of circumstances which logically suggest joint agreement, as distinguished from individual action" (citation and quotation signals omitted)).
Here, the underlying actionable tort for the conspiracy claim is the fraudulent transfer of the Hawaii Property. Because the HUFTA claim meets the Rule 9(b) requirements, the conspiracy claim; to the extent it is directed to the fraudulent transfer of the Hawaii Property, similarly succeeds.[14] While Plaintiffs did allege *1204 generally that Defendants committed "overt acts" in support of this claim, the Amended Complaint enumerates in previous paragraphs these acts supporting the HUFTA claim.
Plaintiffs have also raised a genuine issue of fact regarding Defendants' intent to conspire to defraud Milgroom's creditors. Defendants argue that Milgroom "reasonably believed" the Massachusetts Action was resolved, and Martl had never heard of the Valvanis Family. Martl Br. at 25. As discussed supra, however, Plaintiffs have presented evidence raising issues of fact as to whether Defendants purchased the Hawaii Property and transferred it to Martl as part of a scheme to defraud Milgroom's creditors.
Defendants purchased the Hawaii Property on August 2, 2002 from funds that Martl admits may have come from Milgroom. Martl Decl. ¶ 13; Martl Ex. C at 111.12. Despite Martl's assertion that the funds used to purchase the Hawaii Property were solely her own, Martl Decl. ¶ 4, it was Milgroom who transferred the funds between various accounts to purchase the Hawaii Property. Ueno Decl. ¶ 17; Pls.' Ex. L. Milgroom later transferred his interest in the Hawaii Property to Martl on May 13, 2003, and signed a release of marital interest in the Hawaii Property during their divorce in 2005, each time for no consideration. Martl Ex. C; Pls.' Ex. K. During their divorce (which became final in only, two weeks), Defendants declared under penalty of perjury that they had no expenses, income, or any other major assets other than a 2005 BMW and the Hawaii Property. Pls.' Ex. K. Just two weeks after the divorce decree, Milgroom declared bankruptcy. Pls.' Exs. K, P. After the divorce, Martl continued to support Milgroom financially. Pls.' Ex. X, ¶ 130.
These circumstances suggest a "joint agreement" sufficient to defeat summary judgment on the conspiracy claim at this time. See Joseph E. Seagram & Sons, Inc., 416 F2d at 85; Radcliffe, 254 F.3d at 790 (noting that a fact issue exists "so long as there is a possibility that the jury can infer from the circumstances that the alleged conspirators had a meeting of the minds and thus reached an understanding to achieve the conspiracy's objectives."). Summary judgment for this claim is therefore DENIED.
b. Count IIIcommon law fraudulent transfer
Martl argues that for any claims against her that accrued subsequent to the Hawaii Property transfer, Hawaii common law requires proof that Martl had actual intent to defraud Plaintiffs when the property was conveyed. Martl Br. at 26. Martl's argument lacks merit.
To the extent that Plaintiffs have claims against Martl for actions that occurred after the Hawaii Property transfer, those claims would be separate from the common law fraudulent conveyance claim and seek separate damages. Moreover, the case law cited by Martl, Lippi v. City Bank, 955 F.2d 599, 606-07 (9th Cir.1992), which itself cites to Metzger v. Lalakea, 32 Haw. 706, 1933 WL 2386 (Apr. 26, 1933), is inapplicable to Martl as a transferee. Rather, both cases address whether a conveyance of land can be successfully attacked by creditors of the grantor. See Lippi, 955 F.2d at 606-07 (stating that court's position "is consistent with Hawaii's common law of fraudulent conveyance, which allows subsequent creditors to set aside a conveyance only where it is shown that the debtor conveyed with intent to defraud creditors") (emphasis added); Metzger, 32 Haw. 706, 1933 WL 2386, at *7 ("It is a firmly established principle that even a voluntary conveyance of land cannot be successfully attacked by creditors of *1205 the grantor who became such subsequent to the conveyance unless it was made with the intent to defraud such subsequent-creditors. . . ." (citation and quotation signals omitted.)) Summary judgment cannot be granted on this basis.
c. Count V[15]injunction against further disposition of the Hawaii Prpperty
Defendants argue that summary judgment should be granted on this claim for largely the same reasons that Plaintiffs' lis pendens should be expunged. As discussed in the court's Order Denying Martl's Appeal of Magistrate Judge Kevin S.C. Chang's October 16, 2007 Order, and Order Denying Defendants' Request for Preliminary Injunction, the court does not find these arguments persuasive. Further, if Plaintiffs can prove the facts supporting their HUFTA claim, they may be entitled to an injunction preventing the further transfer of the Hawaii Property. See HRS § 651C-7 (enumerating potential creditor remedies including "an injunction against further disposition by the debtor or a transferee, or both, of the asset transferred or of other property"). As the request for injunction raises fact questions, summary judgment is inappropriate.
d. Count VIappointment of receiver
Defendants argue that summary judgment should be granted on this claim because appointment of a receiver is a harsh remedy of last resort that Plaintiffs cannot justify.
"As a basis for the appointment of a receiver, the plaintiff must show, not only that he has an interest in or right to the fund or property, but that the possession of the property by the defendant was obtained by fraud; or that the property itself, or the income arising from it, is in danger of loss from the neglect, waste, misconduct or insolvency of the defendant." Hawaii Nat'l Bank v. Cook, 100 Hawaii 2, 11, 58 P.3d 60, 69 (2002) (citation and quotation signals omitted.) While the appointment of receiver is generally considered a remedy of "last resort," Carl Corp. v. Dep't of Educ., 93 Hawaii 155, 167, 997 P.2d 567, 569 (2000) (citation and quotation signals omitted), Plaintiffs have pled facts to support this claim. Summary judgment on this claim would be premature at this time.
e. Count VIIspoliation of evidence
During the October 29, 2007 hearing, Plaintiffs' counsel agreed that this claim is not presently pled with sufficient particularity. Thus, the court DISMISSES this claim without prejudice.
f Count VIIIcontempt of court
During the October 29, 2007 hearing, Plaintiffs' counsel agreed that this claim should be dismissed. Accordingly, the court DISMISSES this claim without prejudice.
V. CONCLUSION
For the reasons stated above, Defendants' Motions to Dismiss and/or for Summary Judgment are DENIED.
As a result of the court's ruling, the following claims against Defendants remain: Fraudulent Conveyance Under HRS ch. 651C; Civil Conspiracy to Defraud; Common Law Fraudulent Transfer; Constructive and/or Resulting Trust and/or Equitable Lien; Injunction Against *1206 Further Disposition of the Hawaii Property; and Appointment of Receiver.
IT IS SO ORDERED.
NOTES
[1] Where appropriate, the court cites to both the Amended Complaint and the evidence submitted by the parties. In making the Fed. R.Civ.P. 9(b) determination, the court relies on only the allegations of the Amended Complaint. See Vess v. Ciba-Geigy Corp. USA, 317 F.3d 1097, 1107 (9th Cir.2003) (noting that a motion to dismiss for failure to plead with particularity is the functional equivalent of a motion to dismiss under Fed.R.Civ.P. 12(b)(6)).
[2] Martl filed a Motion for Preliminary Injunction on August 6, 2007, and the court denies this motion by separate order filed concurrently herewith. In their response to Martl's Motion for Summary Judgment, Plaintiffs adopted by reference their Response to Martl's Motion for Preliminary Injunction, Declaration, and Exhibits.
[3] Milgroom's motion fails to comply with the Local Rules for filing a motion for summary judgment. See Local Rule ("LR") 56.1(a) (requiring that a motion for summary judgment be accompanied by a supporting memorandum and a separate concise statement detailing each material fact as to which the movant believes there are no genuine issues to be tried). While Milgroom is appearing pro se, he is also a disbarred attorney, Pls.' Prelim. Inj. Opp'n Ex. 3, and should know the proper court procedures. Because Milgroom argues that the Amended Complaint should be dismissed and/or that summary judgment is appropriate for those reasons raised by Martl, the court can nonetheless determine these motions on the merits without requiring refiling. Milgroom is cautioned that he must follow the Local Rules in the future.
[4] HUFTA further provides that in determining the "intent" element of (a)(1), the following non-exclusive factors may be considered:
(1) The transfer or obligation was to an insider;
(2) The debtor had retained possession or control of the property transferred after the transfer;
(3) The transfer or obligation was disclosed or concealed;
(4) Before the transfer was made or obligation was incurred, the debtor was sued or threatened with suit;
(5) The transfer was of substantially all the debtor's assets;
(6) The debtor had absconded;
(7) The debtor had removed or concealed assets;
(8) The value of the consideration received by the debtor was reasonably equivalent to the value of the asset transferred or the amount of the obligation incurred;
(9) The debtor was insolvent or became insolvent shortly after the transfer was made or the obligation was incurred;
(10) The transfer had occurred shortly before or shortly after a substantial debt was incurred; and
(11) The debtor had transferred the essential assets of the business to a lienor who had transferred the assets to an insider of the debtor.
HRS § 651C-4(b).
[5] HUFTA further provides that transfers under § 651C-4(a)(2) or § 651 C-5 will not be voidable "if the transfer results from (1) Termination of a lease upon default by the debtor when the termination is pursuant to the lease and applicable law; or' (2) Enforcement of a security interest in compliance with Article 9 of the Uniform Commercial Code." HRS § 651C-8(e).
[6] At the October 29, 2007 hearing, Plaintiffs' counsel represented that they were relying on HRS §§ 651C-4(a)(1), 51C-4(a)(2)(b), and 651C-5(a) for their HUFTA claim.
[7] Milgroom argues that because a Special Master in the Massachusetts Action found in his favor in 1994 and from 1994-2005 the Massachusetts Action was relatively inactive, he had the right to make the Hawaii Property transfer. The court addresses this argument in depth in denying the motions for summary judgment, and does not weigh facts outside of the complaint in denying the motions to dismiss.
[8] In support of her argument, Martl relies on evidence outside of the Amended Complaint. Accordingly, the court treats this argument as one for summary judgment, and not a motion to dismiss.
[9] Like HRS § 651C-4(a)(1), HRS §§ 651C-4(a)(2)(B) and 651C-5(a) do not require the knowledge/intent of the transferee as a part of a HUFTA claim.
[10] Because Martl's intent/knowledge is not a necessary element of Plaintiffs' HUFTA claim, the court addresses only the knowledge/intent of Milgroom here.
[11] During the October 29, 2007 hearing, Plaintiffs' counsel stated that Plaintiffs intended to amend the Amended Complaint to specifically allege that Defendants created the tenancy to defraud creditors.
[12] The court also notes that Defendants purchased the Hawaii Property just two weeks after a Massachusetts court in D'Ambrosio et al. v. Milgroom et al., docket number 020003, denied Milgroom's motion to dismiss. Pls.' Ex. X, ¶ 9. In D'Ambrosio et al. v. Milgroom et al., the D'Ambrosio plaintiffs allege that Milgroom improperly transferred his wife's funds before her death. It appears that Defendants filed for divorce one month after the D'Ambrosio court ordered Milgroom to post a $900,000 bond. Id. ¶ 47.
[13] Plaintiffs also submitted evidence calling into question several of Martl's statements in her Declaration, and argue that `the Martl Declaration should be disregarded due to these misrepresentations and/or omissions. For example, Martl claims that the "funds used to purchase the Hawaii Property were solely my own," Martl Decl. ¶ 4, but Plaintiffs have submitted evidence showing that Milgroom transferred the funds to purchase the Hawaii Property. Ueno Decl. ¶ 17. Martl further states that the funds used to purchase the Hawaii Property were from her interest in her real estate business before she met Milgroom, Martl. Decl. ¶ 13, but Plaintiffs have submitted evidence showing that Milgroom was a shareholder and owner of both these companies. Pls.' Ex. 6. As Plaintiffs submit ted evidence raising the factual issue of Martl's knowledge, the court need not determine Plaintiffs' request for the court to disregard Martl Declaration.
[14] To the extent Plaintiffs allege that Defendants conspired to defraud Plaintiffs by transferring "other property," such allegation does not meet Rule 9(b) requirements, and no underlying tort regarding any other property is alleged. See Am. Compl. ¶ 72 (alleging that Defendants "engaged in a scheme to perform overt acts, which intended to defraud and, in fact, succeeded in defrauding the Valvanis Family . . . by transferring the Hawaii Property, cash, and other property to Martl beyond the reach of Milgroom's creditors.").
[15] Martl raised no arguments for summary judgment of the Constructive and/or Resulting Trust and/or Equitable Lien Claim beyond that Plaintiffs have failed to adequately plead their fraud claims. Accordingly, the court does not re-address those arguments.
|
#ifndef HcalQIEDataHandler_h
#define HcalQIEDataHandler_h
// Radek Ofierzynski, 27.02.2008
#include <string>
#include <iostream>
#include <typeinfo>
#include <fstream>
#include "FWCore/Framework/interface/MakerMacros.h"
#include "CondCore/PopCon/interface/PopConSourceHandler.h"
#include "FWCore/Framework/interface/ESHandle.h"
#include "FWCore/Framework/interface/Event.h"
#include "DataFormats/Common/interface/Handle.h"
#include "FWCore/Framework/interface/EventSetup.h"
// user include files
#include "CondFormats/HcalObjects/interface/HcalQIEData.h"
#include "CondFormats/DataRecord/interface/HcalQIEDataRcd.h"
#include "CalibCalorimetry/HcalAlgos/interface/HcalDbASCIIIO.h"
class HcalQIEDataHandler : public popcon::PopConSourceHandler<HcalQIEData> {
public:
void getNewObjects() override;
std::string id() const override { return m_name; }
~HcalQIEDataHandler() override;
HcalQIEDataHandler(edm::ParameterSet const&);
void initObject(HcalQIEData*);
private:
unsigned int sinceTime;
edm::FileInPath fFile;
HcalQIEData* myDBObject;
std::string m_name;
};
#endif
|
Chad Lawhorn
For once, there is a promising Internet deal that doesn’t involve my credit card and chocolatebuytheton.com. Instead, there’s an Internet deal brewing at Lawrence City Hall that may pay immediate dividends for large Internet users in the city, and eventually may benefit regular Web surfers as well.
Lawrence City Hall officials are close to inking a deal with Wichita-based Kansas Fiber Network that will allow the company to lease unused portions of city-owned fiber optic cables. Those cables will be used to begin offering ultra high speed service to educational institutions, health care firms and other large users of broadband services.
Think of Kansas Fiber Network as kind of a wholesaler of Internet and broadband services. It wants to deal with large customers that are looking to buy business class Internet service. Think of universities, school districts, hospitals and businesses that push a lot of information through the Internet.
“We think there are probably 100 to 150 of those types of customers we hope to serve in Lawrence,” said Steven Dorf, president of Kansas Fiber Network.
But where it may get exciting for regular old Internet users who are simply trying to buy the weekend pallet of Hershey’s bars is that one of the types of customers Kansas Fiber Network sells to is Internet Service Providers. That means a new startup Internet service provider could buy wholesale from Kansas Fiber Network and then start selling to residential and small-business customers much easier than trying to build a network entirely on its own.
“We hope that is a likely scenario in Lawrence,” Dorf said. “In other markets we have served, that has been the case. We think we’ll be good for the residential customer because we ultimately enable competition.”
The idea of providing wholesale service is a bit similar to what leaders at Lawrence-based Wicked Broadband had proposed to City Hall, although Wicked also wanted to be in the retail business by selling to residential and small business customers too. A key difference here, though, is that Kansas Fiber Network is not asking for any city incentives. It is seeking to rent the unused fiber from the city at the standard rate the City Commission previously set as part of its new fiber use policy. As currently proposed, the company would pay the city just under $17,000 a year to lease 12 strands of unused fiber in the city’s fiber ring, which runs along most of the major arterial streets in Lawrence.
Dorf said service provided by Kansas Fiber Network will be capable of providing Internet upload and download speeds of 1 gigabit and more. He said the company’s network is actually designed for up to 100 gigabits, although he said there aren’t many business customers that need that type of speed today.
It will be interesting to see if new Internet service providers enter the Lawrence market as a result of this deal. The idea of startup ISPs certainly isn’t as novel as it used to be. As we’ve reported multiple times, Baldwin City-based RG Fiber has committed to providing gigabit service to both Baldwin City and Eudora. We recently reported that RG has begun burying fiber as part of that project, and Baker University is set to become a gigabit campus by the next school year. RG has said it wants to provide service to Lawrence, but the Baldwin City and Eudora projects are ahead of Lawrence, in part because the previous Lawrence City Commission struggled with creating policies for leasing its unused fiber.
As a result, Lawrence is behind the pace of several other communities. One that I recently learned of is a multimillion dollar project in Emporia. A group of local investors there has spent about $12 million bringing a high speed fiber network to the city, according to an article in the Emporia Gazette. According to the article there have been no incentives or tax breaks given to the company. And unlike what had been proposed in Lawrence, this isn’t a pilot project. According to the February article, enough fiber cable had been installed to reach 65 percent of all houses in Emporia. By the end of this year, the company expects to reach 85 percent of all homes.
It is odd to think how new the idea of gigabit Internet service was when Google Fiber announced in 2011 plans to make Kansas City its first market for the new service. Now, places like Baldwin City, Eudora and Emporia are going to have it on a wide scale before Lawrence does.
As for the Kansas Fiber Network project, commissioners are scheduled to approve the lease agreement at their meeting tonight. Dorf said he believes the company can start hooking up new businesses and wholesale accounts in about 90 days. The company already owns some private fiber in Lawrence and likely will be installing more as part of the project.
Kansas Fiber Network is owned by a consortium of 29 independent telephone companies that operate in Kansas. The group created Kansas Fiber Network about five years ago with the idea of providing needed fiber services to rural areas. It now has plans to expand into larger communities, Dorf said. He said Lawrence is part of a group of about 20 towns that it currently is eyeing for expansion.
In other news and notes from around town:
• Get ready for a new twist in the Ninth Street arts corridor project. City commissioners at their meeting tonight are set to receive an update on the planning for that project, which will run from about Massachusetts Street to the Warehouse Arts District in East Lawrence. Commissioners, though, will get more than an update. They’ll also get a letter with nearly 140 signatures asking the commission to do more to involve East Lawrence residents and local artists.
The letter has several specific requests. They include:
• The East Lawrence Neighborhood Association should be part of the formal review and approval process for any public art project planned for the corridor. The letter states this would be consistent with how other public art projects in the neighborhood have happened. It notes the Hobbs Park mural, the New York School mural and a few others.
• The letter writers are seeking a commitment that at least 50 percent of the public art projects planned for the corridor be led by Lawrence artists. In addition, the group wants one half of that one half to be led by artists who live in the East Lawrence district. Plus, the letter writers want a requirement that all of the art projects planned for the corridor include at least one paid assistant who is a Lawrence artist.
“This will be great experience and training for our local artists and will give lead artists who are not from Lawrence essential insights into the place they are working,” the letter reads.
• The group is wanting the city to create a zoning device called a “conservation overlay district” for the arts corridor. That basically means the city would create a specific zoning district for the corridor, and that district would have regulations tailored specifically for the corridor. The city has used the method in the past when it has felt an area is unique enough to require specific regulations rather than the general ones found in the city’s standard zoning code.
We’ll see how this all plays out. It is worth remembering that this isn’t entirely a City Hall project. The Lawrence Arts Center has secured a $500,000 grant that will be used to fund a lot of the art work for the corridor. But the city does hold about a $3 million hammer. To make the project successful, the street needs to be rebuilt, and that will occur with city tax dollars. The current estimate is about $3 million.
On its face, you would not think adding art to a neighborhood — especially one that loves art as much as East Lawrence — would be this hard. But there continues to be concern from various East Lawrence residents and others that the arts corridor is going to become more of a linear entertainment and commercial district that connects downtown and the East Lawrence Warehouse Arts District. City officials have worked to assure residents that what they really are trying to create is more of a linear park infused with art.
This project seems to be a prime example of how certain residents really have a distrust of City Hall. It has been a rough couple of years in the trust-building department for city government, and city commissioners have acknowledged that.
Art can be beautiful in many ways. If this project somehow can be maneuvered to rebuild trust, that would rank right up there on beautiful Lawrence sights.
• Just like art, the beauty of a yard is in the eye of the beholder. You know some of you see dandelions while others of us see beautiful yellow flowers. Some of you see a car on blocks, and others see a visit from our Missouri cousins. I have a feeling we’re going to spend some time talking about the eye of the beholder at tonight’s City Commission meeting.
Commissioners are receiving an update from staff about the property at 1145 Pennsylvania St. City code inspectors say they’re ready to take the property owners — Nick Brown and Shannon Gorres — to court to resolve issues involving storage of materials in the property’s yard and in the city rights-of-way.
I’ve received an email that is going around town urging people to show up at tonight’s City Commission meeting to protest the city’s potential action against the property, which operates as the Cosmic Beauty School. Its website touts it as a venture that promotes urban agriculture, holistic lifestyles and sustainability.
Several folks appear to be upset that the city is not recognizing that this property is really an “urban farm” and the storage that is on the property is just normal in a farm setting. City inspectors, though, note that technically the property is zoned for residential uses. It has been operating under a grandfather clause for years because the property — which used to be the home of Freeman Used Furniture — has a history of commercial uses dating back to the early 1900s.
Planning officials have supported allowing the property to continue to operate under a grandfather clause, but I don’t believe city officials thought this newest business venture would include as much outdoor storage as exists today. The city has received a complaint from a neighbor.
City officials have noted that in a 2009 application to extend the grandfathered commercial use of the property, the project was described not as an urban farm but as a “Holistic Health Management Service.” The application included a statement from the owners that “noise or external visual disturbances should be minimal.”
• A quick bit of housekeeping: Town Talk will take a one day break tomorrow to give me time to unload the chocolate truck, or something like that. |
Previously we've only been able to watch beer bikes in passing envy. But, now Dallas is slated to get its very own roving, 16-seater, pedal-powered, mobile pub. And, yes, it's amazingly already received the green light from the City of Dallas.
"My partner and I first saw one in Houston and we both immediately started making plans to get one in Dallas," says Gloria Flores, co-owner of The Buzz Bike. "Just last month we had a hearing and it got approved. Now we're just sorting out a few other details and we hope to launch in October."
Flores says there are several bike paths already planned out, all of which have been approved by Dallas city-engineers "turn by turn." Most of the routes start in the West End; one goes to the Arts District, another downtown along Main and Commerce and another to the Victory Plaza area.
There's also an Uptown route along McKinney. For all of these routes, which last either one or two hours, they'll have some predetermined stops.
"We don't have the exact places worked out, but we'll be working on finding the best bars to stop at over the next month," says Flores.
The bike is outfitted with six-barstool seats on each side, with pedals underneath. There's also a bench for several people in the back and then one person can stand inside the "bar" in the middle of the bike. Buzz Bikes provides the driver.
The Buzz Bike is BYOB - beer and wine only, no hard liquor. There are a few other rules and some waivers to sign, things that deal with glass, helmets, proper pedaling and staying in your seat. Watch their website for updates. Flores hopes to start taking reservations in the next few weeks. |
Differences in phosphate metabolite levels in drug-sensitive and -resistant human breast cancer cell lines determined by 31P magnetic resonance spectroscopy.
31P magnetic resonance spectra of perfused human breast cancer cells with the phenotype of pleiotropic drug resistance exhibit striking differences in the levels of phosphate metabolites from the wild-type, drug-sensitive parent cell line. Resistant cells demonstrated elevated levels of phosphocreatine and depressed levels of phosphomonoesters, phosphodiesters, and diphosphodiesters. These differences may reflect significant alterations in the control of bioenergetic metabolism between drug-resistant and -sensitive cells. |
Nov. 19, 2013
Loading Photo Galleries ...
Written by
The Tennessean
Oyster Dressing from Puckett's Boat House. / Amy Whidby
Bourbon Cranberry Relish at the Loveless Cafe. / Submitted by the Loveless Cafe
Catering options
Another option for those who want the traditional Thanksgiving food without all the prep is to have it catered. Here are some local options for catering: Perl Cafe
Menu: Turkey, pork loin, beef brisket pot roast or leg of lamb with sides and dessert. Cost: $175 for package of one entree, one salad, two sides, a dozen rolls or biscuits and one dessert; $60-$65 for entree, $25-$45 for sides, $25 for dessert Deadline: 3 p.m. Saturday Contact: 615-646-1390 Puckett’s Boat House
Menu: Entrees include Vegetable Pot Pie, Tempeh or Tofu Tetrazzini and Salisbury Seitan with Mushroom Gravy. Guests also can get such dishes as Organic Cornbread Mushroom Stuffing, Curried Pumpkin Soup, pumpkin cheesecake and more. Cost: Entrees are $70, feeding up to 10. Sides range from $4 for a small serving to $100 for a full pan. Deadline: Monday Contact:Laura@sunflowercafenashville.com
More
ADVERTISEMENT
For many the Thanksgiving feast is the most important meal of the year. Family and friends come together to celebrate food and blessings. Often, guests divvy up the menu — someone prepares the turkey, while others whip up side dishes and desserts.
But not all families look forward to that kind of gathering. For some the holiday tradition means dining out.
“There are a lot more people who eat out on Thanksgiving than I ever anticipated would eat out,” said Pam Anderson of Smithville, who spends every other Thanksgiving dining out with her husband and parents.
The couples spend the holiday meal outside the home when Anderson’s sister’s family goes to the in-laws for the holidays.
“We like to come together, and if everyone can’t be there, it’s just as fun to go out and not have to prep and cook,” she said. “We can put that effort into some other time later in the holidays.”
Over the past 12 years, Anderson has eaten Thanksgiving meals everywhere from The Inn at Evins Mill in Smithville to Cracker Barrel, which is where Ed and Peggy Forbes of Hendersonville spend the holiday each year.
“They have a nice Thanksgiving meal,” Ed Forbes said. “It’s not a matter of getting on the interstate and going somewhere. It’s an easy, relaxing day. No reservations or anything. We just do what we want to do.”
Members of Forbes’ family are spread all over the country.
“I usually work the day before and the day after (Thanksgiving), so it makes going out of town and hooking up with family members hard,” he said.
'Business as usual'
Thanksgiving is special in a different way for George Harvell, senior pitmaster at The Loveless Cafe.
“I just can’t tell you how joyful it makes us to feed people and serve them and give a taste of maybe something they remember from days gone by, or maybe something they’ve never had before,” Harvell said.
The restaurant, which is open on Thanksgiving Day and caters for the holiday as well, began preparing at the beginning of the month. Fifty 22-pound fresh turkeys have been ordered, and Harvell already has created his signature Orange Bourbon Cranberry Relish.
While most people are sleeping next week, chef Tony Marchesi will be spending his time roasting the turkeys and cooking dressing in the off hours in the Loveless Barn kitchen.
“In the cafe, we’re still business as usual,” Harvell said. “Being such a busy restaurant, it’s pretty much life as usual until the day.”
But when the day comes — when all 50 of those turkeys have been served and enjoyed by diners and to-go customers — it’s business as usual in the Loveless kitchen.
“It’s never chaotic but always just very, very busy,” Harvell said. “I would not say it is any more hectic than usual. In fact it may be less hectic because so many people order the same thing. You don’t want many of the other items we offer — you want turkey.”
And they want the turkey without the hassle.
“Of course the biggest (benefit of dining out) is you don’t have that pile of dishes to clean up,” Anderson said.
And while there are things to be missed by spending the holiday out — “you don’t have any leftovers,” Forbes said — restaurants aim to make diners feel at home.
“Southern hospitality is a very real thing,” Harvell said. “It’s not some phoney little thing where we put on a face. A lot of us feel so blessed to serve folks.”
Orange Bourbon Cranberry Relish
2. Sort the fresh cranberries to remove all unripe or bruised berries. Spread cranberries evenly on a large baking sheet and sprinkle the cinnamon evenly over the top. Follow with the granulated sugar and then the orange zest. Slice the zested orange into four slices and lay over the berries.
3. Bake until the berries swell and pop, approximately 30-45 minutes.
4. Remove from the oven and squeeze the juice from the orange slices and discard them. Mix the berries well before drizzling the bourbon over the top.
5. Return to the oven for another 30 minutes. Remove and let cool.
This cranberry relish will keep for weeks refrigerated. Add more or less bourbon depending on your flavor preference. |
Introduction {#Sec1}
============
Fatigue is a multifaceted phenomenon^[@CR1]^, referring to an inhibiting feeling during a sustained task coincident with the body requiring a resting period for recovery. Regulatory processes in the nervous system can emerge even without self-awareness of fatigue^[@CR2]^. This unconscious regulation may involve significant reduction in performance during sustained mental or physical activities. Consequently, objective assessment of fatigue is an important issue, especially in human factors.
Today, a growing number of tasks involve human-computer interaction. In addition, the extension of working life is a major challenge in terms of elevated human error^[@CR3]--[@CR5]^, and health risks linked to stress and anxiety^[@CR6]^. Fatigue development in sedentary computer work may be exacerbated by mental demands^[@CR7]^. Research often shows that fatigue can be avoided by imposing appropriate work-pause/break regimes^[@CR3],[@CR8]^. Thus, to implement an effective pausing regime at work, objective measures to track down the development of fatigue would be required. So far, several psychophysiological modalities, e.g. eye tracking^[@CR9]^, neural signals and imaging^[@CR10],[@CR11]^, and cardiac rhythms^[@CR10]^, have been investigated during recent years to fulfil this aim.
Eye movement characteristics provide indirect access to cognitive processes, e.g. decision making^[@CR12]^, attention^[@CR13]^, and memory^[@CR14]^. Particularly, the ocular events, e.g. saccades, blinks, fixations, and pupillary responses, involve different neural circuitries in connection with visuomotor information processing^[@CR15]^. A number of studies^[@CR9],[@CR16],[@CR17]^ have suggested that saccade peak velocity (SPV), saccade duration (SCD), fixation duration (FD), blink duration (BD), blink frequency (BF), and pupil dilation range (PDR) may be sensitive to mental load variation and fatigue (Table [1](#Tab1){ref-type="table"} presents definitions of the terms).Table 1The operational definitions^[@CR76]^ used to compute the oculometrics.OculometricsAbbreviation (unit)Ocular event attributionOperational definition (computation method)Saccade Peak VelocitySPV (°/s)SaccadeMaximum of gaze velocity during a saccadeSaccade DurationSCD^a^ (s)SaccadeNumber of samples of a saccade divided by the sampling frequency^b^Fixation DurationFD (s)FixationNumber of samples of a fixation divided by the sampling frequencyBlink DurationBD (s)BlinkNumber of samples of a blink divided by the sampling frequencyBlink FrequencyBF (Hz)BlinkNumber of blink occurrences during a cycle^c^ divided by the duration of a cyclePupil Dilation RangePDR (cm)Pupillary responseThe range of change in pupil dilation^a^The saccade duration was abbreviated here as SCD, not to be confused with the standard deviation (*SD*). ^b^The sampling frequency in this study was 360 Hz. ^c^The cycle is described in the method section.
Saccade has been identified as a relevant ocular event to study fatigue. In a two-hour virtual simulation of a driving task^[@CR18]^, both the duration and peak velocity of saccades decreased with time-on-task (TOT). Saccade peak velocity decreased with increasing TOT in a computer task involving a complex decision making process^[@CR19]^, and in an air traffic control task^[@CR9]^. Eye blink has been shown to be an informative ocular event enabling tracking of fatigue^[@CR20]^. The duration and frequency of blinks were sensitive to change in mental load and fatigue levels^[@CR17],[@CR21]^. Furthermore, pupillary responses were reported to be changed with TOT in a 2-back task^[@CR22]^.
A key component in fatigue development is the duration of TOT, which can be specified based on the processing load of a mental task. For example, even in a seemingly short TOT (20 min) of performing a simple reaction time task (psychomotor vigilance test), significant increase in fatigue and decrease in performance were reported^[@CR23]^. In addition, in a visual tracking task^[@CR24]^ the performance of participants reduced significantly around 35 min after the onset of the task. Of note, this decrease in performance correlated with blinking and fixation-based oculometrics.
In the elderly population, fatigue and its cognitive components^[@CR25]^ are less studied^[@CR26]^. In addition, little is known about age-related differences in the oculometrics in response to increasing TOT. Longer BD and higher BF were observed due to physiological changes in eyelid structures and eye muscle fibre types^[@CR27]^ in the process of aging. However, another study failed to observe such a difference in BF between young and elderly individuals^[@CR28]^. Nonetheless, evidence suggest that aging *per se* leads to a decline in cognitive functioning^[@CR29]^, most likely reflected in oculometrics.
We hypothesized that a prolonged mentally demanding task leading to fatigue development would be reflected in oculometrics. Particularly, we hypothesized that such alterations due to fatigue would be markedly prevalent in the elderly^[@CR29]--[@CR31]^. This study assessed the changes in blinks, saccades, fixations, and pupillary responses during TOT in a well-studied model of computer work involving various cognitive processes, e.g. memorization, verbal perception, recall, decision-making, attention, visual search, and eye-hand coordination.
Results {#Sec2}
=======
Oculometrics {#Sec3}
------------
In both groups, BD increased with TOT, Fig. [1(a)](#Fig1){ref-type="fig"}, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(6.2,198.6)=2.9,p=0.010,{\eta }_{p}^{2}=0.1$$\end{document}$. No significant difference was found between the groups in BD. In addition, there was no interaction of task segments and groups in BD. The BF also increased with TOT in the young and elderly groups, Fig. [1(b)](#Fig1){ref-type="fig"}. $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(3.7,118.9)=$$\end{document}$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$3.0,p=0.023,{\eta }_{{\rm{p}}}^{{\rm{2}}}=0.1$$\end{document}$. No significant difference was found between the young and elderly groups neither were there an interaction between the groups and the task segments. Post-hoc comparisons revealed that the changes in both BD and BF were significant between the first and the 11^th^ segments.Figure 1Illustration of the effect of time-on-task on the oculometrics (**a**--**f**) task performance (**h**) and fatigue ratings (**g**) (Mean and SD) in the young (black fill) and elderly group (white fill). The significant main effect of age is indicated by "\*", *p* \< 0.05.
As illustrated in Fig. [1(d)](#Fig1){ref-type="fig"}, PDR increased with TOT in the young and elderly groups, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(5.6,179.8)=$$\end{document}$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$3.0,p=0.009,{\eta }_{p}^{2}=0.1$$\end{document}$. No significant difference was found between age groups in PDR, neither an interaction between the groups and task segments. The significant differences were between the first segment and the segments of three, five, eight, and nine.
FD was affected by the TOT, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(6.3,201.1)=2.5,p=0.019,{\eta }_{{\rm{p}}}^{2}=0.1$$\end{document}$; however, no monotonic relationship between TOT and FD was found, Fig. [1(c)](#Fig1){ref-type="fig"}. No interaction was found in FD between the groups and task segments. FD was higher in the elderly group compared with the young one, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(1,32)=14.8,\,p=0.001,\,{\eta }_{p}^{2}=0.3$$\end{document}$. Multiple comparisons revealed that there was a significant increase in FD from the first to the third segment among the elderly group.
SPV decreased with TOT in both groups, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(11,352)=4.6,p < 0.001,{\eta }_{p}^{2}=0.1$$\end{document}$, Fig. [1(f)](#Fig1){ref-type="fig"}. No significant difference was found between groups, neither were there an interaction between the groups and task segments. There were significant changes from the first segment to the segments of 3--5, seven, eight, 10, and 11 according to the post-hoc comparisons. There was a main effect of TOT on SCD in both groups, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(4.8,153.1)=4.0,$$\end{document}$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$p=0.002,{\eta }_{{\rm{p}}}^{2}=0.1$$\end{document}$, Fig. [1(e)](#Fig1){ref-type="fig"}. No interaction was found between the task segments and the groups in SCD. The young group had significantly higher SCD compared with the elderly group, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(1,32)=6.8,p=0.014,{\eta }_{{\rm{p}}}^{{\rm{2}}}=0.2$$\end{document}$. There were significant decreases from the first segment to the segments of three, five, and 9--11 in the young group.
The effect of TOT on the oculometrics remained significant even after introducing the averaged OP as a covariate to the statistical model. However, there were interactions between averaged OP and TOT in SCD, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(5.0,156.6)=$$\end{document}$ $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$2.8,\,p=0.019,\,{\eta }_{p}^{2}=0.1$$\end{document}$ and between averaged OP and TOT in SPV, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(11,341)=70.7,$$\end{document}$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$p=0.022,\,{\eta }_{p}^{2}=0.1$$\end{document}$.
Task performance {#Sec4}
----------------
The overall performance (OP, see Methods) increased with TOT in the elderly group and had a fluctuating trend in the young one with an initial growth, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(11,352)=4.3,p < 0.001,{\eta }_{{\rm{p}}}^{2}=0.1$$\end{document}$, Fig. [1(h)](#Fig1){ref-type="fig"}. There was no interaction between the groups and the task segments. OP was higher in the young group than the elderly group, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(1,32)=3.0,p < 0.001,{\eta }_{{\rm{p}}}^{{\rm{2}}}=0.5$$\end{document}$. OP was significantly higher in segments 10--12 compared with segment one in the elderly group. No significant differences in OP between segments were found in the young group.
Subjective ratings {#Sec5}
------------------
The self-reported measures of fatigue, i.e. Karolinska Sleepiness Scale (KSS)^[@CR32]^, increased with TOT in both the young and elderly groups as illustrated in Fig. [1(g)](#Fig1){ref-type="fig"}, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$F(1.9,65.4)=8.4,p=0.001,{\eta }_{p}^{2}=0.2$$\end{document}$. No significant difference was found between the groups in KSS, neither were there an interaction between the task segments and groups. There were significant increases from segment one to the segments 7--12, from segment two to segment 7--12, from segment three to segment 8--12, from segment four to segment 7--12, from the segment five to segment 8--12 and, from segment six to segment 11. The effect of TOT on KSS remained significant after the adjustment for averaged OP. The results from National Aeronautics and Space Administration Task Load Index (NASA-TLX) questionnaire^[@CR33]^ also confirmed that the participants have perceived the fatigue block (see Methods) mentally and temporally demanding, Fig. [2](#Fig2){ref-type="fig"}.Figure 2The radar chart of NASA-TLX scores for each workload subscale, i.e. MD: Mental Demand, PD: Physical Demand, FR: Frustration, EF: Effort, PF: Performance, and TD: Temporal Demand, in the young and elderly groups. After the fatigue block, the NASA-TLX was administered to specify the contribution of each workload subscale the participants perceived during the fatigue block. Both of the groups have found the task mentally and temporally demanding and not physically demanding.
Discussion {#Sec6}
==========
In the present work, the effects of a prolonged mentally demanding computer task on the oculometrics were investigated in both young and elderly individuals to address the role of aging in fatigue development during a functional task. As hypothesized, the blinking (BD and BF), fixation-based (FD), pupillary (PDR), and saccadic (SCD and SPV) oculometrics significantly changed with the progression of TOT in both groups, reflecting changes in the oculomotor control in response to sustained mental demands. Interestingly and contrary to our second hypothesis, the pattern of changes in oculometrics over time were quite similar in the young and elderly groups, suggesting that the underlying oculomotor control strategies used for the execution of the prolonged mentally demanding computer task were not remarkably affected by the aging process. This opens important perspectives for online feedback systems based on oculometrics.
The spontaneous blinks are known to be evoked to lubricate the surface of the cornea and conjunctiva. The blinking oculometrics, BD and BF, increased in both the young and the elderly group as TOT increased. These results are in agreement with previous findings on blinking in relation to fatigue^[@CR17],[@CR34],[@CR35]^. The change in BF has been related to alterations in vigilance^[@CR36]^ or arousal level^[@CR37]^. The gradual loss of vigilance in sustained attentional tasks is usually accompanied by the co-occurrence of longer duration and higher rate of blinks^[@CR38]^. The increase in BF can be described as the deactivation of blink inhibition as attentional resources decrease with fatigue development^[@CR39]^. Prolonged BD may also be explained by changes in neural activation level of blink motoneurons in retractor bulbi and orbicularis oculi as fatigue progresses^[@CR39],[@CR40]^. Thus, the co-occurrence of increased BF and BD most likely indicate fatigue development. The changes in the kinematics of blinks have shown that although amplitude and peak velocity of blinks change due to aging, blink rate may not change^[@CR41]^. This may explain why no significant difference between the young and elderly groups was observed in BF.
The saccadic oculometrics, SPV and SCD, significantly decreased as TOT progressed in both groups. This is in accordance with previous findings^[@CR9],[@CR42],[@CR43]^. The SCD and SPV followed a similar trend with TOT, which was expected due to the stereotyped linear relationship between the two parameters^[@CR18],[@CR44]^. In this study, no significant difference was found between the young and elderly groups in SPV in agreement with some studies^[@CR45]--[@CR47]^. However, other studies^[@CR28],[@CR48]^ have reported significant changes in saccadic eye movement characteristics due to aging. This can probably be explained by the fact that the computer task did not require saccade amplitude exceeding 20° ^[@CR48]^. As some studies have suggested, elderly individuals have, compared with young adults, a higher tendency to move their head simultaneously with their eyes towards the visual stimulus during saccadic movements. Thus, to reach target points, elderly individuals are likely to make shorter saccades compared with young adults and compensate for the deficit by head movements^[@CR49]^. The reduction of SCD and SPV across the task segments was not temporally aligned for individuals with high and low averaged OP, resulting in a significant interaction of averaged OP and TOT.
Fixations were also affected by the TOT in both the young and the elderly group. No monotonic pattern with increasing TOT was found, consistent with previous findings^[@CR50]^. However, if the fixation duration is segmented into three classes of short (\<150 ms), medium (\<900 ms and \>150 ms), and long (\>900 ms), the duration of medium-length fixations increased with fatigue development in both the young and the elderly group. Some studies suggest that the medium-length fixations are associated with cognitive processing^[@CR39]^. The higher FD in the elderly group compared with the young group could be explained by the decline in visual search efficacy due to aging^[@CR51]^. In the elderly group, this may be an indicator of increased attentional efforts due to a decline in cognitive performance and working memory capacity, as suggested previously^[@CR52]^.
In this study, PDR was found to increase as TOT increased for both groups. This is also in agreement with recent studies reporting an association between pupillary responses and fatigue development^[@CR22],[@CR53]^. In sum, this supports the decline in perceptual performance with TOT, as pupil dilation increases in response to increased mental effort^[@CR54],[@CR55]^.
Co-occurring changes in the oculometrics, i.e. a decrease in SPV together with an increase in PDR with TOT, have also been reported as a result of increase in mental load^[@CR16]^. In addition, saccades and fixations having originated from distinct neural control circuits^[@CR56]^, as well as the co-occurred changes in saccadic and fixation-based oculometrics found in the current study, may support that the fatigue development modulates activations in both of the distinct neural circuits. It thus suggests studying the similarity of sustained mental load and increasing mental demands of a task on oculomotor control strategies.
The effect of TOT on OP was observed in both groups. OP followed a fluctuating trend in the young and an increasing trend in the elderly group. It was higher in the young group than in the elderly group, most likely due to the loss of motor control efficacy with aging^[@CR47],[@CR57]^, especially in computer tasks^[@CR58]^. The performance during a mental task is not always expected to reduce with TOT^[@CR59]^ as a compensatory mechanism may increase the allocated cognitive capacity to perform the task^[@CR60]^. After adjusting the statistical model for the averaged OP, the main effect of TOT on the oculometrics and KSS remained significant, suggesting that the effect of TOT on the oculometrics and KSS was not mediated by the averaged OP.
Subjective ratings of fatigue, KSS, revealed that both groups perceived increasing levels of fatigue as TOT increased. Even though computer work may also involve physical demands, our results showed an association of fatigue development with mental demands and not with physical demands of computer work based on the subjective ratings of NASA-TLX^[@CR1]^.
In this study, we imposed a specific level of mental demand in a cyclic computer task for 40 min. The repetitive pattern of computer work and an extended TOT were taken into account in the current study design since such specifications during long time may cause chronic or accumulated fatigue^[@CR61],[@CR62]^. In a real-life scenario, a computer user may deal with different work patterns with varying levels of mental demands. Additionally, to allow for comparison of TOT across subjects, the randomly generated patterns were kept identical (See Methods). However, one may conceive that the non-monotonicity of temporal variation of oculometrics was due to the difference in the perceived difficulty of performing the task across the segments. To avoid such an effect, the geometrical features of the patterns were specifically set to keep a consistent level of complexity across the segments. The cognitive processes involved in computer work would also be different from task to task and may, in general, engage visual search, attention, and decision-making to a different extent. Thus, some general features, e.g. work pace, may provide a key factor to investigate the specificity and sensitivity of fatigue biomarkers such as the oculometrics in this study.
In conclusion, the current study investigated the effects of fatigue in a prolonged functional computer task. Despite the differences in SCD and FD between the young and elderly groups, all the oculometrics followed similar patterns of change over time. Compared with the fixation-based metrics, eye blinks, saccades, and pupillary responses revealed stronger relationships with TOT and may therefore be applicable to the tracking of fatigue development. The association of changing characteristics of eye movements with fatigue can potentially provide a quantitative approach to the development of an informed decision on a work-pause regime^[@CR63]^ hampering fatigue.
Methods {#Sec7}
=======
Participants {#Sec8}
------------
Twenty participants, nine females and 11 males, aged 23 (*SD* 3) years old with the height of 1.74 (*SD* 0.08) m, and the body mass of 71 (*SD* 11) kg as a young group and 18 participants, 11 females and seven males, aged 58 (*SD* 7) with the height of 1.72 (*SD* 0.07) m, and the body mass of 80 (*SD* 12) kg as an elderly group were recruited. We had to set aside two young participants and one elderly participant from the study due to poor gaze recording quality. All participants had normal or corrected-to-normal vision (self-reported and examined by Snellen chart). They were familiar with computer work and used their right hand for computer mouse. The Edinburgh Handedness Inventory^[@CR64]^ was administered to assess their handedness i.e. mean laterality index of 74 ± 40. Participants were asked for abstentions from alcohol for 24 h, and caffeine, smoking and drugs for 12 h prior to experimental sessions. The participants reported at least 6 h (mean 7.7 ± 1.1 h) of night sleep before the experimental session. In order to rule out the possibility of including participants suffering from chronic fatigue or eye strain symptoms, Fatigue Assessment Scale (FAS)^[@CR65]^ and Visual Fatigue Scale (VFS)^[@CR66]^ were administered respectively. The FAS includes 10 statements of fatigue and its psychological aspects. Each statement was answered on a 5-point scale (1, never to 5, always), thus the overall FAS score varies between 10 and 50. The VFS involves various symptoms of eyestrain which was rated on their occurrence frequency. The VFS scores ranged from zero to 60, respectively indicating none to all of the symptoms associated with the eyestrain. The resulting FAS and VFS ratings from the participants exhibited no symptom of fatigue-related disorders with 21 (*SD* 2) in FAS, and no eyestrain symptoms with seven (*SD* 5) in VFS. Written informed consent was obtained from each participant. The experiment was approved by The North Denmark Region Committee on Health Research Ethics, project number N-20160023 and conducted in accordance with the Declaration of Helsinki.
Experimental task: A Functional Computer Task {#Sec9}
---------------------------------------------
The task was designed and implemented in MATLAB R2015b (The Mathworks, Natick, MA) based on a standard model of computer work which has been used in previous studies^[@CR67],[@CR68]^. The task was previously shown to be able to impose different levels of mental load^[@CR16]^. The graphic user interface (GUI) of the computer task was displayed on a 19-in screen (1280 × 1024 pixels, refresh rate: 120 Hz) locating approx. 57 cm in front of the participant. The fixed size GUI (subtending approx. 27° horizontal and 22° vertically of visual angle) included a replication and a template panel, Fig. [3](#Fig3){ref-type="fig"}. The square shaped replication and template panel subtended approx. 20° and 5° of visual angle, respectively. The GUI was locked on the centre of the computer screen. The computer screen height was adjusted such that ear-eye line was approx. 15 degrees below the horizon when the participants sat upright and stared at the centre of the screen^[@CR69]^.Figure 3The timeline of fatigue block and the three sections constituting each cycle. The fatigue block included 240 cycles taking about 40 min. After each 20 cycles, a task segment, the participants rated their perceived fatigue on the Karolinska Sleepiness Scale (KSS) while the task execution was paused for five seconds. Each cycle began with the memorization period (I), then continued with the washout period (II), and ended with the replication period (III).
The task consisted of cycles beginning with a memorizing a two dimensional pattern made by a sequence of five randomly-positioned points connected to each other by lines displayed on the template panel. Each point was depicted in a different shape (e.g., circle, square, and triangle) and a textual cue during memorization informed the subjects of the first point determining the order of connecting the points in the pattern. The cycle continued by a washout period during which the pattern disappeared. Meanwhile, the participant had to fixate on a cross, subtended 2° of visual angle, displayed on the centre of replication panel. The computer mouse cursor was invisible during the washout period to avoid any prepositioning. Subsequently, during the replication period, the points without connecting lines appeared on the replication panel, and the participant had to click on the points to replicate the pattern according to their order of succession. The first correct click was recognizable by doubling the point's size; the rest correct clicks were recognizable by the appearance of a connecting line between the currently clicked point and the previous correct one. In addition to the points composing the pattern, a distracting point in a different shape from the constituent points appeared on the replication panel, which had not to be clicked by the participants. When the cycle's period was elapsed, a new cycle with a different pattern appeared. The duration of memorization, washout and replication period were set to be 2.34, 2.34, and 5.06 s, respectively. This corresponded to a medium load setting^[@CR16]^. In this setting, the angles in the patterns made by the five points were \>60°, the distance between points was approximately in the range between 2° to 4° in the pattern presentation panel. In addition, no intersection in the generated patterns was allowed, and the centre of the patterns were aligned to the centre of the presentation panel to avoid perceptual bias across cycles. Even though randomly generated, the patterns were kept identical across participants, not to introduce differences on participant's eye movements due to different patterns.
Procedure {#Sec10}
---------
All experimental sessions were conducted between 10.00--12.00 a.m. and 1.00--3.00 p.m. to minimize the potential influence of circadian rhythm or diurnal variation. The participants were instructed about the task and practiced by performing five short training blocks (5-min) of the task with different levels of mental load as defined in^[@CR16]^. After approx. 10-min rest, the participants were asked to perform the task containing 240 cycles for 40 min. After each 20 cycles, i.e. a task segment, the task execution paused for 5 s while the participants had to indicate their fatigue level on a 9-step Likert of Karolinska Sleepiness Scale (KSS)^[@CR32]^ ranging from 1 to 9 respectively corresponding to "Very alert" and "Very sleepy, fighting sleep". The participants also had to indicate their subjective perception of the mental load by answering the NASA-TLX questionnaire^[@CR33]^ after the termination of the fatigue block. NASA-TLX provides an overall workload score based on a weighted average of ratings on six workload categories (mental demand, physical demand, temporal demand, performance, effort, and frustration). The participants were asked to perform the task as quick and accurate as they could. They were informed that their task performance will be measured and compared with the other participants (incentives on social comparison^[@CR70]^). Furthermore, the participants were informed that the length of the experiment would be reduced and they would get a monetary reward if they persistently got a high task performance. Based on the preliminary results from our pilot studies, and to avoid any confounding factor such as pain and soreness from long time sitting, we chose the 40 min for the length of the TOT in current study.
Data recording and analysis {#Sec11}
---------------------------
A video-based monocular eye-tracker (Eye-Trac 7, Applied Science Laboratories, Bedford, MA, USA) was utilized to measure the eye movements and pupil diameter at a sampling frequency of 360 Hz. As reported by the manufacturer, spatial precision of the eye-tracker is lower than 0.5° of visual angle. The spatial accuracy is less than 2° in the periphery of the visual field. To have an empirical estimate of the accuracy throughout the recording, we calculated the spatial accuracy during the washout period of the task where the subjects were instructed to look at the centre of the replication panel. We found that the average accuracy was 0.7 ± 0.1° across participants and did not change across time (p \> 0.05). The head movements were also tracked in 3-Dimensions using a motion tracker (Visualeyez II system set up with two VZ4000 trackers, Phoenix Technologies Inc., Canada). The data from eye tracker and motion tracker were coupled to compensate for head movements and to precisely estimate the point of gaze (built-in functionality of Eye-Trac 7). The calibration of the eye-tracker was performed before starting the tasks with 9-point calibration protocol. The calibration procedure was repeated if the nominal range of accuracy was not met. The experiments were conducted in an indoor and controlled environment to rule out potential confounding effects due to changes in ambient noise and illumination.
Saccades, blinks, and fixations using an adaptive data-driven algorithm^[@CR71]^ were identified across the entire timeline of the fatigue block. The algorithm initiated by calculating the visual angle between consecutive coordinates of the point of gaze. Afterwards, the angular velocity and acceleration of the visual angle were derived using a second-order Savitzky--Golay filter^[@CR72]^ with a length of 19 samples^[@CR71]^. The saccades were extracted following the velocity and acceleration thresholding^[@CR71]^ together with two additional criteria to detect onset and offset of saccades^[@CR73]^. The two criteria remove the saccades where deviation from the main direction of saccade trajectories deviates from 60° or the change in intra-saccadic direction exceeds 40°.
The pupil diameter was pre-processed as a function of time by linear interpolation to estimate the missing samples during blinks. Then, a zero-phase low-pass Butterworth filter of order 3 was applied to remove the noise and artefacts usually occurring prior or after each blink^[@CR74]^.
Blinks were detected when the pupil was closed for a duration of 50--700 ms. This range has been chosen to include the largest and shortest blinks as suggested by^[@CR73],[@CR75]^. The range also was visually inspected on eye video image frames in 10 subjects. This range includes some blinks which might incorrectly be excluded if we limit the range to e.g. \[100--400\] ms. Noise samples were identified given these criteria: If the duration of closed eyelids (zero-valued samples of pupil dilation) was out of the blink duration range, or corneal reflection was not detected, or the gaze velocity or acceleration were higher than 500°/s and 50000°/s^2^, respectively. Excluding the instances of saccades, blinks, and noise samples, the remaining part of the gaze coordinates were considered as fixations if the duration of the detected fixation was \>30 ms^[@CR76]^. Successive fixations were merged into one fixation where \<5 intra-fixation samples and \<1° of visual dispersion between the preceding and succeeding fixations occurred^[@CR71],[@CR77]^.
Oculometrics {#Sec12}
------------
All the oculometrics in this study are stated in Table [1](#Tab1){ref-type="table"}. PDR was computed to measure pupillary response, since it provides the absolute extent of change in pupil diameter. From saccadic and fixation-based events, the duration of saccades (SCD) and fixations (FD) as well as the peak velocity of saccades (SPV) were computed. Further, we segmented the fixations into three classes of short (\<150 ms), medium (\<900 ms and \>150 ms), and long (\>900 ms) as each class is suggested to reflect different neural activity^[@CR39]^. In addition, BD and BF were computed to capture relevant information of fatigue progression from blinks. Based on the timestamps indicating the onset and offset of the task cycles, the detected ocular events were divided into their corresponding cycles. The cycles with less than five saccades and five fixations (minimum requirement to perform the task) were deemed invalid cycles and excluded from further processing (2 ± 3% of the cycles for each participant and task). The derived metrics were averaged across the valid cycles. To obtain a stable estimate of oculometrics and to span the saccades over a wide range from short saccades in the memorization period to long saccades in the replication period, the whole timeline of a cycle was considered for the calculation of oculometrics.
Task Performance {#Sec13}
----------------
The overall task performance (OP) was computed based on how accurate and fast the pattern replication was done. The ability to keep a set of actions in the face of distracting or competing stimuli^[@CR78],[@CR79]^ was defined as selective attention (SelA). According to Table [2](#Tab2){ref-type="table"}, a customized definition of SelA, and the mean reaction time (MRT) to complete each pattern was employed to compute the task performance. The MRT was divided by its minimum across all participants (i.e., 0.5) to assign the minimum normalized MRT to one. For each cycle, the task performance was computed as the ratio of the SelA to the normalized MRT. The SelA can become one in the highest attentive case when all the pattern points were clicked correctly and descended in low attentiveness. The OP theoretically is a positive value with zero for the lowest performance.Table 2The formula used to compute the task performance for each cycle.FormulaParameters$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$MRT=\{\begin{array}{ll}\frac{{\sum }_{i=1}^{CC}T{I}_{i}}{CC}, & {\rm{Completed}}\,{\rm{pattern}}\\ \frac{{\sum }_{i=1}^{CC}T{I}_{i}+RTRP}{CC+1}, & {\rm{Partially}}\,{\rm{completed}}\,{\rm{pattern}}\\ \mathrm{RP}, & {\rm{No}}\,{\rm{correct}}\,{\rm{clicks}}\end{array}$$\end{document}$*TI*: Time interval between correct clicks (*TI* for the first correct click is computed from the replication period inset time) *CC*: Number of correct clicks*RP*: Replication period*IC*: number of incorrect clicks*PP*: Number of pattern points*DC*: number of clicks on the distracting point$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$SelA=\frac{CC}{IC+PP+DC}$$\end{document}$
Statistics {#Sec14}
----------
The oculometrics (SPV, SCD, FD, PDR), perceived fatigue ratings (KSS), and task performance (OP) were assessed for normality using Kolmogorov--Smirnov tests. We examined the effects of TOT (task segment 1 to 12) as within-subject factor, and the age (young and elderly groups) as between-subject factor, on the oculometrics, task performance, and fatigue ratings using a repeated measures analysis of variance. A Greenhouse-Geisser correction was applied if the assumption of sphericity was not met. The measure of effect size, partial eta-squared, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$${{\rm{\eta }}}_{p}^{2}$$\end{document}$, was also reported. A significant effect of TOT was further examined by post-hoc comparisons of task segments in pairs indicated by Bonferroni correction. Finally, to account for a probable mediating effect of performance on the TOT effect, we introduced averaged OP as the covariate to the statistical model. This was done following the recommendations for applying the analysis of covariance approach to a within-subjects design^[@CR80]^. The statistical analysis was performed in SPSS 24.0. p \< 0.05 was considered significant.
**Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
**Change history**
2/27/2020
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
This project is funded by the Veluxfonden (project number: 00010912).
All authors were involved in the design of the study protocol. R.Z.M. developed the software for the experimental task and the data acquisition. R.Z.M. performed the experiments. R.Z.M. analysed the data. All authors were involved in interpreting the results. R.Z.M. wrote the first draft and all the authors revised the manuscript and approved the final version.
The authors declare no competing interests.
|
10 Great Xbox One Games on Amazon Cyber Monday Deals
The holiday period and especially Cyber Monday is great for picking up video games at excellent prices, and Amazon are offering some excellent deals on Xbox One and crossover titles like Madden NFL 16, Gears of War, NBA 2K16 and The Witcher 3: Wild Hunt.
Gears of War: Ultimate Edition
The Gears of War: Ultimate Edition five chapters of the campaign which were originally exclusively available in the PC version of the game and players who purchased the Ultimate Edition can participate in the multiplayer beta of Gears of War 4. It’s available for $19.99 instead of $39.99.
Forza Motorsport 6
Madden NFL 16
Madden is Madden, the ultimate NFL experience, becoming more realistic and fun to play each year. You can get it for $46.98 instead of $59.99.
NBA 2K16
Sticking with sports, NBA 2k16 is the next chapter in the leading NBA video game franchise, this time with Spike Lee helping bring the story section of the game to a whole new level. It’s available for $49.99 instead of $59.99.
LEGO Jurassic World
Mortal Kombat X
There’s nothing quite like beating your friends up without actually inflicting damage (unless they take video games very very seriously, which a lot of us do). MKX is available for $29.99 instead of $49.99.
Mad Max
The video game of the best action film in years does a good job of capturing the atmosphere and hectic pace of the movie, making for one exhilarating ride. It’s on sale for $29.99 instead of $59.99.
Far Cry 4
One of the most immersive open world games in the last few years, Far Cry is one of those experiences that you always go back to once in awhile, long after completing the game. It’s going for $14.98 instead of $39.99.
The Witcher 3: Wild Hunt
Even without playing the previous games or reading the books (highly recommended by the way), The Witcher 3: Wild Hunt is simply one of the best video games in years, and picking up all the awards at the moment for 2015. It’s available for $29.99 instead of $49.99. |
PITTSBURGH - A landmark federal study on hydraulic fracturing, or fracking, shows no evidence that chemicals from the natural gas drilling process moved up to contaminate drinking water aquifers at a western Pennsylvania drilling site, the Department of Energy told The Associated Press.
After a year of monitoring, the researchers found that the chemical-laced fluids used to free gas trapped deep below the surface stayed thousands of feet below the shallower areas that supply drinking water, geologist Richard Hammack said.
Although the results are preliminary — the study is still ongoing — they are a boost to a natural gas industry that has fought complaints from environmental groups and property owners who call fracking dangerous.
Drilling fluids tagged with unique markers were injected more than 8,000 feet below the surface but were not detected in a monitoring zone 3,000 feet higher. That means the potentially dangerous substances stayed about a mile away from drinking water supplies.
"This is good news," said Duke University scientist Rob Jackson, who was not involved with the study. He called it a "useful and important approach" to monitoring fracking, but he cautioned that the single study doesn't prove that fracking can't pollute, since geology and industry practices vary widely in Pennsylvania and across the nation.
The boom in gas drilling has led to tens of thousands of new wells being drilled in recent years, many in the Marcellus Shale formation that lies under parts of Pennsylvania, New York, Ohio and West Virginia. That's led to major economic benefits but also fears that the chemicals used in the drilling process could spread to water supplies.
The mix of chemicals varies by company and region, and while some are openly listed the industry has complained that disclosing special formulas could violate trade secrets. Some of the chemicals are toxic and could cause health problems in significant doses, so the lack of full transparency has worried landowners and public health experts.
The study done by the National Energy Technology Laboratory in Pittsburgh marked the first time that a drilling company let government scientists inject special tracers into the fracking fluid and then continue regular monitoring to see whether it spread toward drinking water sources. The research is being done at a drilling site in Greene County, which is southwest of Pittsburgh and adjacent to West Virginia.
Eight Marcellus Shale wells were monitored seismically and one was injected with four different man-made tracers at different stages of the fracking process, which involves setting off small explosions to break the rock apart. The scientists also monitored a separate series of older gas wells that are about 3,000 feet above the Marcellus to see if the fracking fluid reached up to them.
The industry and many state and federal regulators have long contended that fracking itself won't contaminate surface drinking water because of the extreme depth of the gas wells. Most are more than a mile underground, while drinking water aquifers are usually within 500 to 1000 feet of the surface.
Kathryn Klaber, CEO of the industry-led Marcellus Shale Coalition, called the study "great news."
"It's important that we continue to seek partnerships that can study these issues and inform the public of the findings," Klaber said.
While the lack of contamination is encouraging, Jackson said he wondered whether the unidentified drilling company might have consciously or unconsciously taken extra care with the research site, since it was being watched. He also noted that other aspects of the drilling process can cause pollution, such as poor well construction, surface spills of chemicals and wastewater.
Jackson and his colleagues at Duke have done numerous studies over the last few years that looked at whether gas drilling is contaminating nearby drinking water, with mixed results. None has found chemical contamination but they did find evidence that natural gas escaped from some wells near the surface and polluted drinking water in northeastern Pennsylvania.
Scott Anderson, a drilling expert with the Environment Defense Fund, said the results sound very interesting.
"Very few people think that fracking at significant depths routinely leads to water contamination. But the jury is still out on what the odds are that this might happen in special situations," Anderson said.
One finding surprised the researchers: Seismic monitoring determined one hydraulic fracture traveled 1,800 feet out from the well bore; most traveled just a few hundred feet. That's significant because some environmental groups have questioned whether the fractures could go all the way to the surface.
The researchers believe that fracture may have hit naturally occurring faults, and that's something both industry and regulators don't want.
"We would like to be able to predict those areas" with natural faults and avoid them, Hammack said.
Jackson said the 1,800-foot fracture was interesting but noted it is still a mile from the surface.
The DOE team will start to publish full results of the tests over the next few months, said Hammack, who called the large amount of field data from the study "the real deal."
"People probably will be looking at the data for years to come," he said.
On Friday, DOE spokesman David Anna added that while nothing of concern has been found thus far, "the results are far too preliminary to make any firm claims." |
import os
from libcxx.test import tracing
from lit.util import executeCommand # pylint: disable=import-error
class Executor(object):
def run(self, exe_path, cmd, local_cwd, file_deps=None, env=None):
"""Execute a command.
Be very careful not to change shared state in this function.
Executor objects are shared between python processes in `lit -jN`.
Args:
exe_path: str: Local path to the executable to be run
cmd: [str]: subprocess.call style command
local_cwd: str: Local path to the working directory
file_deps: [str]: Files required by the test
env: {str: str}: Environment variables to execute under
Returns:
cmd, out, err, exitCode
"""
raise NotImplementedError
class LocalExecutor(Executor):
def __init__(self):
super(LocalExecutor, self).__init__()
def run(self, exe_path, cmd=None, work_dir='.', file_deps=None, env=None):
cmd = cmd or [exe_path]
env_cmd = []
if env:
env_cmd += ['env']
env_cmd += ['%s=%s' % (k, v) for k, v in env.items()]
if work_dir == '.':
work_dir = os.getcwd()
out, err, rc = executeCommand(env_cmd + cmd, cwd=work_dir)
return (env_cmd + cmd, out, err, rc)
class PrefixExecutor(Executor):
"""Prefix an executor with some other command wrapper.
Most useful for setting ulimits on commands, or running an emulator like
qemu and valgrind.
"""
def __init__(self, commandPrefix, chain):
super(PrefixExecutor, self).__init__()
self.commandPrefix = commandPrefix
self.chain = chain
def run(self, exe_path, cmd=None, work_dir='.', file_deps=None, env=None):
cmd = cmd or [exe_path]
return self.chain.run(exe_path, self.commandPrefix + cmd, work_dir,
file_deps, env=env)
class PostfixExecutor(Executor):
"""Postfix an executor with some args."""
def __init__(self, commandPostfix, chain):
super(PostfixExecutor, self).__init__()
self.commandPostfix = commandPostfix
self.chain = chain
def run(self, exe_path, cmd=None, work_dir='.', file_deps=None, env=None):
cmd = cmd or [exe_path]
return self.chain.run(cmd + self.commandPostfix, work_dir, file_deps,
env=env)
class TimeoutExecutor(PrefixExecutor):
"""Execute another action under a timeout.
Deprecated. http://reviews.llvm.org/D6584 adds timeouts to LIT.
"""
def __init__(self, duration, chain):
super(TimeoutExecutor, self).__init__(
['timeout', duration], chain)
class RemoteExecutor(Executor):
def __init__(self):
self.local_run = executeCommand
def remote_temp_dir(self):
return self._remote_temp(True)
def remote_temp_file(self):
return self._remote_temp(False)
def _remote_temp(self, is_dir):
raise NotImplementedError()
def copy_in(self, local_srcs, remote_dsts):
# This could be wrapped up in a tar->scp->untar for performance
# if there are lots of files to be copied/moved
for src, dst in zip(local_srcs, remote_dsts):
self._copy_in_file(src, dst)
def _copy_in_file(self, src, dst):
raise NotImplementedError()
def delete_remote(self, remote):
try:
self._execute_command_remote(['rm', '-rf', remote])
except OSError:
# TODO: Log failure to delete?
pass
def run(self, exe_path, cmd=None, work_dir='.', file_deps=None, env=None):
target_exe_path = None
target_cwd = None
try:
target_cwd = self.remote_temp_dir()
target_exe_path = os.path.join(target_cwd, 'libcxx_test.exe')
if cmd:
# Replace exe_path with target_exe_path.
cmd = [c if c != exe_path else target_exe_path for c in cmd]
else:
cmd = [target_exe_path]
srcs = [exe_path]
dsts = [target_exe_path]
if file_deps is not None:
dev_paths = [os.path.join(target_cwd, os.path.basename(f))
for f in file_deps]
srcs.extend(file_deps)
dsts.extend(dev_paths)
self.copy_in(srcs, dsts)
# TODO(jroelofs): capture the copy_in and delete_remote commands,
# and conjugate them with '&&'s around the first tuple element
# returned here:
return self._execute_command_remote(cmd, target_cwd, env)
finally:
if target_cwd:
self.delete_remote(target_cwd)
def _execute_command_remote(self, cmd, remote_work_dir='.', env=None):
raise NotImplementedError()
class SSHExecutor(RemoteExecutor):
def __init__(self, host, username=None):
super(SSHExecutor, self).__init__()
self.user_prefix = username + '@' if username else ''
self.host = host
self.scp_command = 'scp'
self.ssh_command = 'ssh'
# TODO(jroelofs): switch this on some -super-verbose-debug config flag
if False:
self.local_run = tracing.trace_function(
self.local_run, log_calls=True, log_results=True,
label='ssh_local')
def _remote_temp(self, is_dir):
# TODO: detect what the target system is, and use the correct
# mktemp command for it. (linux and darwin differ here, and I'm
# sure windows has another way to do it)
# Not sure how to do suffix on osx yet
dir_arg = '-d' if is_dir else ''
cmd = 'mktemp -q {} /tmp/libcxx.XXXXXXXXXX'.format(dir_arg)
temp_path, err, exitCode = self._execute_command_remote([cmd])
temp_path = temp_path.strip()
if exitCode != 0:
raise RuntimeError(err)
return temp_path
def _copy_in_file(self, src, dst):
scp = self.scp_command
remote = self.host
remote = self.user_prefix + remote
cmd = [scp, '-p', src, remote + ':' + dst]
self.local_run(cmd)
def _execute_command_remote(self, cmd, remote_work_dir='.', env=None):
remote = self.user_prefix + self.host
ssh_cmd = [self.ssh_command, '-oBatchMode=yes', remote]
if env:
env_cmd = ['env'] + ['%s=%s' % (k, v) for k, v in env.items()]
else:
env_cmd = []
remote_cmd = ' '.join(env_cmd + cmd)
if remote_work_dir != '.':
remote_cmd = 'cd ' + remote_work_dir + ' && ' + remote_cmd
return self.local_run(ssh_cmd + [remote_cmd])
|
Slashdot videos: Now with more Slashdot!
View
Discuss
Share
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Lucas123 writes: "Several high profile protests have circulated across the Web in the past few weeks, garnering social and news media attention — and even forcing the resignation of one high-level executive. There are two components driving the trend in Internet protests: They tend to be effective against Web services, and online networks allow people to mobilize quickly. According to a study released last month by Georgetown University's Center for Social Impact Communication, active Web useres are likely to do far more for a cause than simply 'like' it on a website. And, because a few clicks can cancel a service, their actions carry weight. But there may be a coming backlash as people can grow tired of online activism; and corporations may also take a more proactive stance in response to them."
Answer: No. At least not for anything of consequence. Just look at how many successful petitions came out of change.org.Anyone that thinks a web based protest would be effective should read "The Revolution will not be Tweeted" by by Malcolm Gladwell, published in New Yorker magazine, to understand why.
Yeah, that Mozilla guy stepped down, but there aren't a lot of real consequences to that (save for him being out an easy paycheck ).
Take a look at Occupy Wall Street. That was a real movement with real impact. It was also systematically (and very effectively) shut down before it accomplished anything:(.
Occupy Wall Street was a protest by a bunch of unorganized 18 to 20 somethings with no leader, agenda, or coherent message. It had no impact whatsoever, other than on the local police overtime budget. Nothing real came out of it simply because there was no real foundation to build on.
If you want to talk about a movement that was systematically destroyed, take a look at the Tea Party. It was originally started by a coalition of conservatives and democrats for the express purposes of promoting of fiscal responsibility within government. It was systematically taken over by the conservative far right and bears no resemblance to what it originally stood for. |
Aslan Maskhadov: Five Steps into History
Ilya Maksakov, special to Prague Watchdog
Shortly before the upcoming presidential elections in Chechnya, a press conference was called by several deputies of the Ichkerian Parliament formed in the 1997 elections, commonly referred to as the "Maskhadovian" parliament. Isa Temirov, who calls himself acting Speaker, announced that a motion to impeach "President of the Chechen Republic of Ichkeria" Aslan Maskhadov had been made by 42 of the 43 deputies who are still alive today.
Naturally, the Chechen separatists' media immediately asserted that this was all untrue, adding that the deputies who appeared in Moscow were usurpers; and in order to be convincing, they published a statement by the "true" parliament, headed by a different Speaker.
Several obvious conclusions can be drawn from this incident: First, that the so-called impeachment was aimed at serving a political purpose - to prove to the international community that Maskhadov is being deprived of even a hollow legitimacy. It is no accident that prior to this press conference the “Maskhadovian” deputies met with Akhmat Kadyrov, head of Chechnya's Moscow-backed administration and a heavyweight candidate in the upcoming presidential elections.
Secondly, if not all of the 42 deputies sided with Moscow, then a significant number surely did. Therefore it must be assumed that this number greatly exceeds those who sided with Maskhadov (although, neither party has publicized a precise list of "their" deputies).
And thirdly, although Maskhadov’s presidency is considered an important issue, it is also the cause of much pointless intrigue in the struggle for legitimacy.
The Most Famous Chechen
Aslan Maskhadov (Aslan is not a Moslem name, so he chose Khalid instead), regardless of his future, will surely remain part of Chechnya’s history as an ex-president publicly elected to become president. No Western, Eastern, Russian or Chechen top official considers him to be the incumbent president. In documents of the Parliamentary Assembly of the Council of Europe he is referred to as “the last elected president.” Needless to say, after the October 5 election, regardless of its assessment, it will be necessary to change even this term.
Maskhadov, like most Chechens his age, was born in Khazakhstan, where the Chechen and Ingush nations had been deported on Stalin's order. In 1972 he graduated from Tbilisi Artillery College. From 1981 to 1986 he served in Hungary and Lithuania where, in 1991, he helped the Soviet Army capture the Vilnius TV tower - an act he now regrets.
In 1992 he returned to Chechnya and in 1993, because he took part in suppressing the anti-Dudayev opposition, was appointed Chief of the General Staff of Chechen forces, where he learned how to organize military operations, which were quite different from his artillery training. This was his first step into history.
The first war in Chechnya became a decisive moment in Maskhadov’s life. Within the ranks, a somewhat precise one-man management existed, so that all soldiers obeyed him. Maskhadov himself was subordinate to Dudayev, until April 1996 when the first Chechen President was killed by a Russian missile. After Dudayev's death, Maskhadov became the military and political leader of Chechen separatists as the presidency of Zelimkan Yandarbiyev was more or less nominal.
Maskhadov became if not the most popular Chechen, then certainly the most famous. He was an interesting interview for journalists; a reasonable negotiator for the Russian military, and a predictable politician for Russian statesmen. He always maintained that terrorism was not one of his methods; however, he was proud of the operations he organized, especially the recapture of Grozny in August 1996. His second step into history was signing the Khasav-Yurt agreements with Aleksander Lebed, which led to the end of the first Russian-Chechen war.
Head of State
The three years that followed were dedicated to Chechnya’s attempts to exist as a de facto independent republic. The most important event in Maskhadov’s life and his third step into history was being elected President of Chechnya in January 1997. He won the first round with a huge advantage over his main rival and military ally, Shamil Basayev. The relationship and conduct of these two men, undoubtedly influenced by external factors, ultimately defined the fate of Chechnya.
Current Russian politicians are right in saying that by casting their votes for Maskhadov, Chechens voted against Basayev in order to choose peace. Maskhadov himself is also correct in saying he was elected democratically and by the entire nation. Although the election was fair, it was not, however, according to Russian laws. But Maskhadov always took a liberal approach to laws, even Chechen ones. He turned out to be a rather weak president, but it is doubtful that Chechnya, in the aftermath of war, could have sustained a stronger leader.
Nevertheless, everything started out quite favorably. In 1997 Maskhadov was in the Kremlin, and together with Boris Yeltsin signed a Peace Agreement. Although there were a number of economic assistance programs being worked out in Moscow to aid Chechnya, no one was very anxious to spend money on a republic where funds and people had a tendency to disappear. So an impasse was established whereby Moscow would support, but not actually help, Maskhadov. During these three years of independence no kidnappers were ever convicted in Chechnya. For instance, a famous kidnapper, Arbi Barayev, was released simply by swearing a pledge on the Koran to forego kidnapping. Yet photos of public capital punishment of some non-political murderers spread throughout the world.
Initially, Maskhadov appointed Basayev Deputy Premier of the Ichkerian government, but later on he became Acting Premier. In July 1998 Maskhadov singlehandedly led the government.
It should be noted that all documents designated for Moscow were signed by Maskhadov under the name of Aslan, and all domestic ones signed as Khalid. In the backdrop of an uncontrollable growth of criminal activity, the opposition, led by Basayev, stood openly against Maskhadov. Yet Maskhadov preferred "peace marches" rather than overtly suppressing the so-called “vahhabists”.
During his presidency, Maskhadov was unable to solve a problem that he himself created – returning all soldiers to peacetime duties. His primary concern focused on preventing internal Chechen conflicts. But this also turned out to be unsuccessful, as Chechens killed and were killed by other Chechens.
The result was inevitable. In December 1998 Basayev’s group asked Maskhadov to retire, and the "Sharia Court" told him to unilaterally cease contacts with Russia. In February 1999, Maskhadov established a "Sharia government," suspended operations of the Parliament, and abolished the post of Vice-President.
The fact that he was assaulted twice shows how badly things had gotten out of hand. At one point, while talking on the phone with the then Russian Prime Minister Yevgeny Primakov, Maskhadov abruptly hung up. But before doing so, a suggestion to establish order in Chechnya was offered to Maskhadov who, in turn, told Primakov he should be the one to re-establish order in Moscow.
Maskhadov Means War
His fourth step into history was quite brief. In August 1999 Basayev attacked Dagestan, but no words of censure came forth from Maskhadov; although he later insisted that he did condemn the action but no one heard it.
In October Russian forces entered Chechnya, but Maskhadov did not side with Moscow - that was done by Kadyrov. And today it is uncertain whether this could have prevented the wide-scale war. It is obvious that the terms Moscow offered were humiliating and unacceptable to Maskhadov; yet the Kremlin could offer no better ones. However, Maskhadov remained true to his principle that war with Russia is better than a scenario a la Afghanistan. As a result, Chechnya was involved not only in a war with Russia, but in a civil war as well.
Maskhadov’s fifth step into history turned out much longer than his previous ones. The second war in Chechnya is now in its fourth year, and during this entire time Maskhadov has become a distant president, working underground and inaccessible to everyone. He still disavows terrorist methods, but undertakes large-scale military operations and appeals to Moscow to negotiate “without prior conditions.”
Meanwhile, total absence of control over Chechen guerrillas is not the result of Russian propaganda. All meetings in the Chechnya mountains are held by Basayev, Gelayev and some Arabs, minus Maskhadov; and all of the former are more than happy to pose for photo shoots. And Maskhadov’s circle comments that these gatherings are just meetings of “one of the [resistance] fronts."
Maskhadov undoubtedly has armed and operational formations, otherwise he would not be so well guarded and in relative safety at all times. However, because he is no longer able to give orders to Chechen field commanders anymore, he only keeps signing decrees that no one obeys.
One of his remarkable decrees was signed in July 2002, which could have been described as “a cardinal reform of state government” - provided Ichkeria was not involved. He appointed Basayev his deputy, appointed commanders of "fronts" and other key structures and returned Movladi Udugov and Zelimkhan Yandarbiyev to “power." Yet all three men are Maskhadov’s critics. Evidently it is clear that he was forced to surround himself with an undesirable entourage.
By this time terrorism had become rampant. The terrorist act in Nord-Ost happened behind Maskhadov’s back; and Basayev was “punished“ (although according to his wishes) by being made to step down from "all his posts." After Nord-Ost, Russian President Vladimir Putin uttered one of his popular phrases: "Those who choose Maskhadov, choose war."
Whether or not negotiations with Maskhadov would help regulate the Chechen crisis seems to be outdated now, as it’s clear that negotiations alone cannot solve the crisis. Meanwhile, he and his circle are working out plans for a political solution that envisions, for example, “international autonomy” for Chechnya. However, Moscow is reluctant to take this seriously and refuses to budge from its own plan, in which the upcoming Chechen presidential election will play a crucial role.
Man of Principle
At the outset, Maskhadov’s part in the Moscow-organized Chechen presidental election seemed unreal, although very interesting. Sadly, none of the remaining candidates could rely on votes from Maskhadov's supporters. It was probably Ruslan Khasbulatov who would have had a chance at getting these votes - but he eventually bowed out of the race. These are the results of various “political strategies“ constantly used in Chechnya by Moscow.
It should also be noted that even famous people who never liked Russia's behaviour in Chechnya now appeal to Maskhadov to take some part in the political process rather than just sitting in the mountains writing decrees and working out wide-scale operations.
While predicting the course of the situation after the Chechen presidential elections, some still believe that the events that took place between 1995 and 1996, when Zavgayev and his Parliament were "elected," will again be repeated. Others speak about inevitable stabilization. As usual, the truth lies somewhere in between. Nor is it relevant to draw an analogy with 1996 because Kadyrov is not Zavgayev, Putin is not Yeltsin, and Maskhadov is not the same man he was then. And present events in Chechnya are far more serious and stability still a long way off.
Maskhadov had another principle – not to take military operations beyond Chechnya, stating that the whole world should see that Chechens were fighting for the independence of their state. Quite recently, however, his envoy Akhmad Zakayev mentioned that Maskhadov is considering military operations beyond Chechnya, namely into the entire territory of Russia. Thus it appears that Maskhadov is already morally prepared to take his sixth and final step into history.
Ilya Maskakov is an analyst for the Russian daily Izvestia and a frequent contributor to Prague Watchdog.
The views expressed on this web site are the authors' own, and don't necessarily reflect the views of Prague Watchdog,which aims to present a wide spectrum of opinion and analysis relating to events in the North Caucasus. |
Obesity Is Influenced By Fast Food Retailers
Researchers from Canada say too many fast food retailers in the neighborhood have a definite influence on obesity rates. For those who live in dense areas of fast food chains, obesity is more rampant. Scientists evaluated obesity rates and ratio of fast food restaurants to grocers and specialty stores, finding. “That it correlates very well with the odds that that person may be obese".
John Spence from the University of Alberta, Canada worked with a group of scientists to find that the 'Retail Food Environment Index' (RFEI), the number of fast-food restaurants and convenience stores to supermarkets and specialty food stores in a given radius around a person's home, has a definite influence on obesity.
Advertisement
The study shows that areas dense with fast food retailers does influence obesity rates. The mere proximity of fast food retailers to one’s home raises the risk of obesity and obesity related diseases. Spence says, "These findings may help explain the observation that geographic concentration of fast-food restaurants is associated with mortality and hospital admissions for acute coronary events in Canada".
The researchers suggest that the government intervene to impose zoning laws that would limit fast food dense areas in neighborhoods. Reducing availability of unhealthy foods could reduce the increasing rates of obesity they contend.
Fast food is less expensive, and more energy dense than fruits and vegetables. Unfortunately, having better access to fast food retailers than grocers close to home may be a major factor influencing obesity rates.
Can you be fat and fit? That's the question York University researchers set out to answer in a new study that shows physical activity may be equally and perhaps even more important than weight for people living with severe obesity.
Our face often betrays our age in spite of attempts to keep our bodies toned and youthful in appearance. However, new research sheds light on the phenomenon of yoga for your face. Participants were found to look years younger by the end of this clinical trial.
One of the biggest myths that permeates America’s view of fat is that eating fat makes you fat. However, this misconception is rooted in several flawed theories which I will attempt to reveal in this article.
Resolutions have a way of recycling themselves. Is anyone else recycling the same health resolution they committed to in 2017? My hand is raised too. The question is how to avoid failing to maintain and achieve our health resolution(s) again in 2018. There is no right answer, but I do have some helpful tips that may help all of us to succeed because the only way we learn is by failing the first time around.
The gut is a hot topic these days as the light of scientific knowledge penetrates all of the secrets coiled within the 28 feet of human intestines. Recent research conducted by the University of Illinois sheds light on the role of exercise in gut health, and their findings may astonish you.
Many folks have resigned themselves to a sugar-free Christmas for various reasons whether it is due to being diabetic, having candida, or just being hypoglycemic in general. However, the good news is that sugar doesn’t have to be the grinch that stole Christmas. Monk fruit may be the healthy solution you’ve been looking for to save your sweet tooth and avoid the guilt! |
Two-liquid-phase mesophilic and thermophilic biotrickling filters for the biodegradation of alpha-pinene.
alpha-Pinene biodegradation was evaluated in mesophilic and thermophilic biotrickling filters. The potential of silicone oil for enhancing the removal was evaluated too, at both temperatures. Performance was studied at empty bed residence times between 60 and 14s, and concentrations of 0.06-38.84 gm(-3), with or without silicone oil. Efficiency decreased as the pollutant concentration was increased, showing higher elimination capacities at higher EBRTs. In the absence of silicone oil, better results were obtained in the thermophilic than in the mesophilic bioreactor. At similar loads (360 gm(-3)h(-1)), in the thermophilic bioreactor the elimination capacity was 293 gm(-3)h(-1), with a removal efficiency of 81%, while in the mesophilic BTF the elimination capacity only reached 195 gm(-3)h(-1), for that same load. The presence of a second liquid phase improved performance of both bioreactors. With 5% silicone oil, elimination capacities as high as 2,000 gm(-3)h(-1) were achieved, under either mesophilic or thermophilic conditions. |
.Modal {
cursor: pointer;
}
|
// Copyright (c) 2020 RISC Software GmbH
//
// This file was generated by CPACSGen from CPACS XML Schema (c) German Aerospace Center (DLR/SC).
// Do not edit, all changes are lost when files are re-generated.
//
// Licensed under the Apache License, Version 2.0 (the "License")
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <cassert>
#include "CPACSCurveProfiles.h"
#include "CPACSNacelleProfiles.h"
#include "CPACSProfileGeometry2D.h"
#include "CTiglError.h"
#include "CTiglLogging.h"
#include "CTiglUIDManager.h"
#include "TixiHelper.h"
namespace tigl
{
namespace generated
{
CPACSProfileGeometry2D::CPACSProfileGeometry2D(CPACSCurveProfiles* parent, CTiglUIDManager* uidMgr)
: m_uidMgr(uidMgr)
{
//assert(parent != NULL);
m_parent = parent;
m_parentType = &typeid(CPACSCurveProfiles);
}
CPACSProfileGeometry2D::CPACSProfileGeometry2D(CPACSNacelleProfiles* parent, CTiglUIDManager* uidMgr)
: m_uidMgr(uidMgr)
{
//assert(parent != NULL);
m_parent = parent;
m_parentType = &typeid(CPACSNacelleProfiles);
}
CPACSProfileGeometry2D::~CPACSProfileGeometry2D()
{
if (m_uidMgr) m_uidMgr->TryUnregisterObject(m_uID);
}
const CTiglUIDObject* CPACSProfileGeometry2D::GetNextUIDParent() const
{
if (m_parent) {
if (IsParent<CPACSCurveProfiles>()) {
return GetParent<CPACSCurveProfiles>()->GetNextUIDParent();
}
if (IsParent<CPACSNacelleProfiles>()) {
return GetParent<CPACSNacelleProfiles>()->GetNextUIDParent();
}
}
return nullptr;
}
CTiglUIDObject* CPACSProfileGeometry2D::GetNextUIDParent()
{
if (m_parent) {
if (IsParent<CPACSCurveProfiles>()) {
return GetParent<CPACSCurveProfiles>()->GetNextUIDParent();
}
if (IsParent<CPACSNacelleProfiles>()) {
return GetParent<CPACSNacelleProfiles>()->GetNextUIDParent();
}
}
return nullptr;
}
CTiglUIDManager& CPACSProfileGeometry2D::GetUIDManager()
{
return *m_uidMgr;
}
const CTiglUIDManager& CPACSProfileGeometry2D::GetUIDManager() const
{
return *m_uidMgr;
}
void CPACSProfileGeometry2D::ReadCPACS(const TixiDocumentHandle& tixiHandle, const std::string& xpath)
{
// read attribute symmetry
if (tixi::TixiCheckAttribute(tixiHandle, xpath, "symmetry")) {
m_symmetry = stringToCPACSProfileGeometry2DType_symmetry(tixi::TixiGetAttribute<std::string>(tixiHandle, xpath, "symmetry"));
}
// read attribute uID
if (tixi::TixiCheckAttribute(tixiHandle, xpath, "uID")) {
m_uID = tixi::TixiGetAttribute<std::string>(tixiHandle, xpath, "uID");
if (m_uID.empty()) {
LOG(WARNING) << "Required attribute uID is empty at xpath " << xpath;
}
}
else {
LOG(ERROR) << "Required attribute uID is missing at xpath " << xpath;
}
// read element name
if (tixi::TixiCheckElement(tixiHandle, xpath + "/name")) {
m_name = tixi::TixiGetElement<std::string>(tixiHandle, xpath + "/name");
if (m_name.empty()) {
LOG(WARNING) << "Required element name is empty at xpath " << xpath;
}
}
else {
LOG(ERROR) << "Required element name is missing at xpath " << xpath;
}
// read element description
if (tixi::TixiCheckElement(tixiHandle, xpath + "/description")) {
m_description = tixi::TixiGetElement<std::string>(tixiHandle, xpath + "/description");
if (m_description->empty()) {
LOG(WARNING) << "Optional element description is present but empty at xpath " << xpath;
}
}
// read element pointList
if (tixi::TixiCheckElement(tixiHandle, xpath + "/pointList")) {
m_pointList_choice1 = boost::in_place(reinterpret_cast<CCPACSNacelleProfile*>(this));
try {
m_pointList_choice1->ReadCPACS(tixiHandle, xpath + "/pointList");
} catch(const std::exception& e) {
LOG(ERROR) << "Failed to read pointList at xpath " << xpath << ": " << e.what();
m_pointList_choice1 = boost::none;
}
}
// read element cst2D
if (tixi::TixiCheckElement(tixiHandle, xpath + "/cst2D")) {
m_cst2D_choice2 = boost::in_place(reinterpret_cast<CCPACSNacelleProfile*>(this));
try {
m_cst2D_choice2->ReadCPACS(tixiHandle, xpath + "/cst2D");
} catch(const std::exception& e) {
LOG(ERROR) << "Failed to read cst2D at xpath " << xpath << ": " << e.what();
m_cst2D_choice2 = boost::none;
}
}
if (m_uidMgr && !m_uID.empty()) m_uidMgr->RegisterObject(m_uID, *this);
if (!ValidateChoices()) {
LOG(ERROR) << "Invalid choice configuration at xpath " << xpath;
}
}
void CPACSProfileGeometry2D::WriteCPACS(const TixiDocumentHandle& tixiHandle, const std::string& xpath) const
{
const std::vector<std::string> childElemOrder = { "name", "description", "pointList", "cst2D" };
// write attribute symmetry
if (m_symmetry) {
tixi::TixiSaveAttribute(tixiHandle, xpath, "symmetry", CPACSProfileGeometry2DType_symmetryToString(*m_symmetry));
}
else {
if (tixi::TixiCheckAttribute(tixiHandle, xpath, "symmetry")) {
tixi::TixiRemoveAttribute(tixiHandle, xpath, "symmetry");
}
}
// write attribute uID
tixi::TixiSaveAttribute(tixiHandle, xpath, "uID", m_uID);
// write element name
tixi::TixiCreateSequenceElementIfNotExists(tixiHandle, xpath + "/name", childElemOrder);
tixi::TixiSaveElement(tixiHandle, xpath + "/name", m_name);
// write element description
if (m_description) {
tixi::TixiCreateSequenceElementIfNotExists(tixiHandle, xpath + "/description", childElemOrder);
tixi::TixiSaveElement(tixiHandle, xpath + "/description", *m_description);
}
else {
if (tixi::TixiCheckElement(tixiHandle, xpath + "/description")) {
tixi::TixiRemoveElement(tixiHandle, xpath + "/description");
}
}
// write element pointList
if (m_pointList_choice1) {
tixi::TixiCreateSequenceElementIfNotExists(tixiHandle, xpath + "/pointList", childElemOrder);
m_pointList_choice1->WriteCPACS(tixiHandle, xpath + "/pointList");
}
else {
if (tixi::TixiCheckElement(tixiHandle, xpath + "/pointList")) {
tixi::TixiRemoveElement(tixiHandle, xpath + "/pointList");
}
}
// write element cst2D
if (m_cst2D_choice2) {
tixi::TixiCreateSequenceElementIfNotExists(tixiHandle, xpath + "/cst2D", childElemOrder);
m_cst2D_choice2->WriteCPACS(tixiHandle, xpath + "/cst2D");
}
else {
if (tixi::TixiCheckElement(tixiHandle, xpath + "/cst2D")) {
tixi::TixiRemoveElement(tixiHandle, xpath + "/cst2D");
}
}
}
bool CPACSProfileGeometry2D::ValidateChoices() const
{
return
(
(
(
// mandatory elements of this choice must be there
m_pointList_choice1.is_initialized()
&&
// elements of other choices must not be there
!(
m_cst2D_choice2.is_initialized()
)
)
+
(
// mandatory elements of this choice must be there
m_cst2D_choice2.is_initialized()
&&
// elements of other choices must not be there
!(
m_pointList_choice1.is_initialized()
)
)
== 1
)
)
;
}
const boost::optional<CPACSProfileGeometry2DType_symmetry>& CPACSProfileGeometry2D::GetSymmetry() const
{
return m_symmetry;
}
void CPACSProfileGeometry2D::SetSymmetry(const boost::optional<CPACSProfileGeometry2DType_symmetry>& value)
{
m_symmetry = value;
}
const std::string& CPACSProfileGeometry2D::GetUID() const
{
return m_uID;
}
void CPACSProfileGeometry2D::SetUID(const std::string& value)
{
if (m_uidMgr && value != m_uID) {
if (m_uID.empty()) {
m_uidMgr->RegisterObject(value, *this);
}
else {
m_uidMgr->UpdateObjectUID(m_uID, value);
}
}
m_uID = value;
}
const std::string& CPACSProfileGeometry2D::GetName() const
{
return m_name;
}
void CPACSProfileGeometry2D::SetName(const std::string& value)
{
m_name = value;
}
const boost::optional<std::string>& CPACSProfileGeometry2D::GetDescription() const
{
return m_description;
}
void CPACSProfileGeometry2D::SetDescription(const boost::optional<std::string>& value)
{
m_description = value;
}
const boost::optional<CCPACSPointListXYVector>& CPACSProfileGeometry2D::GetPointList_choice1() const
{
return m_pointList_choice1;
}
boost::optional<CCPACSPointListXYVector>& CPACSProfileGeometry2D::GetPointList_choice1()
{
return m_pointList_choice1;
}
const boost::optional<CCPACSWingProfileCST>& CPACSProfileGeometry2D::GetCst2D_choice2() const
{
return m_cst2D_choice2;
}
boost::optional<CCPACSWingProfileCST>& CPACSProfileGeometry2D::GetCst2D_choice2()
{
return m_cst2D_choice2;
}
CCPACSPointListXYVector& CPACSProfileGeometry2D::GetPointList_choice1(CreateIfNotExistsTag)
{
if (!m_pointList_choice1)
m_pointList_choice1 = boost::in_place(reinterpret_cast<CCPACSNacelleProfile*>(this));
return *m_pointList_choice1;
}
void CPACSProfileGeometry2D::RemovePointList_choice1()
{
m_pointList_choice1 = boost::none;
}
CCPACSWingProfileCST& CPACSProfileGeometry2D::GetCst2D_choice2(CreateIfNotExistsTag)
{
if (!m_cst2D_choice2)
m_cst2D_choice2 = boost::in_place(reinterpret_cast<CCPACSNacelleProfile*>(this));
return *m_cst2D_choice2;
}
void CPACSProfileGeometry2D::RemoveCst2D_choice2()
{
m_cst2D_choice2 = boost::none;
}
} // namespace generated
} // namespace tigl
|
The Ministry of Defence has been ordered to hand over any reports by British troops where they suspected US forces in Iraq were mistreating detainees.
The instruction to search for allegations of US military abuse has been authorised by Mr Justice Turner at the high court in London as the bitter legacy of the conflict continues to work its way through the courts.
The latest development could prove highly embarrassing for future US/UK military cooperation if any documents contain critical comments by British soldiers of their American allies.
The order follows two court hearings before the judge in late October that dealt with claims brought by the law firm Leigh Day on behalf of two, unnamed Iraqi suspects who were arrested in 2008 in Basra, southern Iraq, and handed over to US custody.
Both men, identified only as HTF and ZMS, allege they suffered repeated beatings and had hoods put over their heads so they could not breathe properly at a US facility known as Camp Harper within a British base in Basra.
Leigh Day, which says it is acting for about 45 Iraqis with similar claims, say the suspects were then flown to Baghdad International airport where they were handed over to US forces.
In US custody, it is alleged, detainees were subjected to hooding, excessive sensory and sleep deprivation, loud noise and solitary confinement as well as sexual and physical assaults by male and female US officers. Many were held for long periods. ZMS was not released for more than a year.
The men were detained on the grounds that they posed a threat to security. Their lawyers argue that the UK government knew or should have known that they would be exposed to inhuman and degrading treatment by US forces. British forces may therefore have been complicit in the mistreatment, it is claimed.
At a high court hearing in mid-October, the judge told the MoD that it must search its records and databases for any reports by British servicemen of alleged abuse or mistreatment of detainees by US personnel in Iraq between 2004 and 2008. At a later hearing he ordered disclosure of those reports by 26 November.
The court order specifies the types of internal records the MoD must disclose, including those known as SOI 990A reports, which cover the “procedure for assisting with the movement of high-value individuals into US detention”.
Part of the court order states: “The parties will co-operate in the formulation of appropriate searches by the [MoD]” relating to whether it “knew or ought to have known that, if transferred to the custody of [US] forces … the claimants would be exposed to a risk of unlawful detention [and] other unlawful acts.”
A preliminary search by the MoD is understood to have turned up 509 references but it is not yet clear how many, if any, are reports of suspicious incidents recorded by UK troops or whether they are merely policy files relating to the protocol for reporting such suspicions.
The MoD has maintained that because British forces were accompanied by a US custodial officer and were processed at Camp Harper the suspects were always under “the effective control of the US” and should not have been categorised as UK detainees. All of the men were eventually released from US custody without charge.
According to Leigh Day’s lawyers, there has been controversy over similar allegations involving Danish and Australian coalition forces in Afghanistan and Iraq over liability for subsequent mistreatment of detainees.
Benjamin Croft, the solicitor at Leigh Day handling the case, said: “Almost a decade on from the departure of British troops from Iraq, and despite three separate investigations, there remains a question mark over the extent of British complicity in the US mistreatment of civilians in Iraq.
“It is high time the government opened itself up to scrutiny on this issue and, hopefully, these cases will go some way towards answering those outstanding questions.”
“In-theatre” transfers of detainees from UK to US forces within Iraq and Afghanistan have not been investigated by previous inquiries.
An MoD spokesperson said: “As legal proceedings are ongoing we are unable to comment.” The US embassy did not immediately respond to a request for comment.
The UK government has been criticised for failing to meet its own deadline to decide whether to hold a judge-led inquiry into Britain’s involvement in post-9/11 human rights abuses and the use of torture.
Three months ago, Theresa May offered an apology for MI6’s role in the kidnap and torture of a Libyan dissident, Abdel Hakim Belhaj, and his wife in 2004.
In a separate development, the Solicitors Regulation Authority has confirmed it will not appeal against a high court ruling last month that cleared Leigh Day lawyers of wrongdoing over its pursuit of torture and murder claims against British troops in Iraq. |
Dive Brief:
Amazon Web Services has secured the last required permit for construction to begin on its 900-acre, 80-megawatt solar farm in Accomack County, VA . When completed, it will be the largest solar farm in the mid-Atlantic region.
Virginia Gov. Terry McAuliffe announced Monday that the state Department of Environmental Quality issued the permit for the solar farm, which will eventually be home to 250,000 solar panels that can create enough electricity to power 15,000 local homes.
Construction on the facility is set to begin later this year, and it is scheduled to open for commercial use in the fall of 2016.
Dive Insight:
Through a power purchase agreement, Community Energy will build the solar farm, and the solar panels will power the data centers used for the company’s Amazon Web Services cloud computing platform.
Virginia has often been criticized as slow to move into the renewable energy space, according to pv magazine. The Solar Energy Industries Association ranks Virginia as 31st in the U.S. for its solar PV capacity.
McAuliffe touted the project as a both a job creator and a step forward for Virginia in the renewable energy direction. "We are now in the game," he said. "We weren't in the past even suited up. I think we're sending the signal that Virginia is open and welcoming to renewables and this is a good place to do business."
The recent attention on renewable energy, especially with President Barack Obama's Clean Power Plan, could be a boon for industrial construction, as the additional investment in natural gas, wind farms and solar energy is expected to create more demand for construction of new facilities. |
Muller Martini will close Newport News operations by Jan. 2012
160 will lose jobs
The manufacturer of book binding machinery and other equipment used by publishing companies said Friday that it will close its two Oyster Point production plants by the end of January 2012, resulting in about 160 job losses.
Muller attributed the closure to a sharp decline in business that began during the recession and never fully recovered.
In May 2009, the company laid off 79 workers – nearly a third of its local workforce – in an effort to keep the facilities viable through what it hoped would be a short-lived downturn in orders from its print-based customers.
"Unfortunately, the worldwide demand for print finishing equipment has not rebounded," the company said in a statement announcing the closure.
Muller, like other players in the publishing industry, has been battered by a gradual move of content online, resulting in a sustained decline in demand for its equipment.
The job cuts will come in three phases beginning in July. Affected employees will be given 60 days notice and offered assistance to find new employment, Muller said in the release.
Anna Rhodes, Muller's local human resources director, said she didn't know whether any employees would be offered severance packages or post-separation benefits.
"Details like that still have to be hashed out. This is all brand-new to us, too," said Rhodes, who has been with the company for 33 years. "There are a lot of long faces here today."
In the announcement, the company said it is exploring unspecified business opportunities in the region with the hope of re-hiring some of the employees who will lose their jobs.
Werner Naegeli, president and chief executive of Muller Martini Inc., did not return a call seeking comment.
Muller's two local plants cover 290,000 square feet in the Oyster Point Industrial Park, where workers produce book binding machinery and mail room equipment for publishing companies and other firms that produce catalogs, magazines and other printed material.
In 2007, the local plants employed more than 300 workers.
Swiss-based Muller expanded to the United States in 1973, building its first domestic production plant in Newport News. It subsequently expanded, building a second plant here and other manufacturing facility in Allentown, Pa., called Muller Martini Mailroom Systems Inc.
The Allentown operation, which provides equipment for the Daily Press' printing facilities, is expected to remain open.
Muller Martini
• Swiss-based company opened Newport News manufacturing facility in 1973.
• Plans to close both local production plants in three phases, beginning in July and winding down by January 2012.
• The plants, which employed about 300 as recently as 2007, laid off 79 workers in 2009. The 160 employees who remain will lose their jobs by next January. |
Anti-Vaccine Hysteria Puts All of Us at Risk
The recent outbreak of
measles in the United States is cause for concern for every Amercian.
First and foremost, measles
is a highly contagious disease that places at risk anyone who is in the
vicinity of someone who is infected with measles, whether it be on a plane, a
ship, or the person standing next to you in line at the store.
Second, measles is a disease
that can have severe complications for those who contract it, especially the
very young, the elderly, and pregnant women. Though measles can lead to death
in rare cases, there are many more complications, ranging from flu-like
symptoms to encephalitis (the swelling of the brain) that can cause lifelong
cognitive and physical defects.
Third, the recent outbreak
shows how dangerous our society can become for all of us when a small minority
decides, for reasons ranging from religious beliefs to quack science, that they
are not going to accept vaccinations for their children.
Vaccinations for smallpox,
polio, measles, and other contagious diseases are the single-most significant
reason why life expectancy in the developed world has increased exponentially
in the past 100 years, even though rates of death from heart disease and cancer
have remained roughly the same.
The spread of misinformation
over the internet about the safety,
reliability, and efficacy of vaccines is yet another example of how viral
misinformation via social media is damaging our society.
Measles was declared
eradicated in this country in 2000. Hopefully, our public health officials will
address the situation swiftly, not only to eliminate the threat of measles
itself, but also to ensure that the anti-vaccine contagion does not spread to
other diseases that can have serious consequences for all of us. |
/*
* Copyright (c) 2007 Mockito contributors
* This program is made available under the terms of the MIT License.
*/
package org.mockito.internal.invocation.realmethod;
public interface RealMethod {
Object invoke(Object target, Object[] arguments) throws Throwable;
}
|
Development of colonoscopy teaching simulation.
After 17 years of prototyping, a first release version of the St Mark's Hospital teaching simulator is in final preparation. Advances in computer processing power and graphics cards make it possible to achieve real-time processing of colon and endoscope characteristics and a simulated endoscopic view at an acceptable cost. Realistic feel or "force feedback" for all instrument controls and shaft movements is incorporated. To make the simulator more than a "video game", a package of teaching and assessment features is to be incorporated, including interactive animated graphics to explain particular endoscope loops and situations and the variations of colonic anatomy that are typically encountered. Simulation should spare patients from being used for the early phases of training and should speed up and quantify the learning process. Simulators may introduce even experienced endoscopists to some of the advanced options available in current or future endoscopes or accessories, as well as the use of imminent new technology such as the magnetic imaging system. |
Alstrom Syndrome UK
Charity information
Alstrom Syndrome UK
Alstrom Syndrome UK (ASUK) was formed in 1998 after the Founder and Chief Executive Mrs Kay Parkinson's children were diagnosed aged 15 and 18. She was told it was extremely rare and only 12 other patients were then known to have the syndrome.
Alstrom Syndrome in both children and adults can often go undiagnosed. Alstrom Syndrome is now creating much greater awareness and spearheading important research. |
Do You Have Celiac Disease and Have Questions Or Need Help?
Join Celiac.com's forum / message board and get your questions answered! Our forum has nearly 1 MILLION POSTS, and over 62,000 MEMBERS just waiting to help you with any questions about celiac disease and the gluten-free diet. We'll see you there!
Food Allergies and Sensitivities: Is Gluten an Underlying Factor?
Dr. Ron Hoggan, Ed.D.
As co-author of "Dangerous Grains" and "Cereal Killers", the study of the impact of gluten continues to be a driving passion in my life. I am fascinated by the way that gluten induces illness and impedes learning while it alters mood, behavior, and a host of other facets of our existence. Sure, the impact of gluten on health is an important issue, but that is only the most obvious area of impact. Mood disturbances, learning disabilities, and the loss of quality of life due to psychiatric and neurological illness are even more tragic than the plethora of physical ailments that are caused or worsened by gluten. The further I go down this rabbit hole, the more I realize that grains are a good food for ruminants - not people. I am a retired school teacher. Over the last decade, I have done some college and university level teaching, but the bulk of my teaching career was spent working with high school students. My Web page is: www.DangerousGrains.com
Journal of Gluten Sensitivity Spring 2015 Issue - Originally published April 8, 2015
Celiac.com 12/08/2015 - Is the rate of food sensitivity and allergy growing? Or are we just more concerned about it because children experience anaphylactic crisis, sometimes even dying from exposure to peanuts, strawberries, and all the other foods that most of us think of as harmless? Even if the rates are growing, what is the cause? And should we, in the gluten sensitive community, be concerned about developing such allergies? After all, celiac patients were often told that there was no greater risk of developing IgE food allergies among those with celiac disease than is experienced by the general population (1, 2). I was certainly told this, on more than one occasion, by apparently well qualified medical practitioners. Yet, more recent research is showing that those with any autoimmune disease, including celiac disease, have a much greater risk of developing such allergies (3). Unfortunately, we still have more questions than answers. Nonetheless, the issue really does warrant exploration, especially among those who are gluten sensitive. Further, since the numbers of those with non-celiac gluten sensitivity remain controversial, we can also look at the issue from another perspective.
For instance, a study of childhood IgE allergy frequency, at a center in Texas devoted to treating allergies and similar ailments, the investigators looked at antibody reactions to cow's milk, eggs, fish, peanuts, sesame, shellfish, soy, tree nuts, and wheat. They reported that the rate of all of these allergies combined had almost tripled (from 3% to 8%) in only five years (4). That is a startling rate of increase. If this finding can be applied more broadly, it should be alarming.
However, another research group at Cornell University in Ithaca, New York, reported that childhood emergency department visits for food allergy reactions remained stable over a nine year period, while adult visits for food allergy reactions declined over this same time period (5). The central thrust of their report appears to be that we have an improving understanding of how to manage our own and our children's allergic reactions, so emergency room visits are becoming, relatively less frequent. This may simply signal that allergies are becoming so common that, as a culture, we are becoming better versed in how to avoid or manage mild allergic manifestations.
Yet another group of investigators in Australia state that there has been a "dramatic rise in the prevalence of IgE-mediated food allergy over recent decades, particularly among infants and young children " (6). They go on to suggest that this increase may be due to "the composition, richness and balance of the microbiota that colonize the human gut during early infancy" (6). They further assert that IgE food allergies are connected to an impaired barrier function of epithelial cells that line the intestinal wall, in combination with immune dysregulation (6).
Still others assert that the increase in allergies may be tied to climate change via several factors including "variability of aeroallergens, food allergens and insect-based allergic venoms" (7).
Martin Blazer, M.D., in his book titled Missing Microbes argues that overuse of antibiotics may be at the root of both the increase in food allergies, as well as the increasing prevalence of celiac disease, through disrupting the gut microbiome and selection for antibiotic-resistant strains of microbes (8).
Some or all of the foregoing theories may well have a legitimate influence on our growing rates of allergies. As I see it, however, the various theories postulated to explain these increasing rates have left out one powerful dietary trend that has also accompanied these increases in IgE food allergy prevalence. For instance, compromised intestinal barrier function is a well documented feature of gluten grain consumption, although it is greatest in the context of celiac disease. The increased release of zonulin, triggered by eating gluten grains, may also be a critical factor in the development and persistence of the disease process, especially in cases of celiac disease, type 1 diabetes, rheumatoid arthritis, ankylosing spondylitis, Crohn's disease, systemic lupus erythematosus, and about one quarter of cases of multiple sclerosis (9, 10).
In the gut, gluten triggers increased release of zonulin, which weakens the junction between the epithelial cells that form the intestinal walls, and usually provide a protective barrier where these cells connect (11). The "gap" between these cells, caused by increased zonulin release, allows undigested proteins and peptides to bypass the cells that usually transport digested particles from the intestine to the bloodstream. Partly digested proteins, small peptides, also move through these epithelial cells, following the same path that fully digested food particles follow. However, according to Dr. Fasano, those are usually so degraded that they don't trigger antibody production (9). Thus, the leaky gut that has long been associated with celiac disease, and is often seen as a characteristic of, but not restricted to this ailment, is a critical stage in the development of this illness. This leakiness is, as most readers will know, reversed by a gluten-free diet.
We are now seeing, in the peer reviewed medical literature, a wide range of ailments being identified as manifestations of undigested food proteins being "leaked" into the circulatory system. Further, there is a dose-dependent relationship between increasing gut permeability and increased gluten consumption, both in celiac disease and in other forms of autoimmunity (12). If this dose-dependent relationship also applies to many of those with other sensitivities, at admittedly lower levels of permeability (13), and if that is the dynamic that underlies much of the increasing trend of IgE food allergies, we should be seeing the rates of these allergies continue to rise in the general population. And, if we continue with our gluten gluttony, who can say how many ailments are associated with gluten consumption and increased zonulin release?
It is also possible, perhaps even probable, that some of us experience increased zonulin release into the bloodstream, rather than into the intestinal lumen. If so, those peoples' epithelial linings of lungs, nasal passages, and blood brain barriers, may be more compromised than those individuals who primarily experience a leaky gut. By weakening these other barriers, they may invite other ailments that are less obviously triggered by gluten and other food proteins.
Dr. Alessio Fasano has stated that new understandings of zonulin's role in autoimmunity, inflammation, and some cancers, "suggests that the autoimmune process can be arrested if the interplay between genes and environmental triggers is prevented by reestablishing [sic] the intestinal barrier function" (9). An animal study showed that AT1001, an experimental drug that blocks the action of zonulin, protected against autoimmune attack on pancreatic islet cells (9) which produce insulin. A human study of twenty-one subjects, reported similar findings (14).
While it is true that intestinal infections have also been shown to induce zonulin release in the gut, the issue of microbes may not be as large a factor as it at first appears. When bacteria colonize our intestines, there are three possible outcomes: First, the infection may run rampant and kill us, thus solving the problem in a most undesirable manner. Second, and much more likely, we may take antibiotics and deplete or eliminate these infectious agents in our intestines. Third, and most likely, a combination of our immune systems, other microbes resident in our gut, antibiotics, and other, possibly unknown factors, may quickly or slowly bring the infectious agent under control. By reducing its numbers sufficiently that it won't pose a serious threat to our well being, and the harmful impact of these microbes has been muted.
The second and third possibilities will be both the most common and most desirable. Also, as soon as the microbe in question is under control, zonulin release should be diminished to a point where it is either a minor factor in triggering continued zonulin release or, because it has been eradicated, the microbe will become irrelevant to zonulin release. On the other hand, for as long as we consume gluten, zonulin continues to be released, thus disrupting tight junctions in the intestinal, pulmonary, sinus, and other mucosal membranes, permitting allergens to reach our circulatory systems, ultimately giving rise to the growing prevalence of dangerous allergies that may sometimes manifest in anaphylactic reactions.
The most important issue here seems to be the impact of gluten consumption on zonulin release, along with its impact on several protective barriers in the body, weakening them at the previously tight junctions between their cells. These include the blood brain barrier, which usually protects the brain from impurities and antibodies in the blood. It also includes the mucosa that line the lungs and nasal passages that protect us from airborne toxins and microbes. When that barrier is compromised, small particles from the air that we breathe will reach our circulation and trigger immune reactions...also known as allergies.
Perhaps the most important barrier is in the digestive tract. It is made up of several variants of mucosa that protect the tissues of the gastrointestinal tract from toxins and the unwanted particles in our foods and beverages (well, most of them anyway). This, it seems to me, is the crux of our growing crisis with environmental allergies and the elevated zonulin levels that sometimes accompany them. And we can't even begin to combat this dynamic without first understanding it better.
In the meantime, adding AT1001 to gluten-containing flours might be useful. Conversely, the media voices that are selling the idea that a gluten-free diet is an expensive fad might soon see research that reveals the gluten-free diet as an excellent prophylactic against developing IgE allergies, a variety of cancers, autoimmunity, some psychiatric illnesses, and many neurological diseases. In the interim, we can only use our own best judgement and decide for ourselves. Would the dietary products of gluten grains really be that great a loss to the palate? Is it a reasonable trade-off to risk falling prey to all of the potential consequences that come to us through elevated release of zonulin?
More compellingly, perhaps, Professor Loren Cordain's assertion that humans have not had enough time to become fully adapted to eating cereal grains, especially as a dominant portion of our diet (15), appears to gain considerable support from the discovery and characterization of zonulin. Further, although some European, Asian, and northern African genes may have had as much as 15,000 years to adapt to this food source, most of the world's inhabitants have had a much shorter time to adapt. These are periods that are most appropriately measured in centuries and decades. The assumption that gluten grains can be safely consumed by all humans, because we have been eating them for "thousands of years" is unlikely to be true for most of the world's current population, and may represent a Eurocentric perspective. |
Fire and Water Damage Restoration in Plymouth Meeting, PA
Enter your info to have an expert call you ASAP!
Fields with (*) are required.
Full Name*
Phone Number*
Email Address*
Comments
At Niki Francis Restorations, we’re dedicated to finding innovative ways to save and restore your property and possessions to pre-loss conditions. If you have experienced a disaster from water, mold, fire or smoke, then you need to get back to normal as soon as possible.
Most restoration companies believe it is necessary to discard everything and start from scratch. That can be very costly in terms of time, money and headaches. For example: if a section of the kitchen floor has been damaged by water then we fix that section, not an overhaul of the entire kitchen.
Our team can handle any situation involving the restoration of your property or valuable possessions. Whether it’s in the form of fire damage, water damage, or in many cases mold and smoke. Often times it’s also a matter of being able to notice where there’s damage the owner might not even know about. We can offer trained eyes to come in, assess the situation and then get to work improving things.
At the same time, we’re able to notice possible problems before they become an issue. It’s always better to head off a problem before it really becomes an issue. Our trained team knows the signs of potential problems with water damage, fire hazards and similar situations. We can find them, fix them and prevent hundreds or thousands of dollars of property damage before it happens. We’re devoted to keeping buildings safe and beautiful, whether it’s an office or your home.
At Niki Francis Restorations, we are always looking for ways to enhance our services and provide value to our customers. We are experts in residential and commercial water, fire, storm damage and smoke restoration, mold remediation, and Antique Restorations.
Niki Francis Restorations offers FREE estimates on water remediation. We offer the following services to property owners in our Bucks and Montgomery county service area: |
Introduction {#Sec1}
============
Internet services are increasing in popularity, and many new online services appear every day. The use of online services leads to a massive volume of online financial transactions, where sensitive information is exchanged via the Internet. The attacker's interest is converted from curiosity to financial benefit. Attackers use different malware to achieve their goals. Among the various forms of malware, Botnet is considered to be the most serious means for conducting online crime \[[@CR1]\]. However, financial profit is the goal of Botnets creation and development by attacker \[[@CR2]\].
A Botnet is a network of compromised computers (Bots) remotely managed by an attacker (Botmaster). A Botnet can be ordered to perform various malicious activities, such as sending spam emails, phishing, click fraud, DDoS and spreading malicious software. To effectively administer a Botnet, the Botmaster constructs an infrastructure of a communication channel to send commands to the Bots and to receive results from them \[[@CR3]\]. This communication channel is known as the command and control (C&C) channel. The main difference between a Botnet and other malware is the infrastructure used in the C&C \[[@CR4]\]. In contrast to other malware that is used to perform malicious behaviour individually, a Botnet works as a group of infected hosts based on the C&C communication channel. A Botnets network can be classified into two main categories based on the C&C infrastructure: centralized and decentralized C&C \[[@CR5]\]. In centralized Botnets, the Botmaster normally uses the C&C server to send a command to the Bots as shown in (Fig. [1](#Fig1){ref-type="fig"}a).Fig. 1Structures of the Botnet. **a** Centralized structure, **b** decentralized structure
Due to its simplicity, the centralized Botnet is widely used by many Botnet families. The most famous approaches are the Internet Relay Chat (IRC) and Hypertext Transfer Protocol (HTTP) Botnet. However, the main limitation of the centralized Botnet is its single point of failure C&C server. A shutdown of the C&C server would result in the loss of communication between the Bots and the Botmaster \[[@CR6]\]. In order to avoid the weakness of a single point of failure, Botnet attackers have recently started to build Botnets based on decentralized C&C infrastructures such as the P2P Botnet \[[@CR7]\] and P2P model was adopted by many types of Botnet, e.g. Storm Bot, Conficker Bot and Waledac Bot \[[@CR8]\].
A P2P Botnets are a new class that has replaced the old centralized IRC/HTTP-based Botnet to avoid a single point of failure and avoid detection during C&C connection. Due to the distributed network structure of P2P systems, all peers in the network work as a Bot (client) and C&C (server) at the same time. In this case, the Botmaster plays the main role by sending commands to any infected peers to execute any order or requesting information at any time (see Fig. [1](#Fig1){ref-type="fig"}b).
The life cycle of the P2P Botnet consists of four primary phases, namely: initial infection, peer propagation, secondary injection and attack \[[@CR7]\]. Firstly, Bot code is created to insert on an end-user computer by different techniques such as web download, vulnerability exploitation, mail attachments, automatically scan, exploit and compromise, traditional file-based viruses \[[@CR9]\]. Secondly, the Bot tries to connect with other Bots on infected hosts based on its own hard-coded peer list. Thirdly, the Bot downloads the latest update of the Bot code through the C&C channel, which will update it for future tasks. In this phase, a host is considered to be a Bot in Botnet network. Finally, the Bot initiates malicious activities such as spam or phishing emails, distributed denial-of-service attacks (DDoS), stealing information and scanning activities.
Despite many research efforts, the P2P Botnet detection remains a significant challenge for the researchers. Firstly, the traffic of P2P Botnet is similar to normal traffic; and secondly, many P2P Botnets, such as Storm and Waledac, use encryption algorithms that make methods based on packet inspection ineffective. Furthermore, there is no central server in P2P Botnets and in addition Bots contact other peers using random ports \[[@CR10]\].
The main aim of this research is to develop P2P Bot detection approach based on traffic reduction technique. The approach proposed in this research has the following characteristics. It detects Bots during the propagation phase before any malicious action has been taken. Furthermore, it does not require deep packet inspection (DPI) analysis for signature matching and does not need to analyse the entire network traffic. It detects Bots independent of port numbers, IP addresses and host characteristics. In summary, we made the following contributions:A network traffic reduction approach that has been designed will be able to increase the performance of the proposed framework.A connection-based detection mechanism is independent of payload and uses only the information obtained from the header of TCP control packet. Thus, it does not need deep packet inspection and cannot be confused with payload encryption techniques.Adopting the classification and regression trees to select the important connection features in order to decrease the size and dimensionality of the dataset.Detection of P2P Bot traffic on the network and discriminating it from legitimate network traffic.
The rest of this paper is organized as follows. Section [2](#Sec2){ref-type="sec"} briefly reviews work relevant to P2P Botnet detection approaches. The proposed approach is then described in Sect. [3](#Sec3){ref-type="sec"}. Section [4](#Sec8){ref-type="sec"} presents the experimental results, and finally the conclusions and suggestions for future work are presented in Sect. [5](#Sec12){ref-type="sec"}.
Relevant work {#Sec2}
=============
In recent years, there has been an increasing interest in techniques for Bot detection and prevention. While it may be important to learn how a Bot infects the computers, it is more critical to detect the infected machine before it is exploited to launch malicious activities. Several approaches to detect Botnets have been developed. These approaches can be classified into signature-based, anomaly-based, DNS-based and data mining techniques \[[@CR11]\]. Another researchers such as Han et al. \[[@CR5]\] classified P2P Botnet detection systems into three general types: data mining, machine learning and network behaviour and traffic analysis. What is more, Zeidanloo et al. \[[@CR12]\] in their research classify the Botnet detection system as honeynets or intrusion detection systems (IDS) and also divided the IDS system into three subgroups as following: anomaly-based, specification-based and signature-based. In addition, the Botnet detection system can be classified based on the installation point as a host-based, network-based and hydride systems. Lu et al. \[[@CR3]\] have classified the Botnet detection techniques on the basis of machine-learning type supervised and unsupervised Botnets detection.
A recent study in the field of P2P Botnet detection by Babak et al. \[[@CR13]\] proposed PeerRush, which uses a one-class classification approach to classify various types of normal and abnormal P2P traffic. One-class classifier including KNN, Parzen and Gaussian data description classifiers \[[@CR14]\] is used. An application profile is initially created by learning traffic samples of known P2P applications. Moreover, features such as interval delays between packets and flow duration are used to classify P2P applications. This approach achieves high accuracy rate in classifying P2P applications depending on the features selected. On the other hand, this method does not show clearly how to detect P2P Botnet, and also detection can be easily avoided by changing the delay between packets.
In \[[@CR15]\], Garg et al. presented a several machine-learning algorithms such as nearest neighbour, Naive Bayes and J48. These have been analysed for the detection of P2P Botnets using various network traffic features. The results show that the accuracy of the classifiers trained using the nearest neighbour and J48 is good. However, the detection of legitimate traffic is very weak.
Jiang and Shao \[[@CR16]\] present a method that focuses on the C&C traffic of P2P Bots regardless of how they perform their malicious activity. This method develops a detection mechanism based on a Bots which exhibit connection flow dependency with other Bots. According to the flow dependency behaviour, this approach uses single-linkage hierarchical clustering mechanism to differentiate between P2P Bots and normal hosts. This method was built based on the similarity of Botnet traffic, so this approach will fail to detect the Botnet, which uses the irregularity of traffic flow such as Storm Bot \[[@CR17]\]. Furthermore, it has a limitation to identify individual Bot behaviour.
EFFORT \[[@CR18]\] is a host-based detection approach which collects information related to Bot's characteristics at client and network level. It then correlates Bot-related information by monitoring local computer activity such as keystrokes and connections with other computers. The main advantage of this method is that it does not depend on protocol and communications topology. In addition, it is able to detect Bots that are using encryption techniques to hide the malicious behaviour. The major limitations of this method are critical to evasion techniques such as fast-flux, and it cannot prove as real-time detection approach.
Masud et al. \[[@CR19]\] introduced an approach to Botnet detection based on the observation that a Bot has many reaction patterns which are different from those of humans. This method can detect Bots by correlating incoming packets with outgoing packets, new outgoing connections and application start-ups in hosts. Several machine-learning algorithms such C4.5 decision tree, support vector machine, Naive Bayes, Bayes network classifier and boosted decision tree \[[@CR20]\] were compared and evaluated in the detection of IRC Botnet. The result of the classifiers evaluation shows that all machine-learning algorithms achieve 95 % detection rate, less than 3 % false positive rate and under 5 % false negative rate. The greatest overall performances were reached by a boosted decision tree. However, one major drawback of this approach is that it cannot detect Botnets that use encrypted communication because it needs to access the content of the payload packets. On the other hand, the method has been tested on IRC Bots, therefore its ability to detect modern types of malware such as P2P Bots is not known.
Zhang et al. \[[@CR21]\] introduced a P2P Botnet detection system that can identify stealthy P2P Botnets. The proposed approach focuses on identifying Bots based on the monitoring of C&C traffic. They extract four features for each traffic flow including the number of bytes received and sent and number of packets received and sent. Hierarchical clustering \[[@CR22]\] and BIRCH algorithm \[[@CR23]\] are used to cluster network flow. Furthermore, the approach is independent of payload signatures and has also achieved a high rate of detection both malicious and legitimate hosts, with the FPR of 0.2 % and TPR 100 %. Although this system can detect Botnets regardless of how they perform malicious activities, it focuses only on P2P Botnet and cannot detect other types such as IRC or HTTP Bots. However, the proposed technique is vulnerable with some of the evasion methods such as flow disturbance packets and by using the DGA and fast-flux algorithms as a communications facility in order to provide C&C a high level of privacy.
Liao et al. \[[@CR24]\] used a methodology based on packet size to distinguish between P2P Botnet traffic and legitimate P2P traffic. They presented the following observations. Firstly, P2P Bots tries to update information for other Bots rather than staying idle. Secondly, the Bot mainly transmits data with a minimum rate of connections. Bayesian networks, Naïve Bayes and J48 are used to classify network traffic. Furthermore, the accuracy rates for the three algorithms are 87, 89 and 98 %, respectively. However, it was found that the size of P2P Botnet packets is smaller than that of any other P2P applications.
The detection system introduced by Fedynyshyn et al. \[[@CR25]\] uses a host-based approach to detect Bots using the property of temporal persistence. They utilized a J48 classifier and a random forest algorithm for sorting various kinds of Botnet infection categorized according to their C&C model (HTTP, IRC and P2P). Moreover, they found similarities in C&C structures for different categories of Bots that are different from those of legitimate network traffic.
In 2014, Zhang et al. \[[@CR26]\] introduced an approach based on their previous research in 2011 \[[@CR21]\] to enhance the performance of the system scalability and increase the efficiency. The method includes two main phases which are: (1) recognizes all machines that are possibly involved in P2P connections and extracts statistical fingerprints from profile P2P traffic, (2) analyses the traffic of P2P hosts to classify them as P2P bots or legitimate P2P hosts. In the experiment, P2P applications such as eMule, LimeWire, Skype and BitTorrent were run on various machines to generate legitimate traffic. Besides, Waledac and Storm were run in a controlled environment to generate malicious network traffic. By using hierarchical clustering of P2P flows the approach capable of distinguishing legitimate P2P traffic from P2P Botnet traffic with 100 % detection rate and 0.2 % false positive detection rate. The significant advantage of the method is that it is efficient to distinguish Bots traffic which is overlap within legitimate host traffic with high detection rates.
Zhao and Traore \[[@CR27]\] introduced a P2P Botnet detection technique based on recognizing the malicious behaviour of fast-flux networks. They calculate metrics of features from captured network traffic which are used to identify Botnet traffic. However, the approach through using decision tree algorithm achieves high accuracy rates.
In the proposed approach, a decision tree is utilized as a feature set reduction mechanism to exclude insignificant features for the endeavour of downsizing the quantities of data necessary to acquire better classification accuracy rate, learning rate and reducing in computational time. It includes a unified method which incorporates classification and regression trees (CART) \[[@CR28]\] and a multilayer feed-forward neural network with resilient back-propagation algorithm \[[@CR29]\] for the use of P2P Bot detection.
The proposed system uses the header of TCP control packets to bypass the encrypted network traffic and reduce the number of packets that will enter to the detection system. Moreover, focusing on the connection behaviour will help the detection system to recognize the Bot behaviour at an earlier stage when the Bot propagates and tries to contact with other peers to find new updates. Furthermore, the proposed feature sets are estimated for every connection in the network to detect any single infect machine. To the best of our knowledge, this is the first time that connection-based features are used in P2P Bot detection. As the features are extracted from packets headers, they do not rely on the packet payloads. With this characteristic, our detection approach will not be affected by traffic encryption. Furthermore, the feature sets help the detection system to identify P2P Bot infects even single host in the network.
Proposed approach {#Sec3}
=================
The proposed framework relies on two fundamental concepts. Firstly, it is passively monitoring network traffic \[[@CR12]\]. Secondly, it utilizes the fact that Bots during the propagation phase will show frequent communication behaviours with their C&C servers/peers in order to discover other peers and receive the latest update of tasks due to their pre-programmed nature \[[@CR30], [@CR31]\]. Bots are different from other malware in that they work as a group and they primarily need a communication channel to coordinate their malicious activities. These connections are described as the way by which the Botmaster communicates with his Bots \[[@CR9]\]. The proposed P2P Bot detection uses a multilayer feed-forward neural network with adaptive learning rate, since most well-known P2P Bots communicate using TCP connections \[[@CR32]\] such as Waledac Bot \[[@CR33]\], Storm Bot \[[@CR34]\], Conficker Bot \[[@CR35]\] and Zeus Bot \[[@CR36], [@CR37]\]. Therefore, in this paper features related to TCP connection have been extracted based on TCP control packets. To increase the learning rate, a resilient back-propagation algorithm is used. The resilient back-propagation is considered to be the best algorithm, measured in terms of convergence speed, accuracy, robustness and with respect to training parameters \[[@CR29]\]. Figure [2](#Fig2){ref-type="fig"} shows a block diagram of the proposed system.Fig. 2Block diagram of the proposed system
Network traffic reduction {#Sec4}
-------------------------
Network traffic reduction for detection of malicious activities is essential for managing enormous amounts of network traffic where resources are restricted (e.g. memory, hard disk). The most difficult part of this process is to identify the behaviour of network traffic by inspecting only a small number of packets per flow. Therefore, this research introduces a new traffic reduction technique to facilitate the deployment of Bot detection systems on high-speed networks.
The most of the existing Botnet detection systems \[[@CR38]--[@CR41]\] rely on deep packet inspection (DPI) to analyse packet content, which is computationally expensive and inefficient to recognize unknown payload signature \[[@CR42]\]. In DPI, the system is assumed to have access to the payload of every packet. This technique can be notably accurate when the payload is not encrypted. However, the majority of new malware generation applies evasion methods such as encryption of payload, protocol encapsulation and obfuscation \[[@CR43]\].
Furthermore, examining all packets on a high-speed network is an expensive task because the speed of networks and the amount of the packet transferred via networks are increasing daily. Thus, the detection system which applies DPI may suffer from efficiency bounded on processing a large volume of traffic from high-volume or high-speed networks \[[@CR42]\]. The goal of our work is to increase the effectiveness of the detection systems by decreasing the volume of traffic to be analysed, without affecting the accuracy of the detection process. To achieve this goal, a novel traffic reduction is proposed for a Bot detection framework by selecting only TCP control packets. The framework can efficiently and effectively reduce the amount of traffic that will be entering into the detection system. To the best of our knowledge, this first P2P Bot detection approach applies reduction technique to achieve the efficiency on Botnet detection domain.
In this study, a filtration of TCP control traffic packets is used to reduce the volume of network traffic as well as to increase the performance of the proposed approach. The filtering includes two steps: filtering all traffics related to the TCP protocol; then extracting the TCP control packet SYN, ACK, FIN and RST. Algorithm 1 shows the process of reduction network traffic from network traces (.PCAP files). In Line 2, an array of TCP_Control_Packets_list is initialized. By iterating over the packets, new packets are added to the array of (TCP_Control_Packets_List) from Line 3 to 15 till the last packet in the file is reached. Line 4 examines for TCP packet header, and Line 5 selects packets with no payload data. Line 6 gets the packet header. From Line 7 to 10, the code reads the packet, which is TCP, and extracts the packets having SYN, ACK, FIN and RST flags.
In summary, the network traffic reduction algorithm 3.1 includes six rules to pick the desired packets:*Rule 1* (*R1*) Packet contents SYN flag.*Rule 2* (*R2*) Packet contents SYN--ACK flag.*Rule 3* (*R3*) Packet contents ACK flag.*Rule 4* (*R4*) Packet contents FIN--ACK flag.*Rule 5* (*R5*) Packet contents Rest--ACK flag.*Rule 6* (*R6*) Packet contents Rest flag.{#d29e598}
Feature extraction {#Sec5}
------------------
In the features extraction phase, the features that are important in detecting the Bot's malicious behaviour are extracted, and these features are collected in 29-tuple attributes based on 30-s connections. These features are extracted based on the definition of a connection as a group of packets exchanged between two different hosts, which are identified by the 4-tuple (source IP address, destination IP address, source port and destination port). In our proposed method, all features are extracted directly from the control packet header, rather than previous approaches using deep inspection of packet payload content, e.g. \[[@CR3], [@CR44]--[@CR46]\]. Therefore, performance is increased, and the use of the system resources such as memory and computations in the processor is reduced. Table [1](#Tab1){ref-type="table"} shows the 29 features created in the proposed connections-based P2P Bot detection approach. These features are generated from a 30-s connection and are composed of a feature vector to represent the features of a 30-s connection.Table 1Selected features of network traffic connectionsFeaturesDescriptionF1Number of control packets per flow in a given time intervalF2Number of control packets transmitted per flow in a given time intervalF3Number of control packets received per flow in a given time intervalF4Number of transmitting bytes per flow in a given time intervalF5Number of received bytes per flow in a given time intervalF6Number of transmitted SYN packets per flow in a given time intervalF7Number of received SYN packets per flow in a given time intervalF8Number of transmitted ACK packets per flow in a given time intervalF9Number of received ACK packets per flow in a given time intervalF10Number of transmitted duplicate ACK packets per flow in a given time intervalF11Number of received duplicate ACK packets per flow in a given time intervalF12Average length of transmitted control packets per flow in a given time intervalF13Average length of received control packets per flow in a given time intervalF14Average length of control packets per flow in a given time intervalF15Number of transmitted failed connection per flow in a given time intervalF16Number of received failed connection per flow in a given time intervalF17Number of transmitted ACK packets have a sequence one per flow in a given time intervalF18Number of received ACK packets have a sequence one per flow in a given time intervalF19Number of transmitted SYN--ACK packets per flow in a given time intervalF20Number of received SYN--ACK packets per flow in a given time intervalF21Total number of bytes per flow in a given time intervalF22Ratio of incoming control packets per flow in a given time intervalF23Ratio of average length of outgoing packets over the average length of control packets per flow in a given time intervalF24F6--F20F25Number of transmitted FIN--ACK packets per flow in a given time intervalF26Number of received FIN--ACK packets per flow in a given time intervalF27Number of transmitted RST--ACK packets per flow in a given time intervalF28Number of received RST--ACK packets per flow in a given time intervalF29Average time between an attempt to create connection per flow in a given time interval
Features reduction {#Sec6}
------------------
Feature reduction is the technique of reducing the number of attributes, with the purpose of eliminating those features from the learning algorithm that have a small influence on the classification problem \[[@CR47]\]. Feature reduction is used to decrease the 'over-fitting' problem \[[@CR48]\] and is important to overcome the imbalance dataset problem \[[@CR49]\]. Therefore, the quality of the feature reduction mechanism is one of the most important factors that affect the accuracy of the classification algorithm.
In this study, the aim of feature reduction is to choose a suitable subset of features, which will improve neural network performance and decrease the complexity of a classification model without significantly decreasing accuracy rates. In this study, a classification and regression tree (CART) is employed as the feature reduction approach used to eliminate worthless features, with the aim of reducing the quantity of data needed to obtain better rates of neural network learning and classification accuracy.
The decision tree produced by the CART algorithm consists of two types of node: internal nodes with two children and leaf nodes without children. Any internal node is associated with a decision function to indicate which node to visit next. To begin the construction of the tree, the training samples that contain a set of features and their class labels are required. The training set is recursively divided into smaller subsets during the construction of the tree. Based on the decision matrix from the distribution of classes in the training set, each resulting node is assigned a predicted class. The test at internal nodes is determined based on a measure of impurity to select which feature and which threshold values are selected. The best-known measure of impurity for CART is entropy impurity which is given by.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ E\left( t \right) = - \mathop \sum \limits_{j}^{C} p\left( {\frac{j}{t}} \right)\log_{2} p\left( {\frac{j}{t}} \right) $$\end{document}$$where *E* (*t*) is the entropy impurity at node *t*, $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ p\left( {\frac{j}{t}} \right) $$\end{document}$ is the relative frequency of class j at node *t*, and *c* is the number of classes.
The best value of the split node (*t*) is chosen from a set of all values splitting (*X*), so that the maximum drop in impurity is a difference between impurity at the root node and impurity at the children nodes:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \Delta E\left( {X,t} \right) \, = \, E\left( t \right) \, {-} \, \left( {P_{\text{L}} E\left( {t_{\text{L}} } \right) \, + \, P_{\text{R}} E\left( {t_{\text{R}} } \right)} \right) $$\end{document}$$where ∆*E*(*X*, *t*) is the drop of impurity, *E*(*t* ~L~) and *E*(*t* ~R~) are the impurities of the left and right branch nodes, *P* ~L~ and *P* ~R~ are the percentages of objects go to the left (*t* ~L~) or right (*t* ~R~) child nodes. Table [2](#Tab2){ref-type="table"} provides a ranking of features' importance selected by the CART algorithm. The features F3, F13, F23, F21, F14, F29, F12, F1, F4 and F15 have the best discrimination of the connections behaviour, whereas the features F2, F7, F9, F11, F16, F18, F19, F20, F22, F24, F25, F26, F28 have no discrimination between legitimate and malicious connections.Table 2Features importance ranking by CART and ReliefFCART algorithmReliefF algorithmFeatureImportanceFeatureImportanceF3100F270.08668F1369.77551F250.031391F2358.82751F150.026481F2114.94384F60.026306F142.900449F220.02497F290.794777F240.024034F120.384592F290.023641F10.120902F230.016308F40.082941F260.013599F150.069167F190.011077F60.012049F140.008974F50.01191F130.004725F270.01153F120.004475F100.000515F280.004378F83.81E−06F180.004236F176.12E−09F30.003006F20F10.002928F70F90.002817F90F200.002746F110F40.002391F160F80.002162F180F20.002123F190F210.001838F200F170.001292F220F110.00126F240F100.001083F250F50.00054F280F160F260F70
ReliefF is generally utilized in the data pre-processing phase as a feature selection approach. The key idea of the ReliefF is to evaluate the quality of attributes according to how well their values discriminate between the instances that are near to each other \[[@CR50]\]. The ReliefF algorithm essentially consists of three important parts: firstly, estimation of the nearest miss and nearest hit; secondly, estimation of the weight of a feature; thirdly, return a ranked list of features. The pseudo code of the ReliefF algorithm is given in Algorithm 2 \[[@CR51]\]. Table [2](#Tab2){ref-type="table"} shows the important ranking of features estimated by the ReliefF algorithm.{#d29e1503}
The principal component analysis (PCA) is a feature selection and, to be precise, is also a feature reduction approach. PCA reduces the initial number of features to a smaller number of uncorrelated features, which are calculated as the linear combination of the original ones \[[@CR52]\]. For instance, each principal component in PCA is the linear combination of the variables that gives a maximized variance \[[@CR53]\]. The mathematics behind PCA is briefly described here.
Given an *M* × *N* matrix, *X*, where *M* is the number of attributes and *N* is the number of samples. The mean *m* of the training samples (corresponding to a column vector *N*) is given:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ m = \frac{1}{M}\mathop \sum \limits_{i = 1}^{M} xi $$\end{document}$$
Centralize the matrix *X* by subtracting *m* from each *xi*.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ yi = xi - m $$\end{document}$$Further, the covariance matrix is estimated by$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\text{cov}} = \frac{1}{M}\mathop \sum \limits_{i = 1}^{M} yi \cdot yi^{T} $$\end{document}$$
Calculate the eigenvectors and eigenvalues of the covariance matrix, and then select top *k* eigenvectors that correspond to the top k eigenvalues. The top *k* principal components are picked that retains 95 % (in the WEKA machine learning \[[@CR54]\]) of the data's overall variance.
PCA and ReliefF algorithms have also been used for the reduction of the feature set from the same set of features, and a comparison is made of the performances of these algorithms. The higher ten important features selected by each algorithm are summarized in Table [3](#Tab3){ref-type="table"}.Table 3Feature reduction with the CART, PCA and ReliefF algorithmsFeature selection algorithmFeatures numberFeature listCART10F3, F13, F23, F21, F14, F29, F12, F1, F4, F15PCA10Linear combination of featuresReliefF10F27, F25, F15, F6, F22, F24, F29, F23, F26, F19
Neural network {#Sec7}
--------------
The neural network is currently a subject of wide interest. It has robust capabilities for nonlinear system identification and control due to an inherent ability to approximate an arbitrary nonlinear problem \[[@CR55]--[@CR57]\]. The basic architecture of neural network includes input layer, one or many hidden layers and output layers. Moreover, every layer contains a specific number of neurons. The result from any neuron is used as input to another neuron in the next layer. The link between neurons has an associated weight. A neural network is trained by giving input and target sets repeatedly. Each input is given, and the network computes an output. The neural network outputs are used to determine the accuracy of results and whether the network is wrong or right. Whenever wrong, the network has improved the weight using a back-propagation based on the difference between the output and desired target of the neural network. After each iteration, the network reduces the error between output and target.
For the purposes of the present study, the neural network is trained with a resilient back-propagation learning algorithm, where the use of this algorithm is to minimize the damaging effects of the volumes of fractional derivatives. The sign of the derivative is only used to locate the trend of the weight update, whereas the volume of the derivative has no negative role overweight update. The size of the weight change is solely determined by the following formula \[[@CR29]\]:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \Delta w_{ij}^{\left( t \right)} = \left\{ {\begin{array}{l} { - \Delta_{ij} \left( t \right), \quad {\text{if}} \quad \frac{{{\partial }E\left( t \right)}}{{{\partial }w_{ij} }} \; > \;0 } \\ { + \Delta_{ij} \left( t \right), \quad {\text{if}} \quad \frac{{{\partial }E\left( t \right)}}{{{\partial }w_{ij} }} \; < \;0} \\ {0, \quad \quad {\text{else}} } \\ \end{array} } \right. $$\end{document}$$where $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \Delta w_{ij}^{\left( t \right)} $$\end{document}$ is the change in weight between input layer and hidden layer by the current iteration (*t*) and $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \frac{\partial E\left( t \right)}{{\partial w_{ij} }} $$\end{document}$ denotes the partial derivative with respect to each weight. Once the weights are calculated, the new weight updated value is determined. This is accomplished with the following formula:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \Delta_{ij}^{\left( t \right)} = \left\{ {\begin{array}{l} {\eta^{ + } \cdot \Delta_{ij} \left( t \right), \quad {\text{if}}\quad \frac{{{\partial }E\left( {t - 1} \right)}}{{\partial w_{ij} }} \cdot \frac{{{\partial }E\left( t \right)}}{{{\partial }w_{ij} }} \; > \;0 } \\ {\eta^{ - } \cdot \Delta_{ij} \left( t \right), \quad {\text{if}}\quad \frac{{{\partial }E\left( {t - 1} \right)}}{{{\partial }w_{ij} }} \cdot \frac{{{\partial }E\left( t \right)}}{{{\partial }w_{ij} }} \; < \;0} \\ {\Delta_{ij} \left( {t - 1} \right),\quad {\text{else}} } \\ \end{array} } \right. $$\end{document}$$where $\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ \Delta_{ij}^{\left( t \right)} $$\end{document}$ denotes the updated value for the current iteration *t*, *η* ^+^ is the positive step value which is typically 1.2, and *η* ^−^is the negative step value which is typically 0.5.
The neural network classifier proposed in this study contains ten input and two output parameters. To avoid overfitting by using too many hidden layers, the method proposed in a previous study \[[@CR28]\] is used to determine the number of neurons in hidden layers.
Experimental results and analysis {#Sec8}
=================================
Dataset {#Sec9}
-------
Two datasets that contain malicious and non-malicious traffic were obtained for use in evaluating our proposed system. The first is the ISOT dataset \[[@CR58]\] that contains malicious traffic from the French chapter of the Honeynet Project involving the Waledac and Strom Bots. It also contains non-malicious traffic collected from the Traffic Lab at Ericsson Research in Hungary and from the Lawrence Berkeley National Laboratory (LBNL). The second is the ISCX dataset \[[@CR59]\] which includes normal activity and non-malicious traffic. Table [4](#Tab4){ref-type="table"} shows the samples of network traces used in the experiment and the evaluation of the proposed model.Table 4Datasets selectedTraffic typeDuration (s)Number of packetsNumber of control packetsNumber of connectionsStorm Bot traffic3115128,24164,5515423Waledac Bot traffic605118,37949,5364535Normal traffic (ISCX)9511419,659165,21811,088Normal traffic (LBNL)126,273564,999166,30812,001
Experiment {#Sec10}
----------
To generate an experimental dataset with both P2P Botnets traffic and normal legitimate traffic, the trace (.PCAP) files were replayed using the TcpReplay tool on the same network interface card; then the network traffic was captured via Wireshark for evaluation. After that, a MATLAB script was used to generate connections and to extract features from PCAP file. Connections were then labelled in two classes of Bot and normal connections. In this work, a network connection is defined as 4-tuple, with source IP address, source port number, destination IP address and destination port number, which have transferred to at least one packet in both directions.
Performance evaluation and results {#Sec11}
----------------------------------
In order to evaluate the rate of accurate detection, *N*-fold cross-validation is used to estimate the error rate of classifiers. In *N*-fold cross-validation, the dataset is partitioned randomly into N samples and evaluations run for N iterations. In each iteration, *N*−1 samples are selected for training and the final sample is used to evaluate the accuracy of the classifier. *N* = 10 was selected in conducting the experiments. The performance of the proposed model is compared with that of the PCA and ReliefF algorithm as others feature selection approaches. To evaluate the performance of the neural network recognition system, measures such as false positive rate, true positive rate, accuracy, precision, recall and the *F*-measure are calculated as follows:*True positive* (*TP*) the number of malicious behaviours correctly detected as malicious activities.*True negative* (*TN*) the number of normal behaviours correctly detected as normal activities.*False positive* (*FP*) the number of normal behaviours detected as malicious activities.*False negative* (*FN*) the number of malicious behaviours detected as normal activities.
False positive rate (FPR) shows the percentage of legitimate instances misclassified as Bot instances.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\text{FPR}} = \frac{\text{FP}}{{\left( {{\text{TN}} + {\text{FP}}} \right)}} $$\end{document}$$
Detection rate (DR), also called recall, indicates the percentage of Bot instances that were predicted as Bot instances.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\text{DR}} = \frac{\text{TP}}{{\left( {{\text{TP}} + {\text{FN}}} \right)}} $$\end{document}$$
Accuracy indicates the percentage of correct predictions of all instances.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\text{Accuracy}} = \frac{{\left( {{\text{TP}} + {\text{TN}}} \right)}}{{\left( {{\text{TP}} + {\text{TN}} + {\text{FP}} + {\text{FN}}} \right)}} $$\end{document}$$
Precision indicates the percentage of instances correctly classified as a positive instance.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\text{Precision}} = \frac{\text{TP}}{{\left( {{\text{TP}} + {\text{FP}}} \right)}} $$\end{document}$$
*F*-measure: a measure of a test's accuracy. It considers both the precision and the recall of the test to compute the score.$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ F{\text{-measure}} = \frac{{\left( {2 \times {\text{Precision}} \times {\text{Recall}}} \right)}}{{\left( { {\text{Precision}} + {\text{Recall}}} \right)}} $$\end{document}$$
The results obtained demonstrate that the proposed approach gives the highest detection and accuracy rate with the neural network at around 99 %. The features based on the PCA algorithm gave lower accuracy and detection rates than the other approaches at around 93 and 91 %, respectively, as shown in Table [5](#Tab5){ref-type="table"}.Table 5Neural network results with CART subset, ReliefF subset and PCAClassifierProposed approachReliefFPCANeural networkAccuracy rateDetection rateAccuracy rateDetection rateAccuracy rateDetection rate99.2099.0897.3793.7791.0693.23
Figure [3](#Fig3){ref-type="fig"} gives the FPR, precision rate and F-measure of the Bot detection system using the various feature selection approaches with the same set of TCP features. The results show that the highest average F-measure rate was 98.32 % for the proposed methodology, while the lowest F-measure rate was 87.93 % for the PCA algorithm. Moreover, the proposed approach gave the lowest false positive rate of around 0.75 %.Fig. 3FPR, precision rate and F-measure comparison
To test the efficiency of our proposed approach in detecting P2P Bots, the receiver operating characteristic (ROC) curve is plotted to show the trade-off between TPR and FPR. A perfect classifier would have an area under curve (AUC) close to 1.0. The *x*-axis represents a FPR, and the *y*-axis represents a TPR. As shown in Fig. [4](#Fig4){ref-type="fig"}, the area under curve (AUC) is 0.994 for the TCP control packet feature selection based on CART with the neural network. It is found that the proposed approach performs well in classifying P2P Bot connection traffic based on TCP control packets in a 30-s time interval.Fig. 4ROC Comparison
The computational time of each feature selection algorithms is estimated to measure the performance of algorithms as expected in actual situation deployment. Also, we measure the neural network computational time that required to train it per second based on the subset of features that obtained from features selection algorithm. These analyses were conducted on 3.00 GHz Intel i7 running Windows 8.1 operating system.
Table [6](#Tab6){ref-type="table"} provides a comparison of all the features selection algorithm. The decision tree (CART) achieves the minimum time on selection subset of features than other technique using the same dataset as shown in Table [6](#Tab6){ref-type="table"}.Table 6Features selection algorithm computation timeFeatures selection algorithmCARTReliefFPCATime (s)2.51134.9
Table [7](#Tab7){ref-type="table"} shows the comparison of the build time (training time) of neural network models based on features selection subset. The CART algorithm achieved the best results for neural network training time compared with ReliefF subset and PCA. However, the maximum time is based on the subset of features that obtained from ReliefF algorithm.Table 7Neural network training time with CART subset, ReliefF subset and PCANeural network training timeCART features subsetReliefF features subsetPCA features subsetTime (s)232925
The main advantage of the suggested approach is reduction network traffic technique that it reduces 60 % of the input packets and retains high detection rates as well as low false positive rate. The bottleneck of the neural network model for Bot detection is the dimensionality and the size of the dataset considered because the amount of the packets that a detection system requires to scan is very large. Therefore, this study proposes a reduction network traffic approach to reduce the size of network traffic and utilize decision tree to reduce the features dimensionality. Additionally, the feature set used in the proposed system represents connection behaviour that helps to detect Bots in the early phase of their life cycle before they begin malicious activities. Moreover, to bypass the encrypted network traffic, connections-based detection mechanism was designed which utilizes the information in the header of TCP control packets. Thus, it cannot be confused by payload encryption techniques. The performance of the proposed approach was tested using real network traffic and is compared with some of the existing P2P Bot detection techniques.
Compared with other approaches, the proposed approach reduces the amount of processing required to increase performance. It is not easy to compare different Botnet detection approaches because each uses different datasets and Botnet samples in the experiments. Therefore, the proposed approach is compared with another detection approach based on accuracy, detection and false positive rates. Table [8](#Tab8){ref-type="table"} shows the results of the comparison of our results with those in other published work based on the analysis of network traffic to detect P2P Botnets. The table also demonstrates that the accuracy and false positive rates using the proposed approach are better than those gained by previous solutions. Moreover, due to its design, our solution is able to detect single Bot infections and it is not necessary to associate activity among multiple hosts during the detection phase, as in the case with TAMD \[[@CR60]\], BotMiner \[[@CR39]\] and BotSniffer \[[@CR38]\]. On the other hand, several existing schemes \[[@CR40], [@CR61]\] support the detection of individual Bot infections, but they use DPI. In contrast, our solution needs only information about network connections; it does not examine payload content. Therefore, it is immune to Botnets that use encryption methods. However, the present approach can detect P2P Bots and classify the host connections as legitimate or malicious. A limitation of the proposed research is that it only considers TCP traffic to detect Botnet traffic. Therefore, if Botnets use UDP packets for communication, this may not be detected by the proposed approach. In the future, thus proposed approach will be improved to have the ability to discover the Botnets that utilize the UDP protocol for communication.Table 8Comparison with other published approachesApproachesFPR %Accuracy %Fedynyshyn et al. \[[@CR25]\]7.892.9Wen-Hwa et al. \[[@CR24]\]098Proposed approach**0.7599.20**Bold entries relate to the results achieved by the technique proposed in this paper
There are four principal difficulties in the detection of Botnet behaviour: firstly, the network traffic is continuous, which indicates that it is persistent and features will change over time. Furthermore, Botnets dynamically change via Bot updates or altering their operation in various life cycle stages after receiving instructions from a Botmaster. These phenomena are termed concept drift, and this is currently a serious issue for any detection methods \[[@CR62]\]. Secondly, there is always the risk of a new Botnet emerging on a network and spread the malicious behaviour stealthily. Moreover, the behaviour of an infected host might seem like legitimate behaviour, and it is difficult to detect malicious activities if the classifier was not trained for this behaviour previously. Thirdly, evaluating the entire network traffic in real-time is a computationally expensive task due to the speed of network traffic. Finally, the availability of up-to-date Botnet traffic dataset remains a key challenge in detection of Botnets. The universality and precision of the classifier depend on the training datasets quality. The available Botnet dataset is formed in academic experiment source due to the security and privacy issue, and it is hard for the researcher to get a Botnet traces from other such as corporate networks.
Conclusion and future work {#Sec12}
==========================
A joint classification and regression tree (CART) algorithm and neural network have been presented to detect P2P Bot connections. The implementation of the CART--NN requires two sequential steps. Firstly, CART is applied to choose the suitable features important in detecting Bots. Secondly, the result of CART features subset is employed to produce the input layer of the neural network. The proposed method is based on features extracted from TCP control packet headers during 30-s connections between two hosts; thus, it can be used to detect P2P Bot without relying on packet payload, IP address, port number and encrypted traffic. The performance of the proposed detection technique is compared with features selection approach like PCA, ReliefF algorithms. Experimental results show that the proposed DT--NN method achieved high accuracy rates with lower false positive rates. In the future, we plan to extend our approach to real-time systems by adding an unsupervised learning approach to select the most relevant features that would further increase accuracy and performance.
|
State attorneys general will launch one of the largest bipartisan, multi-state antitrust investigations into Facebook and Google on Monday.
State attorneys general spanning across dozens of states will announce an antitrust investigation into Google and Facebook, and other technology companies at the Supreme Court at 2:00 p.m. ET Monday.
The investigation will investigate whether America’s largest technology companies have stifled competition, restricted access, and harmed consumers.
A Wall Street Journal report suggested that New York Attorney General Letitia James will lead the investigation into Facebook, while Texas Attorney General Attorneys Ken Paxton will lead the investigation into Google.
James said in a statement to the Wall Street Journal:
I am proud to be leading a bipartisan coalition of attorneys general in investigating whether Facebook has stifled competition and put users at risk. We will use every investigative tool at our disposal to determine whether Facebook’s actions may have endangered consumer data, reduced the quality of consumers’ choices, or increased the price of advertising.
Several state attorneys general also plan to announce their Google antitrust probe next Monday, with approximately three dozen state attorneys general. Texas Attorney General Ken Paxton will reportedly lead the Google investigation, which will focus on Google’s advertising markets and whether Google’s dominance in the ad markets harms competition.
The Journal‘s report follows an exclusive Breitbart News interview with Louisiana Attorney General Jeff Landry, who said that many state attorneys generals have “had enough” of big tech, and they will “take action” after significant investigation. “You know I would tell you that if everybody thinks it’s just saber-rattling, then they’re wrong,” Landry told Breitbart News. “At some point in time we believe when there’s smoke there’s fire, and at a time when we are able to gather evidence, we’re going to take action.”
Sen. Josh Hawley (R-MO), one of the Senate’s foremost big tech critics, cheered the reported Google and Facebook antitrust investigations.
”I was proud to launch the first antitrust and privacy investigation of Big Tech by an attorney general two years ago. I’m heartened to see a new group of attorneys general with the courage to stand up to these powerful companies and fight for citizens,” Sen. Hawley said in a statement Friday. “Big Tech companies should be held accountable if they are violating our privacy or harming our children or killing innovation.” |
In the order, Quaintance stated, "the State argued that a sufficient basis exists for the additional charge."
More from KSTP:
Last week, prosecutors argued that since Noor is already charged with third-degree murder, three of the four elements of a second-degree charge are satisfied. Their petition argued the shooting also satisfied the fourth element - that Noor intended to kill Ruszczyk.
Noor and his partner responded to a 911 call from Ruszczyk the night of July 15, 2017 about a possible sexual assault in the alley behind her south Minneapolis home.
Noor's partner, officer Matthew Harrity, said he heard a thump on the hood of the car before Noor reached across Harrity and fired at Ruszczyk. |
Q:
Resize all Bootstrap inputs and controls globally
Is there any easy way to resize all Bootstrap 3 control elements like inputs, select, textarea etc?
I am trying to go though the variables in the scss files but one thing leads to another and I get lost. Thank you in advanced if somebody has an idea!
A:
Try fiddling with the @input-height-base variable which is by default defined as (@line-height-computed + (@padding-base-vertical * 2) + 2)
|
1 of 3 A mobile phone with The Weather Channel app location preference page is seen Friday, Jan. 4, 2019. Los Angeles City Attorney Michael Feuer said Friday that owners of The Weather Channel app, one of the most popular mobile weather apps, used it to track people's every step and profit off that information. Feuer said the company misled users of the popular app to think their location data will only be used for personalized forecasts and alerts. A spokesman for app owner IBM Corp. says it's been clear about the use of location data and will vigorously defend its "fully appropriate" disclosures. (AP Photo/Brian Melley)
1 of 3 A mobile phone with The Weather Channel app location preference page is seen Friday, Jan. 4, 2019. Los Angeles City Attorney Michael Feuer said Friday that owners of The Weather Channel app, one of the most popular mobile weather apps, used it to track people's every step and profit off that information. Feuer said the company misled users of the popular app to think their location data will only be used for personalized forecasts and alerts. A spokesman for app owner IBM Corp. says it's been clear about the use of location data and will vigorously defend its "fully appropriate" disclosures. (AP Photo/Brian Melley)
LOS ANGELES (AP) — People relied on the most popular mobile weather app to track forecasts that determined whether they chose jeans over shorts and packed a parka or umbrella, but its owners used it to track their every step and profit off that information, Los Angeles prosecutors said Friday.
The operator of The Weather Channel mobile app misled users who agreed to share their location information in exchange for personalized forecasts and alerts, and they instead unwittingly surrendered personal privacy when the company sold their data to third parties, City Attorney Michael Feuer said.
Feuer sued the app’s operator in Los Angeles County Superior Court to stop the practice. He said 80 percent of users agreed to allow access to their locations because disclosures on how the app uses geolocation data were buried within a 10,000-word privacy policy and not revealed when they downloaded the app.
“Think how Orwellian it feels to live in a world where a private company is tracking potentially every place you go, every minute of every day,” Feuer said. “If you want to sacrifice to that company that information, you sure ought to be doing it with clear advanced notice of what’s at stake.”
ADVERTISEMENT
A spokesman for IBM Corp., which owns the app, said it has always been clear about the use of location data collected from users and will vigorously defend its “fully appropriate” disclosures.
Feuer said the app’s operators, TWC Product and Technology LLC, sold data to at least a dozen websites for targeted ads and to hedge funds that used the information to analyze consumer behavior.
The lawsuit seeks to stop the company from the practice it calls “unfair and fraudulent” and seeks penalties of up to $2,500 for each violation. Any court decision would only apply to California.
Marketed as the “world’s most downloaded weather app,” The Weather Channel app claims approximately 45 million users a month, the lawsuit said.
Users who download the free app are asked whether to allow access to their location to “get personalized local weather data, alerts and forecasts.” It does not say how the company benefits from the information.
While disclosures may be included in the privacy policy, state law says “fine print alone can’t make good what otherwise has been made obscure,” Feuer said.
He said he learned about the sale of the private data from an article in The New York Times.
ADVERTISEMENT
The lawsuit comes as companies, most notably Facebook and Google, are increasingly under fire for how they use people’s personal data. Both companies faced congressional hearings last year on privacy issues, which are likely to remain on lawmakers and regulators’ minds both nationally and in California.
In June, California lawmakers approved what experts are calling the country’s most far-reaching law to give people more control over their personal data online. That law doesn’t take effect until next year.
Feuer said he hopes the case inspires other lawsuits and legislation to curb data-sharing practices.
IBM bought the app along with the digital assets of The Weather Company in 2015 for $2 billion but did not acquire The Weather Channel seen on TV, which is owned by another company.
___
AP Technology Writer Barbara Ortutay contributed to this report.
___
This story has been clarified to show that the lawsuit is against the operator of The Weather Channel mobile app and not The Weather Channel. |
There are 9601 comments on the
www.topix.net
story from Apr 7, 2008, titled United House of Prayer for All People: Bishop's body in Charlot....
In it, www.topix.net reports that:
The body of Bishop S.C. 'Sweet Daddy' Madison -- only the third leader in the 89-year-history of the United House of Prayer for All People -- will lie in state Thursday night at the denomination's palatial N.C. ...
1st letter continued:Would you invest your hard earned money into a known ponzi scheme where you give and give withno return on your investment? NEVER! Housing is being built with our money but not for us.•WHAT? Are you Serious? We can't live in the Bailey Lofts ($2065 per month). But Daddy Baileywould gladly take your $2000 Love Gift/"G" class report. Members we need to UNITE and DEMANDan independent audit be conducted on every House in this kingdom for the past twenty years. We need3405to know how much money was raised. How much was spent and for what. Is that too much to ask? Ifeverything balances out, No Harm, NO Foul. But if funds are unaccounted for, then, we have aproblem.We have Pastors who have dedicated their entire lives to this organization and get nothing in return...
you need to get ur facts straight, most pastors get a big offering as well as an anniversary every year in which tbey get good money thier offering goes up on the different holidays. Once agan get ur facts straight every Elder who servea 5 years or more gets a check when they retirer n as far as an audit being done the government has been watching the HOP since Daddy Grace time, when passed they took all monet n some property Daddy Mccollough the only man n a black to fight the IRS and won the HOP money n property back what u r calling for don't make sense, why don't u give it a rest by the way all of this public record!
<quoted text>Yes Grace, McCollough,Madison preached alot of mess including this scare tactic! Please!!!!! A girl in my class once tried to fight me cause i asked her why she had a pic of madison in her note book at school. How many kids you know carry a pic of their pastor in their note books! What that is called brain washing an a CULT! Please !!!ARE YOU SERIOUS!!!!!!!!!!
you sound so foolish! What r the procedure to brain wash someone. You put people down for having a picture of the Bishop, what about all those who prasises Basketball n Baseball players n singers stars , focus on that all of our Bishops have given us positive teaching back up by the Holy Bible.
You are so right! I recently watched a You-tube of a local church an they are just literally dancing to the beat of the band that daddy has made. I must admit that it does sound pretty good. But I am not impressed with the church or the band I am more impressed that these are self taught musicians an most are your African Americans. Imagine if they put that effort into education instead of just UHOP band. Imagaine if they hit the books an became doctors, lawyers for the community. No! they are merely happy with just being in daddies band an sounding good for a few minutes.As for the members jumping around to the beat.One of the women in the video lives up the street from me an on the video she is just swaying an acting like she is in the spirit and we all know she is one of the meanest women in the town, she even threatened a kid with a baseball bat one time, but they claim to live so righteous. Its sad that they are dancing to the band on the outside but have not love an the holy spirit on the inside.As for 1 million for Bailey! What for? Does he really need that. He needs to take that money and come to Claxton Ga an get his ppl out of the projects, run down trailers, old board houses.I do have a question why does there minister podium stand off to the side instead of front an center like traditional churches.
As for them mean sister the sign reads united House of Prayer for People this what God named it, therfor you have all people wbich is subject to different behavior.The pastors roster is front n center the Bishop roster is off to the side.
Wake up young lady . My aunt had sex with Daddy Grace several times. She told me that even if you told anyone about it they would say you are crazy. She also told me he attempted sex on her 9 year old sister in their parents home. My point in telling you this is because no one on this earth is greater then God and his son Jesus. Granted Bailey is not having sex because he is certainly to fat to attempt it with any rational thinking women.
The UHOP is right but when you have a careless leader it will effect the church as a whole. I do attend and like 95% of the membership I am standing still and waiting on God to remove this very large problem. My aunt also told me that Bishop Lady Dee knew about the sex bring forced on the young maids and that she was also having sex with him. I'm sorry but this is the truth. Most people that heard McCollough speak remember hearing him say the wrong man can get in the chair and just stand still and mark time.
There are many people that has been hurt by all of the mess that's going on in the HOP. God is not apart of confusion and if you really look at things the people are not happy and if you heard McCollough you understand what I'm saying.
Wake up young lady . My aunt had sex with Daddy Grace several times. She told me that even if you told anyone about it they would say you are crazy. She also told me he attempted sex on her 9 year old sister in their parents home. My point in telling you this is because no one on this earth is greater then God and his son Jesus. Granted Bailey is not having sex because he is certainly to fat to attempt it with any rational thinking women.The UHOP is right but when you have a careless leader it will effect the church as a whole. I do attend and like 95% of the membership I am standing still and waiting on God to remove this very large problem. My aunt also told me that Bishop Lady Dee knew about the sex bring forced on the young maids and that she was also having sex with him. I'm sorry but this is the truth. Most people that heard McCollough speak remember hearing him say the wrong man can get in the chair and just stand still and mark time.There are many people that has been hurt by all of the mess that's going on in the HOP. God is not apart of confusion and if you really look at things the people are not happy and if you heard McCollough you understand what I'm saying.
That true because I was a victim of Old Daddy Grace.. But I disagree about the HOP being right. It can't be right and wrong. Its either or. It can't be luke warm. Its wrong to have young innocent girls molested at ages 13, 14, 15.
We do not pray to Daddy, who told you that lie! We have never prayed to him, that' why I have said before get ur facts straight.
Who did you call on when you got saved? I'll tell you who you called and it was not Jesus. Because you were taught that you call on Daddy, daddy, daddy when you seek for the holy ghost because you are really calling on the christ in daddy Bailey not Bailey.(and thats a fact)
..........The UHOP is right but when you have a careless leader it will .
I'm going to get right to it... The UHOP is right? What makes the UHOP right? Somebody please tell me. Give it to us straight. When Jesus was walking the earth, he didn't go around telling people to go to the UHOP. At least I never read it. So how is it right? I've hear many times...."the UHOP is right, it's just the people".
Here's something to think about.... If Jesus was here today would He sit at the UHOP and state that He will stay right where He is and not going anywhere. Just sit there on a throne over a few people in this entire world. Would He also demand you not to go anywhere to spread His gospel and that if the world wants to know about Him, they must visit the projects of New York, New Jersey DC, Virginia, North Carolina, Georgia, South Carolina, Florida, etc. and do a search for the UHOP? Really? Would He say...if the people are not at the UHOP, then they won't get to see or hear from me (Jesus). Really? Do you think that Jesus would ignore other people in other states of the United State, or other countries, ie....Japan, China, Africa, Australia. Do you think that He would just ignore them? "House of Prayer is right". Oh.....kay. Does that make the Saint John Episcopal church (made up name) wrong? What does the 'UHOP is right" really mean?
Not trying to market here, but I have sprint phone service. When I have issues, I call sprint and demand to fix the issues or "I'm out". I don't call other sprint customers and convince them that maybe Sprint has issues but "Sprint is right". I may have drop calls and unnecessary charges, but I know for sure Sprint is right and I'm not going NOWHERE!!! Please!!!!If I get another drop call, I'm gonna to change plans!!
This is what I heard...."Jesus came to save the world" not just a few people over a few states within America.
Here's my issue, why do members feel the need to NOW deny practices and teachings that have been in effect for over 60years.
If you find it okay to practice behind closed doors, why not stand for those same practices in public? I have seen so many facebook postings where ppl are making up stories just to make things seem better than what they are; don't you realize that if you have to alter the truth, there is something wrong?
If you have to pretend you had a good time in service and you really didn't.........something is wrong
If you pretend you do not call on the name daddy in front of the world but do in the privacy of the HOP.......... something is wrong.
If you refuse to repeat what your bishop and pastors say because you don't want anyone to question it..........something is wrong.
Does anyone knows what happens to the money donated to G-class, tithes and other offerings?
I was talking with a friend earlier and they explained a member received a silver necklace and charm given to ppl who were on the 6th flr which would be about $3k. The member had the necklace appraised and it was valued at less than $20.00.
I’m a little confused. I don’t understand what is happening to all of the money collected. The only money that I know that is dedicated to the House is church offering, g-class, tithes, special offerings, love gifts are all sent to DC…..correct?
Here’s the breakdown that has me perplexed. If 2,500 people paid $2,000 each for daddy’s club (plz know the actual numbers are much larger) the total would be $5million dollars. If those ppl then received the gifts with a monetary value of $50.00 each, that totals to be $125,000.
*The pastors do not receive a salary from the organization or an expense account.*Are there any “organization sponsored” charitable programs outside of the scholarship fund, which according to the HOP website states “Lady Madison continues to financially support the Program with assistance from the current Leader, Bishop C.M. Bailey, and the support of past recipients, their parents, members and other contributors.” And would also be a tax write off for Lady Dee.
*Individual houses do not receive help for the up keep for the bldgs., they are forced to sink or swim on their own and many times other houses in that state are forced to help a struggling house with their bills, because the funds have not or will not be sent from DC
*You pay to ride the buses.* No monetary help for members who are having financial hardships* No low income daycare or after school programs* No low cost transportation for members* The low income apts (what’s left) are operating with a profit because there are not taxes and minimum up keep. *No food bank*No training and back to work programs…
I could go on and on but you get the point………….. My question after all of this is,
Another topicDoes anyone knows what happens to the money donated to G-class, tithes and other offerings?I was talking with a friend earlier and they explained a member received a silver necklace and charm given to ppl who were on the 6th flr which would be about $3k. The member had the necklace appraised and it was valued at less than $20.00.I’m a little confused. I don’t understand what is happening to all of the money collected.The only money that I know that is dedicated to the House is church offering, g-class, tithes, special offerings, love gifts are all sent to DC…..correct?Here’s the breakdown that has me perplexed. If 2,500 people paid $2,000 each for daddy’s club (plz know the actual numbers are much larger) the total would be $5million dollars. If those ppl then received the gifts with a monetary value of $50.00 each, that totals to be $125,000.So, 5,000,000.00 -$125,000.=$4,875,000.00 + love gifts + tithes+ other g-class contributions+ special offerings + dues + auxiliary fees+etc.=$$$$$$*??
I really don't know exactly what all the different monies are used for, but I can say that the church offering stays in the House, and is not sent to DC. The Church offering is used for exactly what you mentioned: upkeep up the House, utilities, supplies, etc. The issue: Most Houses church offering programs is not a priority until the cut off notices are received; at that time the pressure is on the members to increase their offerings for that particular time, and some Houses borrow from others. It's trifling! The Reason: The money that is sent to DC (G-Class/Daddies Club) is the top priority making the Pastors/State Chairmen look good at the expense of the members. Furthermore, it benefits DC while the House struggles to keep their lights on and water flowing.
Members prefer to drop a $100 or $500 in a given G-Class program, but act agitated and broke when asked to pay $20 for church offering or a $6.00 meal. They have secretaries, presidents, and cafeteria workers having to purchase their own supplies because church offering is not a focus for the Houses. If only they would take advantage of the fact that church offering can be arranged to help with alot of different types of expenses and sources, members will have a better understanding of how a church is suppose to operate and may learn how charity works as well. Sending monies to DC is like "diamonds going down the drain". The investment is worthless; no returns. Teach the members to pay Church offering like they do G-Class and maybe there can be some established supportive programs for the members with the right type of concerned pastor. BUT LET'S BE REALISTIC, UHOP men can't be real men in the UHOP. So sorry if I hurt somebody's feelings. But if you can't stand up and tell another man he's wrong, AND help push for a change for your congregation, marriages, families and members, and guest....then your not a MAN. Your just a "son of a Bi..Ah..shop." (Bishop)
Unfortunately, pastors are trying to please "Daddy" and pleasing "Daddy" is the ticket to keeping their pastor seats; so being a man is difficult trying to follow behind the set-up of the HOP. Go against the grain for the members sake and learn that you can lose your seat quickly.
Other monies like state expenses, fines, and fees are being used at the discretion of the pastor. But! For some Houses, you may want to check in on Sunday School offerings. Your Sunday School offerings may not really being going towards offering afterall. The name of Sunday School offering should be changed to something much more appropriate.
When you are right, you don't have to fight!This is a spiritual kingdom, and without a spiritual eye, you will never see it. The scripture acknowledges, "it is hidden from those who are lost". When you really don't know the principles and understanding of an organization, ugly comments is the worst possible way to learn. It might be an intelligent move to either learn first, even if you don't agree, or be silent. Ignorance will not be an excuse when you have to explain to the Yougreat "I AM" your uninformed analogy of how you think people should serve God. If you are not a member and do not understand, you should probably stand on the sidelines, you might accidentally learn a thing or two!
Wake up young lady . My aunt had sex with Daddy Grace several times. She told me that even if you told anyone about it they would say you are crazy. She also told me he attempted sex on her 9 year old sister in their parents home. My point in telling you this is because no one on this earth is greater then God and his son Jesus. Granted Bailey is not having sex because he is certainly to fat to attempt it with any rational thinking women.The UHOP is right but when you have a careless leader it will effect the church as a whole. I do attend and like 95% of the membership I am standing still and waiting on God to remove this very large problem. My aunt also told me that Bishop Lady Dee knew about the sex bring forced on the young maids and that she was also having sex with him. I'm sorry but this is the truth. Most people that heard McCollough speak remember hearing him say the wrong man can get in the chair and just stand still and mark time.There are many people that has been hurt by all of the mess that's going on in the HOP. God is not apart of confusion and if you really look at things the people are not happy and if you heard McCollough you understand what I'm saying.
with all that sex going on, how come ur aunt never got pregnet n why wait until now n tell this 54 years later. Is ur aunt still a member n do she still attend?
One go from time to time and one is no longer alive but had stop attending. No my aunt did not get pragant be she knew girls that did. The is an Elder right now in GA that is a son of daddy grace. Also Daddy McCollough youngest son (punk in they called him) was not by Madame. Therefore these men of God had multiple women. Now God will judge them but people need to understand these men are human and can get weak. Only Jesus was perfect and without sin. Clearly you are very young but what if it happen to you, what would you do? Would you call the police? What if you got pragant what would you do?
Iwould not have had sex with none of them n if i was forced i would report it! Sorry about the aunt thatpassed did she tell this back then n before she passed? ur aunt that comes sometime what is her opion about all of this. What happen to all the other girls .n the children. Who is the Elder in GA n do he know hes D addy Graces son?
There is a letter circulating that Bishop L Thompson has written to the members of the House of Prayer. If you are a member looking for answers to questions that you have about the present state of the House of Prayer, this letter may help you. If it has not gotten you yet and you want to read it, email me at [email protected] If you are happy and satisfied with things, continue enjoying, this is not for you nor against you. It just doesn't apply. This is for those who KNOW something is wrong. Hebrews unite, Cultastic and all those who have already determined that the House of Prayer is a cult and its leaders (Grace and McCollough) were false prophets, need not email me. You are too wise for this stuff. This is not a letter to bash the House of Prayer but rather defend it.
<quoted text>That true because I was a victim of Old Daddy Grace.. But I disagree about the HOP being right. It can't be right and wrong. Its either or. It can't be luke warm. Its wrong to have young innocent girls molested at ages 13, 14, 15.
i am truly saddened by what has been done to u! No one deserves that crap! If i had to pick my two favorite things in the HOP it would be the chicken and the music
Tell me when this thread is updated:
Add your comments below
Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite.
Inappropriate posts may be removed by the moderator. Send us your feedback. |
Implantable rate-responsive counterpulsation assist system.
To apply the potential energy source available from skeletal muscle in cardiac assistance, we developed an implantable counterpulsation assist system. This study reports the results using this implantable counterpulsation assist system in an acute in vivo animal model. Twelve dogs had a dual-chambered, extraaortic counter-pulsation pump anastomosed in parallel to the thoracic aorta. The left latissimus dorsi muscle was used to power the pump. A newly developed implantable stimulator was used to make the muscle contract in synchrony with the diastolic phase. The unique feature of this stimulator is its ability to adjust timing of muscle contraction according to changing heart rates. The stimulator is also able to detect arrhythmias, and as a safety measure, shuts down until a normal rhythm is resumed. During counterpulsation assist with the implantable counterpulsation assist system, diastolic pressure increased an average of 34 mm Hg from baseline, equivalent to a 69% augmentation. Systolic peak pressure decreased an average of 10 mm Hg, equivalent to an 11% unloading. With induced heart rate changes, the implantable counterpulsation assist system readjusted its timing, maintaining optimal counterpulsation without systolic interference. Induced ventricular tachycardia resulted in immediate shutdown of the stimulator until resumption of a normal rhythm. The feasibility of using an intraaortic balloon pump console as back-up was also demonstrated. Excellent counterpulsation was obtained with either muscle power or balloon pump console. We conclude that the implantable counterpulsation assist system can provide effective counterpulsation assist and has the potential for continuous cardiac support. |
Last week the Obama administration started publishing comparative data on what more than 3,000 hospitals across the nation charge for services – information that has long been hidden from consumers. And the results were pretty shocking.
As Modern Healthcare reports, the data show enormous disparities in what hospitals charge for the same treatments – not just from region to region, but even among hospitals in the same metropolitan area. Treatment for kidney and urinary tract infections, for example, typically costs $40,902 at suburban Atlanta hospital, compared with just $7,682 at a neighboring medical center. And one suburban Los Angeles hospital charges $24,176 for treatment of septicemia, a life-threatening blood infection, while another hospital less than 20 miles away charges $216,438.
Jonathan Blum, acting deputy administrator of the Centers for Medicare & Medicaid Services, which gathered the data, bluntly told reporters: “There’s no relationship that we see to charges and the quality of care that’s being provided.” Even the American Hospital Association acknowledged that the systems by which hospitals decide what to charge for services “urgently need updating.”
But while the disparities are scandalous, the cumbersome manner in which the federal government provided the data – a downloadable spreadsheet – may only add to the frustration of consumers who want to make use of the information to avoid being fleeced. Fortunately, though, a new website, OpsCost.com, is now offering to crunch the numbers and allow you to compare the charges at various hospitals in your area.
All you have to do is type in the metropolitan area in which you live and select from a pull-down menu of 100 different health-care procedures. A search of 10 hospitals in the Washington, D.C., area, for example, reveals that the cost for implanting a pacemaker ranges from $13,101 at Virginia Hospital Center in Arlington, Va., to $22,390 at Holy Cross Hospital in Silver Spring, Md.
The new website actually is a side project for the developers of RentMetrics.com, a site that compares real estate rental data for developers and investors.
“We saw the data get released and realized how important it was,” cofounder George Kalogeropoulos explained in an article on the Fiscal Times website. “But [we] also saw that it was only available in a relatively inaccessible format. The site has gained a lot of traction.” |
<script>window.pathPrefix="../../";</script><!DOCTYPE html>
<html lang="en" style="padding-bottom:0px" class="local"></html>
<head><meta name="generator" content="Hexo 3.9.0">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<link href="../../images/favicon.png" rel="shortcut icon" type="image/png">
<title>DJI Mobile SDK Documentation
</title><link rel="stylesheet" href="../../stylesheets/doc-vendor.css"><link rel="stylesheet" href="../../stylesheets/doc-app.css">
</head>
<body>
<nav id="site-header" class="site-header navbar">
<div class="container">
<div class="navbar-header"><a href="/" class="logo"><img src="../../images/dji-logo@2x.png">IOS SDK API Reference</a></div>
</div>
</nav>
<div id="documentation-page" class="documentation-page">
<div class="container">
<div class="site-sidebar">
<div class="searcher">
<div id="panel" class="panel panel_tree">
<div class="header">
<div class="search-con">
<label id="search-label" for="search">
</label>
<input id="search" type="text" placeholder="Search" autosave="searchdoc" results="10" autocomplete="off">
<div class="search-icon"></div><a class="clean-search glyphicon glyphicon-remove-circle"></a>
</div>
</div>
<div class="tree">
<ul></ul>
</div>
<div class="result">
<ul></ul>
</div>
</div>
</div>
<div class="nav scrollable js-tree-menu">
<dl>
<dt>Manager Classes
</dt>
<dd><a data-href="../SDKManager/DJISDKManager.html" class="sub-toggle">DJISDKManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../SDKManager/DJIBluetoothProductConnector.html">DJIBluetoothProductConnector</a>
</dd>
</ul>
</dd>
<dd><a data-href="../KeyManager/DJIKeyManager.html" class="sub-toggle">DJIKeyManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../KeyManager/DJIKey.html" class="sub-toggle">DJIKey<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../KeyManager/DJIBatteryKey.html">DJIBatteryKey</a>
</dd>
<dd><a href="../KeyManager/DJICameraKey.html">DJICameraKey</a>
</dd>
<dd><a href="../KeyManager/DJIFlightControllerKey.html">DJIFlightControllerKey</a>
</dd>
<dd><a href="../KeyManager/DJIPayloadKey.html">DJIPayloadKey</a>
</dd>
<dd><a href="../KeyManager/DJIGimbalKey.html">DJIGimbalKey</a>
</dd>
<dd><a href="../KeyManager/DJIProductKey.html">DJIProductKey</a>
</dd>
<dd><a href="../KeyManager/DJIRemoteControllerKey.html">DJIRemoteControllerKey</a>
</dd>
<dd><a href="../KeyManager/DJIHandheldControllerKey.html">DJIHandheldControllerKey</a>
</dd>
<dd><a href="../KeyManager/DJIMissionKey.html">DJIMissionKey</a>
</dd>
<dd><a href="../KeyManager/DJIAirLinkKey.html">DJIAirLinkKey</a>
</dd>
<dd><a href="../KeyManager/DJIAccessoryKey.html">DJIAccessoryKey</a>
</dd>
<dd><a href="../KeyManager/DJIRTKBaseStationKey.html">DJIRTKBaseStationKey</a>
</dd>
</ul>
</dd>
<dd><a href="../KeyManager/DJIKeyedValue.html">DJIKeyedValue</a>
</dd>
</ul>
</dd>
<dd><a data-href="../FlyZoneManager/DJIFlyZoneManager.html" class="sub-toggle">DJIFlyZoneManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIUnlockedZoneGroup.html">DJIUnlockedZoneGroup</a>
</dd>
<dd><a data-href="../FlyZoneManager/DJIFlyZoneManager_DJIFlyZoneInformation.html" class="sub-toggle">DJIFlyZoneInformation<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJISubFlyZoneInformation.html">DJISubFlyZoneInformation</a>
</dd>
</ul>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIIndividualUnlockZone.html">DJICustomUnlockZone</a>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIFlyingSafetyWarningInformation.html">DJIFlyingSafetyWarningInformation</a>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIFlyingSafetySeriousWarningInformation.html">DJIFlyingSafetySeriousWarningInformation</a>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIFlyingSafetyTip.html">DJIFlyingSafetyTip</a>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIFlySafeReturnToHomeInformation.html">DJIFlySafeReturnToHomeInformation</a>
</dd>
<dd><a href="../FlyZoneManager/DJIFlyZoneManager_DJIFlySafeNotification.html">DJIFlySafeNotification</a>
</dd>
</ul>
</dd>
<dd><a href="../AppActivationManager/DJIAppActivationManager.html">DJIAppActivationManager</a>
</dd>
<dd><a href="../UserAccountManager/DJIUserAccountManager.html">DJIUserAccountManager</a>
</dd>
<dd><a href="../DataProtectionManager/DJIDataProtectionManager.html">DJIDataProtectionManager</a>
</dd>
<dd><a href="../LDMManager/DJILDMManager.html">DJILDMManager</a>
</dd>
<dd><a data-href="../UTMISSManager/DJIUTMISSManager.html" class="sub-toggle">DJIUTMISSManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../UTMISSManager/DJIUTMISSManager_DJIUTMISSParam.html">DJIUTMISSParam</a>
</dd>
</ul>
</dd>
<dd><a data-href="../FlightHubManager/DJIFlightHubManager.html" class="sub-toggle">DJIFlightHubManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubOnlineDevice.html">DJIFlightHubOnlineDevice</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubBoundDevice.html">DJIFlightHubBoundDevice</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubUser.html">DJIFlightHubUser</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubTeam.html">DJIFlightHubTeam</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubUpStream.html">DJIFlightHubUpStream</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubLiveStream.html">DJIFlightHubLiveStream</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubFlightPathNode.html">DJIFlightHubFlightPathNode</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubFlightHistoricalDetail.html">DJIFlightHubFlightHistoricalDetail</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubStatistics.html">DJIFlightHubStatistics</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubHistoricalFlight.html">DJIFlightHubHistoricalFlight</a>
</dd>
<dd><a href="../FlightHubManager/DJIFlightHubManager_DJIFlightHubRealTimeFlightData.html">DJIFlightHubRealTimeFlightData</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Upgrade/DJIUpgradeManager.html" class="sub-toggle">DJIUpgradeManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../Upgrade/DJIUpgradeManager_DJIUpgradeComponent.html" class="sub-toggle">DJIUpgradeComponent<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Upgrade/DJIUpgradeManager_DJIUpgradeComponent_DJIFirmwareUpgradeProgress.html">DJIFirmwareUpgradeProgress</a>
</dd>
<dd><a href="../Upgrade/DJIUpgradeManager_DJIUpgradeComponent_DJIFirmwareInformation.html">DJIFirmwareInformation</a>
</dd>
</ul>
</dd>
</ul>
</dd>
</dl>
<dl>
<dt>Base Classes
</dt>
<dd><a data-href="../../BaseClasses/DJIBaseProduct.html" class="sub-toggle">DJIBaseProduct<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../../BaseClasses/DJIVideoFeeder.html" class="sub-toggle">DJIVideoFeeder<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../../BaseClasses/DJIVideoFeeder_DJIVideoFeed.html">DJIVideoFeed</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a href="../BaseComponent/DJIBaseComponent.html">DJIBaseComponent</a>
</dd>
</dl>
<dl>
<dt>Product Classes
</dt>
<dd><a href="../../Products/Aircraft/DJIAircraft.html">DJIAircraft</a>
</dd>
<dd><a href="../../Products/Handheld/DJIHandheld.html">DJIHandheld</a>
</dd>
</dl>
<dl>
<dt>Component Classes
</dt>
<dd><a data-href="../FlightController/DJIFlightController.html" class="sub-toggle">DJIFlightController<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../FlightController/DJIFlightController_DJIFlightControllerCurrentState.html">DJIFlightControllerState</a>
</dd>
<dd><a href="../FlightController/DJIFlightController_DJIGravityCenterState.html">DJIGravityCenterState</a>
</dd>
<dd><a href="../FlightController/DJIFlightController_DJIWarningStatusItem.html">DJIWarningStatusItem</a>
</dd>
<dd><a data-href="../Compass/DJICompass.html" class="sub-toggle">DJICompass<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Compass/DJICompass_DJICompassState.html">DJICompassState</a>
</dd>
</ul>
</dd>
<dd><a data-href="../RTK/DJIRTK.html" class="sub-toggle">DJIRTK<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../RTK/DJIRTK_DJIRTKBaseStationInformation.html">DJIRTKBaseStationInformation</a>
</dd>
<dd><a href="../RTK/DJIRTK_DJIRTKState.html">DJIRTKState</a>
</dd>
<dd><a data-href="../RTK/DJIRTKNetworkServiceProvider.html" class="sub-toggle">DJIRTKNetworkServiceProvider<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../RTK/DJIRTKNetworkServiceProvider_DJIRTKNetworkServiceState.html">DJIRTKNetworkServiceState</a>
</dd>
<dd><a href="../RTK/DJIRTKNetworkServiceProvider_DJIRTKNetworkServicePlan.html">DJIRTKNetworkServicePlan</a>
</dd>
<dd><a href="../RTK/DJIRTKNetworkServiceProvider_DJIRTKNetworkServicePlansState.html">DJIRTKNetworkServicePlansState</a>
</dd>
<dd><a href="../RTK/DJIRTKNetworkServiceProvider_DJIRTKNetworkServiceSettings.html">DJIRTKNetworkServiceSettings</a>
</dd>
<dd><a href="../RTK/DJIRTKNetworkServiceProvider_DJIMutableRTKNetworkServiceSettings.html">DJIMutableRTKNetworkServiceSettings</a>
</dd>
</ul>
</dd>
<dd><a href="../RTK/DJIRTK_DJIRTKReceiverInfo.html">DJIRTKReceiverInfo</a>
</dd>
<dd><a href="../RTK/DJIRTK_DJILocationStandardDeviation.html">DJILocationStandardDeviation</a>
</dd>
</ul>
</dd>
<dd><a href="../LandingGear/DJILandingGear.html">DJILandingGear</a>
</dd>
<dd><a data-href="../IntelligentFlightAssistant/DJIIntelligentFlightAssistant.html" class="sub-toggle">DJIFlightAssistant<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../VisionDetectionState/DJIVisionDetectionState.html" class="sub-toggle">DJIVisionDetectionState<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../VisionDetectionState/DJIVisionDetectionState_DJIVisionDetectionSector.html">DJIObstacleDetectionSector</a>
</dd>
</ul>
</dd>
<dd><a href="../IntelligentFlightAssistant/DJIVisionDetectionState_DJIVisionControlState.html">DJIVisionControlState</a>
</dd>
<dd><a href="../IntelligentFlightAssistant/DJISmartCaptureState.html">DJISmartCaptureState</a>
</dd>
<dd><a href="../IntelligentFlightAssistant/DJIFlightAssistantAvoidanceState.html">DJIFlightAssistantObstacleAvoidanceSensorState</a>
</dd>
<dd><a href="../IntelligentFlightAssistant/DJIFlightAssistantPerceptionState.html">DJIFlightAssistantPerceptionInformation</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Simulator/DJIAccessLocker.html" class="sub-toggle">DJIAccessLocker<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Simulator/DJIAccessLocker_DJIAccessLockerFormattingState.html">DJIAccessLockerFormattingState</a>
</dd>
<dd><a href="../Simulator/DJIAccessLocker_DJIAccessLockerUserAccountInfo.html">DJIAccessLockerUserAccountInfo</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Simulator/DJISimulator.html" class="sub-toggle">DJISimulator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Simulator/DJISimulator_DJISimulatorState.html">DJISimulatorState</a>
</dd>
</ul>
</dd>
<dd><a data-href="../IMUState/DJIIMUState.html" class="sub-toggle">DJIIMUState<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../IMUState/DJIIMUState_DJIIMUMultiOrientationCalibrationHint.html">DJIIMUMultipleOrientationCalibrationHint</a>
</dd>
</ul>
</dd>
<dd><a href="../OnboardSDKDevice/DJIOnboardSDKDevice.html">DJIOnboardSDKDevice</a>
</dd>
<dd><a data-href="../FlightController/DJIAirSenseSystemInformation.html" class="sub-toggle">DJIAirSenseSystemInformation<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../FlightController/DJIAirSenseAirplaneState.html">DJIAirSenseAirplaneState</a>
</dd>
</ul>
</dd>
<dd><a href="../FlightController/DJIFlightController_DJIFlightControllerLEDsSettings.html">DJIFlightControllerLEDsSettings</a>
</dd>
<dd><a href="../FlightController/DJIFlightController_DJIMutableFlightControllerLEDsSettings.html">DJIMutableFlightControllerLEDsSettings</a>
</dd>
<dd><a href="../FlightController/DJIFlightController_DJISimulatorWindSpeed.html">DJISimulatorWindSpeed</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Battery/DJIBattery.html" class="sub-toggle">DJIBattery<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Battery/DJIBattery_BatteryState.html">DJIBatteryState</a>
</dd>
<dd><a data-href="../Battery/DJIBattery_AggregationState.html" class="sub-toggle">DJIBatteryAggregationState<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Battery/DJIBattery_BatteryOverview.html">DJIBatteryOverview</a>
</dd>
</ul>
</dd>
<dd><a href="../Battery/DJIBattery_WarningRecord.html">DJIBatteryWarningRecord</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Camera/DJICamera.html" class="sub-toggle">DJICamera<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Camera/DJICamera_DJICameraSystemState.html">DJICameraSystemState</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraLensState.html">DJICameraFocusState</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraSDCardState.html">DJICameraStorageState</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraSSDState.html">DJICameraSSDState</a>
</dd>
<dd><a data-href="../Camera/DJIMediaManager.html" class="sub-toggle">DJIMediaManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../Camera/DJIMediaManager_DJIMedia.html" class="sub-toggle">DJIMediaFile<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Camera/DJIMediaManager_DJIMedia_DJIMediaFile.html">DJIAudioMediaFile</a>
</dd>
</ul>
</dd>
<dd><a href="../Camera/DJIMediaManager_VideoPlayback_DJIMediaVideoPlaybackState.html">DJIMediaVideoPlaybackState</a>
</dd>
<dd><a data-href="../Camera/DJIMediaManager_FetchMediaTaskScheduler.html" class="sub-toggle">DJIFetchMediaTaskScheduler<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Camera/DJIMediaManager_DJIFetchMediaTask.html">DJIFetchMediaTask</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a data-href="../Camera/DJIPlaybackManager.html" class="sub-toggle">DJIPlaybackManager<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Camera/DJIPlaybackManager_DJICameraPlaybackState.html">DJICameraPlaybackState</a>
</dd>
</ul>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraParameters.html">DJICameraCapabilities</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraWhiteBalanceInterface.html">DJICameraWhiteBalance</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraSSDClipFileNameInterface.html">DJICameraSSDClipFileName</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraOriginalPhotoSettings.html">DJICameraOriginalPhotoSettings</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraMultispectralStorageSettings.html">DJICameraMultispectralStorageSettings</a>
</dd>
<dd><a href="../Camera/DJICamera_DJIMutableCameraMultispectralStorageSettings.html">DJIMutableCameraMultispectralStorageSettings</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraMultispectralExposureState.html">DJICameraMultispectralExposureState</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraMultispectralExposureStates.html">DJICameraMultispectralExposureStates</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraWatermarkSettings.html">DJICameraWatermarkSettings</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraLaserMeasureInformation.html">DJICameraLaserMeasureInformation</a>
</dd>
<dd><a href="../Camera/DJICamera_DJICameraVideoResolutionAndFrameRate.html">DJICameraVideoResolutionAndFrameRate</a>
</dd>
<dd><a href="../Camera/DJICamera_DJILens.html">DJILens</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Gimbal/DJIGimbal.html" class="sub-toggle">DJIGimbal<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Gimbal/DJIGimbal_GimbalState.html">DJIGimbalState</a>
</dd>
<dd><a href="../Gimbal/DJIGimbal_movementSettingsState.html">DJIGimbalMovementSettings</a>
</dd>
<dd><a href="../Gimbal/DJIGimbal_DJIGimbalRotation.html">DJIGimbalRotation</a>
</dd>
<dd><a href="../Gimbal/DJIGimbal_DJIMultiGimbalConnectionWorkingStatus.html">DJIMultiGimbalConnectionWorkingStatus</a>
</dd>
<dd><a data-href="../Gimbal/DJIGimbal_DJIGimbalBalanceDetectionState.html" class="sub-toggle">DJIGimbalBalanceDetectionState<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Gimbal/DJIGimbal_DJIGimbalDirectionState.html">DJIGimbalDirectionState</a>
</dd>
</ul>
</dd>
<dd><a href="../Gimbal/DJIGimbal_DJIGimbalControlParametersAutoTuningState.html">DJIGimbalControlParametersAutoTuningState</a>
</dd>
<dd><a href="../Gimbal/DJIGimbal_DJIGimbalCoaxialityDetectionState.html">DJIGimbalCoaxialityDetectionState</a>
</dd>
</ul>
</dd>
<dd><a data-href="../AirLink/DJIAirLink.html" class="sub-toggle">DJIAirLink<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../LBAirLink/DJILBAirLink.html" class="sub-toggle">DJILightbridgeLink<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../LBAirLink/DJILBAirLink_DJILBAirLinkChannelInterference.html">DJILightbridgeChannelInterference</a>
</dd>
<dd><a href="../LBAirLink/DJILBAirLink_DJILightbridgeAntennaRSSI.html">DJILightbridgeAntennaRSSI</a>
</dd>
</ul>
</dd>
<dd><a data-href="../OcuSyncLink/DJIOcuSyncLink.html" class="sub-toggle">OcuSyncLink<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../OcuSyncLink/DJIOcuSyncLink_DJIOcuSyncFrequencyInterference.html">DJIOcuSyncFrequencyInterference</a>
</dd>
</ul>
</dd>
<dd><a data-href="../WiFiLink/DJIWiFiLink.html" class="sub-toggle">DJIWiFiLink<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../WiFiLink/DJIWiFiLink_DJIWiFiChannelInterference.html">DJIWiFiChannelInterference</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a data-href="../RemoteController/DJIRemoteController.html" class="sub-toggle">DJIRemoteController<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../RemoteController/DJIRemoteController_DJIRCGimbalMapping.html">DJIRCGimbalMapping</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCAircraftMapping.html">DJIRCAircraftMapping</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_RCCustomButtonTagParam.html">DJIRCCustomButtonTags</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCInfo.html">DJIRCInformation</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCMasterSlaveState.html">DJIRCMasterSlaveState</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCCredentials.html">DJIRCCredentials</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCButtonConfiguration.html">DJIRCButtonConfiguration</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIMutableRCButtonConfiguration.html">DJIMutableRCButtonConfiguration</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCCalibrationComponentState.html">DJIRCCalibrationComponentState</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCCalibrationProgress.html">DJIRCCalibrationProgress</a>
</dd>
<dd><a href="../RemoteController/DJIRemoteController_DJIRCMultiDeviceAggregationState.html">DJIRCMultiDeviceAggregationState</a>
</dd>
</ul>
</dd>
<dd><a data-href="../HandheldController/DJIHandheldController.html" class="sub-toggle">DJIHandheldController<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../HandheldController/DJIHandheldController_DJIHandheldControllerHardwareState.html">DJIHandheldControllerHardwareState</a>
</dd>
<dd><a data-href="../HandheldController/DJIHandheldController_DJIHandheldControllerLEDCommand.html" class="sub-toggle">DJIHandheldControllerLEDCommand<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../HandheldController/DJIHandheldController_DJIHandheldControllerLEDCommand_DJIHandheldControllerLEDColorPattern.html">DJIHandheldControllerLEDColorPattern</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a href="../MobileRemoteController/DJIMobileRemoteController.html">DJIMobileRemoteController</a>
</dd>
<dd><a data-href="../Payload/DJIPayload.html" class="sub-toggle">DJIPayload<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Payload/DJIPayload_PayloadWidget.html">DJIPayloadWidget</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Pipeline/DJIPipeline.html" class="sub-toggle">DJIPipeline<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Pipeline/DJIPipelines.html">DJIPipelines</a>
</dd>
</ul>
</dd>
<dd><a data-href="../AccessoryAggregation/DJIAccessoryAggregation.html" class="sub-toggle">DJIAccessoryAggregation<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="../AccessoryAggregation/DJIAccessoryAggregation_DJISpotlight.html" class="sub-toggle">DJISpotlight<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../AccessoryAggregation/DJIAccessoryAggregation_DJISpotlight_DJISpotlightState.html">DJISpotlightState</a>
</dd>
</ul>
</dd>
<dd><a href="../AccessoryAggregation/DJIAccessoryAggregation_DJIBeacon.html">DJIBeacon</a>
</dd>
<dd><a data-href="../AccessoryAggregation/DJIAccessoryAggregation_DJISpeaker.html" class="sub-toggle">DJISpeaker<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../AccessoryAggregation/DJIAccessoryAggregation_DJISpeaker_DJISpeakerState.html">DJISpeakerState</a>
</dd>
<dd><a href="../AccessoryAggregation/DJIAccessoryAggregation_DJISpeaker_DJIAudioFileInfo.html">DJIAudioFileInfo</a>
</dd>
</ul>
</dd>
<dd><a href="../AccessoryAggregation/DJIAccessoryAggregation_AggregationState.html">DJIAccessoryAggregationState</a>
</dd>
</ul>
</dd>
<dd><a data-href="../RTKBaseStation/DJIRTKBaseStation.html" class="sub-toggle">DJIRTKBaseStation<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../RTKBaseStation/DJIRTKBaseStation_DJIRTKBaseStationBatteryState.html">DJIRTKBaseStationBatteryState</a>
</dd>
<dd><a href="../RTKBaseStation/DJIRTKBaseStation_DJIRTKBaseStationState.html">DJIRTKBaseStationState</a>
</dd>
</ul>
</dd>
</dl>
<dl>
<dt>Mission Classes
</dt>
<dd><a href="DJIMissionControl.html">DJIMissionControl</a>
</dd>
<dd><a data-href="DJIMissionAction.html" class="sub-toggle">DJIMissionAction<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJITakeOffAction.html">DJITakeOffAction</a>
</dd>
<dd><a href="DJIAircraftYawAction.html">DJIAircraftYawAction</a>
</dd>
<dd><a href="DJIGoToAction.html">DJIGoToAction</a>
</dd>
<dd><a href="DJIGoHomeAction.html">DJIGoHomeAction</a>
</dd>
<dd><a href="DJIHotpointAction.html">DJIHotpointAction</a>
</dd>
<dd><a href class="active">DJIGimbalAttitudeAction</a>
</dd>
<dd><a href="DJIRecordVideoAction.html">DJIRecordVideoAction</a>
</dd>
<dd><a href="DJIShootPhotoAction.html">DJIShootPhotoAction</a>
</dd>
<dd><a href="DJILandAction.html">DJILandAction</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIMissionTrigger.html" class="sub-toggle">DJIMissionTrigger<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIMissionTrigger_DJIBatteryLevelMissionTrigger.html">DJIBatteryLevelMissionTrigger</a>
</dd>
<dd><a href="DJIMissionTrigger_DJIWaypointReachedMissionTrigger.html">DJIWaypointReachedMissionTrigger</a>
</dd>
<dd><a href="DJIMissionTrigger_DJIAircraftLandedMissionTrigger.html">DJIAircraftLandedMissionTrigger</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointMissionOperator.html" class="sub-toggle">DJIWaypointMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJIWaypointMission.html" class="sub-toggle">DJIWaypointMission<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJIWaypoint.html" class="sub-toggle">DJIWaypoint<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypoint_DJIWaypointAction.html">DJIWaypointAction</a>
</dd>
</ul>
</dd>
<dd><a href="DJIMutableWaypointMission.html">DJIMutableWaypointMission</a>
</dd>
<dd><a href="DJIWaypointMission_DJIWaypointMissionInterruption.html">DJIWaypointMissionInterruption</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointMissionUploadEvent.html" class="sub-toggle">DJIWaypointMissionUploadEvent<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointMission_DJIWaypointUploadProgress.html">DJIWaypointUploadProgress</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointMissionDownloadEvent.html" class="sub-toggle">DJIWaypointMissionDownloadEvent<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointMission_DJIWaypointDownloadProgress.html">DJIWaypointDownloadProgress</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointMissionExecutionEvent.html" class="sub-toggle">DJIWaypointMissionExecutionEvent<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointMission_DJIWaypointExecutionProgress.html">DJIWaypointExecutionProgress</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointV2MissionOperator.html" class="sub-toggle">DJIWaypointV2MissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJIWaypointV2Mission.html" class="sub-toggle">DJIWaypointV2Mission<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIMutableWaypointV2Mission.html">DJIMutableWaypointV2Mission</a>
</dd>
<dd><a href="DJIWaypointV2.html">DJIWaypointV2</a>
</dd>
</ul>
</dd>
<dd><a href="DJIWaypointV2MissionActionExecutionEvent.html">DJIWaypointV2MissionActionExecutionEvent</a>
</dd>
<dd><a href="DJIWaypointV2MissionActionDownloadEvent.html">DJIWaypointV2MissionActionDownloadEvent</a>
</dd>
<dd><a href="DJIWaypointV2MissionActionUploadEvent.html">DJIWaypointV2MissionActionUploadEvent</a>
</dd>
<dd><a href="DJIWaypointV2MissionExecutionEvent.html">DJIWaypointV2MissionExecutionEvent</a>
</dd>
<dd><a href="DJIWaypointV2MissionDownloadEvent.html">DJIWaypointV2MissionDownloadEvent</a>
</dd>
<dd><a href="DJIWaypointV2MissionUploadEvent.html">DJIWaypointV2MissionUploadEvent</a>
</dd>
<dd><a data-href="DJIWaypointV2Action.html" class="sub-toggle">DJIWaypointV2Action<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJIWaypointV2Action_DJIWaypointV2Actuator.html" class="sub-toggle">DJIWaypointV2Actuator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointV2Actuator_DJIWaypointV2GimbalActuatorParam.html">DJIWaypointV2GimbalActuatorParam</a>
</dd>
<dd><a data-href="DJIWaypointV2Actuator_DJIWaypointV2AircraftControlParam.html" class="sub-toggle">DJIWaypointV2AircraftControlParam<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointV2AircraftControlParam_DJIWaypointV2AircraftControlFlyingParam.html">DJIWaypointV2AircraftControlFlyingParam</a>
</dd>
<dd><a href="DJIWaypointV2AircraftControlParam_DJIWaypointV2AircraftControlRotateHeadingParam.html">DJIWaypointV2AircraftControlRotateHeadingParam</a>
</dd>
</ul>
</dd>
<dd><a href="DJIWaypointV2Actuator_DJIWaypointV2CameraActuatorParam.html">DJIWaypointV2CameraActuatorParam</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIWaypointV2Action_DJIWaypointV2Trigger.html" class="sub-toggle">DJIWaypointV2Trigger<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIWaypointV2Trigger_DJIWaypointV2IntervalTriggerParam.html">DJIWaypointV2IntervalTriggerParam</a>
</dd>
<dd><a href="DJIWaypointV2Trigger_DJIWaypointV2TrajectoryTriggerParam.html">DJIWaypointV2TrajectoryTriggerParam</a>
</dd>
<dd><a href="DJIWaypointV2Trigger_DJIWaypointV2AssociateTriggerParam.html">DJIWaypointV2AssociateTriggerParam</a>
</dd>
<dd><a href="DJIWaypointV2Trigger_DJIWaypointV2ReachPointTriggerParam.html">DJIWaypointV2ReachPointTriggerParam</a>
</dd>
</ul>
</dd>
</ul>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2UploadProgress.html">DJIWaypointV2UploadProgress</a>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2DownloadProgress.html">DJIWaypointV2DownloadProgress</a>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2ExecutionProgress.html">DJIWaypointV2ExecutionProgress</a>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2ActionUploadProgress.html">DJIWaypointV2ActionUploadProgress</a>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2ActionDownloadProgress.html">DJIWaypointV2ActionDownloadProgress</a>
</dd>
<dd><a href="DJIWaypointV2MissionOperator_DJIWaypointV2ActionExecutionProgress.html">DJIWaypointV2ActionExecutionProgress</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIFollowMeMissionOperator.html" class="sub-toggle">DJIFollowMeMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIFollowMeMission.html">DJIFollowMeMission</a>
</dd>
<dd><a href="DJIFollowMeMissionEvent.html">DJIFollowMeMissionEvent</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIPanoramaMissionOperator.html" class="sub-toggle">DJIPanoramaMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIPanoramaMissionEvent.html">DJIPanoramaMissionEvent</a>
</dd>
<dd><a href="DJIPanoramaMission_DJIPanoramaMissionStatus.html">DJIPanoramaMissionExecutionState</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIHotpointMissionOperator.html" class="sub-toggle">DJIHotpointMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIHotPointMission.html">DJIHotpointMission</a>
</dd>
<dd><a href="DJIHotpointMissionEvent.html">DJIHotpointMissionEvent</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIIntelligentHotpointMissionOperator.html" class="sub-toggle">DJIIntelligentHotpointMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIIntelligentHotpointMission.html">DJIIntelligentHotpointMission</a>
</dd>
<dd><a href="DJIIntelligentHotpointMissionOperator_DJIIntelligentHotpointMissionEvent.html">DJIIntelligentHotpointMissionEvent</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJITapFlyMissionOperator.html" class="sub-toggle">DJITapFlyMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJITapFlyMission.html" class="sub-toggle">DJITapFlyMission<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJITapFlyMission_DJITapFlyExecutionState.html">DJITapFlyExecutionState</a>
</dd>
<dd><a href="DJITapFlyMission_DJIVector.html">DJISDKVector3D</a>
</dd>
</ul>
</dd>
<dd><a href="DJITapFlyMissionEvent.html">DJITapFlyMissionEvent</a>
</dd>
</ul>
</dd>
<dd><a data-href="DJIActiveTrackMissionOperator.html" class="sub-toggle">DJIActiveTrackMissionOperator<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a data-href="DJIActiveTrackMission.html" class="sub-toggle">DJIActiveTrackMission<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="DJIActiveTrackTrackingState.html">DJIActiveTrackTrackingState</a>
</dd>
<dd><a href="DJIActiveTrackMission_DJISubjectSensingState.html">DJISubjectSensingState</a>
</dd>
</ul>
</dd>
<dd><a href="DJIActiveTrackMissionEvent.html">DJIActiveTrackMissionEvent</a>
</dd>
</ul>
</dd>
<dd><a href="../Mission/DJIMission.html">DJIMission</a>
</dd>
</dl>
<dl>
<dt>Misc Classes
</dt>
<dd><a data-href="../ParamCapability/DJIParamCapability.html" class="sub-toggle">DJIParamCapability<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../ParamCapability/DJIParamCapability_DJIParamCapabilityMinMax.html">DJIParamCapabilityMinMax</a>
</dd>
</ul>
</dd>
<dd><a data-href="../SDKError/DJIError.html" class="sub-toggle">NSError<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../SDKError/DJIError_DJISDKCacheError.html">NSError</a>
</dd>
</ul>
</dd>
<dd><a data-href="../Diagnostics/DJIDiagnostics.html" class="sub-toggle">DJIDiagnostics<i class="fa fa-angle-down"></i><i class="fa fa-angle-up"></i></a>
<ul class="sub-menu">
<dd><a href="../Diagnostics/DJIDiagnostics_DJIDiagnosticsDeviceHealthInformation.html">DJIDiagnosticsDeviceHealthInformation</a>
</dd>
</ul>
</dd>
<dd><a href="../RemoteLogger/DJIRemoteLogger.html">DJIRemoteLogger</a>
</dd>
</dl>
</div>
</div>
<div class="site-main">
<div class="article"><div class="article"><h1><font color="#AAA">class </font>DJIGimbalAttitudeAction</h1></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="class"><span class="keyword">@interface</span> <span class="title">DJIGimbalAttitudeAction</span> : <span class="title">DJIMissionAction</span></span></span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr><tr valign="top"><td width="15%"><font color="#999"><i>Inherits From:</i></font></td><td width="85%"><font color="#999"><code><a href="../../Components/Missions/DJIMissionAction.html#djimissionaction">DJIMissionAction</a></code></font></td></tr></table></html>
<h5 id="description">Description:</h5>
<p><font color="#666">This class represents a gimbal movement action used as an element in a Timeline mission. By creating an object of this class and adding it to Mission Control's Timeline, the camera's gimbal will move to the specified attitude when the Timeline reaches the action.</font></p>
<h5 id="class-members">Class Members:</h5>
<div class="api-row" id="djigimbalattitudeaction_initwithattitude"><div class="api-col left">Constructor</div><div class="api-col middle" style="color:#AAA">method</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_initwithattitude_inline">initWithAttitude</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_initwithattitude_inline" <blockquote>
<div class="article"><h6><font color="#AAA">method </font>initWithAttitude</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line">- (<span class="keyword">instancetype</span> _Nullable)initWithAttitude:(DJIGimbalAttitude)attitude</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v2">Description:</h5>
<p><font color="#666">Initialize instance with gimbal target attitude. The value of <code><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_workmode">DJIGimbalMode</a></code> is <code><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_workmode_unknown">DJIGimbalModeUnknown</a></code>.</font></p>
<h5 id="input-parameters">Input Parameters:</h5>
<html><table class="table-inline-parameters"><tr valign="top"><td><font color="#70BF41"><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_attitude">DJIGimbalAttitude</a> <font color="#000">attitude</font></font></td><td><font color="#666"><i>Gimbal target attitude.</i></font></td></tr></table></html>
<h5 id="return">Return:</h5>
<html><table class="table-inline-parameters"><tr valign="top"><td><font color="#70BF41">instancetype _Nullable</font></td><td><font color="#666"><i>An instance of <code><a href="../../Components/Missions/DJIGimbalAttitudeAction.html#djigimbalattitudeaction">DJIGimbalAttitudeAction</a></code>.</i></font></td></tr></table></html></div>
<div class="api-row" id="djigimbalattitudeaction_initwithattitude_gimbalmode"><div class="api-col left"></div><div class="api-col middle" style="color:#AAA">method</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_initwithattitude_gimbalmode_inline">initWithAttitude:gimbalMode</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_initwithattitude_gimbalmode_inline" <blockquote>
<div class="article"><h6><font color="#AAA">method </font>initWithAttitude:gimbalMode</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line">- (<span class="keyword">instancetype</span> _Nullable)initWithAttitude:(DJIGimbalAttitude)attitude</span><br><span class="line"> gimbalMode:(DJIGimbalMode)gimbalMode</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v3">Description:</h5>
<p><font color="#666">Initialize instance with gimbal target attitude and gimbal mode.</font></p>
<h5 id="input-parameters-v2">Input Parameters:</h5>
<html><table class="table-inline-parameters"><tr valign="top"><td><font color="#70BF41"><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_attitude">DJIGimbalAttitude</a> <font color="#000">attitude</font></font></td><td><font color="#666"><i>Gimbal target attitude.</i></font></td></tr><tr valign="top"><td><font color="#70BF41"><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_workmode">DJIGimbalMode</a> <font color="#000">gimbalMode</font></font></td><td><font color="#666"><i>Gimbal mode to switch to.</i></font></td></tr></table></html>
<h5 id="return-v2">Return:</h5>
<html><table class="table-inline-parameters"><tr valign="top"><td><font color="#70BF41">instancetype _Nullable</font></td><td><font color="#666"><i>An instance of <code><a href="../../Components/Missions/DJIGimbalAttitudeAction.html#djigimbalattitudeaction">DJIGimbalAttitudeAction</a></code>.</i></font></td></tr></table></html></div>
<div class="api-row" id="djigimbalattitudeaction_completiontime"><div class="api-col left">Time</div><div class="api-col middle" style="color:#AAA">property</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_completiontime_inline">completionTime</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_completiontime_inline" <blockquote>
<div class="article"><h6><font color="#AAA">property </font>completionTime</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="keyword">@property</span>(<span class="keyword">nonatomic</span>, <span class="keyword">assign</span>) <span class="keyword">double</span> completionTime</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v4">Description:</h5>
<p><font color="#666">Completion time, in seconds, for the gimbal to go to the target attitude from current attitude. Default is 1 second.</font></p>
</div>
<div class="api-row" id="djigimbalattitudeaction_gimbalmode"><div class="api-col left">Gimbal Mode</div><div class="api-col middle" style="color:#AAA">property</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_gimbalmode_inline">gimbalMode</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_gimbalmode_inline" <blockquote>
<div class="article"><h6><font color="#AAA">property </font>gimbalMode</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="keyword">@property</span> (<span class="keyword">nonatomic</span>, <span class="keyword">assign</span>) DJIGimbalMode gimbalMode</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v5">Description:</h5>
<p><font color="#666">Gimbal mode to switch to when executing the action. When it is <code><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_workmode_unknown">DJIGimbalModeUnknown</a></code>, the action will not change the gimbal mode.</font></p>
<h5 id="see-also">See Also:</h5>
<p><font color="#666"><code><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_workmode">DJIGimbalMode</a></code></font></p>
</div>
<div class="api-row" id="djigimbalattitudeaction_targetattitude"><div class="api-col left">Attitude</div><div class="api-col middle" style="color:#AAA">property</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_targetattitude_inline">targetAttitude</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_targetattitude_inline" <blockquote>
<div class="article"><h6><font color="#AAA">property </font>targetAttitude</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="keyword">@property</span>(<span class="keyword">nonatomic</span>, <span class="keyword">readonly</span>) DJIGimbalAttitude targetAttitude</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v6">Description:</h5>
<p><font color="#666">Target gimbal attitude.</font></p>
<h5 id="see-also-v2">See Also:</h5>
<p><font color="#666"><code><a href="../../Components/Gimbal/DJIGimbal.html#djigimbal_attitude">DJIGimbalAttitude</a></code></font></p>
</div>
<h5 id="related">Related:</h5>
<div class="api-row" id="djigimbalattitudeaction_djigimbalattitudeactionerrordomain"><div class="api-col left">Error</div><div class="api-col middle" style="color:#AAA">const</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_djigimbalattitudeactionerrordomain_inline">DJIGimbalAttitudeActionErrorDomain</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_djigimbalattitudeactionerrordomain_inline" <blockquote>
<div class="article"><h6><font color="#AAA">const </font>DJIGimbalAttitudeActionErrorDomain</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="keyword">extern</span> <span class="keyword">const</span> <span class="built_in">NSErrorDomain</span> DJIGimbalAttitudeActionErrorDomain</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v7">Description:</h5>
<p><font color="#666">The Error domain for DJIGimbalAttitudeAction specific Errors.</font></p>
</div>
<div class="api-row" id="djigimbalattitudeaction_djigimbalattitudeactionerror"><div class="api-col left"></div><div class="api-col middle" style="color:#AAA">enum</div><div class="api-col right"><a class="trigger" href="#djigimbalattitudeaction_djigimbalattitudeactionerror_inline">DJIGimbalAttitudeActionError</a></div></div><div class="inline-doc" id="djigimbalattitudeaction_djigimbalattitudeactionerror_inline" <blockquote>
<div class="article"><h6><font color="#AAA">enum </font>DJIGimbalAttitudeActionError</h6></div>
<figure class="highlight objc"><table><tr><td class="code"><pre><span class="line"><span class="keyword">typedef</span> <span class="built_in">NS_ENUM</span>(<span class="built_in">NSInteger</span>, DJIGimbalAttitudeActionError)</span><br></pre></td></tr></table></figure>
<html><table class="table-supportedby"><tr valign="top"><td width="15%"><font color="#999"><i>Header:</i></font></td><td width="85%"><font color="#999">DJIGimbalAttitudeAction.h</font></td></tr></table></html>
<h5 id="description-v8">Description:</h5>
<p><font color="#666">A list of all errors relative to the gimbal attitude action.</font></p>
<h5 id="enum-members">Enum Members:</h5>
<html><table class="table-inline-parameters"><tr valign="top"><td><font color="#70BF41"><a href="#djigimbalattitudeaction_djigimbalattitudeactionerror_unknown_inline"></a>DJIGimbalAttitudeActionErrorUnknown</font></td><td><font color="#666">Default error if nothing else matches.</font></td></tr><tr valign="top"><td><font color="#70BF41"><a href="#djigimbalattitudeaction_djigimbalattitudeactionerror_yawoutsidemaxcapabilities_inline"></a>DJIGimbalAttitudeActionErrorYawOutsideMaxCapabilities</font></td><td><font color="#666">Yaw value passed is beyond the max capabilities of the gimbal.</font></td></tr><tr valign="top"><td><font color="#70BF41"><a href="#djigimbalattitudeaction_djigimbalattitudeactionerror_pitchoutsidemaxcapabilities_inline"></a>DJIGimbalAttitudeActionErrorPitchOutsideMaxCapabilities</font></td><td><font color="#666">Pitch value passed is beyond the max capabilities of the gimbal.</font></td></tr><tr valign="top"><td><font color="#70BF41"><a href="#djigimbalattitudeaction_djigimbalattitudeactionerror_completiontimeinvalid_inline"></a>DJIGimbalAttitudeActionErrorCompletionTimeInvalid</font></td><td><font color="#666">Completion Time value passed is invalid (less than 0).</font></td></tr></table></html></div>
</div>
</div>
</div>
<div id="search-modal" class="search-modal modal fade">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header"><a href="javascript:;" @click="closeSearch" class="btn-close">×</a>
<h2 class="title">Search Mobile SDK Document
</h2>
<input type="text" v-model="searchInput" @keydown.enter="search">
</div>
<div class="modal-body">
<p v-show="!!searchCount" class="search-count"><span v-cloak>{{searchCount}}</span> Results
</p>
<ul v-show="!!searchCount" class="search-result">
<li v-for="item in searchResult"><a v-bind:href="item.url | docUrl">
<h3 class="title">{{{(item.highlights && item.highlights.title) || item.title}}}</h3>
<p class="content">{{{(item.highlights && item.highlights.content[0]) || item.title}}}</p></a></li>
</ul>
<div v-show="showLoadMore" class="text-center"><a href="javascript:;" @click="loadMoreSearch" class="btn-learn-more">Load More</a></div>
<div v-show="searchLoading" class="text-center">Loading...
</div>
<div v-show="!searchCount && !searchLoading" class="text-center">Not Found
</div>
</div>
</div>
</div>
</div>
</div>
<script type="text/javascript">
window.Config = window.config = {
sdk: "mobile-sdk",
locale: "en",
environment: "development",
api_host: ""
};
</script>
<!-- build:js /javascripts/doc-vendor.js-->
<script src="../../javascripts/lib/jquery-2.1.4.min.js" type="text/javascript"></script>
<script src="../../javascripts/lib/bootstrap.js" type="text/javascript"></script>
<script src="../../javascripts/lib/vue.min.js" type="text/javascript"></script>
<!-- endbuild-->
<!-- build:js /javascripts/doc-app.js-->
<script src="../../javascripts/util/cookie.js" type="text/javascript"></script>
<script src="../../javascripts/util/url-manager.js" type="text/javascript"></script>
<script src="../../javascripts/util/ajax-manager.js" type="text/javascript"></script>
<script src="../../javascripts/base/footer.js" type="text/javascript"></script>
<script src="../../javascripts/base/header.js" type="text/javascript"></script>
<script src="../../javascripts/util/searcher.js" type="text/javascript"></script>
<script src="../../javascripts/search_index.js" type="text/javascript"></script>
<script src="../../javascripts/searchdoc.js" type="text/javascript"></script>
<script src="../../javascripts/api.js" type="text/javascript"></script>
<!-- endbuild-->
<script type="text/javascript">
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','http://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-43055594-1', 'auto');
ga('send', 'pageview');
</script>
</body> |
Concentrator Information
Respiratory diseases often create the need for more oxygen than what is available in the air. If you have Chronic Obstructive Pulmonary Disease (COPD) or Interstitial Lung Disease (ILD), you may already be using supplemental oxygen and if not you may have already discussed it with your doctor.
However, if you’re still not sure what supplemental oxygen is and what it means for you, this post will give you an overview.
If you have breathing difficulties, you know that the summer brings some complications: high humidity and extreme heat can exacerbate conditions such as COPD. In fact, one study showed a strong association between weather-related heat and emergency hospitalizations related to respiratory distress, meaning that those who suffer from these conditions must take even better care of themselves when the temperatures rise.
In addition to taking care of themselves, though, they need to take care of their oxygen concentrators. Units aren’t made to withstand extreme heat, so it’s important to ensure you’re keeping it safe along with yourself.
Accidents and emergencies can happen with and without warnings, such as a severe snowstorm, hurricane or an unexpected fire. When they do happen, everyone, including oxygen therapy users, need to be able to act fast. To make sure that you’ll be prepared for anything, whether it’s an evacuation or a situation where you need to stay put, make sure that you’ve got your oxygen ready to go with you.
Keeping your oxygen concentrator in top working condition not only ensures effective and safe oxygen delivery but it may also extend the lifespan of your unit. Cleaning and maintaining your portable oxygen concentrator is an important step in owning and caring for your unit. By following a few simple steps and guidelines you can easily keep your concentrator in pristine, "like-new" condition!
How to Clean The Outside of Your Oxygen Concentrator
Like all electronics, your oxygen concentrator is going to collect dirt, dust, and come in contact with substances that could make them sticky. Luckily, it’s easy to clean the outside of a portable concentrator, especially when you begin developing the habit of maintaining your unit early on in oxygen therapy!
Deciding which portable oxygen concentrator to purchase is an important choice. Not only are you buying a vital piece of medical equipment, but you’re paying a significant price too. It really pays to do your research and make sure you’re getting the features you need. The list below will detail what to look for and hopefully help make your decision an easier one.
Not only does the SeQual Eclipse 5 outperform the previous generations of this model in almost all categories, it features a powerful oxygen delivery system with many options. The SeQual Eclipse 5 comes with a surprising variety of modes and settings but not every unit works for everyone! Continue reading to find out if the SeQual Eclipse 5 is right for you. Here is a list of the Pros and Cons of the SeQual Eclipse 5 portable oxygen concentrator.
The Philips Respironics SimplyGo is a feature-laden workhouse of an oxygen concentrator designed with travel in mind. It comes with a ton of accessories and has versatile oxygen-delivery capability. Here is a list of the Pros and Cons of the Respironics SimplyGo portable oxygen concentrator.
The Inogen One G3 really puts the "portable" in oxygen concentrator portability. This small, lightweight unit is over 2 pounds lighter and several inches smaller than its predecessor, the G2. The G3 offers "pulse mode" oxygen therapy and also comes with several useful features and protective warranty. Here is a list of the Pros and Cons of the Inogen One G3 portable oxygen concentrator.
In the world of oxygen concentrators, and with most other machines and appliances, smaller is always preferred. However, smaller also generally means a lower oxygen capacity. If you can find a small oxygen concentrator that can deliver the oxygen dosage that you need, you're in luck.
Small, medium, or large, the one you choose should fit your lifestyle and meet your oxygen needs.
Portable oxygen concentrators were designed to provide the oxygen therapy you need while you are staying active or traveling. They were also meant to last and are built to be tough. They are made to be safe, even while in use on an airplane, as well as small and lightweight enough to comfortably take anywhere. The one thing they cannot do is get wet, just like with any other electronic machine. Other than that, they can go anywhere that you can comfortably go.
But just how long will they continue to provide the oxygen you need? This depends on the necessary maintenance, and how often it gets checked out and maintenance, as well as the brand and the model. There is no solid number to tell us how long a portable oxygen concentrator can last. What we can do, however, is give a rough estimate based on a few different factors. |
All my (mediocre) face washes have been replaced with this single product. It's moisturising enough that after I lather it on, I use a face towel for a little exfoliating treatment. It's got an instant firming element and my skin feels firm yet soft for hours. Vanisha - A Life Un-Styled
Natural, soap free, unisex and non drying, this biodegradable, plant based face wash is suitable for all skin types including sensitive skin. Heavenly scented and lovingly formulated to gently remove make up and impurities, minimise break outs and leave your skin feeling cleansed, soft and revitalised.
Enriched with:New Zealand manuka honey - one of nature's true wonders. A natural antimicrobial that is soothing, calming and protecting.
Organic cucumber - a natural extract to cool, hydrate and tone skin.
Lemon fruit - softens, cleanses and assists in brightening.
How to use:Gently massage onto damp face and neck then remove with a warmly rinsed cloth.
About Us 關於我們
Customer Service 顧客服務
Friendly Reminder: The information on this website is intended for your general information. It is not a substitute for medical advice from a health care professional and is not intended to diagnose, treat, cure or prevent any disease. Always consult your doctor or other qualified health care professional with any questions you may have regarding a medical condition. Do not disregard medical advice or postpone consultation with your health care professional because of information that you have read on this website. Always read the label of any supplements or natural health products you purchase and use only as directed. Vitamins and minerals are supplementary to and not a replacement for a balanced diet. Consult a health care professional if symptoms persist. |
1. Field of the Invention
The present invention relates to a portable phone and, more particularly, to a flip cover and antenna assembly coupled to a main housing of such a portable phone.
2. Description of Related Art
Portable cellular phones, which typically transmit and receive signals at a frequency of approximately 900 Megahertz, are well known and have been utilized for the last several years. Recently, however, it has become important for a second mode of communication, i.e., satellite, to be employed in areas where cellular communication is unavailable due to the lack of necessary cellular towers or stations. Such satellite communication occurs at frequencies within the L-band, and generally in the range of 1.0 to 30.0 Gigahertz.
It is recognized that separate antennas are necessary for cellular and satellite mode communication since cellular antennas are linearly polarized and satellite antennas are circularly polarized. A further difference is that the satellite communication mode involves a directional component, where link margin is increased when the satellite antenna is pointed toward the satellite, and the cellular mode communication mode does not. Thus, the positioning of the satellite antenna in the portable phone is very important, as is the construction of the satellite antenna.
Flip covers for portable phones have generally been used to protect the keypad or display and has only extended over part of the phone base. In certain applications, though, a flip cover has been utilized to house an antenna (e.g., U.S. Pat. Nos. 5,337,061, 5,258,892, 5,014,346, and 5,170,173). As will be seen herein, each of the antennas disclosed in these patents is of a different construction than the satellite antenna of the present invention. Additionally, the mechanical coupling of the flip cover to the main housing in such patents involves rotation about a single axis between an open and closed position.
It has been found that the form of antenna desired for satellite mode communication is a radiating patch element, which presents certain electrical and structural challenges when positioned within a flip cover of a portable phone. In particular, the gain for such types of antennas needs to be increased for acceptable performance, as does control over the radiation patterns thereof. The radiating patch elements must also be adequately secured within the flip cover housing to maintain stability and consistency. At the same time, the overall aesthetic impression of a portable phone including such a flip cover and antenna assembly must remain pleasing to the user.
In light of the foregoing, a primary object of the present invention is to provide a flip cover and antenna assembly for a portable phone capable of operating in satellite and/or cellular communication modes.
Another object of the present invention is to provide a flip cover and antenna assembly for a portable phone which maximizes the gain of the antenna element in such flip cover.
Yet another object of the present invention is to provide a flip cover and antenna assembly for a portable phone which maintains the overall look, feel and impression of the portable phone.
Still another object of the present invention is to provide a flip cover and antenna assembly which is compatible with rotation about two separate axes.
Another object of the present invention is to provide a flip cover and antenna assembly for a portable phone which maintains structural integrity when used in the operating environment.
These objects and other features of the present invention will become more readily apparent upon reference to the following description when taken in conjunction with the following drawing.
In accordance with the present invention, a flip cover and antenna assembly for a portable phone is disclosed as being rotatably coupled to a main housing thereof. The flip cover and antenna assembly includes a first flip cover housing, a second flip cover housing matable with the first flip cover housing, and an antenna element positioned between the first and second flip cover housings. The antenna element further includes a ground plane having a first surface and a second surface, with at least one radiating patch element bonded to the ground plane first surface. A dielectric foam is positioned over any remaining area of the ground plane first surface. The first and second flip cover housings have flanges which extend from at least a portion thereof to wrap around corresponding edges of the main housing, which enables extensions of the ground plane to be provided conforming to the flanges. The ground plane may also be patterned in order to control the radiation pattern thereof and minimize RF interaction with the portable phone and its user. The flip cover and antenna assembly may also include a second antenna in the form of a printed circuit antenna or a monopole antenna. |
And so, Zari does just that. She spends a good chunk of time doing anything she wants. She binges on whipped cream, messes with some weapons and the costumes of other Legends, throws snowballs at Rory, even uses the time to learn to expertly play a violin and read Rory’s full novel.
Of course, it wouldn’t be a time loop without showing off her reaching near omnipotence. Zari hangs in the background while Rory and Ray have an argument, holding up large cards with each of their dialogue written on them, dropping one card to reveal the next just before the words are spoken. But, her enjoyment can only last so long.
Beat – Can’t Take It Anymore
There tends to reach a point where the monotony of an unchanging world really gets to the character. It’s the opposite beat from the fun montage, and where this trope tends to get its darkest.
Zari returns to Nate at the beginning of another loop, looking more beaten down and worn out than ever. She says she can’t do it anymore; she’s losing her mind. He asks if she did the fun montage yet, she tells him she did, and thanks him for the idea, going on to call him a good friend. Like many other characters before her, Zari sees suicide as a possible way out. As she sees it, it’s the only thing she hasn’t tried.
At her bleakest moment, Zari holds a gun held to her own head, and Sara tries to stop her. Zari pulls the trigger, but it doesn’t work. She’s nearly in tears as she explains the situation to Sara, convinced her words won’t be believed. “I’m totally alone in it, because for some reason, I’m the only one that’s even aware that it’s happening. And I try so hard, but… I can never save any of you.” Sara sees the sincerity in what Zari is saying, and everything changes. Sara calls the others all to a meeting, and for the first time in any loop, Zari has the help of all the Legends. Now that the whole team is together, they quickly they discover a place that Zari has never checked: the trash compactor.
Beat – Upping the Stakes
The final chance at a loop doesn’t always occur, but it is something that can happen to ramp up the tension. Without this, it really comes down the character dealing with the mental or emotional weight of the situation but trapped in a kind of purgatory that will never get better or worse until it is figured out. Creating the idea of a final loop ups the stakes for everyone involved, especially when the reset is triggered by death. |
April is National Sexual Assault Awareness Month and Child Abuse Prevention Month, two great reasons to raise awareness. Every two minutes someone in the United States is sexually assaulted. One in three girls and one in six boys will be sexually abused by their eighteenth birthday. As many as 93 percent of the children are
Recently we were visiting my uncle in Florida. His wife asked how the book was coming along, which led to a conversation about my past. My uncle, my father’s brother, explicitly expressed what he would have done to his brother had he known he was abusing me. It sounds like something any relative would say |
Spotify premium for family let six user per subscription in the same household (same address) and all get to play their own music of choice for just $14.99 per month.
Image: Spotify
You can get the Google Home Mini if you reside in the US. But the shipping charges may apply. The offer will last till December 31st 2018 and it must be redeemed before January 15th 2019.
This is a nice offer because both new and existing subscriber get it as well, if you are an existing subscriber you can get your Google Home Mini here. New user click here to subscribe and get your Google Home Mini.
Get the offer while it's still last multiple accounts up to 6 people per same home address at just $14.99/month.
Available for a limited time with a small-yet-mighty smart speaker
It won't take anything from you to follow us on our social media handles below: |
Polarizable vacuum
Gravitation can be described via a scalar theory of gravitation, using a stratified conformally flat metric, in which the field equation arises from the notion that the vacuum behaves like an optical polarizable medium.
It was proposed by R. H. Dicke (1957) and then H. E. Puthoff (1998).
Harold Puthoff (see also Bernard Haisch and SED)
In theoretical physics, polarizable vacuum (PV) and its associated theory refers to proposals by Harold Puthoff, Robert H. Dicke, and others to develop an analogue of general relativity to describe gravity and its relationship to electromagnetism.
Description
In essence, Dicke and Puthoff proposed that the presence of mass alters the electric permittivity and the magnetic permeability of flat spacetime, εo and μo respectively by multiplying them by a scalar function, K:
εo→ε = Kεo, μo→μ = Kμo
arguing that this will affect the lengths of rulers made of ordinary matter, so that in the presence of a gravitational field the spacetime metric of Minkowski spacetime is replaced by
where is the so-called "dielectric constant of the vacuum". This is a "diagonal" metric given in terms of a Cartesian chart and having the same stratified conformally flat form in the Watt-Misner theory of gravitation. However, according to Dicke and Puthoff, κ must satisfy a field equation which differs from the field equation of the Watt-Misner theory. In the case of a static spherically symmetric vacuum, this yields the asymptotically flat solution
The resulting Lorentzian spacetime happens to agree with the analogous solution in the Watt-Misner theory, and it has the same weak-field limit, and the same far-field, as the Schwarzschild vacuum solution in general relativity, and it satisfies three of the four classical tests of relativistic gravitation (redshift, deflection of light, precession of the perihelion of Mercury) to within the limit of observational accuracy. However, as shown by Ibison (2003), it yields a different prediction for the inspiral of test particles due to gravitational radiation.
However, requiring stratified-conformally flat metrics rules out the possibility of recovering the weak-field Kerr metric, and is certainly inconsistent with the claim that PV can give a general "approximation" of the general theory of relativity. In particular, this theory exhibits no frame-dragging effects. Also, the effect of gravitational radiation on test particles differs profoundly between scalar theories and tensor theories of gravitation such as general relativity. LIGO is not intended primarily as a test ruling out scalar theories, but is widely expected to do so as a side benefit once it detects unambiguous gravitational wave signals exhibiting the characteristics expected in general relativity.
Ibison has considered a "cosmological solution" of PV, analogous to the Friedmann dust solution with flat orthogonal hyperslices in general relativity, and argues that this model is inconsistent with various observational and theoretical constraints. He also finds a rate of inspiral disagreeing with observation. The latter result disagrees with that of Watt and Misner, whose Lorentzian manifold differs from PV in the case of cosmology.
It is widely accepted that no scalar theory of gravitation can reproduce all of general relativity's successes, contrary to Puthoff's claims. It might be noted that De Felice uses constitutive relations to obtain a susceptibility tensor which lives in spatial hyperslices; this provides extra degrees of freedom which help make up for the degree of freedom lacking in PV and other scalar theories.
Modified PV Model
In 2005 Depp proposed a modification to the original PV work of Dicke that addresses many of the objections above. The revised model is not a replacement for general relativity but is meant to provide insight into the possible underlying physics of general relativity.
Depp presents a PV Lagrangian field from which can be derived the exact Schwarzschild solution and the exact Reissner-Nordstrom solution. In addition it is also shown that electron charge renormalization can be obtained from the model that is in good agreement with QED.
Desiato argues that Depp's modification was actually a correction that consistently uses the refractive index c/K throughout. Where, the original formulations by Dicke and Puthoff were inconsistent, using c^4/K or c^4/K^2 in the leading term of the Lagrangian, rather than Depp's (c/K)^4. PV and GR are now on the same experimental footing because they produce identical metric predictions. Illustrating that PV is just an alternative interpretation of the same phenomenon described by GR, and is well suited for engineering purposes; such that the Refractive Index takes the form:
K = 1 / (1 - 2GM/rc2) = rc2 / (rc2 - 2GM)
Consequently, the relationship between Cosmological Redshift & Refractive Index takes the form:
K = 1 / (1 + z)2
Desiato published an article in JBIS, using the Modified PV Model to derive an alternative to Alcubierre's warp drive equation, and offers a different interpretation of the Negative Energy Density required to achieve this goal.
Criticism
Generalization
Puthoff himself has apparently offered various characterizations of his proposal, which has been variously characterized as
an attempt to reformulate general relativity in terms of a purely formal analogy with the propagation of light through an optical medium,
an attempt to replace general relativity with a scalar theory of gravitation featuring formal analogies with Maxwell's theory of electromagnetism,
an attempt to unify gravitation and electromagnetism in a theory of electrogravity,
an attempt to provide a physical mechanism for how spacetime gets curved in general relativity, which suggests (to Puthoff) the possibility of "metric engineering" for such purposes as spacecraft propulsion (see Breakthrough Propulsion Physics Program).
PV has origins in more mainstream work by such physicists as Robert Dicke, but in current parlance the term does appear to be most closely associated with the speculations of Puthoff. The claims have not been accepted in mainstream physics.
Related work
Antecedents of PV and more recent related proposals include the following:
A proposal in 1921 by H. A. Wilson to reduce gravitation to electromagnetism by pursuing the formal analogy between "light bending" in metric theories of gravitation and propagation of light through an optical medium having a spatially varying refractive index. Wilson's approach to a unified field theory is not considered viable today.
An attempt (roughly 1960-1970) by Robert Dicke and Fernando de Felice to resurrect and improve Wilson's idea of an optical analogue of gravitational effects. If interpreted conservatively as an attempt to provide an alternative approach to general relativity, rather than as work toward a theory unifying electromagnetism and gravitation, this is not an unreasonable approach, although most likely of rather limited utility.
The 1967 proposal of Andrei Sakharov that gravitation might arise from underlying quantum field theory effects, in a manner somewhat analogous to the way that the (simple) classical theory of elasticity arises from (complicated) particle physics. This work is generally regarded as mainstream and not entirely implausible, but highly speculative, and most physicists seem to feel that little progress has been made.
In a series of papers, Bernard Haisch and Alfonso Rueda have proposed that the inertia of massive objects arises as a "electromagnetic reaction force", due to interaction with the so-called zero point field. According to mainstream physics, their claims rest upon incorrect computations using quantum field theory.
Recent work, motivated in large part by the discoveries of the Unruh effect, Hawking radiation, and black hole thermodynamics, to work out a complete theory of physical analogues such as optical black holes. This is not work toward a unified field theory, but in another sense can be regarded as work towards an even more ambitious unification, in which some of the most famous effects usually ascribed to general relativity (but actually common to many metric theories of gravitation) would be seen as essentially thermodynamical effects, not specifically gravitational effects. This work has excited great interest because it might enable experimental verification of the basic concept of Hawking radiation, which is widely regarded as one of the most revolutionary proposals in twentieth century physics, but which in its gravitational incarnation seems to be impossible to verify in experiments in earthly laboratories.
The 1999 proposal by Keith Watt and Charles W. Misner of a scalar theory of gravitation which postulates a stratified conformally flat metric of the form , given with respect to a Cartesian chart, where φ satisfies a certain partial differential equation which reduces in a vacuum region to the flat spacetime wave equation . This is a "toy theory", not a fully fledged theory of gravitation, since as Watt and Misner pointed out, while this theory does have the correct Newtonian limit, it disagrees with the result of certain observations.
See also
Induced gravity (for Sakharov's proposal)
Maxwell's equations in curved spacetime
Electromagnetic stress-energy tensor
References
arXiv eprint
External links
H. E. Puthoff, M. Ibison, Polarizable Vacuum "Metric Engineering" Approach to GR-Type Effects, MITRE Conference, McLean, VA, May 8, 2003. From the website of EarthTech, a company founded by Puthoff.
H. E. Puthoff, S. R. Little, M. Ibison, Engineering the Zero-Point Field and Polarizable Vacuum For Interstellar Flight, Institute for Advanced Studies, Austin, Texas, January 2001.
T. J. Desiato, The Electromagnetic Quantum Vacuum Warp Drive, Journal of the British Interplanetary Society, (2015) Released February 2016.
Notes
Category:Theories of gravitation
Category:Fringe physics |
1. Field of the Invention
This invention relates in general to ladders and more particularly to a ladder stand-off device for supporting and stabilizing a ladder in a leaning attitude against a vertical wall with the device also including a safety harness.
2. Description of the Prior Art
Ladders have been used for many years for performing work related tasks at heights otherwise not reachable.
Despite the wide use of ladders, however, a significant number accidents occur each year which are related to ladder use. Of course, some of these accidents result from the negligence of the individual using the ladder, and other accidents can perhaps be traced to faulty ladder design or construction. However, there are several situations in which the use of a ladder remains awkward and/or dangerous in spite of the fact that the ladder is well-designed and constructed and that the user is reasonably careful during its use.
One such situation arises when it is necessary to work at or near the top of a ladder which is leaning against a vertical support. For example, when working on the outside of a house, the edges of the roof generally hang over the outside vertical walls, thereby making it awkward to work near the top of a ladder which lies directly below the roof. Working under the other types of overhangs may similarly make ladder work difficult. Unfortunately, in such a situation the user often finds himself standing very close to the top of the ladder with nothing to hang onto. He may also be required to attempt some awkward and dangerous reaching in order to accomplish his desired objective. These factors, of course, may contribute significantly to the danger of ladder use.
Another common situation in which proper ladder use may be awkward arises when a ladder must be used adjacent windows and shrubs. As a general rule, the base of a ladder should be positioned one foot away from the ladder's vertical supporting surface for every four feet of ladder length. However, when working adjacent windows and shrubs, it is frequently difficult to maintain this proper slope. Often, for example, if the ladder were to be positioned properly, the top of the ladder would rest against a window; consequently, in order to avoid damaging the window, the ladder user either positions the top of the ladder just below or above the window. Thus, the user may find that the ladder is improperly positioned to support him. Similar problems may arise when a ladder must be used adjacent shrubs, since the proper positioning of the base of the ladder may be impossible.
A further situation which may make ladder use awkward or dangerous occurs when a ladder must be used adjacent an uneven vertical surface. Occasionally, an individual will simply place a ladder against an uneven surface and then attempt to climb the ladder, even though only one of the ladder's side rails is actually in contact with the vertical supporting surface. It will be readily appreciated that this situation creates a substantial danger, and a ladder so positioned will frequently twist away from the supporting surface and fall.
In order to minimize the awkwardness and danger involved in the above-mentioned situations, those skilled in the art have commonly used a device called a wall stand-off. A typical prior art stand-off comprises two support arms which are connected to the side rails so that the top of the ladder is spaced outwardly from the vertical surface. By using this sort of device, one may easily work adjacent the top of the ladder while still having sufficient room to hang onto the top of the ladder's side rails. Additionally, since the ladder is supported a predetermined distance from the supporting wall, awkward and dangerous reaching can be minimized. It will further be appreciated that prior art stand-off devices of this sort can be positioned such that the proper ladder slope is maintained when the ladder is used adjacent windows or shrubs.
However, in spite of the advantages of the prior art type of wall stand-off devices, there are several disadvantages associated with its use. First, it will be appreciated that since the stand-off attached to the side rails of the ladder, the stand-off is somewhat inconvenient to remove. Significantly, a worker often finds himself without the correct tools to remove the stand-off device. Consequently, when using a ladder to which a stand-off has been attached, a worker may try to use the ladder without removing the stand-off. There are numerous situations in which the use of a stand-off would not be appropriate and would tend to increase the danger of ladder usage.
Although the above discussed prior art stand-off devices provide a significant work and safety advantages over conventional ladders, they can still be dangerous. Due to the stand-off capability, there is an increased tendency for a user to place the ladder in a severely upright position, and this results in an increase in the chances for a user to lose his balance and fall backward.
Therefore a need exists for a new and improved ladder stand-off device with a safety harness which overcomes some of the problems and shortcomings of the prior art. |
I've been wagering on football for a long time as well as I have actually found out some terrific sporting activities betting football suggestions that I'm mosting likely to share with you. Betting on football is a procedure that requires continuing advancement unless you acquire football choices from somebody.
Today, I'll share with you 3 football betting tips to aid you win extra in your football betting journey.
Do not wager university football video games like NFL football games. This is just one of the much more common errors in football. Do it at your very own danger.
With college football, you have boys coming into their very own. They're at school and under all kind of influences. NFL football has to do with professional organisation men. It's more of a company mindset and to win, you need to wager it a little differently.
Football Betting Tip 2
Ensure your football parlay betting is only a tiny portion of your general football wagering. If it's not, you'll ultimately end up being a long term loser, which I understand you do not desire.
Football parlay wagers are a blast, however don't simply wager parlay cards. You require a healthy and balanced dosage of single wagers.
Football Betting Pointer 3
Bet the worth. It's really straightforward. When you make football bets, you desire to find lines that use you worth. Let's state that the New England Patriots are playing at house versus the Atlanta Falcons.
The line is -21. Is this worth? Nope. Sure, the Patriots are most likely mosting likely to win (in our hypothetical NFL video game), however 21 is a lot too expensive.
It matters not if you understand who will certainly win the video game. What matters is defeating the spread. As well as exactly what issues more is getting terrific value for your wagers.
Winning great deals of football bets this season is simple. Would like to know just how?
Below's a free football betting video to view. It's from Wise Gambler of SportsBettingFootball.com. Check it out.
While a lot of the gaming truths you may have gotten in Las Vegas can be valuable in online gambling it's vital that you recognize there are some crucial differences. With an understanding of the facts bordering your selected game, as well as equipped with some betting pointers from experienced online gamers, you will locate online gambling not just a remarkable as well as exciting experience little bit also a chance to turn your gaming leisure activity into a lucrative endeavor.
Never ever chase your losses. Don't raise your wagers since you're losing as well as desire to obtain even; just enhance your wagers as part of a pre-determined method.
Don't wager at any type of game that you don't understand. Discover it initially.
Do not wager as well as drink at the same. It's difficult enough to win at betting even without dulled senses.
Finance - General Guidelines
You will certainly shed regularly compared to you win and the longer you play the most likely that truth is. And it holds true whether you're discussing hands of blackjack, rolls of the live roulette wheel or throws of the dice.
The essential to winning is to optimize your wins and also to decrease you losses.
Discover and remember the odds at the game you have actually selected to play along with the finest approaches to use in an initiative to optimize your profits at that certain game.
Never wager with "dear" cash; just gamble with "excess" cash. In other words, never gamble with money that you will certainly need, or may require, to pay your everyday living expenses.
If you're playing against other gamers on-line this is two times as essential. The min you start gambling with "dear" money the other player will certainly sense your increased anxiety and play as necessary - commonly harassing you out of a bet because they know you are more tentative with your "dear" cash.
Separate each of those amounts right into 4 smaller amounts. If you lose one of the smaller sized amounts, adjustment tables or games or just take a break. If you lose your entire initial part, stop betting for the day.
Be disciplined as well as avoid the gambler's death of going right into your following allocation due to the fact that you feel like your good luck "simply needs to transform around." |
Pineapple Granita
Ingredients
1/2 cup sugar
2 cups pineapple juice
4 small mint sprigs, for garnish
Preparation
Combine sugar with 1/4 cup water in a small saucepan
over medium-high heat. Simmer until sugar
is dissolved, stirring once or twice. Whisk juice
into the sugar syrup and pour into a 9 x 9 x 2-inch
pan. Freeze 2-3 hours, pulling a fork through the
mixture every 30 minutes to make granules. Serve
in glasses garnished with mint. |
Q:
Time complexity of $\sim c \cdot n^3$ with a computer which is 10 times faster
I am trying to solve the following question
There's an algorithm with time complexity $\sim c \cdot n^3$. Suppose
there's another computer which is 10 times faster. How much bigger can
our $n$ be to be solved in the same time?
My answer so far is $\sqrt[3]{10}$.
$n^3$ can be 10 times bigger, so I have to multiply N with $\sqrt[3]{10}$. Is my conclusion correct or is there a fault in my reasoning?
A:
You've correctly reasoned that the additional speed doesn't change the $n^3$ part of the tilde expression. The only component left for it to effect then is $c$.
Let $c_1$ be the constant of the first computer and $c_2$ the constant of the second. If the second computer is 10x faster, then $c_2 = c_1/10.$ Now, all you need to do is solve the following equation:
$$c_1 \cdot n^3 = \frac{c_1 \cdot n'^3}{10},$$
which gives the same answer you came up with!
|
This blog is part of our Ruby 2.4 series.
Ruby 2.3
We can use MatchData#[] to extract named capture and positional capture groups.
pattern = /(?<number>\d+) (?<word>\w+)/ pattern . match ( '100 thousand' )[ :number ] #=> "100" pattern = /(\d+) (\w+)/ pattern . match ( '100 thousand' )[ 2 ] #=> "thousand"
Positional capture groups could also be extracted using MatchData#values_at .
pattern = /(\d+) (\w+)/ pattern . match ( '100 thousand' ). values_at ( 2 ) #=> ["thousand"]
Changes in Ruby 2.4
In Ruby 2.4, we can pass string or symbol to extract named capture groups to method #values_at . |
16 January 2009
the field negro, has a photo of president-elect obama's recent meeting with members of the supreme court. in fn's picture one can see chief justice roberts and justices john paul stevens, ruth bader ginsburgh, clarence thomas and david souter. all republican appointees except justice ginsburgh.
meanwhile, devvy kidd complains that it's inappropriate for the justices to meet with the president-elect when there are pending cases on the supreme court's docket in which obama is the defendant. |
Subsets and Splits