content
stringlengths 7
2.61M
|
---|
Rarita-Schwinger Quantum Free Field Via Deformation Quantization Rarita-Schwinger (RS) quantum free field is reexamined in the context of deformation quantization. It is found out that the subsidiary condition does not introduce any change either in the Wigner function or in other aspects of the deformation quantization formalism, in relation to the Dirac field case. This happens because the vector structure of the RS field imposes constraints on the space of wave function solutions and not on the operator structure. The RS propagator was also calculated within this formalism. Introduction Deformation quantization (DQ) is nowadays a mathematically well structured and established procedure. It can be regarded as a deformation of the algebraic structure of the ring of functions on the phase space. These functions turn into formal series containing a formal parameter (for some recent reviews, see ). However, there are an amount of cases where the formal parameter is a complex (or real) number and it describes real quantization of physical systems. Most of the studies of deformation quantization come from the mathematical point of view. One of the standard examples of DQ is the Weyl-Wigner-Groenewold-Moyal (WWGM) formalism, which is valid when the phase space is flat and euclidean. Also it requires from the Schrdinger representation of field theory. This is not a standard representation in quantum field theory and it has been useful when one try to gain some intuition from energy eigenvalues in a determined field theory. This strategy has been particularly useful in the deformation quantization of various fields. Regarding quantum field theory, just a few examples have been considered in the literature for the case of scalar fields. The free electromagnetic field and the Dirac field were discussed in respectively. Also some works have been done in relation to the gravitational field and bosonic string theory. Thus, it is natural to wonder about fields with higher spins. In particular, in the present paper we describe the deformation quantization for the Rarita-Schwinger (RS) free field. This field is of great importance as it describes the gravitino arising in supergravity and superstrings. In order to do this we briefly review this free field over Minkowski spacetime M 3+1 = R 3 R with the signature (−, −, −, +), where x = ( x, t) ∈ M. The RS field, (x), where is an spinorial index ( = 1,, 4) and is a spacetime vector index ( = 0, 1, 2, 3), transforms under the Lorentz group as (. Thus, the field (x) simultaneously fulfills the Dirac equation and the subsidiary condition where, as usual, i = i, 0 =, with i = 1, 2, 3. Note that we use the Weyl (or chiral) representation of the Dirac matrices : where j are the Pauli's matrices and j = 1, 2, 3. The Dirac matrices have the following properties: The paper is organized as follows: in Sec. 2 we implement the DQ procedure to quantize the free RS field and finally, in Sec. 3, we give our final remarks. Deformation Quantization of the Rarita-Schwinger Field If we want to apply the WWGM formalism to the RS free field, one needs to take into account not only the Dirac equation, but also the subsidiary condition. It was shown in that, for the system described by the Dirac equation, the time independent Schrdinger equation can be written as where the wave functional is defined by Remember that b * is determined by the complex conjugate of these equations. Similarly, we can write the subsidiary condition in the form where w ( p, r) is a solution of the RS equation. Writing down the equations and in the WMGM formalism, we have: For the ground state, the Dirac equation is equivalent to whose solution (including the normalization factor) is given by (see ref. ): Here we took into account the expression for the Moyal ⋆-product where F and G are functionals over the RS phase space defined by: As w ( p, r) = 0, equation does not impose new restrictions on b( p, r) or b * ( p, r). That is the reason why there are no changes in the Wigner function due to the consideration of the subsidiary condition. The Winger functionals for excited states can be constructed, as in, in the following form From this last formula one can find the Wigner functional for any excited state, which will be also identical to the Dirac case. The other aspects of the WWGM, such as: the Stratonovich-Weyl quantizer and normal ordering are also the same as for the Dirac case. However, the propagator depending on the wave functions that contains the information about the solutions of positive and negative energy of the RS equation, would be different. In the next section we compute it using the WWGM formalism. Rarita-Schwinger Propagator In order to compute the propagator of the RS field we need to find So we first compute the quantities 0| (x) (y)|0 and 0| (y) (x)|0. In terms of deformation quantization these expectation values are given by (compare with ) and the analogous formula for the second expectation value. Carrying out the corresponding integrations and making use of the following relations (see ref. ): after straightforward calculations we arrive at the following results and where p x = p x. The above formulas reproduce exactly the propagator of the RS field. Concluding Remarks In this paper we have extended the deformation quantization program via the WWGM formalism from Dirac to RS free field. We found out that the subsidiary equation does not introduce any change in the Wigner function of the Dirac field. For that reason, our main result is that the subsidiary condition does not affect the quantization of this field. Consequently, the quantum states are the same as those for the Dirac case. The difference appears only at the level of the space of the wave functions which are solutions of the equation of motion and the subsidiary condition. Then, although the quantum states are the same, the propagator and also the scattering amplitudes, both determined by the dynamics of the theory, are very different. It is interesting to note that something similar happens with the CPT group of the Rarita-Schwinger field in relation to the CPT group of the Dirac field: both fermionic fields have the same CPT group. In the case of deformation quantization as well as in the case of the CPT group, there is no a priori reason to think that the results for the Dirac field and for the Rarita-Schwinger field must be coinciding. Both results show that these two fields share similar properties despite their different nature. Making a comparison for the spin 3/2 field between the procedures of deformation quantization and canonical quantization, we can find out that the latter becomes rather awkward due to the difficulty of isolating the independent dynamical degrees of freedom ; while in the first case this problem is avoided because DQ does not distinguish between Dirac and Rarita-Schwinger fields. |
Firefighting foam concentrates are mixtures of foaming agents, solvents and other additives. These concentrates are intended to be mixed with water, the resulting solution foamed by mechanical means, and the foam projected onto the surface of a burning liquid. A particular class of firefighting foam concentrates is known as an aqueous film-forming foam (AFFF). AFFF concentrates have the quality of being able to spread an aqueous film on the surface of hydrocarbon liquids, enhancing the speed of extinguishment of fuel and solvent fires. Surfactants added to AFFF lower surface tension values which permits the foam to spread on the surface of the hydrocarbon liquids.
Aqueous film-forming foams provide a blanket to cover the fuel surface excluding air preventing further ignition of the fuel. For this reason aqueous film-forming foam compositions are particularly desirable for extinguishing fires involving flammable fuels, such as gasoline, naphtha, diesel oils, hydraulic fluids and other hydrocarbons.
Aqueous film-forming foams typically include a surfactant to impart important film forming properties that are useful in the extinguishment of burning liquids. Commonly used anionic hydrocarbon surfactants include alkyl ether sulfates and alpha olefin sulfates. What is needed are fluorinated sulfate surfactants which can enhance the fire extinguishment properties and stability of firefighting foams, including reducing surface tension and improving foam expansion. |
Food festival takedown: These vile bacchanals are a waste of money.
These modern-day bacchanals showcase the worst features of American life.
At the touring piggypalooza Cochon 555—which bills itself as “an epic porc feast featuring top chefs preparing whole heritage breed pigs”—tomato-faced diners cut lines with impunity. When necessary, they use sharp elbows and shoulder shivers to establish position. Their eyes scan the chefs’ tables frantically, and their shaky hands seize each tiny cup of tortellini en brodo before the tray touches the tablecloths. If you close your eyes and listen, you hear exaggerated groans of pleasure and thumping feet colliding eerily with glugs, scrapes, and clangs.
Looking down from the relative safety of a balcony at the L.A. House of Blues, where I was researching a blog post for L.A. Weekly last year, I was reminded of the end of Nathanael West’s short 1939 novel The Day of the Locust, in which a horde of spiritually famished L.A. grotesques, urged on by a gleeful barker, turns violent and destructive at a movie premiere. A celebration of eating turns strange and a little horrific when the overeaters-next-door are so caught up in their pursuit of porky goodness that they eschew manners and propriety, stirred by a barker’s exhortations and emboldened by their anonymity.
A food festival is a good way to lose your appetite, even if you’re attending, as I have on half a dozen occasions over the past five years, in a semi-detached journalistic capacity (usually writing for a Village Voice Media food blog). These festivals, whether food truck showcases or judged cooking competitions, are not concerned with creating a sense of community. They may even obscure the artistry of the participating chefs. They proudly revel in the relentless, boorish stuffing of faces, unchecked public intoxication, and wasteful excess.
Cochon 555 is not an outlier. It exemplifies the trend. At the 2013 Los Angeles Street Food Fest, for instance, eaters who had paid $75 for the occasion gathered outside the gates of the Rose Bowl. Some carried plus-sized versions of the cardboard boxes that In-and-Out uses to serve large orders. Within a few minutes of entering the arena, those cardboard troughs were stretched to their splitting point, inside each, a United Nations of incongruous foodstuffs: Thai noodles, pastrami, cheese-smothered waffle fries, a pizza sliver, half a dozen tacos, a medium-rare slider, and pork belly sandwiches with pickles.
There are a couple of strategies for navigating a food festival of this magnitude, both equally unappealing. If you heap your cardboard box with food and then find a place to huddle and eat, you end up forgetting the ingredients and provenance of each selection. Your food may be cold. It may have all spilled together, which is fine if you’re eating mashed potatoes and peas, but less so if your pig skin pasta is exchanging fluids with the sausage-stuffed squid braised in black ink. If you eat as you go, you’re standing up the whole time, in digestion-thwarting motion, balancing drinks, and dodging fellow patrons, who think nothing of spilling Anchor Steam down your leg or haphazardly flinging guacamole on your shoes.
Indoors, space is inevitably limited. You can’t rest a tray anywhere that isn’t precarious. Outdoors, the sun gives the food on your plate an unappetizing glaze and blisters your skin like pizza cheese.
There’s also the problem of avoiding inebriates. Food festival attendees drink with the giddiness of college freshmen finally free of controlling parents, and wineries, breweries, and distillers give away their wares for free in exchange for exposure. At the L.A. Street Food fest, most diners held at least one cocktail or tall, perspiring cup of beer in the hand unoccupied by the trough. Unsurprisingly, given the heat and the frequency with which they returned to the vendors, many were done by late afternoon, either bulling zombie-like from line to line or literally falling asleep. Couples slumped on benches, their troughs half-empty. Dropping her drink, a woman passed out against a wall, and festival employees rushed to revive her.
Some food festivals trumpet sustainability as a pillar of their mission, but this is self-evidently ridiculous. While biodegradable forks made from potato starch are popular, at the end of the day, napkins, plates, and discarded food billow out of garbage cans. Piles of trash sprout wherever attendees feel like starting them. Just because the heritage-breed pigs everyone’s tucking into were raised on chestnuts, doesn’t mean that the event is somehow expanding the crowd’s understanding of food systems. Responsible animal husbandry is great, but the very notion of encouraging a few relatively privileged people to dramatically overindulge—and then leave piles of garbage behind for janitors to clean up—seems unsustainable.
Walking out of a food festival, I feel bad. I have eaten too much good food, but I don’t feel the warm glow that accompanies an opulent, booze-soaked dinner party with friends or a restaurant splurge with a partner. Instead, there is the queasy guilt that I have not enjoyed with the appropriate reverence a luxury so many others cannot fathom.
Relax, some might say. Why be indignant about the obvious? Food festivals are supposed to be messy bacchanals. You pay for the privilege of sampling a variety of wares, being a part of the scene, and letting yourself go. Music festivals are an easy comparison: At a major food festival, you can enjoy the cooking of many of a city’s best chefs in an environment hardly conducive to eating, and at a major music festival you may enjoy performances by dozens of popular artists in an environment ill-suited to appreciating music.
People have a special relationship with music, but enjoying music isn’t an essential activity the way eating is. The pursuit of sustenance is part of survival, and cooking, many have argued, is quite literally what makes us human. Meals are sociocultural rituals; dinner tables strengthen bonds of family and friendship. A splashy food festival free-for-all encourages you to bypass all of that.
And that, I believe, is precisely why some people like them. The ritual of eating a meal, whether at home or in a restaurant, is smashed. The community that naturally forms around food preparation and consumption is replaced with an artificial one lacking a communal spirit. At dinner, you share conversation and pass dishes. The meal is (ideally) improved by the company. People (hopefully) try not to revolt one another.
At food festivals, those that make up the community have self-interest perpetually in mind. They don’t consider how their actions affect others. They talk to those with whom they came, sure—while standing and scarfing—but above all they pursue individual satisfaction. Get ahead in line. Get your money’s worth. Grab (literally) a piece of the pie before it’s too late.
At a big, bombastic food festival, everyone walks in with the same ticket, but only selfishness and a willingness to be brash, bold, and a little idiotic will get you what you covet. It’s a brined and barbecued version of the American Dream. And like the original, it can leave you feeling empty. |
VARIATIONS BY RACE, ETHNICITY AND SEX IN RELATIONS OF BEHAVIORAL FACTORS TO BIOLOGICAL AGING cognitive-executive and motor areas. This study sought to quantify how cortical perfusion, which is known to impact function during aging, is impacted by cardiovascular fitness in older adults and how cortical perfusion impacts the BOLD signal during tasks. We acquired cortical perfusion data using arterial spin labeling on twelve young and fourteen older neurologically healthy subjects. Perfusion in the frontal gyrus was greater for young subjects compared to old. In support of our hypothesis, the age-related decreased perfusion was negated in our regions of interest - inferior frontal and the motor cortices - in older adults quantified as physic-ally active and were related to changes in the BOLD signal. Identifying physiologic mechanisms that result in beneficial adaptations in cortical activity will be pivotal in understand-ing aging as well as age-related disease processes and will also guide preventative strategies aimed to delay age-related and neural pathological functional decline. Background: Public health guidance supports physical activity (PA), avoiding smoking, moderate drinking and maintenance of good mental health as beneficial for aging. However, little is known about whether relations of these factors to biological aging vary by race, ethnicity and/or sex. Methods: We included a sub-set of community-dwell-ing Latino, black, and non-Latino white US participants aged 50+ years (mean age=67 years) in a depression prevention ancillary study (VITAL-DEP) to the VITamin D and OmegA-3 TriaL (VITAL; n=25,874), a randomized trial of fish oil and vitamin D supplements for primary prevention of cancer and cardiovascular disease. Before randomization blood samples and extensive health and behavioral variables, including PA, smoking, alcohol use and mood, were collected. Biomarkers were assayed from DNA extracted from whole blood and included: telomere length (n=792); mitochon-drial DNA copy number (n=396); DNA methylation (n=23) (>850,000 CpG sites on the MethylationEPIC technology). Results: The biomarkers did not consistently show correla-tions with each other or agree regarding associations with behavioral/lifestyle factors. Significant differences by race, ethnicity and sex were found in relations of PA, smoking and alcohol use to biomarkers: e.g., females (particularly black females) vs. males had stronger smoking-telomere shortening associations (p-interaction=0.03). Conclusion: We observed novel variations by race, ethnicity and sex for key behavioral and lifestyle factors with respect to aging biomarkers. If confirmed, these results could have implications for public health recommendations regarding optimization of health behaviors among older adults, especially if they indicate that modifiable behaviors differentially influence biological aging outcomes within sub-sets of the population. (MMSE) scores for survivors from Wave 1 (1993/1994) to Wave 9 (2015/2016), n=255. Growth Mixture Modeling (GMM) is then used to assess how changes in MMSE scores are distributed among living arrangements for individuals living independently compared to household extension (living with others) using the full sample. Results: Analyses reveal different trajectories in MMSE score. 12% (n=27) of the sample had no decrease, while the remaining (88%) were split between moderate decline (60% n=136, 110 point decline in MMSE) and severe decline (28% n=62 >10 point decline In MMSE). Changes in living arrangement over the same period show that 89% of individuals who move from independent living into extended household experienced cognitive decline. Conclusions: This study provides new information on how cognitive trajectories are associated with living arrangements. We discuss implications for improving community-based interventions for Latino family caregivers. |
<filename>src/main/java/dev/area51/broker/consumer/ConsumerRepository.java
package dev.area51.broker.consumer;
import dev.area51.xsd.amqrabbitbridge.v1.ConsumerDefinition;
import javax.jms.Message;
import java.util.Map;
import java.util.Objects;
import java.util.ServiceLoader;
import java.util.concurrent.ConcurrentHashMap;
import java.util.function.Consumer;
public enum ConsumerRepository
{
INSTANCE;
private final Map<Class, ConsumerFactory> factories;
ConsumerRepository( )
{
factories = new ConcurrentHashMap<>( );
ServiceLoader<ConsumerFactory> loader = ServiceLoader.load( ConsumerFactory.class );
for ( ConsumerFactory factory : loader )
{
ConsumerType type = factory
.getClass( )
.getAnnotation( ConsumerType.class );
factories.put( type.value( ),
factory );
}
}
public ConsumerFactory lookup( ConsumerDefinition definition )
{
return factories.get( definition.getClass( ) );
}
public Consumer<Message> createConsumer( ConsumerBuilder builder,
ConsumerDefinition definition )
{
ConsumerFactory factory = Objects.requireNonNull( lookup( definition ),
"No definition for " + definition.getClass( ) );
return factory.create( builder,
definition );
}
}
|
<reponame>DanLindeman/optaplanner<gh_stars>0
/*
* Copyright 2012 Red Hat, Inc. and/or its affiliates.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.optaplanner.core.impl.heuristic.selector.value.chained;
import java.io.Serializable;
import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
import org.optaplanner.core.impl.score.director.ScoreDirector;
/**
* A subList out of a single chain.
* <p>
* Never includes an anchor.
*/
public class SubChain implements Serializable {
private final List<Object> entityList;
public SubChain(List<Object> entityList) {
this.entityList = entityList;
}
public List<Object> getEntityList() {
return entityList;
}
// ************************************************************************
// Worker methods
// ************************************************************************
public Object getFirstEntity() {
if (entityList.isEmpty()) {
return null;
}
return entityList.get(0);
}
public Object getLastEntity() {
if (entityList.isEmpty()) {
return null;
}
return entityList.get(entityList.size() - 1);
}
public int getSize() {
return entityList.size();
}
public SubChain reverse() {
List<Object> reversedEntityList = new ArrayList<>(entityList);
Collections.reverse(reversedEntityList);
return new SubChain(reversedEntityList);
}
public SubChain subChain(int fromIndex, int toIndex) {
return new SubChain(entityList.subList(fromIndex, toIndex));
}
public <Solution_> SubChain rebase(ScoreDirector<Solution_> destinationScoreDirector) {
List<Object> rebasedEntityList = new ArrayList<>(entityList.size());
for (Object entity : entityList) {
rebasedEntityList.add(destinationScoreDirector.lookUpWorkingObject(entity));
}
return new SubChain(rebasedEntityList);
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
} else if (o instanceof SubChain) {
SubChain other = (SubChain) o;
return entityList.equals(other.entityList);
} else {
return false;
}
}
@Override
public int hashCode() {
return entityList.hashCode();
}
@Override
public String toString() {
return entityList.toString();
}
public String toDottedString() {
return "[" + getFirstEntity() + ".." + getLastEntity() + "]";
}
}
|
/*-
* Copyright(c) 2016-2017 Intel Corporation. All rights reserved.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
#include <rte_string_fns.h>
#include "cli.h"
#include "cli_string_fns.h"
static int
__count_nodes(struct cli_node *node,
uint32_t flags, args_t *args)
{
if (flags & node->type)
args->arg1.u32[0]++;
return 0;
}
uint32_t
cli_dir_item_count(struct cli_node *node, uint32_t types)
{
args_t args;
if (!node || !is_directory(node))
return 0;
memset(&args, '\0', sizeof(args));
cli_scan_directory(node, __count_nodes, types, &args);
return args.arg1.u32[0];
}
uint32_t
cli_path_item_count(uint32_t types)
{
uint32_t cnt = 0, i;
/* Look in the current directory first for a command */
for (i = 0; i < CLI_MAX_BINS; i++)
cnt += cli_dir_item_count(this_cli->bins[i], types);
return cnt;
}
uint32_t
cli_path_cmd_count(void)
{
return cli_path_item_count(CLI_EXE_TYPE);
}
static uint32_t
node_list_with_type(uint32_t flags, void **ret)
{
struct cli_node *n, **nodes, *bin;
uint32_t cnt, i, k = 0;
cnt = cli_path_item_count(flags);
if (cnt) {
nodes = calloc(cnt + 1, sizeof(struct cli_node *));
if (!nodes)
return 0;
for (i = 0; i < CLI_MAX_BINS; i++) {
bin = this_cli->bins[i];
if (!bin)
continue;
/*
* Current directory could be a bin directory skip this bin
* directory as the cwd has already been searched. The cwd is
* the first entry in the bins list.
*/
if ((i > 0) && (bin == get_cwd())) {
cli_printf("skip %s\n", bin->name);
continue;
}
TAILQ_FOREACH(n, &bin->items, next) {
if (n->type & flags)
nodes[k++] = n;
}
}
*ret = nodes;
}
return k;
}
static uint32_t
dir_list_with_type(struct cli_node *dir, uint32_t flags, void **ret)
{
struct cli_node *n, **nodes;
uint32_t cnt, k = 0;
cnt = cli_dir_item_count(dir, flags);
if (cnt) {
nodes = calloc(cnt + 1, sizeof(struct cli_node *));
if (!nodes)
return 0;
TAILQ_FOREACH(n, &dir->items, next) {
if (n->type & flags)
nodes[k++] = n;
}
*ret = nodes;
}
return k;
}
uint32_t
cli_node_list_with_type(struct cli_node *node, uint32_t flags, void **ret)
{
if (node)
return dir_list_with_type(node, flags, ret);
else
return node_list_with_type(flags, ret);
}
void
cli_node_list_free(void *nodes)
{
free(nodes);
}
int
cli_scan_directory(struct cli_node *dir,
cli_scan_t func, uint32_t flags, args_t *args)
{
struct cli_node *node;
int ret = 0;
if (!func)
return ret;
if (!dir)
dir = cli_root_node();
TAILQ_FOREACH(node, &dir->items, next) {
if (node->type & flags) {
ret = func(node, flags, args);
if (ret)
break;
}
}
return ret;
}
int
cli_scan_path(const char *path, cli_scan_t func, uint32_t flags, args_t *args)
{
struct cli_node *node;
if (cli_find_node(path, &node))
if (cli_scan_directory(node, func, flags, args))
return 1;
return 0;
}
struct cli_node *
cli_search_dir(struct cli_node *dir, const char *name, uint32_t type)
{
struct cli_node *node;
if (!name || (*name == '\0'))
return NULL;
if (!dir)
dir = get_cwd();
else if (!is_directory(dir))
return NULL;
/* Process the .. and . directories */
if (!strcmp(name, ".."))
return (dir->parent) ? dir->parent : NULL;
else if (!strcmp(name, "."))
return dir;
TAILQ_FOREACH(node, &dir->items, next) {
if (rte_strmatch(node->name, name) && (node->type & type))
return node;
}
return NULL;
}
int
cli_find_node(const char *path, struct cli_node **ret)
{
struct cli_node *node, *dir;
char *my_path = NULL;
char *argv[CLI_MAX_ARGVS + 1];
int n, i;
if (!path || (*path == '\0'))
return 0;
if (path[0] == '/' && path[1] == '\0') {
node = cli_root_node();
goto _leave;
}
/* Skip the leading '/' */
my_path = strdup((path[0] == '/') ? &path[1] : path);
if (!my_path)
return 0;
n = rte_strtok(my_path, "/", argv, CLI_MAX_ARGVS);
/* handle the special case of leading '/' */
if (path[0] == '/')
dir = this_cli->root.tqh_first;
else
dir = get_cwd();
/* Follow the directory path if present */
for (i = 0, node = NULL; i < n; i++) {
node = cli_search_dir(dir, argv[i], CLI_ALL_TYPE);
if (!node)
break;
/* follow the next directory */
if (is_directory(node) && (i < n))
dir = node;
else
break;
}
free(my_path);
_leave:
if (ret)
*ret = node;
return (node) ? 1 : 0;
}
struct cli_node *
cli_last_node_in_path(const char *path)
{
struct cli_node *node, *dir;
char *my_path = NULL;
char *argv[CLI_MAX_ARGVS+1];
int n, i;
if (!path || (*path == '\0'))
return get_cwd();
if (path[0] == '/' && path[1] == '\0')
return cli_root_node();
/* Skip the leading '/' */
my_path = strdup((path[0] == '/') ? &path[1] : path);
if (!my_path)
return NULL;
n = rte_strtok(my_path, "/", argv, CLI_MAX_ARGVS);
/* handle the special case of leading '/' */
if (path[0] == '/')
dir = this_cli->root.tqh_first;
else
dir = get_cwd();
/* Follow the directory path if present */
for (i = 0, node = NULL; i < n; i++) {
node = cli_search_dir(dir, argv[i], CLI_ALL_TYPE);
if (!node)
break;
/* follow the next directory */
if (is_directory(node) && (i < n))
dir = node;
else
break;
}
free(my_path);
return dir;
}
struct cli_node *
cli_find_cmd(const char *path)
{
struct cli_node *cmd, *dir;
int i;
if (cli_find_node(path, &cmd))
return cmd;
for (i = 0; i < CLI_MAX_BINS; i++) {
if ((dir = this_cli->bins[i]) == NULL)
continue;
cmd = cli_search_dir(dir, path, CLI_EXE_TYPE);
if (cmd)
return cmd;
}
return NULL;
}
|
Book Review: Magnification Radiography Magnification radiography is a collection and presentation of the major research work on this subject, which is of great value because of the growing interest in magnification during recent years. The book gives an excellent survey of the magnification method, especially from the physical and technical standpoints. Although the English translation could be better, the text is easy to follow and the theoretical explanations are clear even for those without extensive technical or mathematical knowledge. The clinical applications of the magnification method are well presented and this description could be of great value to anyone wishing to utilize this method. The authors use a series of 14 patients to show the information gained by magnification in clinical practice. The film reproductions are excellent and clearly show the advantages of magnification in many fields of radiology. The information is based upon various focal spot sizes. The authors have extensive personal experience in this field, and S. Takahashi, the senior author, is one of the pioneers. The list of 141 references includes 20 of Takahashi's works and seven of these were written in collaboration with S. Sakuma, another pioneer with an extensive bibliography in this field. The fact that of 68 quoted papers of Japanese origin only 25 are in English enhances the value of this work since many critical references are in Japanese and this is the first comprehensive review of these in English. Despite the obvious advantages and information so well described in this book, the present reviewer feels that the authors are somewhat overoptimistic and uncritical about the method. At the present time the use of magnification must be limited because of the radiation dose and because of the small field size. In summary, this book is an excellent introduction to magnification radiography and reveals the great potentialities of the method. Erik Boijsen |
Divergent DNA methylation patterns associated with gene expression in rice cultivars with contrasting drought and salinity stress response DNA methylation is an epigenetic mechanism that play an important role in gene regulation in response to environmental conditions. The understanding of DNA methylation at the whole genome level can provide insights into the regulatory mechanisms underlying abiotic stress response/adaptation. We report DNA methylation patterns and their influence on transcription in three rice (Oryza sativa) cultivars (IR64, stress-sensitive; Nagina 22, drought-tolerant; Pokkali, salinity-tolerant) via an integrated analysis of whole genome bisulphite sequencing and RNA sequencing. We discovered extensive DNA methylation at single-base resolution in rice cultivars, identified the sequence context and extent of methylation at each site. Overall, methylation levels were significantly different in the three rice cultivars. Numerous differentially methylated regions (DMRs) among different cultivars were identified and many of which were associated with differential expression of genes important for abiotic stress response. Transposon-associated DMRs were found coupled to the transcript abundance of nearby protein-coding gene(s). Small RNA (smRNA) abundance was found to be positively correlated with hypermethylated regions. These results provide insights into interplay among DNA methylation, gene expression and smRNA abundance, and suggest a role in abiotic stress adaptation in rice. Rice is an important crop accounting for food security of over half the world population. Water-deficit and salinity are the major abiotic factors that affect rice productivity worldwide. Rice germplasm exhibit variability in their response to these abiotic stresses; some genotypes possess ability to tolerate extreme drought and salinity stresses, whereas many of them are highly susceptible. These phenotypic variability may be attributed to genetic and epigenetic variations, and different regulatory architecture among them. The study of tolerance/response mechanisms to abiotic stresses has been intensively worked out based on genomics, transcriptomics and proteomics analyses. Several genes and genomic variations involved in stress responses have been identified and a few regulatory networks have been proposed. However, only a few studies have analyzed the epigenetic regulation of stress response in rice, that too at low-throughput level, mostly focused on a set of genes/loci 26,27. High-throughput sequencing technologies provide an opportunity to recognize the DNA methylation at single-base resolution quickly and comprehensively in different biological contexts in plants 18,. Although several techniques have been applied to study genome-wide DNA methylation, most detailed methylome maps at single-base resolution have been obtained using bisulphite sequencing. A global analysis of extent and pattern of DNA methylation in rice varieties with contrasting response to abiotic stresses is lacking. In this study, we investigated the differences in DNA methylation patterns of three different rice cultivars with contrasting responses to drought and salinity stresses. The expression of stress-responsive genes was found to be influenced by methylation status of associated regions, which suggested possible role of DNA methylation in stress adaptation. The high resolution methylome maps of different rice genotypes and differentially methylated regions contributes to our understanding of the role of epigenetic regulation of stress responses in plants. Results Three well-characterized rice cultivars with contrasting response to drought and/or salinity stresses, were used in this study for genome-wide analysis of DNA methylation, gene expression and small RNA profiling to reveal the epigenetic regulation of abiotic stress response. These rice cultivars are commonly used worldwide for the generation of various genomic resources and donors of stress-related agronomic traits 22,25,35,36. DNA methylation landscape of rice genome in different cultivars. Genome-wide profiling of DNA methylation using bisulphite sequencing was performed in IR64, N22 and Pokkali rice cultivars. In total, 160-212 million high-quality reads were obtained (Supplementary Table S1), reflecting > 30 genome coverage for each sample. Only the sequence reads that mapped uniquely to the reference rice genome were considered for the analysis. The uniquely mapped reads provided 87-89% coverage of the rice genome and over 80% (81-83%) of cytosines (Cs) in the genome (Supplementary Table S1). Using the non-conversion rate of Cs (0.05%) in the non-methylated chloroplast genome as error rate, the methylation status of each C was determined at a P-value cut-off of 0.001. Applying this criteria, we identified methylated C residues (mCs) for which sufficient read depth (at least five) was available. Overall, the frequencies of mCs were similar in IR64 (11.32%) and Pokkali (11.5%), and marginally higher in N22 (12.30%). Of the total mCs, the highest fraction was of CG (47-49%) followed by CHG (28-31%) and CHH (20-24%) for all the three rice cultivars (Fig. 1a). The methylation level of mCs in CG context was much higher than CHG and CHH contexts (Fig. 1b). The average methylation levels was also highest in CG context (87-88%) followed by CHG (67-68%) and CHH (41-43%) contexts ( Supplementary Fig. S1). The relative frequency of mCs in different contexts and the tendency of higher methylation level in CG context and lower methylation levels in CHH context were similar to those observed in other plants 10,32,37. A higher methylation was observed in N22 for Cs in all contexts (Fig. 1b). Overall, significant differences were observed in the methylation levels among different rice cultivars. We observed extensive DNA methylation in the pericentromeric regions of the chromosomes as compared to ends, reflecting dense methylation of repetitive sequences (Fig. 1c, Supplementary Fig. S2). A considerable number of mCs were observed in the non-repetitive intergenic and genic regions as well. The comparison of DNA methylation levels with density of genes and transposable elements (TEs) revealed a positive correlation with the density of TEs and negative correlation with gene density. We found substantial variations between IR64 and N22 in the distribution of mCs in all contexts, whereas only few regions showed variations in distribution of mCs between IR64 and Pokkali (Fig. 1c, Supplementary Fig. S2). Further, we examined strand-specific distribution of DNA methylation in the three rice cultivars. Both DNA strands (sense and anti-sense) of the genome exhibited similar methylation levels with minor differences (Supplementary Fig. S3). DNA methylation patterns in protein-coding genes and TEs. We analyzed DNA methylation patterns in genic and TE regions. In general, CHG methylation levels were much higher in TEs (28-32%) as compared to protein-coding genes (7-9%) in all the rice cultivars (Fig. 2a). The CG context methylation of TEs was also higher than genes in N22, which was in contrast to that of IR64 and Pokkali. In CHH context, the methylation level of TEs and genes was similar in N22, but was lower for TEs than genes in IR64 and Pokkali. These results suggest that protein-coding genes and TEs are differentially recognized for methylation in different rice cultivars. Further, we investigated patterns of DNA methylation in various genomic features in all contexts ( Supplementary Fig. S4). For CG, largest number of mCs were located within gene body in rice cultivars. However, the frequency of mCs in CHG and CHH contexts were considerably higher in the upstream and downstream regions as compared to the gene body. Least number of CHH context mCs existed in the exonic regions (CDS and UTRs). Further, we analyzed the pattern of DNA methylation within gene body, and upstream and downstream flanking sequences. DNA methylation sites in all contexts increased rapidly while moving upstream to transcriptional start sites (TSSs) and downstream to termination sites (TTSs, Fig. 2b). In contrast to CHG and CHH, number of mCs in CG context was higher in the gene body as compared to the flanking sequences. Notably, the frequency of mCs in CHH context was higher than CG context mCs in the upstream region near the TSSs. Similar observations have been made in other plant species too 38,39. However, the methylation level throughout the upstream, gene body and downstream regions was highest in CG context followed by CHG and CHH ( Supplementary Fig. S5). Because DNA methylation has a major role in transposon silencing, we examined the patterns of DNA methylation in TEs as well (Fig. 2c). The analysis revealed enrichment of DNA methylation throughout the TE body as compared to flanking sequences in all contexts. However, the enrichment of CG and CHG methylation was several-fold higher than CHH methylation. Notably, the methylation level was markedly higher in the TE body as compared to protein-coding genes. Also, TEs were highly methylated near the TSSs and TTSs as opposed to the protein-coding genes (Fig. 2b,c), consistent with earlier reports 10,13. Among the rice cultivars, the patterns of DNA methylation in CHG and CHH contexts were almost similar, whereas substantial differences were observed for CG context. The TE body was most highly methylated in N22 followed by IR64 and Pokkali. Differentially methylated regions in different rice cultivars. To investigate the differential methylation in the three rice cultivars, we identified differentially methylated regions (DMRs). For identification of DMRs, we calculated methylation levels in 100 bp bins. A total of 64,212 DMRs between N22 and IR64 (N22/IR64), and 35,723 DMRs between Pokkali and IR64 (PK/IR64) could be identified (q-value ≤ 0.01, Fisher's exact test followed by SLIM correction) (Fig. 3a). We observed that hypermethylation was more common in N22, whereas the frequency of hyper and hypomethylation was similar in Pokkali. The DMRs were found more likely to be located near (2 kb upstream and downstream) the genes (42-45%), but not so often within the gene body (16-18%) ( Supplementary Fig. S6). Overall, the DMRs present within/near protein-coding genes presented the major fraction (57-62%) of total DMRs. The genes with DMRs within their body and 2 kb flanking sequences were regarded as DMR-associated genes. A large number of protein-coding rice genes were identified as DMR-associated genes in N22/ IR64 (57.9%) and PK/IR64 (38.5%). In N22/IR64, number of hyper DMR-associated genes were significantly higher (2.2 times) than hypo DMR-associated genes, whereas the number of hyper and hypo DMR-associated genes were almost similar in PK/IR64 (Fig. 3b). Gene ontology (GO) analysis revealed that genes involved in diverse biological processes, such as metabolic processes, response to stress, signal transduction, translation and epigenetic regulation of gene expression were differentially methylated among rice cultivars ( Supplementary Fig. S7). Notably, a large fraction of these genes were found to be associated with response to abiotic stress. The enrichment analysis of DMR-associated genes revealed significant overrepresentation of genes involved in metabolic processes (lipid metabolic process and secondary metabolic process) and response to stress in both N22/IR64 and PK/IR64 (Fig. 3c). Differential gene expression in different cultivars. We determined the transcript abundance of all the rice genes in IR64, N22 and Pokkali cultivars using RNA-seq approach (Supplementary Table S2). The transcripts showing at least two-fold change with P-value less than 0.05 were identified as differentially expressed genes (DEGs). A total of 5172 (2620 upregulated and 2552 downregulated) and 3226 (1202 upregulated and 2024 downregulated) rice transcripts were found to be differentially expressed in N22/ IR64 and PK/IR64, respectively (Fig. 4a, Supplementary Table S3). Among these, 1395 (544 upregulated and 851 downregulated) transcripts were differentially expressed in both the comparisons. The genes involved in various cellular processes, including metabolic processes, amino acid metabolism, cell wall components, response to abiotic stimulus (osmotic stress, salt stress and water stress), defense response, photosynthesis, transcription and signal transduction were well represented among the differentially expressed genes (Supplementary Table S3). At least 356 transcription factor encoding genes belonging to 50 families were found to be differentially expressed in N22 and/or Pokkali as compared to IR64. The genes belonging to MYB/MYB-related, AP2-EREBP, bHLH and homeobox families were most highly represented among the differentially expressed genes (Fig. 4b). In addition, a large number of members of C3H, NAC, bZIP, PHD and WRKY families were also differentially expressed in N22 and/or Pokkali. GO enrichment analysis revealed that the genes involved in response to abiotic stimulus and amine metabolic processes were significantly enriched in both N22 and Pokkali cultivars (Fig. 4c). In addition, the genes involved in translation, protein folding and regulation of catalytic activity were significantly enriched in N22 cultivar. The changes in expression of many of these genes under stress conditions have been reported in previous studies too and implicated in stress tolerance mechanisms 10,35,36,40,41. The modulation of various metabolic pathways, such as osmoprotectants, cell wall components, amino acid metabolism, lipid metabolism, hormone metabolism and secondary metabolites have been correlated with the physiological differences among the rice cultivars under stress conditions. Differential methylation is coupled to differential gene expression in different cultivars. To examine influence of DNA methylation on expression of neighbouring genes, we assessed the relationship between DMRs and transcript abundance on a genome-wide scale. A total of about 39% and 30% of the DEGs in N22/IR64 and PK/IR64, respectively, were found to be associated with DMRs. We found that differential expression of DMR-associated genes was dependent on the direction of change in methylation status (Fig. 5a). In general, the genes proximal to hypermethylated DMRs exhibited lower levels of transcript abundance (downregulation) relative to entire gene set. The genes proximal to hypomethylated DMRs displayed similar or moderately higher levels of transcript abundance (upregulation) compared to all genes. However, some of the DMR-associated genes showed positive correlation with the transcript abundance. DNA methylation appeared to be correlated with on/off status of gene expression too for DMRs (14.5% for N22/IR64 and 7.2% for PK/IR64) ( Supplementary Fig. S8a,b). For other cases, DNA methylation state was correlated with quantitative differences in gene expression. DMRs with negative correlation with gene expression were found more likely located near genes boundaries opposed to those not associated with gene expression. Furthermore, enrichment analysis of DMR-associated DEGs revealed a negative correlation between methylation status and transcript abundance (Fig. 5b). A significant enrichment of downregulated genes was observed in genes proximal to hyper-DMRs present within the gene body and vice-versa for both N22/IR64 and PK/IR64. However, no significant correlation was observed for the DMRs present in the flanking sequences except for PK/IR64. These results suggest that the gene body methylation play an important role in regulation of gene expression and might contribute, in large part, to the differential stress response of the rice cultivars. Differential methylation of genes associated with stress response and epigenetic regulation of gene expression. The expression of genes involved in diverse cellular processes vary in different cultivars. The activation or repression of many of these genes is dependent on their chromatin structure, which is mainly determined by epigenetic marks, such as DNA methylation. Several examples of epigenetic regulation of gene expression in response to environmental stress are known 10,15,18,20,26,27,42. We also found the differential methylation of several genes belonging to various functional categories in the rice cultivars. These genes encoded proteins involved in various cellular processes, such as transcription regulation, metabolic processes and signal transduction (Supplementary Table S4). A substantial number of genes encoded for proteins with unknown function. The differential methylation level and corresponding differential gene expression of rice genes in N22/IR64 and PK/IR64 are shown in Fig. 6a. The GO analysis of DMR-associated genes in both N22/IR64 and PK/IR64 revealed a significant enrichment of genes that participate in stress response (Fig. 6b,c). In addition, genes involved in metabolic processes, such as lipid metabolic processes were enriched in both the comparisons. The epigenetic regulation of gene expression and protein modification processes were other important GO terms significantly overrepresented among the DMR-associated genes in N22/IR64 and PK/IR64, respectively (Fig. 6b). The biological processes, regulation of gene expression, response to abiotic stimulus and chromatin binding were significant among the genes exhibiting on/off gene expression with respect to their methylation status ( Supplementary Fig. S8c). Many of these genes represented known abiotic stress-responsive genes. For example, genes encoding for transcription factors (MYB, AP2-EREBP, WRKY, NAC and HB families), sodium transporter HKT1 homologs, F-box, calcium-dependent protein kinases, proteinases, peptidases, oxidoreductase, glutathione S-transferase, histone deacetylase and putative dicer-like proteins, were differentially methylated in N22 and/or Pokkali cultivars as compared to IR64 (Supplementary Table S4). A few representative examples of differential methylation of genes involved in abiotic stress response and epigenetic regulation of gene expression have been shown in Fig. 6c. The transcript abundance of these proteins were found to be negatively correlated with their differential methylation status. For example, transcription factors, such as A20/AN1-like zinc finger (Os05g23470), homeobox (Os02g43330 and Os03g43930) and AGL19 (Os10g39130) exhibited differential methylation in N22/IR64 and/or PK/ (c) Heatmap representation of the differential methylation (M) and differential expression (E) of DMR-associated genes known to be involved in abiotic stress response and epigenetic regulation of gene expression. Gene identifiers (MSU v7) and gene descriptions (best Arabidopsis ortholog) are given on the left and right sides of the heatmap, respectively. Colors at the bottom represents status of differential methylation (hypo/hyper) and differential expression (up/down). N22, Nagina 22; PK, Pokkali. IR64. The methylation status of these transcription factors can regulate the expression of a cascade of several downstream targets. In addition, genes encoding calcium-dependent protein kinase, calmodulin, transporter protein, drought-responsive proteins, detoxifying enzymes (oxidoreductase, glutathione S-transferase and thioredoxin), F-box protein, and heat-shock proteins also exhibited differential methylation status and transcript abundance in the rice cultivars (Fig. 6c). The role of many of these genes in drought/salinity stress response has already been demonstrated. Interestingly, we observed differential methylation of many of the genes involved in epigenetic regulation of gene expression. For example, histone deacetylase (Os08g25570) was hypermethylated (downregulated), but histone methyltransferase (Os01g70220) was hypomethylated (upregulated) in N22. One of the RNA-directed DNA methylation protein (Os06g42430) was found to be hypermethylated with lower transcript abundance in Pokkali. Many of the genes encoding components of gene silencing machinery, such as dicer-like proteins (Os09g14610, Os08g05320 and Os04g43050) exhibited differential methylation and transcript abundance in the rice cultivars. Although the differential expression of a few of these genes have been reported earlier 43,44, their differential methylation was not known. These proteins are required for establishment and maintenance of different context cytosine methylation and many aspects of epigenetic regulation. Although the exact mechanism of involvement of these proteins remains to be elucidated, our results provide evidence for their role in environmental stress responses. Methylation status of TEs is correlated with transcription of proximal protein-coding genes. Further, we examined the possibility of involvement of methylation within TEs to regulate gene expression in different cultivars. We determined the relative TE density at DMR-associated DEGs or non-DEGs as compared to all DEGs or non-DEGs, respectively, for N22/IR64 and PK/IR64. The enrichment of TEs was substantially higher for DMR-associated DEGs as compared to non-DEGs for both N22/IR64 (P-value 1.49e-05) and PK/IR64 (P-value 5.26e-05) (Fig. 7a). However, TE density for all expressed genes and DEGs was lower. Further, we analyzed the methylation level difference of DMRs associated with protein-coding genes and TEs. We found significantly higher differences in the methylation level of DMRs associated with TEs as compared to protein-coding genes for PK/IR64 (Fig. 7b). Validation of DNA methylation and gene expression. To validate the results of differential methylation patterns, we selected a series of DMR candidate regions. Based on the whole-genome bisulphite-sequencing results, we picked at least 15 genomic regions (DMRs) lying within the genes known to be involved in abiotic stress response and epigenetic regulation of gene expression. In these regions, we performed traditional bisulphite-PCR followed by Sanger sequencing for the three rice cultivars. Notably, more than 90-95% of the methyl cytosines at CG sites were validated, whereas 80-90% and 75-87% of CHG and CHH sites, respectively, could be validated in the three rice cultivars. The correlation between methylation levels of all methyl cytosines ranged from 0.78-0.83 for CG, 0.73-0.77 for CHG and 0.70-0.71 for CHH context (Supplementary Fig. S9). In addition, about 70% of genes/loci reported to be differentially methylated in different stress-related rice cultivars in earlier studies 20,26,27 were represented in our dataset. Further, we validated transcript levels of at least 16 DMR-associated genes in rice cultivars by real-time PCR analysis. A high correlation (Pearson correlation 0.75) between the differential gene expression results from RNA-seq and qRT-PCR data, was obtained ( Supplementary Fig. S10). Overall, the results were in concordance with results obtained from whole genome bisulphite sequencing and RNA-seq data analyses indicating high-quality of our data. Role of small RNAs in DNA methylation. A correlation between small RNA (smRNA) abundance and DNA methylation has been established by many studies 10,18,29,32. Therefore, we sought to investigate the relationship between DNA methylation and smRNAs in the rice cultivars. To perform genome-wide discovery of smRNAs, small RNA libraries for IR64, N22 and Pokkali seedlings were sequenced and more than 15 million reads were generated for each sample. After pre-processing, the unique reads (smR-NAs) of 21-24 nt were aligned to the rice genome (Supplementary Table S5). A total of 46-47% of the smRNAs (21-24 nt) mapped uniquely to the rice genome. The small RNAs were well distributed throughout the rice genome without any obvious difference in the different cultivars (Fig. 8a, Supplementary Fig. S2). The integration of genomic coordinates of smRNAs with the rice genome annotation revealed that a large fraction (68-70%) of smRNAs were originated from the genic and flanking sequences. The abundance of smRNAs was higher in the upstream sequences as compared to the gene body and downstream sequences (Fig. 8b). Highest abundance of smRNAs was observed in the upstream sequences near the TSSs. Within the genebody, highest abundance of smRNAs was observed at the 3 -end. However, the abundance of smRNAs was much higher within TE body as compared to the upstream and downstream sequences (Fig. 8c). This pattern seems to be consistent with the CHH methylation patterns in protein-coding genes and TEs (Fig. 2b,c). Further, we searched for the presence of mCs in different contexts within the smRNA loci. Overall 9-10% of total mCs were associated with smRNA loci in different rice cultivars and 53-55% of smRNA loci contained at least one mC. Notably, the proportion of CHH context mCs lying within smRNAs (13.1-15.2%) was substantially higher as compared to CG (7.5-8.5%) and CHG (8.5-9.3%) context mCs in all the three rice cultivars (Fig. 8d). The higher frequency of CHH context mCs located within the smRNA loci suggested a positive correlation between them. Next, we investigated the correlation between smRNA abundance and differential DNA methylation. We estimated the abundance of smRNA in all the protein-coding genes and DMR-associated genes in the rice cultivars. We found that abundance of smRNAs was significantly higher in the DMR-associated genes in all the three cultivars (Fig. 8e). In addition, we noticed significantly higher (~1.6-1.8 fold) enrichment of smRNAs in the hypermethylated genes and significant (~two-fold) depletion of smRNAs in the hypomethylated genes in both N22/IR64 and PK/IR64 comparisons (Fig. 8f). These results suggest that smRNAs participate in alteration of DNA methylation levels in different rice cultivars. Discussion Growing evidences from recent studies have suggested that DNA methylation plays a crucial role in regulation of stress responses/adaptation in plants 15,26,45,46. Rice has rich germplasm resources with variability in their adaptive response to environmental cues, such as drought and salinity. The epigenetic marks, such as DNA methylation may be responsible for phenotypic consequences like tolerance to abiotic stresses. Therefore, it is important to investigate the DNA methylomes of rice cultivars with contrasting phenotype towards abiotic stress tolerance to understand the epigenetic regulation of stress adaptation and identify specific marks that contribute to the modulation of this agronomic trait. In this study, we assessed the dynamics of DNA methylation at single base resolution in rice cultivars with contrasting drought and salinity stress response. Our results revealed several features regarding distribution of mCs, differential methylation patterns and their relationship with gene expression. The highest fraction of mCs in CG context followed by CHG and CHH contexts observed in the rice cultivars seems to be due to higher statistical power in detecting change at CG sites followed by CHG and CHH sites, which follow the same pattern of average methylation levels 28,32. Significant differences were observed in the methylation patterns in different rice cultivars with contrasting stress response. We found several cultivar-specific methylated regions in the rice genome and detected genome-wide differences in DNA methylation status, which were coupled to the gene expression, strengthening the possible role of epigenetic mechanisms in abiotic stress adaptation. Significant differences in methylation patterns of specific loci have been reported in different cultivars/lines with contrasting phenotype under stress conditions 26,27,46,47. Hypomethylation/demethylation is considered as a common feature associated with adaptive response to various stresses 19,. Based on methylation sensitive amplified polymorphism analysis, it has been shown that hypomethylation and hypermethylation are more frequent in drought-tolerant and drought-sensitive rice genotypes, respectively, under drought stress conditions 50. Other studies also suggested the genotype and developmental/tissue specificity of epigenetic regulation of abiotic stress responses in rice cultivars 26,27. Differential methylation in IR64, N22 and Pokkali rice cultivars under stress conditions is also expected to contribute to their contrasting stress response phenotype. Overall, these results suggest cultivar-specific changes in DNA methylation and different unknown mechanism(s) might be responsible for the differential stress responses. Our genome-wide analysis provide unique insight into the dynamics of DNA methylation in rice cultivars. The results suggest that DNA methylation regulate stress responsive genes via altering their expression. Our observations are consistent with previous reports associating methylation status of the DNA with transcriptional control of specific loci in different plant species 18,48,. Although we found significant enrichment of down and upregulated genes associated with hyper and hypo-DMRs, respectively, a large fraction of the DEGs did not exhibit significant differences in their methylation levels among cultivars. It may be speculated that the effect of DNA methylation on gene expression may be mediated either directly or indirectly via some transcriptional regulatory proteins, which can recognize mCs in the promoter regions. A mechanism involving the recruitment of methyl CG-binding proteins to remodel chromatin by utilizing histone deacetylase activity has been proposed that regulate gene expression. An alternate mechanism of gene silencing via inhibition of transcription activator binding due to promoter DNA methylation has also been reported earlier. Further, we observed a stronger correlation of gene body methylation/demethylation as compared to that of flanking sequences with decreased/increased transcript abundance. These results are consistent with previous reports, which demonstrated that DNA methylation in gene bodies affects gene expression more effectively than the promoter methylation in various organisms including rice 18,48,. However, these observations are in contrast with other studies, which reported a strong correlation between promoter methylation and gene expression 42,64. Further studies are required to clarify that how the transcript abundance is regulated differentially by the gene body or promoter methylation in different biological contexts. Overall, the identification of diverse categories of genes including those involved in abiotic stress response with differential methylation patterns provides evidence that epigenetic modifications play a crucial role in plants adaptation/response to abiotic stresses. The association of DNA methylation with inactivation of transposon activity is well known 65,66. Several genome-wide studies have shown heavy methylation of transposon sequences 67,68. It is now well established that the position and methylation status of nearby transposon(s) can regulate the gene expression 39,42,. We also observed heavy methylation of TEs in rice cultivars and their methylation patterns were quite different than protein-coding genes. Higher methylation of TEs is due to their ability to recruit the silencing machinery and is considered as an evolutionary mechanism to silence their expression and mobility 65,66. Many of the DMRs were associated with TEs and changes in the methylation of TEs was coupled to the expression of proximal protein-coding genes. Similar results have been reported in other studies on different plants as well 18,42,72. A few evidences have demonstrated that abiotic stresses can evoke heritable changes in the epigenetic framework that can confer enhanced stress tolerance in the progeny due to transgenerational memory 45,73,74. Interestingly, a copia-type retrotransposon (ONSEN) in Arabidopsis was found to have heat-induced transcription and transposition activity, which was found to be transgenerationally inherited 75. Altogether, it can be speculated that changes in DNA methylation patterns can remove epigenetic constraints from TEs, thereby resulting in transcriptional changes in stress-responsive genes. The de novo DNA methylation is established mainly via small RNA (smRNA)-guided RdDM pathway. Recently, bisulphite sequencing of selected genes in rdd mutant (a triple DNA demethylase mutant) Arabidopsis plants revealed that RdDM-associated CHH methylation play a positive role in stress-responsive gene expression 42. We observed a concordance in distribution patterns of mCs in CHH context and smRNAs within gene/TE body and their flanking sequences in the rice cultivars. In addition, a larger fraction of CHH context mCs were associated with smRNA loci. As CHH methylation is established by de novo methyltransferases only, our data also suggested a larger participation of smRNAs in CHH methylation which can regulate the target gene expression. Further, smRNAs were significantly enriched in hypermethylated regions, but depleted in hypomethylated regions. Overall, these results suggest that smRNAs also play a crucial role in shaping the DNA methylation landscape. Conclusions Our results suggest the potential role of cultivar-specific DNA methylation patterns as an important regulatory mechanism for sensing and responding to the stress conditions via modulation of stress-responsive gene expression. Our investigation suggest that variability for drought/salinity tolerance in rice germplasm is dependent on the extent and patterns of DNA methylation. We have provided evidence suggesting that DNA methylation play an important role in abiotic stress adaptation/response by regulating expression of a set of stress-responsive genes in rice largely via methylation/demethylation of proximal TEs. The DMRs described here provide an initial set of targets of epigenetic variations across rice germplasm and may provide basis of future selection strategies. Further, it would be interesting to study the changes in methylation pattern in the rice cultivars under stress conditions. Overall, the understanding of epigenetic regulation of abiotic stress responses can have a significant impact in breeding for development of improved varieties with enhanced stress tolerance. Methods Plant material and genomic DNA isolation. Three rice (Oryza sativa) cultivars, IR64 (drought and salinity sensitive), Pokkali (salinity-tolerant) and Nagina 22 (drought-tolerant), were used for DNA methylome analysis in this study. Rice seeds after surface sterilization with sodium hypochlorite solution were grown in hydroponics in a culture room under 14 h light/10 h dark conditions at 28 ± 1 °C. After two weeks of growth, seedlings of different cultivars were harvested, frozen in liquid nitrogen and stored at − 80 °C till further use. The experimental set-up was repeated to collect three independent biological replicates of each tissue sample. Genomic DNA was isolated from frozen tissues using Qiagen DNeasy Minikit (Qiagen) as per manufacturer's protocol. The quality and quantity of the genomic DNA samples were checked by Nanodrop Spectrophotometer (Thermo Scientific) and Qubit Fluorimeter (Life Technologies). Agarose gel electrophoresis was also carried out to ascertain the quality of genomic DNA samples. Whole genome bisulphite sequencing. The genomic DNA isolated from IR64, N22 and Pokkali seedlings (pooled in equal quantity from the three independent biological replicates) were processed for bisulphite sequencing. The genomic DNA samples were fragmented via sonication to a size of 100-300 bp, end repaired and TruSeq-methylated adapters were ligated to the DNA fragments. Approximately, 500 ng of adapter-ligated DNA fragments were used for bisulphite conversion using EZ DNA Methylation-Gold TM kit (Zymo Research Corporation, CA, USA) according to manufacturer's protocol. After desalting, size selection and PCR amplification, library quality was analyzed. The qualified libraries were sequenced on the HiSeq 2000 system (Illumina) for 90 cycles in paired-end mode to achieve more than 30 genome coverage for each sample and processed sequenced data (after removal of reads containing adaptor sequences and low-quality reads) was obtained. The sequence data were further filtered using our in-house NGS QC Toolkit (v2.3) 78. Read alignment and identification of mCs. The filtered 90 bp paired-end reads from each sample were aligned to the rice genome sequence (MSU v7.0) using Bismark (v0.8) 79 under default parameters. Reads from each sample were processed to remove clonal reads by retaining only one of such reads. Only the reads aligned at unique location in the genome were retained. Alignment of all the reads was performed on the rice chloroplast genome also to estimate the bisulphite conversion efficiency and error-rate. A bisulphite conversion efficiency of ≥ 99% was observed for all the samples. The non-conversion rate of chloroplast genome Cs was considered as a measure of false discovery rate (error rate). The alignment files on the rice genome were used as input in Methylkit (v0.5.6) for further analysis. The mCs were identified by P-value calculation using binomial distribution as described earlier 37. This step excludes mCs, which might be the result of non-conversion of cytosines during bisulphite conversion. A P-value cut-off of 0.001 and minimum read-depth of five was used to identity true mCs. The methylation level (percentage of reads showing mC among all the reads covering the same cytosine site) of each identified mC was determined. Various analyses, including coverage determination, distribution of mCs in the genome and various genomic features, and determination of frequency of flanking nucleotides were carried out using custom perl scripts. Identification of DMRs. For screening of DMRs, we determined the frequency of mCs in each bin size of 100 bp throughout the genome. Only the cytosine sites covered by at least five reads in each sample were considered. For each bin, the methylation level at each cytosine site was calculated for each sample. The bins containing at least three mCs and a minimum difference of 20% methylation level with q-value of 0.01 were identified as DMRs. For estimation of q-value, P-value was determined by Fisher's exact test followed by correction using Sliding Linear Model (SLIM). The DMRs were positioned within gene body or 2 kb flanking sequences based on the position of mid-point relative to gene position coordinates. Gene ontology (GO) enrichment analysis. The enrichment analysis of GO categories within the methylated genes (methylation at promoters and/or within annotated transcribed regions) was performed using the BiNGO tool and visualized using Cytoscape (v3.7). The GO categories with P-value 0.05 after applying FWER correction were considered as significantly enriched. RNA sequencing and data analysis. Total RNA was extracted using TRI Reagent (Sigma Life Science, USA), according to manufacturer's instructions. The quality and quantity of RNA samples were assessed using Agilent Bioanalyzer (Agilent Technologies, Singapore) as described previously 80. For sequencing, cDNA libraries were generated from total RNA of each tissue sample and sequencing was performed on Illumina platform to generate 100 bp paired-end reads. The Fastq files were obtained and various quality controls were performed using NGS QC Toolkit 78. Filtered high-quality reads were mapped on the rice genome (MSU7) using Tophat (v2.0.0) software. To analyze gene expression, a consensus reference-guided assembly of the transcriptome data from all samples was generated using Cufflinks (v2.0.2) and differential expression of genes among rice cultivars was determined by Cuffdiff as described 81. Only the genes exhibiting significant difference (at least two-fold change with P-value ≤ 0.05) were considered. Methylation-expression correlation analysis. The correlation between methylation and gene expression was determined by comparison of methylation status of DMR-associated genes and their expression level/differential expression measured by RNA-seq. A box-and-whisker plot (boxplot R function) of the differential expression levels of the genes associated with hypo-or hyper-methylated DMRs and all rice genes was generated. The significance of differences was estimated using a two-tailed Wilcoxon rank-sum test (wilcox.test R function) using R programming environment. Small RNA sequencing and data analysis. The total RNAs isolated from seedlings of IR64, N22 and Pokkali rice cultivars were used for library preparation using TruSeq Small RNA Sample Prep Kit (Illumina Technologies) according to the manufacturer's instructions. Each small RNA library was sequenced for 50 cycles on Illumina platform and the sequence data was obtained in FASTQ files for further processing. The sequence data was pre-processed using modified perl script as described previously 82 and only the unique reads were retained. Further, all the unique reads from each sample were mapped to the rice genome sequence using Bowtie2. Only the uniquely mapped reads of 21-24 nt in length were used for subsequent analysis. Locus-specific bisulphite sequencing of selected DMRs. About 1 g of genomic DNA extracted from unstressed control seedlings of rice genotypes was bisulphite converted using EZ DNA Methylation-Gold TM kit (Qiagen). The bisulphite converted DNA was desalted and an aliquot of it was used for PCR amplification of the selected genomic regions representing DMRs using locus-specific forward and reverse primers. The purified PCR products were cloned in pGEM-T Easy vector (Promega) and confirmed clones were sequenced via Sanger sequencing method. An average of 10 clones were chosen randomly for sequencing. Methylation status of cytosines was assessed by comparing the sequence of the bisulphite treated DNA with that of untreated DNA. Quantitative PCR analysis. The gene-specific primers for qRT-PCR were designed using Primer Express (v3.0) software (Applied Biosystems, Foster City, CA). The primer sequences used in this study are listed in Supplementary Table S6. The quantitative PCR analysis was performed as described previously 80 employing ABI 7500 Real-Time PCR System (Applied Biosystems). At least two independent biological replicates for each sample and three technical replicates of each biological replicate were analyzed for the analysis. The transcript level of each gene in different tissue samples was normalized with the transcript level of internal control gene, Ubiquitin5 (UBQ5) 83 and fold change was calculated as compared to the control condition. Data availability. The DNA methylation, RNA-seq and small RNA sequencing data generated in this study have been deposited with NCBI at Gene expression Omnibus (GEO) under series accession numbers GSE60288, GSE60287 and GSE64651, respectively. |
package com.tlys.sys.model;
// default package
import javax.persistence.Column;
import javax.persistence.Entity;
import javax.persistence.GeneratedValue;
import javax.persistence.GenerationType;
import javax.persistence.Id;
import javax.persistence.Table;
import org.hibernate.annotations.GenericGenerator;
import org.hibernate.annotations.Parameter;
/**
* SysFraccessLogOpr entity. @author MyEclipse Persistence Tools
*/
@Entity
@Table(name = "TB_ZBC_SYS_FRACCESSLOGOPR")
public class SysFraccessLogOpr implements java.io.Serializable {
/**
*
*/
private static final long serialVersionUID = -1922475774783057897L;
// Fields
@Id
@GeneratedValue(strategy = GenerationType.SEQUENCE, generator = "SEQ_TB_ZBC_SYS_FRACCESSLOGOPR")
@GenericGenerator(name = "SEQ_TB_ZBC_SYS_FRACCESSLOGOPR", strategy = "sequence", parameters = { @Parameter(
name = "sequence", value = "SEQ_TB_ZBC_SYS_FRACCESSLOGOPR") })
@Column(name = "ID", unique = true, nullable = false, precision = 24, scale = 0)
private Long id;
private Long logid;
private String quarter;
private String operid;
private String dbtname;
private String oprtype;
private String opercode;
/** default constructor */
public SysFraccessLogOpr() {
}
/** full constructor */
public SysFraccessLogOpr(Long id, Long logid, String quarter, String operid) {
this.id = id;
this.logid = logid;
this.quarter = quarter;
this.operid = operid;
}
public String getDbtname() {
return dbtname;
}
public Long getId() {
return this.id;
}
@Column(name = "LOGID", nullable = false, precision = 24, scale = 0)
public Long getLogid() {
return this.logid;
}
public String getOpercode() {
return opercode;
}
@Column(name = "OPERID", nullable = false, length = 3)
public String getOperid() {
return this.operid;
}
public String getOprtype() {
return oprtype;
}
// Property accessors
@Column(name = "QUARTER", nullable = false, length = 5)
public String getQuarter() {
return this.quarter;
}
public void setDbtname(String dbtname) {
this.dbtname = dbtname;
}
public void setId(Long id) {
this.id = id;
}
public void setLogid(Long logid) {
this.logid = logid;
}
public void setOpercode(String opercode) {
this.opercode = opercode;
}
public void setOperid(String operid) {
this.operid = operid;
}
public void setOprtype(String oprtype) {
this.oprtype = oprtype;
}
public void setQuarter(String quarter) {
this.quarter = quarter;
}
} |
. OBJECTIVE To study whether the polymorphisms of TaqIB of cholesteryl transfer protein (CETP) gene and 1444C/T of C reactive protein (CRP) gene are associated with non-valvular atrial fibrillation in the Chinese Han population. METHODS Polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) assay was used to detect the distribution of genotypes of CETP TaqIB and CRP 1444C/T in 147 patients with non-valvular atrial fibrillation and 147 control subjects in Chinese Han population. RESULTS The distribution of CETP TaqIB and CRP 1444C/T genotypes was in Hardy-Weinberg equilibrium. A statistically significant difference between patients and controls for CETP TaqIB (P= 0.005, OR= 0.614, beta = -0.488) and CRP 1444C/T (P= 0.003, OR= 2.428, beta = 0.887) was observed. In female group, significant difference was observed in smoking, CETP TaqIB and CRP 1444C/T polymorphisms. And in male group, significant difference was observed in body mass index and CETP TaqIB polymorphisms. CONCLUSION These results suggest that CETP TaqIB (B2 allele as protective factor) and CRP1444C/T (T allele as risk factor) genetic polymorphisms may be associated with the non-valvular atrial fibrillation in the Chinese Han population. Smoking and CRP1444T single nucleotide polymorphism may induce hereditary susceptibility to non-valvular atrial fibrillation in female. Obesity may induce hereditary susceptibility to non-valvular atrial fibrillation in male. |
That Darth Vader line has always creeped me out a little. This stuff, though, featuring a pair of storyboard artists working in the games industry, does nothing of the sort.
After I ran that Crysis 2 art last week, I was contacted by Trudi Castle, another artist who worked on the game. Unlike the static pieces we generally feature here on Fine Art, though, Trudi had provided some storyboards for the game, to illustrate its more cinematic moments.
Providing the others? Trudi's twin sister Astrid.
It's cool the pair aren't just working in the same industry but on the same projects (though Trudi has since worked on Halo Anniversary), but even cooler is they've given us the chance to show off some of the other kinds of art that go into making a video game. Sure, "traditional" 2D concept art looks pretty and is the building block of most games, but it's not the only creative work that goes into the building of a virtual world; people like animators and, here, storyboard artists do their part too.
After all, cinematic sequences (even in-engine ones, like these) don't just happen. Somebody has to plan them out! |
<filename>web/gui/src/main/java/org/onosproject/ui/impl/IntentViewMessageHandler.java
/*
* Copyright 2015 Open Networking Laboratory
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.onosproject.ui.impl;
import com.fasterxml.jackson.databind.node.ObjectNode;
import com.google.common.collect.ImmutableSet;
import org.onosproject.net.ConnectPoint;
import org.onosproject.net.NetworkResource;
import org.onosproject.net.flow.criteria.Criterion;
import org.onosproject.net.flow.instructions.Instruction;
import org.onosproject.net.intent.ConnectivityIntent;
import org.onosproject.net.intent.Constraint;
import org.onosproject.net.intent.HostToHostIntent;
import org.onosproject.net.intent.Intent;
import org.onosproject.net.intent.IntentService;
import org.onosproject.net.intent.LinkCollectionIntent;
import org.onosproject.net.intent.MultiPointToSinglePointIntent;
import org.onosproject.net.intent.PathIntent;
import org.onosproject.net.intent.PointToPointIntent;
import org.onosproject.net.intent.SinglePointToMultiPointIntent;
import org.onosproject.ui.RequestHandler;
import org.onosproject.ui.UiMessageHandler;
import org.onosproject.ui.table.CellFormatter;
import org.onosproject.ui.table.TableModel;
import org.onosproject.ui.table.TableRequestHandler;
import org.onosproject.ui.table.cell.AppIdFormatter;
import org.onosproject.ui.table.cell.EnumFormatter;
import java.util.Collection;
import java.util.List;
import java.util.Set;
/**
* Message handler for intent view related messages.
*/
public class IntentViewMessageHandler extends UiMessageHandler {
private static final String INTENT_DATA_REQ = "intentDataRequest";
private static final String INTENT_DATA_RESP = "intentDataResponse";
private static final String INTENTS = "intents";
private static final String APP_ID = "appId";
private static final String KEY = "key";
private static final String TYPE = "type";
private static final String PRIORITY = "priority";
private static final String STATE = "state";
private static final String RESOURCES = "resources";
private static final String DETAILS = "details";
private static final String[] COL_IDS = {
APP_ID, KEY, TYPE, PRIORITY, STATE, RESOURCES, DETAILS
};
@Override
protected Collection<RequestHandler> createRequestHandlers() {
return ImmutableSet.of(new IntentDataRequest());
}
// handler for intent table requests
private final class IntentDataRequest extends TableRequestHandler {
private static final String NO_ROWS_MESSAGE = "No intents found";
private IntentDataRequest() {
super(INTENT_DATA_REQ, INTENT_DATA_RESP, INTENTS);
}
@Override
protected String defaultColumnId() {
return APP_ID;
}
@Override
protected String[] getColumnIds() {
return COL_IDS;
}
@Override
protected String noRowsMessage(ObjectNode payload) {
return NO_ROWS_MESSAGE;
}
@Override
protected TableModel createTableModel() {
TableModel tm = super.createTableModel();
tm.setFormatter(APP_ID, AppIdFormatter.INSTANCE);
tm.setFormatter(RESOURCES, new ResourcesFormatter());
tm.setFormatter(DETAILS, new DetailsFormatter());
tm.setFormatter(STATE, EnumFormatter.INSTANCE);
return tm;
}
@Override
protected void populateTable(TableModel tm, ObjectNode payload) {
IntentService is = get(IntentService.class);
for (Intent intent : is.getIntents()) {
populateRow(tm.addRow(), intent, is);
}
}
private void populateRow(TableModel.Row row, Intent intent, IntentService is) {
row.cell(APP_ID, intent.appId())
.cell(KEY, intent.key())
.cell(TYPE, intent.getClass().getSimpleName())
.cell(PRIORITY, intent.priority())
.cell(STATE, is.getIntentState(intent.key()))
.cell(RESOURCES, intent)
.cell(DETAILS, intent);
}
private final class ResourcesFormatter implements CellFormatter {
private static final String COMMA = ", ";
@Override
public String format(Object value) {
Intent intent = (Intent) value;
Collection<NetworkResource> resources = intent.resources();
if (resources.isEmpty()) {
return "(No resources for this intent)";
}
StringBuilder sb = new StringBuilder("Resources: ");
for (NetworkResource nr : resources) {
sb.append(nr).append(COMMA);
}
removeTrailingComma(sb);
return sb.toString();
}
private StringBuilder removeTrailingComma(StringBuilder sb) {
int pos = sb.lastIndexOf(COMMA);
sb.delete(pos, sb.length());
return sb;
}
}
private final class DetailsFormatter implements CellFormatter {
@Override
public String format(Object value) {
return formatDetails((Intent) value, new StringBuilder()).toString();
}
private StringBuilder formatDetails(Intent intent, StringBuilder sb) {
if (intent instanceof ConnectivityIntent) {
buildConnectivityDetails((ConnectivityIntent) intent, sb);
}
if (intent instanceof HostToHostIntent) {
buildHostToHostDetails((HostToHostIntent) intent, sb);
} else if (intent instanceof PointToPointIntent) {
buildPointToPointDetails((PointToPointIntent) intent, sb);
} else if (intent instanceof MultiPointToSinglePointIntent) {
buildMPToSPDetails((MultiPointToSinglePointIntent) intent, sb);
} else if (intent instanceof SinglePointToMultiPointIntent) {
buildSPToMPDetails((SinglePointToMultiPointIntent) intent, sb);
} else if (intent instanceof PathIntent) {
buildPathDetails((PathIntent) intent, sb);
} else if (intent instanceof LinkCollectionIntent) {
buildLinkConnectionDetails((LinkCollectionIntent) intent, sb);
}
if (sb.length() == 0) {
sb.append("(No details for this intent)");
} else {
sb.insert(0, "Details: ");
}
return sb;
}
private void appendMultiPointsDetails(Set<ConnectPoint> points,
StringBuilder sb) {
for (ConnectPoint point : points) {
sb.append(point.elementId())
.append('/')
.append(point.port())
.append(' ');
}
}
private void buildConnectivityDetails(ConnectivityIntent intent,
StringBuilder sb) {
Set<Criterion> criteria = intent.selector().criteria();
List<Instruction> instructions = intent.treatment().allInstructions();
List<Constraint> constraints = intent.constraints();
if (!criteria.isEmpty()) {
sb.append("Selector: ").append(criteria);
}
if (!instructions.isEmpty()) {
sb.append("Treatment: ").append(instructions);
}
if (constraints != null && !constraints.isEmpty()) {
sb.append("Constraints: ").append(constraints);
}
}
private void buildHostToHostDetails(HostToHostIntent intent,
StringBuilder sb) {
sb.append(" Host 1: ")
.append(intent.one())
.append(", Host 2: ")
.append(intent.two());
}
private void buildPointToPointDetails(PointToPointIntent intent,
StringBuilder sb) {
ConnectPoint ingress = intent.ingressPoint();
ConnectPoint egress = intent.egressPoint();
sb.append(" Ingress: ")
.append(ingress.elementId())
.append('/')
.append(ingress.port())
.append(", Egress: ")
.append(egress.elementId())
.append('/')
.append(egress.port())
.append(' ');
}
private void buildMPToSPDetails(MultiPointToSinglePointIntent intent,
StringBuilder sb) {
ConnectPoint egress = intent.egressPoint();
sb.append(" Ingress=");
appendMultiPointsDetails(intent.ingressPoints(), sb);
sb.append(", Egress=")
.append(egress.elementId())
.append('/')
.append(egress.port())
.append(' ');
}
private void buildSPToMPDetails(SinglePointToMultiPointIntent intent,
StringBuilder sb) {
ConnectPoint ingress = intent.ingressPoint();
sb.append(" Ingress=")
.append(ingress.elementId())
.append('/')
.append(ingress.port())
.append(", Egress=");
appendMultiPointsDetails(intent.egressPoints(), sb);
}
private void buildPathDetails(PathIntent intent, StringBuilder sb) {
sb.append(" path=")
.append(intent.path().links())
.append(", cost=")
.append(intent.path().cost());
}
private void buildLinkConnectionDetails(LinkCollectionIntent intent,
StringBuilder sb) {
sb.append(" links=")
.append(intent.links())
.append(", egress=");
appendMultiPointsDetails(intent.egressPoints(), sb);
}
}
}
}
|
<filename>doc/examples/Java/JavaRequestClassesExample.java
import java.util.UUID;
import de.fraunhofer.fokus.fuzzing.fuzzino.FuzzedValue;
import de.fraunhofer.fokus.fuzzing.fuzzino.StringRequestProcessor;
import de.fraunhofer.fokus.fuzzing.fuzzino.request.RequestFactory;
import de.fraunhofer.fokus.fuzzing.fuzzino.request.StringEncoding;
import de.fraunhofer.fokus.fuzzing.fuzzino.request.StringRequest;
import de.fraunhofer.fokus.fuzzing.fuzzino.request.StringSpecification;
import de.fraunhofer.fokus.fuzzing.fuzzino.request.StringType;
import de.fraunhofer.fokus.fuzzing.fuzzino.response.FuzzedValuesByGenerators;
import de.fraunhofer.fokus.fuzzing.fuzzino.response.GeneratorSpecificFuzzedValues;
import de.fraunhofer.fokus.fuzzing.fuzzino.response.StringResponse;
public class JavaRequestClassesExample {
public static void main(String[] args) {
// generate a string request (corresponding XML tag 'string')
StringRequest stringRequest = RequestFactory.INSTANCE.createStringRequest();
stringRequest.setName("MyFirstRequest");
stringRequest.setMaxValues(10);
// generate a a specification that describes the type (corresponding XML tag 'specification')
StringSpecification stringSpecification = RequestFactory.INSTANCE.createStringSpecification();
stringSpecification.setEncoding(StringEncoding.UTF8);
stringSpecification.setType(StringType.FILENAME);
stringSpecification.setIgnoreLengths(true);
// add the specification to the string request
stringRequest.setSpecification(stringSpecification);
// instantiate a request processor for the tring requests, the second argument is arbitrary, but necessary
// further requests
StringRequestProcessor stringRequestProcessor = new StringRequestProcessor(stringRequest, UUID.randomUUID());
// fetch the response of the request processor
// the request processor will choose appropriate fuzzing heuristics for you
// according to the specification
StringResponse stringResponse = stringRequestProcessor.getResponse();
// fetch the fuzzed values generated by heuristics that generate values from the specification
FuzzedValuesByGenerators<String> byGenerators = stringResponse.getGeneratorBasedSection();
// fetch for each fuzzing heuristic chosen by the request processor...
for (GeneratorSpecificFuzzedValues<String> generatorSpecificValues : byGenerators) {
// ... its fuzzed values
for (FuzzedValue<String> fuzzedValue : generatorSpecificValues) {
System.out.println(fuzzedValue);
}
}
}
}
|
#pragma once
#include "Manager.h"
#include "Programmer.h"
#include "QA.h"
class Company
{
public:
Company();
~Company();
Company(const Company& old);
Company& operator=(const Company& rhs);
void addEmployee(const Employee& _add);
void leftEmployee(const Employee& _left );
int getCurrent()const;
void printCompany()const;
void setCurrent(int _current);
Employee* getEmployees()const;
void fire();
float monthlySalaries();
float averageMonthlyPay();
bool check(const Employee& _add);
private:
Employee** employees;
int current;
int size;
}; |
Accurate CNV identification from only a few cells with low GC bias in a single-molecule sequencing platform A technical problem of characterizing copy number variation of several cells with next-generation sequencing is the whole genome amplification induced bias. The result of CNVs and mosaicism detection is affected by the GC bias. Here, we report a rapid non-WGA sample preparation strategy for a single-molecule sequencing platform GenoCare1600. This approach, combined with a single-molecule sequencing platform that avoids the use of WGA and bridge PCR processes, can provide higher reliability with its lower GC bias. By combining our optimized Tn5-based transposon insertion approach with GenoCare, we successfully detected CNVs as small as 1.29M and mosaicism as small as 20%, which is consistent with next-generation sequencing (NGS) data. Moreover, our GenoCare-TTI protocol showed less GC bias and less Mad of Diff. These results suggest that the optimized TTI approach, together with the GenoCare1600 sequencing platform, is a promising option for CNV characterization from maybe one single cell. |
<filename>internal/providers/terraform/azure/log_analytics_workspace.go
package azure
import (
"github.com/infracost/infracost/internal/resources/azure"
"github.com/infracost/infracost/internal/schema"
)
var sentinelDataConnectorRefs = []string{
"azurerm_sentinel_data_connector_aws_cloud_trail.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_azure_active_directory.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_azure_advanced_threat_protection.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_azure_security_center.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_microsoft_cloud_app_security.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_microsoft_defender_advanced_threat_protection.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_office_365.log_analytics_workspace_id",
"azurerm_sentinel_data_connector_threat_intelligence.log_analytics_workspace_id",
}
func getAzureRMLogAnalyticsWorkspaceRegistryItem() *schema.RegistryItem {
refs := []string{
"resource_group_name",
"azurerm_log_analytics_solution.workspace_resource_id",
}
return &schema.RegistryItem{
Name: "azurerm_log_analytics_workspace",
RFunc: newLogAnalyticsWorkspace,
ReferenceAttributes: append(refs, sentinelDataConnectorRefs...),
}
}
func newLogAnalyticsWorkspace(d *schema.ResourceData, u *schema.UsageData) *schema.Resource {
region := lookupRegion(d, []string{"resource_group_name"})
sku := "PerGB2018"
if !d.IsEmpty("sku") {
sku = d.Get("sku").String()
}
sentinelEnabled := logAnalyticsWorkspaceDetectSentinel(d)
capacity := d.Get("reservation_capacity_in_gb_per_day").Int()
// Deprecated and removed in v3
// this attribute typo was fixed in https://github.com/hashicorp/terraform-provider-azurerm/pull/14910
// but we need to support the typo for backwards compatibility
if !d.IsEmpty("reservation_capcity_in_gb_per_day") {
capacity = d.Get("reservation_capcity_in_gb_per_day").Int()
}
r := &azure.LogAnalyticsWorkspace{
Address: d.Address,
Region: region,
SKU: sku,
ReservationCapacityInGBPerDay: capacity,
RetentionInDays: d.Get("retention_in_days").Int(),
SentinelEnabled: sentinelEnabled,
}
r.PopulateUsage(u)
return r.BuildResource()
}
func logAnalyticsWorkspaceDetectSentinel(d *schema.ResourceData) bool {
for _, ref := range sentinelDataConnectorRefs {
if len(d.References(ref)) > 0 {
return true
}
}
logSolutionRefs := d.References("azurerm_log_analytics_solution.workspace_resource_id")
if len(logSolutionRefs) > 0 {
return logAnalyticsWorkspaceDetectSentinel(logSolutionRefs[0])
}
return false
}
|
A security framework for SOA applications in mobile environment A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enable support to many types of application but also give rise to a necessity to find a model of service development. Actually, SOA (Service Oriented Architecture) is a good option to support application development. This paper presents a framework that allows the development of SOA based application in mobile environment. The objective of the framework is to give developers with tools for provision of services in this environment with the necessary security characteristics. INTRODUCTION Over the last years there is a great improvement of capabilities of mobile device, both in its storage capacity and in processing power. This has enabled a wider acceptance of these devices which now offer a variety of applications to users. In addition, new communication technologies allow these devices to access the Internet more efficiently and to communicate with each other. Actually, it is possible to develop and install in these equipments other applications and services beyond those already coming from the factory. These types of applications may act as service consumers or/and service providers. Thus, there is a need to use a pattern of development that allows developers to create and provide its services more quickly and efficiently. Service-Oriented Architecture (SOA) has emerged as a solution to this type of necessity. The aim of this paper is to describe a framework to the development of SOA based applications in mobile environment drawing the complexity of their development, with mechanisms to perform all necessary functions for provision of services, such as describing services, carry messages from the parser with specific format, creating a channel of communication to receive and send messages. With this framework, services may be associated with security properties such as cryptography, digital signatures. This paper is structured of the following form. The first section presents the aim and motivations of the work. The second section describes the SOA architecture and its main components. The third section describes the necessary services in mobile environment. The fourth section shows the mains problems related to security in the mobile environment. The fifth section describes the proposed architecture and the sixth section shows some work related to the proposed work. Finally the last section presents the conclusions and suggestions for future work. SERVICE ORIENTED ARCHITECTURE (SOA) SOA describes the keys concepts of software architecture and their relations, where a service and its use are the key concepts that are involved, following a model of publishing services and applications and their universal access. SOA has an interface that describes a collection of operations accessible over the network via a standardized format (e.g. XML). These requirements are activated anywhere in a dynamic computing environment and/or pervasive computing where service providers offer a range of services. SOA creates an environment in which distributed applications and components may create independently of language and platform and focuses on the use of a relatively widespread pattern of communication between operations, enabling thus a model for homogeneous distribution and composition of components. SOA is a model of components, providing an environment for building distributed systems. SOA applications communicate functionally as a service to the end user's applications and other services, bringing the benefits of low coupling and encapsulation for the integration of enterprises applications. SOA defines the rules of the participants as provider of services, customer of services and registry of services. SOA is not a rating and many new technologies such as CORBA and DCOM at least already had this idea. Web services are new to developers and are the best way to achieve and develop an SOA. SOA Architecture The basic architecture of SOA consists of three main components Service Requestor (Client) -this entity requires certain functions to perform some task, application or service that relies on interaction with a boot or some service; Service Provider -this entity creates and provides the service, it also makes a description of the service and publishes it in a central registry; Service Registry (Broker) -location of service description (i.e. where the Service Provider publishes a description of the service). Although a service provider is implemented in a mobile device, the standard WSDL can be used to describe the service, and the standard UDDI registry may be used to publish and make the service available. A challenge is in developing mobile terminal architectures such one of a standard desktop system, taking into account low resources of mobile device. SOA Operations The components of SOA interact with each other through operations (figure 1) which are described below: Publish -records a description of the service in directory services, covering the registration of its capabilities, interface, performance and quality that it offers offers; Find -searches for services registered in directory services, provided they meet the desired criteria and it can be used in a process of business, taking into account the description of the published service; Bind -this operation relies on the service requested or boots an interaction with the service at runtime using the information obtained in discovery of the service; WEB SERVICE PROVISION -MOBILE HOST Mobile Host is a provider of services (Light Weight) built to run on mobile devices such as smart-phones and PDAs, developed as a Web Service Handler built on top of a normal Web server. Mobile Host opens a new set of applications yet little explored. They may be used in areas such as location-based services, community support for mobile and games. It also allows smaller mobile operators increase their business without resorting to a stationary infrastructure. However, these additional flexibilities generate a large number of interesting questions for surveys which require further investigation. Figure 2 shows the main components of a Mobile Host. The design of a "Mobile Host" is going through many things, some issues where there is very little research; so far set up service provisioning is very limited to devices. The work in describes a model for the development of a Mobile Host system in general. Traditionally, mobile systems have been designed as client-server systems where thin clients such as PDAs or phones are able to use wireless connections to gain access to resources (data and services) provided by central servers. With the emergence of wireless networks, Ad-Hoc and powerful mobile devices it becomes possible to design mobile system using an architecture peer-to-peer. According to, the following characteristics must be guaranteed so that SOA can be built in the mobile environment: 9. Access the local file system, or any external device like a GPS receiver, using infrared, Bluetooth etc. SECURITY Security in wireless networks always is evolving. With adequate time a persistent cracker is capable of invading a wireless system. Moreover, some attitudes need to be taken to hinder as much as possible the work of an intruder, allowing basic services of security are met. Risks already common in wired networks are incorporated into the wireless networks, new arise due to differences in physical structure of these and how they operate. Thus, any solution targeted for wireless networks are to be built in compliance with these new risks because that they are unique to wireless networks. The greatest threat to a mobile network is the possibility of installing wires through doors in phone calls and data traffic. This threat can be remedied in part with the use of encryption. Consequently, the probability of threat depends on the strength of the encryption algorithm. This resistance is an exit that becomes questionable in the GSM system. Another critical threat, although more hypothetical, is amending the original mobile traffic. In this case the attacker overwrites the data with their own information. Since a SOA is implemented as a Mobile Host, the services are prone to different types of security breaches: such as denial of service attacks, man-in-the-middle, and spoofing of intrusion, and so on. SOA in mobile environment using technologies based on message (such as SOAP over HTTP) for complex operations in several areas. Also, there may be many legitimate services intermediaries in the communication between doing composes a particular service, which makes the context of a security requirement end-to-end. The need for sophisticated message-level security end-to-end becomes a priority for a mobile web service. Figure 3 illustrates some of the typical violations of security in SOA environments in wireless. Considering the breaches of security, the SOA mobile communication must contain at least the basic requirements of security, as shown in Figure 4. Secure transmission of messages is achieved by ensuring the confidentiality and integrity of the data, while the authentication and authorization will ensure that the service is accessed only by trusted requesting. After the success of the implementation of such basic requirements of security, confidence and politicies may be considered as services for mobile field. Political trust can ensure a correct choreography of services. It sets any general policy statements on security policy of insurance SOA, while building relationships of trust in SOA allows safe for the exchange of security keys, providing an appropriate standard of safety. OVERVIEW OF ARCHITECTURE The proposed solution is the development of a framework based on a Mobile Host. A developer can implement the proposed framework and thus make their services (with multiple services in one device) available to the general public without the need of additional deployments to the activities necessary for the provisioning of service, such as receive and send messages, conduct parser of messages to/from the format SOAP/XML, publication of services, generation of WSDL containing information of public services, creation and tracking of an interface for communication to transmit messages on different types of existing technologies (Bluetooth, wireless, HTTP), to identify and implement a requested service. Furthermore, the architecture provides a model of communication secure end-to-end based on public keys. Figure 5 shows the mains components of the proposed architecture, which will be described below: Control of Access and Privacy -responsible for verifying whether a consumer can access the services available on the device; Manager of Services -responsible to provide the functionality necessary for the provision of services in the mobile device. This component performs activities such as the description of the service after reaching the details of it and the generation of a WSDL document related thereto; storage of the service in a local database, called Database Services; generation of document for its publication. Also receiving the SOAP requests and processes, checking possible errors, obtaining and executing the requested service; Manager of Mobile Host -responsible for setup and initiation of the other components of middleware. In this module the databases used are created and available for use with other components, verify that a service has been created, or not, and send data from a new service to be processed by the Manager of Services; Control of Confidentiality e Integrity -adds mechanisms that allow messages sent by consumers remain confidential, i.e., can't be interpreted by others through the use of pairs of symmetric keys. In addition, this module allows the framework to generate a digital signature created for each message, which allows the broadcast content is changed if it becomes possible to identify it and also of digital certificates means by which the consumer gets the key issues of service; Databases: The framework uses some database to store certain information that is necessary for carrying out their activities. These database, and their features are listed below: Database of Services -This base is used to store the services created and are available in the device; Database of Users -responsible for storing the data for validation of consumers made through the registration the login and password hash. The data for identifying a device and if they have permission to access the services also are stored on this database; The proposed architecture can be structured into a model composed of the following layers (see figure 6): 1. Network Layer Interface -responsible for creating a channel of communication between the provider and consumer service, receiving and transmitting messages and can use different types of available communication technologies; 2. Events Layer -verify what kind of message is being transmitted and therefore can perform activities related to it, is also responsible for conducting the parser of messages to/from the format SOAP/XML; 3. Service Layer -through this layer a service can be described, made available for publication, obtain and enforce a method when it is invoked; 4. storage Layer -place where all created services and the latest user requests are stored; this layer stores as well WSDL descriptions and the document object containing the information of each created department; 5. Security Layer -ensures that there is security end-to-end in every step since the transmission of a request and the response of the request is made by the end user; 6. Management Layer -allows the management of all services offered by the developed framework; Figure 6. Model in Layers Process Development Services A service is created by the framework must implement the interface iService to describe the service, and thus informing what methods, their parameters and return type. In addition, A user must use the method executeMethod to inform how the methods will be executed, because executeMethod is called by the system to run method after going through all stages of verification. In this method it is created an instance of object where the service is implemented or of the class that implements iService. After the developer has informed the details of the service, the system automatically generates a WSDL document, which contains the details of the service following a pattern already known, and stores in a specific folder on the device itself for further verification, or can be sent to a consumer. Figure 7 shows the mapping of a Java class to a WSDL document that contains a description. In case the developer wants to add security services the developer must instantiate to class "SymmetricKey" responsible for the generation of a pair of symmetric keys (public and private) used to create a digital certificate (which can be sent to Final consumers) for the service and create a digital signature for each message sent, to guarantees its integrity. Following the steps outlined above the service will be stored in a repository specifically for its further use. Several services can be created and stored, allowing the developer holds a range of services to make them available to their consumers, but the restrictions are limited memory capacity of the device and where it will be allocated. Figure 8 shows a diagram of activities with for the startup process of a Mobile Host and creating new services. Network Interface The framework guarantees the communication between the service provider and the end consumer because the framework has a mechanism that provides this features. This mechanism allows different technologies can be used for communication (Bluetooth, HTTP or Sockets). The developer can choose which best fits that their needs and provide the network address and port that will be used, or can use the default values set by the framework. Once started, the Network Interface Service stay listening to demands on the network and it is responsible for receiving and sending messages to/from the Mobile Host, and thus behaving a standard Web server. Each received request a new line of enforcement is designed to meet the request to identify if it is a SOAP request or a normal web request. Invocation Service When the message received is a normal web request the web server treats it normally. Figure 9. Activity Diagram -Service Invocation However if the request is a SOAP request its treatment is passed to a handler for the SOAP requests, which performs the message parsing, extracting the information necessary for the invocation of a service. During the process of parsing, it is checked if the invoked service is compound all the requirements of the method invoked (quantity and types of variables, besides the type of return, according to the SOAP specification) according to the data reported by the developer in the process of creating the service. If the message is not compatible with the requirements, a error message is generated by the system and send it to the customer, otherwise the method is executed through the invocation of the executeMethod to which are passed the method name and parameters from the message. Once in possession of the response of the implementation of the method invoked a reply message is generated and sends it to the customer. If the developer has added security services, a digital signature is generated for the response of the Mobile Host and sent along the message. Figure 9 shows the diagram of activities with the process of invocation of a service. Parsing of messages An important feature of the Mobile Host is the ability to perform the parsing of messages received as a SOAP envelope to an object that contains the details of the request and that is used to obtain the information necessary to implement the request. Also, the reverse process is possible, that is the response is converted into a document SOAP before being sent to the requester. The framework also generates error messages (SOAP FAULT) if any failure is identified in the request. Security Service The model described in this paper proposes a security mechanism based on the content of messages, which is engaged in protecting the communications end-to-end between the consumer and service provider, ensuring that messages delivered are not corrupted by third party. This mechanism provides tools for generation of digital signatures and encryption of transmitted messages. The framework can create pair of keys (public and private) for each service provided by the Mobile Host during the process of creating the service. Though, this is optional the final developer decides whether or not this service can be added to its system. The encryption based on public key can also be used in the process of digital signature, which ensures the authenticity of who sends the message, associated with the integrity of its contents. Through these keys it can be created a digital signature to be sent along with a message, and also for allowing the transmitted messages to be encrypted and decrypted as observed in Figure 10. To make the public key available for a possible consumer, the system adds the generation of digital certificate that can be sent to mobile consumers, through which they get the public key of the services which he wants to communicate, and thus can encrypt the messages and verify the authenticity of digital signatures received by them. An example of a Digital Certificate generated by the system can be seen below: ----------Begin Certificate ----------Type: X. CASE STUDY This section presents some case studies that were developed with the aim of assessing the implementation of the proposed framework. The services are created in accordance with the roadmap presented in section 5.1. Note System This case study presents a service which provides the notes of a group of students in certain disciplines stored on a mobile device through an application installed on the device itself, which Figure 11. Application of Service System Notes can be seen in Figure 11 (this application runs on Mobile Host). When a client wants to obtain the notes of a student he must create a SOAP request and sends it to the device where the service is installed. Figure 12 shows the consumer informing the data which will be used in the request. With this information a SOAP request may be generated as we see in Figure 13. Thus, the message is sent to the Mobile Host, where the service is installed. When this message arrives in the Mobile Host and it is identified as a SOAP request, it is then forwarded to the service manager which is responsible for the treatment. Initially, a parser is invoked to obtain the requested service and extract the data. An analysis is done to check whether the service exists and the data is conforming to the existing service. If it is the case, the service is performed and the results are returned through a message which is generated and is sent back to the requester ( Figure 14). If the service does not exist or the data is incorrect or a method failure occurs during the execution of a service, an error message is generated and sent back to the requester. When the response is received, the application service consumer extracts its content and displays the information obtained to the user's device, as can be seen in Figure 15. The application must also be prepared to receive and display an error message, if it occurs during any treatment of any request. RELATED WORKS The idea of provisioning SOA for mobile devices is explored in. According with, the basic architecture of a mobile terminal as a service provider can be established through a: Service Request, Service Provider (Mobile Host) and service registry. The service providers implemented in the mobile device are used to describe the standard service (WSDL), and a standard (UDDI) is used to publish and remove publication services. Once you can see that this architecture follows the pattern of desktop systems, but taking into account the low resources of the device. According with with the advent of wireless and ad-hoc networks, there is increase in capabilities of equipment that allow the creation of entirely pure P2P networks, where the key piece of this architecture is to maintain the Mobile Host completely compatible with the interfaces used by (WS) SOA in such a way customers do not perceive the difference; developing Mobile Host with few resources available on the device, and limit the performance of functions of SOA in such a way it does not interfere with the functions of the device. The core of the architecture proposed by is: a network interface which is responsible for receiving the requests and sends the answers to consumers, Request Handler extracts the contents of the request and sent them to the Service handler that accesses the database of services and executes the requests. In, it is proposed a mechanism for hierarchical service overlay, based on the capabilities of the hosting devices. The Middleware of is called PEAK (Pervasive Information Communities Organization) which enables the transformation of resources into services. Based on the widespread hierarchical "overlay service" by developing a mechanism for composition of services which is able to make dynamically complex services using the availability of basic services. In, it is developed a mobile middleware technology, motivated primarily by projects related to mobile applications. Using this Middleware, mobile devices become a part of SOA (Web Services) located on the Internet. The Middleware enables not only access to SOAs on the Internet, but also the provisioning of services. These services can be used by other applications of the Internet (mobile call back services) or any other fixed or mobile device (P2P services). In, the author investigates mechanisms to support dynamic m-services oriented architecture context with the objective of service publication and dynamic discovery of mobile users anywhere and anytime discussing the characteristics of SOAs for wireless and wired networks. Moreover, investigates the availability of technologies for mobile device and SOA paradigm; proposing an m-services architecture to support dynamic and scalable mobile services. proposes an entity management services with a service record as an intermediate layer between service providers and mobile users. The management service is responsible for coordination of interactions between service providers and mobile users. This interaction produces information services, providing and delivering services for mobile users at any time. is also investigating the use of dynamic invocation interfaces as a mechanism of communication between departments of the description and invocation at runtime. FINAL CONSIDERATIONS This paper proposes the use of devices as service providers; however its development requires an implementation work that can become extremely complex. Therefore, we see the need for a tool for development and provision of services on mobile devices in an automated way. This work introduces the Mobile Host as part of a Middleware for construction of SOA in mobile environment. This paper presents an overview of the concepts, and proposes an architecture. The architecture proposal aims to provide a developer with a tool for rapid development of services in mobile environment and aggregates all services necessary for the provision of the service for invocations in an infra-structured network such as in P2P networks. A security service is included in the framework, where the developer has the option of whether or not to use it. While it is a very important requirement, its use requires a greater use in processing power of the device and the response time of a request. Then it should be considered whether its use is feasible for each service being developed. The framework presented proved to be a good solution to the problem presented. However, more tests related to their performance and quality of service offered yet become necessary. |
/**
* Cache for Description objects which can optionally be injected into stores.
* Especially useful for caching Register objects with their membership list.
*
* @author <a href="mailto:dave@epimorphics.com">Dave Reynolds</a>
*/
public class DescriptionCache {
static final int DEFAULT_SIZE = 100;
LRUMap cache;
public DescriptionCache() {
this(DEFAULT_SIZE);
}
public DescriptionCache(int size) {
cache = new LRUMap(size);
}
public void cache(Description d) {
cache.put(d.getRoot().getURI(), d);
}
public Description get(String uri) {
return (Description) cache.get(uri);
}
public void flush(String uri) {
cache.remove(uri);
}
public void clear() {
cache.clear();
}
} |
Epigenetic compound screening uncovers small molecules for re-activation of latent HIV-1 During infection with the human immunodeficiency virus type 1 (HIV-1), latent reservoirs are established, which circumvent full eradication of the virus by antiretroviral therapy (ART) and are the source for viral rebound after cessation of therapy. As these reservoirs are phenotypically undistinguishable from infected cells, current strategies aim to reactivate these reservoirs, followed by pharmaceutical and immunological destruction of the cells. Here, we employed a simple and convenient cell-based reporter system, which enables sample handling under biosafety level (BSL)-1 conditions, to screen for compounds that were able to reactivate latent HIV-1. The assay showed a high dynamic signal range and reproducibility with an average Z-factor of 0.77, classifying the system as robust. The assay was used for high-throughput screening (HTS) of an epigenetic compound library in combination with titration and cell-toxicity studies and revealed several potential new latency reversing agents (LRAs). Further validation in well-known latency model systems verified earlier studies and identified two novel compounds with very high reactivation efficiency and low toxicity. Both drugs, namely N-hydroxy-4-(2--2-oxoethyl)benzamide (HPOB) and 2',3'-difluoro--4-carboxylic acid, 2-butylhydrazide (SR-4370), showed comparable performances to other already known LRAs, did not activate CD4+ T-cells or caused changes in the composition of PBMCs as shown by flow cytometry analyses. Both compounds may represent an effective new treatment possibility for revocation of latency in HIV-1 infected individuals. |
/*
* Copyright (c) 2010-2015 Pivotal Software, Inc. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"); you
* may not use this file except in compliance with the License. You
* may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
* implied. See the License for the specific language governing
* permissions and limitations under the License. See accompanying
* LICENSE file.
*/
package com.gemstone.gemfire.cache;
import java.io.IOException;
/**
* Indicates that the region has been destroyed. Further operations
* on the region object are not allowed.
*
* @author <NAME>
*
* @since 2.0
*/
public class RegionDestroyedException extends CacheRuntimeException {
private static final long serialVersionUID = 319804842308010754L;
private String regionFullPath;
private transient boolean isRemote;
/** Constructs a <code>RegionDestroyedException</code> with a message.
* @param msg the String message
*/
public RegionDestroyedException(String msg, String regionFullPath) {
super(msg);
this.regionFullPath = regionFullPath;
}
/** Constructs a <code>RegionDestroyedException</code> with a message and
* a cause.
* @param s the String message
* @param ex the Throwable cause
*/
public RegionDestroyedException(String s, String regionFullPath, Throwable ex) {
super(s, ex);
this.regionFullPath = regionFullPath;
}
public String getRegionFullPath() {
return this.regionFullPath;
}
/**
* Returns true if this exception originated from a remote node.
*/
public final boolean isRemote() {
return this.isRemote;
}
// Overrides to set "isRemote" flag after deserialization
private synchronized void writeObject(final java.io.ObjectOutputStream out)
throws IOException {
getStackTrace(); // Ensure that stackTrace field is initialized.
out.defaultWriteObject();
}
private void readObject(final java.io.ObjectInputStream in)
throws IOException, ClassNotFoundException {
in.defaultReadObject();
this.isRemote = true;
}
}
|
<gh_stars>100-1000
package version
import (
"fmt"
"strings"
ver "github.com/hashicorp/go-version"
)
var (
// Set to the content of CURRENT_VERSION file at link-time with -X flag.
rawReleaseVersion = "0.0.0"
releaseVersion = ver.Must(ver.NewSemver(strings.TrimSuffix(rawReleaseVersion, "\n")))
// Set at link-time with -X flag.
gitVersion = "unknown"
)
func ReleaseVersion() *ver.Version {
return releaseVersion
}
// The git SHA that this copy of the CLI is built from.
func GitVersion() string {
return gitVersion
}
func CLIDisplayString() string {
return fmt.Sprintf("%s (%s)", releaseVersion.String(), gitVersion)
}
|
<reponame>XiyuChenFAU/kgs_vibration_entropy<filename>src/planners/MCMCPlanner.cpp<gh_stars>1-10
/*
Excited States software: KGS
Contributors: See CONTRIBUTORS.txt
Contact: <EMAIL>
Copyright (C) 2009-2017 Stanford University
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the "Software"), to deal in
the Software without restriction, including without limitation the rights to
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do
so, subject to the following conditions:
This entire text, including the above copyright notice and this permission notice
shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS, CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
IN THE SOFTWARE.
*/
#include "MCMCPlanner.h"
#include <iomanip>
#include <stack>
#include <IO.h>
#include "Logger.h"
#include "core/Transformation.h"
using namespace std;
MCMCPlanner::MCMCPlanner(
Molecule * molecule,
Direction * direction,
int stopAfter,
double stepSize
):
SamplingPlanner(),
m_molecule(molecule),
m_direction(direction),
m_stopAfter(stopAfter),
m_bigRad(stepSize*4.0/3.0),
m_lilRad(m_bigRad/2)
{
}
MCMCPlanner::~MCMCPlanner() {
for (auto &s : m_samples) {
delete s;
}
}
void MCMCPlanner::generateSamples()
{
int clashes = 0;
gsl_vector* gradient = gsl_vector_alloc(m_molecule->m_spanningTree->getNumDOFs());
m_samples.push_back(new Configuration(m_molecule));
for (int i = 0; i < m_stopAfter; i++) {
Configuration* seed = m_samples.back();
m_direction->gradient(seed, nullptr, gradient);
//gsl_vector_scale_max_component(gradient, options.maxRotation);
// Scale gradient so move is in Poisson disc
Configuration *new_conf = m_move->move(seed, gradient); //Perform move
double dist = m_metric->distance(new_conf, seed);
int scaleAttempts = 0;
while( dist<m_lilRad || dist>m_bigRad){
if(++scaleAttempts==5) break;
double gradientScale = (m_bigRad+m_lilRad)/(2.0*dist);
gsl_vector_scale(gradient, gradientScale);
delete new_conf;
new_conf = m_move->move(seed, gradient);
dist = m_metric->distance(new_conf, seed);
}
// scale_gradient(gradient, &protein);
// gsl_vector_scale(gradient, options.stepSize);
// Configuration* new_conf = move->move(seed, gradient);
if(new_conf->updatedMolecule()->inCollision()) {
clashes++;
i--;
} else {
log("samplingStatus")<<"Accepted conformation "<<i<<endl;
IO::writePdb(new_conf->updatedMolecule(), "output/conf_" + std::to_string((long long) i) + ".pdb");
m_samples.push_back(new_conf);
}
}
//Print final status
log("samplingStatus")<<"MCMC-planner: Rejects from clash: "<<clashes<<endl;
log("samplingStatus")<<"Done"<<endl;
}
|
<reponame>adventurelibrary/site
export function convertAPIException (ex: any) : string {
console.log(JSON.stringify(ex))
if (typeof ex === 'object') {
if (ex.key === 'validation') {
return ex.details.map((detail: any) => {
return detail.message
}).join(' & ')
}
}
return ex.toString()
}
|
// Autogen format for autogenerated code
func Autogen(data []byte) ([]byte, error) {
var buf bytes.Buffer
buf.WriteString(fmt.Sprintf(header, strings.Join(os.Args, " ")))
buf.WriteString("\n\n")
buf.Write(data)
fset := token.NewFileSet()
file, err := parser.ParseFile(fset, "", buf.Bytes(), parser.AllErrors|parser.ParseComments)
if err != nil {
return nil, &wrapError{
msg: "parse input data",
err: err,
}
}
res, err := AST(fset, file)
if err != nil {
return nil, &wrapError{
msg: "print AST",
err: err,
}
}
return res, nil
} |
Anterior insular cortex regulation in autism spectrum disorders Autism spectrum disorders (ASDs) comprise a heterogeneous set of neurodevelopmental disorders characterized by dramatic impairments of interpersonal behavior, communication, and empathy. Recent neuroimaging studies suggested that ASD are disorders characterized by widespread abnormalities involving distributed brain network, though clear evidence of differences in large-scale brain network interactions underlying the cognitive and behavioral symptoms of ASD are still lacking. Consistent findings of anterior insula cortex hypoactivation and dysconnectivity during tasks related to emotional and social processing indicates its dysfunctional role in ASD. In parallel, increasing evidence showed that successful control of anterior insula activity can be attained using real-time fMRI paradigms. More importantly, successful regulation of this region was associated with changes in behavior and brain connectivity in both healthy individuals and psychiatric patients. Building on these results we here propose and discuss the use of real-time fMRI neurofeedback in ASD aiming at improving emotional and social behavior. Introduction Autism spectrum disorders (ASDs) are neurodevelopmental disorders that dramatically impair interpersonal behavior, communication, and empathy (), with an estimated incidence of about 6:1000 (Chakrabarti and Fombonne, 2001;). A systematic review of epidemiological surveys of autistic disorder and pervasive developmental disorders (PDD) worldwide indicated a median of ASD prevalence estimates of 62/10000 (). On the other hand according to the US Centers for Disease Control the incidence increased to 1 in 68 children. 1 ASD are mainly characterized by abnormal functioning in social communication and social interaction across multiple contexts, such as social-emotional reciprocity and nonverbal communicative behaviors used for social interaction, and by restricted, repetitive patterns of behavior, interests, or activities (Diagnostic and Statistical Manual of Mental Disorders DSM-5, American Psychiatric Association). Although the neurobiological and pathophysiological mechanisms remain obscure, clear evidence indicates that autism is a complex and heterogeneous disorder with multisystem and multigenic origin, where even identical genetic variations may lead to divergent phenotypes (;Happ and Ronald, 2008;Levitt and Campbell, 2009;Geschwind, 2011;State and Levitt, 2011). Recent neuroimaging studies suggested that ASD are disorders characterized by widespread abnormalities involving distributed brain networks (Mller, 2007), but clear evidence of differences in large-scale brain network interactions underlying the cognitive and behavioral symptoms of ASD are still lacking. A large set of empirical results indicating decreased functional and structural connectivity of distributed brain networks supports the ''underconnectivity theory'' (;a,b;;Courchesne and Pierce, 2005;Geschwind and Levitt, 2007;Hughes, 2007;Casanova and Trippe, 2009;). This theory along with functional connectivity findings suggested local over-connectivity but long-distance under-connectivity in ASD (;Courchesne and Pierce, 2005;Geschwind and Levitt, 2007;;Casanova and Trippe, 2009). An underlying generalized disorder of synaptic connectivity resulting on alterations of distributed networks functioning has also been proposed as possible explanation of the manifested heterogeneity of ASD symptoms (b;Bourgeron, 2009). On the other hand, findings of postmortem and neuroimaging studies, although rather partial and sometimes contradicting (Sokol and Edwards-Brown, 2004), revealed pathological signs for ASD in the frontal lobes, amygdala and cerebellum (). Neurobiological theories on the underlying mechanisms of ASD, in particular those related to social behavior, mainly emphasized an impairment of selected brain regions, such as the amygdala (;), superior temporal sulcus (STS; Pelphrey and Carter, 2008), and fusiform gyrus. In addition, functional neuroanatomy investigations highlighted a relationship between the dysfunctional anterior insular cortex (AI) and the emotional and social impairment observed in ASD. Results of a recent metaanalysis of functional neuroimaging studies in ASD revealed hypoactivation of the right AI during several different tasks related to emotional and social processing (Di ). The AI cortex critically contributes to emotional and social processing by supporting the neural representation of the own physiological state. Several studies demonstrated that the AI is involved in the explicit appraisal and awareness of emotional and bodily responses (). The AI represents a hub mediating interactions between large-scale brain networks related to the integration of externally-directed and self-directed emotional processes. Recent models further suggested that AI supports different levels of representation of current and predictive emotional states allowing for errorbased learning of feeling states (;Seth, 2013). Self-reported poor awareness of own and others' feelings, both in autistic and typically developing individuals were associated with a reduced response in interoceptive insular cortex (Craig, 2003;). Silani et al. reported a relationship between a reduced response in the AI and poor awareness of own and others feelings in high-functioning autism/Asperger individuals (). In a subsequent study, Bird et al. observed a reduced activation of the left AI in individuals with ASD as compared to control participants when exposed to empathic pain stimuli, and concluded that alexithymia mediates the empathy deficits in ASD (). In a functional integration perspective it has been proposed that dysfunctional AI connectivity may underlie the emotional and social impairment observed in patients with ASD (Uddin and Menon, 2009;a,b;). AI hypoactivation in ASD would be related to a disconnection between AI and sensory and limbic structures that project to it, leading to a reduction in salience detection and subsequent mobilization of attentional resources necessary for guiding appropriate social behavior. To date, although a large number of studies provided important neurobiological insights on dysfunctional brain mechanisms of ASD (;;;;;) only few investigations exploited these results to develop novel treatments. Among these, preliminary EEG based neurofeedback studies showed promising results in mitigating cognitive and social emotional impairment in ASD (a(Kouijzer et al.,, 2010). In parallel, increasing evidence showed that self-regulation of AI activity through fMRI feedback training is achievable in both healthy individuals (;) and psychiatric patients (;), and that volitional control of AI leads to changes in emotional behavior, such as self-evaluation of emotionally salient stimuli (;). Building on these results we here propose the real-time fMRI neurofeedback approach for AI regulation with the aim of enhancing emotional and socio-communicative behavior in ASD. We will first summarize results of previous pilot investigations showing the effects of EEG-neurofeedback in ASD, and then shortly review studies reporting abnormal functioning of AI in this population. Ultimately, we will present fMRI neurofeedback studies targeting AI in healthy participants and psychiatric patients, and discuss the possible use of this approach in ASD. EEG Neurofeedback in ASD In the past decades ASD have emerged as a major public health and community challenge () with high incidence (;), but at present evidence-based interventions that effectively treat the core symptoms of ASD are lacking. ASD pathophysiology remains unclear, and psychological interventions are currently the most common treatments (). Pharmacologic interventions are also used to temporarily reduce additional behavioral problems but do not target the core symptoms of ASD (). Despite some variability among approaches, the overall efficacy of both psychological and pharmacologic treatments is moderate. A promising but under-examined neurobiologically-focused alternative for ASD treatment is represented by neurofeedback (). This approach permits to manipulate brain activity through instrumental (operant) conditioning (). Instrumental learning of brain activity occurs by reinforcing, with positive or negative reward, the desired brain signals so as to establish a causal relationship between neural response and reinforcer. A large body of literature on EEG-based neurofeedback demonstrated that it is possible to manipulate abnormal oscillatory brain activity in healthy individuals and patients by rewarding the inhibition or enhancement of specific neuroelectric activity (;;). In individuals with ASD concurrent inhibition of theta power and enhancement of low beta power through neurofeedback training partially reduced autistic behavior. In a pilot study Coben and Padolsky showed that EEG training aiming to weaken hyper-connectivity between posteriorfrontal and anterior-temporal regions in ASD (Coben and Padolsky, 2007) resulted in an improvement of attention, visual perception, language and executive functions, and of some ASD core symptoms as assessed by the Autism Treatment Evaluation Checklist. A further similar investigation reported positive effects on behavioral, cognitive, and neurophysiological measures (b). Interestingly, the effects on social behavior and executive functions were maintained after one year (a). A recent neurofeedback study targeting the mirror neuron system via modulation of EEG signal demonstrated that successful mu rhythm suppression was associated with improvement of ASD symptoms, as evidenced by behavioral questionnaires administered to parents (). Although promising most of these results were potentially biased by parents' expectation as the outcomes of neurofeedback treatment were mainly based on parents' evaluation. Thus, more objective behavioral and neurophysiological measures (e.g., quantitative EEG Scolnick, 2005) are necessary to confirm these observations. Overall, these preliminary results suggest that EEG-based neurofeedback approach may lead to some improvement in social interactions and verbal and non-verbal communication skills in children with ASD, but more controlled clinical studies on larger samples are strongly needed. Regulation of AI Activity Through Real-time fMRI A number of investigations have demonstrated that learned regulation of the BOLD signal is possible in brain areas related to different type of processing: sensorimotor, cognitive and emotional (;Weiskopf, 2012;). More importantly, real-time fMRI studies have shown that feedback training, besides allowing specific control of localized BOLD signal, may lead to changes in behavior (;Weiskopf, 2012;). Most of real-time fMRI studies adopted experimental protocols consisting in a certain number of fMRI feedback sessions during which participants were trained to learn to enhance or reduce the BOLD response in selected target regions. Contingent information of BOLD signal is typically visually feedback in a continuous fashion so as to allow online monitoring and modulation of the level of activity in the target regions. The signal time series of the targeted regions of interest is then used to generate a visual feedback for the participant. Information about ongoing brain activity can be depicted using thermometer bars representing the actual level of BOLD activity with respect to a baseline level, and updated every 1--2 s (Figure 1). Alternative representation of visual feedback can also be implemented using computer games or virtual reality scenarios (Figure 1). Participants are usually provided with some strategies (e.g., using mental imagery) that potentially permit to achieve successful regulation, though, they are also encouraged to explore different strategies and find those, explicit or implicit, most successful. Participants can be unaware of the purpose of the neurofeedback training and of the meaning of the feedback (implicit approach) (), in this case they would be instructed to increase the number of thermometer bars or to perform a specific visual task (). In some studies the effects of self-regulation of brain activity were based on the responses to specific stimuli presented immediately after or during up-/down-regulation blocks; researchers were thus able to directly test for differences in behavior contingent to instantaneous increase and decrease of BOLD signal (;). In other studies the effects were assessed by measuring changes in participants' response after single or multiple feedback training runs, either in the same day or across different days (;;). In this case the observed changes in behavior were associated with a longer-term effect of learned enhancement/reduction of metabolic activity in the target regions. Using a real-time fMRI paradigm we demonstrated that selfregulation of AI is achievable after few training sessions (). In a consecutive study, we showed that enhanced AI activity lead to increased negative perception of aversive stimuli (), and induced reorganization of functional brain connectivity (). Overall findings of real-time fMRI studies on AI indicated the suitability of real-time fMRI paradigm for clinical applications in emotional disorders. Moreover, they complemented more conventional neuroimaging studies highlighting the involvement of AI in the explicit appraisal of emotional stimuli (Craig, 2003(Craig,, 2009). Promising results were also shown by preliminary pre-clinical studies adopting neurofeedback protocols for AI regulation (;;). FIGURE 1 | Real-time fMRI neurofeedback setup. BOLD signal from spatially circumscribed brain regions (e.g., the green rectangle localized in the right insula) is usually measured with fast echo planar imaging (EPI) sequences (bottom left). Real-time fMRI analysis can be performed by retrieving data online, and by performing preprocessing and statistical analysis using incremental algorithms (). The signal time series (see graph at the bottom) of the selected regions of interest is then used to generate a visual feedback for participants (right). Information about ongoing brain activity can be depicted using thermometer bars representing the actual level of BOLD activity with respect to a baseline level, and updated typically every 1-2 s. Alternative representation of visual feedback can also be implemented using computer games or virtual reality scenarios in order to increase attention, motivation and compliance of children and adolescents (e.g., by increasing the BOLD signal a fish moves towards smaller fishes-corresponding to higher level of BOLD response-to eat them). In a proof-of-concept study, clinical symptoms of patients with depression significantly ameliorated after real-time fMRI training aiming to increase activity in brain regions responsive to positive stimuli, such as the ventrolateral prefrontal cortex and insula (). A challenging study in chronic schizophrenic patients indicated their ability to learn volitional control of AI activity after real-time fMRI training (). Learned control of AI affected emotion recognition so that disgust faces presented after up-regulation were more accurately detected. These results are particularly important considering that autism and schizophrenia are characterized by common etiologic and phenotypic characteristics (;de Lacy and King, 2013), and that altered brain areas involved in social emotional processing were observed in both disorders (). Self-regulation of AI in ASD The identification of the AI as region of hypoactivation in ASD represents a key premise for proposing novel real-time fMRI experiments in autism. Previous real-time fMRI neurofeedback studies indicated that instrumental learning of AI activity affects emotional processing in healthy individuals (;) and patients with emotional disorders (;;). Considering the role of AI in emotional and social behavior, and the evidence of abnormal functionality of this region in ASD, it is reasonable to hypothesize that learned regulation of AI might potentially lead to positive clinical outcomes also in ASD. Moreover, real-time fMRI approach allowing to establish a causal link between brain activity and behavior might help to clarify the role of AI in the still unclear pathophysiology of ASD, and consequently open the way to neurobiologically-focused treatments complementing current psychosocial and pharmacological treatments. Recent real-time functional MRI developments also indicated the possibility to provide feedback information based on dynamic functional MR connectivity (;). Future fMRI neurofeedback investigations in ASD might directly target not simply AI but also their altered neuronal connections; for instance, participants could be trained to reinforce connectivity between AI and sensory and limbic structures. However, several methodological issues () still need to be addressed before applying real-time fMRI neurofeedback paradigms in individuals with ASD, including how to enhance learning and motivation in emotionally sensitive patients, and how to increase behavioral effects and their translation out of the lab setting. The role of instructions, and more in general, the strategies for achieving successful control of brain activity, might be particularly critical in ASD in light of the reported deficit in learning (Klinger and Dawson, 2001;;;;). Impaired implicit learning was shown in individuals with low mental ages and intellectual disability during category-learning tasks (Klinger and Dawson, 2001), whereas studies involving high functioning individuals reported more intact learning abilities (). Consecutive studies partially explained this difference suggesting that high functioning individuals adopt explicit strategies, for instance explicit verbal processing and reasoning, to counteract for impairment in implicit learning (); low functioning individuals are instead usually engaged in forced-choice tasks. In general, unlike neurotypical individuals, showing independent mechanisms for explicit and implicit learning, individuals with ASD seem to rely on the same mental processes. Classical fear conditioning studies in ASD also demonstrated impaired associative learning across both visual and auditory modalities (Gaigg and Bowler, 2007;). Interestingly, it has been shown that increased explicit awareness of the learning contingencies, measured with explicit memory test, was associated with better performance in associative learning. These results also pointed to a compensatory role of explicit learning strategies, which might then be equally adopted during instrumental learning of metabolic activity. Probabilistic reinforcement learning in ASD has also been shown to diverge from that of typically developing individuals, with ASD having further deficits in using positive feedback to exploit rewarded choices in a task requiring learning relationships between stimulus pairs (). Moreover, recent findings indicated that individuals with ASD have impaired ability to develop an effective reward-based working memory, and mainly rely on trial-by-trial feedback processing during learning (). The evidence of impaired implicit learning and conditioned behavior implies that appropriate neurofeedback paradigm, with specific schedules of reinforcement (Rescorla, 1984;;;), should be designed to optimize learning in ASD. Typically, real-time fMRI feedback is provided contingently to the participant's behavior (;;), yet, successful BOLD control in healthy individuals was shown using a delayed as well as intermittent feedback (;). On the other hand, instrumental-conditioning studies showed that learning mechanisms in ASD, although potentially altered, could be still adaptive and functional. Preliminary EEG based neurofeedback studies in children with ASD suggested that control of brain electrical activity is possible. Decreasing of excessive theta power at central and frontal regions was achieved by means of contingent feedback of brain activity, motivational reinforcement of the therapist, and no need of specific instructions. In most of real-time fMRI studies participants were informed about potentially successful general strategies, however the role of instructions is still debated. A combination of cognitive strategies (mental imagery) and feedback information helps participants to acquire successful BOLD control (;;), but whether this combination is sufficient to achieve voluntary control still remains unclear. On the other hand, studies on operant control of neuroelectric signals suggested that feedback is more important than instructions for successful cortical regulation measured with slow cortical potentials, but that instruction to imagine facilitated learning at least during the first sessions of training (;). It is conceivable that a combination of both explicit and implicit strategies supports learning control of metabolic activity. We think that the timely interplay of cognitive and operant strategies can facilitate brain activity control in healthy individuals and might (re)activate either impaired or dormant mechanisms in patients (). The use of specific instructions in individuals with ASD might be advantageous as they generally showed better performance during explicit as compared to implicit learning. However, instructions should be carefully selected in order to facilitate learning and to prevent reinforcement of dysfunctional activity and behavior. We also speculate that using appropriate predefined instructions might help retention of the acquired BOLD control over longer time, and possibly response generalization in everyday life. Neurofeedback approach can be applied either to children or adolescents (;;a,b); a pilot study on EEG neurofeedback feasibility in children with ASD showed that positive reinforcement and breaks including calm breathing exercises can facilitate training (a). However, in children with ASD, and more in general in low functioning individuals, the uncomfortable MR environment might pose serious feasibility challenges as active behaviors and vocalizations, which are frequent off-task behaviors, would detrimentally affect fMRI data. Nevertheless, specific game scenarios exploiting specific participants' ability and interests might be implemented for both children and adolescents in order to increase attention, motivation and treatment's compliance (Figure 1). The effects of learned control of AI in ASD individuals can then be assessed using a variety of tests. Considering the involvement of AI in interoception () and emotional awareness, which is altered in ASD (;), changes in interoceptive sensitivity concurrent to AI regulation might be measured. Ratings of emotional pictures might also be used for measuring changes in emotional processing and awareness. Understanding of others' mental states might instead be measured using tests where participants are required to associate words describing emotional states or expressions of another person's eyes with images depicting emotional faces (). Pre-and post-training administration of questionnaires such as the Toronto Alexithymia Scale (TAS-20; ) and the Davis Interpersonal Reactivity Index might also be employed for assessing outcomes related to emotional awareness and empathy, respectively. In addition, more objective and indirect measures using physiological recordings and implicit tests (;Fazio and Olson, 2003) might permit stronger conclusions on the relationship between self-regulated AI activity and emotional and social behavior. Real-time fMRI in ASD should then entail the use of randomized, controlled investigations with specific control groups (e.g., Down syndrome and/or fully matched typical developing individuals) to assess the specificity of the potential outcomes and exclude placebo or unspecific effects. Comparisons with current available treatments for ASD, such as psychological and pharmacological interventions, should also be performed to demonstrate validity of real-time fMRI training and estimating its efficacy. Boosting short-term, and possibly, long-term effects of neurofeedback in ASD might be even attained by combining real-time fMRI training with the administration of specific hormones or neuromodulators, such as oxytocin (;;). It has recently been proposed that early pathophysiology in the oxytocin system by disrupting homeostatic regulation and interoception could partially account for the development of autism (Quattrocki and Friston, 2014). Moreover, recent studies demonstrated that administration of oxytocin in children and adults with ASD enhances willingness to interact socially, comprehension of affective speech, understanding of others' mental states, and social cognition (;;). In a real-time fMRI protocol delivery of oxytocin or neuromodulators might be, for instance, triggered by specific level of AI activity so as to benefit of concurrent biochemical and neurophysiological mechanisms. Finally, possible issues of real-time fMRI neurofeedback approach for clinical use are the costs and accessibility of MR technology, which might limit its applicability to large cohorts of patients with ASD. To overcome this limitation more affordable alternatives to fMRI, such as optical imaging (fNIRS) and EEG might ultimately be specifically implemented and tested. For instance, assessing specific EEG correlates during real-time fMRI-based insula training might permit to build a correspondent more easily applicable EEG-based paradigm. |
# KRATOS _ _ ____ _
# | | (_)_ __ ___ __ _ _ __/ ___| ___ | |_ _____ _ __ ___
# | | | | '_ \ / _ \/ _` | '__\___ \ / _ \| \ \ / / _ \ '__/ __|
# | |___| | | | | __/ (_| | | ___) | (_) | |\ V / __/ | \__ |
# |_____|_|_| |_|\___|\__,_|_| |____/ \___/|_| \_/ \___|_| |___/ Application
#
# Author: <NAME>
#
# Application dependent names and paths
from KratosMultiphysics import _ImportApplication
from KratosLinearSolversApplication import *
application = KratosLinearSolversApplication()
application_name = "LinearSolversApplication"
_ImportApplication(application, application_name)
|
MALCOLM Turnbull has been ousted as Australian Prime Minister by his party rivals - with Scott Morrison elected to take over his role.
The beleaguered leader of the conservative Liberal Party called a leadership meeting on Friday after losing the majority support of the party.
Morrison, who will be Australia's sixth prime minister in less than 10 years, emerged victorious from a three-way race with former home affairs minister Peter Dutton and Foreign Minister Julie Bishop.
Turnbull, who opted not to contest the vote, is the fourth PM to be dumped by their own party before serving a full three-year term since 2010.
Turnbull came to power in a party-room coup in September 2015.
A social liberal and multi-millionaire former merchant banker, he has struggled to appeal to conservative voters and only narrowly won a general election in 2016.
The Liberal party is the senior partner in the ruling conservative coalition.
The Liberal-National government has consistently trailed the opposition Labor party in opinion polls.
If Turnbull resigns from parliament, he would leave the new government facing a by-election for his Sydney seat that could see it lose its one-seat majority.
Turnbull said on Thursday he believed that former prime ministers are best out of the parliament. |
Subway Arrests Are Up 300 Percent Under de Blasio and Bratton. Why?
Overall stops and arrests are down, but arrests of panhandlers and peddlers are way up.
In the first two months of the year, arrests of peddlers and panhandlers on subways have more than tripled over the same period last year, with the police recording 274 such arrests as of March 2. By this point last year, they had made 90 such arrests.… Police statistics also indicate a noticeable spike in arrests for low-level violations in public housing developments. On New York City Housing Authority property, arrests for felonies are down nearly 5 percent and arrests for misdemeanors are nearly flat. But arrests for violations—a category of infractions that includes drinking beer in public and riding a bike on the sidewalk—has increased by more than 21 percent.
The Times also points out that stop-and-frisk encounters, which decreased dramaticallty in 2013, fell by an incredible amount so far in 2014, from 5,983 year-to-date last year to 353 so far this year. Overall arrests are also down. And the information on subway busts is public only because Commissioner William Bratton decided to be more transparent than his predecessor, Ray Kelly, had been.
Given that stops and arrests are down overall, and that crime is lower so far this year compared to last, what does the uptick in peddler/panhandler arrests mean?
When there’s a pronounced increase in a particular kind of enforcement, sometimes it’s a response to what cops call “conditions”—problems that have been identified in a command (e.g., there’s a slew of complaints about bar patrons getting rowdy on their way home, so the cops establish a presence near the watering holes at closing time). That could be what’s behind these numbers, though subway crime overall was down last year.
On their face, of course, the numbers conjure up memories of Bratton’s first stint as top cop, in the first years of the Giuliani administration, when mass arrests around so-called “quality of life” crimes were explained as reflecting a “broken windows” theory of urban disorder, in which tolerance for minor crimes was thought to create an atmosphere in which more serious offenses were more likely to occur.
Some, of course, look back on that era of policing fondly. Others—namely the people who have protested de Blasio’s decision to bring Bratton back to One Police Plaza—recall the “broken windows” surge in arrests as the start of an era of aggressive, racially targeted policing, eventually encompassing Howard Safir’s street crime unit and evolving into the mass-arrest, stop-and-frisk strategy of the Bloomberg years.
Here’s where a little communication by the mayor would be handy. During the campaign, he made many legitimate criticisms of the Bloomberg NYPD but had little to say about what his own approach to fighting crime would be. The VisionZero effort is an ambitious redirection of some police resources. But what’s the overall approach, and how do record arrests of people asking for change or selling candy (not for any basketball team, but just to do something positive and put money in their pocket, you might say) fit into it? |
Periodic acceleration: effects on vasoactive, fibrinolytic, and coagulation factors. Cellular and isolated vessel experiments have shown that pulsatile and laminar shear stress to the endothelium produces significant release of mediators into the circulation. Periodic acceleration (pG(z)) applied to the whole body in the direction of the spinal axis adds pulses to the circulation, thereby increasing pulsatile and shear stress to the endothelium that should also cause release of mediators into the circulation. The purpose of this study was to determine whether addition of pulses to the circulation through pG(z) would be sufficient to increase shear stress in whole animals and to acutely release mediators and how such a physical maneuver might affect coagulation factors. Randomized control experiments were performed on anesthetized, supine piglets. The treatment group (pG(z)) (n = 12) received pG(z) with a motion platform that moved them repetitively head to foot at +/-0.4 g at 180 cpm for 60 min. The control group (n = 6) was secured to the platform but remained on conventional ventilation throughout the 4-h protocol. Compared with control animals and baseline, pulsatile stress produced significant increases of serum nitrite, prostacyclin, PGE, and tissue plasminogen activator antigen and activity, as well as D-dimer. There were no significant changes in epinephrine, norepinephrine, cortisol, and coagulation factors between groups or from baseline values. Pulsatile and laminar shear stress to the endothelium induced by pG(z) safely produces increases of vasoactive and fibrinolytic activity. pG(z) has potential to achieve mediator-related benefits from the actions of nitric oxide and prostaglandins. |
<gh_stars>1-10
/*
* \copyright Copyright 2013 Google Inc. All Rights Reserved.
* \license @{
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* @}
*/
#include <stdio.h>
#include <iostream>
using std::cout;
using std::endl;
using std::ostream;
#ifdef _MSC_VER
#include <tchar.h>
#endif
#include "googleapis/client/util/test/googleapis_gtest.h"
#include <glog/logging.h>
#include "googleapis/base/scoped_ptr.h"
#include "googleapis/util/file.h"
#include "googleapis/util/status.h"
namespace googleapis {
namespace {
#ifdef _MSC_VER
// Windows gives us a file name by creating a file.
// we want a directory so this is no good.
// Fow now we'll just delete the temporary file and use its name.
static string tempnam(const char* ignore_dir, const char* prefix) {
TCHAR dir[MAX_PATH + 1];
int len = GetTempPath(ARRAYSIZE(dir), dir);
string windows_prefix;
const TCHAR* name_prefix = ToWindowsString(prefix, &windows_prefix);
TCHAR path[MAX_PATH + 1];
UINT result = GetTempFileName(dir, name_prefix, 0, path);
DeleteFile(path); // Was created a side effect.
CHECK_NE(0, result);
string windows_path = googleapis::FromWindowsStr(path);
return googleapis::FromWindowsPath(windows_path);
}
#endif
scoped_ptr<string> default_tempdir_;
void CreateTestingTempDir() {
default_tempdir_.reset(new string(tempnam(NULL, "gapi")));
util::Status status =
File::RecursivelyCreateDirWithPermissions(*default_tempdir_, S_IRWXU);
// If this fails, maybe there was a race condition.
// But more likely we have a permissions problem.
ASSERT_TRUE(status.ok()) << "Could not create " << *default_tempdir_;
LOG(INFO) << "Using test_tmpdir=" << *default_tempdir_;
}
void DeleteTestingTempDir() {
LOG(INFO) << "Deleting test_tmpdir=" << *default_tempdir_;
File::RecursivelyDeleteDir(*default_tempdir_);
}
} // annoymous namespace
namespace client {
string GetTestingTempDir() {
return *default_tempdir_;
}
} // namespace client
} // namespace googleapis
using namespace googleapis;
int main(int argc, char** argv) {
testing::InitGoogleTest(&argc, argv);
#ifdef _MSC_VER
// Change glog fatal failure function to abort so DEATH tests will see
// a failure. Otherwise the default handler used by glog does not result
// in a failure exit in _DEBUG.
google::InstallFailureFunction(abort);
#endif
CreateTestingTempDir();
int result = RUN_ALL_TESTS();
DeleteTestingTempDir();
return result;
}
|
// purpose: modified DataObject and nonmodified property, get(DataObject, Property)
public void testGetOldValueAfterTwoModifications() {
changeSummary.beginLogging();
root.set(rootProperty1, "test");
root.set(rootProperty1, "test2");
assertNull(changeSummary.getOldValue(root, rootProperty));
assertNull(changeSummary.getOldValue(root, rootProperty1).getValue());
assertFalse(changeSummary.getOldValue(root, rootProperty1).isSet());
} |
OPTICAL STUDIES FOR THE SUPER SEPARATOR SPECTROMETER S 3 HIGHER-ORDER OPTIMIZATIONS S (Super Separator Spectrometer) is a future device designed for experiments with the high intensity heavy ion stable beams of SPIRAL2 at GANIL (Caen, France). It will include a target resistant to these very high intensities, a first stage momentum achromat for primary beam extraction and suppression, a second stage mass spectrometer and a dedicated detection system. This spectrometer includes large aperture quadrupole triplets with embedded multipolar corrections. To enable the primary beam extraction one triplet has to be opened on one side, which requires an appropriate design of such a multipolar magnet. The final mass separation power required for S needs a careful design of the optics with a high level of aberration correction. Multiple symmetric lattices were studied for this purpose. A 4-fold symmetric lattice and the achieved results are described in this paper. |
<reponame>dfparker2002/composum<gh_stars>10-100
package com.composum.sling.core.servlet;
import com.composum.sling.core.service.PermissionsService;
import com.composum.sling.core.util.XSS;
import com.google.gson.stream.JsonWriter;
import org.apache.commons.lang3.StringUtils;
import org.apache.sling.api.SlingHttpServletRequest;
import org.apache.sling.api.SlingHttpServletResponse;
import org.apache.sling.api.request.RequestPathInfo;
import org.apache.sling.api.resource.Resource;
import org.apache.sling.api.servlets.HttpConstants;
import org.apache.sling.api.servlets.ServletResolverConstants;
import org.apache.sling.api.servlets.SlingSafeMethodsServlet;
import org.osgi.framework.Constants;
import org.osgi.service.component.annotations.Component;
import org.osgi.service.component.annotations.Reference;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.jcr.Session;
import javax.servlet.Servlet;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;
/**
* The service servlet to retrieve and/or check permissions of a path. The path is necessary only for
* privilege checks; a 'path' parameter, a suffix or the requested resource is used (in this order).
* parameters: 'member' and/or 'privilege' (possibly multiple), optional 'path';
* each parameter can be a ',' separated list combined with OR; multiple parameters are combined with AND
* response: {"result":true/false,"userId":...,"path":...,...matching permissions}
*/
@Component(service = Servlet.class,
property = {
Constants.SERVICE_DESCRIPTION + "=Composum Nodes Core Permissions Servlet",
ServletResolverConstants.SLING_SERVLET_RESOURCE_TYPES + "=sling/servlet/default",
ServletResolverConstants.SLING_SERVLET_SELECTORS + "=cpm.permissions",
ServletResolverConstants.SLING_SERVLET_EXTENSIONS + "=json",
ServletResolverConstants.SLING_SERVLET_METHODS + "=" + HttpConstants.METHOD_GET,
}
)
public class CorePermissionsServlet extends SlingSafeMethodsServlet {
private static final Logger LOG = LoggerFactory.getLogger(CorePermissionsServlet.class);
@Reference
private PermissionsService permissionsService;
@Override
protected void doGet(SlingHttpServletRequest request, SlingHttpServletResponse response)
throws IOException {
Boolean checkResult = null;
String userId = null;
String path = null;
List<String> memberOf = new ArrayList<>();
List<String> privilege = new ArrayList<>();
Session session = request.getResourceResolver().adaptTo(Session.class);
if (session != null) {
userId = session.getUserID();
RequestPathInfo pathInfo = request.getRequestPathInfo();
List<String> selectors = Arrays.asList(pathInfo.getSelectors());
String[] memberValues = XSS.filter(request.getParameterValues("member"));
if (memberValues != null) {
for (String members : memberValues) {
if (checkResult == null || checkResult) {
String found = permissionsService.isMemberOfOne(session,
StringUtils.split(members, ","));
if (checkResult = (found != null)) {
memberOf.add(found);
}
}
}
}
if (checkResult == null || checkResult) {
String[] privilegeValues = XSS.filter(request.getParameterValues("privilege"));
if (privilegeValues != null) {
path = XSS.filter(request.getParameter("path"));
if (StringUtils.isBlank(path)) {
path = XSS.filter(pathInfo.getSuffix());
}
if (StringUtils.isBlank(path)) {
Resource resource = request.getResource();
if (resource != null) {
path = resource.getPath();
}
}
if (StringUtils.isNotBlank(path)) {
for (String privileges : privilegeValues) {
if (checkResult == null || checkResult) {
String found = permissionsService.hasOneOfPrivileges(session, path,
StringUtils.split(privileges, ","));
if (checkResult = (found != null)) {
privilege.add(found);
}
}
}
}
}
}
}
response.setStatus(HttpServletResponse.SC_OK);
response.setContentType("application/json; charset=UTF-8");
JsonWriter writer = new JsonWriter(response.getWriter());
writer.beginObject();
writer.name("result").value(checkResult != null && checkResult);
if (StringUtils.isNotBlank(userId)) {
writer.name("userId").value(userId);
}
if (StringUtils.isNotBlank(path)) {
writer.name("path").value(path);
}
if (memberOf.size() > 0) {
writer.name("memberOf").beginArray();
for (String value : memberOf) {
writer.value(value);
}
writer.endArray();
}
if (privilege.size() > 0) {
writer.name("privilege").beginArray();
for (String value : privilege) {
writer.value(value);
}
writer.endArray();
}
writer.endObject();
}
}
|
Abnormal differentiation of tissue macrophage populations in 'osteopetrosis' (op) mice defective in the production of macrophage colony-stimulating factor. Examination of the op/op mouse disclosed marked reduction and abnormal differentiation of osteoclasts in the bones and of tissue-specific macrophages in various visceral organs and tissues. Most of these macrophages were immature as judged by ultrastructural criteria. In co-cultures of normal mouse bone marrow cells with fibroblast cell lines prepared from the lungs of the op/op mice, a defective differentiation of monocytes into macrophages was confirmed, supporting previous evidence that the fibroblast cell lines of the mutant mouse failed to produce functional macrophage colony-stimulating factor (M-CSF/CSF-1). In such co-cultures, however, a small number of macrophages apparently mature under the influence of granulocyte/macrophage colony-stimulating factor (GM-CSF) produced by the op/op fibroblast cell lines. In the mutant mice, the numbers of macrophages in the uterine wall and ovaries were severely reduced. Compared with the tissues of normal littermates, those of the mutants contained about 60% fewer macrophages in many tissues. This suggests that an M-CSF-independent population of macrophages is derived from granulocyte/macrophage-colony-forming cells (GM-CFC) or earlier hematopoietic progenitors. |
package kr.co.popone.fitts.feature.post.upload.create;
import io.reactivex.functions.Consumer;
import java.util.ArrayList;
import java.util.List;
import kr.co.popone.fitts.C0010R$id;
import kr.co.popone.fitts.feature.tag.TagGroup;
final class CreatePostActivity$onCreate$44<T> implements Consumer<ArrayList<String>> {
final /* synthetic */ CreatePostActivity this$0;
CreatePostActivity$onCreate$44(CreatePostActivity createPostActivity) {
this.this$0 = createPostActivity;
}
public final void accept(ArrayList<String> arrayList) {
((TagGroup) this.this$0._$_findCachedViewById(C0010R$id.tag_create_post)).setTags((List<String>) arrayList);
}
}
|
<filename>code/Drivers/BSP/53L3A2/53l3a2_conf_template.h
/**
******************************************************************************
* @file 53l3a2_conf_template.h
* @author IMG SW Application Team
* @brief This file contains definitions for the ToF components bus interfaces
* when using the X-NUCLEO-53L3A2 expansion board
* This file should be copied to the application folder and renamed
* to 53l3a2_conf.h.
******************************************************************************
* @attention
*
* Copyright (c) 2022 STMicroelectronics.
* All rights reserved.
*
* This software is licensed under terms that can be found in the LICENSE file
* in the root directory of this software component.
* If no LICENSE file comes with this software, it is provided AS-IS.
*
******************************************************************************
*/
/* Replace the header file names with the ones of the target platform */
#include "stm32yyxx_hal.h"
#include "nucleo_xyyyzz_bus.h"
#include "nucleo_xyyyzz_errno.h"
/* Define to prevent recursive inclusion -------------------------------------*/
#ifndef __53L3A2_CONF_H__
#define __53L3A2_CONF_H__
#ifdef __cplusplus
extern "C" {
#endif
/* USER CODE BEGIN 1 */
/* USER CODE END 1 */
#define RANGING_SENSOR_INSTANCES_NBR (3U)
#define VL53L3A2_hi2c (hi2c1)
#define VL53L3A2_I2C_SCL_GPIO_PORT BUS_I2C1_SCL_GPIO_PORT
#define VL53L3A2_I2C_SCL_GPIO_PIN BUS_I2C1_SCL_GPIO_PIN
#define VL53L3A2_I2C_SDA_GPIO_PORT BUS_I2C1_SDA_GPIO_PORT
#define VL53L3A2_I2C_SDA_GPIO_PIN BUS_I2C1_SDA_GPIO_PIN
#define VL53L3A2_I2C_Init BSP_I2C1_Init
#define VL53L3A2_I2C_DeInit BSP_I2C1_DeInit
#define VL53L3A2_I2C_WriteReg BSP_I2C1_Send
#define VL53L3A2_I2C_ReadReg BSP_I2C1_Recv
#define VL53L3A2_GetTick BSP_GetTick
#ifdef __cplusplus
}
#endif
#endif /* __53L3A2_CONF_H__*/
|
/**
* Test of getCorreo method, of class Usuario.
*/
@Test
public void testGetCorreo() {
System.out.println("getCorreo");
Cliente instance = (Cliente) usuarioCompleto;
String expResult = "testC";
String result = instance.getCorreo();
assertEquals(expResult, result);
} |
//=======================================================================
// Copyright (c)
//
// Distributed under the Boost Software License, Version 1.0. (See
// accompanying file LICENSE_1_0.txt or copy at
// http://www.boost.org/LICENSE_1_0.txt)
//=======================================================================
/**
* @file dreyfus_wagner.hpp
* @brief Finds optimal Steiner Tree in exponential time.
* @author <NAME>
* @version 1.0
* @date 2013-07-05
*/
#ifndef PAAL_DREYFUS_WAGNER_HPP
#define PAAL_DREYFUS_WAGNER_HPP
#include "paal/data_structures/metric/metric_traits.hpp"
#include "paal/data_structures/metric/graph_metrics.hpp"
#include <unordered_map>
#include <unordered_set>
#include <bitset>
namespace paal {
/**
* Implements Dreyfus-Wagner algorithm.
* The algorithm finds optimal Steiner Tree in exponential time, 3^k * n.
*/
template <typename Metric, typename Terminals, typename NonTerminals,
unsigned int TerminalsLimit = 32>
class dreyfus_wagner {
public:
using MT = data_structures::metric_traits<Metric>;
using Vertex = typename MT::VertexType;
using Dist = typename MT::DistanceType;
using Edge = typename std::pair<Vertex, Vertex>;
using TerminalsBitSet = typename std::bitset<TerminalsLimit>;
using State = std::pair<Vertex, TerminalsBitSet>;
using steiner_elements = std::unordered_set<Vertex, boost::hash<Vertex>>;
/**
* Constructor used for solving Steiner Tree problem.
*/
dreyfus_wagner(const Metric &cost_map, const Terminals &term,
const NonTerminals &non_terminals)
: m_cost_map(cost_map), m_terminals(term),
m_non_terminals(non_terminals) {
assert(m_terminals.size() <= TerminalsLimit);
for (int i = 0; i < (int)m_terminals.size(); i++) {
m_elements_map[m_terminals[i]] = i;
}
}
/**
* Finds optimal Steiner Tree.
* @param start Vertex to start the recurrence from.
*/
void solve(int start = 0) {
int n = m_elements_map.size();
assert(start >= 0 && start < n);
TerminalsBitSet remaining;
// set all terminals except 'start' to 1
for (int i = 0; i < n; i++) {
remaining.set(i);
}
remaining.reset(start);
m_cost = connect_vertex(m_terminals[start], remaining);
retrieve_solution_connect(m_terminals[start], remaining);
}
/**
* Gets the optimal Steiner Tree cost.
*/
Dist get_cost() const { return m_cost; }
/**
* Gets edges belonging to optimal tree.
*/
const std::vector<Edge> &get_edges() const { return m_edges; }
/**
* Gets selected Steiner vertices.
*/
const steiner_elements &get_steiner_elements() const {
return m_steiner_elements;
}
private:
/*
* @brief Computes minimal cost of connecting given vertex and a set of
* other vertices.
* @param v vertex currently processed
* @param mask vertices not yet processed has corresponding bits set to 1
*/
Dist connect_vertex(Vertex v, TerminalsBitSet remaining) {
if (remaining.none()) {
return 0;
}
if (remaining.count() == 1) {
int k = smallest_bit(remaining);
Dist cost = m_cost_map(v, m_terminals[k]);
m_best_cand[code_state(v, remaining)] =
std::make_pair(cost, m_terminals[k]);
return cost;
}
// Check in the map if already computed
auto iter = m_best_cand.find(code_state(v, remaining));
if (iter != m_best_cand.end()) {
return iter->second.first;
}
Dist best = split_vertex(v, remaining);
Vertex cand = v;
auto try_vertex = [&](Vertex w) {
Dist val = split_vertex(w, remaining);
val += m_cost_map(v, w);
if (best < 0 || val < best) {
best = val;
cand = w;
}
};
for (Vertex w : m_non_terminals) {
try_vertex(w);
}
for (auto w_with_id : m_elements_map) {
if (!remaining.test(w_with_id.second)) {
try_vertex(w_with_id.first);
}
}
for (auto vertex_and_terminal_id : m_elements_map) {
Vertex w = vertex_and_terminal_id.first;
int terminal_id = vertex_and_terminal_id.second;
if (!remaining.test(terminal_id)) continue;
remaining.reset(terminal_id);
Dist val = connect_vertex(w, remaining);
val += m_cost_map(v, w);
remaining.set(terminal_id);
if (best < 0 || val < best) {
best = val;
cand = w;
}
}
m_best_cand[code_state(v, remaining)] = std::make_pair(best, cand);
return best;
}
/**
* @brief Computes minimal cost by splitting the tree in two parts.
*/
Dist split_vertex(Vertex v, TerminalsBitSet remaining) {
if (remaining.count() < 2) {
return 0;
}
// Check in the map if already computed
auto iter = m_best_split.find(code_state(v, remaining));
if (iter != m_best_split.end()) {
return iter->second.first;
}
int k = smallest_bit(remaining) +
1; // optimalization, to avoid checking subset twice
std::pair<Dist, TerminalsBitSet> best =
best_split(v, remaining, remaining, k);
m_best_split[code_state(v, remaining)] = best;
return best.first;
}
/**
* Generates all splits of given set of vertices and finds the best one.
*/
std::pair<Dist, TerminalsBitSet> best_split(const Vertex v,
const TerminalsBitSet remaining,
TerminalsBitSet subset, int k) {
if (k == (int)m_terminals.size()) {
TerminalsBitSet complement = remaining ^ subset;
if (!subset.none() && !complement.none()) {
Dist val =
connect_vertex(v, subset) + connect_vertex(v, complement);
return make_pair(val, subset);
} else {
return std::make_pair(-1, NULL);
}
} else {
std::pair<Dist, TerminalsBitSet> ret1, ret2;
ret1 = best_split(v, remaining, subset, k + 1);
if (remaining.test(k)) {
subset.flip(k);
ret2 = best_split(v, remaining, subset, k + 1);
if (ret1.first < 0 || ret1.first > ret2.first) {
ret1 = ret2;
}
}
return ret1;
}
}
/**
* Retrieves the path of the optimal solution returned by connect_vertex
* method.
*/
void retrieve_solution_connect(Vertex v, TerminalsBitSet remaining) {
if (remaining.none()) return;
Vertex next = m_best_cand.at(code_state(v, remaining)).second;
auto terminal_id_iter = m_elements_map.find(next);
if (v == next) { // called wagner directly from dreyfus
retrieve_solution_split(next, remaining);
} else if (terminal_id_iter == m_elements_map.end() // nonterminal
|| !remaining.test(terminal_id_iter->second)) { // terminal not in remaining
add_vertex_to_graph(next);
add_edge_to_graph(v, next);
retrieve_solution_split(next, remaining);
} else { // terminal
add_edge_to_graph(v, next);
remaining.flip(terminal_id_iter->second);
retrieve_solution_connect(next, remaining);
}
}
/**
* Retrieves the path of the optimal solution returned by split_vertex
* method.
*/
void retrieve_solution_split(Vertex v, TerminalsBitSet remaining) {
if (remaining.none()) return;
TerminalsBitSet split =
m_best_split.at(code_state(v, remaining)).second;
retrieve_solution_connect(v, split);
retrieve_solution_connect(v, remaining ^ split);
}
/**
* Codes current state to the structure that fits as the map key.
*/
State code_state(Vertex v, TerminalsBitSet remaining) {
// TODO: can be optimized
return std::make_pair(v, remaining);
}
/**
* Hash function for State, used in unordered_maps.
*/
struct state_hash {
std::size_t operator()(const State &k) const {
return boost::hash<Vertex>()(k.first) ^
(std::hash<TerminalsBitSet>()(k.second) << 1);
}
};
/**
* Adds the edge to the solution.
*/
void add_edge_to_graph(Vertex u, Vertex w) {
Edge e = std::make_pair(u, w);
m_edges.push_back(e);
}
/**
* Adds Steiner vertex to the solution.
*/
void add_vertex_to_graph(Vertex v) { m_steiner_elements.insert(v); }
/**
* Finds the index of the first nonempty bit in given mask.
*/
int smallest_bit(TerminalsBitSet mask) {
int k = 0;
while (!mask.test(k)) ++k;
return k;
}
const Metric &m_cost_map; // stores the cost for each edge
const Terminals &m_terminals; // terminals to be connected
const NonTerminals &m_non_terminals; // list of all non-terminals
Dist m_cost; // cost of optimal Steiner Tree
steiner_elements m_steiner_elements; // non-terminals selected for spanning
// tree
std::vector<Edge> m_edges; // edges spanning the component
std::unordered_map<Vertex, int, boost::hash<Vertex>> m_elements_map; // maps Vertex to position
// in m_terminals vector
using StateV = std::pair<Dist, Vertex>;
using StateBM = std::pair<Dist, TerminalsBitSet>;
std::unordered_map<State, StateV, state_hash> m_best_cand; // stores result
// of dreyfus
// method for
// given state
std::unordered_map<State, StateBM, state_hash> m_best_split; // stores
// result of
// wagner
// method for
// given state
};
/**
* @brief Creates a dreyfus_wagner object.
* @tparam TerminalsLimit
* @tparam Metric
* @tparam Terminals
* @tparam NonTerminals
*/
template <unsigned int TerminalsLimit = 32, typename Metric, typename Terminals, typename NonTerminals>
dreyfus_wagner<Metric, Terminals, NonTerminals, TerminalsLimit>
make_dreyfus_wagner(const Metric &metric, const Terminals &terminals,
const NonTerminals &non_terminals) {
return dreyfus_wagner<Metric, Terminals, NonTerminals, TerminalsLimit>(
metric, terminals, non_terminals);
}
} // paal
#endif // PAAL_DREYFUS_WAGNER_HPP
|
Q:
I have a client who keeps asking for quotations but never follows through
I'm fairly new to freelancing and have an issue that I'm not sure how to tackle.
I'm still struggling to get paid work so every potential job is very important, however I've had so many time wasters. One of whom has got in touch with me several times over the past few months, always asking for a quotation on a different project. She will only speak to me face-to-face and talks for ages, but never actually follows through and commissions me for any work.
She's got in touch yet again saying she wants to discuss an upcoming project with me. I'm starting to get fed up with wasting my time for no financial payoff but not sure what to say to her as I don't want to be rude/ruin my reputation, and part of me keeps thinking maybe she is serious this time.
Any advice much appreciated!
Thank you
A:
Something to consider: Charging a consultation fee then offering half or all of the fee as a credit when the contract is signed.
A:
This is something some people do. I don't know you, the client or anything about the situation so it's hard to tell but it is likely one of two scenarios.
Your client is indecisive and not very serious about her ideas. An idea pops in to her head and the first thing she does is arrange a meeting with you to run through the the project, get advice and gauge how viable the project is taking in to account costs and timescales etc.
or...
Your client has no intention of using you at all. I know people who will get quotes and ideas from cheaper and less experienced designers just so they can go to someone more experienced and say "hey, this person quoted me X amount" as a bargaining tool *.
In either case, it is not doing you any good.
Obviously there is no obligation to follow through with a quote and go ahead with the project but if someone is consistently asking for quotes, taking up face-to-face time and never following through with the project, that is wasting your time. Time is money, and you could spend that time better by looking for other work.
Be direct and explain the situation to this person. There's no need to be rude or too blunt about it but they may not realise they are doing anything wrong. If this person is a decent and reasonable person they will understand. Explain that you are not going to have face-to-face meetings unless they are serious about the project. If they want a meeting just to run through ideas and get your advice—charge for your time. That will end any time wasting (or you'll get paid for the time, so you win either way). If the client isn't understanding, they aren't worth having as a client.
* If you are on the other end of this, pay no attention. What you charge is what you charge. Some room for negotiation on price is fine, but not as a response to "this person does it cheaper".
A:
If I were you, I would deffinetely tell her that I'm working on another project and if she wants to discuss anything she'd have to first gather any materials relating to it and then in one single E-MAIL describe what she wants and send you those materials.
That will show that she is serious enough. Describe you EMAIL request with certain changes you've made to your work process and that now you gather all projects through e-mail so no details get lost in translation. (sorry for the long sentence) |
/* Copyright (C) 2021 SCARV project <<EMAIL>>
*
* Use of this source code is restricted per the MIT license, a copy of which
* can be found at https://opensource.org/licenses/MIT (or should be included
* as LICENSE.txt within the associated archive or repository).
*/
#include "ise_v1.h"
//
// Given rs1||rs2 = A,D|| B,C
// Compute the output values of A and D in the Quarter round
uint64_t chacha_ad_v1(uint64_t rs1, uint64_t rs2) {
uint32_t a = rs1 >> 32;
uint32_t b = rs2 >> 32;
uint32_t d = rs1 ;
uint32_t c = rs2 ;
uint32_t ia = a + b;
uint32_t id = ROL32((ia^d),16);
uint32_t ic = c +id;
uint32_t ib = ROL32((ic^b),12);
uint32_t na = ia+ib;
uint32_t nd = ROL32((id^na),8);
return ((uint64_t)na) << 32 | nd;
}
//
// Given rs1||rs2 = nA,nD|| B,C
// Compute the output values of B and C in the Quarter round
uint64_t chacha_bc_v1(uint64_t rs1, uint64_t rs2) {
uint32_t na = rs1 >> 32;
uint32_t b = rs2 >> 32;
uint32_t nd = rs1 ;
uint32_t c = rs2 ;
uint32_t id = ROL32(nd,24) ^ na;
uint32_t ic = c +id;
uint32_t ib = ROL32((b ^ic),12);
uint32_t nc = ic+nd;
uint32_t nb = ROL32((ib^nc),7);
return ((uint64_t)nb) << 32 | nc;
}
|
Strategies for Autonomous Sensor-Brain Interfaces for Closed-Loop Sensory Reanimation of Paralyzed Limbs. Copyright C © 2017 by the Congress of Neurological Surgeons T he dexterous hand is a defining feature of human existence. Evolved over tens of millions of years, modern humans are able to perform remarkable tasks with their hands. From typing hundreds of words per minute to playing Rachmaninoff s Piano Concerto No. 2, the dexterous hand defines us. Unfortunately, a number of maladies rob us of this defining human characteristic. In the most extreme case, paralyzed individuals lose communication between the brain and the periphery. This condition affects an estimated 5.4 million people, or 2% of the US population.1 At present, no effective treatment restores function to these individuals. Regaining hand function is a principal concern for paralyzed patients. Toward this aim, significant advances in motoror efferent braincomputer interface (BCI) systems have occurred in recent years. Efferent BCI systems extract movement-relevant information from electrocorticography (ECoG) or electroencephalography (EEG). These analogue signals are transformed into control commands to drive robotic arms2 or evoke muscle contractions in paralyzed limbs.3-8 In the later example, compound wrist flexion may be evoked by brain-controlled functional electrical stimulation of forearm flexors. Planned clinical trials aim to capitalize upon these scientific advances to test efferent BCI across a range of conditions and control routines. While these proof-of-principal systems are encouraging, a number of substantial hurdles remain. Perhaps the most pressing barrier to restoring dexterous hand movements is the lack of systems to restore somatosensory feedback. Even in the presence of intact descending motor systems, precise hand movements are abolished |
export class AddUser {
user_id:number
name:string
password:<PASSWORD>
nic:string
dob:string
gender:string
email:string
address:string
contact_number:string
user_type:string
}
|
<gh_stars>1-10
/*
* openTCS copyright information:
* Copyright (c) 2014 Fraunhofer IML
*
* This program is free software and subject to the MIT license. (For details,
* see the licensing information (LICENSE.txt) you should have received with
* this copy of the software.)
*/
package org.opentcs.guing.components.drawing.figures;
import org.opentcs.guing.model.elements.LinkModel;
import org.opentcs.guing.model.elements.LocationModel;
import org.opentcs.guing.model.elements.PathModel;
import org.opentcs.guing.model.elements.PointModel;
import org.opentcs.guing.model.elements.VehicleModel;
/**
*
* @author <NAME> (Fraunhofer IML)
*/
public interface FigureFactory {
PointFigure createPointFigure(PointModel model);
LabeledPointFigure createLabeledPointFigure(PointFigure figure);
LocationFigure createLocationFigure(LocationModel model);
LabeledLocationFigure createLabeledLocationFigure(LocationFigure figure);
PathConnection createPathConnection(PathModel model);
LinkConnection createLinkConnection(LinkModel model);
VehicleFigure createVehicleFigure(VehicleModel model);
OffsetFigure createOffsetFigure();
}
|
def start(
self,
workers=(),
port=None,
worker_start_delay=None,
panic_on_worker_lost=True,
heartbeat=None,
secret_file=None,
idle_timeout=None,
hw_interval=None,
):
print("Starting tako env in ", self.work_path)
port = port or self.default_listen_port
self.start_server(
port=port,
panic_on_worker_lost=panic_on_worker_lost,
secret_file=secret_file,
idle_timeout=idle_timeout,
)
it = 0
while check_free_port(port):
time.sleep(0.05)
self.check_running_processes()
it += 1
if it > 100:
raise Exception("Server not started after 5")
for cpus in workers:
self.start_worker(
cpus, port=port, heartbeat=heartbeat, hw_interval=hw_interval
)
if worker_start_delay:
time.sleep(worker_start_delay)
time.sleep(0.2)
self.check_running_processes()
return self.session() |
A Distributed Descriptor Characterizing Structural Irregularity of EEG Time Series for Epileptic Seizure Detection This paper presents a novel descriptor aiming at anomaly detection in sequential data, like epileptic seizure detection with EEG time series. The descriptor is derived from the eigenvalue decomposition (EVD) of a Hankel-form data matrix generated from the raw time series. Simulation trials imply that the descriptor is capable of characterizing the structural aspect of a time series. In addition, we deploy the proposed descriptor as a feature extractor and apply it on Bonn Seizure Database which is widely used in seizure detection. The high accuracies on classification problems are comparable with the state-of-the-art so validate the effectiveness of our method. |
from bisect import*;input();l,a=[],''
for c in[-ord(i)for i in input()]:
i=bisect_left(l,c);a+=str(i)
if i<len(l):l[i]=c
else:l+=c,
if len(l)<3:print('Yes');print(a)
else:print('No') |
/**
* Created by Yahosseini on 27.01.2017.
*/
public class Logger {
private static BufferedWriter movementWriter;
private static BufferedWriter structureWriter;
private static BufferedWriter participantWriter;
Logger(){
restartFiles(World.getWorld().getPathPrefix());
}
public void writeToStructureFile(String string) {
try {
structureWriter.write(string);
} catch (IOException e) {
e.printStackTrace();
}
}
public void flushStructureFile(){
try {
structureWriter.flush();
} catch (IOException e) {
e.printStackTrace();
}
}
public void writeToMovementFile(String string) {
try {
movementWriter.write(string);
} catch (IOException e) {
e.printStackTrace();
}
}
public void flushMovementFile(){
try {
movementWriter.flush();
} catch (IOException e) {
e.printStackTrace();
}
}
public void writeToParticipantFile(String string) {
try {
participantWriter.write(string);
} catch (IOException e) {
e.printStackTrace();
}
}
public void flushParticipantFile(){
try {
participantWriter.flush();
} catch (IOException e) {
e.printStackTrace();
}
}
public void restartFiles(String path){
String participantFilename = path+"participant.csv";
String movementFilename = path+"movement.csv";
String structureFilename = path+"structure.csv";
try {
participantWriter = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(participantFilename), "utf-8"));
movementWriter = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(movementFilename), "utf-8"));
structureWriter= new BufferedWriter(new OutputStreamWriter(new FileOutputStream(structureFilename), "utf-8"));
} catch (Exception e) {
e.printStackTrace();
}
}
} |
/* Status goes to Established. Send keepalive packet then make first
update information. */
int
bgp_establish (struct peer *peer)
{
struct bgp_notify *notify;
if (! CHECK_FLAG (peer->sflags, PEER_STATUS_CAPABILITY_OPEN))
SET_FLAG (peer->sflags, PEER_STATUS_CAPABILITY_OPEN);
notify = &peer->notify;
if (notify->data)
XFREE (MTYPE_TMP, notify->data);
memset (notify, 0, sizeof (struct bgp_notify));
peer->v_start = BGP_INIT_START_TIMER;
peer->established++;
fsm_change_status (peer, Established);
#ifdef HAVE_SNMP
bgpTrapEstablished (peer);
#endif
bgp_uptime_reset (peer);
if (peer->v_keepalive)
bgp_keepalive_send (peer);
bgp_announce_table (peer);
return 0;
} |
Effect of different fusion types on kinematics of midfoot lateral column: a comparative biomechanical study. Background This study aimed to compare the biomechanical outcomes of the isolated 4th or 5th tarsometatarsal (TMT) joint arthrodesis with the whole lateral TMT joints arthrodesis. Methods Ten cadaveric lower legs underwent isolated 4th TMT joint arthrodesis, 5th TMT joint arthrodesis, and whole lateral TMT joints arthrodesis in sequence. Texson F-scan and K-scanTM joint sensor were used to test the medial and lateral plantar pressure and the pressure of calcaneocuboid joint. Results Compared with the intact foot, the lateral forefoot pressure increased significantly (P<0.05) after 4th TMT joint fusion. The medial forefoot pressure was significantly lower in the 5th TMT joint fusion than that in the intact foot (P<0.05) and the 4th TMT joint fusion (P<0.05), but higher than that in the whole lateral TMT joints fusion (P<0.05). On the contrary, the lateral forefoot pressure was significantly higher in the 5th TMT joint fusion than that in the intact foot and the 4th TMT joint fusion, but lower than that in the whole lateral TMT joints fusion (P<0.05). The medial forefoot pressure was the lowest (P<0.05) and lateral forefoot pressure was the highest (P<0.05) in the whole lateral TMT joints fusion. The calcaneocuboid joint pressure increased respectively with the intact foot being the lowest, followed by the isolated 4th TMT joint arthrodesis, the isolated 5th TMT joint arthrodesis, and the whole lateral TMT joints arthrodesis (P<0.05). Conclusions The isolated 4th or 5th TMT joint arthrodesis has less impact on the pressure of forefoot and adjacent joints than the whole lateral TMT joints arthrodesis. The isolated 4th TMT joint arthrodesis has the lowest influence on the pressure of forefoot and adjacent joints. |
Red sorrel (Hibiscus Sabdariffa) prevents the ethanol-induced deficits of Purkinje cells in the cerebellum. OBJECTIVES The present study is aimed at investigating the possible protective effects of H. sabdariffa on ethanol-elicited deficits of motor coordination and estimated total number of the Purkinje cells of the cerebellums of adolescent male Wistar rats. METHODS Forty male Wistar rats aged 21 days were divided into five groups. Na/wtr group was given water orally and injected with normal saline intra peritoneally (ip). Eth/wtr group was given water orally and ethanol (ip). Another three experimental groups (Eth/Hsab) were given different dosages of H. sabdariffa and ethanol (ip). All groups were treated intermittently for the total period of treatment of two weeks. The motor coordination of rats was tested prior and subsequent to the treatments. The rats were euthanized, and their cerebellums were examined. The total number of Purkinje cells was estimated using physical fractionator method. RESULTS Upon revolving drum test, the number of falls of rats increased following ethanol treatment. There was no significant difference between the total number of falls prior and subsequent to treatment in all Eth/Hsab groups. The estimated total number of Purkinje cells in Eth/Hsab groups was higher than in Eth/wtr group. CONCLUSION H. sabdariffa may prevent the ethanol-induced deficits of motor coordination and estimated total number of Purkinje cells of the cerebellums in adolescent rats (Tab. 3, Fig. 1, Ref. 42). |
<reponame>mayyamus/drill
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.drill.common.scanner.persistence;
import java.lang.reflect.Array;
import java.util.List;
import java.util.Map;
import org.apache.drill.common.exceptions.DrillRuntimeException;
import com.fasterxml.jackson.annotation.JsonCreator;
import com.fasterxml.jackson.annotation.JsonIgnore;
import com.fasterxml.jackson.annotation.JsonProperty;
/**
* a class fields
*/
public final class FieldDescriptor {
private final String name;
private final String descriptor;
private final List<AnnotationDescriptor> annotations;
private final Map<String, AnnotationDescriptor> annotationMap;
@JsonCreator public FieldDescriptor(
@JsonProperty("name") String name,
@JsonProperty("descriptor") String descriptor,
@JsonProperty("annotations") List<AnnotationDescriptor> annotations) {
this.name = name;
this.descriptor = descriptor;
this.annotations = annotations;
this.annotationMap = AnnotationDescriptor.buildAnnotationsMap(annotations);
// validate the descriptor
getType();
}
public String getName() {
return name;
}
/**
* @return the descriptor of the type of the field as defined in the bytecode
*/
public String getDescriptor() {
return descriptor;
}
public List<AnnotationDescriptor> getAnnotations() {
return annotations;
}
public AnnotationDescriptor getAnnotation(Class<?> clazz) {
return annotationMap.get(clazz.getName());
}
public <T> T getAnnotationProxy(Class<T> clazz) {
final AnnotationDescriptor annotationDescriptor = getAnnotation(clazz);
if (annotationDescriptor == null) {
return null;
}
return annotationDescriptor.getProxy(clazz);
}
@JsonIgnore
public TypeDescriptor getType() {
int arrayDim = 0;
char c;
while ((c = descriptor.charAt(arrayDim)) == '[') {
++arrayDim;
}
if (c == 'L') {
int lastIndex = descriptor.length() - 1;
if (descriptor.charAt(lastIndex) != ';') {
throw new DrillRuntimeException("Illegal descriptor: " + descriptor);
}
String className = descriptor.substring(arrayDim + 1, lastIndex).replace('/', '.');
return TypeDescriptor.forClass(className, arrayDim);
} else {
return TypeDescriptor.forPrimitive(c, arrayDim);
}
}
@JsonIgnore
public Class<?> getFieldClass() {
TypeDescriptor type = getType();
Class<?> elementClass = type.getType();
if (type.isArray()) {
return Array.newInstance(elementClass, new int[type.getArrayDim()]).getClass();
} else {
return elementClass;
}
}
@Override
public String toString() {
return "Field[name=" + name + ", descriptor=" + descriptor + ", annotations=" + annotations + "]";
}
} |
When Paul Heckingbottom took the reins a month ago, the top six looked some way off for Hibs.
Languishing in eighth place, five points adrift of sixth-place St Johnstone and a point beneath on-form Motherwell with just eight games to play before the split, the Edinburgh side seemed likely to be playing out the campaign in the bottom six.
Heckingbottom’s swift impact, however, has led Hibs to a position whereby, in just his fifth league game in charge, they can take a huge step towards securing their place among the top six. An impressive return of ten points from a possible 12 in the Yorkshireman’s opening four matches in charge has already allowed the Hibees to leapfrog both Motherwell and St Johnstone and, temporarily at least, take hold of sixth place. With a two-point advantage over the seventh-place Lanarkshire side, this weekend’s meeting between the two teams at Easter Road marks an opportunity for Hibs to turn the screw in what appears to be a four-way battle for one remaining top-six berth, assuming the top five have already done enough to make the cut.
Here we take a look at the prospects of the four teams scrapping it out for that final place among the big boys.
The Easter Road side have to be viewed as favourites to keep hold of their top-six berth until the split. In addition to a two-point advantage over Motherwell, a four-point lead over St Johnstone and a five-point gap to Livingston, they also possess momentum and a general sense of renewed harmony following the tumultuous ending to Neil Lennon’s reign as manager. Their four remaining pre-split fixtures don’t look particularly straightforward but neither should they be viewed as overly daunting. Faced with Motherwell at home, Livingston away, Kilmarnock at home and Hearts away, Hibs clearly still have plenty work to do to ensure they are in the top six. Having enjoyed a nine-point swing over St Johnstone in the last four games, the Easter Road side must be mindful of the possibility that it can just as quickly go back the other way if they start spilling points over the next few campaign-defining weeks. All four of the sides they still have to face are currently either fighting for the top six or a European spot so are unlikely to be in end-of-season holiday mode. Much will depend on how this weekend’s match goes. If they can avoid defeat against rampant Motherwell, they will remain in the driving seat with three games to go and will be entitled to feel that they are closing in on the top six. If, however, they suffer a first league defeat under Heckingbottom and are simultaneously overtaken by Well, then suddenly those last three matches will become a lot more pressure-filled and hazardous-looking. Ideally, Hibs don’t want to be concluding their pre-split fixtures at Tynecastle, where they haven’t won for six years, in need of a result to remain in the top six. Victory over Motherwell this weekend would certainly make the home straight appear a whole lot more negotiable for Heckingbottom’s team.
While Hibs have been in good form under Heckingbottom over the past month, Motherwell have been excelling since the turn of the year, with seven wins from their last nine league games propelling them into the mid-table mix. Their only league defeat this year has come at Celtic Park. Ordinarily, Stephen Robinson’s on-form side would be favourites to kick on and take the final top-six berth, even allowing for the fact they are two points below Hibs. The problem for the Fir Park side, however, is that they have probably the most difficult run-in of the four teams involved. With Hibs away, St Johnstone at home, Aberdeen away and Rangers at home, Robinson will require some serious heroics from his players over the coming weeks if they are to maintain their excellent form and clinch an unlikely top-six berth. Even if they damage their two main rivals by picking up results in their next two games - which is well within their capabilities - they would probably still require a decent haul from their last two games against the Dons and the Ibrox side in order to get over the line. It looks a tall order for the Lanarkshire side.
Saints will be kicking themselves over how they have allowed themselves to fall away over the past month and a half. After defeating Livingston 1-0 on January 23 – the night of Lennon’s last game in charge of Hibs – the Perth side sat fifth in the Premiership, seven points clear of the bottom six with a game in hand. Since then, however, they have collected only one point from eight league games and now find their top-six bid hanging by a thread. Although four points adrift of Hibs and completely shorn of form, Tommy Wright can take some solace from the fact Saints have the most favourable run of fixtures out of the four teams. They have a clear chance to get back on track when they host bottom-of-the-table St Mirren on Saturday. Given that St Johnstone have a habit of winning – and losing – in spurts under Wright, if they win this weekend and restore some confidence, they will feel it is within their grasp to take a significant points haul from a three-game finale in which they visit Motherwell, host Dundee and travel to Kilmarnock. Victory over St Mirren is imperative to their hopes, though.
Gary Holt’s team are probably only in contention in mathematical terms. Realistically, they look destined to remain in the bottom six. While wiping out a five-point deficit and overtaking three teams in the space of just four games would be a tall order in any circumstances, Livingston’s plight is exacerbated by the fact they must face two of the top three in their closing pre-split matches. After a poor run of form through the winter, they have given themselves a glimmer of hope by winning two of their last three games. With a trip to Aberdeen this weekend followed by home games against Hibs and Hamilton Accies and then a visit to Celtic Park, it would go down as a footballing miracle if Livingston find themselves in with the big boys in a month’s time. |
export const MIN_STATISTIC_DATE = new Date(2022, 0, 1, 0, 0, 0, 0);
|
<filename>adaptors/common/indicator-buffer.cpp
/*
* Copyright (c) 2014 Samsung Electronics Co., Ltd.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
// CLASS HEADER
#include "indicator-buffer.h"
namespace Dali
{
namespace Internal
{
namespace Adaptor
{
IndicatorBuffer::IndicatorBuffer( Adaptor* adaptor, unsigned int width, unsigned int height, Pixel::Format pixelFormat )
: mAdaptor(adaptor),
mImageWidth(width),
mImageHeight(height),
mPixelFormat(pixelFormat)
{
DALI_ASSERT_ALWAYS( adaptor );
// Use BitmapImage when SharedGlBuffer extension is unavailable
mBitmapBuffer = new NativeBitmapBuffer( adaptor, mImageWidth, mImageHeight, mPixelFormat );
mNativeImage = mBitmapBuffer;
}
bool IndicatorBuffer::UpdatePixels( const unsigned char *src, size_t size )
{
// Use double buffered bitmap when SharedGlBuffer extension is unavailable
mBitmapBuffer->Write( src, size );
return true;
}
NativeImageInterface& IndicatorBuffer::GetNativeImage() const
{
DALI_ASSERT_DEBUG(mNativeImage.Get());
return *mNativeImage;
}
void IndicatorBuffer::SetAdaptor( Adaptor* adaptor )
{
mAdaptor = adaptor;
}
} // Adaptor
} // Internal
} // Dali
|
/**
* An entry that is consumed by an {@link EntryProcessor}. The updates to the entry are replayed
* on the cache when the processor completes.
*
* @author ben.manes@gmail.com (Ben Manes)
*/
public final class EntryProcessorEntry<K, V> implements MutableEntry<K, V> {
private final K key;
private V value;
private Action action;
private Optional<CacheLoader<K, V>> cacheLoader;
public EntryProcessorEntry(K key, @Nullable V value, Optional<CacheLoader<K, V>> cacheLoader) {
this.cacheLoader = cacheLoader;
this.action = Action.NONE;
this.value = value;
this.key = key;
}
@Override
public boolean exists() {
return (getValue() != null);
}
@Override
public K getKey() {
return key;
}
@Override
public V getValue() {
if (action != Action.NONE) {
return value;
} else if (value != null) {
action = Action.READ;
} else if (cacheLoader.isPresent()) {
value = cacheLoader.get().load(key);
cacheLoader = Optional.empty();
if (value != null) {
action = Action.LOADED;
}
}
return value;
}
@Override
public void remove() {
action = (action == Action.CREATED) ? Action.NONE : Action.DELETED;
value = null;
}
@Override
public void setValue(V value) {
requireNonNull(value);
if ((action != Action.CREATED) && (action != Action.LOADED)) {
action = exists() ? Action.UPDATED : Action.CREATED;
}
this.value = value;
}
/** @return the dominant action performed by the processor on the entry. */
public Action getAction() {
return action;
}
@Override
public <T> T unwrap(Class<T> clazz) {
if (!clazz.isInstance(this)) {
throw new IllegalArgumentException("Class " + clazz + " is unknown to this implementation");
}
@SuppressWarnings("unchecked")
T castedEntry = (T) this;
return castedEntry;
}
@Override
public boolean equals(Object o) {
if (!(o instanceof Cache.Entry<?, ?>)) {
return false;
}
Cache.Entry<?, ?> entry = (Cache.Entry<?, ?>) o;
return Objects.equals(key, entry.getKey())
&& Objects.equals(getValue(), entry.getValue());
}
@Override
public int hashCode() {
return (key == null ? 0 : key.hashCode()) ^ (getValue() == null ? 0 : value.hashCode());
}
@Override
public String toString() {
return key + "=" + getValue();
}
} |
Aydın
Etymology
After the first capture of the city by the Turks under the emirate (Beylik) of Menteşe, whose lands extended towards the south, who named it for a first period as Güzelhisar, literally "the beautiful castle" (sometimes rendered as Guzel Hissar). The city was later taken over by Turks of the Aydinids, whose lands extended towards the north, who named it after Aydinid dynasty. "Aydın" meant "lucid, enlightened" in Turkish and in a distinct evolution of the term, came to mean "lettered, educated, intellectual" in modern Turkish. It is still a popular male name.
In ancient Greek sources, the name of the city is given as Anthea (Ανθέα) and Euanthia (Ευανθία). During the Seleucid period, it received the name Antiochia (Greek: Αντιόχεια). At other times it was also called Seleucia ad Maeandrum (Σελεύκεια επί του Μαιάνδρου) and Erynina (Ερυνίνα). In Roman and Byzantine times, it was known as Tralles (in Latin) or Tralleis (Τραλλεῖς in Ancient Greek), and was one of the largest Aegean cities in antiquity. There is some indication that it once bore the name Charax (Χάραξ), but that name may have belonged to Acharaca.
Nevertheless, the name Güzelhisar was used throughout the early centuries of the Ottoman administration as well, often recorded in adjectival form, as "Güzelhisar of Aydın (lands)", but the name Aydın was increasingly preferred. This previous Turkish name also found its way into the international trade vocabulary until at least the end of the 18th century and its modified forms Joselassar and even Joseph Lasat were used to describe a fine type of cotton produced in this same region and much sought after.
Antiquity
According to Strabo Tralles was founded by the Argives and Trallians. Along with the rest of Lydia, the city fell to the Persian Empire. After its success against Athens in the Peloponnesian War, Sparta unsuccessfully sought to take the city from the Persians, but in 334 BC, Tralles surrendered to Alexander the Great without resistance and therefore was not sacked. Alexander's general Antigonus held the city from 313 to 301 BC and later the Seleucids held the city until 190 BC when it fell to Pergamon. From 133 to 129 BC, the city supported Aristonicus of Pergamon, a pretender to the Pergamene throne, against the Romans. After the Romans defeated him, they revoked the city's right to mint coins.
Tralles was a conventus for a time under the Roman Republic, but Ephesus later took over that position. The city was taken by rebels during the Mithridatic War during which many Roman inhabitants were killed. Tralles suffered greatly from an earthquake in 26 BC. Augustus provided funds for its reconstruction after which the city thanked him by renaming itself Caesarea.
Strabo describes the city as a prosperous trading center, listing famous residents of the city, including Pythodoros (native of Nysa), and orators Damasus Scombrus and Dionysocles. Several centuries later, Anthemius of Tralles, architect of the Hagia Sophia in Constantinople, was born in Tralles.
Christianity and Byzantine era
An early bishop Polybius (fl. ca. 105) is attested by a letter from Saint Ignatius of Antioch to the church at Tralles. The city was officially Christianized, along with the rest of Caria, early after the conversion of Constantine, at which time the see was confirmed. Among the recorded bishops are: Heracleon (431), Maximus (451), Uranius (553), Myron (692), Theophylactus (787), Theophanes and Theopistus both ninth century, and John (1230). The Catholic Church includes this bishopric in its list of titular sees as Tralles in Asia, distinguishing it from the see of Tralles in Lydia. It has appointed no new titular bishop to these Eastern sees since the Second Vatican Council.
After the Battle of Manzikert in 1071, with the Byzantine Empire was in civil chaos, the Seljuks took Tralles for the first time but Alexios I Komnenos re-captured the city for Byzantium in the later half of the eleventh century.
By the 13th century, the city lay in ruins. In 1278, Andronikos II Palaiologos decided to rebuild and repopulate it, now to be renamed Andronikopolis or Palaiologopolis, with the aim of forming a bulwark against Turkish encroachment in the area. The megas domestikos Michael Tarchaneiotes was given the task: he rebuilt the walls and settled 36,000 people from the surrounding regions. 13th century Byzantine settlement policy along the Meander Valley notably involved the Turkic Cumans. Nevertheless, Turkish attacks resumed soon after. The city was besieged and, lacking sufficient supplies and access to water, captured by the beylik of Menteshe in 1284. The city suffered extensive destruction and part of its inhabitants were massacred. Moreover, over 20,000 inhabitants were sold off as slaves.
Turkish era
Under the rule of Menteshe, whose lands extended towards the south, the city was renamed as Güzelhisar ("beautiful castle"). The city was later taken over by the Aydinids, who made it one of their principal settlements, but not the capital.
The Beylik of Aydin was founded in the region in 1307 and they ruled the lands north of Büyük Menderes River up to and including İzmir. During the first half of the 14th century, Aydinids were as active as the Ottomans, if not more, in pressuring the islands and the lands west of Anatolia, and they caused much hardship for the Byzantine and Latin dependencies of the Aegean Sea and mainland Greece. The principality was taken over by the rising Ottoman Empire, for the first time shortly before the Battle of Ankara between the Ottomans and Tamerlane in 1402, and then finally in 1425, Tamerlane having given back the province to the sons of Aydın in the interval.
Aydın became part of Anatolia Province of the Ottoman Empire and this until 1827, when it became the seat of its own eyalet under its own name, constituted among other reasons to respond to the prevalent unrest in the region, as exemplified by Atçalı Kel Mehmet Rebellion (1829–1830). The seat was moved to İzmir in the 1840s and with the abolition of eyalets under the administrative reforms of 1864, Aydın became a sanjak (subprovince) of the vilayet of the same name, with its seat still in İzmir, which had outgrown Aydın city in size as it became a booming port of international trade.
In the 19th century Aydın continued to benefit from its location at the center of the fertile Menderes valley, and its population grew. At that time, besides figs and olive oil, which were the traditional crops of the region, cotton also grew in importance, with many European investors seeking alternative sources of cotton at the time of the American Civil War.
Construction of İzmir-Aydın Railway
The first railroad commenced in the Ottoman Empire and the first finished within the present-day territory of Turkey was built by the British Levant Company connecting Aydın to Smyrna (now İzmir). The 130 km (81 mi) line was started in 1856 and finished in ten years. The line fundamentally changed Aydın region's economy. The railway station built at the time remains an impressive structure in the city of Aydın.
The Greek Occupation of Aydın
During the Greco-Turkish War (1919-1922), violent fighting took place in and around Aydın [Αϊδίνιο], especially in the beginning phase of the war, during the Battle of Aydın between 27 June and 4 July 1919. The civilian population of the city, principally Turkish as well as Greek, suffered heavy casualties. Neither could the city's Jewish population, 3,500-strong in 1917 go unscathed.
The "efe" resistance
Aydın remained in ruins until it was re-captured by the Turkish army on 7 September 1922. Resistance warriors such as the efe Yörük Ali, who were based in the surrounding mountains and conducted a guerrilla warfare against the Greek army, became heroes in Turkey. Following the war and the foundation of the Republic of Turkey the Greeks of Aydın were exchanged with Muslims living in Greece under the 1923 agreement for the Population exchange between Greece and Turkey.
Economy
In the 1920s, Aydın was noted for its cotton and grain production.
There are many olive trees, are located in Aydın. Some citizens produced olive oil. There are many small-scale firm which exports olive oil to different countries.
Modern Aydın
Recent decades have seen Aydın going beyond its traditional role as a hub for agricultural products, and developing a diversified economy increasingly based on services. One event in this process was the opening in 1992 of Adnan Menderes University, named after a favorite son of Efeler, Aydın Adnan Menderes, Turkey's prime minister during the 1950s. The pace of the economy is determined by the city's location, at only an hour's drive from the seashore. Many residents of Aydın typically have summer houses and investments in or around such centers of tourism as Kuşadası, Güzelçamlı and Didim.
But still the city has a quiet country market town feel to it and its dominance, within both the Turkish market and abroad, in the production of a number of agricultural products, particularly figs, still identifies Aydın Province, and most of this trade is managed and handled from Aydın itself.
Aydın city centre is still relatively small but growing, centred on one palm-lined avenue of shops and cafes, and a maze of narrow side streets, dotted with orange trees. The people more family-oriented, so there is little night life, or cultural amenities for young people, although presumably now they have a university this will change. There are a number of mosques, high schools, dersane (private courses cramming students for the university entrance exams) and other public buildings. Like all Turkish cities Aydın is now spreading as the middle-classes are leaving their flats in the city for smarter apartments or houses slightly out of town.
Transport
The construction of the six-lane İzmir-Aydın motorway shortened the journey from Aydın to İzmir, Turkey's second portuary center, to less than an hour, and less still to the international Adnan Menderes Airport. |
/**
* Class to wait some time while some condition is <b>true</b>
*/
public class NotificationTimeoutWaiter {
private final long timeoutDuration;
private final long retryDelay;
/**
* If greater then 0 and {@code intermediateReporter} is set in {@link #start(Supplier, Function, Consumer)} -
* call consumer every {@code intermediateReportDelay} msec during execution.
*/
private final long intermediateReportDelay;
private long lastDuration = -1;
private long currentDuration = -1;
/**
* @param timeoutDurationMsec total time to wait
* @param retryDelayMsec delay after which to retry
*/
public NotificationTimeoutWaiter(long timeoutDurationMsec, long retryDelayMsec) {
this.timeoutDuration = timeoutDurationMsec;
this.retryDelay = retryDelayMsec;
this.intermediateReportDelay = -1;
}
/**
*
* @param timeoutDurationMsec total time to wait
* @param retryDelayMsec delay after which to retry
* @param intermediateReportDelayMsec make intermediate reports every period of the time
*/
public NotificationTimeoutWaiter(long timeoutDurationMsec, long retryDelayMsec, long intermediateReportDelayMsec) {
this.timeoutDuration = timeoutDurationMsec;
this.retryDelay = retryDelayMsec;
this.intermediateReportDelay = intermediateReportDelayMsec;
}
/**
* Block current thread until {@code exitCondition} is <b>true</b>, but not longer than {@link #timeoutDuration}
* @param executeAction action to perform every time (at the beginning and after every {@link #retryDelay}
* @param exitCondition if returns <b>true</b> - exit the function. The function accepts the last returned value
* from {@code executeAction}
* @param intermediateReporter consumer which accepts the last obtained result from {@code executeAction} and
* prints makes some intermediate job every {@link #intermediateReportDelay} time.
* @param <T> type of the value {@code executeAction} returns.
* @return the last value from {@code executeAction}
* @throws InterruptedException
*/
public <T> T start(Supplier<T> executeAction, Function<T, Boolean> exitCondition,
@Nullable Consumer<T> intermediateReporter) throws InterruptedException {
final long startTime = currentTimeMillis();
lastDuration = -1;
currentDuration = -1;
long lastIntermediateReportTime = startTime;
T res;
while (true) {
res = executeAction.get();
if (exitCondition.apply(res)) {
break;
}
long currentTime = currentTimeMillis();
if (intermediateReportDelay > 0 && (currentTime - lastIntermediateReportTime) >= intermediateReportDelay
&& intermediateReporter != null) {
lastIntermediateReportTime = currentTime;
intermediateReporter.accept(res);
}
Thread.sleep(retryDelay);
currentDuration = currentTimeMillis() - startTime;
if(currentDuration > timeoutDuration) {
break;
}
}
lastDuration = currentDuration;
return res;
}
public <T> T start(Supplier<T> executeAction, Function<T, Boolean> exitCondition) throws InterruptedException {
return start(executeAction, exitCondition, null);
}
public long getTimeoutDuration() {
return timeoutDuration;
}
/**
* Complete duration after {@code #start()} method completed. Before start and during execution the value is -1.
* After complete this value is equal to {@link #currentDuration}.
*
* The value might be a bit bigger then {@link #timeoutDuration}.
*
* @return the time duration (in msec) last {@link #start(Supplier, Function)} call took.
*/
public long getLastDuration() {
return lastDuration;
}
/**
* Current duration during {@code #start()} method execution. Before start the value is -1, during execution the
* value grows to up to {@link #timeoutDuration}. After completion the value equals to {@link #lastDuration}.
* @return the time current execution is lasting.
*/
public long getCurrentDuration() {
return currentDuration;
}
} |
“It’s the Islamic version of the ‘The Price is Right,’ ” said the studio manager, standing behind a camera.
Mr. Hussain, 41, is a broadcasting sensation in Pakistan. His marathon transmissions during the recent holy month of Ramadan — 11 hours a day, for 30 days straight — offered viewers a kaleidoscopic mix of prayer, preaching, game shows and cookery, and won record ratings for his channel, Geo Entertainment.
“This is not just a religious show; we want to entertain people through Islam,” Mr. Hussain said during a backstage interview, serving up a chicken dish he had prepared on the show. “And the people love it.”
Yet Mr. Hussain is also a deeply contentious figure, accused of using his television pulpit to promote hate speech and crackpot conspiracy theories. He once derided a video showing Taliban fighters flogging a young woman as an “international conspiracy.” He supported calls to kill the author Salman Rushdie.
Most controversially, in 2008 he hosted a show in which Muslim clerics declared that members of the Ahmadi community, a vulnerable religious minority, were “deserving of death.” Forty-eight hours later, two Ahmadi leaders, one of them an American citizen, had been shot dead in Punjab and Sindh Provinces.
Many media critics held Mr. Hussain partly responsible, and the show so appalled American diplomats that they urged the State Department to sever a lucrative contract with Geo, which they accused of “specifically targeting” Ahmadis, according to a November 2008 cable published by WikiLeaks.
Now, Mr. Hussain casts himself as a repentant sinner. In his first Ramadan broadcast, he declared that Ahmadis had an “equal right to freedom” and issued a broad apology for “anything I had said or done.” In interviews, prompted by his own management, he portrays himself as a torchbearer for progressive values.
Advertisement Continue reading the main story
“Islam is a religion of harmony, love and peace,” he said, as he waited to have his makeup refreshed. “But tolerance is the main thing.”
IN some ways, Mr. Hussain is emblematic of the cable television revolution that has shaped public discourse in Pakistan over the past decade. He was the face of Geo when the upstart, Urdu-language station began broadcasting from a five-star hotel in Karachi in 2002. Then he went political, winning a parliamentary seat in elections late that year. The station gave him a religious chat show, Aalim Online, which brought together Sunni and Shiite clerics. The show received a broad welcome in a society troubled by sectarian tensions; it also brought Mr. Hussain to the attention of the military leader Gen. Pervez Musharraf, who was reportedly touched by its content. In 2005, General Musharraf appointed him junior minister for religious affairs, a post he held for two years.
Mr. Hussain’s success, with his manic energy and quick-fire smile, is rooted in his folksy broadcasting style, described as charming by fans and oily by critics. By his own admission, he has little formal religious training, apart from a mail-order doctorate in Islamic studies he obtained from an online Spanish university in order to qualify for election in 2002.
“I have the experience of thousands of clerics; in my mind there are thousands of answers,” he said.
Newsletter Sign Up Continue reading the main story Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. You must select a newsletter to subscribe to. Sign Up You will receive emails containing news content , updates and promotions from The New York Times. You may opt-out at any time. You agree to receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing. An error has occurred. Please try again later. View all New York Times newsletters.
That pious image was dented in 2011 when embarrassing outtakes from his show, leaked on YouTube, showed him swearing like a sailor during the breaks and making crude jokes with chuckling clerics. “It was my lighter side,” Mr. Hussain said. (Previously, he had claimed the tapes were doctored.)
But that episode did little to hurt his appeal to the middle-class Pakistanis who form his core audience. “Aamir Liaquat is a warm, honest and soft-natured person,” said Shahida Rao, a veiled Karachi resident, as she entered a recent broadcast, accompanied by her 6-year-old grandson. “We like him a lot.”
Senior colleagues at Geo are less enthusiastic. After an accumulation of controversies, including the Ahmadi show and on-air criticism of sex education material in school textbooks, he left the station in 2010. But Geo struggled to find a replacement and last June brought him back, causing consternation among senior anchors and managers, several of whom threatened to resign, senior executives said.
“It created a lot of noise,” said one, speaking on the condition of anonymity. “Many of us wanted to know what he was coming back as.”
The answers were provided by the network’s chief executive, Mir Ibrahim Rahman, a 34-year-old Harvard graduate who argues that Pakistan needs people like Mr. Hussain, who hold water with Islamic conservatives, to incrementally change society.
Advertisement Continue reading the main story
“We are still recovering from the Zia years; we can’t move too fast,” Mr. Rahman said, referring to the excesses of the Islamist dictator Gen. Mohammad Zia ul-Haq in the 1980s. “We need people like him to ease us down the mountain.”
To placate internal critics, Geo has just published a code of conduct for its journalists. “We’ve taken stock of the excesses that have been committed,” said the channel’s president, Imran Aslam, referring to a variety of controversies involving the station. “It’s an important start.”
But commercial imperatives also loom large, and in that arena, Mr. Hussain’s value is unquestioned.
COMPETITION for ratings at Ramadan is fierce among Pakistan’s television stations, and this year the race had a feverish feel. One station hired Veena Malik, a racy actress better known for posing seminude for an Indian magazine, to present its religious programs. One of her shows featured a live exorcism of a supernatural spirit that, conveniently enough, had called the station by telephone. Another station broadcast the conversion of a Hindu boy to Islam, drawing wide criticism.
By contrast, Mr. Hussain’s show seemed a model of restraint, though the set’s extravagance may have suggested otherwise.
The centerpiece was a giant boat that represented Noah’s Ark, but closely resembled a craft from the “Pirates of the Caribbean” movie franchise. Live animals wandered the set, including flamingos, peacocks and deer. Studio guests included Abdul Qadeer Khan, the father of Pakistan’s nuclear weapon program, and Imran Khan, the cricketer-turned-conservative politician. Ratings peaked on Aug. 12 when the studio moved to a cavernous exhibition hall that held 30,000 people — the largest studio audience in Pakistan’s history, executives said.
Mr. Hussain, unsurprisingly, has become rich.
Although his salary is a closely guarded secret, Geo sources said top names can earn $30,000 a month — income that, in Mr. Hussain’s case, is increased by lucrative product sponsorship deals, his clothing line and by leading religious pilgrimages to Saudi Arabia.
He keeps tight security, including bodyguards and an armored vehicle, since his acrimonious departure from the Muttahida Qaumi Movement, a political party at the center of Karachi’s often violent power struggles, in 2008. A senior party official said Mr. Hussain had “nothing to fear” from the party.
Mr. Hussain hopes to shrug controversy off in his latest incarnation. “Even the liberals will love me,” he said, a touch optimistically. He has even developed a soft spot for the United States, the bête noir of Pakistani conservatives. After a family vacation in New York last year, he returned with a honey sauce that he uses during his cooking broadcasts.
Advertisement Continue reading the main story
“I call it my Manhattan sauce,” he said. |
<reponame>GodKkkkk/gulimall
package xyz.tiancaikai.gulimall.order.dao;
import xyz.tiancaikai.gulimall.order.entity.OrderSettingEntity;
import com.baomidou.mybatisplus.core.mapper.BaseMapper;
import org.apache.ibatis.annotations.Mapper;
/**
* 订单配置信息
*
* @author tiancaikai
* @email <EMAIL>
* @date 2020-09-02 14:49:22
*/
@Mapper
public interface OrderSettingDao extends BaseMapper<OrderSettingEntity> {
}
|
#pragma once
namespace putils {
template<typename T>
T clamp(T val, T min, T max) {
val = std::max(min, val);
val = std::min(max, val);
return val;
}
} |
Putative Degradation of Non-Stored Sperm in the Female Reproductive Tract of the Dengue Vector Mosquito Aedes aegypti In insect vectors of disease, male and female molecules that mediate reproductive processes are promising targets to suppress fertility of these populations. One process, the storage of sperm in the female reproductive tract, is essential for optimal fertility in all organisms examined to date. In the dengue vector mosquito Aedes aegypti, female sperm storage has not been fully characterized, a requirement to identify sex-specific molecules that mediate this process. Aedes aegypti males deposit the ejaculate into the bursa of the female reproductive tract, and sperm enter the spermathecaethe long-term storage sitesquickly after insemination. However, the proportion of sperm received during mating that are stored in the spermathecae is unclear, and the fate of non-stored sperm unknown. We quantified sperm storage in two Ae. aegypti strains, mated in all combinations, and in two contexts (mass mated and when mating was observed) at 1-, 3- and 5-days post-mating. Sperm quantity in the spermathecae was similar at all timepoints; most females stored ~400 sperm on average. Sperm that did not enter the spermathecae remained in the bursa, where they declined in number and became more fragile to mechanical manipulation at each timepoint. Further, sperm viability in the bursa fell from 91.6% shortly after mating to 12.2% 24 h later. One day after insemination, ~50% of sperm detected in the female reproductive tract was stored in the spermathecae. When we quantified sperm storage in females mated to males that transferred reduced ejaculate quantities (but still able to induce optimal fertility in their mates), sperm detected in the spermathecae similarly declined; females stored ~50% of the sperm received even as sperm quantities transferred at mating declined. Our results suggest that sperm storage in Ae. aegypti females is influenced by ejaculate volume, and that sperm that do not enter the spermathecae remain in the bursa, where they appear to degrade. The consistent presence of sperm in the bursa, even when males transferred low sperm quantities, suggests that the putative degradation of bursa sperm may play a role in Ae. aegypti female fertility, potentially identifying a novel process in this important vector species. |
Farm waters run deep: a coupled positive multi-attribute utility programming and computable general equilibrium model to assess the economy-wide impacts of water buyback Little is known about the economy-wide repercussions of water buyback, which may include relevant feedbacks on the output of economic sectors at a regional and supra-regional scale. Limited studies available rely on stand-alone Computable General Equilibrium (CGE) models that represent competition for water explicitly, but this approach presents significant data and methodological challenges in areas where mature water markets are not in place the case of most regions worldwide. To bridge this gap, this paper couples a microeconomic Positive Multi-Attribute Utility Programming (PMAUP) model that elicits the value and price share to water with a macroeconomic, regionally-calibrated CGE model for Spain. Methods are illustrated with a case study in the Murcia Region in southeastern Spain. Economy-wide feedbacks amplify income losses in Murcia's agriculture from −20.5% in the PMAUP model up to −33% in the coupled PMAUP-CGE model. Compensations paid to irrigators enhance demand in the region, but supply contraction in agriculture and related sectors lead to overall GDP losses (up to −2.1%) in most scenarios. The supply gap is partially filled in by other Spanish regions, which experience a GDP gain through a substitution effect (up to +.034%). In all scenarios, aggregate GDP for Spain decreases (up to −.023%). Introduction Water institutions are increasingly reliant on the reacquisition or buyback of water rights to restore the balance in overexploited basins. Buyback programmes are operated through purchase tenders that compensate farmers who choose to relinquish their rights to withdraw water, complemented with flanking measures to address negative feedbacks on agriculture and related economic sectors at a regional and supra-regional scale (DSEWPAC, 2016;GRBA, 2008;Hanak and Stryjewski, 2012). An expanding research analyses the interaction between user-level choices and tender design to limit information rents and prevent overcompensation (;;;). Less is known, however, about the economy-wide impacts of buyback -despite the large amount of resources committed to mitigate them. For example, the buyback programme of the Upper Guadiana River Basin in Spain projected an investment of EUR 3 billion along a 20-year transition period, of which only 33% addressed purchase tenders directly; while the remaining 67% envisaged flanking measures to compensate for negative feedbacks, including subsidies for economic diversification and new transportation, communication and energy infrastructures. In Australia's Murray-Darling Basin, an investment of AUD 3.1 billion for the reacquisition of 1500 million m 3 from irrigators was complemented with an irrigation modernization programme worth AUD 7.36 billion aiming to i) compensate for negative feedbacks through enhanced productivity and ii) limit water use by another 1900 million m 3 (Department of the Environment, 2015; DSEWPAC, 2016), although the achievement of the latter target has been questioned (Australian Parliament, 2017). Research available on the topic relies on theoretical models (), or Computable General Equilibrium (CGE) models applied to the Australian case. Dixon et al. (2012aDixon et al. (, 2011 use a dynamic CGE model containing water accounts to analyze the effects of an illustrative buyback scheme in the Southern Murray-Darling Basin. Simulation results show that, contrary to what could be expected, buyback has a positive impact on the regional economy, and a negative albeit marginal one at a national level. This is explained by supplydemand interaction in water markets, which lead to higher prices that i) increase net exports of water and consumption and ii) cause a reallocation of farm production factors that partially compensates for the negative impact on agricultural output. Notably, the adjustment dynamics of the model relies on the existence of full-fledged water markets, a prerequisite that holds only in Australia, Chile and the semi-arid states of Western US. In most regions and countries today, allocation rules are still conditioned by historical rights and queuing, and prices represent administrative charges to (partially) recover the cost of conveying water to users. In this context, attempts to model competition for water explicitly in a CGE environment must rely on estimations that assign a price and value share to water (see e.g. ), which is challenging due to the limited information available. More importantly, recent research rightly claims that the shadow price of water must correspond to the gap between irrigated and rainfed production to pay for the returns to water, which is often not reflected in value and price estimations (Hertel and Liu, 2016). Addressing this methodological challenge in a CGE environment calls for an alternative approach that models water competition implicitly, e.g. through irrigated land (;) or virtual water (), which however is inadequate to model and inform water purchase tenders and thus the economy-wide impact of buyback programmes. In the absence of water markets or data sources with equivalent information, an economy-wide assessment of buyback programmes may require the macroeconomic model to be simulated in concert with a complementary bottom-up model that supplies the missing information. This makes possible to bridge the scale gap and adapt the analysis on the varied and asymmetric welfare impacts to the more convenient scale or decision unit. A wide range of applications coupling bottom-up with macroeconomic models can be found in the literature, and not only related to water issues. Bottom-up models can be bio-physical or microeconomic, such as agent-based (Husby, 2016, chap. 7) or mathematical programming methods (Baghersad and Zobel, 2015); while macroeconomic approaches typically include CGE or Input-Output (IO) models. The choice of bottom-up and macroeconomic model varies depending on the research focus, data availability and policy experiment. CGE models are preferred over IO where price dynamics are expected to be relevant, as happens with policies involving large reallocations of physical and financial resources such as buyback, and to examine the medium and long run effects (Dudu and Chumi, 2008). On the other hand, microeconomic mathematical programming methods are the approach typically used to model agents' motives and behavior in agricultural economics. One straightforward way to combine the complementary outputs of micro-and macro-economic models is to solve both models independently, where available, and use results to inform water policy. However, the different foundations of both approaches (individual behavior in narrowly-defined markets in microeconomic models v. structure and behavior of a whole economy in macroeconomic ones) can lead to conflicting outcomes and raise consistency issues. Using a holistic approach that solves both models together allows a detailed representation of causal relationships and interdependencies and ensures consistency, but making the complex internal optimization procedures of micro-and macro-economic models compatible will demand oversimplification, as happens with holistic hydroeconomic models that represent farmers' behavior through piecewise exogenous benefit functions that relate water use to profit (). Modular approaches run the two models independently in a recursive or sequential fashion, which increases the probability of convergence on an optimal solution and the level of detail in each subfield, at the expense of a less thorough representation of causality and interdependencies between models. While the use of both holistic and modular approaches is widely reported in hybrid models literature, the coupling of computationally demanding macroeconomic models with bottom-up models is typically conducted using a modular approach ). This paper presents a methodological framework that utilizes a modular approach to connect, in a sequential fashion, a microeconomic Positive Multi-Attribute Utility Programming (PMAUP) model with a macroeconomic CGE model to assess the local and economy-wide impacts of agricultural water buyback. The microeconomic PMAUP model makes possible a realistic representation of intricate water allocation mechanisms based on queuing and historical rights charged by the administration, and a detailed assessment of farmers' motives and behavior, bringing positivism and high spatial resolution to the design of buyback scenarios; while the CGE model feeds on the simulation outputs from the PMUAP model to assess the spread and intensity of the policy shock throughout spatial units, economic sectors and macroeconomic agents. Methods are illustrated with an application to the Region of Murcia in southeastern Spain. The PMAUP model is calibrated at an Agricultural Water Demand Unit (AWDU) scale, a basic agricultural unit in Spain that encompasses irrigation communities with a common source of water and similar administrative and hydrological characteristics (SRBA, 2015a). On the other hand, CGE models typically work at a national or supranational scale, although some examples considering the sub-national regions within a country or a group of countries can be found in Australia (Wittwer and Horridge, 2010), Europe (), US (a), Russia () and China (Horridge and Wittwer, 2008). This work relies on the Intertemporal Computable Equilibrium System (ICES), a global CGE model that has been used extensively to assess the macro-economic impacts of climate change and to evaluate different environmental and climate policies (see e.g. Parrado and De Cian, 2014). For the purpose of this research, the model has been calibrated for 17 sub-national units at a NUTS2 1 level in Spain. This bridges the scale gap and makes feasible the coupling between both models, which is resolved in two steps. In the first step, the water constraint is progressively strengthened in the PMAUP model to assess agents' (AWDUs) responses to buyback and reveal: i) the foregone income; and ii) the compensating variation that addresses foregone utility, or shadow price of water. This step relies on previous work by Prez-Blanco and Gutirrez-Martn. In the second step, the foregone income and compensating variation obtained for every agent are aggregated at a regional level and reproduced in a macroeconomic context through two shocks: i) a shock on production based on the foregone income; and ii) a shock on the income of the representative agent in the CGE model resulting from the water sales -a function of the compensating variation. The economy-wide repercussions of water buyback are estimated as the difference between the economic output of the economic sectors and regions under selected water reacquisition targets and that of the baseline without buyback. The paper is structured as follows. Sections 2,3 and 4 constitute the methodological part of the paper and introduce the PMAUP model, the CGE model and the coupling approach, respectively. Section 5 presents the case study area, the Region of Murcia in Spain. Section 6 illustrates the methods with an application to the case study area. Section 7 discusses the results, and Section 8 concludes. The microeconomic module: positive multi-attribute utility programming The microeconomic model used in this paper builds on the axioms of revealed preference to elicit an objective function that is both consistent with an observed (and finite) set of choices and prices and suitable as a basis for empirical analysis in agricultural water management (Gutirrez-Martn 1 The Nomenclature of Units for Territorial Statistics (NUTS) is a EU standard that refers to the subdivisions of countries. In Spain, NUTS 1 refers to groups of autonomous communities; NUTS 2 to Autonomous communities and cities; and NUTS 3 to provinces. and Gmez, 2011). The theory of revealed preference originates in Samuelson's "pure theory of consumer behavior", which derived testable implications of rational consumption behavior and demand for two different budget sets without the need to postulate a utility function to represent agent's preferences, giving rise to the Weak Axiom of Revealed Preference (Samuelson, 1948(Samuelson,, 1938. Later on, Houthakker introduced the Strong Axiom of Revealed Preference (SARP), which uses transitivity to derive testable implications of rational consumption for any budget sets. Houthakker also established a close link between the axioms about demand and those about preferences by showing that, in order to satisfy SARP, demand functions must be the observable result of the optimization of preferences subject to agent's budgetary constraint. The theoretical foundation for revealed preference theory provided by Houthakker and Samuelson (1948Samuelson (, 1938) assumes a complete description of a demand system that gives quantities as a function of every possible budget and price. The key development in applied revealed preference research is offered by Afriat, who develops a utility function consistent with agent's choices from an observed finite dataset of prices and choices, providing the basis to estimate aggregate consumer demand functions (). Although the first revealed preference applications date from the 1970s (), the large computational power and hard micro-data necessary to implement revealed preference models have limited empirical analyses. Yet, these barriers appear to be subsiding: in 2005, Varian conducted a search on "revealed preference" in JSTOR business and economics journals and found 997 results; in early 2018, the same search found 8866 results. Revealed preference is becoming an increasingly relevant applied economics tool in areas as disparate as public goods research (), information costs (Caplin and Dean, 2015), monetary economics, citation analysis (Tahai and Meyer, 1999), health economics (Demuynck and Verriest, 2013), network economics (), environmental goods (Getz and Huang, 1978), climate change or agricultural economics (Gutirrez-Martn and Gmez, 2011). In the area of water resources management and farm modeling, revealed preference has been relevant in the calibration of multi-attribute utility models. Positive Multi-Attribute Utility Programming (PMAUP) models that build on the axioms of revealed preference have been used to elicit farmers' objective function (;Gutirrez-Martn and Gmez, 2011) and assess their responses to price volatility (), insurance policies (a) and water charges (b). In a recent application, Prez-Blanco and Gutirrez-Martn run a series of simulations in the Region of Murcia in Spain in which the water allocation constraint in the model is progressively strengthened to estimate: i) the foregone income; and ii) the compensating variation that addresses foregone utility, or shadow price of water. The price and value share to water thus revealed were found consistent with those observed in previous reacquisitions () and other works in the area using Positive Mathematical Programming (Martnez-Granados and Calatrava, 2014). This paper relies on the estimations by Prez-Blanco and Gutirrez-Martn to feed a series of simulations in a CGE environment through the development of a coupled PMAUP-CGE model in order to assess the economy-wide repercussions of agricultural water buyback. Objective function In irrigated agriculture, agent observed choices are a combination of crop mix and timing, water application and capital stock. Literature often simplifies this complex decision process by representing each possible combination of crops, timing, water application and capital as a separate crop with unique features, so that the optimization problem is reduced to a choice on the crop portfolio x within a domain F(x), where the crop portfolio x is a vector representing the land share devoted to each individual crop x i such that: The agent does not have direct preferences over the crop portfolio itself, but over the utility this crop portfolio will return in terms of the provision of valuable attributes. Applied models to simulate farmer's behavior often assume that farmers are rational profit maximizers and therefore utility equals profit ( = U ), although this approach usually leads to significant divergence between observed and simulated behavior. More robust theoretical frameworks assume agent's behavior can be modeled by means of maximizing a utility function where profits are the relevant attribute, as in Expected Utility (von Neumann and Morgenstern, 1953) and Positive Mathematical Programming. Since the 1970s a growing research body known as the Theory of Planned Behavior (TPB) has disputed that farmers' behavior can be modeled maximizing profits or a utility function where profits are the single relevant attribute (Ajzen, 1991;); instead, these authors argue that farmers' behavior is driven by multiple (and often conflicting) attributes related to socioeconomic, cultural and natural features, including but not limited to profit. Recent empirical evidence shows that the variance in farmers' intentions and observed strategic and entrepreneurial conduct are largely explained by farmers' attitudes towards their behavior (Basarir and Gillespie, 2006;). Attitudes can be seen as "a summary of psychological evaluations based on agent's beliefs about the "goodness" or "badness" of an object, normally associated with a particular attribute" (). If farmers' beliefs concerning multiple attributes govern decision making, modeling farmers' behavior requires the consideration of more than one attribute through a multi-attribute utility function where relevant attributes are included (Keeney and Raiffa, 1993). Rational economic agents will choose the crop portfolio x that maximizes the utility from the provision of relevant attributes z(x) within a domain F(x): Attributes are quantities of dimension one, the result of dividing observed attribute values by the maximum feasible value they can attain; and are defined so that "more is better", i.e. increasing the provision of one attribute improves agent's utility provided the remaining attributes are kept constant. Assuming attributes are measurable, alternative crop portfolios can be ranked in accordance to the utility they yield. There is no risk of correlation among attributes, since the outcome of the utility function is an ordinal value. This means that the model is not concerned about total utility or levels of utility, but rather about ranking alternative decisions so that they are coherent with observed choices. Rational agents will then cultivate the crop portfolio that maximizes utility within a domain defined by a set of quantifiable restrictions, notably agronomic features, land constraints, know-how, policy restrictions (e.g. Common Agricultural Policy) and water allocation. The latter can be represented as: Where water availability per hectare is denoted by W. w i is the water required by crop x i, per hectare. In revealing agent's preferences the PMAUP model follows a positive approach, implying that the optimal solution to the problem above should be as closed as possible to the observed choice or crop portfolio x 0. The PMAUP model thus aims to recover an objective function that is consistent with x 0 and the choice domain F(x), so that it can be used to forecast future behavior. Following standard microeconomic theory, the parameters of a utility function can be elicited for a given set of attributes equalizing the Marginal Rate of Transformation (MRT kp ), which represents the opportunity cost between two attributes z, z p k and is obtained as the slope of the efficient frontier kp ; and the Marginal Rate of Substitution (MRS kp ), which represents the willingness to sacrifice one unit of attribute z p for one unit of attribute z k : The utility function is parameterized in three steps, which are explained in detail in the next sections: i Efficient frontiers are elicited for each pair of attributes using numerical methods, and the tangency point that serves as a landing point for the utility function's indifference curve is obtained. ii Given a tangency point and a functional form, the utility function parameters are calibrated for every possible combination of attributes equalizing the MRT kp and the MRS kp. iii Error terms are obtained as the distance between observed and simulated choices. The utility function with the lowest error contains the relevant attributes and is the one used in the simulations. Marginal rate of transformation Observed decisions of rational agents must be efficient, i.e. they must belong to the Pareto efficient set or efficient frontier. Therefore, among all feasible choices we are only interested in revealing those along the efficient frontier, where the agent maximizes utility. In a multi-attribute context, the efficient frontier represents the maximum value of attribute z p rational agents can attain for a given value of attribute z k within the domain. Real-life efficient frontiers cannot be analytically defined using a closed function (Andr, 2009). Instead, numerical methods through an optimization procedure are typically used, as follows: where = c (0,,1) is a finite set that determines the values of attribute z k for which the values of attribute z p are projected to the frontier (recall attributes are values of dimension one). Solving the optimization problem above we obtain an efficient frontier in the two-dimensional space, where X ** is the set of crop choices delivering a provision of attributes z, z p k along the frontier. Literature offers a number of alternatives to estimate the tangency or "landing point" for the utility function. Sumpsi et al. maximize each attribute (z k, z p ) separately within the domain to calculate the pay-off matrix (i.e. the maximum value each attribute can attain within the domain), and approximate the efficient frontier through a hyper-plane connecting two efficient points included in the pay-off matrix (segment formed by points A and B in two dimensions in Fig. 1case 1). Andr and Riesgo project the observed choice to the closest efficient point x ** (i.e. along the efficiency frontier), which is then used as a reference point to obtain a "compromise set" consisting of a set of efficient points in the vicinity. The compromise set is interpreted as the piece of the efficient frontier where the utility function is maximized. Then the tangency point for the indifference curve is obtained regressing a hyper-plane from the compromise set (segment formed by points A and B in Fig All these methods obtain the efficient frontier and tangency points from linear combinations of two efficient points. Admittedly, efficient frontiers are convex -otherwise there is no tradeoff and the choice between the two attributes becomes irrelevant. This means that the hyper-planes connecting efficient points will not belong to the actual efficient set X ** and will lead to approximation errors (distance between the segment AB and X ** in Fig. 1). Positive multi-attribute models typically rely on the methods described in cases 1-3 to reveal the tangency points. Consistent with Prez-Blanco and Gutirrez-Martn this paper follows the method by Gutirrez-Martn and Gmez, which minimizes the approximation error for the database used. Solving the optimization problem in Eqs ). Similarly to Afriat's model for the case of single-attribute utility functions, the methodology presented here can be used to calibrate a utility function consistent with observed choices and the domain. Typically, there will be several utility functions available. For the case of single-attribute utility functions, Varian presented a way to describe the entire set of utility functions consistent with observed preferences, while Varian obtained bounds on specific functional forms. For the case of multi-attribute utility functions, the information provided by the MRT kp and MRS kp makes feasible the elicitation of the function parameters consistent with observed choices within the domain F(x), for a given functional form considered. For the application presented here it is assumed that the multi-attribute utility function adopts a Cobb-Douglas specification, which offers a sensible approximation to actual farmers' behavior. As compared to alternative additive or multiplicative-additive specifications, a Cobb-Douglas function offers the advantages of decreasing marginal utility for each attribute and the existence of a global optimum. Following a Cobb-Douglas specification, the objective function in Eq. can now be represented as: Marginal rate of substitution Where p are the objective function parameters or alpha values. By means of equalizing the MRS kp of a Cobb-Douglas function and the MRT kp obtained in the previous section, the objective function parameters can be estimated solving the following system of equations: The values of the parameters obtained resolving the system of equations above for alternative attribute combinations within the set z(x) are used in Eqs. Relevant attributes and utility function parameters Rational agents cultivate the portfolio of crops that maximizes the utility obtained from the attributes they value. Therefore, the relevant attributes are those that minimize the distance between observed and calibrated behavior, which is measured through a calibration residual obtained as the ordinary arithmetic mean of two errors. The first error captures the distance between the observed (x o ) and simulated (x * ) crop portfolio: The second error captures the distance between observed (z o ) and calibrated (z * ) attributes: The relevant set of attributes minimizes the average calibration residual, which is obtained as follows: The set of attributes and corresponding parameter values that minimize the average calibration residual is the one used in the simulations. Data Agents in the PMAUP model are the 55 Agricultural Water Demand Units (AWDUs) of the Segura River Basin located within the boundaries of the Region of Murcia. Aggregation of individual farmers to conform representative economic agents is well documented in the literature, also through the use of AWDUs (Martnez-Granados and Calatrava, 2014; Prez-Blanco and Gutirrez-Martn, 2017). The calibration year (observed crop portfolio x o ) is 2013. Data used in the PMAUP model depends on the finite attributes set considered in the model calibration. We explore five attributes, based on a literature review on multi-attribute utility functions (see Prez-Blanco and Gutirrez-Martn, 2017). These attributes include: profit (z 1, quantified through the gross variable margin), risk avoidance (z 2, obtained as the difference between the standard deviation of the crop portfolio that maximizes profit and that of an alternative portfolio x), direct costs avoidance (z 3, the difference between the per unit of revenue direct costs incurred in the management of the crop portfolio that maximizes profit and those of an alternative portfolio x), hired labor avoidance (z 4, the difference between the hired labor necessary to implement the crop portfolio that maximizes profit and that of an alternative portfolio x) and family labor avoidance (z 5, the difference between the hired labor necessary to implement the crop portfolio that maximizes profit and that of an alternative portfolio x). Data collection aims at supplying the necessary information to quantify the attributes listed above. Land use data per crop is obtained at a municipal level for the calibration year from Regin de Murcia, and disaggregated at an AWDU level crossing this information with the land use data per crop category 2 available for AWDUs in the basin plan, using georeferenced data (SRBA, 2015b). Data on water sources, withdrawals and distribution and irrigation ef- 2 Including: forage, winter cereal, summer cereal, spring cereal, industrial crop, legume, horticulture -bulb, horticulture -root, horticulture -flower, horticulture -leaf, horticulture -fruit, horticulture -greenhouse, horticulture -tuber, citrus tree, stone fruit, seed fruit, almond tree, vineyard (grape), vineyard (wine), olive grove. Theoretical structure From a general point of view a CGE model is a market-based tool which captures the economic interactions taking place between sectors, regions and factors. Prices are flexible and adjust to the different impacts and policies to clear the markets and achieve a new equilibrium in which supply equals demand. The regionalized ICES is a neoclassical model: perfect competition is assumed in all sectors of the economy, factors are fully employed and investments are saving-driven. In this experiment we use a regionalized version of the model that includes the 17 NUTS2 regions of Spain, the rest of Europe and the rest of the world; and seven economic sectors, namely agriculture, extraction, food industry, other industry, utilities sector, construction and services. The main characteristics of demand and supply are described in the following sub-sections. Supply A representative firm in every region and sector minimizes costs subject to a Leontief technology production function for output (y) considering the Gross Value Added (GVA) (va) and intermediate inputs (in) where pva j,s and pin j,s are respectively the price of the value added The regionally-calibrated CGE model assumes endogenous labor and capital supply at the regional level, allowing to some extent the spatial mobility of workers and capital within the national territory. Production factors are immobile with respect to the rest of Europe and the rest of the world. Within each Spanish region, labor and capital can move across sectors, while land is used in the agricultural sector only and natural resources in mining, forestry and fishing sectors. A Constant Elasticity of Transformation (CET) function is implemented for the purpose of modelling regional labor and capital supply given the national constraint. The First Order Conditions are obtained from the following maximization problem: where q f represents the supply in the sub-country region s and in Spain, and w f their corresponding prices. The elasticity of substitution f falls within the interval . A higher absolute value indicates a higher interregional mobility, while a null value denotes perfect immobility at the regional level. Consistently with previous studies ) we set an intermediate value of minus two. Demand Final and intermediate goods can be traded in the domestic, national and international market. The demand side includes an upper and a lower bundle. Both thresholds postulate imperfect substitution between products coming from different spatial units (countries and/or regions) according to the standard Armington assumption. In the upper level, this is done by breaking agents' demand for any commodity in two parts using a CES function, dd j,s and dm j,s, which are the domestic demand and the aggregate demand for imported products in region s and sector j, respectively. The representative agent in each region includes the household and the government. For each economic sector, the representative agent minimizes the total expenditure under the CES constraint on domestic and imported goods. + Where dtot j,s is the total demand and pdd j,s and pdm j,s are the prices associated with domestic and aggregate demand for imported goods, respectively. The Armington elasticity in the upper level ( ) j Up captures the imperfect substitution between domestic and imported commodities. In the lower level the aggregate amount of imports (dm j,s ) are sourced from the country or the sub-country region of origin. The representative agent in each region and sector minimizes the expenditure for imports under a Constant Ratios of Elasticities of Substitution and Homothetic (CRESH) constraint (Cai and Arora, 2015;Hanoch, 1971;Pant, 2007). Min Where imp j,s',s is the bi-lateral trade flow from region/country s' to region/country s in sector j and pimp j,s',s is the associated price; imp j,s and j,s, Lo are two S-dimensional vectors (S being the number of country/ regions in the CGE) representing respectively all the bi-lateral imports and elasticities of substitution of region/country s in sector j. Price Indexes for the aggregate import composite is weighted by the threedimensional elasticity following the minimization problem in the two equations above. The advantage to use the CRESH function in the lower level consists in having a three dimensional elasticity ( > 0 j,s,s Lo ' ), which allows for more flexibility than CES to model the product substitutability for each couple of spatial units. Since theoretical and empirical evidence shows that trade is larger within national borders than across them, given the same distance (;McCallum, 1995), intra-national trade flows should be more fluid than international trade ones, and this is guaranteed by setting a higher value of the CRESH elasticity involving two Spanish regions. The income (Inc s ) of the representative agent in each sub-national region or country is allocated in fixed proportions to private final consumption (Cons s ), government consumption (Gov s ) and saving (Save s ). = + + Inc Cons Gov Save s s s s The macro-economic closure assumes that the investments are mobile at the international level; global investments are equal to global savings; and trade balance in each country/region is given by the difference between regional/country savings and investments. Data The model uses information from the GTAP 8 database (). The 8.1 version consists in a collection of Social Accounting Matrices (SAMs) for 57 economic sectors and 134 countries (or groups of countries) in the world. The reference year is 2007. We split the national SAM of Spain in the GTAP database into 17 regions using information from Spanish Regional Accounting and Economic Accounts for Agriculture and Structural Business Statistics. To do this, first we match the sectors of the GTAP database with those of our data sources. Then, for each sector, the regional shares of value added, and accordingly of labor, capital, land and natural resources are computed using the sub-national data. Finally, these shares are used to distribute original country-level data across sub-national units. A detailed description of the methodology is available in Bosello and Standardi. INE provides information on both capital and labor at the sectoral level. For some manufacturing activities we referred to Structural Business Statistics because they have a more detailed description of these sectors. To regionalize the agricultural economic components of value added we mainly rely on the Economic Accounts for Agriculture because of the rich and already standardized information across EU regions. One of the most challenging tasks to achieve in the database construction is the derivation of the sub-national domestic demand and trade among regions within the country. This is because these data are often missing and need to be computed using different techniques. In our case we rely on the so-called Simple Locations Quotients (SLQs) (Miller and Blair, 2009). SLQs give a measure of the regional specialization in the economic activity compared to the national average and allow us to determine the domestic demand and aggregate demand for imports. Then we follow the gravitational approach to obtain the bilateral trade flows across sub-national regions in line with Dixon et al. (2012b) and Wittwer and Horridge. Coupling the PMAUP and CGE models Once the multi-attribute objective function is calibrated in the PMAUP model, the water allocation constraint W g is progressively strengthened to comply with alternative water reacquisition targets (g), and the resulting crop portfolio x g *, utility U g * and GVA va g * (a function of the gross margin z 1,g *, and hired labor z 4,g * ) are estimated. These variables contain the necessary information to reveal: i) the foregone income; and ii) the compensating variation that addresses the foregone utility. These two measures serve as a basis to assess the economy-wide repercussions of water buyback in a CGE environment. The foregone income is used to estimate the consequences on the supply side through a productivity shock in the representative agricultural firm; while the compensating variation is used to assess the consequences on the demand side through a money transfer to the representative agent in Murcia. The supply shock In the microeconomic model, the GVA (va g * ) in Murcia for every reacquisition target g is obtained aggregating the simulated gross margin (z 1,g * ) and labor income (a function of hired labor, z 4,g * ): The foregone income in Murcia for a given reacquisition target, as compared to the baseline ( = g 0), can be transformed using simple calculations into a productivity shock ( The negative productivity shock is homogeneously distributed among the production factors (f, including labor, capital and land) of the representative agricultural firm ( = j agr) of Murcia ( = s MUR) in the macroeconomic model through Eq.. The productivity shock reproduces the impact on GVA estimated by the PMAUP model in a CGE context, for every water reacquisition target considered. The demand shock The compensating variation is the amount of money that keeps the utility equal to that of the baseline scenario without buyback ( = g 0). Although the foregone income is in principle more easily observable to the buyer (principal) than foregone utility, using a method that accounts for changes in utility instead of changes in income yields more accurate, and typically lower, compensation estimates. This is explained by the tradeoff between risk and management complexity aversion on the one hand, and profit on the other, in the multi-attribute microeconomic model. As a result, water uses displaying high income, but high risk and management complexity, can yield a relatively low marginal utility (and compensating variation); and vice-versa, uses with low income but low risk and management complexity attached can still yield a high marginal utility (and compensating variation). For a detailed discussion on the compensation estimation method choice, the reader may refer to Prez-Blanco and Gutirrez-Martn. The compensating variation for a given reacquisition target CV g is obtained in the microeconomic model as follows: Where e represents an expenditure function, i.e. the minimum amount of money agents would need to attain the initial utility (U 0 * ) given a water constraint W g. In the baseline scenario ( = g 0), the expenditure function equals 0. For consistency, the compensating variation stemming from the PMAUP model is divided by the baseline GVA in the PMAUP model, and the resulting percentage is multiplied by the baseline GVA in the CGE model to estimate the equivalent compensating variation in the macroeconomic context ( g ). Compensations to irrigators are represented in the CGE macroeconomic context through an income transfer to the representative agent in Murcia (T g ). Income transfers can be operated through an annuity payment or a lump sum transfer. Since the capitalization rate that applies to agricultural assets in Spain has been volatile during the financial crisis, an annuity payment that removes discount rate uncertainty was preferred in this case. Note that the marginal cost of the public funds scheme and the corresponding distortion of resource allocation is endogenous in the CGE model and is captured by the adjustment in the relative prices. Once the transfer from the rest of Spain to the Murcia region is set, economic agents change their decision according to their new income budget constraint. When ex-ante designing the policy, an analyst may be tempted to equalize income transfers to expected compensating variations. However, CGE models work on realized values, which typically do not match expected compensating variations due to information asymmetry. This leads to some degree of agency costs 1 (). The potential for rent extraction is conditional on the information asymmetries present and on the ability of the principal to address them (e.g. through auction design). Next the income transfer is introduced in the CGE model through the equation representing regional income (see Eq. ). First, each Spanish region pays its share of the income transfer (Tr s ) based on the GDP share of the region in the national economy (GDPsh s ). The Region of Murcia receives the total amount of the annuity for the implementation of the water buyback policy, minus its share of the income transfer payment. The regionally-calibrated CGE model reproduces the productivity shock in the representative agricultural firm and the income transfer to the representative agent in a macroeconomic context and finds a new equilibrium. The economy-wide impacts of water buyback are estimated as the difference between the GVA of the economic sectors and regions in Spain for each water reacquisition target and that of the baseline without water buyback. Case study area: the Region of Murcia in Spain The Region of Murcia is located in southeastern Spain, within the boundaries of the absolute water scarce Segura River Basin. Murcia has a surface of 11,313 km 2, a population of 1.5 million inhabitants and a GDP per capita of EUR 19,089. Historically located along the middle stretches of the Segura River (Huerta Murciana), Murcia's irrigated agriculture sprawled towards coastal areas from the 50 s. This resulted in an increasing number of AWDUs (the agent in the PMAUP model), which now total 55, and water use (SRBA, 2015a). The worsening water crisis and difficulties to deploy more restrictive caps and charging arrangements led the Segura River Basin to pioneer water purchase tenders in the EU. Two buyback tenders for the temporary reacquisition (1 year) of water rights from rice farms upstream were implemented during the 2007-2008 drought. Tenders had a budget of EUR 700,000 and envisaged a maximum purchase price of EUR 0.18/m 3. In 2007, the first tender consumed EUR 495,000 to purchase 2.93 million m 3 at an average price of EUR 0.17/ m 3. Similar results were obtained in the 2008 tender. Both water reacquisitions were fully used to enhance environmental flows (Garrido Recent research in AWDUs of the Region of Murcia has estimated the annuity payment of buyback programmes to inform the design of purchase tenders in the area (Martnez-Granados and Calatrava, 2014;Prez-Blanco and Gutirrez-Martn, 2017). Yet, a major and persisting concern relates to the economy-wide repercussions of water buyback. The Region of Murcia is highly dependent on agriculture, which represents around 4.4% of regional GDP and 10.4% of regional employment, as compared to 2.3% and 4% at a national level. Food industry and tourism, closely connected to the agricultural sector, account for 4.5% and 5.6% of the GDP, respectively Relevant feedbacks on the output of economic sectors in the region, which are yet to be estimated, can be anticipated from this sectoral GDP distribution. Results Methods are illustrated with an application to the Murcia Region in SE Spain. The PMAUP is calibrated for the 55 AWDUs in the area following the methodology in Section 2. The parameterization results of the utility function of each AWDU and the corresponding calibration residuals come from Prez-Blanco and Gutirrez-Martn and can be also consulted in the on-line supplementary material. A series of simulations are run in which the water allocation constraint is strengthened in every AWDU. Limiting water availability precludes some portfolio choices and has a negative impact on the utility of agents through a reduced provision of valuable attributes, including profit. Agents readjust their crop portfolio according to their objective function and the new water constraint. For every simulation resolved, the foregone income and compensating variation are estimated. Results from microeconomic simulations are then elaborated to obtain the productivity shock and the annuity that feed the CGE model. The macroeconomic simulation runs a comparative statics exercise to assess regional and sectorial GVA changes considering eight alternative water reacquisition targets: 50 (4% of water allocation in the baseline), 100 (8%), 150 (12%), 200 (16%), 250 (20%), 300 (24%), 350 (28%) and 400 (32%) million m 3. The economic repercussions of water reacquisitions are assessed following two alternative criteria: i) a costeffective criterion (CE) in which priority in the reacquisition is given to those AWDUs where water is inexpensive; and ii) a proportional criterion (Pr) in which the same proportion of the initial water allocation is purchased in each AWDU. The motivation for the inclusion of these two criteria lies on the heterogeneity of water. If water was a homogeneous good with the same environmental value across Murcia's AWDUs, the first criterion should apply. However, this is not the case, and purchase tenders focusing on specific AWDUs may be necessary to restore/preserve critical ecosystem services. Finally, a major concern in water reacquisitions regards agency costs: due to information asymmetry, irrigators may perceive a compensation that is not consistent with the shadow price of water, increasing the cost of the buyback program and/or limiting its scope -and henceforth the extent of ecosystem services delivered. Three agency costs scenarios are defined based on the values reported in the literature: = 1 (no agency costs, case 1), = 1.5 (case 2) and = 2 (case 3) (;Martnez-Granados and Calatrava, 2014;Prez-Blanco and Gutirrez-Martn, 2017;). Microeconomic assessment Initially, agents react to the new water allocation constraint substituting irrigated crops in the margin by less water demanding or rainfed crops that yield slightly lower utility levels. When the water reacquisition target becomes more stringent though, agents are constrained to sacrifice increasingly valuable crops and utility losses amplify. This process is visible in Fig. 3, which displays the compensating variation (€/m 3 ) in the 55 AWDUs for 8 reacquisition targets. As utility decreases, so does income, one of the critical attributes determining utility (Fig. 4). In some simulations the objective function cannot be resolved within the domain ("N/A" value in the legend). This is largely the consequence of the ligneous crops surface thresholds set in the model 4, and happens with 40% of AWDUs when water allocation is reduced by > 32% (> 400 million m3). A maximum threshold for water reacquisition targets is fixed at this value. Overall, surface water-reliant AWDUs in upstream catchments display less productive crop portfolios and lower purchase prices compared to those located downstream. Focusing water purchase tenders on upstream areas may improve environmental flows along the basin at the least cost (CE criterion). However, complementary purchase tenders may be necessary in other areas to restore the balance locally (e.g. aquifers, tributary rivers). The results obtained above for every AWDU are aggregated to obtain the inputs for the CGE model. Table 1 displays the foregone income and compensating variation, as a percentage of Murcia's agricultural GVA in the baseline, for alternative reacquisition targets and design (CE and Pr) in the case of no agency costs ( = 1). Not surprisingly the Pr scheme shows higher compensating variation and income losses than the CE scheme. In absolute value, income losses are greater than the compensating variation in both schemes: as the water allocation constraint is strengthened, an increasing share of land is devoted to less water intensive and rainfed crops, which yield a lower expected income but typically also higher risk and management complexity avoidance -two valuable attributes that mitigate the negative impact income losses have on utility. The opposite may happen, and the compensating variation can be greater than income losses (absolute values) where agency costs are considered. Macroeconomic assessment In the PMAUP model agents' choices are taken within a static macroeconomic scenario with exogenous prices -a reasonable assumption for the small AWDUs of Murcia (Gutirrez-Martn and Gmez, 2011). When the productivity and income shocks stemming from the PMAUP model are aggregated for the entire Murcia's agricultural sector and translated into the CGE model, the macroeconomic scenario is not anymore given but reacts through changes in relative prices, triggering on future market and non-market (ecosystem services) income -the latter not being accounted for in the model. Alternatively, water requirement for fruit trees could be reduced, resulting in yield losses but preserving the trees, but this necessitates yield functions that are challenging to implement in the PMAUP model -not the least due to the limited hard data available. Consequently, a minimum surface threshold has been set for ligneous crops, which have to remain above 90% of their original surface. the reaction of other economic sectors, agents and regions. Consistent with the permanent nature of the reacquisitions, the model assumes a flexible CGE setting with a medium-to long-term focus, where labor and capital are perfectly mobile between sectors and CET elasticity for labor and capital mobility within Spain is minus two. This value is consistent with previous CGE studies assuming a flexible economic system at the sub-country level ). Accordingly, regional and sectorial GVA changes in this comparative statics exercise should be also understood in a medium-to long-term context. The regionalized CGE model explores the macroeconomic impacts of Murcia's water buyback programme across sectors and regions of Spain through a series of simulations. Fig. 5 displays simulation results in the agriculture (A), food industry (B), services (C) and aggregate GDP (D) for all water targets (50,100,150,200,250,300,350 and 400 million m 3 ), CE and Pr reacquisition schemes, and agency cost cases 1, 2 and 3. The microeconomic results in Table 1 are amplified in the macroeconomic assessment. For example, for the most ambitious reacquisition target in the Pr scheme and no agency costs case, Murcia's agricultural income experiences a -33% contraction as compared to -20.5% in the microeconomic model. Sectors that are strongly linked to agriculture like food industry also experience relevant losses in Murcia (up to -4% GVA). As opposed to the GVA losses experienced by Murcia, agricultural GVA elsewhere in Spain increases by.37% (aggregate agricultural GVA in Spain still decreases by almost 1.5%) and the service sector by almost.02%. This is partly the result of a substitution effect led by the reallocation of agricultural supply from Murcia towards other economic sectors and regions of Spain. On the other hand, the contraction of the Spanish aggregate income limits the rise of the GVA in the rest of Spain, resulting in an income effect that counterbalances the substitution effect. The trade-off between substitution and income effects is typical of this dynamic macroeconomic scenario where flexible prices determine the adjustment of trading flows. The underlying reallocation of primary factors is critical to understand these effects. Consumers substitute goods from Murcia with goods produced elsewhere and not affected by the negative productivity shock, thus increasing the firms' demand for capital and labor in the rest of Spain. This leads to a shift of capital and labor force from Murcia to the rest of Spain, where capital and workers can find higher remunerations. As a result, Murcia experiences a substantial GDP loss (up to -2.1%), while GDP increases in the rest of Spain (up to +0.034%). Overall, the policy has a negative impact on Spanish GDP, although limited (up to -0.023%). Not surprisingly, the Pr scheme has a more negative impact than the CE. It is worth noting that higher agency costs do not influence the effects on Spanish aggregate GDP but have implications for its spatial distribution, mitigating losses in Murcia and diminishing gains in other Spanish regions. It should be also noted that relative changes in food industry and services exhibit nonlinear and non-monotonous patterns. This is due to the reallocation of primary factors and the resultant redistribution of trade in the different scenarios. Agency costs mitigate Murcia's losses in the services sector and the overall economy, but have a negligible impact on agriculture and food industry, where results for the three agency costs scenarios are similar. Fig. 6 assesses policy impacts looking at the Equivalent Variation. Conceptually, the Equivalent Variation is similar to the Compensating Variation, but it is applied at the macroeconomic level to assess welfare impacts. It represents the amount of income that keeps the utility of the agent of the CGE model equal to that of the baseline, and is mainly driven by final consumption. A negative sign denotes a welfare loss as compared to the baseline. Welfare effects at a regional and national level are also explained by the movements of primary factors and the re-composition of trade in the different scenarios, which depends on the Armington elasticities, whose coefficients differ for every sector. This leads to non-linear adjustment and non-monotonicity. In Murcia, the income transfer from the rest of Spain is insufficient to fully compensate the negative impact of reacquisitions, resulting in a welfare loss in most macroeconomic scenarios. Only for a few reacquisition targets (200, 350 and 400 million m 3 ) and for the highest level of agency costs (case 3) the income transfer leaves the representative agent with a welfare level comparable or higher to that of the baseline. The rest of Spain finds itself worse off in terms of welfare in several scenarios, despite the GDP increase. On the one hand, the income transfer in Murcia increases imports from the rest of Spain, especially agricultural products, which are cheaper since the production has not been negatively affected by the productivity shock; on the other, this is possible because the rest of Spain finances the consumption of Murcia through the income transfer, thus decreasing its own. Welfare impacts on the rest of Spain are a function of agency costs, with welfare gains where there are no agency costs and welfare losses where agency costs are high. Again, the size of agency costs does not affect aggregate welfare impacts on Spain, and the Pr scheme is more detrimental for welfare than the CE scheme. Discussion Simulation results show that the economy-wide repercussions of water buyback are relevant and range between -33% and -19.33% agricultural GVA losses in the Murcia Region for the most ambitious reacquisition target (400 million m 3 ), significantly higher than the GVA losses estimated in the microeconomic model (up to -20.5% for the same scenario). This amplification effect is the result of the reallocation of primary factors from Murcia to the rest of Spain modelled in the CGE context. Despite compensations paid to local irrigators, Murcia's supply contraction in the agricultural and related economic sectors leads to an overall GDP loss in the region between -1% and -2.1%. The remaining Spanish regions partially fill in the supply gap and experience an agricultural GDP increase between 0.21% and 0.37% and an overall GDP increase between 0.012% and 0.034%, which is nonetheless insufficient to compensate GDP losses in Murcia, resulting in a (limited) net GDP loss in the Spanish economy between -0.013% and -0.023% for the most ambitious target. Welfare effects can be unevenly distributed between Murcia and the rest of Spain, with winners and losers depending on the size of the agency costs. Results support the decision to develop investment plans/flanking measures to address the economywide impacts of buyback, particularly in affected rural economies and related economic sectors such as food industry. Previous applied research on the economy-wide impacts of agricultural water buyback programmes is limited and focuses on the Australian case. Dixon et al. (2011Dixon et al. (, 2012a analyze the economy-wide impacts of the water buyback programme in the Southern Murray-Darling Basin using a sub-national CGE model for Australia that incorporates water as a primary factor, thus making water trading simulations feasible. Results show that the reacquisition of 1 500 million m 3 (22.8% of initial water allotments) to restore the balance in the Southern Murray-Darling Basin has a marginal impact at the national level (-0.006% of GDP). In the Segura River Basin, restoring the balance would demand the reacquisition of 250 million m 3 (15.9% of initial water allotments). Our results suggest this policy would have an impact on the Spanish GDP comparable to the Australian case (-0.011% in the Pr scheme and -0.004% in the CE scheme), but a significantly higher cost per m 3 of water reacquired: 0.21$ in the CE and 0.51$ in the Pr, as compared to 0.05$ in Australia, in 2015 prices. This is largely explained by the distinct ability of the agricultural sectors in the Southern Murray-Darling Basin and Murcia to absorb the shock: following the reacquisitions, agricultural output falls by -1.3% in Southern Murray-Darling Basin as compared to between -16% (Pr) and -6.5% (CE) in Murcia. In addition, farmers in the Murray-Darling basin increase their consumption and welfare following the buyback, while the opposite situation is registered in most scenarios in Murcia. Two elements appear crucial to explain the differences between our results and those of Dixon et al. (2012aDixon et al. (, 2011: i) the existence of water markets in Australia; and ii) the coupling method used in our approach, which allows for a more detailed representation of the motivations and constraints faced by farmers. In a market environment, buyback constrains supply and increases water prices, and farmers can leverage on this opportunity to increase consumption and welfare. This is not the case in Europe, where water markets do not exist and "prices" are administrative charges that do not respond to the scarcity value of water. The second key element is the coupling. The spatial resolution in the sub-national Australian CGE model does not offer the same level of detail than a locally calibrated microeconomic model such as the PMAUP model for Murcia. The southern half of the large Murray-Darling basin (1 061 469 km 2 ) is divided into 13 units in Dixon et al. (2012aDixon et al. (, 2011 while Murcia, which covers an area equaling 1% of the Murray-Darling Basin's territory (11 313 km 2 ), is divided in 55 units in our study. The microeconomic analysis makes possible the use of mathematical programming methods to elicit the parameters of agents' objective functions and allows for a more detailed representation of the motivations and constraints faced by irrigators. The Australian CGE model does not consider these constraints, and risks to overestimate irrigators' capacity to shift capital, labor and land from one land use to another. As Wittwer points out, a finer regional division in CGE models is desirable for three reasons: i) more detailed regional results; ii) environmental issues such as water management often call for smaller regions that can map watershed or other natural boundaries more closely; and iii) more and smaller regions give a greater sense of geographical realism. The coupling between the PMAUP and the regionally-calibrated CGE model is a first step in this direction. Although macroeconomic models have been previously used to assess the economy-wide impacts of fiscal policy schemes and water markets, to the best of our knowledge this is the first applied study of the economy-wide impacts of buyback policies outside Australia. The most plausible explanation to this gap is the difficulty to accurately simulate the price and value share to water, and water reallocation among users, outside of a market environment. Some macroeconomic models have been developed to inform irrigation water reallocation in the EU context and elsewhere (see e.g. Hertel and Liu, 2016). Even if the focus of these studies is different from ours, they can provide useful insights and policy implications for our work. For instance, insights from other macroeconomic models can be useful to inform policy sequencing in water reacquisitions. Water market scenarios for Europe unequivocally show an increase in GVA through water reallocation to more productive uses (Dudu and Chumi, 2008), suggesting water trading could help mitigate the GVA losses associated to buyback programmes. On the other hand, this very mechanism increases shadow prices (;a), and thus the overall cost of buyback for taxpayers. A sensible water policy reform consistent with the cost-effectiveness rationale that governs EU water policy may need to consider alternative policy sequencings to the Australian case to enhance acceptability -e.g. commencing reacquisitions before developing full-fledged water markets. In addition to its economy-wide impacts, water buyback can also involve wider environmental consequences beyond the target basin because of the spatial redistribution of production. For example, Cazcarro et al. show that a combination of water tariffs and subsidies on food production can save water in the water scarce regions of Southern Spain (Murcia and Andalusia) and enhance food production in the water-abundant regions of the North (Cantabria and Basque Country). In our assessment, water conservation targets in Murcia are achieved at the expense of a significant decrease in the agricultural output, which is replaced by higher agricultural production elsewhere. Although we are not able to precise water use patterns in the remaining Spanish regions, the agricultural production increase is more pronounced in Northern regions such as Asturias, Cantabria and Aragn where water is relatively more abundant -pointing towards a pattern similar to that of Cazcarro et al.. However, as higher valueadded (and water intensive) crops are affected by the reacquisition, transferring their production to Northern regions may become increasingly unfeasible due to climatic and agronomic constrains. As a result, water use may increase in other water scarce Southern regions that resemble the physical and socioeconomic conditions of the Region of Murcia, exacerbating water overallocation problems there. For a discussion on the policy implications of implementing agricultural water buyback schemes, including an analysis on the feasibility of the beneficiary-pays approach adopted by this instrument, we refer the reader to Prez-Blanco and Gutirrez-Martn. Conclusions Coupling the PMAUP and CGE models makes feasible a detailed analysis of the tradeoffs in water conservation, from the sub-regional (AWDU) to the regional, national and supranational scale. Methods are general and replicable in other areas where water markets are nonexistent or in an early stage of development and ex-post trading data is not readily available. Future research can focus on i) addressing the current limitations of the micro-and macro-economic models and ii) expanding the methodological framework. The current version of the PMAUP relies on a validated projection method to reveal the efficient frontier, but recent developments in the field could help to minimize the approximation error (see e.g. b). Also the calibration residual could be reduced finding alternative and/or complementary attributes in the objective function that are relevant in explaining agents' decisions, although this is ultimately constrained by data availability. The CGE model could be improved introducing temporal dynamics to examine the transition pathway towards the new equilibrium and identify potential trade-offs between short and long run effects which could be relevant for policy implementation. In exploring transition pathways, the sequential coupling and comparative statics used in this paper could be replaced with a recursive coupling where agents in the PMAUP model adapt to the new macroeconomic scenario until convergence is reached. While comparative statics is often used to assess the impact of one-time permanent policies such as buyback, a recursive model would allow a better representation of temporary or recurrent policies (e.g. water charging). From the data perspective, water satellite accounts at a sectorial level (where available) could be used to analyze simultaneously the macroeconomic propagation of the policy and water use changes in economic sectors (other than irrigators in Murcia), e.g. through input-output coefficients. The current methodological framework could be also expanded including a hydrological module that accounts for catchment-specific characteristics and system dynamics (e.g. percolation, runoff) and localizes water flows and water conservation across the basin. This information is instrumental to assess the environmental outputs of the policy, and to estimate its economic benefits through non-market valuation methods. |
<gh_stars>1-10
/*
* Copyright (c) 2020-2021, <NAME>., https://www.philips.com
* SPDX-License-Identifier: MIT
*/
package com.philips.research.bombase.core.downloader.domain;
import com.philips.research.bombase.core.downloader.DownloadException;
import org.junit.jupiter.api.Disabled;
import org.junit.jupiter.api.Test;
import java.io.IOException;
import java.net.URI;
import java.nio.file.Files;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
class GitVcsHandlerTest extends VcsHandlerTestBase {
final VcsHandler handler = new GitVcsHandler();
private void assertHash(String s) throws IOException {
assertThat(Files.readString(tempDir.resolve(".git").resolve("HEAD")))
.isEqualTo(s + "\n");
}
@Test
void checksOutRelease() throws IOException {
final var path = handler.download(tempDir, URI.create("https://github.com/excalith%2Fgit-cheats.git@v1.0.0#some%2Fpath"));
assertHash("61b307521005e98474243b8546a62a56e8e561b2");
assertThat(path).isEqualTo(tempDir);
}
@Test
void checksOutUsingAlternativeVersionTags() throws IOException {
final var path = handler.download(tempDir, URI.create("https://github.com/excalith%2Fgit-cheats.git@1.0.0"));
assertHash("61b307521005e98474243b8546a62a56e8e561b2");
}
@Test
void checksOutByCommitHash() throws IOException {
handler.download(tempDir, URI.create("https://github.com/excalith/git-cheats.git@4c9d714"));
assertHash("4c9d7140896202504e76c79e499177d7f5414755");
}
@Test
@Disabled("Build server does not have an SSH key on GitHub")
void supportsUserSpecificSshURL() throws IOException {
handler.download(tempDir, URI.create("ssh://git%40github.com/excalith/git-cheats.git@v1.0.0"));
assertHash("61b307521005e98474243b8546a62a56e8e561b2");
}
@Test
@Disabled("Build server does not have an SSH key on GitHub")
void supportsUserSpecificSshURI() throws IOException {
handler.download(tempDir, URI.create("ssh:git%40github.com:excalith/git-cheats.git@v1.0.0"));
assertHash("61b307521005e98474243b8546a62a56e8e561b2");
}
@Test
void throws_gitFailures() {
assertThatThrownBy(() -> handler.download(tempDir, URI.create("https://example.com/unknown")))
.isInstanceOf(DownloadException.class)
.hasMessageContaining("Checkout");
}
}
|
LANE DETECTION AND TRACKING BASED ON LIDAR DATA The contribution presents a novel approach to the dete ction and tracking of lanes based on lidar data. Therefore, we use the distance and reflectivity data coming from a one-dimensional sensor. After having detected the lane through a temporal fusion algorithm, we register the l idar data in a world-fixed coordinate system. To this end, we also incorporate the data coming from an inertial measurement unit and a differential global positioning system. After that stage, an original image of the roa d can be inferred. Based on this data view, we are able to track the lane either with a Kalman filter or by using a polynomial approximation for the underlying lane model. |
At least two Australians are among the 29 workers missing after an underground explosion in a New Zealand coal mine.
Confusion surrounds when a rescue bid may be made, after Grey District mayor Tony Kokshoorn earlier said rescue staff had been given the green light to enter the mine.
Cr Kokshoorn told the New Zealand Herald that results from three air samples showed gas at the mine was not explosive, but Pike River chairman John Dow said no test results of the air from the mine had come back today.
Mr Dow said the rescue effort would not get underway for hours because the company is uncertain of when they would be able to gather suitable air quality samples.
Two miners managed to get out of the mine on the country's South Island yesterday, but so far, there is no sign of the other men.
The two men who escaped were in a different part of the mine when the explosion occurred, and were slightly injured.
Pike River Coal CEO Peter Whittal said most of the miners are locals, but some of the contractors are from overseas.
"There's about eight of the 29 that we don't have any details on, especially the contractors," he said.
"There was two Australians underground, at least two, because as I said there are about eight that we don't know their nationality. There was a number of British citizens and Kiwis."
Prime Minister Julia Gillard has offered Australia's assistance to the rescue effort.
"The world has witnessed a mine disaster already this year and a miracle when people came out alive," she said.
"So our very best wishes go to the New Zealanders as they deal with this situation."
Specialist gas testing equipment has been flown in from Australia to help with the rescue operation.
Gary Knowles, the District Commander overseeing the rescue operation, said crews are attempting to flush the poisonous gases out of the mine.
"At the moment we are using specialists to assist us with the recovery operation. We have to flush the mine obviously with some type of fresh air to allow my staff to go underground," he said.
"We've brought in a number of experts who specialise in mining recovery operations and they are trying to stabilise the environment and once that's done, we will then go underground and try to recover our colleagues."
But Superintendant Knowles said he would not send rescuers in until he is sure the mine is safe.
"I'm not prepared to put crews down below ground until we can stabilise the environment and it's safe for them to go in," he said.
Communications are also cut so rescuers do not know what condition the trapped miners are in or whether they are alive.
Mr Whittal says the trapped miners should have some access to fresh air.
"The miners themselves carry a self escape apparatus on their belts. It's an oxygen generating rescue device and they can put that on and that would give them between 30 and 60 minutes of oxygen generation. But they also have tools and first aid kits available to them," he said.
Mr Whittal says the explosion likely occurred near the ventilation shaft.
"We've seen evidence of an explosion on the surface of the mine around the ventilation shaft, which would be the typical place that an explosion path would go because that's up the return airway of the mine," he said.
"From the damage on the surface we can't determine the strength, magnitude or extent of the damage underground or indeed what impact that would have had on the employees."
Relatives of the missing miners spent the night near the pit with support staff.
Pike River Coal says the youngest miner underground is 17 and the eldest is 62.
Mr Whittal says there are 16 Pike River employees and 13 contractors unaccounted for, and family members have been briefed this morning.
"We were able to give them firsthand knowledge, which I'm sure they appreciated. They also are very together as a group and there was a lot of families in the room, there was a lot of people obviously holding hands and hugging each other," he said.
"Mining in itself is quite a close-knit industry and Greymouth... is a very close-knit mining community. So there's a lot of empathy in the community for the plight of the men that are underground and everyone is waiting and watching and hoping that we can affect a recovery as quickly as possible."
The cause of the blast is not known.
Earlier, the company denied reports that a body had been retrieved from the mine.
Mr Whittall says the miners are about 120 metres beneath the surface. They had started the afternoon shift about an hour before the blast.
"We are holding on to hope. Look at Chile, all those miners were trapped and they all came out alive," he said.
Mining minister Gerry Brownlee said the government would put whatever resources were needed into rescuing the miners.
The company's website says the mine began production last year and has a 2.4-kilometre access tunnel running beneath the Paparoa mountain range to reach the coal seam which took 10 years to build.
The mine is on the opposite side of the range to the scene of the 1968 Strongman mine disaster in which 19 miners died in an explosion. |
import { TestBed } from '@angular/core/testing';
import { provideMockActions } from '@ngrx/effects/testing';
import { ReplaySubject } from 'rxjs';
import { StoreModule } from '@ngrx/store';
import { BrowserBreakPointChangedAction, LargerDeviceBreakActivatedAction } from './core.actions';
import { BreakpointState } from '@angular/cdk/layout';
import { CoreEffects } from './core.effects';
describe('CoreEffects', () => {
let actions$: ReplaySubject<any>;
let effects: CoreEffects;
beforeEach(() => {
TestBed.configureTestingModule({
imports: [
StoreModule.forRoot({}),
],
providers: [
CoreEffects,
provideMockActions(() => actions$)
]
});
actions$ = new ReplaySubject(1);
effects = TestBed.get(CoreEffects);
});
it('should compile', () => {
expect(effects).toBeTruthy();
});
it('should return larger device break activated action', () => {
const payload: BreakpointState = {matches: true, breakpoints: {key: false}};
const action = new BrowserBreakPointChangedAction(payload);
const completion = new LargerDeviceBreakActivatedAction();
actions$.next(action);
effects.breakPointChanged$.subscribe(result => {
expect(result).toEqual(completion);
});
});
});
|
Does marriage influence whether a facially disfigured person is considered physically unattractive? Many recent studies have supported Dion, Berscheid, and Walster's viewpoint that "What is beautiful is good." In addition, several studies have found that an individual who is believed to be married to a facially attractive person will be perceived as attractive to other people. Few studies have examined how a disfigured or deformed face is perceived. The present study sought to determine whether perception of facial disfigurement is influenced by marriage to someone who has a normal face. Evidence to support this theory was found. |
<gh_stars>0
package com.google.android.gms.ads.internal.overlay;
import android.content.Context;
import android.view.View;
import android.view.View.OnClickListener;
import android.widget.FrameLayout;
import android.widget.FrameLayout.LayoutParams;
import android.widget.ImageButton;
import com.google.android.gms.internal.gr;
import com.google.android.gms.internal.op;
@op
public class zzp extends FrameLayout implements OnClickListener {
private final ImageButton f2454a;
private final zzv f2455b;
public zzp(Context context, int i, zzv com_google_android_gms_ads_internal_overlay_zzv) {
super(context);
this.f2455b = com_google_android_gms_ads_internal_overlay_zzv;
setOnClickListener(this);
this.f2454a = new ImageButton(context);
this.f2454a.setImageResource(17301527);
this.f2454a.setBackgroundColor(0);
this.f2454a.setOnClickListener(this);
this.f2454a.setPadding(0, 0, 0, 0);
this.f2454a.setContentDescription("Interstitial close button");
int a = gr.m6416a().m8690a(context, i);
addView(this.f2454a, new LayoutParams(a, a, 17));
}
public void onClick(View view) {
if (this.f2455b != null) {
this.f2455b.zzhj();
}
}
public void zza(boolean z, boolean z2) {
if (!z2) {
this.f2454a.setVisibility(0);
} else if (z) {
this.f2454a.setVisibility(4);
} else {
this.f2454a.setVisibility(8);
}
}
}
|
// StringField accesses a field in the SObject as string. Empty string is returned if the field doesn't exist.
func (s *SObject) StringField(key string) string {
value := s.InterfaceField(key)
switch v := value.(type) {
case string:
return v
default:
return ""
}
} |
Micro air vehicles energy transportation for a wireless power transfer system The aim of this work is to demonstrate the feasibility use of an Micro air vehicles (MAV) in order to power wirelessly an electric system, for example, a sensor network, using low-cost and open-source elements. To achieve this objective, an inductive system has been modelled and validated to power wirelessly a sensor node using a Crazyflie 2.0 as MAV. The design of the inductive system must be small and light enough to fulfil the requirements of the Crazyflie. An inductive model based on two resonant coils is presented. Several coils are defined to be tested using the most suitable resonant configuration. Measurements are performed to validate the model and to select the most suitable coil. While attempting to minimize the weight at transmitters side, on the receiver side it is intended to efficiently acquire and manage the power obtained from the transmitter. In order to prove its feasibility, a temperature sensor node is used as demonstrator. The experiment results show successfully energy transportation by MAV, and wireless power transfer for the resonant configuration, being able to completely charge the node battery and to power the temperature sensor. Introduction The applications of Micro air vehicles (MAV) are growing every year. One of these applications is measurement and monitoring. The MAVs can be used to transport any type of payload, from parcels 6 to sensors, 7 mobile node sensors or to transport the data collected by static sensor nodes. 8 In this last scenario, sensor nodes cannot communicate among them, hence, they need assistance to send the measured data. The MAV can pick up the data and transport to destination. Furthermore, the MAV can transport others payloads, as energy when the sensors are located in low-energy environments or harsh environments, for instance, a battery is inadequate in extremely hot environments, 9 the sensor node can capture the energy carried by the MAV. These nodes are non-battery sensor nodes. In addition, the tendency is that they are low cost and open source. 10 Thus, the sensor network is composed of two node types: a mobile node that integrates an MAV and several static nodes containing the sensors. There are many examples of applications that use this type of networks: monitoring bridges, 11 Internet of things, 12 agriculture 8 and many more. In order to simplify the energy transfer from mobile node to static node, a wireless transfer is used. Although the idea of wireless power transfer (WPT) began in 19th century, it is necessary to wait until the early 1970s where experiments with RFID tags were done by the U.S. government, 13 and by the early 2000s the Professor She Yuen developed a charger to provide resonant power transfer for small electronics. Recently, in 2007, MIT researchers were able to power a 60-W light bulb from a power source while providing 40% efficiency over distance in excess of 2 m using resonant inductive coupling. 14 Until that moment, the maximum transfer distances achieved between transmitter and receiver were on centimeter range scale. This event signified a turning point in WPT systems. In July 2010, wireless charging technology for portable electronic devices up to 5 W reached commercialization stage through launching the Qi Standard by the Wireless Power Consortium, 15 now comprising more than 220 companies worldwide. The main limitation for this energy transfer technique is the distance. It is only efficient for short distance. Instead of expending great resources to improve the efficiency with large distances, it is much easier to transport energy wherever is needed, shortening distance. MAVs can carry energy anywhere, reducing the distance to values where this energy transfer technique is efficient. have several examples of this application to sensor networks. Different optimizations have been introduced. In case of large node number, the optimization is oriented to determine scheduling priority for charging requests when multiple nodes are waiting for charging. Other optimization takes into account not only the distance but also the angle between the energy receiver and the charger's orientation. 24 There are applications in which the path medium is not air. For instance, in the case of implanted devices, the tissue media introduces path losses. 25 WPT systems using a resonant frequency are more efficient that those do not use it. It is possible to use a single frequency or multiple frequencies. 26 The ideal solution is to use large coils to obtain great efficiency, but it is not possible to use in an MAV. The main goal of this work is the study and development of a small WPT system, adapted to the dimensions and conditions imposed by the UAV, so that it does not suffer major changes in its dynamics. Furthermore, this work demonstrates the use of MAV for energy transportation in order to shorten the distance for an efficient WPT. This development is done using low-cost and open-source components and devices. In order to demonstrate that accomplish these constraints, an application has been developed. The system architecture consists of several modules: MAV, energy transmitter, energy receiver and sensor node, see Figure 1. The energy transmitter and receiver modules have been developed. The other modules are commercial ones. Those modules are described in the next sections. The design is easily adaptable to any other MAV system with any other electric system. WPT systems WPT works by modulating the generated electric, magnetic or electromagnetic fields to transport power from a transmitter towards a receiver at certain distance. There are two main types: the near-field transfers and the far-field transfers. The first one is divided into capacitive and inductive couplings, and the second one into propagating electromagnetic, microwave and photo-electricity. Table 1 summarizes several characteristics between near-field, nonradiative and far-field, radiative techniques. Efficiency is a desired characteristic, thus nonradiative techniques, near-field, were selected. Capacitive coupling was rejected because of safety issues related to the necessity of a high-source voltage. Magnetic fields interact so weakly with biological organisms, it is also important for safety considerations. 28 Model of resonant magnetic induction A changing magnetic flux through a surface bounded by a closed stationary loop of wire induces an electric current in the wire. This current is also found in a static magnetic field, when a changing magnetic flux is created by a moving loop of wire through the surface bounded by the wire itself. The magnetic flux, 1 m, through a surface is the surface integral of the normal component of the magnetic field,B, passing through that surface. Our system uses two loops: one to generate the magnetic field (transmitter), the other where the current is induced in it (receiver). In our case, these surfaces are defined as the transmitter and receiver loops, see Figure 2. These loops are formed by several turns, forming coils. As magnetic field is proportional to the number of field lines per area unit, the magnetic flux is proportional to the number of field lines through an area element. 29 Since the coil surface is flat, has a constant area, A, and has several turns, N, if we assume magnetic field is uniform in magnitude and direction everywhere on the area, the magnetic flux through the coil area is where h is the angle between the direction of B and the direction of the unit vector normal to the coil surface, n, see Figure 2. Equation shows that flux can be modified altering B; A; N or h. A; N and h correspond to the coil geometry. For an existent coil, it is easier to modify B than the geometry. Thus, it is necessary to use alternating current (AC) that generates a magnetic field that changes in time. The result of this variation of magnetic flux is an electro motive force, e, induced along the path that is equal in magnitude to the rate of change of the magnetic flux through the surface. This is known as Faraday's law According to the Faraday's law, the polarity of the induced magnetic field is such that it produces a magnetic field that opposes the change which produces it. Because of induced voltage and current are produced at the secondary side, power is successfully transferred from the primary to the secondary side. This is the basic working principle of the inductive coupling. Coreless transformer modelling In order to study the coils to be used in the inductive coupling, it is necessary to use an electric model of a coil. It is made of copper wire, thus, the coil, in addition to inductive behaviour, has resistive and capacitive behaviours; for this reason, the coil model used is composed by an inductance, a resistance and a capacitance, see Figure 3, left. The coil inductance L itself, the resistance R is the effective resistance of the conductor of the coil at the operating frequency. The capacitance C accounts for the end-to-end and turn-to-turn stray capacitance of the coil. 30 This capacitance is due to the fact that the inductor is made out of a coil of insulated wire. Therefore, tiny capacitors are created between the windings since there are two sections of conductor separated by an insulator. In our case, the capacitance is small enough and can be neglected, thus the model is composed by an inductance and a resistance, Figure 3, right. Coil resistance R At low frequencies (f < 200 kHz), 31 the resistance experiments a DC behaviour. Its value only depends on the wire geometry and material. The DC resistance of a metal conductor is given by where l is the wire length (m), S is the wire section (m 2 ) and q is the electrical resistivity of the metal material (Xm). For copper, the most usual metal used, is 1.6810 8 Xm. When the frequency increases up to 200 kHz, some effects appear that increase the wire resistance with the frequency. The resistance behaves as an AC resistance due to the skin-effect and proximity-effect. Skin-effect happens in all wire and cable. When the signal is DC, the current uses the entire conductor, with the same amount of current flowing in the inner part as on the outer part of the wire. As the frequency is increased, the current density is larger near the surface of the conductor and decreases with greater depths in the conductor. Consequently, the equivalent crosssection decreases and the wire resistance is increased with frequency. To quantify the skin-effect, the skindepth, d, is introduced. It is a measure of how far electrical conduction takes place in a conductor and is a function of frequency, no matter how thick the wire is where r is the electrical conductivity (1/q) of the wire material (S/m), f is the frequency (Hz) and l is the total permeability in free space and in material (l l 0 l m ). The resistance corresponding to skin-effect can be calculated as where d is the diameter of the conductor. Moreover, there is another phenomenon that increases the resistance of a conductor when an AC is applied. It is the proximity-effect. This effect is the apparent resistance increment of the wire due to the circulating current in the conductor caused by the alternating flux of other nearby conductors. As a result, more power losses appear in the windings. To quantify the proximity-effect, the Dowell's assumption 32 is used where N is the number of turns of the coil and W can be obtained by The total equivalent resistance is Coil inductance L Inductors with solid-core provide better coupling than air-core ones, but a limitation of our system is the weight transported by the MAV. The primary coil is wanted to go on a micro quadcopter, thus, air-core coils are used instead of solid-core ones. To calculate the coil inductance, Wheeler's formula can be used for air-cored inductor 33 where K is a parameter that depends on the dimension ratio (D/l) of the coil, where l is the length of the coil, whose value is listed in appendix 11.A of Chen, 33 D is the diameter of the coil and N is the number of turns. WPT modelling The WPT comprises of two coils: a primary transmitter coil (T x ) and a secondary receiver coil (R x ). The coils are modelled with a resistance and an inductance as seen above. Figure 4 shows this model that contains three voltage generators: V s is the generator of the power to transmit; jxMi 1 and jxMi 2 take into account the mutual inductance (M) of the coils. Furthermore, the model includes the resistances and inductances of the coils (R 1, L 1, R 2 and L 2 ) and the load resistance (R L ) of the device to be powered. The influence of the secondary coil in the primary one can be viewed as a reflected impedance (Z R ). Its value comprises the impedance of the secondary coil and the mutual inductance Figure 5 shows the equivalent circuit with the reflected impedance. The power transferred to the reflected impedance is given by V out can be calculated as where The maximum power transfer occurs when Z R Z 1. This result is a restrictive parameter since Z R depends on the mutual inductance, which in turn depends on the distance between the transmitter and receiver coil. Thus, there is no a unique optimal value of Z 1. This system has an important energetic drawback: secondary coil impedance is usually high; therefore, when the power transferred to the load is intended to be increased, the input voltage should be also increased, provided that P out is proportional to the square of V s. But this solution is not optimal because it requires higher current amplitudes in the primary coil, and therefore greater Joule losses. 31 In order to solve this disadvantage, resonance capacitors are added to the primary and secondary circuits. They cancel (or decrease notably) the large reactance of a coil by working at the resonant frequency. These capacitors allow to reduce the current amplitudes and to improve the efficiency of the coreless transformer. The intrinsic capacitances of the coils (see Figure 3) are negligible, but these capacitors are necessary in order to minimize the large reactance of the coils. These capacitors have a much higher capacity than the intrinsic capacities of the coils. A circuit containing an inductor and a capacitor has a resonant frequency (f 0 ). When this circuit works at that frequency, the inductive and capacitive reactances are equal in magnitude. Then they cancel and the resistance only contributes to the impedance. This one has a minimum value. Below that natural frequency, the resonance circuit looks capacitive, since the impedance of the capacitor increases while inductive reactance decreases. Above resonance frequency, the circuit behaves oppositely. There are four resonant configurations, see Figure 6. They are labelled as SS, SP, PS and PP. The first letter indicates for the primary, the second one for the secondary. S or P indicates series or parallel for the capacitor. The generators taking into account the mutual inductance of the coils (see Figure 4) are not represented in order to simplify the figure. The input power P in and the load power P L are where u is the phase between the input voltage, V S, and the primary current, I S. P in is multiplied by the power factor, cos(u), which corresponds to compute the active or consumable power. In order to select the best topology, the efficiency (g P L /P in ) and the output power is studied versus the resonant frequency (f 0 ). Figure 7 shows the efficiency (g), left, and the output power (P L ), right, for all topologies. It can be seen that the greater the efficiency, the lower the bandwidth. From the results, it can be concluded that the best topologies are SS and SP. PP topology has a better efficiency than SS and SP at the resonant frequency, but the output power is much lower. It is not possible to determine the ideal operating frequency without knowing many factors as coil sizes, self-resonant frequency, efficiency, etc. Hence, it is intended to determine the suitable frequency band where the coils could work properly. The upper limit is restricted by the maximum switching frequency of the power driver used to drive the transmitter coil. Other high frequency limitation is the coil selfresonance frequency (f s ) and the parasitic capacitance of the coils (see Figure 3). Exciting the windings with a frequency of about 10% f s ensure that the parasitic capacitive effects will not influence the inductor impedance values. 34 Due to the fact that the experimental results of f s are not higher than 30 MHz, the upper limit for maximal operating frequency is set to be 3 MHz. For low frequencies, there are no restrictions, but recommendations. The Wireless Power Consortium suggests as admissible, quality factor, Q xL/R, values above 100 for WPT applications. To achieve the desired Q factor, frequencies higher than 500 kHz are typically needed. Figure 8 shows the specific frequency band for coils' diameters between 3 cm and 10 cm, which is the desired order of magnitude of the coils due to drone size. The vertical arrows indicate frequencies (MHz) used in different works with similar characteristics as ours. The selected frequency should be some units of Mega Hertz. In our case, 1 MHz was selected due to drone size limitations, and it is easy and cheap to generate using a quartz crystal, which is stable and permits a narrow band. Hardware design of WPT As Figure 1 shows, the system is composed of an MAV, a transmitter unit and a receiver unit. MAV One of the initial objectives of the project is the WPT system outfitting on the micro quadcopter, remember that one objective is the use of low-cost elements. The inclusion of the quadcopter as an energy transporter restricts transmitter and receiver sides because of the weight and dimension. The coils must be designed taking into account the constraints imposed by the drone. The model used in this work is created by Bitcraze, its second micro quadcopter version, named Crazyflie 2.0, see Figure 9. It is one of the smallest quadcopter in the market. It is ideal for indoor and environments with obstacles. It measures 9.2 cm from helix to helix and weighs 27 g. It has a flight autonomy around 7 min at full thrust. Its maximum recommended payload weight is 15 g, and it supports up to 42 g of weight at take-off. It has two microcontrollers. The main one is used to execute the main application; it is a built-in ARMCortex-M4 processor, STM32F405. This processor has a 32-bit architecture and can work until 168 MHz. The second microcontroller is used to manage the power and the radio. This is an ARM Cortex-M0 microprocessor, nRF51822, that works at 32 MHz. Furthermore, it has an inertial measurement unit, MPU-9250, which is composed of a gyroscope of three axes, an accelerometer of three axes and a magnetometer of three axes. They provide 9 degrees of freedom. Additionally, it has a barometer to measure atmospheric pressure, LPS25H, and a temperature sensor. The quadcopter has two modules: the quadcopter itself, Figure 9 left, and an USB dongle, right, for its control. Crazyflie 2.0 is an open-source quadcopter. Its firmware is based on FreeRTOS. 38 It is an operating system for embedded devices. Crazyflie 2.0 can be controlled by three methods: from an Android device using an application, from a PC using a Python application that permits using a joystick and a Python library that permits sending orders to the quadcopter. Transmitter and the receiver circuits The main feature of the WPT system lies on energy conversion. Hence, the transmitter and the receiver circuits need power converters. Figure 10 shows the WPT system architecture. The power stored in a battery is conditioned for using by the transmitter coil. The power captured by the receiver coil is conditioned again for using by the load. Coil characteristics Typical shapes of WPT inductors include circular, square, rectangular and all regular polygons. Circular coils obtain a higher magnetic coupling than any other shape. This can be explained by the distortion of the field distribution around the corners of those shapes. 39 Each conductor has a different electrical resistivity which is an important parameter to define its DC and AC resistance. The most common metal used is copper. It is easy to obtain and it has a relatively low resistivity, 1.68 10 8 Xm. It is used as a wire of 0.59 mm diameter, with polymeric layer insulation, 1.4 mm total diameter, because of its ease to obtain. The dimensions are restricted by the payload of the MAV. Its maximum take-off weight is 42 g. The drone will carry other devices than the coil, and therefore, we limit the coil weight to 15 g. The coil radius is restricted by the drone dimension to 5 cm maximum. Three different coils were constructed to be tested to select the best candidate. Table 2 shows the dimensions of those coils. Model A corresponds to the maximum size allowed by the drone. As we said above, midrange WPT applications contain distances from coil diameter up to 10 times the coil diameter. 40 Thus, if we aspire to transfer power up to 40 cm, at least a coil with 4 cm of diameter is needed. This is the diameter of model B. Model C corresponds to an intermediate size. Both Tx and Rx coils were designed with the same dimensions for each of models A, B and C. This assumption simplifies computations and coil winding procedures. Transmitting side The transmitting subsystem is carried by the micro quadcopter. It has a battery for its powering. In order to simplify the system and avoiding increasing the total weight, it was decided to use one battery to give power to the transmitting coil and to the drone. The battery voltage is 3.7 V, and to increase power without having to use large current, voltage was increased. Figure 10 shows the different parts of the transmitter power adapter. The DC-DC converter raises from 3.7 V to 12 V. A switching regulator (TPS61088) is used to raise the voltage. It has an efficiency of about 92%. Figure 11. Electric schematic of the transmitter module. It is composed of a battery, a DC-DC converter, a DC-AC converter, a power driver and the primary coil and capacitor. The DC-AC converter (HEF4069) is an oscillator that prepares the voltage to attack the coil. It converts the 12 V DC to AC. The power driver is used to increase the current given to the coil. It is composed of Darlington transistors (ULN2803A) and power resistors. In our case, this current was 0.32 A. The maximum given power to the coil was around 3.8 W. Figure 11 shows the electric schematic of the transmitter module. It is composed of the components detailed above and the primary coil and capacitor. Figure 12 shows the assembled transmitter circuit containing the previous explained subsystems. It has the appropriate dimension to fit the droid. Receiving side The receiving subsystem has to adapt the captured power by the receiving coil. Figure 10 shows the different parts of the transmitter power adapter. It rectifies the received AC voltage to DC. It is composed of Schottky diodes. They can switch at the working frequency of 1 MHz. The DC voltage has to set it up to the desirable voltage level. A DC-DC boost converter (bq25504EVM) is used to increase the voltage. Then it is stored in a storage element for its use. The storage element can be a battery or a capacitor. In our case, a capacitor was chosen, of 140 mF. Figure 13 shows the electric schematic of the receiver module. It is composed of the components detailed above and the secondary coil and capacitor, and the sensor node. Figure 14 shows the assembled receiver circuit containing the previous explained subsystems. In order to demonstrate the system viability, a simple wireless sensor node was selected: eZ430-RF5000T. This device is a wireless developing tool with an integrated temperature sensor. An eZ430-RF5000T board is connected to the receiver and wirelessly communicates with other board which is Experimental measurements Several measurements have been done to test the previous designs. Coil characteristics Each coil is characterized by a resistance and an inductance, see Figure 3. They have been measured using an Agilent 4294 A Precision Impedance Analyzer (40 Hz-110 MHz). All voltage measurements are done using an Agilent DSO3062A oscilloscope and several Agilent N2862A probes. Figure 15 shows the measurement setup with two coils of model C, the probes and the oscilloscope. Table 3 shows the measured and calculated values for the three coil models, A, B and C, see Table 2. Tx is for transmitter coils and Rx for receiver coils. Calculated values are obtained using equations and. In order to select the proper coil model, several measurements have been carried out using the various configurations described above: SS and SP resonant configurations, see Figure 6, using the different model coils, see Table 2. The power is measured on the receiver coil to select the best configuration. Table 4 shows only several of the measures obtained in order to clarify this selection. The measurement setup is the following: Exciting voltage: 1 Vrms, correspond to Vs in Figure 6. Frequency: 0.7 MHz, 1 MHz and 2 MHz. Only the results for 1 MHz are shown in Table 4. Distance between coils: from 2.5 cm to 10 cm. Only the results for 3.8 cm are shown in Table 4. Table 4 shows that the best coil model is A, but C has similar results, although slightly lower. Regarding the resonant configuration, SP is better than SS. The A model is better than the C model, but the first one is larger, 10 cm in diameter, instead of 8 cm for C. This smaller model is better for coupling to the quadcopter and it allows better flight control and less rolling. Therefore, C coil and SP configuration are selected. Figure 16 shows the power received and the efficiency as a function of distance for SP topology and C coils. It compares the theoretical power received calculated using equation and the measured one. The theoretical curve is higher than the experimental one because the model does not take into account some losses. It can be seen that, as expected, the smaller the distance, the greater the power received. Therefore, the drone should be placed as close as possible to improve the transfer of energy. System performance A test was carried out to determine the autonomy of the micro quadcopter battery using the transmitter circuit coupled to the receiver, and charging the super capacitor without the load installed. As it was seen previously, the closer are the coils, the more efficient is the energy transfer. The tests were done using different distances between coils, from 2.5 cm to 7 cm. It is difficult to maintain a quadcopter in static flight, and to facilitate its positioning, it has pillars in order to maintain its position and avoid to waste battery energy using the quadcopter engines. In order to perform the tests, several pillars with different lengths were used. In order to facilitate the landing, we can attach a small camera to the UAV and a tag at the centre of the coil. Then it is possible to land manually, looking for the tag, or automatically using the Open CV library. 41 The full charging of the super capacitor in minimum time was obtained at a distance of 2.5 cm, it was at 10 min with the micro quadcopter battery without being discharged completely. Longer times were obtained with larger distances: 4 cm was 26 min, 6 cm 88 min and 7 cm 2.5 h. The micro quadcopter's battery is completely discharged after 15 min approximately, see Figure 17. The horizontal dashed line indicates the voltage limit where the inductive system is turned off. This limit corresponds to the minimum voltage allowed by the regulator to boost the voltage level to 12 V DC. The same test has been tested with the SS topology and the charge time is increased over 14 min. This test experimentally confirms that the optimal topology to use is the SP compensation topology. Figure 16. Power received and efficiency vs. distance for SP topology and C coils. Figure 18 shows the experimental set-up for these measurements. The quadcopter and the coils can be seen on the lower right area. The transmitter coil is located on the bottom part of the quadcopter in order to facilitate magnetic coupling with the secondary coil; furthermore, this placement, on the lower part of the quadcopter, facilitates its transportation and improves the quadcopter stability. The secondary coil is settled apart from the node and receiver circuits; this layout permits a better coupling with the primary coil and allows that the nodes can have the adequate setting to correctly carry out the measurements. Behind them, there is a computer that has connected a node. This node receives the data transmitter from the emitter node, the one that is powered from the secondary coil. The computer screen shows the temperature received, and on the right there is a detail of the temperature display. Conclusions This work demonstrates the feasibility of using a micro quadcopter for wireless energy transfer using magnetic induction to supply energy to a sensor node, using open-source elements, resulting in a low-cost system. The use of a resonant circuit is necessary to improve the energy transfer efficiency. Three different coils and four different circuits have been studied, simulated and implemented. Measurements have confirmed the results calculated. Several conditioning circuits have been used to adapt the energy saved in the micro quadcopter battery to be transmitted by the coils, and then saved again in the node supercapacitor in order to supply the sensor node. Coil sizes and working frequency have been optimized for using with the Crazyflie. Energy has been transmitted from the Crazyflie to a sensor node. Our system is capable to charge the super capacitor in 10 min, at 2.5 cm, using a coil of 4 cm of radius and 13.5 g of weight, allowing the node sensor to send the temperature wirelessly. This work shows the methodology and characteristics that the coils and circuits must accomplish in order to WPT and the MAV to transport the system. All components are low-cost elements. Using these directives, any other system can be designed, with any other dimensions. Declaration of conflicting interests The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. Funding The author(s) received no financial support for the research, authorship, and/or publication of this article. Figure 17. Micro quadcopter's battery discharging evolution. Receiver circuits Emitter and receiver nodes Figure 18. System performance measurement set-up: receiver circuits, left down; emitter and receiver nodes, left; MAV and coils, right down; PC, centre. |
Electron microscopic study of the peritoneal kinetics of iron dextran during peritoneal dialysis in the rabbit. Iron dextran, an electron-dense tracer, was given intravenously (100 mg of iron/100 g of body weight) to 8 normal rabbits to study its movement from the plasma to the peritoneal cavity during peritoneal dialysis. The dialysate infused at 75 ml/kg contained 1.5 g/dl of glucose in 4 animals and 4.25 g/dl in the remainder. Peritoneal dialysis was discontinued and the peritoneum was fixed in vivo at various times (20-120 min) after the injection of the iron dextran. Large amounts of tracer were detected in the effluent after draining the peritoneal cavity. Electron microscopic examination of the mesentery showed particles of iron dextran in the endothelial cells of small vessels (capillaries and venules) the interstitium and the mesothelial cells adjacent to vessels irrespective of the dialysate concentration or duration of dialysis. Tracer was not clearly demonstrated in the interendothelial or intermesothelial spaces. In the mesothelial cells, the particles were found exclusively in (small, elongated or large) vesicles, while in the endothelial cells they were both in vesicles and free in the cytoplasm. Our findings suggest that during the 20- to 120-min period after intravenous administration, the intracellular transport of iron dextran, depends on either moving vesicles or the presence of pre-existing tunnels in the mesothelial cells of rabbit mesentery. |
// Seconds returns the number of seconds represents by the spanstat. If a span
// is still open, it is closed first.
func (s *SpanStat) Seconds() float64 {
s.mutex.Lock()
defer s.mutex.Unlock()
if !s.spanStart.IsZero() {
s.end(true)
}
total := s.successDuration + s.failureDuration
return total.Seconds()
} |
from __future__ import unicode_literals
from frappe import _
def get_data():
return {
'fieldname': 'pyt_menu',
# 'non_standard_fieldnames': {
# 'Auto Repeat': 'reference_document',
# },
'transactions': [
{
'label': _('Payment Menu'),
'items': ['Payment Menu']
},
]
}
|
All this domestic turmoil is indicative of the way in which Brexit goes to the heart of Britain’s national identity. For this reason, it is hard to believe that the jingoistic associations of The Daily Mail’s cartoon were a coincidence. Brexit is rooted in imperial nostalgia and myths of British exceptionalism, coming up as they have — especially since 2008 — against the reality that Britain is no longer a major world power.
This is evident in Mrs. May’s rhetoric. Her Brexit speech, for instance, invited us to imagine the “Global Britain” that will somehow emerge once the country has left the European Union, its citizens “instinctively” looking, as she has claimed the British do, to expand their horizons beyond Europe and exploit opportunities across the world. This is simply a sanitized version of the dream of a British Empire in which every eastern and southern corner of the globe could be imagined as an Englishman’s rightful backyard, ready for him to stride into, whenever he so chose, to impose his will and make his fortune.
The bullishness of the Brexiteers represents a progression from an earlier era of revived empire nostalgia that might be described as the “Keep Calm and Carry On” era. From the mid-2000s, tropes such as the titular wartime posters, alongside a rediscovered love for old-timey delicacies like tea, cupcakes and gin, offered a retreat from a world made freshly hostile to the middle class by the global financial crisis.
These tropes abide today — but they have ceased acting merely as a shelter, for those who live surrounded by them, against politics. They have now become an active, transformative political force. It’s not just The Daily Mail cartoon, or Mrs. May’s crypto-imperialist rhetoric. It’s the U.K. Independence Party leader Paul Nuttall, striding about in a tweed jacket and matching hat like a Victorian country squire. It’s the Brexit secretary David Davis, responding to complaints from the Civil Service that it lacks the budget to deal with the logistics of leaving the European Union by invoking the Blitz spirit of World War II. It’s the foreign secretary Boris Johnson saying that France’s president, François Hollande, “wants to administer punishment beatings to anyone who chooses to escape, rather in the manner of some World War II movie.” Those most under the spell of imperial nostalgia have now become the sorcerers themselves, having somehow managed to conjure up a mandate to transform Britain in their image.
But no matter how confident the Brexiteers might be, their grip on reality remains patchy at best. Global Britain’s delusions are unlikely to withstand the shock of actually leaving the European Union. One indication of this came shortly after the referendum result, when it emerged that Marmite, an iconic British food, was actually owned by a Dutch company, Unilever. Its prices are set to go up after Britain leaves the European Union. Andrea Leadsom, the minister for the environment, food and rural affairs, has indicated that Britain’s post-Brexit trade strategy will be primarily based around the export of jam, biscuits and cheese. Britain, it seems, is in danger of becoming the world’s largest church fete. |
Gov. Jerry Brown has been getting quite cranky lately when anyone belittles a pet project, especially his proposed water tunnels.
And if he's crotchety now, wait until next year's election, when he'll probably be forced to defend his pricey tunnels and pokey bullet train.
That's because there'll be a citizens' initiative on the ballot that could bury the tunnels and sidetrack the train. The measure would require voter approval of any project with a price tag exceeding $2 billion if it's to be financed by state revenue bonds. The tunnels probably would be; the train, perhaps.
Last week after tunnel opponents protested on the state Capitol steps — claiming the $15.5-billion project was financially risky and a water grab by San Joaquin Valley corporate farmers and Southern California developers — Brown issued a brief prepared statement unique in its formal acerbity.
The governor began civilly enough: "The delta pipeline is essential to … protecting fish and water quality. Without this fix, San Joaquin farms, Silicon Valley and other vital centers of the California economy will suffer devastating losses in their water supply."
"Claims to the contrary are false, shameful and do a profound disservice to California's future."
Very un-gubernatorial. Since when is it shameful and a disservice to democracy to express an opposing viewpoint at the state Capitol?
You might recall that in a speech last spring to local water officials the governor told tunnel opponents to "shut up" unless they'd studied the project — as his administration had — for 1 million hours. "Because you don't know what the hell you're talking about."
That million hours, for one opponent, would consume 480 years of normal work weeks.
The water managers laughed, and a Brown spokesman later said the governor was just kidding. But the body language didn't show that. It portrayed a guy who thinks he's the smartest one around — maybe because he has been around longer than just about anyone else in the room. But Brown has always been that way, even decades ago when he was the new kid.
In July, you might also remember, Brown spoke at a climate-change conference in Canada and called U.S. politicians who refuse to act against global warming "troglodytes," or cave dwellers.
But back to the Sacramento-San Joaquin River Delta, California's main water hub. Brown has been trying to build two humongous 40-foot-wide, 35-mile tunnels under the West Coast's largest estuary. They would siphon fresh water from the Sacramento River before it flows into the delta and pour it into southbound aqueducts.
Brown says this is needed to protect California's water supply against collapsing levees during a big earthquake, against federal judges who periodically turn off fish-chomping pumps in the current plumbing system and against a rising salty sea in future global warming.
Opponents point out there has never been such a delta earthquake in recorded history. And they argue there are cheaper alternatives that wouldn't destroy delta farming and salmon reliant on fresh water. They include strengthening delta levees and installing better fish screens on pumps. Plus finally building reservoirs and focusing on local projects: groundwater cleanup, storm water capture, recycling and desalination.
One man who feels strongly about this is wealthy food processor Dean Cortopassi, 78, who has lived his entire life in the delta and loves it. He has spent $4 million of his own money to qualify what he calls the "no blank checks" initiative for the 2016 ballot.
It's not a referendum on the tunnels, exactly, but could collapse them.
A little civics refresher here: There are two basic types of state bonds. The most common is a general obligation bond, which is paid off through the state general fund with tax money. These bonds must be approved by voters. They're not involved in the initiative.
The second type is a revenue bond. It is financed with revenue from a project: vehicle tolls or water rates. Voters don't get a say on these projects because they're paid for by user fees.
Cortopassi's proposal would require any revenue bond project exceeding $2 billion to win voter approval. About the only current projects that would be affected are the twin tunnels and possibly the $68-billion bullet train. Voters already have approved $9 billion in general obligation bonds for high-speed rail, but that's far short of what would be needed to complete the line.
Brown, labor unions and business interests are adamantly opposed to the measure. They contend it would torpedo many infrastructure projects. There could be some, such as dams partly paid for by water users.
Requiring voter approval of huge user-funded projects might be a bad idea. That will require more thought. But the tunnel project was purposely set up to avoid the electorate. Politicians and their appointees are making all the decisions.
And as Cortopassi pointed out to me, delta plumbing provides water for about two-thirds of California's population.
"I find it a specious argument that users are not taxpayers and taxpayers are not users," he says. "When do they ever get a chance to say aye or nay? We shouldn't be leaving that kind of willy-nilly spending up to government agencies."
You'll no doubt be hearing more about that from the grumpy governor. |
Situations with enhanced chemical risks due to toxicokinetic and toxicodynamic factors. Recognizing toxicokinetic and toxicodynamic variability is important in risk assessment of chemicals and may help to explain interindividual differences in susceptibility in exposed populations. Both toxicokinetic and toxicodynamic factors may be influenced by age and disease processes and show genetic polymorphic variation. Decreased metabolic activity in the very young or very old may enhance chemical toxicity caused by the parent chemical. Similarly, disease processes affecting hepatic metabolism and renal excretion may delay inactivation of many xenobiotics. Genetic polymorphisms may enhance toxicity in rapid metabolizers when the toxicity is caused by a reactive intermediate and increase toxicity in slow metabolizers when the toxicity is caused by a parent chemical. Some cells of the developing conceptus are exquisitely sensitive to chemical exposure. Also, organs and tissues of newborns and elderly individuals may show increased responses toward xenobiotics. In addition, disease-induced altered receptor sensitivity and tissue repair may result in enhanced chemical toxicity. Further, tissue antioxidant defense against radical damage may be compromised under nutritional deficiencies and starvation. Hereditary peculiarities in individual responses to environmental chemicals may be due to polymorphic variation of receptor proteins and tissue repair enzymes, although the database for such variation is quite limited. |
<reponame>fabianojgf/JBDatetimePicker-Android
package jb.org.jbdatetimepicker;
/**
* Created by fabiano on 17/01/18.
*/
public enum DatetimeMode {
DATETIME, DATE, TIME;
public static boolean isDateAvailable(DatetimeMode mode) {
if(mode == DATETIME || mode == DATE)
return true;
return false;
}
public static boolean isTimeAvailable(DatetimeMode mode) {
if(mode == DATETIME || mode == TIME)
return true;
return false;
}
}
|
/**
* @file src/demangler/borland_ast/conversion_operator.cpp
* @brief Representation of conversion operators.
* @copyright (c) 2019 Avast Software, licensed under the MIT license
*/
#include <sstream>
#include "retdec/demangler/borland_ast/conversion_operator.h"
namespace retdec {
namespace demangler {
namespace borland {
/**
* Private constructor for Conversino Operator Node. Use create.
* @param type Node representing target type.
*/
ConversionOperatorNode::ConversionOperatorNode(
std::shared_ptr<Node> type) :
Node(Kind::KConversionOperator), _type(std::move(type)) {}
/**
* Creates shared pointer with Conversion operator.
* @param type Node representing target type.
* @return pointer to constructed operator.
*/
std::shared_ptr<ConversionOperatorNode> ConversionOperatorNode::create(std::shared_ptr<Node> type)
{
return std::shared_ptr<ConversionOperatorNode>(new ConversionOperatorNode(std::move(type)));
}
/**
* Prints string representation of conversion operator.
* @param s Output stream.
*/
void ConversionOperatorNode::printLeft(std::ostream &s) const
{
s << "operator ";
_type->print(s);
}
} // borland
} // demangler
} // retdec
|
During a time of economic strife and doubts, the new director of Peoria’s Ag Lab doesn’t have them. “The future is in our hands. Our mission is to solve important problems for the country and the world. As long as we do that, we’ll be fine,” said Paul Sebesta, who recently took over as head of the National Center for Agricultural Utilization Research.
During a time of economic strife and doubts, the new director of Peoria’s Ag Lab doesn’t have them.
“The future is in our hands. Our mission is to solve important problems for the country and the world. As long as we do that, we’ll be fine,” said Paul Sebesta, who recently took over as head of the National Center for Agricultural Utilization Research.
That’s not to say Sebesta thinks agricultural research is an untouchable when it comes to beleaguered budgets. “We worry about our funding and the sources of our funding. We just have to manage the best way we can,” he said.
Like other federal research centers around the country, the Peoria lab works on five-year plans, said Sebesta, who has been meeting with research units at the lab to familiarize himself with their work.
While Sebesta isn’t yet fully versed on all that goes on in his building, he has great respect for the people who work there. “I’m in complete awe of the scientists and support staff assembled here. It’s a humbling experience to be their director,” he said.
Peoria’s Ag Lab sprang from humble beginnings in December 1940 before making its name as the place that introduced the world to the large-scale production of penicillin. That accomplishment not only saved countless U.S. lives during World War II but is commonly regarded as opening the modern era of antibiotics.
Three hundred people, including 100 scientists, are now employed at a lab that has been the source of breakthroughs in biofuels, plastics and foods while leading to products such as Super Slurper, Fantesk and Oatrim.
Sebesta, 55, brings his own record of accomplishments to the lab, noting that his interest in agricultural research comes naturally. “My father was a wheat geneticist with the government. I learned about plants at an early age in Stillwater, Okla.,” he said.
Working with his father in the greenhouse and on field plots led to a career for Sebesta, who became a wheat breeder at Oklahoma State University.
After a brief stint teaching at North Dakota State University, he spent five years with the Monsanto company in Wichita, Kan. In 1987, Sebesta moved to Texas A&M University with responsibility for improving crop plants such as wheat, soybeans and turf grass.
The next stop was the University of Southern California, where Sebesta spent nine years as superintendent of the school’s Desert Research and Extension Center. While there he looked into the possibility of growing sugarcane in California’s Imperial Valley, the fertile growing area that serves as the nation’s major source of fruits and vegetables.
Sebasta’s interest in introducing sugarcane to the valley was to determine if it could be a source for ethanol to help meet California’s growing need for alternative fuels.
After what Sebesta described as a sabbatical — a return to Oklahoma to work for the National Audubon Society — he renewed his ag research at a federal lab in Texas near the Mexican border. “The focus there is entomology — insects — and it’s also one of four bee labs in the country,” said Sebesta.
That lab has been heavily involved with looking into colony collapse disorder, the mysterious ailment that has seen a huge reduction in the bee populations of the world, he said.
There’s no mystery regarding the Peoria lab’s focus: “Significant research on ethanol and biodiesel that’s all part of an international program to end our dependence on foreign oil,” said Sebesta.
As a wheat breeder who used a note pad and a hand calculator when he started his research, Sebesta cites the ongoing impact that computer technology has made on his field. “We’re seeing huge changes in mapping genes and molecular modeling,” he said.
“We’re looking for ways to better communicate what we do here. We want to get more involved with the community,” he said. |
package org.valkyrienskies.addon.control.item;
public enum EnumWrenchMode {
// Construct not Assemble because it would prob be mixed up with infuser
CONSTRUCT("construct"), DECONSTRUCT("deconstruct");
private String name;
EnumWrenchMode(String name) {
this.name = name;
}
public String toString() {
return this.name;
}
}
|
HOMEGROWN
CRITICAL CULTURAL COMMUNICATION
GENERAL EDITORS: Jonathan Gray, Aswin Punathambekar, Nina Huntemann
FOUNDING EDITORS: Sarah Banet-Weiser and Kent A. Ono
Dangerous Curves: Latina Bodies in the Media
Isabel Molina-Guzmán
The Net Effect: Romanticism, Capitalism, and the Internet
Thomas Streeter
Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance
Kelly A. Gates
Critical Rhetorics of Race
Edited by Michael G. Lacy and Kent A. Ono
Circuits of Visibility: Gender and Transnational Media Cultures
Edited by Radha S. Hegde
Commodity Activism: Cultural Resistance in Neoliberal Times
Edited by Roopali Mukherjee and Sarah Banet-Weiser
Arabs and Muslims in the Media: Race and Representation after 9/11
Evelyn Alsultany
Visualizing Atrocity: Arendt, Evil, and the Optics of Thoughtlessness
Valerie Hartouni
The Makeover: Reality Television and Reflexive Audiences
Katherine Sender
Authentic™: The Politics of Ambivalence in a Brand Culture
Sarah Banet-Weiser
Technomobility in China: Young Migrant Women and Mobile Phones
Cara Wallis
Love and Money: Queers, Class, and Cultural Production
Lisa Henderson
Cached: Decoding the Internet in Global Popular Culture
Stephanie Ricker Schulte
Black Television Travels: African American Media around the Globe
Timothy Havens
Citizenship Excess: Latino/as, Media, and the Nation
Hector Amaya
Feeling Mediated: A History of Media Technology and Emotion in America
Brenton J. Malin
Making Media Work: Cultures of Management in the Entertainment Industries
Edited by Derek Johnson, Derek Kompare, and Avi Santo
The Post-Racial Mystique: Media and Race in the Twenty-First Century
Catherine R. Squires
Sounds of Belonging: U.S. Spanish-language Radio and Public Advocacy
Dolores Inés Casillas
Orienting Hollywood: A Century of Film Culture between Los Angeles and Bombay
Nitin Govil
Asian American Media Activism: Fighting for Cultural Citizenship
Lori Kido Lopez
Struggling for Ordinary: Media and Transgender Belonging in Everyday Life
Andre Cavalcante
Wife, Inc.: The Business of Marriage in the Twenty-First Century
Suzanne Leonard
Homegrown: Identity and Difference in the American War on Terror
Piotr M. Szpunar
Homegrown
Identity and Difference in the American War on Terror
Piotr M. Szpunar
NEW YORK UNIVERSITY PRESS
New York
NEW YORK UNIVERSITY PRESS
New York
www.nyupress.org
© 2018 by New York University
All rights reserved
References to Internet websites (URLs) were accurate at the time of writing. Neither the author nor New York University Press is responsible for URLs that may have expired or changed since the manuscript was prepared.
Library of Congress Cataloging-in-Publication Data
Names: Szpunar, Piotr M., author.
Title: Homegrown : identity and difference in the American war on terror / Piotr M. Szpunar.
Description: New York : New York University, [2018] | Series: Critical cultural communication | Includes bibliographical references and index.
Identifiers: LCCN 2017044869 | ISBN 9781479841905 (cl : alk. paper) | ISBN 9781479870332 (pb : alk. paper)
Subjects: LCSH: Terrorism—United States—Prevention. | Terrorism—Social aspects—United States.
Classification: LCC HV6432 .S97 2018 | DDC 363.325/170973—dc23
LC record available at <https://lccn.loc.gov/2017044869>
New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. We strive to use environmentally responsible suppliers and materials to the greatest extent possible in publishing our books.
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Also available as an ebook
For Hanna and Roman
CONTENTS
Entrance: A Theory of the Double
1. Identity and Incidence: Defining Terror
2. Informants and Other Media: Networking the Double
3. Opacity and Transparency in Counterterrorism: Belonging and Citizenship Post-9/11
No Exit
Epilogue
Acknowledgments
Notes
Bibliography
Index
About the Author
Figure 1. Rolling Stone, August 1, 2013.
Entrance
A Theory of the Double
Twarz wroga przeraża mnie wtedy, gdy widzę, jak bardzo jest podobna do mojej.
(The face of the enemy terrifies me when I see how very similar it is to mine.)
—Stanisław Jerzy Lec, Myśli Nieuczesane
THE BOMBER. The all-caps bolded declaration juxtaposed against the image of an attractive teenager is a dissonant composition, one that scribbles in a tense interval into the score of the war on terror. For some, the image and its placement, reminiscent of Jim Morrison's posthumous Rolling Stone cover (September 17, 1981), not only glamorized a terrorist, but worse still disrespected his victims. Three people were killed and about 260 injured on the final stretch of the 2013 Boston Marathon when Dzhokhar Tsarnaev and his older brother Tamerlan remotely detonated two homemade bombs. Tamerlan was killed during a shootout with police. The younger brother's fate was foreshadowed by the caption accompanying the 1981 Morrison cover to which the 2013 one was widely compared: "He's hot, he's sexy, and he's dead." Tsarnaev was tried, found guilty of all thirty counts with which he was charged, and sentenced to death in 2015.
For others the image marked a cadence, the shifting of the war on terror into a new modality, however unpleasing. This sentiment was most clearly expressed by the Rolling Stone's Matt Taibbi who ruminated about the nature of the "modern terrorist": "You can't see him coming. He's not walking down the street with a scary beard and a red X through his face. He looks just like any other kid." In Taibbi's juxtaposition of the Tsarnaev cover to a 2011 Time magazine cover that posthumously featured Osama bin Laden (with "a scary beard and a red X"), the image of the enemy-terrorist morphs from a clearly delineated other packed in neat Orientalist binaries into a figure that confuses the boundaries that demarcate us from other. This figure is the Double.
After 9/11 philosopher and cultural critic Slavoj Žižek asked, "Are we in a war? Do we have an enemy?" echoing the French philosopher Jacques Derrida's post–Cold War reflections in which he lamented the violence that the loss of an identifiable enemy might bring. This lost enemy is the spatial-political structuring enemy central to the thought of German jurist Carl Schmitt. Yet, even as Žižek acknowledged the dispersion of the enemy into a shadowy network, he recognized the reinvigoration of the binary logic of the enemy image. Indeed, for the first decade of the twenty-first century, bin Laden (in name and image) acted as a synecdochic figure that stood in for a dispersed global enemy, providing a template for countless popular and political representations of threat, one built atop age-old Orientalist fantasies. The enemy, imagined as other, unifies a collective. By embodying what a collective is not—and externalizing blame, aggression, and evil—the other provides a clearly bounded adversary (by race, culture, religion, ideology, etc., however porous the political borders) against which to identify and be identified, against which to mobilize and be mobilized.
In 2010, Attorney General Eric Holder publicly announced that the threat facing the United States had changed. He warned Americans that they had reason to fear their neighbors, those "raised here, born here, and who for whatever reason, have decided that they are going to become radicalized and take up arms against the nation in which they were born." Janet Napolitano, secretary of homeland security, reiterated Holder's assertion in a statement to the Senate Committee on Homeland Security and Governmental Affairs. She testified that the threat of homegrown terrorism—Americans taking up arms against their own country—has no "typical profile." Certainly, the claim that the enemy is "walking among us" is a commonplace war on terror assertion. But it is a claim based on the loosening of state boundaries—the enemy walks across borders and within our cities. In the context of the war on terror, analysis of what threat looks like, that is, how it is represented, has continued to center on what the Italian political philosopher Carlo Galli calls the "hyper-representation" of others (the racialized enemy images that Žižek sees as reinvigorated). But the Double figure that I develop in this book, and that Napolitano and Holder invoke, does not fit this mold. Rather, it is a threat explicitly communicated as one not clearly or categorically identifiable. It demarks a foe running loose within the country's borders who might look, talk, and/or act "like us," who might materialize in the people and places one would least expect, even a good-looking, pot-smoking, popular university student.
This book fills this gap and analyzes security discourses that do not depend exclusively on hyper-representations of threat. Instead, it focuses on discourses that also rely on the regular invocation of markers of likeness and similarity. The articulations of likeness in security discourse are not to be taken as self-evident claims. Rather, much like those of difference they are "non-factual" constructs. In other words, I examine the exploitation of the murkiness against which hyper-representations are said to be deployed by the state. Here, the bin Laden image is overlaid (and as I will show neither erased nor discarded) by multiple, shifting others; Tsarnaev's is only one iteration in an ever-expanding series. Contra the other, the Double is a figure that, in failing to externalize the negative of a collective's own self-image, functions to disrupt the collective, marking the group as fractured. It takes the ambivalent and productive splitting of cultural theorist Homi Bhabha's stereotype (simultaneously dangerous/active and obedient/passive) and redirects it onto one's own community. More broadly, I show throughout this book that the Double is a modality of communicating threat that reflects the cultural-political plane on which contemporary security discourses operate. Here, the spectrality of the structuring enemy migrates onto the plane of representation. In this process members of a collective are marked as potentially dangerous, both suspect and susceptible.
Indeed, the breadth of events and actors described as terrorist has expanded in recent years, accompanied by the proliferation of debates concerning who is "the real terrorist" (though the seed of either growth is not to be found in the rubble of the Twin Towers). Referring to groups who participate in arson and other acts of sabotage, the Federal Bureau of Investigation announced in 2008 that "ecoterrorism" was the country's number-one domestic terror threat. In both 2009 and 2015, the Department of Homeland Security stated that the nation's most dangerous terrorists sprang from the political right—racist white supremacists and the Sovereign Citizen movement, respectively. The violence of the former most recently materialized when nine African American churchgoers were massacred in Charleston, South Carolina. The latter consists of loosely affiliated individuals who reject the authority of the federal government, several of whom have targeted and killed police officers. The violence against persons and property in these contexts is carried out by white men. However, in their warnings to the American public, Holder and Napolitano were concerned with neither the activist left nor the racist right. Rather, in both instances they were referring to jihadists.
There have certainly been incidents of jihadist violence in addition to the Boston Marathon bombing that have perplexed commonplace war on terror stereotypes. In 2011, Daniel Patrick Boyd, a former high school football star and small business owner from North Carolina, plead guilty to conspiracy to provide material support to terrorists. As did a New Jersey woman, Colleen LaRose (aka Jihad Jane), that same year in an unrelated case. In 2015, a Protestant-raised Oregon man turned al-Qaeda operative named Adam Gadahn was killed in a drone strike. A federal grand jury indicted him for treason nine years earlier. All three homegrown jihadists are Caucasian. More recently, sympathizers and recruits of the self-proclaimed "Islamic State" (ISIS) have left pundits similarly perplexed (such as the case of a nineteen-year-old white woman, Shannon Maureen Conley, from Colorado who was arrested by federal agents as she was about to board an Istanbul-bound flight, her first and last stop before heading to Syria). But, as this book will show, invocations of likeness in the context of terrorist threat, like those found in the statements of Holder and Napolitano, are not limited to those who are white. In this effort, here I depart from the Tsarnaev case and return to it in the conclusion.
In this book, I am not interested in adjudicating whether or not, or how much, an individual (threat, enemy, or foe) is "like us." This is often the work of rabid nationalists, though hardly exclusive to them. Rather, I approach claims of likeness from a more oblique angle. The original valence of Polish poet Stanisław Lec's aphorism in the epigraph is ethical and unhinging. It draws attention to how a collective can take on the monstrous qualities it projects onto its adversary in times of war. The moment he describes is not one of identification, nor is it simply a matter of role reversal. It is a fundamentally disruptive experience of asymmetrical refraction in which identification itself is put into doubt. Holder and Napolitano's statements, however, are best read as instrumentalizing Lec's aphorism, in what I call the discourse of the Double. What terrifies both Holder and Napolitano is not the simultaneous yet disjointed and disjointing realization of one's own brutality and one's adversary's humanity, but an enemy that blends into the crowd. Certainly, their conjuring of the Double is also disruptive, but is enacted through a governmental modality that services contemporary securitization. When Žižek illustrates that the work of identifying the enemy through markers of difference is never factual, but rather a laborious constructive process sometimes intricate sometimes crude, he risks naturalizing likeness, stating, "[the enemy] cannot be directly recognized because it looks like one of us." Here, without naturalizing the expressions of difference often used in producing images of the enemy, I seek to investigate the work of constructing likeness in the realm of security. This book focuses on the functionalities of making the claim that a terrorist is "like us" in a variety of respects, the historical and media backdrop against which this claim is and can be made, and the political repercussions of doing so.
America's anxieties concerning traitors and turncoats are hardly new. The Oath of Allegiance conscripts new Americans into the service of defending the nation "against all enemies, foreign and domestic." In the same vein, one need only think of the Cold War cries of "Reds under the bed." Thus, this book falls within a well-tread interdisciplinary nexus that grapples with the relationship between identity, media, and citizenship in times of conflict. However, within this tradition, homegrown terrorism in its specificity has received little attention. Terrorism as an idea has had several lives, but only recently has security discourse sprouted the concept of homegrown terrorism, generating a unique context within which the spectral or phantom enemy materializes in the communication of threat. Moreover, while the Double resurfaces in various historical moments, albeit in period-specific articulations, it has not been deployed as a heuristic through which to make sense of identity in and for war. The academic tradition that has examined the ways in which an adversary is imagined as or made identifiable and knowable has largely rested on notions of the other. American World War II propaganda exemplifies the use of stereotyped images—of the Japanese, for example—to mark threat, as do the many fictional portrayals both pre- and post-9/11 that the face of Osama bin Laden has come to represent. While the histories to which these examples are tied belie assertions that conflict is ever so neatly bounded, the question remains: how does the formulation of a threat as one that explicitly blurs the boundaries of representation in and for security, those thought so crucial for waging a successful campaign, affect the rhythms played on the drums of war?
This book breaks down this question into component parts in order to adequately address the issues of identity, media, belonging, and citizenship it raises. How is difference—racial, ethnic, classed, and religious—communicated within articulations of a threat that is said to be indistinguishable from the citizen (distinct from those in response to a lost enemy)? How is likeness injected into visual and textual representations of the homegrown threat? How do media practices (digital and analog) of terrorist groups, citizens, and counterterrorism efforts inform and structure invocations of the Double? What does the conjuring of the Double reveal about contemporary modalities of enmity and power? How are citizenship and belonging reimagined through the Double? What is the relationship of the Double to the other, to boundaries of inclusion and exclusion? What securitizing practices does the Double accompany and facilitate?
An adequate footing from which to address these questions requires a genealogy of homegrown terrorism, one that addresses the discourses, representations, conceptualizations, practices, and strategies of communicating threat found in both popular culture and official government matters. Too often the concept of terrorism is applied retroactively ignoring the conditions that facilitate its resonance and historical particularity. In contrast, here I situate homegrown terrorism in (and as arising out of) the past forty years or so of security discourse in the context of US politics. While history is surely replete with terror and doubles, the genealogy mapped in this introduction is intended to reveal the historical conditions and theoretical maneuvers that underwrite the concept of homegrown terrorism as it emerged during the Obama administration (a period accompanied by premature and politically motivated assertions of postraciality) and provide a base from which to theorize its accompanying figure, the Double.
The historical ground out of which homegrown terrorism and the Double arise is multilayered. Making sense of it involves retracing the transformation of terrorism from a vilifying term used in piecemeal fashion into a concept around which contemporary conflict is organized. Also required are surveys of the increased racialization of Arabs and Muslims coalescing in the brown-Arab-Muslim-other as well as the depoliticization of particular modes of violence; both are internal to the organization of actionable knowledge on and about terrorism. Together, these three intertwined histories illustrate how the Double takes its shape in the confounded boundaries of conflict, acquires its existentially threatening quality, and is formulated as a figure that inversely mirrors the citizen, respectively. In short, this genealogical triad forms the complex harmony over which the dissonant melody of the Double is played.
Terrorism: From Epithet to Refrain
International-Domestic-Homegrown
The word "terror" was introduced into European languages in the writings of the Benedictine monk Bersuire in the fourteenth century. It was not until another half millennium had passed that, in the wake of the French Revolution, "terrorism" entered popular parlance and, soon after, the Oxford English Dictionary: "a government policy intended to strike with terror those against whom it is adopted." Over the following century, terrorism would be divorced from the state and become "associated with anti-state violence under the impact of the Russian terrorists of the 1880s and the anarchists of the 1890s." Out of the transformation from state to non-state violence arose the central conundrum of terrorism: one man's terrorist is another's freedom fighter.
In the United States terrorism has long been a label used to vilify non-state actors. The pages of the New York Times provide a glimpse into this practice. The term first appeared in the newspaper in the 1850s, in column inches allocated to stories concerning anti-Abolitionist ("Pro-Slavery Ruffian") violence in Kansas, Iowa, and Tennessee. The actions of racist groups, such as the Ku Klux Klan, have also long been—though certainly not consistently—referred to as terrorism therein. October 19, 1859, marked the first time the term was used in a headline within the New York Times (in reference to vigilante violence in Louisiana).
In the early 1970s there was a distinct change in how terrorism was invoked in US politics. From a solitary staccato invective, terrorism gradually became an increasingly sustained (and sustaining) reverberation, namely, a refrain. Much like in its more conventional usage—a recurring phrase that connects various melodic and harmonic elements and gives a piece of music its identity—a refrain (ritournelle) in the work of French philosophers Gilles Deleuze and Félix Guattari marks out a territory by aggregating and holding together various objects, bodies, utterances, movements, and actions. At times referred to in Foucauldian terms—as an episteme and/or dispositif—the terrorism refrain, as a constellation of symbols, statements, definitions, presuppositions, and practices through which to make sense of particular violent phenomena, marks what is and can be discussed and dealt with as terrorism.
The turning point at which terrorism coalesced into a guiding lens through which to make sense of the world is contested. Sociologist Lisa Stampnitzky's study on how experts created terrorism marks the 1972 massacre at the Munich Olympics as a decisive event. For others, the Palestinian-Israeli conflict is central. The political context in which discourses of terrorism took hold in the United States was undoubtedly complex: the American war in Vietnam spurned a crisis of legitimacy in US politics; wars of decolonization continued to illustrate how a state's monopoly on violence could be wrestled away; airplane hijackings surged in the 1960s and 1970s; anti-Communist hysteria continued to fuel misguided global operations; and political violence within US borders peaked in 1970. Perhaps, the defining act to come out of all of this was not one that involved any direct physical harm. Rather, it was an executive command. In 1974, with the United States on the brink of defeat in Vietnam, President Richard Nixon abolished the Attorney General's List of Subversive Organizations, setting in motion a shift in security focus from subversion to terrorism (though these anxieties remained overlaid until the end of the Cold War and beyond). Nixon's move was prefigured earlier that year when the House Committee on Internal Security held hearings and published a staff study under the rubric of terrorism.
Around the same time, an academic field began to take shape around the notion of terrorism, a key landmark of which was the 1977 establishment of Terrorism: An International Journal. The connection between government agencies and the academy in ushering in an era in which political violence was increasingly made sense of as terrorism cannot be understated. Researchers and agency representatives attended the same conferences and government perspectives were regularly published in academic journals; Stampnitzky vividly outlines the details and nuances of this process. The resulting alignment of interests is unsurprising: one Cold War–era study asserted that 90 percent of terrorist groups either were Marxist or had pro-Marxist sympathies. Similarly predictable is that even in the proliferation of definitions and debates about terrorism that began to emerge at the time, much of the field of terrorism studies adopted an uncritical statist view that precluded or explained away the possibility of "state terrorism." In effect, the delegitimizing valence of terrorism—which was never done away with in the transformation of terrorism from epithet to refrain—was maintained and institutionalized under the guise of objective inquiry in favor of the state. This relationship continues into the present through journals, think tanks, and sanctioned talking heads on network news.
Early on, the purview of terrorism was international in scope, concentrated on foreign policy with a particular emphasis on how left-wing and revolutionary groups affected the interests of the United States. In other words, terrorism was largely a foreign land. For example, an early classification of terrorist organizations mentioned only one US group. More revealing in this respect is terrorism's initial migration into the US Legal Code. First introduced by the Foreign Intelligence Surveillance Act of 1978, the definition in the code currently cited by legislation was introduced by the 1987 Foreign Relations Authorization Act. These acts placed terrorism into Titles 50 (War and National Defense) and 22 (Foreign Relations and Intercourse), respectively; that is, they firmly situated terrorism in the realm of foreign policy. A preoccupation with the foreign or international continued into the 1990s and beyond as domestic groups were mentioned only in passing in many academic studies. The work of one prominent commentator on terrorism, journalist Brigitte L. Nacos, is indicative. Her 1994 Terrorism and the Media made no mention of domestic groups. The second edition of the book changed the subtitle to include the Oklahoma City bombing. In a later work, Mass-Mediated Terrorism, she asserted that the incident brought about an increased awareness of domestic terrorism in the United States but did not devote any significant attention to domestic terrorism until her 2005 Terrorism and Counterterrorism.
Despite the preeminent focus placed on the world outside of the United States, over time domestic spaces incrementally garnered more attention, altering the territory enclosed by the terrorism refrain. While the Attorney General's List of Subversive Organizations has never been replaced by a list of domestic terror groups, the FBI was nonetheless designated as the lead agency on terrorism within the United States in 1982. The agency focused on a variety of groups, such as Puerto Rican separatists and racist right-wing groups under the umbrella of "Aryan Nation Affiliates." It was not until 1992, however, that a distinction between international and domestic varieties of terrorism was entrenched in the US Legal Code. From the mid- to late 1980s and into the 1990s, academics followed suit and a variety of extremisms within America increasingly found their way into the pages of journals and books about terrorism. This included the racist, white supremacist right, abortion-clinic arsons and bombings—which, at the time, were increasing in frequency and exposure—and environmental terrorism or ecoterrorism. While the state and its violence was rarely the subject of inquiry, forms of racist violence endemic to US history were partially absorbed into discourses of terrorism, partially, it suffices to say, because the categorization of racist violence as terrorism remains more inconsistent than other forms.
In 1995 two white supremacists brought down much of the Alfred P. Murrah Federal Building by detonating a forty-eight-hundred-pound truck bomb. The Oklahoma City bombing was certainly a catalyst in annexing domestic spaces into the territory of terrorism. More importantly, it was also in the unsettled dust of the attack that "homegrown terrorism" was first uttered in US political discourse (the reasons and repercussions of which will be discussed in conjunction with the racialization of Arabs and Muslims below). Homegrown terrorism became a permanent fixture in security discourse a decade later in the wake of the 2005 London bombings when it was discovered that the perpetrators had grown up in the United Kingdom. In the United States, the term became widespread around 2009. While homegrown and domestic are often used interchangeably, the Department of Homeland Security offers the following definition:
A homegrown violent extremist (HVE) is a person of any citizenship who has lived and/or operated primarily in the United States or its territories who advocates, is engaged in, or is preparing to engage in ideologically-motivated terrorist activities (including providing support to terrorism) in furtherance of political or social objectives promoted by a foreign terrorist organization, but is acting independently of direction by a foreign terrorist organization. HVEs are distinct from traditional domestic terrorists who engage in unlawful acts of violence to intimidate civilian populations or attempt to influence domestic policy without direction from or influence from a foreign actor.
Much like the increased focus on domestic terrorism before it, homegrown terrorism also reconfigures the territory of terrorism. It does so not by expanding the space encompassed therein, but by altering the organization of the terrorism refrain in a more fundamental way. At first encompassing largely foreign actors, then an increasing amount of domestic players, with homegrown, a global quality emerges. The once guiding spatial distinction (domestic/foreign) collapses in homegrown: domestic actors (Americans or, at least, American residents) are operating in line with foreign ideologies. The Double begins to take shape in this confounded boundary.
Homegrown terrorism distinctively captures what Carl Schmitt called "absolute hostility," a mode of enmity characterized by global ideologies and a lack of any spatial or temporal limits: adversaries are not confined or locatable in delineated spaces and operations of combat are not constrained to a particular battlefield. But changes in the nature of conflict—a result of technological, tactical, and normative innovations—do not fully account for the emergence of the phenomenon of homegrown terrorism, particularly in how it is conceptualized, debated, and combated. Another key lineage integral to the problematic of homegrown terrorism is hinted at in the DHS definition above. It makes explicit something that the term "homegrown" itself implies: a foreign seed (of terror) takes root in American soil (in a manner beyond infiltration), the outgrowth of which can take multiple and shifting forms. Thus, as homegrown collapses the neat binary between foreign and domestic, it does so without fully negating either category—even if, as I will show, they do not exclusively manifest in forms of hyper-representation.
The Brown-Arab-Muslim-Other
The history of the contemporary terrorism refrain is simultaneously that of the foreign actor, the brown-Arab-Muslim-other. The oft-cited passage from French philosopher Alain Badiou's Infinite Thought illustrates the intimate link between this figure and terrorism:
When a predicate is attributed to a formal substance (as is the case with any derivation of a substantive from a formal adjective) it has no other consistency than that of giving an ostensible content to that form. In "Islamic terrorism," the predicate "Islamic" has no other function except that of supplying an apparent content to the word "terrorism" which is itself devoid of all content (in this instance, political).
Here, "Islamic" is not only a designation of religiosity, but also a racialized marker of difference. I use this triple-hyphenated term, "brown-Arab-Muslim-other," to indicate that these identity positions are often conflated and used interchangeably in discourses of threat.
Race or racialization in this context is a formation or process that goes beyond phenotype. Building on the work of Hannah Arendt, sociologist Sherene Razack explains that race thinking is a "structure of thought that divides up the world between the deserving and the undeserving according to descent." In the war on terror this division is traced and cut along civilizational lines, naturalized by an emphasis on the incommensurable difference between cultures and informed by the binary structures of Orientalist thinking. Following the work of Palestinian American cultural critic Edward Said, the West/Orient dichotomy depicts the latter as a space of oppression, backwardness, irrationality, danger, and extremism, in contrast to Western freedom, forwardness, rationality, stability, and moderateness. Racial superiority, when not unabashedly explicit, is certainly inflected in such "culture talk" and is no less evident in liberal discourses that distinguish between "good" and "bad" Muslims. The result is often framed as regrettable, yet necessary (or even "respectable") racism.
The history of terrorism by no means began—and perhaps may not end—with the brown-Arab-Muslim-other. Nevertheless, the development of terrorism qua refrain and the marking of Arabs, Muslims, and other brown bodies as undeserving share important landmarks. At a time when terrorism was coming to the fore in foreign policy circles, the brown-Arab-Muslim-other figured prominently in the representation and narrativization of key events: the 1967 Arab-Israeli War, the Oil Embargoes of 1967 and 1973, the Munich massacre of 1972, and the Iranian Revolution in 1979. Within the United States, this link fomented suspicion of Arab and Muslim American communities, transforming invisible minorities into a problem population. For example, in 1972 President Nixon's Operation Boulder targeted individuals of "Arabic-speaking descent" for intrusive surveillance and possible detention or deportation under the guise of fears of sabotage. The initiative was largely driven by assumptions regarding the stance of particular communities on the Palestinian-Israeli conflict. A similar anxiety emerged a thousandfold in the wake of 9/11. The intimate cross-stitching of the geographically ever-shifting Middle East and terrorism in US thought is plainly evident in the 1987 Foreign Relations Authorization Act, which introduced a definition of international terrorism into the US Legal Code. The authors of the act made a point of stating, "Middle Eastern terrorism accounted for 60 percent of international terrorism."
Islam did not begin to be dogmatically associated with terrorism until the 1980s, a process that was equally serpentine. At a time when America witnessed anti-Semitic violence perpetrated by racist white supremacists, the killing of a prominent Arab American by the Jewish Defense League, and the first fatality of the Unabomber, an FBI report relegated the "Islamic threat" within the United States to a passing mention as "Other" lumped with Anti-Nuclear Activists and United Freedom Fighters. Moreover, those warring under the banner of Islam in the 1980s, the Mujahideen in Afghanistan, where heavily supported by the United States. Hailed as freedom fighters by President Ronald Reagan, they were positioned as allies of the United States against a godless evil empire. At the same time, in 1984, Benjamin Netanyahu warned the Second International Conference on Terrorism that the threat of terrorism came not only from Communism but also from Islamic extremism. These contradictory narratives are not unconnected. Financing not only weapons but promotional tours seeking volunteers for the Afghan warfront, the United States was an active agent in aiding the internationalization of religious rhetoric in and for war. Representing a policy of supporting groups who opposed Communism in the Middle East that stems back to the Eisenhower Doctrine of the 1950s, the "Islamic" terror Netanyahu warned of was birthed out of Communist hysteria.
The end of the Cold War was accompanied by hawkish declarations of a "clash of civilizations." The resulting shift in bipolar groupings transformed the brown-Arab-Muslim-other from a potential agent of sabotage into an inassimilable presence. The World Trade Center bombing in 1993 was further used to solidify a connection between a civilization/culture and a particular trademark of violence, an association so ingrained that the Oklahoma City bombing was initially reported as being "Middle Eastern" in style, with the suspects described as dark-haired, bearded, and of Mideastern origin. In effect, the concept of homegrown in American popular and political discourse was birthed in a fear of the brown-Arab-Muslim-other. The confusion sparked by the revelation that the perpetrators were white is one replayed over and over again, though with different inflections, in cases of homegrown terrorism.
The inassimilable character of the brown-Arab-Muslim-other was only further entrenched by the advent of "New Terrorism" just before the end of the twentieth century. For Walter Laqueur, an American historian of terrorism, the New Terrorism is the result of a shift over time in the motivations of terrorists, from Marx to Muhammad to Armageddon. These are, however, not exclusive categories. Rather, in security discourse the movement from one to the next signals an upping of the ante in the clash of civilizations—even if it is a tendency relegated to "bad" Muslims, as a clash within civilization. The antipathy and pathology of the "East" intensifies from a premodern condition and morphs into an antimodern fanaticism that is necessarily millenarian, ringing cries of annihilation. A hallmark of Schmitt's absolute hostility, annihilation signals a change in the nature of the enemy (into what he calls a foe). In conventional conflict between nation-states, one's adversary is evil because she is one's adversary (which manifests for a variety of political reasons) and is thus targeted for defeat. In the ideological battles of absolute hostility, one's adversary is an enemy in the first instance because she is evil. Such articulations are evident in contemporary government and terrorist communiqués alike. Thus, one's adversary must be annihilated rather than defeated, a logic found in the often uttered (though historically disingenuous) statement, "We don't negotiate with terrorists." Here, the Double acquires its existentially threatening quality.
The existential threat posed by such an adversary exponentially intensifies when it manifests not only within US borders, but within people and places marked as familiar. When clearly bounded notions are confounded, different ways of making sense of the fanaticism of terrorism arise. In the context of homegrown terrorism, radicalization has most evidently resonated in recent years. Therein, this figure is often positioned as an agent of infiltration. But in other instances it is also invoked in more complex ways that cannot be reduced to the hyper-representation of an other and merges with or is shaped by that which is marked as American or familiar (suggestive of Galli's "Global War"). In either case, the realities of increased contact and exchange fostered by digital, social, and global media are certainly a key aspect in this regard but do not fully account for the particularity of radicalization discourse in the US context. Enter the third lineage constitutive of a genealogy of homegrown terrorism, clues to which lie in the marking of threat as existential. To speak about threats as existential and necessitating annihilation (whether emanating from all or "bad" Muslims, or a distinct individual/group marked as such via simile) is to depoliticize violence. While undoubtedly deeply tied to the formulation of a civilizational other, the reduction of violence to irrationality and evil is equally tied to the increasing codification and routinization of terrorism in and through the US legal apparatus.
Political Violence
The idea that the kernel of hostility lies in inherent cultural or civilizational traits uproots acts of violence from their historical-political contexts. As does the framing of particular modes of violence as wrought exclusively for vengeance, bloodlust, and fanaticism rather than in the service of resistance or decolonization. The confluence of these notions has ushered in practices marked by the emergency or suspension of law aimed at annihilation: Guantanamo Bay, drone strikes, Abu Ghraib, extrajudicial killing, capture or kill lists, and so on. However, the depoliticization of violence is complex and multivalent. To fully account for how homegrown terrorism is conceptualized, addressed, and managed, other avenues need to be explored.
In sharp contrast to the exceptional bodies confined to the cells of Guantanamo Bay, there are actual terrorists walking the streets of America today. Not the shadowy figures security discourses warn of, but those who have been convicted of terrorism-related crimes, have served jail sentences, and have been ultimately released. This includes Daniel McGowan, a convicted ecoterrorist; Rothschild Augustine, part of a group called the Liberty City Seven, who was caught up a sting operation and sentenced to seven years in prison; and two men from the Virginia Jihad Network, Khwaja Mahmood Hasan and Yong Ki Kwon, whose initial sentences were reduced (and who are now released) after reaching plea agreements and cooperating with prosecutors. Even John Walker Lindh, an American captured fighting alongside the Taliban, has a projected release date of May 2019. These instances point to a need to go beyond narratives of exception to make sense of homegrown terrorism. There has been much debate over whether terrorism ought to be addressed through a war paradigm or as a problem of law enforcement. Critics of the war on terror have placed much focus on the war paradigm and how it has seeped into and/or usurped the law. However, the depoliticization of violence has as much to do with the criminalization of terrorism as it does with the militarization of law.
While much attention has been (rightfully) given to the US PATRIOT Act in this regard, the process began decades earlier and produced a variety of implications. For example, the much-discussed "material support" statutes were amended rather than introduced by the PATRIOT Act; they were drafted in the 1994 Violent Crime Control and Law Enforcement Act (section 120005). This occurred two years after the Federal Courts Administration Act inscribed a distinction between domestic and international terrorism into criminal law. What is significant here is that while the previous inscriptions of terrorism into the US Code (in 1978 and 1987) were connected to foreign policy, the 1992 distinction is placed in Title 18 (chapter 113 B, section 2331), Crimes and Criminal Procedure, a markedly different focus. During the 1990s there were various attempts to further criminalize political violence with a variety of repercussions, some exceptional, others not. For example, the US Antiterrorism and Effective Death Penalty Act of 1996 established a list of "foreign terrorist organizations" and the ability to deport suspected terrorists based on secret information. Others facilitated practices that could hardly be characterized as exceptional. In the wake of the Oklahoma City bombing, the "terrorism enhancement" of the Federal Sentencing Guidelines (section 3A1.4) was enacted, under which a judge may significantly increase the sentence of an individual if his crime is deemed to be terrorism (we see examples of this in Chapters 1 and ). This is not to suggest that practices that could be characterized as exceptional have been abandoned. While the proposed Enemy Expatriation Act of 2012, which sought to grant the government the ability to strip individuals of their citizenship if convicted of a terrorism-related crime, initially failed—thought to have no chance of surviving a challenge on constitutional grounds—it has reemerged in more recent proposed legislation that I address in Chapter 3. Nevertheless, the point here is that the criminalization of political violence sets up a particular mode of depoliticization that opens the door to discourses of radicalization.
Historically, every time terrorism entered (or threatened to enter) mainstream political discourse its valence of illegitimacy has been articulated in different ways. But the marking of terrorism as inhuman and barbaric always begins, pace Badiou, with the manner in which it is emptied, or made "devoid of content." This process is evident in the definition found in the US Legal Code: "premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience." While terrorism is often used interchangeably with or is defined as "political violence," the two are hardly synonymous. Terrorism transforms the single space that separates the two terms (political violence) into an intractable gap, a distance already signified in the US definition by the insertion of "motivated." Political, in the context of terrorism, is thus always meant to be understood as being struck through, as political, that is, as fundamentally illegitimate. The obliteration of the political is completed through the stress placed on noncombatants, those who cannot be rightfully constituted as targets of aggression. The absence of legitimacy leaves in its wake only barbarism, irrationality, and evil.
In a peculiar maneuver, defining terrorism in US law voids the very motive fundamental to distinguishing it from other types of criminal violence, marking the complexity of its operation. Take, for instance, the 2006 Animal Enterprise Terrorism Act, which replaced the 1992 Animal Enterprise Protection Act. The result of a decades-long effort on the part of business lobbies, it is an example of the successful introduction of terrorism into new spaces of activity. The striking through of the political in domestic law opens an aporia in the "incorporeal transformation" of a criminal, arsonist, or vandal into a terrorist. It is the political that differentiates these figures. Yet, when making sense of these crimes the political cannot be given significant weight. The political must be simultaneously invoked and refuted: "These individuals claim to be motivated by the deprivation of the earth, but what is really driving them?" In other words, without a legitimate political lens through which to decipher the motivation to violence and with the stakes becoming increasingly global, a void emerges: how to make sense of incidents in which Americans carry out terroristic violence against America? In effect, the political returns criminal motive to the level of the personal, but not in the same way as it relates to petty crime. The move back to the personal in the context of homegrown terrorism is not marked by a motivation of material gain. What remains is pathological.
Useful here is French philosopher Michel Foucault's interrogation of how psychiatry came to bear on law in the nineteenth century by addressing crimes that appeared to be "without reason" and "against nature"—two phrases commonly used to describe terrorism. Crimes, in essence, not preceded by a history, disturbance, or sign. The psychologizing of such crimes—like that of a woman who killed and decapitated her neighbor's daughter, tossing her severed head out a window—injected into the fabric of society, a "dangerous individual." This dangerous element is similar to the "enemy of mankind" that emerged alongside and facilitated the terror of the French Revolution. Today, homegrown terrorism is discussed in similar terms. To be clear, my argument is not that homegrown terrorism is a crime without reason, history, or sign. As I show in the following chapters, these are precisely the claims made in government discourses. Rather, the history I am outlining illustrates how it has become possible to speak about homegrown terrorism in this way. While certainly not the same as the merging of insanity and criminality in Foucault's argument, what I argue here is that without the political to explain or make sense of violence, and yet a need to distinguish particular actions from petty crime, violence becomes unintelligible, monstrous, and irrational and a space opens up in which the (pseudo-)psychology of radicalization comes to bear on terrorism.
Large amounts of government capital and academic effort have been placed into outlining, detailing, and defining the process of radicalization. Faiza Patel, co-director of the Brennan Center's Liberty and National Security Program, outlines two approaches to radicalization. On one end of the spectrum, proponents of radicalization almost all agree that there is no singular profile of a homegrown terrorist based on categorical schema such as race, ethnicity, class, gender, or religious upbringing. On the other, as political writer Arun Kundnani also illustrates, theories of radicalization are built on the assumption that violence originates from theological ideas. In fact, many theories, but not all, do focus solely on jihadist violence. Certainly, radicalization and the practices it underwrites are not equally distributed—the Double does not usurp the other, a topic I will return to below. Here, I am interested in the conjunction of the two approaches, and suffice it to say, models of radicalization however unequally deployed do not operate on the logic of the other exclusively. This is not to say that those "less reductive" theories are any less problematic; only that their multiplicity and messiness ought to be addressed. The theories posit a process in which a plethora of cognitive, affective, and experiential factors move someone from an unremarkable state and into one of bloodthirsty violence. These factors are conceptualized as personal, social, economic, and political (or more appropriately political), from one's views on the war on terror to one's feelings of social alienation, from one's familial relations to one's socioeconomic status. Reflected in the "If You See Something, Say Something" campaign, in which the terrorist is often depicted as white, injected into discourses of terrorism is an idea that the threat America faces is not easily confined to particular categorical molds. Rather, threat is communicated as a distributed potential, as a dangerous element that can be triggered or put into action by the most ordinary of experiences or constellation of factors—which ultimately helps to strike out any political motive as legitimate. Sounding calls for monitoring, this narrative comes to signify not only "the rare and monstrous figure of the monomaniac... [but also] the common everyday figure of the degenerate, of the pervert, of the constitutionally unbalanced, of the immature, etc." In effect, the figures are merged and the face of the foe is shown to mirror that of the citizen; the Double might materialize in the most ordinary of shapes.
The lineages that make up homegrown terrorism's genealogy are complex lines that contain overlapping and cascading notes. The territorial shifts of the refrain (from international to domestic to homegrown); the changes in security concerns from the Communist to the jihadist and beyond; exceptional and administrative modes of depoliticizing violence—none of these divisions are absolute, and the emergence of one, much like the move from the other to the Double, does not depend on the disappearance of another. Together the lineages constitute a historical triad from which to understand the emergence of the Double in its current forms and inflections. For Sigmund Freud, the Double simultaneously embodies what is "familiar and agreeable and... that which is concealed and kept out of sight." A figure that takes the most ordinary of shapes (the everyday citizen) together with the most existential of threats (the monstrous terrorist), the Double is a dissonant melody, always out of key and in constant motion. The genealogy of homegrown terrorism does not produce the shape of the Double in any deterministic sense. The Double is an amorphous and complex figure. This history simply provides a backdrop from which to begin to theorize and make sense of the ways in which the Double is constructed in contemporary security discourses.
The Double
A cultural-literary motif employed in oral and written traditions across cultures and civilizations, the Double dates back to a twelfth-century BCE ancient Egyptian story, "The Tale of the Two Brothers." In it doubling is evident not only between the two brothers, but also in the externalization of the younger's soul, which takes on many changing forms. Shadows, reflections, and twins—the earliest manifestations of doubling that fascinated humankind—souls, lookalikes (doppelgängers), clones, suspected imposters, complementary characters, and psychological personality splits, these are the many expressions of the Double. Oscillating in and out of fashion, late eighteenth- to early nineteenth-century European literature marks the height of the Double's popularity. Despite claims of its facile nature and that film had reduced its complexity, the Double has retained its peculiar draw. Notable twentieth- and twenty-first-century writers who employed it include Kafka, Borges, Nabokov, Saramago, Roth, and Pamuk, to name a few. In intellectual circles the Double has been applied to an equally dizzying array of themes: Saussure's theory of the sign, Christian theology, Hegel's dialectic, Lacanian psychoanalysis, Derrida's work on language and representation, posthumanism, literary history, and the relationship of philosophy and literature more generally.
The Double's seemingly endless iterations and uses present the daunting but necessary task of defining how it will be used throughout this book and how it relates to homegrown terrorism. While the Double's multiplicity has led some to describe the concept as "embarrassingly vague," malleability and amorphousness are its essence, its constitutive anxiety found in its shifting and porous boundaries. The blurring of clear boundaries is precisely the core anxiety concerning incidents of Americans taking up arms against their own country and a productive force in strategies of security. Thus, the definition offered here does not reduce the multiplicity of the Double, but retains its core ambiguity. Also, since the nineteenth century—though some trace this back to Descartes's division of cogito and res extensa—the Double has been a predominantly psychological construct marking opposing tendencies, identity crises, and man's fundamental incompleteness. While this book is primarily concerned with the Double in a collective context, the psychological inflection remains consequential. Claims that a Double is lurking and loose within the collective are dependent on assertions that the group's members are not only suspect but also susceptible to crises of identity. With these points in mind, the Double is a trope that blends the familiar and the unfamiliar by placing within the familiar an amorphous sense of otherness, strangeness, and potential danger.
The bright rays fell vividly upon the sleeper, and my eyes, at the same moment, upon his countenance. I looked;—and a numbness, an iciness of feeling instantly pervaded my frame. My breast heaved, my knees tottered, my whole spirit became possessed with an objectless yet intolerable horror. Gasping for breath, I lowered the lamp in still nearer proximity to the face. Were these—these the lineaments of William Wilson? I saw, indeed, that they were his, but I shook as if hit with a fit of the ague in fancying that they were not. What was there about them to confound me in this manner? I gazed;—while my brain reeled with a multitude of incoherent thoughts. Not thus he appeared—assuredly not thus—in the vivacity of his waking hours. The same name! the same contour of person! the same day of arrival at the academy! And then this dogged and meaningless imitation of my gait, my voice, my habits and my manner! Was it, in truth, within the bounds of human possibility, that what I now saw was the result, merely, of the habitual practice of this sarcastic imitation?
Edgar Allan Poe's short story "William Wilson," from which the above passage is quoted, begins with a man who narrates his lifelong entanglement with his Double (who I will also refer to as "Wilson"). The Double's likeness to the narrator is at first made evident to the reader only through their common name. Time and again the Double thwarts the narrator's mischievous actions. Their story ends with a single-blow murder-suicide in which the narrator kills Wilson, and, through a mirror that subsequently takes Wilson's place, realizes that he has mortally wounded himself. One of innumerable possible examples, Poe's story is a richly dense source from which to illustrate my definition and introduce key aspects of the Double. These include the identity markers deployed in conjuring the Double, its tie to media and communication technologies writ broadly, and, ultimately, its function in the context of homegrown terrorism.
The above passage describes the moment in which the narrator first recognizes the face of the Double as an exact likeness of his own. The Double often appears—and is predominantly thought of—as a lookalike. This occurs slowly in Poe's story. The narrator discovers their shared physiognomy gradually over time and only once he examines the sleeping Wilson by candlelight. The closing scene leaves no doubt: "in my death, see by this image, which is thine own, how utterly thou hast murdered thyself." Dzhokhar Tsarnaev embodies this realization in the context of homegrown terrorism. But the Double does not solely, or always primarily, manifest in phenotypic duplicates or matching physiognomies. It can appear in vision (not limited to the face or physical body), voice, and manner. In "William Wilson," before the reader learns of the uncanny similarity between both faces, the narrator indicates not only physical likenesses—height, "general contour of person and outline of feature"—but also similarities in style of dress, gait, and the timbre of voice. Indeed, the conjuring of the Double in cases of homegrown terrorism is not exclusively based on physical markers but, paralleling the racism that pervades the war on terror, is centered on cultural markers as well as behavioral ones. Chapter 3 illustrates how officials and the media communicated a frightening recognition of "something of ourselves" in Anwar al-Awlaki—an American cleric affiliated with al-Qaeda killed in a 2011 drone strike—by highlighting his familiarity and command of American culture evident in the delivery and content of his lectures. In Chapter 1, Nidal Malik Hasan, the Fort Hood shooter, was said to be hiding in plain sight, camouflaged by his US Army fatigues (he was a military psychiatrist). These two cases illustrate how a variety of markers of likeness are invoked even in cases involving physiognomies that, throughout the war on terror, have consistently been made other.
The amalgamation of self and other in one individual, or the splitting of an individual, is often accounted for in media and official discourse through recourse to technologies that facilitate access to that which has been deemed foreign. Paralleling Schmitt's assertion that developments in technology (including communication technologies) have changed the nature of conflict, the infiltration of America or radicalization of Americans by a malignant otherness is often attributed to communications media, particularly digital media. The Tsarnaev brothers were said to live out their second or shadowy lives on social media. The Fort Dix Five were said to be inspired by the digital output of Anwar al-Awlaki (Chapter 2), who himself continued to exist as a digital doppelgänger after his death in 2011 (Chapter 3). This is by no means a recent development in the Double motif. The ubiquity of the Double in nineteenth-century literature was also closely linked to anxieties concerning new technologies and the novel forms of contact they facilitated with distant others. In Stevenson's Strange Case of Dr. Jekyll and Mr. Hyde, the electric light allows Hyde to roam the streets of London carrying out his vile desires—much like candlelight allows the narrator to finally see his Double in "William Wilson." In Mary Shelley's Frankenstein, new technologies produce a monstrous Double. Historically and today the Double (re)emerges in and through anxieties concerning the development of a "world of perpetual light." Chapter 2 illustrates the ways in which a wide variety of media and communications technologies (e.g., books, airplanes, bombs, websites) placed in ubiquitous digital and analog networks (intimately connecting virtual spaces, foreign lands, and the living rooms of ordinary Americans) are implicated in the discourse of the Double and the securitizing practices it facilitates.
Bringing the Double into the context of the collective and, more importantly, the collective at war in its contemporary form begs the question of what exactly the invocation of the Double facilitates. What does framing an enemy as a circulating potential within ubiquitous communication networks and brought to life through experiences and pressures common to everyday life (as per theories of radicalization) do to notions of belonging? What is the utility of constructing a threat "like us" and proclaiming that this "highly energized and potentially dangerous" figure is loose within the collective? An understanding of the function of the Double begins with addressing its status as potentially dangerous.
The simple appearance of one's likeness, whether in vision, voice, or manner, and however disorienting, does not fully explain the horror of the narrator's experience in "William Wilson"—tottering knees, lack of breath, and reeling mind. The Double motif is not a priori tied to terror. Not only was the Double once employed for comic effect, but in some of its earlier usages the figure signaled different variants of immortality. In Judaic tradition, the Double's appearance was considered proof of the soul's existence and thus man's immortality. In the burial rights of Roman emperors, the use of and ritual around an effigy of the deceased signaled that "while the king may die, the King never dies." However, what was once a guardian angel would come to be viewed as a harbinger of death. The presence of one's Double took on the meaning that one's soul had departed the body, signaling one's ultimate doom; hence, the reference to the Double as "the fetch" in Scottish folklore. In literature, those who come across their Double, like the narrator of "William Wilson," eventually, and often quickly, meet their demise. Here, the "unfamiliar" is not simply another body or figure, but an otherness sensed in the presence of the familiar, in their conflation. When Freud states that the Double conceals something under the veneer of agreeability, the implication is that what is kept from sight is ominous, disturbing, and dangerous (its potency due to its inseparability from the familiar).
The Double, pace Freud, is underwritten by the logics of not only splitting and duplication, but also doubt and duplicity, giving the many forms of likeness embodied in the Double a peculiar valence. The Double is no mere facsimile. In the pangs of discovering the Double's face, the narrator refers to Wilson's gait, voice, habits, and manner as "sarcastic imitation." However, he otherwise admits that through these, Wilson presents an "exquisite portraiture... [that] could not justly be termed a mere caricature." Moreover, in the climactic finale in which a mirror appears in place of Wilson, the narrator utters in response to the image in it, "Thus it appeared, I say, but was not." Here, the narrator communicates the ambivalence of the Double motif and how it works precisely to put into doubt any clear distinction between one and one's double. Doubt and duplicity are also evident in the multitude of terms the narrator employs to describe Wilson: brother, namesake, twin, companion, imposter, and antagonist.
In a collective context, particularly that of homegrown terrorism, the effect of the Double translates into an inability to tell friend from foe: "the phenomenological problem posed by [doubles such as Stevenson's] Hyde is that his deformity is unnamable. The monster cannot be expressly distinguished from normal forms," only intensifying the existential threat the figure presents. The Double populates and generates what Schmitt calls "wider spaces of insecurity, fear, and general mistrust." Like the narrator's unease about when and where Wilson might turn up—doubly reflected in the narrator's claim that their shared name is so unremarkable and ordinary that it is the "common property of the mob"—the discourse of the Double injects a similar anxiety into contemporary America. Family, friends, and neighbors of Americans who are charged with terrorism-related offenses or attempt to join ISIS exclaim in surprise at the revelation—"If he's a terrorist, he's the nicest terrorist I ever met in my life!"
The Double unsettles and prevents closure: "what captures and entraps—what seems inescapable—is none other than an ever changing tendency to shift and defer, ad infinitum." What this entails is, again, best illustrated in contrast to the functionality of the other. The other establishes clear boundaries and sutures a collective's identity. It circulates within what Foucault calls relations of disciplinary power. Discipline is a modality of power that lets "nothing escape," utilizing strategies of enclosure, confinement, and observation that materialize in a variety of spaces: the prison, the clinic, the asylum. All of these disciplinary spaces divide the normal from the abnormal and structure what is permitted and what is prohibited. The present-day use of communication management units (which place extreme limits on contact with the outside world) in federal prisons, Guantanamo Bay, and various other black sites in which many brown, Arab, and Muslim men (marked as other) are held without charge or chance of release is a poignant reminder of the continuing relevance of disciplinary power, however modified by the logic of the exception.
The Double, on the other hand, could be said to simultaneously underwrite and exceed what Foucault terms biopolitical strategies of management that operate through a calculus of ratios and probabilities and in which pathologies are immanent rather than confined. Taking into account a whole constellation of variables, this modality of power is visible in theories of radicalization that, rather than always employing clear categorizations (though many do), consider a broad and ever-expanding list of cognitive, affective, and experiential variables in calculating what may take an American outside an acceptable curve of normality. In search of and in anticipation of the dangerous individual, this logic of security "works on the future" and focuses on the uncertain and "tries to prevent violence, crime, terror, etc.] in advance"—an urgency fed by the political costs of a terrorist attack occurring on one's watch. The anticipatory calculus of uncovering an enemy that might materialize in the people and places one would least expect is an intrusive one. In "William Wilson," the true horror of the Double is uncovered only through covert action, penetrating the only private space Wilson has in the school—his bedroom. The narrator's discovery of the Double (in the sense that they share a physiognomy) occurs by casting a secretive light into a private space. In the context of homegrown terrorism, this practice takes two interrelated forms: first, sweeping modes of surveillance that penetrate into the most intimate dimensions of everyday life, such as the NSA's PRISM; second, the use of informants. Government informants, however, do much more than monitor and surveil; their function exceeds the biopolitical. Unlike discipline, which lets nothing escape, Foucault asserts biopower "lets things happen." The Double requires that this be taken further and facilitates strategies that "make things happen"—it is a preemptory and "incitatory" figure. Informants explicitly aid in the "radicalization" and mobilization of US residents and citizens, the practices and consequences of which are examined in [Chapters 2 and . The informant is himself a double—the inversion of the enemy-Double—illustrating just how the figure and discourse of the Double is not simply a threat to be confined, but a construct that is part and parcel of contemporary modalities of conflict.
If the Double marks the abandonment of the form of "originary [external] difference intrinsic to the Western logos," it does so in a temporary and oscillating manner and works in conjunction with other strategies. Importantly, the Double does not negate the consequentiality of the other. The racism, violence, and discrimination faced by American Muslim and Arab communities serve as constant reminders. The move from the other to the Double, much like that of discipline to biopower and conventional to absolute hostility, is only a shift "in emphasis" (much like the imbricated histories that make up the genealogy of homegrown terrorism). Moreover, forms of hostility overlap and biopolitical modalities embed themselves within the strategies of disciplinary power. The Double and other are contrapuntal figures and their relational trajectories play out side by side, intertwine, merge, and separate in complex ways. Indeed, the securitizing notion that titles this book could be written as "home|grown" to illustrate that it marks not simply the combination of foreign seed and native soil but an attempt to keep them separate through their conjunction. This relation is staged in popular fictional portrayals. In the widely popular series Homeland, the homegrown terrorist is a white Marine named Nicholas Brody who returns home after eight years in captivity. Yet, Brody's crisis of identity and involvement in a terror plot are closely tied to Abu Nazir, a prototypical bin Laden figure (i.e., bearded, turbaned, Arab, and Muslim), with whom he developed a complex relationship through the latter's son (who was killed in a US drone strike). The program, in which a military hero "turns," plays out America's contemporary fears of homegrown terrorism. It is a phenomenon also visible in the before-and-after images that accompany news accounts of Americans who have tried to join ISIS.
Here, assertions that contemporary security positions the citizen as simultaneously suspect and spy must be tempered by the fact that this position is not equally distributed. That is, some are more suspect than others (Brody's radicalization is tied to, though not strictly at the hands of, the prototypical other). And while there have been recent cases of informant-led operations preventing violence against Muslim Americans, the rhetoric (and effort) of government officials illustrates that the practice is largely focused on America's mosques. Moreover, the invocation of the Double is (an attempt at the) postracial in that it facilitates the distancing, at least rhetorically (through representations of terror via the white body), of the official government position from strategies of profiling, even as government agencies undertake such measures. Last, the brown-Arab-Muslim-other is irrevocably tied to the development and conjuring of the Double in contemporary security discourse (Chapter 1 dives deeper into the complex work carried out in marking an influence for political violence as "foreign"). Together, the Double and the other create a productive tension of deferral and closure, disruption and suture. The two figures are deeply imbricated, and the Double is often a figure deployed strategically to uncover the potential other hiding within the populace. Nevertheless, the distinction between the other and the Double is crucial because, as I have outlined here, the Double exhibits significantly different forms of representation, fulfills a unique function, and signals distinctive relations of enmity and power. While the Double is by no means an equal opportunity concept, always inflected with the identity of whomever it is placed over, it captures the ambivalent play of otherness and likeness in discourses that warn of a threat that can mutate and materialize, a phenomenon somewhere in between infiltration and emergence, in the homeland.
Chapter Overview
The remainder of the book takes its cue from the genealogy presented here. I have attempted, however briefly, to retrace how the purview of counterterrorism in the United States has been (re)defined over time (historically) in a way that affects its spatiality and how the Double reemerges in discourses of security in this context. The following chapters are organized along these dimensions of homegrown terrorism/counterterrorism: definitional, historical, and spatial. These are not the only possible gateways for thinking through homegrown terrorism and counterterrorism, but they are tied to significant questions or problems concerning these phenomena. Discuss terrorism long enough and questions about its definition will arise. A constant issue in security, academic, and popular circles, the addition of "homegrown" into the mix only further complicates the matter. Also, terrorism is often invoked in an ahistorical tonality or has a way of obscuring important pasts. Thus, a history of anxieties of infiltration holds promise for making sense of the phenomena under the umbrella of terrorism in a more critical light. Last, in the late war on terror, anxieties concerning the collapse of spatial divides are increasingly visible in, for example, the construction of border walls. Yet, boundary making in this environment is not limited to the border. Rather, it permeates social, cultural, and political relations, and, thus, examining the spaces of counterterrorism within (rather than at) US borders is a crucial aspect of understanding homegrown terrorism.
The three dimensions of homegrown (counter)terrorism that structure this book reveal more than just insights to the questions or anxieties from which they emerge. Each provides an entry point into further developing the figure of the Double and its place in security discourse. It is a potential I exploit by pairing the definitional, historical, and spatial with issues of identity, media, and citizenship, respectively. Certainly, these issues and the dimensions to which they are tied are intricately cross-stitched and overlapping; thus, the chapters are meant to be iterative in that respect. In other words, the pairings (definitional/identity, historical/media, spatial/citizenship) are intervals that cadence and cascade, and it is from the subsequent intersections and interstices that the Double emerges in all its complexity. The book is replete with doubles: shadows, split personalities, clones, imposters, and doppelgängers. The Double as a heuristic construct here is not intended to reduce these manifestations into mere synonyms or different representations of a unified phenomenon. Rather, the Double ties these together in shifting ways that reveal the intricacies of today's anxieties, discourses of security, and modalities of conflict as well as how they come to bear on articulations and experiences of citizenship.
Chapter 1, "Identity and Incidence: Defining Terror," is concerned not with the formulation of a universally accepted definition of terrorism but with examining how three very different men and their violent acts were coded as terrorist: Daniel McGowan (ecoterrorist), Wade Michael Page (domestic terrorist), and Nidal Malik Hasan (homegrown terrorist). The chapter is structured along two definitional axes. The first is nominal (and suggestively ordinal) and examines the way identity constructs are deployed in efforts to mark an actor and his action as an existential threat, as "foreign." It is a maneuver performed through the super- or sub-imposition of the brown-Arab-Muslim-other atop or beneath the familiar—be they the white faces of environmentalists and racists or a US military uniform. For a threat to be existential it must also be reoccurring and persistent. Thus, the second axis is temporal and examines how each actor/action was constituted as an incidence rather than a mere incident. In this effort, I detail how each man was paired with a past doppelgänger—McGowan/Kaczynski (the Unabomber), Page/McVeigh (who carried out the Oklahoma City bombing), Hasan/al-Hazmi (one of the 9/11 hijackers)—and characterized as a rematerialization of a ghost that promises subsequent, cyclical, and perhaps even more destructive returns. Together, the two axes illustrate the complex interplay of constructs of familiarity and difference as well as temporality in recoding violence as terror. Therein, I illustrate how the Double, a figure positioned in the past and future, but never present—one deployed strategically by various actors—is the operational figure of anticipatory or preemptive politics, the failure of which only reinforces its necessity.
"Informants and Other Media: Networking the Double" places contemporary fears of radicalization in a productive comparison with Cold War fears of infiltration. By focusing on media, writ broadly, I show how these anxieties are both, at their base and despite their differences, fears of connectivity. Furthermore, they are made sense of—and simultaneously exacerbated and alleviated—through the lens of conspiracy. Thus, Chapter 2 is situated in two courtrooms over sixty years apart: the 1949 Foley Square trial in which eleven leaders of the Communist Party of the United States of America were found guilty of conspiring to teach and advocate the violent overthrow of the US government; and the 2008 trial of the Fort Dix Five, New Jersey men convicted of conspiring to kill US military personnel. I remap how an old surveillance medium, the paid informant, fostered, facilitated, and elicited social, technological, and ideological links between those accused and broader enemy networks (Communism and global jihad, respectively) in a manner that made conspiracy legible to publics and juries. Here, the Double is found in the network; neither here nor there, but always circulating. As such, the Double is epistemologically inseparable from the media implicated in the enemy network by the informant—books, videos, etc.—and the informant himself (as a surveillance technology). Here connectivity is simultaneously ill and remedy and the informant is a securitizing-Double, the enemy-Double's inverse, a conspiratorial figure that exploits connectivity in an effort to make conspiracy charges, a legal mechanism of counterterrorism, stick.
Counterterrorism materializes in more than just America's courtrooms. Chapter 3, "Opacity and Transparency in Counterterrorism: Belonging and Citizenship Post-9/11" examines two spaces integral to the production of counterterrorism spectacles: namely, the office of executive decision making and the US prison system, both largely kept from public view. The play of opacity and transparency in counterterrorism, inextricably linked to the spatial collapse of conflict, is visible in the two cases that inform this chapter: the placement of Anwar al-Awlaki on the infamous "capture or kill" list and the entrapment of four African American ex-convicts in a 2009 sting operation (the Newburgh Four). Both cases involve individuals readily made other, and yet what made their respective death and imprisonments so urgent was, I argue, their Americanness: al-Awlaki's cultural familiarity and American accent and the Newburgh Four's emergence from a quintessential American space—the prison. From there I examine the interplay of what is seen and left out of sight in counterterrorism, the articulations of belonging it fosters, and the already-existing second-class experiences of citizenship it exacerbates. The communication of the US drone program vis-à-vis hunting al-Awlaki as an open secret, a play of opacity/transparency, illustrates the fluid positioning of citizens as simultaneously spy and suspect. The resulting peculiar articulation of belonging—laughter, in the face of the drone strike that takes the life of a fellow citizen—illustrates the unequal distribution of this dual position. I develop this further through the Newburgh Four by illustrating how the largely unseen machinations of mass incarceration are integral to the production of the "successful" counterterror sting, which in turn only further oils the cogs of mass incarceration.
The book concludes by returning to the image with which it began, perhaps the most visible manifestation of the discourse of the Double in the context of homegrown terrorism. At the time of writing, the Boston Marathon bombing carried out by the Tsarnaev brothers is the only successful post-9/11 improvised explosive attack carried out on US soil by self-proclaimed jihadists. A metaphorical return to the originary Tale of the Two Brothers, the Tsarnaev case acts as a crescendo in which the themes of this book tie together. The case illustrates the failure of anticipatory politics, the complex interplay of articulations of otherness and likeness, and the consequences of the Double for thinking about belonging. Moreover, the Double manifests therein in digital media, in psychological splits, and as doppelgänger on the cover of Rolling Stone.
Above the cacophony of ball bearings, lost limbs, shootouts, messages scribbled in blood, and "fan-girls," a single note resounded with a peculiar resonance. The younger Tsarnaev's appearance in a space thought to be reserved for America's idols (though this is a historically inaccurate portrayal of Rolling Stone) was interpreted as an indication that the terrorist had been absorbed into the popular imagination beyond a nameless figure, an other marked for an unremarkable death in a high-budget Hollywood production. To conclude the book, I address the question of whether the image of the Double is in fact an enemy image or one of a different type and modality. From the Tsarnaev cover and its various appropriations I move to examining the double images (before and after) that structure how sense has been made of Americans who have tried to join ISIS. These images and their juxtaposition powerfully illustrate "home|grown" security discourse and the consequences of the Double's appearance on the scene of security. The strategic constructions of difference and likeness in threat itself, rather than in a clear us/other dichotomy, mark the usurpation of that binary. It is replaced by another nonbinary pairing—other-Double—that oscillates between deferral and closure, disruption and suture, engendering a cyclical movement, an ever-repeating coda that works to continuously defer the end of the war on terror.
Figure 2. Time, November 23, 2009.
1
Identity and Incidence
Defining Terror
December 7, 2005: Daniel McGowan was arrested in connection to a series of arsons. The arrest was one of a dozen, the culmination of the FBI's Operation Backfire, an investigation into acts of ecoterrorism.
August 5, 2012: Wade Michael Page, a known white supremacist, killed six at the Sikh Temple of Wisconsin. The FBI investigated the case as an act of domestic terrorism.
November 5, 2009: Major Nidal Malik Hasan killed thirteen fellow soldiers at the Fort Hood military base in Texas. Given Hasan's communiqués with Anwar al-Awlaki, the case was widely referred to as an act of homegrown terrorism.
"We cannot fully know what leads a man to do such a thing," President Obama said somberly as he relayed a request for Americans not to jump to conclusions in the wake of the Fort Hood shooting. Critics pounced, claiming that Obama, not a half year after his "New Beginnings" speech in Cairo, was playing politics with the lives of American servicemen and -women. Beyond the right's Islamophobia or disdain for Obama, the exchange illustrates a more general and much older problem: namely, that dubbing an individual or group as terrorist (or, in this case, not) is an inherently "political" act. Much bemoaned, academic after pundit after politician continue to attempt to construct a definition of terrorism that might move above such politics. One of the most widely cited is the "consensus definition" of terrorism studies scholar Alex Schmid:
Terrorism refers to on the one hand a doctrine about the presumed effectiveness of a special form or tactic of fear-generating, coercive political violence and, on the other hand, to a conspiratorial practice of calculated, demonstrative, direct violent action without legal or moral restraints, targeting mainly civilians and non-combatants, performed for its propagandistic and psychological effects on various audiences and conflict parties.
Evident from Schmid's definition is that the so-called problem of politics associated with terrorism is not merely a matter of application (i.e., who counts as a terrorist) but is integral to the definition of terrorism itself. In his survey of academic definitions, "political"—that is, the nature of, or motive for, an act—is the second most commonly cited element of terrorism after "violence or force" (he conjoins the two in his definition). Thus, distinguishing the violence of crime, however heinous, from that of terrorism pivots on the ability to clearly determine whether an action is motivated by personal gain or politics—in moments of psychosis, it might be neither. So deeply ingrained is this thinking that in the aftermath of violence, news media coverage and government hearings are dedicated to uncovering the perpetrator's motivation and whether or not she intended for the act to send a message to an audience beyond her direct victim(s).
Yet, as information rolled in about Nidal Malik Hasan, determining the nature of his motive became no easier. Featured on the cover of Time magazine two and a half weeks after the shooting, "TERRORIST?" covers Hasan's almost expressionless eyes; the image taken from his military file. At this point, authorities and the public had learned that Hasan had communicated with a radical cleric. But they also learned of his potential psychological issues. In this chapter I do not engage in the futile labor of proposing a definition of terrorism that might somehow provide a way around this impasse. Instead, I descend from the mythologized air above politics and into its ground, charting the maneuvers, tensions, and debates initiated by efforts to mark three very different individuals as (eco, domestic, and homegrown) terrorists—Daniel McGowan, Wade Michael Page, and Nidal Malik Hasan.
The three cases that make up this chapter reveal not only that the determination of the nature of a motive itself is a matter of politics, but more importantly, that it involves a peculiar kind of valuation. I argue that the transformation of violence into terrorism not so much depends on the illustration of a political motive (i.e., pro-life, race, the environment, social change, etc.), but rather hinges on characterizing that motive as political; that is, as illegitimate, as foreign to ordinary politics, and, above all, as an existential threat to "our way of life" that must be anticipated and prevented. Thus, a shift in the crux of the definitional conundrum of terrorism—from searching for political motive to analyzing how actors are deemed a civilizational threat—reveals the close relationship between defining terrorism and identity constructs.
This chapter is structured around two definitional axes through which the three men were coded as terrorists. The first maps the manner in which the motives underlying the actions of McGowan, Page, and Hasan were demarcated as "foreign." Efforts to do so begin with the discourse of the Double, if in varying ways, claiming that within the familiar—be they the white faces of environmentalists and racists or a US military uniform—lurks an otherness that threatens (Western) civilization. While each case presents distinct narrations of otherness, they are all accompanied by invocations of the brown-Arab-Muslim-other. Through comparison or superimposition, this figure renders the otherness of each legible vis-à-vis their familiarity.
The second is temporal. Time magazine asked, "Is Fort Hood an aberration or a sign of things to come?" hinting that an answer to the single-word question that masked Hasan's visage depended on whether his act could be shown to be an incidence rather than a mere incident. In more general terms, if terrorism is part of a political project, it cannot, by definition, be a one-time act. Efforts to mark the men as terrorist involved tying McGowan, Page, and Hasan to past doppelgängers: Theodore Kaczynski, Timothy McVeigh, Nawaf al-Hazmi (one of the 9/11 hijackers), respectively. It is a definitional maneuver that sets in motion a Janus-faced discourse that projects and mutates a traumatic past into an imminent, yet not entirely determined, future. The logic here is that of a future-past (futur antérieur), but one that maintains a sense a Derridian unknowable future (the "to come," à-venir)—trauma, as Derrida states, proceeds from the future. Each man, as the manifestation of a copy, the fulfillment of the future as past in the present, creates a cyclical lineage that promises subsequent copies and returns, though in perhaps even more destructive form. Time suggests as much. "A sign of things to come?" The titular question, thus, concerns more than one's status as a terrorist; an affirmative answer also includes the promise of things to come. It is a futurity "held in the present in a perpetual state of potential," made legible through a doubling in time.
The Double reveals the complex and mutable interplay of identity constructs integral to recoding violence as terrorism as well as the temporal structure on which this incorporeal transformation depends. The Double is, in effect, the operational figure of preemption, a risk too catastrophic (and rare) to be subject to calculation and compensation. The Double, as existential threat, thus requires, as sociologist François Ewald puts it, that I, "out of precaution, imagine [rather than calculate] the worst possible, the consequence that an infinitely deceptive, malicious demon could have slipped into the false of apparently innocent enterprise." Shifting the definitional problem of terrorism to a focus on how a wide breadth of actors, actions, and utterances are coded as existential threats illustrates how the Double is not simply a source of anxiety or another adversary to be captured and confined. Rather, the Double is internal to preemptive politics. It is an adversary that cannot—or, pace security thinking, ought not—be named, only anticipated.
Coding Terror (in Three Parts): Identity at the End of Civilization
Human-Hating Treehuggers
The largest domestic terrorism investigation in US history, Operation Backfire, focused on a series of arsons. The operation hinged on the use of an informant, Jacob Ferguson, a one-time mainstay in the environmentalist movement in the US Northwest. Exploiting his heroin addiction, the FBI swayed him into service to avoid drug charges. For his handlers, Ferguson mapped out a cell of eighteen individuals with ties to a variety of groups known for taking "direct action"—i.e., arson, vandalism, sabotage, and demonstrations—against organizations whose activities harmed the environment and animal life. Referred to as "the Family," the cell was characterized by critics as a fiction cooked up by the combined imaginations of overeager FBI agents and a strung-out informant. Ferguson was flown around the country to stage "run-ins" with each individual and record their conversations; Daniel McGowan was one of the individuals he visited.
After his arrest, McGowan agreed to a noncooperative plea bargain (in which he was not required to testify against his codefendants) and admitted to his involvement in two arsons in Oregon in 2001. The trial judge applied a terrorism enhancement at sentencing and McGowan received a seven-year term, double the average federal sentence for arson. McGowan served his time in a communication management unit housed at the US Penitentiary in Marion, Illinois. It is a form of confinement developed specifically to house terrorists and one that severely limits one's contact with the outside world. He was released on June 3, 2013. Throughout the process FBI officials unequivocally referred to McGowan and company as terrorists.
Ecoterrorism is not the conceptual offspring of 9/11. Ron Arnold, founder of the Wise-Use Movement, coined the term in a 1983 article for Reason magazine. His intent, on behalf of a consortium of industry interests, was to secure additional protections against (and vilify) environmentalists. The concept's migration from the pages of industry pamphlets into mainstream political discourse was the result of intense industry lobbying. The campaign also worked to insert itself into academic debate; the first article about "environmental terrorism" to appear in the journal Terrorism was authored by an executive of Contingency Management Services. Within two decades ecoterrorism became the FBI's top domestic terrorism priority. In 2003, the American Legislative Exchange Council published a pamphlet (amounting to model legislation) titled "Animal and Ecological Terrorism in America" in an effort to transform the Animal Enterprise Protection Act of 1992 into the Animal Enterprise Terrorism Act. The latter was ultimately ratified in 2006, preceded by a series of Senate and House committee hearings on ecoterrorism.
The radical environmentalist movement that industry sought to vilify is made up of a variety of groups, organizations, and networks. A few of the more recognizable names, those implicated in Operation Backfire, include the Earth Liberation Front (ELF), the Animal Liberation Front (ALF), Stop Huntingdon Animal Cruelty (SHAC), and Earth First ALF, ELF, and SHAC are British imports that arrived in the United States in 1979, 1996, and 2004, respectively. ALF announced its presence in the United States by freeing five animals from the New York University Medical Center. Earth First! was founded in 1979 by Dave Foreman, a popular figure in the environmentalist movement who penned Ecodefense: A Field Guide to Monkeywrenching in 1985; his book details "ecotage," tactics for sabotaging machinery in order to disrupt industry activities. The groups are tied together in a number of ways: tactics, philosophy, shared members, and declarations of solidarity—not to mention being the co-subjects of government hearings, investigations, and reports.
James Jarboe, the FBI's domestic terrorism section chief, defines ecoterrorism as "the use or threatened use of violence of a criminal nature against innocent victims or property by an environmentally-oriented subnational group for environmental-political reasons, or aimed at an audience beyond the target often of a symbolic nature." As a carbon copy of the FBI definition of domestic terrorism, the terms "environmentally" and "environmental" are scribbled in, either attached to or in place of, "politically" and "political." Republican Senator David Vitter, present at many of the hearings on the subject, lauded the application of terrorism to the actions of environmentalists. Echoing the testimonies of employees and executives who described the terror they felt as a result of direct action, he concluded, "I think it is absolutely appropriate. You look up the definition, and this is what terrorism is about. It is using violent and illegal activity to try to intimidate people, scare people into submission to go along with these extremist political agendas. That is basically the dictionary definition of terrorism." Matters, however, were not so straightforward.
Despite causing approximately $110 million in damage in a suspected 1,100 cases, the actions of radical environmentalists have never resulted in a single death. The care taken by the movement's organizations to not "harm any animal (human or otherwise)" led some within government and elsewhere to chastise those who would equate direct action with terrorism as engaging in "excessive name calling." While I address the attempts to deflect charges of terrorism below, what is at issue here is the manner in which direct action and its practitioners were marked as terrorist in light of a lack of fatalities. Arguments that one ought not call another a terrorist if there is no trail of dead implies that the identification of a political motive alone is not sufficient for recoding violence as terrorism. How was this impasse circumvented? What provided proponents of the institutionalization of ecoterrorism with an avenue through which to authoritatively and legally (i.e., in legislation) code environmentalists as terrorists?
The first maneuver involves including violence to property in the definition of (eco)terrorism. The owner of Superior Lumber, the target of one of the arsons with which McGowan was involved, described the destruction of his property as producing a feeling of terror. Here, property is intimately tied to one's body and livelihood, the destruction of which could have devastating impacts. In government hearings, acts of property destruction were regularly compared to murder.
If not wholly convincing, the movement's apparent disdain for private property acted as the basis from which arson and vandalism were delineated as fundamentally anti-Western acts, the motivation for which could only have a foreign or un-American source. In a statement to a House Subcommittee hearing on Ecoterrorism and Lawlessness in National Forests, one executive forcefully asserted that the environmentalist movement is
disdainful of fundamental American values, including the rule of law, private property rights, free enterprise, and democracy.... [They] detest American businesses, our free enterprise system, our environmental policies, our use of animals for food and medical research, our judicial system, our elected officials, and many other American institutions and values.
Others emphasized that radical environmentalists are, in essence, "human-hating treehuggers" who renounce "the view of the Greek philosopher Protagoras that 'man is the measure of all things.' " In effect, they want to "destroy civilization as we know it."
Certainly various segments of the environmentalist movement align themselves with "the East"—a largely reappropriated and mythologized notion of a space and culture untouched by technology, which, among other things, speaks to the whiteness of which the movement has repeatedly been accused. Various authors within the movement alternatively trace its roots to the Indian Vedas (1500 BC) that denounce the eating of meat, the Jains (circa 500 BC) who wore covers over their mouths so as to not accidentally swallow insects, and, later, Buddhists. Furthermore, they chastise the Abrahamic religions—Judaism, Christianity, and Islam, in equal measure—for claiming that god gave man dominance over the earth, which they see as the root of "an inherently irrational, exploitative, and destructive [Capitalist] system."
Conversely, there is a contingent within the movement that aligns it with the very American philosophies of Ralph Waldo Emerson and Henry David Thoreau. They characterize environmentalist thought as the "most recent expressions of the centuries-old minority tradition in Western philosophy" that showcases and embodies the "highest ideals of Western society." Others still connect their lived environment to US nationalism. In the 2011 documentary If a Tree Falls, which documents, in part, McGowan's story, Bill Barton of the Native Forest Council stumbles upon a felled old-growth tree and longingly muses that it "probably sprouted just about the time Columbus sailed the ocean blue."
To counter the potential that Americans might identify with the movement or its goals, its opponents further characterize the movement as anti-Western by conjuring the brown-Arab-Muslim-other: "They think they are heroes and crusaders for justice, just as the September 11 hijackers thought of themselves in this way." Moreover, radical environmentalists might prove even more dangerous. The movement's action against Huntingdon Life Sciences, whose animal testing practices broke various protection laws, succeeded in having financiers divest from the company. In his testimony before the Senate Committee on Environment and Public Works, the company's counsel claimed that in "attacking the integrity and independence of the US stock market system... [SHAC] had succeeded where Osama bin Laden had failed." In effect, within the familiar faces of these white Americans exists a "homegrown brand of al-Qaeda," a threat so dangerous to American interests and values that only a racialized terrorist identity construct could communicate its gravity.
The Sound of Hate
On the morning of August 5, 2012, Wade Michael Page entered the Sikh Temple of Wisconsin in Oak Creek. He opened fire, killing six people. Another four were wounded before he turned his weapon on himself. One victim's relative recounted the massacre:
It was not the American dream of Prakash Singh, who had only been reunited with his family for a few precious weeks after six years apart. When he heard gunshots that morning, he told his two children to hide in the basement. He saved their lives. When it was over, his children found him lying in a pool of blood. They shook his body and cried "Papa! Get up!" But he was gone.
After the initial confusion, which included reports of multiple gunmen and that the police had shot Page, details began to emerge about the shooter. He was a US Army veteran whose tattoo-covered body read "like a poster text for white nationalism." Page had been a member of a white power skinhead organization. The Hammerskins—which includes a (self-characterized) clandestine group of supporters called Crew 38—formed in Dallas, Texas, in 1988 and is an integral part of the white power music scene. Himself a guitarist and vocalist in a variety of "hatecore" bands (e.g., Celtic Warrior, Intimidation One, Aggressive Force, Blue Eyed Devils, and End Apathy), Page had been on the radar of various watchdog agencies for some time. The FBI announced early on that it was investigating the shooting as an act of domestic terrorism.
The United States has an endemic history of both systemic racial oppression as well as hate- and bias-motivated crime that includes intimidation, assault, vandalism, arson, and murder. The racist right to which the Hammerskins are tied is made up of a diverse set of organizations and networks. Sociologists Pete Simi and Robert Futrell divide the movement along four branches—the Ku Klux Klan, Christian Identity and neo-Pagan racists, Neo-Nazis, and racist skinheads. While not without their disagreements, conflicts, and debates, these branches have migrated, mixed, and overlapped in a variety of ways. Before the end of the Cold War connections between groups began to solidify under the banner of RaHoWa (Racial Holy War), facilitating the movement of individuals and iconography between groups. For example, the contemporary KKK is involved in the racist music scene and has itself "Nazified" through the adoption of Neo-Nazi symbols. Also, in the mid- to late 1980s skinheads began to incorporate Nazi ideals and were themselves recruited into other groups. The Hammerskins are a part of this mixture. It is perhaps ironic that one of their founding members met Tom Metzger (founder of the White Aryan Resistance) during a taping of the Oprah Winfrey Show (February 4, 1988), which led to increased connections between the groups as well as the more active presence of the Hammerskins in the white supremacist movement as a whole.
The distinction between hate crimes and terrorism is difficult to ascertain. The Southern Poverty Law Center, for instance, does not have a strict protocol regarding the distinct use of each term. Rather, it follows the FBI definition of "hate crime" and labels attacks it feels are politically motivated as terrorism on a case-by-case basis, admitting that there can be overlap. Perhaps the crucial difference is to be found in the communicative aspect of terrorism. That is, one might hypothetically murder someone of a particular race, for example, motivated by prejudices one personally holds, and perhaps without the intent of sending a message to a broader audience. However, this distinction is problematic. First, divorcing personal prejudice from broader political, social, and cultural contexts is difficult if not altogether questionable. Second, a message is likely conveyed beyond one's victim regardless of one's intent, be it to those targeted by violence or those who are like-minded, and this audience need not be national or international in scope.
Rather than attempting to resolve this tension, it is more useful to examine what the tension itself reveals about the definitional problem of terrorism. The lack of concrete distinction between hate crimes and terrorism, the fact that there is always a semblance of political motivation in hate crimes, further illustrates that identifying a political motive is not in itself satisfactory in recoding violence as terrorism. Again, we return to the existential, even if at first glance, situating Page therein poses a quandary. The prevalence and institutionalization of racist violence within the United States begs the question of how such actions could be recoded as threatening the very essence and structure of American society—save a disingenuous denial of white supremacy. By what means does the racist violence integral to the establishment of the United States return in the guise of a transformational threat?
The redefinition of white racist violence from a mainstay of American politics to terrorism occurs through a rereading of the racist right's recent past. According to Heidi Beirich and Mark Potok of the Southern Poverty Law Center, the contemporary racist right is far removed from the likes of the Ku Klux Klan of the 1920s, which saw itself as a defender of culture and country. A decisive shift occurred at end of the Cold War: without the Communist bogeyman, the US government became the racist right's foremost nemesis. They argue that, slowly ushered in and solidified through the Oklahoma City bombing, the racist right shifted from being a "restorationist effort" to constituting a "revolutionary movement" that pursues a fundamental transformation of the United States.
Beirich and Potok released their report in 2009, the same year that a Department of Homeland Security report on the threat of right-wing extremism was decried as an attack on veterans and conservatism more generally. The backlash effectively gutted the branch of the department that dealt with right-wing extremism. I address this in detail below, but point now to how the aftermath of the Sikh temple shooting, and more recently the takeover of the Malheur National Wildlife Refuge in Oregon in early 2016, resulted in a revived interest (however momentary) in the workings of the racist and extreme right and how a movement the DHS called "paranoid" continues to plot "against America."
By no means providing a characterization of the racist right that is universally accepted in the United States, Beirich and Potok attempt to solidify the transformation of racist violence into terrorism, to further position it as "foreign" so to speak. Their report does so through an indirect invocation of the brown-Arab-Muslim-other. The otherness of this figure is imbued into white racists by emphasizing statements of affinity made in the aftermath of 9/11:
In case after case, extremists applauded the murder of some 3,000 of their countrymen. Billy Roper, then an official of the major neo-Nazi group National Alliance, said it best in an email to all 1,400 of his members. "The enemy of our enemy is, for now at least, our friends," he wrote. "We may not want them marrying our daughters, just as they would not want us marrying theirs. We may not want them in our societies, just as they would not want us in theirs. But anyone who is willing to drive a plane into a building to kill Jews is alright [sic] by me. I wish our members had half as much testicular fortitude."
White supremacist web forums have featured, and not infrequently, discussions regarding whether or not Arabs are "white," with a variety of opinions on the matter. More recently threads focused on Muslims dominate discussions therein of what constitutes an existential threat to white America. Regardless, it is through the suggested affinity quoted above that statements by the racist right, such as "that government [one led by Barack Obama] is not our government," are given resonance as existential threats.
The argument here is not that groups such as the SPLC are wrong in labeling racist violence as terrorism. Surely, in the current political climate, there is a strategic utility to marking violence as terrorism in order to garner needed attention. Nor is it to deny the immense terror inflicted by white supremacists (and this terror is too often denied). There are, however, serious limits to dealing with racism and racist violence in the United States through the lens of terrorism. Specifically, it begs the question as to whether conceptualizing the racist violence experienced by communities of color through a formulation of terrorism that effectively severs violence from its complex contexts—reducing the source of violence to "evil" or a "foreign" entity—can address the continued institutionalized character of that violence, particularly given the statist nature of present-day conceptualizations of terrorism (which I address below). Nevertheless, the immediate purpose here is to show the manner in which identity is deployed in efforts to communicate and redefine violence as terrorism. More than a political cause, it is violence with an aim to bring an end to society as we know it, a claim communicated through the figure of the brown-Arab-Muslim-other and the clash of civilizations baggage with which it comes, however seemingly questionable or counterintuitive the coupling might be.
The Horror at Fort Hood
On the afternoon of November 5, 2009, Major Nidal Malik Hasan, an Army psychiatrist who had joined the military out of high school, entered the Soldier Readiness Center at Fort Hood, Texas. Wearing his military uniform and brandishing a semiautomatic pistol and a revolver, he opened fire. Unleashing over a hundred rounds, he killed thirteen and wounded thirty-two of his fellow servicemen and-women. In the melee, Hasan was shot several times and was paralyzed from the waist down. In August 2013 Hasan was convicted of thirteen counts of premeditated murder, dishonorably discharged, and sentenced to death. In the immediate aftermath, as rumors circulated about Hasan being troubled by his imminent deployment to Afghanistan, President Obama urged Americans to avoid making premature conclusions about the nature of the crime, for which he received much criticism. Despite the FBI's conclusion that Hasan had no significant ties to terrorist groups, the shooting is widely referred to as an act of homegrown terrorism.
The DHS definition of homegrown terrorism places focus on those who work "in furtherance of political or social objectives promoted by a foreign terrorist organization, but [are] acting independently of direction by a foreign terrorist organization." Thus, Hasan's status as a "lone wolf" acting outside of official structures of command or control, that is, his lack of material ties did not preclude the application of the terror label. In lieu of these—and before it became public knowledge that Hasan had contacted Anwar al-Awlaki—identity markers were used to substantiate his ties, however nonmaterial, to a foreign interest. (The contents of those emails would become known only later; those and Hasan's own later statements regarding his motive I address in the next section.)
Within hours of the shooting, media pundits, politicians, and readers were quick to jump on what was for them the neat realization of their racialized fears of terrorism. "I think the name Malik Nidal Hasan might give you a clue," stated one New York Times reader referring to the debate about the nature of the incident. Others stressed Hasan's "heritage" or "roots" (i.e., he was born to Palestinian parents) over his American birth. His faith, illustrated by his dress and beard (which was later forcibly shaved), was a key focal point of speculation. His search for and ultimate failure to find a "pious" wife rendered him a childless bachelor, which was in turn construed as a failure in fulfilling his religious duty. Implied here is that, emasculated in the eyes of his god, Hasan found another way to assert his masculinity and satisfy his religious obligations. Even his good deeds, such as forgiving his neighbors who often taunted him and vandalized his car, were taken as indicators of a dangerous piety. One reader put it most plainly, "He wasn't connected with a 'terrorist' group! Actually, he was—it is called Islam." All this was made even more troubling given that his parents were reported to be not particularly devout, signaling a purposeful move to the "other side" of the existential conflict in which America is embroiled.
Yet, for the Webster Commission, tasked with reviewing FBI procedure after the attack,
Nidal Malik Hasan's transformation into a killer underscores the dilemma confronting the FBI. Hasan was a licensed psychiatrist and a U.S. Army Major with fifteen years of military service. He was a member of two professional communities—mental health and defense—whose missions include protection against violence. He worked at Walter Reed Army Medical Center and other facilities in close and constant contact with other U.S. military personnel, including fellow psychiatrists. He was a religious person. He had no known foreign travel. Other than his eighteen communications with Anwar al-Aulaqi, he had no known contact and no known relationships with criminal elements, agents of foreign powers, or potential terrorists.
In the cases of McGowan and Page, the brown-Arab-Muslim-other was invoked in order to communicate that within familiar visages exists a threat of such severity that it justifies the label of terrorism. The form that the discourse of the Double takes in the Hasan case presents the inverse: of the threatening other hiding in plain sight, disguised as it were in military fatigues. Reinforced by notions of Islam as an inherently political and violent system of beliefs and laws, doubt was placed on whether a Muslim could faithfully serve in the US military. "A Muslim American soldier kills American soldiers. I'm shocked. Shocked," one reader wrote sarcastically, while another framed it in a matter-of-fact tone: "What a split identity_-[sic] Arab (Muslim) American soldier (combatant). Talk about a person in a job for which they were not suited." For those on the conspiratorial right—pundits who believe that the Oklahoma City bombing was carried out with Saddam Hussein's help, that Obama is secretly Muslim, and that the Muslim Brotherhood has infiltrated all levels of the US government—it was clear that Hasan's allegiances lay with sharia law, which dictated "that the faithful must engage in jihad." Hasan's refusal to shave his beard was, in effect, an indicator of his militancy, of his extremism, and of where he placed his loyalty. (And, surely, the insistence to forcibly shave it at trial was an impotent gesture of asserting control—that even the other must follow protocol.) The implication here being that admitting Muslims into the military provides lone wolves with sheep's clothing. For many, Hasan's identity was proof enough that "the western civilized countries of the world... [must take] realistic approaches to the condition of cancer, Muslimism, existing in the world." Framed as a matter of "self preservation," at stake is no less than the "future of the republic."
* * *
The coding of all three men as terrorists did not go uncontested. In the immediate aftermath of the Fort Hood shooting voices in the media and its readership avidly rejected the application of reductive stereotypes to Hasan. For instance, in response to the reader (quoted above) who suggested that Hasan's name indicated that he was in fact a terrorist, another retorted, "Does the name Timothy McVeigh give you a clue? Or how about Theodore Kaczynski?" Still another reader pointed out the racialized character of terrorism discourse: "When a white guy shoots up a post office, they call that going postal.... But when a Muslim does it, they call it jihad." Here, Hasan's "torn psyche" is attributable not to some inherent incompatibility between Islam and serving in the American military, but rather to the racism Hasan experienced while in the service. In efforts to vilify one's enemy, epithets such as "camel jockey," "haaji," and "raghead" had become part of soldiers' everyday lexicon. Because Hasan experienced this firsthand, some saw the incident as a tragedy remedied only by more inclusivity rather than as a betrayal that warranted a purge.
There were also questions of mental illness, in both the Fort Hood and Sikh temple attacks. In Page's case, media reports pried into his economic and relationship woes (the latter framed differently than those of Hasan). In the years leading up to his violent attack, his home—already once refinanced—went into foreclosure. After a move to Milwaukee, his girlfriend broke off their relationship. Soon after, Page stopped showing up for work. In the same vein, his violent act was repeatedly and widely referred to as a case of mistaken identity (which, of course, insinuates that violence against Muslims is somehow more understandable). This led those within the white supremacist movement to reject Page as "sick" or an idiot on the fringe of the movement. A thread started the day of Page's rampage on the white supremacist site Stormfront captured the movement's sentiments:
Let me guess, the story will be that he went to a Sikh temple to get revenge for 9/11, thinking that it was a Mosque.
Just as I thought when I heard the news: some low IQ White who doesn't know the difference between Sikhs and Muslims.
Some members even suggested collecting money for the victims. The label that represented his band also distanced itself from Page. Claiming it strove to promote a positive image, it removed his band's merchandise from its website because it did not want to profit from the tragedy (which suggests that it could readily have done so). Here, either explicitly or otherwise, Page was placed on the fringe, either mentally ill or deficient.
The morning after the Fort Hood shooting, the New York Times' Bob Herbert penned an op-ed, "Stress Beyond Belief," in which he argued that breakdowns like Hasan's were a sign of an overstretched and overworked military, with some troops serving multiple tours and little being done to address the resulting psychological effects. Despite the fact that Hasan had not yet been deployed, it was thought that his imminent deployment terrified him, particularly after counseling so many others who returned with posttraumatic stress disorder (PTSD) and other afflictions. Readers commented that Hasan's break was a sign of the unsustainability of US neo-imperialism, a foreign policy structured around natural resources and the greed of the military-industrial complex. The racism Hasan experienced in the military also contributed to his deteriorated mental health. In response, the New York Times' David Brooks claimed that arguments about mental health were driven by "political correctness" and prematurely ruled out the "possibility of evil." One of Brooks's readers reiterated his dismissal of any explanation for Hasan's violence outside of the clash of civilizations narrative more succinctly: "Calling guys like Nidal Hasan 'nuts' is like calling a member of the Nazi party a nut—its simplistic and overlooks the actual problem which is Islamic political ideology."
The invocation of the brown-Arab-Muslim-other is evident not only in efforts to code actors as terrorists, or to reject other plausible explanations of violence, but also in attempts to deflect the application of the label of terrorism. This line of articulation is evident throughout the documentary If a Tree Falls. The film catches up with McGowan on the anniversary of 9/11, walking the streets of New York City:
Of course I am going to get off of house arrest on this day, of all days, it'll be today, you know? It's really sad for me to have all these feelings about my home being attacked, my city being attacked. I mean, when I tell people that I'm accused of being a terrorist, whether it's "eco" or "domestic" in front of it or if it's just straight terrorist, it's ludicrous to me, it's surreal and, most people that know me are, like, "what?" No one's accused in my case of flying planes, bombing things, trying to hurt people, none of these things, no one's accused of that.
Earlier in the film, McGowan refers to terrorism as a "bogeyman word" that is applied to those with whom one disagrees. Yet, in the passage above he reverts to a seemingly obvious distinction, one predicated on unspoken cultural and racial stereotypes. A New York Times reader echoed this sentiment by stating that "labeling of ecologically motivated monkey-wrenchers as 'terrorists'... is disrespectful to the memories of those who perished at the hands of real terrorists on Sept. 11." While McGowan and company at times invoke right-wing extremists as terrorists, often the "real terrorist" is embodied in a racial/ethnic/religious/cultural other. Either way, the argument is that to put radical environmentalists in the same "category as Osama bin Laden and Timothy McVeigh... weakens the word terrorist."
Conversely, white supremacists also bemoan the implication that they are terrorists, claiming that "Jewish-controlled" watchdogs do not cover left-wing groups with the same fervor. Other conservative writers have also voiced this criticism (while avoiding the explicit anti-Semitic overtones), stating that groups such as the Anti-Defamation League and Southern Poverty Law Center overuse the term "terrorism" and have a tendency to vilify their opponents (a critique squarely in line with current white supremacist discourse). Perhaps unsurprisingly, those on white supremacist message boards ultimately blamed Page's stupidity on the "Jewish-controlled media." Despite resorting to established white supremacist paranoid myths to deflect charges of terrorism, online discussions turned their focus to the brown-Arab-Muslim-other.
The Hammerskins online forum conspicuously lacks any threads concerning Wade Michael Page or any posts at all for that matter on August 5, 2012, or the days following. On the other hand, the world's most popular white supremacist site, Stormfront—which has been linked to a hundred deaths in the United States alone—hosted ample discussion. The implication of Muslims as the "real terrorists" already found in the mistaken identity narrative popular in white supremacist discourse is made explicit: "Sikh people are OK and, while they might not belong in the UK or America, they know better than anyone, the dangers of Islam... [and in] the struggle for civilization, Sikhs are mainly on our side—valuable against Islamic primitivism." Prior to the massacre, members of the Hammerskins forum reacted to a Department of Homeland Security public service announcement titled "The Drop Off" in a similar way. In the dramatization, a white cab driver stops in front of a commuter station. The white woman who gets out of the cab walks into the station and drops off her purse, while the driver arms a bomb in the trunk. Receiving this as an antiwhite message that distorts the "truth" about terrorism, one member wrote in an August 20, 2011, thread, "Fact there were 122 people indicted last year on charges of terrorism in the US, out side of the fact they are terrorists what do they all have in common?... Every one of them was a Muslim. So of course lets be on the lookout for well-dressed white ladies."
The three cases here are coded as various types of terrorism—eco, domestic, and homegrown. Ecoterrorism is a variety of domestic terrorism, evident in its poached definition. While domestic and homegrown are often used interchangeably, in the official DHS definition what distinguishes them is whether or not the perpetrator is working in furtherance of a foreign entity or ideology. In short, officially, homegrown is a label exclusively meant for jihadists. Refocusing the definitional problem of terrorism from political motive to existential threat reveals a common denominator. The variety of uses of the brown-Arab-Muslim-other illustrates that—in addition to the continued problem of Islamophobia and the ingrained nature of the clash of civilizations thesis—a sense of otherness communicated in identity constructs is integral to marking all three men as terrorists in a way that blends with strategic invocations of likeness.
In the aftermath of the Fort Hood shooting, a military spouse reflected on the push to mark Hasan as foreign, which we can extend to all three cases:
I think that some need to believe that an attack such as this has to be about something Muslim, Jordanian, terrorist—pick your label—something foreign to touch us where we are supposed to feel most safe.... The alternative—that this war, or even the idea of this war, might make our cherished ones desperate and nearly unrecognizable... is too much to bear.
The invocation of "something foreign" is certainly a mechanism through which a collective might avoid having to face its own monstrous tendencies. This foreign entity is also integral to coding violence as terrorism; in her comments terrorism is that something foreign, as is the brown-Arab-Muslim-other that, as I outlined in the Entrance, is intimately tied to (counter)terrorism discourse. Her comments, however, also hint toward the complex uses of the brown-Arab-Muslim-other in an interplay with other identity positions. The "something foreign" is superimposed onto familiar spaces "where we are supposed to feel most safe." McGowan, Page, and Hasan are constituted as doubles; white physiognomies or military fatigues mask an otherness that threatens civilization. For McGowan and Page, the brown-Arab-Muslim-other is superimposed in order to make the threat they pose legible; for Hasan, he is framed as the prototypical other hiding in plain sight. While the effects are certainly different, this process illustrates the centrality and usability of identity in defining terrorism as well as the limits of formulating threats in ways that do not resort to racialized frameworks.
The process of redefining violence as terrorism is closely tied to its anticipation; the terrorist threatens civilization and, thus, must be prevented in advance. If, as Ewald asserts, society is required to imagine the worst, these cases highlight that this responsibility falls not just on the state and its apparatuses, but also on citizens, NGOs, and private business. Identity constructs and their interplay are an important part of this anticipatory reckoning. Not only must the worst be imagined, but it must be imagined beyond the usual suspects and scrutinize spaces populated by anarcho-hippies, skinheads, and military personnel. In other words, threat must be imagined as emerging from spaces beyond those structured by binary stereotypes; uncovering otherness, thus, ominously maintains a strategic sense of the familiar. Neither the process of anticipation, nor that of coding terrorism is presentist in nature. They involve a temporal lineage and speculation, to which I now turn.
Doubles Future-Past
For sociologist Ulrich Beck a dependence on the "past encourages anticipation of the wrong kind of risk." It is an observation that certainly applies to post-9/11 air travel security and the ways certain provisions have been quickly outmoded by the imagination of those who sought to bypass them. Only three months after the Twin Towers fell, Richard Colvin Reid (the Shoe Bomber) made it onboard a Miami-bound plane in Paris with explosives packed into his shoes, which he failed to detonate. Unsurprisingly, passengers from then on have been required to remove their shoes for screening (unless they are at an airport during a Thanksgiving Day rush). Here, security plays catch-up, responding to things that have already occurred, as if the past can force the future to cohere to a particular modus operandi.
The past, nevertheless, is integral to the definitional transformation of violence into terrorism. In a February 2002 hearing on ecoterrorism, the FBI's James Jarboe was pushed on his definition of terrorism. He responded:
If the motivation [of an actor] was to induce over [sic]—a long-term change in the Government or political entities, or social environment with a political agenda at the heart of the motivation, then it would become—come under the terrorist umbrella. If it's just a one time act, irritation at an individual, or a specific one instance without looking at the long-term social change, then it would not.
In Jarboe's argument, for violence to constitute terrorism it must have significance beyond the impact of a single bomb. Terrorism cannot be a one-time act, but rather must be part of a series of events that threaten society, both past and future. (Jarboe is equivocal about in which direction one ought to look to make such a determination.) In effect, each action, whether that of McGowan, Page, or Hasan, must be codified as an incidence rather than a mere incident. Each incidence is a rerun or a copy of a previous act and each man the doppelgänger of another. If each man is already the return of a ghost, the recurrence of the past in a once-future present, then each also forebodes yet another return.
This temporal logic of the Double, the future-past (futur-antérieur), is indispensable to both the definition and anticipation of terrorism because it provides a future "about which one can speak definitely because it is already past." The past, however, is not always put to use in the overcoded and narrow way that Beck suggests. The future as past does not mean that the projected future cannot or is not expected to exceed the past in its intensity or detail. In effect, the deployment of the future-past and its doubles furnishes an opaque and alarming conceptualization of the future: inevitable, yet not without uncertainty. The future-past of the Double, thus, only further inscribes terrorism as an existential threat. Beyond a one-time act, it is a persistent threat that requires vigilance. None of this is to suggest that this mode of anticipation actually prevents violence. It fails. But, its failure works only to reinforce its necessity.
Theodore Kaczynski
The invocation of al-Qaeda in order to communicate the existential quality of the threat presented by radical environmentalists was one strategy through which to circumvent the fact that the movement has never left a dead body in its wake. To this maneuver, there is a complementary temporal one that reaches into the future by way of the past and facilitates arguments that it is only a matter of time until the movement kills. The potential and imminence of a future death at the hands of radical environmentalists has been articulated in several ways. First, officials, executives, and commentators read into the movement signs that forebode an escalation in tactics and the likelihood of fatalities. For example, ELF's homepage features a burning structure that, for one commentator, hauntingly invokes the group's "spiritual ancestor," the Ku Klux Klan.
Second, the absence of casualties is framed as a matter of luck rather than planning. The groups associated with the movement adopt an open-source structure. ELF openly promotes its lack of "central leadership or chain of command. Each cell... [is] autonomous and an individual could join or drop out at will. Anyone could call him or her self a member of ELF." ALF is similarly structured: "Any group of people who are vegetarians or vegans and who carry out actions according to ALF guidelines have the right to regard themselves as part of the ALF." (In effect, the groups also conjure the Double, a strategy I will discuss below.) Thus, the argument proceeds as such: while ELF and ALF distribute guides that teach others how to carry out direct action, they exert no direct control over unknown sympathizers and, thus, cannot be certain that strangers will show the same level of precaution. The lack of hierarchical structure also leaves the door open for particular strangers to be connected to the movement. Enter Theodore Kaczynski.
Kaczynski, known as the Unabomber, killed three people during a bombing campaign that lasted almost two decades. The shadow of the Unabomber is cast over radical environmentalism in efforts to mark its potential to kill. Kaczynski's actual connection to the movement, however, is by and large tangential if not nonexistent. By his own admission, he disdained the left and cared little about environmental issues:
I don't even believe in the cult of nature-worshipers or wilderness-worshipers. I am perfectly ready to litter in parts of the woods that are of no use to me—I often throw cans in logged-over areas or in places much frequented by people; I don't find wilderness particularly healthy physically; I don't hesitate to poach.
It is thought that he tacked on an environmentalist strand to his manifesto to give it wider appeal. Moreover, claims that Kaczynski wrote a letter to a reporter congratulating ELF and ALF for their actions and that he had chosen two of his victims from an Earth First! "hit list" are unsubstantiated and highly contested claims. Yet, Kaczynski is repeatedly characterized as, at least, one of the loosely affiliated sympathizers that authorities fearfully anticipate: Ron Arnold, who coined the term "ecoterrorism," wrote a book on ecoterrorism and the Unabomber; a pro-hunting lobby, Putting People First, produced a press release titled "Unabomber Linked to Radical Environmentalism"; and Craig Rosenbraugh, a onetime spokesperson for ALF, was asked at a government hearing if he considered the Unabomber to be a "prisoner of war."
The movement's own open-source structure and its opponents' (however spurious) invocation of the Unabomber are used to support anticipatory claims that it is "only a matter of time before their parade of terror results in loss of human life." Thus, the government cannot "sit aside and wait until someone is killed with an IED [improvised explosive device], and you know it is going to happen." Here arguments that use the past—in conjectural ways—service the future-oriented gaze of anticipatory politics. This gaze makes future violence imminent through the return of the Unabomber. Simultaneously, it maintains an uncertainty in who exactly will constitute this reincarnation and its intensity. McGowan and company were just a few in a lineage of repetition, and their lower level of violence in no way dispels the potential for future escalation. In his testimony in front of a 1998 hearing on ecoterrorism, the president of the pro-industry Alliance for America, Bruce Vincent, summed up what drives anticipatory logic: " 'What if' and 'but' are the two words of terror in this discussion. They are small words, but they are powerful and palpable."
Timothy McVeigh
The much-maligned 2009 Department of Homeland Security report, Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment, was not itself novel. Both the FBI and SPLC published reports on the military's "white power problem" in 2008 and 2009, respectively. These documents in a sense foreshadow the coming of Page, with the conclusion of the SPLC report ominously titled, "The Future." Outlining and anticipating a rise in right-wing extremism, the DHS report, much like the others, bases its argument on the fact that conditions in 2009 mirrored those that gave rise to Timothy McVeigh over a decade prior. These overlapping factors included a prolonged economic recession, a difficult job market, and a large population of veterans returning home affected by the horrors of war (with the election of a black president adding fuel to the fire). At the time of its release, conservative pundits and lawmakers quickly denounced the report claiming it disrespected veterans and effectively equated conservatism with terror; Janet Napolitano, who at first defended the report, later withdrew it and apologized to veterans.
In the aftermath of the Sikh temple massacre, the press turned its attention back to the 2009 DHS report, comparing aspects of Page's life to the troubling factors outlined therein. A few accounts commented on Page's economic difficulties, but most focused on the connection between his military service and his racism (save any discussion concerning the structural place of racism in the US military enterprise). While likely harboring racist beliefs before his enlistment, Page was thought to have become "a true convert after joining the Army in 1992." His final posting was in 1995 at Fort Bragg, which then served as the home base for unabashedly vocal white supremacist soldiers who flew Nazi flags, played music that endorsed the killing of minorities, actively recruited soldiers for their cause, and led KKK training exercises. Beyond sharing a particular military experience, Page was also tied to McVeigh through the images and text that covered his body. Particular attention was paid to the number 14 tattooed on his upper left arm:
The "14" itself is particularly telling: It's a reference to "the 14 words" [We must secure the existence of our people and a future for white children], a racist credo first set down by David Lane, the cofounder of a white nationalist terror group known as The Order. (The Order—whose name was inspired by a similar group immortalized in William Luther Pierce's racist novel, The Turner Diaries, a favorite of Timothy McVeigh's—has been active for nearly 30 years and was implicated in the 1984 murder of Alan Berg, a liberal Jewish radio host.)
Here, Page is not simply tied to the broader movement (which he was clearly a part of) but, in effect, is positioned as a copy of McVeigh. As the return of the past, Page is but one iteration of a threat that continuously portends its own future return.
The future beyond Page, the potential of McVeigh's continuing return, is located in the racist right's methods of recruitment and its organizational structure. The Hammerskins organize Hammerfest, a yearly white power music festival, which is referred to as "a virtual Woodstock of hate rock." Hammerfest is only one event within a broad music scene that is supported through online sharing and informal performance spaces such as backyard parties. American leaders of white supremacist groups initially came across white power music in the United Kingdom and sought to make use of it in the United States for their cause. On the radar of law enforcement and civil rights organizations since the early 1980s, the music simultaneously provides the movement with entertainment, a mythology, violent imagery, and a major source of funding—Resistance Records, a prominent white power record label, once reported one million dollars in annual sales.
Music has often erroneously been posited as single-handedly catalyzing violence in America. Nevertheless, music is undoubtedly a key feature in the construction of the hypermasculine identity of the white supremacist movement. And unlike the music implicated in the Columbine Massacre, for example, hatecore's style, lyrics, and imagery—as well as the band names (e.g., Jew Slaughter, Grinded Nig, Angry Aryans, and Ethnic Cleansing)—are more explicitly geared toward mobilizing listeners to, if nothing else, identify their enemies; they mirror what Democratic Senator Durbin called the movement's own "propensity for violence." This propensity materialized in Page. Headlines read "Inside the Creepy World of 'Hate Music,' " "Hatecore Music Is Called White Supremacist Recruiting Tool," "Wisconsin Killer Fed and Was Fueled by Hate-Driven Music."
The potential of music molding Page is compounded by the open-source structure the movement utilizes. The Hammerskins describe themselves as "a leaderless group of men and women who have adopted the White Power Skinhead lifestyle. We are blue collar workers, white collar professionals, college students, entrepreneurs, fathers and mothers." Web forums like Hammerskins.org and Stormfront.org surely facilitate a non-hierarchical mode of entry and exchange, though not without their own protocols (e.g., the Hammerskins are wary of surveillance and warn that any account on the site that does not regularly post will be terminated). Moreover, the individuals who populate the movement are said to blend into society seamlessly, a point reiterated in response to some media reports that characterized Page as a "typical" white supremacist. On the day Page was identified, one "sustaining member" of Stormfront wrote:
You know it's curious—every single one, without exception, of the racially-aware/White Nationalist-minded people I personally know are the most unremarkable, and least "extreme" people one could meet!! They are in no way distinguishable from any other White American—and in many cases, their own friends and family are probably totally unaware of their political/ideological outlook.
Here, like radical environmentalists, the racist right invokes the Double. The adoption of this lifestyle and worldview does not require white supremacists to shave their heads and cover their bodies with tattoos.
In 2009 Beirich and Potok warned "a perfect storm is brewing." Economic conditions, military disillusionment, and increased racial tensions, combined with an open-source structure and a musical hook with which to attract individuals (who may be indistinguishable from the general populace) forebode the cyclical return of McVeigh, of which Page was but one copy. Moreover, the gathering clouds are made up of an increasing number of hate groups, patriot organizations, and armed militias, reactionary assemblages to the Obama presidency (and now further galvanized by a white supremacist Trump administration). In the plethora of opinions and investigations that made up the effort to understand Page, one perhaps best captures the anxieties of a future-past that is imminent, yet indeterminate in detail. In an op-ed for the Washington Post a US Army veteran and self-described former white supremacist asked himself, "Could I have been Wade Michael Page?" He could muster only one answer: "It makes me sick to say that I don't know."
Nawaf al-Hazmi
Senator Joe Lieberman referred to the Fort Hood shooting as "the most destructive terrorist act to be committed on American soil since 9/11." Tying incidents to 9/11 does more than simply act as a benchmark—based on body count or otherwise—against which to assess the severity of violence. The coupling transforms an event into an incidence, one in a series of events threatening Western civilization, a foreboding of a return of the mythical originary trauma through which Americans make sense of contemporary life.
Allahu Akbar! For conservative pundits who described it as a "battle cry"—one heard by military brass in the battlefields of Afghanistan and Iraq—these two words confirmed Hasan's ties to al-Qaeda. For some New York Times readers the utterance was proof of not only an ideological affinity, but a calculated effort. The connection to 9/11 was only reinforced when it was revealed that Hasan had sent a number of emails to Anwar al-Awlaki.
In the course of six months, between December 2008 and June 2009, Hasan had sent Anwar al-Awlaki eighteen email messages, the first through a "Contact the Sheikh" tool on al-Awlaki's personal website. He wrote asking if al-Awlaki considered Muslim American soldiers who carry out violence against Americans to be undertaking jihad and if dying in the process granted one martyrdom status. Later notes included his thoughts on Iran, the Palestinian-Israeli conflict, and Hamas. After four unsuccessful attempts to illicit a response from al-Awlaki, Hasan sent a succession of three notes asking for alternate avenues through which to donate money to him. The third, which reads much like spam from a fictional Nigerian prince, informs al-Awlaki that a five-thousand-dollar scholarship is to be awarded in an essay contest titled "Why is Anwar al-Awlaki a great activist and leader?" and that "we" want him to present the award in person. Three days later he receives a short response in which al-Awlaki says it would be impossible for him to fulfill the request and that he would be "embarrassed" by the award in any event. Hasan followed up later that day, telling al-Awlaki that despite "everyone... giving me the green light with tentative reassurances" the contest had been cancelled. The FBI's investigation determined that Hasan had no contact or ties to any other extremist individuals or groups. Hasan ends the email offering help—that "goes without saying... should be legal and in accordance with U.S. Law and Allah"—and telling al-Awlaki that he is looking for a wife (this was a common theme in media reports about Hasan's damaged psyche). Al-Awlaki responds only once more, informing Hasan that he cannot offer any advice on how Hasan can help, but closes by stating, "Tell me more about yourself. I will keep an eye out for a sister." This would be al-Awlaki's final note to Hasan. This despite the latter's attempts to illicit a response by sending notes about a public opinion poll on Muslim Americans, again offering financial help, and the ethics of suicide bombing.
Certainly, one can read into Hasan's emails signs of the psychological instability that readers and media pundits discussed (and that others dismissed). Regardless of how al-Awlaki's persona might have influenced or allured Hasan, he had all but ignored Hasan's attempts at a meaningful exchange. After the attack, however, al-Awlaki called Hasan a "hero," describing him "as a man who took his Muslim faith seriously, and who was eager to understand how to interpret Islamic sharia law." Al-Awlaki also claimed that he acted as Hasan's confidant. By virtue of the fact that Nawaf al-Hazmi, one of the 9/11 hijackers, also considered al-Awlaki to be his spiritual leader, al-Awlaki's claim on Hasan positioned the latter as a copy of those who carried out the 9/11 attacks.
Hasan's name is listed in Inspire, al-Qaeda in the Arabian Peninsula's online magazine, which began publication in June 2010 and with which al-Awlaki was involved. Not only does each issue memorialize a string of prisoners, but it is the vehicle through which they promise a future return. The magazine promotes "Open Source Jihad," a regular installment based on the writings of Abu Mus'ab al-Suri's sixteen-hundred-page The Global Islamic Resistance Call. Al-Suri has been referred to as the "architect" or "mastermind" of global jihad who once scolded bin Laden for catching "the disease of screens, flashes, fans, and applause." Al-Suri is a methodical thinker who wrote his treatise over fourteen years. In it he asserts that al-Qaeda does not accept America's definition of terrorism, which, as an abstract concept, can have either positive or negative connotations depending on the context. Al-Suri distinguishes between two types of terrorism—blameworthy (irhab madhmum) and praiseworthy (irhab mahmud). The former is "the terrorism of falsehood (irhab al-batil) and force of falsehood (quwwa al-batil)... which inflicts harm and fear among the innocent without a true cause... [it is] the terrorism of... invaders... and unrightful rulers." The latter is the opposite—"terrorism by the righteous that have been unjustly treated... [and] is undertaken through terrorizing and repelling the oppressor." Inspire also attempts to facilitate individual jihad by publishing hit lists and articles on weapons maintenance and construction.
Anxieties concerning the potential for other reincarnations of martyred men are compounded by Inspire magazine's call for ordinary Muslims—and anyone willing to adhere to their reading of Islam—living in the West, regardless of race or nationality, to take up arms. Al-Qaeda, thus, also invokes the Double. Inspire's original editor, Samir Khan—also an American and killed alongside al-Awlaki in 2011—penned, "I am proud to be a traitor to America," in which he places the responsibility for his actions on the United States and its foreign policy. Similarly, al-Qaeda argued that Hasan was recruited not by the group or by al-Awlaki, but by America's crimes, which promises the continued supply of new recruits from the West.
* * *
Each man is a copy of a past terrorist, effectively placing each into a series of events that makes the label of terrorism applicable. Moreover, each incidence or iteration in the series forebodes its own return. McGowan/Kaczynski, Page/McVeigh, Hasan/al-Hazmi. The former in each doubling is the return of the past in the once-future present. Each return, as a return of the past at a later date, forebodes its own future return. This cyclical future-past, in which the Double appears and reappears as ghost, copy, or doppelgänger, is a fundamental component of recoding violence as terrorism, as an existential threat that requires an anticipatory vigilance, itself caught up in this temporality.
The Fort Hood shooting spurned a variety of reports and hearings, including the Webster Commission Report, the Pentagon's Protecting the Force: Lessons From Fort Hood, the Committee on Homeland Security and Government Affair's A Ticking Time Bomb: Counterterrorism Lessons from the US Government's Failure to Prevent the Fort Hood Attack, and the Subcommittee on Oversight, Investigations and Management's Lessons from Fort Hood: Improving Our Ability to Connect the Dots. These documents all focus on the failure of the state's anticipatory security apparatus. Their recommendations included technological integration that would allow for information to be more widely shared and accessible between agencies while maintaining protocols of access by clearance level. Moreover, while there needed to be more horizontal integration, the reports recommended a clear policy concerning a hierarchy of responsibility or "ownership of the lead" in order to ensure timely responses to potential red flags (such as those raised by Hasan's communications to al-Awlaki).
Perhaps the most stressed recommendation in the reports concerns the need for nuancing what in practice constitutes a red flag. The Department of Defense report states that "policy regarding religious accommodation lacks the clarity necessary to help commanders distinguish appropriate religious practices from those that might indicate a potential for violence or self-radicalization" and that a baseline of traditional religious practice must be established. This was echoed in the Committee for Homeland Security report. In effect these reports use loosely coded language effectively blaming "political correctness" for the tragedy—had Hasan's overall behavior (beyond his academic performance), including expanded character references, been adjudicated as a whole, his clearance might have been downgraded. The implication being that this was not done due to oversensitivity. The manner in which such a practice to distinguish between extreme and normal expressions of one's faith could be established, let alone in a way that maintains constitutional guarantees, is left to the imagination of the reader. Indeed, it opens up a space into which one can inject one's own prejudices or those already part and parcel of counterterrorism. The crux of the reports is that in light of self-radicalization, the security apparatus desperately needs ways to uncover individuals' "potential for violence." The Committee for Homeland Security report recommends that the FBI and DoD ought not limit a red flag to overt statements and actions toward terrorism, but include the various factors that signal one's move toward radicalization; in effect, the report's call for "new ways to discern potentially violent behavior" requires either (or both) intrusive surveillance or the further implementation of reductive and racist models of radicalization. What is most telling in these reports is that nowhere does the failure to anticipate terrorism come to suggest something fundamentally amiss with the belief that time, effort, and money ought to be spent on sussing out potential extremists. Rather, however politicized a failure might become, the failure of anticipatory politics at its base works to reinforce, if not intensify, its own necessity.
This unshakeable need for anticipation is closely linked to how terrorism is defined or coded. Deeming an actor, action, or utterance to be terrorist requires that they be marked as existential threats. And while, as the three cases illustrate, the responsibility of anticipating a threat falls beyond the state—to NGOs, watchdogs, citizens, business lobbyists—the manner in which groups are coded as terrorists also has a particular legitimizing function. In constituting the essence of the terrorist threat to be existential—one that promises a continuing return—the state becomes the guarantor of the status quo, of continuity in the most reductive sense of the word. Terrorism Studies as a field contains within it debates regarding whether or not the state can be a terrorist, but maintains a predominantly statist orientation. If the definitional problem of terrorism pivots on the gravity of the civilization threat, it is unsurprising that the state is often effectively excluded from consideration (which also highlights the limit or pitfall in addressing the root of violence against people of color and other minorities through the lens of terrorism). Thus, lawmakers can not only dismiss accusations of terrorism on behalf of or by the state, but also ride out its failures to anticipate terror.
A Threat with No Name
The inability to profile an enemy, to clearly mark the boundaries of where she resides, is the constitutive anxiety surrounding homegrown terrorism. Moreover, it is an anxiety exploited by the movements to which McGowan, Page, and Hasan are linked, an observation that in no way morally equates these movements. Each promotes an open source or leaderless structure. White supremacists generally trace this back to Louis Beam, an American white supremacist and KKK member who coined the term "leaderless resistance" and first outlined the workings of the strategy in a 1983 article. Others assert that the racist right adapted the approach from left-wing revolutionary groups. And al-Suri traces what he refers to as individual jihad (al-jihad al-fardi) to the Prophet Muhammad's companion Abu Basir. The material utility of this approach lies in avoiding detection and arrest, aspects all three movements explicitly promote. However, its strategic value does not end with issues of command and control. It also has another communicative utility found in the very claim that one's members, sympathizers, and operatives blend seamlessly into the crowd. The Animal Liberation Front claims that "anyone in your community could be part of ALF without you knowing. This includes PTA parents, church volunteers, your spouse, your neighbor, or your mayor." Skinheads have long been urged to adopt conventional appearances, and as an owner of a white power music label claims, "Our customers, you couldn't pick them out of a crowd. They are the captain of the football team, the cheerleaders, just regular suburban kids." Al-Suri urges would-be warriors to act in a manner so as to be able to remain "present in the West in a natural way." This practice (rhetorical and actual) denies authorities a profile. Moreover, it suggests that beyond being a strategy to avoid detection, the effort to blend in also serves to communicate a sense of power that the movements, in actuality, lack. In Inspire's list of prisoners, included are individuals who have never had any contact with the group or downloaded any of their material such as the Fort Dix Five, who, save one, had no idea they were part of a terrorist plot (none knew that it was one led by an informant). Notwithstanding this, a movement with a claimed and/or suspected multitude of followers indistinguishable from the general populace is more formidable an adversary than one that can be neatly located.
This line of articulation is reproduced in the media and in academic and government discourse. Radical environmentalists/ecoterrorists are described as "nebulous... and purposefully disorganized"; as having no formal organization, lurking in the shadows and having no typical recruit. Aryans are invisible and "hide amongst us"; Page "was one of thousands." Hasan's former neighbor expresses this quandary well: "You think you know a person by seeing them, by how they act, but sometimes you're wrong"; another adds, "He looked normal."
What then, ultimately, is the Double in this context? Temporally, the Double is never present, but always lurking in the past and future, existing only in a potential that is made legible through the future-past. Alexander Galloway and Eugene Thacker intimate this point in their theorization of networks. In their discussion of the network as a weapons system they touch on the topic of enmity: the "name of this distributed new enemy is 'terrorism.'... [However,] in the same breath, we see the statement that our new enemy is networked and distributed to such a degree that it cannot be named." In short, the Double is a never present adversary.
Defining terrorism, or recoding violence as terrorism, has little to do with political motive. The FBI's John Lewis was asked if he considered Right to Life and other antiabortion groups terrorist organizations because they have, like ecoterrorists, committed arson and, unlike ecoterrorists, have killed for a political cause. He responds that one "of the reasons that I hesitate [to designate them as such] is because there are law-abiding individuals in some of these groups, that spend their day trying to do the right thing." In short, the cause of antiabortion groups, for Lewis, is not an existential threat to the United States specifically or the West in general. In this chapter I have shown how the designation of an actor, action, or utterance as an existential threat is made visible by interrogating two axes of coding terrorism: identity and incidence. The first rests on accusations that an otherness that threatens our way of life hides behind and is distorted by familiar faces or military fatigues. These accusations are made legible and actionable not through expositions on political motives, but through invocations of identity constructs, oscillating between their blurring and consolidation. The second rests on constituting each man as a once-future, now-realized copy of a past other. Each man's manifestation as such promises another iteration, a future-past that signals a perpetual potential, adding to the grave nature of a terrorist threat. In short, to transform violence to terrorism, it must be coded as foreign (within the familiar) and as a forever returning threat that aims at the destruction and/or transformation of the way "we" live.
The Double manifests in a variety of iterations in this process: as a familiar face, as an other hiding in plain sight, and as a future-past copy. The Double simultaneously encompasses the mechanisms and maneuvers through which terrorism is made sense of (coded or defined) and makes legible/localizes the perpetual potential that is the constitutive anxiety surrounding homegrown terrorism (all in an attempt to preempt or anticipate it). The Double as an adversary that cannot be named is part of a structure of enmity that facilitates a set of practices utilized by a multitude of actors with varying relations to one another. The Double not only is deployed by those positioned as terrorist, but has productive functions in counterterrorism efforts as well.
This requires some explanation. There is a fundamental qualitative difference between stating "We are at war with the Germans" and stating "We are at war with terrorism"—which correspond to Schmitt's ideas of conventional and absolute enmity, respectively. The former names an enemy in that it clearly situates one's adversary in a bounded space (i.e., Germany). The latter delineates a threat through what could be best described as a perforated line, one that can shift and expand, requiring one to include in anticipatory calculations spaces one might not initially suspect: lumberyards, Sikh temples, military bases. It reflects the blurred boundaries that characterize contemporary warfare and the ways that a variety of actors conjure it and react to its invocation. It requires more fluid ways of making sense of one's adversary. One of these is, as Galloway and Thacker suggest, through the concept of the network. An enemy that cannot be named circulates. In the following chapter I turn to this networked articulation of the Double, its historical reoccurrence, and its function and form in counterterrorism.
2
Informants and Other Media
Networking the Double
On October 15, 1949, New York's Daily Mirror ran the headline "Victory for America." At Foley Square in New York the day before, Eugene Dennis and ten other leaders of the Communist Party of the United States of America (CPUSA) were found guilty of conspiracy to teach and advocate the overthrow of the US government by force or violence under the Smith Act. Almost six decades later, on December 22, 2008, a twenty-two-year-old naturalized American named Mohamad Ibrahim Shnewer along with Serdar Tatar and three brothers (Dritan, Shain, and Eljvir Duka) were convicted of conspiring to kill US military personnel at the Fort Dix military base in New Jersey.
In moments of national crisis, conspiracy charges become weapons in the ostensible struggle for security. Fears of Communist infiltration and jihadist radicalization form the backdrop of Foley Square and Fort Dix, respectively. Foley Square centered on the 1945 reestablishment of the CPUSA, a move that came after its disbandment and transformation into the Communist Political Association a year prior was publicly criticized by Jacques Duclos, the French Communist leader. Its reformation raised fears that American Communists were committed to a worldwide Communist plot. The Fort Dix case was triggered when a Circuit City employee contacted authorities about a video a customer had asked him to convert to DVD. In it, men were shooting guns at a firing range and speaking in Arabic. Two paid FBI informants would later befriend and implicate five of the men in a terror plot.
The use of the conspiracy charge is rarely uncontroversial. In sharp contrast to the celebratory announcements that the conviction of the CPUSA elite sent a strong message to Moscow, W. E. B. Du Bois wrote, "Nothing in my life has so shaken my belief in American democracy... [the trial] marks the nadir [of] our hysteria and the determination to throttle free speech and make honest thinking impossible." And, when New Jersey attorney general Christopher Christie praised law enforcement for preemptively stopping men who "wanted to be jihadists... a new brand of terrorism where a small cell of people can bring enormous devastation," critics called the plot "manufactured."
In this chapter I use the historical resurfacing of the conspiracy charge vis-à-vis the Double to examine the relationship between connectivity, media/technology, and enmity. What makes the conspiracy charge an apt site for this inquiry is that it depends on establishing links between at least two individuals; in other words, it requires that the enemy be networked, directing focus to the surveillance technologies deployed in the process of networking and the media implicated in the resulting assemblage. Certainly, both now and then, an array of actors were/are connected in a variety of ways. However, the network here is not an object of study but a method. By examining the effort exerted in making the shape of a network legible to juries and publics, I illustrate how the Double is made sense of through and in relation to media, as both threat and an answer to that threat.
In the contemporary moment, the network is certainly the structuring diagram of collective dreams and nightmares. Aspirations of increased peace brought about through the olive branches of connectivity persist in various circles despite having largely given way to epidemiological fears concerning the viruses and poisons (ideological, biological, and affective) to which connectivity makes us vulnerable. The network is a "weapons system." Al-Qaeda is a "network of networks." ISIS has skillfully exploited networked social media to spread conflict beyond its declared borders. These assertions are often displayed in frozen images of dots and lines, as in Jytte Klausen's Western Jihadism Project (Figure 4), an example of the most distributed of computer scientist Paul Baran's network diagrams. The most recent deployment of the network metaphor and diagram in the realm of security certainly owes much to the popularization of RAND researchers John Arquilla and David Ronfeldt's netwar doctrine in policy circles in the 1990s. However, as the CPUSA conspiracy case suggests, the use of the network in both thinking and doing security predates the contemporary war on terror.
In 1934, Elizabeth Dilling, a fervent right-wing anti-Communist, published her infamous The Red Network, listing some 1,300 alleged Communists and 460 suspect organizations (including Albert Einstein and the ACLU). The book was popular, though not as influential as Dilling herself claimed. Nevertheless, the same metaphor was one that found resonance in the Internal Security Act of 1950. The act names the "Communist network in the United States" as part of a "world Communist movement" that spreads through "treachery, deceit, infiltration into other groups (governmental and otherwise), espionage, sabotage, terrorism, and any other means deemed necessary."
The threat of the red network was visualized in a starkly different way than the sparse geometric diagrams circulating today. The 1938 pamphlet produced by the Catholic Liberty Service, "How Communism Works" (Figure 3), depicts the Communist network as an octopus. The "cartographic land octopus," a popular image in maps intended to convey existential threat, first appeared in the last third of the nineteenth century. It is not difficult to see why the cephalopod was an attractive creature on which to structure imaginaries of Communist threat as it possesses: an ability to camouflage; an aptitude for obfuscation found in the cloud of ink it emits on command, obscuring its movements; a powerful grasp provided by the two rows of suction cups found on each of its eight arms, which are themselves autotomizing, making her resilient to defeat and setback; and a bite largely hidden from sight containing a toxin used to paralyze its prey (producing the intoxicated Double).
There are dangers in using the network to understand complex social and political phenomena. Not only does the "network graph problematically [freeze] the temporality of [events]," but the concept is so ambiguous that French philosopher and sociologist Bruno Latour admits it ought to have been abandoned long ago. In a more direct assault on the metaphor, sociologist Mark Erickson asserts that the network graph "explains nothing" and "reducing everything to network hides things from us, and makes us think we have been precise when we have been vague" (the very characteristics that make it compatible with the conspiracy charge). There are perhaps even more pitfalls in deploying the network in a comparative context. Certainly the Cold War and the war on terror, with their accompanying diagrams, are not identical in design or consequence. There are a variety of important differences. The octopus, resembling a centralized network, has a clear head/center (Stalin/the Soviet Union) that most contemporary visualizations of networked adversaries lack, suggesting increasing decentralization and dispersion. Moreover, unlike the cephalopod diagram of the Cold War that exists in and on the globe, contemporary network diagrams are often, like the one above (Figure 4), mapped in the ether of the cloud. But it is this last difference that is the impetus for my inquiry. The network as octopus makes plainly visible the work that goes into networking, into thinking and practicing security in and through the network in a manner that contemporary geometric visualizations tend to obscure.
Figure 3. Catholic Library Service, 1938.
Figure 4. Jytte Klausen's Western Jihadism Project, 2006.
My interest in the Double vis-à-vis the network comes from the manner in which the figure was articulated in the Cold War. Thus, the first part of the chapter outlines just how the Double was conceptualized in security discourse in an America on the cusp of McCarthyism. The Foley Square trial marked a pivotal turning point against the backdrop of continuing hearings in front of the House Un-American Activities Committee and rising hysteria. Building on and contrasting to the notion of the Double of contemporary counterterrorism, a comparative examination of the Cold War Double further develops the figure's spatiality: as neither here nor there, but circulating through and in relation to a variety of media. Fears of infiltration and radicalization are not synonymous. They are historically specific and differently structured, one with an identifiable head, the other more amorphous. Nevertheless, both represent fears of connectivity.
The second part and bulk of the chapter shifts to how the Double was networked at Foley Square and Fort Dix. Often, when security and networks are mentioned in the same breath, the focus turns to the ways in which a variety of groups exploit social media in structure and content. In The Shock of the Old, the historian of technology David Edgerton argues that by focusing on new technologies in conflict, we miss the continued significance of the horse, that is, existing technologies of continued, if revamped, significance and consequence. In the context of security that old horse is the informant, a surveillance medium as old as political power itself that came into widespread use with the professionalization of the police in nineteenth-century Europe. Here, I repurpose Arquilla and Ronfeldt's netwar doctrine into a heuristic through which to examine the informant's role in cultivating, curating, and eliciting the social, technological, and ideological links that tie his targets to a conspiratorial networked threat. An examination of the work of the informant reveals how the enemy network takes shape, how it is made legible, and how a variety of media are conceptualized therein and to what effect—all in relation to the Double.
The enemy that cannot be named is instead mapped in its movement through the circuits of a network, the shape of which is not self-evident. This suggests that the circulating-Double is epistemologically inseparable from the media it circulates in relation to as well as the surveillance practices used to make all of this legible. Further revealed through efforts to network the enemy is that the Double embodies more than a threat. The informant is the enemy-Double's inverse, a sheep in wolf's clothing—or perhaps a wolf in wolf's clothing. Thus, the Double is an incitatory figure in the work of anticipation and, ultimately, preemption. While the other must be confined, the Double must be flushed out, a process that is not revelatory but productive—the Double "makes things happen." In other words, the enemy network is not something the informant simply infiltrates, but is ontologically and epistemologically inseparable from it. In the informant's work we see that conspiracy is not simply a counterbalance to fears of connectivity embodied in the Double, but that conspiracy, as a security mechanism, depends on the productive exploitation of connectivity through the informant. Indeed, both conspiracy and connectivity are defined by the type of paranoia associated with the circulating-Double—not omnipotent, but potentially anywhere. The Double underwrites connectivity as a general feature of enmity, both anxiety and remedy; as the Catholic Liberty Service instructs, "Keep this pamphlet moving."
Seeing Double/Seeing Red
The media coverage of the Foley Square trial was largely structured around long-held notions that positioned Communism as antithetical to the American spirit, as its other. The New York Post wrote that the trial had revealed the "true nature of Communist loyalty... [which was] to a foreign capital rather than a revolutionary cause." A sentiment soon after nested in the Internal Security Act of 1950, to be a Communist was to "repudiate [one's] allegiance to the United States." Even those who thought the trial absurd and saw the threat posed by Communist fifth columns as no more than a "bad joke" couched their arguments in this binary. After the convictions, journalist Max Lerner asserted that Communism had "no roots in the American soil, no appeal to the American mind." In contrast to today's narratives of fundamentalism and hyper-religiosity, the foreign character of Communism depended on highlighting its atheism. In the lead-up to the trial, a concerned citizen wrote to the Washington Post that the country would come to see Communists as agents bent on destroying the concept of "the relationship of man to God... which gave birth to the American system and its institutions." This was a regular theme at the House Un-American Activities Committee (HUAC) hearings on Communist infiltration of minority groups, held in the summer of 1949 as the Foley Square trial was in full swing. Prominent priests and rabbis appeared before the committee to affirm that their faith inoculated them from the toxins of Communist thought. Inside the courthouse, the prosecution asserted the credibility of its star witness, Communist-turned-informant Louis F. Budenz, by stressing his return to the Catholic Church. (He dedicated his memoir, This Is My Story, to "Mary Immaculate, Patroness of Our Beloved Land.") A tense exchange during a long aside on March 31, 1949, demonstrated the thorny nature of this distinction. One of the defense lawyers, Abraham Isserman, in an objection regarding the introduction into evidence of piecemeal and decontextualized passages of Communist texts, remarked, "Certainly you couldn't try any ideas of, say, Christianity by quoting a few passages out of the Bible." Judge Medina, the presiding magistrate, retorted sharply, "I really think that is a comment that you ought not make. How you can compare what we have been hearing here with the doctrines of Christianity is beyond me."
The Second World War intensified fears of Communism within the United States, of the "rachitic child dropped on the U.S. doorstep by the Russian Revolution." Certainly, much of the suspicion was directed at non-Americans. Against the backdrop of stoked fears of infiltration and fascist fifth columns, as early as 1939, 87 percent of Americans were in favor of a requirement for all noncitizens to register with the government, something the Smith Act of 1940 institutionalized. However, there was also a considerable effort aimed at Americans. HUAC, established in 1938 under various commissions, became a standing committee in 1945 and was tasked with investigating subversive and un-American propaganda activities "instigated from foreign countries or of a domestic origin." The committee paid particular attention to Communist infiltration of minorities, education, entertainment, and government. The Smith Act, in addition to targeting foreigners, also sought to punish anyone who "willfully advocates, abets, advises, or teaches the duty, necessity, desirability, or propriety of overthrowing or destroying the government of the United States... by force or violence"; the trial of the CPUSA leaders would be the first in a series.
Despite the neat abstract division of American and Communist, the Communist was not easy to pick out. Philosophers Michael Hardt and Antonio Negri argue that during the Cold War the boundary between "inside" and "outside" began to unravel. The cover of a 1948 New Jersey Manufacturers Association cartoon book captured this anxiety and serves here as an entry point into understanding the other-Double relation that took shape in post–World War II America:
There is an ominous shadow looming over you, over your family, over your home, your job, your church—over your whole life.... This shadow which comes from across the ocean, threatens to destroy your liberty, the liberty that cost so much in blood and sweat, and suffering.... What is this shadow? What is behind it? The dark shadow is Communism—and behind Communism is A PLOT TO STEAL THE WORLD!
The above caption accompanies an illustration of a shadow that covers Europe (as if invoking Marx), stretches across the Atlantic and creeps onto the northeastern seaboard. Behind the shadow is what one of the Foley Square defendants, Benjamin J. Davis Jr., critiqued as an unfairly depicted "lustful figure" with his feet firmly planted in the Soviet Union. The shadow is one of the earliest manifestations of the Double, both an evil twin and a sign of potency (the loss of which portends imminent death). The casting of Communism's shadow represents a more amorphous and perhaps even more sinister threat than the Soviet Communist.
The mutability of the shadow that loomed over America was evident in the "miscellany of ordinary-looking U.S. citizens" that sat at the defense table at Foley Square. Thus, as a later Armed Forces propaganda film would instruct, "in recognizing a Communist, physical appearance counts for nothing." A Communist may be any race, ethnicity, and gender (the latter made clear by the film's interchangeable use of male and female pronouns in referring to Communists). Even more disconcerting was that the Communists' "chameleon-like" abilities were not incidental but thought to be a key part of their strategy, evident in their actions and words. Again, at a HUAC hearing on the infiltration of minority groups held at the height of the trial, Lester B. Granger, director of the National Urban League, was asked, "Where can the line be drawn between Communist-front activities and Negro progressive activities?" He replied that at "certain times you can't draw the line... [that you] can't tell the difference," and that the kernel of any distinction between the two lies in whether the action was of a moral or political character. And, as Time magazine noted, when Eugene Dennis outlined the principles of the CPUSA in the courtroom, "those principles sounded no more radical than Harry Truman's Fair Deal, no more revolutionary than the teachings of Abraham Lincoln."
If, as Richard Nixon would later remark about Alger Hiss, "that men become Communists out of the best of motives," the conundrum presented by the shadowy-Double in red concerned how to understand one's transformation. For example, how was one to make sense of the metamorphosis of Francis X. Waldron Jr., a regular American from Seattle "with his wavy brown hair, his snappy clothes and his electric smile... as handsome as a junior Arrow Collar Man" into Eugene Dennis, the general secretary of the CPUSA? Time magazine's profile traced Waldron's story from when he received all of his father's worldly goods from the hospital in which he died: "a crumpled leather cigarette case, a Seattle streetcar token, and a worn 25¢ piece." Not long after, "Frankie went to Europe, probably stopped in at Moscow, went to South Africa, on to China, then back to Moscow." By the time he found himself in a Shanghai apartment, "seedy-looking and burning-eyed, with a shock of wild hair... so far as he was concerned, Francis X. Waldron Jr. was dead and buried. Not a trace of him remained, not even a Seattle streetcar token."
Time's profile of Dennis suggests that the Double is a fundamentally circulating figure, neither here nor there, but in motion. This narrative was articulated differently in the Fort Dix case. The Duka brothers' supposed involvement in the Fort Dix plot shocked members of their community. One neighbor expressed his surprise: "They were your everyday Muslims... I would have believed they were aliens before I'd think they were terrorists." Even the Circuit City employee who contacted authorities admitted, "if you saw the defendants at a strip mall in Jersey, you wouldn't look twice." And, while each individual implicated in Fort Dix had a reported attachment to places outside of the United States (e.g., Shnewer to Palestine and Jordan, the Dukas to Albania, and Tatar to Turkey), what was most concerning to authorities was each one's virtual travels, through digital networks that led him to jihadist propaganda. Ultimately, as much with Foley Square as with Fort Dix, the circulating nature of the Double is tied to communications technologies. Much like the way in which the electric light allowed Dr. Jekyll's double to roam freely, the neither here nor there positionality of the Double—not everywhere but potentially anywhere—is made sense of through and in relation to a variety of technologies, old and new. The emergence of the Double in security discourse cannot be separated from how threat is conceptualized through a network of people, places, and media.
Networking the Double
"Whoever masters the network gains the advantage." This is Arquilla and Ronfeldt's central dictum in their influential Advent of Netwar. In addition to emphasizing the exploitation of network structures offensively, they also stress the necessity of making sense of one's adversaries as networks, which requires a deep understanding of its nodes and edges. There are three fundamental types of edges in their diagram: technological, social, and narrative (or ideological). This is the framework through which I retrace the informant's work.
The "parade of trusted 'communists' who revealed themselves in the courtroom as FBI agents" at Foley Square were matched by the small cadre of informants, agents, translators, and experts who took turns on the witness stand at the Fort Dix Five trial. My primary focus is on the efforts of a pair of informants in each case, and the supporting roles played by expert witnesses. Louis F. Budenz, a labor organizer turned Communist turned expert informant, made a career of testifying at government cases against Communists. As much as his return to Catholicism lent him credibility, he leveraged his experience as the managing editor of the Daily Worker, the CPUSA's newspaper, to position himself as an expert of all things Communism. Herbert Philbrick volunteered to become an FBI informant after he reported the Communist leanings of a youth group he had joined. Fulfilling what he thought to be his patriotic duty, he made his way through a variety of groups. He broke his cover the day he took the stand at Foley Square, April 6, 1949.
Federal agents approached the primary informant of the Fort Dix case, Mahmoud Omar, in 2006 after they were apprised of the Circuit City DVD. Omar was acquainted with one of the men in the video, Mohamad Shnewer. Omar, who had entered the United States illegally and had a history of fraud convictions, was enticed into service for the FBI by the hope of obtaining legal status. While it is unclear as to whether this materialized, the FBI did help him get clearance to visit family in Egypt and return to the United States (despite being undocumented). The agency also paid him and covered his expenses. In total, he earned approximately $238,000. Besnik Bakalli, an undocumented Albanian, was deployed later to befriend the Duka brothers on account of their shared ethnicity. In addition to the two informants, the networking of the five men to global jihad depended on the testimonial performance of Evan Kohlmann, known as the Doogie Howser of terrorism, who has made a living off of providing "expert analysis" on the link between jihad and the Internet. Kohlmann scours the Internet for jihadist propaganda and maintains a database. Lacking fluency in Arabic (most of the videos he analyzed were in Arabic, and he depended on translations), he bases his credibility on his bachelor's and law degrees as well as his certificate in "Islam and Muslim Understanding" from the Prince Walebtatal Center for Muslim Christian Understanding at Georgetown University.
These two historical moments are as different as the network diagrams that define each adversary. Yet, examining how the social, technological, and narrative/ideological links were cultivated, curated, and elicited (and made legible) in and through the informant reveals more than just the continued relevance of the informant in security practice. First, more than just a listening post—as the NYPD refers to its informants—that is, a passive sensor capable of collecting uncontaminated data, an analysis of the informants' own accounts and performances on the stand uncovers a more active function. Second, retracing how the enemy network is given shape in trying conspiracy illustrates both the relation between the enemy-Double and the media that circulate within this network as well as the place of the Double in security, rather than simply its object-enemy.
Comrades/Brothers
Social ties are a key dimension of the netwar doctrine. Arquilla and Ronfeldt directly connect the strength of social ties to a network's effectiveness. Of course, this depends on what is meant by effectiveness. Sociologist Mark Granovetter theorized long ago not only that weak ties were important for the mass diffusion of information but that a weak tie is more likely to connect individuals from different groups. As Latour argues, the strength of a network overall "does not come from concentration, purity, and unity, but form dissemination, heterogeneity, and the careful plaiting of weak ties." Nevertheless, what Arquilla and Ronfeldt identify as the base of social ties, mutual trust and a sense of identity, are certainly necessary for holding a network together, particularly one that aims to act out in the physical world. They argue that these are strongest in the "clan ties" of "ethnically based" groups. In the digital age, notions of "remote intimacy" act as a stand-in for the seeming lack of direct social ties between homegrown terrorists and those for whom they claim to work. Undoubtedly, both al-Qaeda and ISIS attempt to foster a sense of shared identity across national and ethnic groups in and through their propaganda efforts. The work of informants in this regard depends on the context in which they are placed. For instance, while there (still) exists a Communist Party in the United States, there is no comparative organization of jihadists. The common thread that runs through informants' work across these different moments is that for informants to be able to do their work, to function as they are supposed to—and to establish the necessary credibility they exploit on the stand—they must cultivate trust and a shared identity at a local level.
Formed in 1919, the Communist Party of the United States of America was frequently, if not constantly, the object of suspicion or active repression. As the primary organization through which American Communists developed and deepened a sense of shared identity, it organized a variety of clubs, schools, and classes, none of which were particularly secret. For instance, the party headquarters was listed and could be reached by phone. Yet, the landscape of social spaces that concerned authorities was far broader. Subsection 3(1) of the Internal Security Act defined an organization as "a group of persons, whether or not incorporated, permanently or temporarily associated together for joint action on any subject or subjects." Effectively, informal study groups and book clubs constituted nodes in a larger conspiratorial network, one defined not just by institutions but also by more fluid social relations.
Budenz and Philbrick came into this social setting in very different ways. Budenz was a labor organizer who was arrested on multiple occasions for his activities. He joined the Communist Party in 1935, a moment he described in detail in his memoir. As he sat in front of a boarded-up warehouse at the foot of the Williamsburg Bridge in Brooklyn, he read an account of Georgi Dimitrov's speech at the Seventh World Congress of the Communist International in the Daily Worker. His excitement regarding what he saw as a move that gave American Communists more autonomy led him to the party. He characterized his work for the Communist Party as always strained, trying to balance his faith and his belief in the cause of labor. He claimed to have left the party once he no longer saw this balance as tenable, returning to the Church in 1945; it was then that he began to cooperate with the government as an expert informant. During his time in the party, Budenz worked for a variety of Communist newspapers. He eventually worked his way up to the position of managing editor of the Daily Worker in 1940. The paper's offices were located on the eight floor of 50 East 13th Street in Manhattan, just a floor below the party headquarters. There he established a rapport with Eugene Dennis and Jack Stachel, who was the newspaper's editor. He conferred with them about the paper's content either by making the trip up to the ninth floor or through a direct phone line. He also lectured on Communist journalism for the party.
Herbert Philbrick took another path. He joined the Cambridge Youth Council in 1940 and soon after became alarmed by what he saw as the increasing leverage of Communist thought in its ranks. According to this memoir, he approached the FBI despite doubting his anxieties. When the FBI validated his concerns, he volunteered to work for the agency as an undercover informant. Two years later the FBI suggested that he join the Youth Communist League and approved of his secret move into the Communist Party. Philbrick reported on what was discussed at party meetings and who attended; he provided the agency with the literature that circulated therein. As an advertising executive, Philbrick worked on pamphlets for the party, taught at a Communist school, acted as an educational director for some subgroups, and was entrusted with reestablishing a party group in Wakefield, Massachusetts. He was also an alternative delegate at the July 1945 Convention of the Communist Political Association of New England. Both Philbrick and Budenz were at one time well-entrenched and trusted members of the circles in which they ran.
Despite their differing paths into the party—Philbrick's being more directly guided by the FBI—their work on the stand was similar. Both men not only described their place within the network but, more importantly, characterized the social ties that held the Communist network together in a manner that lent itself to conspiracy: as hierarchical and secretive. Much of the trial was focused on illustrating that the CPUSA was a Moscow-controlled conspiratorial group; while the party certainly had international ties (e.g., the Communist International), the reconstitution of the party (after it had been the Communist Political Association under Eric Browder's leadership) was framed as an unchallenged order rather than the result of a more complex political process within the United States. Both men framed their experiences in ways that illustrated such control at the micro level within the party. Budenz characterized his conferences with Dennis and Stachel as a "continuous supervision" and equated other meetings to "the lecture of a teacher to a class." Philbrick, who wrote in his memoir that he "was never free from close scrutiny," added on the stand that those who wanted to participate in panel discussions at group meetings had to organize their materials in advance, suggesting that their words required approval (rather than giving other participants a chance to familiarize themselves with material). Budenz communicated the control within the party most alarmingly during his cross-examination. He was asked why he did not simply resign and leave the party instead of making a public spectacle of his exit—the defense accused Budenz of owing the party money and leaving as he did to avoid paying his debts. In response, Budenz conveyed the prosecution's characterization of the CPUSA in a single phrase, "You can't escape from the Communist Party that easily."
Branding the CPUSA as part of conspiratorial movement also depended on articulations of secrecy, which the informants claimed to have uncovered. Both Budenz and Philbrick described various party meetings as being held in secret. Yet, Budenz admitted that the "secret schools" for training party leadership were regularly reported on in the Daily Worker, which, as the defense pointed out, openly worked to increase its readership—efforts Budenz himself described as "very strenuous." Much of Budenz's secretive characterization rested on the lack of detail with which he conveyed his experiences. One particular meeting was held in "the winter of 1939 or 1940... after the Hitler-Stalin Pact," the location of which was a basement "in a building in Chicago, a big building." Budenz attributed his vague recollection to vast number of secret meetings he had attended. Similarly, when Philbrick was asked if branch meetings were open to the public, he replied, "Not in the generally accepted sense of the word, no." He went on to claim that the only nonmembers in attendance were potential, and thoroughly vetted, recruits.
The indictment included "others unknown," and both men also testified to this fact by stressing the use of "party names," aliases to avoid identification. In his memoir, Philbrick recalls the first thing he was told by a fellow Communist when becoming involved with the Youth Communist League: "Naturally, your membership will not be known publicly.... You needn't be afraid of that." On the stand, he went on to describe his interactions with shadowy figures, "a man named Pete," and others who went by single names. These individuals were, in effect, the "fellow-travelers" and "crypto-Communists" that were often the subject of inquiry in front of HUAC. The defense argued that the use of subgroups and assumed names needed to be put into context. Given the stigma and consequences that came with identifying as a Communist, many individuals in their membership feared losing their jobs. The anxiety was particularly acute in 1948 when the Mundt-Nixon Bill was being considered in Congress. It would have required any member of the Communist Party to register with the attorney general. In his memoir, Budenz articulated that regardless of the historical circumstances, secrecy was, in practice, fundamentally un-American. Moreover, Philbrick neatly tied the use of false names to the hierarchy of the party. In response to accusations that he had in fact proposed the use of assumed names at one meeting (to further his work for the FBI), he claimed that the practice was an order that "would come from above some place. It wasn't up to us to decide that."
* * *
Mahmoud Omar and Besnik Bakalli were not tasked with infiltrating al-Shabaab or al-Qaeda. For the Circuit City employee who received a videotape showing a group of men firing guns and speaking in Arabic, it was the stuff of post-9/11 television. Programs like 24 and Sleeper Cell featuring jihadist fifth columns preparing to strike the homeland, though the one he thought he witnessed was clearly very sloppy if the supposed cell had in fact entrusted incriminating material to a complete stranger. (Jihadist sleeper cells are virtually nonexistent in the American context.) The resulting deployment of informants seemed to closely follow the netwar doctrine. Omar was sent to befriend Mohamad Shnewer not only because Omar knew him, but because the two men shared nominal markers of identity: both Arab and Muslim. Similarly, Bakalli, like the Duka brothers, was a native Albanian. Bakalli was befriended by the brothers when they saw him sitting at the Dunkin' Donuts they frequented, speaking on his phone in Albanian loud enough for those around to hear as instructed by the FBI. Instead of plugging into already-existing organizations, Omar and Bakalli worked to develop social relationships with their targets by developing trust through performing acts of friendship and fostering a sense of family.
Omar had met Shnewer at the latter's family store in 2005 but had not befriended him until instructed to do so by the FBI in 2006. Omar, sixteen years Shnewer's senior, began to assert himself as an older brother—"You know that I am like your older brother," he was once recorded saying—or father figure, regularly referring to Shnewer as "my son." When asked by the defense if he was trying to create a sense of comfort one usually feels around family, Omar replied plainly, "That's the only way to get him to trust me and talk to me."
Omar solidified his position as Shnewer's quasi-guardian through persistently warning Shnewer to avoid someone called "American Mahmoud"—a nickname the men used for an acquaintance named Joe DeStefano to distinguish him from Omar, the "Egyptian Mahmoud." American Mahmoud candidly spoke about violence and jihad even at the wedding of Eljvir Duka to Shnewer's sister. This, Omar said on the witness stand, rubbed him the wrong way. The defense pressed Omar about American Mahmoud. If Omar's job was to report suspicious activity to the FBI, why had he not told his handler about American Mahmoud? The defense suggested that the FBI had in fact told him to warn Shnewer about American Mahmoud to further secure his trust. Irrespective of the motivation, Omar did precisely that and asked the Duka brothers to similarly warn Shnewer.
As his work progressed, Omar worried that the Duka brothers and Serdar Tatar did not trust him, the impetus for deploying Bakalli. Tatar, twenty-three years old at the time and with aspirations of becoming a police officer, reported Omar to the Philadelphia Police Department after Omar repeatedly pressured him to get a map of the Fort Dix army base. Afterward, Tatar recorded a conversation with Omar in preparation for when he expected the FBI to call. And when agents—who were aware of Omar's operation—finally came to his door, they downplayed the threat. There were indications, however, that Omar had developed a good relationship with the Dukas, particularly Tony (Dritan's nickname). Omar did favors for the brothers, fixing their cars (he was a mechanic) and taking them to car auctions (as a dealer he was able to give them access to government auctions); he once loaned Eljvir money to buy a car when the latter was in trouble financially. Omar also bonded with Tony by claiming to understand, like Tony, the harsh realities of growing up "on the streets" (the truthfulness of Omar's claim is unclear). Over time, signs of friendship and trust multiplied. Omar was invited to Eljvir's wedding and to join the brothers on fishing and paintball trips. At times he was invited without Shnewer—who had introduced Omar to the brothers—because the Dukas, for the most part, did not like Shnewer. Most importantly, the brothers expressed trust at key moments of the operation. Tony felt nervous about purchasing guns illegally through Omar, even if he had wanted them only for use at a gun range. Ultimately, despite his reservations, Tony told Shnewer, "I trust you brother."
Bakalli came later, posing as a fellow Albanian who was going through a divorce and experiencing financial trouble. He told the brothers that he was forced to leave Albania because he had killed a man who had raped his sister. As their friendship grew, Bakalli would regale the Duka brothers with (fake) war stories about fighting with the Kosovo Liberation Army. After some time, he began to regularly eat dinner and drink coffee with the Dukas. Later, he asked the brothers to help him be a better Muslim, to which they agreed. It is then that jihad became a more frequent topic of discussion at Bakalli's seemingly naïve behest.
The only person with whom Omar discussed a plot was Shnewer (he did ask Tatar for a map, but did not disclose any details, hoping instead that Shnewer would speak with him). Exploiting their mentor-mentee relationship, Omar had convinced Shnewer to assign him as the leader of the plot: "And if you appoint me as the Amir [sic], leader, I should be able to tell you which, uh, uh, plan could be done, what can be executed, who should be present and what are your possibilities." In this passage, Omar transformed his position of authority and respect into one of a military advisor. As such, Omar constantly pushed Shnewer to plan an attack, berating him for being all talk and no action—the Dukas knew Shnewer to be a big talker who rarely fulfilled his promises and thought him likely to be emotionally disturbed. Omar demanded deadlines for assembling a team, attempting to move the process along by constantly bringing up Eljvir in conversation with Shnewer: eleven times on August 2, 2006; thirty-four times on an August 4 to 5 fishing trip; thirty-one times on August 11; fifty times on August 13 and 14; forty times on August 20; twenty-five times on August 30; twenty-five times the next day; forty-five times on September 14; and thirty-seven times on September 19. To satisfy Omar's demands Shnewer told him that the brothers were on board, which always turned out to be false based on Omar's own interactions with the Dukas. Omar also insisted Shnewer perform surveillance, which Shnewer never did save the one time he was accompanied by Omar. He attempted to goad Shnewer into action by complaining that the latter's skittishness about buying weapons was making him look bad in the eyes of a (fictional) Baltimore arms dealer. Similarly, Bakalli attempted to use his currency as a supposed freedom fighter to rile the Dukas into action, telling them that without acting one is a coward. Both men, though Omar more than Bakalli, worked to cultivate social ties not in an effort to infiltrate an existing cell, but in a manner that would constitute their targets as the "Fort Dix Five."
By recalling how they cultivated social ties, or as in the case of Foley Square in using their position to characterize the social ties of a group, the informants began to populate the enemy network with a variety of nodes. Budenz and Philbrick present a network consisting of party leaders and countless shadowy doubles that move in a variety of spaces over which the network is laid: the offices of the Daily Worker, the Communist Party headquarters, and more ephemeral spaces such as living rooms, basements, and bookshops. The hierarchical social ties may suggest a direct mode of control, but as the details of both the technological and ideological ties come into focus, they reveal a more complex structure. The arms of the Red Octopus are not completely under the control of its head. In a more dispersed environment, Omar and Bakalli worked to constitute a cell through social ties, to draw a dot on the geometric plane of jihad that could be labeled "the Fort Dix Five." Just as Omar pushed Shnewer to act in ways that would establish the cell, so too were the informants instrumental in establishing the technological ties that would connect this cell to other nodes in global jihad.
Books/Videos (and a Pizza Delivery Map)
The shape a network takes is, to some degree, a function of the communications technologies utilized therein. Arquilla and Ronfeldt argue that netwar is afforded its capacity "by the latest information and communication technologies—cellular telephones, fax machines, electronic mail (email), web sites, and computer conferencing." However, care must be taken not to fetishize technologies and cut them off from the social relations in which they are situated. By focusing on the work of the informant, I intend to denaturalize the role of technologies that are implicated in conspiracies by showing how their use and characterization are the result of much effort. In other words, I am interested in outlining how the communications technologies situated in international Communism and global jihad—broadly defined to include that which either is used in or facilitates the transfer of information—are positioned as what Latour calls "actants," objects whose mere presence can change a state of affairs. The positioning of books and videos as actants in an enemy network is made visible in the intense focus placed on their transfer, exchange, and circulation in the courtroom. The edges established by the movement of these media are facilitated and made legible as such by the informant.
Throughout the second Red Scare various modes of communication were thought to aid the reach of the Red Octopus. Similar to the red flag that traveling to Pakistan or Yemen raises today, traveling to the Soviet Union or another Communist nation was similarly incriminating. The prosecution at Foley Square made a point of stressing the defendants' "almost yearly trips to Moscow." A common theme in the HUAC hearings, those summoned to appear in front of the committee were also questioned about long-distance phone calls. Within the United States, the means of communication between American Communists were also of concern. On the stand, Philbrick gave an account of how small subgroups would communicate with the party apparatus largely through human couriers. Each subgroup would elect a member to represent them at the next level of the chain of command, and so on.
Yet, of most concern was neither air travel nor the telephone, but an even older means of information transfer: the book. On March 29, 1949, Judge Medina reminded the courtroom that part of the conspiracy charge concerned the fact that the "defendants would publish and circulate and cause to be published and circulated books, articles, magazines and newspapers advocating the principles of Marxism-Leninism." The defense contested the manner in which the books were introduced as evidence:
Indeed, frequently, with a triumphant flourish the prosecution produces the "very book" (another one is obtainable at any public library) that was used by the witness in his class.... The ever-present goal of the prosecution is to create the impression with the jury that these books are dangerous weapons, secretly smuggled from reader to reader and produced at the trial only as a result of the daring of the government informer.
The circulation ("secret smuggling") of Communist texts was a principal issue at trial in addition to their content, and the informants had much to do with making apparent their exchange and circulation as secretive and sinister.
Budenz's testimony began with a series of simple questions. Did he receive a particular text from Jack Stachel (his boss at the Daily Worker)? Did he recognize another? The texts in question included Moissaye J. Olgin's "Why Communism?," "Program of the Communist International," Stalin's Foundations of Leninism, Lenin's State and Revolution and Imperialism, among others. After providing an affirmative answer, select portions of each text would be introduced as evidence and read aloud in the courtroom (and onto the record, at Judge Medina's request). Beyond acting as a passive conduit, a circuit that by answering in the affirmative allowed a text or book to be read into evidence, Budenz also played a twofold active role on the stand. The first was to provide a personal account, constituting proof of the circulation and exchange of the texts within the Communist network. In doing so he was sure to characterize any transfer of texts, whether passing through the hands of the defendants or not, as incriminating them:
Q: Did Mr. Stachel give you any copy of Dimitrofff's [sic] speeches at the Seventh Congress?
A: Not directly.
Q: Well, did he give you any copy at all directly or indirectly?
A: He gave it to me indirectly in the sense that we all received it and the Political Committee approved of it and he was a member, but he did not personally give me a copy, so far as I remember.
Second, in order to make the circulation of texts an issue of conspiracy, Budenz, along with Philbrick, worked hard to dehistoricize the works in the face of defense assertions that the texts' focus on "historical conditions" signaled a necessity for interpretation, rather than literal reading. On the stand, Philbrick equated any text that was considered "just a historical document" with one the party would "pay no attention to," implying that the only works considered timeless and worthy of circulation were those read to the letter. It was a characterization reinforced by Budenz and Philbrick's repeated referral to the Communist texts in question as "manuals" and "textbooks"—complementary to the prosecution's assertion that the Russian Revolution acted as a "blueprint" for the CPUSA. The act of possessing Communist texts was evidence of Communist "thought control" and of participating in their circulation, of being, along with the text itself, a link in the chain of conspiracy.
Much of the prosecution's argument suggested that the books were on trial as much as any individual—a regular charge from critics of the trial. In his closing argument, chief prosecutor John F. X. McGohey attempted to dispel this charge. However, belying his own effort, McGohey's remarks make more explicit that which Budenz and Philbrick's testimonies more subtly suggested, revealing the positioning of texts as actants (and thus part of the conspiracy being tried):
We are not concerned with the innocent use of books or papers or publications. We are concerned with the use of such material as an instrument in the commission of a crime. Now let me give you an example: A chisel, a hammer, and a baseball bat on the shelf of a store. They are perfectly innocent objects; perfectly innocent. But if three men intent upon robbing a home take those objects and use them as a means to gain entry into the home, as a means to subdue the occupants of the home, and as a means of opening the cabinets and the closets, then of course these objects are no longer mere innocent objects... and how silly, how silly it would be for the defendants in such a case to argue, as these defendants have argued here, that the baseball bat, or the hammer, or the chisel were on trial and not the criminals who used them.
What is effective about McGohey's analogy is that the objects to which he compares a book can easily be imagined in their "innocent use"—a chisel is for sculpting, a hammer for building, and a baseball bat for playing a sport. Yet, in strategically leaving these uses unsaid and describing the objects as nonthreatening only when "on the shelf"—all the while suggesting robbery and murder—any benign use of a Communist text becomes unimaginable. His juxtaposition implies that taking a Communist text "off the shelf," simply putting it into circulation, constitutes an act of aggression, conspiracy, and potential murder. Throughout the trial, in the testimony of the informants and the arguments of the prosecution, what mattered was not the manner in which either informant had witnessed a book being taught, or any interpretation that any of the defendants might have articulated (whether encouraging the violent overthrow of the US government or not). Rather, it was the texts themselves that transformed the reader/teacher into the "voice of the Kremlin." Here, the book, not the teacher, is the intoxicating agent that changes the state of an individual. Thus, to put them into circulation—through production, exchange, "teaching," recommendation, or "secret smuggling"—is tantamount to teaching or advocating the violent overthrow of the government. The book, as actant, is in effect constituted as a suction cup on the Red Octopus's arm, extending Moscow's dangerous reach.
* * *
The Fort Dix sting operation was triggered by a DVD, foreshadowing the prominence of jihadist videos both in the informants' work and as evidence at trial. Digital media occupy a central position in theories of radicalization and discourses of homegrown terrorism, posited therein as indirectly (and at times directly) connecting an individual to like-minded individuals, providing a space in which one might immerse oneself in an alternate narrative-reality and, ultimately, portending one's turn to violence. Mohamad Shnewer did indeed download a few jihadist videos. He also offered his password to Eljvir Duka for a website on which one could view Anwar al-Awlaki's translation and interpretation of Yusuf al-Uyayri's "The Constants of Jihad" (a lecture that is also available on YouTube). Both Shnewer and Tony Duka were recorded on occasion praising al-Awlaki for providing "raw and uncut" commentary.
The significance of Shnewer's actions and words in this regard was hardly self-evident, a problem not lost on the prosecution. Procuring the services of Evan Kohlmann, a self-proclaimed terrorism expert, the prosecution used his testimony to convey to the jury exactly how the possession of jihadist propaganda connected the defendants to global jihad. Aside from describing and interpreting the content via translations (to which I will return below) Kohlmann explained the significance of the videos' authors or stars. Much like the admission of Communist texts through Budenz at Foley Square, Kohlmann made apparent the importance of a variety of figures in the jihadist network—Osama bin Laden, Anwar al-Awlaki, Ayman al-Zawahiri, and Adam Gadahn. Also, in sifting through what he characterized as Shnewer's "very wide compendium" of some of al-Qaeda's "most significant" videos, Kohlmann made a point of stressing their "high resolution." In effect, the clarity of the images served to analogize the clearness of the link between the Fort Dix Five and global jihad.
For Kohlmann, the act of downloading and, thus, extending the circulation of jihadist propaganda presented an even more sinister possibility. Shnewer had used LimeWire, a now defunct peer-to-peer file-sharing client program, to download videos. In his testimony, Kohlmann stressed that LimeWire had a chat function. During his cross-examination, Kohlmann was pressed further on the subject:
Q: Right. The answer is you've not been presented with any evidence that [a direct chat] did occur, correct?
A: I—I wasn't able to recover it. The answer is I don't know. Again, I want to be very clear here because there might be. I don't know.
Q: All right. So when you don't know something, you can't say that it did occur, correct?
A: I can only say—I can only say—say it again. The only thing I can say for sure through the Limewire [sic] was the high resolution jehadi [sic] propaganda videos were specifically selected, were searched for, selected, picked and downloaded from other supporters of jehad [sic] on the internet. What else they may have—what other communications, I don't know, but there was a communications link.
Despite the lack of any forensic evidence that the defendants had directly chatted with anyone, Kohlmann maintained that the men might have established contact with those from whom they were downloading videos. He framed these shadowy avatars—here Communist Party names are replaced by screen names—as "other supporters of jihad," suggesting that the defendants had found their kin online.
As much as an online community of others facilitated Shnewer's procurement of jihadist videos, the role of the informant in establishing this technological link cannot be understated. Omar provided Shnewer with the technological means to store and share the videos, a burner drive paid for by the FBI. The burner drive was intended to allow Shnewer to make physical copies and hand them to Omar, facilitating something similar to what we saw at Foley Square; the informant intercepts (and makes visible) the exchange of actants. More significantly, the effect of Omar is evident in the way Shnewer's online activity sharply changes once Omar is in the picture:
[Shnewer downloaded a] total of two, three, four, five videos, before... relating to and interacting with Omar. Now, let's see what happens in June of 2006; four videos. July of 2006, 13 videos. August of 2006—and this is when Omar's really pouring it on.... Let's look at the downloads in August of 2006 from his [Omar's] pushing and prodding and inducing. 30. September of 2006; 44.
In all, 96 of the 101 videos found on Shnewer's hard drive were downloaded during the time his relationship with Omar was growing. Just as Omar pushed Shnewer for plot details and deadlines, he further exploited their mentor-mentee relationship by constantly pressuring Shnewer for more videos and DVDs, often berating his mentee for taking so long to fulfill his requests. Here, the informant is much more than a passive listening post, but an indispensable actor in solidifying a defendant's technological links to global jihad.
At this juncture, the efforts of Kohlmann and Omar come together in a remarkable way to belie the active role of the informant. Kohlmann testified that the videos do more than motivate an individual; they fundamentally instill a sense of obligation in the viewer without further guidance or contact. Effectively, Kohlmann characterizes the videos as actants. While this cannot be completely separated from the content of the videos, the prosecution (like at Foley Square) stressed their circulation. What is important here is that positioning the videos as agents of radicalization absolves the informant of any responsibility, rendering his pushing and prodding in the context of the social/familial relationship he had cultivated as ultimately unproblematic. The informant's cultivated intimacy is denied significance and his role is maintained as passively making legible the men's technological links to global jihad rather than curating edges between the men and other nodes. In effect, possessing the product of an al-Qaeda operative connects the men to the network; exchanging the videos among themselves constitutes the Fort Dix Five as part of a conspiracy in league with al-Qaeda.
Without an established cell or organization to infiltrate, Omar and Bakalli also utilized technology to establish the Fort Dix Five as a conspiratorial cell (supplementing the social ties they cultivated). Omar was fully aware that a conspiracy charge would not stick if he had only discussed a variety of plot points with each defendant individually. Thus, he attempted to facilitate the use of technology between the men in order to generate proof. For instance, Omar instructs Shnewer to call Tony and ask about how many guns he wanted from Omar's dealer (something Omar had already directly discussed with Tony). Omar also pressured Shnewer to conduct surveillance, utilizing technologies that one might expect a terrorist to use in planning an attack (e.g., cameras and cell phones), creating a forensic trail of images and video. Aside from one short outing with Omar—during which neither took take any images or video—Shnewer never again went on a scouting mission. Compounded by Shnewer's constant lies regarding the Dukas' involvement, Omar complains to the Dukas (in a conversation captured by his own wire) that Shnewer is bullshitting him. While on the stand Shnewer's attorney asked Omar about this incident: "Were you now starting to form the impression, and excuse my language, that Mohamad was bullshitting you in his interaction?" Omar ignores both the evidence and his cultivated relationship with Shnewer by simply stating, "It was very easy for Mohamad to tell me I have nothing to do with this issue and I don't want to do anything."
The wires worn by Omar and Bakalli, as well as the CCTV cameras planted in Omar's home, were key accessories in giving the impression that the informants in the case were mere listening posts. Omar, for example, was instructed to never be with his targets without his hidden wiretap. However, the active character of the informant's work is found in that both Omar and Bakalli switched off their recording devices, at times on their own accord, at others on instruction. Their active function became even more pronounced when Omar's accompanying technology failed and he resorted to becoming a medium himself, in two very different senses. First, Omar conjured connections (much like Kohlmann's potential online chats). Omar insisted, "I'm the one who lived every minute and every second in all this case and I know everything about this case and everything about this case is in my head." When asked in turn about a trip the men took to the Poconos and whether any plot to kill military personnel or otherwise was discussed, he accounted for each of his blind spots (and those of the technology that accompanied him) by repeating, "In front of me, didn't happen." Here, Omar is maintaining that, based on his deep knowledge of the men "in his head," it was possible that such exchanges might have been made outside of his ear's (or mic's) range.
Second, in the absence of direct connections, Omar took on the role of middleman. One of the centerpieces of the investigation was a pizza delivery map. Shnewer had repeatedly failed to provide Omar with a map of the Fort Dix base, which he was supposed to obtain from Tatar, whose family owned a pizza shop in the base's general vicinity. Omar resorted to directly asking Tatar. Tatar, despite having reported Omar to the authorities, eventually came through (on November 28, 2006). Omar's efforts then turned to gathering the men in his home, in front of his CCTV cameras, to discuss the map and "plot" together (Tatar was still unaware of the details of any plot). When this meeting also failed to materialize—largely due to Shnewer's obfuscation—Omar then simply handed Shnewer the map directly on December 29, 2006. In effect, the only piece of physical evidence involving planning was exchanged through Omar. Once in possession, Shnewer did not share the map with anyone else. What is peculiar about this exchange is that Shnewer, who was capable of downloading videos, did not simply use Google Maps, which would have provided a much more accurate and detailed map. Barring this, Omar had to improvise and establish an exchange that would help constitute a conspiracy.
In curating technological ties—exchanging books, downloading videos—informants further made legible the nodes of the enemy network. This includes the Communist and jihadist elite. More importantly, the work of the informants constituted the books and videos as nodes of a curious sort—latent, circulating, and imbued with a particular power. In effect, the books constitute a series of suction cups on the Red Octopus's arms, which could be put into motion and latch onto another space or individual. The videos, on the other hand, made up a constellation of latent nodes waiting to be downloaded, uploaded, and copied. These media are not stationary, but move through circuits of exchange, either in the movement of the Red Octopus's arms or in the vague orbital trajectories of geometric lines in pure space. And once put into circulation, they have the power to change the state of the affairs. A Communist text or jihadist video travels from one node to another, changing the internal makeup of each as it moves along. The threat posed by the Double, the anxiety it imbues, and thus the Double itself is inherently tied to these actant-objects. The Double is made sense of in, through, and in relation to these media. Positioned as actants in security thinking, these objects also guarantee their own recirculation. These dangerous objects threaten to intoxicate individuals, transforming them into (Communist or jihadist) automatons that will further replay the exchange through a potentially endless chain of party or screen names.
The relation between the various ties in networking the enemy is complex. Already indicated above is that social ties are used to generate technological ties. The implication at Foley Square was that the trusted position of the informants is what led to the exchange of books through them. At Fort Dix, the cultivated familial relationships provided the leverage through which to curate technological links to jihad and the supposed cell itself. While I have attempted to discuss technological ties (via books and videos) separately from their content—and, indeed, the very fact of their circulation and exchange is a key part of the prosecution of conspiracies—doing so always already hints at the centrality of ideological ties in networking the enemy, to which I now turn.
Double Talk/the Perfect Cover
Arquilla and Ronfeldt assert that narrative, which they interchangeably refer to as a common story, doctrine, or ideology, is vital to maintaining and, thus, understanding networked groups who lack ethnic or "clan" ties. Mirroring this line of thought, perhaps the most decisive work of the informant is that of showing the perpetrators to be true believers, that their motive can be articulated in and through an anti-American narrative or ideology. A shared narrative communicates an (in)human connectedness, filling in the gaps left by a lack of clear social and technological ties or their ambiguity; intertwining narrative in the social and technological also makes them more flexible and robust. The ideological is the lifeblood of the Red Octopus as well as its venom, it is also the plane on which a geometric network can be drawn, supporting and running through all of the nodes and edges therein. The work of the informant in this regard involves translating and interpreting the words and actions of their targets as part of "the narrative."
The defendants at Foley Square were avowed Communists. Yet, despite the general disdain toward Communism in public discourse, the men had to be tied to a more specific narrative. Ostensibly, it was not a crime to assert that capitalism is fundamentally unjust. Thus, while the exchange and circulation of Communist texts surely constituted ideological links, the task of linking the defendants to a conspiracy required that their expressions of Communist thought (and those in the texts) be characterized as signaling a belief in the inevitability and desirability of the violent overthrow of the US government. The informant was indispensable in this regard, acting as a translator of Communist discourse.
A common refrain at HUAC sessions stressed: "[when] Communists and their kind talk about 'democracy' and 'equality,' they are using double talk. They use good words in their own topsy-turvy way, to cover up bad intentions." The double talk of Communism had a name—Aesopianism. Originally advanced by J. Edgar Hoover in his March 1947 testimony in front of the Thomas-Rankin Committee, the theory was based on a single excerpt from Lenin's Imperialism and an editorial footnote therein. In the passage, Lenin outlines why coded language was a necessity for revolutionaries in Tsarist Russia; it was a means to avoid censorship. He called this Aesopian language, after the ancient Greek fabulist Aesop. In his memoir, Budenz admits that some of the secrecy practiced by the Communist Party in the United States has historical roots, stemming from anti-Communist efforts such as the Palmer Raids between November 1919 and January 1920. However, for him it is ultimately a strategy in extending the reach of the Red Octopus. Judge Medina not only allowed the theory to be advanced at trial, but regularly expressed opinions that aligned with it. On March 25, 1949, he commented that Communists had a "curious way of expressing themselves in... articles and resolutions.... It seems to me like a special jargon." He later added, "words that seem to have a common meaning, at least to me, are sometimes used differently [by Communists]." The chief prosecutor closed the trial similarly arguing that "tricky phrases, high-sounding platitudes" were used to cover up sinister meanings.
Judge Medina made the role of the informants in revealing the true meanings of Communist language explicitly clear. Intervening in the prosecution's direct examination of Budenz, he told the witness, "I am going to read this section [article 8, section 2 of the Communist Political Association's Constitution].... And then you are going to tell us what it meant." The informants were thought particularly suited to the task largely because of the social ties they established within the Communist Party. Budenz wrote in his memoir that his position as managing editor of the Daily Worker made him "well versed in 'the Communist code' by which to unravel and interpret... [the] ideological and involved language" deployed by Communists.
Budenz provided what was perhaps the most important definition of the trial, that of Marxism-Leninism. He did so against a dissonant backdrop made up of the repeated and vociferous (and overruled) objections of the defense. For Budenz, Marxism-Leninism (also referred to as the "Leninist line") held that "scientific socialism" clearly indicated that socialism could
only be attained by the violent shattering of the capitalist state, and the setting up of a dictatorship of the proletariat by force and violence in place of the state. In the United States this would mean that the Communist Party of the United States is basically committed to the overthrow of the Government of the United States as set up by the Constitution of the United States.
Budenz also conveyed to the courtroom that the charges of "revisionism" levied against Eric Browder in the Duclos letter were really a condemnation of Browder's abandonment of a Communist policy that requires American (and all) Communists to turn imperialist war (of which they accused the United States) into civil war.
Philbrick would later testify that concepts such as "the proletariat" were defined in such a way as to allow individuals who did own property—he uses the example of a small shop owner—to identify as part of the struggle against capitalism. Thus, Aesopianism not only supposedly served a "protective" function against revealing the violent intentions of Communists, but was also a way to lure others into the Communist Party. Budenz, who describes in his memoir how he was partially a victim of this strategy, was asked during cross-examination:
Q: Did the Communist Party during that ten-year period put out pamphlets on rent control?
A: Yes, sir, among other subjects.
Q: On price control?
A: Yes, sir.
Q: On supporting the efforts of organized labor to organize?
A: Yes, sir.
Q: On supporting the efforts on the part of trade unions to obtain wage increases?
A: Yes, sir.
Q: Supporting efforts on the part of trade unions to obtain recognition in collective bargaining?
A: Yes, sir. They took advantage of every grievance.
The above exchange is indicative of how both informants testified that the CPUSA was not actually concerned with any issue beyond its end goal of overthrowing of the government. Ultimately, any release, document, or statement that promoted peace, reform, or any other cause was, according to Philbrick, "public literature," that is, literature intended for "public consumption." He followed by providing convoluted accounts of how nonpublic ideas were communicated within the party. This was based on his recollection of what a member meant when she directed others' attention to a particular section of a particular book in a class (interpreting, for example, that the distinction between just and unjust wars mentioned in some Communist texts, like most anything, indicates the necessity to transform imperialist war into civil war). Budenz similarly offered serpentine explanations of how Communists, sympathizers, and those susceptible were directed to the party's intended message. For instance, Budenz described an article he wrote for the Daily Worker in April 1945 in which he recommended an article in Political Affairs (The Communist until 1944) by John Williamson, who himself recommended that his readers pick up Stalin's The History of the Communist Party in the Soviet Union. Budenz relays the danger in this seemingly benign connection: "every Communist knows that when you being to read [Stalin's book] you begin to commit yourself to the Leninist line." Again, the book is positioned as an actant, simply its possession—before its content—is an indication of conspiracy.
The defense attempted to illustrate that Lenin saw Aesopian language as a "cursed, slavish tongue," but necessary in the face of repression. They also worked to highlight how various Communist texts stressed the need to be keenly aware of historical conditions and, thus, did not communicate a predetermined or eternal necessity for violence. Against these efforts the translation work of the informants set a trap that transformed most anything into an ideological tie to a violent interpretation of Communism; it is one that the defense recognized. In other words, the work of the informants transformed "any evidence offered by the defendants to answer the charges against them [its efforts against 'racial, national and religious discrimination, against Jim Crowism, anti-Semitism, and all forms of chauvinism']... into 'proof' of their guilt."
* * *
At the beginning of Evan Kohlmann's testimony, the prosecution asked him, "Could you please describe to the jury al-Qaeda as an organization versus al-Qaeda as an ideology?" Kohlmann went on to present an account of what was once an organization like any other, but forced to dramatically change after its base was destroyed and many of its leaders killed in the US war in Afghanistan. While al-Qaeda persisted as a smaller organization, it then began to emphasize that those who share their beliefs, feelings, and grievances could become members by downloading their materials and acting on those instead of attempting to travel to Afghanistan or Pakistan. Kohlmann builds on the discourse pushed by various pundits who (erroneously) claim that an anti-American or jihadist narrative—"the narrative"—is at the core of the transformation of Americans into terrorists; the narrative of "the narrative" is itself built on simplistic notions of a binary clash of civilizations and its accompanying Islamophobic tropes (i.e., they either refuse to understand "us" or simply cannot). Nevertheless, the work at trial largely centered on showing that what the men said and did was ideologically in sync with al-Qaeda's anti-American narrative; the informants worked hard to elicit from the defendants words and actions that a cadre of experts then labored to fashion into a coherent narrative.
One of the first witnesses called by the prosecution was an FBI translator who defined "jihad" for the court (to the objection of the defense) as "holy war"—in addition to "inshallah," "fatwa," "Allahu Akbar," and other phrases. Often, when the men used jihad in this way, it was in response to a provocation by one of the informants. In one heated conversation Omar was able to elicit the intended response. Shnewer told him, "If we are going to fight these people, we will not fight them based on racism. We are not fighting them for anything but for Allah's sake. Glory and praise to him almighty because they have persecuted Muslims everywhere." However, in many other instances Omar could not produce the same effect. For example, in a discussion with Serdar Tatar (and without disclosing the existence of any plan) Omar emotionally states that he wants to make the United States pay for what they supposedly did to him personally. Tatar responds in shock rather than in agreement or sympathy. Thus, delimiting "jihad" on the stand was particularly important given that both Omar's wiretap and Bakalli's revealed the multiple ways the defendants used the term. In one recorded discussion, Tony Duka describes "big jihad" as a struggle against one's own "lusts." Similarly, Shnewer, when asked by Omar to define "jihad," responded that it was an internal struggle against one's own urges.
Against the equivocal utterances elicited from the targets, there were efforts both within and outside of the courtroom to mold the men's words into more legible ideological ties. After Shnewer provided Omar with a nonviolent definition of jihad, Omar attempted to lead Shnewer to a more violent definition, going through a litany of scenarios, hinting at the necessity of violence. The majority of such efforts drew on the videos found in the men's possession and their content. In the courtroom, the defense asserted that while disturbing and insensitive, the act of watching jihadist videos did not equate with planning an attack on America. The prosecution ostensibly agreed but added that "when taken with [the defendants'] conversations, [the videos are] powerful evidence of their motive... [and] explain why the defendants did what they did." Thus, part of Kohlmann's role was to match the words of the defendants with the content of the videos that they downloaded. The turn to content indicates that the technological ties used to position the Fort Dix Five in global jihad are always-already ideological. Kohlmann testified that much of what came out of Shnewer's mouth in his recorded conversations with Omar were verbatim reproductions of the videos' content. For the prosecution, Shnewer's words were proof of the effect of the videos as actants and of an ideological affinity, rather than attempts to impress an older father figure who was repeatedly asking him for more videos and eliciting discussions about jihad. The social ties of the enemy network are here imbued with an ideological current that subverts the significance of the affective connections (of friendship and family) the informants cultivated.
In addition to eliciting comments on jihad, Omar found ways to establish ideological ties by other means. Omar offered to get the men weapons, AK-47s and rocket-propelled grenades (RPGs), by connecting them to his (fictional) arms dealer in Baltimore. The weapons were chosen strategically. On the stand, Kohlmann referred to the AK-47 as one of al-Qaeda's "most preferred weapons" whose operatives regularly extolled its virtues. Beyond being frightening, the weapons conjure images of insurgent fighting in Afghanistan and Iraq. The transfer of—and desire for—these weapons signaled an ideological link through a shared modus operandi. Again, the informant was key in establishing this link beyond introducing the men to a fictional arms dealer. When Shnewer made it clear that he could not afford the weapons, Omar first lowered the price and later offered to pay for the weapons, reminding Shnewer that he was dedicating ten thousand dollars of his own money for their "mission." Also, the men never once requested RPGs, and once the Dukas saw them on the list, they quickly rejected them. The men had experience firing high-powered rifles at the gun ranges they would visit and wanted their own so as not to have to wait their turn on outings. When the men made the purchase, Tony Duka was recorded saying, "Now we don't have to wait on line to shoot in the Poconos." Surely the purchase was illegal, but to further fashion the act into a sign of ideological affinity, the seemingly innocent purpose of the purchase (i.e., for use at a gun range) was characterized—much like the actions and words of Communists—as having a sinister meaning.
The defendants often played paintball and went to gun ranges on their trips to the Pocono Mountains in Pennsylvania. The prosecution framed these trips as training sessions. Shnewer had in fact explicitly referred to the trips as such. However, not only was he the only one to do so, but the very idea of training came from Omar. Drawing on his own story of being a veteran of the Egyptian army, he assured Shnewer that he could provide the younger Shnewer with the skills necessary for a mission. Similarly, Tony Duka's assertions that paintball was like real war and that the US Army used it for training were not only cued by Omar, but were really a reiteration of what Omar had said to strike up that particular conversation. On the stand, Omar further drove home the characterization of the men's activities as training, repeatedly referring to paintball guns as "fake guns," claiming Shnewer preferred them because they attracted less attention. Almost in unison, Kohlmann made strained efforts to justify his characterization of any visit to a gun range as "training." In response to defense assertions that shooting at a range is a legal activity in which many Americans participate, Kohlmann responded that that is what makes it the perfect cover. He did this with many incongruities and seemingly benign acts, illustrating them as dangerous through conjuring other homegrown plots. Beyond creating a prototypical mold that the Fort Dix Five seemed to fit through a scattered assemblage of cherry-picked examples, Kohlmann helped convey a paranoid sense that anything benign was potentially threatening. A simple U-turn was a "counter-surveillance maneuver." Even balloons signaled jihad: "Balloons were recovered. Balloons mixed in with ammunition. Recovered from Dritan Duka's house, were some balloons. Little party balloons. And in most cases, in most situations that would just be an odd fact. A curious fact. But not in this [case]. And not with these defendants. Those balloons have a deadly sinister meaning." Here, the balloons the brothers used for target practice come to signify soldiers' heads and a visit to a gun range takes on an ideological meaning, training to kill American soldiers (mimicking what the men watched in jihadist propaganda). Dispelling this would be extremely difficult. According to the prosecution, the laughter and joking caught on surveillance tapes of the defendants during their supposed tactical training ought not be misconstrued as a sign that they were in fact not training and that they were simply on vacation. Kohlmann backed this up when he stated that even Ayman al-Zawahiri had joked around and laughed throughout the recording of one of his propaganda videos.
Returning to the videos that played such a pivotal role in the trial. Omar failed to have Shnewer or any other "member" produce a fatwa—which an FBI translator defined as "an Islamic ruling or edict"—for their "mission." Seeking religious sanction for their plot would have surely solidified their affinity with al-Qaeda. At trial Kohlmann filled in this ideological gap by suggesting that Anwar al-Awlaki's "The Constants of Jihad"—a video the men had in their possession but that forensic evidence made clear they had never watched in its entirety—constituted a fatwa. Not only did the men become part of al-Qaeda as Kohlmann asserted, but they also received sanction from its ideological leaders "without even speaking to [al-Qaeda] directly even once."
Kohlmann's statement indicates the manner in which the ideological links shape the network diagram of each historical moment. The ideological grants the Red Octopus, despite its legible center, a level of movement and distribution, its arms wandering in a semi-autonomous manner from space to space, potentially infecting unsuspecting organizations that become fronts, their words another Aesopian vehicle for the octopus's venom. In the distributed geometric constellation of global jihad the ideological provides a guarantee of uniformity without recourse to direct control. The ideological interweaves with the social and technological, making them legible as part of a network and conspiracy. The ideological and its accompanying potential of spreading a network into the most innocuous of spaces illustrates the common thread of paranoid thinking of both conspiracy and connectivity, an interstice in which the Double's rhizomatic trajectory—not everywhere but potentially anywhere—finds expression.
Conspiracy/Connectivity
The homegrown terrorist, the DHS definition indicates, works without direction. As such, Omar characterized his work as getting into the heads of his targets, reflecting the pseudo-psychologizing of contemporary radicalization theories. Indeed, the lack of "explicit evidence" (read: direct links) did not bother Judge Kugler, who presided over the Fort Dix criminal trial, in also denying the men's subsequent appeal of their life sentences. And in the immediate aftermath of CPUSA convictions, upheld by the Supreme Court in Dennis v. the US, and as McCarthyism came into full swing, accusations occurred in concert with the belief that directives (between Communists) "hardly needed to be transmitted." Articulations of Communist "thought control" were inflected with religious rhetoric, reflecting fears at the time of how the atheist ideology "burned into the souls of some Americans like a hot skewer."
Read properly, these assertions about America's adversaries illustrate the move of paranoid thinking of connectivity not just from the pathological to the logical, as theorist of digital media Wendy Hui Kyong Chun posits, but also to the legal in and through conspiracy. Times of national crises are accompanied by the increased use of conspiracy charges, as deployed in Foley Square and Fort Dix. Conspiracy is itself based in the paranoid thinking of connectivity, seen in the leverage and leeway given to the prosecution in making particularly loose and imaginative connections. A successful conspiracy conviction simultaneously assuages the paranoia of connectivity by outing the Double through conviction while exacerbating it by proving the paranoiac right—the Double, future-past, guarantees its own potentially more destructive return. The Foley Square convictions only served as proof that "it is hard to tell where these seeds of the Russian theory have sunk into the soil or what new crops may spring." But the conspiratorial movement of the Double is also utilized in "proving" conspiracy through the informant. In other words, security simultaneously fears and exploits connectivity, in the twin figures of the hidden enemy and the informant. This chapter has focused on how the informant's work shapes the enemy network through cultivating, curating, and eliciting connectivity in a way that is legally legible. I conclude here by elaborating on how connectivity maps onto conspiracy, on the relation of the informant to the shape of the enemy network, and what both reveal about the Double.
In outlining the work of the informant in times of national crisis, my intention was not to suggest the accuracy of the netwar doctrine, but to repurpose a popular security framework as a heuristic from which to uncover how enemy networks take their shape and the effort that goes into such a project. Albeit in differing ways given the network diagram native to each moment, informants cultivate social relationships, curate exchanges through and of communications media, and elicit and translate ideological links through which to implicate their targets in a broad international or global conspiracy. I have traced the variety of links separately, but conceptually the edges of the enemy network cannot be thought of as distinct. Rather, they are stitched together over the same trajectories. In the Fort Dix case, the informants exploited their social connections to curate technological links. Moreover, the technological links that resulted—an increase in downloading jihadist videos—were always-already ideological; the ideological links, often elicited strategically by the informants, simultaneously helped to determine the quality of one's communication patterns and reduced the significance and legal consequence of the informants' cultivated social ties, which they couched in the language of familial bond. At Foley Square, both Budenz and Philbrick moved through the Communist Party apparatus—"I had passed the first stringent tests, and now I was entrusted with new and larger responsibilities," wrote Philbrick in his memoir. Once established in the organizational and social makeup of the party, their positions therein allowed them to act as conduits through which Communist media changed hands, often producing the "very book" that moved through them as proof of conspiracy. Moreover, their social ties lent them the credibility to translate Communism's tricky phrases and Aesopian language, which in turn was a key part of their effort in making the social and technological links they helped constitute legible.
In the face of countervailing evidence and the lack of direct ties, the "success" of the work of the informant is closely linked to conspiracy law. In US jurisprudence there is no objective test regarding a conspiracy's boundaries, whether in time (duration), space (geographic specificity), or subject matter (target or aim). Moreover, the agreement at any conspiracy's heart need not be formal. That is, not only can one's assent be tacit, but each individual party need not be aware of the identity of her accomplices or even how many there are. Omar—to the FBI while in the field, on the stand and in interviews afterward—explicitly stated that the Dukas were not involved in any plot. But, because evidence of directive is not requisite to proving the existence of a conspiracy and "whether an agreement exists depends on the facts and inferences appropriately drawn from them," even an informant's admission against inclusion can be overridden. Despite his statement about the Dukas, Omar did much on the stand that was crucial to establishing such inferences. By stitching the ideological into the social and technological, by making all of the enemy network ties legible through the lens of ideology (international Communism or global jihad), the informants provide a malleable subject matter capable of encompassing an innumerable amount of actions and utterances. In doing so, they also furnish a movement whose potential covered the globe (if in different ways) and was bent on destroying "our way of life," thus placing it on the plane of eternal time (the Double is never present but always past and yet to come). Indeed, the ideological links conceptualized as running through not only the social and technological but the very plane on which each network was diagrammed are at the heart of the paranoiac reasoning of conspiracy prosecution.
It is certainly tempting to leave the analysis here, to reduce the work of proving conspiracy to the invocation of threatening ideologies, whether international Communism or global jihad. And certainly, the informant was instrumental in doing so. Moreover, the anti-American narrative provides accompanying identity constructs that transform a vast swatch of individuals into potential coconspirators (those associated with an other) and malleable enough to implicate many more (intoxicated or radicalized doubles). However, there is more at work here. The informant's efforts depended a great deal on what Chun calls the "fantasy of connectivity," asserting, "paranoia stems from the reduction of political problems into technological ones." Positioning media, books and videos, as actants fulfills precisely this function, shifting focus away from complex historical-political contexts (and the cultivated social contexts created by the informant) and onto the circulation of media. Technical connectivity or mere circulation, as much as articulations of ideology, act as enablers and proof of conspiracy. Moreover, what media scholar Jose van Dijck terms the "ideology of connectivity" conflates this potential for technical connectivity with (in)human connectedness, suggesting a quality of tie that is neither simply technical nor ideological but also affective (on the stand Kohlmann often referred to the emotions displayed by those who watched jihadist videos). Last, the fantasy of connectivity posits a freedom analogous to buying and selling, one that dedifferentiates users, obscuring their social position. In the contexts at hand, particularly that of Fort Dix, the logics of connectivity work to further downplay the social relationship cultivated by the informant: "It was very easy for Mohamad to tell me I have nothing to do with this issue and I don't want to do anything," Omar said on the stand, suggesting that regardless of the nature of their relationship, Shnewer bought into global jihad. In short, inasmuch as anxieties concerning anti-American narratives fuel the paranoid thinking of security, so too do fears of connectivity. The notion that "everything is connected" has deviance at its core, according to Tung-Hui Hu, a historian and theorist of digital media, "circuits—or people—that are unreliable and untrustworthy." Here, there is a circular relationship apropos of the paranoid thinking of connectivity and conspiracy. The conspiratorial ideologies used to connect adversaries (and thus flesh out the Double) depend on fantasies of connectivity, which simultaneously always-already contain a conspiratorial rot that maintains connectivity as a fantasy that can be mobilized in the service of security, particularly in the conspiracy charge.
In the paranoid circularity of conspiracy and connectivity, the Double as more than enemy emerges. The informant, the enemy-Double's inverse, the wolf in wolf's clothing enters into this cycle, himself not always able to distinguish friend from foe; Omar and Bakalli had no idea that the other was also an informant. And from this work, drawing on dedifferentiating tendencies of ideological narratives and connectivity, the informant produces the shape of the enemy network in a form legible to publics and juries. I have attempted to make visible this process, often hidden under the innovative flash of the new, by examining this old technology that is deployed into the conspiratorial circuits of connectivity. Certainly, in each moment the informant-Double's productive work is different. In the contemporary crisis, the octopus has become a constellation floating in ideological ether, and, thus, the work of the informant has become more taxing. Rather than infiltrating organizations and characterizing them as cells in a conspiratorial network (which is itself fundamental to producing the enemy network as a legible threat), the informant cum fledgling jihadist must attempt to form a cell from which to link individuals to global jihad. Curating radicalization is much more labor-intensive than infiltration, perhaps an irony in an increasingly automated world.
Yet, the octopus and the constellation are both afforded a certain amount of movement and control—perhaps because the Cold War marked a move toward distributed modes of organization or because a truly distributed network is a fiction. Regardless, the characteristics of these networks are packed into the actants that are said to circulate within, carriers of ideology and means of connectivity. In this sense, the Double as both an enemy figure and informant cannot be epistemologically separated from these media. The Double as circulating—not everywhere, but potentially anywhere—threatening to materialize in the people and places one would least expect, is inherently tied to the actants of a network. In the next chapter, I turn to spaces of contemporary counterterrorism, which, in an attempt to freeze the movement of the enemy-Double, are themselves caught up in the play of opacity and transparency, producing novel articulations of belonging and exacerbating already-existing experiences of second-class citizenship.
Figure 5. Drone strike in Baghdad, April 10, 2008. This is a composite of two screen shots from a Department of Defense video posted on YouTube.
Figure 6. Surveillance footage from the Newburgh sting.
3
Opacity and Transparency in Counterterrorism
Belonging and Citizenship Post-9/11
On September 30, 2011, an American named Anwar al-Awlaki was killed in a drone strike in Yemen. The drone images shown (Figure 5) are not from that operation, but from a similar one in Iraq. Footage of the al-Awlaki strike was never released, perhaps because it showed the extrajudicial killing of a US citizen. The camera of a surveillance helicopter (Figure 6) hovering over the Bronx, New York, on the evening of May 20, 2009, focused in on four African Americans (James Cromitie, David Williams, Onta Williams, and Laguerre Payen) in the midst of carrying out a supposed terror attack. Minutes later federal agents arrested the men who would come to be known as the Newburgh Four. The footage and the arrest were made possible by a paid FBI informant who lured the men into the plot.
Both videos illustrate the spaces in which counterterrorism materializes, or at least those shown to the public: faraway lands and everyday American streets. Videos of drone strikes, which have collectively garnered tens of millions of views, are uploaded onto YouTube by the Department of Defense, ostensibly in an effort to be more transparent about its (openly) secret program. The same could be said for the images of FBI sting operations. Yet, even with their release, much is hidden. The humanity and status as citizen of the targets are pixilated away and the horrors of war mediated into more a palatable infrared form of visual representation—thus, while the particular video of al-Awlaki's killing is classified, the dedifferentiation of what Lisa Parks calls the drone's "vertical mediation" allows any one video to act as a reasonable stand-in. The specificity of the location is thus also mediated away into exotic deserts and anywhere USA, spaces that become interchangeable and overlapped. Moreover, any video in isolation leaves unseen the complex processes involved in its production. Beyond the network of communication infrastructure populating and orbiting Earth, the two cases in this chapter bring our attention to two other spaces integral to the production of counterterrorism spectacles, spaces largely invisible to the public eye: the increasingly solitary office of executive decision and the American prison system.
My interest in the operational spaces of counterterrorism stems from the spatial terms deployed vis-à-vis homegrown terrorism. In the previous chapter I showed how the Double is made sense of as a figure in circulation, networked, neither here nor there. In light of this continuous motion the spatial dimension of counterterrorism is best described as one of collapse, the boundary between foreign and native becoming difficult to discern. This collapse is further visible in various phenomena: in the drone, whose pilot sits in front of a screen in a trailer outside of Las Vegas, Nevada, or Langley, Virginia, or at a base in Somalia or the United Arab Emirates, while the machine stalks and kills targets in Africa, the Middle East, and South Asia; in the fact that operations against US citizens are carried out both abroad and at home; and in the declaration of the American home front as a battlefield in the war on terror via the National Defense Authorization Act. In the debates in response to the latter, critics worried about how the act would facilitate the infringement of individual rights, while supporters claimed that those who had nothing to hide—those who truly belonged—had nothing to worry about. These debates closely link the spatial dimension of counterterrorism to notions of belonging and citizenship in contemporary America. This chapter examines this link, but from a different perspective.
My focus on American spaces of counterterrorism—the institutional configurations of executive secrecy and mass incarceration—takes its cue from how the spatial collapse of homegrown terrorism is articulated in a tense unison in al-Qaeda in the Arabian Peninsula's Inspire magazine and the multiagency "If You See Something, Say Something" campaign (See/Say Something campaign hereafter). Both warn of the Double, a threat that might materialize in the places one would least expect. Al-Qaeda claims she will become completely visible only in the ephemeral flash of terror; government authorities assert they could pick her out of the crowd if only given enough access to information. A notion already suggested in the efforts to network the enemy, what is of particular interest in this cacophony of threats is the way in which the Double is constructed. Beyond the unidirectional infiltration of the native by the foreign, what is articulated is an uncanny recognition of something American in contemporary jihad, communicated as a promise in Inspire and as an ominous warning in the See/Say Something campaign. I argue that both al-Awlaki and the Newburgh Four were framed as particularly worrisome threats (deserving of death and life in prison, respectively) through an articulation of precisely this type of uncanny recognition: in al-Awlaki's American accent, idiomatic English, and effortless ability to traverse cultural spaces; in the Newburgh Four's (supposed) emergence from a quintessential (racialized) American space—the prison.
The second half of the chapter begins with the exhortations of Department of Homeland Security head Janet Napolitano, in harmony with the See/Say Something campaign, calling for citizens to keep watch in the face of the threat that may come from their fellow Americans. Effectively positioning each individual as both suspect and spy, the cases in this chapter illustrate how this double identity is not distributed evenly. To show this, I begin not from the assumption that the shape of counterterrorism practice could be understood as a reaction to a foreign threat that has infiltrated the United States. Rather, I play on assertions regarding the Americanness of jihad and focus on how long-established American institutional configurations shape counterterrorism and how their entanglement therein produces articulations of belonging and experiences of citizenship. The al-Awlaki and Newburgh cases, which have both been used as examples regarding the effect of counterterrorism on citizenship, present unique incarnations of this phenomenon.
Instead of discussing the legality of the extrajudicial killing of Anwar al-Awlaki, I focus on the manner in which his placement on the capture or kill list and the drone program, in general, were communicated to the American public. It is a communicative strategy best understood as the open secret, which at once acknowledges (if partially) and denies, releases (e.g., drone videos) and withholds (e.g., details about how one is marked for death), and communicates trust and suspicion without clearly or explicitly marking who is trusted and who is not. Mirroring the spatial anxieties of counterterrorism, this strategy cannot be properly understood without being situated within a long-standing institutional configuration that accelerated under the Reagan administration, that is, executive secrecy. In the open secret's play of opacity and transparency, a peculiar articulation of belonging is produced: laughter. I argue that the laughter in response to questions about al-Awlaki's death and the drone program acts as a complex, if fleeting, vocalization of one's belonging.
The Newburgh case provides further insight into those who cannot laugh in the face of counterterrorism practice and its accompanying secrecy. The announcement of the capture of four violent men, career criminals whose antisocial tendencies found an outlet in jihad, fit the Prislam narrative conveyed in various government circles. Prislam is the fear that convicts, who convert in prison, are vulnerable to the lure of a violent form of Islam; in short Prislam is framed as an unholy alliance of criminality and jihad. I flip the script of Prislam by connecting counterterrorism practice to mass incarceration, its constitutive racism, and its institutionalization of a cyclical movement of individuals between two spaces largely hidden from public view: the prison and the depressed city. It is this institutional configuration, I argue, on which this informant-led operation depended. And, given how mass incarceration disproportionately affects African Americans, I show how counterterrorism practice can work to exacerbate already-existing second-class experiences of citizenship, in its intersection and exploitation of the machinations of mass incarceration.
Citizenship, more than holding a passport or having a nationality, establishes one's membership in a community in a complex interplay of identity, participation, and rights. It involves expressions of belonging as well as the manner in which one is able to assert one's rights, both of which have been and continue to be doled out unequally. In his analysis of the unequal experiences of citizenship endemic in America history, political scientist Rogers Smith highlights that many Americans have long been denied their "personal liberties and opportunities for political participation... on the basis of race, ethnicity, gender, and even religion"—categories that he argues are at the core of the political identity of Americans, their "stories of peoplehood" and "imagined communities." In times of war, unequal experiences of citizenship are often tied to the ways in which the nation's enemy has been portrayed. This trend does not end with the Double. The double position of suspect/spy is not equally distributed. The examination of the play of visibility and invisibility, transparency and opacity, spaces shown and spaces hidden in counterterrorism communication and practice illustrates how America's political structures and institutions, through which counterterrorism practice moves, shape the form that the Double takes before the public's eyes and its unequal effects.
As American as...
The multiagency See/Say Something campaign predates al-Qaeda's Inspire magazine by almost a decade, but, as if holding a joint news conference, both warn of an adversary that threatens to materialize within US borders in the people and places one would least expect. Al-Qaeda in the Arabian Peninsula published seventeen issues of Inspire between 2010 and 2017. One of the publication's primary functions is to facilitate violence (or at least give the impression that it has the ability to do so). By promoting "Open Source Jihad" the magazine leaves the choice of where terror might materialize to individual whim rather than organizational planning. But the magazine does provide aids, including illustrated manuals for weapons training and manufacturing as well as hit lists that mark particular individuals for assassination. These include Terry Jones, the Florida pastor behind "International Burn-a-Quran Day," and more high-profile figures such as Bill Gates. More often than not, however, its suggested targets are much more nondescript and generic (e.g., borders, financial institutions, government buildings, military bases, harbors, railroads, etc.). Even more vague is its encouragement to target civilians in general by hitting populated areas, causing car accidents, starting forest fires ("Arson Jihad"), or carrying out workplace violence. This vague and never-exhausted list acts as a threat, one that underwrites al-Qaeda's warning to its adversaries that the "question of 'who and why' should be kept aside. You should be asking 'Where is next?' " This also happens to be the message communicated in the See/Say Something campaign, whose most recent incarnation includes a series of videos titled "Protect Your Everyday."
A ten-minute Department of Homeland Security public service announcement features an array of mundane and innocuous spaces in which the terrorist might appear: shopping malls, dimly lit parking garages, the subway, nondescript neighborhood streets, sanitized hospital labs, industrial storage facilities, and the like. In one scene, a man enters a parking garage and notices that the lens of a security camera has been spray-painted over. He then spots several individuals (all covered in dark clothing) exit a white van, drop its keys on the ground, and leave the garage on foot. Avoiding detection by shrinking into his car seat, he then calls authorities, "Hello? Listen, I don't know if this is anything, but what I just saw looked really suspicious." The video represents well how the terrorist is never portrayed as a stereotyped other in the campaign. Rather, the terrorist double is either white, masked (often by a hoodie or other clothing), or ambiguous. Through a display of press clippings and footage, the same video also parades a miscellany of threats, including Ted Kaczynski, Timothy McVeigh, Colleen LaRose (aka Jihad Jane), Faisal Shahzad (who attempted to set off a car bomb in Times Square), and Joseph Stack (who flew a small plane into an IRS building in Texas). Against this diversity of threats, the video instructs Americans not to make judgments based on race, language, gender, or religion.
Inspire communicates an image of a potent threat by manufacturing a sense of collective identity that similarly does not depend on a typical member profile. Seeking to foster a "borderless loyalty," the magazine calls out to every "building, slum, desert, house," directing its communications not only to Muslims in the West, but to anyone willing to adhere to its political quasi-theology. This imagined community is given a history by comparing it to figures from the past and commemorating events. In this work, homegrown attacks in the United States are central to their narrative; for example, the Boston Marathon bombing is reframed as the Battle of Boston. In the back of most every issue, Inspire lists a dispersed legion of prisoners held by the West. These tributes include those whose arrests predate the magazine's existence and others who had no contact with the magazine or organization, whether directly or indirectly (including the Fort Dix Five). In short, al-Qaeda appropriates events that can be labeled jihadist; several of these are American.
This leads into what has been a topic of conversation since Inspire first appeared. Stoking fears of radicalization, most concerning for officials is that Inspire, as one commentator put it, "feels so very American":
A canny blend of photos, feature stories, insider details, snappy news bits and verse-quoting theological justifications for terrorist attacks, all of it calculated to appeal to American Muslims who grew up on glossy magazines like Details and GQ. It is also notable for its collegiate sense of humor, which includes a mention of the fact that the plotters dropped a copy of Charles Dickens's "Great Expectations" into one of the bomb packages—a detail illustrated by a close-up of the novel's paperback edition.... [All] a seeming attempt to appeal to the sensibilities of Muslim hipsters.
The Wall Street Journal wrote that the magazine's most unnerving pages are those in which it "remixes old-school jihadist tropes for an English-speaking Western audience... [particularly] the aspiring suburban jihadist." Inspire posits this suburbanite as a reluctant superhero through the visual language of videogame culture. It glorifies martyrdom through Hollywood-style poster spreads. Beyond flashy graphics, Inspire also covers a variety of social issues read as relevant to Americans such as materialism, poverty, and climate change—the first issue featured a piece by Osama bin Laden titled "The Way to Save the Earth." Furthermore it stresses not only the persistent prejudice faced by American Muslims and Arabs but also the continued effects of institutionalized racism on African Americans, appropriating the horrific murder of Trayvon Martin, for example, to buttress its message. More than promising paradise, the magazine presents its political ideology as a solution to some of America's most pressing problems.
Surely, the surprise expressed in media accounts in reaction to what is seen as Inspire's American or Western style can be read as emerging from widespread Orientalist assumptions about a backward, antimodern, and unsophisticated other. However, the recognition of something uncanny in the publication also signals anxieties over a particular adversary: the Double. Inspire is thus feared to be the stuff of traitors. In a 2010 statement that uncannily mirrors that of Eric Holder quoted in the Entrance, Anwar al-Awlaki made this explicit: "Men and women in the West who were born in the West, raised in the West, educated in the West, whose culture is that of the West, who have never studied or met with any 'radicalized' Imams, and never attended any radical mosques are embracing the path of Jihad." The magazine, in fact, features articles penned by American defectors. Al-Awlaki's experience has been serialized in "Why Did I Choose al-Qaeda?" Samir Khan—another American killed alongside al-Awlaki (officially not targeted and classified as collateral damage) and Inspire's original editor—penned, "I am proud to be a traitor to America." This, and the sheer amount of American cultural references within its pages, is clear evidence for Peter Neumann, director of the International Centre for the Study of Radicalisation, that "the people who are producing the magazine are clearly American. We don't know for sure, but it would surprise me very much if not 80 per cent of the contributors to the magazine were American." His remarks echo those of former DHS head Janet Napolitano in a 2011 speech: "Indeed, one of the most striking elements of today's threat picture is that plots to attack America increasingly involve American residents and citizens." Al-Awlaki put all this in more concise terms, asserting that jihad "is becoming as American as apple pie."
In a tense harmony, American counterterrorism officials and their adversaries announce the collapse of clearly bounded spaces of enmity. It is against this backdrop that threats are positioned as particularly worrisome by invoking the manner in which there is an air of the familiar in what ought to be strange, in their uncanny comfort with American culture or their emergence from quintessentially American spaces. Two cases that were described in precisely these terms, albeit in very different ways, were that of Anwar al-Awlaki, who seemed to have fulfilled his own prophecy, and the Newburgh Four, a group of four African American ex-convicts caught up in an informant-led FBI sting operation.
. . . Apple Pie: A US Citizen in America's Crosshairs
Silent and cold. At twenty thousand feet, the temperature is minus ten degrees Fahrenheit. At almost a thousand miles per hour, sound cannot keep up. Heat and noise struggle in the turbulence. Three miles away, seven thousand miles from American soil, an American citizen driving an empty road has ten seconds to live.... This American citizen has become an enemy of the United States. In response... his government added him to a kill list, targeted him, and launched a military operation against him. The Hellfire finds its mark. The heat and noise catch up.
Anwar al-Awlaki and his companions had just eaten breakfast five miles from the town of Khashef in Yemen's northern Jawf province when the heat and noise caught up with them on September 30, 2011. What one White House official called "a good day for America," an American was killed by his own government in a clandestine military operation. He was never charged with a crime.
Anwar al-Awlaki was described as an individual who possessed the ability to effortlessly shift between countries and cultures. Born in New Mexico in 1971, he lived in the United States until the age of seven, when his father, Nasser, took a prominent post in his native Yemen and moved the family there. Anwar al-Awlaki returned to the United States to attend first university and then graduate school in the early 1990s. During that time he had a son, Abdulrahman, born in Denver in 1995. Abdulrahman was also killed in a drone strike two weeks after his father—the result, authorities claim, of being in the wrong place at the wrong time. Similarly, Abdulrahman's eight-year-old sister, Nawar, was killed in a US-led raid in early 2017. From the mid-1990s onward al-Awlaki served as the imam for several mosques around Colorado, California, and later Virginia. The FBI had begun monitoring al-Awlaki in 1999, suspecting that the charities with which he worked had ties to terrorist organizations. Agents then took note of his recurring solicitation of prostitutes, for which he was arrested several times. These efforts only intensified post-9/11 with the FBI interviewing him three times in the days immediately following the attacks. According to the transcripts, he was questioned about Nawaf al-Hazmi, one of the hijackers whom he recognized from San Diego. The transcripts also show that al-Awlaki publicly condemned the 9/11 attacks; his sermon on the Friday afterward focused on healing, not surprising given his reputation at the time as an imam who attempted to build bridges between communities. It was this reputation that gained him an invitation to an outreach luncheon at the Pentagon in early 2002; as he traveled to the event on public transportation the FBI followed closely behind. He left the United States that same year.
On May 6, 2003, the FBI closed their investigation, concluding that al-Awlaki did not have terrorist ties. Later that year he contacted the FBI in response to media reports stating that he was a "spiritual advisor" to some of the 9/11 hijackers. He wrote, "I am amazed at how absurd the media could be and I hope that the US authorities know better and realize that what was mentioned about me was nothing but lies." Attempts to set up a meeting failed, and before the end of the year emails from FBI agents to al-Awlaki all bounced back. Eventually, the FBI arranged a meeting with him in a Yemeni prison in 2007. He had been placed there a year prior, at the behest of US authorities he would later claim. As of the early 2000s his writing began to support suicide bombing. After he was released from jail he began openly calling for violence against the West, particularly the United States, through Inspire and elsewhere.
The media reports that bewildered al-Awlaki often portrayed him as a prototypical other: brown, Arab, and Muslim. Al-Awlaki was described as a "bushy-bearded orator... dressed in [a] traditional Yemeni long robe, headscarf and tribal dagger." The invocation of traditional Yemeni culture was prevalent in multiple profiles. Much like Nidal Malik Hasan's "roots," various commentators stressed that al-Awlaki spent his "formative years" in the alternatively rugged, tribal, or medieval country of Yemen, that is, "in the embrace of one of the most traditional societies on earth." His return to America for college was said to have happened only at his father's insistence. Once back he was said to find it difficult to fit in, the apparent result of spending his adolescence idolizing the Mujahideen fighting in Afghanistan and studying the Quran in a society where "women were largely excluded from public life."
Like with many other jihadists, gender relations were prominent in establishing al-Awlaki's outsider status. His wife—a distant cousin—was always covered and never shown to male friends. Some claimed that he was "not able to talk to women at all, even covered women." Anecdotes circulated in media reports. Scott Shane of the New York Times made the connection between gender relations and belonging explicit: "I mean, we're talking about Colorado State, right? I mean, there aren't many guys who are running the other way from women on American college campuses." His uneasy relationship with women was also illustrated through his solicitation of prostitutes. Al-Awlaki is thus transformed into a "Yemeni cleric"—gendered hang-ups and all. Despite the fact that he spent half of his life in America, al-Awlaki was depicted as having been "never fully American." Much like labeling him "American-born," in those headlines in which he was referred to as an American citizen, "citizen" acts as a modifier of "American," restricting al-Awlaki to a formal status, one undeserving of sympathy.
The framing of al-Awlaki as other, however, does not capture, I argue, why President Obama was seemingly obsessed with him. With a fervor one advisor compared to that seen in George W. Bush after 9/11, Obama made al-Awlaki his top priority, a position supported by expert and official lines that labeled him the most significant threat to the US homeland. At the same time, however, al-Awlaki was characterized as a "dime-a-dozen cleric" largely unknown to most Middle Easterners who, as the New York Times put it, shrugged at his death. Moreover, his status within al-Qaeda was propelled, pundits mused, by the attention he received in US media more than anything else. To understand how a man with few resources attracted so much attention requires a rereading of his repeated positioning as "American-born."
Reducing al-Awlaki's status to American-born was certainly intended to exclude him from the American collective, suggesting that he shed anything American like a worn skin when he left the country. However, placed against the backdrop of the spatial dimension of counterterrorism, American-born should also be read as connoting a threat. Al-Awlaki's firsthand, intimate experience in and of America equipped him with the ability to speak to Americans in a way that no other jihadist could. That is, what was particularly threatening about al-Awlaki was not his otherness. Rather, in a profound sense, it was al-Awlaki's "very American qualities... that made him such a dangerous radicalizing force." Just as with Inspire magazine there was a fearful recognition of something American in al-Awlaki (which is not the same thing as accepting him as a full American). This recognition went beyond his fluent command of the English language, though this itself garnered much attention. He spoke in an American accent and in a calm and reasonable manner, a far cry from the caricature of Arab and Muslim terrorists in Hollywood movies (here, the uncanny recognition feeds off of long-held stereotypes). Moreover, it was al-Awlaki's "idiomatic" English that was particularly threatening. In his lectures he referenced figures, historical and allegorical, readily identifiable by American audiences, such as Malcolm X and "Joe Sixpack." Once, he used an anecdote about Michael Jackson and his desire to live forever in order to make a point about the inevitability of death. For observers, al-Awlaki displayed more than an elementary familiarity with American culture; that is, he possessed a keen ability to exploit it in efforts to "relate culturally to a Western audience." In a sense, the easily adopted American culture that is often the subject of globalization debates returns home in Frankensteinian form.
Al-Awlaki's reach was powered not only by his cultural lexicon but also by his seemingly expert use of digital media; both assertions depend on a contrast to an unsophisticated, uncultured, and primitive other. Alternatively dubbed "the bin Laden of the Internet," a "YouTube warrior," and an "e-mam," al-Awlaki regularly posted videos to YouTube, one of which was viewed more than a hundred thousand times. He had a Facebook fan page (with almost five thousand followers), a popular blog, and a best-selling lecture series he sold over the Internet. Al-Awlaki's Internet presence and his online video sermons have been thought to be the inspiration for various jihadists, including the Tsarnaev brothers. The removal of these materials is an almost impossible task. His videos and tributes to him remain on YouTube. The site's attempt to remove them in 2010 was described as a mild inconvenience for jihadists or the equivalent of "placing [his videos] just a few inches off prime shelf space." Beyond depictions of martyrdom, his electronic legacy is ensured by a digital Double, one that can be readily copied, distributed, uploaded, and downloaded, endlessly circulating within global communications networks.
Al-Awlaki, who had spent half of his life in the United States and whose first language was English, embodied both his own prediction that jihad would become as American as apple pie as well as official fears of a potential enemy hiding in plain sight—as the story goes, a once moderate preacher who called America his home turned against it. Undoubtedly, the act of killing an American citizen was made easier by racializing al-Awlaki. However, what made targeting him so urgent was his perceived ability to transverse cultural spaces; that is, the uncanny recognition of something American in a face that was so often made other. Media reports highlighted testimonies from former colleagues who positioned al-Awlaki as "just the guy next door." Al-Awlaki was not a lookalike, but a manifestation of the Double by way of accent and cultural proficiency, perpetually reproduced in digital traces and the people he influenced. Al-Awlaki was presented, in his patterns of movement, speech, and Internet use, as a figure in which spatial and identity boundaries of us and other collapse.
. . . Mass Incarceration: Prislam
On May 20, 2009, five men set out to plant car bombs outside of two Riverdale synagogues in the Bronx, New York. The plan was to arm the explosives, drive some sixty miles to the Stewart Air National Guard Base near Newburgh, New York, and detonate the devices remotely while using Stinger missiles to blowup military planes parked at the base. The men who would come to be known as the Newburgh Four, James Cromitie, David Williams IV, Onta Williams, and Laguerre Payen, were not alone in the car. Accompanying them was a man who went by the name Maqsood, ostensibly a wealthy recruiter of Jaish-e-Mohammed, a Pakistani terrorist group. Cromitie had met Maqsood at a mosque in Newburgh the previous year. As soon as the bombs were armed, a mass of police officers dressed in plain clothes descended on the suspects. The scene was one remediated from many disaster-porn terrorist movies with a hundred agents and a bomb squad present. The presence of the latter was a curious sight given that the weapons, all procured through Maqsood, were fakes: the bombs duds and the missiles inoperable. A police helicopter had been filming their entire drive out to Riverdale. The men were caught in an elaborate sting operation. Maqsood, who had lured the men into the plot with promises of money, had recorded their conversations, hundreds of hours, for months. Maqsood was a paid government informant named Shahed Hussain. All four men received twenty-five-year sentences. On August 23, 2013, a three-judge panel at a Manhattan appeals court denied an appeal, two to one, to overturn the convictions. In 2014, the Supreme Court refused to hear the case.
For Karen Greenberg, director of the Center on National Security at Fordham University, the Newburgh case was one of many that indicated "it is no longer possible to think of jihad as a purely foreign phenomenon," seemingly mirroring al-Awlaki's assertion that jihad would become as American as apple pie. However, rather than claiming that Americans have wholeheartedly taken up jihad as al-Awlaki hoped, Greenberg characterizes jihad as having morphed into a repository for a litany of grievances Americans may hold against their own government; some of those she listed as engaged in jihad were not Muslim. For Greenberg, "Jihad has put down roots in America. And, at the same time, it is arguably being shaped by America as well." One can argue that jihad has been shaped by America since at least the late 1970s given the country's involvement in the Afghan-Soviet War. Nevertheless, for many in the security community one space in which homegrown jihad is shaped is the US prison. All four defendants had extensive, though nonviolent, criminal records.
"Prislam" has been the subject of two congressional hearings and a Justice Department report. Coined by Frank Cilluffo, the director of the Homeland Security Policy Institute at George Washington University, Prislam refers to the fear of inmates converting to a version of Islam that justifies violence. While it is estimated that there are about 350,000 Muslim inmates in US prisons, with about 30,000 to 40,000 inmates converting every year, there is little evidence to support anything resembling widespread extremism within the prison population. Perhaps the only documented case, which acts as a stand-in for the potential of further occurrences, is that of Kevin James, who founded Jam'iyyat Ul-Islam Is-Saheeh in California's Folsom Prison. After recruiting three others, they plotted to bomb military bases and synagogues in California in 2005. Their plan was foiled when a cell phone left at the scene of a gas station robbery led police to the apartment of two of the men. There, authorities found evidence of planning and a prepared press release.
The Newburgh Four did not know each other in prison. The group was formed, rather, at the insistence of the government informant who repeatedly badgered James Cromitie to assemble a group of "good Muslims," preferably "guys from the [Newburgh] mosque." Cromitie, who was labeled the group's leader, had been the only "member" for much of the time Hussain worked on him, repeatedly dodging requests to assemble a team. This important detail did not prevent both the media and politicians from tying the case to Prislam, a narrative driven largely by the fact that each man fit the description of the average prison convert: poor and black. The New York Times wrote that "the case has in certain circles evoked an old debate about the role prison might play as an incubator of extremist ideas among Muslims." Those circles are often occupied by conservative politicians (though hardly exclusive to them), such as Congressman Peter King, who described the Newburgh Four plot as "a very serious threat that could have cost many, many lives if it had gone through.... It would have been a horrible, damaging tragedy. There's a real threat from homegrown terrorists and also from jailhouse converts." King subsequently brought the case up at his 2011 hearing on Prislam, claiming erroneously that Cromitie was radicalized in prison—whether Cromitie was radicalized at all is doubtful. King warned those gathered that Cromitie and company were "not alone."
At trial, the prosecution did not explicitly make the case that the Newburgh plot was an instance of Prislam. Yet, the main tenets of the Prislam narrative were readily employed throughout the trial. Michael P. Downing of the LAPD testified at the 2011 hearing that inmates "by their very nature" are particularly vulnerable to radicalization because of their "isolation, violent tendencies and cultural discontent"; in other words, they have "already stepped outside the norms of societal behavior." Prosecutors portrayed the Newburgh Four exactly in this manner, as men with a "thirst for violence." Cromitie had, in fact, bragged "about violent things he had done and he [claimed] he had used bombs before and led a team of men armed with guns." None of his stories, however, were true, and his defense attorney described him as being a "big talker"—a point that I will show is of deeper significance than simply revealing Cromitie's blowhard personality. In fact, none of the men had a history of violent crime; all had served time for nonviolent drug offences (e.g., Cromitie sold marijuana to an undercover officer and David Williams was once caught with a small amount of cocaine in his pocket).
Commenting on the potential for those who have stepped outside of acceptable societal behavior to transgress civilizational boundaries (from crime to terrorism), Patrick T. Dunleavy, a former deputy inspector general of New York, warned that "putting 60's domestic terrorists in the same prison as convicted Islamic terrorists is not a healthy mix and can produce an unholy alliance." Here Dunleavy was referring to Jamil Abdullah al-Amin, also known as H. Rap Brown, a black activist and honorary member of the Black Panthers. He is a founder of "the Ummah," which federal authorities describe as a "nationwide radical fundamentalist Sunni group consisting mainly of African Americans." Al-Amin is in fact listed in Inspire magazine as a political prisoner; however, there is no evidence of contact (another case of Inspire reappropriating events for its own propaganda use). Nevertheless, these anxieties materialized in the 2009 case of Luqman Ameen Abdullah, a member of the Ummah. FBI agents in Dearborn, Michigan, shot Abdullah twenty-one times and killed him in what was described as, at best, a sting operation gone wrong and, at worst, a cover-up of a bundled case of entrapment. For Greenberg, Abdullah's case, one in which jihadists took inspiration from "an American icon of black nationalism," illustrated how "jihadism has grown more complicated over the past decade, as it has become, in part, a homegrown US phenomenon."
The Newburgh Four's only connection to any organization was through the informant who posed as a member of Jaish-e-Mohammed. Yet, this was enough to frame their case as an instance of just such an unholy alliance. US prosecutor Adam Hickey stated in his opening remarks that the men were offered an opportunity to do "something for the cause of jihad" and jumped at the chance "without hesitation." In effect, he was suggesting that the men had found an outlet for their bloodlust in jihad. Cromitie undoubtedly said many things that suggested his adherence to a particular anti-American/jihadist narrative. In addition to his repeated anti-Semitic diatribes, in a conversation recorded November 7, 2008, he told Hussain: "Listen, I am an American soldier. Do you hear what I'm saying? Just listen closely. I am an American soldier. I am a soldier right here in America, that the President don't even know about. Do you understand what I'm saying? I'm an American soldier, I am here in America, I am a soldier here, but not for America." Perhaps sealing the four men's fate, and the prosecution made a point to mention this early and often, recordings revealed that the men "prayed for success."
In the Prislam narrative, jihad becomes more complex in that it is shaped in spaces ostensibly meant to contain society's most dangerous. The prison is a thoroughly American space; the United States incarcerates more of its citizens in number and in proportion than any other country. While convicts and inmates are positioned as already-other, the constitutive anxiety of Prislam is that those who are a society's other might morph into civilization's existentially threatening foe. Admittedly, given America's racist history, the distinction between societal and civilizational others is meant to neither be absolute nor connote that the treatment of one might be more severe. Yet, the significance of prison here is how that which is threatening is communicated as not just infiltrating but drawing on American spaces, those authorities claim to control. However, on the margins of society, the Double is invoked here in one's transformation from criminal to traitor. The spaces of policing and of global conflict collapse into one another.
Jihad in America/American Jihad
Following up her 2011 comments on the involvement of Americans in jihad, Janet Napolitano added that because "citizens are often the first to notice signs of potential terrorist activity... we need every part of our society to be cognizant of the kinds of threats that exist, and knowledgeable about common sense steps to counter them." In this effort, the See/Say Something campaign aims to, as a video playing continuously on loop at New York's Penn Station boasts, "create thousands of eyes and ears." Americans are thus called to play the role of informer. But, because the potential terrorist may also be a fellow citizen, surveillance thinking positions each person as both a spy and a suspect, an observation Walter Benjamin made in the 1930s: "In times of terror, when everyone is something of a conspirator, everybody will be in the position of having to play detective." Here, the spatial dimension of counterterrorism begins to illustrate its demands on citizenship. More recently, the New York Metro Transit Authority has shifted its use of the See/Say Something campaign and produced videos featuring New Yorkers who have done just that. They have proved themselves by seeing something and saying something, though that "something" is often left in the realm of the subjunctive.
While this function of the campaign has received much attention, there is another dimension to it that has been largely ignored. Namely, the campaign clearly communicates that "seeing something" is no easy task. The Double blends in keeping much out of sight, a line repeated not only in theories of radicalization, but also in the pages of Inspire. In one interview, the AQ Chef—the pseudonym for whoever supplies Inspire with bomb-making recipes—was asked why he has focused on "the kitchen" in his work (e.g., the now infamous, "How to make a bomb in the kitchen of your mom" in the inaugural issue). He replied:
Unlike a lab, a kitchen is found in every house. Moreover, if a Mujahid can prepare a bomb from materials used in the kitchen instead of lab materials and use cooking utensils instead of lab apparatus, then we have a double success and we have overcome the security hurdle.... Generally, we are trying as much as possible to move the lone Mujahid from the lab to the pharmacy and from the pharmacy to the kitchen.
In effect, the kitchen allows the enemy to stay out of sight, in a private space more difficult to surveil. The See/Say Something campaign communicates something similar, but to different effect. In a PSA titled "The Drop Off," a white woman exits a cab in front of a commuter station. Her driver, a white man, opens the trunk and arms a bomb, while she enters the building and drops her purse on a bench. In each trigger moment, the camera speed slows and focuses our attention on these actions, indicating a technologically enhanced level of attention and perception that most, if not all, citizens lack.
This has several implications. First, positing that something that citizens are supposed to see as difficult to spot (beyond the unattended package) works to reinforce the necessity of government surveillance, whether digital or embodied in the informant. The deployment of the latter further suggests that the dual position of spy/suspect is not equally distributed. Some are more suspect than others and less trusted to surveil, illustrated in the NYPD's expansive (but ultimately unsuccessful) attempt to deploy an informant into each of the city's mosques and in the repeated calls for Muslims to show (read: prove) that they are "moderate." Connected to this, the second function is illustrated by a New Jersey Transit pamphlet that urges its riders, "If It Doesn't Feel Right, It Probably Isn't." Beyond fostering a feeling of unease around unattended parcels, the appeal to affect provides what philosopher Judith Butler calls a "license for prejudicial perception" despite official injunctions to the contrary. One need only recall the repeated occurrence on tarmacs in which one's language or dress has led to demands for removal in order for others to feel right.
The unequal distribution of trust and suspicion in calls for citizen surveillance requires us to refocus the spatial problematic of counterterrorism. The manner in which the discourse of the Double links space (materialized and hidden) and citizenship provides a frame from which to parse through what is rendered opaque and transparent in the execution of counterterrorism practice. Examining the play of seen and unseen in counterterrorism, from the spaces of executive decision to the prison—the latter conceptualized as neither an incubator of violence nor a storehouse of potential jihadists but in relation to mass incarceration and its effects—the American quality of jihad obtains a starkly different significance. What matters here is not an enemy that speaks our language—at least not beyond its catalytic role—but how features of the American political system in their entanglement in counterterrorism efforts produce articulations of belonging and experiences of citizenship.
Laughing at the Sky: The Open Secret and Belonging
The repercussions of killing al-Awlaki were immediately debated. An American citizen was killed by his government (as much as he disavowed that government) without due process; there was no trial, let alone a charge laid against him. Al-Awlaki had gone from being a propagandist to an operational member of al-Qaeda when he prepared, personally instructed, coordinated, and approved Umar Farouk Abdulmutallab's attempt to set off a bomb he had hidden in his underwear on a Christmas Day Detroit-bound flight in 2009, tantamount to having joined enemy forces. John C. Dehn of the US Military Academy argued that in such cases "Supreme Court precedent firmly supports the idea that the government may properly identify a US citizen as an enemy subject to war measures." Others disagreed. For one legal scholar, al-Awlaki was killed "merely on the assertion that lethal force was necessary to respond to the threat of terrorism." The administration's move was condemned by pundits across the US political spectrum, from the self-proclaimed "warmongering neocon hawk" Jeff Goldberg to the constitutional lawyer Glenn Greenwald, from Libertarian Senator Rand Paul to Democratic Representative Dennis J. Kucinich, who believed "the administration has a crossed a dangerous divide and set a dangerous precedent." Others called the operation an assassination and grossly unconstitutional.
I leave the legitimacy of his killing to legal scholars. What I want to examine here is all that was left partially hidden in the process and the articulations of belonging that emerged. In President Obama's first comments on the killing of al-Awlaki he was able to mention neither the involvement of the CIA nor the Predator drone whose missile found al-Awlaki. That information is classified. The increasing classification of government information is inextricably tied to the gradual expansion of executive power in the United States since the 1970s and its acceleration under the Reagan administration in the 1980s. However, the secrecy displayed in regard to the al-Awlaki case, and by association the drone program, is peculiar in that Americans were well aware of the general contours of the facts Obama omitted. Drone strikes are covered in foreign and American media and have inspired critical art installations. Also, long before al-Awlaki was killed, the public knew he was targeted. Here, "in a mechanism reminiscent of Freudian disavowal, we know perfectly well that the secret is known, but nonetheless we must persist, however ineptly, in guarding it."
The drone program and targeted killing are open secrets, even if the details of both are scantly known. Literary critic D. A. Miller defines that open secret as that which "must always be rigorously maintained in the face of a secret that everybody already knows." In articulating both contemporary threat (as Double) and America's response to it, the politics of boundary maintenance are caught up in the play between known and unknown, transparency and opacity, seen and unseen, us and other. Government communication of secrets follows this general pattern, one in which the boundary between opacity and transparency is strategically managed rather than clearly delineated. In the case of an extrajudicial killing of an American, the power to manage this boundary largely rests in the executive. Vicki Divoll, former legal advisor to the CIA's Counterterrorism Center, observed, "Oddly, under current law, Congress and the courts are involved when presidents eavesdrop on Americans, detain them or harshly interrogate them—but not when they kill them." The al-Awlaki case repeatedly confirmed her views. In throwing out Nasser al-Awlaki's lawsuit challenging his son's placement on a capture or kill list, the presiding judge, John D. Bates, recognized "the somewhat unsettling nature of [his] conclusion—that there are circumstances in which the Executive's unilateral decision to kill a US citizen overseas is... judicially unreviewable." He ruled the killing of al-Awlaki a "political question," the purview of the executive. So too was the legal justification for his killing, the infamous "Awlaki memo." In ruling on a lawsuit brought forth by the New York Times and the American Civil Liberties Union in 2013, Judge Colleen McMahon—who also presided over the Newburgh Four case—could
find no way around the thicket of laws and precedents that effectively allow the executive branch of our government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws while keeping the reasons for their conclusion a secret.... The Alice-in-Wonderland nature of this pronouncement is not lost on me.
Even as the executive slowly relented, it continued to manage what was known and unknown. A month after McMahon's ruling, a sixteen-page white paper was leaked, but gave few specific details. In June 2014, the US Second Circuit Court of Appeals reversed McMahon's decision and ordered the memo released. Retaining a modicum of control, the Department of Justice decided not to appeal the ruling but redacted ten of the memo's forty-one pages.
The public's eventual knowledge of the drone program and al-Awlaki's targeted death was not singularly the result of protracted legal battles. Secrets have their own forms of publicity, and open secrets are made known through a particular mode of communication that involves "rarely [speaking one's] mind, but more often only its screen." In the context at hand, the idea of speaking through a screen can be extrapolated to an executive that never openly admits to a program, memo, and so on; rather, these secrets are discussed, though never with significant detail, through intermediaries such as lawyers, advisors, and leaks to the media, ultimately retaining some amount of deniability. The drone program has largely been communicated in this way. Following al-Awlaki's death, a series of speeches on the topic of drones were given between February and April 2012: the Pentagon's general counsel Jeh Johnson at Yale University, attorney general Eric Holder at Northwestern University, and Obama's top counterterrorism advisor, John Brennan, at the Woodrow Wilson Center. Aspects of the al-Awlaki case, specifically, were communicated through leaks to the media. In 2011 the Awlaki memo was described to Charlie Savage of the New York Times "by people who [had] read it" and in 2013, about the same time that Obama decided to share the memo with two legislative committees, a white paper version stripped of all mention of al-Awlaki was leaked to NBC News. Speaking only through a screen, while under the guise of openness—tempered by matters of national security—maintains a distance, actual and symbolic, between the public and the spaces in which one can be ruled an existential threat to one's own country and marked for death.
Yet, the practice of opaquely communicating through screens begs the question of the function of the open secret in the context of national security. What is the purpose of publicizing secrets? How is belonging communicated in an environment characterized by a fluid and shifting play of transparency and opacity? The answer to the first question has been widely discussed. The executive's management of what is known and unknown acts as a public relations campaign, which prevents citizens from fully grasping the context of violence, a strategy likely to garner popular support for government action. Indeed, many cheered the killing of al-Awlaki. Congressman Peter King called the operation "a tribute" to the administration. John McCain was "glad they did it"; Senate Majority Leader Harry Reid was certain that al-Awlaki deserved to die. More generally, recent Pew Research Center opinion polls indicate that a majority of Americans support the use of both drones and intrusive surveillance measures.
The open secret also functions as a "way of imparting knowledge such that it cannot be claimed and acted on." That is, without having the details through which to scrutinize government action, there is no way to effectively challenge the mechanisms of counterterrorism practice. Once the redacted Awlaki memo was released, legal scholars saw a variety of issues: its application of "public authority justification"—which allows, among other things, fire trucks to speed when traveling to an alarm—to killing an American abroad as unconvincing, particularly in its application to the CIA rather than the military; and its dependence on imminence (which does not require evidence of impending action) noting that there is "a big difference between a government official satisfying themselves and the criminal standard of proof." Certainly, these debates cannot begin without access, but the constant battle over access is also problematic. For political philosopher Jodi Dean, the obsession with revelation is a block to democratic participation, directing debate from pressing issues and toward negotiating the boundary of what is accessible and what is not.
To begin to answer the question of belonging, the structure of the open secret must be positioned within the problematic of the Double, in which us and other occupy shared spaces. Rather than simply an omission, aberration, or lack that hinders democratic society, opacity, particularly in its function in the open secret, produces and "correspond[s] to particular knowledges and circulate[s] as part of particular regimes of truth." In the context at hand, the open secret works to reinforce the blurred boundaries of identification seen in the Double. In the open secret's simultaneous acknowledgment and disavowal, both trust and suspicion are communicated; the open secret informs the citizen and keeps information away from the suspect without explicitly delineating a boundary between the two. Here, rather than plainly distinguishing friend from foe in demographic terms or as occupying distinct spaces, the binary between the two—including the "sanctity of the first term" (i.e., citizen)—is recovered in potentials (suspect/spy) that are distributed among the whole population, however unevenly.
How does one signal one's belonging in a space made tense by suspicions of treason, in a cloud of secrecy marked by drones and death? I argue that those who laugh in the face of precarity communicate their belonging, all the while making no demands and, thus, maintain the structure of the open secret. Three examples provide ample illustration. First, at a budget hearing in 2012, Senator Patrick Leahy pressed attorney general Eric Holder regarding the Awlaki memo:
"I still want to see the Office of Legal Counsel memorandum and I would urge you to keep working on that," Mr. Leahy said to Mr. Holder. "I realize that's a matter of some debate within the administration but...." The senator then paused, smiled and laughed. Mr. Holder responded by nodding and said, chuckling, "That would be true."
Second, during his 2011 speech at Harvard Law School, John Brennan was asked by an audience member plainly, "Does the C.I.A. have a drone program?" As "Mr. Brennan struggled to suppress a smile, he said, 'If the agency did have such a program, I'm sure it would be done with the utmost care, precision...' and the next part was garbled by the laughter of the audience." Third, at the 2010 White House Correspondents' Association Dinner, during President Obama's routine, he quipped, "The Jonas Brothers are here tonight. They're out there somewhere. Sasha and Malia are huge fans. But, boys, don't get any ideas. [Laughter.] I have two words for you—Predator drones. [Laughter.] You will never see it coming. [Laughter.] You think I'm joking. [Laughter.]"
Much derided in Western philosophy, laughter has been theorized as a signal of superiority (Hobbes), as the result of an experience of incongruity, that is, when scenarios do not match our expectations (Kant and Schopenhauer), and as a release of excess energy whether of thought or emotion (Freud). In relation to the open secret, laughter retains a semblance of all of these traits in its multiple functions. The first is, as an act of avoidance, procedural. Laughter allows conversations to continue past what would otherwise be an insurmountable impasse, as in the exchange between Leahy and Holder above. One demands information from another, knowing perfectly well that the other cannot disclose that information (regardless of the fact that its existence is already public). Simultaneously an acknowledgment and disavowal, the laughter between Leahy and Holder signals recognition and provides relief in allowing one (Holder) not to utter knowledge of the secret directly and in allowing the government procedural to continue.
Laughter's second function centers on identification and is inextricably linked to the procedural. French philosopher Henri Bergson posited laughter as a collective phenomenon that requires a certain degree of indifference to the potentially serious implications of a given scenario. In the context of national security, particularly in the examples of Brennan's and Obama's speeches, laughter works to signal one's belonging in a group. If one can laugh with the government, that is, show indifference to another's death without needing to know the details surrounding it, then the joke is, in effect, not on them. (Leahy and Holder's conversation could not proceed without this identification.) Laughter marks them as members of the superior group; by laughing they assert that they are not threatened by their government's secrecy. This is a phenomenon not limited to these three instances in the war on terror. Following the January 2015 attack on the Charlie Hebdo offices in Paris, various pundits and media outlets chastised those who would not republish the magazine's cartoons, calling them traitors. If you cannot laugh with the group, you are not part of it. It is a dichotomous articulation in a milieu marked by a collapse of boundaries, just one way to mark which side one positions oneself on in the clash of civilizations dyad.
Laughter in this context reveals a process of identification in a milieu marked by blurred boundaries between trust and suspicion, transparency and opacity, one in which us and other are distributed potentials. This securitizing laughter is directed at someone, without explicitly expressing who that someone is in demographic terms. While some can choose not to laugh, the ability of others is taken away by the trauma wrought by the Predator's missile. The ability to laugh at the sky, like the spy/suspect dichotomy, is not equally distributed. Mimicking the See/Say Something campaign, explicit articulations are abandoned in favor of more fluid practices that mark some as less deserving. Certainly, al-Awlaki and those tied to the markers that made him other/killable—even as it was his status as Double that marked the urgency of his imminent death—would find it difficult to laugh; or those in the spaces hidden by the pixilation of the drone pilot's screen who experience the taunting sound of the drone and the hellfire that comes after (or those who despite being removed from those spaces identify with those therein). In another case, but one within America's borders, the Newburgh Four similarly illustrates that some are less able to laugh than others.
The "Pathetic Newburgh Four": Poor, Black, and Jailed
For the family of the Newburgh Four, the arrest of the men was no laughing matter. On September 16, 2010, an altercation took place in the Lower Manhattan courthouse where the trial of the four men was being held. It was a Thursday and the final session of that week had just let out. As the jury was being led out a family member or friend of one of the defendants spotted them. The individual began to shout. While the exact exchange was not recorded, it was relayed to Judge Colleen McMahon the following Monday. The individual angrily told the jurors that they should know the difference between terrorism and entrapment. If they could see Newburgh, New York—the town where the men lived—they would understand the difference. The unidentified individual's comment hints at what remains hidden by the Prislam narrative: the other space affected by mass incarceration, the impoverished/depressed city. Positioning the prison within critical reflections on mass incarceration furnishes an alternative reading of the prison in relation to counterterrorism. Far from dismissing the prison as unimportant, I argue that mass incarceration helps to create the potential for counterterrorism operations to "succeed." To be clear, I am arguing that the confluence of prison and terror remains important, but because of the politics of imprisonment rather than the "nature" of (black) prisoners.
Much of the criticism levied against the government's case focused on the informant, the securitizing Double of counterterrorism. The Newburgh sting was not Shahed Hussain's first operation. A native of Pakistan, he fled the country after being held on kidnapping and murder charges—political-motivated charges, he claimed—and only after his father bribed local officials to secure his release. In 1994 he entered the United States on a fake British passport. Settling in Albany, New York, he worked as an interpreter for the Department of Motor Vehicles. While there, he ran a scheme in which he would feed test answers to individuals for whom he was supposed to be translating. He was caught in an FBI sting operation. Facing deportation and a litany of fraud charges, he agreed to work as an informant. His first operation as Maqsood, a wealthy man with ties to Jaish-e-Mohammed, led to the arrest of a local Albany imam. It was an operation that relied on Hussain's work to set up a loan as money laundering for the terror group. For his work, Hussain received a sentence of time served and a letter from the FBI to help him avoid deportation. For the Newburgh sting, he was compensated.
Much like Mahmoud Omar in Chapter 2, Shahed Hussain was not a passive listening post despite framing his job as that of a listener. Early on in the trial, the prosecution admitted that Hussain was "no wallflower," but acted as one might expect a terrorist recruiter to act. Upon cross-examination, he admitted as much:
Q: And you were supposed to be passive, correct?
A: Sometimes, yes ma'am, not always.
Q: Not always. And isn't it true that you were the one who initiated conversations many times about jihad; isn't it true?
A: Yes, ma'am.
In his active role, Hussain regularly initiated conversations about jihad, America, or Jews, often with statements as vile as those made by James Cromitie. For example, he once stated that "to eat under the shadow of a Jew, is like eating your own mother's meat." He also did much more. He was the only link the men had to terrorism. The Newburgh Four were not radicalized on the Internet. There was no indication that the Newburgh Four had regular computer access. The smallest digital tasks seemed to impress Cromitie. When Hussain produced a map of their targets via Google Maps, Cromitie exclaimed, "I'm surprised you even got that. That's what's up. You did that on the computer?!" Hussain also suggested, purchased, and/or procured all of the technologies necessary to carry out the plot: digital cameras, burner phones, stinger missiles, and improvised explosive devices. Again, as with the Fort Dix case, the weapons were intended not merely to frighten a jury and the public, but also to connect the men to global jihad through a shared modus operandi.
Hussain shaped the case significantly through his ability to switch the hidden cameras and microphones to which he was attached on and off as he saw fit. Judge McMahon acknowledged the peculiar consequences of this practice in that "the critical [initial] conversations in which Mr. Cromitie ostensibly came up with the idea to do jihad are conveniently not on any tape or video recording." In fact, these statements were the impetus for moving forward with the sting operation. Hussain also acted as an interpreter of what was on and not on those tapes. If Hussain's account of events as recorded in his handler's handwritten notes did not match surveillance recordings, he dismissed these discrepancies as errors made by his handler. Moreover, in the damning prayer for success, the men failed to verbalize their exhortations of jihad despite Hussain's specific instruction to "say it loud so everyone [read: the hidden microphone] could hear." On the stand he resorted to interpreting their motions, "you just do it in your heart you just don't say it loudly. And this—so Mr. Cromitie did do a dua [prayer] in his heart, and so did I. There are no words said in Dua, loudly sir." To further place Cromitie and company in the narrative of jihad, he asserted that Cromitie's purchase of "two Arabic channels" to get news from overseas was a clear indication that "he vied to be in a terrorist organization..."—his commentary was cut short by an objection from the defense. Hussain could not confirm the purchase, and it was likely another of Cromitie's lies given that he repeatedly displayed a complete ignorance of international terrorist attacks. For example, during a trip to Philadelphia with Maqsood in 2008, it was clear that he had not heard of the then front-page news of attacks in Mumbai, India. To keep Cromitie within the narrative of jihad, Hussain bought a newspaper featuring a story on the attacks and gave it to him; that paper was ultimately entered into evidence. Last, and a point I will deal with in detail below, Hussain regularly doled out money to the men and promised much more after the mission.
The entrapment defense has yet to be successful in a post-9/11 terrorism trial. The Newburgh case, because of the egregious behavior of the informant, was expected to draw a line in the sand for what constituted entrapment in informant-led operations. Despite some controversy surrounding it, the definitive test for entrapment is the "subjective test," which focuses on the predisposition of the defendant, that is, whether or not she would carry out a crime given the chance. The Prislam narrative assumes a general predisposition within the prison population that renders inmates more vulnerable to radicalization. It is a predisposition articulated as a violent tendency, which is itself explicitly tied to the politics of 1960s America. Visible here, among other things, is the deeply racist nature of the anxieties concerning violent radicalization in the Prislam narrative. The history of mass incarceration is, thus, crucial for fully grasping how racialized notions of criminality become enmeshed in the machinations of counterterrorism.
The American prison boom from the 1970s onward is well documented, as is the role of racial anxieties therein—blackness long positioned as threatening to white supremacy and order. Almost half a century ago, conceptualizations of the prison as a place of rehabilitation and reform gave way to notions of incapacitation, docility, deterrence, punishment, and enclosure, hiding from the public society's most dangerous. When the United States declared a war on crime, it was at its outset a response to the push for civil rights and steeped in racialized constructions of criminality and victimhood. Whites were portrayed as victims and blacks as receivers of aid who would nevertheless turn to crime. Furthermore, the simultaneous criminalization of urban space—on account of the concentration of African Americans in the country's inner cities—served to increase the proportion and number of blacks in US prisons. African American men are starkly overrepresented in US prisons, "imprisoned at a rate of 6.4 times greater than white men." For communities of color, mass incarceration brought disenfranchisement, poverty, less access to government aid, and lower education—the hindering of the life chances of an entire population in regard to education, employment, life expectancy, health, and so forth.
Mass incarceration puts into motion "a vicious cycle of imprisonment and want, one that both undergirded and ensured civic distress: mass incarceration increased poverty, increased urban poverty led to even more urban incarceration, and so on." That is, two spaces kept from the public's view—the prison and the depressed city—are mutually constitutive, both forms of invisibility and encasement. One's oscillation between the two presents a cyclical movement that is ensured by stigma and a variety of other constraints. Moreover, the cycle also structures societal expectations of predisposition. The movements internal to the mass incarceration phenomenon describe well the life experiences of the Newburgh Four. All four men moved between jail and the impoverished town of Newburgh, New York. James Cromitie, for example, had been in and out of prison since his early teens. In that time he amassed a record of twenty-seven arrests and a total of twelve years served. All four were largely undereducated, held low-paying jobs, and had little access to government aid. The latter point is perhaps most evident in the case of Laguerre Payen, who is schizophrenic. When authorities raided his apartment, they did not find jihadist propaganda or bomb-making manuals. Rather, they found jars of urine; due to his psychological state he had been too afraid to use the shared bathroom at the end of the hall in his building. Just how closely these men's lives are tied to the prison system was poignantly illustrated by the fact that, as the story unfolded, Cromitie's own family could not confirm his religious affiliation. Journalists and police were left to rely on his prison records.
When prosecutors, the media, and politicians invoke Prislam, whether explicitly or implicitly, they invoke the specter of black criminality. The failure of the entrapment defense depends on not only the fear generated by "terrorism" but also that engendered in the racialized stigma of criminality and its accompanying expectations of predisposition (further accompanied by the "fantasy of connectivity"). Here, sociologist Bruce Western's assertion, that "the self-sustaining character of mass imprisonment as an engine of social inequality" ensures that "the penal system will remain as it has become, a significant feature on the new landscape of American poverty and race relations," can be extended to the realm of counterterrorism. It is Hussain's exploitation of systemic inequality that illustrates the American quality of jihad, albeit in a much different way than is presented in the body of al-Awlaki. Just how Hussain operated illustrates how counterterrorism can function through and exacerbate experiences of second-class citizenship.
Hussain's largest task was to establish a relationship first with Cromitie and then with the other men. He did this through exploiting their poverty, developing a relationship of financial dependence. Hussain, as Maqsood, stood out when he arrived at the Newburgh mosque. Rolling up in a variety of luxury cars and dressed in designer clothes, he ostentatiously displayed his apparent wealth. Hussain explained on the stand that posing as a rich man was a necessity so that others would want to talk to him. Hussain and Cromitie met only months after the informant began visiting the mosque, but when Cromitie first spotted him, he was instantly attracted to his wealth. Cromitie introduced himself as Abdul Rahman and commented on Hussain's sandals, which he claimed to recognize as being Afghani because his father was from there. Another of Cromitie's many lies, here his outlandish statements more clearly resemble the attempts of a man trying to ingratiate himself with a wealthy acquaintance. That day, Hussain bought Cromitie a drink. As their relationship continued Hussain paid for every meal, and later, when Cromitie asked, he readily provided money for groceries and Cromitie's $180 monthly rent. Hussain reassured Cromitie, "If you need anything, just call me. If you need money, you come to me. If you need money, I can give you money, you know."
Hussain was not merely a source of petty cash. Rather, he held the promise of a better life for each man. He offered Cromitie a quarter million dollars and a barbershop, playing on the one skill Cromitie had picked up in prison and his only potential way out of the cycle of imprisonment and want in which he was stuck. David Williams was promised enough money to pay for his brother's liver transplant—a fact the prosecution sought, but failed, to have ruled as "irrelevant and prejudicial." Both Onta Williams and a penniless Payen were offered ten thousand dollars.
Here, a different picture of the four men emerges, one in stark contrast to that of a quartet who found in jihad an outlet to satisfy their bloodlust. As Paul Harris of the Guardian wrote, "none of the four men fit the usual profile of a terrorist-in-waiting, let alone an active militant. But they did fit the profile of desperate men who would do anything for money." Here, Cromitie's boastings about his nonexistent violent past and questionable extremist beliefs could be understood as a ploy through which to make him seem credible to Hussain, thus keeping the latter's wallet open. David Williams wrote from prison that "every time James lied to him [Hussain], or said something anti-American or whatever, the informant would give him money. Cromitie knew what the informant wanted to hear and gave it to him so he could get that money." Cromitie's lawyer put it more plainly; he was "singing for his supper." According to Williams the men had intended to con Hussain, taking his money without carrying out any attack.
There is certainly evidence to support the notion that the Cromitie and company were only interested in Hussain's money. For instance, Cromitie baulked at Hussain's requests for months, failing to produce a target, plan, or team. "Well maybe it's not my mission then, maybe my mission hasn't come yet," he once told Hussain. Cromitie's dedication to money rather than martyrdom was starkly displayed in actions large and small. He took the camera Hussain had bought for reconnaissance and sold it for fifty dollars, telling Hussain that it had broken. Also, in the thousands of phone conversations taped by the FBI, not once does Cromitie say anything anti-Semitic or anti-American, except when he is speaking to Hussain. In the lead-up to the night of the plot, a recorded phone call between Cromitie and David Williams reveals that neither mentions jihad, only money.
When Cromitie was not in need he actively avoided Hussain. On February 25, 2009, Hussain was supposed to pick up Cromitie so that they could begin planning (at this point, there had already been several false starts). Cromitie's lawyer narrated what happened next in court:
Now, something very, very remarkable happens at this point of the movie, ladies and gentleman.... Cromitie drops out of sight completely.... When Hussain shows up the next day at 3:00, James is not home. Or at least he pretends not to be home.... And from outside of James' house, Hussain calls James. And James says, well, he is somewhere, but he is not in Newburgh. James says, "I'll call you back at 6:00." At 6:00, Hussain shows up at the house again... Cromitie is not there.
Cromitie eventually told Hussain that he was leaving to work in North Carolina. The FBI knew this to be a lie because agents were monitoring his home and phone. Cromitie deleted voicemail after voicemail, up until April 5, 2009, the day Cromitie reestablished contact. He had lost his minimum-wage job at Walmart and was more desperate than ever. Angered at being abandoned—which he reiterated on the witness stand—Hussain relayed to Cromitie that the repeated delays had endangered Hussain's life, insinuating that Jaish-e-Mohammed threatened to behead him. Regardless of whether Cromitie believed that this also meant that his own life was in jeopardy or that his cash flow was at risk, it was only after this warning that a plot began to take shape. Even after this, Cromitie stalled, failing to "arm" the bombs when the men were in Riverdale, forcing Hussain to do it.
While Hussain regularly treated the men to food and gifts, he introduced money into the plot itself only after months of working on Cromitie without any movement. This opened up the operation to charges of entrapment, however mitigated by the stigma of racialized criminality. Hussain was providing an incentive for someone to commit a crime he would otherwise not have. In order to minimize this risk, the informant worked to entangle money and jihad in such a way as to make them inseparable. He referred to the promised sums as "jihad money," repeatedly telling the men that they would be rewarded in two ways: monetarily in this life and with paradise in the next. When pushed about it on the stand he reiterated:
Q: Now again, jihad money is the same as like regular money in terms of how you might be able to spend it, correct?
A: On the spending purposes, the meaning purpose is very different.
Thus, connecting to global jihad is conceived as a free choice to buy in, regardless of one's social position. For the prosecution there was no consequential difference between accepting money and taking up jihad.
In addition to this characterization, Hussain played down the significance of the money in a variety of ways. First, he claimed that the $250,000 he promised Cromitie was code. The men, at Hussain's insistence, kept a list of code words for weapons and targets. "$250,000" was not on that list. In fact Hussain admitted that he never told Cromitie explicitly that it was code; Hussain simply "thought he would understand." Second, Hussain liked to say something that Cromitie would regularly regurgitate back at him: that the group was acting "for the cause, not just because." Heard throughout the recordings, Hussain repeated ad nauseam that the mission is "not about the money." When Cromitie told Hussain that the others "will do it for the money.... they're not even thinking about the cause," he sharply protested. In an exchange on April 23, 2009, when David Williams IV joined the conversation, Hussain told him, "This is not anything to do with money. This has everything to do with Allah." Williams replied, "Right. But they giving us money anyway." Hussain's repeated insistence, the defense argued at trial, was a clear sign that the men's involvement was entirely the result of the money offered rather than jihad. In perhaps his most unnerving moment on the stand, Hussain retorted:
I have to—in radicalism, in radicalism, money is the last thing anybody could think about. It's all about religion. About the cause. And if somebody—the Agent, Fuller, wanted to know, was they are going to do it for the money, or for the greed, or for the cause. So I have to remind them, every time I met them, are you going to do it for the cause. If it is for the money, we don't want to do it. And I had to keep reminding them, keep reminding them, is it for the cause, or is it for the money. Because the question was Agent Fuller wanted to find out if they—if the mission, or the terrorist attacks, or bombings were done because they wanted to do a prank because of the greed or for the cause. And he wanted to find out. And that's why I was reminding them all the time.
Hussain's strained entanglement of money and jihad is analogous to that of counterterrorism and racialized structures of policing in the United States. During an appeal hearing, the prosecution continued to insist, "Money didn't matter to these guys," to which Judge McMahon quickly replied, "Really? It was painfully obvious that the reason they did it was for the money." Yet, at their sentencing Judge McMahon called the men "thugs for hire," invoking a well-worn trope used to criminalize black men. Her remarks illustrate the self-sustaining nature of mass incarceration: "I imagine that you will be far from here, and quite isolated.... I doubt that you will receive any training or rehabilitative treatment of any sort. Your crimes were terrible. Your punishment will indeed be severe. 25 years in the sort of conditions I anticipate you are facing is easily the equivalent of life in other conditions." Placed atop existing structures of policing and imprisonment, counterterrorism here oils the cogs of mass incarceration and vice versa. The success, in the Newburgh case, is starkly dependent on the spaces of imprisonment and want that are kept out of the sight of the public. This is what the unidentified family member meant when she implored the jury to see Newburgh. It is only in contextualizing this case against the backdrop of mass incarceration that the American flavor of (counter)jihad comes to the fore. It is only by seeing Newburgh that we can fully grasp the ways in which counterterrorism practice exacerbates already-existing second-class experiences of citizenship.
At his sentencing, Cromitie averred that "I've never been a terrorist and I never will be a terrorist." Similarly, David Williams IV wrote from jail, "Evidence-wise, we had them beat.... We got convicted on feelings. They [the prosecutors] started talking about 9/11, and James was saying a lot of stuff that was ill and real stupid, and we got convicted on that. Once you put 'terrorist' in front of anything, it's like being charged with rape or child molestation. Once a jury hears that you're accused of a certain type of crime, you're already guilty." Certainly, Williams is correct that terrorism and the fear it induces perhaps overdetermines how one is seen by a jury of one's peers. But this is not mutually exclusive from the racialized notions of predisposition that decades of mass incarceration have wrought.
Citizenship in an Age of Terror
The war on terror, as the popular narrative goes, began on American soil on September 11, 2001 (even if its beginnings can be traced back decades). The advent of homegrown terrorism marks its uncanny return home, with the adversary communicated as possessing unmistakably American traits—whether al-Awlaki's accent and cultural know-how or the Newburgh Four's entanglement within America's penal system. In the aftermath of 9/11 Americans were called on to support the exportation of violence abroad, and a year later New York's MTA introduced the slogan "If You See Something, Say Something." This call to stand guard has increasingly, with the gaining focus on homegrown terrorism, shifted to the everyday. The latest DHS campaign under the banner of See/Say Something, "Protect Your Everyday," features a firefighter, a teacher, a farmer, a barber, a student, a waitress, and a mom. Together, as a multicultural representational slice of America, they playfully muse about the innocuous unforeseen events that occur every day (e.g., flat tires, traffic delays, etc.). But, they turn stern and warn:
It's when you experience a moment of uncertainty.
Something you know shouldn't be there.
Or someone's behavior that doesn't seem quite right.
These are the moments to take a pause.
Because if something doesn't feel right, it's probably not.
The video, which reassures the viewer that it is not about paranoia or fear, but about responsibility, never illustrates this moment of uncertainty; all of the citizens go about their everyday without having to operationalize their responsibility.
As I discussed above, this campaign also buttresses the necessity of government intervention. And recent years have seen initiatives aimed directly at the status of citizenship. In 2011, Senators Joe Lieberman (I-CT) and Scott Brown (R-MA) and Representatives Charlie Dent (R-PA) and Jason Altmire (D-PA) introduced the Enemy Expatriation Act. The act was about a page and sought to amend section 349 of the Immigration and Nationality Act, adding one way in which an American could lose her citizenship: "engaging in, or purposefully and materially supporting, hostilities against the United States" (therein, "hostilities" were defined as "any conflict subject to the laws of war"). Thought to be overly broad and unconstitutional, HR3166/S1698 died; but not for long. While this was seemingly a one-off effort, the potential of Americans traveling to Syria to fight alongside ISIS reinvigorated citizenship-stripping initiatives.
Charles Dent reintroduced the same bill (HR545) on January 27, 2015, which again failed. In December of that year, not to be discouraged, Dent resubmitted the act (HR4186) with an important change. The added actions for which one could lose one's citizenship included "traveling abroad to join, participate in, train with, fight for, conspire with, or otherwise support a foreign terrorist organization designated by the Secretary of State under section 219." At the time of writing, it has been referred to the Committee on the Judiciary for further consideration. This is one of several related efforts. In September 2014, Texas Representative Ted Poe introduced a bill that would revoke the passport of any American for the same reasons (word for word) as Dent's restructured Enemy Expatriation Act. Poe's bill (HR5406) also died, and he also resubmitted twice more (as HR237), in January and July 2015. It passed in the House in a voice vote (no tally was taken) and has moved to the Senate. It allows one to ask for due process, but allows reports to be submitted in classified form.
In January 2015 Representative Steve King of Iowa and Senator Ted Cruz submitted a bill titled the Expatriate Terrorist Act, which in essence combines the Enemy Expatriation Act and the efforts to revoke passports. The approach is broader. Rather than simply tacking on another action by which an American can lose her citizenship at the end of the list found in section 349 of the Immigration and Nationality Act, they not only position the added stipulation in the middle of the list, but aim to add "foreign terrorist organization" to each action listed, such as swearing allegiance to an adversary of the United States. In effect, an American can relinquish his citizenship by "taking oath or making an affirmation or other formal declaration of allegiance to a foreign state," and the bill seeks to extend this to those who have joined ISIS and burned their passports (evidenced by YouTube videos). While one can hardly doubt their intentions, institutionalizing this move grants ISIS a status once reserved for other sovereign states and one that the group is perhaps best denied.
While the proposed bills are unlikely to become law, their recurrence illustrates the anxieties brought about by an adversary in which Americans recognize something of themselves and the spatial collapse of global conflict; this is both a constitutive anxiety and a strategic way of communicating threat to facilitate particular counterterrorism practices. However, what the al-Awlaki and Newburgh Four cases illustrate is the multiple ways in which belonging and citizenship are tied up in counterterrorism. The open secret manages what is known and unknown, producing peculiar ways of voicing one's belonging: through laughter, but a laughter always aimed at someone. The informant's exploitation of systemic inequalities similarly marks that there are those who cannot laugh in the face of death by counterterrorism—in the Foucauldian sense that includes social death (i.e., life imprisonment). Short of the explicit stripping of one's passport, the Double facilitates a plethora of practices that make citizenship precarious. Indeed, the Double positions the citizen as simultaneously suspect and spy, injecting a general sense of precarity into citizenship in the service of counterterrorism. But in counterterrorism's American spaces, its interaction with institutional configurations—secrecy and mass incarceration—the uneven distribution of this dual position is reinforced. Just as the Double as enemy has many manifestations, so too does the effect of positing the citizen as suspect/spy, effects that differ based on one's social position and identity. Some cannot laugh at the use of a hellfire missile to kill an American without charge or due process. Others, rather than being more prone to radicalization as the Prislam narrative assumes, are more susceptible to the consequences of, and targeted by, informant-led operations. All of these effects are the result of counterterrorism's intermingling with American institutional configurations, a relation that deeply affects the shapes of the Double in popular and official discourse.
Figure 7. Rolling Stone, August 1, 2013.
No Exit
The Double is not a singular phenomenon. It accommodates ever-shifting configurations of difference and likeness; the push-and-pull modality it embodies is both anxiety and remedy. It is a threat that might look, act, or talk "like us" in a variety of registers. And surely, if one scrolls through the profiles of homegrown terrorists (even when limited to those who have been identified and self-identify as jihadists), represented are a variety of faces and histories. Yet, invocations of likeness, much like those of difference, are never self-evident. They are strategic and facilitate particular practices of security. Throughout this book, I have examined the ways and to what effect similarity is injected into how threat is discussed in the context of homegrown terrorism, and what it reveals about identity, media, and belonging in the contemporary United States.
The various manifestations of the Double—along with its temporality and spatiality, embroiled with identity constructs and media technologies—that have been the subject of the book lead back to the case with which the book began. The Boston Marathon bombing could be described as the most striking case of the discourse of the Double. It involves a look-alike, a doppelgänger so apparently familiar (and attractive) that it was thought to have elicited empathy, the most shocking of emotions in the context of terror (though largely dismissed in sexist language, the result of the "more primal and less pretty [impulses] in the female psyche" and diagnosed as "hybristophilia"). I purposefully left this case to the conclusion not because it is the most recent chronologically, but for two reasons that structure this conclusion. First, it brings us back to the origin myth of the Double, the Tale of the Two Brothers, and helps to summarize many of the phenomena examined throughout this book: identity, media technologies, and belonging in the context of homegrown terrorism. But its usefulness in this sense depends on not naturalizing the claim that the terrorist threat is "like us." Tsarnaev could surely be said to look the part, but in outlining the discourse of the Double in its historical development across a variety of cases, these claims vis-à-vis Tsarnaev can hardly be said to be spontaneous. That is, neither the bombing itself nor the appearance of "Jahar" on the cover of a popular magazine were catalysts of a discourse in which terrorists are made sense of through narratives of likeness and familiarity. Placing the case one might deem "most obvious" at the end not only acts as a crescendo but has allowed me to develop a theory of the Double in a way that does not rely on seemingly self-evident notions of likeness that only reinforce problematic identity constructs. To be clear, denaturalizing likeness does not in turn depend on essentialist notions of difference. Instead, I have been aiming to illustrate how invocations of likeness, which are part and parcel of contemporary US security discourse, are as much the result of a complex process as are the enemy images that pivot on reductive articulations of difference. Even the most familiar can be made other. Those, like al-Awlaki, that were readily made other were also depicted to be "like us." And, it is at this intersection, the work of making familiar and making other, where I locate the second reason for ending with this case. To address a question that moves throughout the book: is the image of the Double an enemy image?
The Brothers Tsarnaev
Throughout the book I have argued that the figure of the Double represents both the anxieties surrounding homegrown terrorism as well as the securitization that comes with them; it demarcates a plane of security in which boundaries of identification are pushed and pulled. Much like in other cases, the revelation that a friend committed an act so violent as to be called terrorism was met with disbelief, shock, and terror: "I can't feel that my friend, the Jahar I knew, is a terrorist.... That Jahar isn't, to me," relayed one of his closest friends. In their lament is the idea that the bomber was someone else, a Hyde to their Jekyll, a shadow they never saw. Even his older brother, Tamerlan, who was more readily made other in media reports—via his accent, conservatism, and open faith—"seemed so nice." The reaction to the Boston Marathon bombing illustrates well the anxieties surrounding the Double. How is one to tell apart a good-looking popular kid who had been excited about gaining American citizenship and the one who scribbled "Fuck America" in his own blood as he lay dying during his run from police? Or, to paraphrase his former wrestling coach, how is one to separate the good kid from the monster? Fyodor Dostoyevsky's The Double, in which a lowly civil servant meets his copy, one that has all of the qualities that he lacks, illustrates the conundrum well: "If the two of them had been placed next to each other, no one, absolutely no one, would have been able to say who was the real Mr. Golyadkin and who the imitation, who the old and who the new, who the original and who the copy." In the novel, Dostoyevsky provides only suffixes (Sr. and Jr.) and they retain the same name. Similarly, the Jahar his friend knew and the one staring back at America on newsstands cannot be adequately separated. The enemy cannot be named, placed, or identified. But, as I have shown throughout the book, this is a formulation of threat that security works with rather than simply against. Blurred boundaries underwrite the placement of novel spaces in the purview of counterterrorism, the use of informants, and mass surveillance.
In response to the controversy spurned by the placement of Dzhokhar Tsarnaev on its cover, in a pose and light many found too glamorous, Rolling Stone enlisted Matt Taibbi to explain it to the American public. Taibbi, a Bostonian, positioned the cover and its accompanying story, Janet Reitman's "Jahar's World," as an effort to understand contemporary terrorism:
The jarringly non-threatening image of Tsarnaev is exactly the point of the whole story. If any of those who are up in arms about this cover had read Janet's piece, they would see that the lesson of this story is that there are no warning signs for terrorism, that even nice, polite, sweet-looking young kids can end up packing pressure-cookers full of shrapnel and tossing them into crowds of strangers. Thus the cover picture is not intended to glamorize Tsarnaev. Just the opposite, I believe it's supposed to frighten. It's Tsarnaev's very normalcy and niceness that is the most monstrous and terrifying thing about him.
Here, despite the insinuation that the cover and story challenged dominant notions concerning terrorism, Taibbi is echoing the sentiments of attorney general Eric Holder and Janet Napolitano in their assertions that the homegrown terrorist lacks a typical profile. While there is certainly some value in stories that provide details of an individual's history in cases of violence, here the intention remains to frighten. Here, the invocations of likeness only reinforce the now commonplace security discourses that I have examined in this book.
Beyond the general contours of the anxieties and strategies of security the Double embodies, the Tsarnaev case also showcases its other aspects: the ways in which identity constructs and media technologies are implicated in structuring the Double; and the repercussions of this discourse and its practices for notions of belonging. The brothers Tsarnaev illustrate well the ways that identity constructs, both individual and collective, are invoked in the context of homegrown terrorism. Individual Americans (and residents) are positioned as suspect and susceptible. The Double often manifests in a psychological split and has long been associated with conditions such as schizophrenia; Dostoyevsky's tale is often interpreted in this way. For example, in the cases of Wade Michael Page and Nidal Malik Hasan, the mental states of both men were discussed at length; the potential of depression and a form of transferred PTSD, respectively. Of course, these had different inflections and were connected to other constructs in various degrees. Nevertheless, the psychological state of the brothers was also the subject of intense speculation. Tamerlan Tsarnaev, it was reported, confided in his mother that he felt there were "two people living in him," and reports framed his transformation into a killer as one that involved an increasingly aggressive "internal rambling that only he could hear," one that eventually began to issue orders. Even as Dzhokhar's pressures and stresses were more explicitly connected to familial strife in media reports, he was said to have experienced "terrifying nightmares about murder and destruction."
The mental state of each brother was connected to crises of social and collective identity. Media accounts stressed that the brothers struggled to "define themselves or where they belonged" and that their actions were potentially driven by a desire to resolve these tensions. Much like with Hasan and al-Awlaki, the duo's "roots" became a subject of interest. The brothers were described as "reared by both Chechnya and America." The former was thought to be stronger in Tamerlan, who emigrated at a later age and never shed his accent. Moreover, his lack of American friends and white wife who converted and wore the hijab (at his behest, it was said) were taken as signs that he never truly assimilated. Yet, as a boxer with aspirations to represent the United States in the Olympics, his friends called him "Tim." A rule change in the US Tournament of Champions (an Olympic qualifying event) disqualified permanent residents from competition, effectively ending his boxing career. For Tamerlan, this experience, among others, reduced his green card to a reminder "[that he was] not really an American." His crisis of belonging was only further compounded during a 2012 trip to Dagestan (a republic within Russia, neighboring Chechnya). There, having grown a beard and given up drinking, Tamerlan showed up to prayer at a mosque known to be frequented by radicals. He greased his hair with olive oil and lined his eyes with dark makeup, "apparently in an effort to copy contemporary jihadist fashion," only to be chided as "too American."
Described as attractive, happy, and charismatic, Dzhokhar was thought the better adjusted (read: assimilated) of the two, even tweeting his excitement at becoming a US citizen. Initially, it was thought that this pot-smoking popular kid who used his barbed wit to talk himself out of many precarious situations must have been brainwashed by his older brother. However, the more reporters and officials dug into the younger brother's life, the more the elder's influence was placed in doubt: "Up to his arrest, he drank and smoked marijuana—more marijuana than most high school or college students, friends said—despite... Tamerlan's clear disapproval." Dzhokhar's story in the media became one of displacement and alienation. His parents divorced in 2011, with both eventually moving to Russia; his friends were going off to different colleges and he would eventually be on the verge of flunking out. The younger Tsarnaev's tie to his "roots" was described as more purposeful and reactionary. Feeling more isolated, he began to exert a strong interest in Chechnya despite never having lived there. He contacted an expert on the region, University of Massachusetts–Dartmouth Islamic studies professor Brian Glyn Williams, who agreed to help Dzhokhar in his genealogical pursuit. Williams was struck by "how little he actually knew.... He didn't know anything about Chechnya, and he wanted to know everything." Thus, while Tamerlan was framed as never shedding his roots, Dzhokhar was thought to have actively sought them out, revealing a "deeply fractured" teenager.
As a threat that cannot be adequately named, the Double circulates. I have shown how connectivity is conceptualized in security discourses, positioning citizens as suspect and susceptible. More problematic, security officials operationally exploit connectivity vis-à-vis conspiracy charges in and through the informant to implicate, entrap, and convict Americans. Connectivity and social media were central in making sense of the transformation of the Tsarnaevs. One official commented, "I would not be surprised if they [the Tsarnaevs] had another life over social media." Tamerlan maintained a YouTube channel he created after returning to the United States from his 2012 trip to Dagestan. Therein, he had two videos listed under "terrorism." He also followed an obscure Russian jihadist, Gadzhimurad Dolgatov, online. Dzhokhar's online activity was stressed as one indicating a cultural as well as psychological shift. He "abandoned his American Facebook for the Russian version Vkontakte," wrote Reitman in her Rolling Stone profile. Dzhokhar also maintained two separate Twitter accounts. One broadcast the slacker image that his friends knew. The other showed a wannabe jihadist. The maintenance of these dual identities was the work of a teenager the New York Times called a "master of concealment."
The brothers also downloaded jihadist propaganda particularly, the sermons of Anwar al-Awlaki, who has been linked to a dozen incidents both before and after his death in 2011. Most consequentially, the brothers apparently fashioned their bombs from instructions found in al-Qaeda's Inspire. In fact, if one closely examines the New America Foundation's statistics on homegrown jihadist incidents, the Boston Marathon bombing is the only case in which individuals successfully constructed an improvised explosive device through the utilization of Internet materials alone, that is, without any hands-on training or guidance. Based on interviews with explosive experts, Michael Kenney argues that online manuals, while providing abstract technical knowledge (techne), cannot provide the necessary mētis or situational knowledge necessary to handle the volatile mixtures needed to build a bomb. In short, someone trying to construct a bomb from just an online manual is likely to hurt or kill himself before he can harm anyone else. Indeed, parsing through New America's data, one notices that in more than half of the jihadist plots that involve explosives, those explosives are fake and provided by paid government informants (much like the Fort Dix and Newburgh plots). The others have all traveled abroad to receive training, have failed to successfully construct an explosive, or have been caught in the process of acquiring the necessary components. The deadliest homegrown terrorist jihadists (as well as "non-jihadists," to use New America's dichotomy) involve profoundly American weapons, access to which is constitutionally protected. The Boston Marathon bombing seems to be the one exception, though doubts remain due to the sophistication of the devices and their well-timed execution (which has also fueled conspiracy theories about Dzhokhar's innocence). Upon further examination, there was no evidence of testing found in Tamerlan's apartment. For example, there was no circuit tester that experts deem necessary in ensuring that the components will work.
However, it was not only the brothers' travel to and virtual projection into foreign spaces that accounted for their transformation. Models of radicalization were deployed in understanding the Tsarnaevs. Tom Neer of the Soufan Group—a counterterrorism think tank—was quoted in Reitman's piece:
There is no single precipitating event or stressor.... Instead, what you see with most of these people [i.e., homegrown terrorists] is a gradual process of feeling alienated or listless or not connected. But what they all have in common is a whole constellation of things that aren't working right.
This constellation includes innumerable experiences, any of which can act as triggers (economic hardship, experiences of prejudice, psychological issues, familial pressure, etc.). In Neer's comments the connectivity that is epistemologically inseparable from the Double manifests itself in disconnection on a personal and local level, repeating a well-worn anxiety concerning connectivity and alienation. Indeed, blame was spread out: their turbulent home life; the women in their lives, particularly their mother; a mysterious uncle named Misha; their Chechen heritage; social media; Tamerlan's battered brain (a result of his boxing career) and chronic unemployment; their faith; and failed attempts at realizing the American dream.
Some commentators mused that, despite their consumption of jihadist literature, the story of the brothers Tsarnaev "in the end... is not a story about Chechnya or radical Islam or the insurgency in the North Caucasus" but also about something fundamentally American. That is, radicalization is not equivalent to unidirectional infiltration. For example, Tamerlan's descent into conspiracy theories was not only the stuff of jihadist chatrooms. His fascination with 9/11 "truther" conspiracies was equally fueled through American sources, such as Alex Jones's Infowars and the film Zeitgeist. Moreover, his failures (in providing for his family) that were thought to weigh heavily on him were explained not simply by his Chechen roots and traditions but also by the difficulties and systemic barriers for immigrants in achieving the American dream. Last, it was reported that Tamerlan had been questioned by federal agents—the defense suggesting that he had been asked to be an informant, though they were unable to obtain corroborating evidence—suggesting the role played by counterterrorism in fomenting the animosity it is charged with preventing; the "auto-immunological" dimensions of counterterrorism.
The Tsarnaev case also illustrates the repercussions of the Double for thinking through citizenship and belonging. I have highlighted both exceptional and administrative ways in which terrorism has been dealt with in (and through the suspension of) the law. Neither approach, as I have shown, is without its implications for notions of belonging and experiences of citizenship. Which approach is more appropriate or effective remains a point of debate among America's political elite. For example, former US ambassador to the United Nations John Bolton criticized the Obama administration over what he refers to as the "criminal-law paradigm" in fighting terrorism, claiming that it signals defeat in the war on terror. Supporting this line of thinking, some (including Senator Lindsey Graham) called for Dzhokhar Tsarnaev to be labeled an "unlawful enemy combatant"—similar to the labeling of al-Awlaki as a "specially designated global terrorist"—and denied Miranda rights. Others called for him to be processed through the criminal justice system. Dzhokhar was read his Miranda rights, pled "not guilty," was tried, and was found guilty. He has been sentenced to death.
It is not only those who are directly charged with terrorism whose allegiance is questioned and, thus, their place within the collective made more precarious. In a strategic environment marked by the open secret and in which citizens are positioned, however unequally, as suspect and spy, there is no bounded positionality that saves one from suspicion; there is, as the French collective Tiqqun states, "only proof." What is the "If You See Something, Say Something" campaign if not a demand for citizens to prove their allegiance, even as the campaign suggests the impossibility of "seeing" clearly. Burdens of proof, much like the dual suspect/spy position, are not equally distributed, and the fallout of the Boston Marathon bombing provides an incisive example of the various inflections of this inequality. After the Boston Marathon bombing, news outlets asked what Katherine Russell, Tamerlan's widow, knew about the plot. How had she failed to notice her husband's planning and plotting? At best, a case of a citizen asleep at her post, or worse, a sign that she was involved. In either case, her burden of proof was built upon normative gender constructs of the "good wife." "I don't know how she could not have known. I know when my husband farts in the basement," one Huffington Post reader wrote. This statement captures precisely the extent of the detail citizens are expected to notice as well as the extent of their expected vigilance—those affects and intuitions one can access only through close contact and that might escape digital surveillance. Inadequately fulfilling her duty, Russell failed to provide proof that she was "still one of us." I include "still" because her burden of proof was undoubtedly compounded by her conversion and religious dress.
The Boston Marathon bombing illustrates well the relationship between identity, media, and belonging with which this book is concerned. Various identity constructs are communicated in and through media, at times delineated, at times confused, overlapping, or superimposed onto one another. The loss of boundaries of identification is simultaneously positioned as affected and/or structured by media. This phenomenon, however, is not simply fought against. That is, counterterrorism is not simply concerned with reestablishing clear boundaries, but works in and through the relations embodied in the Double. Subsequently, these efforts produce novel articulations of belonging and reinforce and exploit already existing unequal experiences of citizenship. This book is as much about counterterrorism as it is about homegrown terrorism. The increasing articulations of homegrown terrorists as "like us" or "once a regular guy" are not simply a reflection of the inability to identify the enemy in contemporary distributed conflict. Rather, they are strategic invocations. Likeness on the plane of identification is as much a work of construction as difference. It is at this juncture, at the intersection of constructions of difference and likeness that I return to a question that permeates the entire book. That of whether or not the Double constitutes an enemy image.
The Terrorist Has Been Absorbed
Is the Double an enemy image? In considering the question I take my cue from a piece written in perhaps the most unlikely of sources, the New York Times Style Magazine (the September 15, 2013, Men's Fashion edition). In his piece, "Let Us Now Praise Infamous Men," American writer Joshua Ferris bemoans the "impoverishment of the image." He argues that the new media environment, marked by the democratization of communication and info-glut, severs the once uncontested link between the hero and the icon. As a result, the "heroic male icon" that inspired, defined, and unified a nation is lost (his gendering of the hero construct is not inconsequential, part and parcel of the nostalgic and conservative tone of his article). The apotheosis of the contemporary crisis of American identity—as reflected in the continuing war on terror (if by another name), economic hardship, the feared death of the American dream, an ineffective Congress, etc.—he argues is found "on the cover of the Rolling Stone," as the old song goes. The figure of the terrorist, Ferris contends, which had remained outside of mass culture since the latter's dawn, is now a fixture in the popular American imagination. The placement of Tsarnaev's visage within a space of cultural affirmation, "the terrorist as icon," can mean only one thing: "the terrorist has been absorbed."
The writer's contentions could be dismissed as naïve and ahistorical, ignoring the magazine's tradition of investigative journalism as well as the other controversial figures that have been featured on its cover (e.g., Charles Manson). Nevertheless, he was not alone in his critique, and it provides the base from which to understand what kind of image the Double generates. If the Double marks the loss of the icon, what does this mean for the enemy image? A good point from which to build is precisely the loss of the identifiable enemy. As the minutes after 9/11—if one wagers to mark its end—turned into hours, days, and weeks, George W. Bush sang a number of variations on a theme that would come to characterize contemporary enmity (or its loss): "you are either with us or against us in the war on terror." At times he altered the wording of the second half of the pairing to "with the terrorists." In any event, in his statements there is no "them," either literally ("against us") or at least in any legitimate sense ("with the terrorists"). Jacques Derrida posited, in his immediate thoughts on the attacks, that Bush's inability to identify the enemy against which he declared war indeed marked the dissolution of the political enemy in the Schmittean sense—indeed what I have been referring to in this book as an enemy, would be a "foe" for Schmitt. Already in the wake of the Cold War (and its spectral rebirth) Derrida argued that the disappearance of the identifiable enemy, because of its constitutive role in defining "us," indeed implies the loss of the friend. But the Schmittean enemy is the political structuring enemy, and its loss, as Žižek reminds us, has simultaneously reinvigorated the binary logic of the enemy image. The enemy and the enemy image are certainly connected but belong to different registers. For Carlo Galli, the resurgence, if not intensification, of what he calls hyper-representations of enemy others is a symptom of "Global War," a futile attempt to remake boundless conflict in an obsolete mold. However, Tsarnaev's image and the instances of doubling examined throughout this book more generally do not fit this template. Rather, the Double marks the superimposition of the loss of political boundaries onto the plane of representation.
If the political enemy depends on clear political/state borders, by analogy an enemy image requires similar boundaries but on the level of representation be they racial, religious, classed, and so on. In the Double these binaries are blurred. This suggests that the loss of the icon and the disappearance of the enemy image are one and the same. The Double is, thus, clearly not an enemy image. Rather, it is better to think about the Double as an attempt to narrativize and visualize threat (one that is always-already veiled), a risk beyond the calculable, distinct from the enemy and enemy image; it is not simply the representation of Calli's "phantom enemy" (the most uncanny and absolute of enemies because it marks the indistinction between friend and enemy) but the injection of its (lack of) structure into practices of representation through marking difference, likeness, and their conflation. As such, the function of the Double image is not that of the enemy image; it is, in effect, the enemy image's negative inverse or its double exposure. It disrupts rather than unifies, lurks rather than looms. Threat is more dispersed than the enemy, fundamentally circulating, non-present, and beyond the measure of risk. While radicalization models posit a slew of possible triggers and factors, these are not subject to measurement in the same way as other risks (e.g., carbon emission levels for global warming). Rather, they are intended to open up spaces for surveillance (by government, by neighbor, by self). I will return to this functionality of the Double below, but at this juncture I want to detour into a cautionary point. The Double may not be an enemy image, but this claim is not intended to imply that the enemy image is lost in any absolute sense.
Hyper-representations of the (lost) enemy continue to populate official and cultural discourses concerning terrorism. Invocations of this binary enemy image surface throughout this book, and in some instances it is invoked as a haunting, a shadow cast over others that do not fit the profile. This is evident in the debate concerning Tsarnaev. In his defense of Rolling Stone, Matt Taibbi juxtaposes the Tsarnaev image to those of bin Laden on the covers of Time and Newsweek. In the latter, bin Laden's eyes are painted over with a streak of white, accompanied by the headline "Mission Accomplished" and an ominous subtitle, "But are we any safer?" For Taibbi, the answer is clearly "no" due to the fact that a clearly bounded enemy image has morphed into one of a veiled threat—"you can't see him coming." This temporal juxtaposition is instructive. Even with bin Laden's death, the other is not gone, but remains not underneath but within the mask of a handsome young American. Here, the terrorist has been absorbed, mixed into a veneer of agreeability and familiarity. In a landscape that lacks a politically identifiable enemy, the enemy image is made equally phantom in the context of homegrown terrorism.
The enemy image relegated, however momentarily to the background, can rematerialize. The appearance of the Double can spurn attempts at hyper-representation. In other words, the Double can arouse an urge to kill. Instructive here is De Quincey's "Milton versus Southey and Landor," admittedly transposed to the present context:
Nature does not repeat herself.... Any of us would be jealous of his own duplicate; and if I had a doppelganger who went about personating me, copying me, and pirating me... I might (if the Court of Chancery would not grant me an injunction against him) be so far carried away by jealousy as to attempt the crime of murder upon his carcass; and no great matter as regards HIM. But it would be a sad thing for me to find myself hanged; and for what, I beseech you? for murdering a sham, that was either nobody at all, or oneself repeated once too often.
To appreciate fully the implications of the arousal of the Double vis-à-vis homegrown terrorism, killing must be understood, as it has been throughout the book, as more than murder. Following Michel Foucault, "When I say 'killing,' I obviously do not mean simply murder as such, but also every form of indirect murder: the fact of exposing someone to death, increasing risk of death for some people, or, quite simply, political death, expulsion, rejection and so on." The doubles in this book have been killed in a variety of ways: extrajudicial killing, the death penalty, and life imprisonment. As in al-Awlaki's case, his positioning as a prototypical other surely made killing him easier—as did the positions of the Duka brothers (undocumented) and the Newburgh Four (African Americans with criminal records)—but it was his positioning as Double, as familiar that made his death so urgent. This very relation is manifest in the Tsarnaev case. He first appeared to the American public as a familiar face. And, following Foucault, to expose him to death or make his death more palatable there were a series of attempts to revert his image to that of a clearly bounded other, to materialize the spectral enemy that lies within the face of the Double.
This tendency is visible in the various alternative covers produced in response to Rolling Stone. Some, critiquing the glamorization of a violent individual, photoshopped Tsarnaev's face onto other sexualized bodies: a seminude Janet Jackson featured on a 1993 Rolling Stone issue and a chiseled body flaunted on the cover of Men's Health, for example. Some suggested that the magazine would have been wise to feature victims and showcase their perseverance. In the controversy, a Massachusetts State Police photographer leaked photos of Tsarnaev emerging from the boat in which he was hiding, hands bloodied and raised, the red dot of a sniper's scope squarely on his forehead. The photographer wanted to show "the true face of terror." The effort that received the most attention, however, was that of the conservative magazine The Week. Its May 3, 2013 cover featured the brothers drawn, their complexions made markedly darker, reduced to a racialized and more bounded enemy image.
The exaggerated features on The Week's cover fall well within Galli's futile hyper-representations (much like the "misidentifications" that occurred early in the manhunt). But these do not exist in isolation, nor are they reactions to an apparently natural doppelgänger. While the Double certainly functions in security discourse to uncover an other within, it does not stop at an other, but endlessly opens up the collective to more interrogation. To transpose Freud, the Double also "leads back to what is... long familiar." I have argued that the relational trajectories between Double and other, as figures of representation, modulate between parallel, perpendicular, oblique, and acute movements. They intertwine, merge, and separate in complex ways, creating a productive tension of deferral and closure, disruption and suture. Against Tsarnaev's likeness, a reduction to other secured his death; for al-Awlaki, assertions of his likeness hastened his demise.
The movement between other and Double is plainly visible in more recent visual depictions of the Americans who have taken up arms for ISIS or the Islamic State. Shannon Conley, a nineteen-year-old white woman from Colorado, was arrested at Denver's International Airport as she was about to board a plane for Turkey, en route to Syria. She was sentenced to four years in prison. Elton Simpson, a twenty-nine-year-old African American who resided in Arizona, was killed outside of the Curtis Culwell Center. Inside the center, the American Freedom Defense Initiative, a hate group also known as Stop Islamization of America, was holding the First Annual Muhammad Art Exhibit and Contest. Simpson and Nadir Soofi approached the center guns in tow but were shot and killed by a police officer before they were able to enter the facility. Media reports of both incidents featured uncanny juxtapositions. An image from Conley's school yearbook, short hair and smile, was placed beside her in a courtroom, donning military camouflage and a hijab. Simpson's high school picture, on a basketball court and clean-shaven, was positioned against one of him wearing a scraggily beard and a white skullcap. In these double visions the other is extracted from the image of the Double. But, this is not a unidirectional movement, but a refraction that moves back onto the "before" image. While reinforcing xenophobic articulations of hostility, the tension also requires another look back, a search for "what else?"
In an age of "Global War" the phantom enemy signifies "a humanity that opens itself up to its own inhumanity, to its own ontological undoing." The Double is the functionalization of this disruption in the register of representation and of communicating threat. In reference to the cases of young Americans of a variety of backgrounds joining ISIS, Peter Bergen and David Sterman write without irony, "The first line of defense against terrorism: Mom and Dad." This runs parallel to Foucault's argument regarding the dangerous individual, the movement and transposition of the rare and the monstrous into the "common everyday figure of the degenerate, of the pervert, of the constitutionally unbalanced, of the immature, etc." But, it is an ever-widening fissure. It is the intensification of a process sparked by the loss of the political enemy; the disappearance/inter-pixelization of the enemy image in the Double and the oscillation that results from futile attempts to extract an enemy image from it penetrates the most intimate spaces of collective life. Of course, the sacrificial killing this engenders is much like the dual position begat by the Double. We might all be potentially an enemy or suspect, but this suspicion is unequally experienced and felt, even if it can be projected, transposed, and superimposed.
This leaves us in a precarious balancing act. Surely, violence materializes in ways that go beyond political borders and their identifiable enemies—even if this violence is inseparable from institutional assemblages native to the American legal system. But on the plane of representation, the at times well-intentioned if naïve deployment of the Double in narrative form (he looks like us, he seemed so normal, he was just a normal guy) proves vexing. First, it takes our attention away from the continued reach and effect of markers of difference in hyper-representations of terror. These demand a continued and vigilant disruption. However, in addition to questioning constructions of reductive difference, the Double forces us to reconsider the mirrors of likeness. Markers of difference used in formulating an enemy image, as Schmitt points out, are never factual. Even in situations of conventional enmity in which two clearly delineated political groupings are involved in combat, the enemy image remains a purposeful and selective construction. In this book, I have shown that similarity and likeness in the register of the image of threat are equally nonfactual. But this claim does not and cannot depend on an assertion of natural, self-evident, or essential difference. Practically, it simply points to the fact that the Double depends on selective and purposeful articulations of likeness and familiarity: one's looks, accent, residence, occupation, and so on. More generally, however, the Double points to the limits of disruption in and through identity as a strategy to disturb the machinations of the increasingly mundane war on terror. The discourse of the Double reappropriates the disruption of the enemy image in the service of security, but in a way that does not abandon the enemy image in any absolute sense; the result is a cyclical movement between rupture and closure. In instrumentalizing Lec's aphorism, the disjunctural quality of "seeing" my own monstrosity becomes part and parcel of security, rather than a maneuver to begin to think otherwise.
In Galli's gray global twilight
... if there is a lunatic in the house, what can one know, of course I don't want to exaggerate, but there's no question of peace any more until this is cleared up, even in one's own home one is at the mercy of... I say, at the mercy of...
Epilogue
Much has changed in the time since this book was finalized. Such is the nature of writing about such an endlessly modulating conflict that this epilogue will likely require updating by the time it reaches print.
This book is set, so to speak, in Obama's America. The discourse of homegrown terrorism and its accompanying figure, the Double, congealed early on in his tenure. Both are a reflection and product of the so-called postracial moment with which his term coincided. During that time government officials and the news media described an adversary that grew out from within, one that seemingly complicated orthodox war on terror optics. This shift, of course, did little in the way of reducing Islamophobia or the persistence of the "other" in security discourse. Nevertheless, it is a moment in which the familiar and unfamiliar were presented not as embodied in the pairing of friend/enemy but as scrambled within threat itself.
During the 2016 US presidential election, Donald Trump, who ran a multifront race-baiting campaign, promised a return to ostensibly simpler times. In his trademark schoolyard self-touting style he claimed to be the anti-PC candidate who was willing to "name the enemy." "Islam hates us," he asserted, promising a "total and complete shutdown" of Muslim immigration to the United States. Couched in the liberal tendency to separate "good" from "bad" in clashes within rather than clashes between, the Double perhaps came and went with the Obama presidency.
Yet, on May 21, 2017, Trump gave a speech in Riyadh, Saudi Arabia, that contained passages that could have easily scrolled across President Obama's teleprompter: "This is not a battle between different faiths, different sects, or different civilizations. This is a battle between barbaric criminals who seek to obliterate human life, and decent people of all religions who seek to protect it. This is a battle between Good and Evil." The notion of the Double is perhaps not yet ready to leave the scene of security. The other-Double relation is a shifting one, in which emphases and relations change. For someone who follows reality TV logic there is no contradiction in his varying statements, only messages that play well to certain audiences. In his speech there is much to unpack and also much that will unfold over time. Thus, I can make only some preliminarily observations.
Trump himself touted his remarks in Riyadh as his "Islam speech." Two opinion contributors for the New York Times, Mustafa Aykol and Wajahat Ali, were quick to point out that the speech wasn't really about Islam. What Trump did discuss at length was terrorism; the significance of the conflation cannot be understated. Despite the fact that Trump only said "Islamic terrorism" once—apparently going off script, a telling slip—and despite the fact that the section advocating for a "total and complete shutdown" of Muslim immigration has been taken off of his campaign web page, the brown-Arab-Muslim-other, along with other racial formations, are clearly central to his worldview. His campaign and early tenure—marked by policies steeped in racism—have certainly emboldened white supremacists who now appear in public with torches but without the hoods that once covered their faces. In the wake of such rising violence, he has not made (and most certainly will not make) a similar (Christian) speech within America's borders calling on white Americans to weed out the radicalized among them (though this criticism is not exclusive to Trump). For example, it took Trump three days to address the May 26, 2017, deaths of two men who intervened in an altercation in which a white supremacist was subjecting two women to anti-Muslim epithets. When he did, he used the official POTUS Twitter account rather than his personal one, the latter being the one his base follows. Just one day prior, the Fourth Circuit Court of Appeals upheld a lower court's decision to block Trump's second "Muslim ban."
At the same time as shouldering the responsibility of curbing terrorism on Arabs and Muslims (as much as Saudi Arabia merits that responsibility), Trump in his speech also strained to group all god-fearing people together against terrorists. Terrorists "do not worship god, [but]... worship death," he professed, reminiscent of Cold War efforts to mobilize Americans against a godless evil empire. His national security advisor, Lt. Gen. H. R. McMaster—who has pushed Trump to drop "radical Islamic terror" from his lexicon—reiterated this stance, while claiming Trump was "learning": "I think it's important that whatever we call it, we recognize that these are not religious people and, in fact, these enemies of all civilizations, what they want to do is to cloak their criminal behavior under this false idea of some kind of religious war." In this effort, Trump's trip marked the establishment of a joint US-Saudi Global Center for Combating Extremist Ideology, however ironic and superficial this partnership might be. At the same time, some US media have framed Saudi Arabia's own problems with ISIS through the discourse of the Double: "ISIS Turns Saudis Against the Kingdom, and Families Against Their Own," reads one New York Times headline. Whether this is a frame that structures discourses about terrorism within the country itself is a question I cannot answer here. Nevertheless, framing victory in the battle against terrorism as a goal "that transcends every other" and one that requires a purge brings its own violence. The marked emphasis in the middle of his speech, all caps to ensure he would not go off script, makes this clear:
Drive. Them. Out.
DRIVE THEM OUT of your places of worship.
DRIVE THEM OUT of your communities.
DRIVE THEM OUT of your holy land, and
DRIVE THEM OUT OF THIS EARTH.
This ostensible effort for peace is also marked by a $110 billion sale of military arms. No longer a battle for "hearts and minds," for Trump and his business partners, it is a battle for "hearts and souls"—a shift whose significance will only unfold over time.
Early in Trump's America the other-Double relation has certainly reconfigured, the Double taking second chair. The future of US security discourse and how particular figures of threat will be deployed and operationalized by a white supremacist administration are perhaps not difficult to gauge. Ultimately, for the Trump era, however long it lasts, this book serves as a cautionary tale. Trump himself provides an all-too-neat package in which to place the country's ills. Certainly the violence that has accompanied Trump's election, fomented by the words and deeds of Trump himself and those closest to him, is terrifying and abhorrent. Yet, it is perhaps too easy to forget that which has been the subject of much of this book: that Obama-era approaches to counterterrorism, couched in the discourse of the Double, come with their own violent baggage. Thus, in a moment in which we are already seeing a misguided fondness for George W. Bush, it is essential that efforts to counter Trump's racist policies not be marked by a deceptive nostalgia for a lighter and gentler war on terror.
ACKNOWLEDGMENTS
To begin, or in this case end a book by unloading some of the responsibility for its oversights is one of the academy's strangest traditions. Its only redeeming quality is that it simultaneously prevents an author from taking full credit for an often years-long project, with so many twists, turns, trap doors, and (seemingly) dead ends that no single person could navigate alone.
I am indebted to my mentor Barbie Zelizer. Without her keen mind, attention, and insistence, much of the prose would be far less comprehensible. I am thankful for her ongoing support, guidance, and example of critical scholarship.
I was lucky enough to have an interdisciplinary committee of advisors. To John Jackson, Marwan Kraidy, Anne Norton, and Rogers Smith I am grateful for the input, conversations, and interactions that have helped to shape this book and my thought more generally. The generosity and support of Michael X. Delli Carpini and the entire Annenberg School were invaluable. I am also indebted to the programs that have further supported my research and writing: Rogers Smith's Democracy, Citizenship, and Constitutionalism Program and the George Gerbner Postdoctoral Fellowship.
To my former neighbors in the west hall at Annenberg, Sharrona Pearl and Jessa Lingl, the open office doors, advice, and support have not gone unappreciated. And a special thanks to my first Annenberg family: Loi Sessions-Goulet, Alison Perelman, Jeff Gottfried, Adrienne Shaw, Brooke Duffy, Heidi Khaled, Michael Serazio, Matt Lapierre, Nora Draper, Christopher Ali. I would also like to express my gratitude to my colleagues at the University at Albany, SUNY, particularly Nico Bencherki.
Thank you to Alicia Nadkarni and the NYU Press series editors, Jonathan Gray, Aswin Punathambekar, and Nina Huntemann, for their help in navigating the world of academic publishing.
I am profoundly indebted to my parents, Hanna and Roman Szpunar. A courageous pair that took their kids on "vacation" in the early eighties only to come home to another country. Their ethic, effort, volume, and persistence continue to shape my approach to any undertaking. My brother, Karol (Karl), has been a constant source of support, friendship, and, more recently, collaboration. My sister, Monika, continues to set an example that I can only futilely imitate.
To my wife Jen. To ease any anxiety about now living with a me that is not attached to this project, I can only promise to continue to be as pleasant as I have been throughout this process, particularly after a dusk-to-dawn writing shift. Without your love, support, encouragement, and patience, I could not have finished this book.
NOTES
ENTRANCE
1 Taibbi, "Explaining the Rolling Stone Cover"; Žižek, "Are We in a War?"; Derrida, Politics of Friendship; Schmitt, Concept of the Political.
2 On the function of the other in this regard, see Hall, "Question of Cultural Identity"; Said, Orientalism; Žižek, Sublime Object of Ideology. On the other in the war on terror, see Alsultany, Arabs and Muslims in the Media; Kumar, "Framing Islam"; Semati, "Islamophobia, Culture and Race in the Age of Empire."
3 Quoted in Madison, "Attorney General Eric Holder."
4 Napolitano, "Nine years after 9/11."
5 Galli, "On War and on the Enemy."
6 Bhabha, Location of Culture. This point can be put another way, transposing Arjun Appadurai's thesis on small numbers. The Double constitutes the smallest of numbers (<1) that prevents the externalization of a collective's inability to achieve wholeness. Indeed, "small numbers can unsettle big issues." Appadurai, Fear of Small Numbers, 73.
7 Lec, Myśli Nieuczesane, 44. The translation used in the epigraph is my own.
8 Rapoport, "Four Waves of Rebel Terror and September 11."
9 Schmid, Routledge Handbook of Terrorism Research, 102.
10 Schmid and Jongman, Political Terrorism, 66.
11 See "Condition of Kansas"; "Discouraging to 'Fanatics' "; "Terrorism in Louisiana." For another early example of racist violence discussed as terrorism, see "Robeson Asks U.S. to Probe 'Terrorism.' " This Washington Post headline is telling. First, placing terrorism in scare quotes is a practice not readily seen today, marking the emergence of terrorism as an episteme over the past half century. Second, the use of scare quotes in the context of racist violence speaks to the unequal usage of the term vis-à-vis the racial identity of the victims of violence.
12 I use the concept of the refrain because it most effectively addresses a process of territorial movement (of de- and reterritorialization), an oscillation between articulation and flight that accounts for not only how knowledge and practice concerning terrorism are organized (articulated and repeated) but also how new spaces, utterances, and actors are enclosed within this particular epistemic lens that marks the possibilities of de-organization (flight). It simultaneously traces out a territory that does not preexist and produces "stems and filaments that seem to be roots... [and can also be put] to strange new uses." Deleuze and Guattari, Thousand Plateaus, 311, 15. On how the refrain holds together fuzzy aggregates, see Murphie, "Sound at the End"; on the refrain's three aspects of injection, inscription, and interception vis-à-vis organization, see Sørensen, "Immaculate Defecation."
13 Stampnitzky, Disciplining Terror; Kumar, Islamophobia and the Politics of Empire.
14 US Congress, Senate, Committee for Internal Security, Terrorism; US Congress, Senate, Committee for Internal Security, "Terrorism: A Staff Study." This is a complex history in itself. While Nixon originally attempted to revive the list, he was met with congressional resistance due in large part to the belief that the list was not of much use in dealing with the emerging threat of terrorism. See Goldstein, American Blacklist. It should also be noted that there were initiatives centered on terrorism before 1974, such as the short-lived Cabinet Committee on Terrorism formed in 1972. However, there is agreement that terrorism did not "hit the stands" until 1974 (H. H. A. Cooper, former staff director of the National Advisory Committee Task Force on Disorders and Terrorism, quoted in Stampnitzky, Disciplining Terror, 90).
15 Alexander, Baum, and Danziger, "Terrorism."
16 Jackson, "Argument for Terrorism."
17 Merari, "Classification of Terrorist Groups."
18 The first act to have terrorism in the title was the 1984 Act to Combat International Terrorism, which primarily focused on authorizing rewards for foreign nationals who provided the US government with information.
19 FBI, "FBI Analysis of Terrorist Incidents."
20 On this question of state terrorism, see Sproat, "Can the State Be Terrorist?" The recent murder of nine AME church members in Charleston, South Carolina, on June 17, 2015, has been hotly contested, with many voices calling for the incident, perpetrated by Dylann Roof, to be publicly deemed an act of terrorism. Similarly, the endemic killing of black men by police forces across the United States has received similar traction. More recently, commentators have been stating that the first US antiterrorism laws were directed at the KKK. The reference is to the Third Force Act of 1871. The term "terrorism" was not used in this act, but it has been interpreted as such in the contemporary moment. See Craven, "Dylann Roof Wasn't Charged with Terrorism Because He's White."
21 DHS, "Domestic Terrorism."
22 Schmitt, Theory of the Partisan. For Schmitt, "limits" do not connote the brutality of violence. All forms of hostility—conventional (between nation states), real (between a nation-state and a subnational group), and absolute (between ideological actors)—can be equally brutal. Rather, "limits" demarcate the boundaries used to define the actors themselves as well as the timeframe of open conflict. It is in this limitless space-time that Galli's phantom enemy materializes.
23 Badiou, Infinite Thought, 126.
24 Razack, Casting Out.
25 Said, Orientalism; Said, Covering Islam. On culture talk, see Mamdani, Good Muslim, Bad Muslim. On respectable racism, see Alsultany, Arabs and Muslims in the Media.
26 Naber, Arab America. This formulation, of course, does not apply equally to all Muslim-American communities, particularly those made up of largely African Americans.
27 One signpost being the hearings held by Republican Peter King on the radicalization of the Muslim American community from 2011 onward. See Kundnani, Muslims Are Coming!; Naber, "Arab Americans and U.S. Racial Formations"; Volpp, "Citizen and the Terrorist."
28 See "H.R. 1777 (100th)." This particular statement is problematic for two reasons. First, and most obvious, is the politics of naming terrorists. Second, it obfuscates the complex assemblages out of which violence erupts.
29 FBI, "FBI Analysis of Terrorist Incidents," 90.
30 Kumar, Islamophobia and the Politics of Empire, 121.
31 Mamdani, Good Muslim, Bad Muslim, 177. For a different angle on the connection between Cold War anxieties and those concerning global terrorism, see Stohl and Stohl, "Networks of Terror," 95–96.
32 Huntington, "Clash of Civilizations?"; Lewis, "Roots of Muslim Rage."
33 Semati, "Terrorists, Moslems, Fundamentalists"; Semati, "Islamophobia, Culture and Race in the Age of Empire." The terrorism-related legislation that emerged in the wake of the Oklahoma City bombing and other domestic and international events, such as President Clinton's Antiterrorism and Effective Death Penalty Act, focused on (in coded language) "alien terrorists," allowing for their deportation via secret evidence. See Kumar, Islamophobia and the Politics of Empire, 141.
34 Laqueur, New Terrorism.
35 Galli, "On War and on the Enemy," 216–17.
36 Though claims of an absolute state of exception are tempered by several Supreme Court decisions: Boumediene v. Bush, 553 US 723 (2008); Hamdan v. Rumsfeld, 548 US 557 (2006); Hamdi v. Rumsfeld, 542 US 507 (2004).
37 While these violent practices have received much attention, through the work of Italian philosopher Giorgio Agamben and those building off of his notion that the "camp is the biopolitical paradigm of the modern," they are hardly the entire picture. German social theorist Thomas Lemke critiques Agamben for his overwrought focus on "a formal and repressive conception of the state," which limits sovereignty to state agencies and does not allow for differentiations of experience. One would add that it does not allow for differentiation of state practice. Moreover, Louise Amoore expertly illustrates how Agamben's "zone of indistinction" is teeming with life. Agamben, Homo Sacer; Agamben, State of Exception; Amoore, Politics of Possibility; Lemke, "Zone of Indistinction."
38 US Sentencing Commission, "2012 Federal Sentencing Guidelines Manual," www.ussc.gov.
39 In the United States, individuals can be stripped of their citizenship only if it can be proved that they committed fraud during the naturalization process. In addition, citizens can relinquish their citizenship. See Perez v. Brownwell, 356 US 44 (1958); Nishikawa v. Dulles, 356 US 129 (1958); Afroyim v. Rush, 387 US 253 (1967); and Vance v. Terrazas, 444 US 252 (1980). International laws on statelessness would also make any such practice illegal (though as Canada's Bill C-24 shows, this can be sidestepped by limiting this practice to those who have another nationality, whether or not they were born in Canada).
40 Ditrych, "From Discourse to Dispositif."
41 One of the main tensions in the war on terror exists in the use of "noncombatants" in defining terrorism. Groups, such as al-Qaeda, claim that those who elected governments involved in conflicts in the Muslim are in fact not noncombatants (a similar notion was promoted by Israeli hard-liners in justifying operations against Gaza after the election of Hamas in 2006). In his work on bare life, Giorgio Agamben suggests that this distinction is obliterated by the operations and governmentality of the West. This is also suggested by the declaration of America as part of the battlefield in the war on terror (National Defense Authorization Act, 2012), and the disparity between civilian and noncivilian casualties in US drone strikes. Thus, the notion of noncombatants, the protection of whom is a fundamental driver of the war on terror, all but disappears in those efforts. This, of course, is not an absolute formation—in the way Agamben suggests—and there are gradations of innocence and suspicion, which I discuss later.
42 The notion of incorporeal transformation refers to the manner in which the body passes from one experiential state to another, as when a judge announces a guilty verdict. See Deleuze and Guattari, Thousand Plateaus, xvi, 76–82.
43 Foucault, "About the Concept of the 'Dangerous Individual.' "
44 This is not to suggest that some perpetrators' actions cannot be understood through a psychological account, only that the approach of radicalization ignores how the assemblages to which an individual may become attached have formed.
45 Patel, Rethinking Radicalization; Kundnani, Muslims Are Coming!
46 Studies that do not exclusively focus on jihadists include Bjelopera, Domestic Terrorist Threat; Krueger and Malečková, "Education, Poverty and Terrorism"; McCauley and Moskalenko, "Mechanisms of Political Radicalization"; Moghaddam, "Staircase to Terrorism."
47 Foucault, "About the Concept of the 'Dangerous Individual,' " 17.
48 Freud, " 'Uncanny,' " 224.
49 The Double is prominent in the work of Jean Paul (who coined the term "doppelgänger"), E. T. A. Hoffmann, Shelley, Dostoyevsky, Stevenson, Poe, Melville, and Wilde, to name but a few. See Coates, Double and the Other; Crawley, "Doubles"; Hallam, "Double as Incomplete Self."
50 See Tymms, Doubles in Literary Psychology. The Double also continues to be the subject of film. Most recently, Dostoyevsky's novella and Saramago's novel, both titled (in their English translations) The Double, have undergone cinematic adaptation.
51 See Ascroft, "Lacan's Desire and Dostoevsky's Double"; Lizama, "Body of Information"; Plank, "Différance"; Herdman, Double in Nineteenth-Century Fiction; Vardoulakis, Doppelgänger; Webber, Doppelgänger.
52 Guerard, "Concepts of the Double."
53 Freud, " 'Uncanny' "; Rank, Double; Fleming, "Doppelgänger/Doppeltgänger."
54 Poe, "William Wilson," 561.
55 The name we are given is William Wilson, which, the narrator states, is similar to his own common name, but is a pseudonym.
56 Jean Paul, who coined the term, defines doppelgänger as follows: "So people who see themselves are called." See Hallam, "Double as Incomplete Self." The doppelgänger has, however, come to refer to the figure one sees, rather than the one who sees it. Moreover, Fleming notes that this definition is originally tied to the word "doppeltgänger," while "doppelgänger" refers to two meal courses served simultaneously. Regardless, the term is here used in its popular connotation, of a look-alike figure that appears to an individual, whose own constitution (and singularity) it puts in doubt. See Fleming, "Doppelgänger/Doppeltgänger."
57 Webber, Doppelgänger, 60.
58 See specifically Dryden, Modern Gothic and Literary Doubles; Coates, Double and the Other.
59 Coates, Double and the Other, 3.
60 Hallam, "Double as Incomplete Self," 17.
61 Rank, Beyond Psychology.
62 Fleming, "Doppelgänger/Doppeltgänger."
63 Borges, Book of Imaginary Beings; Ng, "Introduction"; Rosenfield, "Shadow Within."
64 Guerard, "Concepts of the Double"; Herdman, Double in Nineteenth-Century Fiction; Webber, Doppelgänger. Often, splitting and duplication occur simultaneously: in Robert Louis Stevenson's Strange Case of Dr. Jekyll and Mr. Hyde, a single man is split in two (good-natured Jekyll and sinister Hyde); in Dostoyevsky's The Double, Mr. Golyadkin meets his exact copy, who happens to possess all the traits that he lacks.
65 Dostoyevsky puts this phenomenon another way: "If the two of them had been placed next to each other, no one, absolutely no one, would have been able to say who was the real Mr. Golyadkin and who the imitation, who the old and who the new, who the original and who the copy." Dostoyevsky's The Double, quoted in Rank, Double, 30.
66 Webber, Doppelgänger, 7.
67 Schmitt, Theory of the Partisan, 73.
68 Neighbor of Daniel Boyd, quoted in "Nicest Terrorist I Ever Met." Boyd, a North Carolina man, pled guilty to conspiracy to provide material support to terrorists in 2011.
69 Chow, Age of the World Target, 59.
70 Foucault, Security, Territory, Population, 45.
71 Ibid., 63.
72 Ibid., 20, 37. Herein lies another distinction between other and Double. The other is spatially oriented while the Double is temporally oriented, particularly toward the future.
73 Ibid., 45.
74 Massumi, "Potential Politics and the Primacy of Preemption."
75 Aaronson, Terror Factory; Apuzzo and Goldman, Enemies Within; Ali Musawi, Cheering for Osama.
76 Chow, Age of the World Target, 48.
77 Foucault, Security, Territory, Population, 363.
78 Gomez, "Robert Doggart."
79 Brown, Walled States, Waning Sovereignty.
CHAPTER 1. IDENTITY AND INCIDENCE
1 Schmid, Routledge Handbook of Terrorism Research, 86. In Schmid's definition it is evident that the politics of vilification remain: terrorists, according to him, are without "moral restraint."
2 Even the pithiest definitions have been put into the service of political interests. For example, the co-optation and reduction of the widely accepted notion of terrorism as a "communicative act" certainly underwrote Margaret Thatcher's infamous characterization of the (mass) media as "terrorism's oxygen." The dubious science used to support an overly deterministic formulation of the "contagion thesis" (via a hypodermic needle model of communication) set off a long and overdrawn debate over how, and even if, the media ought to cover political violence; the thesis continues to have purchase in the digital age. To say that a phenomenon involves the media is not saying very much, particularly when much of our lives are mediated. Schmid and de Graaf, Violence as Communication; Picard, "News Coverage as the Contagion of Terrorism"; Archetti, "Terrorism, Communication and New Media."
3 Jacques Derrida, interviewed in Borradori, Philosophy in a Time of Terror.
4 Massumi, "Potential Politics and the Primacy of Preemption."
5 François Ewald, quoted in Beck, "Living in the World Risk Society," 335. Contra Beck, I do not distinguish between environmental risk and the risk wrought by terrorism (which he bases in intentionality). Contemporary terrorism, particularly seen in its historical development outlined in the Entrance, has the characteristics that Beck reserves for environmental crisis: unintentional—though "unforeseen" is a preferable term—consequences of human activity.
6 Described in detail in Curry, If a Tree Falls; Desphande and Ernst, "Countering Eco-terrorism"; National Lawyers Guild, "Operation Backfire."
7 He was originally released in December 2012, but after penning an article for the Huffington Post, he was retaken into custody for supposedly violating a stipulation of his release by publishing. This regulation was deemed unconstitutional and he was again released.
8 While the use of the term spiked in 2001, this occurred prior to the attack on the Twin Towers. See Wagner, "Reframing Ecotage as Ecoterrorism." The term itself first appeared in the New York Times in regard to the tactics of Saddam Hussein. Safire, "Don't Throw Away Victory." For an account of its formulation, see Smith, "Ecoterrorism?"
9 Badolato, "Environmental Terrorism."
10 Mainstream organizations such as People for the Ethical Treatment of Animals (PETA) and the Humane Society of the United States are, at times, vilified through spurious associations to these groups; ironically, radical environmentalists often refer these two as "industry friends." See Animal Liberation Front, "Manifesto for Radical Abolitionism."
11 Testimony of Carson Carroll of the ATF in US Congress, Senate, Committee on Environment and Public Works, Eco-terrorism Specifically Examining the Earth Liberation Front and the Animal Liberation Front (hereafter Examining ELF and ALF), 13–14.
12 US Congress, Senate, Subcommittee on Forests and Forest Health of the Committee on Resources, Ecoterrorism and Lawlessness on the National Forests (hereafter Ecoterrorism and Lawlessness), 50.
13 Examining ELF and ALF, 8. For testimonies, see Testimony of Michelle Basso in US Congress, Senate, Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, Animal Enterprise Terrorism Act, 13–14, and Statement of Skip Boruchin in US Congress, Senate, Committee on Environment and Public Works, Eco-terrorism Specifically Examining Stop Huntingdon Animal Cruelty (hereafter Examining SHAC), 18.
14 Senator Frank Lautenberg (D-NJ) in Examining ELF and ALF, 5. On care, see Animal Liberation Front, "ALF Credo."
15 Curry, If a Tree Falls.
16 Statement of Frank Riggs in which he compares environmentalists to antiabortionists who kill doctors. US Congress, Senate, Subcommittee on Crime of the Committee on the Judiciary, Acts of Ecoterrorism by Radical Environmental Organizations (hereafter Acts of Ecoterrorism), 10.
17 Statement of Nick Nichols, CEO of Nichols-Dezenhall Communications Management Group, in Ecoterrorism and Lawlessness, 130–33.
18 "Green Monsters"; Drabelle, "Extremism in the Defense of Trees."
19 The radical environmental movement has long been criticized for the "whiteness" of their rhetoric and politics. For example, ignoring the political causes of and the populations that are disproportionately affected by AIDS and famine, in the early to mid-1980s prominent figures within the movement stated that environmentalists should celebrate the advent of AIDS as well as opposed famine relief to Ethiopia as both would produce the population decline necessary for a sustainable and balanced ecosystem. See Scarce, Eco-warriors and Lee, Earth First!
20 Animal Liberation Front, "Manifesto for Radical Abolitionism"; Gruen, Singer, and Hine, Animal Liberation.
21 Scarce, Eco-warriors, 32, xv. Moreover, others claim that their actions originate themselves in the West; they are the result of the contemporary American system. A co-founder of Earth First!, Howie Wolke writes, "We played by the rules.... We were moderate, reasonable, professional. We had data, statistics, maps, graphs. And we got fucked.... That's what led to Earth First! more than anything else." Quoted in Scarce, Eco-warriors, 24.
22 Quotes in order: Statement of Nick Nichols, Ecoterrorism and Lawlessness, 133 (for examples of this in academic literature, see Leader and Probst, "Earth Liberation Front and Environmental Terrorism," and Vanderheiden, "Eco-terrorism or Justified Resistance?"); Testimony of Mark L. Bibi, Counsel for Huntingdon Life Sciences, in Examining SHAC, 15; Ecoterrorism and Lawlessness, 19.
23 Testimony of Hapreet Singh Saini in US Congress, Senate, Subcommittee on the Constitution, Civil Rights, and Human Rights, Committee of the Judiciary, Hate Crimes and the Threat of Domestic Extremism (hereafter Hate Crimes and Domestic Extremism).
24 Weinstein, "Sikh Temple Shooter's Racist Tattoos, Deciphered."
25 Yaccino, Schwirtz, and Santora, "Gunman Kills 6 at Sikh Temple in Wisconsin."
26 Simi and Futrell, American Swastika, 15.
27 Heidi Beirich, personal communication, March 13, 2013.
28 Beirich and Potok, "USA," 256. The claim that there is a significant change in the nature of the racist right circa 1995 is overstated. As the case study highlights, there are still concerns over other bogeyman who have infiltrated America in lieu of the Communists such as the brown-Arab-Muslim-other. Surely, globalization has altered the racist right's restorationist effort, but most assertions that the government must be toppled are still supported by what Beirich and Potok refer to as an "Edenic past." Only now the government has been corrupted to the point that it cannot be "restored" without a revolutionary agenda.
29 See Eichenwald, "Right-Wing Extremists." On the gutting of the DHS, see Ackerman, "DHS Crushed This Analyst" and Smith, "Homeland Security Department."
30 Quoted in Beirich and Potok, "USA," 256.
31 David Duke quoted in Beirich and Potok, "USA," 258.
32 Stolberg, "Obama Offers Sympathy."
33 Reader comment no. 43 in Mackey, "Mass Shooting at Fort Hood."
34 Adjudicating one's religious devotion is not a topic I intend to take up; I am simply restating the arguments of others.
35 Reader comment no. 168 in Johnston and Shane, "U.S. Knew of Suspect's Tie to Radical Cleric."
36 William H. Webster Commission, "Final Report," 6.
37 Reader comment no. 257 in Mackey, "Mass Shooting at Fort Hood"; Reader comment no. 33 in Mackey, "Updates on the Shootings at Fort Hood."
38 Gaffney, "Siren Call of Shariah." It should be noted that the author of this article, who served as Ted Cruz's national security advisor in the 2016 Republican primaries, has espoused all of these views publicly. While he writes for the Washington Times, which is at best a marginal newspaper in the United States, this line of articulation reflects the considerable amount of paranoia in the United States over the specter of sharia: Tennessee and Louisiana have enacted legislation banning it, Mississippi and Utah have tried and failed, and another eleven states are considering similar measures. See Murphy, "Map."
39 Reader comment no. 231 in Johnston and Shane, "U.S. Knew of Suspect's Tie to Radical Cleric"; Reader comments no. 193 and no. 65 in Mackey, "Mass Shooting at Fort Hood."
40 Reader comment no. 102 in Mackey, "Mass Shooting at Fort Hood," quoted in Moss, "Muslims at Fort Voice Outrage and Ask Questions."
41 A popular assertion in the mainstream press as well. See, e.g., Yaccino, Schwirtz, and Santora, "Gunman Kills 6 at Sikh Temple in Wisconsin."
42 Posts made by users "Breitling" and "Pat88," August 5, 2012.
43 Herbert, "Stress Beyond Belief."
44 Brooks, "Rush to Therapy."
45 Reader comment no. 20 in Friedman, "America vs. the Narrative."
46 Barcott, "From Tree-Hugger to Terrorist."
47 A supporter of Chelsea D. Gerlach, a member of "the Family," at her trial, quoted in Yardley, "Radical Environmentalist Gets 9-Year Term."
48 E.g., Michael, Lone Wolf Terror.
49 According to the forums on www.crew38.com, the relationship between the Hammerskin Nation and Stormfront, for example, is fragile and varied. A thread titled "Stormfront?" on the Hammerskins forum asks members what they think of Stormfront. The responses vary from contempt to affinity.
50 Post by user "Poacher," August 5, 2012.
51 Post by user "beerrunner13," August 20, 2011.
52 "Topic A." She mentions "Jordanian" because Hasan was mistakenly (or wishfully) thought to have been born in Jordan.
53 Beck, "Living in the World Risk Society," 330.
54 Ecoterrorism and Lawlessness, 80, emphasis added.
55 While the term "doppelgänger" is often defined as a look-alike, Jean Paul's original connotation is the "double-goer" or "one who goes twice." Fleming, "Doppelgänger/Doppeltgänger."
56 Genosko and Thompson, "Tense Theory," 130.
57 Barcott, "From Tree-Hugger to Terrorist"; Leader and Probst, "Earth Liberation Front and Environmental Terrorism"; Testimony of John Lewis in Examining ELF and ALF.
58 "Boy Who Cried 'Elf.' "
59 See www.originalelf.com/earthlib.htm.
60 Animal Liberation Front, "ALF Credo."
61 See Testimony of Congressman Greg Walden in Ecoterrorism and Lawlessness; Testimony of John Lewis in Examining ELF and ALF, 15; Testimony of Porter Wharton III of Vail Resorts in Ecoterrorism and Lawlessness, 54.
62 Quoted in Chase, Harvard and the Unabomber, 94.
63 "Boy Who Cried 'ELF.' " The article does not provide citations or evidence for these claims.
64 Smith, "Ecoterrorism?"; Ecoterrorism and Lawlessness, 33.
65 Ecoterrorism and Lawlessness, 2.
66 Testimony of Senator James Inhofe in Examining ELF and ALF, 8.
67 Acts of Ecoterrorism, 15.
68 FBI, "White Supremacist Recruitment"; Beirich and Potok, "USA."
69 "Chorus of Protest Grows"; Thompson, "Apology to Veterans."
70 Dao and Kovaleski, "Hatecore Music."
71 Weinstein, "Sikh Temple Shooter's Racist Tattoos, Deciphered."
72 Laris, Somashekhar, and Leonnig, "Gunman in Wisconsin."
73 William Pierce of the National Alliance (and the author of The Turner Diaries) founded Resistance Records in an attempt to have "millions of young, white Americans and Europeans... make resistance music their music of choice, instead of the Negroid filth churned out by MTV." Quoted in Simi and Futrell, American Swastika, 80.
74 One need only think of the Columbine High School massacre in 1999 in which the music of Marilyn Manson was thought by some to have led the two perpetrators to commit their crimes as well as the 1990 court case of James Vance v. Judas Priest in which the music of a British heavy metal band was blamed for the suicide of two US teens.
75 Senator Durbin in Hate Crimes and Domestic Extremism.
76 Dao and Kovaleski, "Hatecore Music"; Goode and Kovaleski, "Wisconsin Killer Fed"; Lee, "Inside the Creepy World of 'Hate Music.' "
77 See www.hammerskins.net.
78 Post by user "Ballistic," August 5, 2012, emphasis added.
79 Leyden, "I Used to Be a Skinhead."
80 Quoted in Fox News Sunday.
81 Krauthammer, "Medicalizing Mass Murder."
82 Reader comments no. 24 and no. 59 in "Horror at Fort Hood"; "Topic A."
83 Much of the correspondence is available in William H. Webster Commission, "Final Report."
84 Quoted in Raghavan, "Cleric Says He Was Confidant to Hasan."
85 On al-Awlaki's relationship to al-Hazmi, see Berger, "Anwar al-Awlaki's Links to the September 11 Hijackers."
86 Quotes in Samuels, "New Mastermind of Jihad"; see also Lia, Architect of Global Jihad.
87 Quoted in al-Qaeda in the Arabian Peninsula, Inspire 5 (Spring 2011): 29.
88 Quoted in Lia, Architect of Global Jihad, 383.
89 This includes converts, who become part of the community through their violence. Thus, in effect, how much they "believe" or "follow" al-Qaeda's system likely matters little. Dead men cannot challenge one's reading of their intent, nor can they sully their assumed devotion.
90 Al-Qaeda in the Arabian Peninsula, Inspire 1 (Summer 2010): 57.
91 For a critique of radicalization, see Kundnani, Muslims Are Coming!, esp. 115–52. For an analysis of various approaches to radicalization, see Patel, Rethinking Radicalization.
92 Ironically, the successes of anticipatory politics, those cases in which the state prevents terrorism—often characterized as entrapment due to the use of informants who goad individuals into action and intrusive surveillance—also fail both in the fact that these only highlight and create the enigmatic threats that lurk among Americans and in their infringement on civil liberties.
93 Michael, Lone Wolf Terror. Admittedly the strategy had been used long before Beam coined it; he himself traces it to a 1962 article by Colonel Ulius Louis Amoss, who described it as a strategy to be used in case of Communist invasion. US Congress, Senate, Committee for Internal Security, "Terrorism: A Staff Study"; al-Suri quoted in Lia, Architect of Global Jihad.
94 From an ALF primer reprinted in Best and Nocella, Terrorists or Freedom Fighters?, quoted in Heim, "Wisconsin Shooter Embraced 'Hate Rock' "; Abu Mus'ab al-Suri quoted in Brahimi, " 'Changing' Face of Al-Qaeda."
95 Statement of Frank Riggs in Acts of Ecoterrorism, 8; Ecoterrorism and Lawlessness, 15, 19, 83.
96 Simi and Futrell, American Swastika, 4; Goode and Kovaleski, "Wisconsin Killer Fed."
97 Quoted in Newman and Brick, "Neighbor Says Hasan Gave Belongings Away."
98 Galloway and Thacker, Exploit, 11, emphasis added.
99 Examining ELF and ALF, 17.
CHAPTER 2. INFORMANTS AND OTHER MEDIA
1 The defendants included Benjamin J. Davis, Jr., Eugene Dennis, John Gates, Gil Green, Gus Hall, Irving Potash, Jack Stachel, Robert G. Thompson, John Williamson, Henry Wilson, and Carl Winter. There were originally twelve defendants, but William Z. Foster, the CPUSA national secretary, took ill and was not tried.
2 Roosevelt, "Memo to Moscow"; "Letters," Communist Party of the United States, TAM 132 (box 7, folder 7), 1949, Tamiment Library/Robert F. Wagner Labor Archives, New York University.
3 Kocieniewski, "6 Men Arrested."
4 See Galloway and Thacker, Exploit; Hu, Prehistory of the Cloud.
5 Cited in Hu, Prehistory of the Cloud, 6. What follows is not intended to completely dismiss the usefulness of the network diagram in understanding violence (as in Klausen's project). Rather, it is intended to examine some of the repercussions of its deployment vis-à-vis the law.
6 The netwar conception was itself part of the broader developments in the use of the network metaphor across disciplines in the 1990s; see Stohl and Stohl, "Networks of Terror."
7 Dilling, Red Network.
8 Internal Security Act, subsection 2(9), <http://tucnak.fsv.cuni.cz>.
9 Jacobs, "Cartography's Favourite Map Monster."
10 Sampson, Virality; Latour, "On Actor-Network Theory"; Latour, Reassembling the Social.
11 Erickson, "Network as Metaphor." As early as the 1980s Wilhelm Baldamus stated that the concept is interesting only in that examining how "a metaphor with hardly any explanatory power to start with can maintain its popularity for long periods with no tangible reason" (912–13). In the context of terrorism, communication scholars Cynthia and Michael Stohl vividly show the pitfalls of the ways in which the US administration has conceptualized terrorism as a network. See Stohl and Stohl, "Networks of Terror."
12 Bloom, "Historical Overview of Informants."
13 Massumi, "Potential Politics and the Primacy of Preemption."
14 "Who Won?"
15 Lerner, "Ideas as Criminals."
16 For example, Freeman, "Communist Trial."
17 Testimonies of George K. Hunton, director of the Catholic Interracial Council of New York and Rabbi Benjamin Schultz in HUAC, Infiltration of Minority Groups, 448, 440.
18 Budenz, This Is My Story.
19 United States v. Foster et al., 81 F. Supp. 280 (SDNY 1948), Stenographer's Notes, vols. 3–5, National Archives and Records Administration–Northeast Region, New York, March 23–April 12, 1949, vol. 4, 2066.
20 "Little Commissar," 24.
21 Belknap, Cold War Political Justice, 21.
22 Hardt and Negri, "Sovereignty."
23 This notebook is cited in "Affidavit of Benjamin J. Davis, Jr.," Communist Party of the United States, TAM 132 (box 7, folder 24), 1949, Tamiment Library.
24 "Presence of Evil," 23; Armed Forces Information Film, no. 5 (1960), www.youtube.com/watch?v=y1UHQ795K8k; Chamberlain, "Communist Trial."
25 HUAC, Infiltration of Minority Groups, 468.
26 "Evolution or Revolution," 26.
27 Nixon, "Plea for an Anti-Communist Faith," in Bentley, Thirty Years of Treason, 570.
28 "Little Commissar."
29 Quoted in Faiola and Russakoff, "Terrorists Next Door?," quoted in Ripley, "Fort Dix Conspiracy."
30 Each man also had a different status in the United States. Shnewer is a naturalized citizen, the Dukas are undocumented, and Tatar is a legal resident.
31 Of course they frame this as a reality. And indeed it is perhaps indisputable that the network structures the efforts of activists, terrorists, and governments alike. However, not all networks are equal, and their mapping requires effort.
32 Chamberlain, "Communist Trial."
33 Yang, "Terrorist Search Engine."
34 Apuzzo and Goldman, Enemies Within.
35 Granovetter, "Strength of Weak Ties," 1366, 1375.
36 Latour, "On Actor-Network Theory," 370.
37 Berger, "Metronome of Apocalyptic Time."
38 US v. Foster et al., Stenographer's Notes, vol. 3, 1405; vol. 4, 2209.
39 Ibid., vol. 3, 1404, 1715.
40 Philbrick, I Led 3 Lives, 71; US v. Foster et al., Stenographer's Notes, vol. 5, 2655.
41 US v. Foster et al., Stenographer's Notes, vol. 4, 2393.
42 Ibid., vol. 4, 2187–89; vol. 5, 2979–80.
43 Porter, "U.S. Reds Ordered to Revolt in 1945"; Porter, "Budenz Describes a U.S. 'Politburo.' "
44 Philbrick, I Led 3 Lives, 65.
45 "Brief on Constitutional Issues," Communist Party of the United States, TAM 132 (box 7, folder 27), 1949, Tamiment Library; Porter, "Communists Plan to 'Colonize' Key Industries Told at Trial."
46 Testimonies of Professor Davis and Granville Hicks in HUAC, Communist Methods of Infiltration—Education, 7, 99.
47 US v. Foster et al., Stenographer's Notes, vol. 5, 3001.
48 Alsultany, Arabs and Muslims in the Media.
49 United States v. Mohamad Ibrahim Shnewer, Dritan Duka, Eljvir Duka, Shain Duka, and Serdar Tatar, Court Transcripts, Criminal No. 07-CR-00459 (RBK), 2008, 3200.
50 Hussain and Ghalayini, "Christie's Conspiracy."
51 US v. Shnewer et al., Court Transcripts, 4344.
52 Hussain and Ghalayini, "Christie's Conspiracy."
53 US v. Shnewer et al., Court Transcripts, 3282–83.
54 Ibid., 4027.
55 Ibid., 5599.
56 Arquilla and Ronfeldt, Advent of Netwar, 10.
57 HUAC, Infiltration of Minority Groups, 454. Paul Robeson, a popular African American entertainer, had his travel to the Soviet Union used in this way to place him within the international Communist network. His statement that if America were to go to war with the Soviet Union African Americans would not fight in it was the supposed impetus for the hearings on Communist infiltration of minority groups.
58 US v. Foster et al., Stenographer's Notes, vol. 5, 2628.
59 Ibid., vol. 3, 1830.
60 "Brief on Constitutional Issues," 24.
61 US v. Foster et al., Stenographer's Notes, vol. 4, 2497.
62 Ibid., vol. 5, 2706.
63 "Brief on Constitutional Issues."
64 For a counterargument to this, see "Defense Closing Statement," Communist Party of the United States, TAM 132 (box 11, folder 9), 1949, Tamiment Library.
65 "Prosecution Closing Argument," Communist Party of the United States, TAM 132 (box 11, folder 10), 1949, Tamiment Library.
66 See Testimony of Alvin Stokes in HUAC, Infiltration of Minority Groups.
67 On the stand, Budenz equated recommending a text with advocacy, calling the former the "Communist method." US v. Foster et al., Stenographer's Notes, vol. 4, 2311–12.
68 US v. Shnewer et al., Court Transcripts, 6443; Hussain and Ghalayini, "Christie's Conspiracy." The six constants are (1) jihad will continue until Judgment Day, (2) jihad does not rely on a leader, (3) jihad is not tied to a particular land, (4) jihad does not depend on a specific battle, (5) victory in jihad is not equivalent to military victory, and (6) defeat in jihad is not equivalent to military defeat.
69 US v. Shnewer et al., Court Transcripts, 5830.
70 Ibid., 5912.
71 Ibid., 6486–87.
72 Ibid., 5914.
73 Ibid., 5943.
74 Ibid., 1571.
75 Ibid., 3561.
76 Ibid., 2950.
77 One is left to wonder how Budenz, who had read various Communist texts before joining the party, had not been infected—he claimed he had not "studied" the books. See US v. Foster et al., Stenographer's Notes, vol. 4, 2115–17. Philbrick, on the other hand, described himself as "natively so unreceptive to their doctrines that it was only by swallowing my gorge that I was able to convince them they should take me in the first place." Philbrick, I Led 3 Lives, 64.
78 Testimony of Joshua D. White in HUAC, Infiltration of Minority Groups, 2838, emphasis added.
79 "Brief on Constitutional Issues."
80 US v. Foster et al., Stenographer's Notes, vol. 3, 1675, quoted in "Due Process in a Political Trial," Communist Party of the United States, TAM 132 (box 7, folder 29), 1949, Tamiment Library.
81 "Prosecution Closing Argument."
82 US v. Foster et al., Stenographer's Notes, vol. 4, 1919.
83 Budenz, This Is My Story, 233.
84 US v. Foster et al., Stenographer's Notes, vol. 3, 1809.
85 Ibid., vol. 4, 2164, emphasis added.
86 Ibid., vol. 5, 3178–88.
87 Ibid., vol. 4, 2224.
88 "Brief on Constitutional Issues."
89 US v. Shnewer et al., Court Transcripts, 5834.
90 Friedman, "America vs. the Narrative."
91 US v. Shnewer et al., Court Transcripts, 2273.
92 Ibid., 4213–14.
93 Ibid., 4127.
94 Ibid., 2993.
95 Ibid., 6490, 6369.
96 Ibid., 5852.
97 Ibid., 1517–18.
98 Quoted in ibid., 4011.
99 Ibid., 5923–24.
Ibid., 6525.
Ibid., 1520.
Ibid., 5937–38.
Ibid., 5835.
Hussain, "Judge Upholds Life Sentences."
HUAC, Communist Methods of Infiltration—Education, 9.
"Little Commissar."
"Conviction of Communists."
Philbrick, I Led 3 Lives, 78.
Siesseger, "Conspiracy Theory," 1182.
Chun, Control and Freedom, 3.
Van Dijck, Culture of Connectivity.
US v. Shnewer et al., Court Transcripts, 3561.
Hu, Prehistory of the Cloud, xxvii.
CHAPTER 3. OPACITY AND TRANSPARENCY IN COUNTERTERRORISM
1 Parks, "Drones, Vertical Mediation, and the Targeted Class." See also Chow, Age of the World Target.
2 Marshall, Class, Citizenship, and Social Development.
3 Smith, Civic Ideals, 2. The denial of rights along these lines often happens in spite of formal equality. See also Sassen, Territory, Authority, Rights. Smith, Stories of Peoplehood; Anderson, Imagined Communities.
4 Al-Qaeda in the Arabian Peninsula, Inspire 3 (November 2010): 20; Inspire 9 (May 2012): 23, 30; Inspire 10 (March 2013): 50; Inspire 12 (March 2014): 14; Inspire 14 (September 2015): 70.
5 Al-Qaeda in the Arabian Peninsula, Inspire 11 (May 2013): 3.
6 Department of Homeland Security, If You See Something, Say Something Video file], [www.youtube.com/watch?v=6jAV1dbGPB4.
7 Al-Qaeda in the Arabian Peninsula, Inspire 4 (January 2011): 24; Inspire 2 (October 2010): 63.
8 For example, "Suleiman al-Halaby, 18th Century Lone Mujahid Assassin," Inspire 14 (September 2015): 30–31; al-Qaeda in the Arabian Peninsula, Inspire 13 (December 2014): 50.
9 Miller and Samuels, "Glossy Approach to Inciting Terrorism."
10 Ibid.
11 Brahimi, "Inspiring Extremism."
12 Al-Qaeda in the Arabian Peninsula, Inspire 1 (January 2010): 8–10. On poverty, see Inspire 1 (January 2010): 18; on racism, see Inspire 10 (March 2013): 29, and Inspire 14 (September 2015): 19.
13 Quoted in Millstone, "Anwar al-Awlaki Hails Rise of 'Western Jihad.' "
14 Quotes in order: Franklin, "Do Suicide Bombers Cancel Their Subscriptions?" (if Neumann is mistaken, it is all the more indicative of the phenomenon of the Double as the writers of Inspire can be misidentified as American); Napolitano, "Progress toward a More Secure and Resilient Nation"; Shane and Mekhennet, "Imam's Path."
15 Dreyfuss, "My Fellow Americans," 250.
16 Quoted in Ignatius, "Killing of Anwar Al-Aulaqi."
17 As with other terrorists, the media focused on his deviant and/or starved sexuality. Al-Awlaki not only visited prostitutes but mostly talked with them according to FBI surveillance transcripts.
18 Holmes, "Why Hasn't Yemen Hunted Down Anwar al-Awlaki?"; Symmes, "Anwar al-Awlaki"; Shane and Mekhennet, "Imam's Path."
19 Christopher Heffelfinger and Scott Shane in Boucek, "Rise of Anwar al-Awlaki."
20 Klaidman, Kill or Capture; Raghavan, "Anwar al-Aulaqi"; Shadid and Kirkpatrick, "As the West Celebrates."
21 Shane, "Judging a Long, Deadly Reach."
22 Ghosh, "How Dangerous is the Cleric Anwar al-Awlaki?"; Raghavan, "Anwar al-Aulaqi."
23 Heffelfinger, "Anwar Al-'Awlaqi." See also Holmes, "Why Hasn't Yemen Hunted Down Anwar al-Awlaki?"; Stanglin, "Al-Awlaki's Diatribes"; Shadid and Kirkpatrick, "As the West Celebrates"; Shane and Mekhennet, "Imam's Path."
24 Al-Arabiya, cited in Ghosh, "How Dangerous Is the Cleric Anwar al-Awlaki?"; Engelhardt, "Redefining the Language of War."
25 Rawnsley, "YouTube Yanks Jihadi Videos"; Shane, "Judging a Long, Deadly Reach."
26 Madhani, "Cleric al-Awlaki."
27 Greenberg, "Homegrown."
28 US Congress, Senate, Subcommittee on Terrorism, Technology, and Homeland Security, Terrorism: Radical Islamic Influence of Chaplaincy; US Congress, Senate, Committee on Homeland Security, Threat of Muslim-American Radicalization in U.S. Prisons (hereafter Threat of Muslim-American Radicalization); Hamm, "Prisoner Radicalization."
29 Government Exhibit 119-E1. All government exhibits have been retrieved from www.investigativeproject.org. The website is run by Steve Emerson, a key figure on the American paranoid right. He pushes a variety of conspiracy theories including that the Muslim Brotherhood has infiltrated all levels of the US government.
30 Wakin, "Imams Reject Talk"; Baker and Hernandez, "4 Accused of Bombing Plot."
31 Testimony of Michael P. Downing, Los Angeles Police Counterterrorism Officer, in Threat of Muslim-American Radicalization, 221, 232.
32 United States v. James Cromitie, David Williams, Onta Williams, and Laguerre Payen, Court Transcripts, Criminal No. 09-CR-00558, 2010, 38, 44–49.
33 Threat of Muslim-American Radicalization, 215.
34 Dunleavy is not referring to the Nation of Islam, despite its presence in US prisons. By the 1960s, the Nation of Islam boasted a membership of 65,000 to 100,000. This group had a largely apolitical separatist stance, but did file various lawsuits to claim rights for the incarcerated. The Nation of Islam historically provided a base of racial solidarity and collectivity for black prisoners, one whose focus on black superiority formed a threatening alternative imagined community antithetical to mainstream American white culture. It is discussed in the hearings concerning prison radicalization and is listed therein as a racist organization. However, the fears that this group may breed recruits for al-Qaeda are unlikely as the Nation of Islam has long been considered heretical by other Muslim sects and organizations. For example, an American prison convert, Kevin James, who founded a group called Jam'iyyat Ul-Islam Is-Saheeh (JIS) while in prison, has listed members of the Nation of Islam as legitimate targets of violence (though he himself was once a member). See Threat of Muslim-American Radicalization, 218; Gottschalk, Prison and the Gallows.
35 Quoted in Gray, "Why Was a Controversial Imam Shot 20 Times?" In his statement, Dunleavy emphasizes that an issue of Inspire magazine refers to al-Amin as a "political prisoner and faithful mujahid" (in Threat of Muslim-American Radicalization, 212).
36 Greenberg, "Homegrown." On this incident, see also Gray, "Why Was a Controversial Imam Shot 20 Times?" and White, "Luqman Ameen Abdullah."
37 US v. Cromitie et al., Court Transcripts, 16.
38 Government Exhibit 105A-E3.
39 US v. Cromitie et al., Court Transcripts, 3.
40 Napolitano, "Progress toward a More Secure and Resilient Nation."
41 Walter Benjamin, quoted in Vaughan-Williams, "Borderwork beyond Inside/Outside?," 70; see also Andrejevic, iSpy, 43; Sassen, Territory, Authority, Rights, 284.
42 Chung, "MTA Updates Famous 'See Something, Say Something' Campaign."
43 Al-Qaeda in the Arabian Peninsula, Inspire 13 (December 2014): 19.
44 All this despite evidence that the Muslim American community has been much more involved in terrorism prevention than others. See Schanzer, Kurzman, and Moosa, "Anti-terror Lessons of Muslim-Americans."
45 Butler, Precarious Life, 77.
46 Al-Awlaki was not the only American killed by a drone. Adam Gadahn (née Pearlman), a California native with Jewish roots who was raised Protestant, joined al-Qaeda and became an advisor to bin Laden. In 2006, he was indicted by a federal grand jury for treason; the indictment was largely based on the testimony of an FBI field agent. That day, Deputy Attorney General Paul J. McNulty warned, "Betrayal of our country will bring severe consequences." In January 2015, Gadahn was killed in Pakistan, though the administration claimed he was not directly targeted. See Eggen and DeYoung, "US Supporter of Al-Qaeda," and White House, "Statement by the Press Secretary."
47 Dehn and Heller, "Debate," 181. Here Dehn and Heller cite the 1863 Prize Cases, in which residents of Confederate states claimed that they, by the Constitution, were to be treated as "loyal citizens" until proved otherwise. The Court found that US citizenship did not exempt any individual enemy from actions allowed by the laws of war. Dehn and Heller further claim that this was maintained in Hamdi v. Rumsfeld (2004), Ex Parte Quirin (as to petitioner Haupt, 1942), Juragua Iron Co Ltd v. US (1909).
48 McKelvey, "Due Process Rights," 1356.
49 See statements in Baumann, "Jeff Goldberg Agrees"; Goodman, "Awlaki Killing Incites Criticism"; Wilson, "No Safe Haven Anywhere"; Kendall, "Guy Fawkes's Dangerous Remedy"; Qadhi, "Illegal and Counterproductive Assassination"; Shane, "Judging a Long, Deadly Reach."
50 Sassen, Territory, Authority, Rights.
51 Miller, "Secret Subjects, Open Secrets," 27.
52 Ibid., 19.
53 Divoll, "Who Says You Can Kill Americans, Mr. President?"
54 Nasser al-Awlaki v. Obama, Gates & Panetta (10–1469 JDB, 2010), <https://ecf.dcd.uscourts.gov>.
55 Quoted in Liptak, "Secrecy of Memo on Drone Killing Is Upheld."
56 Miller, "Secret Subjects, Open Secrets," 24.
57 Savage, "Secret U.S. Memo"; "Justice Department Memo Reveals Legal Case."
58 Masco, " 'Sensitive but Unclassified.' "
59 King quoted in Landler, "Obama Hailed after Awlaki Killing"; McCain quoted in Whitlock, "After Yemen Attack"; Reid quoted in Serwer, "Bipartisan Approval for Targeted Killing." Opinion polls in Drake, "Most Americans Believe"; Pew Research Center for the People and the Press, "Majority Views NSA Phone Tracking."
60 François, Open Secrets, 1.
61 Ross, "Legal Experts Dissect."
62 Dean, Publicity's Secret.
63 Sedgwick, Epistemology of the Closet, 8.
64 Miller, "Secret Subjects, Open Secrets," 27.
65 Quoted in Savage, "Not-Quite Confirmation of a Memo Approving Killing"; Brisbane, "Secrets of Government Killing"; video available at www.youtube.com/watch?v=WWKG6ZmgAX4.
66 Bergson, Laughter.
67 See, for example, Griswold, "(Ever-Growing) List of Cowards."
68 US v. Cromitie et al., Court Transcripts, 1567–70.
69 Ibid., 28.
70 Ibid., 1397.
71 Ibid., 1610.
72 Government Exhibit 119-E1.
73 Judge McMahon in US v. Cromitie et al., 2011.
74 US v. Cromitie et al., Court Transcripts, 1602–3.
75 Ibid., 1908.
76 Ibid., 740.
77 Sherman, " 'Person Otherwise Innocent.' "
78 Alexander, New Jim Crow; Wacquant, Punishing the Poor; Western, Punishment and Inequality in America; Thompson, "Why Mass Incarceration Matters"; Berger, Captive Nation.
79 Western, Punishment and Inequality in America, 192. The crime rate itself cannot account for the rise of mass incarceration as "new methods of counting crime"—which included the criminalization of urban spaces—distorted the size of the increase, nor can mass incarceration take credit for the subsequent drop in crime rates, accounting for only 10 percent of the drop by one study's measure.
80 Berger, Captive Nation, 18.
81 Thompson, "Why Mass Incarceration Matters," 716.
82 Wacquant, Punishing the Poor, 204–5. The ghetto is an important phenomenon for Wacquant. Even whites who accepted integration found ways to "keep distance" through the concentration of blacks in ghettos. So central was this separation that many liberal whites who supported Martin Luther King Jr. had turned on him when "he confronted the issue of the ghetto in the northern metropolis."
83 In fact, Cromitie's sister almost scoffed at the idea that he had converted: "They do a little time in jail and they don't eat pork no more." Quoted in Chan and Schweber, "Updates in Terror Plot."
84 Western, Punishment and Inequality in America, 198.
85 US v. Cromitie et al., Court Transcripts, 1545.
86 Quoted in ibid., 46.
87 Ibid., 79–81.
88 Harris, "Newburgh Four."
89 Quoted in Rayman, "Were the Newburgh 4 Really Out to Blow Up Synagogues?"; US v. Cromitie et al., Court Transcripts, 45.
90 Government Exhibit 112–E3.
91 US v. Cromitie et al., Court Transcripts, 54–55.
92 Ibid., 1827–31; Government Exhibit 116-E1.
93 US v. Cromitie et al., Court Transcripts, 1869.
94 Ibid., 1795–1801, 1880–81.
95 Quoted in Fahim, "Agent Wanted Backup Charge."
96 US v. Cromitie et al., Court Transcripts, 1900.
97 Judge McMahon quoted in Moynihan, "Entrapment Argued."
98 Judge McMahon quoted in Weiser, "3 Men Get 25 Years."
99 Cromitie quoted in Weiser, "3 Men Get 25 Years"; Williams in Rayman, "Were the Newburgh 4 Really Out to Blow Up Synagogues?"
NO EXIT
1 Allen, "Dzhokhar Tsarnaev and His Fangirls"; Le Tellier, "Dzhokhar Tsarnaev and His Disgusting Fangirls"; Bruenig, "Dzhokhar Tsarnaev's Female Supporters Are Not 'Fangirls.' "
2 A friend, quoted in Reitman, "Jahar's World," 48.
3 Remnick, "Culprits."
4 Dzhokhar's wrestling coach, quoted in Reitman, "Jahar's World," 48.
5 Fyodor Dostoyevsky's The Double, quoted in Rank, Double, 30.
6 Taibbi, "Explaining the Rolling Stone Cover."
7 Reitman, "Jahar's World," 53; Jacobs, Filipov, and Wen, "Fall of the House of Tsarnaev."
8 Wines and Lovett, "Dark Side, Carefully Masked."
9 Reitman, "Jahar's World," 54, 53, 55. After the bombing there were tributes to the brothers in Inspire magazine, another reappropriation of disparate events by al-Qaeda in the Arabian Peninsula.
10 Ioffe, "Boston Bombing Suspects."
11 Reitman, "Jahar's World," 55.
12 Cullison, "Family Terror."
13 Wines and Lovett, "Dark Side, Carefully Masked."
14 Reitman, "Jahar's World," 55, 52, emphasis original.
15 Quoted in Remnick, "Culprits."
16 Dewey, "Obscure Russian Jihadist"; Harding and Dodd, "Tamerlan Tsarnaev's YouTube Account"; Reitman, "Jahar's World," 55. The contact with Russia was so troubling that a congressional party was sent there to investigate.
17 Wines and Lovett, "Dark Side, Carefully Masked."
18 On the limits of online bomb-making instructions, see Kenney, "Beyond the Internet." At the time of writing there were twenty-eight such cases: seventeen involved informants, six involved hands-on training abroad, and the remaining five all failed, save the Tsarnaevs. Data retrieved from "Terrorism in America after 9/11."
19 Field and Almasy, "Did the Tsarnaev Brothers Have Help?"
20 Quoted in Reitman, "Jahar's World," 57.
21 Ioffe, "Boston Bombing Suspects."
22 Cullison, "Family Terror."
23 Debrix and Barder, Beyond Biopolitics; Jacques Derrida in Borradori, Philosophy in a Time of Terror.
24 Bolton, "Barack Obama Declares Defeat."
25 Reilly, "Dzhokhar Tsarnaev Will Not Be Treated as Enemy Combatant"; Ungar, "Senator Lindsey Graham Says Suspend the Constitution."
26 Tiqqun, Introduction to Civil War. An interesting example of this type of practice is that of naturalization through military service. Noncitizens prove their allegiance by risking their lives and, in return, gain citizenship.
27 For example, Pearson, McPike, and Cooper, "What Did Suspected Bomber's Widow Know?"
28 Comment in "Katherine Russell Not Involved in Boston Bombing."
29 The women in Dzhokhar's life received a similar amount of attention. Newsweek's October 24, 2014, cover featured a black-and-white drawing of Dzhokhar Tsarnaev accompanied by his sisters Ailina and Bella. The caption read "Twisted Sisters," suggesting that the women pushed for "jihad."
30 Shel Silverstein, "Cover of the Rolling Stone," recorded by Dr. Hook & the Medicine Show on Sloppy Seconds (San Francisco, CA: Columbia Records, 1972). The band made it on the cover the following year.
31 "You Are Either with Us or against Us."
32 In Borradori, Philosophy in a Time of Terror; Derrida, Politics of Friendship. Others who have addressed this theme include Galloway and Thacker, Exploit; Masco, Theater of Operations.
33 De Quincey, "Milton versus Southey and Landor," 202.
34 Foucault, Society Must Be Defended, 256.
35 Quoted in Pearson, "Trooper Who Leaked Boston Bomber Pictures."
36 Freud, " 'Uncanny,' " 219.
37 Debrix and Barder, Beyond Biopolitics, 109. Here they are building on Carlo Galli's notion of "Global War."
38 Bergen and Sterman, "First Line of Defense."
39 Foucault, "About the Concept of the 'Dangerous Individual,' " 17.
40 Attempts to humanize those labeled terrorist need to be assessed critically. In addition to being appropriated into security discourse, as I have outlined in this book, there is certainly a racial component concerning who can and who cannot be humanized. That is, Tsarnaev "looks the part" while others certainly do not. Even in the case of Tsarnaev there are limits. Journalist Masha Gessen received much criticism for being too empathetic toward the brothers in her book about them. See Gessen, The Brothers.
41 Gombrowicz, Cosmos, 89.
EPILOGUE
1 Full text is available online at www.thehill.com. Note that all emphases and caps are from the original.
2 Akyol and Ali, "This Wasn't a Speech about Islam."
3 Dockray, "President Trump Finally Calls Portland Attack 'Unacceptable.' "
4 Quoted in Rossoll, "McMaster Hints."
5 Hubbard, "ISIS Turns Saudis."
BIBLIOGRAPHY
Aaronson, Trevor. The Terror Factory: Inside the FBI's Manufactured War on Terrorism. Brooklyn, NY: Ig Publishing, 2014.
Ackerman, Spencer. "DHS Crushed This Analyst for Warning about Far-Right Terror." Wired, August 7, 2012. www.wired.com.
Agamben, Giorgio. Homo Sacer: Sovereign Power and Bare Life. Translated by Daniel Heller-Roazen. Stanford, CA: Stanford University Press, 1998.
________. State of Exception. Translated by Kevin Attell. Chicago: University of Chicago Press, 2005.
Akyol, Mustafa, and Wajahat Ali. "This Wasn't a Speech about Islam." New York Times, May 21, 2017. www.nytimes.com.
Alexander, Michelle. The New Jim Crow: Mass Incarceration in the Age of Colorblindness. New York: New Press, 2010.
Alexander, Yonah, Phil Baum, and Raphael Danziger. "Terrorism: Future Threats and Responses." Terrorism 7, no. 4 (1985): 367–410. doi:10.1080/10576108508435587.
Ali Musawi, Mohammed. Cheering for Osama: How Jihadists Use Internet Discussion Forums. London: Quilliam, 2010. www.quilliaminternational.com.
Allen, Charlotte. "Dzhokhar Tsarnaev and His Fangirls." Los Angeles Times, May 22, 2013. www.latimes.com.
Alsultany, Evelyn. Arabs and Muslims in the Media: Race and Representation after 9/11. New York: New York University Press, 2012.
Amoore, Louise. The Politics of Possibility: Risk and Security beyond Probability. Durham, NC: Duke University Press, 2013.
Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. New York: Verso, 1983.
Andrejevic, Mark. iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas, 2007.
Animal Liberation Front. "ALF Credo." N.d. www.animalliberationfront.com.
________. "Manifesto for Radical Abolitionism: Total Liberation by Any Means Necessary." N.d. www.animalliberationfront.com.
Appadurai, Arjun. Fear of Small Numbers: An Essay on the Geography of Anger. Durham, NC: Duke University Press, 2006.
Apuzzo, Matt, and Adam Goldman. Enemies Within: Inside the NYPD's Secret Spying Unit and Bin Laden's Final Plot against America. New York: Touchstone, 2013.
Archetti, Cristina. "Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age." Perspectives on Terrorism 9, no. 1 (2015). www.terrorismanalysts.com.
Arquilla, John, and David Ronfeldt. The Advent of Netwar. Santa Monica, CA: RAND, 1996.
Ascroft, Edward. "Lacan's Desire and Dostoevsky's Double: The Problematics of Psychoanalytic Discourse in a Fictional Psychosis." Dostoevsky Journal 6 (2005): 1–20.
Badiou, Alain. Infinite Thought. London: Bloomsbury Academic, 2005.
Badolato, Edward V. "Environmental Terrorism: A Case Study." Studies in Conflict & Terrorism 14, no. 4 (1991): 237–39.
Baker, Al, and Javier C. Hernandez. "4 Accused of Bombing Plot at Bronx Synagogues." New York Times, May 21, 2009, A1.
Barcott, Bruce. "From Tree-Hugger to Terrorist." New York Times, April 7, 2002. www.nytimes.com.
Baumann, Nick. "Jeff Goldberg Agrees with... Glenn Greenwald? About Anwar al-Awlaki?" Mother Jones, November 16, 2010. www.motherjones.com.
Beck, Ulrich. "Living in the World Risk Society." Economy and Society 35, no. 3 (2006): 329–45. doi:10.1080/03085140600844902.
Beirich, Heidi, and Mark Potok. "USA: Hate Groups, Radical-Right Violence, on the Rise." Policing 3, no. 3 (2009): 255–63. doi:10.1093/police/pap020.
Belknap, Michal R. Cold War Political Justice: The Smith Act, the Communist Party, and American Civil Liberties. Westport, CT: Praeger, 1977.
Bentley, Eric. Thirty Years of Treason: Excerpts from Hearings before the House Committee on Un-American Activities 1938–1968. New York: Viking, 1971.
Bergen, Peter, and David Sterman. "First Line of Defense against Terrorism: Mom and Dad." CNN, October 29, 2014. www.cnn.com.
Berger, Dan. Captive Nation: Black Prison Organizing in the Civil Rights Era. Chapel Hill: University of North Carolina Press, 2014.
Berger, J. M. "Anwar al-Awlaki's Links to the September 11 Hijackers." Atlantic, September 9, 2011. www.theatlantic.com.
________. "The Metronome of Apocalyptic Time: Social Media as Carrier Wave for Millenarian Contagion." Perspectives on Terrorism 9, no. 4 (2015). www.terrorismanalysts.com.
Bergson, Henri Louis. Laughter—An Essay on the Meaning of the Comic. Translated by Cloudesley Brereton and Fred Rothwell. New York: Macmillan, 1917.
Best, Steven, and Anthony J. Nocella. Terrorists or Freedom Fighters? Reflections on the Liberation of Animals. New York: Lantern Books, 2004.
Bhabha, Homi K. The Location of Culture. London: Routledge, 2004.
Bjelopera, Jerome P. The Domestic Terrorist Threat: Background and Issues for Congress. Washington, DC: Congressional Research Service, 2012. <http://digital.library.unt.edu>.
Bloom, Robert M. "A Historical Overview of Informants." Legal Studies Research Paper Series (Boston College Law School) 64 (2005). <https://papers.ssrn.com>.
Bolton, John. "John Bolton: Barack Obama Declares Defeat in Global War on Terror." Daily Beast, January 30, 2017. www.thedailybeast.com.
Borges, Jorge Luis. The Book of Imaginary Beings. Translated by Andrew Hurley. New York: Penguin, 2006.
Borradori, Giovanna. Philosophy in a Time of Terror: Dialogues with Jurgen Habermas and Jacques Derrida. Chicago: University of Chicago Press, 2003.
Boucek, Christopher. "The Rise of Anwar al-Awlaki." Washington, DC: Carnegie Endowment for International Peace, June 1, 2010. <http://carnegieendowment.org>.
"The Boy Who Cried 'ELF.' " Wall Street Journal, February 14, 2001. www.wsj.com.
Brahimi, Alia. "The 'Changing' Face of Al-Qaeda." Al-Jazeera, July 5, 2011. www.aljazeera.com.
________. "Inspiring Extremism." Majalla Magazine, March 27, 2013. <http://eng.majalla.com>.
Brisbane, Arthur S. "The Secrets of Government Killing." New York Times, October 9, 2011, SR12.
Brooks, David. "The Rush to Therapy." New York Times, November 9, 2009. www.nytimes.com.
Brown, Wendy. Walled States, Waning Sovereignty. New York: Zone Books, 2014.
Bruenig, Elizabeth Stoker. "Dzhokhar Tsarnaev's Female Supporters Are Not 'Fangirls.' " Atlantic, July 12, 2013. www.theatlantic.com.
Budenz, Louis F. This Is My Story. New York: McGraw-Hill, 1949.
Butler, Judith. Precarious Life: The Powers of Mourning and Violence. New York: Verso, 2004.
Chamberlain, William Henry. "The Communist Trial." Wall Street Journal, October 20, 1949.
Chan, Sewell, and Nate Schweber. "Updates in Terror Plot." New York Times, May 21, 2009. <https://cityroom.blogs.nytimes.com>.
Chase, Alston. Harvard and the Unabomber: The Education of an American Terrorist. New York: Norton, 2003.
"Chorus of Protest Grows over Report Warning of Right Wing Radicalization." Fox News, April 15, 2009. www.foxnews.com.
Chow, Rey. The Age of the World Target: Self-Referentiality in War, Theory, and Comparative Work. Durham, NC: Duke University Press, 2006.
Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fiber Optics. Cambridge, MA: MIT Press, 2006.
Chung, Jen. "MTA Updates Famous 'See Something, Say Something' Campaign with Real NYers Who Saw Something, Said Something." Gothamist, March 3, 2016. <http://gothamist.com>.
Coates, Paul. The Double and the Other: Identity as Ideology in Post-romantic Fiction. New York: Palgrave Macmillan, 1988.
"The Condition of Kansas." New York Times, August 13, 1856. www.nytimes.com.
"Conviction of Communists [Op-Ed]." Portland (ME) Press-Herald, October 16, 1949.
Craven, Julia. "Dylann Roof Wasn't Charged with Terrorism Because He's White." Huffington Post, July 24, 2015. www.huffingtonpost.com.
Crawley, Alfred E. "Doubles." In Encyclopedia of Religion and Ethics IV, edited by James Hastings, 853–60. New York: Charles Scribner's Sons, 1908.
Cullison, Alan. "A Family Terror: The Tsarnaevs and the Boston Bombing." Wall Street Journal, December 14, 2013. www.wsj.com.
Curry, Michael, director. If a Tree Falls: A Story of the Earth Liberation Front. USA: Oscilloscope, 2011.
Dao, James, and Serge F. Kovaleski. "Hatecore Music Is Called White Supremacist Recruiting Tool." New York Times, August 8, 2012, A10.
Dean, Jodi. Publicity's Secret: How Technoculture Capitalizes on Democracy. Ithaca, NY: Cornell University Press, 2002.
Debrix, Francois, and Alexander D. Barder. Beyond Biopolitics: Theory, Violence, and Horror in World Politics. New York: Routledge, 2012.
Dehn, John C., and Kevin Jon Heller. "Debate: Targeted Killing: The Case of Anwar Al-Aulaqi." University of Pennsylvania Law Review PENNumbra 159 (2011): 175–201.
Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Translated by Brian Massumi. Minneapolis: University of Minnesota Press, 1987.
Department of Homeland Security. "Domestic Terrorism and Homegrown Violent Extremism Lexicon." November 10, 2011. www.dhs.gov.
De Quincey, Thomas. "Milton versus Southey and Landor." In The Notebook of an Opium-Eater, and Miscellaneous Essays, 193–216. Boston: J.R. Osgood, 1873.
Derrida, Jacques. The Politics of Friendship. Translated by George Collins. London: Verso, 2006.
Desphande, Nick, and Howard Ernst. "Countering Eco-terrorism in the United States: The Case of Operation Backfire." College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism, 2012. www.start.umd.edu.
Dewey, Caitlin. "The Obscure Russian Jihadist Whom Tamerlan Tsarnaev Followed Online." Washington Post, April 24, 2013. www.washingtonpost.com.
Dilling, Elizabeth Kirkpatrick. The Red Network: A Who's Who and Handbook of Radicalism for Patriots. Chicago: Published by the Author, 1934.
"Discouraging to 'Fanatics.' " New York Times, October 5, 1857. www.nytimes.com.
Ditrych, Ondrej. "From Discourse to Dispositif: States and Terrorism between Marseille and 9/11." Security Dialogue 44, no. 3 (2013): 223–40. doi:10.1177/0967010613484076.
Divoll, Vicki. "Who Says You Can Kill Americans, Mr. President?" New York Times, January 16, 2013. www.nytimes.com.
Dockray, Heather. "President Trump Finally Calls Portland Attack 'Unacceptable'—But Slyly Avoids His Base," May 29, 2017. www.mashable.com.
Donnelly, Michael. "Criminalizing Dissent." Counterpunch, May 24, 2006. www.counterpunch.org.
Drabelle, Dennis. "Extremism in the Defense of Trees." Washington Post, March 24, 1991. www.washingtonpost.com.
Drake, Bruce. "Most Americans Believe Government Surveillance Program Helped Prevent Terrorist Attacks." Pew Research Center, 2013. www.pewresearch.org.
Dreyfuss, Mike. "My Fellow Americans, We Are Going to Kill You: The Legality of Targeting and Killing U.S. Citizens Abroad." Vanderbilt Law Review 56 (2012): 249–92.
Dryden, Linda. The Modern Gothic and Literary Doubles: Stevenson, Wilde and Wells. New York: Palgrave Macmillan, 2003.
Edgerton, David. The Shock of the Old: Technology and Global History since 1900. Oxford: Oxford University Press, 2007.
Eggen, Dan, and Karen DeYoung. "U.S. Supporter of Al-Qaeda Is Indicted on Treason Charge." Washington Post, October 12, 2006. www.washingtonpost.com.
Eichenwald, Kurt. "Right-Wing Extremists Are a Bigger Threat to America Than ISIS." Newsweek, February 4, 2016. www.newsweek.com.
Engelhardt, Tom. "Redefining the Language of War: Nine Words with New Meanings." Mother Jones, June 23, 2011. www.motherjones.com.
Erickson, Mark. "Network as Metaphor." International Journal of Criminology and Sociological Theory 5, no. 2 (2012): 912–21.
"Evolution or Revolution." Time, April 4, 1949, 26.
Fahim, Kareem. "Agent Wanted Backup Charge in Synagogue Bomb Case." New York Times, August 27, 2010, A16.
Faiola, Anthony, and Dale Russakoff. "The Terrorists Next Door?" Washington Post, May 10, 2007. www.washingtonpost.com.
Federal Bureau of Investigation. "FBI Analysis of Terrorist Incidents in the United States—1982." Terrorism 7, no. 1 (1984): 87–117. doi:10.1080/10576108408435564.
________. "White Supremacist Recruitment of Military Personnel after 9/11." July 7, 2008. www.splcenter.org.
Ferris, Joshua. "Let Us Now Praise Infamous Men." New York Times Style Magazine, September 15, 2013.
Field, Alexandra, and Steve Almasy. "Did the Tsarnaev Brothers Have Help Making the Boston Marathon Bombs?" CNN, March 5, 2015. www.cnn.com.
Fleming, Paul. "Doppelgänger/Doppeltgänger." Cabinet, 14 (Summer 2004). www.cabinetmagazine.org.
Foucault, Michel. "About the Concept of the 'Dangerous Individual' in 19th-Century Legal Psychiatry." Translated by Alain Baudot and Jane Couchman. International Journal of Law and Psychiatry 1, no. 1 (1978): 1–18.
________. Security, Territory, Population: Lectures at the Collège de France 1977—1978. Edited by Michel Senellart. Translated by Graham Burchell. New York: Picador, 2009.
________. Society Must Be Defended: Lectures at the Collège de France, 1975–1976. Translated by David Macey. New York: Picador, 2003.
Fox News Sunday. Fox News, November 8, 2009. www.foxnews.com.
François, Anne-Lise. Open Secrets: The Literature of Uncounted Experience. Stanford, CA: Stanford University Press, 2008.
Franklin, O. "Do Suicide Bombers Cancel Their Subscriptions? Uncovering Inspire, Al-Qaeda's Jihadist Magazine." British GQ, April 24, 2013.
Freeman, F. L. "Communist Trial [Letter to the Editor]." Washington Post, February 9, 1949.
Freud, Sigmund. "The 'Uncanny.' " In The Standard Edition of the Complete Psychological Works of Sigmund Freud, XVII (1917–1919): An Infantile Neurosis and Other Works, 217–56. New York: Norton, 1919.
Friedman, Thomas L. "America vs. the Narrative." New York Times, November 28, 2009. www.nytimes.com.
Gaffney, Frank J., Jr. "The Siren Call of Shariah." Washington Times, November 10, 2009. www.washingtontimes.com.
Galli, Carlo. "On War and on the Enemy." Translated by Amanda Minervini and Adam Sitze. CR: The New Centennial Review 9, no. 2 (2010): 195–219. doi:10.1353/ncr.0.0070.
Galloway, Alexander R., and Eugene Thacker. The Exploit: A Theory of Networks. Minneapolis: University of Minnesota Press, 2007.
Genosko, Gary, and Scott Thompson. "Tense Theory: The Temporalities of Surveillance." In Theorizing Surveillance: The Panopticon and Beyond, edited by Gary Genosko and David Lyon, 123–38. Cullompton, Devon: Willan, 2006.
Gessen, Masha. The Brothers: The Road to an American Tragedy. New York: Riverhead Books, 2015.
Ghosh, Bobby. "How Dangerous Is the Cleric Anwar al-Awlaki?" Time, January 13, 2010. www.time.com.
Goldstein, Robert Justin. American Blacklist: The Attorney General's List of Subversive Organizations. Lawrence: University Press of Kansas, 2008.
Gombrowicz, Witold. Cosmos: A Novel. Translated by Danuta Borchardt. New York: Grove Press, 2011.
Gomez, Dayana Morales. "Robert Doggart, Man Who Allegedly Plotted to Kill Muslims, Indicted on Federal Charges." Huffington Post, July 7, 2015. www.huffingtonpost.com.
Goode, Erica, and Serge F. Kovaleski. "Wisconsin Killer Fed and Was Fueled by Hate-Driven Music." New York Times, August 6, 2012. www.nytimes.com.
Goodman, J. David. "Awlaki Killing Incites Criticism on Left and Libertarian Right." New York Times, September 30, 2011. <https://thelede.blogs.nytimes.com>.
Gottschalk, Marie. The Prison and the Gallows: The Politics of Mass Incarceration in America. Cambridge: Cambridge University Press, 2006.
Granovetter, Mark S. "The Strength of Weak Ties." American Journal of Sociology 78, no. 6 (1973): 1360–80.
Gray, Steven. "Why Was a Controversial Imam Shot 20 Times?" Time, February 1, 2010. www.time.com.
"Green Monsters [Op-Ed]." Washington Post, June 13, 1992.
Greenberg, Karen J. "Homegrown: The Rise of American Jihad." New Republic, May 21, 2010. www.newrepublic.com.
Griswold, Alex. "The (Ever-Growing) List of Cowards Refusing to Publish the Mohammad Cartoons." Daily Caller, January 7, 2015. <http://dailycaller.com>.
Gruen, Lori, Peter Singer, and David Hine. Animal Liberation: A Graphic Guide. London: Camden Press, 1987.
Guerard, Albert J. "Concepts of the Double." In Stories of the Double, edited by Albert J. Guerard, 1–14. Philadelphia: J. B. Lippincott, 1967.
Hall, Stuart. "The Question of Cultural Identity." In Modernity: An Introduction to Modern Societies, edited by Stuart Hall, David Held, Don Hubert, and Kenneth Thompson, 595–634. Malden, MA: Wiley-Blackwell, 1996.
Hallam, Clifford. "The Double as Incomplete Self: Toward a Definition of Doppelgänger." In Fearful Symmetry: Doubles and Doubling in Literature and Film, edited by Eugene J. Crook, 1–31. Tallahassee: University Press of Florida, 1982.
Hamm, Mark S. "Prisoner Radicalization: Assessing the Threat in U.S. Correctional Institutions." National Institute of Justice Journal 261 (October 27, 2008). www.nij.gov.
Harding, Luke, and Vikram Dodd. "Tamerlan Tsarnaev's YouTube Account Shows Jihadist Radicalisation in Pictures." Guardian, April 22, 2013. www.theguardian.com.
Hardt, Michael, and Antonio Negri. "Sovereignty." In Reflections on Empire, edited by Antonio Negri, 49–59. Cambridge: Polity, 2008.
Harris, Paul. "Newburgh Four: Poor, Black, and Jailed under FBI 'Entrapment' Tactics." Guardian, December 12, 2011. www.theguardian.com.
Heffelfinger, Christopher. "Anwar Al-'Awlaqi: Profile of a Jihadi Radicalizer | Combating Terrorism Center at West Point." Combating Terrorism Center Sentinel 3, no. 3 (2010): 1–4.
Heim, Joe. "Wisconsin Shooter Embraced 'Hate Rock.' " Washington Post, August 8, 2012. www.washingtonpost.com.
Herbert, Bob. "Stress Beyond Belief." New York Times, November 6, 2009. www.nytimes.com.
Herdman, J. The Double in Nineteenth-Century Fiction. New York: St. Martin's Press, 1991.
Holmes, Oliver. "Why Hasn't Yemen Hunted Down Anwar al-Awlaki?" Time, November 9, 2010.
"The Horror at Fort Hood." New York Times, November 6, 2009. www.nytimes.com.
"H.R. 1777 (100th): Foreign Relations Authorization Act, Fiscal Years 1988 and 1989." GovTrack, n.d. www.govtrack.us.
Hu, Tung-Hui. A Prehistory of the Cloud. Cambridge, MA: MIT Press, 2015.
Hubbard, Ben. "ISIS Turns Saudis against the Kingdom, and Families against Their Own," New York Times, March 31, 2016. www.nytimes.com.
Huntington, Samuel P. "The Clash of Civilizations?" Foreign Affairs, June 1, 1993.
Hussain, Murtaza. "Judge Upholds Life Sentences in Fort Dix Plot, but Advocates Say Fight Will Go On." Intercept, June 3, 2016. <https://theintercept.com>.
Hussain, Murtaza, and Razan Ghalayini. "Christie's Conspiracy: The Real Story behind the Fort Dix Five Terror Plot." Intercept, June 25, 2015. <https://theintercept.com>.
Ignatius, David. "The Killing of Anwar Al-Aulaqi: The White House's Drone Attack Policy." Washington Post, September 30, 2011. www.washingtonpost.com.
Ioffe, Julia. "The Boston Bombing Suspects Were Reared in Both Chechnya and America." New Republic, April 19, 2013. www.newrepublic.com.
Jackson, Richard. "An Argument for Terrorism." Perspectives on Terrorism 2, no. 2 (2008): 25–32.
Jacobs, Frank. "Cartography's Favourite Map Monster: The Land Octopus." Big Think, July 4, 2011. <http://bigthink.com>.
Jacobs, Sally, David Filipov, and Patricia Wen. "The Fall of the House of Tsarnaev." Boston Globe, December 15, 2013. www.bostonglobe.com.
Johnston, David, and Scott Shane. "U.S. Knew of Suspect's Tie to Radical Cleric, Authorities Say." New York Times, November 9, 2009. www.nytimes.com.
"Justice Department Memo Reveals Legal Case for Drone Strikes on Americans." NBC News, February 4, 2013. <http://investigations.nbcnews.com>.
"Katherine Russell Not Involved in Boston Bombing, Dzhokhar Tsarnaev Allegedly Says." Huffington Post, May 8, 2013. www.huffingtonpost.com.
Kendall, Emily C. "Guy Fawkes's Dangerous Remedy: The Unconstitutionality of Government-Ordered Assassination against U.S. Citizens and Its Implications for Due Process in America." John Marshall Law Review 45 (2012): 1121–50.
Kenney, Michael. "Beyond the Internet: Mētis, Techne, and the Limitations of Online Artifacts for Islamist Terrorists." Terrorism and Political Violence 22, no. 2 (2010): 177–97.
Klaidman, Daniel. Kill or Capture: The War on Terror and the Soul of the Obama Presidency. Boston: Houghton Mifflin Harcourt, 2012.
Kocieniewski, David. "6 Men Arrested in a Terror Plot against Fort Dix." New York Times, May 9, 2007, A1.
Krauthammer, Charles. "Medicalizing Mass Murder." Washington Post, November 13, 2009. www.washingtonpost.com.
Krueger, Alan B., and Jitka Malečková. "Education, Poverty and Terrorism: Is There a Causal Connection?" Journal of Economic Perspectives 17, no. 4 (2003): 119–44.
Kumar, Deepa. "Framing Islam: The Resurgence of Orientalism during the Bush II Era." Journal of Communication Inquiry 34, no. 3 (2010): 254–77. doi:10.1177/0196859910363174.
________. Islamophobia and the Politics of Empire: The Cultural Logic of Empire. Chicago: Haymarket Books, 2012.
Kundnani, Arun. The Muslims Are Coming! Islamophobia, Extremism, and the Domestic War on Terror. New York: Verso, 2015.
Landler, Mark. "Obama Hailed after Awlaki Killing, but for How Long?" New York Times, September 30, 2011. <https://thecaucus.blogs.nytimes.com>.
Laqueur, Walter. The New Terrorism: Fanaticism and the Arms of Mass Destruction. Oxford: Oxford University Press, 1999.
Laris, Michael, Sandhya Somashekhar, and Carol D. Leonnig. "Gunman in Wisconsin Was Deeply Involved in White-Supremacist Music Scene." Washington Post, August 7, 2012. www.washingtonpost.com.
Latour, Bruno. "On Actor-Network Theory: A Few Clarifications." Soziale Welt 47, no. 4 (1996): 369–81.
________. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2005.
Leader, Stefan H., and Peter Probst. "The Earth Liberation Front and Environmental Terrorism." Terrorism and Political Violence 15, no. 4 (2003): 37–58. doi:10.1080/09546550390449872.
Lec, Stanisław Jerzy. Myśli Nieuczesane. Kraków, Poland: Wydawnictwo Literackie, 1957/1968.
Lee, Chris. "Inside the Creepy World of 'Hate Music.' " Daily Beast, January 30, 2017. www.thedailybeast.com.
Lee, Martha. Earth First! Environmental Apocalypse. Syracuse, NY: Syracuse University Press, 1995.
Lemke, Thomas. " 'A Zone of Indistinction'—A Critique of Giorgio Agamben's Concept of Biopolitics." N.d. www.thomaslemkeweb.de.
Lerner, Max. "Ideas as Criminals [Op-Ed]." New York Post, October 17, 1949.
Le Tellier, Alexandra. "Dzhokhar Tsarnaev and His Disgusting Fangirls." Los Angeles Times, July 10, 2013. www.latimes.com.
Lewis, Bernard. "The Roots of Muslim Rage." Atlantic Monthly, September 1990.
Leyden, T. J. "I Used to Be a Skinhead Op-Ed]." Washington Post, August 12, 2012. [www.washingtonpost.com.
Lia, Brynjar. Architect of Global Jihad: The Life of Al-Qaeda Strategist Abu Mus'ab Al-Suri. Oxford: Oxford University Press, 2008.
Liptak, Adam. "Secrecy of Memo on Drone Killing Is Upheld." New York Times, January 3, 2013, A17.
"The Little Commissar." Time, April 25, 1949, 24.
Lizama, Natalia. "A Body of Information: Posthumanism, the Digital Doppelgänger and Don DeLillo's White Noise." In The Poetics of Shadows: The Double in Literature and Philosophy, edited by Andrew Hock Soon Ng, 162–75. Stuttgart: ibidem-Verlag, 2008.
Lyon, David. Surveillance Society: Monitoring Everyday Life. Philadelphia: Open University Press, 2001.
Mackey, Robert. "Mass Shooting at Fort Hood." New York Times, November 5, 2009. <https://thelede.blogs.nytimes.com>.
________. "Updates on the Shootings at Fort Hood." New York Times, November 6, 2009. <https://thelede.blogs.nytimes.com>.
Madhani, Aamer. "Cleric al-Awlaki Dubbed 'bin Laden of the Internet.' " USA Today, August 24, 2010. www.usatoday.com.
Madison, Lucy. "Attorney General Eric Holder: Threat of Homegrown Terrorism 'Keeps Me Up at Night.' " CBS News, December 21, 2010. www.cbsnews.com.
Mamdani, Mahmood. Good Muslim, Bad Muslim: America, the Cold War, and the Roots of Terror. New York: Harmony, 2005.
Markon, Jerry. "Judge Slashes Sentences of 2 in 'Va. Jihad.' " Washington Post, February 25, 2006. www.washingtonpost.com.
Marshall, Thomas Humphrey. Class, Citizenship, and Social Development. Chicago: University of Chicago Press, 1973.
Masco, Joseph. " 'Sensitive but Unclassified': Secrecy and the Counterterrorist State." Public Culture 22, no. 3 (2010): 433–63. doi:10.1215/08992363–2010–004.
________. The Theater of Operations: National Security Affect from the Cold War to the War on Terror. Durham, NC: Duke University Press, 2014.
Massumi, Brian. "Potential Politics and the Primacy of Preemption." Theory & Event 10, no. 2 (2007). doi:10.1353/tae.2007.0066.
McCauley, Clark, and Sophia Moskalenko. "Mechanisms of Political Radicalization: Pathways toward Terrorism." Terrorism and Political Violence 20, no. 3 (2008): 415–33. doi:10.1080/09546550802073367.
McKelvey, Benjamin. "Due Process Rights and the Targeted Killing of Suspected Terrorists: The Unconstitutional Scope of Executive Killing Power." Vanderbilt Journal of Transnational Law 44 (2011): 1353–84.
Merari, Ariel. "A Classification of Terrorist Groups." Terrorism 1, nos. 3–4 (1978): 331–46. doi:10.1080/10576107808435418.
Michael, George. Lone Wolf Terror and the Rise of Leaderless Resistance. Nashville, TN: Vanderbilt University Press, 2012.
Miller, D. A. "Secret Subjects, Open Secrets." Dickens Studies Annual 14 (1985): 17–38.
Miller, Judith, and David Samuels. "A Glossy Approach to Inciting Terrorism." Wall Street Journal, November 27, 2010. www.wsj.com.
Millstone, Ken. "Anwar al-Awlaki Hails Rise of 'Western Jihad.' " CBS News, March 22, 2010. www.cbsnews.com.
Moghaddam, Fathali M. "The Staircase to Terrorism: A Psychological Exploration." American Psychologist 60, no. 2 (2005): 161–69. doi:10.1037/0003–066X.60.2.161.
Morreall, John. "A New Theory of Laughter." Philosophical Studies 42, no. 2 (1982): 243–54.
Moss, Michael. "Muslims at Fort Voice Outrage and Ask Questions." New York Times, November 7, 2009, A17.
Moynihan, Colin. "Entrapment Argued in Bomb-Plot Appeal." New York Times, March 25, 2011, A24.
Murphie, Andrew. "Sound at the End of the World as We Know It." In Deleuze and Guattari: Critical Assessments of Leading Philosophers, edited by Gary Genosko, 255–80. New York: Routledge, 2001.
Murphy, Tim. "Map: Has Your State Banned Sharia?" Mother Jones, February 11, 2011. www.motherjones.com.
Naber, Nadine. Arab America: Gender, Cultural Politics, and Activism. New York: New York University Press, 2012.
________. "Arab Americans and U.S. Racial Formations." In Race and Arab Americans before and after 9/11: From Invisible Citizens to Visible Subjects, edited by Nadine Naber and Amaney Jamal, 229–75. Syracuse, NY: Syracuse University Press, 2008.
Nacos, Brigitte L. Terrorism and the Media. New York: Columbia University Press, 1994.
________. Mass-Mediated Terrorism: The Central Role of Media in Terrorism and Counterterrorism. London: Rowman & Littlefield, 2002.
________. Terrorism and Counterterrorism: Understanding Threats and Responses in the Post-9/11 World. New York: Penguin, 2005.
Napolitano, Janet. "Nine Years after 9/11: Confronting the Terrorist Threat to the Homeland." US Department of Homeland Security, September 22, 2010. www.dhs.gov.
________. "Progress toward a More Secure and Resilient Nation." Homeland Security Affairs 7 (2011). www.hsaj.org.
National Lawyers Guild. "Operation Backfire: A Survival Guide for Environmental and Animal Rights Activists." N.d. www.nlg.org.
Negri, Antonio, ed. Reflections on Empire. Malden, MA: Polity, 2008.
Newman, Maria, and Michael Brick. "Neighbor Says Hasan Gave Belongings Away before Attack." New York Times, November 6, 2009. www.nytimes.com.
Ng, Andrew Hock Soon. "Introduction: Reading the Double." In The Poetics of Shadows: The Double in Literature and Philosophy, edited by Andrew Hock Soon Ng, 1–16. Stuttgart: ibidem-Verlag, 2008.
"The Nicest Terrorist I Ever Met." CBS News, July 30, 2009. www.cbsnews.com.
Parks, Lisa. "Drones, Vertical Mediation, and the Targeted Class." Feminist Studies 42, no. 1 (2016): 227–35. doi:10.15767/feministstudies.42.1.227.
Patel, Faiza. Rethinking Radicalization. New York: New York University, Brennan Center for Justice, 2011.
Pearson, Michael. "Trooper Who Leaked Boston Bomber Pictures Retires with 'No Regrets.' " CNN, November 7, 2013. www.cnn.com.
Pearson, Michael, Erin McPike, and Aaron Cooper. "What Did Suspected Bomber's Widow Know?" CNN, May 3, 2013. www.cnn.com.
Pew Research Center for the People and the Press. "Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic." 2013. www.people-press.org.
Philbrick, Herbert Arthur. I Led 3 Lives: Citizen, "Communist," Counterspy. New York: McGraw-Hill, 1952.
Picard, Robert G. "News Coverage as the Contagion of Terrorism: Dangerous Charges Backed by Dubious Science." Political Communication 3, no. 4 (1986): 385–400. doi:10.1080/10584609.1986.9962800.
Plank, William G. "Différance: Hypostatization of the Dialectic Synthesis." In Fearful Symmetry: Doubles and Doubling in Literature and Film, edited by Eugene J. Crook, 163–71. Tallahassee: University Press of Florida, 1982.
Poe, Edgar Allan. "William Wilson." In Edgar Allan Poe: Complete Tales and Poems, 555–68. Edison, NJ: Castle Books, 1985.
Porter, Russell. "Budenz Describes a U.S. 'Politburo.' " New York Times, March 31, 1949.
________. "Communists Plan to 'Colonize' Key Industries Told at Trial." New York Times, April 8, 1949.
________. "U.S. Reds Ordered to Revolt in 1945, Budenz Tells Court." New York Times, March 25, 1949.
"The Presence of Evil." Time, October 24, 1949, 23.
Qadhi, Yasir. "An Illegal and Counterproductive Assassination." New York Times, October 1, 2011. www.nytimes.com.
Raghavan, Sudarsan. "Anwar Al-Aulaqi, U.S.-Born Cleric Linked to Al-Qaeda, Killed in Yemen." Washington Post, October 1, 2011. www.washingtonpost.com.
________. "Cleric Says He Was Confidant to Hasan." Washington Post, November 16, 2009. www.washingtonpost.com.
Rank, Otto. Beyond Psychology. Mineola, NY: Dover, 1958.
________. The Double: A Psychoanalytic Study. Chapel Hill: University of North Carolina Press, 1971.
Rapoport, David C. "The Four Waves of Rebel Terror and September 11." Anthropoetics 8, no. 1 (2002): 1–17.
Rawnsley, Adam. "YouTube Yanks Jihadi Videos; Terror Wannabes Mildly Inconvenienced." Wired, November 3, 2010. www.wired.com.
Rayman, Graham. "Were the Newburgh 4 Really Out to Blow Up Synagogues? A Defendant Finally Speaks Out." Village Voice, March 2, 2011. www.villagevoice.com.
Razack, Sherene. Casting Out: The Eviction of Muslims from Western Law and Politics. Toronto: University of Toronto Press, 2008.
Reilly, Ryan J. "Dzhokhar Tsarnaev Will Not Be Treated as Enemy Combatant: White House." Huffington Post, April 22, 2013. www.huffingtonpost.com.
Reitman, Janet. "Jahar's World." Rolling Stone, July 2013, 46–57.
Remnick, David. "The Culprits." New Yorker, April 29, 2013.
Ripley, Amanda. "The Fort Dix Conspiracy." Time, December 6, 2007. www.time.com.
"Robeson Asks U.S. to Probe 'Terrorism.' " Washington Post, August 29, 1949.
Roosevelt, Eleanor. "Memo to Moscow." Washington Times, October 24, 1949.
Rosenfield, Claire. "The Shadow Within: The Conscious and Unconscious Use of the Double." In Stories of the Double, edited by Albert J. Guerard, 311–31. Philadelphia: J. B. Lippincott, 1967.
Ross, Alice K. "Legal Experts Dissect the US Government's Secret Drone Memo: A Round-Up." Bureau of Investigative Journalism, June 25, 2014. www.thebureauinvestigates.com.
Rossoll, Nicki. "McMaster Hints at Break from Trump Campaign Rhetoric on 'Radical Islamic Terror.' " ABC News, May 20, 2017. www.abcnews.go.com.
Safire, William. "Essay: Don't Throw Away Victory." New York Times, January 31, 1991. www.nytimes.com.
Said, Edward W. Orientalism. New York: Vintage, 1979.
Sampson, Tony D. Virality: Contagion Theory in the Age of Networks. Minneapolis: University of Minnesota Press, 2012.
Samuels, David. "The New Mastermind of Jihad." Wall Street Journal, April 7, 2012. www.wsj.com.
Sassen, Saskia. Territory, Authority, Rights: From Medieval to Global Assemblages. Princeton, NJ: Princeton University Press, 2006.
Savage, Charlie. "A Not-Quite Confirmation of a Memo Approving Killing." New York Times, March 9, 2012, A16.
________. "Secret U.S. Memo Made Legal Case to Kill a Citizen." New York Times, October 9, 2011, A1.
Scarce, Rik. Eco-warriors: Understanding the Radical Environmental Movement. Chicago: Noble Press, 1990.
Schanzer, David, Charles Kurzman, and Ebrahim Moosa. "Anti-terror Lessons of Muslim-Americans." National Institute of Justice, January 6, 2010. <https://fds.duke.edu>.
Schmid, Alex P., ed. The Routledge Handbook of Terrorism Research. New York: Routledge, 2013.
Schmid, Alex P., and Janny de Graaf. Violence as Communication: Insurgent Terrorism and the Western News Media. Beverly Hills, CA: Sage, 1982.
Schmid, Alex P., and A. J. Jongman. Political Terrorism: A Research Guide to Concepts, Theories, Data Bases, and Literature. Amsterdam: North-Holland, 1984.
Schmitt, Carl. The Concept of the Political. Translated by George Schwab. Chicago: University of Chicago Press, 2005.
________. Theory of the Partisan: Intermediate Commentary on the Concept of the Political. Translated by G. L. Ulmen. New York: Telos Press, 2007.
Sedgwick, Eve Kosofsky. Epistemology of the Closet. Berkeley: University of California Press, 1990.
Semati, Mehdi. "Islamophobia, Culture and Race in the Age of Empire." Cultural Studies 24, no. 2 (2010): 256–75. doi:10.1080/09502380903541696.
________. "Terrorists, Moslems, Fundamentalists and Other Bad Objects in the Midst of 'Us.' " Journal of International Communication 4, no. 1 (1997): 30–49. doi:10.1080/13216597.1997.9751843.
Serwer, Adam. "Bipartisan Approval for Targeted Killing of Suspected Terrorists." Mother Jones, March 14, 2012. www.motherjones.com.
Shadid, Anthony, and David D. Kirkpatrick. "As the West Celebrates Awlaki's Death, the Mideast Shrugs." New York Times, October 2, 2011, A1.
Shane, Scott. "Awlaki Killing Is Awash in Open Secrets." New York Times, October 5, 2011, A18.
________. "Judging a Long, Deadly Reach." New York Times, October 1, 2011, A1.
Shane, Scott, and Souad Mekhennet. "Imam's Path from Condemning Terror to Preaching Jihad." New York Times, May 8, 2010. www.nytimes.com.
Sherman, Jon. " 'A Person Otherwise Innocent': Policing Entrapment in Preventative, Undercover Counterterrorism Investigations." University of Pennsylvania Journal of Constitutional Law 11 (2008): 1475–1510.
Siesseger, Marie E. "Conspiracy Theory: The Use of the Conspiracy Doctrine in Times of National Crisis." William & Mary Law Review 46, no. 3 (2004): 1177–1218.
Simi, Pete, and Robert Futrell. American Swastika: Inside the White Power Movement's Hidden Spaces of Hate. Lanham, MD: Rowman & Littlefield, 2010.
Smith, R. Jeffrey. "Homeland Security Department Curtails Home-Grown Terror Analysis." Washington Post, June 2, 2011. www.washingtonpost.com.
Smith, Rebecca K. "Ecoterrorism? A Critical Analysis of the Vilification of Radical Environmental Activists as Terrorists." Environmental Law 38 (2008): 537–76.
Smith, Rogers M. Civic Ideals: Conflicting Visions of Citizenship in U.S. History. New Haven, CT: Yale University Press, 1997.
________. Stories of Peoplehood: The Politics and Morals of Political Membership. Cambridge: Cambridge University Press, 2003.
Sørensen, Bent Meier. "Immaculate Defecation: Gilles Deleuze and Félix Guattari in Organization Theory." Sociological Review 53, no. 1 (2005): 120–33.
Sproat, Peter Alan. "Can the State Be Terrorist?" Terrorism 14, no. 1 (1991): 19–29. doi:10.1080/10576109108435854.
Stampnitzky, Lisa. Disciplining Terror: How Experts Invented "Terrorism." Cambridge: Cambridge University Press, 2014.
Stanglin, Douglas. "Al-Awlaki's Diatribes Came in an American Accent." USA Today, September 30, 2011. www.usatoday.com.
Stohl, Cynthia, and Michael Stohl. "Networks of Terror: Theoretical Assumptions and Pragmatic Consequences." Communication Theory 17, no. 2 (2007): 93–124.
Stolberg, Sheryl Gay. "Obama Offers Sympathy and Urges No 'Jump to Conclusions.' " New York Times, November 8, 2009. www.nytimes.com.
Symmes, Patrick. "Anwar al-Awlaki: The Next Bin Laden." GQ, June 21, 2011. www.gq.com.
Taibbi, Matt. "Explaining the Rolling Stone Cover, by a Boston Native." Rolling Stone, July 19, 2013. www.rollingstone.com.
"Terrorism in America after 9/11." New America, n.d. www.newamerica.org.
"Terrorism in Louisiana." New York Times, October 19, 1859. www.nytimes.com.
Thompson, Ginger. "An Apology to Veterans over Intelligence Report." New York Times, April 17, 2009. www.nytimes.com.
Thompson, Heather Ann. "Why Mass Incarceration Matters: Rethinking Crisis, Decline, and Transformation in Postwar American History." Journal of American History 97, no. 3 (2010): 703–34.
Tiqqun. Introduction to Civil War. Translated by Alexander R. Galloway and Jason E. Smith. Los Angeles: Semiotext(e), 2010.
"Topic A Letters to the Editor]." Washington Post, November 8, 2009. [www.washingtonpost.com.
Tymms, Ralph. Doubles in Literary Psychology. Cambridge: Bowes & Bowes, 1977.
Ungar, Rick. "Senator Lindsey Graham Says Suspend the Constitution for Boston Marathon Suspect and Designate Him an Enemy Combatant." Forbes, April 19, 2013. www.forbes.com.
US Congress, House Un-American Activities Committee. Hearings Regarding Communist Infiltration of Minority Groups [Hearings]. July 13, 14, and 18, 1949, and September 1, 1950.
US Congress, House Un-American Activities Committee. Communist Methods of Infiltration—Education [Hearings]. February 25–27, March 12, 13, 17, and 18, 1953.
US Congress, Senate, Committee on Environment and Public Works. Eco-terrorism Specifically Examining the Earth Liberation Front and the Animal Liberation Front [Hearing]. May 18, 2005.
US Congress, Senate, Committee on Environment and Public Works. Eco-terrorism Specifically Examining Stop Huntingdon Animal Cruelty [Hearing]. October 26, 2005.
US Congress, Senate, Committee on Homeland Security. The Threat of Muslim-American Radicalization in U.S. Prisons [Hearing]. June 15, 2011.
US Congress, Senate, Committee for Internal Security. Terrorism [Hearings]. February 27 and 28, March 21, 22, and 26, 1974.
US Congress, Senate, Committee for Internal Security. "Terrorism: A Staff Study." Washington, DC: Government Printing Office, 1974.
US Congress, Senate, Subcommittee on the Constitution, Civil Rights, and Human Rights, Committee of the Judiciary. Hate Crimes and the Threat of Domestic Extremism [Hearing]. September 19, 2012.
US Congress, Senate, Subcommittee on Crime of the Committee on the Judiciary. Acts of Ecoterrorism by Radical Environmental Organizations [Hearing]. June 9, 1998.
US Congress, Senate, Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary. Animal Enterprise Terrorism Act [Hearing]. May 23, 2006.
US Congress, Senate, Subcommittee on Forests and Forest Health of the Committee on Resources. Ecoterrorism and Lawlessness on the National Forests [Hearing]. February 12, 2002.
US Congress, Senate, Subcommittee on Terrorism, Technology, and Homeland Security. Terrorism: Radical Islamic Influence on Chaplaincy of the U.S. Military and Prisons [Hearing]. October 14, 2003.
US Sentencing Commission. "2012 Federal Sentencing Guidelines Manual." www.ussc.gov.
Vanderheiden, S. "Eco-terrorism or Justified Resistance? Radical Environmentalism and the 'War on Terror.' " Politics & Society 33, no. 3 (2005): 425–47. doi:10.1177/0032329205278462.
van Dijck, Jose. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013.
Vardoulakis, Dimitris. The Doppelgänger: Literature's Philosophy. New York: Fordham University Press, 2010.
Vaughan-Williams, Nick. "Borderwork beyond Inside/Outside? Frontex, the Citizen–Detective and the War on Terror." Space and Polity 12, no. 1 (2008): 63–79. doi:10.1080/13562570801969457.
Volpp, Leti. "The Citizen and the Terrorist." Immigration and Nationality Law Review 23 (2012): 561–86.
Wacquant, Loïc. Punishing the Poor: The Neoliberal Government of Social Insecurity. Durham, NC: Duke University Press, 2009.
Wagner, Travis. "Reframing Ecotage as Ecoterrorism: News and the Discourse of Fear." Environmental Communication 2, no. 1 (2008): 25–39. doi:10.1080/17524030801945617.
Wakin, Daniel J. "Imams Reject Talk That Islam Radicalizes Inmates." New York Times, May 23, 2009, A22.
Webber, Andrew J. The Doppelgänger: Double Visions in German Literature. Oxford: Oxford University Press, 1996.
Weinstein, Adam. "The Sikh Temple Shooter's Racist Tattoos, Deciphered." Mother Jones, August 6, 2012. www.motherjones.com.
Weiser, Benjamin. "3 Men Get 25 Years in Plot to Bomb Bronx Synagogues." New York Times, June 30, 2011, A22.
Western, Bruce. Punishment and Inequality in America. New York: Russell Sage Foundation, 2006.
White, Ed. "Luqman Ameen Abdullaj, Leader of Radical Islam Group, Killed in Raid." Huffington Post, October 28, 2009. www.huffingtonpost.com.
White House. "Statement by the Press Secretary." April 23, 2015. www.whitehouse.gov.
Whitlock, Craig. "After Yemen Attack, Little Comment." Washington Post, October 23, 2011. www.washingtonpost.com.
"Who Won?" New York Post, October 16, 1949.
William H. Webster Commission. "Final Report on the Federal Bureau of Investigation, Counterterrorism Intelligence, and the Events at Fort Hood Texas on November 5, 2009." Federal Bureau of Investigation, 2012. www.fbi.gov.
Wilson, Scott. "No Safe Haven Anywhere in the World." Washington Post, October 1, 2011. www.washingtonpost.com.
Wines, Michael, and Ian Lovett. "The Dark Side, Carefully Masked." New York Times, May 5, 2013, A1.
Yaccino, Steven, Michael Schwirtz, and Marc Santora. "Gunman Kills 6 at Sikh Temple in Wisconsin." New York Times, August 6, 2012, A1.
Yang, Wesley. "The Terrorist Search Engine." New York Magazine, December 5, 2010. www.nymag.com.
Yardley, William. "Radical Environmentalist Gets 9-Year Term." New York Times, May 26, 2007, A9.
"You Are Either with Us or against Us." CNN, November 6, 2001. www.cnn.com.
Žižek, Slavoj. "Are We in a War? Do We Have an Enemy?" London Review of Books, May 23, 2002.
________. The Sublime Object of Ideology. New York: Verso, 1989.
INDEX
Italic page numbers refer to illustrations.
9/11, , , , 50–51, , , ; air travel after, ; citizenship after, , 111–47; events compared to, 60–61; hijackers, , , , , ; representations of threat after, , . See also al-Hazmi, Nawaf
24 (show),
Abdullah, Luqman Ameen, 125–26
abortion-clinic attacks, , . See also Right to Life movement
absolute hostility, , 14–15,
Abu Ghraib,
actants, , 90–91, 93–94, , , , ,
Act to Combat International Terrorism, 172n18
Adulmutallab, Umar Farouk,
Aesopianism, 97–100, , . See also double talk
Afghanistan, 13–14, , , 101–2, , ,
Afghan-Soviet War,
African Americans, , , , 117–18, , , 161–62, 173n26, 183n57
Agamben, Giorgio, 173n37, 174n41
al-Amin, Jamil Abdullah (H. Rap Brown), ,
al-Awlaki, Abdulrahman,
al-Awlaki, Anwar, , 31–32, , , 61–63, , , 113–14, 117–23, 129–33, , , 144–46, 150–56, 161–62, , 188n46; "The Constants of Jihad," ,
al-Awlaki, Nasser, ,
al-Awlaki, Nawar,
Albania, 78–79, ,
Alfred P. Murrah Federal Building, . See also Oklahoma City bombing
al-Hazmi, Nawaf, , , 62–63,
Alliance for America,
al-Qaeda, , , , , , , , 100–102, , , 174n41, 181n89, 187n34, 188n46; media by, 62–63, , , 112–13, 115–18, , , , , 186n14, 187n35; network structure of, ,
al-Shabaab,
al-Suri, Abu Mus'ab, , 65–66, ,
al-Uyayri, Yusef: "The Constants of Jihad,"
al-Zawahiri, Ayman, ,
AME (African Methodist Episcopal) Church, 172n20
American Civil Liberties Union (ACLU), ,
American Freedom Defense Initiative/Stop Islamization of America,
American Legislative Exchange Council: "Animal and Ecological Terrorism in America,"
Amoore, Louise, 173n37
Amoss, Ulius Louis, 181n93
anarchists, ,
Animal Enterprise Terrorism Act, ,
Animal Liberation Front (ALF), , 56–57,
anti-Abolitionist movement,
anti-abortion movement, , 66–67. See also Right to Life movement
Anti-Defamation League,
anti-Semitism, , , , , , ,
Antiterrorism and Effective Death Penalty Act,
Appadurai, Arjun, 171n6
AQ Chef,
Arab Americans, ,
Arab-Israeli War (1967),
Arabs, , , , 120–21; racialization of, , , ; violence against, , . See also brown-Arab-Muslim-other
Arendt, Hannah,
Arnold, Ron, ,
Arquilla, John, , , 79–80, ,
Aryan Nation Affiliates,
Attorney General's List of Subversive Organizations,
Augustine, Rothschild,
Badiou, Alain, ,
Bakalli, Besnik, , 84–87, 94–95, ,
Baran, Paul,
Basir, Abu,
Bates, John D.,
Beam, Louis, , 181n93
Beck, Ulrich, 54–55, 176n5
Beirich, Heidi, 44–45, , 178n28
belonging, , , , , , 111–47, , 152–53, 156–57,
Benjamin, Walter,
Berg, Alan,
Bergen, Peter,
Bergson, Henri,
Bhabha, Homi,
Bill C-24 (Canada),
bin Laden, Osama, 1–3, , , , , , , , , 188n46; "The Way to Save the Earth,"
biopolitics, 26–27,
Black Panthers,
Bolton, John,
Borges, Jorge Luis,
Boston Marathon bombing (2013), , , , , 149–58. See also Tsarnaev, Dzhokhar; Tsarnaev, Tamerlan
Boyd, Daniel Patrick, , 175n68
Brennan, John, ,
Brennan Center's Liberty and National Security Program,
Brooks, David,
Browder, Eric, ,
Brown, H. Rap. See al-Amin, Jamil Abdullah
brown-Arab-Muslim-other, , 12–14, , , , , , 45–46, , 51–53, , , 178n28
Buddhism,
Budenz, Louis F., , , 81–84, , 89–90, , 98–100,
Bush, George W., , 158–59,
Butler, Judith,
Cabinet Committee on Terrorism, 172n14
capture or kill lists, , , ,
Catholic Liberty Service: "How Communism Works," 71–72, ,
Central Intelligence Agency (CIA), 129–30, , ; Counterterrorism Center,
Charleston shooting (2015), , 172n20. See also Roof, Dylann
Charlie Hebdo shooting (2015),
Chechnya, 152–53, 155–56
Christian Identity movement,
Christianity, , 42–43, , ,
Christie, Christopher,
Chun, Wendy Hui Kyong, ,
Cilluffo, Frank,
Circuit City, , 78–79,
citizenship, , 174n39, 188n47, 191n26; counterterrorism and, 31–32, , 111–47; Double and, , , 29–30, 156–57; terrorism and, ,
clash of civilizations discourse, , , , , ,
Clinton, Bill, 173n33
Cold War, , , 8–9, , , 43–44, , , , , , , 173n31. See also McCarthyism
collective, 2–4, , 24–26, , , , , , , 156–57, 162–63, 171n6
Columbine Massacre (1999), 180n74
Committee for Homeland Security, 63–64
Communism, , , , 106–7, 178n28, 184n67, 184n77; anti-Communism, , , , 71–73, 75–79, 81–84, 87–93, 97–98, , 181n93, 183n57; terrorism genealogy and, , 30–31. See also House Un-American Activities Committee (HUAC); McCarthyism; Palmer Raids; Red Octopus; Red Scare
Communist International, ; Seventh World Congress, ,
Communist Party (CPUSA), , 69–70, 76–79, 81–84, 87–93, 98–100, 105–6, 181n1
Communist Political Association, , 82–83, 98–100
Conley, Shannon Maureen, ,
connectivity, , , 74–75, 105–9, , 154–55
conspiracy, , , , , 69–70, 74–75, 80–83, , 90–91, 94–97, , 104–9, , , 154–56, 175n68
counterterrorism, , 63–64, 155–57, ; citizenship and, 31–32, , 111–47; Double and, , , , 67–68, , , , , , ; spaces of, , 31–32, , 111–47,
Crew 38,
Cromitie, James, , 123–26, 136–44
Cruz, Ted, , 179n38
Curtis Culwell Center,
Daily Mirror,
Daily Worker, , 81–83, , , ,
dangerous individual, figure of, , ,
Davis, Benjamin J., Jr., , 181n1
Dean, Jodi,
Dehn, John C.,
Deleuze, Gilles, , 171n12
Dennis, Eugene, , 77–78, 82–83
Dennis v. the US,
De Quincey, Thomas,
Derrida, Jacques, , , ,
Descartes, René,
DeStefano, Joe,
Dickens, Charles,
Dilling, Elizabeth: The Red Network,
Dimitrov, Georgi, ,
Divoll, Vicki,
Dolgatov, Gadzhimurad,
doppelgänger, , , , , , , , , , 174n49; definition, 175n56, 179n55; digital,
Dostoyevsky, Fyodor, 174n49; The Double, , 174n50, 175n64, 175n65
the Double, 2–3, 5–7, , , 19–20, 22–29, 31–33, 37–39, , 53–56, , 66–72, 75–80, 96–97, 105–9, 112–17, , 126–36, 149–52, 154–68, 174n49, 174n50, 186n14; definition, ; fear of small numbers and, 171n6; relation to other, , , , , 161–64, 166–67; spatiality of, 73–74, ; temporality of, , 176n72
double talk, . See also Aesopianism
Downing, Michael,
drones, , , , , , , 110–114, , 129–35, 174n41, 188n46
"The Drop Off," ,
Du Bois, W. E. B.,
Duclos, Jacques, ,
Duka brothers (Dritan, Shain, and Eljvir), , 78–79, 84–87, 91–92, , , , , , 182n30
Dunleavy, Patrick T., ,
Earth First!, 39–40, , 178n21
Earth Liberation Front (ELF), , 55–56
ecotage,
ecoterrorism, , , , , , , , , 55–57, , 177n8
Edgerton, David,
Egypt, , , ; Cairo,
Einstein, Albert,
Eisenhower Doctrine,
Emerson, Ralph Waldo,
Emerson, Steve,
enemy, figure of, 14–15, , , , 128–29, , , , 172n22, 188n47; defining a collective, 1–6, ; Double and, , 31–32, 65–68, , , 108–9, 113–14, , , 158–65; enemy networks, , , , , 87–88, 96–97, , 106–9, ; "enemy of our enemy" framework, ; racism and, , , , . See also terrorist, figure of
Enemy Expatriation Act, , 145–46
enemy of mankind, figure of,
entrapment, , , , 138–39, , , 181n92; subjective test,
Erickson, Mark,
Europe, , , , 77–78, 180n73. See also individual countries
Ewald, François, , ,
Expatriate Terrorist Act,
extrajudicial killings, , , , ,
Facebook, ,
Fair Deal,
"the Family,"
fantasy of connectivity, 107–8,
Federal Bureau of Investigation (FBI), , , , , , , ; counterterrorism practices, , , 38–40, , , , 84–85, , , , , 118–20, 125–26, , 141–42, 186n17, 188n46; Fort Hood shooting investigation, 47–48, ; hate crimes definition,
Federal Courts Administration Act,
Federal Sentencing Guidelines: terrorism enhancement, ,
Ferguson, Jacob,
Ferris, Joshua,
"the fetch,"
First Annual Muhammad Art Exhibit and Contest,
Fleming, Paul,
Foley Square trial (1949), , , 73–79, 87–88, 92–94, 96–97, 105–6
Folsom Prison,
Foreign Intelligence Surveillance Act,
foreignness, , , 11–13, 23–24, 27–28, , , , 45–46, , 52–53, , 75–76, 112–13, , , 172n18; "foreign terrorist organizations" category, , ,
Foreign Relations Authorization Act, ,
Foreman, Dave,
Fort Bragg,
Fort Dix Five, , , , , , 78–80, 84–88, 91–97, 100–108, , , , , 182n30. See also Duka brothers; Shnewer, Mohamad Ibrahim; Tatar, Serdar
Fort Hood shooting (2009), , 35–37, 46–50, , 60–63. See also Hasan, Nidal Malik
Foster, William Z., 181n1
Foucault, Michel, 18–19, 26–27, ,
France, , , , , , , ; French Revolution, ,
Freud, Sigmund, , , , ,
Futrell, Robert,
future-past, , 54–55, , , 66–67,
Gadahn, Adam, , , 188n46
Gaffney, Frank J., Jr., 179n38
Galli, Carlo, , , , , , 172n22, 191n37
Galloway, Alexander, ,
gender, , , , , , 157–58
Germany, , ,
Global War, , , , 191n37
Goldberg, Jeff,
Google Maps, ,
Graham, Lindsey,
Granger, Lester B.,
Granovetter, Mark,
Great Britain, , , 180n74. See also United Kingdom
Green, Gil, 181n1
Greenberg, Karen, ,
Greenwald, Glenn,
Guantanamo Bay Naval Base, ,
Guattari, Félix,
Hall, Gus, 181n1
Hamas, ,
Hammerskins, 43–44, , 58–59, 179n49
Hardt, Michael,
Hasan, Khwaja Mahmood,
Hasan, Nidal Malik, , , 35–37, 46–50, , , 61–66, , , 179n52
hatecore, ,
Hegel, Georg Wilhelm,
Herbert, Bob,
Hickey, Adam,
Hiss, Alger,
Hitler-Stalin Pact,
Hobbes, Thomas,
Hoffmann, E. T. A., 174n49
Holder, Eric, 2–5, , , 133–34,
homegrown violent extremist (HVE),
Homeland, 27–28
Hoover, J. Edgar,
House Un-American Activities Committee (HUAC), 75–77, , ,
Hu, Tung-Hui Hu,
Huntingdon Life Sciences, 178n22
Hussain, Shahed (Maqsood), 123–24, , 136–43
Hussein, Saddam,
hybristophilia,
ideology, , , , , , , , , , 79–80, , 97–98, 100–109, ,
If a Tree Falls, ,
"If You See Something, Say Something," , 115–16, 127–28. See also "The Drop Off"
Immigration and Nationality Act, 145–46
imperialism, , , , 99–100
incidence v. incident, , , , ,
India, ; Mumbai,
informants, 27–28, 30–31, , , 69–73, 75–95, 97–109, , , , 123–28, 136–42, 146–47, , , , 181n92, 190n18; as medium, ,
Infowars,
Inspire magazine, 62–63, , 112–13, 115–18, , , , , 186n14, 187n35
Internal Security Act, , ,
International Burn-a-Quran Day,
International Centre for the Study of Radicalisation,
Iran, , ; Iranian Revolution,
Iraq: Baghdad,
ISIS, , , , , , , 145–46, 162–63,
Islam, , 12–14, , 47–50, , , , , , , , 165–66; Nation of Islam, 187n34. See also Muslims
Islamophobia, , , , 165–66. See also American Freedom Defense Initiative/Stop Islamization of America; International Burn-a-Quran Day
Israel, , , , 174n41
Italy, ,
Jackson, Janet,
Jackson, Michael,
Jainism,
Jaish-e-Mohammed, , , ,
James, Kevin,
James Vance v. Judas Priest, 180n74
Jam'iyyat Ul-Islam Is-Saheeh (JIS), , 187n34
Japan,
Jarboe, James, , 54–55
Jewish Defense League,
jihad, , , , , , , , , , 85–87, , , 113–14, , 153–56, 184n68, 191n29; American, 116–29, 136–44; global, , , , , 92–94, , , 107–8, ; individual, ; jihadist videos, 91–94, , , , , ; open source, , ; racialization and, , , ; radicalization and, , ; "sleeper cell" narrative, . See also Jytte Klausen's Western Jihadism Project
Jim Crow,
Johnson, Jeh,
Jonas Brothers,
Jones, Alex,
Jones, Terry,
Jordan, , , 179n52
Judaism, , ,
Jytte Klausen's Western Jihadism Project, , , 181n5
Kaczynski, Theodore (Unabomber), , , , , 55–57, , ,
Kafka, Franz,
Kant, Immanuel,
Kenney, Michael,
Khan, Samir, ,
King, Martin Luther, Jr., 189n82
King, Peter, 124–25, , 173n27
Klausen, Jytte. See Jytte Klausen's Western Jihadism Project
Kohlmann, Evan, , 92–95, 100–104,
Kosovo Liberation Army,
Kucinich, Dennis J.,
Kugler, Robert B.,
Ku Klux Klan (KKK), , 43–44, , , , 172n20
Kwon, Yong Ki,
Lacan, Jacques,
Lane, David,
LAPD,
Laqueur, Walter,
LaRose, Colleen "Jihad Jane," ,
Latour, Bruno, , ,
laughter, , , , 133–35, 146–47
Leahy, Patrick, 133–34
Lec, Stanisław Jerzy, , 4–5,
Lemke, Thomas, 173n37
Lenin, Vladimir, ; Imperialism, , 97–98; State and Revolution,
Lerner, Max,
Lewis, John, 66–67
Liberty City Seven,
Lieberman, Joe, ,
likeness, 3–6, 22–25, , 32–33, , 149–50, , 157–59, 162–64
LimeWire,
Lincoln, Abraham,
Lindh, John Walker,
London bombings (2005),
Malcolm X,
Malheur National Wildlife Refuge takeover (2016),
Manson, Charles,
Manson, Marilyn, 180n74
Maqsood. See Hussain, Shahed
Martin, Trayvon,
Marx, Karl, ,
Marxism, ; Marxism-Leninism, ,
mass incarceration, , 138–39
McCain, John,
McCarthyism, , . See also Red Scare
McGohey, John F. X., 90–91
McGowan, Daniel, , , 35–39, 41–42, , , , , , ,
McMahon, Colleen, 130–31, , ,
McMaster, H. R.,
McVeigh, Timothy, , , , , 57–60, ,
Medina, Harold, , 88–89,
Melville, Herman, 174n49
Men's Health,
mental illness, 49–50, , . See also posttraumatic stress disorder
Metzger, Tom,
Middle East, 13–14, . See also individual countries
Miller, D. A.,
Miranda rights,
Morrison, Jim,
Muhammad, Prophet, , ,
Mujahideen, , , 127–28, 187n35
Mundt-Nixon Bill,
Munich Olympics massacre (1972), ,
music, , 180n74; white supremacy and, , 58–60, , 180n73. See also hatecore; Resistance Records
Muslim Americans, , , , , 116–17, 173n26, 173n27, 187n44
Muslim Brotherhood, , 187n29
Muslims, , 48–53, 61–62, , , , , 116–17, , 123–24, , 174n41, 187n34; "good" vs. "bad" binary, 12–15; racialization of, , ; Sunnis, ; Trump's immigration ban on, 165–66; violence against, 27–28. See also brown-Arab-Muslim-other; Islam
Nabokov, Vladimir,
Nacos, Brigitte L., 9–10
Napolitano, Janet, 2–5, , , , ,
National Alliance, , 180n73
National Defense Authorization Act, , 174n41
nationalism, , ; black nationalism, ; white nationalism/white supremacy, 42–43,
National Security Administration (NSA): PRISM,
National Urban League,
Nation of Islam, 187n34
Native Forest Council, 41–42
NBC News,
Neer, Tom,
Negri, Antonio,
Neo-Nazis, , ,
neo-Pagan racists,
Netanyahu, Benjamin, 13–14
netwar doctrine, , , 79–80, , , , 182n6
networks, , , , , 181n5, 182n6, 183n57; Double and, 30–31, , , 69–109, 111–12, ; role in conceptualizing terrorism, , 182n11, 183n31
Neumann, Peter, , 186n14
New America Foundations, 154–55
Newburgh Four, 31–32, , 110–111, 113–14, , 123–27, , 135–44, , ,
New Jersey Manufacturers Association,
New Jersey Transit,
Newsweek,
New Terrorism,
New York Metropolitan Transit Authority (MTA),
New York Post,
New York Times, 7–8, , 50–51, , 120–21, , 130–31, , , 166–67, 177n8
Nigeria,
Nixon, Richard, , , , , 172n14
NYPD, ,
Oak Creek Sikh Temple shooting (2012), , 42–45, 49–53, , 57–60. See also Page, Wade Michael
Oath of Allegiance,
Obama, Barack, , , 46–48, , , 129–31, 133–34, , ,
Oklahoma City bombing (1995), , , , , , , 173n33. See also McVeigh, Timothy
Olympics, ,
Omar, Mahmoud, , 84–87, 93–96, 101–8,
open secret, 130–34, ,
Operation Backfire, , 38–39
Operation Boulder,
Oprah Winfrey Show,
The Order,
Orientalism, , ,
the other, 2–3, ; other-Double relation, , , , , 161–64, 166–67. See also brown-Arab-Muslim-other
Page, Wade Michael, , 35–37, 42–44, 48–53, , 57–60, , 65–66,
Pakistan, , , , , 188n46
Palestine, , , , , ; Gaza Strip, 174n41
Palestinian–Israeli conflict, , ,
Palmer Raids,
Pamuk, Orhan,
paranoia, , , , , , 107–8, , 179n38, 187n29
Parks, Lisa,
Patel, Faiza,
PATRIOT Act: material support statutes,
Paul, Jean, 174n49, 175n56, 179n55
Payen, Laguerre, , , 139–40
Pentagon, , ; Protecting the Force,
People for the Ethical Treatment of Animals (PETA), 177n10
Pew Research Center,
phantom enemy, , 159–60, , 172n22
Philadelphia Police Department,
Philbrick, Herbert, , 81–84, 87–88, , , , 184n77
Pierce, William Luther: The Turner Diaries, , 180n73
Poe, Edgar Allan, 174n49; "William Wilson," 22–27
Poland,
the political, 15–20,
political violence: relationship to terrorism, 8–9, , 15–20, 35–37, , , , , 66–67, , 159–60, 176n2
posttraumatic stress disorder (PTSD), ,
Potash, Irving, 181n1
Potok, Mark, 44–45, , 178n28
Prislam, , 123–27, 138–39,
Prize Cases, 188n47
property: damage to as terrorism, 40–41
Protagoras,
psychiatry, , , ,
public authority justification,
Puerto Rico,
Putting People First, 56–57
Quran, ,
race, , , , , , , , , , , 183n57, 187n34, 191n40; postraciality, , , ; prison system and, , 138–39, 143–44; racialization, , , , , , , , 138–39, 142–44, ; racial violence, 42–60, 165–68, 171n11
racism, , , , , , , , 171n11, 187n34; in the military, 49–50, ; of prisons, , 138–39; racist right, 3–4, , , 43–46, 58–60, , 178n28; of Trump, 165–68; in war on terror, , . See also American Freedom Defense Initiative/Stop Islamization of America; anti-Abolitionist movement; anti-Semitism; Charleston shooting; Christian Identity movement; Hammerskins; Islamophobia; Ku Klux Klan; National Alliance; Neo-Nazis; neo-Pagan racists; Oak Creek Sikh Temple shooting; The Order; Orientalism; skinheads; white supremacy
radicalization, , , , , , 26–30, , , , , , 155–56, , 173n27, 174n44; media and, , , 116–21, 127–28; in Prislam narrative, , 137–38, , 187n34; self-radicalization, ; white supremacy and, ,
RaHoWa ("Racial Holy War"),
RAND,
Razack, Sherene,
Reagan, Ronald, , ,
Red Octopus, , , 87–88, , 96–98,
Red Scare, . See also McCarthyism; Red Octopus
Reid, Richard Colvin (the Shoe Bomber),
Reitman, Janet, , 154–55
Resistance Records, , 180n73
Right to Life movement, . See also abortion-clinic attacks
Robeson, Paul, 183n57
Rolling Stone, viii, , , , , , , 160–61
Ronfeldt, David, , , 79–80, ,
Roof, Dylann, 172n20
Roper, Billy,
Rosenbraugh, Craig,
Roth, Philip,
Russell, Katherine,
Russia, , , , 153–54, 190n16; Moscow, , , , , ; Russian Revolution, , . See also Soviet Union
Said, Edward,
Saramago, José, , 174n50
Saudi Arabia, ; Riyadh, 165–66
Saussure, Ferdinand de,
Savage, Charlie,
Schmid, Alex, 35–36, 176n1
Schmitt, Carl, , , , , , 35–36, , , , 172n22
Schopenhauer, Arthur,
Second International Conference on Terrorism,
Shahzad, Faisal,
Shane, Scott,
sharia, , , 179n38
Shelley, Mary, , 174n49
Shnewer, Mohamad Ibrahim, , 78–79, 84–87, 91–96, 101–4, , 182n30
the Shoe Bomber. See Reid, Richard Colvin
Sikhs, , , , 49–50, , ,
Simi, Pete,
Simpson, Elton,
skinheads, , , ,
Sleeper Cell,
Smith, Rogers,
Smith Act, ,
Soldier Readiness Center,
Somalia,
Soofi, Nadir,
South Africa,
South Asia,
Southern Poverty Law Center (SPLC), , , ,
Sovereign Citizen movement,
Soviet Union, , , , , , 183n57. See also Russia
"specially designated global terrorist" category,
Stachel, Jack, 82–83, , 181n1
Stack, Joseph,
Stalin, Joseph, , ; Foundations of Leninism, ; The History of the Communist Party in the Soviet Union,
Stampnitzky, Lisa, 8–9
Stevenson, Robert Louis, 174n49; Strange Case of Dr. Jekyll and Mr. Hyde, 24–25, , , 175n64
Stewart Air National Guard Base,
Stohl, Cynthia and Michael, 182n11
Stop Huntingdon Animal Cruelty (SHAC), ,
Stormfront, , , , 179n49
surveillance, , , , , , , , , , 110–111, 127–28, , , , , , 181n92, 186n17; counter-surveillance, ; law and, ; PRISM and,
Syria, , ,
Taibbi, Matt, , ,
"The Tale of Two Brothers," , ,
Taliban,
Tatar, Serdar, , , 85–86, , , 182n30
terrorism, definition, 29–30, , , 46–49, 51–56, 62–67, , 171n12, 174n41, 176n2, 182n11; "consensus definition," ; genealogy of, 7–18, 171n11, 172n14, 172n18; relationship to political violence, 8–9, , 15–20, 35–38, , , , , 66–67, , 159–60, 176n2; war v. law enforcement paradigm, , . See also counterterrorism
terrorism, domestic, , 9–12, , , , 35–43, 51–52, , 173n33
terrorism, homegrown, , , 35–36, , , , , , , , 144–45; Double and, 21–27, , , 149–55, 160–63, ; genealogy of, 5–7, 10–20, ; Prislam and, 123–27; relationship to counterterrorism, , 67–68, , 91–92, , . See also counterterrorism; ecoterrorism
terrorism, "Islamic," 12–14, , 166–67
terrorism, racist right-wing, , 43–46, 57–60, 172n20, 521
Terrorism: An International Journal,
terrorism studies, , ,
terrorist, figure of, , , 63–65, , 115–16, , , , , , 173n28, 191n40; "alien," 173n33; domestic, , 36–37, ; Double and, , , , , 149–62; eco-, , 36–37, 39–42, ; history of, 3–4, ; homegrown, , , , , 36–37, 47–53, , , , , 124–25, 136–37, 149–62; "modern terrorist," 1–2; racist right-wing, 3–4, 51–52. See also counterterrorism; enemy, figure of
Thacker, Eugene, ,
Thatcher, Margaret, 176n2
Third Force Act, 172n20
Thomas-Rankin Committee,
Thompson, Robert G., 181n1
Thoreau, Henry David,
Time magazine, , 36–37, 77–78,
Tiqqun (collective),
treason, , , 188n46
Truman, Harry,
Trump, Donald: Muslim travel ban, 165–66; white supremacy of, , 165–68
Tsarnaev, Ailina, 191n29
Tsarnaev, Bella, 191n29
Tsarnaev, Dzhokhar, , 3–4, , , 149–58, 160–62, 190n18, 191n29, 191n40
Tsarnaev, Tamerlan, , , , , 149–58, 190n18
Turkey, ,
Twin Towers, , , 177n8. See also 9/11
Twitter, , ,
the Ummah,
Unabomber. See Kaczynski, Theodore
United Arab Emirates,
United Freedom Fighters,
United Kingdom, , , . See also Great Britain
United Nations,
"unlawful enemy combatant" category,
US Armed Forces,
US Army, , , , , , , ,
US Congress, , , , , , 172n14, 190n16. See also U.S. House of Representatives; U.S. Senate
US Constitution, , , , , , , , 176n7, 188n47
US Department of Defense (DoD), , , 110–111
US Department of Homeland Security (DHS), 2–4, , , , , 63–64, , ; "The Drop Off," , ; Rightwing Extremism, 57–58; See/Say Something, 112–13, 127–28, ; Protect Your Everyday videos, ,
US Department of Justice, , ; Office of Legal Counsel,
US Fourth Circuit Court of Appeals,
US House of Representatives, , , 145–46; Committee on Internal Security, ; House Un-American Activities Committee (HUAC), 75–77, , , ; Subcommittee on Ecoterrorism and Lawlessness in National Forests, ; Subcommittee on Oversight, Investigations and Management: Lessons from Fort Hood,
US Legal Code, 9–10, , ; Crimes and Criminal Procedure,
US Military Academy,
US-Saudi Global Center for Combating Extremist Ideology,
US Second Circuit Court of Appeals,
US Senate, , , 59–60, , 145–46, ; Committee on Environment and Public Works, ; Committee on Homeland Security and Governmental Affairs, ; A Ticking Time Bomb, 63–64; Committee on the Judiciary,
US Supreme Court, , , , 173n36
van Dijck, Jose, ,
Vedas,
vertical mediation,
Vietnam War,
Vincent, Bruce,
Violent Crime Control and Law Enforcement Act: material support statutes,
Virginia Jihad Network,
Vitter, David,
Vkontakte,
Wacquant, Loïc, 189n82
Waldron, Francis X., Jr.,
Wall Street Journal,
Walter Reed Army Medical Center,
war on terror, 1–2, , , , , , , , 70–71, , , , 158–59, 164–65, , ,
Washington Post, , , 171n11
Washington Times, 179n38
Webster Commission Report, ,
The Week,
Western, Bruce,
White Aryan Resistance,
White House, ,
whiteness, , , 41–42, , , , , , 177n19, 187n34, 189n82; violence of, 3–4, , 13–14, , , , 43–46, 49–52, 57–60, , , 166–67, 180n73
white supremacy, 3–4, , , 43–46, 49–52, 57–60, , , 166–67. See also anti-Abolitionist movement; Charleston shooting.; Christian Identity movement; Hammerskins; Ku Klux Klan; National Alliance; Neo-Nazis; neo-Pagan racists; Oak Creek Sikh Temple shooting (2012); The Order; skinheads
Wilde, Oscar, 174n49
Williams, Brian Glyn,
Williams, David, , , , 140–41, 143–44
Williams, Onta, , ,
Williamson, John,
Wilson, Henry, 181n1
Winter, Carl, 181n1
Wise-Use Movement,
Wolke, Howie, 178n21
Woodrow Wilson Center,
World Trade Center bombing (1993),
World War II, ,
Yemen, , , 119–20; Khashef,
Youth Communist League, ,
YouTube, , , 110–111, , ,
Zeitgeist,
Žižek, Slavoj, , ,
ABOUT THE AUTHOR
Piotr M. Szpunar is Assistant Professor in the Department of Communication at the University at Albany, State University of New York.
## Contents
1. Half Title
2. Series Page
3. Title Page
4. Copyright
5. Dedication
6. Contents
7. Entrance: A Theory of the Double
8. 1. Identity and Incidence: Defining Terror
9. 2. Informants and Other Media: Networking the Double
10. 3. Opacity and Transparency in Counterterrorism: Belonging and Citizenship Post-9/11
11. No Exit
12. Epilogue
13. Acknowledgments
14. Notes
15. Bibliography
16. Index
17. About the Author
## Guide
1. Cover
2. Table of Contents
3. Begin Reading
## Pagebreaks of the print version
1. Cover Page
2. i
3. ii
4. iii
5. iv
6. v
7. vii
8. viii
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
135.
136.
137.
138.
139.
140.
141.
142.
143.
144.
145.
146.
147.
148.
149.
150.
151.
152.
153.
154.
155.
156.
157.
158.
159.
160.
161.
162.
163.
164.
165.
166.
167.
168.
169.
170.
171.
172.
173.
174.
175.
176.
177.
178.
179.
180.
181.
182.
183.
184.
185.
186.
187.
188.
189.
190.
191.
192.
193.
194.
195.
196.
197.
198.
199.
200.
201.
202.
203.
204.
205.
206.
207.
208.
209.
210.
211.
212.
213.
214.
215.
216.
217.
218.
219.
220.
221.
222.
223.
224.
225.
226.
227.
|
Photo by Barn Images on Unsplash
A lot of people make fun of me about my concept that an organization, company of people can self-organize. Friends ask me - “but how can you self-organize, there will be always someone who organizes everything?”, “won’t it be very chaotic?”, “how can you control it?”… They ask me all sorts of questions about self-organization but don’t want to listen to my answers. They only hear them.
I’ll try to outline how Camplight is thriving for the last 5-6 years, how it manages to achieve tremendous growth even when “shit hits the fan” so many times that it’s scary to think about it.
Self-organization, also called spontaneous order … is a process where some form of overall order arises from local interactions between parts of an initially disordered system.
~ Wikipedia
The idea is that this process doesn’t require control by any external agent. The benefit is that this kind of organization is wholly decentralized, typically robust and can survive or self-repair severe perturbations/turbulences. Chaos theory discusses self-organization in terms of islands of predictability in a sea of chaotic unpredictability. So it can be found in nature, why not in human relationships and companies? Although we have a lot to learn we do it within Camplight with three easy principles:
Proactivity vs. reflectivity
Photo by Aaron Burden on Unsplash
Proactivity in organizational behaviour and psychology refers to anticipatory, change-oriented and self-initiated behaviour in situations. Proactive behaviour involves acting in advance of a future situation, rather than just reacting or reflecting after the fact. In Camplight we don’t distinguish between proactive and active. We call them both “being active”, so you can deduce that operating in a “proactive” state is actually our baseline of daily existence :)
In order to be in such state of mind we rely on a set of basic ingredients:
Strong dynamical non-linearity
We don’t have job titles and occupations in a horizontal way. We have roles which can change across our “vertical” activities. We can invent new roles or dismiss old ones. We can interchange roles, merge them, branch them out. This happens dynamically, sometimes via consensus, sometimes just by seeking advice from your peers.
Balance of exploitation and exploration
One cannot be active 100% of the time. That’s why we need time to reflect, to explore, to tune with the organizational noise and pick signals which inspire us to move forward. We must know how to rest in order to be productive. Sometimes being 100% active can be destructive - both organizationally (you can create value without meaning or purpose, which increases the noise) or individually (you can burnout). This balance provides us with energy for our endeavors. It’s the reason we strive to be active 100% of the time :) Yeah, I know there’s a contradiction … That’s the beauty of it.*
Multiple interactions, feedback loops and discussions
We’re constantly giving or seeking feedback. This way we improve our interactions and build up synergy. I don’t think self-organization can be achieved without team symbiosis or at least some form of build up.
Those ingredients are the triggers for executing an initiative. A trigger can also be a random event, or our individual inspiration and ambition.
Participatory leadership
An initiative is our work domain, task vector, spark for progress in which we self-organize about its inception, execution, delivery and nurturing. Sometimes we have expected outcomes, sometimes we just iterate and experiment like kids in a sandbox. But every initiative should be brought to life by a leader otherwise it will rot in the abyss of leaderless initiatives. We have a lot of undelivered initiatives … ideas that didn’t gather enough interest or their time hasn’t come yet.
A leader can be one person or a team of people. Leaders can change during the lifespan of an initiative. One leader can become worn out so others from the team can step in if they want to continue the momentum. The leader listens and moves the initiative forward with integrity and collaboration with other initiatives/leaders/peers/teams if applicable.
Entropy control
Photo by Aaron Burden on Unsplash
Usually if we’ve synchronized our energy levels and became active in overlapping periods of time there can be a lot of moving parts within Camplight. This can result in a lot of chaos for the untrained mind. Camplight can seem quite busy and everyone on the outside is asking how do we thrive in such random conditions?
The short answer
We bring order out of chaos through best practices, principles, habits, discipline and motivation.
We have wisdom sayings like “The future depends on what you do today” which always reminds us that entropy is part of our life but we should not let it escalate to uncontrollable levels. We have templates and documents describing processes for achieving excellence. We constantly evolve our knowledge base and strive for perfection although the mindful journey is really what matters.
Everything is progress. |
/**
* jobComplete is a STAXJobCompleteListener interface method
* <p>
* Called when the submitted sub-job completes so it can set variables
* RC and STAXResult with the result from the STAX EXECUTE request.
* Generates an event to indicate that the submitted sub-job has completed.
* If the job-action (if any) has completed, removes the hold thread
* condition and schedules the thread to run.
* <p>
* Note that this entire method is synchronized since its state can be
* changed on another thread (e.g. via the execute, handleCondition, and
* threadComplete methods).
*
* @parm job the STAXJob object that submitted the sub-job
*/
public synchronized void jobComplete(STAXJob job)
{
if (sDebug)
STAX.logToJVMLog(
"Debug", fThread,
"STAXJobAction::jobComplete(): fState=" + getStateAsString());
if (fState == COMPLETE) return;
fIsJobRunning = false;
fSubJob = job;
HashMap<String, String> subJobMap = new HashMap<String, String>();
subJobMap.put("type", "subjob");
subJobMap.put("block", fCurrentBlockName);
subJobMap.put("status", "stop");
subJobMap.put("jobID", String.valueOf(fJobID));
subJobMap.put("result", job.getResult().toString());
fThread.getJob().generateEvent(
STAXJobActionFactory.STAX_SUBJOB_EVENT,
subJobMap);
if (fThreadMap.isEmpty())
{
if (sDebug)
STAX.logToJVMLog(
"Debug", fThread,
"STAXJobAction::jobComplete(): Remove HoldThread " +
"condition: " + fThread.getConditionStack());
fThread.removeCondition(fHoldCondition);
fThread.schedule();
}
} |
/*
* DO NOT EDIT THIS FILE!
* This file is auto-generated from the registers file.
* Edits to this file will be lost when it is regenerated.
*
*
* This license is set out in https://raw.githubusercontent.com/Broadcom-Network-Switching-Software/OpenBCM/master/Legal/LICENSE file.
*
* Copyright 2007-2020 Broadcom Inc. All rights reserved.
*
* File: ddrc16.c
* Purpose: PHY info for ddrc16
*/
#include <soc/field.h>
#include <soc/types.h>
#include <soc/ddrc16.h>
#if !defined(SOC_NO_NAMES)
char *soc_phy_ddrc16_fieldnames[] = {
"ACCU_ACTIVE",
"ACCU_ACTIVE_LOST",
"ACCU_ACTIVE_TIMEOUT",
"ACCU_LOAD",
"ACCU_LOAD_VALUE",
"ACCU_POS_THRESHOLD",
"ACCU_VALUE",
"ADDRPATH_ADDITIONAL_LATENCY",
"ADDRPATH_SHIFT_ENABLE",
"A_0",
"A_MINUS_1",
"A_MINUS_2",
"A_MINUS_3",
"A_PLUS_1",
"A_PLUS_2",
"BIAS_CTRL",
"BYPASS",
"CDR_RESET_N",
"CK_ENABLE",
"CK_PATTERN",
"CLEAR_ACTIVITY_STATS",
"CLEAR_VDL_STATS",
"CLEAR_VDL_STATS_ON_ROLLOVER",
"CLK_DIV_RATIO",
"CLOCK_DIV_RESET_N",
"COMP_ACK",
"COMP_DONE",
"COMP_EN",
"COMP_ERROR",
"COMP_INIT_FDEPTH",
"COMP_INIT_OFFSET",
"COMP_OFFSET_EN",
"COMP_OFFSET_OP",
"CTRL",
"CURRENT_ERROR",
"CUR_STATE",
"CUR_WCOUNT",
"DATA",
"DATAPATH_ADDITIONAL_LATENCY",
"DATAPATH_SHIFT_ENABLE",
"DATA_READ_UI_SHIFT",
"DATA_READ_UI_SHIFT_LOAD_VALUE",
"DATA_UI_SHIFT",
"DATA_VALID_GEN_ENABLE",
"DATA_VALID_GEN_ERROR_CLEAR",
"DATA_VALID_RP",
"DATA_VALID_WP",
"DATA_VALID_WR2RD_DELAY",
"DATA_VALID_WR2RD_DELAY_DEC",
"DATA_VALID_WR2RD_DELAY_INC",
"DATA_VALID_WR2RD_DELAY_LOAD_VALUE",
"DBI",
"DCOUNT",
"DDR4_GLUE_RESET_N",
"DEM",
"DN_VDL_LOAD_VALUE",
"DN_VDL_VALUE",
"DP_VDL_LOAD_VALUE",
"DP_VDL_VALUE",
"DQS",
"DQ_BYTE0_RD2_2G_DELAY_DEC",
"DQ_BYTE0_RD2_2G_DELAY_INC",
"DQ_BYTE0_RD2_2G_DELAY_IN_USE",
"DQ_BYTE0_RD2_2G_SELECT",
"DQ_BYTE0_WRITE_ENABLE",
"DQ_BYTE1_RD2_2G_DELAY_DEC",
"DQ_BYTE1_RD2_2G_DELAY_INC",
"DQ_BYTE1_RD2_2G_DELAY_IN_USE",
"DQ_BYTE1_RD2_2G_SELECT",
"DQ_BYTE1_WRITE_ENABLE",
"DQ_BYTE2_RD2_2G_DELAY_DEC",
"DQ_BYTE2_RD2_2G_DELAY_INC",
"DQ_BYTE2_RD2_2G_DELAY_IN_USE",
"DQ_BYTE2_RD2_2G_SELECT",
"DQ_BYTE2_WRITE_ENABLE",
"DQ_BYTE3_RD2_2G_DELAY_DEC",
"DQ_BYTE3_RD2_2G_DELAY_INC",
"DQ_BYTE3_RD2_2G_DELAY_IN_USE",
"DQ_BYTE3_RD2_2G_SELECT",
"DQ_BYTE3_WRITE_ENABLE",
"DRC_1G_RESET_N",
"EDC",
"EDC_HALF_RATE_ENABLE",
"EDC_HALF_RATE_UI_SELECT",
"EDC_READ_UI_SHIFT",
"EDC_READ_UI_SHIFT_LOAD_VALUE",
"EDC_UI_SHIFT",
"EDC_VALID_RP",
"EDC_VALID_WP",
"EDC_VALID_WR2RD_DELAY",
"EDC_VALID_WR2RD_DELAY_DEC",
"EDC_VALID_WR2RD_DELAY_INC",
"EDC_VALID_WR2RD_DELAY_LOAD_VALUE",
"ENABLE",
"EN_EXTERNAL_PHY_2G_WCLK",
"EN_NLDL_CLKOUT_BAR",
"EN_VDL_LOAD_VALUE",
"EN_VDL_VALUE",
"EP_VDL_LOAD_VALUE",
"EP_VDL_VALUE",
"ERR1_CLEAR",
"ERR2_CLEAR",
"ERROR",
"EXP_RCMD_ID",
"FIFO_W2R_MIN_DELAY_2",
"FLEXIBLE_VDL_CAP",
"FORCE_UPDATE",
"FREE_RUNNING_MODE",
"FREQ_CNTR_FC_RESET_N",
"FREQ_CNTR_RO_RESET_N",
"HALF_RATE_MODE",
"ID4",
"ID8",
"IMMEDIATE_UPDATE_THRESHOLD",
"INIT_ACCU_ACTIVE",
"INIT_SEARCH_ACTIVE",
"INIT_SEARCH_COMPLETE",
"INIT_TRACK_ACTIVE",
"INIT_TRACK_OPTIONS",
"INIT_TRACK_TRANSITION",
"MAJOR",
"MANUAL_OVERRIDE_EN",
"MASTER_MODE",
"MAX_VDL_STEP",
"MAX_VDL_VALUE",
"MAX_WCOUNT",
"MINOR",
"MIN_VDL_STEP",
"MIN_VDL_VALUE",
"NCOMP_CODE_2CORE",
"NCOMP_DIN",
"NCOMP_ENB_2CORE",
"NCOMP_INIT_CODE",
"ND",
"NDONE_2CORE",
"NTERM",
"NXT_RCMD_FIFO_WDATA0",
"NXT_RCMD_FIFO_WDATA1",
"NXT_RCMD_FIFO_WR0",
"NXT_RCMD_FIFO_WR1",
"NXT_RD_EN_UI01",
"NXT_RD_EN_UI23",
"NXT_STATE",
"OBS_INTERVAL",
"OBS_RCMD_ID",
"OVERRIDE_EN",
"OVERRIDE_MODE",
"OVERRIDE_VALUE",
"PAST_STATE0",
"PAST_STATE1",
"PAST_STATE2",
"PAST_STATE3",
"PAST_STATE4",
"PAST_STATE5",
"PAST_STATE6",
"PAST_STATE7",
"PCOMP_CODE_2CORE",
"PCOMP_DIN",
"PCOMP_ENB_2CORE",
"PCOMP_INIT_CODE",
"PD",
"PDONE_2CORE",
"PEAK",
"PHY_1G_RESET_N",
"PHY_2G_RESET_N",
"PNCOMP_INIT_DIFF",
"POWERSAVE_EN",
"PTERM",
"PULL_UP_OFF_B",
"PWRDN",
"QDR_MODE",
"RCMD_1",
"RCMD_2",
"RCMD_3",
"RCMD_4",
"RCMD_5",
"RCMD_6",
"RCMD_7",
"RCMD_8",
"RCMD_ADDITIONAL_LATENCY",
"RCMD_FIFO_RD",
"RCMD_FIFO_RDATA",
"RCMD_FIFO_RESET_N",
"RCMD_PAIR",
"RCMD_SHIFT_ENABLE",
"RD2_2G_DELAY",
"RDATA_RP",
"RDATA_WP",
"RDATA_WR2RD_DELAY",
"RDATA_WR2RD_DELAY_DEC",
"RDATA_WR2RD_DELAY_INC",
"RD_2G_DELAY",
"RD_2G_DELAY_DEC",
"RD_2G_DELAY_INC",
"RD_EN_UI01",
"RD_EN_UI23",
"READ_FIFO_RESET_N",
"REF_EXT",
"REF_SEL_EXT",
"RESCAL_RESET_N",
"RESERVED",
"ROLLOVER_AMOUNT",
"ROLLOVER_COUNT",
"ROLLOVER_MODE",
"ROLLOVER_OVERFLOW",
"ROLLOVER_PHASE_GAP",
"RO_OVERFLOW",
"RO_UCOUNT",
"RO_VDL_STEP",
"RP",
"RP0",
"RP0_XMSB",
"RP1",
"RP1_XMSB",
"RP_1G",
"RP_1G_XMSB",
"RP_2G",
"RP_2G_XMSB",
"RP_XMSB",
"RXENB",
"RXENB_ALERT_N",
"RX_BIAS",
"SEARCH_ACTIVE",
"SEARCH_ACTIVE_RETRIGGERED",
"SEARCH_ACTIVE_TIMEOUT",
"SEL_FC_REFCLK",
"START_OBS",
"STATE",
"STATE_0",
"STATE_1",
"STATE_2",
"STATE_3",
"STATE_4",
"STATE_5",
"STATE_6",
"STATE_7",
"STICKY_ERROR",
"SYSTEM_ENABLE",
"TEST_EN",
"TEST_PIN_DIV_SEL",
"TRACK_ACTIVE",
"TRACK_ACTIVE_LOST",
"TRACK_ACTIVE_TIMEOUT",
"UI_SHIFT",
"UPDATE_ENABLE_DELAY",
"UPDATE_MODE",
"VALID_0",
"VALID_1",
"VALID_2",
"VALID_3",
"VALID_4",
"VALID_5",
"VALID_6",
"VALID_7",
"VDL_1G_RESET_N",
"VDL_LOAD",
"VDL_MAX_VALUE_CAP",
"VDL_MIN_VALUE_CAP",
"VDL_SWITCH",
"VDL_UPDATE_GAP",
"W2R_MIN_DELAY_2",
"WFULL",
"WP",
"WP0",
"WP0_XMSB",
"WP1",
"WP1_XMSB",
"WP_XMSB",
"WRITE_ERROR",
"WRITE_LEVELING_MODE"
};
#endif /* !SOC_NO_NAMES */
soc_field_info_t soc_phy_ddrc16_AQ_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RXENB_ALERT_Nf, 1, 29, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_LDO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_L_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_L_MAX_VDL_ADDRr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 2, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_L_MAX_VDL_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 2, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_L_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_AQ_U_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_U_MAX_VDL_ADDRr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 2, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_U_MAX_VDL_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 2, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_AQ_U_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_COMMON_CK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CK_ENABLEf, 1, 8, 0 },
{ SOC_PHY_DDRC16_CK_PATTERNf, 8, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_LDO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_MAX_VDL_CKr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_RESCAL_INIT_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CLK_DIV_RATIOf, 3, 24, 0 },
{ SOC_PHY_DDRC16_COMP_INIT_FDEPTHf, 4, 20, 0 },
{ SOC_PHY_DDRC16_COMP_INIT_OFFSETf, 5, 15, 0 },
{ SOC_PHY_DDRC16_NCOMP_INIT_CODEf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PCOMP_INIT_CODEf, 5, 0, 0 },
{ SOC_PHY_DDRC16_PNCOMP_INIT_DIFFf, 5, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_RESCAL_OPERATION_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_COMP_ENf, 1, 11, 0 },
{ SOC_PHY_DDRC16_COMP_OFFSET_ENf, 1, 10, 0 },
{ SOC_PHY_DDRC16_COMP_OFFSET_OPf, 1, 9, 0 },
{ SOC_PHY_DDRC16_MANUAL_OVERRIDE_ENf, 1, 13, 0 },
{ SOC_PHY_DDRC16_OVERRIDE_ENf, 1, 8, 0 },
{ SOC_PHY_DDRC16_OVERRIDE_MODEf, 3, 5, 0 },
{ SOC_PHY_DDRC16_OVERRIDE_VALUEf, 5, 0, 0 },
{ SOC_PHY_DDRC16_POWERSAVE_ENf, 1, 12, 0 },
{ SOC_PHY_DDRC16_TEST_ENf, 1, 14, 0 }
};
soc_field_info_t soc_phy_ddrc16_COMMON_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_COMMON_STATUS_RESCALr_fields[] = {
{ SOC_PHY_DDRC16_COMP_ACKf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_COMP_DONEf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_COMP_ERRORf, 6, 2, SOCF_RO },
{ SOC_PHY_DDRC16_NCOMP_CODE_2COREf, 5, 17, SOCF_RO },
{ SOC_PHY_DDRC16_NCOMP_DINf, 1, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NCOMP_ENB_2COREf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_NDONE_2COREf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_PCOMP_CODE_2COREf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_PCOMP_DINf, 1, 22, SOCF_RO },
{ SOC_PHY_DDRC16_PCOMP_ENB_2COREf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_PDONE_2COREf, 1, 10, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_INITIALIZERr_fields[] = {
{ SOC_PHY_DDRC16_DQ_BYTE0_RD2_2G_SELECTf, 2, 4, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE0_WRITE_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE1_RD2_2G_SELECTf, 2, 6, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE1_WRITE_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE2_RD2_2G_SELECTf, 2, 8, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE2_WRITE_ENABLEf, 1, 2, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE3_RD2_2G_SELECTf, 2, 10, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE3_WRITE_ENABLEf, 1, 3, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_MODIFIERr_fields[] = {
{ SOC_PHY_DDRC16_DQ_BYTE0_RD2_2G_DELAY_DECf, 1, 6, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE0_RD2_2G_DELAY_INCf, 1, 5, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE0_RD2_2G_DELAY_IN_USEf, 5, 0, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE1_RD2_2G_DELAY_DECf, 1, 14, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE1_RD2_2G_DELAY_INCf, 1, 13, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE1_RD2_2G_DELAY_IN_USEf, 5, 8, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE2_RD2_2G_DELAY_DECf, 1, 22, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE2_RD2_2G_DELAY_INCf, 1, 21, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE2_RD2_2G_DELAY_IN_USEf, 5, 16, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE3_RD2_2G_DELAY_DECf, 1, 30, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE3_RD2_2G_DELAY_INCf, 1, 29, 0 },
{ SOC_PHY_DDRC16_DQ_BYTE3_RD2_2G_DELAY_IN_USEf, 5, 24, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_FREQ_CNTR_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_EN_EXTERNAL_PHY_2G_WCLKf, 1, 31, 0 },
{ SOC_PHY_DDRC16_EN_NLDL_CLKOUT_BARf, 1, 26, 0 },
{ SOC_PHY_DDRC16_OBS_INTERVALf, 16, 0, 0 },
{ SOC_PHY_DDRC16_RO_VDL_STEPf, 9, 16, 0 },
{ SOC_PHY_DDRC16_SEL_FC_REFCLKf, 1, 25, 0 },
{ SOC_PHY_DDRC16_START_OBSf, 1, 27, 0 },
{ SOC_PHY_DDRC16_TEST_PIN_DIV_SELf, 3, 28, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_INPUT_SHIFT_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ADDRPATH_ADDITIONAL_LATENCYf, 3, 5, 0 },
{ SOC_PHY_DDRC16_ADDRPATH_SHIFT_ENABLEf, 1, 4, 0 },
{ SOC_PHY_DDRC16_DATAPATH_ADDITIONAL_LATENCYf, 3, 1, 0 },
{ SOC_PHY_DDRC16_DATAPATH_SHIFT_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_RCMD_ADDITIONAL_LATENCYf, 6, 9, 0 },
{ SOC_PHY_DDRC16_RCMD_SHIFT_ENABLEf, 1, 8, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_READ_CLOCK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_FREE_RUNNING_MODEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_READ_FIFO_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_W2R_MIN_DELAY_2f, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_RESET_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_CDR_RESET_Nf, 1, 6, 0 },
{ SOC_PHY_DDRC16_CLOCK_DIV_RESET_Nf, 1, 11, 0 },
{ SOC_PHY_DDRC16_DDR4_GLUE_RESET_Nf, 1, 3, 0 },
{ SOC_PHY_DDRC16_DRC_1G_RESET_Nf, 1, 0, 0 },
{ SOC_PHY_DDRC16_FREQ_CNTR_FC_RESET_Nf, 1, 8, 0 },
{ SOC_PHY_DDRC16_FREQ_CNTR_RO_RESET_Nf, 1, 9, 0 },
{ SOC_PHY_DDRC16_PHY_1G_RESET_Nf, 1, 1, 0 },
{ SOC_PHY_DDRC16_PHY_2G_RESET_Nf, 1, 2, 0 },
{ SOC_PHY_DDRC16_RCMD_FIFO_RESET_Nf, 1, 4, 0 },
{ SOC_PHY_DDRC16_READ_FIFO_RESET_Nf, 1, 5, 0 },
{ SOC_PHY_DDRC16_RESCAL_RESET_Nf, 1, 7, 0 },
{ SOC_PHY_DDRC16_VDL_1G_RESET_Nf, 1, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_REVISIONr_fields[] = {
{ SOC_PHY_DDRC16_MAJORf, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_MINORf, 8, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_SHARED_VREF_DAC_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CTRLf, 8, 0, 0 },
{ SOC_PHY_DDRC16_DATAf, 8, 16, 0 }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_STATUS_FREQ_CNTR_DCOUNTr_fields[] = {
{ SOC_PHY_DDRC16_DCOUNTf, 16, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_STATUS_FREQ_CNTR_UCOUNTr_fields[] = {
{ SOC_PHY_DDRC16_RO_OVERFLOWf, 3, 24, SOCF_RO },
{ SOC_PHY_DDRC16_RO_UCOUNTf, 24, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_CONTROL_REGS_WRITE_FIFO_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_W2R_MIN_DELAY_2f, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_N_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EN_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_OPERATION_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_LOADf, 1, 3, 0 },
{ SOC_PHY_DDRC16_ACCU_LOAD_VALUEf, 8, 4, 0 },
{ SOC_PHY_DDRC16_ACCU_POS_THRESHOLDf, 8, 12, 0 },
{ SOC_PHY_DDRC16_CLEAR_ACTIVITY_STATSf, 1, 28, 0 },
{ SOC_PHY_DDRC16_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_FIFO_W2R_MIN_DELAY_2f, 1, 27, 0 },
{ SOC_PHY_DDRC16_HALF_RATE_MODEf, 1, 23, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_OPTIONSf, 2, 21, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_TRANSITIONf, 1, 20, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_MODEf, 3, 24, 0 },
{ SOC_PHY_DDRC16_UPDATE_MODEf, 2, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_P_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EP_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_TIMING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CLEAR_VDL_STATSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CLEAR_VDL_STATS_ON_ROLLOVERf, 1, 3, 0 },
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFT_LOAD_VALUEf, 3, 8, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFT_LOAD_VALUEf, 3, 4, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 12, 0 },
{ SOC_PHY_DDRC16_VDL_LOADf, 1, 0, 0 },
{ SOC_PHY_DDRC16_VDL_SWITCHf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_TRACK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVE_TIMEOUTf, 8, 0, 0 },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_TIMEOUTf, 4, 12, 0 },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_TIMEOUTf, 4, 8, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_UPDATE_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_IMMEDIATE_UPDATE_THRESHOLDf, 4, 4, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_AMOUNTf, 9, 16, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_PHASE_GAPf, 6, 26, 0 },
{ SOC_PHY_DDRC16_UPDATE_ENABLE_DELAYf, 6, 8, 0 },
{ SOC_PHY_DDRC16_VDL_UPDATE_GAPf, 4, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_CDR_VDL_CAP_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_FLEXIBLE_VDL_CAPf, 1, 28, 0 },
{ SOC_PHY_DDRC16_VDL_MAX_VALUE_CAPf, 9, 16, 0 },
{ SOC_PHY_DDRC16_VDL_MIN_VALUE_CAPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DATA_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DDR4_READ_MAX_VDL_FSMr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_FIFO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_RD2_2G_DELAYf, 5, 5, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAYf, 5, 0, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_DECf, 1, 11, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_INCf, 1, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_GEN_ERR_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ERR1_CLEARf, 1, 0, 0 },
{ SOC_PHY_DDRC16_ERR2_CLEARf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_STRETCH_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_A_0f, 1, 3, 0 },
{ SOC_PHY_DDRC16_A_MINUS_1f, 1, 2, 0 },
{ SOC_PHY_DDRC16_A_MINUS_2f, 1, 1, 0 },
{ SOC_PHY_DDRC16_A_MINUS_3f, 1, 0, 0 },
{ SOC_PHY_DDRC16_A_PLUS_1f, 1, 4, 0 },
{ SOC_PHY_DDRC16_A_PLUS_2f, 1, 5, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_DQS_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_GDDR5_READ_ALIGNMENT_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_UI_SHIFTf, 3, 0, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 4, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 9, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 8, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_ENABLEf, 1, 22, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_UI_SELECTf, 1, 23, 0 },
{ SOC_PHY_DDRC16_EDC_UI_SHIFTf, 3, 12, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 21, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 20, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAYf, 4, 24, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_DECf, 1, 29, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_INCf, 1, 28, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_GDDR5_READ_FSM_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ERROR_CLEARf, 1, 2, 0 },
{ SOC_PHY_DDRC16_QDR_MODEf, 1, 3, 0 },
{ SOC_PHY_DDRC16_SYSTEM_ENABLEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_LDO_R_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_LDO_W_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSDNr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSDPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSENr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSEPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQS_MASTER_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_FORCE_UPDATEf, 1, 12, 0 },
{ SOC_PHY_DDRC16_MASTER_MODEf, 1, 16, 0 },
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_DN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_DP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_EN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_EP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_N_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_OPERATIONr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVEf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_ACTIVE_LOSTf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_VALUEf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_ACCU_ACTIVEf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_ACTIVEf, 1, 15, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_COMPLETEf, 1, 16, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_TRACK_ACTIVEf, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_COUNTf, 8, 20, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_OVERFLOWf, 1, 28, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVEf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_RETRIGGEREDf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVEf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_LOSTf, 1, 14, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_P_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EP_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_TIMINGr_fields[] = {
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFTf, 3, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 2, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFTf, 3, 4, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_CTRr_fields[] = {
{ SOC_PHY_DDRC16_CUR_WCOUNTf, 6, 2, SOCF_RO },
{ SOC_PHY_DDRC16_MAX_WCOUNTf, 6, 8, SOCF_RO },
{ SOC_PHY_DDRC16_WFULLf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_WRITE_ERRORf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_PTRr_fields[] = {
{ SOC_PHY_DDRC16_RPf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WP0f, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP0_XMSBf, 1, 5, SOCF_RO },
{ SOC_PHY_DDRC16_WP1f, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_WP1_XMSBf, 1, 11, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACHr_fields[] = {
{ SOC_PHY_DDRC16_CUR_STATEf, 3, 0, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE0f, 3, 3, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE1f, 3, 6, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE2f, 3, 9, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE3f, 3, 12, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE4f, 3, 15, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE5f, 3, 18, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE6f, 3, 21, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE7f, 3, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR3r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EXP_RCMD_IDf, 6, 10, SOCF_RO },
{ SOC_PHY_DDRC16_OBS_RCMD_IDf, 6, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RDATA_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP0f, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RP0_XMSBf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RP1f, 4, 10, SOCF_RO },
{ SOC_PHY_DDRC16_RP1_XMSBf, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP_1Gf, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_RP_1G_XMSBf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2Gf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2G_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 5, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields[] = {
{ SOC_PHY_DDRC16_CURRENT_ERRORf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STICKY_ERRORf, 4, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_FIFO_POINTERSr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_RPf, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_RPf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WPf, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_RPf, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_WPf, 4, 16, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_STATUS_WRITE_LEVELINGr_fields[] = {
{ SOC_PHY_DDRC16_DATAf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_DBIf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DQSf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_EDCf, 1, 9, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_VREF_DAC_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CTRLf, 8, 0, 0 },
{ SOC_PHY_DDRC16_DATAf, 8, 16, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_LEVELING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_WRITE_LEVELING_MODEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DATAr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DATA_SHADOWr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DQSr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_N_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EN_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_OPERATION_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_LOADf, 1, 3, 0 },
{ SOC_PHY_DDRC16_ACCU_LOAD_VALUEf, 8, 4, 0 },
{ SOC_PHY_DDRC16_ACCU_POS_THRESHOLDf, 8, 12, 0 },
{ SOC_PHY_DDRC16_CLEAR_ACTIVITY_STATSf, 1, 28, 0 },
{ SOC_PHY_DDRC16_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_FIFO_W2R_MIN_DELAY_2f, 1, 27, 0 },
{ SOC_PHY_DDRC16_HALF_RATE_MODEf, 1, 23, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_OPTIONSf, 2, 21, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_TRANSITIONf, 1, 20, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_MODEf, 3, 24, 0 },
{ SOC_PHY_DDRC16_UPDATE_MODEf, 2, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_P_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EP_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_TIMING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CLEAR_VDL_STATSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CLEAR_VDL_STATS_ON_ROLLOVERf, 1, 3, 0 },
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFT_LOAD_VALUEf, 3, 8, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFT_LOAD_VALUEf, 3, 4, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 12, 0 },
{ SOC_PHY_DDRC16_VDL_LOADf, 1, 0, 0 },
{ SOC_PHY_DDRC16_VDL_SWITCHf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_TRACK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVE_TIMEOUTf, 8, 0, 0 },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_TIMEOUTf, 4, 12, 0 },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_TIMEOUTf, 4, 8, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_UPDATE_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_IMMEDIATE_UPDATE_THRESHOLDf, 4, 4, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_AMOUNTf, 9, 16, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_PHASE_GAPf, 6, 26, 0 },
{ SOC_PHY_DDRC16_UPDATE_ENABLE_DELAYf, 6, 8, 0 },
{ SOC_PHY_DDRC16_VDL_UPDATE_GAPf, 4, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_CDR_VDL_CAP_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_FLEXIBLE_VDL_CAPf, 1, 28, 0 },
{ SOC_PHY_DDRC16_VDL_MAX_VALUE_CAPf, 9, 16, 0 },
{ SOC_PHY_DDRC16_VDL_MIN_VALUE_CAPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DATA_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DDR4_READ_MAX_VDL_FSMr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_FIFO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_RD2_2G_DELAYf, 5, 5, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAYf, 5, 0, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_DECf, 1, 11, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_INCf, 1, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_GEN_ERR_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ERR1_CLEARf, 1, 0, 0 },
{ SOC_PHY_DDRC16_ERR2_CLEARf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_STRETCH_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_A_0f, 1, 3, 0 },
{ SOC_PHY_DDRC16_A_MINUS_1f, 1, 2, 0 },
{ SOC_PHY_DDRC16_A_MINUS_2f, 1, 1, 0 },
{ SOC_PHY_DDRC16_A_MINUS_3f, 1, 0, 0 },
{ SOC_PHY_DDRC16_A_PLUS_1f, 1, 4, 0 },
{ SOC_PHY_DDRC16_A_PLUS_2f, 1, 5, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_DQS_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_GDDR5_READ_ALIGNMENT_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_UI_SHIFTf, 3, 0, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 4, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 9, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 8, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_ENABLEf, 1, 22, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_UI_SELECTf, 1, 23, 0 },
{ SOC_PHY_DDRC16_EDC_UI_SHIFTf, 3, 12, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 21, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 20, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAYf, 4, 24, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_DECf, 1, 29, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_INCf, 1, 28, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_GDDR5_READ_FSM_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ERROR_CLEARf, 1, 2, 0 },
{ SOC_PHY_DDRC16_QDR_MODEf, 1, 3, 0 },
{ SOC_PHY_DDRC16_SYSTEM_ENABLEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_LDO_R_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_LDO_W_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSDNr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSDPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSENr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSEPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQS_MASTER_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_FORCE_UPDATEf, 1, 12, 0 },
{ SOC_PHY_DDRC16_MASTER_MODEf, 1, 16, 0 },
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_DN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_DP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_EN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_EP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_N_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_OPERATIONr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVEf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_ACTIVE_LOSTf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_VALUEf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_ACCU_ACTIVEf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_ACTIVEf, 1, 15, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_COMPLETEf, 1, 16, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_TRACK_ACTIVEf, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_COUNTf, 8, 20, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_OVERFLOWf, 1, 28, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVEf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_RETRIGGEREDf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVEf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_LOSTf, 1, 14, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_P_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EP_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_TIMINGr_fields[] = {
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFTf, 3, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 2, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFTf, 3, 4, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_CTRr_fields[] = {
{ SOC_PHY_DDRC16_CUR_WCOUNTf, 6, 2, SOCF_RO },
{ SOC_PHY_DDRC16_MAX_WCOUNTf, 6, 8, SOCF_RO },
{ SOC_PHY_DDRC16_WFULLf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_WRITE_ERRORf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_PTRr_fields[] = {
{ SOC_PHY_DDRC16_RPf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WP0f, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP0_XMSBf, 1, 5, SOCF_RO },
{ SOC_PHY_DDRC16_WP1f, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_WP1_XMSBf, 1, 11, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACHr_fields[] = {
{ SOC_PHY_DDRC16_CUR_STATEf, 3, 0, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE0f, 3, 3, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE1f, 3, 6, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE2f, 3, 9, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE3f, 3, 12, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE4f, 3, 15, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE5f, 3, 18, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE6f, 3, 21, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE7f, 3, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR3r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EXP_RCMD_IDf, 6, 10, SOCF_RO },
{ SOC_PHY_DDRC16_OBS_RCMD_IDf, 6, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RDATA_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP0f, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RP0_XMSBf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RP1f, 4, 10, SOCF_RO },
{ SOC_PHY_DDRC16_RP1_XMSBf, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP_1Gf, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_RP_1G_XMSBf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2Gf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2G_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 5, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields[] = {
{ SOC_PHY_DDRC16_CURRENT_ERRORf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STICKY_ERRORf, 4, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_FIFO_POINTERSr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_RPf, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_RPf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WPf, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_RPf, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_WPf, 4, 16, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_STATUS_WRITE_LEVELINGr_fields[] = {
{ SOC_PHY_DDRC16_DATAf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_DBIf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DQSf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_EDCf, 1, 9, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_VREF_DAC_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CTRLf, 8, 0, 0 },
{ SOC_PHY_DDRC16_DATAf, 8, 16, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_LEVELING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_WRITE_LEVELING_MODEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DATAr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DATA_SHADOWr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DQSr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_N_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EN_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_OPERATION_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_LOADf, 1, 3, 0 },
{ SOC_PHY_DDRC16_ACCU_LOAD_VALUEf, 8, 4, 0 },
{ SOC_PHY_DDRC16_ACCU_POS_THRESHOLDf, 8, 12, 0 },
{ SOC_PHY_DDRC16_CLEAR_ACTIVITY_STATSf, 1, 28, 0 },
{ SOC_PHY_DDRC16_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_FIFO_W2R_MIN_DELAY_2f, 1, 27, 0 },
{ SOC_PHY_DDRC16_HALF_RATE_MODEf, 1, 23, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_OPTIONSf, 2, 21, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_TRANSITIONf, 1, 20, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_MODEf, 3, 24, 0 },
{ SOC_PHY_DDRC16_UPDATE_MODEf, 2, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_P_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EP_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_TIMING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CLEAR_VDL_STATSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CLEAR_VDL_STATS_ON_ROLLOVERf, 1, 3, 0 },
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFT_LOAD_VALUEf, 3, 8, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFT_LOAD_VALUEf, 3, 4, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 12, 0 },
{ SOC_PHY_DDRC16_VDL_LOADf, 1, 0, 0 },
{ SOC_PHY_DDRC16_VDL_SWITCHf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_TRACK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVE_TIMEOUTf, 8, 0, 0 },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_TIMEOUTf, 4, 12, 0 },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_TIMEOUTf, 4, 8, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_UPDATE_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_IMMEDIATE_UPDATE_THRESHOLDf, 4, 4, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_AMOUNTf, 9, 16, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_PHASE_GAPf, 6, 26, 0 },
{ SOC_PHY_DDRC16_UPDATE_ENABLE_DELAYf, 6, 8, 0 },
{ SOC_PHY_DDRC16_VDL_UPDATE_GAPf, 4, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_CDR_VDL_CAP_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_FLEXIBLE_VDL_CAPf, 1, 28, 0 },
{ SOC_PHY_DDRC16_VDL_MAX_VALUE_CAPf, 9, 16, 0 },
{ SOC_PHY_DDRC16_VDL_MIN_VALUE_CAPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DATA_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DDR4_READ_MAX_VDL_FSMr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_FIFO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_RD2_2G_DELAYf, 5, 5, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAYf, 5, 0, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_DECf, 1, 11, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_INCf, 1, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_GEN_ERR_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ERR1_CLEARf, 1, 0, 0 },
{ SOC_PHY_DDRC16_ERR2_CLEARf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_STRETCH_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_A_0f, 1, 3, 0 },
{ SOC_PHY_DDRC16_A_MINUS_1f, 1, 2, 0 },
{ SOC_PHY_DDRC16_A_MINUS_2f, 1, 1, 0 },
{ SOC_PHY_DDRC16_A_MINUS_3f, 1, 0, 0 },
{ SOC_PHY_DDRC16_A_PLUS_1f, 1, 4, 0 },
{ SOC_PHY_DDRC16_A_PLUS_2f, 1, 5, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_DQS_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_GDDR5_READ_ALIGNMENT_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_UI_SHIFTf, 3, 0, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 4, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 9, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 8, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_ENABLEf, 1, 22, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_UI_SELECTf, 1, 23, 0 },
{ SOC_PHY_DDRC16_EDC_UI_SHIFTf, 3, 12, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 21, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 20, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAYf, 4, 24, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_DECf, 1, 29, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_INCf, 1, 28, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_GDDR5_READ_FSM_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ERROR_CLEARf, 1, 2, 0 },
{ SOC_PHY_DDRC16_QDR_MODEf, 1, 3, 0 },
{ SOC_PHY_DDRC16_SYSTEM_ENABLEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_LDO_R_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_LDO_W_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSDNr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSDPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSENr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSEPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQS_MASTER_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_FORCE_UPDATEf, 1, 12, 0 },
{ SOC_PHY_DDRC16_MASTER_MODEf, 1, 16, 0 },
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_DN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_DP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_EN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_EP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_N_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_OPERATIONr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVEf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_ACTIVE_LOSTf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_VALUEf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_ACCU_ACTIVEf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_ACTIVEf, 1, 15, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_COMPLETEf, 1, 16, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_TRACK_ACTIVEf, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_COUNTf, 8, 20, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_OVERFLOWf, 1, 28, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVEf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_RETRIGGEREDf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVEf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_LOSTf, 1, 14, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_P_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EP_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_TIMINGr_fields[] = {
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFTf, 3, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 2, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFTf, 3, 4, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_CTRr_fields[] = {
{ SOC_PHY_DDRC16_CUR_WCOUNTf, 6, 2, SOCF_RO },
{ SOC_PHY_DDRC16_MAX_WCOUNTf, 6, 8, SOCF_RO },
{ SOC_PHY_DDRC16_WFULLf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_WRITE_ERRORf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_PTRr_fields[] = {
{ SOC_PHY_DDRC16_RPf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WP0f, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP0_XMSBf, 1, 5, SOCF_RO },
{ SOC_PHY_DDRC16_WP1f, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_WP1_XMSBf, 1, 11, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACHr_fields[] = {
{ SOC_PHY_DDRC16_CUR_STATEf, 3, 0, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE0f, 3, 3, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE1f, 3, 6, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE2f, 3, 9, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE3f, 3, 12, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE4f, 3, 15, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE5f, 3, 18, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE6f, 3, 21, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE7f, 3, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR3r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EXP_RCMD_IDf, 6, 10, SOCF_RO },
{ SOC_PHY_DDRC16_OBS_RCMD_IDf, 6, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RDATA_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP0f, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RP0_XMSBf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RP1f, 4, 10, SOCF_RO },
{ SOC_PHY_DDRC16_RP1_XMSBf, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP_1Gf, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_RP_1G_XMSBf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2Gf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2G_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 5, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields[] = {
{ SOC_PHY_DDRC16_CURRENT_ERRORf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STICKY_ERRORf, 4, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_FIFO_POINTERSr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_RPf, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_RPf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WPf, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_RPf, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_WPf, 4, 16, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_STATUS_WRITE_LEVELINGr_fields[] = {
{ SOC_PHY_DDRC16_DATAf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_DBIf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DQSf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_EDCf, 1, 9, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_VREF_DAC_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CTRLf, 8, 0, 0 },
{ SOC_PHY_DDRC16_DATAf, 8, 16, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_LEVELING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_WRITE_LEVELING_MODEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DATAr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DATA_SHADOWr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DQSr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_N_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EN_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_OPERATION_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_LOADf, 1, 3, 0 },
{ SOC_PHY_DDRC16_ACCU_LOAD_VALUEf, 8, 4, 0 },
{ SOC_PHY_DDRC16_ACCU_POS_THRESHOLDf, 8, 12, 0 },
{ SOC_PHY_DDRC16_CLEAR_ACTIVITY_STATSf, 1, 28, 0 },
{ SOC_PHY_DDRC16_ENABLEf, 1, 0, 0 },
{ SOC_PHY_DDRC16_FIFO_W2R_MIN_DELAY_2f, 1, 27, 0 },
{ SOC_PHY_DDRC16_HALF_RATE_MODEf, 1, 23, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_OPTIONSf, 2, 21, 0 },
{ SOC_PHY_DDRC16_INIT_TRACK_TRANSITIONf, 1, 20, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_MODEf, 3, 24, 0 },
{ SOC_PHY_DDRC16_UPDATE_MODEf, 2, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_P_VDL_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_LOAD_VALUEf, 9, 16, 0 },
{ SOC_PHY_DDRC16_EP_VDL_LOAD_VALUEf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_TIMING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CLEAR_VDL_STATSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CLEAR_VDL_STATS_ON_ROLLOVERf, 1, 3, 0 },
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFT_LOAD_VALUEf, 3, 8, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFT_LOAD_VALUEf, 3, 4, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_LOAD_VALUEf, 4, 12, 0 },
{ SOC_PHY_DDRC16_VDL_LOADf, 1, 0, 0 },
{ SOC_PHY_DDRC16_VDL_SWITCHf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_TRACK_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVE_TIMEOUTf, 8, 0, 0 },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_TIMEOUTf, 4, 12, 0 },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_TIMEOUTf, 4, 8, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_UPDATE_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_IMMEDIATE_UPDATE_THRESHOLDf, 4, 4, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_AMOUNTf, 9, 16, 0 },
{ SOC_PHY_DDRC16_ROLLOVER_PHASE_GAPf, 6, 26, 0 },
{ SOC_PHY_DDRC16_UPDATE_ENABLE_DELAYf, 6, 8, 0 },
{ SOC_PHY_DDRC16_VDL_UPDATE_GAPf, 4, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_CDR_VDL_CAP_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_FLEXIBLE_VDL_CAPf, 1, 28, 0 },
{ SOC_PHY_DDRC16_VDL_MAX_VALUE_CAPf, 9, 16, 0 },
{ SOC_PHY_DDRC16_VDL_MIN_VALUE_CAPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DATA_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DDR4_READ_MAX_VDL_FSMr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_FIFO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_RD2_2G_DELAYf, 5, 5, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAYf, 5, 0, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_DECf, 1, 11, 0 },
{ SOC_PHY_DDRC16_RD_2G_DELAY_INCf, 1, 10, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_GEN_ERR_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_ERR1_CLEARf, 1, 0, 0 },
{ SOC_PHY_DDRC16_ERR2_CLEARf, 1, 1, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_STRETCH_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_A_0f, 1, 3, 0 },
{ SOC_PHY_DDRC16_A_MINUS_1f, 1, 2, 0 },
{ SOC_PHY_DDRC16_A_MINUS_2f, 1, 1, 0 },
{ SOC_PHY_DDRC16_A_MINUS_3f, 1, 0, 0 },
{ SOC_PHY_DDRC16_A_PLUS_1f, 1, 4, 0 },
{ SOC_PHY_DDRC16_A_PLUS_2f, 1, 5, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_DQS_IO_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_DEMf, 2, 11, 0 },
{ SOC_PHY_DDRC16_NDf, 5, 0, 0 },
{ SOC_PHY_DDRC16_NTERMf, 5, 19, 0 },
{ SOC_PHY_DDRC16_PDf, 5, 5, 0 },
{ SOC_PHY_DDRC16_PEAKf, 2, 13, 0 },
{ SOC_PHY_DDRC16_PTERMf, 5, 24, 0 },
{ SOC_PHY_DDRC16_PULL_UP_OFF_Bf, 1, 17, 0 },
{ SOC_PHY_DDRC16_RXENBf, 1, 10, 0 },
{ SOC_PHY_DDRC16_RX_BIASf, 2, 15, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_GDDR5_READ_ALIGNMENT_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_UI_SHIFTf, 3, 0, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 4, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 9, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 8, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_ENABLEf, 1, 22, 0 },
{ SOC_PHY_DDRC16_EDC_HALF_RATE_UI_SELECTf, 1, 23, 0 },
{ SOC_PHY_DDRC16_EDC_UI_SHIFTf, 3, 12, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 16, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 21, 0 },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 20, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAYf, 4, 24, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_DECf, 1, 29, 0 },
{ SOC_PHY_DDRC16_RDATA_WR2RD_DELAY_INCf, 1, 28, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_GDDR5_READ_FSM_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ENABLEf, 1, 1, 0 },
{ SOC_PHY_DDRC16_DATA_VALID_GEN_ERROR_CLEARf, 1, 2, 0 },
{ SOC_PHY_DDRC16_QDR_MODEf, 1, 3, 0 },
{ SOC_PHY_DDRC16_SYSTEM_ENABLEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_LDO_R_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_LDO_W_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_BIAS_CTRLf, 2, 0, 0 },
{ SOC_PHY_DDRC16_BYPASSf, 1, 2, 0 },
{ SOC_PHY_DDRC16_CTRLf, 6, 3, 0 },
{ SOC_PHY_DDRC16_PWRDNf, 1, 9, 0 },
{ SOC_PHY_DDRC16_REF_EXTf, 1, 12, 0 },
{ SOC_PHY_DDRC16_REF_SEL_EXTf, 1, 13, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_MACRO_RESERVED_REGr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSDNr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSDPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSENr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSEPr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQS_MASTER_CTRLr_fields[] = {
{ SOC_PHY_DDRC16_FORCE_UPDATEf, 1, 12, 0 },
{ SOC_PHY_DDRC16_MASTER_MODEf, 1, 16, 0 },
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_DN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_DP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_EN_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_EP_VDL_STATr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_MIN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_N_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DN_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EN_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_OPERATIONr_fields[] = {
{ SOC_PHY_DDRC16_ACCU_ACTIVEf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_ACTIVE_LOSTf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_ACCU_VALUEf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_ACCU_ACTIVEf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_ACTIVEf, 1, 15, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_SEARCH_COMPLETEf, 1, 16, SOCF_RO },
{ SOC_PHY_DDRC16_INIT_TRACK_ACTIVEf, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_COUNTf, 8, 20, SOCF_RO },
{ SOC_PHY_DDRC16_ROLLOVER_OVERFLOWf, 1, 28, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVEf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_SEARCH_ACTIVE_RETRIGGEREDf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVEf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_TRACK_ACTIVE_LOSTf, 1, 14, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_P_VDLr_fields[] = {
{ SOC_PHY_DDRC16_DP_VDL_VALUEf, 9, 16, SOCF_RO },
{ SOC_PHY_DDRC16_EP_VDL_VALUEf, 9, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_TIMINGr_fields[] = {
{ SOC_PHY_DDRC16_DATA_READ_UI_SHIFTf, 3, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAYf, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_DECf, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WR2RD_DELAY_INCf, 1, 2, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_READ_UI_SHIFTf, 3, 4, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAYf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_DECf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WR2RD_DELAY_INCf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_CTRr_fields[] = {
{ SOC_PHY_DDRC16_CUR_WCOUNTf, 6, 2, SOCF_RO },
{ SOC_PHY_DDRC16_MAX_WCOUNTf, 6, 8, SOCF_RO },
{ SOC_PHY_DDRC16_WFULLf, 1, 1, SOCF_RO },
{ SOC_PHY_DDRC16_WRITE_ERRORf, 1, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_PTRr_fields[] = {
{ SOC_PHY_DDRC16_RPf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WP0f, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP0_XMSBf, 1, 5, SOCF_RO },
{ SOC_PHY_DDRC16_WP1f, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_WP1_XMSBf, 1, 11, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACHr_fields[] = {
{ SOC_PHY_DDRC16_CUR_STATEf, 3, 0, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE0f, 3, 3, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE1f, 3, 6, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE2f, 3, 9, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE3f, 3, 12, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE4f, 3, 15, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE5f, 3, 18, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE6f, 3, 21, SOCF_RO },
{ SOC_PHY_DDRC16_PAST_STATE7f, 3, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDf, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_FIFO_RDATAf, 8, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR3r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EXP_RCMD_IDf, 6, 10, SOCF_RO },
{ SOC_PHY_DDRC16_OBS_RCMD_IDf, 6, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 3, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RDATA_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP0f, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RP0_XMSBf, 1, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RP1f, 4, 10, SOCF_RO },
{ SOC_PHY_DDRC16_RP1_XMSBf, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_FIFOr_fields[] = {
{ SOC_PHY_DDRC16_RP_1Gf, 5, 6, SOCF_RO },
{ SOC_PHY_DDRC16_RP_1G_XMSBf, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2Gf, 5, 12, SOCF_RO },
{ SOC_PHY_DDRC16_RP_2G_XMSBf, 1, 17, SOCF_RO },
{ SOC_PHY_DDRC16_WPf, 5, 0, SOCF_RO },
{ SOC_PHY_DDRC16_WP_XMSBf, 1, 5, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR1r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR2r_fields[] = {
{ SOC_PHY_DDRC16_ERRORf, 1, 0, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA0f, 8, 15, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WDATA1f, 8, 23, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR0f, 1, 13, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RCMD_FIFO_WR1f, 1, 14, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI01f, 1, 11, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_RD_EN_UI23f, 1, 12, SOCF_RO },
{ SOC_PHY_DDRC16_NXT_STATEf, 2, 9, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_PAIRf, 4, 5, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI01f, 1, 3, SOCF_RO },
{ SOC_PHY_DDRC16_RD_EN_UI23f, 1, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATEf, 2, 1, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_RCMD_IDr_fields[] = {
{ SOC_PHY_DDRC16_ID4f, 6, 0, SOCF_RO },
{ SOC_PHY_DDRC16_ID8f, 6, 6, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields[] = {
{ SOC_PHY_DDRC16_CURRENT_ERRORf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STICKY_ERRORf, 4, 4, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_1f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_2f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_3f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_4f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields[] = {
{ SOC_PHY_DDRC16_RCMD_5f, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_6f, 8, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_7f, 8, 16, SOCF_RO },
{ SOC_PHY_DDRC16_RCMD_8f, 8, 24, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields[] = {
{ SOC_PHY_DDRC16_STATE_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_STATE_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields[] = {
{ SOC_PHY_DDRC16_VALID_0f, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_1f, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_2f, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_3f, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_4f, 4, 16, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_5f, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_6f, 4, 24, SOCF_RO },
{ SOC_PHY_DDRC16_VALID_7f, 4, 28, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_FIFO_POINTERSr_fields[] = {
{ SOC_PHY_DDRC16_DATA_VALID_RPf, 4, 4, SOCF_RO },
{ SOC_PHY_DDRC16_DATA_VALID_WPf, 4, 0, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_RPf, 4, 12, SOCF_RO },
{ SOC_PHY_DDRC16_EDC_VALID_WPf, 4, 8, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_RPf, 4, 20, SOCF_RO },
{ SOC_PHY_DDRC16_RDATA_WPf, 4, 16, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_MACRO_RESERVEDr_fields[] = {
{ SOC_PHY_DDRC16_RESERVEDf, 32, 0, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_STATUS_WRITE_LEVELINGr_fields[] = {
{ SOC_PHY_DDRC16_DATAf, 8, 0, SOCF_RO },
{ SOC_PHY_DDRC16_DBIf, 1, 8, SOCF_RO },
{ SOC_PHY_DDRC16_DQSf, 1, 10, SOCF_RO },
{ SOC_PHY_DDRC16_EDCf, 1, 9, SOCF_RO }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_VREF_DAC_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_CTRLf, 8, 0, 0 },
{ SOC_PHY_DDRC16_DATAf, 8, 16, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_LEVELING_CONFIGr_fields[] = {
{ SOC_PHY_DDRC16_WRITE_LEVELING_MODEf, 1, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DATAr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DATA_SHADOWr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DQSr_fields[] = {
{ SOC_PHY_DDRC16_MAX_VDL_STEPf, 9, 0, 0 },
{ SOC_PHY_DDRC16_UI_SHIFTf, 3, 9, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT0r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT1r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT2r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT3r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT4r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT5r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT6r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT7r_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_DBIr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_field_info_t soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_EDCr_fields[] = {
{ SOC_PHY_DDRC16_MIN_VDL_STEPf, 7, 0, 0 }
};
soc_reg_info_t soc_phy_ddrc16_reg_list[] = {
{ /* SOC_PHY_DDRC16_REG_AQ_IO_CONFIGr */
0,
0,
1,
0,
0xd04,
0,
0,
10,
soc_phy_ddrc16_AQ_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b860f, 0x00000000)
SOC_RESET_MASK_DEC(0x3ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_LDO_CONFIGr */
0,
0,
1,
0,
0xd05,
0,
0,
6,
soc_phy_ddrc16_AQ_LDO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_L_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0xd06,
0,
0,
1,
soc_phy_ddrc16_AQ_L_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_L_MAX_VDL_ADDRr */
0,
0,
1,
0,
0xd00,
0,
0,
2,
soc_phy_ddrc16_AQ_L_MAX_VDL_ADDRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_L_MAX_VDL_CTRLr */
0,
0,
1,
0,
0xd01,
0,
0,
2,
soc_phy_ddrc16_AQ_L_MAX_VDL_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_L_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0xd07,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_AQ_L_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_U_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0xd08,
0,
0,
1,
soc_phy_ddrc16_AQ_U_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_U_MAX_VDL_ADDRr */
0,
0,
1,
0,
0xd02,
0,
0,
2,
soc_phy_ddrc16_AQ_U_MAX_VDL_ADDRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_U_MAX_VDL_CTRLr */
0,
0,
1,
0,
0xd03,
0,
0,
2,
soc_phy_ddrc16_AQ_U_MAX_VDL_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_AQ_U_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0xd09,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_AQ_U_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_CK_CONFIGr */
0,
0,
1,
0,
0xe01,
0,
0,
2,
soc_phy_ddrc16_COMMON_CK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000033, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_IO_CONFIGr */
0,
0,
1,
0,
0xe02,
0,
0,
9,
soc_phy_ddrc16_COMMON_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b860f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_LDO_CONFIGr */
0,
0,
1,
0,
0xe03,
0,
0,
6,
soc_phy_ddrc16_COMMON_LDO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0xe07,
0,
0,
1,
soc_phy_ddrc16_COMMON_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_MAX_VDL_CKr */
0,
0,
1,
0,
0xe00,
0,
0,
2,
soc_phy_ddrc16_COMMON_MAX_VDL_CKr_fields,
SOC_RESET_VAL_DEC(0x00000600, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_RESCAL_INIT_CONFIGr */
0,
0,
1,
0,
0xe04,
0,
0,
6,
soc_phy_ddrc16_COMMON_RESCAL_INIT_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x037141f0, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_RESCAL_OPERATION_CONFIGr */
0,
0,
1,
0,
0xe05,
0,
0,
9,
soc_phy_ddrc16_COMMON_RESCAL_OPERATION_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0xe08,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_COMMON_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_COMMON_STATUS_RESCALr */
0,
0,
1,
0,
0xe06,
SOC_REG_FLAG_RO,
0,
11,
soc_phy_ddrc16_COMMON_STATUS_RESCALr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_INITIALIZERr */
0,
0,
1,
0,
0xf06,
0,
0,
8,
soc_phy_ddrc16_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_INITIALIZERr_fields,
SOC_RESET_VAL_DEC(0x00000e40, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_MODIFIERr */
0,
0,
1,
0,
0xf07,
0,
0,
12,
soc_phy_ddrc16_CONTROL_REGS_DDR4_REN_FIFO_CENTRAL_MODIFIERr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7f7f7f7f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_FREQ_CNTR_CONFIGr */
0,
0,
1,
0,
0xf09,
0,
0,
7,
soc_phy_ddrc16_CONTROL_REGS_FREQ_CNTR_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_INPUT_SHIFT_CTRLr */
0,
0,
1,
0,
0xf05,
0,
0,
6,
soc_phy_ddrc16_CONTROL_REGS_INPUT_SHIFT_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_READ_CLOCK_CONFIGr */
0,
0,
1,
0,
0xf04,
0,
0,
1,
soc_phy_ddrc16_CONTROL_REGS_READ_CLOCK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000001, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_READ_FIFO_CTRLr */
0,
0,
1,
0,
0xf02,
0,
0,
2,
soc_phy_ddrc16_CONTROL_REGS_READ_FIFO_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000003, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_RESERVED_REGr */
0,
0,
1,
0,
0xf0c,
0,
0,
1,
soc_phy_ddrc16_CONTROL_REGS_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_RESET_CTRLr */
0,
0,
1,
0,
0xf01,
0,
0,
12,
soc_phy_ddrc16_CONTROL_REGS_RESET_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_REVISIONr */
0,
0,
1,
0,
0xf00,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_CONTROL_REGS_REVISIONr_fields,
SOC_RESET_VAL_DEC(0x0000b000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_SHARED_VREF_DAC_CONFIGr */
0,
0,
1,
0,
0xf08,
0,
0,
2,
soc_phy_ddrc16_CONTROL_REGS_SHARED_VREF_DAC_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00920000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ff00ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_STATUS_FREQ_CNTR_DCOUNTr */
0,
0,
1,
0,
0xf0a,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_CONTROL_REGS_STATUS_FREQ_CNTR_DCOUNTr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_STATUS_FREQ_CNTR_UCOUNTr */
0,
0,
1,
0,
0xf0b,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_CONTROL_REGS_STATUS_FREQ_CNTR_UCOUNTr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0xf0d,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_CONTROL_REGS_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_CONTROL_REGS_WRITE_FIFO_CTRLr */
0,
0,
1,
0,
0xf03,
0,
0,
1,
soc_phy_ddrc16_CONTROL_REGS_WRITE_FIFO_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_N_VDL_CONFIGr */
0,
0,
1,
0,
0x2e,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_CDR_N_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_OPERATION_CONFIGr */
0,
0,
1,
0,
0x28,
0,
0,
11,
soc_phy_ddrc16_DQ_BYTE0_CDR_OPERATION_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00310000, 0x00000000)
SOC_RESET_MASK_DEC(0x1fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_P_VDL_CONFIGr */
0,
0,
1,
0,
0x2d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_CDR_P_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_TIMING_CONFIGr */
0,
0,
1,
0,
0x2b,
0,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_CDR_TIMING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_TRACK_CONFIGr */
0,
0,
1,
0,
0x2a,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE0_CDR_TRACK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000ffff, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_UPDATE_CONFIGr */
0,
0,
1,
0,
0x29,
0,
0,
5,
soc_phy_ddrc16_DQ_BYTE0_CDR_UPDATE_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0c000001, 0x00000000)
SOC_RESET_MASK_DEC(0xfdff3fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_CDR_VDL_CAP_CONFIGr */
0,
0,
1,
0,
0x2c,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE0_CDR_VDL_CAP_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x01ff0000, 0x00000000)
SOC_RESET_MASK_DEC(0x11ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DATA_IO_CONFIGr */
0,
0,
1,
0,
0x23,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE0_DATA_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DDR4_READ_MAX_VDL_FSMr */
0,
0,
1,
0,
0x20,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_DDR4_READ_MAX_VDL_FSMr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DDR4_REN_FIFO_CONFIGr */
0,
0,
1,
0,
0x1e,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_FIFO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DDR4_REN_GEN_ERR_CTRLr */
0,
0,
1,
0,
0x1d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_GEN_ERR_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000003, 0x00000000)
SOC_RESET_MASK_DEC(0x00000003, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DDR4_REN_STRETCH_CONFIGr */
0,
0,
1,
0,
0x1f,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_DDR4_REN_STRETCH_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000001e, 0x00000000)
SOC_RESET_MASK_DEC(0x0000003f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_DQS_IO_CONFIGr */
0,
0,
1,
0,
0x24,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE0_DQS_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_GDDR5_READ_ALIGNMENT_CTRLr */
0,
0,
1,
0,
0x21,
0,
0,
13,
soc_phy_ddrc16_DQ_BYTE0_GDDR5_READ_ALIGNMENT_CTRLr_fields,
SOC_RESET_VAL_DEC(0x04000000, 0x00000000)
SOC_RESET_MASK_DEC(0x3fff73f7, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_GDDR5_READ_FSM_CTRLr */
0,
0,
1,
0,
0x22,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_GDDR5_READ_FSM_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000000f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_LDO_R_CONFIGr */
0,
0,
1,
0,
0x26,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_LDO_R_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_LDO_W_CONFIGr */
0,
0,
1,
0,
0x27,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_LDO_W_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0x4e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MAX_VDL_DQSDNr */
0,
0,
1,
0,
0x1b,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSDNr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MAX_VDL_DQSDPr */
0,
0,
1,
0,
0x19,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSDPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MAX_VDL_DQSENr */
0,
0,
1,
0,
0x1a,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSENr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MAX_VDL_DQSEPr */
0,
0,
1,
0,
0x18,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQSEPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MAX_VDL_DQS_MASTER_CTRLr */
0,
0,
1,
0,
0x17,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE0_READ_MAX_VDL_DQS_MASTER_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000111ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT0r */
0,
0,
1,
0,
0xd,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT1r */
0,
0,
1,
0,
0xe,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT2r */
0,
0,
1,
0,
0xf,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x10,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x11,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x12,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x13,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x14,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_DBIr */
0,
0,
1,
0,
0x15,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_READ_MIN_VDL_EDCr */
0,
0,
1,
0,
0x16,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_READ_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_DN_VDL_STATr */
0,
0,
1,
0,
0x34,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_DN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_DP_VDL_STATr */
0,
0,
1,
0,
0x32,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_DP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_EN_VDL_STATr */
0,
0,
1,
0,
0x33,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_EN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_EP_VDL_STATr */
0,
0,
1,
0,
0x31,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_EP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_N_VDLr */
0,
0,
1,
0,
0x30,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_N_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_OPERATIONr */
0,
0,
1,
0,
0x35,
SOC_REG_FLAG_RO,
0,
13,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_OPERATIONr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x1ff3ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_P_VDLr */
0,
0,
1,
0,
0x2f,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_P_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_CDR_TIMINGr */
0,
0,
1,
0,
0x36,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_STATUS_CDR_TIMINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_CTRr */
0,
0,
1,
0,
0x38,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_CTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00003fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_PTRr */
0,
0,
1,
0,
0x37,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_FIFO_PTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_MACHr */
0,
0,
1,
0,
0x39,
SOC_REG_FLAG_RO,
0,
9,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACHr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR1r */
0,
0,
1,
0,
0x3a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR2r */
0,
0,
1,
0,
0x3b,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR3r */
0,
0,
1,
0,
0x3c,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_ERR3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_RCMD_IDr */
0,
0,
1,
0,
0x3d,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_RDATA_FIFOr */
0,
0,
1,
0,
0x3e,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_RDATA_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_REN_FIFOr */
0,
0,
1,
0,
0x3f,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR1r */
0,
0,
1,
0,
0x41,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR2r */
0,
0,
1,
0,
0x42,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_DDR4_REN_GEN_RCMD_IDr */
0,
0,
1,
0,
0x40,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_DDR4_REN_GEN_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERRORr */
0,
0,
1,
0,
0x48,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000000ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr */
0,
0,
1,
0,
0x49,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr */
0,
0,
1,
0,
0x4a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr */
0,
0,
1,
0,
0x4b,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr */
0,
0,
1,
0,
0x4c,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr */
0,
0,
1,
0,
0x44,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr */
0,
0,
1,
0,
0x45,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr */
0,
0,
1,
0,
0x46,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr */
0,
0,
1,
0,
0x47,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_GDDR5_FIFO_POINTERSr */
0,
0,
1,
0,
0x43,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE0_STATUS_GDDR5_FIFO_POINTERSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0x4f,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_STATUS_WRITE_LEVELINGr */
0,
0,
1,
0,
0x4d,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE0_STATUS_WRITE_LEVELINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_VREF_DAC_CONFIGr */
0,
0,
1,
0,
0x25,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_VREF_DAC_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00920000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ff00ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_LEVELING_CONFIGr */
0,
0,
1,
0,
0x1c,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_LEVELING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MAX_VDL_DATAr */
0,
0,
1,
0,
0xa,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DATAr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MAX_VDL_DATA_SHADOWr */
0,
0,
1,
0,
0xb,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DATA_SHADOWr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MAX_VDL_DQSr */
0,
0,
1,
0,
0xc,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MAX_VDL_DQSr_fields,
SOC_RESET_VAL_DEC(0x00000400, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT0r */
0,
0,
1,
0,
0,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x1,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x2,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x3,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x4,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x5,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x6,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x7,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_DBIr */
0,
0,
1,
0,
0x8,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE0_WRITE_MIN_VDL_EDCr */
0,
0,
1,
0,
0x9,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE0_WRITE_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_N_VDL_CONFIGr */
0,
0,
1,
0,
0x12e,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_CDR_N_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_OPERATION_CONFIGr */
0,
0,
1,
0,
0x128,
0,
0,
11,
soc_phy_ddrc16_DQ_BYTE1_CDR_OPERATION_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00310000, 0x00000000)
SOC_RESET_MASK_DEC(0x1fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_P_VDL_CONFIGr */
0,
0,
1,
0,
0x12d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_CDR_P_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_TIMING_CONFIGr */
0,
0,
1,
0,
0x12b,
0,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_CDR_TIMING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_TRACK_CONFIGr */
0,
0,
1,
0,
0x12a,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE1_CDR_TRACK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000ffff, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_UPDATE_CONFIGr */
0,
0,
1,
0,
0x129,
0,
0,
5,
soc_phy_ddrc16_DQ_BYTE1_CDR_UPDATE_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0c000001, 0x00000000)
SOC_RESET_MASK_DEC(0xfdff3fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_CDR_VDL_CAP_CONFIGr */
0,
0,
1,
0,
0x12c,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE1_CDR_VDL_CAP_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x01ff0000, 0x00000000)
SOC_RESET_MASK_DEC(0x11ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DATA_IO_CONFIGr */
0,
0,
1,
0,
0x123,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE1_DATA_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DDR4_READ_MAX_VDL_FSMr */
0,
0,
1,
0,
0x120,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_DDR4_READ_MAX_VDL_FSMr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DDR4_REN_FIFO_CONFIGr */
0,
0,
1,
0,
0x11e,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_FIFO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DDR4_REN_GEN_ERR_CTRLr */
0,
0,
1,
0,
0x11d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_GEN_ERR_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000003, 0x00000000)
SOC_RESET_MASK_DEC(0x00000003, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DDR4_REN_STRETCH_CONFIGr */
0,
0,
1,
0,
0x11f,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_DDR4_REN_STRETCH_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000001e, 0x00000000)
SOC_RESET_MASK_DEC(0x0000003f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_DQS_IO_CONFIGr */
0,
0,
1,
0,
0x124,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE1_DQS_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_GDDR5_READ_ALIGNMENT_CTRLr */
0,
0,
1,
0,
0x121,
0,
0,
13,
soc_phy_ddrc16_DQ_BYTE1_GDDR5_READ_ALIGNMENT_CTRLr_fields,
SOC_RESET_VAL_DEC(0x04000000, 0x00000000)
SOC_RESET_MASK_DEC(0x3fff73f7, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_GDDR5_READ_FSM_CTRLr */
0,
0,
1,
0,
0x122,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_GDDR5_READ_FSM_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000000f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_LDO_R_CONFIGr */
0,
0,
1,
0,
0x126,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_LDO_R_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_LDO_W_CONFIGr */
0,
0,
1,
0,
0x127,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_LDO_W_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0x14e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MAX_VDL_DQSDNr */
0,
0,
1,
0,
0x11b,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSDNr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MAX_VDL_DQSDPr */
0,
0,
1,
0,
0x119,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSDPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MAX_VDL_DQSENr */
0,
0,
1,
0,
0x11a,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSENr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MAX_VDL_DQSEPr */
0,
0,
1,
0,
0x118,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQSEPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MAX_VDL_DQS_MASTER_CTRLr */
0,
0,
1,
0,
0x117,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE1_READ_MAX_VDL_DQS_MASTER_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000111ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x10d,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x10e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x10f,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x110,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x111,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x112,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x113,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x114,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_DBIr */
0,
0,
1,
0,
0x115,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_READ_MIN_VDL_EDCr */
0,
0,
1,
0,
0x116,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_READ_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_DN_VDL_STATr */
0,
0,
1,
0,
0x134,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_DN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_DP_VDL_STATr */
0,
0,
1,
0,
0x132,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_DP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_EN_VDL_STATr */
0,
0,
1,
0,
0x133,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_EN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_EP_VDL_STATr */
0,
0,
1,
0,
0x131,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_EP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_N_VDLr */
0,
0,
1,
0,
0x130,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_N_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_OPERATIONr */
0,
0,
1,
0,
0x135,
SOC_REG_FLAG_RO,
0,
13,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_OPERATIONr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x1ff3ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_P_VDLr */
0,
0,
1,
0,
0x12f,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_P_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_CDR_TIMINGr */
0,
0,
1,
0,
0x136,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_STATUS_CDR_TIMINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_CTRr */
0,
0,
1,
0,
0x138,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_CTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00003fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_PTRr */
0,
0,
1,
0,
0x137,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_FIFO_PTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_MACHr */
0,
0,
1,
0,
0x139,
SOC_REG_FLAG_RO,
0,
9,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACHr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR1r */
0,
0,
1,
0,
0x13a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR2r */
0,
0,
1,
0,
0x13b,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR3r */
0,
0,
1,
0,
0x13c,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_ERR3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_RCMD_IDr */
0,
0,
1,
0,
0x13d,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_RDATA_FIFOr */
0,
0,
1,
0,
0x13e,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_RDATA_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_REN_FIFOr */
0,
0,
1,
0,
0x13f,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR1r */
0,
0,
1,
0,
0x141,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR2r */
0,
0,
1,
0,
0x142,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_DDR4_REN_GEN_RCMD_IDr */
0,
0,
1,
0,
0x140,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_DDR4_REN_GEN_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERRORr */
0,
0,
1,
0,
0x148,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000000ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr */
0,
0,
1,
0,
0x149,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr */
0,
0,
1,
0,
0x14a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr */
0,
0,
1,
0,
0x14b,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr */
0,
0,
1,
0,
0x14c,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr */
0,
0,
1,
0,
0x144,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr */
0,
0,
1,
0,
0x145,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr */
0,
0,
1,
0,
0x146,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr */
0,
0,
1,
0,
0x147,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_GDDR5_FIFO_POINTERSr */
0,
0,
1,
0,
0x143,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE1_STATUS_GDDR5_FIFO_POINTERSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0x14f,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_STATUS_WRITE_LEVELINGr */
0,
0,
1,
0,
0x14d,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE1_STATUS_WRITE_LEVELINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_VREF_DAC_CONFIGr */
0,
0,
1,
0,
0x125,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_VREF_DAC_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00920000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ff00ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_LEVELING_CONFIGr */
0,
0,
1,
0,
0x11c,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_LEVELING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MAX_VDL_DATAr */
0,
0,
1,
0,
0x10a,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DATAr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MAX_VDL_DATA_SHADOWr */
0,
0,
1,
0,
0x10b,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DATA_SHADOWr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MAX_VDL_DQSr */
0,
0,
1,
0,
0x10c,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MAX_VDL_DQSr_fields,
SOC_RESET_VAL_DEC(0x00000400, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x100,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x101,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x102,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x103,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x104,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x105,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x106,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x107,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_DBIr */
0,
0,
1,
0,
0x108,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE1_WRITE_MIN_VDL_EDCr */
0,
0,
1,
0,
0x109,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE1_WRITE_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_N_VDL_CONFIGr */
0,
0,
1,
0,
0x22e,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_CDR_N_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_OPERATION_CONFIGr */
0,
0,
1,
0,
0x228,
0,
0,
11,
soc_phy_ddrc16_DQ_BYTE2_CDR_OPERATION_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00310000, 0x00000000)
SOC_RESET_MASK_DEC(0x1fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_P_VDL_CONFIGr */
0,
0,
1,
0,
0x22d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_CDR_P_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_TIMING_CONFIGr */
0,
0,
1,
0,
0x22b,
0,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_CDR_TIMING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_TRACK_CONFIGr */
0,
0,
1,
0,
0x22a,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE2_CDR_TRACK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000ffff, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_UPDATE_CONFIGr */
0,
0,
1,
0,
0x229,
0,
0,
5,
soc_phy_ddrc16_DQ_BYTE2_CDR_UPDATE_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0c000001, 0x00000000)
SOC_RESET_MASK_DEC(0xfdff3fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_CDR_VDL_CAP_CONFIGr */
0,
0,
1,
0,
0x22c,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE2_CDR_VDL_CAP_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x01ff0000, 0x00000000)
SOC_RESET_MASK_DEC(0x11ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DATA_IO_CONFIGr */
0,
0,
1,
0,
0x223,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE2_DATA_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DDR4_READ_MAX_VDL_FSMr */
0,
0,
1,
0,
0x220,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_DDR4_READ_MAX_VDL_FSMr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DDR4_REN_FIFO_CONFIGr */
0,
0,
1,
0,
0x21e,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_FIFO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DDR4_REN_GEN_ERR_CTRLr */
0,
0,
1,
0,
0x21d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_GEN_ERR_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000003, 0x00000000)
SOC_RESET_MASK_DEC(0x00000003, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DDR4_REN_STRETCH_CONFIGr */
0,
0,
1,
0,
0x21f,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_DDR4_REN_STRETCH_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000001e, 0x00000000)
SOC_RESET_MASK_DEC(0x0000003f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_DQS_IO_CONFIGr */
0,
0,
1,
0,
0x224,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE2_DQS_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_GDDR5_READ_ALIGNMENT_CTRLr */
0,
0,
1,
0,
0x221,
0,
0,
13,
soc_phy_ddrc16_DQ_BYTE2_GDDR5_READ_ALIGNMENT_CTRLr_fields,
SOC_RESET_VAL_DEC(0x04000000, 0x00000000)
SOC_RESET_MASK_DEC(0x3fff73f7, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_GDDR5_READ_FSM_CTRLr */
0,
0,
1,
0,
0x222,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_GDDR5_READ_FSM_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000000f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_LDO_R_CONFIGr */
0,
0,
1,
0,
0x226,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_LDO_R_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_LDO_W_CONFIGr */
0,
0,
1,
0,
0x227,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_LDO_W_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0x24e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MAX_VDL_DQSDNr */
0,
0,
1,
0,
0x21b,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSDNr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MAX_VDL_DQSDPr */
0,
0,
1,
0,
0x219,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSDPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MAX_VDL_DQSENr */
0,
0,
1,
0,
0x21a,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSENr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MAX_VDL_DQSEPr */
0,
0,
1,
0,
0x218,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQSEPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MAX_VDL_DQS_MASTER_CTRLr */
0,
0,
1,
0,
0x217,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE2_READ_MAX_VDL_DQS_MASTER_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000111ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x20d,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x20e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x20f,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x210,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x211,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x212,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x213,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x214,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_DBIr */
0,
0,
1,
0,
0x215,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_READ_MIN_VDL_EDCr */
0,
0,
1,
0,
0x216,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_READ_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_DN_VDL_STATr */
0,
0,
1,
0,
0x234,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_DN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_DP_VDL_STATr */
0,
0,
1,
0,
0x232,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_DP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_EN_VDL_STATr */
0,
0,
1,
0,
0x233,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_EN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_EP_VDL_STATr */
0,
0,
1,
0,
0x231,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_EP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_N_VDLr */
0,
0,
1,
0,
0x230,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_N_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_OPERATIONr */
0,
0,
1,
0,
0x235,
SOC_REG_FLAG_RO,
0,
13,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_OPERATIONr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x1ff3ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_P_VDLr */
0,
0,
1,
0,
0x22f,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_P_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_CDR_TIMINGr */
0,
0,
1,
0,
0x236,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_STATUS_CDR_TIMINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_CTRr */
0,
0,
1,
0,
0x238,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_CTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00003fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_PTRr */
0,
0,
1,
0,
0x237,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_FIFO_PTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_MACHr */
0,
0,
1,
0,
0x239,
SOC_REG_FLAG_RO,
0,
9,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACHr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR1r */
0,
0,
1,
0,
0x23a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR2r */
0,
0,
1,
0,
0x23b,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR3r */
0,
0,
1,
0,
0x23c,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_ERR3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_RCMD_IDr */
0,
0,
1,
0,
0x23d,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_RDATA_FIFOr */
0,
0,
1,
0,
0x23e,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_RDATA_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_REN_FIFOr */
0,
0,
1,
0,
0x23f,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR1r */
0,
0,
1,
0,
0x241,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR2r */
0,
0,
1,
0,
0x242,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_DDR4_REN_GEN_RCMD_IDr */
0,
0,
1,
0,
0x240,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_DDR4_REN_GEN_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERRORr */
0,
0,
1,
0,
0x248,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000000ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr */
0,
0,
1,
0,
0x249,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr */
0,
0,
1,
0,
0x24a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr */
0,
0,
1,
0,
0x24b,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr */
0,
0,
1,
0,
0x24c,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr */
0,
0,
1,
0,
0x244,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr */
0,
0,
1,
0,
0x245,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr */
0,
0,
1,
0,
0x246,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr */
0,
0,
1,
0,
0x247,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_GDDR5_FIFO_POINTERSr */
0,
0,
1,
0,
0x243,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE2_STATUS_GDDR5_FIFO_POINTERSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0x24f,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_STATUS_WRITE_LEVELINGr */
0,
0,
1,
0,
0x24d,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE2_STATUS_WRITE_LEVELINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_VREF_DAC_CONFIGr */
0,
0,
1,
0,
0x225,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_VREF_DAC_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00920000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ff00ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_LEVELING_CONFIGr */
0,
0,
1,
0,
0x21c,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_LEVELING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MAX_VDL_DATAr */
0,
0,
1,
0,
0x20a,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DATAr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MAX_VDL_DATA_SHADOWr */
0,
0,
1,
0,
0x20b,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DATA_SHADOWr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MAX_VDL_DQSr */
0,
0,
1,
0,
0x20c,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MAX_VDL_DQSr_fields,
SOC_RESET_VAL_DEC(0x00000400, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x200,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x201,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x202,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x203,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x204,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x205,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x206,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x207,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_DBIr */
0,
0,
1,
0,
0x208,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE2_WRITE_MIN_VDL_EDCr */
0,
0,
1,
0,
0x209,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE2_WRITE_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_N_VDL_CONFIGr */
0,
0,
1,
0,
0x32e,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_CDR_N_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_OPERATION_CONFIGr */
0,
0,
1,
0,
0x328,
0,
0,
11,
soc_phy_ddrc16_DQ_BYTE3_CDR_OPERATION_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00310000, 0x00000000)
SOC_RESET_MASK_DEC(0x1fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_P_VDL_CONFIGr */
0,
0,
1,
0,
0x32d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_CDR_P_VDL_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_TIMING_CONFIGr */
0,
0,
1,
0,
0x32b,
0,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_CDR_TIMING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_TRACK_CONFIGr */
0,
0,
1,
0,
0x32a,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE3_CDR_TRACK_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000ffff, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_UPDATE_CONFIGr */
0,
0,
1,
0,
0x329,
0,
0,
5,
soc_phy_ddrc16_DQ_BYTE3_CDR_UPDATE_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0c000001, 0x00000000)
SOC_RESET_MASK_DEC(0xfdff3fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_CDR_VDL_CAP_CONFIGr */
0,
0,
1,
0,
0x32c,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE3_CDR_VDL_CAP_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x01ff0000, 0x00000000)
SOC_RESET_MASK_DEC(0x11ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DATA_IO_CONFIGr */
0,
0,
1,
0,
0x323,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE3_DATA_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DDR4_READ_MAX_VDL_FSMr */
0,
0,
1,
0,
0x320,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_DDR4_READ_MAX_VDL_FSMr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DDR4_REN_FIFO_CONFIGr */
0,
0,
1,
0,
0x31e,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_FIFO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DDR4_REN_GEN_ERR_CTRLr */
0,
0,
1,
0,
0x31d,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_GEN_ERR_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000003, 0x00000000)
SOC_RESET_MASK_DEC(0x00000003, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DDR4_REN_STRETCH_CONFIGr */
0,
0,
1,
0,
0x31f,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_DDR4_REN_STRETCH_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x0000001e, 0x00000000)
SOC_RESET_MASK_DEC(0x0000003f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_DQS_IO_CONFIGr */
0,
0,
1,
0,
0x324,
0,
0,
9,
soc_phy_ddrc16_DQ_BYTE3_DQS_IO_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x107b820f, 0x00000000)
SOC_RESET_MASK_DEC(0x1ffbffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_GDDR5_READ_ALIGNMENT_CTRLr */
0,
0,
1,
0,
0x321,
0,
0,
13,
soc_phy_ddrc16_DQ_BYTE3_GDDR5_READ_ALIGNMENT_CTRLr_fields,
SOC_RESET_VAL_DEC(0x04000000, 0x00000000)
SOC_RESET_MASK_DEC(0x3fff73f7, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_GDDR5_READ_FSM_CTRLr */
0,
0,
1,
0,
0x322,
0,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_GDDR5_READ_FSM_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000000f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_LDO_R_CONFIGr */
0,
0,
1,
0,
0x326,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_LDO_R_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_LDO_W_CONFIGr */
0,
0,
1,
0,
0x327,
0,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_LDO_W_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000033ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_MACRO_RESERVED_REGr */
0,
0,
1,
0,
0x34e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_MACRO_RESERVED_REGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MAX_VDL_DQSDNr */
0,
0,
1,
0,
0x31b,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSDNr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MAX_VDL_DQSDPr */
0,
0,
1,
0,
0x319,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSDPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MAX_VDL_DQSENr */
0,
0,
1,
0,
0x31a,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSENr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MAX_VDL_DQSEPr */
0,
0,
1,
0,
0x318,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQSEPr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000001ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MAX_VDL_DQS_MASTER_CTRLr */
0,
0,
1,
0,
0x317,
0,
0,
3,
soc_phy_ddrc16_DQ_BYTE3_READ_MAX_VDL_DQS_MASTER_CTRLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000111ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x30d,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x30e,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x30f,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x310,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x311,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x312,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x313,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x314,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_DBIr */
0,
0,
1,
0,
0x315,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_READ_MIN_VDL_EDCr */
0,
0,
1,
0,
0x316,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_READ_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_DN_VDL_STATr */
0,
0,
1,
0,
0x334,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_DN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_DP_VDL_STATr */
0,
0,
1,
0,
0x332,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_DP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_EN_VDL_STATr */
0,
0,
1,
0,
0x333,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_EN_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_EP_VDL_STATr */
0,
0,
1,
0,
0x331,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_EP_VDL_STATr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_N_VDLr */
0,
0,
1,
0,
0x330,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_N_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_OPERATIONr */
0,
0,
1,
0,
0x335,
SOC_REG_FLAG_RO,
0,
13,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_OPERATIONr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x1ff3ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_P_VDLr */
0,
0,
1,
0,
0x32f,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_P_VDLr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x01ff01ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_CDR_TIMINGr */
0,
0,
1,
0,
0x336,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_STATUS_CDR_TIMINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000ff77f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_CTRr */
0,
0,
1,
0,
0x338,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_CTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00003fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_PTRr */
0,
0,
1,
0,
0x337,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_FIFO_PTRr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_MACHr */
0,
0,
1,
0,
0x339,
SOC_REG_FLAG_RO,
0,
9,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACHr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x07ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR1r */
0,
0,
1,
0,
0x33a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR2r */
0,
0,
1,
0,
0x33b,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00001fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR3r */
0,
0,
1,
0,
0x33c,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_ERR3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_RCMD_IDr */
0,
0,
1,
0,
0x33d,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RCMD_MACH_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_RDATA_FIFOr */
0,
0,
1,
0,
0x33e,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_RDATA_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00007fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_REN_FIFOr */
0,
0,
1,
0,
0x33f,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_FIFOr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0003ffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR1r */
0,
0,
1,
0,
0x341,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR2r */
0,
0,
1,
0,
0x342,
SOC_REG_FLAG_RO,
0,
12,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_ERR2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x7fffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_DDR4_REN_GEN_RCMD_IDr */
0,
0,
1,
0,
0x340,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_DDR4_REN_GEN_RCMD_IDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERRORr */
0,
0,
1,
0,
0x348,
SOC_REG_FLAG_RO,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERRORr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000000ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr */
0,
0,
1,
0,
0x349,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr */
0,
0,
1,
0,
0x34a,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr */
0,
0,
1,
0,
0x34b,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr */
0,
0,
1,
0,
0x34c,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_ERROR_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr */
0,
0,
1,
0,
0x344,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_LSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr */
0,
0,
1,
0,
0x345,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_RCMDS_MSBr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr */
0,
0,
1,
0,
0x346,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_STATESr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr */
0,
0,
1,
0,
0x347,
SOC_REG_FLAG_RO,
0,
8,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_DATA_VALID_GEN_LAST_VALIDSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_GDDR5_FIFO_POINTERSr */
0,
0,
1,
0,
0x343,
SOC_REG_FLAG_RO,
0,
6,
soc_phy_ddrc16_DQ_BYTE3_STATUS_GDDR5_FIFO_POINTERSr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_MACRO_RESERVEDr */
0,
0,
1,
0,
0x34f,
SOC_REG_FLAG_RO,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_STATUS_MACRO_RESERVEDr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0xffffffff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_STATUS_WRITE_LEVELINGr */
0,
0,
1,
0,
0x34d,
SOC_REG_FLAG_RO,
0,
4,
soc_phy_ddrc16_DQ_BYTE3_STATUS_WRITE_LEVELINGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x000007ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_VREF_DAC_CONFIGr */
0,
0,
1,
0,
0x325,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_VREF_DAC_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00920000, 0x00000000)
SOC_RESET_MASK_DEC(0x00ff00ff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_LEVELING_CONFIGr */
0,
0,
1,
0,
0x31c,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_LEVELING_CONFIGr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x00000001, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MAX_VDL_DATAr */
0,
0,
1,
0,
0x30a,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DATAr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MAX_VDL_DATA_SHADOWr */
0,
0,
1,
0,
0x30b,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DATA_SHADOWr_fields,
SOC_RESET_VAL_DEC(0x00000200, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MAX_VDL_DQSr */
0,
0,
1,
0,
0x30c,
0,
0,
2,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MAX_VDL_DQSr_fields,
SOC_RESET_VAL_DEC(0x00000400, 0x00000000)
SOC_RESET_MASK_DEC(0x00000fff, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT0r */
0,
0,
1,
0,
0x300,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT0r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT1r */
0,
0,
1,
0,
0x301,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT1r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT2r */
0,
0,
1,
0,
0x302,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT2r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT3r */
0,
0,
1,
0,
0x303,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT3r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT4r */
0,
0,
1,
0,
0x304,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT4r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT5r */
0,
0,
1,
0,
0x305,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT5r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT6r */
0,
0,
1,
0,
0x306,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT6r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_BIT7r */
0,
0,
1,
0,
0x307,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_BIT7r_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_DBIr */
0,
0,
1,
0,
0x308,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_DBIr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
{ /* SOC_PHY_DDRC16_REG_DQ_BYTE3_WRITE_MIN_VDL_EDCr */
0,
0,
1,
0,
0x309,
0,
0,
1,
soc_phy_ddrc16_DQ_BYTE3_WRITE_MIN_VDL_EDCr_fields,
SOC_RESET_VAL_DEC(0x00000000, 0x00000000)
SOC_RESET_MASK_DEC(0x0000007f, 0x00000000)
-1,
-1,
},
}; /* soc_phy_ddrc16_reg_list array */
|
1. Field of the Invention
This invention generally relates to the forming chamber for the formation of glass on a molten metal. In particular the invention relates to the repair of the bottom refractories of the forming chamber.
2. Discussion of the Prior Art
In processes of float glass formation wherein molten glass is formed into sheets on a pool of molten metal there has been a continuing interest in methods of repair of refractories in the forming chamber. As illustrated in U.S. Pat. No. 3,594,147 to Galey et al the bottom refractories of the forming chamber may be cast in place. In the most common type of bath bottom construction as illustrated by U.S. Pat. No. 3,584,477 to Hainsfurther, the bottom blocks are precast, layed in place and bolted down. The refractory blocks must be held down or they will float upward onto the surface of the metal bath. The tin which ordinarily forms the molten metal of the bath is corrosive to steel and leaks will result if the metal casing of the bath is exposed to continual attack of the molten metal. Further, if the studs holding the refractory blocks are exposed to molten metal they will corrode and the blocks will float to the surface of the bath.
The view of the difficulties that are caused by the failure of bottom refractories in the bath, there is a continuing need for a method for repairing such refractories without the need to shut down and drain the forming chamber. For reasons not entirely understood, there is a tendency for the bottom refractories, particularly in bolted down precast blocks, in the forming chamber to delaminate at a point about 7" from the upper surface of the blocks. The typical refractory bottom block of a forming chamber is about a foot thick. The delamination of the upper portion risks exposure of the hold down bolts or studs, which if they are corroded lead to the entire block floating to the surface and exposing the metal casing of the forming chamber to attack by the tin. Therefore, when delamination occurs it must be repaired within a short time. The normal method of repair prior to the instant invention was to shut down the forming chamber, drain the metal from the bath, and reset or recast a new block or blocks where delamination has occurred. This, of course, is very expensive as extensive delays in production are caused. Also, it has been known in the glass industry that baths were not repaired but continued to run after the bottom had deteriorated such that a release of tin through the bottom occurred. Also, operation with exposed bottom steel can cause glass bubble defects. Therefore, there is a need for a reliable method of in situ, hot repair of the bottom refractories in a float forming chamber. There is a need for a repair that may be done through the molten metal without draining the forming chamber. |
<filename>TikTokBusinessSDK/AppEvents/TikTokAppEventStore.h<gh_stars>1-10
//
// Copyright (c) 2020. Bytedance Inc.
//
// This source code is licensed under the MIT license found in
// the LICENSE file in the root directory of this source tree.
//
#import <UIKit/UIKit.h>
#import <Foundation/Foundation.h>
NS_ASSUME_NONNULL_BEGIN
@class TikTokAppEventQueue;
@interface TikTokAppEventStore : NSObject
/**
* @brief Method to clear persisted app events
*/
+ (void)clearPersistedAppEvents;
/**
* @brief Method to read events in disk, append events in queue, and write combined into disk
*/
+ (void)persistAppEvents:(NSArray *)queue;
/**
* @brief Method to return the array of saved app event states and deletes them.
*/
+ (NSArray *)retrievePersistedAppEvents;
@end
NS_ASSUME_NONNULL_END
|
Seasonal Variation in Activity Budget of Assamese Macaques in Limestone Forest of Southwest Guangxi, China The activity budget is important for understanding behavioural variability and adaptation in primates. Assamese macaques (Macaca assamensis) found in the limestone forest of Guangxi Nonggang National Nature Reserve, Southwest China, primarily feed on young leaves of Bonia saxatilis (a shrubby, karst-endemic bamboo). To understand how a specific bamboo leaf-based diet and ecological factors affect activity budget, one group of Assamese macaques was studied using instantaneous scan sampling for 1 year. The macaques spent most of their time feeding (32.7 ± 5.4%), followed by resting (28.6 ± 6.3%), moving (28.6 ± 5.3%), grooming (8.0 ± 3.0%), playing (1.7 ± 1.6%) and other activities (0.4 ± 0.2%). Their activity budget was similar to that of typical frugivorous primates and bamboo-dominated primates, which spent more time on active behaviours (feeding and moving, 61.3 ± 6.0%) than on inactive behaviours (resting and grooming, 36.6 ± 6.4%). The macaques spent significantly more time resting during the fruit-lean season and more time moving during the fruit-rich season. Their activity budget was significantly affected by diet. Resting time increased with decreased fruit consumption, whereas moving time decreased with the increasing mature leaf consumption. Playing time decreased when the macaques consumed more young bamboo leaves. The activity budget was also influenced by food availability and climatic factors. Resting time increased with decreasing temperature, whereas moving time increased with increasing day length and young leaf availability. Grooming time increased with decreasing day length and increasing temperature, and playing time increased with increasing day length. Our findings provide evidence of the importance of diet, food availability, temperature and day length in coping with seasonal variation in ecological factors, highlighting the need to increase knowledge of the behavioural ecology of the Assamese macaques living in the unique limestone forest and to understand the influence of a bamboo-dominated diet and ecological factors on their survival. |
/**
* @author Ashish Sharma
*/
public class TapeEquilibiriumTest {
@Test
public void getMinimumDifference() {
int[] arr = new int[]{3, 1, 2, 4, 3};
System.out.println(solution(arr));
}
public int solution(int A[]) {
if (A.length != 0 && A.length > 1) {
int minimumDifference = Integer.MAX_VALUE;
int currentDifference = Integer.MAX_VALUE;
int totalSum = Arrays.stream(A, 0, A.length).sum();
int currentSum = 0;
for (int i = 0; i < A.length - 1; i++) {
currentSum += A[i];
currentDifference = Math.abs(currentSum - (totalSum - currentSum));
if (currentDifference < minimumDifference) {
minimumDifference = currentDifference;
}
}
return minimumDifference;
} else if (A.length == 1) {
return A[0];
} else {
return -1;
}
}
} |
FLORHAM PARK, N.J. -- The New York Jets will have at least one of their starting cornerbacks in the lineup on Thursday night against the Buffalo Bills.
Buster Skrine, who sat out last week with a concussion, was cleared on Wednesday, practiced fully (a walk-through) and is scheduled to play in the game. His last game was a nightmare -- three touchdowns allowed and three penalties.
His partner, Morris Claiborne, may not be available. The Jets' top corner, who sprained his left foot last Sunday, missed practice for the third straight day and is listed as questionable. Considering the nature of the injury and the short week, it's very possible he will be inactive. Darryl Roberts likely would start in his place, with Juston Burris (or perhaps newcomer Rashard Robinson) handling the No. 3 role.
As usual, defensive end Muhammad Wilkerson (foot/shoulder) is questionable after another week of not practicing. Because of the quick turnaround, it's "going to be tough" for him to play, coach Todd Bowles said on Monday. Nevertheless, the Jets are hopeful he will give it a shot.
Right tackle Brent Qvale is expected to start for the second straight week, as Brandon Shell (neck) suffered a setback this week and is doubtful for the game. So is Terrence Brooks (hamstring), who plays on defense when they go to a four-safety package. Fullback Lawrence Thomas (concussion) has been ruled out. |
<filename>Manage Conky/AppDelegate.h
//
// AppDelegate.h
// Manage Conky
//
// Created by <NAME> on 08/09/2017.
// Copyright © 2017 <NAME>. All rights reserved.
//
#import <Cocoa/Cocoa.h>
@interface AppDelegate : NSObject <NSApplicationDelegate, NSWindowDelegate>
@end
|
A MIXED VARIATIONAL FRAMEWORK FOR THE RADIATIVE TRANSFER EQUATION We present a rigorous variational framework for the analysis and discretization of the radiative transfer equation. Existence and uniqueness of weak solutions are established under rather general assumptions on the coefficients. Moreover, weak solutions are shown to be regular and hence also strong solutions of the radiative transfer equation. The relation of the proposed variational method to other approaches, including least-squares and even-parity formulations, is discussed. Moreover, the approximation by Galerkin methods is investigated, and simple conditions are given, under which stable quasi-optimal discretizations can be obtained. For illustration, the approximation by a finite element PN approximation is discussed in some detail. |
President Kufuor is expected to make a historic trip to Dagbon in the Northern Region next week to meet with the chiefs and interact with the elders of the traditional area.
But as already explained to party supporters, he will not mount a political platform to seek his re-election as has been the case with those parts of the country he has been visiting. He goes to mourn with the bereaved family and people of Dagbon over the loss of his friend, the Overlord Yakubu Andani II.
These disclosures were made by sitting MP for the Yendi Constituency and former Minister for the Interior Alhaji Malik Al-Hassan Yakubu last Monday in an interview with the Network Herald during the launch of “Positive Change Chapter Two” in Accra.
According to him that eagerly awaited visit two clear years after the royal clash between the Abudus and the Andanis that resulted in the murder of the Ya-Na and forty of his subjects is being honoured upon careful reflection backed by sound advice.
Alhaji Malik acknowledged though that while the presidency would adhere primarily to using the visit to demonstrate sensitivity to the norms and values of the people by not mounting a political platform to campaign in Dagbon, the visit has the potential of reinforcing the chances of the ruling NPP and enhance its margins at the December 7th polls in Dagbon. But he was quick to add that Dagbon had traditionally been a stronghold of the United Party (UP) from which his party draws inspiration.
He submitted that though the NPP is expected to win in the area even without the visit of the President, the visit could also have a timely effect on the people so far as the commitment of the president to absolute peace in the area is concerned. It is also expected that the interaction with the traditional authorities and opinion leaders would help the people go into the December polls with a better purpose than acrimony.
The former Interior Minister seeking re-election revealed further that after this visit which will concretize plans for the burial and funeral arrangement of the Ya-Na, the President would then join the people in celebrating the funeral to further emphasis the place of unity in his administration.
Alhaji Malik who is also a Member of the Pan African Parliament told the paper that President Kufuor is very sensitive to Dagbon people and thinks the right atmosphere has now been created for him to meet the people.
He is hopeful that the people of Dagbon would reciprocate the gesture by recounting all that the president had done in the wake of the tragedy particularly the appointment of the Committee of Eminent Chiefs, Nayiri and the Asantehene among others to help solve the aged old dispute.
He disagreed with suggestions that the government woefully failed to put adequate measures in place to prevent the 2002 carnage but agreed with concerns that the Dagbon problem could persist for a long time until the root cause of the protracted chieftaincy problem is addressed.
Alhaji Malik said prior to “the Yendi massacre” government was examining the complex dimensions of the Dagbon chieftaincy saga that had divided the people since independence so as to find a lasting solution only for its opponents to, for their own selfish reasons, throw a spanner into spokes to derail the process.
Alhaji Malik expressed great uneasiness that the body of the Ya-Na should still be in the morgue two years after his death because it is contrary to both his Islamic faith and the tradition of the people of Dagbon.
However, he said that contrary to media reports about that Dagbon is 'hot', the place is presently so peaceful that he personally feels at home there than in Accra. He claimed that the people had resolved to live together and are going about their chores peacefully. |
<filename>spring-learning-annotation/src/main/java/pojo/Sun.java
package pojo;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Component;
import java.io.Serializable;
@Component
public class Sun implements Serializable {
private Moon moon;
@Autowired
public Sun(Moon moon) {
System.out.println("Sun......开始实例化, moon = " + moon);
}
/**
* {@link Autowired} 可以用在方法上,如果容器中存在对应的bean
* 则会自动注入到方法的参数里
*/
@Autowired
public void setMoon(Moon moon) {
this.moon = moon;
}
public Moon getMoon() {
return this.moon;
}
public Sun() {
System.out.println("Sun......开始实例化");
}
public void init() {
System.out.println("Sun......开始初始化");
}
public void destroy() {
System.out.println("Sun......开始销毁");
}
}
|
Incident Localization and Assistance System: A case study of a Cyber-Physical Human System One goal of the Industry 4.0 initiative is to improve horizontal and vertical knowledge sharing among industries. Horizontal sharing allows companies to exchange knowledge across different sites whereas vertical sharing allows the exchange of knowledge across hierarchical structures within a site. Sharing knowledge especially about incidents results in better products, reduces down-times and improves efficiency in industries. Horizontal and vertical knowledge sharing is a great challenge in the domain of manufacturing. We describe a case study where we replace handwritten incident and maintenance documentation. The main problems associated with handwritten documentation are bad readability and non-shareability. In this paper we describe our Incident Localization and Assistance System (ILAS), an incident documentation and maintenance system. ILAS transfers process oriented incident management knowledge from IT Service Management (ITSM) to the domain of manufacturing. ILAS offers real-time monitoring using wearables, incident analysis support and knowledge sharing for incidents within and among different production sites. We implemented ILAS as a Cyber-Physical Human System. Additionally, we conducted a survey about the potential of wearables within Industry 4.0. We found out that wearables in enterprises are still in their infancy but have great potential especially for this use case. |
Incidental finding of renal masses at unenhanced CT: prevalence and analysis of features for guiding management. OBJECTIVE The purposes of this study were to investigate the frequency and clinical relevance of the incidental finding of renal masses at low-dose unenhanced CT and to analyze the results for features that can be used to guide evaluation. MATERIALS AND METHODS Images from unenhanced CT colonographic examinations of 3001 consecutively registered adults without symptoms (1667 women, 1334 men; mean age, 57 years) were retrospectively reviewed for the presence of cystic and solid renal masses 1 cm in diameter or larger. An index mass, that is, the most complex or concerning, in each patient was assessed for size, mean attenuation, and morphologic features. Masses containing fat or with attenuation less than 20 HU or greater than 70 HU were considered benign if they did not contain thickened walls or septations, three or more septations, mural nodules, or thick calcifications. Masses with attenuation between 20 and 70 HU or any of these features were considered indeterminate. The performance of CT colonography in the detection of renal cell carcinoma was calculated for masses with 2 or more years of follow-up. RESULTS At least one renal mass was identified in 433 (14.4%) patients. The mean size of the index masses was 25 ± 16 mm; 376 (86.8%) masses were classified as benign and 57 (13.2%) as indeterminate. The 20- to 70-HU attenuation criterion alone was used for classification of 53 indeterminate lesions. Follow-up data (mean follow-up period, 4.4 years; range, 2-6.3 years) were available for 353 (81.5%) patients with masses (41 indeterminate, 312 benign). Four of the 41 indeterminate masses were diagnosed as renal cell carcinoma. The sensitivity and specificity for renal cell carcinoma on the basis of the indeterminate criteria were 100% and 89.4%. The positive and negative predictive values were 9.8% and 100%. CONCLUSION The incidental finding of a renal mass is relatively common at unenhanced CT, but imaging criteria can be used for reliable identification of most of these lesions as benign without further workup. Mean attenuation alone appears reliable for determining which renal masses need further evaluation. |
<reponame>yang-guangliang/osv-free<filename>src/content/child/web_url_loader_impl.cc
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/child/web_url_loader_impl.h"
#include <stdint.h>
#include <algorithm>
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "base/bind.h"
#include "base/callback.h"
#include "base/files/file_path.h"
#include "base/logging.h"
#include "base/memory/ptr_util.h"
#include "base/optional.h"
#include "base/single_thread_task_runner.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_util.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/time/time.h"
#include "build/build_config.h"
#include "components/mime_util/mime_util.h"
#include "content/child/child_thread_impl.h"
#include "content/child/ftp_directory_listing_response_delegate.h"
#include "content/child/request_extra_data.h"
#include "content/child/resource_dispatcher.h"
#include "content/child/shared_memory_data_consumer_handle.h"
#include "content/child/sync_load_response.h"
#include "content/child/web_url_request_util.h"
#include "content/child/weburlresponse_extradata_impl.h"
#include "content/common/resource_messages.h"
#include "content/common/resource_request.h"
#include "content/common/resource_request_body_impl.h"
#include "content/common/service_worker/service_worker_types.h"
#include "content/common/url_loader.mojom.h"
#include "content/public/child/fixed_received_data.h"
#include "content/public/child/request_peer.h"
#include "content/public/common/browser_side_navigation_policy.h"
#include "net/base/data_url.h"
#include "net/base/filename_util.h"
#include "net/base/net_errors.h"
#include "net/cert/cert_status_flags.h"
#include "net/cert/ct_sct_to_string.h"
#include "net/cert/x509_util.h"
#include "net/http/http_response_headers.h"
#include "net/http/http_util.h"
#include "net/ssl/ssl_cipher_suite_names.h"
#include "net/ssl/ssl_connection_status_flags.h"
#include "net/url_request/url_request_data_job.h"
#include "third_party/WebKit/public/platform/FilePathConversion.h"
#include "third_party/WebKit/public/platform/WebHTTPLoadInfo.h"
#include "third_party/WebKit/public/platform/WebSecurityOrigin.h"
#include "third_party/WebKit/public/platform/WebSecurityStyle.h"
#include "third_party/WebKit/public/platform/WebURL.h"
#include "third_party/WebKit/public/platform/WebURLError.h"
#include "third_party/WebKit/public/platform/WebURLLoadTiming.h"
#include "third_party/WebKit/public/platform/WebURLLoaderClient.h"
#include "third_party/WebKit/public/platform/WebURLRequest.h"
#include "third_party/WebKit/public/platform/WebURLResponse.h"
#include "third_party/WebKit/public/web/WebSecurityPolicy.h"
#include "third_party/boringssl/src/include/openssl/ssl.h"
using base::Time;
using base::TimeTicks;
using blink::WebData;
using blink::WebHTTPBody;
using blink::WebHTTPHeaderVisitor;
using blink::WebHTTPLoadInfo;
using blink::WebReferrerPolicy;
using blink::WebSecurityPolicy;
using blink::WebString;
using blink::WebURL;
using blink::WebURLError;
using blink::WebURLLoadTiming;
using blink::WebURLLoader;
using blink::WebURLLoaderClient;
using blink::WebURLRequest;
using blink::WebURLResponse;
namespace content {
// Utilities ------------------------------------------------------------------
namespace {
using HeadersVector = ResourceDevToolsInfo::HeadersVector;
// TODO(estark): Figure out a way for the embedder to provide the
// security style for a resource. Ideally, the logic for assigning
// per-resource security styles should live in the same place as the
// logic for assigning per-page security styles (which lives in the
// embedder). It would also be nice for the embedder to have the chance
// to control the per-resource security style beyond the simple logic
// here. (For example, the embedder might want to mark certain resources
// differently if they use SHA1 signatures.) https://crbug.com/648326
blink::WebSecurityStyle GetSecurityStyleForResource(
const GURL& url,
net::CertStatus cert_status) {
if (!url.SchemeIsCryptographic())
return blink::kWebSecurityStyleNeutral;
// Minor errors don't lower the security style to
// WebSecurityStyleAuthenticationBroken.
if (net::IsCertStatusError(cert_status) &&
!net::IsCertStatusMinorError(cert_status)) {
return blink::kWebSecurityStyleInsecure;
}
return blink::kWebSecurityStyleSecure;
}
// Converts timing data from |load_timing| to the format used by WebKit.
void PopulateURLLoadTiming(const net::LoadTimingInfo& load_timing,
WebURLLoadTiming* url_timing) {
DCHECK(!load_timing.request_start.is_null());
const TimeTicks kNullTicks;
url_timing->Initialize();
url_timing->SetRequestTime(
(load_timing.request_start - kNullTicks).InSecondsF());
url_timing->SetProxyStart(
(load_timing.proxy_resolve_start - kNullTicks).InSecondsF());
url_timing->SetProxyEnd(
(load_timing.proxy_resolve_end - kNullTicks).InSecondsF());
url_timing->SetDNSStart(
(load_timing.connect_timing.dns_start - kNullTicks).InSecondsF());
url_timing->SetDNSEnd(
(load_timing.connect_timing.dns_end - kNullTicks).InSecondsF());
url_timing->SetConnectStart(
(load_timing.connect_timing.connect_start - kNullTicks).InSecondsF());
url_timing->SetConnectEnd(
(load_timing.connect_timing.connect_end - kNullTicks).InSecondsF());
url_timing->SetSSLStart(
(load_timing.connect_timing.ssl_start - kNullTicks).InSecondsF());
url_timing->SetSSLEnd(
(load_timing.connect_timing.ssl_end - kNullTicks).InSecondsF());
url_timing->SetSendStart((load_timing.send_start - kNullTicks).InSecondsF());
url_timing->SetSendEnd((load_timing.send_end - kNullTicks).InSecondsF());
url_timing->SetReceiveHeadersEnd(
(load_timing.receive_headers_end - kNullTicks).InSecondsF());
url_timing->SetPushStart((load_timing.push_start - kNullTicks).InSecondsF());
url_timing->SetPushEnd((load_timing.push_end - kNullTicks).InSecondsF());
}
net::RequestPriority ConvertWebKitPriorityToNetPriority(
const WebURLRequest::Priority& priority) {
switch (priority) {
case WebURLRequest::kPriorityVeryHigh:
return net::HIGHEST;
case WebURLRequest::kPriorityHigh:
return net::MEDIUM;
case WebURLRequest::kPriorityMedium:
return net::LOW;
case WebURLRequest::kPriorityLow:
return net::LOWEST;
case WebURLRequest::kPriorityVeryLow:
return net::IDLE;
case WebURLRequest::kPriorityUnresolved:
default:
NOTREACHED();
return net::LOW;
}
}
blink::WebReferrerPolicy NetReferrerPolicyToBlinkReferrerPolicy(
net::URLRequest::ReferrerPolicy net_policy) {
switch (net_policy) {
case net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE:
return blink::kWebReferrerPolicyNoReferrerWhenDowngrade;
case net::URLRequest::
REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN:
return blink::
kWebReferrerPolicyNoReferrerWhenDowngradeOriginWhenCrossOrigin;
case net::URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN:
return blink::kWebReferrerPolicyOriginWhenCrossOrigin;
case net::URLRequest::NEVER_CLEAR_REFERRER:
return blink::kWebReferrerPolicyAlways;
case net::URLRequest::ORIGIN:
return blink::kWebReferrerPolicyOrigin;
case net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_CROSS_ORIGIN:
return blink::kWebReferrerPolicySameOrigin;
case net::URLRequest::ORIGIN_CLEAR_ON_TRANSITION_FROM_SECURE_TO_INSECURE:
return blink::kWebReferrerPolicyStrictOrigin;
case net::URLRequest::NO_REFERRER:
return blink::kWebReferrerPolicyNever;
case net::URLRequest::MAX_REFERRER_POLICY:
NOTREACHED();
return blink::kWebReferrerPolicyDefault;
}
NOTREACHED();
return blink::kWebReferrerPolicyDefault;
}
// Extracts info from a data scheme URL |url| into |info| and |data|. Returns
// net::OK if successful. Returns a net error code otherwise.
int GetInfoFromDataURL(const GURL& url,
ResourceResponseInfo* info,
std::string* data) {
// Assure same time for all time fields of data: URLs.
Time now = Time::Now();
info->load_timing.request_start = TimeTicks::Now();
info->load_timing.request_start_time = now;
info->request_time = now;
info->response_time = now;
std::string mime_type;
std::string charset;
scoped_refptr<net::HttpResponseHeaders> headers(
new net::HttpResponseHeaders(std::string()));
int result = net::URLRequestDataJob::BuildResponse(
url, &mime_type, &charset, data, headers.get());
if (result != net::OK)
return result;
info->headers = headers;
info->mime_type.swap(mime_type);
info->charset.swap(charset);
info->content_length = data->length();
info->encoded_data_length = 0;
info->encoded_body_length = 0;
return net::OK;
}
// Convert a net::SignedCertificateTimestampAndStatus object to a
// blink::WebURLResponse::SignedCertificateTimestamp object.
blink::WebURLResponse::SignedCertificateTimestamp NetSCTToBlinkSCT(
const net::SignedCertificateTimestampAndStatus& sct_and_status) {
return blink::WebURLResponse::SignedCertificateTimestamp(
WebString::FromASCII(net::ct::StatusToString(sct_and_status.status)),
WebString::FromASCII(net::ct::OriginToString(sct_and_status.sct->origin)),
WebString::FromUTF8(sct_and_status.sct->log_description),
WebString::FromASCII(
base::HexEncode(sct_and_status.sct->log_id.c_str(),
sct_and_status.sct->log_id.length())),
sct_and_status.sct->timestamp.ToJavaTime(),
WebString::FromASCII(net::ct::HashAlgorithmToString(
sct_and_status.sct->signature.hash_algorithm)),
WebString::FromASCII(net::ct::SignatureAlgorithmToString(
sct_and_status.sct->signature.signature_algorithm)),
WebString::FromASCII(base::HexEncode(
sct_and_status.sct->signature.signature_data.c_str(),
sct_and_status.sct->signature.signature_data.length())));
}
void SetSecurityStyleAndDetails(const GURL& url,
const ResourceResponseInfo& info,
WebURLResponse* response,
bool report_security_info) {
if (!report_security_info) {
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
if (!url.SchemeIsCryptographic()) {
response->SetSecurityStyle(blink::kWebSecurityStyleNeutral);
return;
}
// The resource loader does not provide a guarantee that requests always have
// security info (such as a certificate) attached. Use WebSecurityStyleUnknown
// in this case where there isn't enough information to be useful.
if (info.certificate.empty()) {
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
int ssl_version =
net::SSLConnectionStatusToVersion(info.ssl_connection_status);
const char* protocol;
net::SSLVersionToString(&protocol, ssl_version);
const char* key_exchange;
const char* cipher;
const char* mac;
bool is_aead;
bool is_tls13;
uint16_t cipher_suite =
net::SSLConnectionStatusToCipherSuite(info.ssl_connection_status);
net::SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead,
&is_tls13, cipher_suite);
if (key_exchange == nullptr) {
DCHECK(is_tls13);
key_exchange = "";
}
if (mac == nullptr) {
DCHECK(is_aead);
mac = "";
}
const char* key_exchange_group = "";
if (info.ssl_key_exchange_group != 0) {
// Historically the field was named 'curve' rather than 'group'.
key_exchange_group = SSL_get_curve_name(info.ssl_key_exchange_group);
if (!key_exchange_group) {
NOTREACHED();
key_exchange_group = "";
}
}
response->SetSecurityStyle(
GetSecurityStyleForResource(url, info.cert_status));
blink::WebURLResponse::SignedCertificateTimestampList sct_list(
info.signed_certificate_timestamps.size());
for (size_t i = 0; i < sct_list.size(); ++i)
sct_list[i] = NetSCTToBlinkSCT(info.signed_certificate_timestamps[i]);
std::string subject, issuer;
base::Time valid_start, valid_expiry;
std::vector<std::string> san;
bool rv = net::x509_util::ParseCertificateSandboxed(
info.certificate[0], &subject, &issuer, &valid_start, &valid_expiry, &san,
&san);
if (!rv) {
NOTREACHED();
response->SetSecurityStyle(blink::kWebSecurityStyleUnknown);
return;
}
blink::WebVector<blink::WebString> web_san(san.size());
std::transform(
san.begin(), san.end(), web_san.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
blink::WebVector<blink::WebString> web_cert(info.certificate.size());
std::transform(
info.certificate.begin(), info.certificate.end(), web_cert.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
blink::WebURLResponse::WebSecurityDetails webSecurityDetails(
WebString::FromASCII(protocol), WebString::FromASCII(key_exchange),
WebString::FromASCII(key_exchange_group), WebString::FromASCII(cipher),
WebString::FromASCII(mac), WebString::FromUTF8(subject), web_san,
WebString::FromUTF8(issuer), valid_start.ToDoubleT(),
valid_expiry.ToDoubleT(), web_cert, sct_list);
response->SetSecurityDetails(webSecurityDetails);
}
} // namespace
StreamOverrideParameters::StreamOverrideParameters() {}
StreamOverrideParameters::~StreamOverrideParameters() {
if (on_delete)
std::move(on_delete).Run(stream_url);
}
// This inner class exists since the WebURLLoader may be deleted while inside a
// call to WebURLLoaderClient. Refcounting is to keep the context from being
// deleted if it may have work to do after calling into the client.
class WebURLLoaderImpl::Context : public base::RefCounted<Context> {
public:
using ReceivedData = RequestPeer::ReceivedData;
Context(WebURLLoaderImpl* loader,
ResourceDispatcher* resource_dispatcher,
mojom::URLLoaderFactory* factory);
WebURLLoaderClient* client() const { return client_; }
void set_client(WebURLLoaderClient* client) { client_ = client; }
void Cancel();
void SetDefersLoading(bool value);
void DidChangePriority(WebURLRequest::Priority new_priority,
int intra_priority_value);
void Start(const WebURLRequest& request,
SyncLoadResponse* sync_load_response);
void SetTaskRunner(
const scoped_refptr<base::SingleThreadTaskRunner>& task_runner);
void OnUploadProgress(uint64_t position, uint64_t size);
bool OnReceivedRedirect(const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info);
void OnReceivedResponse(const ResourceResponseInfo& info);
void OnDownloadedData(int len, int encoded_data_length);
void OnReceivedData(std::unique_ptr<ReceivedData> data);
void OnTransferSizeUpdated(int transfer_size_diff);
void OnReceivedCachedMetadata(const char* data, int len);
void OnCompletedRequest(int error_code,
bool was_ignored_by_handler,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size);
private:
friend class base::RefCounted<Context>;
~Context();
// Called when the body data stream is detached from the reader side.
void CancelBodyStreaming();
// We can optimize the handling of data URLs in most cases.
bool CanHandleDataURLRequestLocally() const;
void HandleDataURL();
WebURLLoaderImpl* loader_;
WebURLRequest request_;
WebURLLoaderClient* client_;
ResourceDispatcher* resource_dispatcher_;
scoped_refptr<base::SingleThreadTaskRunner> task_runner_;
std::unique_ptr<FtpDirectoryListingResponseDelegate> ftp_listing_delegate_;
std::unique_ptr<StreamOverrideParameters> stream_override_;
std::unique_ptr<SharedMemoryDataConsumerHandle::Writer> body_stream_writer_;
enum DeferState {NOT_DEFERRING, SHOULD_DEFER, DEFERRED_DATA};
DeferState defers_loading_;
int request_id_;
// These are owned by the Blink::Platform singleton.
mojom::URLLoaderFactory* url_loader_factory_;
};
// A thin wrapper class for Context to ensure its lifetime while it is
// handling IPC messages coming from ResourceDispatcher. Owns one ref to
// Context and held by ResourceDispatcher.
class WebURLLoaderImpl::RequestPeerImpl : public RequestPeer {
public:
explicit RequestPeerImpl(Context* context);
// RequestPeer methods:
void OnUploadProgress(uint64_t position, uint64_t size) override;
bool OnReceivedRedirect(const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) override;
void OnReceivedResponse(const ResourceResponseInfo& info) override;
void OnDownloadedData(int len, int encoded_data_length) override;
void OnReceivedData(std::unique_ptr<ReceivedData> data) override;
void OnTransferSizeUpdated(int transfer_size_diff) override;
void OnReceivedCachedMetadata(const char* data, int len) override;
void OnCompletedRequest(int error_code,
bool was_ignored_by_handler,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) override;
private:
scoped_refptr<Context> context_;
DISALLOW_COPY_AND_ASSIGN(RequestPeerImpl);
};
// WebURLLoaderImpl::Context --------------------------------------------------
WebURLLoaderImpl::Context::Context(WebURLLoaderImpl* loader,
ResourceDispatcher* resource_dispatcher,
mojom::URLLoaderFactory* url_loader_factory)
: loader_(loader),
client_(NULL),
resource_dispatcher_(resource_dispatcher),
task_runner_(base::ThreadTaskRunnerHandle::Get()),
defers_loading_(NOT_DEFERRING),
request_id_(-1),
url_loader_factory_(url_loader_factory) {}
void WebURLLoaderImpl::Context::Cancel() {
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::Context::Cancel", this,
TRACE_EVENT_FLAG_FLOW_IN);
if (resource_dispatcher_ && // NULL in unittest.
request_id_ != -1) {
resource_dispatcher_->Cancel(request_id_);
request_id_ = -1;
}
if (body_stream_writer_)
body_stream_writer_->Fail();
// Ensure that we do not notify the delegate anymore as it has
// its own pointer to the client.
if (ftp_listing_delegate_)
ftp_listing_delegate_->Cancel();
// Do not make any further calls to the client.
client_ = NULL;
loader_ = NULL;
}
void WebURLLoaderImpl::Context::SetDefersLoading(bool value) {
if (request_id_ != -1)
resource_dispatcher_->SetDefersLoading(request_id_, value);
if (value && defers_loading_ == NOT_DEFERRING) {
defers_loading_ = SHOULD_DEFER;
} else if (!value && defers_loading_ != NOT_DEFERRING) {
if (defers_loading_ == DEFERRED_DATA) {
task_runner_->PostTask(FROM_HERE,
base::Bind(&Context::HandleDataURL, this));
}
defers_loading_ = NOT_DEFERRING;
}
}
void WebURLLoaderImpl::Context::DidChangePriority(
WebURLRequest::Priority new_priority, int intra_priority_value) {
if (request_id_ != -1) {
resource_dispatcher_->DidChangePriority(
request_id_,
ConvertWebKitPriorityToNetPriority(new_priority),
intra_priority_value);
}
}
void WebURLLoaderImpl::Context::Start(const WebURLRequest& request,
SyncLoadResponse* sync_load_response) {
DCHECK(request_id_ == -1);
request_ = request; // Save the request.
GURL url = request.Url();
if (CanHandleDataURLRequestLocally()) {
if (sync_load_response) {
// This is a sync load. Do the work now.
sync_load_response->url = url;
sync_load_response->error_code =
GetInfoFromDataURL(sync_load_response->url, sync_load_response,
&sync_load_response->data);
} else {
task_runner_->PostTask(FROM_HERE,
base::Bind(&Context::HandleDataURL, this));
}
return;
}
if (request.GetExtraData()) {
RequestExtraData* extra_data =
static_cast<RequestExtraData*>(request.GetExtraData());
stream_override_ = extra_data->TakeStreamOverrideOwnership();
}
// PlzNavigate: outside of tests, the only navigation requests going through
// the WebURLLoader are the ones created by CommitNavigation. Several browser
// tests load HTML directly through a data url which will be handled by the
// block above.
DCHECK(!IsBrowserSideNavigationEnabled() || stream_override_ ||
request.GetFrameType() == WebURLRequest::kFrameTypeNone);
GURL referrer_url(
request.HttpHeaderField(WebString::FromASCII("Referer")).Latin1());
const std::string& method = request.HttpMethod().Latin1();
// TODO(brettw) this should take parameter encoding into account when
// creating the GURLs.
// TODO(horo): Check credentials flag is unset when credentials mode is omit.
// Check credentials flag is set when credentials mode is include.
std::unique_ptr<ResourceRequest> resource_request(new ResourceRequest);
resource_request->method = method;
resource_request->url = url;
resource_request->first_party_for_cookies = request.FirstPartyForCookies();
resource_request->request_initiator =
request.RequestorOrigin().IsNull()
? base::Optional<url::Origin>()
: base::Optional<url::Origin>(request.RequestorOrigin());
resource_request->referrer = referrer_url;
resource_request->referrer_policy = request.GetReferrerPolicy();
resource_request->headers = GetWebURLRequestHeaders(request);
resource_request->load_flags = GetLoadFlagsForWebURLRequest(request);
// origin_pid only needs to be non-zero if the request originates outside
// the render process, so we can use requestorProcessID even for requests
// from in-process plugins.
resource_request->origin_pid = request.RequestorProcessID();
resource_request->resource_type = WebURLRequestToResourceType(request);
resource_request->priority =
ConvertWebKitPriorityToNetPriority(request.GetPriority());
resource_request->appcache_host_id = request.AppCacheHostID();
resource_request->should_reset_appcache = request.ShouldResetAppCache();
resource_request->service_worker_mode =
GetServiceWorkerModeForWebURLRequest(request);
resource_request->fetch_request_mode =
GetFetchRequestModeForWebURLRequest(request);
resource_request->fetch_credentials_mode =
GetFetchCredentialsModeForWebURLRequest(request);
resource_request->fetch_redirect_mode =
GetFetchRedirectModeForWebURLRequest(request);
resource_request->fetch_request_context_type =
GetRequestContextTypeForWebURLRequest(request);
resource_request->fetch_mixed_content_context_type =
GetMixedContentContextTypeForWebURLRequest(request);
resource_request->fetch_frame_type =
GetRequestContextFrameTypeForWebURLRequest(request);
resource_request->request_body =
GetRequestBodyForWebURLRequest(request).get();
resource_request->download_to_file = request.DownloadToFile();
resource_request->has_user_gesture = request.HasUserGesture();
resource_request->enable_load_timing = true;
resource_request->enable_upload_progress = request.ReportUploadProgress();
if (request.GetRequestContext() ==
WebURLRequest::kRequestContextXMLHttpRequest &&
(url.has_username() || url.has_password())) {
resource_request->do_not_prompt_for_login = true;
}
resource_request->report_raw_headers = request.ReportRawHeaders();
resource_request->previews_state =
static_cast<PreviewsState>(request.GetPreviewsState());
// PlzNavigate: during navigation, the renderer should request a stream which
// contains the body of the response. The network request has already been
// made by the browser.
mojo::ScopedDataPipeConsumerHandle consumer_handle;
if (stream_override_) {
CHECK(IsBrowserSideNavigationEnabled());
DCHECK(!sync_load_response);
DCHECK_NE(WebURLRequest::kFrameTypeNone, request.GetFrameType());
if (stream_override_->consumer_handle.is_valid()) {
consumer_handle = std::move(stream_override_->consumer_handle);
} else {
resource_request->resource_body_stream_url = stream_override_->stream_url;
}
}
RequestExtraData empty_extra_data;
RequestExtraData* extra_data;
if (request.GetExtraData())
extra_data = static_cast<RequestExtraData*>(request.GetExtraData());
else
extra_data = &empty_extra_data;
extra_data->CopyToResourceRequest(resource_request.get());
if (extra_data->url_loader_factory_override())
url_loader_factory_ = extra_data->url_loader_factory_override();
if (sync_load_response) {
DCHECK(defers_loading_ == NOT_DEFERRING);
resource_dispatcher_->StartSync(
std::move(resource_request), request.RequestorID(), sync_load_response,
request.GetLoadingIPCType(), url_loader_factory_,
extra_data->TakeURLLoaderThrottles());
return;
}
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::Context::Start", this,
TRACE_EVENT_FLAG_FLOW_OUT);
request_id_ = resource_dispatcher_->StartAsync(
std::move(resource_request), request.RequestorID(), task_runner_,
extra_data->frame_origin(),
base::MakeUnique<WebURLLoaderImpl::RequestPeerImpl>(this),
request.GetLoadingIPCType(), url_loader_factory_,
extra_data->TakeURLLoaderThrottles(), std::move(consumer_handle));
if (defers_loading_ != NOT_DEFERRING)
resource_dispatcher_->SetDefersLoading(request_id_, true);
}
void WebURLLoaderImpl::Context::SetTaskRunner(
const scoped_refptr<base::SingleThreadTaskRunner>& task_runner) {
task_runner_ = task_runner;
}
void WebURLLoaderImpl::Context::OnUploadProgress(uint64_t position,
uint64_t size) {
if (client_)
client_->DidSendData(position, size);
}
bool WebURLLoaderImpl::Context::OnReceivedRedirect(
const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) {
if (!client_)
return false;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedRedirect",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
WebURLResponse response;
PopulateURLResponse(request_.Url(), info, &response,
request_.ReportRawHeaders());
WebURLRequest new_request = PopulateURLRequestForRedirect(
request_, redirect_info,
info.was_fetched_via_service_worker
? blink::WebURLRequest::ServiceWorkerMode::kAll
: blink::WebURLRequest::ServiceWorkerMode::kNone);
bool follow = client_->WillFollowRedirect(new_request, response);
if (!follow) {
request_ = WebURLRequest();
return false;
}
DCHECK(WebURL(redirect_info.new_url) == new_request.Url());
request_ = new_request;
// First-party cookie logic moved from DocumentLoader in Blink to
// net::URLRequest in the browser. Assert that Blink didn't try to change it
// to something else.
DCHECK_EQ(redirect_info.new_first_party_for_cookies.spec(),
request_.FirstPartyForCookies().GetString().Utf8());
return true;
}
void WebURLLoaderImpl::Context::OnReceivedResponse(
const ResourceResponseInfo& initial_info) {
if (!client_)
return;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedResponse",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
ResourceResponseInfo info = initial_info;
// PlzNavigate: during navigations, the ResourceResponse has already been
// received on the browser side, and has been passed down to the renderer.
if (stream_override_) {
CHECK(IsBrowserSideNavigationEnabled());
// Compute the delta between the response sizes so that the accurate
// transfer size can be reported at the end of the request.
stream_override_->total_transfer_size_delta =
stream_override_->response.encoded_data_length -
initial_info.encoded_data_length;
info = stream_override_->response;
// Replay the redirects that happened during navigation.
DCHECK_EQ(stream_override_->redirect_responses.size(),
stream_override_->redirect_infos.size());
for (size_t i = 0; i < stream_override_->redirect_responses.size(); ++i) {
bool result = OnReceivedRedirect(stream_override_->redirect_infos[i],
stream_override_->redirect_responses[i]);
if (!result)
return;
}
}
WebURLResponse response;
GURL url(request_.Url());
PopulateURLResponse(url, info, &response, request_.ReportRawHeaders());
bool show_raw_listing = false;
if (info.mime_type == "text/vnd.chromium.ftp-dir") {
if (url.query_piece() == "raw") {
// Set the MIME type to plain text to prevent any active content.
response.SetMIMEType("text/plain");
show_raw_listing = true;
} else {
// We're going to produce a parsed listing in HTML.
response.SetMIMEType("text/html");
}
}
if (info.headers.get() && info.mime_type == "multipart/x-mixed-replace") {
std::string content_type;
info.headers->EnumerateHeader(NULL, "content-type", &content_type);
std::string mime_type;
std::string charset;
bool had_charset = false;
std::string boundary;
net::HttpUtil::ParseContentType(content_type, &mime_type, &charset,
&had_charset, &boundary);
base::TrimString(boundary, " \"", &boundary);
response.SetMultipartBoundary(boundary.data(), boundary.size());
}
if (request_.UseStreamOnResponse()) {
SharedMemoryDataConsumerHandle::BackpressureMode mode =
SharedMemoryDataConsumerHandle::kDoNotApplyBackpressure;
if (info.headers &&
info.headers->HasHeaderValue("Cache-Control", "no-store")) {
mode = SharedMemoryDataConsumerHandle::kApplyBackpressure;
}
auto read_handle = base::MakeUnique<SharedMemoryDataConsumerHandle>(
mode, base::Bind(&Context::CancelBodyStreaming, this),
&body_stream_writer_);
// Here |body_stream_writer_| has an indirect reference to |this| and that
// creates a reference cycle, but it is not a problem because the cycle
// will break if one of the following happens:
// 1) The body data transfer is done (with or without an error).
// 2) |read_handle| (and its reader) is detached.
client_->DidReceiveResponse(response, std::move(read_handle));
// TODO(yhirano): Support ftp listening and multipart
return;
}
client_->DidReceiveResponse(response);
// DidReceiveResponse() may have triggered a cancel, causing the |client_| to
// go away.
if (!client_)
return;
DCHECK(!ftp_listing_delegate_);
if (info.mime_type == "text/vnd.chromium.ftp-dir" && !show_raw_listing) {
ftp_listing_delegate_ =
base::MakeUnique<FtpDirectoryListingResponseDelegate>(client_, loader_,
response);
}
}
void WebURLLoaderImpl::Context::OnDownloadedData(int len,
int encoded_data_length) {
if (client_)
client_->DidDownloadData(len, encoded_data_length);
}
void WebURLLoaderImpl::Context::OnReceivedData(
std::unique_ptr<ReceivedData> data) {
const char* payload = data->payload();
int data_length = data->length();
if (!client_)
return;
if (stream_override_ && stream_override_->stream_url.is_empty()) {
// Since ResourceDispatcher::ContinueForNavigation called OnComplete
// immediately, it didn't have the size of the resource immediately. So as
// data is read off the data pipe, keep track of how much we're reading.
stream_override_->total_transferred += data_length;
}
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedData",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
if (ftp_listing_delegate_) {
// The FTP listing delegate will make the appropriate calls to
// client_->didReceiveData and client_->didReceiveResponse.
ftp_listing_delegate_->OnReceivedData(payload, data_length);
return;
}
// We dispatch the data even when |useStreamOnResponse()| is set, in order
// to make Devtools work.
client_->DidReceiveData(payload, data_length);
if (request_.UseStreamOnResponse()) {
// We don't support |ftp_listing_delegate_| for now.
// TODO(yhirano): Support ftp listening.
body_stream_writer_->AddData(std::move(data));
}
}
void WebURLLoaderImpl::Context::OnTransferSizeUpdated(int transfer_size_diff) {
client_->DidReceiveTransferSizeUpdate(transfer_size_diff);
}
void WebURLLoaderImpl::Context::OnReceivedCachedMetadata(
const char* data, int len) {
if (!client_)
return;
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnReceivedCachedMetadata",
this, TRACE_EVENT_FLAG_FLOW_IN | TRACE_EVENT_FLAG_FLOW_OUT);
client_->DidReceiveCachedMetadata(data, len);
}
void WebURLLoaderImpl::Context::OnCompletedRequest(
int error_code,
bool was_ignored_by_handler,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) {
if (stream_override_ && stream_override_->stream_url.is_empty()) {
// TODO(kinuko|scottmg|jam): This is wrong. https://crbug.com/705744.
total_transfer_size = stream_override_->total_transferred;
encoded_body_size = stream_override_->total_transferred;
}
if (ftp_listing_delegate_) {
ftp_listing_delegate_->OnCompletedRequest();
ftp_listing_delegate_.reset(NULL);
}
if (body_stream_writer_ && error_code != net::OK)
body_stream_writer_->Fail();
body_stream_writer_.reset();
if (client_) {
TRACE_EVENT_WITH_FLOW0(
"loading", "WebURLLoaderImpl::Context::OnCompletedRequest",
this, TRACE_EVENT_FLAG_FLOW_IN);
if (error_code != net::OK) {
client_->DidFail(CreateWebURLError(request_.Url(), stale_copy_in_cache,
error_code, was_ignored_by_handler),
total_transfer_size, encoded_body_size,
decoded_body_size);
} else {
// PlzNavigate: compute the accurate transfer size for navigations.
if (stream_override_) {
DCHECK(IsBrowserSideNavigationEnabled());
total_transfer_size += stream_override_->total_transfer_size_delta;
}
client_->DidFinishLoading((completion_time - TimeTicks()).InSecondsF(),
total_transfer_size, encoded_body_size,
decoded_body_size);
}
}
}
WebURLLoaderImpl::Context::~Context() {
// We must be already cancelled at this point.
DCHECK_LT(request_id_, 0);
}
void WebURLLoaderImpl::Context::CancelBodyStreaming() {
scoped_refptr<Context> protect(this);
// Notify renderer clients that the request is canceled.
if (ftp_listing_delegate_) {
ftp_listing_delegate_->OnCompletedRequest();
ftp_listing_delegate_.reset(NULL);
}
if (body_stream_writer_) {
body_stream_writer_->Fail();
body_stream_writer_.reset();
}
if (client_) {
// TODO(yhirano): Set |stale_copy_in_cache| appropriately if possible.
client_->DidFail(CreateWebURLError(request_.Url(), false, net::ERR_ABORTED),
WebURLLoaderClient::kUnknownEncodedDataLength, 0, 0);
}
// Notify the browser process that the request is canceled.
Cancel();
}
bool WebURLLoaderImpl::Context::CanHandleDataURLRequestLocally() const {
if (!request_.Url().ProtocolIs(url::kDataScheme))
return false;
// The fast paths for data URL, Start() and HandleDataURL(), don't support
// the downloadToFile option.
if (request_.DownloadToFile())
return false;
// Data url requests from object tags may need to be intercepted as streams
// and so need to be sent to the browser.
if (request_.GetRequestContext() == WebURLRequest::kRequestContextObject)
return false;
// Optimize for the case where we can handle a data URL locally. We must
// skip this for data URLs targetted at frames since those could trigger a
// download.
//
// NOTE: We special case MIME types we can render both for performance
// reasons as well as to support unit tests.
#if defined(OS_ANDROID)
// For compatibility reasons on Android we need to expose top-level data://
// to the browser. In tests resource_dispatcher_ can be null, and test pages
// need to be loaded locally.
// For PlzNavigate, navigation requests were already checked in the browser.
if (resource_dispatcher_ &&
request_.GetFrameType() == WebURLRequest::kFrameTypeTopLevel) {
if (!IsBrowserSideNavigationEnabled())
return false;
}
#endif
if (request_.GetFrameType() != WebURLRequest::kFrameTypeTopLevel &&
request_.GetFrameType() != WebURLRequest::kFrameTypeNested)
return true;
std::string mime_type, unused_charset;
if (net::DataURL::Parse(request_.Url(), &mime_type, &unused_charset, NULL) &&
mime_util::IsSupportedMimeType(mime_type))
return true;
return false;
}
void WebURLLoaderImpl::Context::HandleDataURL() {
DCHECK_NE(defers_loading_, DEFERRED_DATA);
if (defers_loading_ == SHOULD_DEFER) {
defers_loading_ = DEFERRED_DATA;
return;
}
ResourceResponseInfo info;
std::string data;
int error_code = GetInfoFromDataURL(request_.Url(), &info, &data);
if (error_code == net::OK) {
OnReceivedResponse(info);
auto size = data.size();
if (size != 0)
OnReceivedData(base::MakeUnique<FixedReceivedData>(data.data(), size));
}
OnCompletedRequest(error_code, false, false, base::TimeTicks::Now(), 0,
data.size(), data.size());
}
// WebURLLoaderImpl::RequestPeerImpl ------------------------------------------
WebURLLoaderImpl::RequestPeerImpl::RequestPeerImpl(Context* context)
: context_(context) {}
void WebURLLoaderImpl::RequestPeerImpl::OnUploadProgress(uint64_t position,
uint64_t size) {
context_->OnUploadProgress(position, size);
}
bool WebURLLoaderImpl::RequestPeerImpl::OnReceivedRedirect(
const net::RedirectInfo& redirect_info,
const ResourceResponseInfo& info) {
return context_->OnReceivedRedirect(redirect_info, info);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedResponse(
const ResourceResponseInfo& info) {
context_->OnReceivedResponse(info);
}
void WebURLLoaderImpl::RequestPeerImpl::OnDownloadedData(
int len,
int encoded_data_length) {
context_->OnDownloadedData(len, encoded_data_length);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedData(
std::unique_ptr<ReceivedData> data) {
context_->OnReceivedData(std::move(data));
}
void WebURLLoaderImpl::RequestPeerImpl::OnTransferSizeUpdated(
int transfer_size_diff) {
context_->OnTransferSizeUpdated(transfer_size_diff);
}
void WebURLLoaderImpl::RequestPeerImpl::OnReceivedCachedMetadata(
const char* data,
int len) {
context_->OnReceivedCachedMetadata(data, len);
}
void WebURLLoaderImpl::RequestPeerImpl::OnCompletedRequest(
int error_code,
bool was_ignored_by_handler,
bool stale_copy_in_cache,
const base::TimeTicks& completion_time,
int64_t total_transfer_size,
int64_t encoded_body_size,
int64_t decoded_body_size) {
context_->OnCompletedRequest(
error_code, was_ignored_by_handler, stale_copy_in_cache, completion_time,
total_transfer_size, encoded_body_size, decoded_body_size);
}
// WebURLLoaderImpl -----------------------------------------------------------
WebURLLoaderImpl::WebURLLoaderImpl(ResourceDispatcher* resource_dispatcher,
mojom::URLLoaderFactory* url_loader_factory)
: context_(new Context(this, resource_dispatcher, url_loader_factory)) {}
WebURLLoaderImpl::~WebURLLoaderImpl() {
Cancel();
}
void WebURLLoaderImpl::PopulateURLResponse(const GURL& url,
const ResourceResponseInfo& info,
WebURLResponse* response,
bool report_security_info) {
response->SetURL(url);
response->SetResponseTime(info.response_time.ToInternalValue());
response->SetMIMEType(WebString::FromUTF8(info.mime_type));
response->SetTextEncodingName(WebString::FromUTF8(info.charset));
response->SetExpectedContentLength(info.content_length);
response->SetHasMajorCertificateErrors(info.has_major_certificate_errors);
response->SetAppCacheID(info.appcache_id);
response->SetAppCacheManifestURL(info.appcache_manifest_url);
response->SetWasCached(!info.load_timing.request_start_time.is_null() &&
info.response_time <
info.load_timing.request_start_time);
response->SetRemoteIPAddress(
WebString::FromUTF8(info.socket_address.HostForURL()));
response->SetRemotePort(info.socket_address.port());
response->SetConnectionID(info.load_timing.socket_log_id);
response->SetConnectionReused(info.load_timing.socket_reused);
response->SetDownloadFilePath(
blink::FilePathToWebString(info.download_file_path));
response->SetWasFetchedViaSPDY(info.was_fetched_via_spdy);
response->SetWasFetchedViaServiceWorker(info.was_fetched_via_service_worker);
response->SetWasFetchedViaForeignFetch(info.was_fetched_via_foreign_fetch);
response->SetWasFallbackRequiredByServiceWorker(
info.was_fallback_required_by_service_worker);
response->SetServiceWorkerResponseType(info.response_type_via_service_worker);
response->SetURLListViaServiceWorker(info.url_list_via_service_worker);
response->SetCacheStorageCacheName(
info.is_in_cache_storage
? blink::WebString::FromUTF8(info.cache_storage_cache_name)
: blink::WebString());
blink::WebVector<blink::WebString> cors_exposed_header_names(
info.cors_exposed_header_names.size());
std::transform(
info.cors_exposed_header_names.begin(),
info.cors_exposed_header_names.end(), cors_exposed_header_names.begin(),
[](const std::string& h) { return blink::WebString::FromLatin1(h); });
response->SetCorsExposedHeaderNames(cors_exposed_header_names);
response->SetDidServiceWorkerNavigationPreload(
info.did_service_worker_navigation_preload);
response->SetEncodedDataLength(info.encoded_data_length);
SetSecurityStyleAndDetails(url, info, response, report_security_info);
WebURLResponseExtraDataImpl* extra_data =
new WebURLResponseExtraDataImpl(info.alpn_negotiated_protocol);
response->SetExtraData(extra_data);
extra_data->set_was_fetched_via_spdy(info.was_fetched_via_spdy);
extra_data->set_was_alpn_negotiated(info.was_alpn_negotiated);
extra_data->set_was_alternate_protocol_available(
info.was_alternate_protocol_available);
extra_data->set_connection_info(info.connection_info);
extra_data->set_previews_state(info.previews_state);
extra_data->set_effective_connection_type(info.effective_connection_type);
// If there's no received headers end time, don't set load timing. This is
// the case for non-HTTP requests, requests that don't go over the wire, and
// certain error cases.
if (!info.load_timing.receive_headers_end.is_null()) {
WebURLLoadTiming timing;
PopulateURLLoadTiming(info.load_timing, &timing);
const TimeTicks kNullTicks;
timing.SetWorkerStart(
(info.service_worker_start_time - kNullTicks).InSecondsF());
timing.SetWorkerReady(
(info.service_worker_ready_time - kNullTicks).InSecondsF());
response->SetLoadTiming(timing);
}
if (info.devtools_info.get()) {
WebHTTPLoadInfo load_info;
load_info.SetHTTPStatusCode(info.devtools_info->http_status_code);
load_info.SetHTTPStatusText(
WebString::FromLatin1(info.devtools_info->http_status_text));
load_info.SetRequestHeadersText(
WebString::FromLatin1(info.devtools_info->request_headers_text));
load_info.SetResponseHeadersText(
WebString::FromLatin1(info.devtools_info->response_headers_text));
const HeadersVector& request_headers = info.devtools_info->request_headers;
for (HeadersVector::const_iterator it = request_headers.begin();
it != request_headers.end(); ++it) {
load_info.AddRequestHeader(WebString::FromLatin1(it->first),
WebString::FromLatin1(it->second));
}
const HeadersVector& response_headers =
info.devtools_info->response_headers;
for (HeadersVector::const_iterator it = response_headers.begin();
it != response_headers.end(); ++it) {
load_info.AddResponseHeader(WebString::FromLatin1(it->first),
WebString::FromLatin1(it->second));
}
load_info.SetNPNNegotiatedProtocol(
WebString::FromLatin1(info.alpn_negotiated_protocol));
response->SetHTTPLoadInfo(load_info);
}
const net::HttpResponseHeaders* headers = info.headers.get();
if (!headers)
return;
WebURLResponse::HTTPVersion version = WebURLResponse::kHTTPVersionUnknown;
if (headers->GetHttpVersion() == net::HttpVersion(0, 9))
version = WebURLResponse::kHTTPVersion_0_9;
else if (headers->GetHttpVersion() == net::HttpVersion(1, 0))
version = WebURLResponse::kHTTPVersion_1_0;
else if (headers->GetHttpVersion() == net::HttpVersion(1, 1))
version = WebURLResponse::kHTTPVersion_1_1;
else if (headers->GetHttpVersion() == net::HttpVersion(2, 0))
version = WebURLResponse::kHTTPVersion_2_0;
response->SetHTTPVersion(version);
response->SetHTTPStatusCode(headers->response_code());
response->SetHTTPStatusText(WebString::FromLatin1(headers->GetStatusText()));
// Build up the header map.
size_t iter = 0;
std::string name;
std::string value;
while (headers->EnumerateHeaderLines(&iter, &name, &value)) {
response->AddHTTPHeaderField(WebString::FromLatin1(name),
WebString::FromLatin1(value));
}
}
WebURLRequest WebURLLoaderImpl::PopulateURLRequestForRedirect(
const blink::WebURLRequest& request,
const net::RedirectInfo& redirect_info,
blink::WebURLRequest::ServiceWorkerMode service_worker_mode) {
// TODO(darin): We lack sufficient information to construct the actual
// request that resulted from the redirect.
WebURLRequest new_request(redirect_info.new_url);
new_request.SetFirstPartyForCookies(
redirect_info.new_first_party_for_cookies);
new_request.SetDownloadToFile(request.DownloadToFile());
new_request.SetUseStreamOnResponse(request.UseStreamOnResponse());
new_request.SetRequestContext(request.GetRequestContext());
new_request.SetFrameType(request.GetFrameType());
new_request.SetServiceWorkerMode(service_worker_mode);
new_request.SetShouldResetAppCache(request.ShouldResetAppCache());
new_request.SetFetchRequestMode(request.GetFetchRequestMode());
new_request.SetFetchCredentialsMode(request.GetFetchCredentialsMode());
new_request.SetKeepalive(request.GetKeepalive());
new_request.SetHTTPReferrer(WebString::FromUTF8(redirect_info.new_referrer),
NetReferrerPolicyToBlinkReferrerPolicy(
redirect_info.new_referrer_policy));
new_request.SetPriority(request.GetPriority());
std::string old_method = request.HttpMethod().Utf8();
new_request.SetHTTPMethod(WebString::FromUTF8(redirect_info.new_method));
if (redirect_info.new_method == old_method)
new_request.SetHTTPBody(request.HttpBody());
new_request.SetCheckForBrowserSideNavigation(
request.CheckForBrowserSideNavigation());
return new_request;
}
void WebURLLoaderImpl::LoadSynchronously(const WebURLRequest& request,
WebURLResponse& response,
WebURLError& error,
WebData& data,
int64_t& encoded_data_length,
int64_t& encoded_body_length) {
TRACE_EVENT0("loading", "WebURLLoaderImpl::loadSynchronously");
SyncLoadResponse sync_load_response;
context_->Start(request, &sync_load_response);
const GURL& final_url = sync_load_response.url;
// TODO(tc): For file loads, we may want to include a more descriptive
// status code or status text.
int error_code = sync_load_response.error_code;
if (error_code != net::OK) {
response.SetURL(final_url);
error.domain = WebString::FromASCII(net::kErrorDomain);
error.reason = error_code;
error.unreachable_url = final_url;
return;
}
PopulateURLResponse(final_url, sync_load_response, &response,
request.ReportRawHeaders());
encoded_data_length = sync_load_response.encoded_data_length;
encoded_body_length = sync_load_response.encoded_body_length;
data.Assign(sync_load_response.data.data(), sync_load_response.data.size());
}
void WebURLLoaderImpl::LoadAsynchronously(const WebURLRequest& request,
WebURLLoaderClient* client) {
TRACE_EVENT_WITH_FLOW0("loading", "WebURLLoaderImpl::loadAsynchronously",
this, TRACE_EVENT_FLAG_FLOW_OUT);
DCHECK(!context_->client());
context_->set_client(client);
context_->Start(request, NULL);
}
void WebURLLoaderImpl::Cancel() {
context_->Cancel();
}
void WebURLLoaderImpl::SetDefersLoading(bool value) {
context_->SetDefersLoading(value);
}
void WebURLLoaderImpl::DidChangePriority(WebURLRequest::Priority new_priority,
int intra_priority_value) {
context_->DidChangePriority(new_priority, intra_priority_value);
}
void WebURLLoaderImpl::SetLoadingTaskRunner(
base::SingleThreadTaskRunner* loading_task_runner) {
context_->SetTaskRunner(loading_task_runner);
}
} // namespace content
|
<reponame>Fingel/piccolo
from .base import Operator
class ComparisonOperator(Operator):
template = ""
class IsNull(ComparisonOperator):
template = "{name} IS NULL"
class Equal(ComparisonOperator):
template = "{name} = {value}"
class NotEqual(ComparisonOperator):
template = "{name} != {value}"
class In(ComparisonOperator):
template = "{name} IN ({values})"
class NotIn(ComparisonOperator):
template = "{name} NOT IN ({values})"
class Like(ComparisonOperator):
template = "{name} LIKE {value}"
class ILike(ComparisonOperator):
template = "{name} ILIKE {value}"
class NotLike(ComparisonOperator):
template = "{name} NOT LIKE {value}"
class GreaterThan(ComparisonOperator):
# Add permitted types???
template = "{name} > {value}"
class GreaterEqualThan(ComparisonOperator):
template = "{name} >= {value}"
class LessThan(ComparisonOperator):
template = "{name} < {value}"
class LessEqualThan(ComparisonOperator):
template = "{name} <= {value}"
|
Welcome to the University of Rochester's Anesthesiology Residency Program!
Living and working in the Anesthesiology program at the University of Rochester is a unique experience.
All positions are offered through Electronic Residency Application Service (ERAS), in compliance with the ACGME rules and regulations. Applications will be accepted starting September 15th through the end of January.
Welcome to our webpage! It was not that long ago that I was in your shoes, and I have since been afforded the opportunity to train and work at a variety of places before starting my position here over two years ago. I am looking forward to being your Residency Program Director.
Let me start by bringing you up to speed about the exciting changes that are occurring this year. After 10 years as serving as Program Director, Dr. Karan will be transitioning to another (and more senior) role at the University of Rochester. She has already begun this work as the Assistant Designated Institutional Officer for Hospital based programs (think of it as the assistant superintendent wherein the program director is the principal) and will continue to work in our department, as well. We have worked together for over a year in order to ensure a smooth transition as I officially take over her role in April, 2019.
Dr. Karan has built an innovative, cutting edge educational curriculum which emphasizes the learner’s experience. I have no plans on changing that. For the better part of two years, Dr. Karan and I have teamed up with other educational leaders in our department to improve the use of simulation and other interactive learning modalities for our residents. Since we are a fully integrated residency program, we start this training as early as September of your internship year. We have also incorporated interdisciplinary learning activities with other surgical specialties. Our residents do not just participate in learning activities, however. Our innovative curriculum is sparked by their feedback and we continuously reevaluate it to incorporate their creative ideas. The residents are truly our collaborators.
We take pride in fostering a family atmosphere. Residency can be very demanding and you may feel vulnerable at times. Our residents work hard- on average about 65 hours a week. They complete approximately 2-4 times the required caseloads in all categories. They score above the national average on the boards each year. Our mission is to provide the infrastructure to develop you to your fullest potential. To that end, we are a national leader in physician wellness programming. Our residents grow their families, get together for outings in the numerous parks and lakes around Rochester, and pursue lifelong interests.
Are self-motivated and enthusiastic learners.
Can synthesize and apply new information in the clinical setting.
Look to continually improve by proactively seeking out feedback.
And can picture themselves (and families) embracing Rochester for three, four, or more years.
I have lived and worked in several large cities- New York, Philadelphia, and Tel Aviv to name a few… Rochester offers many of the cultural aspects of those places, without the congestion. I have found unbelievable mentorship in this department, most notably from Dr. Karan, and have found Rochester a place to grow professionally and personally. Dr. Karan’s leadership has led to an excellent residency program. She will still have a hand in its leadership for years to come. The University of Rochester’s moto is meliora- ever better. And I plan to continue that mindset as your program director. |
/**
* Save the current scene to a J3O file.
*/
void save() {
String filePath = ActionApplication.filePath(saveAssetPath);
File file = new File(filePath);
BinaryExporter exporter = BinaryExporter.getInstance();
try {
exporter.save(sceneNode, file);
} catch (IOException exception) {
logger.log(Level.SEVERE,
"Output exception while saving {0} to file {1}",
new Object[]{
MyString.quote(sceneNode.getName()),
MyString.quote(filePath)
});
return;
}
logger.log(Level.INFO, "Saved {0} to file {1}", new Object[]{
MyString.quote(sceneNode.getName()),
MyString.quote(filePath)
});
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.