content
stringlengths
7
2.61M
SOCIO-ETHICAL ISSUES SURROUNDING CAESAREAN SECTION BIRTHS IN AFRICA In the last decade, a number of studies have questioned the practice of caesarean section birth in obstetrical practices in Africa. Medical sociologists and anthropologists have considered caesarean section as a medicalization of social events. We are not assuming that it is true of false. The transformation of social events into medical indications rises ethical issues in the provision of healthcare in Africa. In this paper, we especially used the case of caesarean section birth to explore the transformation of social events into medical indications in Africa. Caesarean sections by choice interrogates the obstetrical practices. This paper examines the socio-ethical issues in caesarean section in Africa. We considered some underlying factors: medicalization of the society, informed consent, biotechnology, demand inducement, consumer-inducement demand and the health market-driven economy. This was desk-based study. A review of secondary data and literatures relative to caesarean section births in Africa were used for discussion. Findings from literatures revealed that a number of considerations have to be taken such as: demand inducement and information asymmetry, defensive and corporate medicine, medical power, consumer induced demand and health market driven economy. The findings informed health regulators on demand and supply sides of caesarean sections. Introduction In the last decade in Africa, maternal mortality remains a public health concern. In order to respond obstetricians and reproductive health professionals have put in place a number of health strategies to reduce maternal mortality. Among these strategies, we have emergency obstetric care (EOC). One of the components of EOC is caesarian section (CS). CS has been used worldwide to save the life of pregnant women during deliveries both in Advanced Industrialized Countries (AIC) and Low and Middle Countries (LMIC). Despite the success of CS in AIC compared to LMIC, CS rises a number controversies. The first controversy is emergency CS versus elective CS. The second controversy is psycho-social, economic, ethical, legal and technological aspects surrounding CS in Africa. Studies have focused more on estimation of CS rate in Africa using Robson's ten group classification system (Amita R., Sunny J. 2017). But little attention has been paid to socio-ethical issues of CS in Africa. This article was about refection about CS practices. To which extent could we know about the necessary or unnecessary CS? Which of the CS is ethically or morally acceptable? These questions may have no answers. Based on the inexistence of standards, it may be so difficult to give clear answers. Ethics is a moral debate: what is wrong or what is right in CS? We attempted to answer these questions using Beauchamp's principles of ethics. CS is one of the most widely performed surgical procedures in obstetrics worldwide. It was mainly evolved as a live saving procedure for mother and fetus during the difficult delivery. Emergency CS are done under medical indications. Contrary to emergency CS, elective CS are also known 'on demand' or 'requested'. CS on demand is performed without medical/obstetric indications. Elective CS place mothers and babies at risk. (American College of Nurse Midwives, 2003). An author argued that the growing normalization of care givers recommendations and women's request for CS outside of clear compelling and well-supported medical indications constitute a profound cultural shift. It involves both a loosening of criteria for various medical indications and considerations of surgical births. (Zeidenstein L. 2005). Over the past decades, the unprecedented and steady rise in the rates of CS have led to increased research, debates and concerns among health care professionals, governments, policy-makers, scientists and clinicians (Meeta G Global Perspectives Based on the works of (Osonwa O., K., Eku J. E., Eken P. E. 2016), there are wide global variation in the prevalence of CS. The prevalence of CS rates is highest in the Caribbean, Latin America, and Asian Countries which share CS rate of 26% whereas CS rate is low in South Asia and Sub-Saharan Africa. (Stanton and Holtz, 2006). Twenty-five of the twenty nine countries in Africa have a rate of 5% or lower. Countries such as China, South Korea, Brazil, Iran, Chile, Dominican Republic have the highest CS rate ranging from 30-40% (Stanton and Holtz, 2006 The African Perspectives The studies of Betran P. The previous section was an overview on epidemiological aspect of CS worldwide comprised Africa. The next debate is on socio-ethical issues surrounding CS. The lowest or highest CS rate is not justifying that the mothers and fetus who are undergoing emergency CS procedures or elective CS are not at risk. Objective of the Study This paper critically examines the socio-ethical issues surrounding the caesarean section birth in Africa despite the lowest CS rate Materials and Methods This was an ethno-monographic paper using relevant literatures relative to CS. A desk-based study was used to write this paper by consulting data base and secondary data from previous global research and regional studies on CS in Africa. Socio-Ethical Issues From Beauchamp and Childress 's works on ethics, there are key ethical principles to be followed by health professionals: the principle of autonomy, the principle of beneficence, the principle of non maleficence, the principle of justice and the principle of fidelity. The principle of Autonomy The principle of autonomy recognizes the right of individuals to self-determination. This is rooted in society's respect for individuals' ability to make informed decisions about personal matters. Autonomy has become more important as social values have shifted to define medical quality in terms of outcomes that are important to the patient rather than medical professionals. The increasing importance of autonomy can be seen as a social reaction to a "paternalistic" tradition within healthcare (Holmes & Purdy 1994). Studies have questioned whether the backlash against historically excessive paternalism in favor of patient autonomy has inhibited the proper use of soft paternalism to the detriment of outcomes for some patients. Respect for autonomy is the basis for informed consent and advance directives. (Haring 1974). Autonomy is a general indicator of health. Many diseases are characterized by loss of autonomy, in various manners. This makes autonomy an indicator for both personal well-being of the profession. This has implications for the consideration of medical ethics: "is the aim of healt care to do good, and benefit from it?"; or "is the aim of healthcare to do good to others, and have them, and society, benefit from this?". Ethicsby definitiontries to find a beneficial balance between the activities of the Individual and its effects on a collective. By considering autonomy as a gauge parameter for (self) health care, the medical and ethical perspective both benefit from the implied reference to health (Monge 1991). In the case of CS, conflict rises between maternal and fetus life. Consider a maternal refusal of treatment that may benefit the fetus or consider a mother choose an elective CS that may put the life of the fetus in danger: then a variety of ethical framework can support clinical decision making in addition to principle-based approaches. Helpful tools include feminist theory, case-based analysis and ethics of care along with the principle of autonomy. The maternal-fetus conflict can be illustrated when maternal behavior can harm the fetus. Six conflicts may rise when applying the principle of autonomy in regard to CS: Benefit to pregnant women and harm to fetus Benefit to fetus and harm to pregnant women Autonomy and legal consideration Autonomy and maternal value Autonomy and medical evidence Autonomy and social concern In ethical perspective, this is a dilemma as we have the mother's rights, the fetus rights and other rights related to maternal-fetus relation (figure 1). In this context, the ethical debate has focused around question of risks and benefits and has evolved questions obstetrical practices in medicine. The principle of autonomy might contribute to the construction of a reproductive rights framework for the women, but what about the fetus? The ethical debate remains. The principle of autonomy may contradict the principle of informed Consent in case of elective CS. In ethics, four general moral principles are applied to particular ethical problems: autonomy, beneficence, non-maleficence and justice. These principles are grounded in Kantian deontology, Mills Utilitarianism, Judeo-Christian morality and the Hippocratic Oath. Autonomy is, basically, the capacity to make and cat on one's own decision. However, the conception of autonomy that has emerged in bioethics, especially in the matter of informed consent, seems much narrower. ( Zeidenstein L. 2005). The ethical dilemma of elective Cesarean involves confusion about what constitutes informed consent. The informed consent process can be analyzed as containing three elements: information, comprehension, and voluntariness. Of course, the motives for obstetricians are not to do harm to either mother or fetus when they decide that an elective Cesarean is an ethical choice. But in a typically paternalist physician-patient relationship, the physician might present only information on risks and benefits of a procedure that he or she thinks will lead the patient to making the right (i.e., the physician-supported) decision regarding care. How can we expect the surgically trained obstetrician to present the risks and benefits of natural childbirth? It is rare that medical residents or nursing students participate in a socially supported family birth even once in their training. Female medical residents often choose elective Cesareans for themselves. (Zeidenstein L. 2005). The Principle of Beneficence The term beneficence refers to actions that promote the wellbeing of others. In the medical context, this means taking actions that serve the best interest of patients. However, uncertainty surrounds the precise definition of which practices do in fact help patients. (Badi & Badi identified beneficence as one of the core values of health care ethics. Some scholars, such as Pallegrino & Thomasma, argue that healing should be the sole purpose of medicine, and that endeavors like cosmetic surgery, contraception and euthanasia fall beyond its purview as well as elective CS. CS on demand or for non medical indication goes against medical deontology. The obstetrical practice of CS on demand or request interrogates the medical professions. The Principle of Non-Maleficence The concept of non-maleficence is embodied by the phrase, "first, do no harm" or the Latin 'primum non nocere'. Many consider that should be the main or primary consideration (hence primum): that it is more important not to harm your patient, than to do them good (Haring 1974). This is partly because enthusiastic practitioners are prone to using treatments that they believe will do good, without first having evaluated them adequately to ensure they do no (or only acceptable levels of) harm. Much harm has been done to patients as results. It is not only more important to do no harm than to do good; it is also important to know how likely it is that your treatment will harm a patient (Monge 1991). So a physician should go further than not prescribing medications they know to be harmfulhe or she should not prescribe medications (or otherwise treat the patient) unless she/he knows that the likely to be harmful; or at the very least, that patient understands the risks and benefits, and the likely benefits outweigh the likely risks (Olafson 1967). Once again, uncertainty in obstetrical practices may lead to harm to mother and fetus. The Principle of Fidelity This principle refers to fairness to patients. Although elective caesarean versus vaginal birth remains a challenge for midwives and obstetricians. Issues of fidelity arise for health professionals when two people voluntarily enter into a client-health professional relationship. Fidelity involves keeping promises; it also involves issues of faithfulness and loyalty. In the case of caesarean delivery on maternal request (CDMR) or emergency CS, the health professionals have to be loyal. In African cultural context, there are a lot of controversies surrounding the concept. What means Loyal? Is the health professional loyal for CDMR or emergency CS? Majority of women are little knowledgeable and might easily be manipulated in the type of CS. The Principle of Justice The meaning of justice as an ethical principle is said to have originated with Aristotle (Beauchamp & Childress, 1994), who suggested that justice means treating equals equally and but in proportion to their relative differences. Thus, equal people have the right to be treated equally, and non-equal people have the right to be treated differently if the inequality relevant to the issue in question. For example, politicians may be equal as persons but have differently party affiliations. Should these politicians need medical care, they should be treated equally and fairly. Should they ascribe to office and run for reelection, they may be treated differently by their constituents. In Africa, the demand for elective CS is particular for high income households. Aristotle's principle of justice might be questionable. In Africa settings, frequently, the differences in maternal health access are more pronounced in different socioeconomic groups within each country. A number of studies have associated the CS with socio-economic status (SES). The CS is associated with higher familiar income per capital, higher education, lower residential crowding, and pregnancy planning and advanced maternal age. A study carried out in Bangladesh, demonstrated that women from poorer and poorest households reported lower use of CS at around 30% and 54% respectively, whereas the use of CS was 1.32 times and 2.33 time higher among the richer and richest households who generally choose private hospitals where frequency of CS is higher which was similar to the study done in Finland. In Mexico the pregnant women belonging to high socioeconomic level was associated with 44% more chance of cesarean regarding low stratum (OR= 1.44,95% CI: 1.12-1.83) and women within the high social classes were attended only I private hospitals and 85.07% of these women underwent to a CS. (Byanjankar S., Yu B. 2017). The trend among some studies reviewed shows directly proportional relationship between cesarean section and a higher educational level. In Brazil women with higher maternal educational level (12years), showed a cesarean prevalence of 77.2%. (Byanjankar S., Yu B. 2017). CS is also associated with allocation of resources in health. Why society allocates resources to non medical indications (e.g CDMR)? Deontological Ethics and Caesarean Section This theory is argued by Fisher & Lovell,, was developed by Kant's philosophy was that action must be guided by universal principles that apply irrespective of the consequences of the actions. An action can only be morally right if it is carried out as a duty, Kant's categorical imperative lays emphasis that one does 'duty for duty's sake.' not in expectation of a reward. Medical codes of deontology are built upon Kantian principles, which provided a theory of moral permissibility for interactions that violate formulation of the categorical imperatives are morally impermissible. The patient is not sick and she chooses a medical procedure of her choice putting her life and the life of the baby at risk. Discussion Medical sociologists and anthropologists examine the interaction between doctors and patients in term of power and shared power in treatment decision-making process. The elective CS illustrates the social construction of disease without non medical indications. The demand and the supply side influence the CS. The doctor-patient relationship is governed is governed by power. As demonstrated the works of Bourdieu (1977;1996), medical power is a social professionalism construction. The physician acquires his power through education, trainings, skills, knowledge and social capital. Medical knowledge whether an art or a science, is appropriated by the doctor as a source of professional power. The physicians' possession and use of medical knowledge constitute their scientific authority; physicians' power derives from their ability to create objectives, representations, of the patient's health or illness. Medicalization is also source of medical power. The notion of medicalization has been applied by Foucault in analyzing between state and its population, between power and individual subject. Medicalization describe a process where more and more aspects of human existence, human behavior and human body are reframed as medical issues and where the professional power of medicine expands over wider sphere of life (Foucault, 1975;1994;2000). Medicalization induces biopower. The concept of biopower seems unavoidable in studies of health and illness, not only in the most obvious forms of institutional power or authoritative power as demonstrated in healthcare institution, but also the configuration of power in specific social setting in more subtle form of self discipline as pointed out Foucault. His study of power is not formed as attack on the exercise of power by specific institutions, groups, elites, but rather a study of the techniques or the forms of power as enacted in relations between individual agents and incorporated in each individual (Helle and Vibeke, 2004). In this context, Friedson's works demonstrated that medical profession had extended its monopoly over health and illness both through subordination, exclusion of other health work occupations such as nursing and through control of the process of diagnosis treatment and hospitalization. Medical dominance was achieved through occupational closure and control of the division of labor (Freidson, 1970(Freidson,, 1986. Occupational closure refers to a medical monopoly of the profession. The physician-patient relationship needs to be redefined to allow both the physician and patient to take an active role in treatment decision. Medical sociologists and anthropologists have conceptualized the physician-patient relationship in variety ways. Conclusion Caesarean section (CS) rate continue to rise in Africa and worldwide. The phenomenon is attributed to many factors such as: caesarean delivery on maternal demand, advanced age, socioeconomic status, maternal obesity and CS prevalence in public and private hospitals. The CS rate range is accompanied with socio-ethical concerns: autonomy, beneficence, non-maleficence, fidelity, justice, deontological ethics The elective CS may be conserved as social construction of disease or medicalization of births.
package main import "github.com/allaryin/rgoue/cmd" func main() { cmd.Execute() }
<gh_stars>0 # Generated by Django 3.0.7 on 2020-07-11 23:36 from django.db import migrations, models class Migration(migrations.Migration): dependencies = [ ('portfolio', '0097_auto_20200711_2258'), ] operations = [ migrations.AddField( model_name='icon', name='slug', field=models.SlugField(editable=False, null=True), ), ]
Single dose of BNT162b2 mRNA vaccine against SARS-CoV-2 induces high frequency of neutralising antibody and polyfunctional T-cell responses in patients with myeloproliferative neoplasms Encouraging results have been observed from initial studies evaluating vaccines targeting the novel beta coronavirus which causes severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). However, concerns have been raised around the efficacy of these vaccines in immunosuppressed populations, including patients with haematological malignancy. Myeloproliferative neoplasms (MPN), in particular myelofibrosis (MF), are associated with heterogenous immune defects which are influenced by patient age, disease subtype and the use of cytoreductive therapies. Patients with a WHO defined diagnosis of an MPN presenting to our clinic were recruited following first injection of 30g BNT162b2. A positive anti-S IgG ELISA was seen in 76.1% of patients following vaccination with positive neutralising antibodies detected in 85.7% of patients. A memory T cell response was observed in 80% of patients, with a CD4+ T cell response in 75% and a CD8+ T cell response in 35%. These results, for the first time, provide some reassurance regarding the initial immune response to the BNT162b2 vaccine amongst patients with MPN, with response rates similar to that observed in the general population. To the Editor: Encouraging results have been observed from initial studies evaluating vaccines targeting the novel beta coronavirus which causes severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). BNT162b2 (Pfizer-BioNTech) is a nucleoside-modified mRNA that encodes a full-length SARS-CoV-2 Spike (S) protein, a key target of neutralising antibodies, and has demonstrated a 95% reduction of cases in the general population. However, concerns have been raised around the efficacy of these vaccines in immunosuppressed populations, including patients with haematological malignancy. Myeloproliferative neoplasms (MPN), in particular myelofibrosis (MF), are associated with a pro-inflammatory state and dysregulation of pivotal natural killer cell, regulatory T cell and effector T cell function. These heterogenous defects are further influenced by patient age, disease subtype, stage and the use of cytoreductive therapies, including JAK inhibitors. A recently reported large scale population-based cohort study found incidence of both bacterial and viral infections to be significantly increased in MPN patients, irrespective of the use of cytoreductive therapies. Another large patient reported prospective study evaluating incidence of infection in MPN patients found both a diagnosis of MF and the use of ruxolitinib therapy to be associated with increased risk of infection. Separately, a study evaluating MF patients treated with ruxolitinib found disease severity, as determined by high international prognostic score system category, to be significantly correlated with infectious risk, with an optimal spleen response to treatment associated with improved infection free survival. These studies highlight the importance of an effective vaccination programme against SARS-CoV-2 in this population. Herein we describe, for the first time, immune responses to the first injection of BNT162b2 in an unselected MPN cohort. Patients with a WHO defined diagnosis of an MPN presenting to our clinic were recruited in accordance with the regional research and ethics review board, with sampling at baseline and median of 21 days (IQR 21-21) following first injection of 30 g BNT162b2. Clinical characteristics and adverse events are summarised in Table 1, with all adverse events reported within 7 days after administration of the vaccine considered to be related to the vaccine. The vaccine was safe and generally well tolerated with 57.1% patients reporting localised inflammation and 47.6% of patients reporting systemic side effects including flu-like illness, fatigue and gastrointestinal symptoms, following injection Anti-S IgG ELISA testing was performed as described previously in all 21 patients and results were compared with samples taken prior to vaccination in 20 patients. The induction of virus-specific T-cell responses by BNT162b2 vaccination was assessed ex-vivo by flow cytometric enumeration of antigen-specific CD8+ and CD4+ T lymphocytes using an intracellular cytokine assay for IFN, TNF and IL2, as described. Briefly, cells were thawed, then rested for 18 h at 37°C, 5% CO2. Specific peptides covering the immunogenic domains of the Spike (S) protein (Miltenyi Biotech) (0.25 g/ml) and anti-CD28 (BD bioscience) were added for 3 h, followed by Brefeldin-A (BFA) for an additional 3 h. Unstimulated cells were utilised as negative controls and PMA and Ionomycin (Miltenyi Biotech) was added separately as a positive control. Cells were stained with a viability dye, stained with antibodies directed against surface markers, and fixed and permeabilised (BD CytoFix/Cytoperm) prior to staining with antibodies directed against intracellular cytokines. T cell analysis was performed in 20 patients with a response considered positive if there was a threefold increase in any pro-inflammatory cytokine from baseline expression, and above a threshold of 0.01. A memory T cell response was observed in 80% of patients, with a CD4+ T cell response in 75% and a CD8+ T cell response in 35%. A polyfunctional T cell response was observed in 65% of patients evaluated (Fig. 1a, b). The median increase in expression of TNF in CD4+ cells compared with the baseline unstimulated control was 0.07 (IQR 0.01-0.35) and in CD8+ cells 0.11 (0.00-0.19). Of note, patients with a diagnosis of MF (n = 9) had significantly higher post-vaccine anti-S IgG EC50 and neutralising antibody ID50 titres compared to patients with other MPN subtypes, with a mean IgG EC50 of 3459 vs 158.4 (p = 0.012) and mean ID50 of 6604 vs 486.2 (p = 0.026) respectively (Fig. 1c, d). However, four of the patients with evidence of previous Covid-19 infection also had a diagnosis of MF. No significant differences in T cell or antibody response were identified between patients on treatment compared with those undergoing active surveillance. Similarly, no significant differences were observed between those taking ruxolitinib, compared with other therapies. These results, for the first time, provide some reassurance regarding the initial immune response to the BNT162b2 vaccine amongst patients with MPN, with response rates similar to that observed in the general population. This is particularly relevant following reports of a reduced response to a first injection of BNT162b2 in a heterogeneous group of cancer patients, with predominantly solid tissue and lymphoid malignancies. A memory T cell response may prove to be particularly important with regards to ongoing immunity against SARS-CoV-2. Our group has demonstrated a marked decline in neutralising antibodies in the 3 months following infection, whilst a robust T cell response remains evident at 6 months post infection. Indeed, evidence from the SARS-CoV-1 epidemic showed the memory T cell response to be significantly more durable than antibodies. Further analyses of the immune response to a second injection of BNT162b2, as well as the response to other vaccines against SARS-CoV-2, are clearly required. Longitudinal studies will also need to assess the durability of these responses and confirm that vaccination translates into a reduction in cases in this population. Acknowledgements PH designed the research, performed the research, analysed the data and wrote the manuscript. KJD, JSe, CG, TL and MHM perfomed the research and reviewed the manuscript. DR, RD, CW, JSa, NCG, JOS, KR and SK assisted with patient recruitment and reviewed the manuscript. AOR, YS and AE assisted with patient recruitment, patient interviews and reviewed the manuscript. HdL, CH and DM designed the research, assisted with patient recruitment, analysed the data and wrote the manuscript. Compliance with ethical standards Conflict of interest PH reports research funding from Bristol Myers Squibb and speakers fees from Incyte. HdL has received research grants and honoraria from Incyte and honoraria from Novartis and Pfizer. CH has received speaker fees from Novartis, Jannsen, CTI, Celgene, Medscape and has served on the Advisory Board for Incyte, CTI, Sierra Oncology, Novartis, Celgene, Roche, AOP pharma, Geron and Astra Zenica. DM has received speaker fees and advisory boards Novartis, Celgene and Jazz pharmaceuticals. Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
According to the Charlotte-Mecklenburg Police Department, detectives have charged 20-year-old Keith Samuels and 16-year-old Jaydon Turya for a breaking and entering. CHARLOTTE, NC (WBTV) - Police have charged two men for reportedly breaking into a women’s home in Charlotte Wednesday afternoon. On Wednesday, a woman reported that someone broke into her home on Wandering Creek Way and stole items. On Thursday, officers responded to Haven Ridge Lane to assist the Cabarrus County Sheriff’s Office with a stolen vehicle investigation where the occupants fled on foot. With the assistance of the CMPD’s Canine Unit, Samuels and Turya, were located and taken into custody. During a search of the stolen vehicle, items belonging to the woman on Wandering Creek Way were located. Samuels and Turya were then interviewed by Hickory Grove Division Detectives. Samuels and Turya were both charged with breaking and entering, larceny after breaking and entering, possession of stolen property, possession of stolen motor vehicle, carrying a concealed weapon and possession of marijuana. Turya was also charged with possession of a handgun by a minor. Samuels and Turya were then taken to the custody of the Mecklenburg County Sheriff’s Office.
// Report is part of the health.Reporter interface func (qsr *queryServiceRunning) Report(tabletType topo.TabletType, shouldQueryServiceBeRunning bool) (status map[string]string, err error) { isQueryServiceRunning := tabletserver.SqlQueryRpcService.GetState() == "SERVING" if shouldQueryServiceBeRunning != isQueryServiceRunning { return nil, fmt.Errorf("QueryService running=%v, expected=%v", isQueryServiceRunning, shouldQueryServiceBeRunning) } if isQueryServiceRunning { if err := tabletserver.IsHealthy(); err != nil { return nil, fmt.Errorf("QueryService is running, but not healthy: %v", err) } } return nil, nil }
def extract_challenge_data(challenge, phases): challenge_data_directory = CHALLENGE_DATA_DIR.format( challenge_id=challenge.id ) create_dir_as_python_package(challenge_data_directory) evaluation_script_url = challenge.evaluation_script.url evaluation_script_url = return_file_url_per_environment( evaluation_script_url ) PHASE_ANNOTATION_FILE_NAME_MAP[challenge.id] = {} challenge_zip_file = join( challenge_data_directory, "challenge_{}.zip".format(challenge.id) ) download_and_extract_zip_file( evaluation_script_url, challenge_zip_file, challenge_data_directory ) try: requirements_location = join(challenge_data_directory, "requirements.txt") if os.path.isfile(requirements_location): subprocess.check_output([sys.executable, "-m", "pip", "install", "-r", requirements_location]) else: logger.info("No custom requirements for challenge {}".format(challenge.id)) except Exception as e: logger.error(e) phase_data_base_directory = PHASE_DATA_BASE_DIR.format( challenge_id=challenge.id ) create_dir(phase_data_base_directory) for phase in phases: phase_data_directory = PHASE_DATA_DIR.format( challenge_id=challenge.id, phase_id=phase.id ) create_dir(phase_data_directory) annotation_file_url = phase.test_annotation.url annotation_file_url = return_file_url_per_environment( annotation_file_url ) annotation_file_name = os.path.basename(phase.test_annotation.name) PHASE_ANNOTATION_FILE_NAME_MAP[challenge.id][ phase.id ] = annotation_file_name annotation_file_path = PHASE_ANNOTATION_FILE_PATH.format( challenge_id=challenge.id, phase_id=phase.id, annotation_file=annotation_file_name, ) download_and_extract_file(annotation_file_url, annotation_file_path) try: importlib.invalidate_caches() challenge_module = importlib.import_module( CHALLENGE_IMPORT_STRING.format(challenge_id=challenge.id) ) EVALUATION_SCRIPTS[challenge.id] = challenge_module except Exception: logger.exception( "{} Exception raised while creating Python module for challenge_id: {}".format( WORKER_LOGS_PREFIX, challenge.id ) ) raise
Britain's Shadow Finance Minister John McDonnell speaks at the Labour Party Post-Budget Rally in West Bromwich, Britain, November 23, 2017. Reuters / Darren Staples LONDON — The Labour party has detailed proposals for a radical shake-up of the government's financial strategy which would see it move parts of the Bank of England to Birmingham and lend £250 billion to British firms over a decade through a publicly-owned RBS should it be elected. Speaking on Monday morning at the launch of a report commissioned by the party, shadow chancellor John McDonnell said the UK economy required "long-term, stable, patient investment" into sectors such as manufacturing and technology which would boost the UK's chronically low productivity levels. The report, prepared by GFC Economics, outlined proposals for a "Strategic Investment Board" which would answer to the Treasury. Under the radical plans, the Royal Bank of Scotland — currently part-owned by the taxpayer — would be taken into full public ownership distribute loans to British start-ups and other businesses. McDonnell said the Strategic Investment Board would oversee the distribution of £250 billion over a decade. The Conservative party, meanwhile, plans to sell £3 billion tranches of its RBS shares every year until it is privately-owned. The report said other countries such as the US and Japan are racing ahead in areas such as the use of industrial robots — which are widely acknowledged to boost overall productivity — because they receive considerably higher levels of investment. McDonnell also called for the Bank of England to relocate major parts of its operations to Birmingham, and said the new Strategic Investment Board would also be relocated in the Midlands city in a bid to "rebalance" the UK economy on "a basis of regional fairness." The Bank of England has been independent from poilitical control since 1997 and McDonnell insisted would remain so, despite having a role in "implementing strategic direction" and "regulatory oversight" for the RBS loans under the new plans. "The structures outlined in this report will operate effectively and the government's job is to set the overall framework from which those structures will be able to achieve their objective," he said. McDonnell said the plans demonstrate "how we could harness [other financial institutions] to do two things: provide investment and provide it in a way that tackles our productivity problems, and does so on a basis of regional fairness." He also suggested Labour would hold sessions of parliament outside London if it was elected. "I think there's an argument for ensuring that Cabinet and maybe sessions of parliament could be held elsewhere. Jeremy has been talking about holding shadow cabinet meetings around the country on a regular basis, and I think you'll see that evolve into other forms of direct devolution."
import { Character, CharacterPreset, State } from "./types"; import { HierarchicalItemInit } from "./HierarchicalItem"; import { createHierarchicalItem } from "./HierarchicalItem"; type CharacterInit = Omit<HierarchicalItemInit, "type"> & { presetStates: Record<CharacterPreset, State[]> inherentState?: State, states?: State[] | CharacterPreset, inapplicableStates?: State[], requiredStates?: State[], detail?: string, } export function createCharacter(init: CharacterInit): Character { return { ...createHierarchicalItem({ type: "character", ...init }), states: Array.isArray(init.states) ? init.states : typeof init.states === "undefined" ? [] : init.presetStates[init.states], inherentState: init.inherentState, inapplicableStates: init.inapplicableStates ?? [], requiredStates: init.requiredStates ?? [], preset: Array.isArray(init.states) ? undefined : init.states, detail: init.detail ?? "", }; }
Aerial photo of the University of Michigan campus and football stadium. The University of Michigan is again under fire for anti-Israel sentiment as a pro-BDS instructor rejected a Jewish student’s request for a letter of recommendation to study in Israel for a semester, just a few months after an associate professor refused to do the same for student Abigail Ingber. He is now undergoing disciplinary action. But the problem is bigger than Cheney-Lippold, as further evidenced by a second, nearly identical incident that affected another Jewish student. A graduate teaching instructor reneged on her promise to write 20-year-old junior Jake Secker a letter of recommendation to study abroad for a semester at Tel Aviv University. Secker is a friend of Ingber’s. He did not respond to JNS for a comment, nor did Peterson. Groups like the Anti-Defamation League condemned the move and called on the university to address the issue of students being denied letters of recommendation to study in Israel, despite the university’s policy against BDS. “The University of Michigan must take immediate steps to ensure that students are not denied an opportunity to participate in an accredited overseas program because of their professors’ political views,” said ADL CEO Jonathan Greenblatt in a statement. “The University of Michigan, and indeed all U.S. institutions of higher education, should ensure that students are able to pursue academic studies without having their studies thwarted by their professor’s political views,” he added. Zionist Organization of America president Mort Klein expressed a similar sentiment to JNS. “It is shocking and irresponsible for an academic to take this bigoted stance against Israel while ignoring the fact that Israel has offered statehood to the Palestinians,” who have rejected the offer three times in the past 20 years, he said. “All the while, these academics are ignoring the fact that the Palestinian Authority is a terrorist entity” that refuses to negotiate with Israel, added Klein. Secker met with Rosario Ceballo, associate dean for the social sciences in Michigan’s College of Literature, Science and the Arts, who agreed to write the letter in Peterson’s place, according to The Washington Post, which first reported the incident. According to the Post, Secker’s father, who is Israeli, was so infuriated that he considered withdrawing his son from the school, but reconsidered after his wife contacted the president’s office, which connected the couple to the associate dean, who “offered to write any letter Jake wanted,” he said. The latest anti-Israel outrage comes less than a week after a guest lecturer, former Black Panther leader Emory Douglas, compared Israeli Prime Minister Benjamin Netanyahu to the mastermind of the Holocaust, which resulted in the founding of the Jewish state. As part of the department-sponsored lecture, Douglas presented two slides that promoted the ideas behind BDS and violence against Israel. A student, Alexa Smith, captured the images, two years after she observed a similar experience. “Two years ago I was forced to sit through another mandatory Stamps lecture in which the speaker, Joe Sacco, made references to Israel being a terrorist state and explicitly claimed that Israeli soldiers were unworthy of being represented as actual human beings in his artwork,” continued Smith. The lecture was part of a guest-speaker series through the university’s Stamps School of Art & Design. Pro-Israel groups like StandWithUs, the AMCHA Initiative and the Simon Wiesenthal Center condemned the content of the talk. StandWithUs commended Smith for the exposure. “We are proud of Alexa for her courage. She did not give the situation a ‘pass’ and instead stood up to bigotry,” said Roz Rothstein, co-founder and CEO StandWithUs, and a daughter of Holocaust survivors, in a statement. “Comparing Netanyahu to Hitler in the course of a mandatory lecture for art students is an example of the subtle form of anti-Semitism that is injected into North American campus lectures far too often. AMCHA echoed SWU’s response. “The image comparing Netanyahu is outrageous and anti-Semitic,” the group’s director Tammi Rossman-Benjamin told JNS. The Simon Wiesenthal Center called on the university to act.
Several violent incidents broke out across the country amid what have been mostly peaceful Black Friday crowds, as millions of shoppers rushed into stores that opened their doors hours earlier than usual on the most anticipated shopping day of the year. But tensions seemed to reach a boiling point at some stores. Other reports of violence during Black Friday shopping include a shooting during an attempted robbery in the parking lot of a Walmart store in San Leandro, near Oakland. One shooting victim is in critical but stable condition after being accosted by would-be thieves. One of two suspects was detained by the victim's family and arrested. Police are searching for a second man. And in Sacramento, CBS Station KOVR reports police are investigating a stabbing outside the Macy's store at Arden Fair Mall during the early morning hours Friday. The victim suffered a non-life threatening stab wound to his midsection and was transported to a local hospital. Mall security reported the victim and his friends has gotten into a verbal fight with another group of shoppers before the stabbing. There were also reports of gunfire at Cross Creek Mall in Fayetteville, N.C. According to CBS Affiliate WRAL, shots were fired outside the mall near the food court entrance around 2 a.m. One suspect ran inside the mall, and a second followed him, firing more shots. No one was reported injured. Shoppers left the mall and some smaller stores closed in the wake of the shooting. Police say they're looking for two suspects. In Kinston, N.C., a disturbance involving Walmart shoppers prompted security to arrest a former police officer and use pepper spray to calm the crowd. Shopper Angel Bunting told CBS Affiliate WRAL the incident began when a man waiting in line for discounted cell phones fell into a display. But authorities said customers became restless and a fight broke out among them, as employees were setting up the electronics display. Gordon Jackson, 58, a former Kinston police officer, was arrested. Police said he didn't follow instructions. Jackson said there wasn't a fight, and that people were jockeying for position in line. He said a police officer over-reacted by using pepper spray. "He was raining it over the whole crowd, so it will rain down on their heads," Jackson told WNCT-TV. "Some of it got my granddaughter in her face and eyes, and she had to go the emergency room because she's asthmatic." Kinston director of public safety Bill Johnson told Reuters that the off-duty officers hired as store security guards for the event discharged pepper spray to restore order when customers tried to grab merchandise from the pallets before the sale time. "No one was pepper sprayed in the face," Johnson said. In Myrtle Beach, S.C., a 55-year-old woman was shot in the foot after two men demanded her purse shortly after 1 a.m. Friday in a parking lot across from a Wal-Mart store. Another woman told police she heard the victim scream, and fired fired several shots in the air herself; the suspects ran away with the victim's purse. The woman was taken to a local hospital. There was no word on her condition. In Milford Conn., a police officer used a taser on a Wal-Mart shopper who allegedly punched another customer. Police said 26-year-old Brian Shellnutt hit another customer as they waited in line to buy video games late Thursday night. Authorities said an 11-year-old boy was knocked to the ground by the crowd, and Shellnutt confronted the boy's father as he helped him to his feet. Police say Shellnutt punched another man who came to the aid of the father and son. He allegedly ignored an officer's warning to stop fighting before the officer used the stun gun on him. Shellnutt was charged with third-degree assault, second-degree breach of peace and risk of injury to a minor. CBS Affiliate WTVH reports several fights broke out in the electronics department of a Walmart store in Rome, N.Y. just after midnight. Several shoppers were pushed to the ground, according to Oneida County Sheriff's Deputies. Two customers were transported to Rome Memorial Hospital with minor injuries. One man was arrested for disorderly conduct. In Kissimmee, Fla., two men got into a verbal altercation at a Walmart store early Friday morning, CBS Affiliate WKMG reports. When officers arrived to separate the men, the aggressor resisted and swung at one of the officers, police said. The man was taken to the ground and arrested on charges of resisting arrest, WKMG said. Late Thursday evening, CBS Affiliate KPHO reports, police evacuated workers from a Cave Creek, Ariz., Walmart and used a robotic device to remove a suspicious package found in an employee break room. The evacuation delayed the store's opening. Later in the morning, another Phoenix television station reported witnesses saying police slammed a grandfather in a Walmart in Buckeye, Ariz., to the ground after he allegedly put a game in his waistband so that he could lift his grandson out of the crowd. The incidents were attributed to two converging Black Friday trends: Crowds are getting bigger as stores open earlier and stay open later. At the same time, cash-strapped shoppers are competing for deals on a small number of gifts that everybody wants — tablet computers, TVs and game consoles like Xbox, Nintendo 3S and Wii. The crowds are good news for retailers, many of which depend on the busy holiday shopping season for up to 40 percent of their annual revenue. At a Target on Chicago's North Side, crowds were light four hours after the store opened at midnight. And door-buster deals, including the typically quick-to-sell-out TVs and game systems, remained piled up in their boxes. Shoppers pushed carts through mostly empty aisles while thumbing through circulars, and employees in Santa hats roamed the store. There was no Christmas music — or any music — playing. "It's quiet," she said. "It was shocking." For this holiday shopping season, retailers are hoping to rake in $466 billion in sales, so the competition in getting every shopping dollar is tough -- hence why Black Friday is turning into Black Thursday. "Customers have been telling us for a long time they wanted to come in earlier," said Amy Adonis of Best Buy, told CBS News. She added: "It's a whole multichannel business. People can shop online, shop from home, shop in the store, shop online while they are in the store. It just works out great." Some Occupy Wall Street protesters, which turned up for the Macy's midnight opening, were expected to plan flash mobs and other events later in the day in places like Chicago, Washington, D.C. and Boise, Idaho to urge people to reconsider shopping at national chains on Black Friday. In San Francisco, a few dozen people gathered in Union Square to tell shoppers that they should spend their money on education rather than buying clothing and electronics. About 20 Occupy Sacramento protesters marched from a park to a small downtown mall, chanting that shoppers should support local businesses. They made a stop inside a Macy's department store, where the group's leader asked shoppers through a bullhorn not to make purchases there. In Harrisburg, Pa., Occupy Harrisburg said a member of its group has been arrested at a city mall on Black Friday over a zombie outfit. Lower Allen Township police said a young woman was arrested after refusing mall security's request to remove the facial makeup. The Capital City Mall bans outfits that obscure a person's face. The protester, Jenn Hara, said she was merely asking security for more information about the mall's regulation when she was handcuffed and charged with misdemeanor trespassing. The U.S. Small Business Administration is also promoting Small Business Saturday, which encourages people to shop at smaller, mom-and-pop stores on the day after Black Friday.
WASHINGTON -- With the cyber domain expected to see constant battles in future warfare, Army leaders say new efforts are underway to strengthen the Army's cyber force so it can defend forward against adversaries. One aspect being bolstered is electronic warfare. The Army has now placed 29-series EW Soldiers into cyber's 17-series career field as the service zeroes in on it. "We have really focused on the next phase of development and that's in our electronic warfare force," said Brig. Gen. Jennifer Buckner, director of cyber in the Army's G-3/5/7 office. The Multi-Domain Task Force, which has experimented with those capabilities in the Pacific, will continue to serve as a proving ground. This fiscal year, there are plans to stand up an EW platoon within I Corps to support the U.S. Army Pacific-led task force. "That will be kind of the first test case for our electronic warfare organizations," Buckner said Thursday during an interview at the International Cyber Conference on Cyber Conflict U.S., or CyCon U.S. "We're going to experiment with the capabilities as much as we're going to also try to validate force design that we've put on paper." In the coming years, the plan is to place an EW platoon in every brigade combat team's military intelligence company. New EW companies will also fall under expeditionary military intelligence brigades. Cyber and electromagnetic activity cells, or CEMA, will even be built up to advise commanders at the brigade, division, corps and Army Service Component Command levels. "We'll have an operational force and we'll also have the planning and staff element that would help employ them," Buckner said. An additional piece, she added, is the Cyber Warfare Support Battalion. The battalion will grow over the next five to six years and include about 600 personnel in expeditionary cyber teams. The idea behind it is "that we can tailor force packages, if you will, to downward reinforce to tactical levels," she said. Personnel numbers in the other efforts are still being worked on and will depend on the Army's end strength and growth, she added. Army leaders also hope to help fill its cyber ranks with more cadets and civilian professionals. Throughout the ROTC community, there are about 50 cadets who commission into cyber each year. At the U.S. Military Academy, many cadets have also expressed interest to commission into cyber. As of right now, though, only 26 cadets at the academy can do so. "We got a large amount of interest [but] don't quite have the demand side right yet from the Army," said Col. Andrew Hall, director of the Army Cyber Institute, which is located at West Point, New York. Cadets who branch into military intelligence or signal will benefit the cyber force, too. "That's also a huge win for us because those are our primary partners in this fight," Buckner said. Last year, the Army cyber branch began the Cyber Direct Commissioning Program in an effort to entice cyber experts in the civilian world to suit up in an Army uniform. The program received around 250 applicants and at least two of them -- former enlisted Soldiers -- were commissioned as first lieutenants in May. More applicants are expected to be commissioned next year. Those who qualify under the program have the opportunity to join the Army as first lieutenant, with the possibility of a higher rank. Up to $65,000 in student loan repayment over the course of an officer's initial three-year term is also on the table to attract desired applicants. The program is currently searching for its first applicant to be automatically promoted to colonel. "Right now, we have a system where generally an 18-year-old is the target," Hall said of Army recruiting. "But we're saying what happens if someone wakes up at 37 and decides that they want to serve?" While atypical, he noted, direct commissions were common during World War II to fill in gaps. "We want to have flexibility so that we don't limit patriotic service to 18-year-olds," he said. "We want to give the entire country an opportunity to serve."
#!/usr/bin/env python # ## Natural Language Toolkit: substitute a pattern with a replacement in every file # # Copyright (C) 2001-2012 NLTK Project # Author: <NAME> <<EMAIL>> # <NAME> <<EMAIL>> # URL: <http://www.nltk.org/> # For license information, see LICENSE.TXT # NB Should work on all platforms, http://www.python.org/doc/2.5.2/lib/os-file-dir.html import os, stat, sys def update(file, pattern, replacement, verbose=False): if verbose: print "Updating:", file # make sure we can write the file old_perm = os.stat(file)[0] if not os.access(file, os.W_OK): os.chmod(file, old_perm | stat.S_IWRITE) # write the file s = open(file, 'rb').read() t = s.replace(pattern, replacement) out = open(file, 'wb') out.write(t) out.close() # restore permissions os.chmod(file, old_perm) return s != t if __name__ == '__main__': if len(sys.argv) != 3: exit("Usage: %s <pattern> <replacement>" % sys.argv[0]) pattern = sys.argv[1] replacement = sys.argv[2] count = 0 for root, dirs, files in os.walk('.'): if '/.git' not in root: for file in files: path = os.path.join(root, file) if update(path, pattern, replacement): print "Updated:", path count += 1 print "Updated %d files" % count
Remote treatment systems are mechanical devices capable of administering one or more payloads (e.g., a liquid, a vaccine, an anesthetic, other medical treatment, a tracking device, a marker dye, a dye invisible to the naked eye, a tagging device, etc.), usually in a single dose or application to a target, such as the soft tissue of an unrestrained animal, usually by means of a ballistic projectile. A typical system for distance treatment includes a blowpipe or a gun and a dart containing a product, most often just carrying an anesthetic. However, modern delivery systems or methods suffer many shortcomings. For example, the target must be first located and then approached closely. Under most circumstances, animals or other targets must be within five to thirty yards of the shooter for the method or a projectile-based device to be effective. Many animal species are secretive and extremely difficult to locate, let alone approach closely. Also, many devices for close-range targets can be used only on large animals. Typical methods using projectiles tend to be inaccurate and the preferred target area on small animals may be very small. A misplaced shot might easily injure or kill the target. Even if placed correctly, the impact energy or penetration depth could be injurious or lethal to smaller animals. Furthermore, devices for close-range targets are often complicated to use, and training and experience are necessary for those devices capable of reaching targets beyond close-range, and most devices should not be used without some degree of formal instruction by experienced practitioners.
import { computed, reactive, SetupContext, UnwrapRef, } from '@vue/composition-api'; import { pull, remove } from 'lodash'; export interface SelectProps { value?: any; selected?: any | any[]; disabled?: boolean; predicate?: (value: any, current: any) => boolean; multiSelectable?: boolean; } type SelectState = UnwrapRef<{ isSelected: boolean; }> const getSelectState = (props: SelectProps) => { const state: SelectState = reactive({ isSelected: computed<boolean>(() => { if (Array.isArray(props.selected)) { if (props.predicate) { const predicate = props.predicate; return !!props.selected.find(d => predicate(props.value, d)); } return props.selected.includes(props.value); } if (props.predicate) { return props.predicate(props.value, props.selected); } return props.selected === props.value; }), }); return state; }; export const useMultiSelect = (props: SelectProps, context: SetupContext, state: SelectState = getSelectState(props)) => { const onClick = () => { if (props.disabled) return; let newResult: any; if (Array.isArray(props.selected)) { newResult = [...props.selected]; if (!state.isSelected) newResult.push(props.value); else if (props.predicate) { const predicate = props.predicate; remove(newResult, d => predicate(props.value, d)); } else pull(newResult, props.value); } else if (typeof props.selected === 'boolean') { newResult = !props.selected; } else { newResult = state.isSelected ? undefined : props.value; } context.emit('change', newResult, !state.isSelected); }; return { state, onClick, }; }; export const useSingleSelect = (props: SelectProps, context: SetupContext, state: SelectState = getSelectState(props)) => { const onClick = () => { if (props.disabled) return; if (state.isSelected) return; let newResult: any; if (Array.isArray(props.selected)) { newResult = [props.value]; } else if (typeof props.selected === 'boolean') { newResult = !props.selected; } else { newResult = props.value; } context.emit('change', newResult, true); }; return { state, onClick, }; }; export const useSelect = (props: SelectProps, context: SetupContext) => { const state = getSelectState(props); const { onClick: onSingleClick } = useSingleSelect(props, context, state); const { onClick: onMultiClick } = useMultiSelect(props, context, state); const onClick = () => { if (props.multiSelectable) onMultiClick(); else onSingleClick(); }; return { state, onClick, }; };
Diagnostic and Prognostic Value of Synovial Biopsy in Adult Undifferentiated Peripheral Inflammatory Arthritis: A Systematic Review Objective. Our aim was to systematically review the literature on the diagnostic and prognostic value of synovial biopsy in undifferentiated peripheral inflammatory arthritis (UPIA) as an evidence base for generating clinical practice recommendations. The results lead to multinational recommendations in the 3e Initiative in Rheumatology. Methods. We performed a systematic literature review according to the PICO strategy (Patients, Intervention, Comparator, and Outcome). Using a designed search strategy we ran literature searches using Medline, Embase, the Cochrane Library, and abstracts presented at the 2007 and 2008 meetings of the American College of Rheumatology and European League Against Rheumatism. Articles fulfilling predefined inclusion criteria were reviewed, and quality appraisal was performed. Results. Six publications from a total of 3265 diagnostic and 3271 prognostic studies were included, of which 2 were review articles. Data pooling was impossible because of significant clinical and statistical heterogeneity. Three themes of outcome were identified: anti-citrullinated peptide antibody (ACPA) staining in synovium, immunohistochemistry (CD22, CD38, CD68), and vascular patterns. Prognostic and diagnostic value was poor for these themes, although diagnostic trends favoring a particular diagnosis were identified. In contrast to serological ACPA testing, ACPA staining was shown not to be specific for diagnosis of rheumatoid arthritis (RA). Synovial CD22 and CD38 positivity seem to differentiate between RA and non-RA, while synovial CD38 and CD68 positivity can differentiate among RA, spondyloarthritis (SpA), and other diagnoses. Vascular patterns in undifferentiated arthritis are insufficiently specific to differentiate between SpA and RA. Conclusion. There is sparse evidence that synovial biopsy has diagnostic or prognostic value in patients with UPIA in clinical care. We urgently need systematic studies investigating the diagnostic and prognostic potential of synovial markers. A clear, broadly accepted, and unequivocal definition of undifferentiated arthritis is required as a starting point.
Richard Branson has gone back to his roots by publishing an iPad-only magazine entitled Project. The Virgin boss started his illustrious career at the age of 16 when, despite being horribly dyslexic, he set up a school magazine. The beardy billionaire cut his teeth in the music industry by buying job lots of cheap vinyl recordings in France and flogging them at discount prices via mail order in the UK severely undercutting the likes of WH Smiths. Using the cash he generated from this venture and his first retail store in London's Oxford Street, he brought a crumbling pile of a house in Oxfordshire and equipped it with a recording studio. It was here that Virgin Records recorded Mike Oldfield's Tubular Bells which went on to sell as many as 17 million copies worldwide and set Branson on the path to business super-stardom. Now it seems that the notorious self publicist's world has come full circle with the worldwide launch of Project, an iPad lifestyle magazine created by Virgin Digital Publishing. What makes Project unique is that, unlike its iPad-centric contemporaries like FHM, Esquire and T3, it has no traditional print version. Every other commercial magazine on the iTunes Store has a made-from-trees equivalent. Whilst many other iPad publications feel like an afterthought - a cobbled-together collection of post-production PDFs in some cases - Project makes the most all of iOS4's bells and whistles in an attempt to create a truly interactive experience. One early reviewer has compared the magazine's animated pages to the newspapers and posters featured in the Harry Potter movies, another enthusing, "I was greeted by an animated introduction that for once is pertinent to the content." The first issue, which is available now on iTunes, costs £1.79. According to Virgin, that price covers a full month of 'daily updated content' though it remains to be seen what that content will be. The current issue contains an interview with Hollywood renaissance man Jeff Bridges complete with audio and video clips, and more than a few plugs for the remix of eighties kids classic Tron currently doing the rounds. Backing up The Dude's ramblings are a look at Jaguar's 205mph hypercar, a 3D tour of Tokyo and... a moronic canoeist. We'll be taking a closer look at the content of the first issue in another article, but for now I can't help but wonder what impact this first iPad only magazine and subsequent offerings from other publishers will have on the existing magazine industry. Traditional publishers have been quaking at the prospect of the Internet onslaught for years now, but many seem to have cleverly ridden the digital wave. Those who have embraced the on-line world appear, on the whole, to have fared better than those who stuck rigidly to their paper and ink guns, finding that rather than diluting their own sales, having an Internet presence has acted as an effective marketing tool. For many, buying a magazine is an impulse purchase, and being familiar with a publication's content through reading Internet equivalents is a powerful factor when it comes to choice. While it's true that many venerable publications have fallen victim to the Internet phenomenon, an equal number have seen physical sales bolstered by a strong on-line presence. But until now the sheer portability of a printed magazine has been its strongest selling point. Grabbing a copy of Snail Fancier Monthly at the airport or train station at the start of a long and tedious journey is very convenient. You might even leave it on the plane or train when you're done with it for someone else to enjoy. Doing this with an iPad is not recommended. I can't help thinking the days of the printed magazine might be numbered. It could take five years, or even ten, but I can see a time when the tablet PC in its manifold flavours is as ubiquitous as the mobile phone. It's only a matter of time before the majority of airlines start offering proddable wireless slates to passengers as an alternative to difficult-to-repair seat-back entertainment systems. Anyone who has suffered a 13-hour flight in the only seat on the aircraft with a broken screen will agree. Several trials have already taken place. Allowing people to access existing newspaper or magazine subscriptions, or letting them pay a pound or so for the latest issue, will soon be as simple as buying a cup of coffee. Biometric payment methods will smooth the process with a quick thumbprint or retinal scan enough to get the cash out of your bank and into the publisher's. Having previously worked in the printed magazine industry for more than two decades, I will be truly sad to see its inevitable demise. I love the physical heft and flexibility and even the smell of a well-crafted magazine. Seeing an issue I had grafted over sitting on newsagent's shelf still gave me a tangible sense of pride right up until the day I upped sticks and moved over to the dark side of all things Interwebby. But all good things must come to an end. There will always be a niche market for high-quality, high-price magazines reproduced on gravure presses. The kind of magazines which nestle on the coffee tables of people with £100 haircuts for a year or more. But I'm afraid that Mr Branson's foray into the digital publishing market might just signal the death knell for magazine publishing as we know it.
package com.wavesfx.wavesfx; import com.wavesfx.wavesfx.bus.RxBus; import com.wavesfx.wavesfx.config.ConfigLoader; import com.wavesfx.wavesfx.config.ConfigService; import com.wavesfx.wavesfx.gui.FXMLView; import com.wavesfx.wavesfx.gui.login.LoginController; import com.wavesfx.wavesfx.utils.OperatingSystem; import javafx.application.Application; import javafx.fxml.FXMLLoader; import javafx.scene.Parent; import javafx.scene.Scene; import javafx.scene.image.Image; import javafx.stage.Stage; import org.apache.logging.log4j.LogManager; import org.apache.logging.log4j.Logger; import java.awt.*; import java.io.IOException; import java.util.Locale; import java.util.ResourceBundle; import static com.wavesfx.wavesfx.utils.ApplicationSettings.RESOURCE_BUNDLE_FILEPATH; import static com.wavesfx.wavesfx.utils.ApplicationSettings.getAppPath; public class WavesFX extends Application { private static final Logger log = LogManager.getLogger(); @Override public void start(Stage stage) throws IOException { System.setProperty("javafx.sg.warn", "false"); final var appPath = getAppPath(OperatingSystem.getCurrentOS()); log.info("Loading configuration file."); final var configLoader = new ConfigLoader(appPath); final var configService = ConfigService.build(configLoader.getConfigFile()); final var locale = configService.getLanguage().isPresent() ? new Locale(configService.getLanguage().get()) : new Locale("en"); final var messages = ResourceBundle.getBundle(RESOURCE_BUNDLE_FILEPATH, locale); final var rxBus = new RxBus(); rxBus.getConfigService().onNext(configService); rxBus.getResourceBundle().onNext(messages); FXMLLoader loader = new FXMLLoader(getClass().getResource(FXMLView.LOGIN.toString()), messages); final var loginController = new LoginController(rxBus); loader.setController(loginController); Parent root = loader.load(); Scene scene = new Scene(root); stage.getIcons().add(new Image(getClass().getResourceAsStream("/img/wavesfx_icon.png"))); scene.getStylesheets().add(getClass().getResource("/mainView/mainView.css").toExternalForm()); stage.setTitle("WavesFX Wallet"); stage.setMinWidth(1100); stage.setMinHeight(700); stage.setScene(scene); stage.show(); final var splashScreen = SplashScreen.getSplashScreen(); if (splashScreen!=null) splashScreen.close(); // if (!configService.tosIsAgreed()){ // final var fxmlLoader = new FXMLLoader(getClass().getResource(FxmlView.TOS.toString()), messages); // fxmlLoader.setController(new TosController(rxBus)); // final var parent = (Parent) fxmlLoader.load(); // new DialogWindow(rxBus, stage, parent, DialogWindow.Type.TOS).show(); // } } public static void main(String[] args) { launch(args); } }
import {Logger} from "./logger"; import {Server,Request,Response,createServer, plugins} from "restify"; import * as Q from "q"; import * as bodyParser from "body-parser"; export interface RestMessage { methodName : string; message : any; } export interface RestResponse{ status: number; data: any }; interface RestOptions { subject : string; port: number; } export class RESTCommunicationListener { /*********** Data Members ****/ private _logger: Logger; private _options : RestOptions; private _server: Server; constructor(port: number, subject?: string) { const funcName = "c'tor"; this._logger = new Logger("RESTCommunicationListener"); // verify valid server address port = port || 0; if (port <= 0 || port >= 65535) { throw new Error("Port should be in range of 1-65535"); } this._options = { port: port, subject: subject || "/" }; this._options.subject = this._options.subject.replace(new RegExp("/$"),""); this._options.subject = this._options.subject + "/:methodName"; this._logger.info(funcName,": Initilized with the following settings",this._options); } /*********** Events ****/ public onRequest: (msg: RestMessage,req: Request) => Q.Promise<any>; public start(): Q.Promise<void> { var funcName = "start"; this._logger.info(funcName, ":Started with the following options=", this._options); if (this._server) { this._logger.warn(funcName, ": The server was already initialized, ignoring the current request"); return Q.reject(new Error("Server was already initilzied call disconnect")); } let waitForStartDefered: Q.Deferred<void> = Q.defer(); this._server = createServer(); this._server.listen(this._options.port, () => { const funcName = "_onListening"; this._logger.info(" Started for port=",this._options.port) waitForStartDefered.resolve(); }); // adds the body parser middleware this._server.use(plugins.bodyParser()); // Listens on the subject URL. this._server.get(this._options.subject,(req,res,next) => this._onRequest(req,res,next)); this._server.post(this._options.subject,(req,res,next) => this._onRequest(req,res,next)); return waitForStartDefered.promise; } public disconnect() { this._logger.info("disconnect: Called"); this._server.close(); delete this._server; } private _onRequest(request:Request,response:Response,next: () => any): any{ const funcName = "_onRequest"; this._logger.trace(funcName," Started for " , request.href() , " and with body ",request.body); //Goingt to notify the new message event this._logger.trace(funcName,": Got request from ", request.href(), " with body:",request.body); //currently we treat all the messages as requests that needs to be with response. if(!this.onRequest){ this._logger.warn(funcName,": Do not have any message handler"); return next(); } let message : RestMessage = { message: request.body, methodName: request.params.methodName } this.onRequest(message,request) .then((resMsg) => { this._logger.trace(funcName,": Going to return ", resMsg); response.json(resMsg.status,resMsg.data); }); return next(); } }
From elimination to suppression: genomic epidemiology of a large Delta SARS-CoV-2 outbreak in Aotearoa New Zealand New Zealand's COVID-19 elimination strategy heavily relied on the use of genomics to inform contact tracing, linking cases to the border and to clusters during community outbreaks. In August 2021, New Zealand entered its second nationwide lockdown after the detection of a single community case with no immediately apparent epidemiological link to the border. This incursion resulted in the largest outbreak seen in New Zealand caused by the Delta Variant of Concern. Here we generated 3806 high quality SARS-CoV-2 genomes from cases reported in New Zealand between 17 August and 1 December 2021, representing 43% of reported cases. We detected wide geographical spread coupled with undetected community transmission, characterised by the apparent extinction and reappearance of genomically linked clusters. We also identified the emergence, and near replacement, of genomes possessing a 10-nucleotide frameshift deletion that caused the likely truncation of accessory protein ORF7a. By early October, New Zealand moved from elimination to suppression and the role of genomics changed markedly from being used to track and trace, towards population-level surveillance.
Beck has revealed a new single 'Saw Lightning', co-written and produced with Pharrell Williams. Starting with Beck’s unmistakable raw acoustic slide guitar, ‘Saw Lightning’ melds his harmonica and vocals with drums and keys (and a verse) from Pharrell. The cross-genre cut is the first track to be released from Beck's forthcoming ‘Hyperspace’ LP, to be released via Capitol Records at an as-yet undetermined point in the space-time continuum. 'Saw Lightning' will also soundtrack the new Beats by Dr. Dre film, directed by Grammy-winning filmmaker Hiro Murai and ft. Anthony Joshua and Eden Hazard. ‘Hyperspace’ will be Beck’s 14th album, following 2017’s ‘Colors’, which won Best Alternative Music Album and Best Engineered Album, Non-Classical at the GRAMMY Awards earlier this year.
/** * Definition for a binary tree node. * struct TreeNode { * int val; * TreeNode *left; * TreeNode *right; * TreeNode(int x) : val(x), left(NULL), right(NULL) {} * }; */ class Solution { public: TreeNode* sortedArrayToBST(vector<int>& nums) { return sortedArrayToBST(nums, 0, nums.size()-1); } TreeNode* sortedArrayToBST(vector<int>& nums, int left, int right) { if(left > right) return NULL; int mid = (left + right) / 2; TreeNode* cur = new TreeNode(nums[mid]); cur -> left = sortedArrayToBST(nums, left, mid - 1); cur -> right = sortedArrayToBST(nums, mid + 1, right); return cur; } };
Judith Kaplan Eisenstein Life The bat mitzvah was created to address Judaism's gender imbalance and is the female equivalent of a boy’s bar mitzvah, signifying entrance into religious majority. Judith, the oldest daughter of Rabbi Mordecai Kaplan (who was the founder of the Reconstructionist branch of Judaism), was the first person to celebrate a Bat Mitzvah publicly in America, which she did on March 18, 1922, aged 12, at her father’s synagogue the Society for the Advancement of Judaism in New York City. Judith Kaplan recited the preliminary blessing, read a portion of that week's Torah portion in Hebrew and English, and then intoned the closing blessing. Her bat mitzvah was the first time that a woman led the congregation; as such it represents a significant shift for Judaism in America. Until this time women did not engage in public reading of the Torah and a Jewish girl's transition from child to adult was not reflected in synagogue ceremonies. Reflecting on the ceremony many years later she said: "No thunder sounded. No lightning struck." "It all passed very peacefully". Bat mitzvah ceremonies are now commonplace within the Conservative, Reform and Reconstructionist branches of Judaism. At the age of 82, Kaplan had a second bat mitzvah. Various feminist and Jewish leaders, including Betty Friedan, Letty Cottin Pogrebin, Ruth W. Messinger, and Elizabeth Holtzman were present. During her life she was an author, theologian, musicologist and composer. She earned bachelor's and master's degrees from Columbia University and studied at the Institute of Musical Art, now the Juilliard School. She published a book of children's music, "Gateway to Jewish Song," and a number of cantatas on Jewish themes, including the popular "What Is Torah," with her husband, Rabbi Ira Eisenstein whom she married in 1934. Her translations of Hebrew songs are now enjoyed by Jewish children throughout the US. She taught music education and the history of Jewish music at the Albert A. List College of Jewish Studies from 1929 to 1954. She taught at School of Sacred Music of Hebrew Union College-Jewish Institute of Religion in New York from 1966 to 1979. She died on February 14, 1996, in Silver Spring, Maryland. Her papers are included in the Ira and Judith Kaplan Eisenstein Reconstructionist Archives of the Reconstructionist Rabbinical College.
Modal Analysis of Bridges for the SHM Purposes The paper presents problems of modal testing of large civil engineering objects like bridges or viaducts. Authors placed here the practical information, which need to be taken into account while planning and performing this type of measurements. Descriptions of 3 modal experiments with their results are shown. All measurements and analysis were performed for the structural health monitoring and damage assessment purposes. Particularly interesting is the third case, where authors tried to assess a damage level in the road viaduct without undamaged structure model.
//! Uses `builder` and filesystem watch code to repeatedly //! evaluate and build a given Nix file. use crate::builder; use crate::notify; use crate::pathreduction::reduce_paths; use crate::roots; use crate::roots::Roots; use crate::watch::Watch; use std::collections::HashMap; use std::path::PathBuf; use std::sync::mpsc::Sender; /// Builder events sent back over `BuildLoop.tx`. #[derive(Clone, Debug)] pub enum Event { /// The build has started Started, /// The build completed successfully Completed(BuildResults), /// The build command returned a failing exit status Failure(BuildExitFailure), } /// Results of a single, successful build. #[derive(Clone, Debug)] pub struct BuildResults { /// See `build::Info.drvs` drvs: HashMap<usize, PathBuf>, /// See `build::Info.drvs` pub named_drvs: HashMap<String, PathBuf>, } /// Results of a single, failing build. #[derive(Debug, Clone)] pub struct BuildExitFailure { /// stderr log output pub log_lines: Vec<String>, } /// The BuildLoop repeatedly builds the Nix expression in /// `nix_root_path` each time a source file influencing /// a previous build changes. /// Additionally, we create GC roots for the build results. pub struct BuildLoop { /// A nix source file which can be built nix_root_path: PathBuf, roots: Roots, /// Watches all input files for changes. /// As new input files are discovered, they are added to the watchlist. watch: Watch, } impl BuildLoop { /// Instatiate a new BuildLoop. Uses an internal filesystem /// watching implementation. pub fn new(nix_root_path: PathBuf, roots: Roots) -> BuildLoop { BuildLoop { nix_root_path, roots, watch: Watch::init().expect("Failed to initialize watch"), } } /// Loop forever, watching the filesystem for changes. Blocks. /// Sends `Event`s over `Self.tx` once they happen. /// When new filesystem changes are detected while a build is /// still running, it is finished first before starting a new build. pub fn forever(&mut self, tx: Sender<Event>) { loop { // TODO: Make err use Display instead of Debug. // Otherwise user errors (especially for IO errors) // are pretty hard to debug. Might need to review // whether we can handle some errors earlier than here. tx.send(Event::Started) .expect("Failed to notify a started evaluation"); match self.once() { Ok(result) => { tx.send(Event::Completed(result)) .expect("Failed to notify the results of a completed evaluation"); } Err(BuildError::Recoverable(failure)) => { tx.send(Event::Failure(failure)) .expect("Failed to notify the results of a failed evaluation"); } otherwise => { otherwise.unwrap(); } } self.watch.wait_for_change().expect("Waiter exited"); } } /// Execute a single build of the environment. /// /// This will create GC roots and expand the file watch list for /// the evaluation. pub fn once(&mut self) -> Result<BuildResults, BuildError> { let build = builder::run(&self.nix_root_path)?; let paths = build.paths; debug!("original paths: {:?}", paths.len()); let paths = reduce_paths(&paths); debug!(" -> reduced to: {:?}", paths.len()); debug!("named drvs: {:#?}", build.named_drvs); let mut event = BuildResults { drvs: HashMap::new(), named_drvs: HashMap::new(), }; for (name, drv) in build.named_drvs.iter() { event.named_drvs.insert( name.clone(), self.roots.add(&format!("attr-{}", name), &drv)?, ); } for (i, drv) in build.drvs.iter().enumerate() { event .drvs .insert(i, self.roots.add(&format!("build-{}", i), &drv)?); } // add all new (reduced) nix sources to the input source watchlist self.watch.extend(&paths.into_iter().collect::<Vec<_>>())?; if build.exec_result.success() { Ok(event) } else { Err(BuildError::Recoverable(BuildExitFailure { log_lines: build.log_lines, })) } } } /// Error classes returnable from a build. /// /// Callers should probably exit on Unrecoverable errors, but retry /// with Recoverable errors. #[derive(Debug)] pub enum BuildError { /// Recoverable errors are caused by failures to evaluate or build /// the Nix expression itself. Recoverable(BuildExitFailure), /// Unrecoverable errors are anything else: a broken Nix, /// permission problems, etc. Unrecoverable(UnrecoverableErrors), } /// Unrecoverable errors due to internal failures of the plumbing. /// For example `exec` failing, permissions problems, kernel faults, /// etc. /// /// See the corresponding Error struct documentation for further /// information. #[derive(Debug)] #[allow(missing_docs)] pub enum UnrecoverableErrors { Build(builder::Error), AddRoot(roots::AddRootError), Notify(notify::Error), } impl From<builder::Error> for BuildError { fn from(e: builder::Error) -> BuildError { BuildError::Unrecoverable(UnrecoverableErrors::Build(e)) } } impl From<roots::AddRootError> for BuildError { fn from(e: roots::AddRootError) -> BuildError { BuildError::Unrecoverable(UnrecoverableErrors::AddRoot(e)) } } impl From<notify::Error> for BuildError { fn from(e: notify::Error) -> BuildError { BuildError::Unrecoverable(UnrecoverableErrors::Notify(e)) } }
<filename>trabalho5/parte1/lista4/lista4.08/string_copy.h char *string_copy (char *a, char *b);
1. Field of the Invention This invention relates generally to mode setting circuits for memory devices, and more particularly to a mode setting circuit having reduced power consumption. 2. Description of the Related Art In integrated circuits such as memory devices, a variety of circuit components for performing different operations are fabricated in the integrated circuit. This provides flexibility for selecting an optimal operation mode. After a memory chip is manufactured, it is tested to determine what functions are available in the chip, what operating characteristics the chip has, as well as various defects. This information is used to determine what operating modes can be utilized with the chip. Mode setting circuits on the chip are then used to optimize the chip by activating operational circuits, deactivating defective circuits and in other ways configuring and fixing the available circuit components so as to optimize the chip. Such mode setting circuits help reduce the design period and thereby reduce the cost of integrated circuits. Two well known techniques for fixing the specific operation modes of a chip are the use of laser cut fuses and electrically cut fuses. With either laser or electrical fuses, the mode setting operation is carried out by either blowing a fuse or maintaining it intact. FIGS. 1 and 2 illustrate the construction and operation of a mode setting circuit for a control block for EDO (extended data-out) in a semiconductor memory device. The EDO control block of FIG. 1 generates an output signal that enables or disables the EDO mode in accordance with the state of the fuse in the mode setting circuit. FIGS. 3 and 4 illustrate the construction and operation of a prior art mode setting circuit, respectively, using a laser fuse. Referring to FIG. 3, a laser fuse 11 is connected between a power supply Vdd and a node N11. A p-type depletion mode MOS transistor 12 has a channel connected between node N11 and a power supply ground terminal GND. The gate of transistor 12 is connected to GND, and the transistor is in a normally conductive state. A capacitor 13 is connected between node N11 and GND. An n-type MOS transistor 15 has a channel connected between node N11 and GND. The gate of transistor 15 is connected to the output terminal of an inverter 14 which has an input terminal connected to node N11. A NOR gate 16 has a first input terminal connected to the output terminal of the inverter 14 and a second input terminal coupled to receive an input signal .PHI.A. The output terminal of NOR gate is connected to the input terminal of an inverter 17 which has an output terminal that generates an output signal OUTA. When laser fuse 11 is blown, depletion mode transistor 12 connects node N11 to GND and transistor 15 holds node N 11 at ground. The output signal OUTA is generated in response to the input signal .PHI.A and the state of the fuse. If laser fuse 11 is intact, node 11 remains high because it is connected to Vdd through fuse 11 which also charges capacitor 13. Thus, the input signal .PHI.A determines the logic level of the output signal OUTA. When the fuse is intact, the output signal OUTA is low when .PHI.A is low, and OUTA is high when .PHI.A is high as shown in FIG. 4. If fuse 11 is blown by laser cutting, node N11 is held at GND so as to maintain the output of NOR gate 16 at a low level regardless of the state of the input signal .PHI.A. That is, output signal OUTA is always high as shown in FIG. 4 when the fuse is cut. However, since depletion mode transistor 12 is normally turned on, DC current flows from node N11 to ground resulting in excessive current consumption. The amount of current dissipated in a memory device having N mode setting circuits is N.times.IO, where IO is the amount of current flowing from node N11 to ground in the circuit of FIG. 3. Although the channel length of resistor 12 could be increased in order to reduce current consumption, this increases the layout size required for the mode setting circuit. Accordingly, a need remains for a technique for reducing the power consumption of a mode setting circuit without increasing the layout size required for the circuit.
<gh_stars>1-10 package io.bitrise.trace.plugin.task; import androidx.annotation.NonNull; import org.gradle.api.DefaultTask; import org.gradle.api.Project; import org.gradle.api.logging.Logger; /** * Base abstract class for the tasks of the Trace plugin. */ public abstract class BaseTraceTask extends DefaultTask { /** * The {@link Project} which can use this task. */ @NonNull protected Project project = getProject(); /** * The {@link Logger} for logging. */ @NonNull protected Logger logger = project.getLogger(); }
<gh_stars>0 import { Body, Controller, Get, Delete, Post, Request } from '@nestjs/common'; import { AllowAnonymous } from 'src/panel/decorators/public.decorator'; import { AddOrDeletePaymentMethodDto } from 'src/panel/dtos/AddOrDeletePaymentMethodDto'; import { DxGridDeleteRequest } from 'src/panel/dtos/DxGridDeleteRequest'; import { UIResponseBase } from 'src/panel/dtos/UIResponseBase'; import { GetirService } from './getir.service'; @Controller('api/Getir') export class GetirController { constructor(public getirService: GetirService) { } // @Post('AddOrDeletePaymentMethod') // async AddOrDeletePaymentMethod(@Body() body: AddOrDeletePaymentMethodDto, @Request() request): Promise<UIResponseBase<string>> { // const { MerchantId } = request.user; // return (await this.getirService.AddOrDeletePaymentMethod(MerchantId, body)) // } @Post('AddPaymentMethod') async AddPaymentMethod(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.AddPaymentMethod(MerchantId, body.values); return result; } @Post('ActivateDeactivateRestaurantPaymentMethods') async ActivateDeactivateRestaurantPaymentMethods(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateDeactivateRestaurantPaymentMethods(MerchantId, body); return result; } @Post('ActivateDeactivateProductStatus') async ActivateDeactivateProductStatus(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateDeactivateProductStatus(MerchantId, body); return result; } // @Post('ActivateDeactivateCategoryStatus') // async ActivateDeactivateCategoryStatus(@Request() request, @Body() body): Promise<UIResponseBase<any>> { // const { MerchantId } = request.user; // let result = await this.getirService.ActivateDeactivateCategoryStatus(MerchantId, body); // return result; // } @Get('GetRestaurantPaymentMethods') async GetRestaurantPaymentMethods(@Request() request): Promise<UIResponseBase<string>> { const { MerchantId } = request.user; return (await this.getirService.GetRestaurantPaymentMethods(MerchantId)) } @Delete('DeleteRestaurantPaymentMethods') async DeleteRestaurantPaymentMethods(@Request() request, @Body() deleteRequest: DxGridDeleteRequest): Promise<UIResponseBase<string>> { const { MerchantId } = request.user; return (await this.getirService.DeleteRestaurantPaymentMethods(MerchantId, deleteRequest.key)) } @Get('GetAllPaymentMethods') async GetAllPaymentMethods(@Request() request): Promise<UIResponseBase<string>> { const { MerchantId } = request.user; return (await this.getirService.GetAllPaymentMethods(MerchantId)) } @Get('CheckAndGetAccessToken') async CheckAndGetAccessToken(@Request() request): Promise<UIResponseBase<string>> { const { MerchantId } = request.user; return (await this.getirService.CheckAndGetAccessToken(MerchantId)) } @Get('GetOptionProdcuts') async GetOptionProdcuts(@Request() request): Promise<UIResponseBase<string>> { const { MerchantId } = request.user; return (await this.getirService.GetOptionProdcuts(MerchantId)) } @Post('ActivateDeactivateOptionProduct') async ActivateDeactivateOptionProduct(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateDeactivateOptionProduct(MerchantId, body); return result; } @Post('UpdateRestaurantAndCourierInfo') async UpdateRestaurantAndCourierInfo(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; return (await this.getirService.UpdateRestaurantAndCourierInfo(MerchantId, body)) } @Post('ActivateDeactivateAltOptions') async ActivateDeactivateAltOptions(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateDeactivateAltOptions(MerchantId, body); return result; } @Post('ActivateInActiveOptions') async ActivateInActiveOptions(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateInActiveOptions(MerchantId, body); return result; } @Post('ActivateInActiveProductsAsOptions') async ActivateInActiveProductsAsOptions(@Request() request, @Body() body): Promise<UIResponseBase<any>> { const { MerchantId } = request.user; let result = await this.getirService.ActivateInActiveProductsAsOptions(MerchantId, body); return result; } }
<reponame>Hello1024/lrndis<filename>project/time.h /* * The MIT License (MIT) * * Copyright (c) 2015 by <NAME> <<EMAIL>> * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ /* * version: 1.0 demo (7.02.2015) */ #ifndef SYSTEMTIME #define SYSTEMTIME #include <stdbool.h> #include <stdint.h> #include <stddef.h> #include "stm32f4xx.h" #ifdef __cplusplus extern "C" { #endif /* general functions */ void time_init(void); /* time module initialization */ int64_t utime(void); /* monotonic time with 1 us precision */ int64_t mtime(void); /* monotonic time with 1 ms precision */ void usleep(int us); /* sleep to n us */ #define msleep(ms) usleep((ms) * 1000) /* sleep to n ms */ /* softeare timer types */ typedef struct stmr stmr_t; typedef void (*stmr_cb_t)(stmr_t *tmr); #define STMR_ACTIVE 1 struct stmr { uint32_t period; /* timer period, us. */ uint32_t event; /* the last event, us */ uint32_t flags; /* STMR_XXX */ void *data; /* user data */ stmr_cb_t proc; /* timer proc */ stmr_t *next; /* don't touch it */ }; /* softeare timer functions */ void stmr(void); /* call it periodically */ void stmr_init(stmr_t *tmr); /* init timer and adds to list */ void stmr_add(stmr_t *tmr); /* adds timer to a timers list */ void stmr_free(stmr_t *tmr); /* remove timer from the list */ void stmr_stop(stmr_t *tmr); /* deactivate timer */ void stmr_run(stmr_t *tmr); /* activate timer */ #define TIMER_PROC(name, period, active, data) \ void name##_proc(stmr_t *tmr); \ static stmr_t name = \ { \ period, 0, active, data, \ name##_proc, NULL \ }; \ void name##_proc(stmr_t *tmr) #ifdef __cplusplus } #endif #endif
// LoadContainerState loads the container state from the specified filename. If the filename is empty or '-' the state is loaded from STDIN func LoadContainerState(filename string) (*State, error) { if filename == "" || filename == "-" { return ReadContainerState(os.Stdin) } inputFile, err := os.Open(filename) if err != nil { return nil, fmt.Errorf("failed to open file: %v", err) } defer inputFile.Close() return ReadContainerState(inputFile) }
Review of Core Power Loss Analysis Using Finite Element Methods There are two principal methods are utilized to estimate the core power loss (CPL) in magnetic components: Empirical equations and hysteresis models. Both approaches need an anterior test or analysis to calculate the CPL. Most of them are based on improved Steinmetz equations. Tests are usually costly or the number of necessary tests is excessive for the component design development. 2D analyses using Finite Element are not good enough for several magnetic components for their lack of symmetries. Non-symmetric magnetic cores are ones of the most common components in transformers and power converters and they dont have symmetries on the magnetic field distribution and only 3D models are competent to take account all the effects and phenomena. Introduction Losses in magnetic cores have been analyzed because of their particular importance to the component design in power electronics. Physicists study the features in magnetic materials, while design engineers in power electronics need to model the CPL. Nevertheless, there is a break between the power loss calculation theories, focused in material characteristics, and engineering applications. In consequence the devices designed cannot fully use the material capabilities. One group of models are based on the Steinmetz equation where the coefficients are determined by fitting the loss model to the measurement experimental data. This model postulates purely sinusoidal flux densities. An increase of was presented by Jordan in where an iron loss model where the static hysteresis loss (HL) and dynamic eddy current loss (ECL) were divided. Pry and Bean added the excess loss factor or anomalous factor. Bertotti developed a theory developing the losses by introducing the concept of magnetic objects, which led to excess loss in terms of the active magnetic objects and the domain wall motion. Once the separation of the iron losses after the magnetizing processes was added, the losses caused by linear magnetization, rotational magnetization and higher harmonics were involved. In the last times, the Steinmetz equation was im-proving. The Modified Steinmetz equation was presented in for arbitrary waveforms and the Generalized Steinmetz equation that presented the idea of the instantaneous iron loss is a single valued function of the flux density and the rate of change of the flux density. The improved Generalized Steinmetz equation was developed to avoid the limitation in the third higher harmonic. For rectangular shapes voltages, the improved-improved generalized equation was published in. To obtain a higher accuracy, hysteresis models (Preisach and Jiles-Atherton) were developed. An improvement of the Preisach model was presented in including a dynamic part divided in two sections describing the low and high values of the flux density. A friction hysteresis model based on energy approach where the magnetic dissipation from the macroscopic point of view is represented by a friction-like force was introduced in. Advances for nonlinear behaviour were presented in. A new model which describes the switching behaviour implemented in Matlab is in. Analysis for non-sinusoidal signals for specific components used currently in power electronics has been studied in the last years. The empirical and separation loss models are preferable and best suited for fast and rough iron loss definition. The complex hysteresis loss models are more adequate for an exact iron loss. They need much more knowledge about the material data or prior material measurements as well as more information about the flux density waveforms. Another huge issue is the integration into Finite Element tools. Physics Analysis The core power losses are based on Joule heating and due to spin relaxation, although this last impact is only at frequencies in the medium-high frequencies. Hysteresis and eddy current losses are caused by the same physical phenomena: Every change in magnetization (which also occurs at DC magnetization) is a movement of domain walls and produces eddy currents creating Joule heating. The fact that hysteresis losses also arise at almost zero frequency is due to the macroscopic magnetization change, even it is slowly, the local magnetization the domains modifies quickly, which generates eddy current losses. In consequence, the engineering approach of loss separation into different loss types (the so-called hysteresis losses, eddy current losses and excess losses) is an empirical approach, trying to separate the different physical influences due to frequency and flux density variations in electromagnetic systems, rather than explaining the physical phenomena directly. Engineering Analysis The referenced break is produced because engineers usually design devices based on models with different coefficients than physicists use on their models. However, these models are normally appropriate only for a defined frequency range, and practical disadvantages of most of these methods require additional measurements with a given material. Another additional issue is that these methods are only for static situations. Other limitations are: 1) The models are based on eddy loss induced by domain wall motion; it doesn't match with empirical data for ferrites (Steinmetz equation coefficients). 2) It needs material and magnetic field data. Thus, it requires a simulation or essay to estimate the magnetic field into the core. Core Power Loss Analysis using FEM Most of the FEM uses the Steinmetz equation with the defined parameters from the software or coefficient adjustments from the manufactures sheets on the program settings. Also, there is another method to calculate the core power loss using FEM defined in for the hysteresis and eddy current losses. Hysteresis loss is flowing in the forward and reverse directions magnetizes and demagnetizes the core alternatively during each AC cycle. This energy loss is dependent of the properties of particular core material and proportional to the hysteresis loop area. Where B  is the magnetic flux density, H    is the complex conjugate of the magnetic field and ꙍ is the angular frequency. Eddy current loss is an electric current step up by an alternating magnetic field. These losses arise from the fact that the core itself is composed of conducting material, so that the voltage induced in it by the varying flux produces circulating currents in the material. Eddy current loss depends upon the rate of change of flux as well as the resistance of the path, it is reasonable to expect this loss varies as the square of both the maximum flux density and frequency if the core is solid and made up from ferromagnetic materials, and it effectively acts as a single short circuited turn. Induced eddy currents therefore circulate within the core in a plane normal to the flux, and cause resistive heating of the core material. in the same split of the component, this effect appears in the edge and in the space of the two closed turns of the winding modifying the magnetic field density into the core. For power engineers, the equivalent parameters (L and R for the core) can be interesting for the optimization of the component. The estimation L is by 3D simulation and the L-I curve described in can be define using one of the outputs (-I curve) by differentiations as: Where is the magnetic flux. To obtain R, it is derived at the post-modeling step R-I rms curve by numerical integration described in as: Where p the average value of the power and l rms is the rms value of the current on the windings. Conclusion As it is mentioned previously, the complex hysteresis loss models are more adequate for an exact iron loss, however there is a huge issue is the integration into Finite Element tools. The hardware computer limitation is not useful in CPU time spending for the power electronics engineers and the 3D FEM in higher frequencies (> 10 MHz), the time consuming is especially long and the error increases substantially. There are different ways to get along with these limitations. Some simplifications in the 3D model could be a solution, but these kind of limitations may become in the next bottleneck for future works. Another choice is moving the research to decrease the Finite Element numbers reducing the space moving closer the boundaries using the perfectly matching layers technique. Where J  is the current density, J   is the complex conjugate of the current density and is the conductivity in a structure. For the component surfaces, the eddy current loss is defined by: Nevertheless, the modeling in FEA depends on the core symmetry and winding configuration. This dependency produces that the loss calculation in non-symmetric components through a 3D FEM is a difficult task due to the current hardware computational limitations. The current computational limitations provoke to perform some simplifications at the component modeling to achieve the performance of the 3D FEM simulation in operative way for the design engineers. The allowed simplifications depend on the magnetic field distribution (1D/2D/3D). 2D Models are not enough precise in FEM when there is non-axial symmetry. In addition, there important effect that there are only possible to analyze in 3D models as the air-gap and edge effects. The air-gap effect defines when in the magnetic core is introduced a material with poor permeability (usually it's air), there is a discontinuity in the core. This situation produces that the magnetic flux disperses in the closed zone to the air-gap. The disperse flux affects the current distribution of the conductors near of the air-gap. This phenomenon is very similar to the skin and proximity effect. The current of the conductors tries to minimize the energy with its own distribution, so, the real section decreases and the losses increase. The edge effect consists in the direction change of the flux when the conductors finish. In each winding belongs to the magnetic component, the conductors fill the high of the window, and then, the distribution of the field is practically in the same direction, so, when the field arrives at the up or down of the core window, the field has to change the direction and it appears another new distribution different the main one. Also, when it is winded the primary and secondary
Stickmen Brewing Company in Lake Oswego, Ore., has thrived in an industry dominated by big players. (Photo by Niki Walker/For The Washington Post) LAKE OSWEGO, Ore. — At first, Jon Turner was just a software guy who really liked to brew beer. He cooked up two batches a week in his kitchen and kept his hard-drinking friends well supplied. He once brewed one pale ale over and over for a year to get it just right. In 2011, at a national conference of home brewers, he fell under the spell of a panel called “Going Pro.” This is how Turner came to cash out a large chunk of his retirement savings and launch a 16-tap brew pub on the shores of a private lake in a swanky suburb south of Portland. He and his co-owner, Tim Schoenheit, have kept their tech jobs and worked nights, weekends and assorted off hours to bring their 80-employee operation, Stickmen Brewing, to the brink of profitability. Drive around the Portland area today and you’ll see dozens of stories just like Stickmen’s — small pubs and breweries that have sprung to life in the past half-decade and endured, in spite of fierce competition from rivals large and small. In the past month, Portland has seen a similar proliferation of start-ups in the cannabis industry, ignited by a new state law that allows legal marijuana sales to the general public. Microbreweries and pot dispensaries aren’t the major drivers of Portland’s economy, but they loom much larger here than in most U.S. cities. In both those industries, small start-ups are thriving. That’s a sharp contrast to the American economy at large. Don’t let Silicon Valley fool you: The nation has long had a start-up problem. The rate at which new businesses are formed has fallen steadily since 1984, a trend that accelerated during and after the Great Recession, according to research by University of Maryland economist John Haltiwanger and several co-authors. Since the recession ended, more businesses have failed every year than have sprung to life. Breweries and dispensaries offer lessons for how policymakers might nurture a small-business comeback in the United States. But they offer very different lessons, one focused on government intervention, the other on reducing hurdles for entrepreneurs to enter a market — and their ultimate lesson could prove to be, the big guys tend to win in the end. In Oregon’s sin industries, “We’ve had a renaissance of start-ups, which is almost the exact opposite of what we’ve seen almost everywhere else in the economy,” said Joshua Lehner, a state economist in Oregon. “It’s going to be challenging to maintain this.” America’s start-up slowdown began in the 1980s and ’90s, when much of the drop-off was concentrated in the retail trade and service sectors. A lot of new mom-and-pop groceries and bookstores were pushed out of business or were kept from starting up in the first place by the emergence of Wal-Mart, Barnes & Noble and other large chain retailers. In the 2000s, the trend spread to other industries, most notably high tech, which has seen its start-up rate decline over the past 15 years. Economists can’t say for sure what’s driving that trend, but one theory has to do with market power. As big companies get bigger — in retail or tech or anything else — they find ways to shield themselves from competition, often by lobbying the government. Here’s an Oregon example: Google and Facebook have each received tens of millions of dollars in property tax reductions from cities on the state’s rural eastern side, where those companies have built huge warehouses filled with servers to store user data. It’s unlikely that a small-time social-media rival could win the same deal, which means that small company would face higher costs than Facebook does to store its data — a powerful advantage for the large incumbent. The beer industry is more dominated by big players than almost any other in the United States. Its four largest companies account for nearly 90 percent of all sales. That’s a function of a wave of brewery consolidation in recent years, culminating in an announcement last month that the world’s two largest beer companies, SAB Miller and Anheuser-Busch InBev, plan to merge. And yet, for all that market power, the beer giants are acting scared of their smallest competitors — perhaps because there are more of them every day, especially in Oregon. The number of breweries and brew pubs in Oregon has roughly quadrupled since 2001, to more than 200 today. Since the end of the recession, the state’s total beer production for consumption by Oregonians has grown from about 30,000 barrels a year to nearly 50,000. All but a few drops of that increase has come from start-up brewers, according to state statistics. There are simple reasons why brewing is so friendly to start-ups, all of them on display at the Jon Turner, 46, cashed in retirement plans to co-found Stickmen Brewing three years ago. (Photo by Niki Walker/For The Washington Post) Stickmen facility in Lake Oswego. It doesn’t cost much to learn to brew — just $100 or so for a starter kit and a handbook, more for hops and grains when you begin to experiment, as Turner did when he returned to his native Oregon in the late 1990s after a stint in the Navy. It also doesn’t cost much to start a brewery, relatively speaking. Turner practiced his art on the side from his software job until he was hosting annual beer bashes with 30 varieties on tap. When he decided to go pro, he tried to get a government small-business loan. When it fell through, he and Schoenheit borrowed close to $200,000 from a company called Brewery Finance, which paid for steel tanks and other brewing supplies they needed. The other reason it’s easier to start a brewery in Oregon is that Oregonians really love beer, and they’re willing to pay a premium for new and interesting varieties or for better beer closer to home. Stickmen chose Lake Oswego because there weren’t many brew pubs in town. He also had a stock answer for the people who asked whether he was worried the area was being saturated by beer start-ups. “Does anybody ever ask,” Turner said, “if there’s too many muffler shops in Portland?” Stickmen struggled through its first winter, when foot traffic slowed and the restaurant, which did up to $15,000 a day in business during the summer, was lucky to bring in $600 some days. Some weeks Turner had to ask employees to wait to cash their paychecks. But the beer was good enough to get noticed around town, and it eventually won its way into some of the city’s hottest spots for beer nerds. Stickmen hired a distributor and a full-time brewer. Next year, it’s on track to produce 1,000 barrels of beer, largely IPA; this year should be the first it clears a profit. Turner says government regulations of his brewery are minimal and that other small producers help one another out — all advantages in a start-up culture. “It’s not like we’re competing with each other,” he said, “as much as we’re competing with the big guys.” Some beer bloggers, though, have begun to worry that lax government oversight could endanger start-up brewers, whom the large players are targeting on multiple fronts. AB InBev has bought a string of craft brewers across the country, including one called 10 Barrel in Oregon. It’s also buying beer distributors, a move that could eventually choke off smaller brewers’ ability to grow by shipping to cities just beginning to warm to microbrews. So far, according to published reports, only California officials are investigating potential anti-competitive implications of those purchases. Shane McKee, 46, co-founder and owner of Shango Premium Cannabis, in Portland. (Photo by Niki Walker/For The Washington Post) In the early days of Oregon’s legal marijuana industry, state officials are already taking steps to keep any big guys out of the game. They have proposed limits on the size of growing operations, along with mandating that they be majority-owned by Oregon residents — a move widely expected to limit outside investment in the industry. They’ve also approved annual licensing fees, from $4,000 to $6,000, for growers and retail vendors. Many of the rules won’t be final until next year, but the uncertainty hasn’t stopped hundreds of cannabis entrepreneurs from setting up storefronts around the state. Portland-area billboards are plastered with ads for dispensaries whose names run heavily toward puns. (A few of the pun-ier ones in the area: La Cannaisseur, Yer Best Bud and The New Amsterdam.) Some of the industry’s more established players — veterans of the state’s smaller medical-marijuana trade, which has been legal for nearly two decades — warn that the mom-and-pop newcomers will struggle to survive once the market matures, and they say state regulators will inevitably loosen size and ownership restrictions. “You’re going to see some consolidation, and you’re going to see the small players either get out of the market or learn to operate at a higher level,” said Shane McKee, the co-founder of Shango, which runs four commercial growing operations and three dispensaries in the state. Shango employs 47 people in Oregon, McKee said. Seven of them work on licensing and compliance: “The barriers are pretty high to do it right. You start looking at regulations, you look at legal fees, you look at licensing — they’re pretty intense.” In that way, the pot industry’s approach to start-up cultivation is the opposite of the beer industry — higher barriers to entry, coupled with strict regulations. And yet, some cannabis entrepreneurs think they can copy a (quintessentially Portland) secret of microbrewers’ success: artisanal differentiation. In Oregon, said William Simpson, the president and founder of Chalice Farms, which operates four dispensaries that are decked out like Pinot Noir tasting rooms, “People didn’t understand there could be so many varieties of beer, cannabis or wine.” “There is a market for your large corporate product as well,” he said, “but I don’t think it’s going to be that big in the Northwest.” In other words, consumers don’t want a Miller High Life of marijuana. They want the equivalent of a fresh-hop IPA.
Epigenetic alterations in colorectal cancer: the CpG island methylator phenotype. DNA methylation is one of the key mechanisms of epigenetic modification, and genome-wide hypomethylation and CpG island hypermethylation are characteristics of cancer cells. The CpG island methylator phenotype (CIMP) is a distinctive subtype of colorectal cancers (CRCs) that show concordant hypermethylation of numerous promoter CpG island loci. CIMP-positive CRCs are associated with a proximal location in the colon, microsatellite instability, BRAF mutation and a relatively poor clinical outcome. CIMP-positive CRCs have their own precursor lesions, serrated adenomas, distinct from conventional adenomas which progress and transform into CIMP-negative CRCs. Although the existence of CIMP-positive CRCs is generally accepted, there has been controversy over technical issues with gene markers, the methodology used to define CIMP, and the prognostic or predictive role of CIMP. This review addresses recent advances in the field of CIMP-related research.
#include <effectengine/Animation4Music_TestEq.h> #include <hyperhdrbase/SoundCapture.h> Animation4Music_TestEq::Animation4Music_TestEq() : AnimationBaseMusic(AMUSIC_TESTEQ) , _internalIndex(0) { }; EffectDefinition Animation4Music_TestEq::getDefinition() { EffectDefinition ed; ed.name = AMUSIC_TESTEQ; ed.args = GetArgs(); return ed; } void Animation4Music_TestEq::Init( QImage& hyperImage, int hyperLatchTime ) { SetSleepTime(5); } bool Animation4Music_TestEq::Play(QPainter* painter) { return false; } bool Animation4Music_TestEq::hasOwnImage() { return true; }; bool Animation4Music_TestEq::getImage(Image<ColorRgb>& newImage) { uint8_t buffScaledResult[SOUNDCAP_RESULT_RES]; auto r = SoundCapture::getInstance()->hasResult(_internalIndex); if (r==NULL) return false; r->GetBufResult(buffScaledResult, sizeof(buffScaledResult)); memset(newImage.memptr(), 0, (size_t)newImage.width() * newImage.height() * 3); int delta = newImage.width() / SOUNDCAP_RESULT_RES; for (int i = 0; i < SOUNDCAP_RESULT_RES; i++) { QColor color = r->getRangeColor(i); uint16_t destX1 = (newImage.width()*i) / SOUNDCAP_RESULT_RES; uint16_t destX2 = destX1 + delta; uint16_t destY1 = newImage.height() - 1; uint16_t destY2 = destY1 * (255 - buffScaledResult[i]) / 255; newImage.fastBox(destX1, destY1 , destX2, destY2, color.red(), color.green(), color.blue()); } return true; };
#include "minsk/CodeAnalysis/Syntax/AssignmentExpressionSyntax.h" #include "minsk/CodeAnalysis/Syntax/ExpressionSyntax.h" struct AssignmentExpressionSyntax* assignment_expression_new( struct SyntaxToken* identifier_token, struct SyntaxToken* equals_token, struct ExpressionSyntax* expression) { struct AssignmentExpressionSyntax* syntax = mc_malloc(sizeof(struct AssignmentExpressionSyntax)); expression_syntax_init((struct ExpressionSyntax*)syntax, EXPRESSION_SYNTAX_KIND_ASSIGNMENT_EXPRESSION_SYNTAX); syntax->identifier_token = identifier_token; syntax->equals_token = equals_token; syntax->expression = expression; return syntax; } enum SyntaxKind assignment_expression_syntax_get_kind(struct AssignmentExpressionSyntax* syntax) { (void)syntax; return SYNTAX_KIND_ASSIGNMENT_EXPRESSION; } struct SyntaxNodeList* assignment_expression_syntax_get_children(struct AssignmentExpressionSyntax* syntax) { struct SyntaxNodeList* children = mc_malloc(sizeof(struct SyntaxNodeList)); LIST_INIT(children); LIST_PUSH(children, (struct SyntaxNode*)syntax->identifier_token); LIST_PUSH(children, (struct SyntaxNode*)syntax->equals_token); LIST_PUSH(children, (struct SyntaxNode*)syntax->expression); return children; }
"Intrude" by Amanda Parer will be on display for two weeks. The giant glowing rabbits traveling the world with an environmental message are hopping off at Brookfield Place for a couple weeks — and it seems they've been busy. The five original inflatable sculptures, created by Australian artist Amanda Parer and known collectively as “Intrude,” will be joined at 230 Vesey St. on April 17 by two more rabbits commissioned byArts Brookfield. The nylon bunnies range from two to four stories tall; one willactually sit inside Brookfield's Winter Garden atrium, while the others frolick in the outdoor area bordering the Hudson River. Though they appear whimsical and sweet, Parer's bunnies also have a deeper message. Most of us know rabbits as the Easter Bunny or the tardy White Rabbit of “Alice in Wonderland.” But in Australia, they’re an invasive species brought over by settlers in the 1700s that are now devastating its environment. Watch the magic happen as the rabbits are inflated on Sunday, April 17, from 10 a.m. to 1 p.m. They’ll remain on display through April 30.
def ApplyTestEnvOverrides(env, more_overrides={}): resetter = lambda self: TestEnvReset(self, more_overrides) driver_env.override_env('reset', resetter) env.reset()
Kim Jong Un instructed North Korean troops to "wipe out South Korea" in the latest sign of aggression from North Korea's supreme leader. Kim's remarks came during a military border exercise this week as the United Nations Security Council adopted sanctions targeting Pyongyang's coal exports. "This is how we must forcefully respond to those South Koreans. At first strike we must completely break the will of those South Koreans and wipe them all out," Kim said according state-controlled television network KCTV. Kim spoke directly to a marine brigade and a frontline unit that has been tasked with fighting Seoul. The drills included the rapid firing of artillery and Kim was briefed on their training plan, UPI reported Friday. The annual winter training exercise was held near a disputed maritime border in the Yellow Sea. North Korea state media said an island targeted during the training saw loud explosions and light that simulated "the enemy's cities and military targets submerged in a sea of fire." The South Korean island of Yeonpyeong, which North Korea attacked in 2010, killing four South Koreans, sits near the disputed border. Pyongyang warned of another "brutal baptism of fire" in November. South Korea hasn't taken Kim's threats lightly, especially after Pyongyang claimed earlier this year it had carried out a successful test of a nuclear warhead and tested a high powered rocket engine that could be used for an intercontinental ballistic missile. In September, South Korea's defense minister revealed it has a plan to assassinate Kim if necessary. "Yes, we do have such a plan," Han Min-koo said during a parliamentary meeting. "If it becomes clear the enemy is moving to attack the South with nuclear missile, in order to suppress its aims, the concept [of the special forces] is to destroy key figures and areas [that] include the North Korean leadership." The U.N. Security Council unanimously adopted a resolution Wednesday imposing new sanctions against North Korea's exports of coal, its biggest export.
<filename>cups.cpp #include <bits/stdc++.h> using namespace std; #define rep(i, a, b) for(int i = a; i < (b); ++i) #define trav(a, x) for(auto& a : x) #define all(x) x.begin(), x.end() #define sz(x) (int)(x).size() typedef long long ll; typedef pair<int, int> pii; typedef vector<int> vi; //skipped int main() { int n; cin >> n; rep(i,0,n){ string s,length,colur; getline(cin, s); stringstream line(s); } }
Identification of a reactive metabolite of terbinafine: insights into terbinafine-induced hepatotoxicity. Oral terbinafine treatment for superficial fungal infections of toe and fingernails is associated with a low incidence (1:45000) of hepatobiliary dysfunction. Due to the rare and unpredictable nature of this adverse drug reaction, the mechanism of toxicity has been hypothesized to be either an uncommon immunological or metabolically mediated effect. However, there is little evidence to support either mechanism, and toxic metabolites of terbinafine have not been identified. We incubated terbinafine with both rat and human liver microsomal protein in the presence of GSH and were able to trap an allylic aldehyde, 7,7-dimethylhept-2-ene-4-ynal (TBF-A), which corresponds to the N-dealkylation product of terbinafine. TBF-A was also prepared synthetically and reacted with excess GSH to yield conjugates with HPLC retention times and mass spectra identical to those generated in the microsomal incubations. The major GSH conjugate, characterized by H NMR, corresponds to addition of GSH in a 1,6-Michael fashion. There remains a second electrophilic site on this metabolite, which can bind either to a second molecule of GSH or to cellular proteins via a 1,4-Michael addition mechanism. Moreover, we demonstrated that the formation of the GSH conjugates was reversible. We speculate that this allylic aldehyde metabolite, formed by liver enzymes and conjugated with GSH, would be transported across the canalicular membrane of hepatocytes and concentrated in the bile. The mono-GSH conjugate, which is still reactive, could bind to hepatobiliary proteins and lead to direct toxicity. Alternatively, it could modify canalicular proteins and lead to an immune-mediated reaction causing cholestatic dysfunction.
Influence of dipole and intermolecular interaction on the tuning dielectric and energy storage properties of polystyrene-based polymers. A dielectric polymer with high energy density is in high demand in modern electric and electronic systems. The current polymer dielectrics are facing the tradeoff between high energy density and low energy loss. Although many efforts have been devoted to solving the problem by modifying biaxially oriented polypropylene (BOPP), poly(vinylidene fluoride) (PVDF) and glassy polymers, limited success has been achieved. In the present work, we disperse the high polar nitrile units in a low polar polystyrene (PSt) matrix to avoid the strong coupling force among the adjacent polar groups and reduce the relaxation-induced high dielectric loss. In addition, the possible charge transportation offered by phenyl groups could be blocked by the enlarged bandgap. Notably, the induced polarization is established between the nitrile and phenyl groups, which may lead to the copolymer chain being more densely packed. As a result, excellent energy storage performances, including the high energy density and low loss, are achieved in the resultant poly(styrene-co-acrylonitrile) (AS). For instance, AS-4 exhibits a Ue of 11.4 J cm-3 and of 91% at ambient temperature and 550 MV m-1. Manipulating the dipole polarization in the low polar glassy polymer matrix is verified to be a facile strategy for the design of a high-energy storage dielectric polymer.
<gh_stars>1-10 /** * Copyright (C) 2009 - present by OpenGamma Inc. and the OpenGamma group of companies * * Please see distribution for license. */ package com.opengamma.transport.jaxrs; import java.io.IOException; import java.net.Inet4Address; import java.net.Inet6Address; import java.net.InetAddress; import java.net.NetworkInterface; import java.util.Collection; import java.util.Collections; import java.util.Enumeration; import java.util.LinkedList; import java.util.List; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import com.opengamma.transport.EndPointDescriptionProvider; import com.opengamma.util.SingletonFactoryBean; /** * An implementation of {@link EndPointDescriptionProvider} that produces values from a local or remote URI. */ public class UriEndPointDescriptionProviderFactoryBean extends SingletonFactoryBean<UriEndPointDescriptionProvider> { private static final Logger s_logger = LoggerFactory.getLogger(UriEndPointDescriptionProviderFactoryBean.class); private static final boolean s_enableIPv4 = System.getProperty("com.opengamma.transport.jaxrs.UriEndPointDescriptionProviderFactoryBean.disableIPv4") == null; private static final boolean s_enableIPv6 = System.getProperty("com.opengamma.transport.jaxrs.UriEndPointDescriptionProviderFactoryBean.enableIPv6") != null; private final List<String> _uris = new LinkedList<String>(); private String _local; private int _port = 80; private int _securePort = 443; private boolean _secure; //------------------------------------------------------------------------- /** * Sets an absolute URI. * * @param uri the absolute URI, e.g. {@code http://hostname.domain:port/foo/bar} */ public void setAbsolute(final String uri) { _uris.add(uri); } /** * Sets a local path using the default host and port. * * @param local the local path, e.g. {@code /foo/bar} */ public void setLocal(final String local) { _local = local; } /** * Sets the default port * * @param port the default port */ public void setPort(final int port) { _port = port; } public void setSecurePort(final int securePort) { _securePort = securePort; } public void setSecure(final boolean isSecure) { _secure = isSecure; } //------------------------------------------------------------------------- @Override protected UriEndPointDescriptionProvider createObject() { if (_local != null) { if (_secure) { s_logger.warn("Secure local connections not available - using unsecured connections"); } Collection<String> localAddresses = getLocalNetworkAddresses(); for (String address : localAddresses) { String uri = "http://" + address + ":" + _port + _local; _uris.add(uri); s_logger.debug("Publishing {}", uri); } } return new UriEndPointDescriptionProvider(_uris); } //------------------------------------------------------------------------- private Collection<String> getLocalNetworkAddresses() { final List<String> addresses = new LinkedList<String>(); try { Enumeration<NetworkInterface> ni = NetworkInterface.getNetworkInterfaces(); while (ni.hasMoreElements()) { loadInterfaceAddress(ni.nextElement(), addresses); } } catch (IOException e) { s_logger.warn("Error resolving local addresses; no local connections available", e); return Collections.emptySet(); } return addresses; } private void loadInterfaceAddress(final NetworkInterface iface, final Collection<String> addresses) { final Enumeration<NetworkInterface> ni = iface.getSubInterfaces(); while (ni.hasMoreElements()) { loadInterfaceAddress(ni.nextElement(), addresses); } final Enumeration<InetAddress> ai = iface.getInetAddresses(); while (ai.hasMoreElements()) { final InetAddress a = ai.nextElement(); if (a.isLoopbackAddress()) { continue; } if (a instanceof Inet4Address) { if (s_enableIPv4) { addresses.add(a.getHostAddress()); } } else if (a instanceof Inet6Address) { if (s_enableIPv6) { addresses.add("[" + a.getHostAddress() + "]"); } } } } }
<filename>bot/cogs/moderation/__init__.py import logging from discord.ext.commands import Bot from .infractions import Infractions from .management import ModManagement from .modlog import ModLog from .superstarify import Superstarify log = logging.getLogger(__name__) def setup(bot: Bot) -> None: """Load the moderation extension (Infractions, ModManagement, ModLog, & Superstarify cogs).""" bot.add_cog(Infractions(bot)) log.info("Cog loaded: Infractions") bot.add_cog(ModLog(bot)) log.info("Cog loaded: ModLog") bot.add_cog(ModManagement(bot)) log.info("Cog loaded: ModManagement") bot.add_cog(Superstarify(bot)) log.info("Cog loaded: Superstarify")
""" This module provides code for various distance measures. Functions: euclidean Euclidean distance between two points euclidean_py Pure Python implementation of euclidean. """ # XXX cosine distance import warnings warnings.warn("Bio.distance is deprecated. If you use this module, please notify the Biopython developers at <EMAIL>", DeprecationWarning) from numpy import * def euclidean(x, y): """euclidean(x, y) -> euclidean distance between x and y""" if len(x) != len(y): raise ValueError("vectors must be same length") #return sqrt(sum((x-y)**2)) # Optimization by <NAME> (<EMAIL>) d = x-y return sqrt(dot(d, d)) def euclidean_py(x, y): """euclidean_py(x, y) -> euclidean distance between x and y""" # lightly modified from implementation by <NAME>. # This works faster than the Numeric implementation on shorter # vectors. if len(x) != len(y): raise ValueError("vectors must be same length") sum = 0 for i in range(len(x)): sum += (x[i]-y[i])**2 return sqrt(sum)
In general, in a transmission-type electron microscope, a specimen is irradiated with an electron beam that is focused by condenser lenses. The beam penetrates the specimen, and forms a diffraction pattern of the specimen in the back focal plane of the objective lens. Then, the diffracted electrons are again caused to interfere with each other to produce a magnified image of the specimen. When this magnified image is projected onto a fluorescent screen through projector lenses, a magnified transmission image of the specimen can be observed. When the back focal plane of the objective lens is projected, a magnified diffraction pattern of the specimen can be observed. Where intermediate lenses are mounted between the objective lens and the projector lenses, either a magnified transmission image or a diffraction pattern can be obtained by adjusting the focal length of the intermediate lenses. One conventional method of observing such a magnified transmission image or diffraction pattern (hereinafter referred to as a "transmission electron optical image"), is to place a sheet of photographic film in the focal plane of the projector lenses and to expose the film with the transmission electron optical image. Another conventional means is to use an image intensifier for magnifying the projected transmission electron optical image. (European Patent Application No. 0168838) However, the sensitivity of photographic film to electron beams is low. In addition, it is laborious to develop the film. Also, the use of an image intensifier introduces the problem that the sharpness of the image is low. Further, the image tends to be distorted. Recently, a quite sensitive two-dimensional sensor has been proposed. This sensor stores the energy of the electron beam impinging on it. Then, the sensor is exposed to light or heated so that it emits light in proportion to the stored energy. FIG. 3 is a cross-sectional view of a stimulable phosphor sheet adapted for the above-described two-dimensional sensor, the sheet being stimulated by stimulating rays. The stimulable phosphor sheet, indicated by numeral 1, comprises a support 2 and a stimulable phosphor layer 3 formed on the base 2. The base 2 can be a sheet of polyethylene or plastic film of about 100 to 200 .mu.m thick, a sheet of aluminum of 0.5 to 1 mm thick, a sheet of glass of 1 to 3 mm thick, or the like. The base 2 may or may not be transparent. Where the base is opaque, the light emitted from the stimulable phosphor sheet is detected from the same side as the stimulating rays impinged. Where the base is transparent, the emitted light can be detected from the same side the stimulating rays impinged from the opposite side to the stimulating rays impinged on both sides. The stimulable phosphor used in stimulable phosphor sheet of the two-dimensional sensor employed in the present invention can be: EQU (Ba.sub.1-x-y, Mg.sub.x, Ca.sub.y) FX:.alpha.Eu.sup.2+ ( 1) where X is at least one of Cl and Br; x and y satisfy the conditions 0&lt;x +y.ltoreq.0.6 and xy .noteq.xy 0; and .alpha. satisfies the condition 10.sup.-6 .ltoreq..alpha.5.times.10.sup.-2. This is described in Japanese Patent Unexamined Laid Open No. 12143/1980. EQU LnOX : xA (2) where Ln is at least one selected from the group consisting of La, Y, Gd, and Lu; X is at least one of Cl and Br; A is at least one of Ce and Tb; and x satisfies the condition 0&lt;x&lt;0.1. This is described in U.S. Pat. No. 4,236,078. EQU M.sup..pi. FX.multidot.XA: yLn (3) where M.sup..pi. is at least one selected from the group consisting of Ba, Ca, Sr, Mg, Zn, and Cd; A is at least one selected from the group consisting of BeO, MgO, CaO, SrO, BaO, ZnO, Al.sub.2 O.sub.3, Y.sub.2 O.sub.3, La.sub.2 O.sub.3, In.sub.2 O.sub.3, SiO.sub.2, TlO.sub.2, ZrO.sub.2, GeO.sub.2, SnO.sub.2, Nb.sub.2 O.sub.5, Ta.sub.2 O.sub.5, and ThO.sub.2 ; Ln is at least one selected from the group consisting of Eu, Tb, Ce, Tm, Dy, Pr, HO, Nd, Yb, Er, Sm, and Gd; X is at least one selected from the group consisting of Cl, Br, and I; x satisfies the condition 5.times.10.sup.-5 &lt;.times..ltoreq.0.5; and y satisfies the condition 0&lt;y.ltoreq.0.2. This stimulable phosphor is described in U.S. Pat. No. 4,539,138. EQU BaFX.multidot.xNaX':.alpha.Eu.sup.2+ ( 4) where each of X and X' is at least one of Cl, Br, and I; x satisfies the condition 0&lt;x.ltoreq.2; and .alpha. satisfies the condition 0&lt;.alpha..ltoreq.0.2. This stimulable phosphor is described in Japanese Patent Unexamined Laid Open No. 56479/1984. EQU M.sup..pi. X.sub.2 .multidot.aM.sup..pi. X'.sub.2 : xEu.sup.2+( 5) where M.sup..pi. is at least one alkaline-earth metal selected from the group consisting of Ba, Sr, and Ca; each of X and X' is at least one halogen selected from the group consisting of Cl, Br, and I; X and X' are different halogens (X.noteq.X'); .alpha. is a numerical value satisfying the condition 0.1.ltoreq..alpha..ltoreq.10.0; x is a value satisfying the condition 0&lt;x.ltoreq.0.2. This stimulable phosphor is described in Japanese Patent Application No. 84381/1985 (U.S. patent Ser. No. 834,886), and can contain an additive as described in Japanese Patent Application No. 166379/1985 (correspond to European patent application No. 151,494) or 221483/1985 (U.S. Ser. No. 947,631, European Patent Application No. 159,014). Other usable storage-type fluorescent substances are described in U.S. Pat. Nos. 3,859,527, 4,236,078, 4,239,968, 4,505,989 and Japanese patent application Nos. 116777/1981, 23673/1982, 23675/1982, 69281/1983, 206678/1983 (U.S. Ser. No. 841,044, European Patent Application No. 95741), 27980/1984 (European Patent Application No. 101,030), 47289/1984 (European Patent Application No. 103,302), 752200/1984 (European Patent Application No. 107,192), and 101173/1985. Any one of these storage-type fluorescent substances dispersed in a suitable binder and applied to the support 2 up to a thickness of 1000 microns. If stimulable phosphor layer can sustain itself, it can form stimulable phosphor sheet by itself. When a stimulable phosphor sheet formed in this way is exposed to an electron beam or other radiation, some of the energy of the radiation is stored in the stimulable phosphor. Subsequently, the sheet is exposed to stimulating rays such as visible light. As a result, the fluorescent substance fluoresces according to the stored energy. Instead of the stimulable phosphor stimulated by light, a thermal phosphor can be used which releases the stored energy when heated after it stores radiation energy. In this case, the thermal phosphor is sulfate, such as Na.sub.2 SO.sub.4, MnSO.sub.4, CaSO.sub.4, SrSO.sub.4, or BaSO.sub.4, to which a trace of at least one of the additives Mn, Dy, and Tm, is added. The thermal phosphor sheet is fabricated in the same manner as the aforementioned stimulable phosphor sheet. A two-dimensional sensor made of the abovedescribed stimulable phosphor sheet or thermal phosphor sheet is placed in the focal plane of an electron microscope. A transmission electron optical image is stored in this sensor, which is scanned either with stimulating rays such as visible light r with a heat source so that it may emit light. The resulting emitted light is detected photoelectrically. As a result, an electric signal corresponding to the transmission electron optical image can be obtained. The signal derived in this way can be fed to a display unit such as a CRT to make visible the electron optical image, or it can be permanently recorded in the form of hard copy. It is also possible to temporarily store the image signal on a recording medium such as magnetic tape or magnetic disk. When the aforementioned two-dimensional sensor is used, a black spot is developed at the center of the produced image. This phenomenon does not occur when the conventional photographic film is employed. The occurance of such a phenomenon is now explained. The sensitivity of the two-dimensional sensor is much higher than that of the conventional photographic film. Therefore, the image of the filaments of the electron gun installed on the main optical axis of the electron beam in the upper portion of the electron microscope is recorded, or the electrons emanating from the filaments are scattered by the apertures and the specimen installed on the optical axis, giving rise to other radiation, such as X-rays. Hence, the black spot appears.
package core import ( "context" "database/sql" ) func setLocalUserID(c context.Context, tx *sql.Tx) error { var err error if v := c.Value(UserIDKey); v != nil { _, err = tx.Exec(`SET LOCAL "user.id" = ?`, v) } return err }
def int_warizan(a, b): d = a // b return d def amari_warizan(a, d): r = a % b return r def float_warizan(a, b): f = a / b return f num = input() a, b = map(int, num.split()) print(f'{int_warizan(a, b)} {amari_warizan(a, b)} {float_warizan(a, b):.6f}')
<filename>src/state/state.rs pub trait State { fn is_final(&self) -> bool; } state!(Monday); state!(Tuesday); state!(Wednesday); state!(Thursday); state!(Friday); state!(Saturday); state!(Sunday);
The Supreme Court Monday directed the Maharashtra government to submit before it the charge sheet filed against arrested rights activists before a Pune court in connection with the Koregaon-Bhima violence case. The bench has now posted the appeal for further hearing on December 11. The Supreme Court Monday directed the Maharashtra government to submit before it the charge sheet filed against arrested rights activists before a Pune court in connection with the Koregaon-Bhima violence case. A bench headed by Chief Justice Ranjan Gogoi said it wanted to see the “charges” against the accused and asked senior advocate Mukul Rohatgi, appearing for the Maharashtra government, to submit before it by December 8 the charge sheet filed by the state police in a special court in Pune. The bench, also comprising Justices S K Kaul and K M Joseph, was hearing an appeal of the state government against a Bombay High Court order refusing to extend the time limit of 90 days for filing the probe report . The bench has now posted the appeal for further hearing on December 11. Earlier the apex court had stayed the Bombay High Court order. Recently, the Bombay High Court had set aside the lower court’s order allowing extension of time to police to file its probe report against the rights activists. Earlier, the apex court had refused to interfere with the arrest of five rights activists by the Maharashtra Police in connection with the Koregaon-Bhima violence case and declined to appoint a SIT for probe into their arrest. The Pune Police had arrested lawyer Surendra Gadling, Nagpur University professor Shoma Sen, Dalit activist Sudhir Dhawale, activist Mahesh Raut and Kerala native Rona Wilson in June for their alleged links with Maoists under the Unlawful Activities (Prevention) Act (UAPA). The arrests had followed raids at their residences and offices in connection with the Elgar Parishad conclave held in Pune on December 31 last year, which, the police had claimed, had led to violence at Bhima Koregaon the next day. The Maharashtra government had on October 25 moved the apex court challenging the Bombay High Court order by which the extension of time granted to state police to conclude probe in the violence case was set aside. Earlier, lawyer Nishant Katneshwar, appearing for the Maharashtra government, had told the top court that if the high court order is not stayed then accused in the violence case would become entitled for grant of statutory bail for want of non-filing of charge sheet within the stipulated period. Under the UAPA, a charge sheet must be filed within 90 days of arrest. However, the prosecutor can file a report before the trial court, explaining the reasons for the delay, and seek more time. If satisfied, the court can extend the time by 90 days. In the present case, the Pune sessions court had granted the police the additional 90 days, following an application from the investigating officer (IO) and written submissions by an assistant commissioner of police (ACP). Gadling had challenged this, saying the report and the submissions came from the police, not the prosecutor. Under the Act, the report should be filed by the prosecutor, he said. The petition filed in the top court by the state government said the investigating officer had filed an application in the trial court under his signature giving reasons for extension of time on August 30, 2018. “On the very same day, the public prosecutor submitted her report/application carving out the grounds for extension of time.The public prosecutor, by way of abundant precaution, took signature of the investigating officer. But the High Court was carried away by the fact of signature of the investigating officer and arrived at a conclusion that the report/application was not by the public prosecutor,” the plea had said. It had also said that the high court should not have been carried away by the fact of mentioning of names of parties in detail.
Philosophy and mathematics: interactions. From Plato to the beginnings of the last century, mathematics provided philosophers with methods of exposition, procedures of demonstration, and instruments of analysis. The unprecedented development of mathematics on the one hand, and the mathematicians' appropriation of Logic from the philosophers on the other hand, have given rise to two problems with which the philosophers have to contend: Is there still a place for the philosophy of mathematics? and To what extent is a philosophy of mathematics still possible? This article offers some reflections on these questions, which have preoccupied a good many philosophers and continue to do so.
<filename>src/app/services/eth.service.ts<gh_stars>1-10 import { Injectable } from '@angular/core'; import web3 from '../../../web3'; import StudCertRegistry from '../../../contracts/StudentCertificateRegistry'; //import StudCert from '../../../contracts/StudentCertificate'; import StudCert from '../build/contracts/StudCert.json'; //import StudCertRegistry1 from '../../../build/contracts/StudCertRegistry.json'; let StudCertRegistry1 = require('../../../build/contracts/StudCertRegistry.json'); var Tx = require('ethereumjs-tx'); //var coder = require('web3/lib/solidity/coder'); var CryptoJS = require('crypto-js'); declare let require: any; //declare const Buffer; let ipfsFileStorage = require('../../../build/contracts/IPFSFileStorage.json'); let InputDataDecoder = require('ethereum-input-data-decoder'); let eventName = 'studContractCreated'; var _privateKey ='<KEY>'; var _defaultAcct = '0x9496E4064A7f840B03238853E93051Cc6d20fF8a'; var _contractAddress = '0x587860155ebc52176cff327702b703f12633fe0f'; //var _contractAddress = '0x5b6cc69e6c1d3e884a9fabffab128e854a681d41'; var ownerPrivate ='<KEY>'; @Injectable() export class EthService { //ropsten private _decoder: any; constructor() { web3.eth.defaultAccount = _defaultAcct; this._decoder = new InputDataDecoder(ipfsFileStorage.abi); } createSudentCertificate(_ipfsHashCode: string, _studentId: string, _collegeId: string , _firstName: string, _lastName: string, _middleName: string): Promise<any> { return new Promise((resolve, reject) => { var gasPrice = web3.utils.toHex(web3.eth.gasPrice); var gasLimitHex = web3.utils.toHex(3000000); let date = (new Date()).getTime(); var contract = new web3.eth.Contract(StudCertRegistry1.abi, _contractAddress); var transfer = contract.methods.createStudCert('Hello' , 'F1','L1', 'M1', 'S1', 'C1', date); var encodedData = transfer.encodeABI(); var gas = web3.utils.toWei('20', 'gwei') var tx = { from: web3.eth.defaultAccount, to: _contractAddress, gasPrice: web3.utils.toHex(gas), gasLimit: gasLimitHex, data: encodedData, value: "0x0" }; web3.eth.accounts.signTransaction(tx, ownerPrivate, function(err, signed){ if(err) { console.log("signTransaction err: "+err); } web3.eth.sendSignedTransaction(signed.rawTransaction, function(err, res){ if(err) { console.log("sendSignedTransaction err: "+err); } console.log("Transaction Successfull: "+res); }); }); }); } storeIpfsCode(ipfsHashCode: string): Promise<any> { return new Promise((resolve, reject) => { var functionName = 'set'; var types = ['string']; var args = [ipfsHashCode]; var fullName = functionName + '(' + types.join() + ')'; var signature = CryptoJS.SHA3(fullName, { outputLength: 256 }).toString(CryptoJS.enc.Hex).slice(0, 8); var dataHex = signature ;//+ coder.encodeParams(types, args); var data = '0x' + dataHex; var nonce = web3.toHex(web3.eth.getTransactionCount(web3.eth.defaultAccount)) var gasPrice = web3.toHex(web3.eth.gasPrice); var gasLimitHex = web3.toHex(3000000); var rawTx = { 'nonce': nonce, 'gasPrice': 2408182, 'gas': gasLimitHex, 'from': web3.eth.defaultAccount, 'to': _contractAddress, 'data': data} var tx = new Tx(rawTx); tx.sign(Buffer.from(_privateKey, 'hex')); var serializedTx = '0x' + tx.serialize().toString('hex'); return web3.eth.sendRawTransaction(serializedTx, function(err, txHash){ if (err) { console.log(err); return reject(err); } else { console.log(txHash); return resolve(txHash); } }); }); } getTransactionDetails(txnHash: string): Promise<any> { return new Promise(resolve => { var transaction = web3.eth.getTransaction(txnHash); resolve(transaction); }); } getTransactionInputData(txnHash: string) { return new Promise((resolve, reject) => { this.getTransactionDetails(txnHash).then((transaction) => { const data = this._decoder.decodeData(transaction.input); console.log('TX input data ', data.inputs[0]); return resolve(data.inputs[0]); }, function(error) { console.log('Error getting TX input data ', error); return reject(error); }); }); } /* createSudentCertificate(_ipfsHashCode: string, _studentId: string, _collegeId: string , _firstName: string, _lastName: string, _middleName: string): Promise<any> { var _ipfsHashCode = '45dsfret'; return new Promise((resolve, reject) => { var functionName = 'CC2'; var types = ['string', 'string', 'string', 'string', 'string', 'string', 'uint256']; var args = [_ipfsHashCode, _studentId, _collegeId, _firstName, _lastName, _middleName, 0]; var fullName = functionName + '(' + types.join() + ')'; var signature = CryptoJS.SHA3(fullName, { outputLength: 256 }).toString(CryptoJS.enc.Hex).slice(0, 8); var dataHex = signature;// + coder.encodeParams(types, args); var data = '0x' + dataHex; var nonce = web3.toHex(web3.eth.getTransactionCount(web3.eth.defaultAccount)) var gasPrice = web3.toHex(web3.eth.gasPrice); var gasLimitHex = web3.toHex(6000000); var rawTx = { 'nonce': nonce, 'gasPrice': gasPrice, 'gas': gasLimitHex, 'from': web3.eth.defaultAccount, 'to': _contractAddress, 'data': data} var tx = new Tx(rawTx); tx.sign(Buffer.from(_privateKey, 'hex')); var serializedTx = '0x' + tx.serialize().toString('hex'); return web3.eth.sendRawTransaction(serializedTx, function(err, txHash){ if (err) { console.log(err); return reject(err); } else { console.log(txHash); web3.events.studContractCreated((err, events) => { if(err) { console.log('err --', err); } else{ console.log('events --', events); } }); return resolve(txHash); } }); }); } */ }
Java remains one of the most popular programming languages in 2017, landing second only to JavaScript among the languages developers use most. Developers for this popular language are in high demand, as well, requiring a diverse skillset including communication, in-depth knowledge of the ecosystem, and of course an understanding of the language so deep they could code in their sleep. Java Management Extensions (JMX) is a standard component of the Java Platform. It was first added to the J2SE 5.0 release. It is a set of specifications used for network and application management. It specifies a method for developers to integrate the applications they are working on with their network management software by assigning Java objects with management attributes. JMX gives developers a standard and simple way to manage resources, including services, devices, and applications. It is dynamic, making it possible to manage and monitor resources as soon as they are created, implemented or installed. What is mBean? With Java Management Extensions technology, a resource is represented by Managed Beans or mBeans. These are registered on the mBean server, a core-managed object server that acts as an agent and can be used on a majority of devices that support Java. In simpler terms, mBeans acts like Java wrappers for services, components, devices, or applications in a distributed network, while the mBean server provides the actual management, as it is where you would find all the manageable resources. This server then becomes the central focus of the architectural frame, which allows server components to plug in and find manageable objects. A JMX agent, therefore, would consist of the mBean server, plus the services needed to handle the mBeans (you’ll also want an APM solution that includes application framework metrics like mBeans and performance counters). This means that the resources are independent and apart from the management infrastructure, and these resources are manageable no matter how the management applications are deployed. Java Management Extensions specifies standard connectors, which are called JMX connectors. These connectors allow you to access the agents from your remote management applications. These connectors may use different protocols and still work with the same management interface. On the other hand, a management application can easily manage the resources, no matter what communication protocol is used. In fact, it is possible to use JMX agents with systems and applications that are not compatible with the JMX specifications, as long as these applications support JMX agents. There are many reasons why you should use Java Management Extensions technology – as it provides you with a flexible way to create Java applications. With JMX technology: You can now manage Java applications on devices that you already have . What’s more, you do not have to change the design of your application and still be able to manage them easily. All your application needs to have is the managed object server, and as long as the mBeans are registered in the object server, you can use its functionality. . What’s more, you do not have to change the design of your application and still be able to manage them easily. All your application needs to have is the managed object server, and as long as the mBeans are registered in the object server, you can use its functionality. You now have a standard means to manage your Java systems, networks and applications . For instance, your Java EE 5 application server is compatible with JMX and can be managed using JMX technology. . For instance, your Java EE 5 application server is compatible with JMX and can be managed using JMX technology. You can also use it to manage Java VM . You can initiate a JMX agent to gain access to the instrumentation found in Java VM, at which point you can now remotely monitor or manage a Java virtual machine. . You can initiate a JMX agent to gain access to the instrumentation found in Java VM, at which point you can now remotely monitor or manage a Java virtual machine. You now have a dynamic and scalable management architecture. Each JMX agent service can be used with the management agent. This modularity means that the technologies can scale and can be used with smaller devices to huge telecommunication systems. Just as long as you have the core services identified by the specification, you can add services and load, unload, and update these dynamically. JMX uses standard Java technology and will use current Java specifications. For instance, it will follow the conventions set forth by the Java Naming and Directory Interface API. You can use a NetBeans IDE module to create a JMX application. This would help you cut down on costs in developing JMX apps. Moreover, it works with many current management solutions. JMX API is open source, making it easier for management system vendors to incorporate the technology into their own solutions. It can also use lookup and discovery protocols and services, such as Service Location Protocol or the Jini network technology. What is JConsole? JConsole is a monitoring tool for Java Management Extensions. It uses a wide array of JMX instrumentation and gives you data on resource consumption as well as the performance of Java applications. You can start JConsole by running the JConsole executable, which you can find on the JDK_HOME/bin directory. You can use JConsole for monitoring local and remote applications. It is best practice, however, to use JConsole only when you are developing or prototyping applications, rather than using it in production environments. The reason for this is because JConsole uses up a lot of system resources. If you want to connect JConsole to an agent, you would need to specify that agent when you start up. You can also connect to an agent anytime by going to the advanced tab and then type in the URL, username, and password. JConsole allows you to see a lot of information including the uptime, compile time, live threads, peak, current heap size, current classes loaded, free physical memory and others. For mBeans, you can see all the information on every mBean registered with that server, including a list of all the mBeans arranged by object names. When you choose a specific mBean, you would be able to see its attributes, operations, info and notifications in four easily navigable tabs. From here, you can check to see the attributes, and if they are writeable, you can set the value for that particular attribute. What is JMX Console? JMX Console is the management console used by JBoss. It gives you a raw view of all the mBeans that the JBoss server has. The console gives you information on the running server, how to modify its setup, as well as stop or start components, among other tasks. Note that JBoss is a middleware that is provided by Red Hat Inc., and is open source. You can, however, subscribe to JBoss to help you build your expertise, get support when necessary, and deploy without having to go through the complexities of deploying open source software. Additional Resources and Java Management Extensions Tutorials For more information, including some helpful tutorials, visit the following resources:
Revisiting the role of physical activity and exercise in the treatment of type 2 diabetes. There is tremendous potential for improving glycemic control, insulin sensitivity, and cardiovascular risk factors through increased physical activity in individuals with Type 2 diabetes. The demonstrated effects of structured endurance exercise on select outcomes compare favorably with those of typical pharmacological treatment modalities. Adherence to these types of program is problematic, however. We know less about the expected effects of lifestyle-based physical activity. Preliminary results require further investigation, given the apparent acceptability of these programs in this population, however. The effects of resistance training on cardiovascular risk factors to date likely limit its application as an adjunctive therapy for individuals with Type 2 diabetes. The question is no longer "can exercise/physical activity benefit the individual with Type 2 diabetes?" The answer is yes. Future research needs to refine questions regarding type, dose, and magnitude of effects of physical activity (and its subcategory exercise) on glycemic control, insulin sensitivity, and on risk factors for cardiovascular disease within the context of program acceptability and feasibility.
A Rancho Cordova-based insurer Monday launched what it calls the first nationally available insurance coverage designed specifically for the medical marijuana industry. Only 14 states allow use of medical marijuana today, but Statewide Insurance Services is nonetheless offering coverage in all 50 states. "Given the growth in the industry, I think it's only a matter of time" before other states allow medical marijuana, said Mike Aberle, a commercial insurance agent with the local firm and national director of its Medical Marijuana Specialty Division. He added: "Now that we can offer (services) in all 50 states, we can start the minute they go legal, without delay." Aberle said the nationwide program covers "all aspects of the industry," including medical marijuana dispensaries (MMDs for short), workers' compensation, general liability, auto insurance (motor vehicles used to transport product), equipment breakdown/damage, property/product loss (including pot spoilage) and operations related to marijuana growing. The door for dispensaries and commercial insurers opened in 1996, when California voters approved Proposition 215, which allows physicians to recommend cannabis for treatment of cancer, anorexia, AIDS, chronic pain, spasticity, glaucoma, arthritis, migraines or "any other illness for which marijuana provides relief." To read the complete article, visit www.sacbee.com.
<reponame>zen-xu/bundler package bundle import ( "bytes" "fmt" "io" "os" "text/template" "github.com/zen-xu/bundler/pkg/utils" ) type Bundler struct { config *Config } func NewBundler(configPath string) (*Bundler, error) { config, err := NewConfig(configPath) if err != nil { return nil, err } return &Bundler{ config: config, }, nil } func (b *Bundler) Bundle(outputPath string, verbose bool) (ignorePaths []string) { archivePath := "bundle.tar.gz" archiver := NewArchiver(archivePath) archivePaths, ignorePaths := b.config.GetArchivePaths() var err error for _, archivePath := range archivePaths { err = archiver.Archive(archivePath, true) if verbose { fmt.Println(utils.Bold(fmt.Sprintf("add archive file '%s'", archivePath))) } utils.CheckError(err, fmt.Sprintf("Unable to add '%s' to bundle", archivePath)) } archiver.Close() execute := `#!/bin/bash set -eu ARCHIVE=$(awk '/^__BUNDLER_ARCHIVE__/ {print NR + 1; exit 0; }' $0) if [ $# -ne 0 ]; then args=($*) case ${args[0]} in --unpack|-u) tail -n+$ARCHIVE $0 | tar -xz exit 0 ;; --help|-h) echo This is a single executable bundle echo echo Usage: echo " $0 [flags] [arguments]" echo echo Flags: echo " -h, --help help for $0" echo " -u, --unpack unpack bundle" exit 0 esac fi export TMPDIR=$(mktemp -d /tmp/bundler.XXXXXX) tail -n+$ARCHIVE $0 | tar -xz -C $TMPDIR pushd $TMPDIR > /dev/null {{ if ne .Command "" -}} {{.Command}} $* {{ end -}} popd > /dev/null rm -rf $TMPDIR exit 0 __BUNDLER_ARCHIVE__ ` var buff bytes.Buffer var values = struct { Command string }{ Command: b.config.Command, } tmpl := template.New("bundle") tmpl, err = tmpl.Parse(execute) utils.CheckError(err, "Failed to parse Execute template") err = tmpl.Execute(&buff, values) utils.CheckError(err, "Failed to render Execute template") runnerFh, err := os.Create(outputPath) utils.CheckError(err, fmt.Sprintf("Unable to create runner executable file: %s", outputPath)) defer runnerFh.Close() _, err = runnerFh.Write(buff.Bytes()) utils.CheckError(err, fmt.Sprintf("Unable to write bootstrap script to runner executable file: %s", outputPath)) archiveFh, err := os.Open(archivePath) utils.CheckError(err, "Unable to open payload file") defer archiveFh.Close() defer os.Remove(archivePath) _, err = io.Copy(runnerFh, archiveFh) utils.CheckError(err, fmt.Sprintf("Unable to write payload to runner executable file: %s", outputPath)) err = os.Chmod(outputPath, 0755) utils.CheckError(err, "Unable to change runner permissions") return ignorePaths }
Scope of research on Parthenium hysterophorus in Africa Parthenium (Parthenium hysterophorus) is an invasive plant that invades farm and grazing lands, and affects biodiversity, animal and human health, agricultural productivity and food security. The plant is native to the Americas, but was introduced to Africa, Asia and Australia where it has established itself. Although much research effort has focused on the need to understand and combat the spread of P. hysterophorus, there are significant gaps in knowledge regarding its impacts on human and animal health, efficient control methods and economic impacts. The spread of parthenium has been successfully managed in Australia and India using biological agents such as insects, pathogens and competitive smother plant species, raising hopes that the spread in Africa may also be contained. This review examines research that has been conducted on parthenium in Africa with a view to identifying gaps for further research and control of the invasive plant.
<filename>decloud/production/meraner_timeseries_processor.py #!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Copyright (c) 2020-2022 INRAE Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. """ """Process time series with Meraner-like models""" import argparse import datetime import os import sys import logging from decloud.core import system import numpy as np from decloud.production.products import Factory as ProductsFactory from decloud.production.meraner_processor import meraner_processor import pyotb if __name__ == "__main__": # Logger system.basic_logging_init() # Parser parser = argparse.ArgumentParser( description="Remove clouds in a time series of Sentinel-2 image, using joint optical and SAR images.") # Input images parser.add_argument("--il_s2", nargs='+', help="List of Sentinel-2 images, can be a list of paths or " "a .txt file containing paths") parser.add_argument("--il_s1", nargs='+', help="List of Sentinel-1 images, can be a list of paths or " "a .txt file containing paths") parser.add_argument("--s2_dir", help="Directory of Sentinel-2 images. Enables to treat all the images of " "a directory. Used only if il_s2 is not specified") parser.add_argument("--s1_dir", help="Directory of Sentinel-1 images. Enables to treat all the images of " "a directory. Used only if il_s1 is not specified") parser.add_argument("--dem", help="DEM path") parser.add_argument("--out_dir", required=True, help="Output directory for the reconstructed optical time series") parser.add_argument("--model", required=True, help="Path to the saved model directory, containing saved_model.pb") parser.add_argument("--ulx", help="Upper Left X of the ROI, in geographic coordinates. Optional", type=float) parser.add_argument("--uly", help="Upper Left Y of the ROI, in geographic coordinates. Optional", type=float) parser.add_argument("--lrx", help="Lower Right X of the ROI, in geographic coordinates. Optional", type=float) parser.add_argument("--lry", help="Lower Right Y of the ROI, in geographic coordinates. Optional", type=float) parser.add_argument("--start", help="Starting date, format YYYY-MM-DD. Optional") parser.add_argument("--end", help="End date, format YYYY-MM-DD. Optional") parser.add_argument('--ts', default=256, type=int, help="Tile size. Tune this to process larger output image chunks, and speed up the process.") parser.add_argument('--write_intermediate', dest='write_intermediate', action='store_true', help="Whether to write S1t & S2t input rasters used by the model.") parser.set_defaults(write_intermediate=False) parser.add_argument('--overwrite', dest='overwrite', action='store_true', help="Whether to overwrite results if already exist") parser.set_defaults(overwrite=False) parser.add_argument('--skip_nodata_images', dest='skip_nodata_images', action='store_true', help="Whether to skip the reconstruction of the optical image if it is all NoData") parser.set_defaults(skip_nodata_images=False) if len(sys.argv) == 1: parser.print_help() parser.exit() params = parser.parse_args() if not (params.il_s2 or params.s2_dir): raise Exception('Missing --il_s2 or --s2_dir argument') if not (params.il_s1 or params.s1_dir): raise Exception('Missing --il_s1 or --s1_dir argument') if params.il_s2 and params.s2_dir: logging.warning('Both --il_s2 and --s2_dir were specified. Discarding --s2_dir') params.s2_dir = None if params.il_s1 and params.s1_dir: logging.warning('Both --il_s1 and --s1_dir were specified. Discarding --s1_dir') params.s1_dir = None # Getting all the S2 filepaths if params.s2_dir: s2_image_paths = [os.path.join(params.s2_dir, name) for name in os.listdir(params.s2_dir)] elif params.il_s2[0].endswith('.txt'): with open(params.il_s2[0], 'r') as f: s2_image_paths = [x.strip() for x in f.readlines()] else: s2_image_paths = params.il_s2 # Getting all the S1 filepaths if params.s1_dir: s1_image_paths = [os.path.join(params.s1_dir, name) for name in os.listdir(params.s1_dir)] elif params.il_s1[0].endswith('.txt'): with open(params.il_s1[0], 'r') as f: s1_image_paths = [x.strip() for x in f.readlines()] else: s1_image_paths = params.il_s1 # Converting filepaths to S2 products input_s2_products = {} product_count, invalid_count = 0, 0 for product_path in s2_image_paths: product = ProductsFactory.create(product_path, 's2', verbose=False) if product: input_s2_products[product_path] = product product_count += 1 else: invalid_count += 1 logging.info('Retrieved {} S2 products from disk. ' 'Discarded {} paths that were not S2 products'.format(product_count, invalid_count)) # Converting filepaths to S1 products input_s1_products = {} product_count, invalid_count = 0, 0 for product_path in s1_image_paths: product = ProductsFactory.create(product_path, 's1', verbose=False) if product: input_s1_products[product_path] = product product_count += 1 else: invalid_count += 1 logging.info('Retrieved {} S1 products from disk. ' 'Discarded {} paths that were not S1 products'.format(product_count, invalid_count)) il_s1 = list(input_s1_products.keys()) if params.start or params.end: logging.info('Filtering timerange of inputs products, to match user timerange : ' 'From {} to {}'.format(params.start, params.end)) start = datetime.datetime.strptime(params.start, '%Y-%m-%d') if params.start else None end = datetime.datetime.strptime(params.end, '%Y-%m-%d') if params.end else None if not system.is_dir(params.out_dir): system.mkdir(params.out_dir) # OTB extended filename that will be used for all writing filename_extension = ("&streaming:type=tiled&streaming:sizemode=height&streaming:sizevalue={}&" "gdal:co:COMPRESS=DEFLATE&gdal:co:TILED=YES".format(params.ts)) # looping through the input Sentinel-2 images for s2_filepath, s2t_product in input_s2_products.items(): if (params.start and s2t_product.get_date() < start) or (params.end and s2t_product.get_date() > end): # skipping invalid timerange product continue output_filename = os.path.splitext(os.path.basename(s2_filepath))[0] + '_reconstructed.tif' output_path = os.path.join(params.out_dir, output_filename) if params.overwrite or (not os.path.exists(output_path)): # Potentially skip the inference if the s2_t image is all NoData if params.skip_nodata_images: # we consider the 20m image (because it is smaller than 10m image) s2t_20m = s2t_product.get_raster_20m() # If needed, extracting ROI of all rasters if params.lrx and params.lry and params.ulx and params.uly: s2t_20m = pyotb.ExtractROI({'in': s2t_20m, 'mode': 'extent', 'mode.extent.unit': 'phy', 'mode.extent.ulx': params.ulx, 'mode.extent.uly': params.uly, 'mode.extent.lrx': params.lrx, 'mode.extent.lry': params.lry}) s2t_20m = pyotb.Input(s2t_20m) if isinstance(s2t_20m, str) else s2t_20m if np.max(np.asarray(s2t_20m)) <= 0: logging.warning(f'SKIPPING all NoData image: {s2_filepath}') continue if params.write_intermediate: processor, sources = meraner_processor(il_s1, s2_filepath, params.model, params.dem, s1_Nimages=12, ts=params.ts, with_intermediate=True) else: processor = meraner_processor(il_s1, s2_filepath, params.model, params.dem, s1_Nimages=12, ts=params.ts) # If needed, extracting ROI of the reconstructed image if params.lrx and params.lry and params.ulx and params.uly: processor = pyotb.ExtractROI({'in': processor, 'mode': 'extent', 'mode.extent.unit': 'phy', 'mode.extent.ulx': params.ulx, 'mode.extent.uly': params.uly, 'mode.extent.lrx': params.lrx, 'mode.extent.lry': params.lry}, propagate_pixel_type=True) processor.write(out=output_path, filename_extension=filename_extension) # Writing the inputs sources of the model if params.write_intermediate: for name, source in sources.items(): if name != 'dem': # If needed, extracting ROI of every rasters if params.lrx and params.lry and params.ulx and params.uly: source = pyotb.ExtractROI({'in': source, 'mode': 'extent', 'mode.extent.unit': 'phy', 'mode.extent.ulx': params.ulx, 'mode.extent.uly': params.uly, 'mode.extent.lrx': params.lrx, 'mode.extent.lry': params.lry}, propagate_pixel_type=True) if isinstance(source, str): # if needed transform the filepath to pyotb in-memory object source = pyotb.Input(source) source.write(os.path.join(params.out_dir, output_filename.replace('reconstructed', name)), pixel_type='int32', filename_extension=filename_extension)
<gh_stars>0 struct environment; struct parseoptions { _Bool dupbuildwarn; }; void parseinit(void); void parse(const char *, struct environment *); extern struct parseoptions parseopts; /* supported ninja version */ enum { ninjamajor = 1, ninjaminor = 9, }; /* default targets */ extern struct node **deftarg; extern size_t ndeftarg;
Biosynthesis and turnover of proteoglycans in organ culture of bovine articular cartilage. The biosynthesis and turnover of proteoglycans (PG) in organ cultures of bovine metacarpalphalangeal cartilage are described. After a few days in the presence of fetal calf serum, the amount of PG in the tissue is maintained at a constant level and the rate of PG biosynthesis is maintained at a high rate. Under these "steady state" conditions PG biosynthesis and turnover must be in balance. Exposure of tissue to lipopolysaccharides reduces the rate of synthesis while increasing the rate of turnover, thereby yielding net loss of PG from the matrix. After an initial mild trypsin digestion to remove PG from the matrix, turnover of PG is reduced in the cultures and a net increase of PG occurs with time. It is suggested that viable chondrocytes can regulate local concentrations of PG in their surrounding matrix by altering both biosynthetic and turnover parameters.
/* * This file was automatically generated by EvoSuite * Mon Nov 14 09:15:19 GMT 2016 */ package org.openecomp.mso.adapters.vnfrest; import org.junit.Test; import static org.junit.Assert.*; import static org.evosuite.runtime.EvoAssertions.*; import org.openecomp.mso.openstack.beans.VnfStatus; import java.util.HashMap; import java.util.Map; import org.evosuite.runtime.EvoRunner; import org.evosuite.runtime.EvoRunnerParameters; import org.junit.runner.RunWith; @RunWith(EvoRunner.class) @EvoRunnerParameters(mockJVMNonDeterminism = true, useVFS = true, useVNET = true, resetStaticState = true, useJEE = true) public class QueryVfModuleResponseESTest extends QueryVfModuleResponseESTestscaffolding { @Test(timeout = 4000) public void test00() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); queryVfModuleResponse0.setVnfId("K@Avo(l_W.<jd$"); String string0 = queryVfModuleResponse0.getVnfId(); assertEquals("K@Avo(l_W.<jd$", string0); } @Test(timeout = 4000) public void test01() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.UNKNOWN; HashMap<String, String> hashMap0 = new HashMap<String, String>(); QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse("", "", "/iul.p>pa`w<:0tL", vnfStatus0, (Map<String, String>) hashMap0); String string0 = queryVfModuleResponse0.getVnfId(); assertEquals("/iul.p>pa`w<:0tL", queryVfModuleResponse0.getVfModuleStackId()); assertEquals("", string0); assertEquals("", queryVfModuleResponse0.getVfModuleId()); } @Test(timeout = 4000) public void test02() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.UNKNOWN; QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse("", "", "", vnfStatus0, (Map<String, String>) null); String string0 = queryVfModuleResponse0.getVfModuleStackId(); assertEquals("", string0); } @Test(timeout = 4000) public void test03() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.UNKNOWN; HashMap<String, String> hashMap0 = new HashMap<String, String>(); QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse("", "", "/iul.p>pa`w<:0tL", vnfStatus0, (Map<String, String>) hashMap0); queryVfModuleResponse0.getVfModuleOutputs(); assertEquals("", queryVfModuleResponse0.getVnfId()); assertEquals("/iul.p>pa`w<:0tL", queryVfModuleResponse0.getVfModuleStackId()); assertEquals("", queryVfModuleResponse0.getVfModuleId()); } @Test(timeout = 4000) public void test04() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.UNKNOWN; HashMap<String, String> hashMap0 = new HashMap<String, String>(); QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse("", "", "q'&!##_pFRAIJ4uo]*=", vnfStatus0, (Map<String, String>) hashMap0); hashMap0.put("q'&!##_pFRAIJ4uo]*=", ""); queryVfModuleResponse0.getVfModuleOutputs(); assertEquals("", queryVfModuleResponse0.getVfModuleId()); assertEquals("q'&!##_pFRAIJ4uo]*=", queryVfModuleResponse0.getVfModuleStackId()); assertEquals("", queryVfModuleResponse0.getVnfId()); } @Test(timeout = 4000) public void test05() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.FAILED; HashMap<String, String> hashMap0 = new HashMap<String, String>(); QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse("C5aGYYh%|7be0.E!NHp", "C5aGYYh%|7be0.E!NHp", "C5aGYYh%|7be0.E!NHp", vnfStatus0, (Map<String, String>) hashMap0); String string0 = queryVfModuleResponse0.getVfModuleId(); assertEquals("C5aGYYh%|7be0.E!NHp", string0); } @Test(timeout = 4000) public void test06() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); VnfStatus vnfStatus0 = VnfStatus.NOTFOUND; queryVfModuleResponse0.setVnfStatus(vnfStatus0); VnfStatus vnfStatus1 = queryVfModuleResponse0.getVnfStatus(); assertSame(vnfStatus1, vnfStatus0); } @Test(timeout = 4000) public void test07() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); String string0 = queryVfModuleResponse0.getVfModuleId(); assertNull(string0); } @Test(timeout = 4000) public void test08() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); queryVfModuleResponse0.setVfModuleId("\"Sdeh"); assertNull(queryVfModuleResponse0.getVfModuleStackId()); } @Test(timeout = 4000) public void test09() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); String string0 = queryVfModuleResponse0.getVnfId(); assertNull(string0); } @Test(timeout = 4000) public void test10() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); Map<String, String> map0 = queryVfModuleResponse0.getVfModuleOutputs(); assertNull(map0); } @Test(timeout = 4000) public void test11() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); queryVfModuleResponse0.setVfModuleStackId("\"Sdeh"); String string0 = queryVfModuleResponse0.getVfModuleStackId(); assertEquals("\"Sdeh", string0); } @Test(timeout = 4000) public void test12() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); // Undeclared exception! try { queryVfModuleResponse0.toJsonString(); fail("Expecting exception: VerifyError"); } catch(VerifyError e) { // // (class: org/codehaus/jackson/map/MapperConfig, method: <clinit> signature: ()V) Bad type in putfield/putstatic // verifyException("org.codehaus.jackson.map.ObjectMapper", e); } } @Test(timeout = 4000) public void test13() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); HashMap<String, String> hashMap0 = new HashMap<String, String>(); queryVfModuleResponse0.setVfModuleOutputs(hashMap0); assertNull(queryVfModuleResponse0.getVfModuleId()); } @Test(timeout = 4000) public void test14() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); String string0 = queryVfModuleResponse0.getVfModuleStackId(); assertNull(string0); } @Test(timeout = 4000) public void test15() throws Throwable { VnfStatus vnfStatus0 = VnfStatus.ACTIVE; QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse((String) null, "", "", vnfStatus0, (Map<String, String>) null); String string0 = queryVfModuleResponse0.getVfModuleId(); assertEquals("", string0); } @Test(timeout = 4000) public void test16() throws Throwable { QueryVfModuleResponse queryVfModuleResponse0 = new QueryVfModuleResponse(); queryVfModuleResponse0.getVnfStatus(); } }
//***************************************************************************** // Load a class by name, post an error on failure. //***************************************************************************** HRESULT TypeLibExporter::LoadClass( Module *pModule, LPCUTF8 pszName, EEClass **ppClass) { CANNOTTHROWCOMPLUSEXCEPTION(); HRESULT hr = S_OK; BEGIN_ENSURE_COOPERATIVE_GC(); OBJECTREF Throwable = 0; GCPROTECT_BEGIN(Throwable) { *ppClass = pModule->GetClassLoader()->LoadClass(pszName, &Throwable); if (*ppClass == 0) { IfFailGo(PostClassLoadError(pszName, &Throwable)); } ErrExit:; } GCPROTECT_END(); END_ENSURE_COOPERATIVE_GC(); return hr; }
A Human Factors Vulnerability Evaluation Method for Computer and Information Security There is a current lack of human factors identification and analysis methods in computer and information security. Previous research has focused on micro-level issues, such as task analyses and usability studies of security methods such as smart cards, passwords, and biometric devices. The purpose of this research is to develop a framework for identifying human factors and organizational issues contributing to computer and information security vulnerabilities and breaches. This framework is applied in conjunction with technical security audits. The purpose of this research is to test, develop, and refine the proposed methodology. This study examines the methodology with known computer and information technical vulnerabilities through semi-structured interviews with network administrators. These interviews yielded results in the form of methodology refinements and developments and two case studies of technical security vulnerabilities, using what is called the Human Factors Vulnerability Analysis, or HFVA.
<reponame>barracksiot/deployment-service /* * MIT License * * Copyright (c) 2017 Barracks Inc. * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ package io.barracks.deploymentservice.model; import com.fasterxml.jackson.annotation.*; import com.google.common.collect.Lists; import lombok.*; import org.hibernate.validator.constraints.NotBlank; import org.springframework.data.annotation.CreatedDate; import org.springframework.data.annotation.Id; import org.springframework.data.annotation.PersistenceConstructor; import org.springframework.data.mongodb.core.index.CompoundIndex; import org.springframework.data.mongodb.core.mapping.Document; import java.util.*; import java.util.stream.Collectors; @AllArgsConstructor(access = AccessLevel.PRIVATE, onConstructor = @__({@PersistenceConstructor})) @Builder(toBuilder = true) @Getter @EqualsAndHashCode @ToString @JsonInclude(JsonInclude.Include.NON_ABSENT) @JsonIgnoreProperties(ignoreUnknown = true) @Document(collection = "deploymentPlans") @CompoundIndex(name = "packageRef_userId_createdAt", def = "{ 'packageRef': 1, 'userId': 1, 'created': -1 }") public class DeploymentPlan { @Id @JsonIgnore private final String id; @JsonIgnore private final String userId; @NotBlank private final String packageRef; @JsonIgnore private final DeploymentConditions deploymentConditions; @JsonProperty("rules") @Singular private final List<DeploymentRule> deploymentRules; @JsonIgnore @CreatedDate private final Date created; @JsonCreator public static DeploymentPlan fromJson( @JsonProperty("allow") DeploymentCondition allow, @JsonProperty("deny") DeploymentCondition deny, @JsonProperty("rules") List<DeploymentRule> rules ) { final DeploymentPlanBuilder deploymentPlanBuilder = DeploymentPlan.builder() .deploymentRules(Optional.ofNullable(rules).map(ArrayList::new).orElse(new ArrayList<>())); if (allow != null || deny != null) { deploymentPlanBuilder.deploymentConditions( DeploymentConditions.builder().allowCondition(allow).denyCondition(deny).build() ); } return deploymentPlanBuilder.build(); } public Optional<Date> getCreated() { return Optional.ofNullable(created).map(e -> new Date(e.getTime())); } @JsonProperty("allow") public Optional<DeploymentCondition> getAllow() { return Optional.ofNullable(deploymentConditions) .flatMap(DeploymentConditions::getAllowCondition); } @JsonProperty("deny") public Optional<DeploymentCondition> getDeny() { return Optional.ofNullable(deploymentConditions) .flatMap(DeploymentConditions::getDenyCondition); } public Optional<DeploymentConditions> getDeploymentConditions() { return Optional.ofNullable(deploymentConditions); } public List<DeploymentRule> getDeploymentRules() { return Optional.ofNullable(deploymentRules).map(ArrayList::new).orElse(new ArrayList<>()); } public List<String> extractFilters() { final List<String> filters = Lists.newArrayList(); filters.addAll( getDeploymentConditions() .map(DeploymentConditions::extractFilters) .orElse(Collections.emptyList()) ); filters.addAll( getDeploymentRules().stream() .map(rule -> rule.getDeploymentConditions() .map(DeploymentConditions::extractFilters) .orElse(Collections.emptyList()) ) .flatMap(Collection::stream) .collect(Collectors.toList()) ); return filters; } public List<String> extractVersions() { return getDeploymentRules().stream() .map(DeploymentRule::getVersionId) .collect(Collectors.toList()); } }
In = open("input.txt", "r") Out = open("output.txt","w") N, M= In.readline().split() N = int(N) M = int(M) counter = 0 S = "" Flag = (N >= M) for i in range(N+M): if(Flag): if(i%2 == 0 and N>0): S += "B" N -= 1 elif(i%2 == 1 and M>0): S += "G" M -= 1 elif(N == 0 and M >0): S += "G" M -= 1 elif(M == 0 and N>0): S += "B" N -= 1 else: if(i%2 == 1 and N>0): S += "B" N -= 1 elif(i%2 == 0 and M>0): S += "G" M -= 1 elif(N == 0 and M >0): S += "G" M -= 1 elif(M == 0 and N>0): S += "B" N -= 1 print(S, file = Out) In.close() Out.close()
import torch from itertools import combinations def euclidean(x1, x2): return torch.sqrt(((x1 - x2) ** 2).sum() + 1e-8) def k_moment(source_output, target_output, k): num_sources = len(source_output) source_output_ = [] for i in range(num_sources): source_output_.append((source_output[i] ** k).mean(0)) target_output = (target_output ** k).mean(0) kth_moment = 0 for i in range(num_sources): kth_moment += euclidean(source_output_[i], target_output) comb = list(combinations(range(num_sources), 2)) for k in range(len(comb)): kth_moment += euclidean(source_output_[comb[k][0]], source_output_[comb[k][1]]) return kth_moment def moment_soft(want_class_tear_apart, output_s, output_t, class_prob_s, class_prob_t, domain_prob_s, label_s, moment): margin = 30 output_s = output_s.reshape(output_s.shape[0], output_s.shape[1],1) # N x e x 1 class_prob_s = class_prob_s.reshape(class_prob_s.shape[0], 1, class_prob_s.shape[1]) # SHAPE -> N x 1 x c output_s_times_cp = torch.matmul(output_s, class_prob_s) #SHAPE -> N x e x c domain_prob_s = domain_prob_s.reshape(domain_prob_s.shape[0], 1, domain_prob_s.shape[1], domain_prob_s.shape[2]) # SHAPE -> N x 1 x c x d output_s_times_cp = output_s_times_cp.reshape(output_s_times_cp.shape[0], output_s_times_cp.shape[1], output_s_times_cp.shape[2], 1) #SHAPE -> N x e x c x 1 output_prob_s = output_s_times_cp * domain_prob_s #SHAPE -> N x e x c x d N,e,c,d = output_prob_s.shape class_prob_sum_s = class_prob_s.sum(0) + 1e-6 class_prob_sum_s = class_prob_sum_s.reshape(1, -1, 1) #SHAPE -> 1 x c x 1 domain_prob_sum_s = domain_prob_s.sum(0) + 1e-6 domain_prob_sum_s = domain_prob_sum_s.reshape(1, c, d) # SHAPE -> 1 x c x d output_prob_s = (output_prob_s.sum(0)/domain_prob_sum_s) #SHAPE -> e x c x d output_t = output_t.reshape(output_t.shape[0], output_t.shape[1],1) #class_prob_argmax = class_prob_t.argmax(1) #class_prob_max, _ = class_prob_t.max(1) #confident_targets = class_prob_max>0.8 #output_t = output_t[confident_targets] #class_prob_t = class_prob_t[confident_targets] #class_prob_argmax = class_prob_argmax[confident_targets] #useful_classes, counts = torch.unique(class_prob_argmax, return_counts=True) #useful_classes = useful_classes[counts>5].detach() class_prob_t = class_prob_t.reshape(class_prob_t.shape[0], 1, class_prob_t.shape[1]) if class_prob_t.shape[0]!=0: output_prob_t = torch.matmul(output_t, class_prob_t) # SHAPE -> N x e x c class_prob_sum_t = class_prob_t.sum(0) + 1e-6 class_prob_sum_t = class_prob_sum_t.reshape(1, -1) #SHAPE -> 1 x c output_prob_t = output_prob_t.sum(0)/class_prob_sum_t # SHAPE -> e x c intra_domain_loss = torch.zeros(1).cuda() inter_domain_loss = torch.zeros(1).cuda() class_tear_apart_loss = torch.zeros(1).cuda() for cc in range(output_prob_s.shape[1]): for dd in range(output_prob_s.shape[2]): # if cc in useful_classes: #if domain_prob_sum_s[0,cc,dd]<3: # continue inter_domain_loss += domain_prob_sum_s[0,cc,dd]*class_prob_sum_t[0,cc]*euclidean(output_prob_s[:, cc, dd], output_prob_t[:, cc])/(output_s.shape[0]**2) for dd2 in range(dd+1, output_prob_s.shape[2]): #if domain_prob_sum_s[0,cc,dd2]<3: # continue intra_domain_loss += domain_prob_sum_s[0,cc,dd]*domain_prob_sum_s[0,cc,dd2]*euclidean(output_prob_s[:, cc, dd], output_prob_s[:, cc, dd2])/(output_s.shape[0]**2) if moment == 1 and want_class_tear_apart: for cc1 in range(output_prob_s.shape[1]): for cc2 in range(cc1+1, output_prob_s.shape[1]): for dd in range(output_prob_s.shape[2]): for dd2 in range(dd, output_prob_s.shape[2]): hinge_tear_apart = euclidean(output_prob_s[:, cc1, dd], output_prob_s[:, cc2, dd2]) #print(hinge_tear_apart) hinge_tear_apart = torch.maximum(margin - hinge_tear_apart, torch.zeros(1,dtype=torch.float32).cuda()) hinge_tear_apart = domain_prob_sum_s[0,cc1,dd]*domain_prob_sum_s[0,cc2,dd2]*hinge_tear_apart/(output_s.shape[0]**2) #if domain_prob_sum_s[0,cc1,dd] >1e-4 and domain_prob_sum_s[0,cc2,dd2]>1e-4: # print(domain_prob_sum_s[0,cc1,dd], domain_prob_sum_s[0,cc2,dd2], hinge_tear_apart) class_tear_apart_loss += hinge_tear_apart #print("Batch", class_tear_apart_loss) return intra_domain_loss, inter_domain_loss, class_tear_apart_loss def k_moment_soft(want_class_tear_apart, output_s, output_t, k, class_prob_s, class_prob_t, domain_prob_s, label_s): output_s_k = output_s**k output_t_k = output_t**k return moment_soft(want_class_tear_apart, output_s_k, output_t_k, class_prob_s, class_prob_t, domain_prob_s, label_s, k) def class_da_regulizer_soft(want_class_tear_apart, output_s, output_t, belta_moment, class_prob_s, class_prob_t, domain_prob_s, label_s): # print('s1:{}, s2:{}, s3:{}, s4:{}'.format(output_s1.shape, output_s2.shape, output_s3.shape, output_t.shape)) intra_domain_loss = torch.zeros(1).cuda() inter_domain_loss = torch.zeros(1).cuda() class_tear_apart_loss = torch.zeros(1).cuda() for i in range(0,belta_moment): klosses = k_moment_soft(want_class_tear_apart, output_s, output_t, i + 1, class_prob_s, class_prob_t, domain_prob_s, label_s) intra_domain_loss += klosses[0] inter_domain_loss += klosses[1] class_tear_apart_loss += klosses[2] return intra_domain_loss, inter_domain_loss, class_tear_apart_loss * belta_moment
UFC President Dana White won’t budge on his stance that additional weight classes are unnecessary in the UFC to help prevent extreme weight cuts by athletes. Despite documented evidence that the rate of failed weight cuts has gone up in the UFC, particularly since the introduction of early weigh-ins, White doesn’t believe giving fighters more options of which weight to compete at is the solution. A total of 17 fighters have missed weight for UFC fights this year. Five of those weren’t fit enough to make it to the octagon for their bouts, and an issue with some sort of late-withdrawal is seemingly happening at every event. Related This video from Japan should make you want to ban extreme weight cutting in MMA White said he’s not overly concerned, though. There are a section of fighters, fans and media who believe more weight classes would benefit those who have to cut too much weight for a certain division, but are too small to move up a category. The UFC recognized the Association of Boxing Commissions recent weight-class expansion project, but White said that’s not the fix. “People are like, ‘Add weight classes, do this, do that,'” White told TSN. “It’s never going to change. You’re still going to have people trying to – let’s say I add a 165-pound weight class. That will only mean bigger guys will try to make 165. Everybody’s always looking for an advantage.” White said when it comes to weight-cutting, the responsibility falls directly on the athlete. White has touted the UFC’s new Performance Institute in Las Vegas as a facility with free on-site experts who can help fighters cut weight in a safe and efficient manner. Unfortunately, the Performance Institute is of no use to those outside of Las Vegas. According to White, there’s an approach to weight-cutting that minimizes the risk. However, the problem is the majority of UFC fighters don’t have the financial resources to do what he expects of them. “There’s ways to cut weight,” White said. “There’s safe ways. There’s scientific ways. Nutritionists can help you do this. Everybody just wants to take shortcuts and the easy way. But there is no easy way when you’re cutting weight.” Regardless of White’s stance, he said the UFC is being proactive to make the situation better. He said the organization is taking some action behind the scenes to ensure fighters are cutting weight and competing at their fittest. He just isn’t willing to take what he views as an unnecessary step of providing more weight-class options. “What we’ve been doing is Jeff Novitzky, the guy we hired who handles all the (U.S. Anti-Doping Agency) stuff, he’s tracking all these guys’ weights,” White said. “He tracks them. When you come in the week of the fight we find out where you are compared to where you were the last couple times you fought.” For more on the UFC schedule, check out the UFC Rumors section of the site.
/** * The MIT License (MIT) * * Copyright (c) 2016 <NAME> * * Permission is hereby granted, free of charge, to any person obtaining a copy of this software and * associated documentation files (the "Software"), to deal in the Software without restriction, * including without limitation the rights to use, copy, modify, merge, publish, distribute, * sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all copies or * substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT * NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ package org.briljantframework.mimir.evaluation.partition; import java.util.AbstractCollection; import java.util.Collection; import java.util.Iterator; import java.util.List; import org.briljantframework.Check; import org.briljantframework.data.dataframe.DataFrame; import org.briljantframework.data.series.Series; import org.briljantframework.mimir.data.Input; /** * The leave-one-out partitioner can be used to implement Leave-one-out cross-validation, a commonly * employed strategy for evaluating small and expensive to gather datasets. * * <p/> * The {@linkplain DataFrame} (with {@code m} rows) and {@linkplain Series} (of length {@code m}) * are partitioned into {@code m} partitions. At each iteration {@code m-1} data points are returned * as the training set and {@code 1} data point as the validation set. All data points are used as * validation points exactly once. * * @author <NAME>lsson * @see FoldPartitioner */ public class LeaveOneOutPartitioner<In, Out> implements Partitioner<In, Out> { @Override public Collection<Partition<In, Out>> partition(Input<In> x, List<Out> y) { Check.dimension(x.size(), y.size()); return new AbstractCollection<Partition<In, Out>>() { @Override public Iterator<Partition<In, Out>> iterator() { return new FoldIterator<>(x, y, x.size()); } @Override public int size() { return x.size(); } }; } @Override public String toString() { return "LeaveOneOutPartitioner"; } }
Social impact assessment process for industry 4.0 to achieve sustainable artificial intelligence systems The strategic environmental assessment (SEA) process can be broadly defined as a study of the social impacts of a proposed project, plan, policy or legislative action of intelligence systems on the society, environment and sustainability. The SEA process for sustainable intelligent systems has been aimed to incorporate society, environment and sustainability factors into the project planning and decision-making process for sustainable intelligent systems. Artificial intelligence systems (AIS) should consider the titled environmental impact assessment (EIA) process that can be defined as the systematic identification and evaluation of the potential impacts (effects) of proposed projects, plans, programmes, policies or legislative actions relative to the biological physical, physico-chemical, biological, cultural, socio-economic and anthropological components of the total environment. The SEA process protocol is important as it has been proposed for studying and checking the productivity and quality of AIS. This treaty and official government procedures of SEA were helpful in the decision-making process much earlier than the EIA process. Introduction The legislation of the environmental impact assessment (EIA) process was established in 1970 by the enactment of the National Environmental Policy Act (NEPA) in the USA. This was first time that the EIA process became an official tool in the construction sector to protect the environment. Three of the significant terms used while complying with the requirements of NEPA process are 'environmental inventory', 'environmental impact assessment process' and 'environment impact statement'. EIAs of design and construction of engineering structures were undertaken in order to protect the environment during the year 1950 in Japan, Europe and North America. The purpose of the EIA process is to encourage the consideration of the environment in organisational planning and decisionmaking process. Historically, the choice of proposed projects, policies, plans, programmes, permits, procedures or legislations was primarily based on only one criterion called economic viability. Today, it is necessary to consider three criteria: economic, environmental and social viabilities. Environment coupled with sustainable intelligent systems is an intricate managerial approach that was the targeted research area to achieve socio-economic improvement and sustainability based on the triple bottom line approach (economical, environmental and social) and feasibility studies. Product environmental life cycle analysis (LCA) has been studied and checked for identifying and measuring the impact of artificial intelligence (AI) systems on engineering industrial products on the environment and sustain efficacy by means of mass and energy balance methods. LCA considers the activities related to raw materials, transformation, ancillary materials, equipment, method, market, manpower, production, use, disposal and ancillary equipment. As far as construction safety is concerned, personal protective equipment and materials (PPEMs) that include garments, clothing, gloves, safety shoes, hard hats, safety glasses, shields, respirators, full aprons, safety belts and other safety items have to be used by individuals. Such equipment is important for personal protection and for safety. It is the manager's and supervisor's responsibility to ensure that they are used. The enactment of worker's compensation law and occupational disease law shall increase materially the cost of insurance to the industry. The increased cost and the certainty with which it is applied will put a premium on accident prevention work. This cost can be materially reduced by the installation of safety devices. Advanced sustainable intelligent system research experience has shown that approximately 80% of all the accidents are preventable. EIA and environmental health impact assessment (EHIA) processes have been conducted for nuclear power plants to consider the safety and health impacts to mitigate psychological health loadings on workers and nearby residents. The strategic environmental assessment (SEA) system is a potentially useful element of good environmental and social management and sustainable development; however, as currently practiced in industries, it is far from perfection. Emphasis should be given in industries on maintaining economic viability of the operation, while in turn taking care to preserve the ecological and social sustainability of the country. The international EIA process, which has been studied, required a multidisciplinary approach duly conducted at a very early stage of the Indo-Matsushita Midget electrode project in 1982 at Tada for technical, economic, ecological and social sustainability. The PPD process should include the integrated consideration of technical or engineering, economic, environmental, safety, health, social and sustainability factors to achieve intelligence excellence. Prior to the NEPA process in 1970 in the USA, technical and economic factors dominated the world's constructional projects. The objective of the study is to conceptualise the SEA process for intelligent systems based on 15 sustainable detailed project reports (DPRs) submitted by the extension learners of the Diploma in Entrepreneurship and Business Management (DEBM) course conducted by the Entrepreneurship Development Institute of India (EDI of India) during the research year (RY) 1999-2020 under the author's counsellorship. The design of the study is cross-sectional. Stepwise structure of the SEA process The SEA process has been itemised according to the following nine steps: 8. Decision-making; 9. Monitoring, measurement and control opportunities for resource transformation and project implementation and its SEA process. Conceptual framework for screening and scoping of the SEA process for sustainable intelligent systems The screening and scoping processes are the items which are employed in the SEA processes ( Figure 1). Three most significant items are 'strategic environmental assessment inventory, EIA and strategic EIA statement'. The PPD process should include the integrated consideration of technical, economic, environmental, social, safety, health and sustainability factors ( Figure 2). Strategic environmental assessment management plan (SEMP) A SEMP is a detailed plan and schedule for measures to minimise and mitigate any potential environmental and sustained efficacy impacts. SEMP should consist of a set of measurements, monitoring, control (mitigative) and institutional measures to be considered during the implementation and operation of the proposed projects to eliminate adverse environmental and sustainability impacts or offset them or reduce them to acceptable levels. The SEA process aims to incorporate environmental and sustainability considerations into strategic planning and decisionmaking processes of the project formulation and appraisal. International EIAs are important considerations in the project planning and decision-making process. It has been imperative to consider international EIAs in concrete projects to mitigate the CO2-induced climate warming problem and the stratospheric ozone depletion problem. The international EIA process has a potentially good environmental management. Results and Discussion During the last two centuries, due to the fast urbanisation and industrialisation along with the advancement of science, engineering and technology, there have been considerable developments in the engineering sector with the resultant wastage of a copious amount of resources and tremendous environmental stress. Subsequently, it was realised that there were many adverse impacts on the environment and society. These unsustainable construction developments have sustained environmental growth. It is required to apply sustainable intelligent systems for the sustainability of design and development, quality of life, safety on earth and continuous process improvement of our environment, which is of utmost importance. Sustainable development means a kind of development that should occur without damages to the environment. Hence, hectic developmental activities during the last two centuries have caused considerable environmental and social impacts. These impacts have been measured, monitored and mitigated by the international EIA process ( Figure 3). International EIAs are important in the international project planning and decision-making process that mitigates potential environmental impacts in more than one country. The use of sustainable intelligent and sustainable technology and management systems for the environment and sustainability is considered in two areas, i.e., sustainable development with global problems and prevention technologies that are designed to reduce the environmental effects of products and processes ( Figure 4). The integration of environmental protection and economic development is the most important strategic social environmental assessment tool in achieving sustainable development ( Figure 5). Project planning and decision-making should include the integrative consideration of engineering or technical, economic, environmental, ethical and social factors. A midget electrode project was taken as a case study for the SEA process ( Figures 5 and 6). The international EIA process has been designed for the sustainable midget electrode project design and construction to identify and predict the potential effects on the physical, biological, ecological, socio-economic and cultural environment and on human health and well-being are adequately protected. Environmental impact statements have been prepared for the project by considering the environmental and socio-economic factors with respect to development and other proposed actions. Therefore, the EIA system is a potentially useful component of good environmental management. In the chromium tanning industry, chromium environmental contamination and pollution is discharged beyond the safety limits, which seriously affects the life on earth. Toxic emissions from industries, thermal power plants, smelting pollution, auto exhaust pollution in large metropolitan areas and photochemical smog have been poisoning the atmosphere beyond the permissible levels, which has caused serious health hazards. Air pollution causes adverse environmental health and social impacts. Mindless disposal of untreated industrial wastes in Odisha chromite mines and other radio-active wastes in nuclear power plants, construction debris, sanitary wastes, hazardous wastes, municipal solid wastes (MSW), agricultural wastes and domestic wastes has contaminated and polluted the water, soil and land beyond the tolerable limits, which have adversely affected land fertility, water quality, vegetation, aquatic and marine life. This is proving to be more and more hazardous as this development is continuously damaging the environment, viz. melting of glaciers, climate change, carbon tetra chloride emission, greenhouse gas emission and ozone layer depletion. For example, the continuous increase in CO2 concentration in the atmosphere and industrial emission of about 382 ppm lead to climate change. This decrease in glaciers has contributed to about 29.5% of the mean sea level rise since 1991. Water supplies stored in the glaciers have been projected to decline. In addition to contaminating and polluting air, water, soil and land, intensive technological activities also lead to the depletion of natural resources. This is required to bring our energy and intellectual capacity in tandem whereby it can meet the challenges efficiently without major disruptions, as well as without compromising on the livelihood of future generations' needs. Development would have occurred without damages to the environment and major disruption, and the process of urbanisation and industrialisation would have occurred in a sustainable manner by utilising the resources efficiently. Now, these environmental problems are the present environmental challenges and opportunities for improvement. To overcome these environmental problems, new and more efficient solutions, technologies, processes and products alongside behavioural change are required. Sustainable intelligent (AI) systems applied to low carbon and energy-efficient technology of industries can make contributions to mitigating the impacts of economic growth on global warming ( Figure 7). The resultant outputs of green products and services are environmental advantages with good performance and cheaper prices. The dual goals of green design are the waste prevention and better material management, as shown in Figure 7. The design and construction of green buildings have considerably reduced the environmental impacts associated with manufacturing, use and disposal. Prior to the enactment of the NEPA on Environment in 1970 in the USA, only technical or engineering and economic factors dominated the planning and decision-making process in most of the world projects, plans, programmes, permits, policies and legislative actions. As per the sustainable intelligent systems research results, the project planning and decision-making process must include the integrated consideration of engineering or technical, economic, environmental, safety, ethical, social and sustainability factors. This important consideration can be referred to as the 'concept of the four Es and 1 S' in organisational planning and decision-making process. There are ecological and biogeochemical principles and tools such as energy flows and material cycling, element ratios, mass and energy balance, element cycling and product environmental LCA ( Figure 8) available in order to solve major environmental problems that we face in our world today, such as global warming, acid rain, environmental pollution and increasing greenhouse gases. Figure 8. Construction of the product environmental LCA The engineering product environmental LCA is used for identifying and measuring the impact of industrial products on the environment and sustained efficacy by means of mass and energy balance methods ( Figure 8). The LCA considers the activities related to the extraction of raw materials, ancillary materials, equipment production, use, disposal and ancillary equipment. Towards sustainable constructional development The EHIA process is proposed in this research for nuclear power plant projects during the construction phase in order to address psychological health impacts on workers and nearby residents. The environmental health impact assessment can be defined as the systematic identification and evaluation of the potential environmental health impacts or effects of the proposed nuclear power projects, plans, programmes, policies or legislative actions relative to the physico-chemical, biological, cultural and socio-economic components of the total environment. At present, there are more than 437 nuclear power plants situated in the world. It may be worth mentioning that none of the nuclear power projects, plans, programmes, policies or legislative actions in the world has got sustainable practice in conduction of the EHIA process. The nuclear power plants generate electricity while using heat generated in pressurised water reactors where nuclear reaction takes place. During the construction phase of nuclear power plants, uranium-235, thorium-232 and plutonium-239 are used as fuels in nuclear reactors causing nuclear fission. At that time, a copious amount of radiation dose due to the radioactive pollution escapes out in the order of about 120-240 billion Becquerel (120 GBq), i.e., 50-100 g of radiation activities, viz. alpha (), beta () and gamma (), as against the safe limits of 0.1 Bq/l or Bq/kg (ppm) in land, air and water, when operation, repair and maintenance of replacing old nuclear fuels with new fuels taken place. Exposure to high levels of radioactive pollution damages mental health and is a psychological burden on workers and nearby residents. As per the psychological health impact survey conducted by the author in a nuclear power plant at Quinson, China, severe psychological disorders including radioactive poisoning, depression and post-traumatic stress were investigated to an extent among 49% of the nearby residents in and around 82% of the nuclear power plants in the world (World Engineers' Convention, Shanghai, China 2004). Psychological health impact loadings due to radioactive environment on workers and nearby residents have been studied in this research during the test run phase using computer simulation models. The psychological health impact assessment on workers and nearby residents has been addressed to mitigate psychological health impact loadings on workers and nearby residents. Development using sustainable intelligent systems In this research, the EHIA process has been investigated in the cotton double roller (DR) ginning industries using chrome composite leather clad (CCLC) washers for the design and development of an eco-friendly alternative. The objective is to assess the environmental health impacts of the Indian cotton ginning industries. Most of the cotton ginning operations are performed by using DR ginning machines which play an important role in the Indian cotton ginning industries. The rollers used are made of CCLC covering fixed to a shaft. The CCLC contains of about 18,000-36,000 mg/kg (ppm) of chromium particles. When the cotton seed is processed in the DR ginning machine, the lint cotton is contaminated with hexavalent chromium dust of about 140-1990 mg/kg (ppm) which is a carcinogenic substance against the safe limits of 0.1 ppm. During the cotton ginning process due to persistent rubbing of the CCLC over a stationary knife, the chromium particles are adsorbed into the lint cotton such that the spun yarns and woven fabrics get contaminated by about 100-200 ppm which according to World Health Organisation's eco-standards should not be more than 0.1 ppm. The CCLC rollers used in the cotton roller ginning machines get powdered during the ginning process. As chromium is a specific dust, gin and mill workers and residents are directly exposed to this carcinogenic substance and are vulnerable to environmental health hazards. To offset this problem, pollution-free eco-friendly washers/rollers for both laboratory and commercial studies have been fabricated and experimented. The environmental health inventory (EHI) serves as the basis for evaluating the potential environmental health impacts of both beneficial and adverse proposed actions. The environmental health impact statement describes the affected environmental health or environmental health setting without the project. The design and development of the EHI is an initial step in the EHIA process. It is concluded that EHIA process should be conducted for certain projects, plans, programmes, legislative actions, policies in the project planning and decision-making process. International EIA process The international EIA process is a potentially good environmental management system (EMS). International organisation for standardisation (ISO)'s 14000 and 9000 standards focus on EMS and quality management system (QMS) of all sorts of organisations apart from more than 19,500 published standards. The EMS and QMS have been separately featured in ISO. EMS standards apply to the management system concepts of an organisation's environmental issues and opportunities. It defines the features of an EMS that need to be in place to ensure that the organisation identifies and focuses on improving areas where they have significant environmental impacts. This system can be integrated with ISO 9000 QMS standards to achieve excellence in quality as well as environmental obligations. The overall aim of the EMS is to provide protection to the environment and to prevent pollution to manufacture eco-friendly products and services. The EMS focuses on key drives of performance excellence in products and processes, as well as organisations that are focused on delivering values to the customers, internal operational processes and to staff's learning. Hence, this system approach to the environmental management shall achieve excellence in the overall performance of the organisation. In the present study, about two-thirds of construction waste was recoverable due to the conduction of intensive on-site training programmes on recycling and composting processes as against the conventional construction management practices which could recover the waste of only 10%-15%. Construction wastes are produced by the construction sector. The study has been attempted to identify and evaluate special waste minimisation hierarchy of waste management for properly managing construction waste, including minimising generation and treatment that have been generated and disposing of waste residuals. A case study has been included on the generation of construction wastes and potential waste management strategies for a group or generic construction processes. All construction processes generate wastes in the form of liquids, solids or gases. Some wastes are considered as hazardous. The AI waste minimisation hierarchy of waste management is duly ranked from most desirable to least desirable (Figure 9). 1. Eliminating waste generation = most desirable. 2. Reducing waste generation = most desirable. 3. Reuse, recover or recycle waste materials = most desirable. 4. Treating waste to diminish quantity and to detoxify the hazardous and nonhazardous solid wastes = least desirable. 5. Disposing of waste residuals = least desirable. Waste minimisation includes only elimination, recovery, reduce, reuse and recycle hierarchies. Waste minimisation does not include treatment of wastes as well as disposal, which are points 4 and 5, because these are traditional waste control strategies involving the treatment and disposal, which are called end-of-the pipe solutions and are costly affairs, as well as the control of high discharge standards. Modern waste control strategies involve points 1-3 which do not require end-of-pipe solution for the waste management problems. Solid and hazardous waste generation is the sum of material recovery and discard. Sustainable Intelligent systems' report on the waste audit conducted is presented for recovering two-thirds of MSW by recycling and composting processes (Figures10 and 11). Figure 10. Closed loop-shaped green economy To achieve sustainable economic improvement, natural resources should be utilised at optimum level to maximise efficiency as per the result analysis of optimum competitive and social markets applying sustainable intelligent systems. The efficiency of a kind of sustainable economic system is referred to as the 'AK' sustainable economic model, i.e., the product of engineering or technical factor level (A) and the capital (K). Sustainable economic improvement is explained by three factors which are given as follows: The natural increase in the accumulation of labour potential; Capital accumulation or money with which a business is started and run; Sustainable technological momentum can be referred as total factor productivity or efficiency in the construction process. Such momentum keeps the capital development dynamic which emerges from the sustainable enterprise creation process, green products or services, new methods of production and processes, new construction management and transportation, new markets and new forms of constructional organisations. Figure 11. Sustainable AI management system Standard production function (SPF) is expressed based on the operation approach as follows: where Y = output, C = capital and L = labour. As knowledge is a crucial factor for economic growth, the SPF is modified based on the process approach as follows: where 'A' represents the knowledge on sustainable constructional engineering or technical factor; Y = output; Input elements are manpower, machinery, materials, method, money and market denoted as X1, X2, X3, X4, X5, X6; f = SPF. As per the given SPF, knowledge is a decisive production variation and a sustainable innovation level is required in the engineering or technical system. The solution is the development of a reformed SEA implemented in the construction industries. Study of the constructional projects Historically, the choice of new constructional projects was primarily on one criterion, i.e., economic viability. Presently, second and third choice criteria, i.e., environmental and social impacts, have become a strong yardstick; therefore, a triple bottom line approach, i.e., economic, environmental and social factors, to constructional project viability can be applied sustainable intelligent systems. The EIA process is a systematic identification and evaluation of potential effects of proposed projects, plans, programmes, plans or legislative actions relative to the physico-chemical, biological, cultural and socio-economic components of the total environment. Steps to conduct EIA and management Step 1: Identification of the quantity and quality characteristics of the concerned environment of the proposed project. Step 2: Preparation of the description of the existing environmental resource conditions. Step 3: Procurement of relevant quantity and quality standards. Step 5: Assessment of impact significance. Step 6: Identification and incorporation of mitigation measures. Conduction of the EIA study for efficient constructional industrial projects 1. Prediction and assessment of impacts on the surface water environment. 2. Prediction and assessment of impacts on the soil and ground environment. 3. Prediction and assessment of impacts on the air environment. 4. Prediction and assessment of impacts on the noise environment. 5. Prediction and assessment of impacts on the biological environment. 6. Prediction and assessment of impacts on the visual environment. 7. Prediction and assessment of impacts on the socio-economic environment. 8. Prediction and assessment of impacts on the cultural environment. 9. Prediction and assessment of impacts on the archaeological environment. 10. Prediction and assessment of impacts on the anthropological environment. Sustainable intelligent systems applied in the EIA process that benefits the industries 1. Considerable reduction in waste and depletion of resources. 2. Considerable reduction and/or elimination of the release of pollutants into the environment. 3. Green design and green building products to minimise their environmental impact on production, use and disposal. 4. Control of the environmental impacts on sources of raw material. 5. Waste minimisation and adverse environmental impact on new developments. 6. Promote environmental awareness among employees and the community. Sustainable intelligent systems for environmental management programmes The organisation should establish and maintain a programme(s) for achieving the environmental objectives and targets. It should include designation of the responsible function, team or individual and a time frame for achievement as follows : 1. State the objective/target. 2. State the purpose (how the objective/target will support the policy). 3. Describe how the objective/target will be achieved. 4. State the programme (team) leader. 5. Designate departments and individuals responsible for specific tasks. 6. Establish the schedule for completion of the tasks. 7. Establish the programme review, which will include format, content and review schedule. Sustainable intelligent systems for the conduction of the social impact assessment (SIA) study The SIA process is a systematic identification and evaluation of potential social effects of proposed projects, plans, programmes, plans or legislative actions relative to the society. The purpose of the SIA process is to bring about a sustainable and equitable biophysical and human environment. The SIA process includes monitoring, measurement and control opportunities including analysis and management of the intended and unintended social consequences whether both positive and negative impacts of planned interventions and any changes takes place in social transformation process invoked by those interventions. The SIA process should include the analysis of the use of land, culture, industrial process, economic development and their impact on the service sectors such as water use, energy use, sanitation and traffic. The SIA process is carried out to ensure that there is no mismatch between the constructional development and sociocultural and socio-economic development of the project areas. Intelligent systems for the sustainable water and waste water quality management Water quality should be maintained so that water supply to consumers is safe and hygienic. Relevant water quality standards should be followed. A sustainable sanitation facility is to be provided. The sanitation impact assessment study has been conducted for sanitation projects and plans. Sewerage system, storm water drainage systems, waste water treatment system, industrial waste treatment system and sustainable septic tanks are important on-site requirements. Relevant waste water discharge standards are to be followed. The process approach of a sustainable intelligent system for measurement, monitoring and control opportunities for water, waste water and industrial water quantity and quality should be followed. Sustainable intelligent systems for the safety engineering and management in industries (safety first) Sustainable Intelligent systems for safety management are used for the systematic identification and evaluation of potential safety requirements of proposed projects, plans, programmes, plans or legislative actions. The purpose of the AI safety engineering and management is to bring about designs and constructions of sustainable civil engineering structures. It has been observed that some construction methods and machineries used in India are obsolete and outdated because they are old and operate with poor performances in terms of productivity, quality, efficiency and safety. Some of the alternative machineries, which are indigenously manufactured, also do not guarantee for the superior performance and necessary safety conditions because of their poor design and materials of construction. It is mandatory to check for safety requirements about machineries, bridges, roads and buildings. Safety personnel responsible for overseeing the safety of all operating personnel must be cognisant of the latest laws and regulations pertaining to worker safety and occupational health. These are changed and/or updated from time to time. Checking for safety ensures that the question of safety will not be overlooked; it is well to have all plans, specifications and drawings checked for safety, making special provision for this in each set of specifications and in the title plate of each drawing duly checking periodically for cranes, hoists, ventilation, lifts, tackles, fire protection systems, alarms, buildings, mechanical guarding and electrical and electronic equipment and heavy engineering equipment. Personal protective equipment and materials include garments, clothing, gloves, safety shoes, hard hats, safety glasses, shields, respirators, full aprons, safety belts, and other safety items used by individuals. Such sustainable AI equipment is important for personal protection and for safety. It is the manager's and supervisor's responsibility to ensure that these are used. As far as occupational-disease prevention is concerned, those persons engaged in or working near operation are exposed to appreciable quantities of dusts, fumes or gas; so, it is important that adequate control measures must be adopted. Some major considerations involved in the application of effective control to industrial occupational disease are given. Some of the policies, practices and procedures to prevent exposure of personnel to unsafe materials are also provided. As far as the worker's compensation law is concerned, it must be enacted strictly in our country. The principle involved is that the worker injured or disabled in construction industries should be enabled, through proper medical treatment, to return to wage-earning capacity as promptly as possible, and while incapacitated, he should receive compensation in lieu of wages, regardless of the fault. The expense of medical treatment and compensation should properly be borne by the industry and become a part of the cost of its products. The laws generally provide that worker injured in the industry should be furnished with the necessary medical treatment and, in addition, compensation based on a percentage of their weekly wages, payable periodically. Dependents of employees killed in the industry are likewise compensated. The occupational diseases law provides provision for compensation benefits in occupational disease cases. The enactment of worker's compensation laws and occupational disease law should increase materially the cost of insurance to industry. The increased cost and the certainty with which it is applied will put a premium on accident prevention work. This cost can be materially reduced by the installation of safety devices. Research experience has shown that approximately 80% of all the construction industrial accidents are preventable. As far as the fire loss prevention is concerned, it is an indispensable element in the construction industry. It exists only with top management direction and the support of labour. The designation fire protection usually encompasses the entire field of prevention of loss by fire, including both the causes for the occurrence of fires and methods for minimising their consequence. Some of the fire standards of protection to prevent injury and loss of life are given in this paper. Sustainable Intelligent systems in fire protection engineering practices both in building design and in safe operating practices are also included. Construction noise safety is concerned; noise is recognised as a pollutant as both a nuisance and the cause of hearing impairment. There is evidence in construction sites that noise causes ailments such as hearing impairment and physiological and psychological disorders, including anxiety and heart disorders. Protection from noise is required when sound levels exceed those standards. When protective equipment is required, it must be provided by a trained person and periodic checks made of the effectiveness. Figure 12. Conceptualisation of culture-based environmental and quality management entitled 'OVPA' cycle by incorporating the expanded PDCA cycle Sustainable intelligent systems for TQM can be broadly defined as a set of systematic activities carried by an institution to efficiently achieve institutional objectives that satisfy beneficiaries at the appropriate time and price. The definition of quality is 'The totality of features and characteristics of products or services that bear on its ability, efficacy and values to satisfy a given or implied need'. TQM is a comprehensive and structured approach to an educational integrated management that seeks to improve the quality of educational services through ongoing refinements in response to continuous feedback. Thus, this standard definition of quality is applicable commonly to both products and services that are stated and unstated. TQM has an important role to play in addressing quality issues surrounding the constructional development. TQM is a comprehensive and structured approach in the construction sector that seeks to improve the quality of services through ongoing refinements in response to continuous feedback. TQM leads to sustainable AI development. ISO 9000 series defines TQM as a management approach centred on quality, based on the participation of all its members and aimed at long-term success through customer satisfaction and benefits to all members of the organisation and society. Hence, TQM is based on quality management from the customer's point of view. TQM processes are divided into four sequential categories: plan, do, check and act (PDCA) ( Figure 12). This is also called the PDCA cycle or Deming's cycle and sustainability cycle for continuous process improvement. In the planning phase, AI systems define the problem to be addressed, collect relevant data and ascertain the problem's root cause; in the doing phase, AI systems develop and implement a solution and decide upon a measurement to gauge its effectiveness and efficiency; in the checking phase, AI systems confirm the result through before-and-after data comparison; in the acting phase, AI systems document their results, inform others about process changes and make recommendations for the problem to be addresses in the next PDCA cycle and sustainability cycle. ISO 9000 series focuses on the quality management for all sorts of organisations. It has been proposed that the features of sustainable intelligent systems in QMS need to be in place to ensure, identify and focus on improving the areas where they have significant AI system deficiencies. Sustainable intelligent systems for the ISO 14000 EMS standards apply to the management system to manage an organisation's environmental issues and opportunities. It defines the features of an EMS that need to be in place to ensure that the organisation identifies and focuses on improving areas where they have significant environmental impacts. This system has been integrated with ISO 9000 QMS standards in order to achieve excellence in quality as well as environmental obligations in the midget electrode project. The overall aim of the EMS is to provide protection to the environment and to prevent pollution and manufacture eco-friendly products and services. The ISO 14000 series of standards assists the organisations to excel in environmental and economic gains for continuously improving organisational performances. They are used for the prevention of pollution, reduction of wastes, enhancement of internal management system efficiency, optimum utilisation of resources and compliances for legal and regulatory requirements. EMS can be basically divided into five events which form the sequence of a cycle ( Figure 13). These five events are as follows: environmental policy, environmental planning, environmental implementation and operations, checking and corrective actions and management review. The ISO 14000 series of standards has also been designed to cover the areas of socio-environmental issues and opportunities for the organisations to compete the global customer-centric markets so that the products and services can be manufactured at par with the international requirements. Figure 13. Environmental management system Sustainable intelligence systems in EMS focus on key drives of performance excellence in products and processes, as well as organisations, that are focused on delivering values to the customers, internal operational processes and to staff's learning. It may be mentioned that environment and quality management is a managerial approach centred on environment and quality through beneficiary satisfaction in construction industries that lead to economic improvement and sustainability. Hence, this system approach to the socio-environmental management shall achieve excellence in the overall performances of the organisation. Conclusion and Recommendations The SEA process for sustainable intelligent systems has aimed to incorporate environmental and sustainability factors into the project and decision-making process, such as projects' formulation and appraisal of Indo-Matsushita midget electrode (battery carbon rod) plant in 1979 at Tada that included polices, programmes, plans and legislative actions. The primary purpose of the SEA process for sustainable intelligent systems is to encourage the consideration of the environment, safety, health, social and sustainability factors in the organisational PPD process and to arrive at actions that are compatible. The EIA should be considered as an official tool to protect the environment. The sanitation impact assessment has been investigated for sanitary projects and plans. The EIA process has a multidisciplinary approach that is necessary for providing the prevention mechanism for environmental management and protection in any constructional development. The EIA process is designed to identify and predict the potential effects on the physical, biological, ecological, socioeconomic and cultural environment and on human health and well-being are adequately protected. As per sustainable intelligent systems research results, the PPD process should include the integrated consideration of technical or engineering, economic, environmental, safety, health, social and sustainability factors to achieve intelligence excellence. The SEA process for sustainable intelligent systems, which is a protocol, has been proposed for checking the quality of environmental and social assessments and management plans. This treaty and official government procedures of SEA was helpful in the decision-making process much earlier than the EIA process. Therefore, it is key tool for sustainable development. The SEA aims to incorporate environmental and sustainability considerations into strategic decision-making processes, to formulate policies, plans, programmes and legislative actions. Prior to the NEPA process in 1970 in the USA, technical and economic factors dominance the world's projects. The objective of the study is to conceptualise the SEA process for sustainable intelligent systems based on 15 sustainable DPRs submitted by the extension learners of the DEBM (OLPE) course conducted by the EDI of India during the RY 1999-2019 under the author's counsellorship. Sustainable Intelligent systems for the ISO 14000 EMS standards apply to the management system concepts of TQM to the management of an organisation's environmental issues and opportunities. It defines the features of an EMS that need to be in place to ensure that organisations identify and focus on improving areas where they have significant socio-environmental impacts. EMS focuses on key drives of performance excellence in products and processes, as well as organisations, that are focused on delivering values to the customers, internal operational processes and to staff's learning. Hence, this sustainable intelligent system approach to the environmental management shall achieve excellence in the overall organisational performance. Engineering product socio-environmental LCA has been conducted using sustainable intelligent systems for identifying and measuring the impact of construction industrial products on the environment and sustain efficacy by means of mass and energy balance methods. LCA considers the activities related to raw materials, transformation, ancillary materials, equipment, methods, market, production, use, disposal and ancillary equipment. As far as the safety is concerned, sustainable intelligent systems have been applied for enforcement of PPEMs that include garments, clothing, gloves, safety shoes, hard hats, safety glasses, shields, respirators, full aprons, safety belts and other safety items used by individuals. Such equipment is important for personal protection and safety. It is the manager's and supervisor's responsibility to ensure that these are used. The enactment of worker's compensation laws and occupational disease law should increase materially the cost of insurance to the industry. The increased cost and the certainty with which it is applied will put a premium on accident prevention work. This cost can be materially reduced by the installation of safety devices in sustainable intelligent systems. Sustainable Intelligent system research experience has shown that approximately 80% of all the industrial accidents are preventable. It is concluded that sustainable intelligent systems coupled with quality management is a managerial approach centred on environment and quality through beneficiary satisfaction that leads to economic improvement and sustainability based on the triple bottom line approach. Sustainable Intelligent systems for TQM play an important role in addressing quality issues surrounding the sustainable development. Sustainable Intelligent systems for sustainable water and waste water management have been discussed. The SIA and EHIA processes were conducted for a nuclear power plant to consider the safety and health impacts to mitigate psychological health loadings on workers and nearby residents. The SEA system for sustainable intelligent systems is a potentially useful element of good socio-environmental management and sustainable development; however, as currently practiced in industries, it is far from perfection. Emphasis should be given in industries on maintaining economic viability of the operation, while in turn taking care to preserve the ecological and social sustainability of the country using sustainable intelligent systems. The international EIA process required a multidisciplinary approach that has been conducted at a very early stage of Indo-Matsushita carbon rod project in 1982 at Tada for economic, environmental and social viabilities. The paper highlights SEA process conducted for certain projects that based on operation and process approach and associated studies for sustainable development. As per research results, PPD process should include the integrated consideration of technical or engineering, economic, environmental, safety, health, social and sustainability factors to achieve business excellence. The SEA process protocol has been proposed for checking the quality of environmental and social assessments and management plans. This treaty and official government procedures of SEA were helpful in the decision-making process much earlier than the EIA process.
What Do We Owe Medical Students and Medical Colleagues Who Are Impaired? Physicians who are impaired, engage in unprofessional behavior, or violate laws may be barred from further practice. Likewise, medical students may be dismissed from medical school for many infractions, large and small. The welfare of patients and the general public must be our first priority, but when we assess physicians and students who have erred, we should seek to respond as caringly and fairly as possible. This piece will explore how we may do this at all stages of the proceedings physicians and students may encounter. This may include helping them to resume their medical careers if and when this would be sufficiently safe and beneficial for patients.
Stratigraphic Studies and Surface-Layer Formation. A Case Study: Eastern Wilkes Land, East Antarctica (Abstract) This paper presents the results of a detailed study on the geomorphic and diagenetic processes of surface-layer formation and its subsequent preservation in the stratigraphic record. The study supplemented stratigraphic studies carried out along a 750 km ANARE traverse route along the 69 °S parallel between 112° and 131 °E (which approximately follows the 2000 m contour) in the katabatic wind zone of eastern Wilkes Land. A 100 cane farm was established at GD03 (69 °S, 115°E; 1835 m a.s.l.), adjacent to a 30 m deep firn-core drill site. The cane farm was used to monitor seasonal changes in snow accumulation and the type, size, distribution and orientation of the surface micro-relief. The annual snow accumulation at GD03 is equivalent to 300 kg m−2 of water. This annual layer is visibly marked by a multi-layered ice crust, typically 12 mm thick, which is formed in autumn during a hiatus in snow supply. Within the annual layer, single-layered thin ice crusts were observed. These correspond to short hiatus periods, of the order of 23 weeks, during late winterearly spring, and radiation glazes formed during summer. Density and oxygen-isotopedepth profiles display annual cyclicity within the snow-pack. Considerable horizontal variation was found in a single annual-layer thickness, with respect to ice-crust thickness, snow-density and oxygen-isotope values, and depth-hoar development, when traced in 21 2 m cores drilled at 5 m horizontal spacing. The observed changes in surface micro-relief distributions over the cane farm have enabled a greater understanding of vertical variations between annual layers observed in the 30 m firn core.
<gh_stars>1-10 package ru.sbrf.ufs.app.envelope.models.fg; import ru.sbrf.ufs.app.envelope.models.model.Model; import java.util.Collection; import java.util.Comparator; import java.util.Set; public class FgMethod { private final String name; private final FgResponse response; private final Set<Model> requestParameters; private FgMethod(String name, FgResponse response, Set<Model> requestParameters) { this.name = name; this.response = response; this.requestParameters = requestParameters; } public String getName() { return name; } public FgResponse getResponse() { return response; } public Collection<Model> getRequestParameters() { return requestParameters; } public static class Builder { private String name; private FgResponse response; private Set<Model> requestParameters; public Builder name(String name) { this.name = name; return this; } public Builder response(FgResponse response) { this.response = response; return this; } public Builder requestParameters(Set<Model> requestParameters) { this.requestParameters = requestParameters; return this; } public FgMethod build() { return new FgMethod(name, response, requestParameters); } } public static class NameComparator implements Comparator<FgMethod> { @Override public int compare(FgMethod o1, FgMethod o2) { return o1.name.compareTo(o2.name); } } }
<reponame>CharonChui/OpenGLES3.0StudyDemo package com.charon.opengles30studydemo.circle; import android.app.Activity; import android.opengl.GLSurfaceView; import android.os.Bundle; import androidx.annotation.Nullable; import com.charon.opengles30studydemo.R; import com.charon.opengles30studydemo.triangle.TriangleRender; public class CircleActivity extends Activity { private GLSurfaceView mGlSurfaceView; @Override protected void onCreate(@Nullable Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_circle); mGlSurfaceView = findViewById(R.id.mGLSurfaceView); // OpenGL ES 3.0版本 mGlSurfaceView.setEGLContextClientVersion(3); mGlSurfaceView.setRenderer(new CircleRender()); mGlSurfaceView.setRenderMode(GLSurfaceView.RENDERMODE_WHEN_DIRTY); } }
On strong f-electron localization effect in topological kondo insulator We study strong f-electron localization effect on surface state of a generic topological Kondo insulator (TKI) system by performing a mean-field theoretic (MFT) calculation within the frame-work of periodic Anderson model (PAM) using slave-boson technique. The surface metallicity together with bulk insulation is found to require this type of localization. A key distinction between surface states in a conventional insulator and a topological insulator is that, along a course joining two time-reversal invariant momenta (TRIM) in the same BZ, there will be intersection of these surface states, even/odd number of times, with the Fermi energy inside the spectral gap. For even (odd) number of surface state crossings, the surface states are topologically trivial (non-trivial). The symmetry consideration and the pictorial representation of surface band structure obtained here show odd number of crossing leading to the conclusion that, at least within PAM framework, the generic system is a strong topological insulator. We investigate the effects of strong f-electron localization on surface state of a generic topological Kondo insulator (GTKI). The boride SmB6 is a typical example of this class of compound. Its d band metallic counterpart is LaB6. In fact, it was proposed in 2008, after the discovery of topological insulators (TIs), that SmB6 is a topological band insulator supporting metallic surface states with an insulating bulk. The angleresolved photoemission spectroscopy (ARPES) and the transport measurement on SmB6 seem to authenticate the topological interpretation of SmB6, providing persuasive affirmation of metallic surface states with an insulating bulk. In this paper, our focal point is a generic topological Kondo insulator (GTKI) and its band structure. We study strong f-electron localization effect on surface state of this system. Time to time, in the course of discussion, we shall refer to SmB6 to clarify issues which come into view. For example, the issue of categorization into weak and strong TI. A TKI like SmB6 needs to display an odd-number of band-crossings between the Sm 4f -and 5dbands (or, is it overwhelmingly 2p B ? ) for being categorized as a strong TI; an even number of crossings corresponds to a weak TI. Our analysis is based on the Periodic The official email id of the corresponding author: pgoswami@db.du.ac.in;The official email id of the first author: uptyagi@db.du.ac.in;The official email id of the second author: kbera@db.du.ac.in. Anderson Model (PAM) well-suited to discuss a Kondo insulator (KI). We shall show in section 3 that the strong f-electron localization makes GTKI fall decidedly into the former category. A KI basically corresponds to periodic array (Kondo lattice) of localized spin states, which hybridize with itinerant electron sea leading to an energy gap in the electronic density of states (DOS) whose magnitude is strongly temperature-dependent and only fully developed at low temperatures. Interestingly, KIs display metallic behavior at high temperature regime. Upon reduction of temperature, the resistivity decreases up to a minimum value followed by a divergence of the form -ln(T). As had been concluded by Konndo that such a strange variation can be ascribed to strong dependence on the conduction electron scattering by the localized magnetic moments. The s-d hybridization model put forward by Kondo displays a similar trend in resistivity up to a certain temperature, generally referred to as the Kondo temperature (Tk). At temperatures less than Tk, the resistivity is found to diverge. The proximity of periodic ions brings into play additional strong correlation effect (SCE) which leads to the renormalization of band structure and reconstruction of the hybridization gap in the density of states (DOS). While for heavy fermion metals the Fermi level coincides with a finite DOS(the chemical potential is located in the conduction band), for KI the Fermi level falls in the hybridization gap which could be either direct or indirect. Most studied Kondo insulators are FeSi, Ce3Bi4Pt3, SmB6, YbB12, and CeNiSn. Upon decreasing the temperature further, there would be coupling of the spins of the itinerant electrons and those of the impurities leading to the spin-flip scattering (SFS)and the disappearance of the -ln(T) behavior. The near disappearance of local magnetic moments, too, will occur due to the screening by the sea of conduction electrons. In fact, the spin-spin coupling (and SFS) also causes formation of spin singlets. This eventually leads to typical Doniach-like phase diagram (see section 2). The topological Kondo insulator (TKI), on the other hand, are a class of narrow gap insulator in which the gap is created by the strong f-electron correlations but, which are at the same time, topologically ordered due to large spin orbit coupling (and the odd(even)-parity of the localized f-states (conduction band)). The strongly localized f electrons and the spin-momentum locked helical liquid-like band structure in the surface of these systems give rise to exquisite electronic properties. In Figure 1 we have shown a qualitative sketch of DOS (eV -1 ) as a function of energy (eV) for a GTKI. It must be mentioned that the hybridization gap on Sm-terminated and Bterminated surfaces exhibit very similar behavior including display of a finite DOS at E =0, compatible with an additional (surface) conductance channel. Supposing Figure 1 corresponds to a Sm-terminated surface, all other features get shifted toward smaller absolute values of energy on a B-terminated surface. The periodic Anderson model, used in this communication for a GTKI, ignores the complicated multiplet structure of the d and f orbitals usually encountered in real TKIs, such as SmB6. On a quick side note, we present the structure of SmB6 to apprise reader with complications involved: Electrons in a rare earth occupy shells of either 4f n 5d 1 6s 2 or 4f (n+1) 5d 0 6s 2. The states have multiplets of energy levels: Sm4f levels split into 4f5∕2 and 4f7∕2 bands with large energy separation. There is strong onsite repulsion of f electrons. We assume in PAM that the f electrons locally interact via a Hubbard-U repulsion while the d electrons are practically non-interacting. The crystal field splits Sm 4f5∕2 bands into a 7 doublet and a 8 quartet. Away from the point, the 8 quartet further splits into 8 1 and 8 2 doublets. Furthermore, Sm 5d states exhibit with t2g and eg symmetry. These splitting are depicted in a cartoon caricature in Figure 2. In a realistic description, the starting Hamiltonian H must involve terms representing this complex multiplet structure of the d and f orbitals including the strong correlation effect. In that case, however, the analysis will be an unenviable task. Besides, such an analysis is beyond the scope of this communication. We note that the 4f electrons are closer to the nucleus in comparison with the 5d or 6s electrons. Thus, the electrons in the 4f shell are more localized (than the 5d or 6s electrons) and, consequently, their orbital angular momentum behaves like that of a free atom. On the other hand, the outer ones, such as the ones in 5d orbital are in the midst of the crystalline environment. For this reason, their angular momentum average is almost zero due to its precession in the crystal field. As regards the boride SmB6,it possesses inversion symmetry (see section 3). The Z2 topological invariants have been computed via parity analysis by previous workers and found to be Z2 = 1. On the basis of this, it was predicted by Dzero et al. that SmB6 is a topologically non-trivial system. Furthermore, within the bulk hybridization gap, signature of two dimensional Fermi surfaces on and surface planes supporting the presence of topological surface states were obtained in the quantum oscillation experiments of Li et al.. While on quantum oscillations, as a side note, it could be mentioned that Tan et al., and subsequently Sebastian et al., have uncovered a deep mystery associated with the insulating bulk of SmB6 which is the formation of a large three-dimensional (solely) conduction electron Fermi surface (FS), given that thus far such FSs have been considered the preserve of metals, in the absence of the long-range charge transport. This is possibly due to the residual density of states at the Fermi energy (shown in Figure 1) in SmB6. The existence of the residual DOS was indicated through measurements of heat capacity long ago. Now coming back to the original track, we note that recent study by Maiti et al., however, argued that the observed metallic surface states have trivial origin rendering SmB6 a trivial surface conductor. The symmetry consideration and the pictorial representation of surface band structure obtained show odd number of crossing (presented in section 3 of this paper) which leads to the conclusion that this is not true for a GTKI. We now present the organization of the paper in somewhat details: In section 2, we start with dispersive f, and d bands involving hopping (tf, td) for f, and d electrons with td >> tf. The d bands corresponds to bath which can be described by Bloch states. The assumption that correlation between electrons on the impurity ion (f band) much greater than all hopping terms has the effect of favoring single occupation of the impurity level. The correlation, being important for the formation of a magnetic moment on the localized f-orbital, arises from the Coulomb repulsion U >>td between the electrons. The next term involves f band, and d/p bands which hybridize at cryogenic temperatures (a strong spin-orbit overlap) forming an insulating gap at with the Fermi level residing in the hybridization gap. The hybridization V, between an odd-parity nearly localized band and an even-parity delocalized conduction band, plays the role of band-inversion yielding a 3D TI. These terms together constitute PAM Hamiltonian where there are two different species of electrons, namely conduction electrons and localized electrons. When U is very large ( U >> td ) and V << td, the weight of configurations with the number of f electrons significantly different from its average number is very few and far between in the ground-state wave function and charge fluctuations become effectively nonexistent. This results in transformation of the PAM Hamiltonian H PAM to Kondo lattice Hamiltonian HK that describes interaction between spins of localized and conduction electrons. The Hamiltonian HK is obtained by using a second-order perturbation with respect to hybridization V of PAM where the localized f electrons can exchange with the conduction There is a finite DOS-value at energy E = EF. This might indicate an incomplete (or pseudo-) gap, but is also compatible with an additional conductance channel at the surface. Figure 2: A cartoon caricature representation of the bulk band structure without self -energy broadening in SmB6. An alternative, conventional representation of the evolution of energy levels of the f-states in SmB6,due to intervention of the spin-orbit coupling and the crystal field, is shown in the lower panel for greater clarity. The f-states are split into J = 7/2 and J = 5/2 states by spin-orbit coupling (SOC). The J = 5/2 state, slightly below the Fermi energy EF, is split into a 7 doublet and a 8 quartet by the crystal field (CF). Away from the point, the 8 quartet is further split into 8 and 8 doublets. The hybridization between the 7, 8 bands and the conduction band opens two gaps which are denoted as ∆ (typically around 15 meV) and 3~∆. electrons bath thus allowing both charge and spin fluctuations to occur. Whereas the Hamiltonian HK leads to Kondo singlet formation, H PAM constitutes our minimalistic, starting Hamiltonian H bulk which captures essential physics of GTKI in the presence of strong f-electron localization, such as the bulk and surface band-structure topology. In section 3 we investigate the surface state Hamiltonian in slab geometry starting from H bulk. We use the Dirac-matrix Hamiltonian (DMH) method to ascertain whether SmB6 is a weak or strong TKI. It must be emphasized here that when a slab of finite thickness is considered, two surface states overlap such that off-diagonal mass-like term must be included in the surface Hamiltonian above. For this the matrix is suitable, where 5 ≡i 0 1 2 3 and j are Dirac matrices in Dirac basis. As an important step of the DMH method, one needs to check anticommutativity of the matrix with. We obtain here {H, M } ≠ 0, and therefore the topological stability of the band crossing is possible. The combined surface state Hamiltonian that we proceed with is, =, +.We find that, preserves time reversal symmetry (TRS) and the inversion symmetry (IS). The pictorial representation of surface band structure obtained by us leads to the conclusion that, at least within single impurity PAM framework, GTKI system under consideration is a strong topological insulator. The paper ends with discussion and concluding remarks in section 4. Kondo Screening A Kondo system exhibits the Kondo screening. So, while investigating a Kondo system the possibility of the Kondo screening needs to be explored. In an effort to do this, we calculate the Kondo singlet density below within PAM-Kondo framework. The PAM model on a simple cubic lattice for d and f electrons in momentum-space is as follows: We have assumed that, whereas the coulomb repulsion between f electrons on the same site could be approximated by a term involving the Hubbard-U, the d electrons are practically non-interacting. In rest of the terms, in momentum-space, d and f electrons are represented by creation (annihilation) operators d k (dk ) and f k ( f k ), respectively. Here, the index (= ↑,↓ ) represents the spin or pseudo-spin of the electrons with a as the lattice constant. The first and the second term, respectively, describe the dispersion of the f and d electrons. The parameters (,, ), and (,, ) correspond to the (NN, NNN, NNNN) hopping for the f and d electrons, respectively. The hybridization between the f-electrons (l =3and hence odd parity) and the conduction d-electrons (l =2 and hence even parity) is given by the third term. The parity is a good quantum number. It follows that at high symmetry points (HSP) in the Brillouin zone (BZ), where odd and even parity states cannot mix, the third term is zero. The presence of the hybridization node at HSP is an important feature of TKI. Furthermore, since the f-and d-states have different parities, the momentum-dependent form-factor matrix ↑,↓ ( ) involved in the third term in must be odd: ↑,↓ (− )=− ↑,↓ ( ). This is very much required in order to preserve time reversal symmetry (TRS), as the matrix involves coupling with the physical spin of the electron. Therefore, we write ↑,↓ ( ) = −2 ( ( ). ), where V is a constant parameter characterizing the hybridization, ( ) = ( sin, sin, sin ) and = (,, )are the Pauli matrices in physical spin space. In section 4, we have outlined what to use as more complicated odd-parity expressions for, to re-investigate the present problem, expecting newer information. The system shows the bulk metallic as well as the bulk insulating phases determined by the sign of. It is positive for the former and negative for the latter phase. The negative sign of is also necessary for the band inversion, which induces the topological state. Since the bandwidth of the f electrons needs to be smaller than the bandwidth of the conduction electrons, we assume that | | < < | |. Similar relations hold for second-and third-neighbor hopping amplitudes. For the hybridization parameter V we assume | V | < | |. Throughout the whole paper, we choose to be the unit of energy, except in the investigation of Kondo screening. We further assume that, while the d electrons are non-interacting, the on-site coulomb repulsion of f -electrons is given by the Hubbard U. Under the assumption that U is considerably greater than | |, one may write the thermal average of the TKI slaveboson mean-field Hamiltonian in the form (see also section 4) where the additional terms, in comparison with, are [∑ where is a Lagrange multiplier, is the chemical potential, Nd is the number of lattice sites for d electrons, and Ns corresponds to that for f-electrons. The first term describes the constraint on the pseudo-particles due to the infinite Coulomb repulsion. This ensures strong localization of f electrons. The second term compels observance of the fact that the d and f fermions are equal in number (Nd = Ns ). The reason simply is the key requirement for a Kondo insulator, viz. the formation of singlet pairing states between d and f fermions at each lattice site for which the number of d and f fermions must be equal on average. The third term is the constraint which fixes the total number of particles N (N = Nd + Ns ). An explanation to highlight the physical mechanism underlying the second constraint, and the physical interaction that enforces it, perhaps will not be irrelevant: We are investigating the Kondo screening under the assumption "large on-site repulsion (Uf >> ) between the f-electrons" (and no interaction Ud between conduction electrons). In this situation each of the impurities simply becomes an isolated magnetic moment correlated with an itinerant electron spin. The necessity of "chemical potential" is rooted in the correlation between impurity and conduction electron spins. The interaction involved is the spin-spin exchange interaction. It is clear from Eq. that the hybridization parameter is renormalized by the c-number b. It is also clear that the dispersion of the f -electron is renormalized by and its hopping amplitude by b 2. The total parameters are, thus, the Lagrange multiplier, auxiliary chemical potentials and ( is a free parameter), and slave-boson field b. In order to make this paper self-contained we found necessary to include these facts, though these are explained clearly in ref.. The minimization of the thermodynamic potential per unit volume with relative to the parameters (b,, ) yields equations to determine them: = −( ) (− ℵ (,, )); / = 0, / = 0, and / = 0, where =(kB T ) -1, kB is Boltzmann constant and T is temperature. The method outlined in refs. has been used to calculate the thermodynamic potential.,. This is the fourth equation with - as the first three and we have four unknowns, viz. ( b,,, ) where ≈ 4.13 is the lattice constant and is the Fermi wave number. We shortly explain why a single value to the Fermi wave vector ( ) is assigned. In view of the fact that the chemical potential is a free parameter and could be somewhere between the valence and the conduction bands ( > ∈ ( ) ( ), ∈ ( ) ( )), once again it is easy to see that in the long wavelength (i.e. low-lying states) and the zero-temperature limit one may write the imposed restriction as 2 The integration on the left-handside is non-trivial, for assigning a single value to the Fermi wave vector ( ) of an anisotropic (lattice) band structure whose Fermi surface(FS) may not be a sphere is inappropriate, However, as mentioned in section I, the formation of a large threedimensional (solely) conduction electron FS takes place in the insulating bulk of SmB6. Deriving support of this mysterious finding, we assume FS to be a sphere in the first approximation. This leads to the equation After a little algebra, we find that whereas and together yield = −6 + 6, Eq. yields = −3 + 3.This equation for will be extremely useful in section. We now estimate ( ) in the following manner: Since the effective mass * (Fermi velocity * ) of the particles in low-lying states is known to be about 100me ( < 0.3 eV-), the relation * = ℏ * yields ( )~ 0.2 which is consistent with the long wavelength limit we have taken. The two values of obtained from are 0.9430 and 0.0565. As we see below in Eq., when b is nonzero the system corresponds to a Kondo state, and, when b is zero, the system is a non-interacting, dispersive lattice gas mixture of itinerant electrons and charge carrying heavy bosons( see section 4). The admissible value of b will be thus 0.9430. As all the unknown parameters have been determined now, the stage is set to consider the Kondo screening. We calculate the Kondo singlet density which is defined as Ksinglet(,,,, ) = . This average is the ultimate signature of the Kondo insulating state, where there is precisely one conduction electron paired with an impurity spin. The important point now is that a large U puts down charge fluctuations on the local moment site. The corresponding "charge degree of freedom" is "quenched". The degree of freedom that remains at the impurity is its spin. Naturally, the Hamiltonian should contain a term Hk comprising of the spin operator of the impurity and the conduction electron spin. Suppose, Sm denotes the m th-site impurity spin operator, and s = is that for the conduction electron spin, where is the fermion annihilation operator at site-m and spin-state (=↑,↓) and z is the z-component of the Pauli matrices. The required term Hk can now be written as . This is an anti-ferromagnetic exchange-coupling term representing the exchange interaction between the itinerant (conduction) electrons and impurity magnetic moment in the system. For | | >1,we may approximate the impurity spins as classical vectors. This allows us to replace the exchange coupling constant by M = --( | || | / ). I t follows that the exchange field term gives the dimensionless contribution to the Hamiltonian in in the basis (dk↑ fk↑ dk↓ fk↓ ) T in the momentum space. We notice that since a band electron hops on to the impurity site to gain kinetic energy or the impurity electron hops on to the band to lose kinetic energy, the spin flip during such hopping gives rise to an antiferromagnetic (AFM) exchange interaction term. Another important point is that in the local moment limit, the Anderson and Kondo couplings describe the same physics. A fundamental difference between them, however, is that the Anderson model includes charge fluctuations which determine the coupling, while there is absence of the spinorbit coupling (V << ) in the Kondo model which includes only spin-spin interactions. The interaction is non-zero only in the local moment regime. The complete derivation of AFM interaction can be found in terms of the Schrieffer-Wolff transformations. The averages 〈d. d, 〉, 〈bs. bs, 〉, etc. have been calculated below in the finite-temperature formalism as outlined above in page 8. We find We also notice that the location of QCP depends on and. For example, QCP value increases with decrease in | | when and are held fixed. Surface State Hamiltonian The next important issue is how to get surface state Hamiltonian = ℵ, for slab geometry from that of bulk ℵ,, in the non-local moment limit. To explain, we first consider a slab with length, breadth, and thickness in the x, y, and z directions, respectively. The thickness is limited in z ∈ . We further assume the non-open boundary conditions. We can thus replace kz by − i∂z, as in this case kz is not a good quantum number. The Hamiltonian ℵ, can be obtained from the Hamiltonian ℵ,, = − considering a set of ortho-normal basis states {| ⟩, = 1,2,3,4} satisfying the completeness condition I= ∑ | ⟩⟨ |. The issue of obtaining surface state Hamiltonian is thus settled. In terms of these basis states, an arbitrary state vector |〉 can be written as |〉 = ∑ | ⟩⟨ |〉. We now turn to the operator equation |〉 = |〉 where |〉 an arbitrary state vector. Again, in view of the completeness condition, one can write Now, form the inner product ⟨|〉, where ⟨|〉 = (⟨|〉) *. We have With this ansatz, the matrix elements may be written as In the basis (,↑,↑,↓,↓, ) T, the same bulk Hamiltonian will be given as Therefore, upon using, ℵ, consistent with Eq. is given by which is equal to where =, =, =,, and in the long wavelength limit 1(K) = − − − 6 +, and 2(K) =− + + − 6 + +. It may be noted that, in view of, 1(K) ≈ 2(K). The Dirac matrices in Dirac basis is given by j where j =, and where are Pauli matrices. A fifth related matrix is usually defined as 5 ≡i 0 1 2 3 = In what follows we, however, choose the simpler matrix, namely M, hoping that the choice is not going to affect the aim stated above. The outcome of the inclusion of the mass-like term is that there would not be chiral liquid on the surface. There is, however, possibility of helical liquid provided we are able to see that the system is a strong TI. We shall show below the suitability of the matrix M. As a first step of the DMH method, one needs to check the following: We consider non-spatial symmetries. These are symmetries which do not transform different lattice sites into each other. There are three different non-spatial symmetries that need to be considered: particle-hole symmetry (PHS) P, chiral symmetry (CS), and anti-unitary time-reversal symmetry (TRS). If a complex conjugation operator K is multiplied on the left side by a unitary matrix U, the resultant matrix UK is referred to as anti-unitary. It can be easily seen that for 4 4 matrices = ∑y K (this definition ensures anti-unitary), P = ∑x K, and C = diag(1,. If they do not anti-commute (do anti-commute), i.e. any sort of correlation does not exist(exits) between M and H, then the band crossing cannot be gapped out (can be gapped out) which means the band crossing is topologically stable (unstable). We obtain here {H s, M } ≠ 0, and therefore the topological stability of the band crossing is seemingly possible. The surface state Hamiltonian that we proceed with now is H k, k = H k, k + M. It is easy to see that the Hamiltonian H k, k commutes with the operator. Consequently,H k, k needs to satisfy the identity H(-k)= H(k) −1. In view of (K) = (K), i t can be easily checked that H −k, −k = H k, k. The identity implies that if energy band E(k), of a time-reversal(TR)symmetric system, satisfies E(k) =E(−k)) for a TR-invariant momentum (TRIM) pair ( k,−k ) called Kramers pair, the relation −k +G = k (where G is a reciprocal lattice vector) is satisfied by such a pair due to the periodicity of the BZ. Also, one can gap out the helical edge states by introducing a Zeeman term that explicitly breaks the protecting time-reversal symmetry. As we will be showing below, we do obtain a term referred to as the pseudo-Zeeman term (PZT) in the single-particle spectrum which has different sign for opposite spins and no connection with momentum. Now, usually, the effects of an external magnetic field, B, perpendicular to the TI film are captured by two additional terms in the film Hamiltonian. The first term describes the orbital coupling to magnetic field through the minimal coupling kx → kx + (e/c)Ax, where A = is the vector potential in the Landau gauge. The second term describes the coupling of the spins to the magnetic field and is given by the Zeeman contribution. Thus, the PZT term in question does not act like a magnetic field here in real sense. The Hamiltonian H k, k = H k, k + M is spin non-conserving, as ≠ 0. The reason is the presence of the spin-orbit coupling. In fact, due to the spin-orbit coupling, the fstates are eigenstates of the total angular momentum J, and hence hybridize with conduction band states with the same symmetry. Furthermore, we find that The absence of chiral symmetry ensures that the Hamiltonian, could not be brought to an off-diagonal form by a unitary transformation. For example, in a Su-Schrieffer-Heeger chain one can move the end states away from zero energy by breaking the chiral symmetry at the surface and/or in the bulk. We also obtain i.e. P-H Symmetry breaking. We wish to identify the effects of P-H symmetry breaking on the magneto-optical conductivity of the system in a sequel to this paper. Finally, the space inversion operator (the eigenvalue of the operator is ±1 as 2 = 1 ), acting on a state vector in position/momentum representation, brings about the transformations x→−x, →, and k→−k where x stands for spatial coordinate, signifies the spin, and k stands for momentum. ForH k, k, it follows that H k, k −1 = H k, k,where H −k, −k = H (kx, ky). Hence, the system preserves inversion symmetry (IS). The surface state Hamiltonian that we proceed with now is H k, k = H k, k + M.This is TRS and IS invariant. But it breaks PHS and CS. We, where = ±1 is the spin-index and = ±1 is the band-index. The first term (z0/2) acts as an in-plane Zeeman term. The pseudo-Zeeman term of the spectrum comes into being due the presence of the mass-like term M0. Without this term, the spectrum reduces to a bi-quadratic rather than a quartic. The possible role of this term is that of the polarization-usherer. The other functions appearing in are defined as follows: The surface states correspond to the eigenstates corresponding to the eigenvalues in. In an effort to examine the possibility of helical spin liquids, we have plotted the surface state energy spectrum given by Eq. for dimensionless wavevector as a function of the dimensionless wave vector( aK) in Figure 4 for finite mass-like coupling and the various values of the chemical potential. Since the conduction bands are partially empty, the surface state will be metallic. In all figures, is negative and therefore the figures correspond to insulating bulk. The important question is have we been able to show SmB6 as a strong/ weak TI? The answer is not yet. For this purpose, we recall there is a key distinction between surface states in a conventional insulator and a topological insulator. The explanation is given below: We first recall what has been stated above. The TRS identity −, − =, −1 satisfied here means that the energy bands come in (Kramers) pairs. The pairs are degenerate at the TR-invariant momentum (TRIM) where +K becomes equivalent to −K due to the periodicity of the BZ, i.e. K +G = −K where G is a reciprocal lattice vector. Now consider Figures 4(a) -(d). An inspection yields that, in the band structure displayed in 4(a), TRIM is K = (±1,0) /(0, ±1), in 4(b) also K = (±1,0) /(0, ±1), in 4(c) K = (±2,0) /(0, ±2), and in 4(d) K = (±3,0) /(0, ±3). The reason is that K s satisfy the condition + = −. For example, K = (±1,0) and = ( ∓2,0) added together will give − = ( ∓1,0). In figure 4(c), the momentum K= (±2,0) or(0, ±2) obey K+ G = −K where G is the reciprocal lattice vector (∓4,0) or (0, ∓4). Similarly, in figure 4(d), the momentum K= ( ±3,0) or (0, 3±) obey K+ G = −K where G is (∓6,0) or (0,∓6). Let us now note that the Fermi energy EF inside the gap intersects these surface states (in the surface multi-band structures) in the same BZ either an even or odd number of times. If there are odd number of intersections at TRIMs, which guarantees the time reversal invariance, the surface state is topologically non-trivial (strong topological insulator), for disorder or correlations cannot remove pairs of such surface state crossings (SSC) by pushing the surface bands entirely above or below the Fermi energy EF. This has been checked in Figure 4 by assigning different values to the chemical potential. We notice that the number of paired SSCs in each of the figures in Figure 4 is three(odd). However, amongst the three pairs of momenta (K,−K), only one in each of the figures satisfies the relation − = +. So, the number of TRIM involved in SSC is one(odd). When there are even number of pairs of surface-state crossings, the surface states are topologically trivial (weak TI or conventional insulator), for disorder or correlations can remove pairs of such crossings. The inescapable conclusion is that the system under consideration is a strong topological insulator. The material band structures are also characterized by Kane-Mele index Z2= +1 (0 = 0) and Z2= −1 (0 = 1). The former corresponds to weak TI, while the latter to strong TI. The symmetry analysis and graphical representations lead to conclusion that the system considered here is a strong TI. The TKI surface, therefore, comprises of 'helical liquids' in the slab geometry, which (helicity) is one of the most unique properties of a topologically protected surface. A recent report of a spin-signal on the surface by the inverse Edelstein effect has confirmed the helical spin-structure. Discussion and conclusion We have started with periodic Anderson model (PAM) -a model for a generic TKI in the section 2 of the present communication. The model is quadratic in creation and annihilation operators without the on-site repulsion (Uf) between the f-electrons. The quadratic Hamiltonian makes the calculation of the relevant Matsubara propagators extremely simple. To investigate the model with Uf, the slave boson technique (SBT) is employed in the mean-field theoretic(MFT) framework. The technique falls back on the conjecture that electrons can transmute into spinons and chargons (s-c). The s-c bound state needs to be fermionic to preserve the Fermi-Dirac statistics of the electrons. The two ways to have it on board are, (i) if the spinon is fermionic, the chargon should be bosonic (slave-boson) and, on the other hand, (ii) if the spinon is bosonic, the chargon should be fermionic (slave-fermion). Suppose, now the operators b (light slave-boson creation operator) and c (heavy slave-boson creation operator), respectively, creates empty bosonic impurity states and doubly-occupied states. Since the latter is prohibited for large on-site repulsion (Uf >> ) between the f-electrons, the operators c and c need not be taken into account when Uf >>. However, we need to take into account the remaining auxiliary operators ( s, b ) where the single site fermionic (bosonic) creation operator is denoted by s ( b ). The operator s ( b ) corresponds to the electron's spin(charge). The link between these auxiliary operators ( s, b ) to the physical f-electron operator is f = s b. In our SBT-MFT framework with Uf >>, we make the further assumption that slave-boson field (b) at each lattice site can be replaced by a c-number. The crucial anti-commutation relation { f, f } = ' between the physical f-electron operators implies that the auxiliary operators will then satisfy the relation { s, s '} = b --2 '. Furthermore, the restriction ∑ s s + b b = 1 or, ∑ 〈s s 〉 ≅ 1 − b at a site needs to be imposed to take care of the conservation of auxiliary particle number. Thus, the complications associated with the large on-site repulsion (Uf >> t ) between the f-electrons is conveniently circumvented in the SBT by imposing a constraint to remove the double occupancy. The signature of the assumption "large on-site repulsion (Uf >> t ) between the felectrons" is being carried over by the parameter and b which are present in 2 (the defining equation could be found below ). The term 2 is very significant for the surface state energy spectrum given by. Thus, the outcome noted above, viz. surface band structure showing odd number of crossing, is a consequence of the assumption. It will be interesting to re-investigate the problem with Uf > t (i.e. the on-site repulsion between the f-electrons is moderately strong) where the double occupancy is permissible. The slave-particle mean-field-theory is valid at very low values of temperature(T → 0). Moreover, we have neglected the dynamics of the boson field completely as the light slave-boson creation and destruction operators were replaced by a c-number'b'. This approximation has reduced the system to a noninteracting one with the bulk spectral gap dependent on the parameters ( b,,, V). Whereas the first two parameters take care of the strong correlation effect between the f-electrons, the hybridization parameter V is the harbinger of a topological dispensation. In the expression of the momentum-dependent form-factor matrix, we have taken into account only the lowest-order cubic harmonics. In fact, our intention is to use more complicated odd-parity expressions for and re-investigate the present problem bringing about some improvement in the surface Hamiltonian. This is expected to facilitate more refined analysis of odd/even number crossing issue. We summarize below our progress for the benefit of reader. Let us consider the momentum-dependent form-factor matrix involved in the third term in Eq.. This term actually is given by where the fermionic operator d creates a Bloch state with k and ∈ {↑, ↓} being momentum and physical spin quantum numbers, respectively. The fermionic operator f creates a localized Kramers doublet state | f : R = 0, mj > associated with the crystal field effect and spin-orbit coupling. In the case of SmB6 the lowest-lying Kramers doublet is | ( ) = |m = ±. So, mj ∈ {↑, ↓} is a pseudospin quantum number, corresponding to the two possible values of the projection of total angular momentum in the lowest-lying Kramers doublet. We assume that the hybridization operator has a spherical symmetry in the vicinity of the heavy atom. Also, we expand the Bloch wave of s = 1/ 2 fermion in terms of spherical harmonics and partial waves. Besides, the lowest-lying Kramers doublet state can be can be decomposed into radial and angular part. We further assume a constant hybridization amplitude (CHA). One can now rewrite the effective hybridization matrix elements by using these assumptions as a product of CHA, Clebsch-Gordan coefficient for s = and the spherical harmonics. One can then calculate the hybridization matrix for two interesting cases, viz. (i) l = 1, s = 1 /2, j = 1/2 and mj = ± 1 2 (ii) l = 3, s = 1/2, j = 5/2 and mj = ± 1/ 2. In the former case, we find the form factor is equal to a product of V0, an odd spin, and odd momentum operator. Therefore, it is time-reversal invariant. In the latter case (which corresponds to SmB6), it is of form {V0k 3 det} where 'det' is determinant involving spherical harmonics. All the matrix elements of the Hamiltonian will now have to be correct up to O(k 3 ) including the hopping terms for the consistency sake. One then expects to find better version of the surface state Hamiltonian to investigate the odd/even number of crossing issue. Furthermore, we shall have a more accurate platform of investigating theoretically the mysterious behavior of bulk insulator SmB6 displaying metal-like Fermi surface even though there is no long-range transport of charge. The effect of Bychkov − Rashba term on the present system is quite interesting. In order to show why is it so, we proceed with new surface state Hamiltonian H k, k = H k, k + Bychkov − Rashba tervm, where the two by two matrix equivalent of the latter is A0 = and is the strength of the interaction. It is imperative to assume that there must be metals such as Au, on the surface in close proximity or deposition of particles with considerably high Rashba spin-orbit (RSO) interaction strength on the surface of material. Assuming that the Rashba interaction is between f-electrons only, we write the surface state Hamiltonian, in the basis (,↑,↑,↓,,↓ ) T, as where ( ) = − −, A =, and A =.The equation to find the eigenvalues of the Hamiltonian is a bi-quadratic. This yields the following roots Since all four bands are partially empty, the surface state will be metallic. The hopping integral is negative and therefore the system corresponds to insulating bulk. In Figure 5, the two bands and appear to be degenerate. They are, in fact, not so as that would demand fulfilment of the inadmissible condition ( ) = 0. Actually, they are too close to appear as resolved in Figure 5(a). As we have noted, if there are an odd (even) number of TRIM related surface state crossings (SSC), the surface states are topologically non-trivial (trivial). We find that, with greater resolution, there are no TRIM involved SSCs (the apparent near-degeneracy of and may mislead us to believe that there are even number of TRIM linked SSCs) in Figure 5 (b). This means disorder or correlations can remove pairs of such crossings by pushing the surface bands entirely above or below the Fermi energy EF. Seemingly, the broken IS due to the Bychkov − Rashba term, ushers in the change from the strong topological insulator to a conventional one. A detailed investigation is required before we announce the final verdict. In conclusion, we are aware of the fact that the investigation presented does not take into account of the specific electronic structure of the real TKI system, such as SmB6. This makes the work less useful. In a sequel to this paper this issue will be addressed. Moreover, we recall that, in a slab geometry, the top and bottom of the slab interface with vacuum and hopping events between the surface states on the bottom and top opens a finite gap at the point (k = 0). Off-diagonal mass-like terms must be included in the surface Hamiltonian, in a suitable basis, to characterize the opening of this finite gap. The point we wish to make is that while, in hopping, a particle has to have energy greater than or equal to that of the height of the potential barrier (in between atoms at the top and bottom) in order to cross the barrier, in tunneling the particle can cross the barrier even with energy less than the height of the barrier. Besides, the former is classical whereas the latter, which depends on the width of the barrier, is a quantummechanical phenomenon. Thus, our assumption of the 'occurrence of the hopping only' needs to be supplemented with an account of the tunneling. In fact, a full-proof description must account for all processes that make an electron cross from one atom to another.
import torch import torch.nn as nn class BertClassification(nn.Module): def __init__(self, bert_model, num_labels): super(BertClassification, self).__init__() self.bert = bert_model self.pooler = nn.Sequential(nn.Linear(bert_model.config.hidden_size, bert_model.config.hidden_size), nn.Tanh()) self.fc = nn.Linear(bert_model.config.hidden_size, num_labels) def forward(self, x, mask, segment_ids): x = self.bert(x, mask, segment_ids) pooler_output = self.pooler(x[:, 0, :]) return torch.log_softmax(self.fc(pooler_output), dim=-1)
#include <iostream> #include <cstdio> using namespace std; int main(){ int n; long long dp[20][20]; int mt[20][20][20][20]; cin >> n; for(int k=0;k<n;k++){ int gx,gy; cin >> gx >> gy; for(int i=0;i<=gy;i++) for(int j=0;j<=gx;j++) dp[i][j] = 0; for(int i=0;i<=gy;i++) for(int j=0;j<=gx;j++) for(int n=0;n<=gy;n++) for(int m=0;m<=gx;m++) mt[j][i][m][n] = 0; int mata; cin >> mata; for(int i=0;i<mata;i++){ int x1,y1,x2,y2; cin >> x1 >> y1 >> x2 >> y2; mt[x1][y1][x2][y2] = 1; mt[x2][y2][x1][y1] = 1; } dp[0][0] = 1; for(int i=0;i<=gy;i++){ for(int j=0;j<=gx;j++){ if(i-1<0 || mt[j][i-1][j][i] || dp[i-1][j]==0){ if(j-1<0 || mt[j-1][i][j][i] || dp[i][j-1]==0){ continue; } else dp[i][j] = dp[i][j-1]; } else if(j-1<0 || mt[j-1][i][j][i] || dp[i][j-1]==0){ dp[i][j] = dp[i-1][j]; } else dp[i][j] = dp[i-1][j]+dp[i][j-1]; } } if(dp[gy][gx] == 0) printf("Miserable Hokusai!\n"); else printf("%d\n",dp[gy][gx]); } return 0; }
<gh_stars>10-100 #pragma once #include "server/ServerState.h" #include "ext/sokol/sokol_defs.h" #include "client/System.h" namespace sf { struct FastRay; } namespace cl { #if SF_OS_WASM #define CL_SHADOWCACHE_USE_ARRAY 1 #define CL_SHADOWCACHE_TEX TEX_shadowGridArray #else #define CL_SHADOWCACHE_USE_ARRAY 0 #define CL_SHADOWCACHE_TEX TEX_shadowGrid3D #endif struct PointLight { sf::Vec3 position; float radius; sf::Vec3 color; sf::Vec3 shadowMul; sf::Vec3 shadowBias; void writeShader(sf::Vec4 *&dst) { dst[0].x = position.x; dst[0].y = position.y; dst[0].z = position.z; dst[0].w = radius; dst[1].x = color.x; dst[1].y = color.y; dst[1].z = color.z; dst[1].w = 0.0f; dst[2].x = shadowMul.x; dst[2].y = shadowMul.y; dst[2].z = shadowMul.z; dst[2].w = 0.0f; dst[3].x = shadowBias.x; dst[3].y = shadowBias.y; dst[3].z = shadowBias.z; dst[3].w = 0.0f; dst += 4; } }; struct PointLightFilter { bool bounce = false; }; struct LightSystem : EntitySystem { static sf::Box<LightSystem> create(); virtual void addPointLight(Systems &systems, uint32_t entityId, uint8_t componentIndex, const sv::PointLightComponent &c, const Transform &transform) = 0; virtual void updateLightFade(const FrameArgs &frameArgs) = 0; virtual void queryVisiblePointLights(const VisibleAreas &visibleAreas, sf::Array<PointLight> &pointLights, const PointLightFilter &filter={}) const = 0; virtual void queryVisiblePointLights(const VisibleAreas &visibleAreas, sf::Array<PointLight> &pointLights, const sf::Bounds3 &bounds) const = 0; virtual void renderShadowMaps(Systems &systems, const VisibleAreas &visibleAreas, uint64_t frameIndex) = 0; virtual void setIblEnabled(bool enabled) = 0; virtual sg_image getShadowTexture() const = 0; virtual sg_image getEnvmapTexture(const sf::Bounds3 &bounds) const = 0; }; }
import { BaseEntity, Column, Entity, ManyToOne, PrimaryGeneratedColumn, } from "typeorm"; import PostReview from "./PostReview"; @Entity() export default class PostReviewRestaurant extends BaseEntity { @PrimaryGeneratedColumn() id: number; @Column({ nullable: false }) name: string; @Column("text", { nullable: true }) text: string; @Column({ nullable: false }) rating: number; @ManyToOne(() => PostReview) review: PostReview; }
The English philosopher C. D. Broad once noted that “the nonsense written by philosophers on scientific matters is exceeded only by the nonsense written by scientists on philosophy.” You might think there could be no better illustration of Broad’s dictum than Richard Dawkins’s unhappy forays into the philosophy of religion. If so, you should take a look at the latest volume from Stephen Hawking and Leonard Mlodinow. To be sure, the bulk of The Grand Design is devoted to a fairly lucid exposition of the central theories of modern physics. Had Hawking and Mlodinow stuck to science, there would have been little to object to. (Though also little reason to take notice. Did we really need yet another popular account of relativity, quantum mechanics, and string theory?) But they have grander ambitions: a new philosophy of science, in the service of a new theory of the origins of the universe, one that will forever put paid to the claims of natural theology. “Philosophy is dead,” Hawking and Mlodinow assure us, for science can now do what philosophers have tried to do, only better. Unfortunately, their attempt at one-upmanship proves only that Cicero’s famous quip about philosophers may have been misdirected; for The Grand Design demonstrates conclusively that there is nothing so absurd but some scientist has said it. #page#Of course, there is much more to it than that — like a scientific theory, a complex philosophical argument cannot adequately be defended in the course of a book review written for a general audience — but Hawking and Mlodinow don’t even rise to the level of simplistic summary. And while an atheist might object to the argument in various ways, asking “What caused God?” simply misses the point. It is like asking “Why couldn’t a Euclidean triangle have sides that aren’t straight?” A triangle without straight sides just wouldn’t be a Euclidean triangle, and a “God” who could in principle have had a cause just wouldn’t be the sort of God that the First Cause argument is arguing for. Their argument for this remarkable claim is, shall we say, rather sketchy. But the main problem with it is that it is simply incoherent, a metaphysical impossibility. Philosophers and scientists alike have for millennia acknowledged as a necessary truth the principle that nothing can be the cause of itself. The reason is that the very idea of something causing itself is self-contradictory: If a thing were to cause itself, it would have to exist prior to itself, in which case it would already exist and not need to be caused. (“Prior” need not entail “earlier in time”; the same incoherence arises even if we think of a cause and its effect as simultaneous, and interpret “prior to” as meaning “more fundamental than.”) Hawking and Mlodinow do not even acknowledge, much less attempt to answer, this traditional “self-contradiction” objection to the idea of self-causation — despite insisting on “consistency” as an essential criterion for any sound theory. This is the sober, scientific alternative to natural theology? #page#It gets worse, if that is possible. Our authors put forward as a novel philosophy of science something they call “model-dependent realism.” Judging from the name, you might expect that their position is a version of realism — the view that the entities described by scientific theories really exist objectively — and sometimes Hawking and Mlodinow write as if that is indeed what they think. Unfortunately, they also say things that contradict this. For example, in some contexts they tell us that where “physical theories or models accurately predict the same events, one cannot be said to be more real than the other; rather, we are free to use whichever model is most convenient” — which sounds like what philosophers of science call instrumentalism rather than realism. In other contexts they say that “mental concepts are the only reality we can know . . . a well-constructed model creates a reality of its own,” which appears to entail idealism, the view that all reality is mind-dependent. And in yet other contexts they give the impression that what model-dependent realism is really about is the idea that “we have to employ different theories in different situations,” and should not expect all correct scientific models to be reducible to physics. That sort of view can indeed be interpreted in a realist manner, but in that case it is as old as Aristotle and not novel at all. The trouble is that Hawking and Mlodinow simply provide us with no clear or consistent account of what model-dependent realism is supposed to be. And their overall argument trades on this ambiguity: Some of their claims require interpreting the relevant physics realistically, some require interpreting it instrumentally, and some may even require interpreting it idealistically. This is a textbook example of what logicians call the fallacy of equivocation. Had they bothered to acquaint themselves with work done in the philosophy of science, they would have known that their views are not at all novel where they are defensible, and completely muddled where they are original. But while philosophers of science typically consider it a prerequisite to serious work in the field to master the science they comment on, Hawking and Mlodinow repeatedly and confidently pronounce upon philosophy without doing their homework. (Their asides on the history of philosophy, the problem of free will, and the mind-body problem are as embarrassingly amateurish as what they have to say about the philosophy of religion and the philosophy of science.) They ignore their critics too — some of the problems I’ve noted here can be found also in Hawking’s famous book A Brief History of Time, and were pointed out 20 years ago by philosopher William Lane Craig. Embedded as they are in this fabric of errors, even the otherwise useful expositions of relativity, quantum mechanics, and string theory are bound to be highly misleading to the non-expert reader. What comes across like mad science is really just bad philosophy. Next time, fellas, stick to physics, and leave the metaphysics to the experts. – Mr. Feser is the author of Aquinas: A Beginner’s Guide and The Last Superstition: A Refutation of the New Atheism.
<gh_stars>1-10 //! A helper crate for testing Rust code blocks in Markdown. #![doc(html_root_url = "https://docs.rs/doubter/0.2.0-dev")] mod config; mod extract; mod render; mod tree; mod util; use crate::config::Config; use crate::render::RenderContext; use proc_macro::TokenStream; use proc_macro2::TokenStream as TokenStream2; #[proc_macro] pub fn generate_doc_tests(input: TokenStream) -> TokenStream { let config = parse_config(input).expect("failed to parse input as Config"); inner(config).into() } fn parse_config<T>(input: T) -> syn::parse::Result<Config> where T: Into<TokenStream2>, { syn::parse2(input.into()) } fn inner(config: Config) -> TokenStream2 { let renderer = RenderContext::init(config).unwrap_or_else(|e| { panic!("error during initializing render context: {}", e); }); let mut tokens = TokenStream2::new(); renderer.render(&mut tokens).unwrap_or_else(|e| { panic!("error during generating doc comments: {}", e); }); tokens }
class Result: """ Holds the fields associated with a result """ def __init__(self, json="", id="", query="", timestamp="", title="", content=""): if json: self.id = json["id"] self.query = json["query"] self.timestamp = json["timestamp"] self.title = json["title"] self.content = json["content"] else: self.id = id self.query = query self.timestamp = timestamp self.title = title self.content = content def as_dict(self): return { "id": self.id, "query": self.query, "timestamp": self.timestamp, "title": self.title, "content": self.content }
As in any organisation, there is a certain level of staff turnover, and the article admits that the number of people leaving the European External Action Service is well below what could be regarded a reason to worry. People change jobs within the EU institutions – that is quite normal. You say three people 'quit the cabinet'. The people who left the cabinet did so to move onto other senior jobs as a normal part of their career progression. The article produces absolutely no evidence whatsoever to back the journalist's assertion that anybody left because they did not like their jobs. The attribution of critical quotations to unnamed 'sources' is extremely weak, to say the least. Your claim that 'staff do not know who does what in the organisation' is nonsense. Anyone in any doubt simply has to look at the freely-available organisation chart. Relations between the High Representative and her cabinet and the rest of the staff are very good and the service is now achieving excellent results – witness the recent policy initiatives on Libya or the work done on the Middle East Peace Process. I have yet to meet anyone who 'cannot get access to email' or who does 'not have a working telephone on their desk'. Neither reimbursements for foreign missions nor medical fees are paid late. I can say from personal experience that I always receive mine in good time. All EU delegations have the technology to transmit restricted documents and those that need to do so can take information up to the level of secret. Your claim that ex-Commission staff get preferential treatment from the Commission's human resources department is ridiculous. The EEAS has its own HR service. The article talks about Member State diplomats being 'parachuted' into the EEAS. That is the whole point. The agreement on setting up the EEAS was that at least one third of its staff should come from the Member States by 2013. We are well on the way to achieving that target. The notion that other EU institutions are somehow attempting to usurp the EEAS is laughable. The role of the EEAS is set out in black and white in the Lisbon Treaty. I would be grateful if you would publish this letter, in order to put the record straight. Nine months into its life, the EEAS is up to cruising speed and doing effective work around the world on behalf of the EU27. British foreign minister William Hague on Monday said his country would "never" agree to the idea of a single EU military headquarters to replace the command centres scattered around five member states. The idea is part of a report prepared by EU foreign and security policy chief Catherine Ashton.
Fixes looks at solutions to social problems and why they work. In the district of Asosa, the land is thick with bamboo. People plant it and manage the forests. They rely on its soil-grabbing roots to stabilize steep slopes and riverbanks, cutting erosion. They harvest it to burn for fuel, to make into charcoal sticks to sell to city dwellers and to build furniture. Asosa is not in China, not even in Asia. It is a district in the west of Ethiopia, on the Sudanese border. To many people, bamboo means China. But it’s not just panda food — mountain gorillas in Rwanda also live on bamboo. About 4 percent of Africa’s forest cover is bamboo. Soon it may be much more. Bamboo may provide a solution to a very serious problem: deforestation. In sub-Saharan Africa, 70 percent of the people cook their meals over wood fires. The very poorest cut down trees for cooking fuel; those slightly less poor buy charcoal made from wood in those same forests. Every year Africa loses forest cover equal to the size of Switzerland. Terence Sunderland, a senior scientist at the Indonesia-based Center for International Forestry Research, said that in southern Africa, even trees that can be used for fine carving, such as ebony and rosewood, are being cut down and made into charcoal. Deforestation starts a vicious circle of drought and environmental decline. Burning wood releases the carbon stored inside. And deforestation accounts for at least a fifth of all carbon emissions globally. As tree cover vanishes, the land dries out and the soil erodes and becomes barren — a major reason for Ethiopia’s periodic famines. Reliance on hardwood fuel poses more present dangers as well. It’s a woman’s job to collect firewood, and when trees are scarce, women must walk farther and farther to find it, an often dangerous journey. Much cooking, moreover, is done indoors. The resulting air pollution kills some two million people a year. Almost half the deaths are from pneumonia in children under 5. Bamboo and charcoal made from bamboo burn more efficiently and cleanly than wood and wood charcoal Sunderland is talking to several southern African governments about bamboo. Farther north, the International Network for Bamboo and Rattan, a membership organization of 38 countries based in Beijing, is providing technical support for growing and using bamboo in Ghana and Ethiopia. Inbar How does bamboo improve on hardwood? Cut down a hardwood tree and it’s gone. It will take several decades for another to grow in its place; it can take a century for a forest to grow back after cutting. But bamboo is a grass, not a tree. Under the right conditions, it can grow a full meter a day — you can literally watch it grow. It is also fast maturing. A new bamboo plant is mature enough to harvest after three to six years, depending on the species. Most important, bamboo is renewable. Unlike hardwood trees, bamboo regrows after harvesting, just as grass regrows after cutting. After it is mature, bamboo can be harvested every single year for the life of the plant. Bamboo has other advantages. Its roots grab onto soil and hold it fast. Plant bamboo on a steep slope or riverbank and it prevents mudslides and erosion. And bamboo is parsimonious with Africa’s most precious resource: water. “In Africa you want everything,” said Dr. Chin Ong, a retired professor of environmental science at the University of Nottingham in England, who was formerly a senior scientist at the World Agroforestry Center in Nairobi. “You want firewood, you want to reduce erosion, to maintain the water supply, generate cash and employment. Bamboo comes the closest — it gives you the most things.” The need for firewood is now critical in Ethiopia; trees covered 35 percent of the country a century ago; by 2000 they covered just 3 percent. Ethiopia is trying to reverse deforestation by planting trees, and it lags behind only China and India in sheer numbers — in 2007 alone the country planted 700 million trees. But even a huge, continuing campaign may not be enough to reverse deforestation. It has been a problem wherever people settled in Ethiopia. The country’s capital had to be moved five times since the first century B.C., because any concentration of people quickly ran out of firewood. In the 1890s the problem was solved by importing eucalyptus from Australia — a tree that, like bamboo, is renewable. The first plantations were around Addis Ababa, Ethiopia’s new capital, which at times has gone by the name Eucalyptopolis. But while eucalyptus trees provide a renewable source of wood, they starve other trees and plants of water, and rob water from rivers and reservoirs. They gobble so much water that they are sometimes planted for the purpose of draining swamps. By 1913, the government issued a proclamation ordering the destruction of all eucalyptus trees. It was ignored. Inbar In the last five years or so, Ong said, Ethiopia has realized that bamboo is a more profitable and greener solution. INBAR’s program is a four-year project financed by the European Commission and the Common Fund for Commodities, a United Nations organization. The technology comes from China. The project provides bamboo seedlings and trains people to manage bamboo plantations. It teaches villagers to build kilns to make charcoal, which they can sell to city dwellers (rural people in Ethiopia and Ghana can’t afford charcoal. They burn wood. ) The program also promotes bamboo as fuel, and has helped village women to set up businesses making and selling a stove with a closed chamber that uses half the fuel of an open fire. In Ethiopia, the stove, locally made of iron and clay, costs only $3. Coosje Hoogendoorn, INBAR’s director-general, said that while people in Ghana are slower to embrace bamboo because they can still find firewood, Ethiopians need no convincing — there are hardly any trees left to cut down. Bamboo is not the perfect plant. Although the kinds of bamboo that grow in Africa are not invasive — some varieties that grow in cooler climates are — it can be very difficult to get rid of the networks of roots when the plant is no longer wanted. While bamboo can tolerate dry conditions, like any plant it will grow more slowly with less water, and it cannot grow in desert climates — exactly where it is needed most. And most bamboo is hollow, which means it burns more quickly than hardwood. Fortunately, bamboo that grows in Africa’s lowlands is one of the few solid bamboo species. Related More From Fixes Read previous contributions to this series. Because bamboo requires few nutrients, it can grow in soil inhospitable to other plants — not only does it thrive there, it can reclaim the land so other plants can thrive, too. Its roots leach heavy metals from the soil, hold the soil together and draw water closer to the surface. One example is a project in Allahabad, India, to reclaim land whose topsoil had been depleted by the brick industry. In 1996, an INBAR project planted the land with bamboo. Five years later, villagers could farm the land again. Dust storms — a local scourge — were greatly reduced. The bamboo also helped raise the water table by seven meters. In 2007, the project won the global Alcan Prize for Sustainability. Charcoal, of course, is not the only thing that can be made of bamboo. Its tensile strength makes it a good construction material, and it is also used for furniture, flooring and textiles, among other things. Paradoxically, harvesting bamboo to make durable goods is greener than not harvesting bamboo. Here’s why: bamboo culms — the poles — do not live as long as hardwood trees, usually up to a decade. When an old culm decays, it releases carbon into the atmosphere. (The root system, which hold 30 to 40 percent of its carbon, last much longer.) This means that an untouched bamboo forest is a poor carbon sink. Fortunately, the best way to turn bamboo into an excellent carbon sink is to make money with it — harvest the bamboo to make durable products before it starts its decay. Treated bamboo flooring or furniture will last as long as wood, storing its carbon the whole time. In some ways, the challenge in Africa is not to introduce bamboo, but to persuade people and governments that it has commercial uses. “We’ve taken policymakers from Africa to China and India where bamboo used in everyday life — and there’s still very poor adoption,” said Ong. In some countries, for example, Kenya, making charcoal is illegal — a well-intentioned ban that seeks to prevent deforestation, but one that is impractical as long as people need to find their own cooking fuel. “It is not effective to ban charcoal production,” said Jolanda Jonkhart, the director of trade and development programs at INBAR. “It is more effective to promote charcoal production with renewable biomass sources such as bamboo.” Join Fixes on Facebook and follow updates on twitter.com/nytimesfixes. Tina Rosenberg won a Pulitzer Prize for her book “The Haunted Land: Facing Europe’s Ghosts After Communism.” She is a former editorial writer for The Times and now a contributing writer for the paper’s Sunday magazine. Her new book is “Join the Club: How Peer Pressure Can Transform the World.”
SANTA ANA, Calif. (AP) - A California man hooked the catch of a lifetime while on vacation in Alaska. The Orange County Register reports Friday (https://bit.ly/1qQSWU9) 76-year-old Jack McGuire of Santa Ana caught a 482-pound Pacific halibut. McGuire struggled for 40 minutes before the giant fish was reeled in. His catch outweighs the 459-pound Pacific halibut caught in Alaska in 1996 that is the world record, but it doesn’t meet International Game Fish Association regulations. The halibut was shot, then harpooned before it was brought aboard the boat, disqualifying the catch from being considered for a world record. McGuire was on a weeklong fishing trip near Glacier Bay with his three children when he caught the 95-inch-long fish. He says the boat captain shot the giant fish to keep it from flopping around and hurting someone. He applauded the decision, even if it contributed to him not getting the record.
Gregor "The Mountain" Clegane is one of the most evil characters in all of "Game of Thrones" -- and considering this is the same series that spawned Joffrey Baratheon, that's saying something. He's massive, brutal, and in Sunday night's duel with Oberyn "The Red Viper" Martell was involved in something so shocking that people are still talking about it. Casting a guy who could convincingly portray the 8-foot-tall knight was no easy task (two other actors played him in earlier seasons), but the producers seem to have found their man in Icelandic strongman Hafthor Bjornsson. Bjornsson is 6-foot-9 and 420(!) pounds, numbers that make him a perfect candidate for lifting astoundingly heavy things. He's competed in the World's Strongest Man competitions since 2011 and has been steadily progressing up the leaderboard, culminating in a second-place finish in this year's event. Here he is lifting almost 1,000 pounds like it's no big deal: If that's not convincing enough, here he is (painted oddly but perhaps understandably in Hulk green) tossing a washing machine: Back in 2013, the Colts even flirted with the idea of signing Bjornsson to a tryout, which we would have given just about anything to see: Off/Def Lineman,so many 6-3 to 6-7..320-365 lbs/Big,Physical and Nasty! Speaking of size/strength..GM Grig's just might sign "The Icelander" — Jim Irsay (@JimIrsay) May 13, 2013 Fortunately for Pedro Pascal, who plays Oberyn Martell, Bjornsson seems like a much, much nicer guy in real life:
import { gql } from '@apollo/client' import profileChannelIndexFragment from 'v2/components/ProfileChannelIndex/fragments/profileChannelIndex' export default gql` query ProfileChannelIndex($id: ID!, $type: IndexedChannelsTypes) { identity(id: $id) { identifiable { __typename ...ProfileChannelIndex } } } ${profileChannelIndexFragment} `
// The code in this method will be executed when the FEEDING BUTTON is clicked on. @Override public void onClick(View view) { myMonster.GetHit(enemyMonster.getAttack(), enemyMonster.getElement()); enemyMonster.GetHit(myMonster.getAttack(), myMonster.getElement()); SetAttributes(); if (myMonster.getHitPoints() < 1 || enemyMonster.getHitPoints() < 1) { UiHelper.SetButtonVisibility((Button) view, View.GONE); if (myMonster.getHitPoints() < 1 && enemyMonster.getHitPoints() < 1) { endButton.setText("Draw. Nobody won and nobody lost."); endButton.setTextColor(Color.WHITE); UiHelper.SetButtonVisibility(endButton, View.VISIBLE); } else if (myMonster.getHitPoints() < 1 ) { endButton.setText("You lost. Better luck next time!"); endButton.setTextColor(Color.RED); UiHelper.SetButtonVisibility(endButton, View.VISIBLE); } else { endButton.setText(myMonster.getName() + " won! GG"); endButton.setTextColor(Color.GREEN); myMonster.setXP(myMonster.getXP() + enemyMonster.getLevel()); UiHelper.SetButtonVisibility(endButton, View.VISIBLE); FoodAlert(FightHelper.Drop(enemyMonster.getLevel())); } } }
Viability of chondrocytes seeded onto a collagen I/III membrane for matrixinduced autologous chondrocyte implantation Cell viability is crucial for effective cellbased cartilage repair. The aim of this study was to determine the effect of handling the membrane during matrixinduced autologous chondrocyte implantation surgery on the viability of implanted chondrocytes. Images were acquired under five conditions: (i) Preoperative; (ii) Handled during surgery; (iii) Cut edge; (iv) Thumb pressure applied; (v) Heavily grasped with forceps. Live and dead cell stains were used. Images were obtained for cell counting and morphology. Mean cell density was 6.60105 cells/cm2 (5.747.11105) in specimens that did not have significant trauma decreasing significantly in specimens that had been grasped with forceps (p<0.001) or cut (p=0.004). Cell viability on delivery grade membrane was 75.1%(72.477.8%). This dropped to 67.4%(64.169.7%) after handling (p=0.002), 56.3%(51.561.6%) after being thumbed (p<0.001) and 28.8%(24.731.2%) after crushing with forceps (p<0.001). When cut with scissors there was a band of cell death approximately 275m in width where cell viability decreased to 13.7%(10.218.2%, p<0.001). Higher magnification revealed cells without the typical rounded appearance of chondrocytes. We found that confocal laserscanning microscope (CLSM) can be used to quantify and image the fine morphology of cells on a matrixinduced autologous chondrocyte implantation (MACI) membrane. Careful handling of the membrane is essential to minimise chondrocyte death during surgery. © 2014 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 32:14951502, 2014.
Out Thierry Perez's office window, past the crumbling 16th century island prison where Alexandre Dumas set the "Count of Monte Cristo," roils a Mediterranean Sea that didn't exist just a few decades ago. Major disease outbreaks worsened by warming waters now strike sea life five times more than when Perez, a marine ecologist with the French government, began studying the Mediterranean in the 1990s. Water temperatures have risen two to three times faster than across the world’s oceans at large. Half of the Mediterranean's fish are pushing north, with wrasses and barracuda once native to North Africa now common off southern France. View Images Populations of bream fish, like these off Marseille in southern France, are expected to decline due to global warming. Warmer and less-oxygenated oceans make it difficult for bigger fish to get enough oxygen to grow. photograph by Boris Horvat Yet just four hours away by train, international climate negotiators in Paris have been reluctant to even mention oceans in their formal blueprints outlining an action plan for combating global warming. With so much division over how to curb greenhouse gas emissions from deforestation and the burning of coal oil and gas, few global leaders were willing to add something else for 195 battle-weary countries to squabble about. Ocean scientists streamed into France anyway, coming from around the world to insist the seas get more attention in the United Nations climate strategy. The marine world is too important to overlook, they say, both as a victim of climate change but also as place that can be part of the fix. "We need to put oceans on the agenda," Vladimir Ryabinin, a Russian marine scientist and executive secretary of UNESCO's Intergovernmental Oceanographic Commission, told a panel of researchers in Paris. "Oceans are the common heritage of all mankind." Pull Quote What's clear is we have a marine population [in the Mediterranean] that is just more and more sensitive. Thierry Perez, Marine ecologist From the outside, this battle may seem academic: Negotiators aren't suggesting the seascape that covers 70 percent of earth is unimportant. But many advocates say so much is happening so quickly in these watery environments that oceans need a higher profile that would elevate discussion of their problems and create momentum to solve them. Already a new proposal to protect the Indian Ocean off the Republic of Seychelles is being highlighted as a model to protect against climate change. Conservationists are turning to complicated financial instruments to raise money for ocean protection in developing island nations. View Images Fishermen lift bluefin tunas onto their boat off Barbate in Spain. In this traditional technique, nets are used to catch tuna as they migrate from the Atlantic to the Mediterranean. Because of warming waters, bluefin tuna now stick around longer in the sea's western regions. photography by Pablo Blazquez Dominguez But scientists say policymakers and the public first need to understand how fast changes are coming. For that, says Perez, there's no place quite like the Mediterranean. "It's like its own miniature ocean," he says. Sponges Die, Flatfish Increase Stretching from Spain to the Balkans and from Libya to France, the Mediterranean occupies nearly a million square miles. It’s connected to the world’s oceans through the Strait of Gibraltar to the west and the Suez Canal to the southeast. It's proximity to the climate talks–and that unusual geography that keeps it mostly isolated from other oceans–makes it a microcosm of many problems affecting the seas. Neither a tropical nor polar environment where scientists expected to see problems appearing first, the Mediterranean is, even for Perez, sometimes hard to grasp because it’s experiencing so many changes. Pull Quote We're trying to shift the narrative on oceans. Andrew Deutz , The Nature Conservancy It's here that a colleague stumbled on one of the earliest signs that climate appeared to be altering marine waters. In the late 1980s a disease started killing off marine sponges, some of which had been harvested for 4,000 years. By the 1990s scientists began linking the virulence of the pathogen to the unusual warmth of the water. "It was a very impressive syndrome," Perez says. That was just the beginning. Before 1995, it was unusual to see 10 major marine-life epidemics in five years. Today, one five-year span might include 50 disease outbreaks, causing die-offs of everything from corals to bryozoans. Some pathogens even drove localized extinctions of some creatures, including a species of sea fan in Italy and a sponge in Monaco. View Images A long-snouted wrasse swims in seaweed off Costa Brava, Spain. photograph by Reinhard Dirschert, ullstein bild Temperatures now let invasive species, such as algae-grazing rabbitfish, introduced through the Suez Canal from the Red Sea, explode. Some invertebrates are dwindling because the season for males to mate has changed even though females are still ready to reproduce at the same time they always have been. And as species move, the entire system is reorganizing. Bluefin tuna now stick around longer in the sea's western regions. In the northernmost stretches of southern France and the Adriatic, where the sea is bounded by land, some animals have no place left to go to find cold water. When that happens, Perez says with a shrug, "Sometimes they die." Herring-like sprat between Italy and the Balkans have all but disappeared, even though they were barely fished. Sardine populations, on the other hand, are bigger in the north than they've ever been. Perez acknowledges that it can be hard to tease out the role of fishing and land pollution as partial culprits, but he says warming waters are compounding everything else, often in unpredictable ways. The fishing industry recently started catching more sole and other flatfish up north. Eventually scientists determined that increased precipitation was filling rivers and giving them more power. As they spilled into the sea, they churned up the ocean bottom, causing more mixing and more production of food for the things flatfish eat. It's too soon to say where all this is leading, Perez says, but it's clear more attention is needed. He's met fisherman who have given up and switched jobs, and others who are finding new species to catch. Pull Quote [The Mediterranean] is like its own miniature ocean. Thierry Perez "When we start talking about this to a wider audience, people are very concerned," Perez says. "What's clear is we have a marine population that is just more and more sensitive." Swapping Debt to Save Oceans Trying to cushion ocean environments for this kind of havoc is what drove The Nature Conservancy to experiment in the Seychelles. Now other countries may replicate those efforts. In the tiny archipelago of just over 100 islands, where half the land is already protected, rising seas, storms, pollution, and fishing were harming the coast and nearby reefs. Fishermen using hand-held lines to snag grouper and snapper began noticing that fish they caught for their families and sold to tourists were getting smaller. The commercial fishing industry, facing troubled reefs, started heading out to sea to catch more and bigger species. Some ran into pirates, which drove them back toward land, increasing the fishing pressure near shore. "Coral reefs are our first physical protection from the ocean," says Ronald Jumeau, Seychelles ambassador to the United Nations. And in Seychelles, now, "they're under strain." With about 1,000 species of marine fish, 400 of them around their reefs, the government wanted a solution but it had no money to address the rising threats. In fact the government was deep in debt. That's when Rob Weary stepped in. The Nature Conservancy financial guru has been finding ways to use the creative wizardry of Wall Street–where debt is bought and sold like other commodities–to champion nature. He asked Jumeau if he could investigate a "debt-swap." That complicated financial transaction would allow The Nature Conservancy to work with the holders of the country's debt to restructure payments on about $30 million. Through loans and grants, The Nature Conservancy would create a fund that the Seychelles government could use for conservation. A governing trust would manage the account. Similar deals have been done on land, but not for marine conservation. Seychelles said yes, and the organizations spent several years negotiating. Now the deal is final and plans are underway in the Indian Ocean. The country plans to protect up to 30 percent of the 1.4 million square kilometers of ocean within its exclusive economic zone. The deal is expected to protect mangrove lagoons home to 11 seabird species and six types of sharks. It will likely set aside some vulnerable coral reefs so they can continue to help block storm surges. Scientists are studying the ocean waters trying to figure out which areas could be protected for use by fishermen and which should be off limits. Some of these areas might even change over time as fish stock rebuild or others warrant protection. While none of these efforts will forestall climate change, it will help make the country more resilient to the effects. Jumeau says his government is thrilled with the deal, and now other countries including Palau, the Marshall Islands, and Jamaica have expressed interest in trying something similar. The Nature Conservancy also is experimenting with taking out insurance policies on coral reefs, trying to get the tourism industry financially vested in making sure they stay healthy for the long run. "We're trying to shift the narrative on oceans," says Andrew Deutz, with the Nature Conservancy. "They should be thought of as part of the solution. There are all kinds of things we can do if we really try."
/* * Copyright 2010 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.gradle.api.internal.tasks.testing.processors; import org.gradle.api.logging.StandardOutputListener; import org.gradle.internal.io.LinePerThreadBufferingOutputStream; import org.gradle.internal.io.TextStream; import org.gradle.internal.logging.StandardOutputCapture; import javax.annotation.Nullable; import java.io.PrintStream; public class DefaultStandardOutputRedirector implements StandardOutputRedirector { private PrintStream originalStdOut; private PrintStream originalStdErr; private final WriteAction stdOut = new WriteAction(); private final WriteAction stdErr = new WriteAction(); private final PrintStream redirectedStdOut = new LinePerThreadBufferingOutputStream(stdOut); private final PrintStream redirectedStdErr = new LinePerThreadBufferingOutputStream(stdErr); @Override public void redirectStandardOutputTo(StandardOutputListener stdOutDestination) { stdOut.setDestination(stdOutDestination); } @Override public void redirectStandardErrorTo(StandardOutputListener stdErrDestination) { stdErr.setDestination(stdErrDestination); } @Override public StandardOutputCapture start() { if (stdOut.destination != null) { originalStdOut = System.out; System.setOut(redirectedStdOut); } if (stdErr.destination != null) { originalStdErr = System.err; System.setErr(redirectedStdErr); } return this; } @Override public StandardOutputCapture stop() { try { if (originalStdOut != null) { System.setOut(originalStdOut); } if (originalStdErr != null) { System.setErr(originalStdErr); } redirectedStdOut.flush(); redirectedStdErr.flush(); } finally { originalStdOut = null; originalStdErr = null; stdOut.setDestination(new DiscardAction()); stdErr.setDestination(new DiscardAction()); } return this; } private static class DiscardAction implements StandardOutputListener { @Override public void onOutput(CharSequence output) { } } private static class WriteAction implements TextStream { private StandardOutputListener destination; @Override public void text(String message) { destination.onOutput(message); } @Override public void endOfStream(@Nullable Throwable failure) { } public void setDestination(StandardOutputListener destination) { this.destination = destination; } } }
Former Bradley Central student Ryan Casteel is making steady progress after three seasons in the Colorado Rockies minor league system. Ryan Casteel isn't where he wants to be, but he's on track to get there. The former Bradley Central and Cleveland State baseball player is preparing for his fourth professional season and has moved up a rung each year. "It's not an easy job, but right now I like my chances of getting where I want to be," the former Times Free Press player of the year said recently. "If things go the way I think they will, I'll be in the California League." That would be at Modesto at the high Class A level. Casteel began his career in the Colorado Rockies organization at Tri-Cities (Rookie League) in Pasco, Wash., where he hit .305. Two years ago in Casper, Wyo. (high rookie), he hit .273, and then last season he batted .279 in Asheville, N.C. (full season low-A). "Moving to Modesto would be a promotion. I haven't jumped a level, but I've been promoted each year," added the 21-year-old who recently celebrated his first wedding anniversary. "In this business you never know." Bradley coach Travis Adams has been pleased with Casteel's growth. "He takes baseball as a job. He's been so dedicated about working out. When he's home it seems like he's working out here or somewhere close," Adams said. "I had a couple of chances to see him play last year, and he's bigger, stronger and faster. He does everything better than he did here, and he keeps working." Casteel was in the younger half of players on his 2012 team, which averaged 23 years old, and was invited to the Rockies' instructional league for the third time. For a catcher that's a big plus, because all of the club's coordinators are there and he is able to get more one-on-one work with experts. "It's more hands-on with a lot of drills," he said. "There are always things to work on. I think offense is a strength, but out there catching becomes my priority. You want to take that time to try and polish every aspect of your game, but there's a lengthy laundry list of things to work on as far as catching is concerned. "I don't want to be a high-A player all my life, and in order to move up you have to improve." Having moved up a class each year has led him to believe he made the right decision by spurning a University of Tennessee scholarship to go to Cleveland State and get a quicker shot at the draft. "No regrets. I absolutely am blessed and I love what I do," Casteel said. "It isn't an easy job, but I believe the organization believes in me." If he continues to move up, he'll do so as a catcher. "That's what I'm going to be. At least I think that's going to be my home," he said. "I've come a long way since high school." His throws from home to second base were good in high school, but his caught-stealing percentage went up by six points from 2011 to 2012. "Throwing is where I've moved forward, and that's where improvements were finally noticed," he said. "I finally got close to where I want to be there, and I also was able to cut down on the passed balls." His current track would have him in the majors by age 25. "Who knows with major league baseball?" Adams said. "It depends on what the Rockies want and how players are stacked, but he's in a good organization and I don't think he's lost in the shuffle. Sometimes players go and they flake out. Ryan hasn't. Granted, he's in the minors, but he is doing everything he can to push through. "You have to have things go your way if you're not a first-round guy out of college or high school, but Ryan's a great dude with great character and tremendous work ethic and dedication."
<reponame>CptRenko/WHelper #pragma once #include <comdef.h> #include <Wbemidl.h> #include <sstream> #pragma comment(lib, "wbemuuid.lib") namespace WHelper { static constexpr int numberOfRequestObjects = 1; class Wmi { private: HRESULT _hres = 0; IWbemLocator* _iwl = nullptr; IWbemServices* _iws = nullptr; public: Wmi() noexcept; //TRUE = It's possible access to WMI service. [[nodiscard]] bool Init(); //Sync query to CIM repo. [[nodiscard]] bool Query(IEnumWbemClassObject** enumerador, const char* query); //Clean pointers void Disconnect(); }; }
BEIRUT - Donald Trump's decision to recognize Jerusalem as Israel's capital will hasten the country's destruction, Iran's defense minister said Monday. Leaders of Iran, where opposition to Israel and support for the Palestinian cause has been central to foreign policy since the 1979 Islamic revolution, have denounced last week's announcement by the U.S. president, including a plan to move the U.S. embassy to the city. The Palestinians want East Jerusalem as the capital of their future state. "(Trump's) step will hasten the destruction of the Zionist regime and will double the unity of Muslims," Iran's defense minister, Brigadier General Amir Hatami, said on Monday, according to state media. The army's chief of staff, General Mohammad Baqeri, said Trump's "foolish move" could be seen as the beginning of a new intifada, or Palestinian uprising. Iran has long supported a number of anti-Israeli militant groups, including the military wing of Lebanon-based Hezbollah, which the deputy commander of Iran's elite Revolutionary Guards, Brigadier General Hossein Salami, said was "stronger than the Zionist regime." Palestinian President Mahmoud Abbas on Monday stepped up efforts to rally Middle Eastern countries against U.S. recognition of Jerusalem as Israel's capital, which EU foreign ministers meanwhile declined to support.
Uranium storage bed accidents hazards evaluation To properly assess the hazards and risks associated with using uranium beds as tritium storage devices in fusion reactor systems, it is necessary to understand the consequences that would occur in the event of an accident. Accidents involving uranium beds are postulated, and the possible results are considered. A research program aimed at more fully and accurately understanding those results has been initiated jointly by the Idaho National Engineering Laboratory and Ontario Hydro. The plan and objectives of that program are presented.<<ETX>>
Noninvasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP): Diagnostic updates and molecular advances. The noninvasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) is a strictly defined thyroid lesion, reclassified in 2016, in order to more accurately reflect the biological behavior of the tumor and thus, modify the way the lesion is clinically approached and perceived both by practitioners and patients. Additionally, this newly specified designation also allows for more uniformity in reporting for general pathologists less comfortable to exclude overt malignancy with certain nuclear features. In recent years, increasing molecular analyses correlated with longitudinal clinical outcomes have fostered improved diagnostic and treatment paradigms. Important revisions made to the definition of NIFTP in 2018 include the prohibition of any true papillae formation and the exclusion of lesions harboring the BRAF V600E mutation and other high-risk genetic abnormalities. These changes reflect the imperfection of the current criteria in outcome prediction and the global efforts for improvement. NIFTP are lesions with a wide range of size and cytomorphology. Although not addressed in the original series, large (≥4 cm) and oncocytic NIFTP have recently been shown to incur no recurrence or metastatic risk. Molecularly, NIFTP have a similar mutational profile as other follicular thyroid neoplasms, with frequent RAS family mutations and PAX8-PPAR fusions. However, the transcriptomic landscape is highly heterogenous, adding difficulty to gene expression-based cytopathologic classification. This review summarizes the evolution of the NIFTP concept and important advances in recent literature.
An Indian origin man was among a gang of five people jailed for trafficking women into the UK, forcing them into prostitution and forcing one of them into a sham marriage to avoid immigration restrictions. Ramesh Mali, 31, was sentenced at the Wood Green Crown Court to two-and-a-half years after being convicted of being part of a conspiracy to assist unlawful immigration into the UK. Other members of the gang jailed were Sandor Jonas, Anita Viktoria Maule, Victor Maule and Chika Ike Michael. Scotland Yard said that the police were contacted earlier this year by a woman who stated that she had been trafficked into the UK from Hungary in March 2010 by an organised criminal network. Following inquiries by the police’s Human Trafficking Unit, those individuals were identified as Jonas, his girlfriend Anita Maule and her brother Victor. The victim was being forced to work as a prostitute at a massage parlour in London without being paid and being regularly beaten by Sandor in an attempt to keep her under his control. As part of her exploitation she was also forced into a sham marriage with Mali, and made to open a business and bank accounts in her name. Solicitor Ike-Michael assisted in arranging the sham marriage on behalf of the group. British police officers travelled to Hungary and identified a second victim of the gang who had been trafficked into the UK in 2005 and held until 2010. Detective constable Natalia Barrett said, "The defendants were part of a highly organised criminal network who deliberately targeted vulnerable young women in the hope they would be too scared to contact police, or if they did, would not be believed."
Antidifferentiation Noncoding RNA Regulates the Proliferation of Osteosarcoma Cells. BACKGROUND Antidifferentiation noncoding RNA (ANCR), a newly identified long noncoding RNA (lncRNA), plays a critical role for stem cells to maintain undifferentiated cell state. However, the functions of ANCR in human cancers have not been reported. This study is designed to explore the role of ANCR in osteosarcoma. METHODS Lentivirus-mediated (shRNA) was applied to silence ANCR in the human osteosarcoma cell lines U2OS and Saos-2. Cell viability was measured by MTT assay. Colony-forming ability was measured by colony formation assay. Cell cycle progression was determined by flow cytometry with propidium iodide staining. In addition, cell cycle makers, including p21, CDK2, and CDK4, were investigated in ANCR silencing U2OS cells by real time PCR (RT-PCR) analysis. RESULTS In this study, we first proved that lentivirus-mediated shRNA specifically suppressed the expression level of ANCR in U2OS and Saos-2 cells. Further investigations revealed that knockdown of ANCR significantly inhibited the proliferation of U2OS and Saos cells and colony formation of U2OS cells. Moreover, the cell cycle of U2OS cells was arrested at G0/G1 phase after ANCR knockdown. Furthermore, the expression level of p21 was increased and CDK2 was decreased in ANCR knock-down cells. CONCLUSIONS Our data indicated that ANCR might be an oncogenic lncRNA that promoted proliferation of osteosarcoma. The potential application of ANCR-targeted therapy using the lentivirus-mediated shRNA approach is worth further investigations in preclinical and clinical studies.
The Samsung Galaxy S3 (S III) is definitely the Android smartphone of the moment even though it has yet to hit the shelves. Not only is this set to be one of the biggest sellers of the year but even before its release its S-Voice app has become available and a root has been achieved. With this latest Galaxy S smartphone Samsung put the emphasis very much on the software as well as the hardware and the S Voice feature is a prime example of this. Touted as Samsung’s answer to the Siri voice assistant on Apple’s iPhone this is set to be a highlight for potential Galaxy S3 owners and now other Android handset users may be able to use it if their device is running 4.0 ICS or later. An APK install package for the S-Voice app has now become available online according to Tech Radar, sourced from Talk Android. This means Android enthusiasts can check out the S Voice feature already even though the phone is not released in Europe until the end of this month and early June in North America. Ascarface23 over on the XDADevelopers Forum is the source of the APK file, which does require the device to be rooted and some changes made to permissions and directories. As usual we can’t recommend that readers try this out but of course we also know that many of our readers can’t wait to get started! Once installed, users will find that all of the standard voice assistant features are accessible to them such as opening apps, navigating, contact searching and calling and more. There are warnings for potential rooters though and we should stress that this is an unregistered and unverified APK install and users have encountered some bugs and glitches. It appears that owners of Galaxy S2 and Galaxy Nexus owners have had the most success with the app so far. As we’ve already said the install does require your device to be rooted and if you think you’ll have to wait a while for a root for the Galaxy S3 when it launches you may be surprised to know that a root is already available. This is great news for power users and details of the root came to us from Pocketnow. You can check out the XDA-Developers source here. The official stock firmware has also been leaked here, version I9300XXALE8, for the unlocked international carrier-free version of the Galaxy S3. It’s pretty amazing stuff when you think about it, that rooting of the Galaxy S3 has already been achieved before it’s even out and that its voice command feature has already hit the net. We think this looks like a pretty good start and is news that will please a lot of Android enthusiasts. Are you waiting for the Galaxy S3? Maybe you’re going to try out the voice app on your own device? Let us know how you get on by sending us your comments. UPDATE: Engadget has just passed on the news that the unofficial S-Voice APK has now been blocked by Vlingo for unauthorized devices (those other than the Galaxy S3). This came from XDA Developers who spotted that Vlingo’s servers are gagging its use. What are your thoughts on this development? ****FULL GUIDE ON HOW TO GET S-VOICE TO WORK ON YOUR DEVICE****you will need to root your ics device (stock ics or maybe an ics rom) once its rooted you need root explorer , download the apk file to a memory card ,  navigate to the app , change permissons there and then to  rw-r-r then once thats done move it to system/app ( its apparent s-voice works better with your device if your device recognises it as a system app rather than just a normal app) restsart your device , power it back on and boot into root explorer and go to /system/build.prop hold it down and select “open in text editor”  scroll down to “ro.product.model=” and change it to this exactly as i write it “GT-I9300” (should appear twice enter the same data twice) (this is to stop the “network error” that samsung have loaded to all their servers to stop any phone other than the S3 to be declined by their voice servers)  click “save and exit” reboot & thats you (if you have problems on the GT-I9100 copying the file to the “system/app” folder (as only like 15-20MB is avalable in that folder) you will have to delete some apps , i deleted vilingo and youtube and pasted “s-voice” , i then opened it and went through the setup , clicked done and restarted. once restarted open app and go through tutorial. once this is done s-voice should work. 🙂 **YOU WILL NEED TO BE ROOTED & ON STOCK ICS (preferably but if your on a ics rom it should still work but dont expect too much)** Gingerbread will not work (Android 2.3- and so on). This is known to work on the – Htc one Htc One x – Htc Desire with an ics rom – Galaxy Nexus – Samsung Galaxy S2 – Htc Sensation – if you follow my steps correctly you should get it to work fine on your device (but ofcourse you may get some problems as you are changing the buildprop on your device to which your phone isnt , this may cause problems if your on a complete different manufacturer , for an example changing the build prop on a Samsung Galaxy GT-I9100 it wont be as bad as its still a samsung device and only an upgraded model of the GT-19100 (the 19300 am talking about) but if your on a htc and you change the build prop it can cause major problems on your device and if you notice this change back the build prop to whatever text was there before you changed it.S-voice is pretty buggy so dont expect much but if your an android user and would like to give it a shot knock yourself out .- this is the full guide on how to install it without any flaws or “s-voice is not responding” messages. You root say, the s2 or galaxy note, i completely understand.But what is the use of rooting an s3? dont understand why you need to root a S3 , its already plent quick enough !
Automated identification of epileptic seizure EEG signals using empirical wavelet transform based Hilbert marginal spectrum This paper proposes a new method for the classification of epileptic seizure electroencephalogram (EEG) signals. Empirical wavelet transform (EWT) based Hilbert marginal spectrum (HMS) has been derived. In order to segment the Fourier spectrum of the EEG signals, the scale-space representation based boundary detection method has been employed. Then, EWT is used to decompose EEG signals into narrow sub-band signals and HMS of these sub-band signals have been computed. For a synthetically generated multi-component frequency modulated signal, the EWT based HMS is compared with the conventional Fourier spectrum obtained using fast Fourier transform (FFT) algorithm. Three features have been extracted from these HMSs which belong to distinct oscillatory levels of the EEG signals and probability (p) value based feature ranking is performed. Finally, the selected features are fed to random forest classifier for classifying EEG signals of seizure and seizure-free classes. We have achieved 99.3% classification accuracy with only 50% training rate which shows the usefulness of the proposed method for the classification of epileptic seizure EEG signals.
'The calculus of pain': Violence, anthropological ethics, and the category transgender In addressing Nancy Scheper-Hughes's call for 'the primacy of the ethical' in anthropological research, this paper complicates anthropologists' ethical position by exploring a range of practices seen as harmful or violent by transgender-identified people. I argue that an ethical stance on the violence experienced by one's study participants is deeply complicated by what comes to count for participants as harm and violence. By investigating a range of social contexts and practices - political activism, social service support groups, and ethnographic practices - I argue that detailed ethnography which queries the ontological assumptions of those who claim to have experienced violence is the most effective route to acting ethically.