content
stringlengths
7
2.61M
/** * Run this main method to (re)generate the API based on the POJOs defining the data model. * <p> * If the first arg is populated, it will specify the root project folder. * If not, we will attempt to discover the root project folder. */ public static void main(String args[]) throws ClassNotFoundException, IOException { File projectRootFolder; if (args.length > 0) projectRootFolder = new File(args[0]); else throw new IllegalArgumentException("First program arg must be path to hollowredis-example directory"); APIGenerator generator = new APIGenerator(projectRootFolder); generator.generateFiles(); }
from Treebank.Nodes import File from _PTBNode import PTBNode from _PTBSentence import PTBSentence from _PTBLeaf import PTBLeaf import os.path from xml.etree import cElementTree as etree class PTBFile(File, PTBNode): """ A Penn Treebank file """ def __init__(self, **kwargs): path = kwargs.pop('path') if 'string' in kwargs: text = kwargs.pop('string') else: text = open(path).read() # Sometimes sentences start (( instead of ( (. This is an error, correct it filename = path.split('/')[-1] self.path = path self.filename = filename self.ID = filename self._IDDict = {} PTBNode.__init__(self, label='File', **kwargs) if self.filename.endswith('xml'): root_dir = os.path.dirname(os.path.dirname(path)) self._parseNXT(root_dir, filename.split('.')[0]) else: self._parseFile(text) def _parseFile(self, text): currentSentence = [] for line in text.strip().split('\n'): # Detect the start of sentences by line starting with ( # This is messy, but it keeps bracket parsing at the sentence level if line.startswith('(') and currentSentence: self._addSentence(currentSentence) currentSentence = [] currentSentence.append(line) self._addSentence(currentSentence) def _addSentence(self, lines): sentStr = '\n'.join(lines)[1:-1] nSents = len(self)+1 sentID = '%s~%s' % (self.filename, str(nSents).zfill(4)) self.attachChild(PTBSentence(string=sentStr, globalID=sentID, localID=self.length())) class NXTFile(File, PTBNode): def __init__(self, **kwargs): self.path = kwargs.pop('path') self.filename = kwargs.pop('filename') self.ID = self.filename self._IDDict = {} PTBNode.__init__(self, label='File', **kwargs) self.xml_idx = {} self._parseNXT(self.path, self.filename) self._addTurns(self.path, self.filename) def _parseNXT(self, nxt_root_dir, file_id): terminals = {} ns = '{http://nite.sourceforge.net/}' for speaker in ['A', 'B']: # Get terminals terminals_loc = os.path.join(nxt_root_dir, 'xml', 'terminals', '%s.%s.terminals.xml' % (file_id, speaker)) leaves_tree = etree.parse(open(terminals_loc)) for w_xml in leaves_tree.iter('word'): wordID = int(w_xml.get(ns+'id').split('_')[1]) - 1 w_node = PTBLeaf(label=w_xml.get('pos'), start_time=w_xml.get(ns+'start'), end_time=w_xml.get(ns+'end'), text=w_xml.get('orth'), wordID=wordID) terminals[w_xml.get(ns+'id')] = w_node for p_xml in leaves_tree.iter('punc'): wordID = int(p_xml.get(ns+'id').split('_')[1]) - 1 terminals[p_xml.get(ns+'id')] = PTBLeaf(label=p_xml.text, text=p_xml.text, wordID=wordID) for t_xml in leaves_tree.iter('trace'): wordID = int(t_xml.get(ns+'id').split('_')[1]) - 1 terminals[t_xml.get(ns+'id')] = PTBLeaf(label='-NONE-', text='-NONE-', wordID=wordID) for s_xml in leaves_tree.iter('sil'): wordID = int(s_xml.get(ns+'id').split('_')[1]) - 1 terminals[s_xml.get(ns+'id')] = PTBLeaf(label='-NONE-', text='-SIL-', wordID=wordID) syntax_loc = os.path.join(nxt_root_dir, 'xml', 'syntax', '%s.%s.syntax.xml' % (file_id, speaker)) syntax_tree = etree.parse(open(syntax_loc)) for s_xml in syntax_tree.iter('parse'): localID = int(s_xml.get(ns+'id')[1:]) globalID = '%s~%s' % (file_id, str(localID).zfill(4)) ptb_sent = PTBSentence(xml_node=s_xml, terminals=terminals, globalID=globalID, localID=localID) self.xml_idx[(speaker, localID)] = ptb_sent self.attachChild(ptb_sent) self.sortChildren() def _addTurns(self, path, filename): ns = '{http://nite.sourceforge.net/}' for speaker in ['A', 'B']: turns_loc = os.path.join(path, 'xml', 'turns', '%s.%s.turns.xml' % (filename, speaker)) turns_tree = etree.parse(open(turns_loc)) for turn_xml in turns_tree.iter('turn'): child = turn_xml.getchildren()[0] sent_ids = child.get('href').split('#')[1] if '..' in sent_ids: first_id, last_id = sent_ids.split('..') else: first_id = sent_ids last_id = first_id first_id = int(first_id[4:-1]) last_id = int(last_id[4:-1]) + 1 turnID = turn_xml.get(ns+'id') for sent_idx in range(first_id, last_id): sent = self.xml_idx[(speaker, sent_idx)] self.xml_idx[(speaker, sent_idx)].addTurn(speaker, turnID)
<reponame>xuelang201201/Music package com.charles.music.service; import com.charles.music.bean.Music; /** * 播放进度监听器 */ public interface OnPlayerEventListener { /** * 切换歌曲 */ void onChange(Music music); /** * 继续播放 */ void onPlayerStart(); /** * 暂停播放 */ void onPlayerPause(); /** * 更新进度 */ void onPublish(int progress); /** * 缓冲百分比 */ void onBufferingUpdate(int percent); /** * 更新定时停止播放时间 */ void onTimer(long remain); void onMusicListUpdate(); }
/* * Copyright (C) 2016-2017 Turn Inc. All Rights Reserved. * Proprietary and confidential. */ package com.turn.edc.client; import com.turn.edc.discovery.CacheInstance; import com.turn.edc.discovery.ServiceDiscovery; import com.turn.edc.discovery.impl.ConsulServiceDiscovery; import com.turn.edc.discovery.impl.CuratorServiceDiscovery; import com.turn.edc.exception.InvalidParameterException; import com.turn.edc.exception.KeyNotFoundException; import com.turn.edc.router.RequestRouter; import com.turn.edc.router.StoreRequest; import com.turn.edc.selection.CacheInstanceSelector; import com.turn.edc.storage.ConnectionFactory; import com.turn.edc.storage.StorageType; import java.io.IOException; import java.util.Collection; import java.util.List; import java.util.concurrent.TimeoutException; import java.util.stream.Collectors; import com.google.common.collect.Lists; import com.google.common.eventbus.SubscriberExceptionHandler; import com.google.common.net.HostAndPort; import com.google.inject.Guice; import com.google.inject.Inject; import org.apache.commons.lang3.exception.ExceptionUtils; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * EDC client main class * * Create an instance of the EDC client by using the builder. During the build phase, the following * is required to be configured: * 1. storage layer * 2. service discovery layer * 3. service name * * For example: * * EDCClient client = EDCClient.builder() * .withRedisStorage() * .withConsulServiceDiscovery("localhost") * .withServiceName("redis") * .build(); * * After building the client, initialize it by calling start(). This sets up the service discovery * client and initializes the routing layer * * @author tshiou */ public class EDCClient { private static final Logger logger = LoggerFactory.getLogger(EDCClient.class); @Inject private RequestRouter router; @Inject private CacheInstanceSelector selector; @Inject private ServiceDiscovery discovery; private EDCClient(EDCClientModule module) { Guice.createInjector(module).injectMembers(this); this.discovery.attachListeners(this.router, this.selector); } /** * Starts the EDC client * * @throws Exception Initialization failed */ public void start() throws Exception { logger.info("Starting EDC client..."); this.discovery.start(); } /** * Shuts down the EDC client */ public void close() { logger.info("Shutting down EDC client..."); this.discovery.shutdown(); this.router.close(); logger.info("Shut down complete"); } /** * Returns a collection of the cache instances available in the selection layer * @return Collection of selectable cache instances */ public Collection<HostAndPort> allAvailableCacheInstances() { return this.selector.allInstances().stream() .map(CacheInstance::getHostAndPort) .collect(Collectors.toList()); } /** * Retrieves the value at key in the provided destination cache * * @param hostAndPort Destination host and port * @param key Top-level key * * @return Value in bytes * @throws IOException Connection error with destination cache * @throws TimeoutException Retrieval timeout * @throws KeyNotFoundException Key was not found at the provided destination * @throws InvalidParameterException If an invalid destination is provided */ public byte[] get(HostAndPort hostAndPort, String key) throws IOException, TimeoutException, KeyNotFoundException, InvalidParameterException { return get(hostAndPort, key, ""); } /** * Retrieves the value at key:subkey in the provided destination cache * * @param hostAndPort Destination host and port * @param key Top-level key * @param subkey Subkey, can be empty or null * * @return Value in bytes * @throws IOException Connection error with destination cache * @throws TimeoutException Retrieval timeout * @throws KeyNotFoundException Key (or subkey) was not found at the provided destination * @throws InvalidParameterException If an invalid destination is provided */ public byte[] get(HostAndPort hostAndPort, String key, String subkey) throws IOException, TimeoutException, KeyNotFoundException, InvalidParameterException { checkHostAndPort(hostAndPort); return router.get(new CacheInstance(hostAndPort, -1), key, subkey); } /** * Set the value at key with a given replication * * @param replication Desired number of cache instances to store the key * @param key Key * @param value Value * @param ttl TTL (in seconds) for key * * @return Collection of host/port of the selected cache instances * @throws InvalidParameterException If replication is less than 1 or no cache instances were found */ public Collection<HostAndPort> put(int replication, String key, byte[] value, int ttl) throws InvalidParameterException { return put(replication, key, "", value, ttl); } /** * Set the value at key with a given replication * * @param replication Desired number of cache instances to store the key * @param key Top-level key * @param subkey Subkey (i.e. hash) * @param value Value * @param ttl TTL (in seconds) for key * * @return Collection of host/port of the selected cache instances * @throws InvalidParameterException If replication is less than 1 or no cache instances were found */ public Collection<HostAndPort> put(int replication, String key, String subkey, byte[] value, int ttl) throws InvalidParameterException { if (replication < 1) { throw new InvalidParameterException("replication", Integer.toString(replication), "Value should be greater than 0"); } List<HostAndPort> ret = Lists.newArrayListWithCapacity(replication); Collection<CacheInstance> selectedDestinations; try { selectedDestinations = selector.select(replication); } catch (InvalidParameterException ipe) { logger.debug(ExceptionUtils.getMessage(ipe)); return ret; } for (CacheInstance selectedDestination : selectedDestinations) { router.store(selectedDestination, new StoreRequest(key, subkey, value, ttl)); ret.add(selectedDestination.getHostAndPort()); } return ret; } /** * Set the value at key in the given CacheInstance destinations * * @param destinations Collection of cache instances * @param key Top-level key * @param subkey Subkey (i.e. hash) * @param value Value * @param ttl TTL (in seconds) for key * * @return Original collection of HostAndPort destinations * @throws InvalidParameterException If destinations is null */ public Collection<HostAndPort> put(Collection<HostAndPort> destinations, String key, String subkey, byte[] value, int ttl) throws InvalidParameterException { if (destinations == null) { throw new InvalidParameterException("destinations", "null", "Destination cache instances should not be null"); } for (HostAndPort destination : destinations) { put(destination, key, subkey, value, ttl); } return destinations; } /** * Set the value at key in the provided destination * * @param destination Destination host and port * @param key Top-level key * @param subkey Subkey, can be empty or null * @param value Value to store * @param ttl TTL (in seconds) for the top-level key * * @throws InvalidParameterException If an invalid destination is provided */ public void put(HostAndPort destination, String key, String subkey, byte[] value, int ttl) throws InvalidParameterException { checkHostAndPort(destination); router.store(new CacheInstance(destination), new StoreRequest(key, subkey, value, ttl)); } /** * Set the ttl for a key in the provided destination * * @param destination Destination host and port * @param key Top-level key * @param ttl TTL (in seconds) for the top-level key * * @return whether setTTL operation fail or succeed * * @throws IOException * @throws TimeoutException * @throws InvalidParameterException */ public boolean setTTL(HostAndPort hostAndPort, String key, int ttl) throws TimeoutException, IOException, InvalidParameterException { checkHostAndPort(hostAndPort); return router.setTTL(new CacheInstance(hostAndPort), key, ttl) ; } /** * Checks if the hostAndPort is valid (host is not empty, and port is > 0) * @throws InvalidParameterException */ private void checkHostAndPort(HostAndPort hostAndPort) throws InvalidParameterException { if (hostAndPort.getHost() == null || hostAndPort.getHost().isEmpty()) { throw new InvalidParameterException("hostAndPort", hostAndPort.toString(), "Host cannot be empty"); } if (hostAndPort.getPort() < 0) { throw new InvalidParameterException("hostAndPort", hostAndPort.toString(), "Invalid port"); } } /** * Provides a builder for EDCClient. * * Builds in the following order: storage layer, service discovery layer, service-name */ public static Builder.EDCStorageBuilder builder() { return new Builder.EDCStorageBuilder(); } /***************************************** Builder *******************************************/ /** * EDC Client builder */ public static class Builder { private final ConnectionFactory connectorFactory; private final ServiceDiscovery serviceDiscovery; Builder( ConnectionFactory connectorFactory, ServiceDiscovery serviceDiscovery ) { this.connectorFactory = connectorFactory; this.serviceDiscovery = serviceDiscovery; } public EDCClient build() { return new EDCClient( new EDCClientModule(this.connectorFactory, this.serviceDiscovery) ); } /** * Builder for storage layer * * Supports Redis or Memecached * * @author tshiou */ public static class EDCStorageBuilder { EDCStorageBuilder() {} public EDCServiceDiscoveryBuilder usingRedisStorage(SubscriberExceptionHandler subscriberExceptionHandler) { return new EDCServiceDiscoveryBuilder( new ConnectionFactory(StorageType.REDIS, subscriberExceptionHandler)); } public EDCServiceDiscoveryBuilder usingAsyncRedisStorage( SubscriberExceptionHandler subscriberExceptionHandler, int queueSize) { return new EDCServiceDiscoveryBuilder( new ConnectionFactory(StorageType.REDIS, subscriberExceptionHandler, queueSize)); } public EDCServiceDiscoveryBuilder usingMemcachedStorage( SubscriberExceptionHandler subscriberExceptionHandler) { return new EDCServiceDiscoveryBuilder( new ConnectionFactory(StorageType.MEMCACHED, subscriberExceptionHandler)); } } /** * Builder for service discovery layer. * * Support zookeeper or consul * * @author tshiou */ public static class EDCServiceDiscoveryBuilder { private final ConnectionFactory connectorFactory; EDCServiceDiscoveryBuilder(ConnectionFactory connectorFactory) { this.connectorFactory = connectorFactory; } public ZkServiceDiscoveryBuilder usingZkServiceDiscovery(String zkConnectionString) { return new ZkServiceDiscoveryBuilder(this.connectorFactory, zkConnectionString); } public ConsulServiceDiscoveryBuilder usingConsulServiceDiscovery() { return new ConsulServiceDiscoveryBuilder(this.connectorFactory); } } /** * Zookeeper-specific builder for service discovery * * @author tshiou */ public static class ZkServiceDiscoveryBuilder { private final ConnectionFactory connectorFactory; private final String zkConnectionString; ZkServiceDiscoveryBuilder( ConnectionFactory connectorFactory, String zkConnectionString ) { this.connectorFactory = connectorFactory; this.zkConnectionString = zkConnectionString; } public EDCClient.Builder withServiceName(String serviceName) { return new EDCClient.Builder( this.connectorFactory, new CuratorServiceDiscovery(this.zkConnectionString, serviceName) ); } } /** * Consul-specific builder for service discovery * * @author tshiou */ public static class ConsulServiceDiscoveryBuilder { private final ConnectionFactory connectorFactory; private String consulURL = "localhost"; private int consulPort = 8500; ConsulServiceDiscoveryBuilder( ConnectionFactory connectorFactory ) { this.connectorFactory = connectorFactory; } public ConsulServiceDiscoveryBuilder withConsulClientURL(String consulURL) { this.consulURL = consulURL; return this; } public ConsulServiceDiscoveryBuilder withConsulClientPort(int port) { this.consulPort = port; return this; } public EDCClient.Builder forServiceName(String serviceName) { return new EDCClient.Builder( this.connectorFactory, new ConsulServiceDiscovery(this.consulURL, this.consulPort, serviceName) ); } } } }
package com.espressif.iot.command.device.light; import java.net.InetAddress; import java.util.List; import com.espressif.iot.command.IEspCommandLocal; import com.espressif.iot.command.device.IEspCommandLight; import com.espressif.iot.type.device.status.IEspStatusLight; public interface IEspCommandLightPostStatusLocal extends IEspCommandLocal, IEspCommandLight { /** * @deprecated Use {@link #doCommandLightPostStatusLocal(InetAddress, IEspStatusLight, String, String)} instead of * it, and the deviceBssid=null when you call the method * * post the statusLight to the Light by Local * * @param inetAddress the Light's ip address * @param statusLight the status of Light * @return whether the command executed suc */ boolean doCommandLightPostStatusLocal(InetAddress inetAddress, IEspStatusLight statusLight); /** * post the statusLight to the Light by Local * * @param inetAddress the Light's ip address * @param statusLight the status of Light * @param deviceBssid the Light's bssid * @param isMeshDevice whether the Light is mesh device * @return whether the command executed suc */ boolean doCommandLightPostStatusLocal(InetAddress inetAddress, IEspStatusLight statusLight, String deviceBssid, boolean isMeshDevice); /** * post the statusLight to the Light by Local Instantly(without response) * * @param inetAddress the Light's ip address * @param statusLight the status of Light * @param deviceBssid the Light's bssid * @param isMeshDevice whether the Light is mesh device * @param disconnectedCallback disconnected callback */ void doCommandLightPostStatusLocalInstantly(InetAddress inetAddress, IEspStatusLight statusLight, String deviceBssid, boolean isMeshDevice, Runnable disconnectedCallback); /** * Post multicast status * * @param inetAddress * @param statusLight * @param bssids * @return */ boolean doCommandMulticastPostStatusLocal(InetAddress inetAddress, IEspStatusLight statusLight, List<String> bssids); }
The government’s own terror watchdog has called for an independent review into its Islamophobic Prevent strategy. David Anderson QC, who reviews terror legislation, said, “The “lack of transparency in the operation of Prevent encourages rumour and mistrust to spread and fester.” Writing to the home affairs select committee, Anderson added that “it is also possible that aspects of the programme are being applied in an insensitive or discriminatory manner.” Prevent forces public sector workers to spy for signs of “radicalisation”—mainly targeting Muslims. But Anderson’s comments show the growing pressure the government is under as Muslims refuse to be silenced. Over 100 people attended a meeting against Prevent in Waltham Forest, east London, last night. It was organised by the Waltham Forest Council of Mosques and Stand Up to Racism. Idea Shazia from east London told Socialist Worker, “You have to take the lifeblood away from Prevent. It’s the idea that Islam leads to violence. “We have to be much more confident as Muslims to speak out against it.” The Tories and the right wing media are smearing anyone who speaks out against Prevent as a “terrorist sympathiser”. The latest attack, by Andrew Gilligan in the Telegraph newspaper last Sunday, targeted Muslim parent Ifhat Smith. Ifhat told the meeting, “Why was I attacked in that way in the Telegraph? Because I oppose Prevent. I do want Prevent removed—if there’s an injustice happening it should be stopped.” Her 14 year old son was pulled out of class at school and asked if he was affiliated to Isis for using the word “eco terrorism". Alex Kenny, from NUT teachers’ union national executive, said, “Prevent should be withdrawn from schools—it’s doing damage to the relationship between teachers and pupils. “If we’re being labelled as soft on terror then David Anderson QC can be added to the long list that Andrew Gilligan is trying to besmirch.” Other speakers included Haras Ahmed, Steven Saxby and Jahangir Mohammed. Anderson claimed that “the Prevent programme is clearly suffering from a widespread problem of perception”. The problem is not “perception” or isolated “excesses” but state-sponsored Islamophobia. Weyman Bennett from Stand Up to Racism told the meeting, “We’re facing a racist offensive led by the government—this is going to be a difficult fight. “But the government hasn’t won the argument on Prevent and there’s a mass opening of people speaking out about refugees.” Ifhat added, “As individuals we are powerless, but the fact the Telegraph article was done shows there’s fear among the Establishment. Unless we speak out, Prevent has won.
<reponame>ahidaka/EnOceanPnPWork #include <stdio.h> #include <stdlib.h> #include <stddef.h> //offsefof #include <unistd.h> #include <fcntl.h> #include <string.h> #include <ctype.h> #include <time.h> #include <linux/limits.h> //PATH_MAX #include <errno.h> #include <sys/stat.h> //stat #ifdef EXTERNAL_BROKER #include "../dpride/typedefs.h" #include "../dpride/dpride.h" #else #include "typedefs.h" #include "dpride.h" #endif #ifndef EO_LOG_DIRECTORY #define EO_LOG_DIRECTORY "/var/tmp/dpride/logs" #endif #ifndef EO_DEFAULT_LOGNAME #define EO_DEFAULT_LOGNAME "eo"; #endif #ifndef EO_DEFAULT_EXTENSION #define EO_DEFAULT_EXTENSION ".log"; #endif // // // #if __BYTE_ORDER == __LITTLE_ENDIAN #define __LITTLE_ENDIAN__ #elif __BYTE_ORDER == __BIG_ENDIAN #define __BIG_ENDIAN__ #endif static FILE *eologf; static int DebugLog = 0; static char logFileName[PATH_MAX]; static char savePrefix[32]; static char saveExtension[16]; // // // static char *MakeLogFileName(char *Prefix, char *Postfix, char *p) { time_t timep; struct tm *time_inf; const char bufLen = 20; char buf[PATH_MAX]; if (p == NULL) { p = calloc(strlen(Prefix) + strlen(Postfix) + bufLen, 1); } timep = time(NULL); time_inf = localtime(&timep); strftime(buf, bufLen, "%Y%m%d-%H%M%S", time_inf); //printf("%s-%s.%s\n", Prefix, buf, Postfix); sprintf(p, "%s/%s-%s%s", EO_LOG_DIRECTORY, Prefix, buf, Postfix); return p; } static char *MakeLogFileNameHourly(char *Prefix, char *Postfix, char *p) { time_t timep; struct tm *time_inf; const char bufLen = 20; char buf[PATH_MAX]; if (p == NULL) { p = calloc(strlen(Prefix) + strlen(Postfix) + bufLen, 1); } timep = time(NULL); time_inf = localtime(&timep); strftime(buf, bufLen, "%Y%m%d-%H0000", time_inf); //printf("%s-%s.%s\n", Prefix, buf, Postfix); sprintf(p, "%s/%s-%s%s", EO_LOG_DIRECTORY, Prefix, buf, Postfix); return p; } FILE *EoLogInitBase(char *Prefix, char *Extension, char *(*MakeFileNameFunc)(char *Prefix, char *Postfix, char *p)) { struct stat sb; int rtn; const char *logDirectory = EO_LOG_DIRECTORY; if (Prefix == NULL || *Prefix == '\0' ) { Prefix = EO_DEFAULT_LOGNAME; } if (Extension == NULL || *Extension == '\0' ) { Extension = EO_DEFAULT_EXTENSION; } (void) (*MakeFileNameFunc)(Prefix, Extension, logFileName); rtn = stat(logDirectory, &sb); if (rtn < 0){ mkdir(logDirectory, 0777); } rtn = stat(logDirectory, &sb); if (!S_ISDIR(sb.st_mode)) { fprintf(stderr, "EoLogInit: Directory error=%s\n", logDirectory); return NULL; } //printf("<<%s>>\n", logFileName); eologf = fopen(logFileName, "a+"); if (eologf == NULL) { fprintf(stderr, "EoLogInit: cannot open logfile=%s\n", logFileName); return NULL; } // for recovery when file was deleted. strncpy(savePrefix, Prefix, 32); strncpy(saveExtension, Extension, 16); return eologf; } FILE *EoLogInit(char *Prefix, char *Extension) { return(EoLogInitBase(Prefix, Extension, MakeLogFileName)); } FILE *EoLogInitHourly(char *Prefix, char *Extension) { return(EoLogInitBase(Prefix, Extension, MakeLogFileNameHourly)); } // // // static int CheckLogFile(void) { struct stat sb; int rtn; rtn = stat(logFileName, &sb); if (rtn < 0) { //fprintf(stderr, "stat error=%s\n", logFileName); //perror("EoLog"); eologf = EoLogInit(savePrefix, saveExtension); //return errno; } return 0; } void EoLog(char *id, char *eep, char *msg) { time_t timep; struct tm *time_inf; const char null = '\0'; enum {idBufferSize = 11, eepBufferSize = 31}; char idBuffer[idBufferSize + 1]; char eepBuffer[eepBufferSize + 1]; char timeBuf[64]; char buf[BUFSIZ / 4]; (void) CheckLogFile(); idBuffer[0] = null; eepBuffer[0] = null; if (id != NULL && *id != '\0') { strncpy(idBuffer, id, idBufferSize); idBuffer[idBufferSize] = null; } if (eep != NULL && *eep != '\0') { strncpy(eepBuffer, eep, eepBufferSize); eepBuffer[eepBufferSize] = null; } timep = time(NULL); time_inf = localtime(&timep); strftime(timeBuf, sizeof(timeBuf), "%x %X", time_inf); sprintf(buf, "%s,%s,%s,%s\r\n", timeBuf, idBuffer, eepBuffer, msg); fwrite(buf, strlen(buf), 1, eologf); fflush(eologf); if (DebugLog > 0) { //printf("Debug:%s,%s,%s,%s\n", timeBuf, idBuffer, eepBuffer, msg); printf("Debug:<%s>\n", buf); } } void EoLogRaw(char *Msg) { (void) CheckLogFile(); strcat(Msg, "\r\n"); fwrite(Msg, strlen(Msg), 1, eologf); fflush(eologf); if (DebugLog > 0) { //printf("Debug:%s,%s,%s,%s\n", timeBuf, idBuffer, eepBuffer, msg); printf("Debug:<%s>\n", Msg); } } // // // #ifdef UNITTEST int main(int ac, char **av) { char *module = NULL; char *action = NULL; char *msg = NULL; //char logname[BUFSIZ / 2]; //char bytes[6]; //int id = 0x12345678; int i; FILE *logf; //int sleepFlag = 0; //int times = 3; for(i = 1; i < ac; i++) { //if (!strcmp(av[i], "-s")) { // sleepFlag++; //} //else if (isdigit(av[i][0])) { // times = atoi(av[i]); //} if (!module) { module = av[i]; } else if (!action) { action = av[i]; } else { msg = av[i]; } } //logf = EoLogInit(NULL, NULL); logf = EoLogInitHourly("azr", NULL); if (logf == NULL) { fprintf(stderr, ": cannot open logfile=%s\n", "azr-9999"); return 0; } #if 0 for(i = 0; i < times; i++) { if (sleepFlag > 0) { sleep(3 * sleepFlag); } EoLog("01234567", "A5-02-04", msg); printf("%d\n", i); } #endif EoLog(module, action ? action : "", msg ? msg : ""); fclose(logf); return 0; } #endif //UNITTEST
On-orbit absolute temperature calibration using multiple phase change materials: overview of recent technology advancements NASA's anticipated plan for a mission dedicated to Climate (CLARREO) will hinge upon the ability to fly SI traceable standards that provide irrefutable absolute measurement accuracy. As an example, instrumentation designed to measure spectrally resolved infrared radiances will require high-emissivity calibration blackbodies that have absolute temperature uncertainties of better than 0.045K (3 sigma). A novel scheme to provide absolute calibration of temperature sensors onorbit, that uses the transient melt signatures from multiple phase change materials, has been demonstrated in the laboratory at the University of Wisconsin and is now undergoing technology advancement under NASA Instrument Incubator Program funding. Using small quantities of phase change material (less than half of a percent of the mass of the cavity), melt temperature accuracies of better than 10 mK have been demonstrated for mercury, water, and gallium (providing calibration from 233K to 303K). Refinements currently underway focus on ensuring that the melt materials in their sealed confinement housings perform as expected in the thermal and microgravity environment of a multi-year spaceflight mission. Thermal soak and cycling tests are underway to demonstrate that there is no dissolution from the housings into the melt materials that could alter melt temperature, and that there is no liquid metal embrittlement of the housings from the metal melt materials. In addition, NASA funding has been recently secured to conduct a demonstration of this scheme in the microgravity environment of the International Space Station.
<filename>src/test/java/jdk/java/util/ListTest.java package jdk.java.util; import java.util.ArrayList; import java.util.Arrays; import org.junit.Assert; import org.junit.Test; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * JDK8 List api 테스트 유닛 * * @since 2018-12-28 * @author fixalot */ public class ListTest { private static final Logger logger = LoggerFactory.getLogger(ListTest.class); /** * 리스트의 "d"를 찾아 "b"앞에 끼워넣기 * * @author fixalot */ @Test public void moveElement1() { ArrayList<String> list = getAList(); Assert.assertEquals("[a, b, c, d, f]", (String.valueOf(list))); // Collections.rotate(list, 2); // 이거 아님 // Assert.assertEquals("[d, f, a, b, c]", (String.valueOf(list))); list = move1(list, 3, 1); Assert.assertEquals("[a, d, b, c, f]", String.valueOf(list)); list = getAList(); list = move2(list, 3, 1); Assert.assertEquals("[a, d, b, c, f]", String.valueOf(list)); } private ArrayList<String> getAList() { ArrayList<String> list = new ArrayList<String>(Arrays.asList("a", "b", "c", "d", "f")); return list; } private ArrayList<String> move1(ArrayList<String> list, int target, int dest) { logger.debug("{}", list); // 일단 찾고 int index = list.indexOf("d"); Assert.assertEquals(target, index); String element = list.get(target); list.remove(target); logger.debug("{}", list); list.add(dest, element); return list; } /** * indexOf 생략하는 방식 * * @param list * @param target * @param dest * @return * @author fixalot */ private ArrayList<String> move2(ArrayList<String> list, int target, int dest) { logger.debug("{}", list); String element = list.get(target); list.remove(element); logger.debug("{}", list); list.add(dest, element); return list; } }
def heat_wave_total_length( tasmin: xarray.DataArray, tasmax: xarray.DataArray, thresh_tasmin: str = "22.0 degC", thresh_tasmax: str = "30 degC", window: int = 3, freq: str = "YS", ) -> xarray.DataArray: thresh_tasmax = convert_units_to(thresh_tasmax, tasmax) thresh_tasmin = convert_units_to(thresh_tasmin, tasmin) cond = (tasmin > thresh_tasmin) & (tasmax > thresh_tasmax) out = cond.resample(time=freq).map(rl.windowed_run_count, window=window) return to_agg_units(out, tasmin, "count")
On geometric constraint solving based on the immune neural network The geometric constraint solving is a popular problem in the current constraint design research. A constraint can describe a relation to be satisfied. Once the user defines a series of relations, the system will select a proper state to satisfy the constraints after the parameters are modified. Firstly we transform the constraint problem into an optimization problem. And then we propose a novel network framework combining the immune mechanism with the neural information - immune neural network to solve the geometric constraint problems. The users can make use of the characteristic information of the problem to be solved by the network and the network can be simplified by infusing the transcendental knowledge to adjust the the inspiriting function of the concealed layer unit so that the work efficiency and accuracy can be improved. The experiment can indicate that the immune neural network is not only feasible but also effective. It can simplify the framework applied in the concrete problem of the original model and it has a good work capability.
<reponame>v1259397/cosmic-gnuradio<filename>gnuradio-3.7.13.4/gr-qtgui/lib/plot_raster.cc<gh_stars>1-10 /* -*- c++ -*- */ /* * Copyright 2012,2013 Free Software Foundation, Inc. * * This file is part of GNU Radio * * GNU Radio is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3, or (at your option) * any later version. * * GNU Radio is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with GNU Radio; see the file COPYING. If not, write to * the Free Software Foundation, Inc., 51 Franklin Street, * Boston, MA 02110-1301, USA. */ #include <iostream> #include <qimage.h> #include <qpen.h> #include <qpainter.h> #include "qwt_painter.h" #include "qwt_scale_map.h" #include "qwt_color_map.h" #include <gnuradio/qtgui/plot_raster.h> #if QWT_VERSION < 0x060000 #include "qwt_double_interval.h" #endif typedef QVector<QRgb> QwtColorTable; class PlotTimeRasterImage: public QImage { // This class hides some Qt3/Qt4 API differences public: PlotTimeRasterImage(const QSize &size, QwtColorMap::Format format): QImage(size, format == QwtColorMap::RGB ? QImage::Format_ARGB32 : QImage::Format_Indexed8 ) { } PlotTimeRasterImage(const QImage &other): QImage(other) { } void initColorTable(const QImage& other) { setColorTable(other.colorTable()); } }; class PlotTimeRaster::PrivateData { public: PrivateData() { data = NULL; colorMap = new QwtLinearColorMap(); } ~PrivateData() { delete colorMap; } TimeRasterData *data; QwtColorMap *colorMap; }; /*! Sets the following item attributes: - QwtPlotItem::AutoScale: true - QwtPlotItem::Legend: false The z value is initialized to 8.0. \param title Title \sa QwtPlotItem::setItemAttribute(), QwtPlotItem::setZ() */ PlotTimeRaster::PlotTimeRaster(const QString &title) : QwtPlotRasterItem(title) { d_data = new PrivateData(); setItemAttribute(QwtPlotItem::AutoScale, true); setItemAttribute(QwtPlotItem::Legend, false); setZ(1.0); } //! Destructor PlotTimeRaster::~PlotTimeRaster() { delete d_data; } const TimeRasterData* PlotTimeRaster::data()const { return d_data->data; } void PlotTimeRaster::setData(TimeRasterData *data) { d_data->data = data; } //! \return QwtPlotItem::Rtti_PlotSpectrogram int PlotTimeRaster::rtti() const { return QwtPlotItem::Rtti_PlotGrid; } /*! Change the color map Often it is useful to display the mapping between intensities and colors as an additional plot axis, showing a color bar. \param map Color Map \sa colorMap(), QwtScaleWidget::setColorBarEnabled(), QwtScaleWidget::setColorMap() */ void PlotTimeRaster::setColorMap(const QwtColorMap *map) { delete d_data->colorMap; d_data->colorMap = (QwtColorMap*)map; invalidateCache(); itemChanged(); } /*! \return Color Map used for mapping the intensity values to colors \sa setColorMap() */ const QwtColorMap &PlotTimeRaster::colorMap() const { return *d_data->colorMap; } /*! \return Bounding rect of the data \sa QwtRasterData::boundingRect */ #if QWT_VERSION < 0x060000 QwtDoubleRect PlotTimeRaster::boundingRect() const { return d_data->data->boundingRect(); } #endif /*! \brief Returns the recommended raster for a given rect. F.e the raster hint is used to limit the resolution of the image that is rendered. \param rect Rect for the raster hint \return data().rasterHint(rect) */ #if QWT_VERSION < 0x060000 QSize PlotTimeRaster::rasterHint(const QwtDoubleRect &rect) const { return d_data->data->rasterHint(rect); } #endif /*! \brief Render an image from the data and color map. The area is translated into a rect of the paint device. For each pixel of this rect the intensity is mapped into a color. \param xMap X-Scale Map \param yMap Y-Scale Map \param area Area that should be rendered in scale coordinates. \return A QImage::Format_Indexed8 or QImage::Format_ARGB32 depending on the color map. \sa QwtRasterData::intensity(), QwtColorMap::rgb(), QwtColorMap::colorIndex() */ #if QWT_VERSION < 0x060000 QImage PlotTimeRaster::renderImage(const QwtScaleMap &xMap, const QwtScaleMap &yMap, const QwtDoubleRect &area) const #else QImage PlotTimeRaster::renderImage(const QwtScaleMap &xMap, const QwtScaleMap &yMap, const QRectF &area, const QSize &size) const #endif { if(area.isEmpty()) return QImage(); #if QWT_VERSION < 0x060000 QRect rect = transform(xMap, yMap, area); const QSize res = d_data->data->rasterHint(area); #else QRect rect = QwtScaleMap::transform(xMap, yMap, area).toRect(); const QSize res(-1,-1); #endif QwtScaleMap xxMap = xMap; QwtScaleMap yyMap = yMap; if(res.isValid()) { /* It is useless to render an image with a higher resolution than the data offers. Of course someone will have to scale this image later into the size of the given rect, but f.e. in case of postscript this will done on the printer. */ rect.setSize(rect.size().boundedTo(res)); int px1 = rect.x(); int px2 = rect.x() + rect.width(); if(xMap.p1() > xMap.p2()) qSwap(px1, px2); double sx1 = area.x(); double sx2 = area.x() + area.width(); if(xMap.s1() > xMap.s2()) qSwap(sx1, sx2); int py1 = rect.y(); int py2 = rect.y() + rect.height(); if(yMap.p1() > yMap.p2()) qSwap(py1, py2); double sy1 = area.y(); double sy2 = area.y() + area.height(); if(yMap.s1() > yMap.s2()) qSwap(sy1, sy2); xxMap.setPaintInterval(px1, px2); xxMap.setScaleInterval(sx1, sx2); yyMap.setPaintInterval(py1, py2); yyMap.setScaleInterval(sy1, sy2); } PlotTimeRasterImage image(rect.size(), d_data->colorMap->format()); #if QWT_VERSION < 0x060000 const QwtDoubleInterval intensityRange = d_data->data->range(); #else const QwtInterval intensityRange = d_data->data->interval(Qt::ZAxis); #endif if(!intensityRange.isValid()) return image; d_data->data->initRaster(area, rect.size()); if(d_data->colorMap->format() == QwtColorMap::RGB) { for(int y = rect.top(); y <= rect.bottom(); y++) { const double ty = yyMap.invTransform(y); QRgb *line = (QRgb *)image.scanLine(y - rect.top()); for(int x = rect.left(); x <= rect.right(); x++) { const double tx = xxMap.invTransform(x); *line++ = d_data->colorMap->rgb(intensityRange, d_data->data->value(tx, ty)); } } d_data->data->incrementResidual(); } else if(d_data->colorMap->format() == QwtColorMap::Indexed) { image.setColorTable(d_data->colorMap->colorTable(intensityRange)); for(int y = rect.top(); y <= rect.bottom(); y++) { const double ty = yyMap.invTransform(y); unsigned char *line = image.scanLine(y - rect.top()); for(int x = rect.left(); x <= rect.right(); x++) { const double tx = xxMap.invTransform(x); *line++ = d_data->colorMap->colorIndex(intensityRange, d_data->data->value(tx, ty)); } } } d_data->data->discardRaster(); // Mirror the image in case of inverted maps const bool hInvert = xxMap.p1() > xxMap.p2(); const bool vInvert = yyMap.p1() > yyMap.p2(); if(hInvert || vInvert) { image = image.mirrored(hInvert, vInvert); } return image; } #if QWT_VERSION < 0x060000 QwtDoubleInterval PlotTimeRaster::interval(Qt::Axis ax) const { return d_data->data->range(); } #else QwtInterval PlotTimeRaster::interval(Qt::Axis ax) const { return d_data->data->interval(ax); } #endif /*! \brief Draw the raster \param painter Painter \param xMap Maps x-values into pixel coordinates. \param yMap Maps y-values into pixel coordinates. \param canvasRect Contents rect of the canvas in painter coordinates \sa setDisplayMode, renderImage, QwtPlotRasterItem::draw, drawContourLines */ void PlotTimeRaster::draw(QPainter *painter, const QwtScaleMap &xMap, const QwtScaleMap &yMap, const QRect &canvasRect) const { QwtPlotRasterItem::draw(painter, xMap, yMap, canvasRect); }
<reponame>MouradSID/BiblioAppSystem package com.biblioapp.servicesImpl; import java.util.ArrayList; import java.util.List; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Service; import org.springframework.transaction.annotation.Transactional; import com.biblioapp.Dao.UtilisateurDao; import com.biblioapp.model.Utilisateur; import com.biblioapp.services.UtilisateurService; @Service("utilisateurService") @Transactional public class UtilisateurServiceImpl implements UtilisateurService { @Autowired private UtilisateurDao utilisateurDao; public List<Utilisateur> findAll() { List<Utilisateur> utilisateurs = new ArrayList<Utilisateur>(); utilisateurDao.findAll().forEach(utilisateurs::add); return utilisateurs; } public Utilisateur findById(long id) { return utilisateurDao.findById(id).get(); } public Utilisateur save(Utilisateur utilisateur) { return utilisateurDao.save(utilisateur); } public Utilisateur update(Utilisateur utilisateur) { return utilisateurDao.save(utilisateur); } public void deleteById(long id) { utilisateurDao.deleteById(id); } public boolean isExist(Utilisateur utilisateur) { return utilisateur.getId() > 0 && findById(utilisateur.getId()) != null; } public void deleteAll() { } public UtilisateurDao getUtilisateurDao() { return utilisateurDao; } public void setUtilisateurDao(UtilisateurDao utilisateurDao) { this.utilisateurDao = utilisateurDao; } }
Short and longterm results of transvenous catheter ablation of the atrioventricular conduction system Twentytwo patients with refractory supraventricular arrhythmias were treated by catheterdelivered highenergy shocks to the atrioventricular conduction system. All patients had a minimum followup period of six months (mean + SD, 15 + 9 months), at which time 21 of the 22 patients were free of symptoms and required no antiarrhythmic therapy. Permanent pacemakers were implanted in all patients. These results show that transvenous ablation or modification of atrioventricular conduction is a safe and effective technique to treat a wide range of supraventricular arrhythmias, and obviates the need for openheart surgery for the interruption of atrioventricular nodal conduction.
<filename>Plugins/SPlanner/Source/SPlanner/Public/SPlanner/AI/Task/Impl/ChooseTarget/SP_ChooseTargetPlayerTask.h // Copyright 2020 <NAME>. All Rights Reserved. #pragma once #include <SPlanner/AI/Task/Impl/ChooseTarget/SP_ChooseTargetActorTask.h> #include "SP_ChooseTargetPlayerTask.generated.h" /** * Target nearest player task implementation. */ UCLASS(BlueprintType, Blueprintable, ClassGroup = "SPlanner|Task|Target") class SPLANNER_API USP_ChooseTargetPlayerTask : public USP_ChooseTargetActorTask { GENERATED_BODY() protected: bool PostCondition_Implementation(USP_PlanGenInfos* Infos) const override; bool ResetPostCondition_Implementation(USP_PlanGenInfos* Infos) const override; ESP_PlanExecutionState Tick_Internal_Implementation(float DeltaSeconds, USP_AIPlannerComponent* Planner, USP_TaskInfos* TaskInfos) override; };
What Effect Does Gene-Screening Have? NIH study is trying to find answers. With new genetic testing available, researchers can calculate whether you have an increased risk for diabetes, breast cancer and heart disease, among other illnesses. But now the National Institutes of Health wants to find out whether it actually make any difference to someone who learns their risks. NIH researchers are starting to see results from the Multiplex Initiative, a project designed to answer that and other quandaries about genetic testing. While final results are a few months away, researchers say the initial signs are encouraging. People seem to be taking their genetic information in stride, according to Lawrence Brody, a senior investigator at the National Human Genome Research Institute and one of the researchers on the study. "These genetic things are not their destiny, just a guide," he told ABC News. In the spring of 2006, Brody and other NIH researchers partnered with doctors at the Henry Ford Hospital in Detroit to see whether people would pursue genetic screening to find out more about their DNA, how they would interpret the information they received, and what kind of medical advice they would seek once they had that information. "We'll learn a lot about whether they thought [a genetic screening] was a good idea, whether they were sorry, and whether or not they understood the test results," Brody told members of the media assembled at the Jackson Laboratory. So far, Brody said, patients who opted to get genetic information have been following up on it, and there have not been widespread incidents of people taking news of genetic susceptibilities harshly. But Brody emphasized that the current pilot program is just a first step, and will not be able to say on its own whether these genetics screenings lead to better overall health. "As a genetic counselor, I feel this type of research is really critical," said Jill Stopfer, a certified genetics counselor at the University of Pennsylvania's Abramson Cancer Center. "We need to know what to do with this information, we need to know how to deliver this information." Many geneticists are worried how patients will interpret their susceptibilities for various diseases. Brody cited the number of genes associated with breast cancer as an example of the difficulty of such interpretations. While some genes -- such as the widely-known breast cancer genes BRCA1 and BRCA2 -- can increase risk by up to 85 percent, Brody cited a number of other genes that have shown only a very slight increase in the risks of breast cancer. That lack of knowledge has led to concerns about the growth of direct-to-consumer testing, where companies offer to decode your genome and send you the results. Counselors like Stopfer worry about how people will interpret the results they get from such tests, since they typically do not include the counseling that would accompany it in a clinical setting. "It's not that they're hurling themselves off bridges, but they're making inappropriate medical decisions," said Stopfer, citing patients who undergo unnecessary operations to ward off cancers they have only a minor risk of ever contracting. "It's hard stuff to get, and we have to get it across in a way that it is understandable and actually motivates people," said Brody. For that reason, he said, much of the information distributed to patients has to be very carefully worded so that not only lay people, but doctors without a firm knowledge of genetics, would be able to understand it. "The medical community is not set up for this," said Brody. Additionally, Brody said, there was a need to make sure that even basic health advice was written differently to people with certain genes. The concern, he explained, was that a patient with a slight genetic susceptibility for heart disease and a patient without that risk should both exercise and avoid unhealthy eating, but if given the same advice, they might not understand the purpose of genetic testing and choose to ignore their results altogether. For many other genetic susceptibilities though, Brody expects the study to take a closer look at what tests are used and whether certain people really have to undergo those screenings. Brody also gave the example of Jeff Gulcher, the chief scientific officer for the genetic diagnostic company deCODE, who underwent genetic screening and learned that he was at risk for prostate cancer. Gulcher promptly underwent a screening for prostate cancer. And even though, in his late 40s, he was not old enough for screening to be routinely recommended, the disease had progressed to the point where he may have died before reaching the recommended screening age of 50. "Potentially that was a good thing, but when you go forward, you have to decide whether society's going to pay for it, and is this really a good thing?" said Brody. Clearly some believe that it's not. While many see gene testing as a positive, a significant number of patients choose not to undergo genetic testing. One other goal of the Multiplex Initiative is to figure out who does and does not want to undergo these tests. "We will know what, if you ask 2,000 people if they're interested in this, what the demographics and characteristics are of the people who say yes," said Brody. Thus far, genetic testing has focused largely on diseases where steps can be taken to avoid them. But even then, some people would rather avoid having even those risks hanging over their heads. "There are absolutely people who don't want to know. They want to take their chances," said Stopfer. That choice, ultimately, is left up to the individual. "People need to look it in the eye and decide: Is it worth living with the knowledge," said Stopfer, "or is it better to leave it lie?"
Increased lymphocyte adherence to human arterial endothelial cell monolayers in the context of allorecognition. The interactions of alloreactive T lymphocytes with the vascular endothelium were studied in an in vitro model of lymphocyte adherence to cultured human arterial endothelial cell (HAEC) monolayers. Donor-primed lymphocytes (DPL) were shown to have significantly greater adherence to donor HAEC than were third-party primed lymphocytes. Limiting dilution analysis of adherent DPL showed an enrichment of donor-reactive lymphocytes compared with nonadherent DPL. This study examines the allospecific nature of this increased lymphocyte adherence. HAEC constitutively express class I HLA Ag and can be induced by IFN-gamma to express class II Ag. DPL adherence to class I+ HAEC was inhibited only in the presence of mAb directed against class I Ag. DPL adherence to class I+ and class II+ HAEC was inhibited in the presence of mAb directed against class I and class II Ag. Class I- and class II-specific adherence was also shown to involve CD8 and CD4 molecules, respectively, whereas lymphocyte function-associated Ag do not appear to play a major role in long term alloreactive lymphocyte adherence to HAEC. These findings suggest that alloreactive lymphocyte adherence to HAEC is mediated by two mechanisms. One is based on allorecognition, primarily of HLA Ag, and the other is related to presumably non-Ag-specific interactions between activated lymphocytes and the vascular endothelium. The studies presented provide evidence to suggest that HLA-specific lymphocyte adherence to endothelium may significantly contribute to the development of alloreactive lymphocyte infiltrates within the allograft.
/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.cxf.systest.sts.usernametoken; import java.net.URL; import java.util.Arrays; import java.util.Collection; import javax.xml.namespace.QName; import javax.xml.ws.Service; import org.apache.cxf.Bus; import org.apache.cxf.BusFactory; import org.apache.cxf.bus.spring.SpringBusFactory; import org.apache.cxf.systest.sts.common.SecurityTestUtil; import org.apache.cxf.systest.sts.common.TestParam; import org.apache.cxf.systest.sts.deployment.STSServer; import org.apache.cxf.systest.sts.deployment.StaxSTSServer; import org.apache.cxf.testutil.common.AbstractBusClientServerTestBase; import org.example.contract.doubleit.DoubleItPortType; import org.junit.BeforeClass; import org.junit.runner.RunWith; import org.junit.runners.Parameterized.Parameters; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertTrue; import static org.junit.Assert.fail; /** * In this test case, a CXF client sends a Username Token via (1-way) TLS to a CXF provider. * The provider dispatches the Username Token to an STS for validation (via TLS). It also * includes a test where the service provider sends the token for validation using the * WS-Trust "Issue" binding, and sending the token "OnBehalfOf". Roles are also requested, and * access is only granted to the service if the "admin-user" role is in effect. */ @RunWith(value = org.junit.runners.Parameterized.class) public class UsernameTokenTest extends AbstractBusClientServerTestBase { static final String STSPORT = allocatePort(STSServer.class); static final String STAX_STSPORT = allocatePort(StaxSTSServer.class); private static final String NAMESPACE = "http://www.example.org/contract/DoubleIt"; private static final QName SERVICE_QNAME = new QName(NAMESPACE, "DoubleItService"); private static final String PORT = allocatePort(Server.class); private static final String STAX_PORT = allocatePort(StaxServer.class); final TestParam test; public UsernameTokenTest(TestParam type) { this.test = type; } @BeforeClass public static void startServers() throws Exception { assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(Server.class, true) ); assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(StaxServer.class, true) ); assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(STSServer.class, true) ); assertTrue( "Server failed to launch", // run the server in the same process // set this to false to fork launchServer(StaxSTSServer.class, true) ); } @Parameters(name = "{0}") public static Collection<TestParam> data() { return Arrays.asList(new TestParam[] {new TestParam(PORT, false, ""), new TestParam(PORT, true, ""), new TestParam(STAX_PORT, false, ""), new TestParam(STAX_PORT, true, ""), }); } @org.junit.AfterClass public static void cleanup() throws Exception { stopAllServers(); } @org.junit.Test public void testUsernameToken() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = UsernameTokenTest.class.getResource("cxf-client.xml"); Bus bus = bf.createBus(busFile.toString()); BusFactory.setDefaultBus(bus); BusFactory.setThreadDefaultBus(bus); URL wsdl = UsernameTokenTest.class.getResource("DoubleIt.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItTransportUTPort"); DoubleItPortType transportUTPort = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(transportUTPort, test.getPort()); if (test.isStreaming()) { SecurityTestUtil.enableStreaming(transportUTPort); } doubleIt(transportUTPort, 25); ((java.io.Closeable)transportUTPort).close(); bus.shutdown(true); } @org.junit.Test public void testBadUsernameToken() throws Exception { SpringBusFactory bf = new SpringBusFactory(); URL busFile = UsernameTokenTest.class.getResource("cxf-bad-client.xml"); Bus bus = bf.createBus(busFile.toString()); BusFactory.setDefaultBus(bus); BusFactory.setThreadDefaultBus(bus); URL wsdl = UsernameTokenTest.class.getResource("DoubleIt.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItTransportUTPort"); DoubleItPortType transportUTPort = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(transportUTPort, test.getPort()); if (test.isStreaming()) { SecurityTestUtil.enableStreaming(transportUTPort); } try { doubleIt(transportUTPort, 30); fail("Expected failure on a bad password"); } catch (javax.xml.ws.soap.SOAPFaultException fault) { // expected } ((java.io.Closeable)transportUTPort).close(); bus.shutdown(true); } @org.junit.Test public void testUsernameTokenAuthorization() throws Exception { // Token transformation is not supported for the streaming code if (STAX_PORT.equals(test.getPort())) { return; } SpringBusFactory bf = new SpringBusFactory(); URL busFile = UsernameTokenTest.class.getResource("cxf-client.xml"); Bus bus = bf.createBus(busFile.toString()); BusFactory.setDefaultBus(bus); BusFactory.setThreadDefaultBus(bus); URL wsdl = UsernameTokenTest.class.getResource("DoubleIt.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItTransportUTAuthorizationPort"); DoubleItPortType transportUTPort = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(transportUTPort, test.getPort()); if (test.isStreaming()) { SecurityTestUtil.enableStreaming(transportUTPort); } doubleIt(transportUTPort, 25); ((java.io.Closeable)transportUTPort).close(); bus.shutdown(true); } @org.junit.Test public void testUnauthorizedUsernameToken() throws Exception { // Token transformation is not supported for the streaming code if (STAX_PORT.equals(test.getPort())) { return; } SpringBusFactory bf = new SpringBusFactory(); URL busFile = UsernameTokenTest.class.getResource("cxf-bad-client.xml"); Bus bus = bf.createBus(busFile.toString()); BusFactory.setDefaultBus(bus); BusFactory.setThreadDefaultBus(bus); URL wsdl = UsernameTokenTest.class.getResource("DoubleIt.wsdl"); Service service = Service.create(wsdl, SERVICE_QNAME); QName portQName = new QName(NAMESPACE, "DoubleItTransportUTAuthorizationPort"); DoubleItPortType transportUTPort = service.getPort(portQName, DoubleItPortType.class); updateAddressPort(transportUTPort, test.getPort()); if (test.isStreaming()) { SecurityTestUtil.enableStreaming(transportUTPort); } try { doubleIt(transportUTPort, 30); fail("Expected failure on a bad password"); } catch (javax.xml.ws.soap.SOAPFaultException fault) { // expected } ((java.io.Closeable)transportUTPort).close(); bus.shutdown(true); } private static void doubleIt(DoubleItPortType port, int numToDouble) { int resp = port.doubleIt(numToDouble); assertEquals(numToDouble * 2L, resp); } }
/** * Copyright (C) 2011 <NAME> <<EMAIL>> * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.onebusaway.transit_data_federation_webapp.controllers; import java.util.List; import org.onebusaway.gtfs.model.AgencyAndId; import org.onebusaway.transit_data_federation.services.AgencyAndIdLibrary; import org.onebusaway.transit_data_federation.services.transit_graph.StopEntry; import org.onebusaway.transit_data_federation.services.transit_graph.TransitGraphDao; import org.onebusaway.transit_data_federation.services.tripplanner.StopTransfer; import org.onebusaway.transit_data_federation.services.tripplanner.StopTransferService; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Controller; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RequestParam; import org.springframework.web.servlet.ModelAndView; @Controller @RequestMapping("/transfers-for-stop.action") public class TransfersForStopController { @Autowired private TransitGraphDao _graphDao; @Autowired private StopTransferService _stopTransferService; @RequestMapping() public ModelAndView index(@RequestParam() String stopId) { AgencyAndId id = AgencyAndIdLibrary.convertFromString(stopId); StopEntry stop = _graphDao.getStopEntryForId(id); List<StopTransfer> transfers = _stopTransferService.getTransfersFromStop(stop); ModelAndView mv = new ModelAndView("transfers-for-stop.jspx"); mv.addObject("transfers", transfers); return mv; } }
/********************************************************************* * * Setup descriptor buffer(s) from system mbuf buffer pools. * i - designates the ring index * clean - tells the function whether to update * the header, the packet buffer, or both. * **********************************************************************/ static int igb_get_buf(struct rx_ring *rxr, int i, u8 clean) { struct adapter *adapter = rxr->adapter; struct igb_rx_buf *rxbuf; struct mbuf *mh, *mp; bus_dma_segment_t hseg[1]; bus_dma_segment_t pseg[1]; bus_dmamap_t map; int nsegs, error; int mbflags; mbflags = (clean & IGB_CLEAN_INITIAL) ? MB_WAIT : MB_DONTWAIT; rxbuf = &rxr->rx_buffers[i]; mh = mp = NULL; if ((clean & IGB_CLEAN_HEADER) != 0) { mh = m_gethdr(mbflags, MT_DATA); if (mh == NULL) { adapter->mbuf_header_failed++; return (ENOBUFS); } mh->m_pkthdr.len = mh->m_len = MHLEN; m_adj(mh, ETHER_ALIGN); error = bus_dmamap_load_mbuf_segment(rxr->rx_htag, rxr->rx_hspare_map, mh, hseg, 1, &nsegs, BUS_DMA_NOWAIT); if (error != 0) { m_freem(mh); return (error); } mh->m_flags &= ~M_PKTHDR; } if ((clean & IGB_CLEAN_PAYLOAD) != 0) { mp = m_getl(adapter->rx_mbuf_sz, mbflags, MT_DATA, M_PKTHDR, NULL); #if 0 mp = m_getjcl(MB_DONTWAIT, MT_DATA, M_PKTHDR, adapter->rx_mbuf_sz); #endif if (mp == NULL) { if (mh != NULL) { adapter->mbuf_packet_failed++; bus_dmamap_unload(rxr->rx_htag, rxbuf->head_map); mh->m_flags |= M_PKTHDR; m_freem(mh); } return (ENOBUFS); } mp->m_pkthdr.len = mp->m_len = adapter->rx_mbuf_sz; error = bus_dmamap_load_mbuf_segment(rxr->rx_ptag, rxr->rx_pspare_map, mp, pseg, 1, &nsegs, BUS_DMA_NOWAIT); if (error != 0) { if (mh != NULL) { bus_dmamap_unload(rxr->rx_htag, rxbuf->head_map); mh->m_flags |= M_PKTHDR; m_freem(mh); } m_freem(mp); return (error); } mp->m_flags &= ~M_PKTHDR; } if ((clean & IGB_CLEAN_HEADER) != 0 && rxbuf->m_head != NULL) { bus_dmamap_sync(rxr->rx_htag, rxbuf->head_map, BUS_DMASYNC_POSTREAD); bus_dmamap_unload(rxr->rx_htag, rxbuf->head_map); } if ((clean & IGB_CLEAN_PAYLOAD) != 0 && rxbuf->m_pack != NULL) { bus_dmamap_sync(rxr->rx_ptag, rxbuf->pack_map, BUS_DMASYNC_POSTREAD); bus_dmamap_unload(rxr->rx_ptag, rxbuf->pack_map); } if ((clean & IGB_CLEAN_HEADER) != 0) { map = rxbuf->head_map; rxbuf->head_map = rxr->rx_hspare_map; rxr->rx_hspare_map = map; rxbuf->m_head = mh; bus_dmamap_sync(rxr->rx_htag, rxbuf->head_map, BUS_DMASYNC_PREREAD); rxr->rx_base[i].read.hdr_addr = htole64(hseg[0].ds_addr); } if ((clean & IGB_CLEAN_PAYLOAD) != 0) { map = rxbuf->pack_map; rxbuf->pack_map = rxr->rx_pspare_map; rxr->rx_pspare_map = map; rxbuf->m_pack = mp; bus_dmamap_sync(rxr->rx_ptag, rxbuf->pack_map, BUS_DMASYNC_PREREAD); rxr->rx_base[i].read.pkt_addr = htole64(pseg[0].ds_addr); } return (0); }
<filename>samples/client.go package main import ( "flag" "fmt" "io/ioutil" "net/http" "github.com/eddieraa/registry" pb "github.com/eddieraa/registry/nats" "github.com/nats-io/nats.go" "github.com/sirupsen/logrus" ) func main() { var serviceName string flag.StringVar(&serviceName, "service-name", "httptest", "http service name") var natsURL string flag.StringVar(&natsURL, "nats-url", "localhost:4222", "NATS server URL ") var loadBalance bool flag.BoolVar(&loadBalance, "load-balance", false, "Activate load balancing") //parse flag.Parse() conn, err := nats.Connect(natsURL) if err != nil { logrus.Fatal("could not connect to nats ", err) } reg, err := registry.SetDefault(pb.Nats(conn), registry.AddFilter(registry.LoadBalanceFilter())) if err != nil { logrus.Fatal("could not connect to nats ", err) } for i := 0; i < 10; i++ { service, err := reg.GetService(serviceName) if err != nil { logrus.Fatalf("Could not get service %s: %v", serviceName, err) } rep, err := http.Get(fmt.Sprintf("http://%s/httptest", service.Address)) if err != nil { logrus.Fatal("Could net request url ", err) } out, _ := ioutil.ReadAll(rep.Body) logrus.Info("Read ", string(out)) } reg.Close() }
Extracting the Maritime Traffic Route in Korea Based on Probabilistic Approach Using Automatic Identification System Big Data To protect the environment around the world, we are actively developing ecofriendly energy. Offshore wind farm generation installed in the sea is extremely large among various energies, and friction with ships occurs regularly. Other than the traffic designated area and the traffic separate scheme, traffic routes in other sea areas are not protected in Korea. Furthermore, due to increased cargo volume and ship size, there is a risk of collisions with marine facilities and marine pollution. In this study, maritime safety traffic routes that must be preserved are created to ensure the safety of maritime traffic and to prevent accidents with ecofriendly energy projects. To construct maritime traffic routes, the analysis area is divided, and ships are classified using big data. These data are used to estimate density, and 50% maritime traffic is chosen. This result is obtained by categorizing the main route, inner branch route, and outer branch route. The Korean maritime traffic route is constructed, and the width of the route is indicated. Furthermore, this route can be applied as a navigation route for maritime autonomous surface ships.
Switching performance comparison of the SiC JFET and the SiC JFET/Si MOSFET cascode configuration Silicon Carbide (SiC) devices are becoming increasingly available in the market due to the fact that its manufacturing process is more mature. Many are their advantages with respect to the silicon (Si) devices as, for example, higher blocking capability, lower conduction voltage drop and faster transitions, which makes them more suitable for high-power and high-frequency converters. The purpose of this paper is to study the switching behavior of the two configurations more-widely studied in the literature using SiC devices: the normally-on SiC JFET and the cascode using a normally-on SiC JFET and a low-voltage Si MOSFET. A comparison regarding the turn-on and turn-off losses of both configurations is detailed and the results are verified with the experimental efficiency results obtained in a boost converter operating in both Continuous Conduction Mode (CCM) and Discontinuous Conduction Mode (DCM). Furthermore, a special attention will be focused on the switching behavior of the cascode configuration and the effect of its low-voltage MOSFET is analyzed and different Si devices are compared. The study carried out will confirm that the overall switching losses of the JFET are lower, making it more suitable to operate in CCM in terms of the global efficiency of the converter. Nevertheless, the lowest turn-off losses of the cascode highlight this device as the most appropriate one for DCM when ZVS is achieved at the turn-on of the main switch. Finally, all theoretical results have been verified by an experimental 600W boost converter.
A Comparative Study of Cardiac Output Measurement by Dye Dilution and Pulsed Doppler Ultrasound Dye dilution was compared with pulsed doppler for the measurement of cardiac output in eighteen children being ventilated after cardiac surgery. The mean difference between the two techniques was -0.04 l/min (dye minus doppler) with 95% confidence limits of 0.25 l/min and -0.33 l/min over a cardiac output range 0.276.12 l/min; this difference is not significant. Calculation of the product-moment correlation coefficient showed a close relationship between the dye dilution and doppler methods with r = 0.97. Pulsed doppler is a new noninvasive technique that can be used instead of dye dilution for the measurement of cardiac output in co-operative or anaesthetised children.
<filename>src/AlgorithmV1.py import Lectura import ClaseHorario as cl #instalar las librerias de pandas y de sqlalchemy "pi pandas y pi sqlalchemy" engine = Lectura.conexion_BD() #guarda la conexion en un objeto de conexion #Leer todos los archivos #df = Lectura.lee_csv("C:/Users/angel/Documents/python/archivos_csv/AlumnosOculto.csv") # se pasa como parametro la ubicacion del csv , obtiene el dataframework #df = lee_csv("D:/Documentos/archivos_p/materiaspn.csv") # se pasa como parametro la ubicacion del csv , obtiene el dataframework #LA LECTURA DE ARCHIVOS COMO CSV NO LEE CARACTERES ESPECIALES COMO ACENTOS O LA LETRA Ñ #print(df) #Lectura.inserta_BD(df,"alumnos",engine) #para que inserte lo que leyo del csv en la BD es necesario mandar como parametro el dataFramework, nombre de la tabla y la conexion #Lectura.Leeinserta("C:/Users/angel/Documents/python/archivos_csv/AlumnosOculto.csv", "alumnos", engine) #Lectura.Leeinserta("C:/Users/angel/Documents/python/archivos_csv/carreras.csv","carreras",engine) #Lectura.Leeinserta("C:/Users/angel/Documents/python/archivos_csv/materia_carrera.csv","materia_carrera",engine) #Lectura.Leeinserta("C:/Users/angel/Documents/python/archivos_csv/materias.csv","materias",engine) Lectura.BorrarHorarios() PilaAlumnos = [] def EncuentraAlumnoPila(cveunica): for item in PilaAlumnos: if(item.cveu == cveunica): return item #Inscribe una materia en la base de datos y en la matriz del alumno def inscribe_materia(cveunica, idmateria, grupo): dato = Lectura.Obtiene_Grupo(idmateria,grupo) item = dato[0] Alumno = EncuentraAlumnoPila(cveunica) Alumno.Inscribe_materia_matriz(item) #Dentro de este if tendria que guardar en la base de datos al alumno con la materia y grupo que se acaba de crear Lectura.InsertaMateria(cveunica,idmateria,item[1]) #Decrementar en uno el cupo de la materia Lectura.DecrementaCupo(item[0],item[1]) def desinscribe_materia(cveunica, idmateria, grupo): dato = Lectura.Obtiene_Grupo(idmateria,grupo) item = dato[0] Alumno = EncuentraAlumnoPila(cveunica) Alumno.Desinscribe_materia_matriz(item) Lectura.Elimina_materia(cveunica,idmateria) Lectura.AumentaCupo(item[0],item[1]) def posible_inscribir(cveunica, idmateria, grupo): band = True dato = Lectura.Obtiene_Grupo(idmateria,grupo) item = dato[0] Alumno = EncuentraAlumnoPila(cveunica) if (Alumno.VerificaOcupado(item) == 0): band = False return band ### -------------La lista de materias es una consulta, la dejo comentada ------------- ### Lista = Lectura.Lista_materias() # solo se obtiene el id de las materias que existen #Algoritmo iterativo def AlgoritmoIterativoV2(o_self): #primero obtener todos los alumnos df = Lectura.Consulta_Tabla("alumnos") total = len(df) contador = 0 #La tabla alumnos contiene 2 columnas cve_unica y id_carrera por lo tanto df sera una matriz de 2*n alumnos por lo que #por lo que el for que va mas afuera sera el de los alumnos #Crear una lista de alumnos #PilaAlumnos = [] for cveunica,idcarrera in df: #con este for ya estariamos iterando en todos los alumnos, lo siquiente que hay que hacer es obtner cuales son las materias que se #tienen que inscribir a este alumno segun su carrera #Instanciar un nuevo alumno Alumno = cl.Horario(cveunica) progreso = 95*contador/total o_self.progreso.set(progreso) contador += 1 o_self.root.update_idletasks()#esta funcion nos permite lograr percibir el avance de la barra materias = Lectura.MateriasdeCarreraSegunAlumno(cveunica) #Segundo iterador for para navegar entre las materias que necesita inscribir el alumno for idmat, idcar, nom in materias: #for iterador de materias #por cada materia obtener los grupos que hay de ella y que aun tengan cupo #verificar lo siguiente: 2. Es la primer materia del alumno?. 3 Si no es la primera, iterar en los demas grupos para ver cual grupo esta mas cerca # Cuando se encuentre el grupo mas cercano asignarle ese a su horario y 1. Bajarle el cupo. 2. Asignar a matriz horario del alumno grupos = Lectura.ObtieneGruposEquitativo(idmat) #columnas 0 1 2 3 4 5 6 7 8 9 10 #metadaro idmateria grupo maestro cupo lun_i lun_fin mart_i mart_fin ....... for item in grupos: #verificar el grupo no se empalma con el horario que ya se tiene #dia=0 #bandera = 1 #for i in range(0,10,2): # if(item[i+4] != 0): # if(Alumno.VerificaOcupado(item[i+4],item[i+5],dia) == 0): # bandera=0 # break # dia = dia + 1 bandera = Alumno.VerificaOcupado(item) #Si la bandera se queda en 0 entonces significa que ya existe una clase en la hora de el grupo que se quiere meter si no #el algoritmo setea la clase con un 1 en las horas if(bandera != 0): #escribir en una tabla de BD el horario o guardar clave alumno, clave materia , grupo #dia=0 #for i in range(0,10,2): # if(item[i+4] != 0): # Alumno.SetHora(item[i+4],item[i+5],dia) # dia = dia + 1 Alumno.Inscribe_materia_matriz(item) #Dentro de este if tendria que guardar en la base de datos al alumno con la materia y grupo que se acaba de crear Lectura.InsertaMateria(cveunica,idmat,item[1]) #Decrementar en uno el cupo de la materia Lectura.DecrementaCupo(item[0],item[1]) break PilaAlumnos.append(Alumno) #Se asigna el alumno a la pila ## primer metodo : regresa la matriz del alumno segun su clave unica def get_matriz_cupo(cveunica): for item in PilaAlumnos: if(item.cveu == cveunica): return item.matrizHor ## segundo metodo : regresa si el alumno esta completo def esta_completo(cveunica): if(Lectura.Materias_inscritas(cveunica)[0] == Lectura.Materias_de_Alumno(cveunica)[0]): return True #AlgoritmoIterativoV2() #Lectura.Imprime_datos(Lectura.Consulta_Tabla("alumnos")) # imprime los datos que se guardaron en la BD #Lectura.Crea_csv_horario(Lectura.Consulta_Tabla("alumnos"))
import { Injectable } from '@angular/core'; import { map } from 'rxjs/operators'; import { Effect, Actions, ofType } from '@ngrx/effects'; import { AddAuthInfo, AuthActionTypes, AuthInfoAdded } from './auth.action'; @Injectable() export class AuthEffect { // COMMAND ADD_AUTH_INFO emits EVENT AUTH_INFO_ADDED @Effect() addAuthInfo$ = this.actions$.pipe( ofType<AddAuthInfo>(AuthActionTypes.ADD_AUTH_INFO), map((action) => action.payload), map(({ authInfo }) => { return new AuthInfoAdded({ authInfo }); }) ); constructor(private actions$: Actions) {} }
<filename>include/boost/beast/zlib/error.hpp // // Copyright (c) 2016-2019 <NAME> (vinnie dot falco at gmail dot com) // // Distributed under the Boost Software License, Version 1.0. (See accompanying // file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) // // Official repository: https://github.com/boostorg/beast // // This is a derivative work based on Zlib, copyright below: /* Copyright (C) 1995-2013 <NAME> and <NAME> This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. <NAME> <NAME> <EMAIL> <EMAIL> The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files http://tools.ietf.org/html/rfc1950 (zlib format), rfc1951 (deflate format) and rfc1952 (gzip format). */ #ifndef BOOST_BEAST_ZLIB_ERROR_HPP #define BOOST_BEAST_ZLIB_ERROR_HPP #include <boost/beast/core/detail/config.hpp> #include <boost/beast/core/error.hpp> namespace boost { namespace beast { namespace zlib { /** Error codes returned by the deflate codecs. */ enum class error { /** Additional buffers are required. This error indicates that one or both of the buffers provided buffers do not have sufficient available bytes to make forward progress. This does not always indicate a failure condition. @note This is the same as `Z_BUF_ERROR` returned by ZLib. */ need_buffers = 1, /** End of stream reached. @note This is the same as `Z_STREAM_END` returned by ZLib. */ end_of_stream, /** Invalid stream or parameters. This error is returned when invalid parameters are passed, or the operation being performed is not consistent with the state of the stream. For example, attempting to write data when the end of stream is already reached. @note This is the same as `Z_STREAM_ERROR` returned by ZLib. */ stream_error, // // Errors generated by basic_deflate_stream // // // Errors generated by basic_inflate_stream // /// Invalid block type invalid_block_type, /// Invalid stored block length invalid_stored_length, /// Too many length or distance symbols too_many_symbols, /// Invalid code lengths invalid_code_lenths, /// Invalid bit length repeat invalid_bit_length_repeat, /// Missing end of block code missing_eob, /// Invalid literal/length code invalid_literal_length, /// Invalid distance code invalid_distance_code, /// Invalid distance too far back invalid_distance, // // Errors generated by inflate_table // /// Over-subscribed length code over_subscribed_length, /// Incomplete length set incomplete_length_set, /// general error general }; } // zlib } // beast } // boost #include <boost/beast/zlib/impl/error.hpp> #endif
package com.xiao.tx.config; import com.zaxxer.hikari.HikariDataSource; import org.springframework.boot.autoconfigure.AutoConfigureAfter; import org.springframework.boot.autoconfigure.condition.ConditionalOnMissingBean; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.jdbc.core.JdbcTemplate; import org.springframework.jdbc.datasource.DataSourceTransactionManager; import org.springframework.transaction.TransactionManager; import javax.sql.DataSource; /** * @author <NAME> * @create 2021年07月07日 21:39:00 */ @Configuration public class JdbcConfig { @Bean public DataSource dataSource() { HikariDataSource dataSource = new HikariDataSource(); dataSource.setJdbcUrl("jdbc:h2:database/h2db"); dataSource.setDriverClassName("org.h2.Driver"); dataSource.setUsername("sa"); dataSource.setPassword("<PASSWORD>"); return dataSource; } @Bean public JdbcTemplate jdbcTemplate(DataSource dataSource) { return new JdbcTemplate(dataSource); } @Bean public TransactionManager transactionManager(DataSource dataSource) { DataSourceTransactionManager transactionManager = new DataSourceTransactionManager(); transactionManager.setDataSource(dataSource); return transactionManager; } }
Russian President Vladimir Putin listens to reporter question during a joint news conference with Italian Prime Minister Matteo Renzi at the end of a meeting in Milan, northern Italy, June 10, 2015. MOSCOW, June 22 (Reuters) - Russia plans to extend a ban on Western food imports for six months starting from early August and may add new products to the list, in retaliation to extended European sanctions against Moscow, officials said on Monday. European Union foreign ministers extended economic sanctions against Russia until Jan. 31 on Monday, keeping up pressure on Moscow to help resolve the Ukraine conflict. "Taking into account that the European Union has extended sanctions against the Russian Federation for half a year, I ask you to prepare my proposal to the president to extend the presidential degree (on the ban) for this period," Russian Prime Minister Dmitry Medvedev told a meeting with his deputies. Russia had been widely expected to prolong the ban beyond an Aug. 8 deadline, as officials previously said the decision directly depended on the European sanctions extension. Russia's Agriculture Ministry has started to prepare a proposal for the list of imports to be included in the ban and may add new products to the list, Ilya Ananyev, the ministry representative, told Reuters. "We are preparing proposals on the list of products, its extension is not our decision," Ananyev said. The ban, which prohibits food imports worth $9 billion from the United States, European Union, Australia, Canada and Norway, was imposed for a year in retaliation to Western sanctions on Russia over the Ukraine crisis. But the Kremlin is unlikely to approve the addition of new products to the list, sticking to what it calls a policy of reciprocity, one of the Russian officials said. Russia banned imports of fruit, vegetables, meat, poultry, fish, milk and dairy.
Study of e-procurement implementation impacts: A case study in PT. PLN E-procurement gains its popularity through people's trends of using the internet. Transparancy factor of e-procurements is expected to reduce corruption in government projects, as an effort to achieve good corporate governance (GCG). The aim of this study was to analyze the impact of e-procurement in PT. PLN (Persero). Impacts were assessed by conducting structured interview to the people who were involved in procurement process, such as procurement committees, senior manager of e-procurement applications, business process owner, and developers at PT. PLN. This study focused on the gap analysis of conditions in PT. PLN before and after the implementation of e-procurement. This study concluded that the implementation of e-procurement in PT. PLN gave significant impacts on the total cost of acquisitions, organizational characteristics, governance structure, pre-sourcing business processes, and procurement quotation.
use crate::common::*; #[derive(Clone, Copy, Debug, PartialEq, IntoStaticStr, EnumString)] #[strum(serialize_all = "kebab-case")] pub(crate) enum SortOrder { Ascending, Descending, } impl SortOrder { pub(crate) fn name(self) -> &'static str { self.into() } } impl Default for SortOrder { fn default() -> Self { Self::Ascending } }
The video will start in 8 Cancel Get the biggest Everton FC stories by email Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Could not subscribe, try again later Invalid Email Everton have had a bid accepted for young Newcastle United defender Lewis Gibson. The Blues are now hoping to convince the 17-year-old to ignore overtures from clubs including Spurs and join their under-23s set up. Everton have agreed a deal with Newcastle that would be worth in excess of £6m for the highly-rated England youth international. Gibson has gathered a reputation as one of the most talented young defenders in the country and Steve Walsh quickly made him a priority signing for David Unsworth's squad this summer. Everton have moved a step closer to signing the left footed teenager but a deal is far from certain with Spurs, Southampton and others vying for his services.
/** * Send this update to all other replicas. * @param message the message. */ public void propagateUpdate(final byte[] message) { while(proxy.invokeUnordered(message) == null) { Log.getLogger().error("Slave update failed, no response, trying again!"); } }
Tunable microwave filters based on coplanar lines The electromechanical tune method for microwave filters based on coplanar lines are proposed. The simulation of the proposed filter structure was made by finite differences method in the time domain. This method allows tuning for resonance frequency about 80 percents with the air gap between the substrate and the signal electrode width about 50 m. The proposed method can be realized with MEMS technology and piezoelectric actuators.
Annual Report for the Department of Energy: 1999-2000, Nuclear Theory Group at the University of Washington This document is a summary of the physics research carried out by the Nuclear Theory Group at the University of Washington during the last twelve-month period, 1999-2000. I. EFFECTIVE FIELD THEORIES IN MULTI-NUCLEON SYSTEMS Since Weinberg's pioneering efforts to describe nuclear systems with effective field theory (EFT), nuclear physicists have spent the last decade attempting to realize this dream. Beane, Chen 2, Griehammer 3, Phillips 4, Rupak 5 and Savage at the University of Washington have on-going programs to develop a systematic and perturbative theory to describe multinucleon systems. During the last year, important progress has been made in our ability to calculate observables in the two-and three-nucleon sectors. Techniques have been developed that enable precision calculations of low-energy observables, particularly those involving the deuteron. The recent revelation by Burles, Nollet, Truran and Turner that the theoretical uncertainty in the cross section for np → d at low-energies (which they estimated to be ∼ 5%) made a significant contribution to the uncertainties of elemental abundances computed in the Big-Bang, motivated Jiun-Wei Chen, Gautam Rupak and Martin Savage to examine this process with EFT. Chen and Savage were able to derive expressions for the cross section that had an associated error of ∼ 3% over the energy region of interest. This amplitude involves one constant that is not determined by nucleon-nucleon scattering data, however, it is determined by the precisely measured cross section for thermal neutron capture. The predicted cross section for d → np is shown in Figure 1. Rupak was able to extend this calculation to one higher order in the EFT expansion and so obtain a cross section with an associated uncertainty of ∼ 1%. An additional constant appears at this order and is determined by the cross section for d → np at higher energies. Consequently, the theoretical uncertainty for this process that enters nucleosynthesis codes is reduced by a factor of ∼ 5, thereby eliminating this process as a significant source of uncertainty. 2 PhD student of Savage who graduated in 1999 and is currently a Postdoctoral Fellow at the University of Maryland 3 A Postdoctoral Fellow in our group during 1997-1999, and currently a researcher at Munich. 4 Currently a Research Assistant Professor in our group, and who will assume a tenure-track Assistant Professor position at Ohio University in the fall of 2000. 5 Currently a PhD student of Savage, who will assume a Postdoctoral position at TRIUMF in the fall of 2000. The electric and magnetic polarizabilities of the neutron and proton provide great insight into the structure of the nucleon. Due to the absence of pure neutron targets, efforts to extract neutron polarizabilities from processes involving nuclei continue. The reactions are of particular interest because, provided suitable kinematics are chosen, they may allow the extraction of electromagnetic polarizabilities of the neutron. In baryon chiral perturbation theory hadronic effects can be included systematically, order-by-order in the chiral expansion. Consequently, the hadronic part of the reactions can be calculated in a controlled way, and effects due to electromagnetic polarizabilities of the neutron can be reliably extracted from the data. We have recently computed the elastic photon-deuteron scattering to next-to-leading order using Weinberg's power counting. The results appeared in, and are in reasonable agreement with the data from Illinois, although they differ from the recent SAL data as do all reasonable extant theoretical calculations. During the fall of 1999 Dr. Malheiro visited our group, and considerable progress was made towards performing the calculation to next order. This higher-order calculation has the advantage that the neutron polarizabilities appear as the only free parameter at this order in chiral perturbation theory. It also allows for a test of the convergence of the chiral expansion for this reaction. In Figure 2 results of three orders for this calculation are compared to the data at a photon energy of 69 MeV. The recent complete one-loop calculation of pion-nucleon scattering in chiral perturbation theory has greatly improved the description of pion-nucleon scattering. In fact, the agreement with the low-energy pion-nucleon scattering data is now quite good. The logical next step is to apply the recently developed techniques to describe the deuteron in EFT to pion-deuteron scattering. This is of particular interest because the pion-deuteron scattering experiment constrains the isoscalar combination of − N scattering lengths, a +. However, as in the case of the neutron polarizability, if one is to extract this quantity reliably one must employ a formalism in which the two-body corrections to the reaction mechanism are under control. We have had preliminary discussions regarding this calculation. At energies well below the pion mass the only relevant degrees of freedom in few-hadron systems are the nucleons themselves. This led to the formulation of an effective theory of NN interactions which is akin to effective range theory. Indeed, for two-nucleon processes this effective field theory uniquely reproduces the results of effective range theory. However, its predictions differ for processes in which external probes couple to the NN system, in that one can systematically include the effect of operators which are not constrained by NN phase shifts, or related to NN processes by current conservation. There have been a number of very accurate calculations pursued in the last year in this "NN EFT", but one persistent problem was that the series for elastic processes on the deuteron converged somewhat slowly. Last summer we realized that this could be resolved by using an alternative fitting procedure in the NN EFT. This procedure, called the Z-parameterization, involves reproducing the tail of the deuteron wave function correctly in the NN EFT at next-to-leading order. For many observables this results in excellent convergence of the expansion. Indeed, it means that in elastic scattering the first corrections to the NLO result come from two-body operators and relativistic effects. The Z-parameterization significantly improves the convergence of inelastic deuteron processes, such as np → d as described previously, and is no worse for ordinary NN scattering than the original fitting procedure. Nuclear physics is playing a central role in the present discovery of neutrino masses, the first experimental evidence for physics beyond that standard model. The SNO detector will measure both the neutral and charged current interactions of neutrinos from the sun thereby measuring, to some accuracy, their flavor composition (electron verses muon, tau or sterile). Both the production of pp neutrinos, and the subsequent flavor discrimination involve inelastic deuteron processes. Thus it is of the utmost importance to understand the electroweak interactions of the deuteron. while the dot-dashed curves, which lie on top of the solid curves, are NLO in EFT with L 1,A = 6.3 fm 3. The solid curves in the right graph are the results of while the dashed curves, which also lie on top of the solid curves, are NLO in EFT with L 1,A = 1.0 fm 3. Existing potential model calculations of the − d breakup processes disagree at the 5% level due to different assertions about meson exchange currents. Effective field theory calculations by Butler and Chen of − d breakup processes have clarified this ambiguity. A local, gauge invariant operator contributes to the matrix element of the axial current at next-to-leading order, with coefficient L 1,A. Different potential model results correspond to different choices of this counterterm, as can be seen in Figure 3. This counterterm can be fixed in two possible ways. Firstly, an experimental measurement of e d → ppe − at low-energies at the 1%-level, would determine the counterterm, enabling 1% predictions of the processes utilized by the SNO experiment (a higher precision prediction would require knowledge of additional counterterms). Secondly, a theoretical calculation of the rate of tritium -decay would also fix the counterterm. This is being considered by Paulo Bedaque, a Research Assistant Professor at the INT. In fact, sophisticated potential model calculations have implemented the later approach to predict pp → de + e. Butler and Chen have recently included the Coulomb corrections for pp → de + e. During the last twelve months, Bedaque, Gabbiani and Griehammer completed interesting work (that was underway while Griehammer was a Postdoctoral Fellow in our group) in three-body systems with effective field theory. Phase shifts for n − d scattering in the spin quartet channel and in several partial waves have been calculated both above and below the deuteron breakup threshold, solely in terms of two-nucleon scattering parameters. The agreement with data is impressive, and agrees well with the few predictions that have been made using sophisticated nuclear potentials. For almost a decade high quality data available for the near-threshold pion production in nucleon-nucleon collisions has been available. However, the reaction is still not fully understood. As pion dynamics are controlled by chiral symmetry constraints it was hoped that chiral perturbation theory could resolve the uncertainties. Until recently, however, there was significant disagreement between the chiral perturbation theory calculations and data. Our work highlighted the reason for that: once a proper counting scheme is employed it becomes clear that loops enter at next-to-leading order and thus the tree level calculations carried out thus far were incomplete. In addition we were able to demonstrate that p-wave pion production is better behaved: loops enter only at next-to-next-to leading order. The convergence of the chiral expansion was demonstrated with a spin observable for 0 production, where a parameter-free prediction is in agreement with the data. At the order to which we worked there were two unknown coefficients in the chiral Lagrangian. The respective interaction terms not only influence observables in pion production but might provide a solution to the long standing problem in few body physics, the so called A y puzzle in pd scattering. Thus our work demonstrated the close connection between pion production and the three nucleon system. This provides a deeper understanding of low and medium energy nuclear physics. Chiral perturbation theory (or effective field theory) is a relatively new way to derive nuclear forces and cross sections in terms of parameters that carry information about QCD dynamics. Chiral power-counting arguments are expected to supply an organizing principle. Understanding threshold pion production reactions in nucleon-nucleon collisions provides an interesting challenge to any such approach because the relevant momentum scale is p ∼ √ m N m, so p m N is not very small and the usual low momentum expansion is slowly convergent. The acquisition of excellent data for the pp → pp 0 reaction heightened the interest in studying these reactions. Our first paper on this subject found that the seemingly mandated (by chiral symmetry) treatment of the off-shell pion-nucleon scattering amplitude caused the term arising from the pion rescattering to interfere destructively with other amplitudes, leading to a computed cross section was considerably smaller than the measured one. To be specific, consider the effect of a term 2N N. Evaluation of this term, for threshold kinematics, in the rescattering graph (without including initial or final state interactions between the nucleons) gives a factor of m m /2, in which the first factor arises from the final energy of the pion and the second from the energy of the intermediate pion which carries half of the initial center of mass energy. But another group, Sato et al. treated this same factor as m (E(p) − E(p )) in which p, (p ) is the relative momentum in the initial (final) state, and E(p) = p 2 + m 2 n. This is evaluated by multiplying by the initial and final state pp wave functions and integrating over the momenta. Their result is that the low momentum tail of the initial high energy pp wave function and the high momentum tail of the final threshold wave function turn out to be dominant, so that this difference in energies turns out on average to be much larger than m in magnitude and negative. Our discussions at the joint INT/ANL August 1998 workshop led us to try to understand better the differences between the calculations. Both methods of calculation employ a three-dimensional integral to the evaluation of a Feynman diagram which is a four-dimensional integral. This led us to originate a semi-realistic toy model in which one may evaluate the four-dimensional integral exactly, and determine which (if any) of the two approximations are accurate. We proposed to evaluate the relevant Feynman graphs. The preliminary results of the toy model calculations are that the procedure of Ref. is a good approximation to the exact toy model answer. An effective field theory for nucleon-anti-nucleon low energy scattering is being developed. The aim is obtain phase shifts which can better fit the scattering data, so as to extend previous work on various nucleon-anti-nucleon interactions. The case of a large effective range and a small scattering length has been examined. II. LIGHT-FRONT NUCLEAR PHYSICS The aim is to develop a relativistic treatment of nucleons in nuclei which can be used in a variety of high-energy, high-momentum transfer processes, and which incorporates fully the present knowledge of nuclear physics. A method that yields covariant results is needed to properly interpret a host of new electron-nuclear scattering experiments performed at Jefferson Laboratory and at HERA in Hamburg. Relevant reactions include deep inelastic lepton-nucleus scattering, the related Drell-Yan ( + − production) experiments, and nuclear quasi-elastic reactions such as (e, e ), (e, e p), and (p, 2p). Our choice has been to use light-front variables. For example, in the parton model the Bjorken variable x is the ratio x = k + /p + where k + = k 0 + k 3 is the plus-momentum of the struck quark and p + is the plus-momentum of the target. Quark distributions represent the probability that a quark has a plus-momentum fraction x. One of our main interests is in computing the distribution functions f (k + ) which give the probability for nuclear nucleons and mesons to have a given plus-momentum k +. In the light-front technique the f (k + ) are determined by the ground-state wave function, while in the usual equal-time formulation obtaining the f (k + ) requires computing the response function which involves matrix elements between the ground and all excited states. Thus the use of the light front dynamics engenders vast simplicities, if one is able to compute the ground-state wave function using those light-front dynamics. Our previous work included substantial progress towards computing realistic wave functions, which is described below. The light-front quantization for a chiral Lagrangian is performed by obtaining the appropriate Hamiltonian and energy momentum tensor. The mean field approximation was defined and applied to infinite, isospin symmetric, nuclear matter. The one boson exchange treatment of nucleon-nucleon scattering was studied and a close connection with the on-shell T-matrix of the usual equal time formalism is obtained. A new light-front oneboson exchange nucleon-nucleon potential, which achieves a reasonably good representation of the phase shifts has been obtained. The tree-level pion-nucleon scattering scattering amplitude was shown to reproduce soft pion theorems Meson distribution functions for finite nuclei have been obtained, using a simple model. Calculations of properties of finite nuclei are well underway. One of the problems in using the light-front formalism is the lack of manifest rotational invariance. We have recovered the 2j + 1 single-nucleon degeneracy characteristic of the shell model of spherical nuclei. This is accomplished by deriving and solving a new light-front equation for the nucleon wave functions. Nucleon-nucleon correlations are often treated using Brueckner theory. A light front version of this has been derived and successfully applied to infinite nuclear matter. The simplicity of the vacuum allows us to derive the theory from a set of integral equations which maintains the necessary connection between the mesonic components of the Fock space and the nucleon-nucleon potential. Good saturation properties are obtained, including a compressibility of 180 MeV. The nuclear medium is found to enhance the average number of pions per nucleon by about 5%. We have made progress in using light-front dynamics to compute nuclear wave functions. The implementation of rotational invariance should ultimately allow a widespread use of light-front dynamics in any calculation in which relativistic aspects of nuclei are expected to be relevant. A necessary condition for this to occur is that the computed momentum distributions f (k + ) be at least roughly consistent with the experimental data for deep inelastic lepton-nucleus scattering, as well that of the (e, e p) reaction. It is interesting to note that achieving even a vague resemblance to the data requires a very high level of nuclear structure theory. To explain this, we review the history of this problem. The mean field calculation for infinite nuclear matter found that the nucleons carry only about 65% of the nuclear plus-momentum, with the remainder carried by the nucleon. This fraction should be about 90% in infinite nuclear matter. These results are specific to the use of mean field theory and infinite nuclear matter. Thus it was necessary to make calculations for finite nuclei and to go beyond the mean field approximation. Our finite nucleus result, obtained using the mean field approximation for 40 Ca, is that the nucleons carry only 73% of the plus momentum, with the carrying almost all of the remainder. Thus a substantial problem remains. We have done calculations beyond mean field theory by including correlations between two nucleons. This is a light-front version of Bruckner theory. Our calculations reproduce the saturation properties, but including correlations allows much weaker scalar and vector potentials. One consequence is that the nucleons carry at least 84% of the plus momentum, which is much closer to the desired value of 90%. We have emphasized the need to reduce the computed value of the plus-momentum carried by the mesons. But it is clear that any future versions of the present calculations will predict some significant enhancement of the nuclear content. The proposal stated that "We shall try to find experimental signals for this presence. This may be difficult, but it seems worthwhile to try." In June 1999 the HERMES collaboration announced that the ratio R = L / T was enhanced in nuclear deep inelastic scattering. A small value of R is a signature that the struck partons have spin 1/2, so a very large value indicates the strong presence of nuclear mesons. This HERMES discovery led us to search for the influence of vector and scalar mesons. We showed that nuclear, and, mesons can contribute coherently to enhance the electroproduction cross section on nuclei for longitudinal virtual photons at low Q 2 while depleting the cross section for transverse photons. We described recent HERMES inelastic lepton-nucleus scattering data at low Q 2 and small x using photon-meson and meson-nucleus couplings which are consistent with (but not determined by) existing constraints from meson decay widths, nuclear structure, deep inelastic scattering, and lepton pair production data. We find that while pion currents are not important for the present data, they could be observed at different kinematics. Thus our model is very easy to test and is being tested by an experiment at Jefferson Lab. The results of our calculation for 14 N are shown in Figure 4. R. Michaels and P.A. Souder (of the TJNAF HAPPEX collaboration) have proposed an experiment (see also ) intended to measure the neutron density of 208 Pb using parity violating electron scattering. The stated aim is to determine the neutron radius to about 1%. This made it relevant to pursue a new study of how relativistic effects influence the computed charge radii. We showed that these effects are very tiny. G. Krein (IFT), and G. A. Miller There has also been progress in going beyond the nucleon-meson version of nuclear physics. There may be some processes such as DIS for which quark models can be used directly. Thus our aim is to provide a light-front calculation in which the nucleons are treated as moving relativistically within the nucleus, and in which the the quarks (and gluons) are moving relativistically within the nucleon. An extension of the quark-meson coupling model may provide the easiest path to obtaining a realistic formalism that is also tractable. In this model, the quarks are assumed to be bound in non-overlapping nucleon bags, and the interaction between nucleons arises from a coupling of meson fields to the quarks. First calculations using a quark-di-quark model of the nucleon which is immersed in the medium give promising results. Nuclear saturation is achieved with relatively weak mesonic fields. This is the thesis project of Jason Cooke, which is aimed at doing relativistic deuteron physics. We started by examining the bound states of the Wick-Cutkosky model in which two-heavy scalar particles ("nucleons") interact by exchanging another scalar particle. This is a good testing ground for such calculations, because essentially exact solutions exist. As a starting point we studied bound states using the Hamiltonian formalism on the light-front. In this approach manifest rotational invariance is broken when the Fock space is truncated. By considering an effective Hamiltonian that takes into account two meson exchanges, we find that this breaking of rotational invariance is decreased from that which occurs when only one meson exchange is included. The best improvement occurs when the states are weakly bound. We also made a more detailed study of the Wick-Cutkosky model in which lightfront potentials for two-nucleon bound states are calculated using two approaches. First, light-front time-ordered perturbation theory is used to calculate one-and two-mesonexchange potentials. These potentials give results that agree well with the ladder and ladder plus crossed box Bethe-Salpeter spectra. Secondly, approximations that incorporate non-perturbative physics are used to calculate alternative one-meson-exchange potentials. These non-perturbative potentials give better agreement with the spectra of the full nonperturbative ground-state calculation than the perturbative potentials. For lightly-bound states, all of the approaches appear to agree with each other. The above results indicate that the detailed Fock-space wave function of the deuteron could be obtained using light-front techniques. The deuteron is the nucleus that has been the subject of almost all light front calculations of nuclei, and will be studied intensively at Jefferson Lab. The previously mentioned papers can be considered as a warm-up for a realistic calculation, which includes meson degrees of freedom of the deuteron. 10 PhD student of Miller. The nuclear calculations, mentioned above, which predict a significant content of the nucleus lead us to consider the effects of the content of the nucleon. Recent Drell-Yan studies of the proton and deuteron have allowed the extraction of thed(x)/(x), and d(x) −(x), which is equivalent to the isovector and isoscalar anti-quark distributions of the nucleon. Calculations using the effects of a pion cloud seem to successfully reproduce the isovectorq distributions, but provide isoscalar distributions that are smaller than the observed ones. The proposal said "we expect that including the effects of the should supply the missing strength, and propose to make the necessary calculations. This subject is related to a project of Henley & Alberg and we plan to join forces." The result was that we were able to use the meson cloud model of the nucleon to calculate distribution functions for (d −) andd/ in the proton. Including the effect of the omega meson cloud, with a coupling constant g 2 /4 ≈ 8, allows a reasonably good description of the data. We are also trying to understand how the ratiod(x)/(x) can fall below unity at large values of x. The only effects that can give such a result involve the breaking of charge symmetry. C. Hanhart and G. A. Miller Up to now there is no consistent procedure available to quantize higher-spin baryons on the light-front. However, quantization is a necessary step if light-front dynamics is to be used for nuclear applications. So far we are able to quantize the free spin-3 2 field on the light-front. Color transparency is the unusual vanishing of initial and final state interactions in high momentum transfer (Q 2 ) nuclear reactions in which the resolution is good enough to ensure that no extra pions are created in the fundamental hadronic two-body reaction. Examples are the (e, e p) (p, pp) and (e, e ∆) reactions involving nuclear targets. Several experiments searching for color transparency are underway. Much of the theory of the three fundamental aspects of color transparency has been done as well as possible, any future progress in the theory rests on the ability to interpret the findings of future experiments. Our main recent progress is in understanding coherent pion diffraction into minijets. Consider the process of coherent disintegration of a high energy (500 GeV) pion beam into two jets on a nuclear target. We found in 1993 that if each of the jets has a very large transverse momentum t > 4 GeV/c, but the sum of their momentum is very close to that of the beam, the forward cross section is predicted to vary with nucleon number A approximately as A 2, a very striking prediction of color transparency. If one integrates the angular distribution to obtain the cross section for this coherent process, the power of 2 is changed to 4/3. We encouraged experimentalists to search for this process, and the challenge was taken up by the Tel Aviv group as part of Fermilab E791. They compared data taken on 195 Pt and 12 C targets and found a power of 1.55±0.05 in rough but striking agreement (in the sense that the ratio of the cross sections for Pt and C targets was about 70 times bigger than the prediction of the usual diffractive treatment) with our prediction. We proposed to use perturbative quantum chromodynamics to input the perturbative part of the pion wave function into the calculation, to include the final state qq interaction and, to specify the quantum numbers of the different final two-jet states. We intend also to use an updated version of the soft qq-nuclear final state interaction and to include the effects of the skewed gluonic distribution of the nucleon and the effects of electromagnetic disintegration of the pion. Much of the work has been done and some appears in a paper accepted for publication. We are preparing a more detailed calculation. A. The High Energy d → np Reaction We have studied d → np, which has been the subject of a recent TJNAF experiment. A new mechanism is introduced in which photon absorption by a quark in one nucleon followed by a high momentum transfer interaction with a quark in the other may produce two nucleons with high relative momentum. In this mechanism the amplitude depends on the well-known, low-momentum, two-nucleon component of the deuteron wave function. Other diagrams are smaller by orders of magnitude. We intend to determine how much of the observed cross section can be accounted for in this way. We study the absolute value, energy, and angular dependence of the recently measured cross sections. According to the literature, two competing mechanisms account for the high momentum transfer nucleonnucleon scattering amplitude. These are the Feynman mechanism and the use of the minimal Fock space components. We studied the role of each of these mechanisms in determining the np final state interaction that occurs in the photoabsorption process. It is possible that the careful analysis of this data could lead to the resolution of a long-standing question about which mechanism is most important. Our first calculation is now published. Neutrino-nucleon processes are important sources of cooling and heating in several astrophysical phenomena. Neutrino cooling in neutron stars, for example, is driven by reactions of the type nn → nn and nn → npe − e. To date, the strong interaction correlations between the two nucleons have been calculated only perturbatively, i.e. using the one-pion-exchange potential as the NN amplitude. Based on soft-radiation theorems we performed a model-independent calculation of the emission rates for NN → NN and NN → NNa, finding that the one-pion-exchange approximation overestimated these rates by a factor of 4-5. This result will have a serious impact on the role played by neutrinos in the cooling of neutron stars. It may also affect the understanding of the role of neutrinos in supernova explosions. At this stage it is unclear how this result will change the axion mass bound, since a different neutrino rate will influence those as well. However, it is clear that previous estimates of the axion production rate in SN1987A were based on a two-body axion emission amplitude that was much too large. A scenario that is emerging from string theory and effective field theory descriptions of gravity is that matter fields exist on a four-dimensional brane embedded in a higher dimensional space which gravity alone can propagate. One of the strongest constraints on the existence of large, compact, "gravity-only", extra dimensions comes from SN1987A. If the rate of energy loss into these putative extra dimensions is too large, then the neutrino pulse from the supernova will differ from that actually seen. The dominant mechanism for graviton and dilaton production in the supernova is via gravistrahlung and dilastrahlung from the nucleon-nucleon system. Low-energy theorems of the type discussed in the previous paragraph can also be used to calculate these processes in a model-independent fashion. This relates these emissivities to the measured nucleon-nucleon cross section. This is possible because for soft gravitons and dilatons the leading contribution to the energy-loss rate is from graphs in which the gravitational radiation is produced from external nucleon legs. We have re-evaluated the bounds on extra dimensions using our low-energy theorem, and find that if there are two extra "gravity-only" dimensions then to be consistent with the SN1987A observations these dimensions must be of a radius less than 1 micron. A novel technique for evaluating the electron shielding of nuclei in a finite temperature plasma has been developed and applied. The physics is Hartee plus local-density approximation to account for exchange and correlation (Kohn-Sham-Mermin). This is particularly applicable to the fusion process in stellar and laboratory plasmas. Finit-temperature, finite-density electron Green's functions are calculated. Contour integration yields a sum of residues over the complex Matsubara poles. This automatically includes discrete bound states and continuum states weighted by the finite temperature Fermi factor. The one-center problem is adequate for the calculation of fusion rates. A paper describing the method and presenting numerical comparisons with the works of others has been published. A second paper including shielding due to ions and applying the method to the solar fusion problem has been published. We believe the results obtained are the most reliable reported to date. The realization that high-baryon density systems can be color superconductors has lead to significant progress during the past year or so. In such dense systems perturbative calculations of their properties in 2 () are possible. The very low-energy excitations of the dense system can be described with an effective field theory of the pseudo-Goldstone bosons associated with the spontaneous breaking of the global symmetries of the underlying theory. Previous works had attempted to determine the decay constants and masses of the pseudo-Goldstone modes, but contained errors. We determined the decay constants and masses of the excitations, making extensive use of effective field theory techniques. The original analytical determinations of the superconducting gap in QCD suffer from two flaws. First, the gap equation is divergent and so must be regularized and renormalized. Most treatments have taken the baryon density as a sharp cutoff. This might cause some concern since it leads to the possibility of contaminating the low energy physics of the gap with ad hoc high energy physics. Second, the solution of the gap equation at momenta large compared to the gap has been obtained by assuming a particularly unhealthy mathematical approximation. In a recent paper, we use cutoff regularization to define a renormalized gap equation. We also find an exact asymptotic solution to this equation, thus excising the flaws contained in previous determinations. Our results confirm the original analysis by Son. The renormalized gap equation enabled us to resum the large logarithmic contributions due to the evolution of the strong coupling constant between and the gluon magnetic mass scale. Recently, Beane and Bedaque have derived an expression for the gap with dimensional regularization. VI. FUNDAMENTAL SYMMETRIES Fundamental symmetries has long been a topic of high interest at the U.W. Recent efforts involve the use of nuclear physics to elucidate the standard model. Charge symmetry, CS, is a fundamental symmetry which occurs if the Lagrangian is invariant with respect to rotating the u into d quarks (or d→ u) quarks. We were able to use chiral effective field theory to make predictions, based on QCD, for the reaction np → d 0. If charge symmetry holds, the cross section is symmetric about 90 in the cm frame. The form of the charge symmetry breaking part of the hadronic Lagrangian is determined by the symmetries of QCD. This Weinberg term predicts a large breaking of CS in the N scattering amplitude which is needed to compute the cross section for np → d 0. The numerical result was that this Weinberg term provides the dominant contribution to the forward-backward asymmetry in the angular distribution for the reaction pn → d 0, for reasonable values of the mass difference between down and up quarks, m N. Using a value m N ≈ 3 MeV leads to a prediction of a 10 standard deviation effect for a TRIUMF experiment. G. A. Miller Lockyer et al. found a very large parity violating asymmetry A L of about A L = 2.5 10 −6 at a proton beam energy of 6 GeV/c. The only calculation which reproduces this result, without violating the constraints of low-energy data, is a quark-model calculation of Preston and Goldman, in which parity violation occurs as a result of a quark-quark interaction in an excited state of the proton which is formed as a result of an initial state strong interaction. This calculation also predicts a rapid rise in A L as the beam momentum increases. Interest in this topic was revitalized by the possibility of new experiments involving polarized protons at RHIC and the AGS at Brookhaven National Lab. T. Roser (BNL), speaking at the June 1998 INT workshop on parity violation, argued that it could be possible to ultimately make measurements, with an error of about 310 −7, at beam momenta between 5 and 250 GeV/c. Working on understanding all of the reaction mechanisms is in progress and we have found that the physical ideas of Ref. are very good, but that the calculation is flawed in certain ways. Plans to make a better calculation using a similar (but different) reaction mechanism are underway. E. M. Henley Plans are underway to study time reversal and CP-violation for both heavy quarks (the B system) and in nuclear physics. Stimulated by the SAMPLE experiment at Bates, Springer and Savage computed the anapole form factor of the deuteron at leading order with effective field theory. Previously, they had computed the deuteron anapole moment, and were able to extend this to the full form factor using the analytic expressions for multi-loop integrals developed by Michael Binger 13. Due to the large size of the deuteron, it is possible, although very difficult, to distinguish between contributions from the nucleon strange form factor and from the deuteron anapole moment due to the different lengths scales involved in determining the scale of each form factor. P. F. Bedaque (INT) and M. J. Savage It is now universally accepted that determining the single pion nucleon parity violating coupling h 1 N N is very difficult. Systems in which its effects are amplified do not allow for rigorous computation of observables, and systems where rigorous calculations are possible have only small parity violating effects. Experimental programs with ever-increasing sensitivity to parity violating effects are ongoing in an effort to unambiguously determine h 1 N N. In a somewhat speculative calculation, Bedaque and Savage examined parity violation in N → N Compton scattering. The amplitude for this process is theoretically clean and is determined by the long sought after parity violating NN coupling h 1 N N. Corrections to these contributions are small. While measurement of such observables will be difficult, it would provide a theoretically well-defined determination of h 1 N N. I. Halpern and E. M. Henley The authors are preparing a book entitled "Symmetries in Nature and Science" that is aimed at explaining the importance of symmetries to a popular audience. 13 An undergraduate student with the summer 1998 REU program at the UW The current theoretical understanding of the quark-gluon plasma (QGP) phase of nuclear matter is rather limited. In particular, the supposition that the QGP phase can be described as a weakly-interacting gas of quarks and gluons has lead to a number of theoretical predictions that rely on only the lowest order of perturbation theory. In the last five years there have been some significant advances in finite-temperature perturbative calculations. Of particular interest is the perturbative expansion of the free energy of the QGP phase. This quantity has been calculated to order g 5 and show that in the region of experimental interest (T < 1 GeV) the series shows no signs of converging. In Figure 5 the successive approximations to the free energy of a gluon plasma along with the latest lattice result are shown. This clearly illustrates that the theoretical uncertainties due to the poor convergence of the perturbative series, even at order g 5, are quite large and that a different approach is needed. The origin of the large perturbative corrections seems to be plasma effects, such as the screening of interactions and the generation of quasiparticles. These effects arise from the momentum scale gT. Effective-field-theory methods can be used to isolate the effects of the scale gT from those of the scale T, so that the effects of the scale gT can be calculated using nonperturbative methods. There has been some recent progress in solving the analogous problem for a massless scalar field theory with a 4 interaction. When the free energy is calculated using screened perturbation theory, the convergence of successive approximations to the free energy is dramatically improved. A. Scalar Field Theory -Screened Perturbation Theory At nonzero temperature, the conventional perturbative expansion of g 4 theory generates infrared divergences. They can be removed by resumming the higher order diagrams that generate a thermal mass of order gT for the scalar particle. This resummation changes the perturbative series from an expansion in powers of g 2 to an expansion in powers of g. Screened perturbation theory (SPT) is simply a reorganization of the perturbation series for thermal field theory. At nonzero temperature, SPT does not generate any infrared divergences, because the mass parameter in the free lagrangian provides an infrared cutoff. Anderson, Braaten and Strickland have recently made a systematic three-loop calculation of the free energy, entropy, and screening mass within SPT. The previous calculation was only performed to two loops because one of the three-loop diagrams (the so-called "basketball diagram") had not been evaluated analytically. They have been able to calculate this diagram, reducing it to expressions involving three-dimensional integrals that can be easily evaluated numerically. enabling them to calculate the thermodynamic functions for scalar field theories to three-loop order. The results of this calculation show that the convergence of the free-energy, entropy, and screening mass are dramatically improved. B. Quantum Chromodynamics -Hard Thermal Loop Perturbation Theory In order to apply the techniques used in scalar theories to QCD a fundamental change to the formalism must be made. Instead of using a momentum-independent thermal mass one must use the momentum-dependent thermal gluon and quark masses which arise from resummation of hard-thermal-loop (HTL) diagrams. Hard-thermal-loop perturbation theory (HTLpt) is a reorganization of the perturbation series for thermal QCD. In the last year Andersen, Braaten, and M. Strickland have completed the full one-loop HTLpt of the QCD thermodynamic functions. The shaded band in Figure 5 is the result of the pure-glue calculation. The discrepancy between our result and the lattice result is due the neglect of quasiparticle interactions which come in at two-loop order. These calculations demonstrate that HTLpt provides a tractable and gauge-invariant method for incorporating the necessary physics. The two-loop calculation of the QCD free energy within HTLpt is in progress. When the two-loop calculation of the thermodynamic functions is completed the same formalism can be used to calculate real-time processes such as heavy quark and dilepton production from a QGP. A. Inhomogeneous Nuclear Matter A. Bulgac, P. Magierski (Warsaw), and Y. Yu 14 In Ref. it was shown that bubble fermion systems have a remarkable soft collective branch, corresponding to the displacement of the bubble. That study pointed to a large number of new physical effects to be found in systems with bubbles. Bubble nuclei-even if they exist-most likely would be almost impossible to create in laboratory. However, similar effects could easily be observed in other fermion systems, see Ref.. However, one of the most interesting systems to consider are neutron stars. It was predicted a long time ago that at about 0.5 km under the surface of a neutron star nuclear matter is inhomogeneous and a sequence of bubble, rod and plate phases should occur. Almost all previous studies of these phases of neutron matter have been performed within the liquid-drop-model approximation. One exception was the work of Refs., which however has a limited and incomplete treatment of the shell-correction energy to ground-state energy of the phase corresponding to nuclei embedded in a neutron gas. As we discuss in Ref. these last authors computed the least important contribution to the ground state of inhomogeneous neutron matter. Until now nobody noticed a rather subtle contribution to the ground state energy of inhomogeneous neutron matter, for which there is naturally no established term yet in the literature. One can term this contribution either as the Casimir energy, as it is somewhat similar to the Casimir energy in quantum field theory, or equally well use the more common term in nuclear physics, shell correction energy. Shell correction energy is typically attributed to the difference in single particle spectra in finite systems from a spectrum with a smooth level density. In infinite matter however the spectrum is obviously continuous and one might naively conclude that there is no shell correction contribution. In order to better appreciate the nature of the problem we are addressing in this work, let us consider the following simple situation. Let us imagine that two spherical identical bubbles have been formed in an otherwise homogeneous neutron matter. We shall ignore the role of long range forces, namely the Coulomb interaction in the case of neutron stars, as their main contribution is to the smooth, liquid drop or Thomas-Fermi part of the total energy. Under such circumstances one can ask the following apparently innocuous question: "What determines the most energetically favorable arrangement of the two bubbles?" According to a liquid drop model approach (completely neglecting for the moment the possible stabilizing role of the Coulomb forces) the energy of the system should be insensitive to the relative positioning of the two bubbles. A similar question was raised in condensed matter studies, concerning the interaction between two impurities in an electron gas. In the case of two "weak" and point-like impurities the dependence of the energy of the system as a function of the relative distance, a, between the two impurities is given by the Ruderman-Kittel interaction: where k F is the Fermi wave vector and m is the fermion mass. In Ref. we developed a method on how to compute the quantum corrections to the ground state energy of inhomogeneous neutron matter, based on quantum chaos techniques. Using the Gutzwiller trace formula and taking into account only the shortest classical period orbits, we have shown in particular that the interaction energy between two isolated bubbles at large separations (a = L − 2R ≫ R) This result is unexpected in several respects, not the least its very long-range interaction, c.f. the Ruderman-Kittel result above. We quote explicitly only this result, as it displays the new qualitative nature of our results. In Ref. we have analyzed a variety of inhomogeneous neutron phases: bubble phase, rod phase, plate phase, local defects, various lattice deformations and temperature effects. To our knowledge this is the first approach which considers specifically the shell effects in the outside neutron gas and we aimed at discussing its basic features. Even though in principle Hartree-Fock calculations include in principle such effects already, the calculations performed so far were too narrow in scope and did not address this issue specifically and they were not able to put in evidence a large number of new qualitative and quantitative issues. We have analyzed the structure of the shell energy as a function of the density, filling factor, lattice distortions and temperature. The main lesson we learned from this work is that the amplitude of the shell energy effects is comparable with the energy differences between various phases determined in simpler liquid drop type models. This fact alone suggests that the inhomogeneous phase has most likely an extremely complicated structure, maybe even completely disordered, with several types of shapes present at the same time. It is clear that we have only managed to "barely scratch the surface" of this problem. Even though we have specifically addressed the case of neutron matter only, it is clear that a similar picture should emerge when the density increased and quarks become deconfined. In the low density quark matter one would expect quark droplets of various shapes embedded in a neutron gas. It is highly likely that similar phenomena are expected in the case of quark-gluon plasma and in the case of strangelets, see Refs.. The calculation reported so far in the literature are very similar in spirit with the calculations performed in Ref. for neutron matter, i.e. shell energy due to "bound fermion motion" only. As we have shown however, most of the quantum corrections to the ground state energy arises from the unbounded fermion motion, which in a way can also be interpreted as the bubble-bubble interaction energy, often mentioned in various papers but never evaluated, since no methods have ever been developed in this direction. We also expect that progress can be made in computing the Casimir energy as well for new geometries, both in QFT and in critical phenomena. We plan to address these range of questions in the near future. Andreas Wirzba from Darmstadt TU has also expressed his enthusiasm and willingness to join our efforts. B. Dissipative Collective Motion A. Bulgac, G. Do Dang (Orsay), and D. Kusnezov (Yale) We have continued to study the problem of quantum dissipative motion. Two review papers will shortly be published. In addition, a collaboration with Hans A. Weidenmller has started. We are trying to implement new theoretical techniques in the derivation of the quantum kinetic equations based on the supersymmetric techniques, which are widely used in mesoscopic physics and a new development, based on a generalization of the Keldysh-Schwinger formalism. This new development is needed in order to extend the applicability of our kinetic equations to lower temperatures as well as in order to establish the limits of certain approximations used by us in our initial approach, in particular the role played by the so called crossed (non-rainbow) diagrams in treating the intrinsic nuclear degrees of freedom. In a separate development with Do Dang and Kusnezov we have been able to extend significantly the calculation of the so called influence functional, to the non-Markovian regime. The influence functional is the key element in this entire approach and is the object which describes the internal nuclear motion. A. Bulgac and V. Shaginyan (St. Petersburg) In the Fall of 1999 we finished writing an extensive computer program which describes spherical nuclei, using the new density functional due to Fayans and which also calculates the linear response to various external fields. A number of theoretical developments were incorporated, which deal primarily with the renormalization of the zero-range character of the residual interaction. Such modifications are required in order to evaluated correctly the Coulomb energy contributions to the nuclear ground state energies, when we have to evaluate loop integrals over the entire spectrum. We plan to perform the actual calculations during the Fall 2000 INT program on Nuclear Structure. A. Bulgac and Y. Yu We recently finished an initial study of a new gaussian single-particle wave function basis to be used for the description of the single-particle properties of many fermion systems, irrespective of the presence or absence of symmetries. This new basis consists of overlapping gaussians with a judicious choice of the distribution of their centers, widths and number. We did not include the spin degrees of freedom in this initial study, due to some technical difficulties we have encountered in dealing with them in an efficient manner. In the absence of the spin-orbit interaction we can describe spectra with an accuracy of about 0.02 MeV in the bulk and 0.15 MeV near the nucleon threshold. The wave functions are reproduced with an accuracy of not worse than a couple of percent, typically better. The size of the basis set is around 1000 basis functions for heavy nuclei. These results are significantly better than those obtained with other basis sets used in nuclear literature, e.g. harmonic oscillator wave functions. We hope that with more fine tuning we can improve both on the quality and the number of the basis set and thus be able to propose this new basis as perhaps the basis set of choice for mean field calculations of deformed nuclei. Configurations containing all q 3 and q 4q states, including s-s quark pairs, up to a cut off of 1.5 GeV, and at most one gluon (OGE) have been included as basis states in calculations of nucleons and hadrons. Matrix diagonalization, rather than perturbation theory, is employed in order to allow for clustering of quark-antiquark pairs into meson-like structures -if such occur. In adjusting MIT parameters to fit energies, a reasonable positive value for the Casimir term emerges, rather than the problematic negative value employed in the original MIT model. The results for various observables are compared with experiment and with meson-based models. Strange quarks give a minor contribution. Previous perturbation calculations by two other groups were found to contain errors. There is a delicate matter in the method: The Hilbert space for diagonalization contains q 3 and q 4q but no explicit gluon states. Gluons are contained in effective 4-quark vertices. The evaluation of the effective vertex involves the self-consistent energy of the state being evaluated. The matrix diagonalization must be iterated to self-consistency. Initial calculations used the unperturbed initial 3-quark energies. Although the difference is expected to be small, work will continue. The strange quark content of the nucleon was found to be quite small. Questions about the strangeness content of the nucleon are widely discussed in the literature. For some time photoproduction has been thought to be a useful tool to study this. However, up to now there is no calculation available that studies the impact of K and K * loops on this production. We developed a formalism that will alow us to study this effect in a largely model independent way. The results will be important in two respects: first of all they will give insight into what one can really learn from photoproduction and should further constrain models for the strangeness form factor of the nucleon. The project aims at an understanding of the physics from polarization experiments of,, and production in nucleon nucleon collisions. Presently we investigate approximation schemes to treat the nucleon-nucleon interaction in the initial state, for there is, as yet, no model of NN scattering at these high energies. Since protons probes provide complementary information to electro-magnetic probes, we hope meson production in nucleon nucleon collisions, when studied consistently with electro production of heavy mesons, allows for deeper insight into the phenomenology of missing resonances. We have developed a meson-exchange model for pion production in nucleon-nucleon collisions that has proven very successful in the description of charged pion production in both unpolarized and polarized observables. However, in case of the 0 production we still see discrepancies that are not fully understood. So far the final state was treated as an effective two body problem by means of a distorted wave approximation. We are presently working on an improvement of the three body treatment of the problem in order to resolve the discrepancy between theory and experiment. Very little is known about the hyperon-nucleon interaction at low energies. One possible way to gain experimental information on this system is through production reactions. At low energies there are two interesting quantities accessible: the energy dependence allows a determination of low energy hyperon-nucleon scattering parameters and the total strength of the cross section, that contains information on both the hyperon nucleon interaction as well as the production operator. Our work shows that the energy dependence of the total cross sections is in agreement with predictions from the existing hyperon-nucleon potentials. In order to explain the total strength of the cross section a destructive interference between pion and kaon exchange is required. The relative sign between these exchanges is the only free parameter of the model. This allowed Hanhart and collaborators to propose the measurement of the reaction pp → n + K + to check the model. Their investigation was the first microscopic investigation of the associated strangeness production at close to the threshold energies. Further studies aim at a better treatment of the meson-baryon interactions. The spectrum of baryon excitations is still not fully understood. There are different mechanisms discussed in the literature to understand why the Roper resonance, the lightest positive parity excitation, has a lower mass than the lightest negative parity excitation. If the binding where dominated by the confining potential the inverse order is expected. Hanhart and collaborators took a different point of view to quark models: since most of the experimental information on the Roper comes from pion induced reactions their goal was to describe elastic and inelastic pion nucleon scattering. By employing a coupled-channel meson-exchange model they where able to describe the N scattering phase shifts as well as inelasticities up to center of mass energies of 1.9 GeV. A good description of the Roper partial wave P 11 was possible without the inclusion of a bare pole diagram. This investigation demonstrates that there is not necessarily a problem with the baryon spectrum since the Roper resonance might be generated dynamically. In any case: we demonstrated that the meson baryon interaction in the P 11 partial wave is too strong to be neglected when trying to understand the baryon spectrum. A. Buchmann (Tubingen) and E. M. Henley Work has been completed on extending a method devised by Morpugo to obtain static properties of nucleons. This method has been used to calculate and predict meson-baryon couplings to the octet and decuplet baryons. This work has been submitted for publication. A talk on the subject at the 3d Annual Symposium on Symmetries in Subatomic Physics will also be published. This method has also been used to predict quadrupole moments and quadrupole transition moments for the decuplet baryons and between the octet and decuplet. This work is almost ready to submit for publication. The inclusion of relativity in theoretical models becomes particularly critical in the description of electron-deuteron scattering experiments. In electron-deuteron scattering the standard non-relativistic quantum mechanical treatment of the problem is expected to fail at energies where interesting physics occurs. The various available relativistic formalisms all produce different predictions for the observables, none of which accurately describes all of the experimental data. Phillips and Wallace have developed an alternative three-dimensional relativistic scheme for calculating these processes. Impulse approximation calculations of the experimentally-measured quantities A, B, and T 20 show good agreement for T 20 out to Q 2 ∼ 1GeV 2. This calculation is missing strength in A and B, while approaches which are essentially non-relativistic reproduce the data quite well. From this one might conclude that the non-relativistic approach is the correct one. Yet it is clear that relativity should begin to play a crucial role in the description of data at these Q 2 's. In December Phillips visited the Thomas Jefferson National Accelerator Facility and spent three weeks working there with Wallace on these issues. The time was productive, and they have made much progress in improving the framework they have been working on together for the past four years. In particular, the connection of this work to the usual non-relativistic approaches to electron-deuteron scattering is now much clearer. Further calculations will be pursued in the coming year. S. R. Beane The large-N approximation -where N is the number of colors-is one of the few systematic approaches to QCD at low-energies. The large-N approximation yields a great deal of predictive power, particularly in the baryon sector. Less is known in the meson sector. For instance, according to canonical large-N wisdom, meson-meson scattering is governed by exchange of an infinite number of mesons in tree graph approximation. However, little progress has been made in utilizing this property to make predictions. A. High Energy Theorems at Large-N In recent work it was shown that spectral function sum rules take a particularly simple algebraic form in the large-N limit. This allows one to correlate the ordering pattern of narrow meson states at low energies with the size of local order parameters of chiral symmetry breaking in QCD. The spectral function sum rules are constraints on time ordered products of two QCD currents and traditionally their derivation relies on the technology of the operator product expansion. Recently Beane showed that in the large-N limit one can derive sum rules for products of two, three and four QCD currents using chiral symmetry at infinite momentum in the large-N limit. These exact relations among meson decay constants, axialvector couplings and masses determine the asymptotic behavior of an infinite number of QCD correlators. The familiar spectral function sum rules for products of two QCD currents are among the relations derived. With this precise knowledge of asymptotic behavior, an infinite number of large-N QCD correlators can be constructed using dispersion relations. Beane gave a detailed derivation of the exact large-N pion vector form factor and forward pion-pion scattering amplitudes. B. Low Energy Constants from High Energy Theorems As a phenomenological application of the high-energy theorems, Beane considered new constraints implied by the sum rules on resonance saturation in chiral perturbation the-ory. The sum rules imply that the low-energy constants of chiral perturbation theory are related by a set of mixing angles. Beane showed that the simplest nontrivial saturation scheme predicts low-energy constants that are in remarkable agreement with experiment. Further, it was shown that vector-meson dominance can be understood as a consequence of the fact that nature has chosen the lowest-dimensional nontrivial chiral representation, and chiral symmetry places an upper bound on the mass of the lightest scalar in the hadron spectrum. One difficulty for standard treatments of hadronic reactions is that form factors are always used to regulate integrals which would otherwise be divergent. This procedure is well-motivated, since we know that the hadrons have substructure which gives them a finite extent, and hence, a form factor. However, if we understand this description of hadronic dynamics as a field theory then it is non-local, and hence the implementation of basic field theoretic principles, such as gauge invariance, can be quite involved. Methods have been formulated to impose gauge invariance on an amplitude containing hadronic form factors, but they are intrinsically non-unique, since they constrain only the longitudinal part of the electromagnetic amplitude. Some of these difficulties can be resolved by using dimensional regularization (DR) to render divergent integrals finite. This is the method of choice for dealing with the infinities which arise in perturbative field-theoretic calculations. However, there are very few studies of the application of dimensional regularization to integral equations, as opposed to its many applications to integrals in perturbative calculations. Phillips, Afnan and Henry-Edwards recently implemented the numerical solution of this dimensionally-regulated integral equation, and have extracted physical quantities, such as phase shifts, once the regulation and renormalizaton have been done. M. Alberg (Seattle U.) and L. Wilets In our study of the infamous cold fusion problem (which yielded a bound on the process orders of magnitude less than claimed), we calculated wave functions of two nuclei in a plasma. We discovered an infinite set of exact solutions to the Coulomb plus harmonic oscillator potentials. Each solution, corresponds to a particular ratio of the coefficients of the two terms, and hence the set is not orthogonal. There is considerable interest in special soluble potentials. A particular application is in the numerical calculation of wave functions for potentials containing singular terms, such as the Coulomb term. If one writes the radial
from pyrosm.graph_export import ( _create_igraph, _create_nxgraph, _create_pdgraph, generate_directed_edges, ) from pyrosm.graph_connectivity import get_connected_edges from pyrosm.utils import validate_edge_gdf, validate_node_gdf from pyrosm.config import Conf import warnings def get_directed_edges( nodes, edges, direction="oneway", from_id_col="u", to_id_col="v", node_id_col="id", force_bidirectional=False, network_type=None, ): """Prepares the edges and nodes for exporting to different graphs.""" allowed_network_types = Conf._possible_network_filters # Validate nodes and edges validate_node_gdf(nodes) validate_edge_gdf(edges) for col in [from_id_col, to_id_col]: if col not in edges.columns: raise ValueError( "Required column '{col}' does not exist in edges.".format(col=col) ) if direction not in edges.columns: warnings.warn( f"Column '{direction}' missing in the edges GeoDataFrame. " f"Assuming all edges to be bidirectional " f"(travel allowed to both directions).", UserWarning, stacklevel=2, ) edges[direction] = None if node_id_col not in nodes.columns: raise ValueError( "Required column '{col}' does not exist in nodes.".format(col=node_id_col) ) # Check the network_type if network_type is not None: net_type = network_type else: net_type = edges._metadata[-1] # Check if network type is stored with edges or nodes if net_type not in allowed_network_types: net_type = nodes._metadata[-1] if net_type not in allowed_network_types: txt = ", ".join(allowed_network_types) raise ValueError( "Could not detect the network type from the edges. " "In order to save the graph, specify the type of your network" "with 'network_type' -parameter." "Possible network types are: " + txt ) edges = edges.copy() nodes = nodes.copy() # Generate directed edges # Check if user wants to force bidirectional graph # or if the graph is walking, cycling or all if force_bidirectional or net_type in ["walking", "cycling", "all"]: edges = generate_directed_edges( edges, direction, from_id_col, to_id_col, force_bidirectional=True ) else: edges = generate_directed_edges( edges, direction, from_id_col, to_id_col, force_bidirectional=False ) return nodes, edges def to_networkx( nodes, edges, direction="oneway", from_id_col="u", to_id_col="v", edge_id_col="id", node_id_col="id", force_bidirectional=False, network_type=None, retain_all=False, osmnx_compatible=True, ): """ Creates a NetworkX.MultiDiGraph from given OSM GeoDataFrame. Parameters ---------- edges : GeoDataFrame GeoDataFrame containing road network data. network_type : str The type of the network. Possible values: - `'walking'` - `'cycling'` - `'driving'` - `'driving+service'` - `'all'`. direction : str Name for the column containing information about the allowed driving directions from_id_col : str Name for the column having the from-node-ids of edges. to_id_col : str Name for the column having the to-node-ids of edges. edge_id_col : str Name for the column having the unique id for edges. node_id_col : str Name for the column having the unique id for nodes. force_bidirectional : bool If True, all edges will be created as bidirectional (allow travel to both directions). network_type : str Network type for the given data. Determines how the graph will be constructed. By default, bidirectional graph is created for walking, cycling and all, and directed graph for driving (i.e. oneway streets are taken into account). Possible values are: 'walking', 'cycling', 'driving', 'driving+service', 'all'. retain_all : bool if True, return the entire graph even if it is not connected. otherwise, retain only the connected edges. osmnx_compatible : bool (default True) if True, modifies the edge and node-attribute naming to be compatible with OSMnx (allows utilizing all OSMnx functionalities). Returns ------- networkx.MultiDiGraph """ # Prepare the data nodes, edges = get_directed_edges( nodes, edges, direction, from_id_col, to_id_col, node_id_col, force_bidirectional, network_type, ) # Keep only strongly connected component if not specifically requested otherwise if not retain_all: nodes, edges = get_connected_edges( nodes, edges, from_id_col, to_id_col, node_id_col ) if osmnx_compatible: # add 'key' attribute which is needed by OSMnx if "key" not in edges.columns: edges["key"] = 0 # Follow the naming convention of OSMnx nodes = nodes.rename(columns={node_id_col: "osmid", "lat": "y", "lon": "x"}) edges = edges.rename(columns={edge_id_col: "osmid"}) node_id_col = "osmid" # Add node-id as index nodes = nodes.set_index(node_id_col, drop=False) nodes = nodes.rename_axis([None]) # Create NetworkX graph return _create_nxgraph(nodes, edges, from_id_col, to_id_col, node_id_col) def to_igraph( nodes, edges, direction="oneway", from_id_col="u", to_id_col="v", node_id_col="id", force_bidirectional=False, network_type=None, retain_all=False, ): """ Creates an iGraph from given OSM GeoDataFrame. Parameters ---------- edges : GeoDataFrame GeoDataFrame containing road network data. network_type : str The type of the network. Possible values: - `'walking'` - `'cycling'` - `'driving'` - `'driving+service'` - `'all'`. direction : str Name for the column containing information about the allowed driving directions from_id_col : str Name for the column having the from-node-ids of edges. to_id_col : str Name for the column having the to-node-ids of edges. edge_id_col : str Name for the column having the unique id for edges. node_id_col : str Name for the column having the unique id for nodes. force_bidirectional : bool If True, all edges will be created as bidirectional (allow travel to both directions). network_type : str Network type for the given data. Determines how the graph will be constructed. By default, bidirectional graph is created for walking, cycling and all, and directed graph for driving (i.e. oneway streets are taken into account). Possible values are: 'walking', 'cycling', 'driving', 'driving+service', 'all'. retain_all : bool if True, return the entire graph even if it is not connected. otherwise, retain only the connected edges. Returns ------- igraph.Graph """ # Prepare the data nodes, edges = get_directed_edges( nodes, edges, direction, from_id_col, to_id_col, node_id_col, force_bidirectional, network_type, ) # Keep only strongly connected component if not specifically requested otherwise if not retain_all: nodes, edges = get_connected_edges( nodes, edges, from_id_col, to_id_col, node_id_col ) return _create_igraph(nodes, edges, from_id_col, to_id_col, node_id_col) def to_pandana( nodes, edges, direction="oneway", from_id_col="u", to_id_col="v", node_id_col="id", force_bidirectional=False, network_type=None, retain_all=False, weight_cols=["length"], ): # Prepare the data nodes, edges = get_directed_edges( nodes, edges, direction, from_id_col, to_id_col, node_id_col, force_bidirectional, network_type, ) # Keep only strongly connected component if not specifically requested otherwise if not retain_all: nodes, edges = get_connected_edges( nodes, edges, from_id_col, to_id_col, node_id_col ) nodes = nodes.rename(columns={"lat": "y", "lon": "x"}) nodes = nodes.set_index("id", drop=False) nodes = nodes.rename_axis([None]) return _create_pdgraph(nodes, edges, from_id_col, to_id_col, weight_cols)
Is an American Story Better? A Comparison of the Effectiveness of Domestic versus Foreigner Narratives in the Context of Chinese Air Pollution ABSTRACT Narrative messages are a useful tool in communicating health prevention. This study examines differences in the persuasiveness of narratives when they are ethnicity-incongruent or ethnicity-congruent. Many researchers claim that, because of a history of colonization and marginalization, the Chinese public favours foreigner messages that feature white English-speaking people, but little research has tested or explained this favouritism in communication. We, therefore, compared the different effectiveness of two narrative prevention messages. The two messages had the same plot, but their narrators were constructed as being from China or from America. The results showed that the Chinese narrative prevention message was more effective in encouraging Chinese readers (n = 534) facial mask use. This difference may be explained by the different degrees of identification with the narrators of the messages and of transportation into the messages. We offer practical implications for air pollution campaigns and for the use of foreigner narrative messages in China.
from typing import Tuple, List from transform.transformer import TimeSeriesTransformer import numpy as np class IndexedTransformer: def __init__(self, transformer: TimeSeriesTransformer, padding: int, step: int): self.transformer = transformer self.padding = padding self.step = step def __call__(self, data: np.ndarray) -> Tuple[List[int], np.ndarray]: tr_data = self.transformer(data) indices = [self.padding + i * self.step for i in range(len(tr_data))] return indices, tr_data
mod events; mod kind; mod player; pub use events::GameEvents; pub use kind::{CellAccess, CellKind}; pub use player::Player;
package org.springframework.data.gigaspaces.repository.support; import org.openspaces.core.GigaSpace; import org.springframework.beans.BeansException; import org.springframework.beans.factory.NoSuchBeanDefinitionException; import org.springframework.beans.factory.NoUniqueBeanDefinitionException; import org.springframework.context.ApplicationContext; import org.springframework.context.ApplicationContextAware; import org.springframework.data.mapping.context.MappingContext; import org.springframework.data.repository.Repository; import org.springframework.data.repository.core.support.RepositoryFactoryBeanSupport; import org.springframework.data.repository.core.support.RepositoryFactorySupport; import org.springframework.data.gigaspaces.mapping.GigaspacesPersistentEntity; import org.springframework.data.gigaspaces.mapping.GigaspacesPersistentProperty; import java.io.Serializable; import java.util.Map; /** * @author Oleksiy_Dyagilev */ public class GigaspacesRepositoryFactoryBean<T extends Repository<S, ID>, S, ID extends Serializable> extends RepositoryFactoryBeanSupport<T, S, ID> implements ApplicationContextAware { private MappingContext<? extends GigaspacesPersistentEntity<?>, GigaspacesPersistentProperty> context; private GigaSpace gigaSpace; /** * Creates a new {@link RepositoryFactoryBeanSupport} for the given repository interface. * * @param repositoryInterface must not be {@literal null}. */ protected GigaspacesRepositoryFactoryBean(Class<? extends T> repositoryInterface) { super(repositoryInterface); } public GigaSpace getGigaSpace() { return gigaSpace; } public void setGigaSpace(GigaSpace gigaSpace) { this.gigaSpace = gigaSpace; } @Override public void setApplicationContext(ApplicationContext applicationContext) throws BeansException { if (gigaSpace == null) { Map<String, GigaSpace> beans = applicationContext.getBeansOfType(GigaSpace.class); if (beans.size() == 0) { throw new NoSuchBeanDefinitionException(GigaSpace.class); } else if (beans.size() > 1) { throw new NoUniqueBeanDefinitionException(GigaSpace.class, beans.size(), "GigaSpace bean should be only one in context or defined explicitly for repository (using attribute gigaspace)"); } gigaSpace = applicationContext.getBean(GigaSpace.class); } } @Override protected RepositoryFactorySupport createRepositoryFactory() { return new GigaspacesRepositoryFactory(gigaSpace, context); } public void setGigaspacesMappingContext(MappingContext<? extends GigaspacesPersistentEntity<?>, GigaspacesPersistentProperty> context) { this.context = context; } }
import { writeFile } from 'fs' import { join } from 'path' import { exit } from 'process' import * as json from '../manifests/index-repositories.json' const mode = process.env.MODE ?? 'none' type RepositoryManifest = { uri: string slug: string dist?: string suite?: string ranking: number aliases?: string[] }[] const data: RepositoryManifest = json.sort((repositoryA, repositoryB) => { const slugA = repositoryA.slug.toLowerCase() const slugB = repositoryB.slug.toLowerCase() // Sorts repositories alphabetically by slug return slugA < slugB ? -1 : slugA > slugB ? 1 : 0 }).filter((value, index, array) => { // Removes duplicates from the array based on the slug name return array.findIndex(subvalue => subvalue.slug === value.slug) === index }) const write = data.map(entry => { if (entry.slug.includes(' ')) { console.log('%s: space found in slug', entry.slug) return } if (entry.uri.endsWith('/')) { entry.uri = entry.uri.slice(0, -1) } if (entry.dist && !entry.suite) { console.log('%s: given dist without suite', entry.slug) } if (entry.suite && !entry.dist) { console.log('%s: given suite without dist', entry.slug) } // We also want to sort individual keys alphabetically too const alphabetical = Object.keys(entry).sort().reduce((previous, current) => ({ ...previous, [current]: (entry as { [key: string]: unknown })[current] }), {}) return alphabetical }).filter(Boolean) // Filters out empty entries that were omitted if (mode === 'ci') { writeFile(join('production', 'index-repositories.json'), Buffer.from(JSON.stringify(write)), 'utf8', (error) => { if (error) { console.log('[CI] Encountered an error: %s', error.message) exit(-1) // Fail GitHub Actions } }) } if (mode === 'husky') { writeFile(join('manifests', 'index-repositories.json'), Buffer.from(JSON.stringify(write, undefined, '\t')), 'utf8', (error) => { if (error) { console.log('[Husky] Encountered an error: %s', error.message) return } }) }
<gh_stars>10-100 /* * Copyright (c) 2010-2015 Pivotal Software, Inc. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); you * may not use this file except in compliance with the License. You * may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or * implied. See the License for the specific language governing * permissions and limitations under the License. See accompanying * LICENSE file. */ package com.gemstone.gemfire.codeAnalysis; import java.lang.reflect.Field; import java.util.HashMap; import java.util.Map; import com.gemstone.gemfire.codeAnalysis.decode.CompiledClass; import com.gemstone.gemfire.codeAnalysis.decode.CompiledField; public class ClassAndVariables implements Comparable { public CompiledClass dclass; public boolean hasSerialVersionUID = false; public long serialVersionUID; public Map<String,CompiledField> variables = new HashMap<String,CompiledField>(); public ClassAndVariables(CompiledClass parsedClass) { this.dclass = parsedClass; String name = dclass.fullyQualifiedName().replace('/', '.'); try { Class realClass = Class.forName(name); Field field = realClass.getDeclaredField("serialVersionUID"); field.setAccessible(true); serialVersionUID = field.getLong(null); hasSerialVersionUID = true; } catch (NoSuchFieldException e) { //No serialVersionUID defined } catch (Throwable e) { System.out.println("Unable to load" + name + ":" + e); } } public int compareTo(Object other) { if ( !(other instanceof ClassAndVariables) ) { return -1; } return dclass.compareTo(((ClassAndVariables)other).dclass); } @Override public String toString() { return ClassAndVariableDetails.convertForStoring(this); } }
Lots of things can happen in 11 minutes. You can grill a nice steak, you can bake a pan of cookies, or you can raise over $400,000 to build an ultra-compact 3D printer that, for a brief period, cost a mere $199. Called the Micro, the printer smashed its Kickstarter goal of $50,000 and is now well on its way to becoming one of the most interesting projects on the site. Created by a team in Bethesda, MD, the Micro originally sold for $199 for early birds and his since risen by $100. It’s a tiny printer, to be sure, with a 4.5 cubic-inch build volume and a special internal spool that holds the filament inside the printer’s case. It can build objects 4.5-inches high, which isn’t much but it’s enough to have a bit of fun. Now, for the tough question: can M3D pull this off? The case for the printer itself should cost a little less than $20 and the extruder, pieced out separately, probably costs about $100 or so. A very simple extruder costs $65 retail, so you could reduce that price slightly. Shipping will cost a few dollars – probably $12-$20 – depending on where it’s manufactured, so the $199 model was definitely a loss leader. That said, $299 is an entirely feasible price for a mini 3D printer. The founders, Michael Armani and David Jones, have done something quite intelligent: they’re building a very bare-bones printer with some very interesting software. If this image is any indication, you’ll be able to search for an open-source object and print it right from the app. The app resizes the object and prepares it for printing and the wee printer does the rest. It also has a self-leveling print bed, an amazing addition at the price. I doubt this will be the last $199 printer we see – the price will soon fall precipitously and when HP gets into the mix things will really change – but even at $299 this seems like a nice little entry-level device. Caveat emptor, though, because if this campaign takes off I’ll be very curious to see when and how these guys are able to ship all of the printers they sell.
<reponame>SCECcode/CFM GOCAD TSurf 1 HEADER { name: SAFS-MHFZ-LSBM-Berdoo_Canyon_fault-CFM4_1000m visible: true *solid*color: 0.345098 0.517647 0.207843 1 name_in_model_list: SAFS-MHFZ-LSBM-Berdoo_Canyon_fault-CFM4 } GOCAD_ORIGINAL_COORDINATE_SYSTEM NAME " gocad Local" PROJECTION Unknown DATUM Unknown AXIS_NAME X Y Z AXIS_UNIT m m m ZPOSITIVE Elevation END_ORIGINAL_COORDINATE_SYSTEM PROPERTY_CLASS_HEADER X { kind: X unit: m } PROPERTY_CLASS_HEADER Y { kind: Y unit: m } PROPERTY_CLASS_HEADER Z { kind: Z unit: m is_z: on } PROPERTY_CLASS_HEADER vector3d { kind: Length unit: m } TFACE VRTX 1 574123.046875 3742442.796875 -7811.45068359375 VRTX 2 573783.59375 3742826.84375 -8562.244140625 VRTX 3 574204.7734375 3742073.90625 -8023.12939453125 VRTX 4 574041.3203125 3742811.6875 -7599.7724609375 VRTX 5 574445.8515625 3742046.578125 -7141.50537109375 VRTX 6 574299.0546875 3742796.515625 -6637.30126953125 VRTX 7 574679.9453125 3742075.6875 -6206.4462890625 VRTX 8 574556.78125 3742781.359375 -5674.82958984375 VRTX 9 574983.6796875 3741851.015625 -5365.7587890625 VRTX 10 574814.5078125 3742766.203125 -4712.35791015625 VRTX 11 575223.75 3741937.3125 -4326.669921875 VRTX 12 575072.2421875 3742751.046875 -3749.88623046875 VRTX 13 575484.515625 3741923.703125 -3350.3857421875 VRTX 14 575329.96875 3742735.890625 -2787.41455078125 VRTX 15 575778.59375 3741851.34375 -2330.357666015625 VRTX 16 575587.6953125 3742720.734375 -1824.943115234375 VRTX 17 576044.1796875 3741870.34375 -1399.12060546875 VRTX 18 576428.5859375 3740987.875 -1638.6373291015625 VRTX 19 576645.015625 3741200.796875 -628.81365966796875 VRTX 20 577060.75 3740433.375 -637.713623046875 VRTX 21 577128.015625 3740939.109375 264.82586669921875 VRTX 22 576615.5859375 3741814.75 182.41293334960938 VRTX 23 576275.4140625 3741981.78125 -542.44805908203125 VRTX 24 575845.4296875 3742705.5625 -862.4715576171875 VRTX 25 576103.15625 3742690.40625 100 VRTX 26 577555.4140625 3740025.28125 245.90545654296875 VRTX 27 577440.8828125 3739544.359375 -628.53167724609375 VRTX 28 577901.9453125 3739075.140625 130.60493469238281 VRTX 29 577807.5625 3738552.328125 -721.7310791015625 VRTX 30 578161.578125 3738094.265625 98.227653503417969 VRTX 31 578054.7421875 3737548.734375 -738.44207763671875 VRTX 32 578389.796875 3737102.265625 95.814857482910156 VRTX 33 578315.3515625 3736548.234375 -738.7484130859375 VRTX 34 578683.1328125 3736128.734375 95.979873657226562 VRTX 35 578578.71875 3735571.421875 -913.49981689453125 VRTX 36 579009.6796875 3735164.625 97.459419250488281 VRTX 37 578950.3359375 3734605.90625 -735.20635986328125 VRTX 38 579336.21875 3734200.515625 98.93896484375 VRTX 39 579525.25 3733660.015625 -854.20733642578125 VRTX 40 579809.703125 3733300.0625 102.46529388427734 VRTX 41 580025.1328125 3732807.75 -947.1300048828125 VRTX 42 580331.8984375 3732429.75 107.49796295166016 VRTX 43 580713.5703125 3732045.65625 -1009.1913452148438 VRTX 44 580953.59375 3731623.796875 115.86024475097656 VRTX 45 581466.875 3731313.9375 -889.6575927734375 VRTX 46 581196.4921875 3731794.671875 -2026.921630859375 VRTX 47 580419.9921875 3732448.34375 -2055.089599609375 VRTX 48 579691.25 3733153.078125 -2140.1904296875 VRTX 49 579094.671875 3733940.25 -1502.4171142578125 VRTX 50 578962.5 3733857.796875 -2225.291259765625 VRTX 51 578648.3125 3734719.703125 -1629.8104248046875 VRTX 52 578264.296875 3735473.71875 -2110.9384765625 VRTX 53 578416.6953125 3734582.71875 -2582.47607421875 VRTX 54 578013.25 3735323.359375 -3151.37841796875 VRTX 55 577848.8515625 3736233.4375 -2759.616943359375 VRTX 56 578130.6484375 3736292.09375 -1744.7554931640625 VRTX 57 577966.6484375 3737079.40625 -1504.4644775390625 VRTX 58 577696.5859375 3737149.109375 -2357.65966796875 VRTX 59 577461.2265625 3736972.34375 -3319.189453125 VRTX 60 577322.6328125 3737871.46875 -2836.82568359375 VRTX 61 577035.8671875 3737706.75 -3851.18701171875 VRTX 62 576859.859375 3738594.375 -3385.451171875 VRTX 63 576590.1171875 3738453.28125 -4379.55029296875 VRTX 64 576762.6875 3737560.78125 -4806.5966796875 VRTX 65 577194.125 3736809.34375 -4273.52587890625 VRTX 66 577609.8046875 3736063.984375 -3720.287109375 VRTX 67 576331.2578125 3738312.21875 -5339.671875 VRTX 68 576134.1015625 3739194.609375 -4904.91064453125 VRTX 69 576393.1328125 3739350.40625 -3939.990234375 VRTX 70 576676.203125 3739487.046875 -2992.765869140625 VRTX 71 576159.8671875 3740284.296875 -3445.18798828125 VRTX 72 576477.59375 3740295.078125 -2361.8466796875 VRTX 73 576938.671875 3739450.40625 -2213.5986328125 VRTX 74 577200.2265625 3738632.578125 -2352.59375 VRTX 75 577674.3515625 3738002.40625 -1663.369873046875 VRTX 76 577357.9609375 3739016.4375 -1467.9603271484375 VRTX 77 576984.5234375 3739993.859375 -1468.57470703125 VRTX 78 575984.2109375 3741083.78125 -2846.916748046875 VRTX 79 575652.546875 3741075.15625 -3913.5263671875 VRTX 80 575916.0546875 3740142.59375 -4459.20947265625 VRTX 81 575688.6875 3740001.65625 -5415.927734375 VRTX 82 575412.9921875 3741017.4375 -4910.10546875 VRTX 83 575244.1015625 3740773.984375 -5900.544921875 VRTX 84 575468.390625 3739815.09375 -6405.81640625 VRTX 85 575899.8203125 3739063.65625 -5872.7451171875 VRTX 86 575047.1484375 3740568.03125 -6944.89990234375 VRTX 87 574858.8671875 3741401.109375 -6481.01025390625 VRTX 88 574625.9609375 3741320.96875 -7484.01416015625 VRTX 89 581996.0859375 3731165.703125 -2026.306396484375 VRTX 90 582162.6328125 3730730.28125 -1295.053466796875 VRTX 91 582153.71875 3730441.734375 -585.2509765625 VRTX 92 581575.2890625 3730817.828125 124.22252655029297 VRTX 93 582194.171875 3730009.828125 122.91645812988281 VRTX 94 582498.625 3729826.765625 -242.82476806640625 VRTX 95 582803.078125 3729643.71875 -608.56597900390625 VRTX 96 582799.375 3730090.234375 -1317.125 VRTX 97 582795.6875 3730536.734375 -2025.6910400390625 VRTX 98 582806.78125 3729197.21875 100 CNXYZ TRGL 92 44 45 TRGL 94 98 93 TRGL 95 98 94 TRGL 90 89 97 TRGL 90 97 96 TRGL 91 90 96 TRGL 91 96 95 TRGL 91 93 92 TRGL 91 92 45 TRGL 91 45 90 TRGL 45 46 89 TRGL 58 75 60 TRGL 76 75 29 TRGL 77 27 20 TRGL 77 20 18 TRGL 78 18 15 TRGL 78 15 13 TRGL 79 78 13 TRGL 79 13 11 TRGL 5 1 3 TRGL 88 5 3 TRGL 87 88 86 TRGL 87 5 88 TRGL 91 95 94 TRGL 9 87 83 TRGL 83 87 86 TRGL 68 85 67 TRGL 68 81 85 TRGL 81 84 85 TRGL 81 83 84 TRGL 82 83 81 TRGL 82 9 83 TRGL 82 11 9 TRGL 57 75 58 TRGL 80 82 81 TRGL 80 81 68 TRGL 80 68 69 TRGL 80 69 71 TRGL 71 78 79 TRGL 72 78 71 TRGL 72 18 78 TRGL 72 77 18 TRGL 73 76 77 TRGL 73 74 76 TRGL 71 79 80 TRGL 74 75 76 TRGL 74 60 75 TRGL 74 62 60 TRGL 74 70 62 TRGL 70 72 71 TRGL 77 76 27 TRGL 70 71 69 TRGL 70 69 62 TRGL 69 63 62 TRGL 63 69 68 TRGL 63 68 67 TRGL 70 74 73 TRGL 63 67 64 TRGL 7 5 87 TRGL 55 66 54 TRGL 55 59 66 TRGL 59 65 66 TRGL 61 64 65 TRGL 75 57 31 TRGL 61 63 64 TRGL 61 62 63 TRGL 62 61 60 TRGL 60 61 59 TRGL 60 59 58 TRGL 58 59 55 TRGL 58 55 56 TRGL 57 56 33 TRGL 52 56 55 TRGL 52 55 54 TRGL 52 54 53 TRGL 51 53 50 TRGL 51 52 53 TRGL 51 37 35 TRGL 49 39 37 TRGL 49 37 51 TRGL 57 33 31 TRGL 49 51 50 TRGL 48 49 50 TRGL 48 39 49 TRGL 41 48 47 TRGL 43 41 47 TRGL 41 39 48 TRGL 43 47 46 TRGL 43 45 44 TRGL 43 44 42 TRGL 43 42 41 TRGL 41 42 40 TRGL 41 40 39 TRGL 39 40 38 TRGL 39 38 37 TRGL 37 36 35 TRGL 35 34 33 TRGL 9 7 87 TRGL 33 34 32 TRGL 33 32 31 TRGL 31 32 30 TRGL 31 30 29 TRGL 29 30 28 TRGL 29 28 27 TRGL 27 28 26 TRGL 27 26 20 TRGL 21 20 26 TRGL 35 36 34 TRGL 23 22 25 TRGL 56 52 35 TRGL 23 25 24 TRGL 51 35 52 TRGL 17 23 24 TRGL 56 35 33 TRGL 17 19 23 TRGL 17 24 16 TRGL 19 22 23 TRGL 90 45 89 TRGL 82 80 79 TRGL 19 21 22 TRGL 19 20 21 TRGL 70 73 72 TRGL 37 38 36 TRGL 19 18 20 TRGL 18 19 17 TRGL 17 15 18 TRGL 56 57 58 TRGL 15 17 16 TRGL 15 16 14 TRGL 15 14 13 TRGL 91 94 93 TRGL 13 14 12 TRGL 72 73 77 TRGL 13 12 11 TRGL 11 12 10 TRGL 75 31 29 TRGL 83 86 84 TRGL 82 79 11 TRGL 11 10 9 TRGL 59 61 65 TRGL 9 10 8 TRGL 43 46 45 TRGL 9 8 7 TRGL 76 29 27 TRGL 7 8 6 TRGL 7 6 5 TRGL 5 6 4 TRGL 5 4 1 TRGL 4 2 1 TRGL 1 2 3 BSTONE 98 BORDER 99 98 95 END
A Perth man is in police custody after boarding a train in the city with an allegedly homemade bomb device. The 45-year-old man is accused of boarding a train at the Currambine Station about 4pm on Thursday this week and leaving behind the device. Emergency services were called to the scene after a commuter found the small explosive device concealed in a black case. Transit guards alerted authorities who then tested the case, which contained a carbon dioxide bottle, black powder and a fuse but no batteries. Police managed to handle the device and remove it from the train without disrupting the city’s peak hour rush, but have said that if wires inside it had been connected it could have caused a small explosion. Lincoln Hine was arrested by police yesterday when he was allegedly found with a meat cleaver in his backpack and a small quantity of drugs. The 45-year-old faced Perth Magistrates Court today on four charges of possessing explosives under suspicious circumstances. He was formally refused bail and is expected back in court later this month.
<filename>sdk/cognitiveservices/cognitiveservices-localsearch/src/operations/local.ts /* * Copyright (c) Microsoft Corporation. All rights reserved. * Licensed under the MIT License. See License.txt in the project root for * license information. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is * regenerated. */ import * as msRest from "@azure/ms-rest-js"; import * as Models from "../models"; import * as Mappers from "../models/localMappers"; import * as Parameters from "../models/parameters"; import { LocalSearchClientContext } from "../localSearchClientContext"; /** Class representing a Local. */ export class Local { private readonly client: LocalSearchClientContext; /** * Create a Local. * @param {LocalSearchClientContext} client Reference to the service client. */ constructor(client: LocalSearchClientContext) { this.client = client; } /** * @summary The Local Search API lets you send a search query to Bing and get back search results * that include local businesses such as restaurants, hotels, retail stores, or other local * businesses. The query can specify the name of the local business or it can ask for a list (for * example, restaurants near me). * @param query The user's search term. * @param [options] The optional parameters * @returns Promise<Models.LocalSearchResponse> */ search(query: string, options?: Models.LocalSearchOptionalParams): Promise<Models.LocalSearchResponse>; /** * @param query The user's search term. * @param callback The callback */ search(query: string, callback: msRest.ServiceCallback<Models.SearchResponse>): void; /** * @param query The user's search term. * @param options The optional parameters * @param callback The callback */ search(query: string, options: Models.LocalSearchOptionalParams, callback: msRest.ServiceCallback<Models.SearchResponse>): void; search(query: string, options?: Models.LocalSearchOptionalParams | msRest.ServiceCallback<Models.SearchResponse>, callback?: msRest.ServiceCallback<Models.SearchResponse>): Promise<Models.LocalSearchResponse> { return this.client.sendOperationRequest( { query, options }, searchOperationSpec, callback) as Promise<Models.LocalSearchResponse>; } } // Operation Specifications const serializer = new msRest.Serializer(Mappers); const searchOperationSpec: msRest.OperationSpec = { httpMethod: "GET", path: "bing/v7.0/localbusinesses/search", queryParameters: [ Parameters.countryCode, Parameters.market, Parameters.query, Parameters.localCategories, Parameters.localCircularView, Parameters.localMapView, Parameters.count, Parameters.first, Parameters.responseFormat, Parameters.safeSearch, Parameters.setLang ], headerParameters: [ Parameters.xBingApisSDK, Parameters.acceptLanguage, Parameters.pragma, Parameters.userAgent, Parameters.clientId, Parameters.clientIp, Parameters.location ], responses: { 200: { bodyMapper: Mappers.SearchResponse }, default: { bodyMapper: Mappers.ErrorResponse } }, serializer };
class CircuitElement: """ Abstract class for circuit elements. All circuit elements defined in the QCircuit library derive from this base class. """ __metaclass__ = ABCMeta def __init__(self, name): self.name = name @abstractmethod def is_phase(self): pass @abstractmethod def is_charge(self): pass @abstractmethod def energy_term(self, node_phases, node_charges): return None @abstractmethod def symbolic_energy_term(self, node_phases, node_charges): return None
Anticoagulation in acute ischemic stroke: A systematic search. INTRODUCTION Stroke is one of the most important diseases worldwide. Several clinical scenarios demand full dose of anticoagulants primary to stroke etiology or to the treatment of comorbidity. However, controversy exists over many issues regarding anticoagulation treatment in stroke such as time for initiation, efficacy according to stroke etiology, the ideal dose of anticoagulants, and whether novel anticoagulants should be used. METHOD Computerized search for clinical trials and randomized controlled clinical trials was done to the present date at Medline, Scielo, Embase, PsychInfo, and Cochrane Library using MeSH terms and the keywords stroke, ischemic stroke, anticoagulation, anticoagulants, heparin, low-molecular-weight heparin, warfarin, dabigatran, rivaroxaban, apixaban. The PRISMA statement was used to evaluate clinical trials. RESULTS Fourteen clinical trials were selected based on inclusion criteria. No evidence was found supporting the early use of heparin, heparinoids or low-molecular-weight heparin (LMWH) early after stroke. No consistent evidence for the use of warfarin and the newer oral anticoagulants were found. Argatroban was the only anticoagulant with significant positive results early after large-artery ischemic stroke. CONCLUSION The ideal time for initiating anticoagulation remains undefined, requiring further investigation. Early anticoagulation for ischemic stroke is not recommended, with few exceptions, such as that of argatroban.
//---------------------------------------------------------------------------- // // Copyright (c) Intel Corporation, 2003 - 2012 All Rights Reserved. // // File: AMT_AlarmClockService.cpp // // Contents: AMT Alarm Clock Service derived from Service and provides the ability to set an alarm time to turn the host computer system on. Setting an alarm time is done by calling "AddAlarm" method."NextAMTAlarmTime" and "AMTAlarmClockInterval" properties are deprecated and "AddAlarm" should be used instead. // // This file was automatically generated from AMT_AlarmClockService.mof, version: 8.0.0 // //---------------------------------------------------------------------------- #include "AMT_AlarmClockService.h" namespace Intel { namespace Manageability { namespace Cim { namespace Typed { const CimFieldAttribute AMT_AlarmClockService::_metadata[] = { {"NextAMTAlarmTime", false, false, false }, {"AMTAlarmClockInterval", false, false, false }, }; // class fields const CimDateTime AMT_AlarmClockService::NextAMTAlarmTime() const { CimDateTime ret; TypeConverter::StringToType(GetField("NextAMTAlarmTime"), ret); return ret; } void AMT_AlarmClockService::NextAMTAlarmTime(const CimDateTime &value) { SetOrAddField("NextAMTAlarmTime", TypeConverter::TypeToString(value)); } bool AMT_AlarmClockService::NextAMTAlarmTimeExists() const { return ContainsField("NextAMTAlarmTime"); } void AMT_AlarmClockService::RemoveNextAMTAlarmTime() { RemoveField("NextAMTAlarmTime"); } const CimDateTime AMT_AlarmClockService::AMTAlarmClockInterval() const { CimDateTime ret; TypeConverter::StringToType(GetField("AMTAlarmClockInterval"), ret); return ret; } void AMT_AlarmClockService::AMTAlarmClockInterval(const CimDateTime &value) { SetOrAddField("AMTAlarmClockInterval", TypeConverter::TypeToString(value)); } bool AMT_AlarmClockService::AMTAlarmClockIntervalExists() const { return ContainsField("AMTAlarmClockInterval"); } void AMT_AlarmClockService::RemoveAMTAlarmClockInterval() { RemoveField("AMTAlarmClockInterval"); } CimBase *AMT_AlarmClockService::CreateFromCimObject(const CimObject &object) { AMT_AlarmClockService *ret = NULL; if(object.ObjectType() != CLASS_NAME) { ret = new CimExtended<AMT_AlarmClockService>(object); } else { ret = new AMT_AlarmClockService(object); } return ret; } vector<shared_ptr<AMT_AlarmClockService> > AMT_AlarmClockService::Enumerate(ICimWsmanClient *client, const CimKeys &keys) { return CimBase::Enumerate<AMT_AlarmClockService>(client, keys); } void AMT_AlarmClockService::Delete(ICimWsmanClient *client, const CimKeys &keys) { CimBase::Delete(client, CLASS_URI, keys); } const vector<CimFieldAttribute> &AMT_AlarmClockService::GetMetaData() const { return _classMetaData; } const CimFieldAttribute AMT_AlarmClockService::AddAlarm_INPUT::_metadata[] = { {"AlarmTemplate", false, true }, }; void AMT_AlarmClockService::AddAlarm_INPUT::AlarmTemplate(const IPS_AlarmClockOccurrence &value) { SetOrAddField("AlarmTemplate", TypedTypeConverter::TypeToString(value)); } const VectorFieldData AMT_AlarmClockService::AddAlarm_INPUT::GetAllFields() const { VectorFieldData ret; ret = sortData(_metadata, 1); return ret; } const CimReference AMT_AlarmClockService::AddAlarm_OUTPUT::AlarmClock() const { CimReference ret; TypeConverter::StringToType(GetField("AlarmClock"), ret); return ret; } bool AMT_AlarmClockService::AddAlarm_OUTPUT::AlarmClockExists() const { return ContainsField("AlarmClock"); } unsigned int AMT_AlarmClockService::AddAlarm(const AddAlarm_INPUT &input, AddAlarm_OUTPUT &output) { return Invoke("AddAlarm", input, output); } const string AMT_AlarmClockService::CLASS_NAME = "AMT_AlarmClockService"; const string AMT_AlarmClockService::CLASS_URI = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService"; const string AMT_AlarmClockService::CLASS_NS = "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService"; const string AMT_AlarmClockService::CLASS_NS_PREFIX = "AAl1"; CIMFRAMEWORK_API vector <CimFieldAttribute> AMT_AlarmClockService::_classMetaData; } } } }
Framework of Applying Independent Component Analysis After Compressed Sensing for Electroencephalogram Signals This paper proposes a novel compressed sensing (CS) framework for electroencephalogram (EEG) signals with artifacts. A feature of this framework is the application of an independent component analysis (ICA) to remove the interference of artifacts after CS in a data processing unit. Therefore, we can remove the ICA processing block from the sensing unit. In the framework, we use a random sampling measurement matrix in CS to suppress the Gaussian of the compressed sensing data. Herein, the proposed framework is evaluated using raw EEG signals with a pseudo-model of an eye-blinking artifact. The comparison of normalized mean square error (NMSE) values are shown to quantitatively demonstrate the effectiveness of proposed framework.
/** * Returns the temporary directory used by Jerkar for its internal use. */ public static File jerkarTempDir() { final File result = new File(jerkarUserHome(), "temp"); if (!result.exists()) { result.mkdirs(); } return result; }
Preparation of Antioxidant and Antibacterial Chitosan Film from Periplaneta americana Simple Summary The American cockroach (Periplaneta americana) is a kind of insect distributed worldwide. Commonly, it is considered as a pest. However, nowadays, it has been developed as a potential resource of protein, lipid, and antibacterial peptide. Besides, it also contains chitin, which could be used to produce chitosan by deacetylation. Chitosan is a valuable biomaterial containing amino groups, and has been applied in various fields. However, the researches focusing on the applications of P. americana chitosan are rare, which might hinder the exploration of the value of P. americana. In this paper, we prepared and characterized the chitosan film from P. americana. The performances relating to food packaging of the obtained film were also examined. As the results showed, P. americana chitosan film could resist UV light effectively. It could also keep scavenging 2,2-diphenyl-1-picrylhydrazyl (DPPH) radicals in 8 h, proving its ability of antioxidant. In addition, it exhibited antibacterial activity by resisting the growth of Serratia marcescens and Escherichia coli. The results showed that P. americana chitosan film could work as a potential food packaging material, which implicated the value of P. americana chitosan and provided a new clue for the exploration of the value of more insects, especially pests. Abstract Among different insects, the American cockroach (Periplaneta americana) has been bred in industrial scale successfully as a potential resource of protein, lipid, and antibacterial peptide. However, the application of its chitosan has not been studied widely, which has hindered the sufficient utilization of P. americana. In this paper, the chitosan from P. americana was separated, characterized, and processed into film (PaCSF) to examine its potential of being applied in food packaging. As the results of different characterizations showed, PaCSF was similar to shrimp chitosan film (SCSF). However, concerning the performances relating to food packaging, the two chitosan films were different. PaCSF contained more water (42.82%) than SCSF did, resulting in its larger thickness (0.08 mm). PaCSF could resist UV light more effectively than SCSF did. Concerning antioxidant activity, the DPPH radical scavenging ability of PaCSF increased linearly with time passing, reaching 72.46% after 8 h, which was better than that of SCSF. The antibacterial activity assay exhibited that PaCSF resisted the growth of Serratia marcescens and Escherichia coli more effectively than SCSF did. The results implied that P. americana chitosan could be a potential raw material for food packaging, providing a new way to develop P. americana. Introduction Since the global population is soaring, people are exploring more renewable resources to meet the demands of modern life. Recently, insects have attracted researchers' focuses because they possess extraordinarily huge biomass, and they are promising resources of protein, lipid, and chitin. In addition, some species of insects provide special substances, Insects 2021, 12, 53 2 of 14 like antimicrobial peptides, which make them more valuable. The American cockroach (Periplaneta americana) is one of the world's most thriving insects distributing in tropic, subtropic, and temperate regions. In China, P. americana has been used to deal with ulcers, wounds, edema hypochondriac pain, and palpitations for thousands of years. Previous researches have proven that P. americana possesses several outstanding biological properties, including antibacterial ability, antioxidant, inflammatory, and anticancer. Attracted to these characteristics, people in China have reared P. americana in large scale for researches and commercial applications. For now, various substances-including protein, fatty acid, antimicrobial peptide, chitin, and chitosan-have been separated from P. americana so that they could be studied and applied separately. Chitin is the second most abundant natural polysaccharide after cellulose. Chitin linearly consists of N-acetyl-D-glucosamine and D-glucosamine units that are linked by glycosidic bonds. Chitin exists mainly as a structural component in arthropods, some mollusks, and cell walls of fungi and algae. Chitosan is the deacetylated derivative of chitin. During the deacetylation, N-acetyl-D-glucosamine units would be changed to D-glucosamine units. Because of the large number of amino groups distributing along the polysaccharide chains, chitosan possesses several excellent properties, such as biocompatibility, non-toxicity, biodegradability, and the ability of anti-cancer. Therefore, chitosan has been applied in various fields: agriculture, waste water treatment, food industry, cosmetic, and biopharmaceutics. In the food industry, packaging is the final step for food preservation. The effect of packaging depends largely on the performance of the packaging film. Recently, several natural biomaterials have been developed to produce active food packaging film, including protein, polysaccharide, and lipid. Among the polysaccharide, chitosan is utilized most popularly because the obtained film would inherit the outstanding properties of chitosan. These properties-mainly antioxidant and antibacterial activity-would enhance the performance of the obtained film in food packaging. Commercial chitosan generally comes from crab and shrimp shells. However, producing chitosan from P. americana is also reasonable, because the properties of chitosan from various resources are different. This diversity would result in various chitosan films that could be applied in many specific areas. For example, molecular weight and degree of deacetylation of chitosan influenced the mechanical properties and bioactivity of the obtained film seriously. In addition, since some inland areas lack fishery resources, P. americana would supplement the raw material of chitosan. Moreover, the development of P. americana chitosan could add value to this "pest", helping change people's attitude to it. To the author's best knowledge, for now, the researches focusing on P. americana chitosan film were rare. Therefore, in this paper, chitosan was prepared from P. americana and then processed into film. For comparison, commercial shrimp chitin was also utilized to produce chitosan film by the same method. All the chitin, chitosan, and chitosan films were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray Diffraction (XRD), and Scanning electron microscopy (SEM). The performances relating to food packaging of both chitosan films were examined. This paper aimed to develop the application of P. americana chitosan in food packaging and to assist the exploration of P. americana resource in a new way. Materials and Reagents We used 10 kilograms of dead and dried adult P. americana that were donated by Gooddoctor Pharmaceutical Group (Sichuan, China). HCl and H 2 O 2 solution were purchased from Bohua Chemical Reagent Co., Ltd. (Tianjin, China). NaOH powder, glacial acetic acid, hexane, LiCl, DPPH, and Dimethylacetamide (DMAc) were bought from Meryer Chemical Reagent Co., Ltd. (Shanghai, China). The mixture of methyl orange and aniline blue was bought from Yuanye Bio-Technology Co., Ltd. (Shanghai, China). All the chemical reagents were analytical grade. Commercial shrimp chitin (reagent grade) was purchased from P. americana was pulverized by a grinder (YS-04B, Zhengde Machinery Co., Ltd., Beijing, China) for 1 min. Then, the powder was defatted using hexane as the solvent by Soxhlet extraction method in water bath at 80 C for 3 h. The residual powder was dried in an air-drying oven at 65 C for 8 h. Deproteinization The defatted powder was deproteinized by 4 rounds of hot alkali bath. Briefly, in the first round, the powder (1 g) was blended with 30 mL of 0.5 M NaOH solution. The mixture was heated with stirring at 95 C and 500 rpm for 20 min. The residual powder was separated by centrifuging at 4000 rpm for 20 s (Centrifuge 5804, Eppendorf, Hamburg, Germany), and was then rinsed by distilled water until neutral. In the second round, the residual powder after the first round was again blended with NaOH solution at the same temperature and stirring speed; while the volume, concentration of NaOH, and the reaction time were changed to 5 mL, 4 M, and 80 min, respectively. Then the residual powder was separated and rinsed as described above. The conditions of the third and the fourth round were the same as those of the second round, except that the reaction time were changed to 150 min and 30 min, respectively. After deproteinization, the residual powder was dried at 105 C in the oven for 10 h. Demineralization The deproteinized powder was demineralized by 5 mL of 0.5 M HCl at 60 C and 500 rpm for 1 h. The residual powder was separated, rinsed, and dried, as described in Section 2.2.2. The obtained residual powder was P. americana chitin (PaC). Chitosan Preparation PaC was bleached by 5 mL of 10% H 2 O 2 at 80 C and 500 rpm for 3 h, followed by separating, rinsing, and drying at 80 C for 24 h. Then, PaC was deacetylated by 5 mL of 25 M NaOH solution at 130 C and 500 rpm for 2 h. The residual powder was separated, rinsed, and dried at 80 C for 24 h. This process was repeated three times. The final residual powder was P. americana chitosan (PaCS). The commercial shrimp chitin (SC) was also deacetylated under the same conditions, then the shrimp chitosan (SCS) was obtained. Chitosan Film Formation PaCS film (PaCSF) and SCS film (SCSF) were produced by previous module-casting method. Briefly, chitosan (1 g) was totally dissolved in 50 mL of 1% acetic acid solution at room temperature, followed by adding 1 g of glycerol. The solution was stirred until homogeneous, and was then degassed by an ultrasonic cleaner (AS3120A AUTO SCIENCE, Tianjin, China) for 1 h. After that, 25 mL of the solution was poured into a petri dish (diameter = 9 cm), and was then dried at 65 C for 15 h. The obtained film was peeled carefully and preserved in a desiccator at room temperature for at least 24 h before being characterized and tested. Mv of the chitin was determined according to Hong et al.. The chitin sample (0.03 g) was dissolved in 1 dL of 5% LiCl/DMAc (w/v). The intrinsic viscosity of the where was the intrinsic viscosity of the chitin sample; K = 7.6 10 −5 dL/g and = 0.95. The Mv of the chitosan was determined according to Rinaudo et al.. The chitosan sample (0.03 g) was dissolved in 1 dL of 0.2 M sodium acetate/0.3 M acetic acid solution. The intrinsic viscosity of the solution was calculated by Equation, with K = 7.6 10 −4 dL/g and = 0.76. FTIR FTIR spectra were analyzed by a Thermo Fisher Scientific Nicolet iS50 spectrometer (Thermo Fisher Scientific, Waltham, MA, USA) with the frequency of 4000-400 cm −1 at a resolution of 4 cm −1. Degree of acetylation (DA) of the chitin was calculated by the following equation : where A 1320 and A 1420 were the area of the peak at 1320 and 1420 cm −1, respectively. The degree of deacetylation (DDA) of the chitosan was calculated by referring to previous report. The chitosan sample (0.03 g) was dissolved thoroughly in 3 mL of 0.1 M HCl solution. Then 20 L of the mixture of methyl orange and aniline blue was added. NaOH solution (0.1 M) was utilized to titrate until the color of the solution changed from purple to blue-green. DDA was calculated by the following equations: DDA (%) = NH 2 /9.94 100% where NH 2 (%) was the amino content of chitosan; C 1 and C 2 were the concentration of NaOH and HCl solution (M), respectively; V 1 was the volume of HCl solution (L) used to dissolve chitosan; V 2 was the consumed volume of NaOH solution (L) after titration; m was the mass of the chitosan sample (g); 16 was the mass of amino group (g) corresponding to 1 mole of HCl molecules; 9.94 was the theoretical amino content (%) of fully deacetylated chitosan. XRD XRD was conducted by Rigaku SmartLab diffractometer at 30 mA, 40 kV. The scanning angle was from 5 to 45. Crystallinity index (CrI) of the chitin and chitosan samples were calculated according to the following equation : where I 110 was the maximum intensity at 2 ≈ 19.3 ; I am was the intensity of amorphous diffraction at 2 ≈ 13. SEM The surface morphology of the chitin, chitosan, and chitosan films were observed by a scanning electron microscopy (QUANTA 200, FEI, Hillsboro, OR, USA). 2.6. Performances of Chitosan Films 2.6.1. Film Thickness, Light Transmittance, and Opacity Film thickness was measured by a digital caliper (precision = 0.01 mm). Light transmittance of the chitosan films were determined according to Yang et al.. SpectraMax Gemini EM was applied to scan the chitosan films from 200 to 800 nm. One piece of cling wrap (CW) was scanned under the same condition for comparison. The scanning speed was 10 nm/s. The opacity of the chitosan films were calculated by the following equation : where A 600 was the absorbance of the film at 600 nm; d was the film thickness (mm). Water Content and Water Vapor Permeability (WVP) The chitosan films were dried in the oven at 105 C for 12 h. The water content was calculated by the following equation: where M 0 and M d were the weight of the film (g) before and after drying, respectively. WVP was determined as described in previous report with a little modification. The chitosan films and CW were utilized to seal a centrifuge tube of 15 mL containing 12 g of calcium chloride anhydrous. The tube was placed in a desiccator containing distill water at 20 C. The tube was weighed at the interval of 24 h for 6 days. The WVP was calculated by the following equation: where W was the increased weight of the tube (g); x was the film thickness (m); t was the time (s) consumed for that increase in the weight; A was the permeation area of the film (m 2 ); ∆P was 2339 Pa at 20 C. Antioxidant Activity Assay DPPH radical scavenging assay was conducted to assess the antioxidant activity of the chitosan films and CW. The chitosan films and CW were cut up, and 100 mg of each sample was immersed in 4 mL of 0.1 mM DPPH methanol solution. Another group of the same DPPH solution was set as Blank without any chitosan film or CW in it. After violently vibrating, the solution was kept in dark and the absorbance of the solution at 517 nm was determined at the interval of 1 h for 8 h. DPPH radical scavenging activity was calculated by the following equation: where A 0 and A t were the absorbance of Blank and the reacting solution, respectively. Antibacterial Activity Assay Serratia marcescens and Escherichia coli were utilized to assess the antibacterial activity of the chitosan films by paper diffusion method. The bacteria were activated in liquid lysogeny broth (LB) medium at 37 C, and were then transferred and spread uniformly on the surface of LB agar plate. After that, one piece of disc paper (diameter = 6 mm) was set on the plate, and 20 L of the film formation solution was dropped on the disc paper. For comparison, the solution without chitosan dissolved in was set as Blank (negative control); while 20 L of 10 g/L gentamicin solution was set as positive control. The agar plate was incubated at 37 C for 12 h, then the inhibition zones were measured. Statistical Analysis The experimental data were analyzed by SPSS 20 software (IBM, Armonk, NY, USA). The data were expressed as the average ± standard deviation of three replications. Oneway analysis of variance (ANOVA) was utilized to measure the significant differences by Duncan's multiple range at p < 0.05. Results and Discussion 3.1. The Changes of Characteristics from Chitin to Chitosan Film 3.1.1. FTIR FTIR spectra of chitin, chitosan, and chitosan films are shown in Figure 1. PaC and SC exhibited similar peaks at 3443 and 3266 cm −1, which were ascribed to O-H stretching and N-H stretching, respectively. The peak at 3107 cm −1 was the characteristic of secondary amides of -chitin. We could also see splitting band between 1660 and 1625 cm −1, which derived from the hydrogen bonds between C=O and O6-H. All these characteristics proved the evidences of -chitin. and N-H stretching, respectively. The peak at 3107 cm −1 was the characteristic of se ary amides of -chitin. We could also see splitting band between 1660 and 1625 which derived from the hydrogen bonds between C=O and O6-H. All these ch teristics proved the evidences of -chitin. The splitting band mentioned above vanished in PaCS and SCS, because most acetylamino groups that contain C=O were eliminated during deacetylation. We observe obvious peaks at 1600 cm −1 in both PaCS and SCS, which were the characte of amino groups, proving the success of deacetylation. This explanation was b up by the high DDA of chitosan, as presented in Table 1. The peaks at 3443, 2880 stretching), and 1099 cm −1 (C-O stretching) were also the characteristics of chitosan In PaCSF and SCSF, the peaks at 3443 cm −1 shifted to 3285 cm −1 (N-H stretchin cause of the formation of lots of N-H hydrogen bonds among amino groups, glycero water. Additionally, sharp peaks at 1030 cm −1 (C-O stretching) appeared in P and SCSF because of the addition of glycerol. FTIR spectra showed that chitin, chi and chitosan film from P. americana were similar to their counterparts from shrimp The splitting band mentioned above vanished in PaCS and SCS, because most of the acetylamino groups that contain C=O were eliminated during deacetylation. We could observe obvious peaks at 1600 cm −1 in both PaCS and SCS, which were the characteristics of amino groups, proving the success of deacetylation. This explanation was backed up by the high DDA of chitosan, as presented in Table 1. The peaks at 3443, 2880 (C-H stretching), and 1099 cm −1 (C-O stretching) were also the characteristics of chitosan. In PaCSF and SCSF, the peaks at 3443 cm −1 shifted to 3285 cm −1 (N-H stretching) because of the formation of lots of N-H hydrogen bonds among amino groups, glycerol, and water. Additionally, sharp peaks at 1030 cm −1 (C-O stretching) appeared in PaCSF and SCSF because of the addition of glycerol. FTIR spectra showed that chitin, chitosan, and chitosan film from P. americana were similar to their counterparts from shrimp shell. XRD XRD was utilized to study the changes of structures, as presented in Figure 2. We could see typical crystalline peaks of -chitin at 9.3 and 19.3 in both PaC and SC. The two peaks became broader and weaker in PaCS and SCS, because the harsh conditions of deacetylation broke the structures of chitin. This result was supported by the values of CrI, which dropped significantly from chitin to chitosan (p < 0.05), as shown in Table 1. XRD was utilized to study the changes of structures, as presented in Figure could see typical crystalline peaks of -chitin at 9.3° and 19.3° in both PaC and S The two peaks became broader and weaker in PaCS and SCS, because the harsh con of deacetylation broke the structures of chitin. This result was supported by the va CrI, which dropped significantly from chitin to chitosan (p < 0.05), as shown in Tab PaCSF and SCSF presented much broader and weaker peaks at 21°, which w cribed to the amorphous structure. This phenomenon indicated the destruction crystalline structure of the chitosan because of the structure reformation during fi mation. One small peak at 28° could also be observed in SCSF, which was absent in P This peak could be attributed to the remaining minerals, because SC was is from shrimp shell that contained a lot of minerals (like CaCO3). Surface Morphology The photographs of the surface morphology of chitin, chitosan, and chitosan are exhibited in Figure 3. The surface of PaC was smooth with pores and fibrous ve it; while that of SC was rough. Different species and the isolation methods would c ute to various surface morphology of chitin. PaCS and SCS both had wrinkles o surfaces, which might result from the same harsh conditions of deacetylation. We see lots of similar ridge-like grains on the surfaces of PaCSF and SCSF. Since the ch films had been kept in a desiccator after being dried, the lack of water might result i grains. PaCSF and SCSF presented much broader and weaker peaks at 21, which were ascribed to the amorphous structure. This phenomenon indicated the destruction of the crystalline structure of the chitosan because of the structure reformation during film formation. One small peak at 28 could also be observed in SCSF, which was absent in PaCSF. This peak could be attributed to the remaining minerals, because SC was isolated from shrimp shell that contained a lot of minerals (like CaCO 3 ). Surface Morphology The photographs of the surface morphology of chitin, chitosan, and chitosan films are exhibited in Figure 3. The surface of PaC was smooth with pores and fibrous veins on it; while that of SC was rough. Different species and the isolation methods would contribute to various surface morphology of chitin. PaCS and SCS both had wrinkles on their surfaces, which might result from the same harsh conditions of deacetylation. We could see lots of similar ridge-like grains on the surfaces of PaCSF and SCSF. Since the chitosan films had been kept in a desiccator after being dried, the lack of water might result in these grains. The results of FTIR, XRD, and SEM showed that chitin, chitosan, and chitosan films from P. americana were similar to their counterparts derived from shrimp. However, the Mv and the DDA of PaCS were different from those of SCS, which might influence the performances relating to food packaging of the chitosan films. Film Thickness and Optical Performance The film thickness is presented in Table 2. PaCSF was significantly thicker than SCSF (p < 0.05). The Mv of PaCS was much lower than that of SCS (p < 0.05), as shown in Table 1, meaning shorter polysaccharide chains. The shorter the chains were, the more hydrogen bond sites hiding deeply inside would be exposed, which would then be bound to water molecules. Therefore, during film formation, more water molecules were attracted to PaCS, resulting in the film swelling. Similar result could be observed in Table 2, which showed that water content of PaCSF was significantly higher than that of SCSF (p < 0.05). Since the films had lost a lot of water molecules in the desiccator, the initial water content that PaCSF surpassed SCSF would be more considerable. Optical performance was important for films applied in food packaging, especially the ability of UV light resistance. The appearances and the light transmittance of the chitosan films and CW are presented in Figure 4. At the same wavelength, light transmittance of PaCSF was significantly lower than those of SCSF and CW (p < 0.05), proving better light resistance and lower transparency of PaCSF. Concerning UV light resistance, both chitosan films showed excellent resistance against UVC light (200 to 300 nm), and PaCSF was significantly better (p < 0.05). A lot of pigments deposited in the cuticle of P. americana, some of which combined with chitin and survived in PaCSF. Therefore, PaCSF was yellower than SCSF, as shown in Figure 4. These pigments might have absorbed most The results of FTIR, XRD, and SEM showed that chitin, chitosan, and chitosan films from P. americana were similar to their counterparts derived from shrimp. However, the Mv and the DDA of PaCS were different from those of SCS, which might influence the performances relating to food packaging of the chitosan films. Film Thickness and Optical Performance The film thickness is presented in Table 2. PaCSF was significantly thicker than SCSF (p < 0.05). The Mv of PaCS was much lower than that of SCS (p < 0.05), as shown in Table 1, meaning shorter polysaccharide chains. The shorter the chains were, the more hydrogen bond sites hiding deeply inside would be exposed, which would then be bound to water molecules. Therefore, during film formation, more water molecules were attracted to PaCS, resulting in the film swelling. Similar result could be observed in Table 2, which showed that water content of PaCSF was significantly higher than that of SCSF (p < 0.05). Since the films had lost a lot of water molecules in the desiccator, the initial water content that PaCSF surpassed SCSF would be more considerable. Optical performance was important for films applied in food packaging, especially the ability of UV light resistance. The appearances and the light transmittance of the chitosan films and CW are presented in Figure 4. At the same wavelength, light transmittance of PaCSF was significantly lower than those of SCSF and CW (p < 0.05), proving better light resistance and lower transparency of PaCSF. Concerning UV light resistance, both chitosan films showed excellent resistance against UVC light (200 to 300 nm), and PaCSF was significantly better (p < 0.05). A lot of pigments deposited in the cuticle of P. americana, some of which combined with chitin and survived in PaCSF. Therefore, PaCSF was yellower than SCSF, as shown in Figure 4. These pigments might have absorbed most of the UV light that tried to pass through. Although PaCSF was thicker, its opacity (Table 2) was significantly higher than that of SCSF (p < 0.05), proving better ability of light resistance. Insects 2021, 12, x FOR PEER REVIEW of the UV light that tried to pass through. Although PaCSF was thicker, its opaci 2) was significantly higher than that of SCSF (p < 0.05), proving better ability of sistance. WVP As long as the film was intended to be applied in food packaging, its wa ability must be assessed. The WVP of the two chitosan films and CW are exh Figure 5. The WVP of the chitosan films were high at the beginning and then d especially in PaCSF case. Since many water molecules had escaped from the chito after drying and storage, a lot of water-binding sites in chitosan films were free water molecules again. As a result, water molecules outside were absorbed by the films, instead of the calcium chloride anhydrous sealed in the tube. Therefore, th in the first several days were not exactly the WVP of the chitosan films. WVP As long as the film was intended to be applied in food packaging, its water-proof ability must be assessed. The WVP of the two chitosan films and CW are exhibited in Figure 5. The WVP of the chitosan films were high at the beginning and then dropped, especially in PaCSF case. Since many water molecules had escaped from the chitosan films after drying and storage, a lot of water-binding sites in chitosan films were free to accept water molecules again. As a result, water molecules outside were absorbed by the chitosan films, instead of the calcium chloride anhydrous sealed in the tube. Therefore, the values in the first several days were not exactly the WVP of the chitosan films. After 6 days, the WVP of PaCSF and SCSF were (64.85 ± 4.82) 10 −11 gm −1 s −1 Pa −1 and (59.81 ± 2.07) 10 −11 gm −1 s −1 Pa −1, respectively. The WVP of PaCSF was higher than that of SCSF (p < 0.05), implying relatively weaker water-proof ability of PaCSF. As described in Section 3.2.1, lower Mv of PaCS would result in stronger water-binding ability. Therefore, water molecules were more easily to pass through PaCSF. In previous report, the WVP of the chitosan film was (2.88 ± 0.06) 10 −11 gm −1 s −1 Pa −1, which was significantly lower than those of PaCSF and SCSF (p < 0.05). However, in that paper, the molecular weight of the chitosan was 800 kDa, which was much higher than the Mv of PaCS and SCS. Therefore, higher Mv may contribute to better water-proof ability. The WVP of CW was (0.14 ± 0.005) 10 −11 gm −1 s −1 Pa −1, far lower than those of the chitosan films (p < 0.05). This result proved that the obtained chitosan films-especially PaCSF-were not good enough in water resistance. Antioxidant Activity DPPH radical scavenging activity was applied to assess the antioxidant activity of the chitosan films and CW. As shown in Figure 6A, DPPH radical scavenging activity of the chitosan films increased linearly during 1-8 h (r 2 = 0.99, not presented in the figure). At the same time point after 1 h, the antioxidant activity of PaCSF was significantly higher than that of PaCSF (p < 0.05). With time passing, the gap between the antioxidant activity of the two chitosan films enlarged. According to Zhang et al., the amino groups of chitosan could form stable macromolecule radicals, contributing to the antioxidant activity of chitosan film. The DDA of PaCS was higher than that of SCS (Table 1), which meant more amino groups in PaCS and higher antioxidant activity. Additionally, in the authors' opinion, the lower Mv of PaCS also contributed to its higher antioxidant activity. As described in Section 3.2.1, lower Mv of PaCS implied that more amino groups hiding inside the chitosan chains could be exposed to DPPH, which made DPPH radical scavenging easier. DPPH radical scavenging activity of CW was only 2.09 ± 0.53% after 8 h, while that of PaCSF was 72.46 ± 0.16%, indicating significantly better antioxidant activity of PaCSF (p < 0.05). After 6 days, the WVP of PaCSF and SCSF were (64.85 ± 4.82) 10 −11 gm −1 s −1 Pa −1 and (59.81 ± 2.07) 10 −11 gm −1 s −1 Pa −1, respectively. The WVP of PaCSF was higher than that of SCSF (p < 0.05), implying relatively weaker water-proof ability of PaCSF. As described in Section 3.2.1, lower Mv of PaCS would result in stronger water-binding ability. Therefore, water molecules were more easily to pass through PaCSF. In previous report, the WVP of the chitosan film was (2.88 ± 0.06) 10 −11 gm −1 s −1 Pa −1, which was significantly lower than those of PaCSF and SCSF (p < 0.05). However, in that paper, the molecular weight of the chitosan was 800 kDa, which was much higher than the Mv of PaCS and SCS. Therefore, higher Mv may contribute to better water-proof ability. The WVP of CW was (0.14 ± 0.005) 10 −11 gm −1 s −1 Pa −1, far lower than those of the chitosan films (p < 0.05). This result proved that the obtained chitosan films-especially PaCSF-were not good enough in water resistance. Antioxidant Activity DPPH radical scavenging activity was applied to assess the antioxidant activity of the chitosan films and CW. As shown in Figure 6A, DPPH radical scavenging activity of the chitosan films increased linearly during 1-8 h (r 2 = 0.99, not presented in the figure). At the same time point after 1 h, the antioxidant activity of PaCSF was significantly higher than that of PaCSF (p < 0.05). With time passing, the gap between the antioxidant activity of the two chitosan films enlarged. According to Zhang et al., the amino groups of chitosan could form stable macromolecule radicals, contributing to the antioxidant activity of chitosan film. The DDA of PaCS was higher than that of SCS (Table 1), which meant more amino groups in PaCS and higher antioxidant activity. Additionally, in the authors' opinion, the lower Mv of PaCS also contributed to its higher antioxidant activity. As described in Section 3.2.1, lower Mv of PaCS implied that more amino groups hiding inside the chitosan chains could be exposed to DPPH, which made DPPH radical scavenging easier. DPPH radical scavenging activity of CW was only 2.09 ± 0.53% after 8 h, while that of PaCSF was 72.46 ± 0.16%, indicating significantly better antioxidant activity of PaCSF (p < 0.05). Insects 2021, 12, x FOR PEER REVIEW 11 of 14 The color changes of DPPH solution treated with different samples are exhibited in Figure 6B, which gave a visual appreciation of the antioxidant activity of the chitosan films. The colors of Blank and CW did not change after 8 h, while those of PaCSF and SCSF bleached out obviously with time passing. Antibacterial Activity Serratia marcescens and Escherichia coli are common foodborne pathogenic bacteria. They were applied to examine the antibacterial activity of the chitosan films. The results are shown in Figure 7. In the case of S. marcescens, the inhibition zones of PaCSF, SCSF, Blank, and gentamicin were 8.99 ± 0.54, 8.01 ± 0.33, 7.28 ± 0.38, and 26.66 ± 1.42 mm, respectively. The inhibition zone of PaCSF was significantly bigger than those of SCSF and Blank (p < 0.05). Similarly, in the case of E. coli, the inhibition zone of PaCSF (9.29 ± 0.82 mm) was also significantly bigger (p < 0.05) than those of SCSF (8.22 ± 0.71 mm) and Blank (7.24 ± 0.37 mm). These results indicated that PaCSF possessed better antibacterial activity against S. marcescens and E. coli than SCSF did. The color changes of DPPH solution treated with different samples are exhibited in Figure 6B, which gave a visual appreciation of the antioxidant activity of the chitosan films. The colors of Blank and CW did not change after 8 h, while those of PaCSF and SCSF bleached out obviously with time passing. Antibacterial Activity Serratia marcescens and Escherichia coli are common foodborne pathogenic bacteria. They were applied to examine the antibacterial activity of the chitosan films. The results are shown in Figure 7. In the case of S. marcescens, the inhibition zones of PaCSF, SCSF, Blank, and gentamicin were 8.99 ± 0.54, 8.01 ± 0.33, 7.28 ± 0.38, and 26.66 ± 1.42 mm, respectively. The inhibition zone of PaCSF was significantly bigger than those of SCSF and Blank (p < 0.05). Similarly, in the case of E. coli, the inhibition zone of PaCSF (9.29 ± 0.82 mm) was also significantly bigger (p < 0.05) than those of SCSF (8.22 ± 0.71 mm) and Blank (7.24 ± 0.37 mm). These results indicated that PaCSF possessed better antibacterial activity against S. marcescens and E. coli than SCSF did. The antibacterial activity of chitosan derived from its positive charge of protonated amino groups, which would react with the negative charge on the surface of the cells of bacteria, leading to the death of the cells. In addition, as described in Section 3.2.3, the lower the Mv was, the more amino groups would be exposed. Therefore, higher DDA and lower Mv of PaCS (Table 1) enabled its better antibacterial activity against S. marcescens and E. coli than SCSF did. Conclusions Periplaneta americana chitosan film (PaCSF) was produced and characterized. As the results of FTIR, XRD, and SEM showed, PaCSF was similar to shrimp chitosan film (SCSF). However, their performances relating to food packaging were different. PaCSF was thicker because it contained more water. PaCSF could resist UV light more effectively than SCSF did. DPPH radical scavenging assay showed that the antioxidant activity of PaCSF was better than that of SCSF. Antibacterial activity assay exhibited that PaCSF resisted the growth of S. marcescens and E. coli more effectively than SCSF did. These results implied that P. americana was capable of producing chitosan that might be utilized as a raw material for food packaging film without other active additives. Funding: This study was supported by the National Natural Science Foundation of China (Nos. of 31830084, 31970440, and 31672336), and also supported by the construction funds for the "Double First-Class" initiative for Nankai University (Nos. 96172158, 96173250 and 91822294). Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article. Conflicts of Interest: The authors declare no conflicts of interest. The antibacterial activity of chitosan derived from its positive charge of protonated amino groups, which would react with the negative charge on the surface of the cells of bacteria, leading to the death of the cells. In addition, as described in Section 3.2.3, the lower the Mv was, the more amino groups would be exposed. Therefore, higher DDA and lower Mv of PaCS (Table 1) enabled its better antibacterial activity against S. marcescens and E. coli than SCSF did. Conclusions Periplaneta americana chitosan film (PaCSF) was produced and characterized. As the results of FTIR, XRD, and SEM showed, PaCSF was similar to shrimp chitosan film (SCSF). However, their performances relating to food packaging were different. PaCSF was thicker because it contained more water. PaCSF could resist UV light more effectively than SCSF did. DPPH radical scavenging assay showed that the antioxidant activity of PaCSF was better than that of SCSF. Antibacterial activity assay exhibited that PaCSF resisted the growth of S. marcescens and E. coli more effectively than SCSF did. These results implied that P. americana was capable of producing chitosan that might be utilized as a raw material for food packaging film without other active additives. Funding: This study was supported by the National Natural Science Foundation of China (Nos. of 31830084, 31970440, and 31672336), and also supported by the construction funds for the "Double First-Class" initiative for Nankai University (Nos. 96172158, 96173250 and 91822294). Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: No new data were created or analyzed in this study. Data sharing is not applicable to this article.
/* Creates new connection if handle is empty. * or continues to create new request and handles status code. */ esp_err_t http_playback_stream_create_or_renew_session(http_playback_stream_t *hstream) { int ret = 0; if (!hstream->handle) { if (http_connect_async_and_set_keep_alive(hstream) != ESP_OK) { return ESP_FAIL; } } do { http_request_delete(hstream->handle); if (http_connection_new_needed(hstream->handle, hstream->cfg.url)) { http_connection_delete(hstream->handle); hstream->handle = NULL; if (http_connect_async_and_set_keep_alive(hstream) != ESP_OK) { return ESP_FAIL; } } if(http_request_new(hstream->handle, ESP_HTTP_GET, hstream->cfg.url) < 0) { http_connection_delete(hstream->handle); hstream->handle = NULL; return ESP_FAIL; } if ((http_request_send(hstream->handle, NULL, 0) < 0) || (http_header_fetch(hstream->handle) < 0)) { http_request_delete(hstream->handle); http_connection_delete(hstream->handle); hstream->handle = NULL; return ESP_FAIL; } int status_code = http_response_get_code(hstream->handle); if (status_code == 301 || status_code == 302 || status_code == 303 || status_code == 305 || status_code == 307 || status_code == 308) { free(hstream->cfg.url); hstream->cfg.url = esp_audio_mem_strdup(http_response_get_redirect_location(hstream->handle)); ESP_LOGI(TAG, "Received status code: %d. Redirecting to: %s", status_code, hstream->cfg.url); continue; } else if (status_code != 200 && status_code != 206) { ESP_LOGE(TAG, "Expected 200/206 status code, got %d instead", status_code); http_request_delete(hstream->handle); http_connection_delete(hstream->handle); hstream->handle = NULL; return ESP_FAIL; } return ESP_OK; } while (1); }
Can Analytics as a Service Save the Online Discussion Culture? - The Case of Comment Moderation in the Media Industry In recent years, online public discussions face a proliferation of racist, politically, and religiously motivated hate comments, threats, and insults. With the failure of purely manual moderation, platform operators started searching for semi-automated or even completely automated approaches for comment moderation. One promising option to (semi-) automate the moderation process is the application of Natural Language Processing and Machine Learning (ML) techniques. In this paper we describe the challenges, that currently prevent the application of these techniques and therefore the development of (semi-) and automated solutions. As most of the challenges (e.g., curation of big datasets) require huge financial investments, only big players, such as Google or Facebook, will be able to invest in them. Many of the smaller and medium-sized internet companies will fall behind. To allow this bulk of (media) companies to stay competitive, we design a novel Analytics as a Service (AaaS) offering that will also allow small and medium sized enterprises to profit from ML decision support. We then use the identified challenges to evaluate the conceptual design of the business model and highlight areas of future research to enable the instantiation of the AaaS platform.
<reponame>hniedner/structured_eligibility import logging from urllib.parse import urljoin import requests log = logging.getLogger(__name__) # NCI Clinical Trials API Base URL base_url = 'https://clinicaltrialsapi.cancer.gov/v1/' # retrieve a clinical trial by NCT ID def get_trial_by_nct_id(nct_id): req_url = urljoin(urljoin(base_url, 'clinical-trial/'), nct_id) log.warning('GET requesting: {}'.format(req_url)) trial_retval = None try: resp = requests.get(req_url) log.info('Status Code: {}'.format(resp.status_code)) if resp.status_code != 200: # This means something went wrong. log.warning(' Get trial for NCT {} returned: {}'.format(nct_id, resp.status_code)) else: trial_retval = resp.json() return trial_retval except requests.exceptions.RequestException as e: log.error("error ", e) # list of clinical trials based on search criteria # review list of options at the online API documentation # Bad hack to retrieve all records since API only returns # 50 records at the time def find_all_trials(search_params): return find_trials(search_params, 0, 0, True) def find_trials(search_params, start, length, fetch_all=False): search_params["from"] = start if start else 0 search_params["size"] = _calculate_fetch_size(length, fetch_all) # shaping the dictionary to suit jquery datatables result = { "recordsTotal": -1, "data": [] } while start < result['recordsTotal'] or result['recordsTotal'] < 0: start = _fetch_results(start, search_params, result) if fetch_all is False: # no aggregation needed/wanted break # sanitize search_params search_params.pop('from', None) search_params.pop('size', None) search_params["returned"] = result['recordsTotal'] return result def _calculate_fetch_size(length, fetch_all): return 50 if fetch_all or length > 50 else length def _fetch_results(start, search_params, result): search_params['from'] = start draw = _call_api(search_params, 'clinical-trials?') if draw: result['data'].extend(draw['trials']) result['recordsTotal'] = draw['total'] start += 50 # max number of retrieved record supported else: result['recordsTotal'] = 0 return start # return the total number of trials found matching # the submitted search paramters def get_nr_of_trials(search_params): result = _call_api(search_params) return result['total'] # default columns/fields to be displayed for the search results cols = [ "nci_id", "nct_id", "phase.phase", "start_date", "current_trial_status", "official_title" ] # add the returned field to search_params def add_included_fields(search_params, fields=cols): retval = search_params if search_params else {} retval['include'] = fields return retval # returns terms values def search_terms(query, size=20): search_params = dict() search_params['term'] = query search_params['size'] = size return _call_api(search_params, 'terms?') # call clinical trials API and retrieves results and total number of results def _call_api(search_params, url_ext='clinical-trials?'): req_url = urljoin(base_url, url_ext) log.debug('POST requesting: {}'.format(req_url)) trials_retval = None try: log.debug('retrieving: ' + req_url) resp = requests.post(req_url, json=search_params, timeout=3) # wait 3s for response log.info('Status Code: {}'.format(resp.status_code)) if resp.status_code != 200: # This means something went wrong. log.warning(' Search for trials returned: {} \n {}'.format(resp.status_code, search_params)) else: trials_retval = resp.json() return trials_retval except requests.exceptions.RequestException as e: log.error("error ", e)
import java.net.InetAddress; import java.rmi.Naming; import java.rmi.RemoteException; import java.rmi.registry.LocateRegistry; import java.rmi.registry.Registry; import java.rmi.server.UnicastRemoteObject; import java.util.ArrayList; import java.util.List; import java.util.Random; public class ServerImplementation extends UnicastRemoteObject implements Server, Runnable { private List<Listener> listeners = new ArrayList<>(); private volatile double val; protected ServerImplementation() throws RemoteException { val = 88.00; } @Override public void run() { Random lRandom = new Random(); for (; ; ) { int duration = lRandom.nextInt() % 10000 + 2000; if (duration < 0) { duration = duration * -1; } try { Thread.sleep(duration); } catch (InterruptedException aInE) { System.out.println(aInE.getMessage()); } //Take a number to see if up or down int num = lRandom.nextInt(); if (num < 0) { val -= 0.5; } else { val += 0.5; } notifyValueListeners(val); } } private void notifyValueListeners(double aInTemp) { for (Listener lListener : listeners) { try { lListener.valueChanged(aInTemp); } catch (RemoteException aInE) { listeners.remove(lListener); } } } @Override public void addValueListener(Listener Listener) throws RemoteException { listeners.add(Listener); } @Override public void removeValueListener(Listener Listener) throws RemoteException { listeners.remove(Listener); } @Override public Double getValue() throws RemoteException { return val; } public static void main(String[] args) { try { ServerImplementation lServer = new ServerImplementation(); Registry reg = LocateRegistry.createRegistry(52369); String url = "rmi://" + InetAddress.getLocalHost().getHostAddress() + ":52369/Hello"; Naming.rebind(url, lServer); Thread lThread = new Thread(lServer); lThread.start(); } catch (Exception aInE) { System.out.println("Remote error- " + aInE); } } }
Absorption and elimination of polychlorinated biphenyls (PCB) in goldfish. Abstract: The absorption, accumulation and elimination of PCB (Clophen A50) in goldfish was studied. To ensure well-defined and reproducible PCB concentrations in the water phase (0.01, 0.05, 0.10 and 0.50 p.p.m.) the experiments were made in aluminium foil containers. A rapid uptake and accumulation was observed but only slight changes in the relative composition of the absorbed PCB's were found. In the elimination experiment it was found that the content of PCB in the fish was halved during the first three weeks of the experimental period but that the half-life for PCB rose during the experiment.
Endovascular Management of the Failure of Maturation of Native Arterio- Venous Fistula due to Outflow Stenosis for Hemodialysis Background: Arteriovenous fistula (AVF) is a significant procedure for patient in need of hemodialysis. Failure of maturation due to stenosis is a challenge that needs further intervention. Endovascular treatment allows salvaging these fistulae. Aim of the work: To identify the anatomical causes of maturation failure and to assess immediate and long-term clinical effects of PTA of non-mature native (AVF) caused by outflow stenosis using currently available endovascular techniques. Material and Methods: This study was performed on forty patients complaining of stenosis of primary AVF. The mean age is 60.5. Patients were followed-up every two weeks for the first 2 months, then every month for 6 months post-intervention clinically and radiologically. Collected data includes patient's demographics, cause of renal failure, characters of primary AVF, and variables of endovascular intervention, primary patency, and recurrence of stenosis. Results: AVF type was either brachiocephalic (57.5%), brachiobasilic (32.5%) or radiocephalic (10.0%). Fistulography revealed peripheral venous stenosis in 18 patients (45.0%), central venous stenosis in 14 patients (35.0%), and juxta-anastomotic stenosis in 8 patients (20%). Our technical success was achieved in 87.5% of cases; the patency rate was 91.0% in a month, 86.0% in 3 months, and 80.0% in 6 months. Complications were reported in 10 cases. The recurrence was reported in 7 patients (17.5% of cases). Conclusions: Endovascular salvage of failing A-V fistulas with PTA and Stenting is safe and effective. It is associated with high success rates, low complication rates, and rendering the immediate reuse of the failing shunt. INTRODUCTION Chronic end-stage renal disease (ESRD) patients need replacement renal therapy. Native arteriovenous fistula (AVF) is considered as the primary and best vascular access method for renal hemodialysis. 1 In comparison with synthetic grafts and central vein catheters, the native AVF is associated with a low rate of complications, had a low revision rate, costs 2, and low mortality rate. 3 On the other side, AVF had the disadvantage of being associated with a relatively high rate of failure of maturation and early thrombosis. The main causes of AVF maturation failure are arterial or venous problems and the presence of accessory vein. AVF failure of maturation could be early or late; early failure applies to fistula that is never used for dialysis or fails within 3 months of its first use. 4 Late failure refers to failure after 3 months of successful use. 5 The reported rate is extending between 24 and 60% of failure to mature in studies from American and European hemodialysis patient, respectively. Thus, native arterio-venous fistulae (AVF) failure of maturation is a challenging matter in the establishment of functioning hemodialysis vascular access. Current recommendations are monitoring newly created fistula closely to discover maturation; and if happened, early intervention is recommended. However, there was no consensus on the ideal intervention to enhance AVF. 10 The aim of the work was to identify the anatomical causes of maturation failure and to assess immediate and long-term clinical effects of PTA of non-mature Patients: A total of 40 patients with chronic end-stage renal disease, who had dysfunction (stenosis) of primary native AVF were involved in the present research. The mean age is 60.5. 25 males and 15 females are included. The study was conducted during the period from November 2017 to November 2019. Patients were followed up every two weeks for the first 2 months clinically and radiologically, then follow-up was initiated at intervals of 3 months through telephone contact with either the patient or the hemodialysis center for 6 months post-intervention according to follow up protocol adopted by the vascular surgery department for such patient and the last case was concluded in our study in April 2019 as a period of our follow up was 6 months. Patients enrolled in this study were selected according to the presence of one or more of the inclusion criteria. Inclusion criteria: Patient with immature autogenous arteriovenous fistula in the upper arm or forearm which never used or fails during the first 3 months of the use had clinical and radiographic signs of outflow stenosis (peripheral and central venous stenosis ) such as weak thrill, low rates of flow, post AV access hypertension and arm edema. Exclusion criteria: includes patient with thrombosed arterio-venous fistula with no thrill palpable by physical examination and ultrasound, evidence of arteriovenous fistula -related infection, patient with a history of an extreme allergic reaction to intravenous radiographic contrast substances, patient who unable perform the treatment, non-correctable cause of immaturation as (Heart Failure), pseudo-aneurysm and steel syndrome. Methods: The study protocol was accepted by the local research and ethics committee of Al-Azhar faculty of Medicine (Cairo). All patients signed an informed consent after full explanation of the study protocol. Their data privacy and withdrawal right were ascertained. Collected data includes patient's demographics (age, gender), causes of renal failure, characters of primary AVF, and variables of endovascular intervention (e.g., clinical success and complications), primary patency, and recurrence of stenosis. Patients were examined by Duplex Ultrasound as it was considered abnormal in cases of greater than 50 percent stenosis of the feeding artery or outflow vein or in cases of decreased flow rate (less than500mL/minute) before fistulography for diagnosis of AVF stenosis. Fistulography was carried out through brachial artery puncture with a 21G needle and injection of 10 mL of radio-contrast substance under local anesthesia. Images were recorded for feeding artery, arteriovenous anastomosis, a juxta-anastomotic segment of the efferent, and draining veins up to the central veins. The stenosis was assessed by comparison between the stenotic and adjacent normal segments of the veins together, with the application of balloon angioplasty for the stenotic segments with a diameter of <50 percent of the normal segment. Balloon angioplasty was done using an endo-venous procedure (Antegrade and Retrograde manner). Access was done through the outflow vein with 5F vascular sheath insertion. Heparin was injected by a dose of 2500 IU (and an additional dose of 1250 IU was injected every hour, if needed, with a maximum dose of 5000 IU). The determination of the balloon size was done according to the measured diameter of the reference vessel. A standard balloon (Boston Scientific Inc., 300 Boston Scientific Way Marlborough, Massachusetts, USA) with a diameter of 1 mm larger than the normal size of the venous segment (4-8mm) was used. The insufflation of the balloon was sustained for 2 min, and the technique was repeated if needed. Stenting was done in two cases, to overcome the recoil of the stenotic lesion(case of central venous stenosis) and to control venous rupture, this was done by passing the stent over the wire till the stenotic lesion becomes in the middle of the stent which is then inflated and deployed carefully in order not to lose its place. If stenosis became < 30% after balloon angioplasty, the technical success of the procedure would be documented. Manual compression was used to achieve hemostasis after the removal of the sheath. Clinical success was recognized as adequate dialysis after the procedure. Regular outpatients follow up visits were arranged for each patient every two weeks for the first 2 months, then every month for 6 months. This follow up was done clinically and radiologically (using venous mapping and \ or angiography if restenosis that was suspected based on clinical examination or dialysis parameters) to ensure the patency of the vascular access and the probability of restenosis. Primary patency was defined as the time interval between the balloon angioplasty and the subsequent thrombosis or repeated intervention, as defined by Gray et al. 11 Statistical analysis: The collected data were organized, coded, and analyzed by statistical package for social science for windows, Version 20.0 (IBM Corp., Armonk, NY, USA). For categorical variables, Fisher's exact test, Pearson Chi-square tests, independent samples (t), and Mann-Whitney U test was used for numerical data. Data were presented as mean ± standard deviation (SD), minimum-maximum values, number (n) and percentage (%) according to the type of data. A value of p < 0.05 was considered statistically significant. Regarding endovascular intervention were done through a transvenous retrograde approach in 23 cases (57.5%) and trans-venous Antegrade approach in 17 cases (42.5%), the percent of stenosis varies from mild stenosis to total occlusion. Consequently, multiple interventional procedures were done. 38 cases needed angioplasty (95% of cases), and 2 cases needed stent placement (5% of cases). Regarding the outcome of endovascular intervention, after the interventional procedures were done, estimation of the outcome of the procedure is done via visual estimation of the residual stenosis; in 4 cases (10%) there was no residual stenosis, in 7 cases (17.5%) there was <10% residual stenosis, in 24 cases (60.0 %) there was < 30% residual stenosis and in 5 cases (12.5 %) there was >30% residual stenosis. Finally, we report that the technical success (no residual stenosis or < 30 percent), and early clinical success was achieved in (87.5%) of cases; the patency rate was 91.0% in a month, 86.0% in 3 months and 80.0% in 6 months. The procedure complications were vascular spasm in 4 patients (10.0%), puncture site hematoma in 3 patients (7.5%), extravasation in 2 patients (5.0%) that were treated conservatively, and rupture of the vessel wall in 1 patient that need stenting. The recurrence (restenosis) during follow up period was reported after one month in 7.5% of cases (3 patients), after 3 months in12.5% of cases (5 patients) however after 6 months in 17.5% of cases (7 patient). The time to recurrence ranged from 105 to 210 days with a mean duration of 167.14±34.13 days (Table 1-10). In the present work, recurrence was significantly associated with older age (as patients with recurrence were significantly older than those without recurrence (62.44±1.87 vs 54.37±7.13 years respectively)) and the increased coronary artery disease (CAD was reported in 55.6% of patient with recurrence compared to 18.8% of patients without recurrence). Otherwise, no significant association was found between recurrence and patient gender, other risk factors, AVF type, or fistula segment. Examples of studied cases were presented in (Figures 1-3). DISCUSSION The creation of patent arteriovenous fistula considered as the cornerstone for the starting of hemodialysis which is the mainstay in the treatment of chronic (ESRD) (waiting or unfit for renal transplant). The prevalence of end-stage renal disease increases with an increased life expectancy of patient with ESRD. Thus, maintaining patency of AVF is crucial for those patients. 12 AVF maturation includes remodeling of the vessel wall, feeding artery enlargement, and arterialization of the vein due to higher blood flow and blood pressure. 13 Failure to mature the fistula may be occurred and recognized by inadequate AVF flow to sustain hemodialysis after 6 weeks of maturation, with an incidence rate of up to 60 %. 7 The kidney disease outcomes quality initiative (KDOQI) guidelines recommend an arteriovenous fistula (AVF) as the guide standard for primary vascular access due to increased life expectancy and a reduced rate of infection compared to an arteriovenous graft (AVG). However, several studies showed that surgically created AVFs have high rates of early failure, such patient frequently need surgical or endovascular treatment. 14 Here, we presented our clinical experience with the treatment of stenosed, non-mature native AVF with the endovascular intervention (balloon angioplasty and stenting). Results of the present work showed that endovascular intervention is effective (technical success was 87.5% with a patency rate of 91.0% in a month, 86.0% in 3 months and 80.0% in 6 months after the procedure, and safe (complication rate was 15.0%) which were vascular spasm in 10.0% of cases (4 patient), puncture site hematoma in 7.5% of cases (3 patient), extravasation in 5.0% of cases (2 patient) that were treated conservatively and rupture of the vessel wall in 7.5% of cases (1 patient) that needed stenting. The associated factors with recurrence were the patient's age and coronary artery disease. Ascher et al. 15, Gallagher et al. 16, Derderian et al. 17, and Rizvi et al. 18 reported that balloon angioplasty to assist maturation is usually used for treat stenotic non-matured AVF under angiography or ultrasound guidance. They reported a success rate ranged between 55% to 89%.Derderian et al. 19 reported that the most common complications were hematoma (40%), extravasation (9%), the formation of puncture site hematoma (4%), and thrombosis (2%). In AlGaby et al. 20 research concerning the results of our procedure, it was discussed as an immediate technical success during the intervention and clinical success after PTA with follow-up of each patient for one year as technical success was 80% (n=16) and clinical success was 60% (n=14), as regards the procedural complications, the results showed that complications during PTA occurred in 20% of 20 patient (n=4) who had minor venous perforation with extravasation of contrast, which was self-limited with no need for intervention. However, this technical success was close to the results of Heye et al. 21 (84.4%). In contrast, Aktas et al. 22 had a technical success of 96.3% of overall stenosis (without occlusion) and a first-year patency rate of 84.7%. Aborahma A. 23 conducted study on 37 patient, achieved the overall technical success in 86.4% of cases and early clinical success was complete in all these cases except in one case with non-mature fistula as after successful dilatation of radial artery the fistula didn't mature and the access was withdrawn and another access was established. Primary patency in 1 month, 3 month and 6 months were 93.8% (30/32), 71.8% (23/32), and 62.5% (20/32) respectively, the secondary patency in 1 month, 3 months and 6 months were 93.8 % (30/32), 78.1% (25/32) and 68.8% (22/32) respectively. As regards the procedural complications he reported vessel wall rupture in patient, which was easily managed by sustained low pressure inflation of the balloon.There was no hematoma on the entry site and no stent migration was observed. In an observational prospective trial, Beathard et al.4 included one hundred patients with early non-mature AVF were included with stenosis in 78 %, with 48% of these lesions reported to be near to the anastomosis (Juxta-anastomotic). Percutaneous balloon dilatation was conducted with a 98.0% success rate. Upon follow up, 84% of the AVF was functioning in 3 months, 72 % in 6 months, and 68 % in 12 months. The complications rate was 4%. Only one patient (1%) had a vein rupture (major complication) with an increasing hematoma and subsequent loss of the access. The other complications were low-grade hematomas that did not require any special intervention. Shah and Agarwal 24 advocated the assessment of recently developed AVF in 4-6 weeks after creation to discover individuals with early AVF nonmaturation (failure). Clinical evaluation is an easy but effective technique to discover such patient with AVF failure and should be confirmed by duplex ultrasound. Once discovered, these patients should undergo appropriate intervention use of percutaneous endovascular procedures such as balloon angioplasty and vein obliteration. We added that much of the non-maturation of early fistula can be salvaged. CONCLUSION Endovascular salvage of failing A-V fistulas with PTA is both effective and relatively safe. It is associated with high success rates, low complication rates, decreasing the need for hospitalization, rendering the immediate reuse of the failing fistula with good results, and maintained long-term patency. Endovascular techniques have tended to supplant traditional surgery at many centers. Percutaneous therapies including angioplasty and the use of stents have made access repair easier, more successful, less invasive, and readily available on an outpatient basis.
Reducing the prior identification uncertainty of the bearing of active interference sources Problem statement. In measuring the spatial coordinates of sources of active interference, one of the main tasks is to identify their bearings. This problem belongs to the class of multi-alternative problems of statistical choice of hypotheses, the solution of which becomes much more complicated with an increase in the number of sources of active interference.Objective. Reduce the prior uncertainty in identifying bearings of active interference sources due to the use of differences in their energy characteristics at the stage of primary processing of interference signals, recalculated to the points of intersection of bearings.Results. The article discusses the processing features of bearing information in a two-position radar system. It is shown that in these systems, due to the absence of redundant information, the identification of bearings is a multi-alternative problem of statistical choice of hypotheses. The analysis of the matrix of coordinates of intersections of azimuthal bearings is carried out, a rule for identifying possible hypotheses of identification is formulated. It is proposed to use the energy differences of interference signals to reduce the prior uncertainty in identifying bearings. It is shown that a measure of this difference can be the value of the correlation integral, calculated at the stage of primary processing of interference signals.Practical implications. The principle of bearing identification considered in the article can be used to implement the identification of bearings from sources of active interference and other various radio emission objects, including space ones, when upgrading the mathematical and software systems for information processing.
<gh_stars>0 # Generated by Django 2.1 on 2018-10-01 09:17 from django.db import migrations, models class Migration(migrations.Migration): dependencies = [ ('transactions', '0007_auto_20171015_0312'), ] operations = [ migrations.RemoveField( model_name='paidby', name='attendee', ), migrations.RemoveField( model_name='paidby', name='transaction', ), migrations.RemoveField( model_name='abstracttransaction', name='date', ), migrations.RemoveField( model_name='abstracttransaction', name='local_amount', ), migrations.RemoveField( model_name='abstracttransaction', name='local_currency', ), migrations.RemoveField( model_name='abstracttransaction', name='name', ), migrations.RemoveField( model_name='change', name='new_amount', ), migrations.RemoveField( model_name='change', name='new_currency', ), migrations.RemoveField( model_name='debitscredits', name='event', ), migrations.RemoveField( model_name='debitscredits', name='used_by', ), migrations.AddField( model_name='abstracttransaction', name='blob', field=models.TextField(blank=True, verbose_name='blob'), ), migrations.AddField( model_name='abstracttransaction', name='deleted', field=models.BooleanField(default=False, help_text='If true, this entry has been deleted and we keep this is as deleted as a tombstone.', verbose_name='Deleted'), ), migrations.DeleteModel( name='PaidBy', ), ]
Evaluation of the health impact of an urban regeneration policy: Neighbourhood Renewal in Northern Ireland Background Neighbourhood Renewal (NR) was launched in Northern Ireland (NI) in 2003 to revive the social, economic and physical fabric of 36 deprived communities, characterised by a legacy of sectarian conflict. This study evaluates the impact of the policy on health over a decade. Methods A merged panel of secondary data from the British Household Panel Survey (20012008) and Understanding Society (20092012) yields longitudinal information on respondents for 12 years. We conducted a controlled before and after investigation for NR intervention areas (NRAs) and three control groupstwo groups of comparably deprived areas that did not receive assistance and the rest of NI. Linear difference-in-difference regression was used to identify the impact of NR on mental health, self-rated health, life satisfaction, smoking and exercise. Subgroup analysis was conducted for males and females, higher and lower educated, retired, unemployed and home owner groups. Results NR did not have a discernible impact on mental distress. A small, non-significant trend towards a reduction in the gap of good self-rated health and life satisfaction between NRAs and controls was observed. A 10% increase in probability of rating life as satisfying was uncovered for retirees in NRAs compared with the rest of NI. Smoking in NRAs declined on par with people from control areas, so a NR influence was not obvious. A steady rise in undertaking weekly exercise in NRAs compared with controls was not statistically significant. Conclusions Area-based initiatives may not achieve health gains beyond mainstream service provision, though they may safeguard against widening of health disparities.
The adverse male to female sex ratio is a major cause for concern, President Ram Nath Kovind said on Monday, and sought support from medical officers to the government’s ‘Beti Bachao, Beti Padhao’ initiative. Advertising He also asked the medical officers to remain sensitive to the poor and the needy. “Our country is making rapid economic progress. Health and socio-economic indicators must gallop along with it,” Kovind said. He said the disease burden in the country is undergoing change. “We have to tackle communicable diseases such as TB, malaria and dengue, and at the same time deal with the rising incidence of non-communicable diseases,” the president said, addressing General Duty Medical Officers (GDMOS) of the second foundation course conducted by the National Institute of Health and Family Welfare. These GDMOS called on Kovind at the Rashtrapati Bhavan here. Kovind said that to address these shifting health priorities, the government has after more than a decade come up with a revised national health policy. “The adverse male to female sex ratio is a major cause for concern. Undernutrition and malnutrition remains an area where we have a lot more to do,” he said. Kovind said while health may be a core concern, they have an equally important role to play in the socio-economic progress of the country. “Several key government initiatives such as ‘Beti Bachao, Beti Padhao’ and ‘Swachh Bharat’ need your support and service,” he said. The president suggested the medical officers to take a preventive approach to health rather than solely a curative one. “In this context, integrating our traditional systems of medicine — AYUSH — into our healthcare system must be a priority,” he said. Kovind said digital technology combined with Aadhar and mobile telephony can work wonders for health care. “Our e-aushadhi programme is on course. Tele-medicine is another effective technology intervention which we must put to greater use,” he said. Kovind said the society places high faith in doctors and their noble profession. “I am sure you will reciprocate their faith with committed service, always being compassionate and sensitive to the poor and the needy,” the president said. He said the country’s disease burden remains high. “Coupled with it we have issues of delivery, access to services and affordability. But with dedication, drive and determination, we can achieve our goals,” Kovind said. Advertising The president said that the goal of universal health coverage is a priority for the government. “The implementation of the national health mission critically depends on your commitment. This needs effective governance at the community, village and district levels,” he said, addressing the medical officers.
Stop-action cardiac computed tomography. Computed tomographic (CT) cardiac imaging in vivo has been hampered by motion of the heart during its cardiac cycle. A technique of post data-acquisition correlation of the angular projection data using the electrocardiogram as a reference signal is described. This method produced seven "stop action" images of the heart and resulted in delineating morphological detail not recognizable on the conventional CT scan.
package it.at7.gemini.dsl.entities; import java.io.File; import java.io.FileWriter; import java.io.IOException; import java.util.Collections; import java.util.HashSet; import java.util.Map; import java.util.Set; import java.util.concurrent.locks.ReadWriteLock; import java.util.concurrent.locks.ReentrantReadWriteLock; import java.util.stream.Collectors; import static java.util.Collections.EMPTY_SET; public class RawSchema { private final Set<RawEntity> rawEntities; private final ReadWriteLock schemaLock; private final Set<RawEntity> rawEntityInterfaces; public RawSchema(Set<RawEntity> rawEntities, Set<RawEntity> rawInterfaces) { this.rawEntities = new HashSet<>(rawEntities); this.rawEntityInterfaces = rawInterfaces != null ? new HashSet<>(rawInterfaces) : EMPTY_SET; schemaLock = new ReentrantReadWriteLock(); } public RawSchema(Set<RawEntity> rawEntities) { this(rawEntities, null); } public Set<RawEntity> getRawEntities() { try { schemaLock.readLock().lock(); return rawEntities; } finally { schemaLock.readLock().unlock(); } } public Set<RawEntity> getRawEntityInterfaces() { return rawEntityInterfaces; } public Map<String, RawEntity> getRawEntitiesByName() { return getRawEntities().stream().collect(Collectors.toMap(RawEntity::getName, e -> e)); } public void addOrUpdateRawEntity(RawEntity rawEntity) { assert rawEntity != null; try { schemaLock.writeLock().lock(); String name = rawEntity.getName().toUpperCase(); rawEntities.removeIf(e -> e.getName().equals(name)); rawEntities.add(rawEntity); } finally { schemaLock.writeLock().unlock(); } } public void persist(String location) throws IOException { StringBuilder stB = new StringBuilder(); getRawEntities().forEach(e -> { stB.append(e.toString()); stB.append("\n\n"); }); File file = new File(location); file.delete(); file.getParentFile().mkdirs(); try (FileWriter fileWriter = new FileWriter(file)) { fileWriter.write(stB.toString()); fileWriter.flush(); } } }
<reponame>bitcrystal/edk /*++ Copyright (c) 2004 - 2007, Intel Corporation All rights reserved. This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. Module Name: BBSsupport.h Abstract: declares interface functions Revision History --*/ #ifndef _EFI_BDS_BBS_SUPPORT_H #define _EFI_BDS_BBS_SUPPORT_H #include "Tiano.h" #include "EfiDriverLib.h" #include "EfiPrintLib.h" #include "BdsLib.h" #include "BootMaint.h" VOID BdsBuildLegacyDevNameString ( IN BBS_TABLE *CurBBSEntry, IN UINTN Index, IN UINTN BufSize, OUT CHAR16 *BootString ); EFI_STATUS BdsDeleteAllInvalidLegacyBootOptions ( VOID ); EFI_STATUS BdsAddNonExistingLegacyBootOptions ( VOID ) /*++ Routine Description: Add the legacy boot options from BBS table if they do not exist. Arguments: None. Returns: EFI_SUCCESS - The boot options are added successfully or they are already in boot options. others - An error occurred when creating legacy boot options. --*/ ; EFI_STATUS BdsUpdateLegacyDevOrder ( VOID ); EFI_STATUS BdsRefreshBbsTableForBoot ( IN BDS_COMMON_OPTION *Entry ); #endif
def irc_NICK(self, prefix, params): old_nick = prefix.split('!')[0] new_nick = params[0] for channelUserData in self.users.itervalues(): channelUserData.renameUser(old_nick, new_nick) msg = "%s%s is now known as %s" % (COLOUR_YELLOW, old_nick, new_nick) self.factory.queue.put((self, TASK_IRCMESSAGE, (127, COLOUR_PURPLE, "IRC", msg)))
Drug Cost Containment In the absence of a well implemented Drug Policy, paucities in access, affordability, efficiency, quality and effectiveness of health services and limited resources continue to handicap the functioning of the health system. Higher accessibility and quality is taken to be synonymous with higher costs. The main objective of the study was to study the impact of a drug policy on availability of essential drugs and cost containment in a tertiary care hospital from 1996 through 2007. The interventions consisted of selection of list of essential drugs and procurement through centralized pooled system in 19961997, followed by setting up of Drugs & Therapeutic Committee. Average drug expenditure increased slightly from 3.63 per cent to 5.16 per cent while there was 6-fold rise in hospital patient attendance. Drug expenditure reduced by 47 per cent, without any compromise on key drug availability which increased to 94.6 per cent. Despite high expenditure on key drugs (75.89 per cent) mean availability was 67.48 per cent but after intervention with the same expenditure (77.68 per cent) it increased to 95.28 per cent. Number of drugs out-of-stock decreased from 27.57 per cent to 19.57 per cent of minor duration only and no stock out of vital drugs. ABC analysis revealed 3.33 drugs only in category A consuming 74 per cent budget which increased markedly to 9.63 drugs consuming 79.53 per cent budget after intervention along with reversal of previous trend of non-essential among top 10 drugs where only vital drugs represented top 10 drugs. The present study showed cost-containment accompanied by increased availability of essential drugs is possible and optimizes the value of limited government funds and thereby empower and support government in making basic medicines available to all. Managerial interventions such as limited list of essential drugs, efficient procurement, through Drugs and Therapeutic Committee (DTCs) have a vital role in improving day-to-day care of patients and can serve as an effective strategy in curtailing inappropriate drug use, reducing drug expenditures and serve to increased availability and accessibility to essential medicines thus optimizing the value of limited government funds.
Antibacterial Effects of Oxide Compound: The Case Study of Agricultural Waste Material The aim of this work investigated the antibacterial properties of oxide compound from agricultural waste material. The oxide compounds were prepared by annealed the agricultural waste material upon consequence of temperature. After that, the crystalline structure, morphology, chemical composition and estimation of oxide compound were conducted by X-Ray Diffraction (XRD), Energy Dispersive X-Ray Fluorescence (EDXRF) and Fourier Transform Infrared Spectroscopy (FTIR). It was observed that the XRD patterns demonstrated the lime phase and cristobalite phase after heat treatment. Another that, the result from EDXRF and FTIR was in good agreement with the result of XRD. For anti-bacterial efficacy were utilized the lime phase and cristobalite phase for testing antibacterial activities which the agar diffusion technique. It was found that the inhibition zones were clearly visible for both agents, found to exhibit antibacterial action against Escherichia coli.
<reponame>Alexey-N-Chernyshov/cpp-libp2p<filename>include/libp2p/peer/peer_id.hpp /** * Copyright Soramitsu Co., Ltd. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0 */ #ifndef LIBP2P_PEER_ID_HPP #define LIBP2P_PEER_ID_HPP #include <libp2p/crypto/key.hpp> #include <libp2p/crypto/protobuf/protobuf_key.hpp> #include <libp2p/multi/multihash.hpp> #include <libp2p/outcome/outcome.hpp> namespace libp2p::peer { /** * Unique identifier of the peer - SHA256 Multihash, in most cases, of its * public key */ class PeerId { using FactoryResult = outcome::result<PeerId>; public: PeerId(const PeerId &other) = default; PeerId &operator=(const PeerId &other) = default; PeerId(PeerId &&other) noexcept = default; PeerId &operator=(PeerId &&other) noexcept = default; ~PeerId() = default; enum class FactoryError { SUCCESS = 0, SHA256_EXPECTED = 1 }; /** * Create a PeerId from the public key * @param key, from which PeerId is to be created * @return instance of PeerId */ static FactoryResult fromPublicKey(const crypto::ProtobufKey &key); /** * Create a PeerId from the byte array (serialized multihash). * @param v buffer * @return instance of PeerId */ static FactoryResult fromBytes(gsl::span<const uint8_t> v); /** * Create a PeerId from base58-encoded string (not Multibase58!) with its * SHA256-hashed ID * @param id, with which PeerId is to be created * @return instance of PeerId in case of success, error otherwise */ static FactoryResult fromBase58(std::string_view id); /** * Create a PeerId from SHA256 hash of its ID * @param hash, with which PeerId is to be created; MUST be SHA256 * @return instance of PeerId in case of success, error otherwise */ static FactoryResult fromHash(const multi::Multihash &hash); /** * Get a base58 (not Multibase58!) representation of this PeerId * @return base58-encoded SHA256 multihash of the peer's ID */ std::string toBase58() const; /** * @brief Get a hex representation of this PeerId. */ std::string toHex() const; /** * Creates a vector representation of PeerId. */ const std::vector<uint8_t>& toVector() const; /** * Get a SHA256 multihash of the peer's ID * @return multihash */ const multi::Multihash &toMultihash() const; bool operator==(const PeerId &other) const; bool operator!=(const PeerId &other) const; private: /// if key, from which a PeerId is created, does not exceed this size, it's /// put as a PeerId as-is, without SHA-256 hashing static constexpr size_t kMaxInlineKeyLength = 42; /** * Create an instance of PeerId * @param hash, with which PeerId is to be created */ explicit PeerId(multi::Multihash hash); multi::Multihash hash_; }; } // namespace libp2p::peer namespace std { template <> struct hash<libp2p::peer::PeerId> { size_t operator()(const libp2p::peer::PeerId &peer_id) const; }; } // namespace std OUTCOME_HPP_DECLARE_ERROR(libp2p::peer, PeerId::FactoryError) #endif // LIBP2P_PEER_ID_HPP
//get a archive.Writer by name func NewWriter(name string, w io.Writer) (Writer, error) { ext := strings.ToLower(filepath.Ext(name)) fn, ok := writerMap[ext] if !ok { return nil, errors.New("unknown archive writer name: " + name) } return fn(w) }
def fetch_status_codes(self) -> Responses: for url in self.urls: status = requests.get(url).status_code time.sleep(1) self.responses.update({url: status}) return self.responses
<filename>server/src/database/RegistryEntity.ts import {BaseEntity, Entity, PrimaryGeneratedColumn, Column, ManyToMany, ManyToOne} from "typeorm"; import {Student, Teacher} from "."; @Entity() export class Registry extends BaseEntity { @PrimaryGeneratedColumn() public id: number; @ManyToOne(type => Student, student => student.id) public student: Student; @ManyToOne(type => Teacher, teacher => teacher.id) public teacher: Teacher; @Column() public comment: string; @Column() public homework: string; }
<filename>student/views.py from django.shortcuts import render # Create your views here. def studentlist(request): return render(request, 'studentlist.html')
// yunbao.c 雲豹 #include <ansi.h>; inherit NPC; void create() { set_name("雲豹", ({ "yun bao", "bao" }) ); set("race", "走獸"); set("gender", "雌性"); set("age", 5); set("long", @LONG 這是一隻艾葉花皮的雲豹,它的毛皮極為雄美、厚實。 LONG); set("attitude", "aggressive"); set("shen_type", -1); set("combat_exp", 30000); set("neili",800); set("jiali",100); set("max_neili",800); set("jingli",500); set("max_jingli",500); set_temp("apply/attack", 20000); set_temp("apply/defense", 30000); set_temp("apply/armor", 1000); setup(); } void die() { object ob, corpse; message_vision("$N發出震天動地的一聲大吼,轟地倒在地上,死了!\n", this_object()); if( objectp(corpse = CHAR_D->make_corpse(this_object())) ) ob = new("/clone/medicine/vegetable/baotai"); ob->move(corpse); corpse->move(environment(this_object())); destruct(this_object()); }
<filename>d/wuguan/obj/saozhou.c #include <ansi.h> #include <weapon.h> inherit HAMMER; void create() { set_name(HIY "扫帚" NOR, ({ "sao zhou", "sao", "zhou" })); set_weight(500); if (clonep()) set_default_object(__FILE__); else { set("unit", "把"); set("long", HIY "这是一把扫帚,普通百姓的日常用品。\n" NOR); set("value", 10); set("material", "steel"); set("wield_msg", HIY "$N" HIY "拿出一把扫帚握在手中。\n" NOR); set("unwield_msg", HIY "$N" HIY "将手中的扫帚抗在肩上。\n" NOR); } init_hammer(4); setup(); }
Electric properties of AgPbAsSe3 at pressures up to 45 GPa The article is devoted to the investigation of electric properties of ferroelectric-semiconducting AgPbAsSe3 at pressures up to 45 GPa and the existence of phase transitions in this compound. Our data show that there are two phase transitions at 1.52 and 3132 GPa. This paper was presented at the XLVIth European High Pressure Research Group (EHPRG 46) Meeting, Valencia (Spain), 712 September, 2008.
Precision Timing of the ATLAS Level-1 Calorimeter Trigger: From Beam Splashes to High Luminosity ProtonProton Collisions The ATLAS Level-1 Calorimeter Trigger uses trigger tower signals from the ATLAS calorimeter as input. In real-time, it identifes high-pT objects, determines total and missing transverse energy sums and assigns bunch-crossing identification. Reliable operation requires collision signals to be synchronised at the nanosecond level. This timing was first established through the analysis of beam splash events and subsequently refined with data from LHC protonproton collisions. In this contribution, details of the timing synchronization method as well as selected results from the timing adjustments are presented. Introduction The Large Hadron Collider (LHC) at CERN is designed to collide protons at a centre-of-mass energy of 14 TeV with an instantaneous luminosity of 10 34 cm −2 s −1. The ATLAS detector measures particles which are created in those collisions and looks for new physics both within and beyond the Standard Model. Online selection of the relevant collision events is performed by a 3-stage trigger system. The hardware-based Level-1 Trigger (L1) operates at 40 MHz, synchronous with the LHC bunch crossings. Within a fixed latency of 2.5 s, a decision based on fast processing of data with coarsened detector granularity is provided, so that the event is either rejected completely or transferred to the following trigger levels. The decision is generated by the Central Trigger Processor (CTP) which receives information mainly from the Level-1 Calorimeter Trigger (L1Calo) and the Level-1 Muon Trigger (L1Muon). Altogether, the input rate of 40 MHz is reduced to 75 kHz. The L1Calo system processes 7168 analogue signals from the Liquid Argon (LAr) and Tile Calorimeters of the ATLAS detector. These signals are created by summing up to 60 calorimeter cells into Trigger Towers (TT) most of which are of size 0.1 0.1 in ∆ ∆ 1. The L1Calo receivers apply a gain, independently adjustable for each TT, to the analogue signals. In the end, each TT is finally calibrated to transverse energy (E T ). The signals are then conditioned and digitized in the PreProcessor Module (PPM) with a digitization step of 25 ns. In addition, their bunch-crossing is identified (BCID) and the E T is determined. This information is then processed in parallel by the Cluster Processor (CP) and the Jet/Energy-Processor (JEP) which search for and identify high-p T electrons/photons, taus/hadrons and jets. The JEP also provides a total and missing E T measurement. The object multiplicities per threshold are then transmitted to the CTP. In L1Calo, the timing of the input signal digitization directly affects the identification of the correct bunch-crossing and measured energy. For a stable operation of BCID for nonsaturated signals, a sampling of analogue pulses with a precision of ±10 ns is required. Even higher precision is required for an accurate E T measurement (2%), namely ±5 ns. Within the PPM, the signal digitization can be adjusted for every TT independently with respect to the LHC clock. A TT-specific and individually-adjustable delay register (FIFO) is used for a coarse timing adjustment in steps of 25 ns. The so-called PHOS4 chip allows a finer adjustment in 25 steps of 1 ns. Together, both procedures allow to set the sampling of the analogue TT signal directly to the maximum of the analogue signal peak for the central digitized time-slice. In 2009, LHC splash events were used to cross-check and re-calibrate the initial timing of the L1Calo system. Since the start of proton-proton collision data taking at 7 TeV in 2010, timing calibration has been done with those data. Fit method for L1Calo timing synchronization Since the analogue pulse shape of the signals is not available in recorded data, a fit of the digitized pulse shape is needed to extract the timing shift. For the fit method, TTs with similar pulse shape features are grouped together according to their calorimeter division. One of such divisions is, for example, the so-called electromagnetic barrel calorimeter (EMB), which is the central part of the electromagnetic calorimeter layer. All divisions and their respective location are listed in Table 1. Depending on the calorimeter division, TT signals, sampled every 25 ns, are fitted with a combination of a Gaussian and a Landau function (GLu) or of two Landau functions (LLu). Due to the asymmetry of the pulses, combined functions which are joined at the maximum (such as GLu and LLu) have been found to describe the pulses best. The mathematical expression for the GLu fit function is given in equation : Here, x max denotes the maximum position of the signal in units of time and A is the amplitude of the signal fit in the hardware units of digitization, i.e. in ADC counts. Gauss ( Landau ) denotes the fit width, in ns, for the rising (trailing) edge of the pulse. C stands for a constant offset or pedestal of the pulse (usually 32 ADC counts), and D allows the fit to fall below its pedestal value. In the LAr calorimeter, the electronic shaping generates a long negative signal part, the so-called undershoot, which reaches, for example in the EMB, a depth of approximately 20% of the positive signal height. For such pulses, the parameter D becomes relevant. The LLu function is obtained from by replacing the Gaussian by another Landau function like the one for the trailing edge, but with parameter D = 0. Table 1 summarizes the fit procedures used for different calorimeter divisions. The choice between GLu and LLu functions is based on their performance and stability. An example of how the fit method works is given in Figure 1. Here is shown a calibration pulse which was sampled with two different digitization settings in the L1Calo PPr system. In Figure 1(a), the pulse is well-timed. Its maximum is unambigiously identifiable and it lies in the central time-slice of the digitized pulse. The pulse in Figure 1(b) is obviously mistimed, because it shows no clear maximum but rather two values of approximately the same height. This leads to ambiguity in BCID and an E T mismeasurement. Here, the timing was shifted by 12 ns. To both pulses in Figure 1, a GLu fit has been applied. The fit reconstructs the shape and, especially, the maximum position and the amplitude of the original analogue pulse. The challenge of the fit method is to obtain the same pulse shape independent of current digitization settings. In particular, in Figure 1, the signal peak position and the amplitude of both pulses are expected to be identical, apart from a 12 ns shift. Indeed, within small uncertainties, this is the case. Thus, in the timing synchronization procedure, no correction would be required for a pulse like the one in Figure 1(a) and a correction of 12 ns would be needed for a pulse like the one in Figure 1(b). While for calibration pulses 15 time-slices of a TT pulse are read out from the L1Calo trigger system as displayed in Figure 1, during normal data-taking only 5 time-slices can be handled by the Data Acquisition System (DAQ). Thus, the fit range for GLu and LLu functions is restricted significantly. This is the reason why only 4 or 3 (in FCal) time-slices around the signal peak are used by the fit method (see Table 1). With 6 free parameters, the GLu and LLu are underconstrained, so to reduce the number of degrees of freedom the values of Gauss, Landau and the undershoot-to-amplitude ratio (D/A) are fixed to predefined values derived from calibration data. In addition, the pedestal parameter (C) is fixed at the TT signal baseline as set in the L1Calo hardware before digitization. Thus, only the maximum position x max and the amplitude A are allowed to vary freely within certain constraints. The main source of systematic uncertainty of the method comes from the shape differences between the calibration and real physics pulses. They are estimated to be of the order of magnitude of 5-15% in the EMEC and in FCal they even reach to some 20-30%. In the application of the fit method to collision data, these shape differences have been corrected for. Overall, however, the timing synchronization determined by the fit method has a ±1 ns systematic uncertainty and a ±2 ns statistical uncertainty. With respect to the precision of 1 ns in the digitization point setting in the L1Calo hardware, the method's accuracy lies well within the targeted precision of 5 ns. Timing calibration with 2009 LHC beam splashes During autumn 2009, the LHC provided splash events during commissioning, prior to physics (collision) operation. A splash event is produced by beam packets interacting with the collimators located in the beam pipes at ±145 m from the interaction point at the centre of the ATLAS detector. The timing of such events does not correspond to that of beam collision timing. However, given the distances from collimator to each particular TT, and from that TT to the nominal interaction point, a correction for time-of-flight can be performed to estimate the collision timing. Initially, this has been done with data from Run 140370 (20th November 2009) where 55 of the splash events provided by the LHC were used. Timing calibration with proton-proton collision data At the beginning of 2010, the LHC started delivering collision data with a proton-proton centreof-mass energy of √ s = 7 TeV. This allowed the possibility of a timing update derived from actual physics data. Event and pulse selection The precise event and pulse selection requirements have evolved, largely to adapt to LHC increases in luminosity. In all cases, events are required to pass certain basic data quality criteria. They have to be taken during stable beam conditions when the detector, especially the calorimetry, is fully operational. A good primary vertex within a maximum displacement along the beam axis, as well as a minimum number of tracks from the vertex are required. These requirements enhance the probability that the signals originate from head-on proton-proton collisions. The pulse selection criteria are mainly there to reduce the number of noise pulses contaminating the analyzed sample. For calorimeter divisions which are especially susceptible to calorimeter noise, e.g. the HEC, a special noise suppression is applied. Also, a minimum transverse energy of approximately 7 GeV in a given TT as measured by L1Calo is required. For details on event and pulse selection, see. First timing calibration with collision data The first timing calibration with collision data was done with data from 4-5 July 2010, corresponding to an integrated luminosity of ≈ 30 nb −1. Following the described pulse selection, in each TT, the pulses were fitted with a GLu/LLu function. The differences between the fitted maximum positions and the central time-slice are expected to be gauss-distributed around the best timing correction. Figure 3 shows such a distribution for one of TTs in the EMB and a corresponding gaussian fit. However, the mean value of the distribution itself and not the gaussian fit mean is used as the timing correction, because this has been found to be a more stable procedure. was checked nine times using the same method, resulting in six timing adjustments from protonproton collision data. For a full list of updates, see. The magnitudes of the corrections were usually less than 2 ns.. Timing corrections in ns for the electromagnetic calorimeter layer (a) and the hadronic calorimeter layer (a). The timing corrections per TT were derived from protonproton collision data of July 2010. Conclusion Synchronizing the trigger tower (TT) signals of the Level-1 Calorimeter Trigger (L1Calo) with respect to the LHC clock and with respect to each other, as well as maintaining and refining the timing synchronization, are important to ensure a stable and reliable operation of the ATLAS trigger system. Bunch-crossing identification of signals (BCID) and energy measurement in L1Calo necessitate an accuracy of ±5 ns in the timing synchronization. To accomplish the goal, a special fit method has been developed. It has been applied to beam splash data and to collision data. Over the course of 2010 and 2011, it has been applied nine times to collision data with mean timing corrections of ±1.5 ns. The method has demonstrated the stability of the L1Calo timing synchronization to within ±1 ns systematic uncertainty and a ±2 ns statistical uncertainty, as required for reliable trigger operation.
The Galaxy S10 5G and launch of Verizon's 5G data network are the first drops in a 5G flood. Can you tell a budget phone took these photos? Verizon is hungry to win you over to its 5G model, whatever it takes. Samsung, LG, Motorola and more are all developing 5G phones. So when can we get our hands on them? It was a lesson in what not to do. Motorola’s Moto Z3 is reliable, but has little to do while waiting for 2019’s Verizon 5G networks to light up. Previously a Pixel exclusive, the Call Screen feature is rolling out to more Android phones. Amazon, Google, AI and us: Are we too close for comfort? Beyond facial recognition, we're giving smart devices and platforms our intimate biometric details. A $300 phone that looks like a premium phone. In the past four decades, the world has gone from monster handsets to pocket-sized portable computers. But you can still get Apple's Wi-Fi-only refurb for $589. Plus: A big Motorola Moto phone sale.
#include "telnetpp/subnegotiation.hpp" #include <boost/io/ios_state.hpp> #include <iomanip> #include <iostream> #include <utility> namespace telnetpp { // ========================================================================== // OPERATOR<< // ========================================================================== std::ostream &operator<<(std::ostream& out, const subnegotiation& sub) { boost::io::ios_all_saver ias(out); out << "subnegotiation[0x" << std::hex << std::setw(2) << std::setfill('0') << std::uppercase << int(sub.option()) << ", ["; bool first = true; for (auto &&by : sub.content()) { if (!std::exchange(first, false)) { out << ", "; } out << "0x" << std::setw(2) << int(by); } return out << "]]"; } }
A New Species of Myrmecina (Hymenoptera: Formicidae) from Southeastern North America Abstract A new species of ant, Myrmecina cooperi sp. nov. (Hymenoptera: Formicidae: Myrmecinae) is described and illustrated from specimens collected in Florida and Alabama, USA. This species is characterized by its small size (under 2 mm length), shagreened gastral tergites, and a strong ventral protrusion on the underside of the postpetiole. It is presently known from a small area in the Florida Panhandle and adjacent Alabama. Habitus illustrations and an identification key are provided for the 3 eastern species of Myrmecina.
// Parse the interface{} that populates Audience - we get string from some certs, and an array of strings (which parses as an array of interfaces) from others. func (t *jwtAuth0Claims) CheckAudience(expected string) bool { if audienceString, ok := t.Audience.(string); ok { return audienceString == expected } if audienceStringArray, ok := t.Audience.([]string); ok { return utils.StringInSlice(expected, audienceStringArray) } if audienceIterfaceArray, ok := t.Audience.([]interface{}); ok { if audienceStringArray, ok := utils.InterfaceArrayToStringArray(audienceIterfaceArray); ok { return utils.StringInSlice(expected, audienceStringArray) } } log.Error("Unexpected type for Audience in JWT claims") return false }
As he does every day, Bryan Fischer began his radio program with a Bible reading and discussion, in this case, a passage from Psalm 135 which he cited not only as proof that God struck down the Native Americans so that the United States could be established by Christians, but also as proof that there is nothing that human beings can do to influence the climate. Verse 7 of the Psalm declares that “He makes clouds rise from the ends of the earth; he sends lightning with the rain and brings out the wind from his storehouses.” As such, Fischer said, “that’s why it is dumb, dumb, dumb; it is stupid, stupid, stupid; it is ignorant, ignorant, ignorant to think that there is anything that man can do to control the climate through human behavior.” “If you want to do something about the climate,” Fischer said, “you want to do something about the weather, there is only one thing that we can do to affect climate or affect weather and that is to pray to Yahweh”:
Ali F. Bilir Ali F. Bilir (born in 1945 in Gülnar, Mersin, Turkey) is a poet, author and critic, and an active member of Turkish Authors Association. He attended the School of Medicine for a year, but graduated from the Faculty of Pharmacy, University of Istanbul, in 1969. During his university years, he worked part-time at a tourist youth hostel in Istanbul as a reception clerk and later as a manager. In 1967, as an adventure, he toured Europe and North Africa, mainly on foot. For a while, he lived in Essex and London to improve his English language skills, doing various jobs. He participated in the student and youth movements of 1968. In 1970, he published the literary magazine called “North.” Between 1995 and 2005, he was the arts and culture reporter for the local newspapers, “Katılım” and “Yeni Gazete.” His poems, short stories and articles on various subjects have been published in local, regional, national, and international periodicals, magazines, and journals. His work has won many awards. Ali F. Bilir's last poetry book Migration Ballads is being granted by the Turkish government as one of the significant examples of Turkish written heritage. Migration Ballads is published by Plain View Press, U.S.A, in 2008, within the scope of TEDA project. Ali F. Bilir is also a member of Turkish Authors Association (Edebiyatçılar Derneği), Türkiye Yazarlar Sendikası, The European Writers’ Council (EWC), Language Association of Turkey (Dil Derneği), National Federation of State Poetry Societies, and Big Bend Poets chapter of the Florida State Poets Association.
/* ============================================================================== This file is part of the JUCE library. Copyright (c) 2015 - ROLI Ltd. Permission is granted to use this software under the terms of either: a) the GPL v2 (or any later version) b) the Affero GPL v3 Details of these licenses can be found at: www.gnu.org/licenses JUCE is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. ------------------------------------------------------------------------------ To release a closed-source product which uses JUCE, commercial licenses are available: visit www.juce.com for more information. ============================================================================== */ #ifndef JUCE_MOUNTEDVOLUMELISTCHANGEDETECTOR_H_INCLUDED #define JUCE_MOUNTEDVOLUMELISTCHANGEDETECTOR_H_INCLUDED #if JUCE_MAC || JUCE_WINDOWS || defined (DOXYGEN) //============================================================================== /** An instance of this class will provide callbacks when drives are mounted or unmounted on the system. Just inherit from this class and implement the pure virtual method to get the callbacks, there's no need to do anything else. @see File::findFileSystemRoots() */ class JUCE_API MountedVolumeListChangeDetector { public: MountedVolumeListChangeDetector(); virtual ~MountedVolumeListChangeDetector(); /** This method is called when a volume is mounted or unmounted. */ virtual void mountedVolumeListChanged() = 0; private: JUCE_PUBLIC_IN_DLL_BUILD (struct Pimpl) friend struct ContainerDeletePolicy<Pimpl>; ScopedPointer<Pimpl> pimpl; JUCE_DECLARE_NON_COPYABLE_WITH_LEAK_DETECTOR (MountedVolumeListChangeDetector) }; #endif #endif // JUCE_MOUNTEDVOLUMELISTCHANGEDETECTOR_H_INCLUDED
For the third day in a row, Ohio native Ray Sovik led the field of 81 golfers competing in the 21st annual Senior Porter Cup at Niagara Falls Country Club. For the second year in a row, Sovik left wearing the tournament crown. Sovik, 59, of Powell, Ohio, scored a 2-over-par 72 Friday and shot a 54-hole total of 209 during three rounds under a blanket of clouds in Lewiston. Northville, Mich., resident Gary Cloutier, 67, won the Super Senior division (65 years and older), after a 74 Friday gave him a three-round total of 215. After accepting his crystal championship trophy, Sovik explained that it's more than just love for the game of golf that draws him back to Niagara Falls Country Club. "It seems like a long time ago that I came here when I was a young college kid," said Sovik, a former Ohio State golfer who first played in the 1972 Porter Cup. "I remember it being really special. I remember the prestige and notoriety of the tournament." The tradition of the Porter Cup is what gives the Senior Porter Cup national popularity, said tournament director Fred Silver, who was the only local golfer to finish in the top 15, and who also participated in the 1972 tournament with Sovik. "The fact that it's 'The Porter Cup' gives us instant credibility," Silver said, referring to the annual tournament that takes place at Niagara Falls Country Club each July and attracts some of the nation's best collegiate and mid-amateur golfers. "We invite the top 50 seniors in the country who are nationally ranked. It's one of their favorite events to come to, or so they tell me." Out of the 81 golfers teeing off in this year's tournament, only nine live in Buffalo or the surrounding area while 72 hail from places outside of New York. Runner-up Rich Morrison, 56, made the trip from Marana, Ariz. to play in his first Senior Porter Cup. "Anybody that plays amateur golf knows the Porter Cup," he said. "It's got the tradition and the history. This time of year it's a great place to be." Sovik couldn't remember whether he finished fifth or sixth in his first Porter Cup tournament (tied for sixth), but as he stood out on the patio, with the Niagara Escarpment and a view of Toronto behind him, he said he never forgot the beauty of the course he first set eyes on in 1972. More than 30 years later, aside from a bunker or two, not much has changed, said Silver. "It's still the same course he remembers," he said.
BAYOU GEORGE � The Bay County Commission is taking small steps toward developing a secondary potable water source. At its Tuesday meeting, the commission amended the county�s comprehensive plan, removing language referencing the now-abandoned well field project in the Sand Hills area. Last year, a court ruling helped derail the project, sending the county back to the drawing board. Stymied, the county shifted its gaze to a plan that dates back to the 1960s � putting a pump station in Deer Point Lake just south of Econfina Creek. �This is not a new idea,� said Paul Lackemacher, county utility services director. The recently passed amendment, however, doesn�t specify a location for the new pump station,Lackemacher said. The amendment is written in broader terms, giving the county leeway, so even if the current plan falls through, all the county�s eggs won�t be in that basket. Lackemacher referred to the new project as �putting a straw� in the northern part of the lake. It would be on the lake�s edge. He said the plan is �viable,� but there�s a long way to go with design and permits. And it�s far from finalized. Lackemacher estimated the county could complete the project in the next five to six years, but said �the sooner, the better.� He said the Northwest Florida Water Management District, as well as other regulatory agencies, must sign off on the project. Lackemacher said the county hasn�t applied for any permits yet, and the project is in the review phase as the county explores the idea. He said the county will soon have some engineering work done to get more details on the project. Lackemacher said the county has been working �hand-in-hand� with the water management district, but right now, they�ve only had general discussions. Water management district spokeswoman Lauren Engel said because the district has not received any specifics from the county, she could not comment on the proposed plan. �We�re continuing to work with the county to explore the options. � (But) we�re definitely open to finding a good solution that works for the residents,� she said.
<gh_stars>0 /* * Copyright Platform Computing Inc., an IBM company, 1983-2010, 2012 * * $Revision$ * * Function: - MPI header file * * Notice: - IBM Platform MPI is based in parts on the contributions * of the following groups: * * - MPICH (Argonne National Laboratory, Mississippi State University) * versions 1.0.11, 1.0.12 * (c)Copyright 1993 University of Chicago * (c)Copyright 1993 Mississippi State University * * - LAM (Ohio Supercomputer Center) * versions 6.0, 6.1, 7.1.1 * (c)Copyright 1995-1996 The Ohio State University * * - Copyright (c) 2001-2003 The Trustees of Indiana University. * All rights reserved. * Copyright (c) 1998-2001 University of Notre Dame. * All rights reserved. * Copyright (c) 1994-1998 The Ohio State University. * * "@(#)IBM Platform MPI 09.01.04.03 [BASELINE_MPI_STREAM_REL_9.1.4.0_RTM_2015_06_15] [] [] [] [] [] [] (02/06/2018) Linux x86-64" */ // // Point-to-Point Communication // inline void _REAL_MPI_::Request::Wait(_REAL_MPI_::Status &status) { (void)MPI_Wait(&mpi_request, &status.mpi_status); } inline void _REAL_MPI_::Request::Wait() { (void)MPI_Wait(&mpi_request, MPI_STATUS_IGNORE); } inline void _REAL_MPI_::Request::Free() { (void)MPI_Request_free(&mpi_request); } inline bool _REAL_MPI_::Request::Test(_REAL_MPI_::Status &status) { int t; (void)MPI_Test(&mpi_request, &t, &status.mpi_status); return (bool) t; } inline bool _REAL_MPI_::Request::Test() { int t; (void)MPI_Test(&mpi_request, &t, MPI_STATUS_IGNORE); return (bool) t; } inline int _REAL_MPI_::Request::Waitany(int count, _REAL_MPI_::Request array[], _REAL_MPI_::Status& status) { int index, i; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = array[i]; (void)MPI_Waitany(count, array_of_requests, &index, &status.mpi_status); for (i=0; i < count; i++) array[i] = array_of_requests[i]; delete [] array_of_requests; return index; } inline int _REAL_MPI_::Request::Waitany(int count, _REAL_MPI_::Request array[]) { int index, i; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = array[i]; (void)MPI_Waitany(count, array_of_requests, &index, MPI_STATUS_IGNORE); for (i=0; i < count; i++) array[i] = array_of_requests[i]; delete [] array_of_requests; return index; } inline bool _REAL_MPI_::Request::Testany(int count, _REAL_MPI_::Request array[], int& index, _REAL_MPI_::Status& status) { int i, flag; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = array[i]; (void)MPI_Testany(count, array_of_requests, &index, &flag, &status.mpi_status); for (i=0; i < count; i++) array[i] = array_of_requests[i]; delete [] array_of_requests; return (bool)flag; } inline bool _REAL_MPI_::Request::Testany(int count, _REAL_MPI_::Request array[], int& index) { int i, flag; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = array[i]; (void)MPI_Testany(count, array_of_requests, &index, &flag, MPI_STATUS_IGNORE); for (i=0; i < count; i++) array[i] = array_of_requests[i]; delete [] array_of_requests; return (bool)flag; } inline void _REAL_MPI_::Request::Waitall(int count, _REAL_MPI_::Request req_array[], _REAL_MPI_::Status stat_array[]) { int i; MPI_Request* array_of_requests = new MPI_Request[count]; MPI_Status* array_of_statuses = new MPI_Status[count]; for (i=0; i < count; i++) array_of_requests[i] = req_array[i]; (void)MPI_Waitall(count, array_of_requests, array_of_statuses); for (i=0; i < count; i++) req_array[i] = array_of_requests[i]; for (i=0; i < count; i++) stat_array[i] = array_of_statuses[i]; delete [] array_of_requests; delete [] array_of_statuses; } inline void _REAL_MPI_::Request::Waitall(int count, _REAL_MPI_::Request req_array[]) { int i; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = req_array[i]; (void)MPI_Waitall(count, array_of_requests, MPI_STATUSES_IGNORE); for (i=0; i < count; i++) req_array[i] = array_of_requests[i]; delete [] array_of_requests; } inline bool _REAL_MPI_::Request::Testall(int count, _REAL_MPI_::Request req_array[], _REAL_MPI_::Status stat_array[]) { int i, flag; MPI_Request* array_of_requests = new MPI_Request[count]; MPI_Status* array_of_statuses = new MPI_Status[count]; for (i=0; i < count; i++) array_of_requests[i] = req_array[i]; (void)MPI_Testall(count, array_of_requests, &flag, array_of_statuses); for (i=0; i < count; i++) req_array[i] = array_of_requests[i]; for (i=0; i < count; i++) stat_array[i] = array_of_statuses[i]; delete [] array_of_requests; delete [] array_of_statuses; return (bool) flag; } inline bool _REAL_MPI_::Request::Testall(int count, _REAL_MPI_::Request req_array[]) { int i, flag; MPI_Request* array_of_requests = new MPI_Request[count]; for (i=0; i < count; i++) array_of_requests[i] = req_array[i]; (void)MPI_Testall(count, array_of_requests, &flag, MPI_STATUSES_IGNORE); for (i=0; i < count; i++) req_array[i] = array_of_requests[i]; delete [] array_of_requests; return (bool) flag; } inline int _REAL_MPI_::Request::Waitsome(int incount, _REAL_MPI_::Request req_array[], int array_of_indices[], _REAL_MPI_::Status stat_array[]) { int i, outcount; MPI_Request* array_of_requests = new MPI_Request[incount]; MPI_Status* array_of_statuses = new MPI_Status[incount]; for (i=0; i < incount; i++) array_of_requests[i] = req_array[i]; (void)MPI_Waitsome(incount, array_of_requests, &outcount, array_of_indices, array_of_statuses); for (i=0; i < incount; i++) req_array[i] = array_of_requests[i]; for (i=0; i < incount; i++) stat_array[i] = array_of_statuses[i]; delete [] array_of_requests; delete [] array_of_statuses; return outcount; } inline int _REAL_MPI_::Request::Waitsome(int incount, _REAL_MPI_::Request req_array[], int array_of_indices[]) { int i, outcount; MPI_Request* array_of_requests = new MPI_Request[incount]; for (i=0; i < incount; i++) array_of_requests[i] = req_array[i]; (void)MPI_Waitsome(incount, array_of_requests, &outcount, array_of_indices, MPI_STATUSES_IGNORE); for (i=0; i < incount; i++) req_array[i] = array_of_requests[i]; delete [] array_of_requests; return outcount; } inline int _REAL_MPI_::Request::Testsome(int incount, _REAL_MPI_::Request req_array[], int array_of_indices[], _REAL_MPI_::Status stat_array[]) { int i, outcount; MPI_Request* array_of_requests = new MPI_Request[incount]; MPI_Status* array_of_statuses = new MPI_Status[incount]; for (i=0; i < incount; i++) array_of_requests[i] = req_array[i]; (void)MPI_Testsome(incount, array_of_requests, &outcount, array_of_indices, array_of_statuses); for (i=0; i < incount; i++) req_array[i] = array_of_requests[i]; for (i=0; i < incount; i++) stat_array[i] = array_of_statuses[i]; delete [] array_of_requests; delete [] array_of_statuses; return outcount; } inline int _REAL_MPI_::Request::Testsome(int incount, _REAL_MPI_::Request req_array[], int array_of_indices[]) { int i, outcount; MPI_Request* array_of_requests = new MPI_Request[incount]; for (i=0; i < incount; i++) array_of_requests[i] = req_array[i]; (void)MPI_Testsome(incount, array_of_requests, &outcount, array_of_indices, MPI_STATUSES_IGNORE); for (i=0; i < incount; i++) req_array[i] = array_of_requests[i]; delete [] array_of_requests; return outcount; } inline void _REAL_MPI_::Request::Cancel(void) const { (void)MPI_Cancel((MPI_Request*)&mpi_request); } inline void _REAL_MPI_::Prequest::Start() { (void)MPI_Start(&mpi_request); } inline void _REAL_MPI_::Prequest::Startall(int count, _REAL_MPI_:: Prequest array_of_requests[]) { //convert the array of Prequests to an array of MPI_requests MPI_Request* mpi_requests = new MPI_Request[count]; int i; for (i=0; i < count; i++) { mpi_requests[i] = array_of_requests[i]; } (void)MPI_Startall(count, mpi_requests); for (i=0; i < count; i++) array_of_requests[i].mpi_request = mpi_requests[i] ; delete [] mpi_requests; } inline bool _REAL_MPI_::Request::Get_status(_REAL_MPI_::Status& status) const { int flag = 0; MPI_Status c_status; // Call the underlying MPI function rather than simply returning // status.mpi_status because we may have to invoke the generalized // request query function (void)MPI_Request_get_status(mpi_request, &flag, &c_status); if (flag) { status = c_status; } return (bool)(flag); } inline bool _REAL_MPI_::Request::Get_status() const { int flag; // Call the underlying MPI function rather than simply returning // status.mpi_status because we may have to invoke the generalized // request query function (void)MPI_Request_get_status(mpi_request, &flag, MPI_STATUS_IGNORE); return (bool)(flag); } inline _REAL_MPI_::Grequest _REAL_MPI_::Grequest::Start(Query_function *query_fn, Free_function *free_fn, Cancel_function *cancel_fn, void *extra) { MPI_Request grequest = 0; struct Grequest_intercept_t *new_extra = new MPI::Grequest_intercept_t; new_extra->git_extra = extra; new_extra->git_cxx_query_fn = query_fn; new_extra->git_cxx_free_fn = free_fn; new_extra->git_cxx_cancel_fn = cancel_fn; (void) MPI_Grequest_start(grequest_query_fn_intercept, grequest_free_fn_intercept, grequest_cancel_fn_intercept, new_extra, &grequest); return(grequest); } inline void _REAL_MPI_::Grequest::Complete() { (void) MPI_Grequest_complete(mpi_request); }
Family Courts Act, 1988 (No. 24 of 1988), 11 January 1989. This Belize Act establishes a system of family courts "to promote conciliation in, and secure speedy settlement of, disputes relating to certain family affairs." The Act imposes a duty on the courts "to assist and persuade" the parties in arriving at a settlement and requires all proceedings to be held in camera. It also provides that unnecessary formalities are to be avoided in proceedings. Further provisions of the Act relate to qualification of judges for the courts, staff, sittings, appeals, and regulations, among other things.
Fabrication of highly ordered TiO2 nanotube arrays using an organic electrolyte. Anodization of titanium in a fluorinated dimethyl sulfoxide (DMSO) and ethanol mixture electrolyte is investigated. The prepared anodic film has a highly ordered nanotube-array surface architecture. Using a 20 V anodization potential (vs Pt) nanotube arrays having an inner diameter of 60 nm and 40 nm wall thickness are formed. The overall length of the nanotube arrays is controlled by the duration of the anodization, with nanotubes appearing only after approximately 48 h; a 72 h anodization results in a nanotube array approximately 2.3 mum in length. The photoelectrochemical response of the nanotube-array photoelectrodes is studied using a 1 M KOH solution under both UV and visible (AM 1.5) illumination. Enhanced photocurrent density is observed for samples obtained in the organic electrolyte, with an UV photoconversion efficiency of 10.7%.
Atomization sources, such as flames, may be used for a variety of applications, such as welding, chemical analysis and the like. In some instances, flames used in chemical analyses are not hot enough to vaporize the entire liquid sample that is injected into the flame. In addition, introduction of a liquid sample may result in zonal temperatures that may provide mixed results. Another approach to atomization is to use a plasma source. Plasmas have been used in many technological areas including chemical analysis. Plasmas are electrically conducting gaseous mixtures containing large concentrations of cations and electrons. The temperature of a plasma may be as high as around 6,000-10,000 Kelvin, depending on the region of the plasma, whereas the temperature of a flame is often about 1400-1900 Kelvin, depending on the region of the flame. Due to the higher temperatures of the plasma, more rapid vaporization, atomization and/or ionization of chemical species may be achieved. Use of plasmas may have several drawbacks in certain applications. Viewing optical emissions from chemical species in the plasma may be hindered by a high background signal from the plasma. Also, in some circumstances, plasma generation may require high total flow rates of argon (e.g., about 11-17 L/min) to create the plasma, including a flow rate of about 5-15 L/min of argon to isolate the plasma thermally. In addition, injection of aqueous samples into a plasma may result in a decrease in plasma temperature due to evaporation of solvent, i.e., a decrease in temperature due to desolvation. This temperature reduction may reduce the efficiency of atomization and ionization of chemical species in some contexts. Higher powers have been used in plasmas to attempt to lower the detection limits for certain species, such as hard-to-ionize species like arsenic, cadmium, selenium and lead, but increasing the power also results in an increase in the background signal from the plasma. Certain aspects and examples of the present technology alleviate some of the above concerns with previous atomization sources. For example, a boost device is shown here as a way to assist other atomization sources, such as flames, plasmas, arcs and sparks. Certain of these embodiments may enhance atomization efficiency, ionization efficiency, decrease background noise and/or increase emission signals from atomized and ionized species.
package cmd import ( "encoding/json" "errors" "fmt" "io/ioutil" "os" "path/filepath" "github.com/dodopizza/kubectl-shovel/internal/kubernetes" ) func mapContainerTmp(containerInfo kubernetes.ContainerInfo) error { var containerFS string var err error switch containerInfo.Runtime { case "docker": containerFS, err = getDockerContainerMountpoint(containerInfo.ID) case "containerd": containerFS, err = getContainerDContainerMountpoint(containerInfo.ID) default: return errors.New("Unknown container runtime") } if err != nil { return err } err = os.RemoveAll("/tmp") if err != nil { return err } return os.Symlink( filepath.Join(containerFS, "tmp"), "/tmp", ) } func getDockerContainerMountpoint(containerID string) (string, error) { id, err := ioutil.ReadFile( fmt.Sprintf( "/var/lib/docker/image/overlay2/layerdb/mounts/%s/mount-id", containerID, ), ) if err != nil { return "", err } return fmt.Sprintf( "/var/lib/docker/overlay2/%s/merged", string(id), ), nil } func getContainerDContainerMountpoint(containerID string) (string, error) { file, err := os.Open( fmt.Sprintf( "/run/containerd/runc/k8s.io/%s/state.json", containerID, ), ) if err != nil { return "", err } state := &struct { Config struct { RootFS string `json:"rootfs"` } `json:"config"` }{} if err := json.NewDecoder(file).Decode(state); err != nil { return "", err } return state.Config.RootFS, nil }
Steve Irwin Biography Australian naturalist and television personality Steve Irwin (1962–2006) was best known for his popular wildlife program Crocodile Hunter . His unbridled enthusiasm for such unlovely creatures as crocodiles, snakes, and spiders earned him a tremendous following, and his Australia Zoo was a top tourist attraction in his country. An ardent wildlife conservationist, Irwin also invested much of his time and money toward that end. He died in a rare stingray attack while filming off the coast of Australia in 2006. Born to the Breed Irwin was born on February 22, 1962 in Essendon, near Melbourne, Australia. His father, Bob, was a plumber and his mother, Lyn, a nurse, but both were naturalists by avocation. They turned their hobby into a business in the early 1970s, when they moved the family to Australia's Sunshine Coast and opened the Beerwah Reptile Park. Growing up among wild creatures, Irwin soon adopted his parents' affinity for the country's wildlife. He received a python for his sixth birthday, named it "Fred," and never looked back. Before long, he was helping his father rescue crocodiles. "When I was nine, dad took me capturing crocodiles," Irwin told Tessa Cunningham of the London Mirror . "We had five in the boat when my flashlight picked out a sixth. 'This one's yours, son,' dad said. He was a whopper—3ft. I got my legs around his neck and he was thrashing about. It was like being tossed around in a washing machine … It was an out-of-body experience. I knew then that catching crocs was the only life I wanted." Emulating his father played a large role in Irwin's ambitions as well. "I totally revered my dad," he told Gary Arnold of the Washington Times . "For me, he was the greatest legend on the face of the earth. I just wanted to be him, from the time I was this big. I just watched him, this giant of a man, always larger than life." In addition to his role models and early exposure to animals, Irwin had a natural gift that gave him an extra edge. Paul Farhi of the Washington Post , cited in the Seattle Times , quoted Irwin's explanation of that something extra. "I don't want to seem arrogant or bigheaded, but I have a real instinct with animals," he said. "I've grown up with them … It's like I have an uncanny supernatural force rattling around my body. I tell you what, mate, it's magnetism." Thus, via the combined contributing influences of parents, training, and talent, Irwin made animals his trade. He began by trapping rogue crocodiles and relocating them to the family zoo, which was renamed the Queensland Reptile and Fauna Park in the 1980s. In 1991 his parents gave him the business, which he re-dubbed the Australia Zoo. He then met and married Terri Raines, a fellow nature enthusiast from Eugene, Oregon, whom he met at his zoo. And it was the film footage from their honeymoon that propelled Irwin to fame. Wildlife Warrior Irwin and his new bride spent their 1992 honeymoon in Northern Australia, camping and trapping crocodiles for relocation. Through the auspices of old friend and television producer John Stainton, a film of the working vacation became the first episode of Crocodile Hunter . The program was picked up by the Discovery Channel and Irwin was soon an international celebrity. The huge success of Crocodile Hunter was, of course, dependent on its star. Irwin, clad in his trademark khaki shorts and shirt, was full of boyish enthusiasm for the scary creatures. Crocodiles, venomous snakes and lizards, scorpions, and spiders were among the less than cuddly wildlife he championed. Sometimes caressing them, and tussling with others, he always met the animals in their own environments. He spoke in a thick Australian accent and peppered his sentences with such catchphrases as "By Crikey!" and "Look at this beauty." It was dangerous work, but Irwin had an abiding respect for his co-stars. As he told the Houston Chronicle , "If you see me getting bitten by something, it's my mistake. I knew what I was up against went I went in with that animal, and sometimes my reflexes are a little slow or there's an oversight on my part." Such mishaps, however, were comparatively few. By 2006, Irwin's program (by then airing on cable television's Animal Planet) was being seen by approximately 500 million people in more than 120 countries. He had branched out onto the silver screen as well, with an appearance in Eddie Murphy's Doctor Doolittle and a starring role (with his wife) in The Crocodile Hunters: Collision Course (both 2002). Neither was a critical success, but Hollywood was not really Irwin's natural habitat anyway. Commenting on movie studio executives to Richard Deitsch of Sports Illustrated in 2002, Irwin said, "These land sharks in Hollywood, you don't know who they are. They're camouflaged in black Armani suits." Rather, to Irwin, the whole purpose was preserving the animals and their environment. He donated $1 million a year to his charity, Wildlife Warriors, and bought up tracts of land all over Australia to return them to their natural state. He viewed his television programs as ways to get people familiar with and excited about the animals he loved. As he put it to the Houston Chronicle in 2000, "What makes us [Irwin and his wife] tick—our gift to the world—is conservation. We eat, sleep and live for conservation. That's all we're about, that's what we're up to, that's our game. And we will die defending wildlife and wilderness areas. That's our passion." Controversy Not everyone was a fan of Irwin's, naturally. His countrymen, for instance, sometimes found his "ultra Aussieism" an embarrassing cliché. Further, some fellow naturalists found his television antics to be those of an irresponsible thrill-seeker who committed the dual sins of exaggerating the dangers of wild animals while minimizing the risks in handling them. Such types of criticism were of slight consequence to Irwin, however. Irwin ran up against a broader spectrum of critics in 2004. In January he caused an uproar by feeding crocodiles while holding his infant son, Bob. His more vociferous detractors equated the incident with child abuse, but the authorities declined to charge him with an infraction of any kind, and Irwin vehemently denied the child was ever in any danger at all. In June Irwin again came under fire for allegedly filming too close to penguins, whales, and seals in the Antarctic. Overall though, Irwin was not much of a lightning rod for negative comments. His popularity transcended his isolated lapses in judgment, and his star was only minimally dimmed. Likeability was, after all, the Crocodile Hunter's stock in trade. Untimely Death On September 4, 2006, Irwin was filming along Australia's Great Barrier Reef, his boat anchored near Port Douglas in Queensland. He decided to do a segment on a school of stingrays and began snorkeling in relatively shallow waters with his cameraman. Although they possess a barbed tail and a non-life-threatening venom, stingrays are normally extremely docile. On this day, however, chance and bad luck came together in a tragic manner. As Irwin swam over a male ray, it inexplicably struck him in the chest with its tail. His heart was pierced and he died within minutes. Only the third known fatal stingray attack in Australia and the 17th in the entire world, it was a sad and unexpected ending for a man who had made fearsome creatures his life's work. He was 44 years old. The public outpouring of grief was almost immediate, with tributes coming from everyone from Australian Prime Minister John Howard to actor Russell Crowe to legions of fans all over the world. His father explained that he and his son had long been aware of the dangers in their occupations. He was quoted in USA Today as saying, "Both of us over the years have had some very close shaves and we both approached it the same way, we made jokes about it. That's not to say we were careless. But we treated it as part of the job. Nothing to worry about really." Certainly, there was little doubt that Irwin had died doing what he loved to do. Irwin's legacy was the work and family he doted on. His eight-year-old daughter, Bindi, was already following in his footsteps and had been making a series with him at the time of his death. Environmental organization Planet Ark founder John Dee, a friend of Irwin's, told Jennifer Wulff of People , "We've got a fantastic chip off the block ready and raring to go. Hopefully [Bindi will] educate a whole new generation in the way her dad has." That time would, understandably, would be some time off in the future, as his wife and children mourned him. A lesser known gift Irwin left behind was his discovery of a new snapping turtle. Found on the coast of Queensland, it was called Elseya irwini, in the tradition of naming after the discoverer. But perhaps Irwin's most memorable contribution was his unbridled joy and gusto. "I've never met somebody with such enthusiasm for life," television host Jay Leno told Michaela Boland of Variety . His widow and wife of 14 years put it another way in an interview with television personality Barbara Walters, quoted in People , when asked what she would miss the most. "He was fun," she said. "He taught me it's okay to play in the rain. And splash in my puddle. And let the kids get dirty. And spill ice cream on your pants. Now I'm going to have to work really hard at having fun again … I'm Mrs. Steve Irwin. I've got a lot to live up to."
def return_movies(plex, section, days_passed): days_elapsed = int(days_passed) recently_added = __get_movies(plex, section) new_movies = plex_utils.date_filter(recently_added, days_elapsed) return __format_movies(new_movies)
import {t, Trans} from '@lingui/macro' import {Event} from 'event' import {Analyser} from 'parser/core/Analyser' import {filter} from 'parser/core/filter' import {dependency} from 'parser/core/Injectable' import {CooldownDowntime} from 'parser/core/modules/CooldownDowntime' import {Data} from 'parser/core/modules/Data' import {SimpleStatistic, Statistics} from 'parser/core/modules/Statistics' import React from 'react' export class RadiantAegis extends Analyser { static override handle = 'radiantaegis' static override title = t('smn.radiantaegis.title')`Radiant Aegis` @dependency private cooldownDowntime!: CooldownDowntime @dependency private data!: Data @dependency private statistics!: Statistics private aegisCasts = 0 override initialise() { this.addEventHook( filter<Event>() .source(this.parser.actor.id) .action(this.data.actions.RADIANT_AEGIS.id) .type('action'), () => this.aegisCasts += 1) this.addEventHook('complete', this.onComplete) } private onComplete() { const maxUses = this.cooldownDowntime.calculateMaxUsages({cooldowns: [this.data.actions.RADIANT_AEGIS]}) this.statistics.add(new SimpleStatistic({ icon: this.data.actions.RADIANT_AEGIS.icon, title: <Trans id="smn.radiantaegis.statistic-title">Radiant Aegis Uses</Trans>, value: <>{this.aegisCasts} / {maxUses} ({Math.floor(100 * this.aegisCasts / maxUses)}%)</>, info: <Trans id="smn.radiantaegis.info">The shield from Radiant Aegis can provide a significant amount of self-shielding over the course of the fight. This shielding could potentially save you from deaths due to failed mechanics or under-mitigation and healing.</Trans>, })) } }
/** * open a shard for this node to interact with it * assuming we don't already have it open and it is * part of out interest set */ public void openShard(int shard_id) throws Exception { if (shard_comps.containsKey(shard_id)) return; if (!shard_interest_set.contains(shard_id)) return; synchronized(open_shard_lock) { if (shard_comps.containsKey(shard_id)) return; ShardComponents shard_c = new ShardComponents(this, shard_id); TreeMap<Integer, ShardComponents> m = new TreeMap<>(); m.putAll(shard_comps); m.put(shard_id, shard_c); shard_comps = ImmutableMap.copyOf(m); } }
A wild weekend of college football continued Sunday. It started Friday night in Tampa when then-No. 18 South Florida knocked off then-No. 5 West Virginia 21-13. Upsets were the order of the day Saturday, when half the top 10 lost. One team that didn't lose, although it produced a sloppy 27-24 win over Washington, was top-ranked Southern California. That cost the Trojans in a wacky weekend in which three of the top five and seven of the top 13 teams lost produced a new No. 1. The Trojans dropped a spot in Sunday's Associated Press Top 25 poll. Louisiana State is the new No. 1. Florida (4-1), which was stunned by Auburn 20-17 at Florida Field on Saturday night, fell from No. 4 to No. 9. LSU is No. 1 in the AP poll for the first time since Nov. 2, 1959. LSU hosts Florida for an 8:28 p.m. kickoff Saturday on CBS. Southern Cal is the first team to lose the No. 1 ranking after a victory since Nov. 3, 2002, when top-ranked Miami dropped after beating Rutgers 42-17 and No. 2 Oklahoma moved up after a 27-11 victory over No. 13 Colorado. Cal moved up to No. 3, Ohio State is No. 4 and Wisconsin is No. 5. The rest of the Top 10: No. 6 South Florida, No. 7 Boston College, No. 8 Kentucky, No. 9 Florida and No. 10 Oklahoma. In the USA Today coaches� poll, USC held on to No. 1, with LSU, Cal, Ohio State and Wisconsin in the top five. Florida is No. 7 in the coaches' poll.
<gh_stars>0 package org.jfpa.utility; import java.math.BigDecimal; import java.text.ParseException; import java.text.SimpleDateFormat; import java.util.*; public class Utility { public static final String EMPTY_STRING = ""; public static final String NEW_LINE = System.getProperty("line.separator"); private Utility() { } public static boolean isEmpty(final String value) { return value == null || EMPTY_STRING.equals(value.trim()); } public static String substring(final String string, final int start, final int end) { return substring(string, start, end, false); } public static String substring(final String string, final int start, int end, final boolean trim) { if (!isEmpty(string) && start < string.length()) { if (end > string.length()) { end = string.length(); } return (trim ? string.substring(start, end).trim() : string.substring(start, end)); } return null; } public static String buildString(String... strings) { StringBuilder builder = new StringBuilder(); for (String string : strings) { if (string != null) { builder.append(string); } } return builder.toString(); } public static String encloseString(String string, String stringEnclose) { return buildString(stringEnclose, string, stringEnclose); } public static String unencloseString(String string, String stringEnclose) { if (string != null) { int begin = string.indexOf(stringEnclose); int end = string.lastIndexOf(stringEnclose); if (begin < 0 || begin == end) { throw new IllegalArgumentException("string not properly enclosed: " + string); } return string.substring(begin + stringEnclose.length(), end); } return null; } public static String buildDelimitedString(final String delimiter, final Object[] objects) { StringBuilder builder = new StringBuilder(); if (objects != null && objects.length > 0) { if (objects[0] != null) { builder.append(objects[0]); } for (int i = 1; i < objects.length; i++) { builder.append(delimiter); if (objects[i] != null) { builder.append(objects[i]); } } } return builder.toString(); } public static String buildNewLineString(final Object... values) { return buildNewLineString(Arrays.asList(values)); } public static <T> String buildNewLineString(final Collection<T> collection) { StringBuilder builder = new StringBuilder(); Iterator<T> iterator = collection.iterator(); while (iterator.hasNext()) { T next = iterator.next(); if (next != null) { builder.append(next.toString()); } if (iterator.hasNext()) { builder.append(NEW_LINE); } } return builder.toString(); } public static <T> String buildNewLineStringFromList(final Collection<List<T>> collection) { StringBuilder builder = new StringBuilder(); Iterator<List<T>> iterator = collection.iterator(); while (iterator.hasNext()) { List<T> next = iterator.next(); if (next != null) { builder.append(buildNewLineString(next)); } if (iterator.hasNext()) { builder.append(NEW_LINE); } } return builder.toString(); } public static String trimString(String value) { if (value != null) { value = value.trim(); return EMPTY_STRING.equals(value) ? null : value; } return null; } public static String spaces(final int length) { char[] spaces = new char[length]; Arrays.fill(spaces, ' '); return new String(spaces); } public static String rightPad(final String str, final int length) { return String.format("%1$-" + length + "s", getValidString(str)); } public static String getValidString(final String value) { return value == null ? EMPTY_STRING : value; } public static Date stringToDate(final String date, final String format) { if (!isEmpty(date)) { try { SimpleDateFormat sdf = new SimpleDateFormat(format); sdf.setLenient(false); return sdf.parse(date.trim()); } catch (ParseException e) { throw new IllegalArgumentException(e); } } return null; } public static String dateToString(final Date date, final String format) { return date != null ? new SimpleDateFormat(format).format(date) : null; } public static Integer stringToInteger(String value) { if (!isEmpty(value)) { try { if (value.startsWith("+")) { value = value.substring(1); } return Integer.parseInt(value.trim()); } catch (NumberFormatException e) { throw new IllegalArgumentException(e); } } return null; } public static String integerToString(final Integer value) { return value != null ? value.toString() : null; } public static String longToString(final Long value) { return value != null ? value.toString() : null; } public static Long stringToLong(String value) { if (!isEmpty(value)) { try { if (value.startsWith("+")) { value = value.substring(1); } return Long.parseLong(value.trim()); } catch (NumberFormatException e) { throw new IllegalArgumentException(e); } } return null; } public static Double stringToDouble(String value) { if (!isEmpty(value)) { try { if (value.startsWith("+")) { value = value.substring(1); } return Double.parseDouble(value.trim()); } catch (NumberFormatException e) { throw new IllegalArgumentException(e); } } return null; } public static String doubleToString(final Double value) { return value != null ? value.toString() : null; } public static BigDecimal stringToBigDecimal(final String bigDecimal) { if (!isEmpty(bigDecimal)) { try { String bigDecimalSep = bigDecimal.replace(',', '.'); return new BigDecimal(bigDecimalSep.trim()); } catch (NumberFormatException e) { throw new IllegalArgumentException(e); } } return null; } public static String bigDecimalToString(final BigDecimal bigDecimal) { return bigDecimal != null ? bigDecimal.toPlainString() : null; } public static String booleanToString(final Boolean value, final String[] trueFalse) { return value != null ? value ? trueFalse[0] : trueFalse[1] : null; } public static Boolean stringToBoolean(String value, final String[] trueFalse) { value = trimString(value); if (value != null) { if (value.equals(trueFalse[0])) { return true; } if (value.equals(trueFalse[1])) { return false; } throw new IllegalArgumentException("Value '" + value + "' is not in " + Arrays.toString(trueFalse)); } return null; } public static String hexString(final byte[] bytes) { StringBuilder builder = new StringBuilder(); for (byte b : bytes) { builder.append(String.format("0x%x ", b)); } builder.append(String.format("(%d bytes) - ASCII: '%s'", bytes.length, new String(bytes))); return builder.toString(); } public static <T> boolean checkDomain(final T value, final T...allowedValues) { if (value != null) { for (T allowed : allowedValues) { if (value.equals(allowed)) { return true; } } } return false; } public static boolean containsAnyValues(final Object... values) { for (Object value : values) { if (value != null) { return true; } } return false; } public static boolean containsAllValues(final Object... values) { for (Object value : values) { if (value == null) { return false; } } return true; } public static int[] convertArray(final List<Integer> list) { int[] array = new int[list.size()]; for (int i = 0; i < list.size(); i++) { array[i] = list.get(i); } return array; } }
A phantom study of the variables in myocardial scanning with 131Cs. radiopharmaceutical for detecting myocardial in farcts because of the selective concentration of cesium by the myocardium (1 ). Several investigators have reported varying degrees of success with this radionuclide in scanning both dog and human myo cardia; the obstacles encountered in these studies have also been related (2€4). Photoscanning of the heart with 131Cs is hampered by its inherent low energy, 29.4-keV x-ray, resulting in some tissue ab sorption by the structures of the chest wall. Also the interpretation of myocardial scans may be com plicated by cardiac contraction and chest-wall res piratory movement.
<reponame>A-Pass-Zup/orange-talents-07-template-casa-do-codigo<gh_stars>0 package br.com.zupacademy.apass.casadocodigo.modelo; import org.springframework.util.Assert; import javax.persistence.*; import javax.validation.constraints.NotBlank; @Entity public class Pais { @Id @GeneratedValue(strategy = GenerationType.IDENTITY) private Long id; @Column(nullable = false, unique = true) private String nome; @Deprecated private Pais() { } public Pais(@NotBlank String nome) { Assert.hasLength(nome, "Não pode criar um país sem nome!"); this.nome = nome.trim(); } }
It’s been months since the Season 5 finale of Dexter and we’ve still months to go until the Season 6 premiere, so it’s nice to see some intriguing tidbits of Dexter news today. Showtime has just released a new teaser trailer that doesn’t reveal a whole lot about the upcoming story arcs, but tries hard to get you pumped up for fall. Meanwhile, Colin Hanks has signed on as a recurring guest star in a mysterious role. Read more after the jump. TV Line reports that Hanks will be joining the cast for a “major” storyline in Season 6. Showtime is staying quiet about Hanks’ role — as it usually does with its big recurring guest stars — but for what it’s worth, Hanks’ part is most likely not among the three recurring characters announced earlier this month. TV Line has already revealed that Dexter won’t be facing off against just one “big bad” this season, so Hanks’ role apparently isn’t that, either. Now that you have a vague idea of what Hanks won’t be doing, feel free to speculate in the comments about what he will be doing. The teaser trailer is more a recap of previous season highlights than a look at what we can expect from the new season — but that does sound like Deb’s voice screaming “Oh my God, oh my God,” doesn’t it? Showtime president David Nevins has said previously that the new season would have “a microscope on the Deb/Dexter relationship,” so interpret that as you will. The teaser tries its best to refresh your memory, but for an even more comprehensive review, I suggest checking out this infographic on Dexter’s victims and this 60-second parody of a typical Dexter plotline. Okay, now you’re all caught up. Discuss: What did you think of the last season of Dexter? Are you excited for the new season?