content
stringlengths
7
2.61M
#include <core/objects/oscillators/SingleCycle.h> #include <hal/simd.h> #include <math.h> namespace od { SingleCycle::SingleCycle() { addInput(mVoltPerOctave); addInput(mSync); addOutput(mOutput); addInput(mFundamental); addInput(mPhase); addParameter(mInternalPhase); mInternalPhase.enableSerialization(); } SingleCycle::~SingleCycle() { } void SingleCycle::process() { if (mpSample == 0) { float *out = mOutput.buffer(); simd_set(out, FRAMELENGTH, 0); return; } if (mpSlices) { int intervalCount = mpSlices->getIntervalCount(); if (intervalCount == 0) { processOne(0, mpSample->mSampleCount); } else if (intervalCount == 1) { processOne(mpSlices->getIntervalStart(0), mpSlices->getIntervalLength(0)); } else { processMany(); } } else { processOne(0, mpSample->mSampleCount); } } void SingleCycle::processOne(int offset, int length) { float *octave = mVoltPerOctave.buffer(); float *out = mOutput.buffer(); float *sync = mSync.buffer(); float *freq = mFundamental.buffer(); float *phase = mPhase.buffer(); float32x4_t glog2 = vdupq_n_f32(FULLSCALE_IN_VOLTS * logf(2.0f)); float32x4_t one = vdupq_n_f32(1.0f); float32x4_t zero = vdupq_n_f32(0.0f); float32x4_t negOne = vdupq_n_f32(-1.0f); float32x4_t sr = vdupq_n_f32(globalConfig.samplePeriod); float32x4_t N = vdupq_n_f32(length - 1); int32x4_t O = vdupq_n_s32(offset); float internalPhase = mInternalPhase.value(); int32_t U[4] = {0}; for (int i = 0; i < FRAMELENGTH; i += 4) { // calculate phase increment float32x4_t p = vld1q_f32(phase + i); float32x4_t dP = sr * vld1q_f32(freq + i); float32x4_t q = vld1q_f32(octave + i); q = vminq_f32(one, q); q = vmaxq_f32(negOne, q); q = dP * simd_exp(q * glog2); // accumulate phase while handling sync float tmp[4]; uint32_t syncTrue[4]; float32x4_t s = vld1q_f32(sync + i); vst1q_u32(syncTrue, vcgtq_f32(s, zero)); vst1q_f32(tmp, q); for (int j = 0; j < 4; j++) { internalPhase += tmp[j]; if (syncTrue[j]) { internalPhase = 0; } tmp[j] = internalPhase; } q = vld1q_f32(tmp) + p; // wrap to [0,1] q = vsubq_f32(q, vcvtq_f32_s32(vcvtq_s32_f32(q))); q += one; q = vsubq_f32(q, vcvtq_f32_s32(vcvtq_s32_f32(q))); // look up float32x4_t pos = q * N; int32x4_t posI = vcvtq_s32_f32(pos); float32x4_t posX = vcvtq_f32_s32(posI); float32x4_t w1 = pos - posX; float32x4_t w0 = one - w1; float S0[4], S1[4]; vst1q_s32(U, posI + O); for (int j = 0; j < 4; j++) { S0[j] = mpSample->get(U[j], 0); S1[j] = mpSample->get(U[j] + 1, 0); } float32x4_t s0 = vld1q_f32(S0); float32x4_t s1 = vld1q_f32(S1); vst1q_f32(out + i, w0 * s0 + w1 * s1); } internalPhase -= (int)internalPhase; mInternalPhase.hardSet(internalPhase); mCurrentIndex = U[3]; } void SingleCycle::processMany() { float *octave = mVoltPerOctave.buffer(); float *out = mOutput.buffer(); float *sync = mSync.buffer(); float *freq = mFundamental.buffer(); float *phase = mPhase.buffer(); float *select = mSliceSelect.buffer(); float32x4_t glog2 = vdupq_n_f32(FULLSCALE_IN_VOLTS * logf(2.0f)); float32x4_t one = vdupq_n_f32(1.0f); float32x4_t oneEp = vdupq_n_f32(0.9999f); float32x4_t zero = vdupq_n_f32(0.0f); float32x4_t negOne = vdupq_n_f32(-1.0f); float32x4_t sr = vdupq_n_f32(globalConfig.samplePeriod); float32x4_t M = vdupq_n_f32(mpSlices->getIntervalCount() - 1); float internalPhase = mInternalPhase.value(); int32_t U[4], N0[4], N1[4]; // Algorithm Outline (Naive wavetable with linear interpolation) // 1) Look up samples based on phase accumulator. // 2) Look up slices based on (continuous) select value. // 3) Calculate inter-sample interpolation weights. // 4) Calculate inter-slice interpolation weights. // 5) Do 4-way interpolation between the 4 samples at the corners. // Note: Assume slice lengths are different. for (int i = 0; i < FRAMELENGTH; i += 4) { // Calculate phase increment. float32x4_t p = vld1q_f32(phase + i); float32x4_t dP = sr * vld1q_f32(freq + i); float32x4_t q = vld1q_f32(octave + i); q = vminq_f32(one, q); q = vmaxq_f32(negOne, q); q = dP * simd_exp(q * glog2); // Accumulate phase while handling sync. float tmp[4]; uint32_t syncTrue[4]; float32x4_t s = vld1q_f32(sync + i); vst1q_u32(syncTrue, vcgtq_f32(s, zero)); vst1q_f32(tmp, q); for (int j = 0; j < 4; j++) { internalPhase += tmp[j]; if (syncTrue[j]) { internalPhase = 0; } tmp[j] = internalPhase; } q = vld1q_f32(tmp) + p; // Wrap to [0,1] q = vsubq_f32(q, vcvtq_f32_s32(vcvtq_s32_f32(q))); q += one; q = vsubq_f32(q, vcvtq_f32_s32(vcvtq_s32_f32(q))); // Calculate inter-slice interpolation weights. float32x4_t t = vld1q_f32(select + i); t = vminq_f32(oneEp, t); t = vmaxq_f32(zero, t); float32x4_t m = t * M; int32x4_t mI = vcvtq_s32_f32(m); float32x4_t w1 = m - vcvtq_f32_s32(mI); float32x4_t w0 = one - w1; vst1q_s32(U, mI); for (int j = 0; j < 4; j++) { N0[j] = mpSlices->getIntervalLength(U[j]) - 1; N1[j] = mpSlices->getIntervalLength(U[j] + 1) - 1; } // Inter-sample weights for current slice. float32x4_t n0 = vcvtq_f32_s32(vld1q_s32(N0)); float32x4_t pos0 = q * n0; int32x4_t posI0 = vcvtq_s32_f32(pos0); float32x4_t w01 = pos0 - vcvtq_f32_s32(posI0); float32x4_t w00 = one - w01; // Inter-sample weights for next slice. float32x4_t n1 = vcvtq_f32_s32(vld1q_s32(N1)); float32x4_t pos1 = q * n1; int32x4_t posI1 = vcvtq_s32_f32(pos1); float32x4_t w11 = pos0 - vcvtq_f32_s32(posI1); float32x4_t w10 = one - w11; // Get the samples needed for the 4-way interpolation. float S00[4], S01[4], S10[4], S11[4]; vst1q_s32(N0, posI0); vst1q_s32(N1, posI1); for (int j = 0, k; j < 4; j++) { k = N0[j] + mpSlices->getIntervalStart(U[j]); S00[j] = mpSample->get(k, 0); S01[j] = mpSample->get(k + 1, 0); k = N1[j] + mpSlices->getIntervalStart(U[j] + 1); S10[j] = mpSample->get(k, 0); S11[j] = mpSample->get(k + 1, 0); } // 4-way interpolation and store to the out buffer. float32x4_t s00 = vld1q_f32(S00); float32x4_t s01 = vld1q_f32(S01); float32x4_t s10 = vld1q_f32(S10); float32x4_t s11 = vld1q_f32(S11); vst1q_f32(out + i, w0 * (w00 * s00 + w01 * s01) + w1 * (w10 * s10 + w11 * s11)); } internalPhase -= (int)internalPhase; mInternalPhase.hardSet(internalPhase); mCurrentIndex = N0[3] + mpSlices->getIntervalStart(U[3]); mActiveSliceIndex = U[3]; } } /* namespace od */
Decontamination of Prions by the Flowing Afterglow of a Reduced-pressure N2O2 Cold-plasma Transmissible spongiform encephalopathies, also called prion diseases, represent a family of neurodegenerative disorders that affect various animal species. Since the infectious forms of prions are transmissible and highly resistant to chemical and physical decontamination methods routinely used in healthcare, they represent a challenge for science, medicine, and public health/food systems. Suitable decontamination procedures have been proposed, but they are generally incompatible with the materials from which medical devices are made. In this study, we evaluate a cold gaseous-plasma treatment, based on the outflow from a N 2 O 2 microwave discharge, as an alternative decontamination tool against both the non-infectious (PrP C ) and infectious (PrP Sc ) forms of prion proteins. The efficiency of the plasma treatment on these proteins is assessed using an in vitro assay as well as an in vivo bioassay. We showed by Enzyme-Linked Immuno-Sorbent Assay (ELISA) that n the N 2 O 2 discharge afterglow reduces the immunoreactivity of both non-infectious recombinant and pathogenic prion proteins deposited on polystyrene substrates. Tests done in vivo demonstrate that exposure to the cold-plasma flowing afterglow achieves significant decontamination of stainless steel sutures inoculated with infectious forms of prions to be implanted in mice.
package br.com.zupacademy.proposta.proposta.cartao; import org.springframework.data.repository.CrudRepository; import java.util.List; public interface CartaoRepository extends CrudRepository<Cartao,Long> { List<Cartao> findByEstadoDoCartao(EstadoDoCartao bloqueioSolicitado); List<Cartao> findByNotificacaoDeAviso(NotificacaoDeAviso avisoSolicitado); }
More than 10,000 people have now died from the Ebola virus, almost all of them in West Africa, the World Health Organization said Thursday. The three hardest-hit countries of Sierra Leone, Guinea and Liberia have recorded 24,350 cases and 10,004 deaths since the epidemic began more than a year ago, the UN body said. There have also been six deaths in Mali, one in the United States and eight in Nigeria, all of which have since been declared Ebola-free. Ebola, one of the deadliest pathogens known to man, is spread through direct contact with the bodily fluids of an infected person showing symptoms such as fever or vomiting. Sierra Leone has registered the highest number of cases in the worst-ever outbreak of the tropical fever, reporting 11,677 cases as of March 10, according to the WHO. The country has seen a total of 3,655 deaths from Ebola. Also as of March 10, Guinea had reported 3,330 cases and 2,187 deaths. Liberia, long the worst-hit country, recorded 9,343 cases as of March 5, with 4,162 deaths. The WHO said on Wednesday that Liberia appeared to have turned a corner in the fight against the disease, with no new cases of the deadly virus reported since February 19. Six months ago, Liberia was reporting more than 300 new cases each week. The country's last confirmed Ebola patient left hospital earlier this month.
package org.imzdong.study.msb.day_10_juc.refer; import java.lang.management.ManagementFactory; import java.lang.management.MemoryMXBean; import java.lang.management.MemoryUsage; public class MemoryUtil { public static void print(){ System.out.println("=======内存start======"); MemoryMXBean bean = ManagementFactory.getMemoryMXBean(); MemoryUsage memoryUsage = bean.getHeapMemoryUsage(); System.out.println(memoryUsage.getUsed()); System.out.println("=======内存end======"); } }
// Overload comparison operators to compare priorities bool Behavior::operator= (Behavior b) { label = b.getLabel(); priority = b.getPriority(); twist_message = b.getTwistMessage(); hitch_message = b.getHitchMessage(); }
1. Field of the Invention This invention relates to an in-cylinder injection type spark-ignition internal combustion engine in which fuel is injected directly into a combustion chamber and ignited by a spark plug. 2. Description of the Related Art In the in-cylinder injection type spark-ignition internal combustion engine in which fuel is injected directly into a combustion chamber, stratified lean combustion can be carried out, where ignition is made at an overall very lean air/fuel ratio, for example, by transferring fuel spray injected by a fuel injection valve in the compression stoke to near an electrode part of a spark plug, and thereby forming a mixture having an air/fuel ratio close to the stoichiometric air/fuel ratio around the electrode part of the spark plug. There are various manners of transferring the fuel spray to near the electrode part of the spark plug. An internal combustion engine arranged such that a change between different manners of transferring the fuel spray (hereinafter referred to as “spray transfer modes”) is carried out depending on the operational conditions of the engine has been proposed by Japanese Unexamined Patent Publication No. Hei 11-210472 (hereinafter referred to as “patent document 1”), for example. In the technique disclosed in patent document 1, a fuel injection valve is arranged in an almost vertical position at the top of a combustion chamber, a spark plug is arranged with its electrode part located near and facing the injection hole part of the fuel injection valve, and a cavity is formed in the top face of a piston. When the engine is in a low engine-load operational region, stratified combustion is carried out by a so-called spray-guide method, in which, by retarding the fuel injection timing to be close to the ignition timing, it is arranged that ignition is made at the time when the fuel spray from the fuel injection valve arrives near the electrode part of the spark plug on its own kinetic energy. Meanwhile, when the engine is in a high engine-load operational region, stratified combustion is carried out by a so-called wall-guide method, in which, by advancing the fuel injection timing, it is arranged that the fuel spray is transferred to near the electrode part of the spark plug with the help of a tumbling flow produced by the cavity of the piston and ignited. In order to change the spray transfer mode depending on the load on the internal combustion engine as in the technique disclosed in patent document 1, it is necessary to change the fuel injection timing and ignition timing using a specified engine torque as a threshold. However, in the control using normal fuel injection timing maps and normal ignition timing maps, in order to prevent a step in torque due to an abrupt change in fuel injection timing and ignition timing, the fuel injection timing and ignition timing are changed continuously, by performing interpolation to the control maps. This causes a problem that at the time of changing a spray transfer mode, misfire occurs due to the following reasons: FIG. 4 is a characteristic diagram which relates to a specified air/fuel ratio and shows, in respect of fuel injection timing Tij (horizontal axis) and ignition timing Tig (vertical axis), a region capable of achieving stable stratified combustion by the spray-guide method (SG region) and a region capable of achieving stable stratified combustion by the wall-guide method (WG region). FIG. 4 shows that at this air/fuel ratio, the SG region and the WG region are independent of each other, with a misfire region between them. Hence, if the fuel injection timing Tij and ignition time Tig are changed continuously by interpolation as mentioned above, there can be cases where the fuel injection timing and ignition time stay long in the misfire region so that misfire continues. In order to avoid this situation, a spray transfer mode needs to be changed depending on the engine load, however, the change of the mode cannot be carried out. Thus, the merits of both fuel transfer modes, such as improvement in fuel economy and reduction in NOx for example, cannot be fully utilized.
package put.ci.cevo.util.concurrent; import static org.apache.log4j.Level.ERROR; import static org.apache.log4j.Level.FATAL; import static org.apache.log4j.Level.INFO; import static org.apache.log4j.Level.WARN; import org.apache.log4j.Level; import org.apache.log4j.Logger; import put.ci.cevo.util.configuration.LocallyConfiguredThread; public abstract class InterruptibleDaemon extends LocallyConfiguredThread { private static final Logger logger = Logger.getLogger(InterruptibleDaemon.class); private static final int DEFAULT_MAX_CONSECUTIVE_ERRORS_COUNT = 10; protected int maxConsecutiveErrorsCount = DEFAULT_MAX_CONSECUTIVE_ERRORS_COUNT; public void setMaxConsecutiveErrors(int maxConsecutiveErrorsCount) { this.maxConsecutiveErrorsCount = maxConsecutiveErrorsCount; } protected InterruptibleDaemon() { this(null); } protected InterruptibleDaemon(String name) { setName(name == null ? getClass().getSimpleName() : name); setDaemon(true); } @Override public synchronized void start() { VMShutdownThreadInterruptor.register(this); super.start(); } @Override public void run() { try { log(INFO, "Started daemon: " + getName()); if (!sleepTime(getInitialSleepTime())) { return; } int consecutiveErrorsCount = 0; do { try { doLogic(); consecutiveErrorsCount = 0; } catch (InterruptedException e) { return; } catch (Throwable e) { log(ERROR, "Error in daemon " + getName() + " logic", e); onError(++consecutiveErrorsCount, e); } if (!sleepTime(getSleepTime())) { return; } } while (!interrupted()); } finally { log(INFO, "Daemon " + getName() + " stopped"); } } protected void log(Level level, String message) { log(level, message, null); } /** Log safely, even if logger is no longer available. */ protected void log(Level level, String message, Throwable exception) { try { logger.log(level, message, exception); } catch (Throwable e) { // ignore } } /** Return true if completed normally, false if interrupted. */ private boolean sleepTime(long sleepTime) { if (sleepTime <= 0) { return true; } try { Thread.sleep(sleepTime); return true; } catch (InterruptedException e) { log(INFO, "Daemon " + getName() + " interrupted externally"); return false; } } /** The sleep time before the first iteration of the daemon. */ protected long getInitialSleepTime() { return getSleepTime(); } /** Return true if the thread should be killed now. */ protected void onError(int consecutiveErrorsCount, Throwable e) { if (consecutiveErrorsCount > maxConsecutiveErrorsCount) { log(FATAL, "Max consecutive erros count (" + maxConsecutiveErrorsCount + ") reached - interrupting daemon: " + getName()); interrupt(); } } protected void logCountOnError(int consecutiveErrorsCount) { if (consecutiveErrorsCount >= maxConsecutiveErrorsCount) { log(WARN, "Consecutive errors count: " + consecutiveErrorsCount); } } /** Sleep time before the next call to {@link #doLogic()}. */ protected abstract long getSleepTime(); /** The main logic of the daemon. */ protected abstract void doLogic() throws Exception; }
// GetLookupTable returns the Maglev lookup table of the size "m" for the given // backends. The lookup table contains the indices of the given backends. func GetLookupTable(backends []string, m uint64) []int { if len(backends) == 0 { return nil } perm := getPermutation(backends, m, runtime.NumCPU()) next := make([]int, len(backends)) entry := make([]int, m) for j := uint64(0); j < m; j++ { entry[j] = -1 } l := len(backends) for n := uint64(0); n < m; n++ { i := int(n) % l c := perm[i*int(m)+next[i]] for entry[c] >= 0 { next[i] += 1 c = perm[i*int(m)+next[i]] } entry[c] = i next[i] += 1 } return entry }
public class TestAccount { public static void main(String[] args) { Customer customer = new Customer(2,"Dinu",'m'); Account account1 = new Account(2,customer,200); account1.deposit(50); System.out.println(account1); account1.withdraw(150); System.out.println(account1); } }
<filename>src/pages/Checkout.tsx import * as React from 'react' import CheckoutForm from '../components/CheckoutForm' import Layout from '../components/Layout' import { loadStripe } from '@stripe/stripe-js' import { Elements } from '@stripe/react-stripe-js' import '../assets/scss/Checkout.scss' const promise = loadStripe(process.env.STRIPE_API_KEY) const Checkout: React.FC = () => { return ( <Layout> <Elements stripe={promise}> <CheckoutForm /> </Elements> </Layout> ) } export default Checkout
Democracy and Income Inequality: Revisiting the Long- and Short-Term Relationship This paper studies the relationship between democracy andincome inequality in long- and short/medium-run. Using appropriate econometrictechniques on both, averaged and panel data for the period 1962-2006, we findno evidence that democracy is associated with tighter income distribution. Ourresults are robust to different specification techniques, to exclusion ofdeveloped as well as the transition countries. We speculate that the different(and opposing) transmission mechanisms, as well as the nature and thedefinition of the democracy variables (both Polity IV and Freedom House)influence our results. Improvement of conceptualization and measurement of democracycould shed further light onto the democracy-inequality nexus.
Correlated things aren’t necessarily related to each other. In other words, correlation doesn’t imply causation – and a website highlights just that. Tylergiven.com publishes a lot of apparently correlated things, which obviously have nothing in common, like for example US spending on science, space, and technology and Suicides by hanging, strangulation and suffocation. So there you have it people – correlation and causation are two different things, don’t draw any conclusions causation based on correlation alone!
package com.zb.springboot.demo.job.listener; import lombok.extern.slf4j.Slf4j; import org.quartz.JobExecutionContext; import org.quartz.JobExecutionException; import org.quartz.listeners.JobListenerSupport; /** * @author zhangbo * @date 2020/7/20 */ @Slf4j public class MyJobListener extends JobListenerSupport { @Override public String getName() { return "MyTest-JobListener"; } @Override public void jobToBeExecuted(JobExecutionContext context) { // log.info(" === jobToBeExecuted "); } @Override public void jobExecutionVetoed(JobExecutionContext context) { // log.info(" ===<<< jobExecutionVetoed "); } @Override public void jobWasExecuted(JobExecutionContext context, JobExecutionException jobException) { // log.info(" ===>>> jobWasExecuted, jobException = {}", jobException == null ? "" : jobException.getMessage()); } }
(Date Posted: 2/19/2019) On February 15, 2019, Smoked Alaska Seafoods, Inc. recalled all jars and cans of Smoked Silver Salmon because it has the potential to be contaminated with Clostridium botulinum, a bacterium which can cause life-threatening illness or death. Clostridium botulinum is an organism which can cause botulism, a potentially fatal form of food poisoning. Symptoms include general weakness, muscle weakness, dizziness, double-vision, abdominal tension, constipation, trouble with speaking or swallowing and difficulty in breathing. People experiencing these symptoms should seek immediate medical attention. It can lead to life-threatening paralysis of breathing muscles requiring support with a breathing machine (ventilator) and intensive care. Recalled Smoked Silver Salmon was sold to distributors throughout the state of Alaska primarily in gift stores in the Anchorage and Fairbanks area. It is packaged in 6.5 oz. containers and can be identified by the production code of AL81111133. Consumers should destroy the product, or return it to the place where purchased for a refund or contact Smoked Alaska Seafoods, Inc. for a refund or replacement. See ConsumerLab.com's Canned Tuna and Salmon Review for tests of related products. To see the complete recall, use the red link below. https://www.fda.gov/Safety/Recalls/ucm631531.htm
package kfn import ( "fmt" "github.com/slinkydeveloper/kfn/pkg/kfn/util" "os" "path" "strings" ) const targetDirectoryBaseName = "target" const runtimeRemoteZip = "https://github.com/openshift-cloud-functions/faas-js-runtime-image/archive/master.zip" var TargetDirectory string var UsrDirectory string func init() { // Init target directory pwd, err := os.Getwd() if err != nil { panic(fmt.Sprintf("Error while retrieving pwd: %v", err)) } TargetDirectory = path.Join(pwd, targetDirectoryBaseName) UsrDirectory = path.Join(TargetDirectory, "usr") } func LoadFunction(location string) error { if err := initializeTargetDir(); err != nil { return err } if err := initializeUsrDir(); err != nil { return err } if strings.HasPrefix(location, "http") { return downloadFunctionFromHTTP(location) } else { return loadFunctionFileFromLocal(location) } } func DownloadRuntimeAndCopyRequiredFiles() error { if util.FsExist(path.Join(TargetDirectory, "src")) { // We reuse stuff already in target dir return nil } runtimeZip := path.Join(TargetDirectory, "master.zip") if err := util.DownloadFile(runtimeRemoteZip, runtimeZip); err != nil { return err } if _, err := util.Unzip(runtimeZip, TargetDirectory); err != nil { return err } srcDir := path.Join(TargetDirectory, "src") if err := util.Copy(path.Join(TargetDirectory, "faas-js-runtime-image-master", "src"), srcDir); err != nil { return err } return nil } func initializeTargetDir() error { if !util.FsExist(TargetDirectory) { return os.Mkdir(TargetDirectory, os.ModePerm) } return nil } func initializeUsrDir() error { if !util.FsExist(UsrDirectory) { return os.Mkdir(UsrDirectory, os.ModePerm) } return nil } func downloadFunctionFromHTTP(remote string) error { return util.DownloadFile(remote, path.Join(TargetDirectory, "usr", "fn.js")) } func loadFunctionFileFromLocal(filepath string) error { return util.Copy(filepath, path.Join(TargetDirectory, "usr", "index.js")) }
<gh_stars>10-100 package com.zgm.cloud.config; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.security.oauth2.provider.token.TokenStore; import org.springframework.security.oauth2.provider.token.store.JwtAccessTokenConverter; import org.springframework.security.oauth2.provider.token.store.JwtTokenStore; /** * @Description * @Author <NAME> * @Date 16/03/2020 14:16 * @Website https://www.zhangguimin.cn */ @Configuration public class TokenConfig { private final String SIGNING_KEY = "uaa123"; /** * 生成令牌存储方式 * @return */ @Bean public TokenStore tokenStore() { return new JwtTokenStore(accessTokenConverter()); } @Bean public JwtAccessTokenConverter accessTokenConverter() { JwtAccessTokenConverter converter = new JwtAccessTokenConverter(); converter.setSigningKey(SIGNING_KEY); //对称秘钥,资源服务器使用该秘钥来验证 return converter; } /** * 生成令牌存储方式 * @return */ //@Bean //public TokenStore tokenStore() { // return new InMemoryTokenStore(); //} }
<filename>src/demos/CubeWallDemo.h #ifndef CUBEWALLDEMO_H #define CUBEWALLDEMO_H #include <modules/demo_loader/Demo.h> class ApplicationControl; class CubeWallDemo : public Demo { public: CubeWallDemo(ApplicationControl* ac, bool rigid); // Demo interface public: virtual std::string getName(); virtual void load(); virtual void unload(); private: ApplicationControl* mAc; std::string mName; bool mRigid; }; #endif // CUBEWALLDEMO_H
<reponame>MayconFelipeA/sampvoiceatt /* Plugin-SDK (Grand Theft Auto San Andreas) source file Authors: GTA Community. See more here https://github.com/DK22Pac/plugin-sdk Do not delete this comment block. Respect others' work! */ #include "CStreaming.h" int &CStreaming::ms_currentZoneType = *(int *)0x8E4C20; unsigned int &CStreaming::ms_streamingBufferSize = *(unsigned int *)0x8E4CA8; unsigned int &CStreaming::ms_memoryUsed = *(unsigned int *)0x8E4CB4; unsigned int &CStreaming::ms_numModelsRequested = *(unsigned int *)0x8E4CB8; bool &CStreaming::ms_disableStreaming = *(bool *)0x9654B0; bool &CStreaming::ms_bLoadingBigModel = *(bool *)0x8E4A58; bool &CStreaming::ms_bIsInitialised = *(bool *)0x8E4C00; bool &CStreaming::m_bBoatsNeeded = *(bool *)0x9654BC; bool &CStreaming::disablePoliceBikes = *(bool *)0x9654BF; unsigned int &CStreaming::ms_memoryAvailable = *(unsigned int *)0x8A5A80; unsigned int &CStreaming::desiredNumVehiclesLoaded = *(unsigned int *)0x8A5A84; unsigned int &CStreaming::ms_numPriorityRequests = *(unsigned int *)0x8E4BA0; int &CStreaming::ms_lastCullZone = *(int *)0x8E4BA4; unsigned short &CStreaming::ms_loadedGangs = *(unsigned short *)0x8E4BAC; unsigned int &CStreaming::ms_numPedsLoaded = *(unsigned int *)0x8E4BB0; int &CStreaming::copBikeModel = *(int *)0x8A5A9C; int &CStreaming::copBikerModel = *(int *)0x8A5AB0; int *CStreaming::copCarModelByTown = (int *)0x8A5A8C; int *CStreaming::copModelByTown = (int *)0x8A5AA0; int *CStreaming::ambulanceByTown = (int *)0x8A5AB4; int *CStreaming::medicModelsByTown = (int *)0x8A5AC4; int *CStreaming::firetruckModelsByTown = (int *)0x8A5AD4; int *CStreaming::firemanModelsByTown = (int *)0x8A5AE4; int *CStreaming::taxiDriverModelsByTown = (int *)0x8A5AF4; int *CStreaming::ms_pedsLoaded = (int *)0x8E4C00; CStreamingInfo *CStreaming::ms_pEndRequestedList = (CStreamingInfo *)0x8E4C54; CStreamingInfo *CStreaming::ms_pStartRequestedList = (CStreamingInfo *)0x8E4C58; CStreamingInfo *CStreaming::ms_pEndLoadedList = (CStreamingInfo *)0x8E4C5C; CStreamingInfo *CStreaming::ms_pStartLoadedList = (CStreamingInfo *)0x8E4C60; CLoadedCarGroup &CStreaming::ms_vehiclesLoaded = *(CLoadedCarGroup*)0x8E4C24; CStreamingInfo *CStreaming::ms_aInfoForModel = (CStreamingInfo *)0x8E4CC0; CLinkList<RwObject*>& CStreaming::ms_rwObjectInstances = *(CLinkList<RwObject*>*)0x9654F0; bool& CStreaming::bLoadVehiclesInLoadScene = *(bool*)0x8A5A88; bool& CStreaming::m_bHarvesterModelsRequested = *(bool*)0x8E4B9C; bool& CStreaming::m_bStreamHarvesterModelsThisFrame = *(bool*)0x8E4B9D; void CStreaming::ImGonnaUseStreamingMemory() { ((void (__cdecl *)())0x407BE0)(); } void CStreaming::IHaveUsedStreamingMemory() { ((void (__cdecl *)())0x407BF0)(); } void CStreaming::MakeSpaceFor(unsigned int size) { ((void (__cdecl *)(unsigned int))0x40E120)(size); } void CStreaming::DisableCopBikes(bool bDisable) { ((void(__cdecl *)(bool))0x407D10)(bDisable); } unsigned int CStreaming::GetDefaultMedicModel() { return ((unsigned int(__cdecl *)())0x407D20)(); } unsigned int CStreaming::GetDefaultAmbulanceModel() { return ((unsigned int(__cdecl *)())0x407D30)(); } unsigned int CStreaming::GetDefaultFiremanModel() { return ((unsigned int(__cdecl *)())0x407D40)(); } unsigned int CStreaming::GetDefaultFireEngineModel() { return ((unsigned int(__cdecl *)())0x407DC0)(); } unsigned int CStreaming::GetDefaultCopModel() { return ((unsigned int(__cdecl *)())0x407C00)(); } unsigned int CStreaming::GetDefaultCopCarModel(unsigned int arg0) { return ((unsigned int(__cdecl *)(unsigned int))0x407C50)(arg0); } void CStreaming::LoadAllRequestedModels(bool onlyQuickRequests) { ((void(__cdecl *)(bool))0x40EA10)(onlyQuickRequests); } // Used for loading player clothes void CStreaming::LoadRequestedModels() { ((void(__cdecl *)())0x40E3A0)(); } void CStreaming::RemoveAllUnusedModels() { ((void(__cdecl *)())0x40CF80)(); } void CStreaming::RemoveModel(int modelIndex) { ((void(__cdecl *)(int))0x4089A0)(modelIndex); } void CStreaming::RequestModel(int modelIndex, int flags) { ((void(__cdecl *)(int, int))0x4087E0)(modelIndex, flags); } void CStreaming::SetModelIsDeletable(int modelIndex) { ((void(__cdecl *)(int))0x409C10)(modelIndex); } void CStreaming::SetModelTxdIsDeletable(int modelIndex) { ((void(__cdecl *)(int))0x409C70)(modelIndex); } void CStreaming::SetMissionDoesntRequireModel(int modelIndex) { ((void(__cdecl *)(int))0x409C90)(modelIndex); } void CStreaming::LoadScene(CVector const& point) { ((void(__cdecl *)(CVector const&))0x40ED80)(point); } void CStreaming::LoadSceneCollision(CVector const& coord) { ((void(__cdecl *)(CVector const&))0x40ED80)(coord); } // Converted from cdecl int CStreaming::AddEntity(CEntity *pEntity) 0x409650 int CStreaming::AddEntity(CEntity* pEntity) { return plugin::CallAndReturn<int, 0x409650, CEntity*>(pEntity); } // Converted from cdecl int CStreaming::AddImageToList(char const* filename, bool notPlayerFile) 0x407610 int CStreaming::AddImageToList(char const* filename, bool notPlayerFile) { return plugin::CallAndReturn<int, 0x407610, char const*, bool>(filename, notPlayerFile); } // Converted from cdecl void CStreaming::AddModelsToRequestList(CVector const &arg1, uint modelrequestflag) 0x40D3F0 void CStreaming::AddModelsToRequestList(CVector const& arg1, unsigned int modelrequestflag) { plugin::Call<0x40D3F0, CVector const&, unsigned int>(arg1, modelrequestflag); } // Converted from cdecl void CStreaming::AddToLoadedVehiclesList(int vehicleid) 0x408000 void CStreaming::AddToLoadedVehiclesList(int vehicleid) { plugin::Call<0x408000, int>(vehicleid); } // Converted from cdecl void CStreaming::DeleteAllRwObjects(void) 0x4090A0 void CStreaming::DeleteAllRwObjects() { plugin::Call<0x4090A0>(); } // Converted from cdecl void CStreaming::DeleteRwObjectsBehindCamera(int arg1) 0x40D7C0 void CStreaming::DeleteRwObjectsBehindCamera(int arg1) { plugin::Call<0x40D7C0, int>(arg1); } // Converted from cdecl void CStreaming::DeleteRwObjectsInSectorList(CPtrList &arg1, int arg2, int arg3) 0x407A70 void CStreaming::DeleteRwObjectsInSectorList(CPtrList& arg1, int arg2, int arg3) { plugin::Call<0x407A70, CPtrList&, int, int>(arg1, arg2, arg3); } // Converted from cdecl bool CStreaming::FinishLoadingLargeFile(char* FileName,int index) 0x408CB0 bool CStreaming::FinishLoadingLargeFile(char* FileName, int index) { return plugin::CallAndReturn<bool, 0x408CB0, char*, int>(FileName, index); } // Converted from cdecl void CStreaming::FlushChannels(void) 0x40E460 void CStreaming::FlushChannels() { plugin::Call<0x40E460>(); } // Converted from cdecl void CStreaming::FlushRequestList(void) 0x40E4E0 void CStreaming::FlushRequestList() { plugin::Call<0x40E4E0>(); } // Converted from cdecl void CStreaming::ForceLayerToRead(int arg1) 0x407A10 void CStreaming::ForceLayerToRead(int arg1) { plugin::Call<0x407A10, int>(arg1); } // Converted from cdecl int CStreaming::GetDefaultCabDriverModel(void) 0x407D50 int CStreaming::GetDefaultCabDriverModel() { return plugin::CallAndReturn<int, 0x407D50>(); } // Converted from cdecl int CStreaming::GetNextFileOnCd(int arg1,bool arg2) 0x408E20 int CStreaming::GetNextFileOnCd(int arg1, bool arg2) { return plugin::CallAndReturn<int, 0x408E20, int, bool>(arg1, arg2); } // Converted from cdecl void CStreaming::Init(void) 0x5B8AD0 void CStreaming::Init() { plugin::Call<0x5B8AD0>(); } // Converted from cdecl void CStreaming::InitImageList(void) 0x4083C0 void CStreaming::InitImageList() { plugin::Call<0x4083C0>(); } // Converted from cdecl bool CStreaming::IsCarModelNeededInCurrentZone(int modelid) 0x407DD0 bool CStreaming::IsCarModelNeededInCurrentZone(int modelid) { return plugin::CallAndReturn<bool, 0x407DD0, int>(modelid); } // Converted from cdecl bool CStreaming::IsInitialised(void) 0x407600 bool CStreaming::IsInitialised() { return plugin::CallAndReturn<bool, 0x407600>(); } // Converted from cdecl bool CStreaming::IsVeryBusy(void) 0x4076A0 bool CStreaming::IsVeryBusy() { return plugin::CallAndReturn<bool, 0x4076A0>(); } // Converted from cdecl void CStreaming::LoadCdDirectory(char const *archivename, int archiveID) 0x5B6170 void CStreaming::LoadCdDirectory(char const* archivename, int archiveID) { plugin::Call<0x5B6170, char const*, int>(archivename, archiveID); } // Converted from cdecl void CStreaming::LoadInitialPeds(void) 0x40D3D0 void CStreaming::LoadInitialPeds() { plugin::Call<0x40D3D0>(); } // Converted from cdecl void CStreaming::LoadInitialWeapons(void) 0x40A120 void CStreaming::LoadInitialWeapons() { plugin::Call<0x40A120>(); } // Converted from cdecl void CStreaming::LoadZoneVehicle(CVector const& arg1) 0x40B4B0 void CStreaming::LoadZoneVehicle(CVector const& arg1) { plugin::Call<0x40B4B0, CVector const&>(arg1); } // Converted from cdecl void CStreaming::PossiblyStreamCarOutAfterCreation(int modelid) 0x40BA70 void CStreaming::PossiblyStreamCarOutAfterCreation(int modelid) { plugin::Call<0x40BA70, int>(modelid); } // Converted from cdecl void CStreaming::ProcessEntitiesInSectorList(CPtrList &list, float arg2, float arg3, float arg4, float arg5, float arg6, float arg7, float distance, int modelrequestflag) 0x40C270 void CStreaming::ProcessEntitiesInSectorList(CPtrList& list, float arg2, float arg3, float arg4, float arg5, float arg6, float arg7, float distance, int modelrequestflag) { plugin::Call<0x40C270, CPtrList&, float, float, float, float, float, float, float, int>(list, arg2, arg3, arg4, arg5, arg6, arg7, distance, modelrequestflag); } // Converted from cdecl void CStreaming::ProcessEntitiesInSectorList(CPtrList &list ,uint modelrequestflag) 0x40C450 void CStreaming::ProcessEntitiesInSectorList(CPtrList& list, unsigned int modelrequestflag) { plugin::Call<0x40C450, CPtrList&, unsigned int>(list, modelrequestflag); } // Converted from cdecl bool CStreaming::ProcessLoadingChannel(int channelindex) 0x40E170 bool CStreaming::ProcessLoadingChannel(int channelindex) { return plugin::CallAndReturn<bool, 0x40E170, int>(channelindex); } // Converted from cdecl void CStreaming::ReInit(void) 0x40E560 void CStreaming::ReInit() { plugin::Call<0x40E560>(); } // Converted from cdecl void CStreaming::ReadIniFile(void) 0x5BCCD0 void CStreaming::ReadIniFile() { plugin::Call<0x5BCCD0>(); } // Converted from cdecl void CStreaming::ReclassifyLoadedCars(void) 0x40AFA0 void CStreaming::ReclassifyLoadedCars() { plugin::Call<0x40AFA0>(); } // Converted from cdecl void CStreaming::RemoveBigBuildings(void) 0x4093B0 void CStreaming::RemoveBigBuildings() { plugin::Call<0x4093B0>(); } // Converted from cdecl void CStreaming::RemoveBuildingsNotInArea(int area) 0x4094B0 void CStreaming::RemoveBuildingsNotInArea(int area) { plugin::Call<0x4094B0, int>(area); } // Converted from cdecl void CStreaming::RemoveCarModel(int vehicleid) 0x4080F0 void CStreaming::RemoveCarModel(int vehicleid) { plugin::Call<0x4080F0, int>(vehicleid); } // Converted from cdecl void CStreaming::RemoveCurrentZonesModels(void) 0x40B080 void CStreaming::RemoveCurrentZonesModels() { plugin::Call<0x40B080>(); } // Converted from cdecl void CStreaming::RemoveInappropriatePedModels(void) 0x40B3A0 void CStreaming::RemoveInappropriatePedModels() { plugin::Call<0x40B3A0>(); } // Converted from cdecl bool CStreaming::RemoveLeastUsedModel(uchar flag) 0x40CFD0 bool CStreaming::RemoveLeastUsedModel(unsigned char flag) { return plugin::CallAndReturn<bool, 0x40CFD0, unsigned char>(flag); } // Converted from cdecl bool CStreaming::RemoveLoadedVehicle(void) 0x40C020 bool CStreaming::RemoveLoadedVehicle() { return plugin::CallAndReturn<bool, 0x40C020>(); } // Converted from cdecl void CStreaming::RenderEntity(CLink<CEntity *> *arg1) 0x4096D0 void CStreaming::RenderEntity(CLink<CEntity*> *arg1) { plugin::Call<0x4096D0, CLink<CEntity*>*>(arg1); } // Converted from cdecl void CStreaming::RequestBigBuildings(CVector const &arg1) 0x409430 void CStreaming::RequestBigBuildings(CVector const& arg1) { plugin::Call<0x409430, CVector const&>(arg1); } // Converted from cdecl void CStreaming::RequestFile(int index, int offset, int size, int imgid, int modelrequestflag) 0x40A080 void CStreaming::RequestFile(int index, int offset, int size, int imgid, int modelrequestflag) { plugin::Call<0x40A080, int, int, int, int, int>(index, offset, size, imgid, modelrequestflag); } // Converted from cdecl void CStreaming::RequestFilesInChannel(int channelindex) 0x409050 void CStreaming::RequestFilesInChannel(int channelindex) { plugin::Call<0x409050, int>(channelindex); } // Converted from cdecl void CStreaming::RequestModelStream(int streamnum) 0x40CBA0 void CStreaming::RequestModelStream(int streamnum) { plugin::Call<0x40CBA0, int>(streamnum); } // Converted from cdecl void CStreaming::RequestSpecialChar(int index,char const *txdname,int modelrequestflag) 0x40B450 void CStreaming::RequestSpecialChar(int index, char const* txdname, int modelrequestflag) { plugin::Call<0x40B450, int, char const*, int>(index, txdname, modelrequestflag); } // Converted from cdecl void CStreaming::RequestSpecialModel(int slot,char const *name, int modelrequestflag) 0x409D10 void CStreaming::RequestSpecialModel(int slot, char const* name, int modelrequestflag) { plugin::Call<0x409D10, int, char const*, int>(slot, name, modelrequestflag); } // Converted from cdecl void CStreaming::RequestVehicleUpgrade(int modelid, int modelrequestflag) 0x408C70 void CStreaming::RequestVehicleUpgrade(int modelid, int modelrequestflag) { plugin::Call<0x408C70, int, int>(modelid, modelrequestflag); } // Converted from cdecl void CStreaming::RetryLoadFile(int streamnum) 0x4076C0 void CStreaming::RetryLoadFile(int streamnum) { plugin::Call<0x4076C0, int>(streamnum); } // Converted from cdecl void CStreaming::Save(void) 0x5D29A0 void CStreaming::Save() { plugin::Call<0x5D29A0>(); } // Converted from cdecl void CStreaming::SetLoadVehiclesInLoadScene(bool bLoadVehiclesInLoadScene) 0x407A30 void CStreaming::SetLoadVehiclesInLoadScene(bool bLoadVehiclesInLoadScene) { plugin::Call<0x407A30, bool>(bLoadVehiclesInLoadScene); } // Converted from cdecl void CStreaming::SetMissionDoesntRequireAnim(int index) 0x48B570 void CStreaming::SetMissionDoesntRequireAnim(int index) { plugin::Call<0x48B570, int>(index); } // Converted from cdecl void CStreaming::SetMissionDoesntRequireSpecialChar(int index) 0x40B490 void CStreaming::SetMissionDoesntRequireSpecialChar(int index) { plugin::Call<0x40B490, int>(index); } // Converted from cdecl void CStreaming::Shutdown(void) 0x4084B0 void CStreaming::Shutdown() { plugin::Call<0x4084B0>(); } // Converted from cdecl void CStreaming::StartRenderEntities(void) 0x4096C0 void CStreaming::StartRenderEntities() { plugin::Call<0x4096C0>(); } // Converted from cdecl bool CStreaming::StreamAmbulanceAndMedic(bool bStream) 0x40A2A0 bool CStreaming::StreamAmbulanceAndMedic(bool bStream) { return plugin::CallAndReturn<bool, 0x40A2A0, bool>(bStream); } // Converted from cdecl void CStreaming::StreamCopModels(int townID) 0x40A150 void CStreaming::StreamCopModels(int townID) { plugin::Call<0x40A150, int>(townID); } // Converted from cdecl bool CStreaming::StreamFireEngineAndFireman(bool bStream) 0x40A400 bool CStreaming::StreamFireEngineAndFireman(bool bStream) { return plugin::CallAndReturn<bool, 0x40A400, bool>(bStream); } // Converted from cdecl void CStreaming::StreamOneNewCar(void) 0x40B4F0 void CStreaming::StreamOneNewCar() { plugin::Call<0x40B4F0>(); } // Converted from cdecl void CStreaming::StreamPedsIntoRandomSlots(int *modelid) 0x40BDA0 void CStreaming::StreamPedsIntoRandomSlots(int* modelid) { plugin::Call<0x40BDA0, int*>(modelid); } // Converted from cdecl void CStreaming::StreamVehiclesAndPeds(void) 0x40B700 void CStreaming::StreamVehiclesAndPeds() { plugin::Call<0x40B700>(); } // Converted from cdecl void CStreaming::StreamVehiclesAndPeds_Always(CVector const &arg1) 0x40B650 void CStreaming::StreamVehiclesAndPeds_Always(CVector const& arg1) { plugin::Call<0x40B650, CVector const&>(arg1); } // Converted from cdecl void CStreaming::StreamZoneModels(void) 0x40A560 void CStreaming::StreamZoneModels() { plugin::Call<0x40A560>(); } // Converted from cdecl void CStreaming::StreamZoneModels_Gangs(void) 0x40AA10 void CStreaming::StreamZoneModels_Gangs() { plugin::Call<0x40AA10>(); } // Converted from cdecl void CStreaming::Update(void) 0x40E670 void CStreaming::Update() { plugin::Call<0x40E670>(); } // Converted from cdecl void CStreaming::UpdateForAnimViewer(void) 0x40E960 void CStreaming::UpdateForAnimViewer() { plugin::Call<0x40E960>(); } // Converted from cdecl void CStreaming::RequestTxd(uint index,uint modelrequestflag) 0x407100 void CStreaming::RequestTxd(unsigned int index, unsigned int modelrequestflag) { plugin::Call<0x407100, unsigned int, unsigned int>(index, modelrequestflag); } // Converted from cdecl bool CStreaming::HasVehicleUpgradeLoaded(int modelid) 0x407820 bool CStreaming::HasVehicleUpgradeLoaded(int modelid) { return plugin::CallAndReturn<bool, 0x407820, int>(modelid); } // Converted from cdecl void CStreaming::ClearFlagForAll(uint arg1) 0x407A40 void CStreaming::ClearFlagForAll(unsigned int arg1) { plugin::Call<0x407A40, unsigned int>(arg1); } // Converted from cdecl void CStreaming::RequestAllModels(void) 0x4095C0 void CStreaming::RequestAllModels() { plugin::Call<0x4095C0>(); } // Converted from cdecl void CStreaming::RemoveEntity(CLink<CEntity *> *pEntity) 0x409710 void CStreaming::RemoveEntity(CLink<CEntity*> *pEntity) { plugin::Call<0x409710, CLink<CEntity*>*>(pEntity); } // Converted from cdecl bool CStreaming::DeleteLeastUsedEntityRwObject(bool arg1,uchar flag) 0x409760 bool CStreaming::DeleteLeastUsedEntityRwObject(bool arg1, unsigned char flag) { return plugin::CallAndReturn<bool, 0x409760, bool, unsigned char>(arg1, flag); } // Converted from cdecl bool CStreaming::DeleteRwObjectsBehindCameraInSectorList(CPtrList &arg1, int arg2) 0x409940 bool CStreaming::DeleteRwObjectsBehindCameraInSectorList(CPtrList& arg1, int arg2) { return plugin::CallAndReturn<bool, 0x409940, CPtrList&, int>(arg1, arg2); } // Converted from cdecl bool CStreaming::DeleteRwObjectsNotInFrustumInSectorList(CPtrList &arg1, int arg2) 0x4099E0 bool CStreaming::DeleteRwObjectsNotInFrustumInSectorList(CPtrList& arg1, int arg2) { return plugin::CallAndReturn<bool, 0x4099E0, CPtrList&, int>(arg1, arg2); } // Converted from cdecl void CStreaming::RequestPlayerSection(int index, char const *arg2,int modelrequestflag) 0x409FF0 void CStreaming::RequestPlayerSection(int index, char const* arg2, int modelrequestflag) { plugin::Call<0x409FF0, int, char const*, int>(index, arg2, modelrequestflag); } // Converted from cdecl void CStreaming::PurgeRequestList(void) 0x40C1E0 void CStreaming::PurgeRequestList() { plugin::Call<0x40C1E0>(); } // Converted from cdecl void CStreaming::AddLodsToRequestList(CVector const &arg1, uint modelrequestflag) 0x40C520 void CStreaming::AddLodsToRequestList(CVector const& arg1, unsigned int modelrequestflag) { plugin::Call<0x40C520, CVector const&, unsigned int>(arg1, modelrequestflag); } // Converted from cdecl bool CStreaming::ConvertBufferToObject(char *pFileContect,int index, int streamnum) 0x40C6B0 bool CStreaming::ConvertBufferToObject(char* pFileContect, int index, int streamnum) { return plugin::CallAndReturn<bool, 0x40C6B0, char*, int, int>(pFileContect, index, streamnum); } // Converted from cdecl void CStreaming::LoadCdDirectory(void) 0x5B82C0 // load all .img except player.img void CStreaming::LoadCdDirectory() { plugin::Call<0x5B82C0>(); } // Converted from cdecl void CStreaming::Load(void) 0x5D29E0 void CStreaming::Load() { plugin::Call<0x5D29E0>(); } // Converted from cdecl void CStreaming::InstanceLoadedModels(CVector const &arg1) 0x4084F0 void CStreaming::InstanceLoadedModels(CVector const& arg1) { plugin::Call<0x4084F0, CVector const&>(arg1); } // Converted from cdecl void CStreaming::DeleteRwObjectsAfterDeath(CVector const &arg1) 0x409210 void CStreaming::DeleteRwObjectsAfterDeath(CVector const& arg1) { plugin::Call<0x409210, CVector const&>(arg1); } // Converted from cdecl void CStreaming::StreamPedsForInterior(int interior) 0x40BBB0 void CStreaming::StreamPedsForInterior(int interior) { plugin::Call<0x40BBB0, int>(interior); } // Converted from cdecl bool CStreaming::AreAnimsUsedByRequestedModels(int arg1) 0x407AD0 bool CStreaming::AreAnimsUsedByRequestedModels(int arg1) { return plugin::CallAndReturn<bool, 0x407AD0, int>(arg1); } // Converted from cdecl bool CStreaming::HasModelLoaded(int modelid) 0x407800 bool CStreaming::HasModelLoaded(int modelid) { return plugin::CallAndReturn<bool, 0x407800, int>(modelid); } // Converted from cdecl bool CStreaming::AreTexturesUsedByRequestedModels(int arg1) 0x409A90 bool CStreaming::AreTexturesUsedByRequestedModels(int arg1) { return plugin::CallAndReturn<bool, 0x409A90, int>(arg1); } // Converted from cdecl void CStreaming::RemoveTexture(int index) 0x40C180 void CStreaming::RemoveTexture(int index) { plugin::Call<0x40C180, int>(index); }
/** * Take a CPPN and some sprite information to create a level * for a grid-based game. * * @param n The Neural network CPPN * @param levelWidth Width in grid units * @param levelHeight Height in grid units * @param defaultBackground char that corresponds to nothing/floor/background * @param border char that surrounds level as a well (TODO: not all games have this) * @param fixed array of chars for fixed items, like walls, etc. * @param unique array of chars for items/sprites of which there must be exactly one * @param random array of chars for items/sprites of which there can be a variable/random number * @param randomItems Number of items from the random array to place * @return String array with level layout */ public static String[] generateLevelFromCPPN(Network n, double[] inputMultiples, int levelWidth, int levelHeight, char defaultBackground, char border, char[] fixed, char[] unique, char[] random, int randomItems, char[] bottomItems) { char[][] level = new char[levelHeight+2][levelWidth+2]; for(int i = 0; i < level.length; i++) { Arrays.fill(level[i], defaultBackground); } for(int y = 0; y < levelHeight+2; y++) { level[y][0] = border; level[y][levelWidth+1] = border; } for(int x = 1; x < levelWidth+1; x++) { level[0][x] = border; level[levelHeight+1][x] = border; } double[] uniqueScores = new double[unique.length]; Arrays.fill(uniqueScores, Double.NEGATIVE_INFINITY); int[][] uniqueLocations = new int[unique.length][2]; for(int y = 1; y < levelHeight+1; y++) { for(int x = 1; x < levelWidth+1; x++) { double[] inputs = GraphicsUtil.get2DObjectCPPNInputs(x, y, levelWidth, levelHeight, -1); for(int i = 0; i < inputMultiples.length; i++) { inputs[i] = inputs[i] * inputMultiples[i]; } double[] outputs = n.process(inputs); if(outputs[PRESENCE_INDEX] > PRESENCE_THRESHOLD) { double[] fixedActivations = new double[fixed.length]; System.arraycopy(outputs, FIRST_FIXED_INDEX, fixedActivations, 0, fixed.length); int whichFixed = StatisticsUtilities.argmax(fixedActivations); level[y][x] = fixed[whichFixed]; } if(level[y][x] == defaultBackground) { for(int i = 0; i < unique.length; i++) { if(outputs[i+fixed.length] > uniqueScores[i] && unclaimed(x,y,uniqueLocations)) { uniqueScores[i] = outputs[i+fixed.length]; uniqueLocations[i] = new int[]{x,y}; } } if(randomItems > 0) { if(outputs[fixed.length+unique.length] > RANDOM_ITEM_THRESHOLD) { level[y][x] = random[RandomNumbers.randomGenerator.nextInt(random.length)]; randomItems--; } } } } } for(int i = 0; i < unique.length; i++) { level[uniqueLocations[i][1]][uniqueLocations[i][0]] = unique[i]; } String[] stringLevel = new String[levelHeight+2]; for(int i = 0; i < level.length; i++) { stringLevel[i] = new String(level[i]); } return stringLevel; }
Propagating plasmons on silver nanowires Chemically synthesized Ag nanowires (NWs) can serve as waveguides to support propagating surface plasmons (SPs). By using the propagating SPs on Ag NWs, the surface-enhanced Raman scattering of molecules, located in the nanowire-nanoparticle junction a few microns away from the laser spot on one end of the NW, was excited. The propagating SPs can excite the excitons in quantum dots, and in reverse, the decay of excitons can generate SPs. The direction and polarization of the light emitted through the Ag NW waveguide. The emission polarization depends strongly on the shape of the NW terminals. In branched NW structures, the SPs can be switched between the main NW and the branch NW, by tuning the incident polarization. The light of different wavelength can also be controlled to propagate along different ways. Thus, the branched NW structure can serve as controllable plasmonic router and multiplexer.
/** * * @param wr * @param eFile * @param showWarning * @return null if no checkout request was needed (file does not exist or is writable), * if checkout was asked, status represents the resul (isOK()) */ public static IStatus askFileWriteAccess(IFile eFile) { IStatus result = null; if (eFile != null) { File f = eFile.getFullPath().toFile(); if (!f.canWrite()) { if (BuildFatJar.getScmAutoCheckout()) { IFile[] editFiles = new IFile[1]; editFiles[0] = eFile; Shell shell = new Shell(); result = ResourcesPlugin.getWorkspace().validateEdit(editFiles, shell); } } } return result; }
Two weeks before the election, Donald J. Trump delivered a speech in Charlotte, N.C., sketching his “New Deal for Black America.” It was a set of ideas promising greater school choice, safer communities, lower taxes and better infrastructure. The four-page outline posted to his campaign website that summarizes it — a document subtitled “A Plan for Urban Renewal” — is today the closest thing the president-elect has to a proposal for America’s cities. When Mr. Trump announced plans on Monday to nominate Ben Carson to lead the Department of Housing and Urban Development, he said the two men had “talked at length about my urban renewal agenda.” His language has an odd ring to it, not solely for marrying Franklin D. Roosevelt’s New Deal with the post-World War II era of urban renewal. If Mr. Trump was reaching for a broadly uplifting concept — renewal — he landed instead on a term with very specific, and very negative, connotations for the population he says he aims to help.
Vine-Shoots as Enological Additives. A Study of Acute Toxicity and Cytotoxicity Toasted vine-shoots have been recently proposed as enological additives that can be used to improve the sensorial profile of wines. However, the possible toxicity of this new winery practice has not been studied so far. The aim of this study was to evaluate the toxicity of Tempranillo, Cencibel, and Cabernet Sauvignon toasted vine-shoots when used in winemaking. First, vine-shoots were characterized in terms of minerals and phenolic and furan compounds, and then their acute toxicity and cytotoxicity were studied using Microtox® and the metabolic reduction of 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assays. High EC50 values were obtained when the Microtox® assay was applied to vine-shoot aqueous extracts, similar to the case of herbal infusions. When the MTT assay was used, a cell viability above 70% was observed in all the wines made with those vine-shoots, and an even greater viability was observed in the case of Cabernet Sauvignon. Therefore, it was concluded that those vine-shoots have no cytotoxic potential. Introduction Vine-shoots are the most abundant residue of vineyards, with around 2 tons/hectare/ year produced worldwide during vine pruning. In 2019, the area of vineyards worldwide amounted to nearly 7.5 million hectares, highlighting Spain as the most important vine country, with the Castilla-La Mancha region cultivating around 50% of such surface. Therefore, a huge amount of this residue is generated, which should be utilized in alternative ways since it is usually left behind or burned on vineyards, causing significant environmental problems. Vine-shoots are mainly composed of 94% lignocellulosic polymeric material, 55% cellulose and hemicellulose, and 39% lignin. They also contain a small fraction of minerals and phenolic and volatile compounds, with minerals being the most abundant compounds, among which K and Ca have the highest content (5 g/kg each), depending on the characteristics of the vineyard's soil. Most studies on vine-shoots have focused on their phenolic composition, which usually reaches an average of 3 g/kg, depending on variety. Volatile compounds represent the smallest proportion of constituents in vine-shoots, which normally do not exceed 0.2 g/kg. Lignocellulosic composition is a main factor in vine-shoots and is the focus of several exploitation studies. However, its use based on the minority compound fraction is highly limited, although some lignocellulosic materials have been recently used as a potential Two different extracts (e) were prepared with the toasted vine-shoots-one with deionized water (W) as control and the other with ethanol/water solution at 12.0% (v/v; E)-to simulate the contact of vine-shoot pieces in a model wine solution as an enological additive, according to the study by Cebrin-Tarancn. In both cases, vine-shoots with a concentration of 24 g/L were used, which is twice the maximum concentration used in maceration model wines, according to the Cebrin-Tarancn procedure, to simulate a more unfavorable situation. For extraction, which was conducted in duplicate for each vine-shoot variety and extractant, maceration was performed in the dark at room temperature, followed by stirring at 800 rpm for 72 h. A total of 12 extracts were obtained, which were filtered using filter paper and then stored at −22 C until their analysis. The following extracts were obtained: Cencibel aqueous extract (CeW), Cencibel ethanol/water solution extract (CeE), Cabernet Sauvignon aqueous extract (CSeW), Cabernet Sauvignon ethanol/water solution extract (CSeE), Tempranillo aqueous extract (TeW), and Tempranillo ethanol/water solution extract (TeE). Wines Wines (w) from Tempranillo, Cencibel, and Cabernet Sauvignon cultivars were made in duplicate according to the classical red winemaking process. After alcoholic fermentation, toasted granulated vine-shoots were added to their corresponding wines, prepared as outlined in Section 2.1. Each wine was placed in contact with its respective vine-shoots, according to the Cebrin-Tarancn method. Therefore, the following wines were obtained: CwC, CSwCS, and TwT. As a control, wines without the addition of vine-shoots were also obtained: Cw, CSw, and Tw. Subsequently, the enological parameters of both the wines that had been in contact with vine-shoots and the control wines were evaluated according to official European methods. Vine-Shoot Extraction Before the chemical analysis of the toasted vine-shoots, an extraction step was performed according to Cebrin's method. Briefly, 20 g of vine-shoots was ground and toasted as outlined in Section 2.1 and then moisturized with 100 g of ethanol/water solution (12.5%, pH 3.62) for 8 h at room temperature. Then, another 100 g of the same solution was added before extraction, which was performed using a microwave NEOS device (Milestone Srl, Sorisole, BG, Italy). Extraction was performed at 75 C (600 W) for 12 min under reflux to prevent dryness. Then, the extract was centrifuged at 4000 rpm for 10 min, and the supernatant was separated. Subsequently, the solid sample was extracted twice until exhaustion, using the same volume of ethanolic solution (100 mL). The three extracts obtained were mixed and kept at 5-7 C until their analysis. All extraction procedures were performed in duplicate, hence yielding a total of six extracts. Furan Composition The six extracts obtained according to Section 2.3.1 were extracted using headspace sorptive and stir bar extraction (HS-SBSE) and analyzed by gas chromatography (GC) according to the method of Snchez-Gmez. The extraction was carried out with 22 mLc of extract stirred at 500 rpm during 60 min. An automated thermal desorption unit (TDU; Gerstel, Mlheim an der Ruhr, Germany) mounted on an Agilent 7890A gas chromatograph coupled to an Agilent 5975C quadrupole electron ionization mass spectrometric detector (Agilent Technologies) equipped with a fused silica capillary column (BP21 stationary phase, 30 m length, 0.25 mm I.D., 0.25 m film thickness; SGE, Ringwood, Australia) was used. The carrier gas used was helium, with a constant column pressure of 20.75 psi. Mass spectrometry (MS) data acquisition was performed in positive scan mode. To avoid matrix interference, MS quantification was performed in single-ion monitoring mode using characteristic m/z values. Identification of the compounds was performed using the NIST library and confirmed by comparison with the mass spectra and retention time of their standards. The standards employed were purchased from Sigma-Aldrich (the numbers in parentheses indicate the m/z values used for quantification): 2-furanmethanol (m/z = 98), furfural (m/z = 96), 5-hydroxymethylfurfural (m/z = 97), and 5-methylfurfural (m/z = 110). Here, 3-methyl-1-pentanol was used as the internal standard. Quantification was based on calibration curves of the respective standards at five different concentrations (0.5-200 mg/L; R 2 = 0.97-0.99). All analyses were performed in triplicate. Mineral Composition In this study, the following minerals were analyzed: Al, As, Be, Bi, B, Ca, Cd, Co, Cr, Cu, Fe, K, La, Li, Mg, Mn, Mo, Na, Ni, Pb, Rb, Sb, Se, Si, Sr, Ti, Tl, V, and Zn. These minerals were quantified in toasted vine-shoots by inductively coupled plasma optical emission spectrometry (ICP-OES) using an inductively coupled plasma spectrometer (iCAP 6500 Duo; Thermo Fisher Scientific, Madrid, Spain). For digestion, 6 mL of a freshly prepared mixture of HNO 3 and H 2 O 2 (5:1, v/v) was added to 0.5 g of ground vine-shoots (as detailed in Section 2.1) and diluted up to 25 mL with distilled water. Quantification was based on calibration curves of the respective standards (Sigma-Aldrich) at five different concentrations (0.01-25.00 mg/L; R 2 > 0.99). All analyses were performed in triplicate. Microtox ® Assay for Vine-Shoot Extracts Acute toxicity was estimated by determining the bioluminescence inhibition of the marine Gram-negative bacterium V. fischeri after 15 min of exposure to the different extracts, according to. The bacteria were reconstituted with a nontoxic 2% NaCl solution and incubated for 20 min at 5.5 ± 1 C. The light emitted by the bacteria in contact with the samples was analyzed using a Microtox ® M500 (AZUR Environmental, Carlsbad, CA, USA), and the results obtained were processed using the MTX-Microtox ® program. Toxicity was estimated from the EC 50 parameter, which expresses the concentration (in mg/mL) of extract that inhibits 50% of bioluminescence. This method is normally used in aqueous samples, and it is not usually used for wines because of the interference that occurs with the red color of wines; therefore, it was used only for extracts. MTT Assay for Vine-Shoot Extracts and Wines The MTT assay is a colorimetric test that is used to determine the viability of cells via metabolic activity. It is based on the metabolic reduction of 3-(4,5-dimethylthiazol-2-yl)-2,5diphenyltetrazolium bromide (MTT) to formazan, which is mediated by the mitochondrial enzyme oxidoreductase succinate dehydrogenase, thus reflecting the mitochondrial activity of the cells and, consequently, the number of viable cells present. Yellow water-soluble MTT is metabolically reduced in viable cells to purple-colored formazan crystals. To perform the MTT assay, embryonic 3T3-L1 fibroblasts (American Type Culture Collection, Manassas, VA, USA) were cultured as per the supplier's instructions. In all the experiments, cells were used within the fourth passage. The cells were grown on 96-well sterile plates at a cellular density of 2 10 3 cells/well in a cell culture medium (Dulbecco's modified Eagle's medium (DMEM), 90%), supplemented with L-glutamine (1%), penicillin/streptomycin (0.5%), and inactivated fetal bovine serum (FBS, 10%), at 37 C in a 5% CO 2 incubator. When the cells reached optimum confluence (70-80%), the study samples replaced the culture medium. The MTT viability assay was performed as previously described in the study by Escobar, with a slight modification. An MTT stock solution in sterile phosphatebuffered saline (PBS, 5 mg/mL) was freshly prepared and filtered using syringe filters (<0.2 m pore size; Nalgene™ Syringe Filters; Thermo Fisher Scientific, Waltham, MA USA). Working MTT solution was diluted 1:10 in DMEM without phenol red (without PBS). The medium was then removed from the culture plates, and the cells were washed with DMEM without phenol red. Then, the working MTT solution (100 L) was deposited in each well, and the cell culture plates were incubated for 3 h under standard culture conditions. Then, the MTT solution was carefully removed, and the cells were washed with PBS. Finally, to solubilize the formazan crystals that were formed, 100 L of dimethyl sulfoxide (DMSO) was added to each well, followed by stirring at room temperature for 10-15 min, yielding a purple-colored solution. After solubilization, the solutions were transferred to fresh 96-well plates, and absorbance at an optical density (OD) wavelength of 595 nm was measured using spectrophotometry (Asys UVM 340; Microplate Readers, Cambridge, UK). In general, the number of viable cells correlates with the color intensity determined. Data obtained from at least three replicates in each experimental condition from two independent experiments were used for analysis. To calculate the cellular viability, the following equation was used: %Viability = 100 Foods 2021, 10, 1267 6 of 16 transferred to fresh 96-well plates, and absorbance at an optical density (OD) wavelength of 595 nm was measured using spectrophotometry (Asys UVM 340; Microplate Readers, Cambridge, UK). In general, the number of viable cells correlates with the color intensity determined. Data obtained from at least three replicates in each experimental condition from two independent experiments were used for analysis. To calculate the cellular viability, the following equation was used: where OD595a is the color intensity of the problem assay, and OD595b is the reference. All values become final ODs after the subtraction of background absorbance (wells without cells but exposed to MTT, washed, and exposed to DMSO). First, the cytotoxicity of the ethanol solvent at 12% was checked. For this purpose, concentration-response curves were created by dilution in the range of 1:10 3 to 1:10 6 to prevent the final ethanol concentration in the wells from exceeding 0.1% (v/v). The effect OD Foods 2021, 10, 1267 6 of 16 transferred to fresh 96-well plates, and absorbance at an optical density (OD) wavelength of 595 nm was measured using spectrophotometry (Asys UVM 340; Microplate Readers, Cambridge, UK). In general, the number of viable cells correlates with the color intensity determined. Data obtained from at least three replicates in each experimental condition from two independent experiments were used for analysis. To calculate the cellular viability, the following equation was used: where OD595a is the color intensity of the problem assay, and OD595b is the reference. All values become final ODs after the subtraction of background absorbance (wells without cells but exposed to MTT, washed, and exposed to DMSO). First, the cytotoxicity of the ethanol solvent at 12% was checked. For this purpose, concentration-response curves were created by dilution in the range of 1:10 3 to 1:10 6 to prevent the final ethanol concentration in the wells from exceeding 0.1% (v/v). The effect (595a)/ Foods 2021, 10, 1267 6 transferred to fresh 96-well plates, and absorbance at an optical density (OD) wavele of 595 nm was measured using spectrophotometry (Asys UVM 340; Microplate Read Cambridge, UK). In general, the number of viable cells correlates with the c intensity determined. Data obtained from at least three replicates in each experime condition from two independent experiments were used for analysis. To calculate cellular viability, the following equation was used: where OD595a is the color intensity of the problem assay, and OD595b is the reference values become final ODs after the subtraction of background absorbance (wells wit cells but exposed to MTT, washed, and exposed to DMSO). First, the cytotoxicity of the ethanol solvent at 12% was checked. For this purp concentration-response curves were created by dilution in the range of 1:10 3 to 1:1 prevent the final ethanol concentration in the wells from exceeding 0.1% (v/v). The e OD Foods 2021, 10, 1267 6 transferred to fresh 96-well plates, and absorbance at an optical density (OD) wavelen of 595 nm was measured using spectrophotometry (Asys UVM 340; Microplate Read Cambridge, UK). In general, the number of viable cells correlates with the c intensity determined. Data obtained from at least three replicates in each experime condition from two independent experiments were used for analysis. To calculate cellular viability, the following equation was used: where OD595a is the color intensity of the problem assay, and OD595b is the reference. values become final ODs after the subtraction of background absorbance (wells with cells but exposed to MTT, washed, and exposed to DMSO). First, the cytotoxicity of the ethanol solvent at 12% was checked. For this purp concentration-response curves were created by dilution in the range of 1:10 3 to 1:10 prevent the final ethanol concentration in the wells from exceeding 0.1% (v/v). The ef 595b where OD 595a is the color intensity of the problem assay, and OD 595b is the reference. All values become final ODs after the subtraction of background absorbance (wells without cells but exposed to MTT, washed, and exposed to DMSO). First, the cytotoxicity of the ethanol solvent at 12% was checked. For this purpose, concentration-response curves were created by dilution in the range of 1:10 3 to 1:10 6 to prevent the final ethanol concentration in the wells from exceeding 0.1% (v/v). The effect of this solvent on the viability of 3T3-L1 was measured by the MTT assay using Equation, where OD 595a is the average OD of wells corresponding to the ethanol solvent and OD 595b is the average OD of all wells of untreated control cells (C-control). The absence of cytotoxicity (100% viability) was attributed to the C-control. Moreover, the cytotoxicity of vine-shoot ethanol/water extracts and the dilution of vine-shoot ethanol/water (12%) extracts were assessed, for which 50% viability was determined. For this purpose, respective dose-response curves were created. Viability was also determined using Equation, where OD 595a is the average OD of wells corresponding to vine-shoot extracts (CeE, CSeE, or TeE), and OD 595b is the average OD of wells corresponding to ethanol solvent at 12% (1:10 3 ). The absence of cytotoxicity (100% viability) was attributed to the control ethanol solvent at 12%. It should be noted that the dilution of the vine-shoots that produced 50% 3T3-L1 viability was 1:10 4 for all vine-shoot extracts tested. Therefore, dilution of control wines and wines with vine-shoots was performed in the range of 1:10 3 to 1:10 6. Finally, the cytotoxicity of wines with vine-shoots was assessed. Concentrationresponse curves of all wines (Tw, Cw, CSw, TwT, CwC, and CSwCS) were created by dilution in the range of 1:10 3 to 1:10 6. Different dilutions were prepared in a cell culture medium at the beginning of each experiment, and the cells were further incubated under cell culture conditions for 72 h. Three controls were included on the same plates as follows: C-control, ethanol solvent at 12% (cells treated with 12% ethanol/water solution, simulating the highest alcoholic degree of wines), and vine-shoot extracts (cells macerated with vineshoots, CeE, CSeE, and TeE, in 12% ethanol/water solution). Viability was determined using the same previously mentioned equation, where OD 595a is the average OD of wells corresponding to control wines (Cw, CSw, or Tw) or those with vine-shoots (CwC, CSwCS, or TwT), and OD 595b is the average OD of all wells of C-control. The absence of cytotoxicity (100% viability) was attributed to the C-control. The results are presented as a percentage of the following controls: C-control for Tw, Cw, CSw, TwT, CwC, and CSwCS and ethanol solvent at 12% for CeE, CSeE, and TeE. Statistical Analysis The descriptive analysis results regarding vine-shoot parameters composition and toxicity results (Microtox ® and MTT assays) were analyzed by one-way analysis of variance (ANOVA) at 95% probability level according to Fisher's least significant difference (LSD) to determine the differences among the samples. Additionally, a multivariate analysis of variance (MANOVA) was performed with the purpose of having an overall view of the influence that variety and extractant factors have in the Microtox ® assays and that wine type and the addition of vine-shoots factors have in the MTT assay. Principal component analysis (PCA) was performed to summarize the results for the vine-shoots composition and Pearson's correlation analysis was summarized to investigate the relationship between toxicity results (Microtox ® and MTT assays) and analyzed compounds. All statistical analyses were conducted using the Statgraphics Centurion statistical program (version 18.1.12; StatPoint, Inc., The Plains, VA, USA). Vine-Shoot Composition The chemical compounds capable of being transferred from vine-shoots to aqueous and ethanolic solutions are, according to research by Cebrin-Tarancn, some phenolics, furans, and minerals, which are shown in Table 1. In that study, the authors also concluded that this transfer varied depending on the type of compound and matrix and that the transferred proportion was very small but sufficient to influence the final quality of the wines. It can be seen that the most abundant compounds were minerals (around 75%), followed by phenolic (around 20%) and furan (around 1%) compounds. As is already known, flavanols were found to be highly abundant in the group of phenolic compounds, constituting around 65% of the phenolic fraction in the samples studied, with the amount of (−)-epicatechin being twice that of (+)-catechin. In addition, ellagic acid and transresveratrol were found to constitute approximately 19% and 5%, respectively, of the total phenolic compounds. It can be observed that the Cencibel vine-shoots had a higher total phenolic content than that of Cabernet Sauvignon and Tempranillo. Cencibel was found to exhibit the highest content of flavanols and phenolic acids, and Cabernet Sauvignon was found to exhibit the highest content of total stilbenes, although -viniferine was found to have a higher concentration in Cencibel. It should be noted that no quercetin, a flavonol, was found in the Tempranillo vine-shoots. Furan compounds are originally present in vineshoots and increase in concentration with toasting. They were found to be more abundant in Cabernet Sauvignon, with the lowest content found in Tempranillo, 2-furanmethanol being the only one found in the three varieties in similar concentrations. Other furans were found to have significantly lower concentrations in Tempranillo vine-shoots, although 5-hydroxymethylfurfural had a similar concentration in Cencibel and an almost doubled concentration in Cabernet Sauvignon. Finally, the total mineral content observed was mainly due to the high values of K, Ca, Mg, and Na, which are the main macronutrients of vines and are found in significantly high concentrations in Cencibel and low concentrations in Cabernet Sauvignon vine-shoots. Minority minerals were also found to constitute the highest total content in Cencibel, similar to Tempranillo and Cabernet Sauvignon vineshoots. However, some metals, such as Cr, are found only in Cencibel, whereas Bi and Pb are not found in Cabernet Sauvignon, while Mn and Co are found in significantly high concentrations in Cabernet Sauvignon vine-shoots. All of this suggests that the soil in which the three vine varieties are grown provides a different mineral profile, given that they were all cultivated in the same way. The results outlined in Table 1, grouped into organic compounds (phenolics, furans) and mineral compounds, were subjected to separate principal component analysis (PCA), as shown in Figures 1 and 2, respectively. In both cases, it can be observed that there was favorable separation of the three varieties of vine-shoots using two statistical functions. In the case of organic compounds, the first component explained 41.67% of the variance and the second 30.94%, with -viniferine, ellagic acid, and gallic acid being the variables with the greatest weight in component 1 and piceatannol, 5-hydroxymethylfurfural, and 2-furancarboxaldehyde being those in component 2 ( Figure 1). In the case of minerals, the separation was even better, with component 1 explaining 60.76% of the variance and component 2 explaining 26.18% of it (with Fe, Na, and K being the variables with the greatest discriminant capacity in component 1 and Mn, Tl, and Sb being the ones with the greatest weight in component 2; Figure 2). Therefore, it can be concluded that the three varieties of vine-shoots are different in terms of their chemical composition and may exhibit different behaviors in toxicity tests. Table 2 shows the results of the Microtox ® assay in terms of EC 50. Generally, EC 50 represents the effective lethal concentration (in mg/mL) that corresponds to the proportion of extract that causes mortality or inhibition of 50% of the exposed bacteria (V. fischeri). When all the extracts were compared, significant differences were observed among them. It is worth mentioning that the extracts obtained from the Tempranillo variety were those that showed the highest (TeE) and lowest (TeW) values of EC 50, whereas the rest of the extracts showed mean values within this interval. With regard to each variety, it can be observed that, for the Tempranillo and Cabernet Sauvignon vine−shoots, the ethanol/water solution extracts had high EC 50 values, although such differences were significant only for Tempranillo. This indicates that a larger amount of ethanol/water extracts was necessary to reduce the bioluminescence of the bacteria by half since the higher the EC 50 value, the lower the toxicity. Therefore, as previously mentioned, the lowest values were found for the aqueous extract of Tempranillo, hence making this extract the most effective one of all extracts against V. fischeri. In view of these results, and with the aim of highlighting the influence of each factor studied (vine−shoot variety and extractant) on EC 50, a multivariate analysis of variance (MANOVA) was performed. The results indicated that the extractant (water or 12% ethanol/water solution) selected was the most influential factor on acute toxicity, with a p-value of 0.0052, whereas for the variety factor, the significance value was only p < 0.1. However, the results of the interaction between both factors were significant (p = 0.0122), which is explained by the different behaviors of the three varieties (Tempranillo, Cencibel, and Cabernet Sauvignon) in relation to the extractant used. Vine−Shoot Acute Toxicity Evaluated toward V. fischeri In addition to using water as an extractant, a 12% ethanol/water solution was selected for extraction to simulate a model wine solution, which is a way to determine what might happen in actual wines since this assay cannot be performed because of the samples' red color. Therefore, under this premise, and in an attempt to extrapolate these results to real wines, using vine−shoots as enological additives does not present an acute toxicity problem. However, in the trial with MTT that followed, an in−depth toxicological study on vine−shoots was performed. To our knowledge, no studies in the literature have focused on performing comparisons on the acute toxicity of vine−shoots. Moreover, in the case of oak wood, the material that is most used for aging wines, studies related to toxicity have not focused on this type of assay. However, since one of the extractants considered was water, some comparisons have been made with the results obtained for aqueous infusions of aromatic plants. Skotti's research evaluated the toxicity of herbal infusions at V. fischeri using bioluminescence inhibition (Microtox ® ) of several aqueous extracts from different Greek medicinal and aromatic plants. The EC 50 results were found to be notably higher in oregano (Origanum vulgare L.) infusions in boiled water and in dittany (Origanum dictamnus L.) infusions at room temperature than those in vine−shoots, suggesting that the extracts from vine−shoots (aqueous or aqueous/ethanolic) had less acute toxicity. Furthermore, in the present study, the proportion of vine−shoots was 24 g/L, which is 2.4 times higher than the concentration used in the aforementioned study, in which a concentration of 2 g/200 mL of plants was used. Since the extracts were tested without removing any part of the vine−shoots, the reduction of the EC 50 values, which as indicated above does not imply toxicity, should be related to some of the extracted compounds. In this case, and given the composition importance, it was focused on phenolic, volatile, and mineral compounds. Although phenolic compounds are mainly associated with health benefits, some reports highlight side effects and toxicity associated with phenolics. Therefore, different correlations were performed in an attempt to establish a relationship between EC 50 values and the phenolic compounds analyzed in vine−shoots; however, no correlation was established (the R values were less than 0.05; data not shown). Similar results were found for herbal infusions when no correlation between bioluminescence inhibition and total phenolic content was found. In terms of the volatile composition of vine−shoots, only furan compounds were included in the present study because of their possible implications in toxicity since the contents of the rest of the volatile compounds quantified in vine−shoots were found to be significantly lower than furan. This group of compounds should be taken into account when considering the content of cellulose and hemicellulose in vine−shoots since temperature enhances the degradation of sugars released from vine−shoots wood and promotes the formation of furans. Although the contribution of furan compounds, such as furfural and 5−hydroxymethylfurfural (HMF), to the aroma and flavor of food is well known, some research facilities and international organizations worldwide (e.g., U.S. Food and Drug Administration) have regarded furans as novel harmful substances in foods that undergo thermal treatment. Thus, from a safety perspective and for food quality assurance, EC Regulation sets up a maximum limit for HMF of 25 mg/kg in concentrated rectified grape must. On this premise, it is important to control the content of furans in vine−shoots to properly exploit them as enological additives. With regard to the concentrations of vine−shoot extracts and the results related to the Microtox ® assay, the highest EC 50 values did not correspond to the highest content of furan compounds, given that the toxicity value was dependent on the extractant used. In fact, no correlations were found among furan compounds and EC 50 values. Cytotoxicity of Vine−Shoots and Wines Macerated with Them, Evaluated through 3T3−L1 Cell Viability As indicated in Section 2, for the MTT assay related to cytotoxicity, some tests were performed. Before assessing the in vitro cytotoxicity, it was necessary to establish the cellular system, cytotoxicity assay, and exposure conditions. In all tests, according to ISO 10993-5, it was considered that a tested product has a cytotoxic potential when the cell culture viability decreased to <70% in comparison to Group b (untreated control cells and ethanol solvent at 12%, 1:10 3 ) (reference assay; OD 595b ; see Equation ), which was set at 100% viability. It was also decided that a 72 h exposure period is preferable to exposure for 24 or 48 h since this would allow more time for vine−shoots to exert their potential toxic effects. The ethanol control solvent diluted 1:103 produced a slight decrease in viability (97.3% ± 6.4%), although this decrease was not significantly different with respect to C−control. Regarding the vine−shoot ethanol/water (12%) extracts (CeE, CSeE, and TeE), it was observed that the dilution of these extracts, which produced 50% viability, was as follows: TeE, 4.74 10 −4 and R 2 = 0.9765; CeE, 8.24 10 −4 and R 2 = 0.9305; CSeE, 3.24 10 −4 and R 2 = 0.9704. Moreover, the percentages of viability that produced the highest concentration tested (1:10 3 ) were 92.4% ± 15.3%, 99.7% ± 10.1%, and 87.3% ± 8.1% for TeE, CeE, and CSeE, respectively, which did not affect the cellular viability compared with the 12% ethanol solvent control at the same dilution or among the different extracts. The viability produced by each of them showed slight differences, in the order CSeE > TeE > CeE. This variation may be caused by the grape variety; indeed, as some studies have reported, vine−shoot extracts from other varieties such as Riesling showed cytotoxic effects. For wines, the results obtained by evaluating the effects of vine−shoot maceration on 3T3−L1 viability are shown in Figure 3: Tempranillo (a), Cencibel (b), and Cabernet Sauvignon (c). The figure also shows the maximum viability detected for C−control (dashed line, set to 100%) and percentage of viability for TeE, CeE, and CSeE. Moreover, for each wine type (Tempranillo, Cencibel, and Cabernet Sauvignon) and each dilution studied, the cells' relative viabilities when exposed to wines (control wines and wines elaborated with vine−shoots) are represented. In the case of the highest dilution, the results of vine−shoot ethanol/water (12%) extracts were also included to facilitate visual comparison. Albeit with slight differences, the profiles shown by the three types of wines were similar. In general, the percentages of viability for all wine dilutions were greater than 85%, a value that is greater than 70%, which indicates non−cytotoxicity. It should be noted that the viability of 3T3−L1 in the presence of wines macerated with vine−shoots did not exhibit statistically significant differences compared with their corresponding control wines. Moreover, no statistically significant differences were observed when the percentage of viability of wines (control wines and wines with vine−shoots) was compared to that of the 12% ethanol solvent or its corresponding vine−shoot extracts at the highest concentration, corresponding to 1:10 3 dilution. In comparison to C−control (set at 100% viability), wines from Tempranillo (Tw, TwT) seemed to slightly reduce the viability since at the highest concentration these values were 11.5% and 11.0%, respectively. For Cencibel wines (Cw, CwC), it was observed that this highest concentration tested induced only 10.3% and 9.7% mortality, respectively. Relative to the Cabernet Sauvignon wines (CSw, CSwCS), these percentages were reduced by 11.5% and 10.7%, respectively. However, in all cases, the viability exceeded 70% in comparison with C−control, as mentioned above. This value is considered the cutoff for designating wines as nontoxic, according to ISO norms. Although the results were similar for the three wines studied, it can be observed that there is a trend toward a lower reduction in viability associated with Cabernet Sauvignon wines with their own vine−shoots (CSwCS), followed by Cencibel (CwC) and Tempranillo (TwT) wines. Investigating further the two factors considered in this assay (i.e., wine type and addition of vine−shoots), MANOVA showed that neither of these two factors exhibited significant differences (p > 0.05; data not shown). Zhand evaluated the effect of trans−resveratrol−spiked grape skin extracts at different concentrations on 3T3−L1 cell viability and found no toxicity. In addition, no dose−dependent effect of trans−resveratrol was observed at extract concentrations above 500 g/mL. It should be noted that the wines investigated in the present study showed a mean concentration of such a compound of 2 mg/L, and the results obtained with the MTT assay are in agreement with previous studies. Recently, in the studies of Medrano−Pidal related to the cytotoxicity of some stilbenes and a stilbene extract enriched in trans−resveratrol and trans−−viniferin, a significant decrease in the viability of both human intestinal Caco−2 and liver Hep−G2 cell lines was found after exposure with trans−resveratrol; however, the stilbenes and enriched stilbene extract presented a lower effect. Cabernet Sauvignon (c). The figure also shows the maximum viability detected for C−control (dashed line, set to 100%) and percentage of viability for TeE, CeE, and CSeE. Moreover, for each wine type (Tempranillo, Cencibel, and Cabernet Sauvignon) and each dilution studied, the cells' relative viabilities when exposed to wines (control wines and wines elaborated with vine−shoots) are represented. In the case of the highest dilution, the results of vine−shoot ethanol/water (12%) extracts were also included to facilitate visual comparison. Albeit with slight differences, the profiles shown by the three types of wines were similar. In general, the percentages of viability for all wine dilutions were greater than 85%, a value that is greater than 70%, which indicates non−cytotoxicity. It should be noted that the viability of 3T3−L1 in the presence of wines macerated with vine−shoots did not exhibit statistically significant differences compared with their corresponding control wines. Moreover, no statistically significant differences were observed when the percentage of viability of wines (control wines and wines with vine−shoots) was compared to that of the 12% ethanol solvent or its corresponding vine−shoot extracts at the highest concentration, corresponding to 1:10 3 dilution. In comparison to C−control (set at 100% viability), wines from Tempranillo (Tw, TwT) seemed to slightly reduce the viability since at the highest concentration these values were 11.5% and 11.0%, respectively. For Cencibel wines (Cw, CwC), it was observed that this highest concentration tested induced only 10.3% and 9.7% mortality, respectively. Relative to the Cabernet Sauvignon wines (CSw, CSwCS), these percentages were reduced by 11.5% and Conclusions This study, which assessed the potential toxicity of vine−shoots used as enological additives, shows that no acute toxicity was observed when a Microtox ® assay was performed on the extracts obtained from the three varieties studied (Tempranillo, Cencibel, and Cabernet Sauvignon). In relation to wines obtained with the addition of their own vine−shoots, no cytotoxic effect was observed in 3T3−L1 fibroblast cells exposed for 72 h to wines. However, the viability produced by exposure with vine−shoot extracts was lower but did not exhibit a cytotoxic potential either. Therefore, all of these results suggest that vine−shoots can be used as enological additives and that wines with their own vine−shoots added are probably safe for consumption. Data Availability Statement: The data presented in this study are available on request from the corresponding author.
package constant; public class constant { public static void main(String[] args) { // 常量 final int aa = 10; // aa = 20;// Cannot assign a value to final variable "aa" } }
Victorian Estate Housing on the Yarborough Estate, Lincolnshire One of the legacies of the great landed estates in England is the large number of distinctive estate cottages which are scattered throughout the countryside. These are, of course, more in evidence in some counties than others, particularly in those where a considerable proportion of land was owned by the elite. Estate cottages survive in some numbers from the eighteenth century, but the greatest number was built in the nineteenth. Research on estate buildings has tended to highlight the model village, built largely during the first half of the nineteenth century and created for aesthetic reasons. A well-known example is Somerleyton in Suffolk, designed in the 1840s for the then owner of Somerleyton Hall. Here, the cottages, built in a variety of styles some with mock timber-framing, others with thatched roofs surround the village green. Ilam in Staffordshire is another example, where cottages which were designed by G.G. Scott in 1854 display a range of styles and materials, many alien to the local area. A third example is Edensor on the Duke of Devonshire's Derbyshire estate, where the stone buildings exhibit distinctive Italianate features. The list could be extended, but these examples were clearly designed to impress, to provide aesthetic pleasure for the owners and, in the case of Ilam, to create a picturesque image of idyllic contentment among the labouring population as much as to provide good, spacious, sanitary accommodation for employees. In each of these examples, the cottages are generally of individual design and thus expensive to build.
package com.javastreets.mulefd.model; public class Attribute<K, V> { private K name; private V value; public V getValue() { return value; } public void setValue(V value) { this.value = value; } public K getName() { return name; } public void setName(K name) { this.name = name; } public static <K, V> Attribute<K, V> with(K name, V value) { Attribute<K, V> attr = new Attribute<>(); attr.setName(name); attr.setValue(value); return attr; } @Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; Attribute<?, ?> attribute = (Attribute<?, ?>) o; if (!getName().equals(attribute.getName())) return false; return getValue() != null ? getValue().equals(attribute.getValue()) : attribute.getValue() == null; } @Override public int hashCode() { int result = getName().hashCode(); result = 31 * result + (getValue() != null ? getValue().hashCode() : 0); return result; } }
/* * ------------------------------------------------------------------- * * Copyright 2004 Anthony Brockwell * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public * License along with this library; if not, write to the Free * Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. * * ------------------------------------------------------------------- */ #ifndef EPSDC_HPP #define EPSDC_HPP #include "rect.h" #include <fstream.h> class TEpsPlot { protected: ofstream *outfile; bool inpath; int topy,bottomy; double scale; int tof(int); public: TEpsPlot(TRect bbox, const char *filename); ~TEpsPlot(); // things I have taken over void FinishPath(); bool MoveTo(int,int); bool LineTo(int,int); void FillRect(int x1, int y1, int x2, int y2, int r,int g,int b); void FillRect(TRect r1, int r, int g, int b) { FillRect(r1.left, r1.top, r1.right, r1.bottom, r, g, b); }; void DrawRect(int x1, int y1, int x2, int y2); void DrawRect(TRect r1) { DrawRect(r1.left, r1.top, r1.right, r1.bottom);}; void TextOut(int,int,const char *,bool center); void SetLineMode(int md, int w=2); void SetFontSize(int w, int h); }; #endif
<reponame>marko-js/migrate-v3-widget import { types as t } from "@babel/core"; export const name = "onInput"; export const params = ["input", "out"]; export const parts = [ { method: "getInitialProps", replaceParams: ["input", "out"], returnAs: t.memberExpression(t.thisExpression(), t.identifier("input")) }, { method: "getWidgetConfig", replaceParams: ["input", "out"], returnAs: t.memberExpression( t.thisExpression(), t.identifier("widgetConfig") ) }, { method: "getInitialBody", replaceParams: ["input", "out"], returnAs: t.memberExpression( t.memberExpression(t.thisExpression(), t.identifier("input")), t.identifier("renderBody") ) } ];
Synthesis and field emission properties of SnO2 nanowalls SnO2 nanowalls were synthesized on silicon substrate by the thermal chemical vapor transport method at a low temperature of around 650 °C under atmospheric pressure. The microstructure and morphology of the SnO2 nanowalls were evaluated by using scanning electron microscopies and Xray diffraction. Room temperature photoluminescence spectra of the nanowalls showed a broad emission band centering at about 530 nm. Field emission measurements demonstrated that the nanowalls possessed good performance with a turnon field of ∼3.5 V/m and a threshold field of ∼6.1 V/m. (© 2009 WILEYVCH Verlag GmbH & Co. KGaA, Weinheim)
Nerve Growth Factor Pharmacology: Application to the Treatment of Cholinergic Neurodegeneration in Alzheimer's Disease The proposal that NGF or compounds that induce the expression of endogenous NGF may be useful in the treatment of AD is based upon a wealth of evidence showing that NGF effectively attenuates lesion-induced cholinergic deficits and cognitive impairments in animal models. In addition, a recent clinical study with chronic NGF treatment in an AD patient showed promise. Olson et al. showed that NGF treatment increased blood flow, nicotine uptake, and 11C binding in the cerebral cortex. In addition, NGF infusions normalized EEG patterns and improved performance in word recognition tests. Further clinical trials with either NGF or NGF-enhancing compounds will allow determination of whether the animal-based study approach to designing clinically relevant drugs will be advantageous to the treatment of AD. Further findings on the effectiveness of NGF in AD patients are reported by Lars Olson (this volume).
<gh_stars>0 import * as React from 'react'; import HomePage from './components/home-page'; import MovieDetailsPage from './components/movie-details-page'; import { Switch, Route } from 'react-router-dom'; export const routes = ( <Switch> <Route exact path="/" component={HomePage}/> <Route path="/details/:id" component={MovieDetailsPage}/> </Switch> );
Services of General Interest and Territorial Sustainability in Romania Abstract The strengthening of social cohesion, the globalization and the opening of the market to free competition, the expanding of the public private partnership and the sustainable development are the main questions which arise today about the future of services of general interest. The current economic and financial crisis recalls that the main role of the services of general interest lies in ensuring the social and territorial cohesion. At the same time, the crisis has a significant impact on the public sector due to the pressure on public finances and it is essential to make every effort possible in order to keep providing these services and improve their quality. The upcoming accession of Romania to the European Union requires precise criteria for guaranteeing the performance and quality of public services of general interest and, in particular, the development of network industries and the link between these elements is a prerequisite for facilitating the integration, increasing citizens welfare and achieving in a short time the community rules and standards. The role of services of general interest is the sustainable development of a territory and their contribution in maintaining the balance between environment and society, exploiting the available resources in a particular plan, fighting against social exclusion and isolation. Overall, the man has an important role, he can transform the environment, because he is considered an integral part thereof, subject only to maintaining the balance between himself and the other components of the environment; at the same time, he must accept his role as a stabilizing factor in his relationship with nature. Services of general interest in a region should positively influence the life of people in order to achieve the long-term development vision by transforming the regions functioning of institutions. Sustainable development means recognizing that economy, environment and social welfare are interdependent namely that affecting the environment in terms of quality will sooner or later have a negative influence on economic development and the quality of life of each one of us. The human component is an essential urban mobility, and every type of public service must be carried out in a planned system in terms of territory. A responsible demographic capable of long-term strategies for rational use of resources, ensures sustainability planning. Sustainability does not imply an imposed proactive strategy. If an area has resources, a vigorous and enterprising demographic system, fair and profitable exchanges with the outside, it is sustainable, thus it can evolve without outside intervention.
<gh_stars>10-100 /* * This header is generated by classdump-dyld 1.0 * on Saturday, June 1, 2019 at 6:48:48 PM Mountain Standard Time * Operating System: Version 12.1.1 (Build 16C5050a) * Image Source: /System/Library/PrivateFrameworks/ClassroomKit.framework/ClassroomKit * classdump-dyld is licensed under GPLv3, Copyright © 2013-2016 by <NAME>. */ #import <Catalyst/CATOperation.h> @protocol CRKCloudResetable; @class CRKCloudOperation, CATOperationQueue; @interface CRKCloudRetryOperation : CATOperation { unsigned long long mAttempts; CRKCloudOperation*<CRKCloudResetable> _cloudOperation; CATOperationQueue* _operationQueue; } @property (nonatomic,readonly) CRKCloudOperation*<CRKCloudResetable> cloudOperation; //@synthesize cloudOperation=_cloudOperation - In the implementation block @property (nonatomic,readonly) CATOperationQueue * operationQueue; //@synthesize operationQueue=_operationQueue - In the implementation block -(BOOL)isAsynchronous; -(id)initWithOperationQueue:(id)arg1 cloudOperation:(id)arg2 ; -(CRKCloudOperation*<CRKCloudResetable>)cloudOperation; -(void)cloudOperationDidFinish:(id)arg1 ; -(void)performRetry:(id)arg1 ; -(void)main; -(CATOperationQueue *)operationQueue; @end
<filename>mame/src/emu/cpu/sharc/sharc.h #pragma once #ifndef __SHARC_H__ #define __SHARC_H__ #include "cpuintrf.h" #define SHARC_INPUT_FLAG0 3 #define SHARC_INPUT_FLAG1 4 #define SHARC_INPUT_FLAG2 5 #define SHARC_INPUT_FLAG3 6 typedef enum { BOOT_MODE_EPROM, BOOT_MODE_HOST, BOOT_MODE_LINK, BOOT_MODE_NOBOOT } SHARC_BOOT_MODE; typedef struct { SHARC_BOOT_MODE boot_mode; } sharc_config; extern void sharc_set_flag_input(const device_config *device, int flag_num, int state); extern void sharc_external_iop_write(const device_config *device, UINT32 address, UINT32 data); extern void sharc_external_dma_write(const device_config *device, UINT32 address, UINT64 data); CPU_GET_INFO( adsp21062 ); #define CPU_ADSP21062 CPU_GET_INFO_NAME( adsp21062 ) extern UINT32 sharc_dasm_one(char *buffer, offs_t pc, UINT64 opcode); #endif /* __SHARC_H__ */
Well built and cute, brick 1 bed room, 1 bath Bungalow with formal dining room, sun room, fire place and full basement. Detached 2 car garage. Full deck for entertaining and fenced yard for privacy. Seller wants all offers.
# coding:utf-8 '''Low Layer HTTP Client low_layler_http_client.py This program send HTTP request with TCP and get response. ''' import socket class LowLayerHTTPClient(): '''Send http request with TCP and get response.''' request = { 'host': '', 'port': 80, 'header': '', 'encode': 'utf-8' } response = { 'raw': '', 'all': '', 'header': '', 'body': '', 'decode': 'utf-8' } def __init__(self, host='localhost', port=80, request=False): '''Get arguments and set information for response packet.''' if not request: self.request['host'] = host self.request['port'] = port else: self.request = request def connect(self): '''Connect to target server.''' self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.sock.connect((self.request['host'], self.request['port'])) def send(self, header=False): '''Send HTTP request''' if not self.request['header']: self.request['header'] = header encode = self.request['encode'] self.sock.send(self.request['header'].encode(encode)) def get_response(self): '''Get HTTP Response''' data = [] # get data chunk = 'null' while chunk: chunk = self.sock.recv(4096) data.append(chunk) # convert byte to str self.response['raw'] = b''.join(data) decode = self.response['decode'] self.response['all'] = self.response['raw'].decode(decode) # divede to header and body divide_response = self.response['all'].split('\r\n\r\n') self.response['header'] = ''.join(divide_response[0]) self.response['body'] = ''.join(divide_response[1:]) return self.response def close(self): '''Close HTTP connection''' self.sock.close()
// A simplest implementation here, for now bool roseNode::operator==(const abstract_node & x) const { SgNode* other_node = (SgNode*) ( (dynamic_cast<const roseNode&> (x)).getNode()); return (mNode ==other_node); }
/* * ProGuard -- shrinking, optimization, obfuscation, and preverification * of Java bytecode. * * Copyright (c) 2002-2011 <NAME> (<EMAIL>) * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for * more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ package proguard.classfile.io; import proguard.classfile.*; import proguard.classfile.attribute.*; import proguard.classfile.attribute.annotation.*; import proguard.classfile.attribute.annotation.visitor.*; import proguard.classfile.attribute.preverification.*; import proguard.classfile.attribute.preverification.visitor.*; import proguard.classfile.attribute.visitor.*; import proguard.classfile.constant.*; import proguard.classfile.constant.visitor.ConstantVisitor; import proguard.classfile.util.*; import proguard.classfile.visitor.*; import java.io.*; /** * This ClassVisitor writes out the ProgramClass objects that it visits to the * given DataOutput object. * * @author <NAME> */ public class ProgramClassWriter extends SimplifiedVisitor implements ClassVisitor, MemberVisitor, ConstantVisitor, AttributeVisitor { private RuntimeDataOutput dataOutput; private final ConstantBodyWriter constantBodyWriter = new ConstantBodyWriter(); private final AttributeBodyWriter attributeBodyWriter = new AttributeBodyWriter(); private final StackMapFrameBodyWriter stackMapFrameBodyWriter = new StackMapFrameBodyWriter(); private final VerificationTypeBodyWriter verificationTypeBodyWriter = new VerificationTypeBodyWriter(); private final ElementValueBodyWriter elementValueBodyWriter = new ElementValueBodyWriter(); /** * Creates a new ProgramClassWriter for reading from the given DataOutput. */ public ProgramClassWriter(DataOutput dataOutput) { this.dataOutput = new RuntimeDataOutput(dataOutput); } // Implementations for ClassVisitor. public void visitProgramClass(ProgramClass programClass) { // Write the magic number. dataOutput.writeInt(programClass.u4magic); // Write the version numbers. dataOutput.writeShort(ClassUtil.internalMinorClassVersion(programClass.u4version)); dataOutput.writeShort(ClassUtil.internalMajorClassVersion(programClass.u4version)); // Write the constant pool. dataOutput.writeShort(programClass.u2constantPoolCount); programClass.constantPoolEntriesAccept(this); // Write the general class information. dataOutput.writeShort(programClass.u2accessFlags); dataOutput.writeShort(programClass.u2thisClass); dataOutput.writeShort(programClass.u2superClass); // Write the interfaces. dataOutput.writeShort(programClass.u2interfacesCount); for (int index = 0; index < programClass.u2interfacesCount; index++) { dataOutput.writeShort(programClass.u2interfaces[index]); } // Write the fields. dataOutput.writeShort(programClass.u2fieldsCount); programClass.fieldsAccept(this); // Write the methods. dataOutput.writeShort(programClass.u2methodsCount); programClass.methodsAccept(this); // Write the class attributes. dataOutput.writeShort(programClass.u2attributesCount); programClass.attributesAccept(this); } public void visitLibraryClass(LibraryClass libraryClass) { } // Implementations for MemberVisitor. public void visitProgramField(ProgramClass programClass, ProgramField programField) { // Write the general field information. dataOutput.writeShort(programField.u2accessFlags); dataOutput.writeShort(programField.u2nameIndex); dataOutput.writeShort(programField.u2descriptorIndex); // Write the field attributes. dataOutput.writeShort(programField.u2attributesCount); programField.attributesAccept(programClass, this); } public void visitProgramMethod(ProgramClass programClass, ProgramMethod programMethod) { // Write the general method information. dataOutput.writeShort(programMethod.u2accessFlags); dataOutput.writeShort(programMethod.u2nameIndex); dataOutput.writeShort(programMethod.u2descriptorIndex); // Write the method attributes. dataOutput.writeShort(programMethod.u2attributesCount); programMethod.attributesAccept(programClass, this); } public void visitLibraryMember(LibraryClass libraryClass, LibraryMember libraryMember) { } // Implementations for ConstantVisitor. public void visitAnyConstant(Clazz clazz, Constant constant) { // Write the tag. dataOutput.writeByte(constant.getTag()); // Write the actual body. constant.accept(clazz, constantBodyWriter); } private class ConstantBodyWriter extends SimplifiedVisitor implements ConstantVisitor { // Implementations for ConstantVisitor. public void visitIntegerConstant(Clazz clazz, IntegerConstant integerConstant) { dataOutput.writeInt(integerConstant.u4value); } public void visitLongConstant(Clazz clazz, LongConstant longConstant) { dataOutput.writeLong(longConstant.u8value); } public void visitFloatConstant(Clazz clazz, FloatConstant floatConstant) { dataOutput.writeFloat(floatConstant.f4value); } public void visitDoubleConstant(Clazz clazz, DoubleConstant doubleConstant) { dataOutput.writeDouble(doubleConstant.f8value); } public void visitStringConstant(Clazz clazz, StringConstant stringConstant) { dataOutput.writeShort(stringConstant.u2stringIndex); } public void visitUtf8Constant(Clazz clazz, Utf8Constant utf8Constant) { byte[] bytes = utf8Constant.getBytes(); dataOutput.writeShort(bytes.length); dataOutput.write(bytes); } public void visitAnyRefConstant(Clazz clazz, RefConstant refConstant) { dataOutput.writeShort(refConstant.u2classIndex); dataOutput.writeShort(refConstant.u2nameAndTypeIndex); } public void visitClassConstant(Clazz clazz, ClassConstant classConstant) { dataOutput.writeShort(classConstant.u2nameIndex); } public void visitNameAndTypeConstant(Clazz clazz, NameAndTypeConstant nameAndTypeConstant) { dataOutput.writeShort(nameAndTypeConstant.u2nameIndex); dataOutput.writeShort(nameAndTypeConstant.u2descriptorIndex); } } // Implementations for AttributeVisitor. public void visitAnyAttribute(Clazz clazz, Attribute attribute) { // Write the attribute name index. dataOutput.writeShort(attribute.u2attributeNameIndex); // We'll write the attribute body into an array first, so we can // automatically figure out its length. ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream(); // Temporarily replace the current data output. RuntimeDataOutput oldDataOutput = dataOutput; dataOutput = new RuntimeDataOutput(new DataOutputStream(byteArrayOutputStream)); // Write the attribute body into the array. Note that the // accept method with two dummy null arguments never throws // an UnsupportedOperationException. attribute.accept(clazz, null, null, attributeBodyWriter); // Restore the original data output. dataOutput = oldDataOutput; // Write the attribute length and body. byte[] info = byteArrayOutputStream.toByteArray(); dataOutput.writeInt(info.length); dataOutput.write(info); } private class AttributeBodyWriter extends SimplifiedVisitor implements AttributeVisitor, InnerClassesInfoVisitor, ExceptionInfoVisitor, StackMapFrameVisitor, VerificationTypeVisitor, LineNumberInfoVisitor, LocalVariableInfoVisitor, LocalVariableTypeInfoVisitor, AnnotationVisitor, ElementValueVisitor { // Implementations for AttributeVisitor. public void visitUnknownAttribute(Clazz clazz, UnknownAttribute unknownAttribute) { // Write the unknown information. dataOutput.write(unknownAttribute.info); } public void visitSourceFileAttribute(Clazz clazz, SourceFileAttribute sourceFileAttribute) { dataOutput.writeShort(sourceFileAttribute.u2sourceFileIndex); } public void visitSourceDirAttribute(Clazz clazz, SourceDirAttribute sourceDirAttribute) { dataOutput.writeShort(sourceDirAttribute.u2sourceDirIndex); } public void visitInnerClassesAttribute(Clazz clazz, InnerClassesAttribute innerClassesAttribute) { // Write the inner classes. dataOutput.writeShort(innerClassesAttribute.u2classesCount); innerClassesAttribute.innerClassEntriesAccept(clazz, this); } public void visitEnclosingMethodAttribute(Clazz clazz, EnclosingMethodAttribute enclosingMethodAttribute) { dataOutput.writeShort(enclosingMethodAttribute.u2classIndex); dataOutput.writeShort(enclosingMethodAttribute.u2nameAndTypeIndex); } public void visitDeprecatedAttribute(Clazz clazz, DeprecatedAttribute deprecatedAttribute) { // This attribute does not contain any additional information. } public void visitSyntheticAttribute(Clazz clazz, SyntheticAttribute syntheticAttribute) { // This attribute does not contain any additional information. } public void visitSignatureAttribute(Clazz clazz, SignatureAttribute signatureAttribute) { dataOutput.writeShort(signatureAttribute.u2signatureIndex); } public void visitConstantValueAttribute(Clazz clazz, Field field, ConstantValueAttribute constantValueAttribute) { dataOutput.writeShort(constantValueAttribute.u2constantValueIndex); } public void visitExceptionsAttribute(Clazz clazz, Method method, ExceptionsAttribute exceptionsAttribute) { // Write the exceptions. dataOutput.writeShort(exceptionsAttribute.u2exceptionIndexTableLength); for (int index = 0; index < exceptionsAttribute.u2exceptionIndexTableLength; index++) { dataOutput.writeShort(exceptionsAttribute.u2exceptionIndexTable[index]); } } public void visitCodeAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute) { // Write the stack size and local variable frame size. dataOutput.writeShort(codeAttribute.u2maxStack); dataOutput.writeShort(codeAttribute.u2maxLocals); // Write the byte code. dataOutput.writeInt(codeAttribute.u4codeLength); dataOutput.write(codeAttribute.code, 0, codeAttribute.u4codeLength); // Write the exceptions. dataOutput.writeShort(codeAttribute.u2exceptionTableLength); codeAttribute.exceptionsAccept(clazz, method, this); // Write the code attributes. dataOutput.writeShort(codeAttribute.u2attributesCount); codeAttribute.attributesAccept(clazz, method, ProgramClassWriter.this); } public void visitStackMapAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute, StackMapAttribute stackMapAttribute) { // Write the stack map frames (only full frames, without tag). dataOutput.writeShort(stackMapAttribute.u2stackMapFramesCount); stackMapAttribute.stackMapFramesAccept(clazz, method, codeAttribute, stackMapFrameBodyWriter); } public void visitStackMapTableAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute, StackMapTableAttribute stackMapTableAttribute) { // Write the stack map frames. dataOutput.writeShort(stackMapTableAttribute.u2stackMapFramesCount); stackMapTableAttribute.stackMapFramesAccept(clazz, method, codeAttribute, this); } public void visitLineNumberTableAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute, LineNumberTableAttribute lineNumberTableAttribute) { // Write the line numbers. dataOutput.writeShort(lineNumberTableAttribute.u2lineNumberTableLength); lineNumberTableAttribute.lineNumbersAccept(clazz, method, codeAttribute, this); } public void visitLocalVariableTableAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute, LocalVariableTableAttribute localVariableTableAttribute) { // Write the local variables. dataOutput.writeShort(localVariableTableAttribute.u2localVariableTableLength); localVariableTableAttribute.localVariablesAccept(clazz, method, codeAttribute, this); } public void visitLocalVariableTypeTableAttribute(Clazz clazz, Method method, CodeAttribute codeAttribute, LocalVariableTypeTableAttribute localVariableTypeTableAttribute) { // Write the local variable types. dataOutput.writeShort(localVariableTypeTableAttribute.u2localVariableTypeTableLength); localVariableTypeTableAttribute.localVariablesAccept(clazz, method, codeAttribute, this); } public void visitAnyAnnotationsAttribute(Clazz clazz, AnnotationsAttribute annotationsAttribute) { // Write the annotations. dataOutput.writeShort(annotationsAttribute.u2annotationsCount); annotationsAttribute.annotationsAccept(clazz, this); } public void visitAnyParameterAnnotationsAttribute(Clazz clazz, Method method, ParameterAnnotationsAttribute parameterAnnotationsAttribute) { // Write the parameter annotations. dataOutput.writeByte(parameterAnnotationsAttribute.u2parametersCount); for (int parameterIndex = 0; parameterIndex < parameterAnnotationsAttribute.u2parametersCount; parameterIndex++) { // Write the parameter annotations of the given parameter. int u2annotationsCount = parameterAnnotationsAttribute.u2parameterAnnotationsCount[parameterIndex]; Annotation[] annotations = parameterAnnotationsAttribute.parameterAnnotations[parameterIndex]; dataOutput.writeShort(u2annotationsCount); for (int index = 0; index < u2annotationsCount; index++) { Annotation annotation = annotations[index]; this.visitAnnotation(clazz, annotation); } } } public void visitAnnotationDefaultAttribute(Clazz clazz, Method method, AnnotationDefaultAttribute annotationDefaultAttribute) { // Write the default element value. annotationDefaultAttribute.defaultValue.accept(clazz, null, this); } // Implementations for InnerClassesInfoVisitor. public void visitInnerClassesInfo(Clazz clazz, InnerClassesInfo innerClassesInfo) { dataOutput.writeShort(innerClassesInfo.u2innerClassIndex); dataOutput.writeShort(innerClassesInfo.u2outerClassIndex); dataOutput.writeShort(innerClassesInfo.u2innerNameIndex); dataOutput.writeShort(innerClassesInfo.u2innerClassAccessFlags); } // Implementations for ExceptionInfoVisitor. public void visitExceptionInfo(Clazz clazz, Method method, CodeAttribute codeAttribute, ExceptionInfo exceptionInfo) { dataOutput.writeShort(exceptionInfo.u2startPC); dataOutput.writeShort(exceptionInfo.u2endPC); dataOutput.writeShort(exceptionInfo.u2handlerPC); dataOutput.writeShort(exceptionInfo.u2catchType); } // Implementations for StackMapFrameVisitor. public void visitAnyStackMapFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, StackMapFrame stackMapFrame) { // Write the stack map frame tag. dataOutput.writeByte(stackMapFrame.getTag()); // Write the actual body. stackMapFrame.accept(clazz, method, codeAttribute, offset, stackMapFrameBodyWriter); } // Implementations for LineNumberInfoVisitor. public void visitLineNumberInfo(Clazz clazz, Method method, CodeAttribute codeAttribute, LineNumberInfo lineNumberInfo) { dataOutput.writeShort(lineNumberInfo.u2startPC); dataOutput.writeShort(lineNumberInfo.u2lineNumber); } // Implementations for LocalVariableInfoVisitor. public void visitLocalVariableInfo(Clazz clazz, Method method, CodeAttribute codeAttribute, LocalVariableInfo localVariableInfo) { dataOutput.writeShort(localVariableInfo.u2startPC); dataOutput.writeShort(localVariableInfo.u2length); dataOutput.writeShort(localVariableInfo.u2nameIndex); dataOutput.writeShort(localVariableInfo.u2descriptorIndex); dataOutput.writeShort(localVariableInfo.u2index); } // Implementations for LocalVariableTypeInfoVisitor. public void visitLocalVariableTypeInfo(Clazz clazz, Method method, CodeAttribute codeAttribute, LocalVariableTypeInfo localVariableTypeInfo) { dataOutput.writeShort(localVariableTypeInfo.u2startPC); dataOutput.writeShort(localVariableTypeInfo.u2length); dataOutput.writeShort(localVariableTypeInfo.u2nameIndex); dataOutput.writeShort(localVariableTypeInfo.u2signatureIndex); dataOutput.writeShort(localVariableTypeInfo.u2index); } // Implementations for AnnotationVisitor. public void visitAnnotation(Clazz clazz, Annotation annotation) { // Write the annotation type. dataOutput.writeShort(annotation.u2typeIndex); // Write the element value pairs. dataOutput.writeShort(annotation.u2elementValuesCount); annotation.elementValuesAccept(clazz, this); } // Implementations for ElementValueVisitor. public void visitAnyElementValue(Clazz clazz, Annotation annotation, ElementValue elementValue) { // Write the element name index, if applicable. int u2elementNameIndex = elementValue.u2elementNameIndex; if (u2elementNameIndex != 0) { dataOutput.writeShort(u2elementNameIndex); } // Write the tag. dataOutput.writeByte(elementValue.getTag()); // Write the actual body. elementValue.accept(clazz, annotation, elementValueBodyWriter); } } private class StackMapFrameBodyWriter extends SimplifiedVisitor implements StackMapFrameVisitor, VerificationTypeVisitor { public void visitSameZeroFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, SameZeroFrame sameZeroFrame) { if (sameZeroFrame.getTag() == StackMapFrame.SAME_ZERO_FRAME_EXTENDED) { dataOutput.writeShort(sameZeroFrame.u2offsetDelta); } } public void visitSameOneFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, SameOneFrame sameOneFrame) { if (sameOneFrame.getTag() == StackMapFrame.SAME_ONE_FRAME_EXTENDED) { dataOutput.writeShort(sameOneFrame.u2offsetDelta); } // Write the verification type of the stack entry. sameOneFrame.stackItemAccept(clazz, method, codeAttribute, offset, this); } public void visitLessZeroFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, LessZeroFrame lessZeroFrame) { dataOutput.writeShort(lessZeroFrame.u2offsetDelta); } public void visitMoreZeroFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, MoreZeroFrame moreZeroFrame) { dataOutput.writeShort(moreZeroFrame.u2offsetDelta); // Write the verification types of the additional local variables. moreZeroFrame.additionalVariablesAccept(clazz, method, codeAttribute, offset, this); } public void visitFullFrame(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, FullFrame fullFrame) { dataOutput.writeShort(fullFrame.u2offsetDelta); // Write the verification types of the local variables. dataOutput.writeShort(fullFrame.variablesCount); fullFrame.variablesAccept(clazz, method, codeAttribute, offset, this); // Write the verification types of the stack entries. dataOutput.writeShort(fullFrame.stackCount); fullFrame.stackAccept(clazz, method, codeAttribute, offset, this); } // Implementations for VerificationTypeVisitor. public void visitAnyVerificationType(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, VerificationType verificationType) { // Write the verification type tag. dataOutput.writeByte(verificationType.getTag()); // Write the actual body. verificationType.accept(clazz, method, codeAttribute, offset, verificationTypeBodyWriter); } } private class VerificationTypeBodyWriter extends SimplifiedVisitor implements VerificationTypeVisitor { // Implementations for VerificationTypeVisitor. public void visitAnyVerificationType(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, VerificationType verificationType) { // Most verification types don't contain any additional information. } public void visitObjectType(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, ObjectType objectType) { dataOutput.writeShort(objectType.u2classIndex); } public void visitUninitializedType(Clazz clazz, Method method, CodeAttribute codeAttribute, int offset, UninitializedType uninitializedType) { dataOutput.writeShort(uninitializedType.u2newInstructionOffset); } } private class ElementValueBodyWriter extends SimplifiedVisitor implements ElementValueVisitor { // Implementations for ElementValueVisitor. public void visitConstantElementValue(Clazz clazz, Annotation annotation, ConstantElementValue constantElementValue) { dataOutput.writeShort(constantElementValue.u2constantValueIndex); } public void visitEnumConstantElementValue(Clazz clazz, Annotation annotation, EnumConstantElementValue enumConstantElementValue) { dataOutput.writeShort(enumConstantElementValue.u2typeNameIndex); dataOutput.writeShort(enumConstantElementValue.u2constantNameIndex); } public void visitClassElementValue(Clazz clazz, Annotation annotation, ClassElementValue classElementValue) { dataOutput.writeShort(classElementValue.u2classInfoIndex); } public void visitAnnotationElementValue(Clazz clazz, Annotation annotation, AnnotationElementValue annotationElementValue) { // Write the annotation. attributeBodyWriter.visitAnnotation(clazz, annotationElementValue.annotationValue); } public void visitArrayElementValue(Clazz clazz, Annotation annotation, ArrayElementValue arrayElementValue) { // Write the element values. dataOutput.writeShort(arrayElementValue.u2elementValuesCount); arrayElementValue.elementValuesAccept(clazz, annotation, attributeBodyWriter); } } }
The court was hearing a plea filed by Najeeb’s mother, Fatima Nafees, who moved the court on November 25, 2016, to trace her son, a first-year MSc Biotechnology student who went missing from the Mahi Mandavi hostel in JNU. The Delhi high court on Wednesday directed the CBI to take necessary steps to trace JNU student Najeeb Ahmad, who has been missing since last year. “We direct the CBI to take all necessary steps to trace Najeeb, who has been missing since October 15, 2016,” a bench of Justices GS Sistani and Chander Shekhar said. The high court gave its direction after the agency submitted a report giving details of the steps taken by it to trace the student. The agency’s counsel informed the court that they had examined 26 persons, including JNU officials, staff, Najeeb’s friends, colleagues. The counsel, appearing for his mother, also gave suggestions to the CBI to be included in its probe. The high court had on August 8 pulled up the CBI saying the case was “not transferred to the agency for fun”. It had filed the same report regarding its probe that was placed on record in the previous hearing. The high court had on May 16 ordered the CBI to take over the probe into the mysterious circumstances surrounding the disappearance of the student. Najeeb went missing after an altercation with some students belonging to the Akhil Bharatiya Vidyarthi Parishad (ABVP) in the campus. Later, students of the RSS-affiliated ABVP denied any involvement in his disappearance.
A New Method for Numerical Integration of Higher-Order Ordinary Differential Equations Without Losing the Periodic Responses A new numerical method is presented for the solution of initial value problems described by systems of N linear ordinary differential equations (ODEs). Using the state-space representation, a differential equation of order n > 1 is transformed into a system of L = nN first-order equations, thus the numerical method developed recently by Katsikadelis for first-order parabolic differential equations can be applied. The stability condition of the numerical scheme is derived and is investigated using several well-corroborated examples, which demonstrate also its convergence and accuracy. The method is simply implemented. It is accurate and has no numerical damping. The stability does not require symmetrical and positive definite coefficient matrices. This advantage is important because the scheme can find the solution of differential equations resulting from methods in which the space discretization does not result in symmetrical matrices, for example, the boundary element method. It captures the periodic behavior of the solution, where many of the standard numerical methods may fail or are highly inaccurate. The present method also solves equations having variable coefficients as well as non-linear ones. It performs well when motions of long duration are considered, and it can be employed for the integration of stiff differential equations as well as equations exhibiting softening where widely used methods may not be effective. The presented examples demonstrate the efficiency and accuracy of the method.
Spacer layers, so-called spacers, have acquired great importance in semiconductor technology. Spacers are produced, for example, in a structure, for example a hole or a trench, in order to bring about lateral electrical insulation of holes, passages or trenches, to deposit so-called seed layers or to incorporate diffusion barriers. Silicon dioxide (SiO.sub.2) is typically used as the material for the production of an insulating spacer. A conventional method for the production of an SiO.sub.2 spacer is described below with reference to FIG. 1. FIG. 1 illustrates a structure 100, which in this cause may be a trench, for example, prior to the deposition of the material forming the spacer. In the example shown in FIG. 1a, the structure 100 is formed in a multilayer structure comprising a first layer 102 and a second layer 104. The first layer 102 is typically a silicon substrate with transistors (front end), and the second layer 104 is used for the interconnection (metallization) of the transistors (back end), the second layer 104 being composed of SiO.sub.2 into which metal tracks are embedded. After the formation of the structure 100, SiO.sub.2 is deposited, thereby forming an SiO.sub.2 layer 106 on the surface of the layer 104, on the side walls of the structure 100 and on the bottom of the structure 100, as is shown in FIG. 1b. The spacer is completed by carrying out anisotropic plasma etching, by means of which the bottom 108 of the structure 100 is exposed, as can be seen in FIG. 1c. At the same time, the SiO.sub.2 layer 106 above the layer 104 and a small part of the layer 104 are removed by the plasma etching, since the etching rate on the surface of the water is greater than on the bottom of the structure, as can likewise be gathered from FIG. 1c. It is evident from the above description of the method known from the prior art that this known method for the production of a spacer in a structure encompasses a complicated sequence of steps, comprising the steps of producing the structure, depositing the material from which the spacer is to be produced, and the step of exposing the bottom of the structure by an etching process, the different etching rates on the surface of the water and on the bottom of the structure becoming increasingly problematic in the context of present-day structures which are becoming ever deeper. Reference is made to the fact that the above-described conventional method from the prior is not suitable solely for removing an SiO.sub.2 layer from a bottom 108 of a structure 100, rather SiO.sub.2 layers are generally removed from horizontal regions in this way.
Thoughts on the Sheffield non-prescribing programme for narcotic users. Summary The attitudes of professional workers, of drug addicts and ex-addicts in Sheffield to a city-wide non-prescribing policy is reported. In addition, opinions on related subjects are expressed with some details of the users. Professional workers strongly support the programme but drug users, and even successfully treated ex-users, question our justification of limiting people's rights to take drugs. However, the police and probation services feel we have stimulated those same people to take more positive approaches to their problems, and no great increase in crime or deaths or medical problems have followed the changes we have made.
<reponame>suubh/100-Days-of-Code #include<iostream> #include <bits/stdc++.h> using namespace std; int main(){ int N; cout << "Enter the value of N = "; cin >> N; int arr[N]; cout << "Enter the value inside the array = "; for(int i=0;i<N;i++){ cin >> arr[i]; } if(N <4){ cout << "Invalid Output !"<< endl; } else{ //Make quadraples (P,Q,R,S) where 0<P<Q<R<S<N. // Find maxiumum of arr[P]*arr[Q]*arr[R]*arr[S] in all the quadraples and return . //Brute Force - It will be O(n^4) ,which is stupid. int maxx,ans=0; for(int i=0;i<N-3;i++){ for(int j=i+1;j<N-2;j++){ for(int k=j+1;k<N-1;k++){ for(int l=k+1;l<N;l++){ maxx=arr[i]*arr[j]*arr[k]*arr[l]; if(maxx>ans){ ans=maxx; } } } } } cout<< ans << endl; // Better Method - O(nlogn) //1.Sort the array in ascending order //2.Find the product of last four element //3.Find the product of first four element //4.Find the product of first two and last two element //5.Find max of 2,3,4. //*Sounds Good,dont know how !* sort(arr,arr+N); int x=arr[N-1]*arr[N-2]*arr[N-3]*arr[N-4]; int y=arr[0]*arr[1]*arr[2]*arr[3]; int z=arr[0]*arr[1]*arr[N-4]*arr[N-3]; int result=max(x,max(y,z)); cout << result << endl ; } return 0; }
Hymenoptera venom allergy For most people, hymenoptera stings produce only a transient and bothersome local inflammatory reaction characterized by pain, redness and swelling. However, for those who are allergic to components of the venom, a re-sting may cause life-threatening, even fatal reactions. In such patients, correct diagnosis is a prerequisite for effective management (i.e., specific venom immunotherapy) and generally consists of appropriate skin testing and quantification of venom-specific immunoglobulin E antibodies. In spite of the high efficiency of properly administered venom immunotherapy, the molecular and cellular mechanisms of the desensitization process remain incompletely understood.
// Init initializes mp from ib. func (mp *inmemoryPart) Init(ib *inmemoryBlock) { mp.Reset() compressLevel := -5 mp.bh.firstItem, mp.bh.commonPrefix, mp.bh.itemsCount, mp.bh.marshalType = ib.MarshalUnsortedData(&mp.sb, mp.bh.firstItem[:0], mp.bh.commonPrefix[:0], compressLevel) mp.ph.itemsCount = uint64(len(ib.items)) mp.ph.blocksCount = 1 mp.ph.firstItem = append(mp.ph.firstItem[:0], ib.items[0].String(ib.data)...) mp.ph.lastItem = append(mp.ph.lastItem[:0], ib.items[len(ib.items)-1].String(ib.data)...) fs.MustWriteData(&mp.itemsData, mp.sb.itemsData) mp.bh.itemsBlockOffset = 0 mp.bh.itemsBlockSize = uint32(len(mp.sb.itemsData)) fs.MustWriteData(&mp.lensData, mp.sb.lensData) mp.bh.lensBlockOffset = 0 mp.bh.lensBlockSize = uint32(len(mp.sb.lensData)) mp.unpackedIndexBlockBuf = mp.bh.Marshal(mp.unpackedIndexBlockBuf[:0]) mp.packedIndexBlockBuf = encoding.CompressZSTDLevel(mp.packedIndexBlockBuf[:0], mp.unpackedIndexBlockBuf, 0) fs.MustWriteData(&mp.indexData, mp.packedIndexBlockBuf) mp.mr.firstItem = append(mp.mr.firstItem[:0], mp.bh.firstItem...) mp.mr.blockHeadersCount = 1 mp.mr.indexBlockOffset = 0 mp.mr.indexBlockSize = uint32(len(mp.packedIndexBlockBuf)) mp.unpackedMetaindexBuf = mp.mr.Marshal(mp.unpackedMetaindexBuf[:0]) mp.packedMetaindexBuf = encoding.CompressZSTDLevel(mp.packedMetaindexBuf[:0], mp.unpackedMetaindexBuf, 0) fs.MustWriteData(&mp.metaindexData, mp.packedMetaindexBuf) }
/** * If appropriate, adds a String to the passed ArrayList. The String added * is an entry in the value list of an INSERT SQL statement. * *@param currentValueList list of Strings representing the value list of * an INSERT SQL statemnt *@return potentially modified currentValueList *@exception MraldException Description of the Exception */ public ArrayList<String> buildValueList( ArrayList<String> currentValueList ) throws MraldException { try { /* * Checks to see if the first value is empty, if so, dont add it. * ASSU */ String[] valueCheck = nameValues.getValue( FormTags.VALUE_TAG ); if ( valueCheck[0].equals( "" ) ) { return currentValueList; } /* * OK, it has a value, so build the String for the field list * * Since it may have more than one value, you need to go through the entire * list to format the value * * Check if this is a String/VARCHAR type - if so, put in single quotes */ String typeCheck = nameValues.getValue( "Type" )[0]; String newValue; for ( int i = 0; i < valueCheck.length; i++ ) { if ( typeCheck.equals( "String" ) ) { newValue = "'" + valueCheck[i] + "'"; } else if ( typeCheck.equals( "Date" ) || typeCheck.equals( "DateTime" ) || typeCheck.equals( "Timestamp" ) ) { SimpleDateFormat df = new SimpleDateFormat( "mm/dd/yyyy" ); Date date = df.parse( valueCheck[i] ); df.applyPattern( "yyyy-mm-dd" ); String dateVal = df.format( date ); newValue = "'" + dateVal + "'"; } else { newValue = valueCheck[i]; } currentValueList.add( newValue ); } return currentValueList; } catch ( java.text.ParseException e ) { throw new MraldException( e.getMessage() ); } }
Japanese Bonds Yield of Dreams? Saber-tooth tiger. Wooly mammoth. Japanese government issued bonds? Well it's happened. After years of enduring an unrelenting bear market (marked by plunging yields and rising prices) -- the long-battered Japanese government bond has made it on to the endangered financial species list. Asks one October 26 Reuters: "JGB's on the edge of extinction?" The prognosis isn't looking good. In late October, the yield on the 10-year JGB plunged below .300% for the first time in six months. While everyone from Japanese retailers to foreign investors continue to abandon the JGB for other higher-yielding assets. Which begs the question, why is Japan's bond market facing annihilation? Well, according to the mainstream financial experts, the ultimate poacher of the JGB is the Bank of Japan itself. Huh? Okay, here's where things get a bit complicated. And if you happen to need a cure for insomnia, by all means, pick up a book on the Bank of Japan's monetary policy changes and its impact on the value of long-dated securities. But for the sake of time and sanity, here's a much simpler explanation: The introduction of quantitative easing (or QE) has brought about the collapse in bond yields. Namely, the Bank of Japan's commitment to buy government bonds by the fistful, all the while keeping interest rates at a historic 0%. But there's one problem with this logic. If rate cuts and QE caused bond yields to fall -- then why did bond yields also fall amidst rate hikes and an absence of QE? Here, we have a chart of the Bank of Japan's interest rate policy since 2006. Notice: In July 2006, the BOJ ended its zero-rate policy (in place since 2001), and embarked on its most radical rate hike campaign since the late 1980s -- until 2007. So, clearly Japan's bond market is not following the cues of its central bank. But make no mistake, it is following a very clear pattern -- an Elliott wave one, and more. Here, our October 2015 Global Market Perspective's three-part Special Report on Japan shows you how the 10-year Japanese Government Bond is not only adhering to a 69-year long Kondratieff cycle -- but also, to the most common Elliott wave pattern, a five-wave impulse which began in the 1960s. "The monthly chart at right shows that yields remain within a trend channel that has mostly contained wave 5 (circle) over the past nine years. The upper line of the channel runs through the zero percent level in mid-2018. In theory, yields could fall that low. However, the momentum of the decline has already begun to register divergences-versus the 2003 and 2013 lows..." "For those who follow Elliott wave analysis, the writing is on the wall: The next move Japanese stocks, interest rates, and the economy appears to be... in line with the Kondratieff Spring phase." Remember the famous line from the movie Field of Dreams -- "If you build it, they will come." If the 10-year JGB yields continue to build toward a major bottom, as our charts suggest -- then the opportunity of a lifetime will come for investors on the right side. Now for the best part: From now until November 18, the entire 3-part Special Report on Japan is available to our Club EWI members.
Colorectal Mucus Binds DC-SIGN and Inhibits HIV-1 Trans-Infection of CD4+ T-Lymphocytes Bodily secretions, including breast milk and semen, contain factors that modulate HIV-1 infection. Since anal intercourse caries one of the highest risks for HIV-1 transmission, our aim was to determine whether colorectal mucus (CM) also contains factors interfering with HIV-1 infection and replication. CM from a number of individuals was collected and tested for the capacity to bind DC-SIGN and inhibit HIV-1 cis- or trans-infection of CD4+ T-lymphocytes. To this end, a DC-SIGN binding ELISA, a gp140 trimer competition ELISA and HIV-1 capture/ transfer assays were utilized. Subsequently we aimed to identify the DC-SIGN binding component through biochemical characterization and mass spectrometry analysis. CM was shown to bind DC-SIGN and competes with HIV-1 gp140 trimer for binding. Pre-incubation of Raji-DC-SIGN cells or immature dendritic cells (iDCs) with CM potently inhibits DC-SIGN mediated trans-infection of CD4+ T-lymphocytes with CCR5 and CXCR4 using HIV-1 strains, while no effect on direct infection is observed. Preliminary biochemical characterization demonstrates that the component seems to be large (>100kDa), heat and proteinase K resistant, binds in a 13 mannose independent manner and is highly variant between individuals. Immunoprecipitation using DC-SIGN-Fc coated agarose beads followed by mass spectrometry indicated lactoferrin (fragments) and its receptor (intelectin-1) as candidates. Using ELISA we showed that lactoferrin levels within CM correlate with DC-SIGN binding capacity. In conclusion, CM can bind the C-type lectin DC-SIGN and block HIV-1 trans-infection of both CCR5 and CXCR4 using HIV-1 strains. Furthermore, our data indicate that lactoferrin is a DC-SIGN binding component of CM. These results indicate that CM has the potential to interfere with pathogen transmission and modulate immune responses at the colorectal mucosa. Introduction Human immunodeficiency virus type 1 (HIV-1) affects millions of people worldwide despite relatively low transmission rates. Sexual contact is the major route of transmission, yet the risk of transmission is predicted to be 10 times higher when comparing receptive anal intercourse with vaginal intercourse. This may be explained by differences of the epithelium as well as the high number of activated CD4 + T-lymphocytes typically found in the gut. Additionally, bodily secretions present at the mucosal surfaces may also play an important role in HIV-1 transmission. In both routes, HIV-1 is introduced via semen and successful transmission requires the virus to cross a mucosal barrier, either through ruptures, transcytosis or dendritic cell (DC) uptake. Disruption of the mucosal layer can occur during intercourse or result from infections with pathogens such as Schistosomes, which have been associated with enhanced HIV-1 transmission. However, much emphasis has been placed on trans-infection, a mechanism where DCs capture HIV-1 through C-type lectins, mainly Dendritic Cell-Specific Intracellular adhesion molecule-3-Grabbing Non-integrin (DC-SIGN), and transfer the virus to CD4 + Tlymphocytes. DCs found below mucosal surfaces can form dendrites which protrude through the epithelial barrier and thereby may facilitate HIV-1 trans-infection or where such cells can be exposed to virus through tears and breaches in the mucosal layer. DC-SIGN binds mannosylated as well as fucosylated glycans and is thus able to bind an array of pathogens. The precise role of DC-SIGN in the infection by these pathogens is unknown. However, studies have indicated that DC-SIGN aids the formation of DC-T-cell synapses which may explain enhanced HIV-1 transmission. Furthermore, it has been shown that DC-SIGN can cross-talk with toll like receptors (TLRs), thereby influencing immune responses generated. Recently a number of host glycoproteins, bile-salt stimulated lipase (BSSL) and mucin (MUC) 1 from human milk as well as MUC6 and clusterin from seminal plasma have been shown to bind DC-SIGN and thereby interfere with HIV-1 capture and transfer to CD4 + Tlymphocytes. Similarly, a still unidentified molecule in cervical vaginal lavage fluid (CVL) has been described with the same property. Strikingly, the binding capacity of molecules that associate with DC-SIGN and inhibit HIV-1 trans-infection, including BSSL, varies between individuals. These studies suggest that the mucosal surface microenvironment may influence the risk of HIV-1 transmission. Furthermore, any strategy aimed at curtailing HIV-1 transmission, including vaccines and microbicides, will have to take into account the presence of such molecules and their activities. Our aim was to determine whether molecules in colorectal mucus (CM) interfere with HIV-1 infection. We found that CM does have a DC-SIGN binding component, which blocks HIV-1 trans-infection and identified human lactoferrin from CM as being a molecule with such binding activity. CM collection and processing Mucus was collected by gentle washing with small volumes of PBS of surgically-resected colorectal tissue from HIV-1 negative patients undergoing rectocele repair and colectomy for colorectal cancer (n = 2). CM was collected from healthy tissue located approximately 10 to 15 cm from the tumour. The procedure was performed at St George's Hospital, London, UK with signed informed consent from the patients. Cells in CM were removed by centrifugation, 30min at 16,000xg. The cell-free supernatant was partially sterilized by passing through a 0.2m filter. Additional CM samples were collected from male visitors of a STI outpatient clinic (n = 21). They were screened on anal STIs under anoscopic vision and simultaneously, using Dacron swabs, CM was collected from the mucosa. The mean age was 36 years (range 21-63), all subjects tested negative for HIV-1 and showed no signs of sexually transmitted infections. The Ethical committee of the Academic Medical Centre exempted the collection from full review because the lack of additional discomfort. These samples were incubated for 2h at 37°C 1000rpm and subsequently centrifuged 5min at 13,000xg. Next, the Q-tip was inverted and the sample was centrifuged for 1h at 20,000rpm. The collection and research with human colorectal mucus complied with all relevant federal guidelines and institutional board policies. ELISA The DC-SIGN binding ELISA was performed as described. In short, the component of interest was coated on an ELISA plate in 0.2M NaHCO 3 (pH9.2). After o/n incubation at 4°C the plate was blocked with TSM 5% BSA after which 333ng/ml DC-SIGN-Fc (R&D systems) was added. Subsequently, DC-SIGN was detected by a secondary goat-anti-human-Fc HRP labelled antibody (Jackson Immunology) (1:1000) using standard ELISA procedures. The same set up was used for detecting lactoferrin and intelectin-1 in CM, only instead of DC-SIGN-Fc, 333ng/ml polyclonal anti-lactoferrin (ab15811, Abcam) and 333ng/ml anti-intelectin-1 (ab118232, Abcam) was used. In the DC-SIGN blocking ELISA, 10g/ml anti-HIV-1 gp120 antibody, D7324 (Aalto BioReagents Ltd) in 0.1M NaHCO 3 (pH8.6) was coated on an ELISA plate. After overnight incubation at 4°C the plate was blocked with TSM 5%BSA after which trimeric HIV-1 gp140 (JR-FL SOSIP.R6-IZ-D7324) was added to the plate and which has been previously described. Meanwhile 333ng/ml DC-SIGN-Fc (R&D systems) was pre-incubated with the component of interest. Subsequently this mixture was added to the gp140 coated plate and DC-SIGN binding was detected by a secondary HRP labelled goat-anti-human-Fc antibody (Jackson Immunology) (1:1000) using standard ELISA procedures. A more detailed description can be found. The Capsid p24 ELISA was performed as standard. Briefly, culture supernatant was added to a sheep anti-p24-specific antibody (Aalto Bio Reagents Ltd.) (10g/ml) coated ELISA plate. Subsequently, mouse anti-HIV-1-p24 alkaline phosphatase conjugate antibody (Aalto Bio Reagents Ltd.) (4ng/ml) was used as the secondary antibody. For development, Lumi-phos plus (Lumigen Inc.) was used according to the manufacturer's protocol and as a standard curve a serial dilution of Escherichia coli-expressed recombinant HIV-1-p24 (Aalto Bio Reagents Ltd.) was analyzed. Viruses Replication-competent HIV-1 subtype B NSI-18 (R5) and subtype B LAI (X4) were passaged on CD4 + T-lymphocytes. NSI-18 is a primary isolate obtained from an individual from the Amsterdam cohort studies of Gay men and which utilises CCR5 as its coreceptor and LAI represents a molecular clone isolated from an HIV-1 patient and which utilises CXCR4. For each batch the tissue culture infectious dose (TCID 50 ) was determined by limiting dilutions on CD4 + T-lymphocytes according to the Reed and Muench method, previously described Direct infection Different CM dilutions were pre-incubated, 30min. on ice, with NSI-18 or LAI (5ng/ml p24) in DMEM supplemented with 10% FCS, 100U/ml pen/strep and 40g/ml (end concentration) DEAE-dextran (Sigma). Subsequently, this mixture was added to TZM-bl cells (70-80% confluent) that were washed with PBS. Two days post infection the cells were washed again with PBS after which they were lysed with Reporter Lysis Buffer (Promega). After at least 30min. at −80°C the luciferase activity was measured on the Glomax luminometer (Turner BioSystems) using the Luciferase Assay kit (Promega) according to manufacturer's protocol. Direct infection of CD4 + T-lymphocytes was determined by pre-incubating these cells with different dilutions of CM for 30min after which LAI (1000 TCID 50 ) was added. Viral growth was monitored by measuring capsid p24 levels in culture supernatants using ELISA. Biochemical characterization Size fractionation of CM was performed with YM-30 and YM-100 Microcon centrifugal filter devices (Millipore) according to manufacturer instructions. Heat treated samples were placed in a heat block for 10min at 95°C and proteinase K (Promega) treated samples were incubated for 30-60min at 56°C after which the enzyme was inactivated (10 min at 95°C). The depletion of (1-3) mannose containing glycans was performed with Galanthus Nivalis lectin coated agarose beads (Vector Laboratories) according to the manufacturer's protocol. In short, the samples were incubated with the beads for 1h at RT after which the beads were removed from the sample via centrifugation. This approach resulted in identification of human lactoferrin with a total score of 211 -15% sequence coverage-(in band 2), and 302 -16% coverage-(in band 3), as well as human intelectin-1 (band 4) with a total score of 148 and 18% coverage. Band 2 does not contain higher scoring human proteins than lactoferrin (apart from some immunoglobulin and keratin contaminants); at much lower confidence levels we find the polymeric immunoglobulin receptor (score 66), intelectin-1 (score 46), IgGFc-binding protein (score 39), and Mucin-2 (score 30). Band 3 does not contain higher scoring human proteins than lactoferrin (apart from some immunoglobulin and keratin contaminants); at much lower confidence levels we find IgGFcbinding protein (score 98), Krev interaction trapped protein I (score 48), and the polymeric immunoglobulin receptor (score 43). Band 4 does not contain higher scoring human proteins than intelectin-1 (apart from some immunoglobulin and keratin contaminants); at lower confidence levels we find lactoferrin (score 102), serum albumin (score 44), and IgGFc-binding protein (score 31). Statistical analysis Two tailed unpaired t-tests were performed for data sets except when comparing DC-SIGN binding to CM (OD450) with DC-SIGN binding to gp140 (OD450) where a Spearman's rank correlation was used. P values <0.05 were considered statistically significant. CM binds DC-SIGN and blocks its interaction with HIV-1 envelope trimer Using a DC-SIGN binding ELISA, the ability of CM to bind DC-SIGN was determined. As Ca 2+ ions are required for specific DC-SIGN binding, incubation of DC-SIGN-Fc in the presence of the calcium chelator EGTA served as a negative control. We observed that CM bound DC-SIGN-Fc in comparison to the EGTA inactivated DC -SIGN-Fc (p<0.0001, Fig. 1A). Likewise, DC-SIGN-Fc also bound HIV-1 trimeric gp140 SOSIP Env, which is inhibited when DC-SIGN-Fc was pre-incubated with up to a 1000 fold diluted CM in the DC-SIGN blocking ELISA (Fig. 1B). Together, these results suggest that CM not only binds to DC-SIGN, but also inhibits DC-SIGN binding to the HIV-1 envelope trimer. CM blocks DC-SIGN mediated trans-infection We initially investigated whether CM had the capacity to modulate direct infection of HIV-1. Infection of TZM-bl cells was not affected by either 1000 fold or 100 fold dilutions of CM for either NSI-18 (R5) or LAI (X4) HIV-1 ( Fig. 2A). Additionally, the same dilutions of CM had no effect on LAI infection and replication in enriched CD4 + T-lymphocytes (Fig. 2B). To determine the effect of CM on DC-SIGN-mediated HIV-1 capture and transfer, Raji DC-SIGN cells were incubated with different dilutions of CM (300 and 100 fold), medium or mannan (controls) before addition of HIV-1. Subsequently, these cells were co-cultured with CD4 + T-lymphocytes and viral outgrowth was monitored. We observed a clear delay in outgrowth of both NSI-18 and LAI when Raji DC-SIGN cells were pre-treated with 100 fold diluted CM and a less pronounced delay when CM was diluted 300 fold (Fig. 2C). Since CM had no effect on direct infection of CD4 + T-lymphocytes the observed delay in viral outgrowth can be attributed to inefficient HIV-1 capture and transfer in the presence of CM. Next, we repeated these experiments using the physiologically more relevant immature monocyte derived DCs (iDC). These were pre-incubated with CM or medium, 20g/ml DC-SIGN-Fc was pre-incubated with mannan (positive control) and CM dilutions before being added to a gp140 coated plate. Depicted is the percentage by which DC-SIGN-Fc binding to gp140 is blocked, pre-incubation with mannan was set to 100% blocking and pre-incubation with medium to 0%. Preincubating DC-SIGN-Fc with up to a 1000 fold diluted CM inhibits HIV-1 envelope gp140 trimer binding. Data points were performed in triplicate. DC-SIGN blocking antibody AZN or 50g/ml mannan which served as controls. The result demonstrates that 100 fold diluted CM inhibits viral capture and transfer of LAI by iDCs and this effect was lost when CM was diluted 500 times (Fig. 3A). A representation of the assay results obtained is shown (Fig. 3B). These results indicate that CM can efficiently inhibit transinfection of HIV-1 by iDCs. Biochemical characterization of the DC-SIGN binding component of CM Initially CM was size-fractionated using 30-and 100-kDa centrifugal filter devices. Utilizing the DC-SIGN binding ELISA we found that the fraction above 100 kDa contained factor(s) with strong DC-SIGN binding properties whereas weak binding was observed in the 30-100 kDa fraction and the below 30 kDa fraction did not bind DC-SIGN-Fc (Fig. 4A). Non-fractionated CM (input control) and negative (EGTA) controls were included in the DC-SIGN binding ELISA for all tested samples. Determined by the DC-SIGN blocking ELISA, CMs ability to prevent gp140 binding to DC-SIGN was not affected by either heat (96°C), proteinase K treatment (Fig. 4B) or the depletion of 1-3 linked mannose glycans (Fig. 4C). DC-SIGN binding of CM varies between individuals To evaluate donor variation, 21 additional samples were analyzed using a serial dilution from 750g/ml to 11.4ng/ml protein input in the DC-SIGN binding ELISA. Four samples did not bind DC-SIGN, whereas the remaining samples reached a binding plateau at 11.7g/ml input. We observed clear differences in the DC-SIGN binding capacity of CM between individuals which could be divided in high, intermediate and low/no DC-SIGN binding (Fig. 5A). To determine whether the DC-SIGN binding capacity correlates to the ability to prevent gp140 binding, we plotted the DC-SIGN binding capacity versus the gp140 binding by DC-SIGN pre-incubated with 11.7g/ml CM (Fig. 5B). Results show a clear correlation (p = 0.01) and, interestingly, a few CM samples were comparable in their DC-SIGN binding and gp140 blocking capacity to the positive control mannan (open square, Fig. 5B). Mass spectrometry identifies lactoferrin as a DC-SIGN binding component in CM In order to identify the DC-SIGN binding component within CM we performed an immunoprecipitation on pooled CM from 6 samples showing high DC-SIGN binding and which had been depleted of antibodies, using DC-SIGN-Fc coated agarose beads. Subsequently, the DC-SIGN-Fc coated agarose beads with the component(s) of CM were ran on an SDS PAGE gel resulting in the identification of three bands (# 2, 3 and 4, Fig. 6A). Following tryptic in gel digestion and mass analysis of the resulting peptides, using ion trap mass spectrometry, the proteins human lactoferrin (highly abundant in band #3) and immunoglobulin were identified in all bands, whereas intelectin-1 (lactoferrin receptor) was identified abundantly in band #4 (with trace amounts in the other bands). To confirm lactoferrin as a DC-SIGN binding (Fig. 6B). Taken together these results indicate that lactoferrin from CM potently binds DC-SIGN. Discussion To gain better insight into mechanisms involved in HIV-1 transmission deciphering the role specific bodily fluids can play in modulating infection is crucial. Here we demonstrate that although CM is unable to protect against direct infection it does block HIV-1 capture and subsequent transfer by both Raji-DC-SIGN cells and iDCs to CD4 + T-lymphocytes. Other bodily fluids, such as semen, contain factors able to either inhibit or enhance HIV-1 infection. For example, spermatozoa and Semen Derived Enhancer of Virus Infection (SEVI, small aggregates or fibrils) can bind HIV-1 and promote infection of target cells, whilst semenogelin-I inhibits direct infection of target cells and MUC6 and clusterin interfere with DC-SIGN mediated trans-infection. Similarly, CVL contains several innate antimicrobials which offer protection against direct infection as well as a glycoprotein that prevents HIV-1 from binding DC-SIGN. Thus an additional explanation for the enhanced probability of HIV-1 transmission via anal, as compared to vaginal, intercourse may be the lack of inhibitors in CM that are able to block direct infection. Analysis of the DC-SIGN binding component in CM revealed it binds DC-SIGN in a 1-3 mannose independent manner, which implies that the factor is likely fucosylated as DC-SIGN recognizes either of these two carbohydrate structures. Mass spectrometry analysis of a DC-SIGN pull down fraction from CM suggested lactoferrin fragment(s) as the (major) DC-SIGN binding component in CM, since they were identified in band 2, very abundantly in 3 (containing 10 peptides, all from the carboxy-terminal half of the protein) and in band 4 of our SDS PAGE gel. Indeed, we find high levels of lactoferrin in CM with high DC-SIGN binding capacity, intermediate levels in CM with intermediate DC-SIGN binding and no lactoferrin when there is low/no DC-SIGN binding, indicating human lactoferrin in CM is able to bind DC-SIGN. Previous studies have indicated that human lactoferrin does not, or only weakly, binds DC-SIGN. However, these studies have been conducted with recombinant lactoferrin. The strength of binding observed with CM may be explained by differences in posttranslational modifications, such as glycosylation, or processing which could modulate binding to DC-SIGN. Interestingly, the DC-SIGN binding molecule in CM ended up in the larger than 100kDa fraction upon size fractionation, while the molecular weight of human lactoferrin from milk is approximately 80kDa in size. The actual sizes of the lactoferrin fragments found on the SDS PAGE gel were all well below 75kDa. The sample was however boiled and treated with DTT which destroys any complexes and since intelectin-1, a gut specific lactoferrin receptor, was also identified in the DC-SIGN pull down fraction it is likely lactoferrin and intelectin-1 form a complex which could explain the higher predicted molecular weight. Our results imply that intelectin-1 binding to lactoferrin does not interfere with DC-SIGN binding, as high DC-SIGN binding activity is found in the fraction most likely containing complexes. However, lactoferrin (fragment)-intelectin-1 complex formation does abolish recognition of intelectin-1 For all samples maximal binding was achieved when 11.7g/ml CM was coated. A large variation between donors was observed ranging from high to no DC-SIGN binding and where the samples can be divided into three groups as indicated with dotted lines (B). The ability of samples to prevent DC-SIGN-Fc binding to trimeric gp140 was determined with a blocking ELISA. 11.7g/ml CM was preincubated with DC-SIGN-Fc before addition to a gp140 coated plate. Next, DC-SIGN binding to gp140 was correlated with the OD found in the DC-SIGN binding ELISA where 11.7g/ml CM was coated (P<0.01). As a control 5g/ml mannan was included, depicted as an open square. doi:10.1371/journal.pone.0122020.g005 by a polyclonal antibody. The fact that we identified DC-SIGN binding of lactoferrin while earlier studies did not could also be explained by the fact that the carboxy-terminal fragment of the molecule is involved. This could result from mechanisms such as changes in exposition of the binding site(s) upon fragmentation or intelectin-1 binding leading to improved DC-SIGN binding. Mass spectrometric analysis revealed no indication for MUC proteins binding DC-SIGN. Given that MUC1 from human milk and MUC6 from seminal plasma are known to inhibit DC-SIGN mediated HIV-1 trans-infection one might have expected another member of this family to be expressed in CM and binding DC-SIGN. Previously, BSSL from human milk has been demonstrated to bind DC-SIGN and inhibit trans-infection, while certain allele combinations are correlated with a lower risk of HIV-1 infection, indicating BSSL potentially protects against transmission. Furthermore, this molecule is produced in the pancreas and can be released into the duodenum, making it likely that BSSL or smaller digested fragments could be present in CM. However, neither MUC proteins nor BSSL were identified in the DC-SIGN pull-down assay indicating that if these glycoproteins are present, they are only so in limited amounts. Of course we cannot exclude the possibility that the pull down assay preferentially allowed for the capture of human lactoferrin, whereby other DC-SIGN binding molecules were missed. In conclusion, as with other bodily fluids, CM contains a DC-SIGN binding component with the ability to block HIV-1 trans-infection, with human lactoferrin contributing to the binding. These results indicate that CM has the potential to interfere with HIV-1 transmission whilst simultaneously restricting antigen capture at the anal mucosa and potentially skewing mucosal immune responses in the rectum.
/** * Creates the sample classifications from the clinical queries. * @param queryManagementService to query database. * @param clinicalQueries to be turned into sample classifications. * @param sampleColumnOrdering the sample names which are to be used for this classification. * @return sample classification. * @throws InvalidCriterionException if criterion is not valid. */ public static SampleClassificationParameterValue createSampleClassification( QueryManagementService queryManagementService, List<Query> clinicalQueries, List<String> sampleColumnOrdering) throws InvalidCriterionException { Map<String, String> sampleNameToClassificationMap = new HashMap<String, String>(); Map<String, Sample> sampleNameToSampleMap = new HashMap<String, Sample>(); runClinicalQueriesForClassification(queryManagementService, clinicalQueries, sampleNameToClassificationMap, sampleNameToSampleMap); return retrieveSampleClassifications( sampleColumnOrdering, sampleNameToClassificationMap, sampleNameToSampleMap); }
package de.triology.cas.services; import junit.framework.TestCase; import java.util.Map; public class CesServicesSpringConfigurationTest extends TestCase { public void testPropertyStringToMap_emptyString() { // given // when Map<String, String> propertyMap = CesServicesSpringConfiguration.propertyStringToMap(""); // then assertEquals(propertyMap.size(), 0); } public void testPropertyStringToMap_withValues() { // given String mapProperty = "key1:value1,key2:value2"; // when Map<String, String> propertyMap = CesServicesSpringConfiguration.propertyStringToMap(mapProperty); // then assertEquals(propertyMap.size(), 2); assertEquals(propertyMap.get("key1"), "value1"); assertEquals(propertyMap.get("key2"), "value2"); } }
The Obama administration secretly helped lift UN sanctions on two Iranian banks, on the exact same day four American hostages were released, The Wall Street Journal reports. The sanctions revelation, coupled with a now revealed 400 million dollar payment to Iran that day, further contradict the original administration narrative that credited “strong American diplomacy.” The sanctions were not supposed to be lifted until 2023, and were in place for the banks’ role in supporting Iran’s ballistic missile system. “By agreeing to remove U.N. and EU sanctions eight years early on Iran’s main missile financing bank, the administration effectively greenlighted their nuclear warhead-capable ballistic missile program,” Foundation for Defense of Democracies head Mark Dubowtiz told TheWSJ. The U.S. Department of the Treasury called one of the banks the administration lifted sanctions on “the financial linchpin of Iran’s missile procurement network,” in 2007. Previous reports confirmed the U.S. wouldn’t let a plane carrying $400 million take off for Iran until three U.S. prisoners departed Iran in January. The mechanics of the exchange all but confirm accusations that the $400 million in cash was a ransom payment. Saeed Abedini, a former Iranian hostage said, Iranian intelligence officials told him his plane could not take off until the movements of a second plane were confirmed. The second plane is like the U.S. cargo plane carrying $400 million in cash. After the details of the exchange came to light the U.S. Department of State admitted to reporters they used the money as “leverage.” “The timing of this, despite administration protests to the contrary, suggests that this was a ransom payment,” Jonathan Schanzer, an expert on terrorism finance and the vice president of research at the Foundation for the Defense of Democracies, previously told The Daily Caller News Foundation. “And even if this was not what the administration intended, it certainly looks that way to the Iranians.” Before the revelations the administration crowed about how imperative the administration’s Iran deal made the hostage agreement possible. U.S. Secretary of State John Kerry praised “the relationships forged and the diplomatic channels unlocked over the course of the nuclear talks,” the day after the hostage announcement. Obama claims he announced the payment concurrent with the hostage announcement, and declared on August 4, “The United States does not pay ransom and does not negotiate ransoms.” Follow Saagar Enjeti on Twitter Send tips to saagar@dailycallernewsfoundation.org Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact licensing@dailycallernewsfoundation.org.
import { Schema } from 'mongoose'; import { createDoc, clearAll, checkID } from './statics'; import type { ICredentials, ICredentialsModel } from './types'; const schema = new Schema<ICredentials, ICredentialsModel>({ _id: { type: Schema.Types.ObjectId, }, alias: { type: String, required: true, }, client_id: { type: String, required: true, }, client_secret: { type: String, required: true, }, redirect_uri: { type: String, required: true, }, email: { type: String, required: true, unique: true, }, }); schema.statics.createDoc = createDoc; schema.statics.clearAll = clearAll; schema.statics.checkID = checkID; export default schema;
Synthesis and biophysical properties of arabinonucleic acids (ANA): circular dichroic spectra, melting temperatures, and ribonuclease H susceptibility of ANA.RNA hybrid duplexes. Arabinonucleic acid (ANA), the 2'-epimer of RNA, was synthesized from arabinonucleoside building blocks by conventional solid-phase phosphoramidite synthesis. In addition, the biochemical and physicochemical properties of ANA strands of mixed base composition were evaluated for the first time. ANA exhibit certain characteristics desirable for use as antisense agents. They form duplexes with complementary RNA, direct RNase H degradation of target RNA molecules, and display resistance to 3'-exonucleases. Since RNA does not elicit RNase H activity, our findings establish that the stereochemistry at C2' (ANA versus RNA) is a key determinant in the activation of the enzyme RNase H. Inversion of stereochemistry at C2' is most likely accompanied by a conformational change in the furanose sugar pucker from C3'-endo (RNA) to C2'-endo ("DNA-like") pucker (ANA) . This produces ANA/RNA hybrids whose CD spectra (i.e., helical conformation) are more similar to the native DNA/RNA substrates than to those of the pure RNA/RNA duplex. These features, combined with the fact that ara-2'OH groups project into the major groove of the helix (where they should not interfere with RNase H binding), help to explain the RNase H activity of ANA/RNA hybrids.
/** * Leetcode - longest_palindrome */ package com.duol.leetcode.y20.before.longest_palindrome; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * No.409 * * Given a string which consists of lowercase or uppercase letters, * find the length of the longest palindromes that can be built with those letters. * * This is case sensitive, for example "Aa" is not considered a palindrome here. * * Note: * Assume the length of given string will not exceed 1,010. * * Example: * * Input: * "abccccdd" * * Output: * 7 * * Explanation: * One longest palindrome that can be built is "dccaccd", whose length is 7. */ interface Solution { // use this Object to print the log (call from slf4j facade) static Logger log = LoggerFactory.getLogger(Solution.class); int longestPalindrome(String s); }
Digital Economy as a Tool for Reducing of Uncertainty in Strategic Managerial Decisions The article analyzes the actual topic -- a tool for reducing of uncertainty in strategic management decisions in the "digital economy". The tasks solved in the article are to concretize the concept of "digital economy" and substantiate the digitalization of economic information as a tool for more effective management of the economy. Methods for organization of management and reduction of uncertainty about the object of management by digitization of additional information are used. The novelty of the article is the proposal of a methodological tool that provides the reducing of an uncertainty when choosing a most rational management decision through the digitization of information. The basic concepts related to the economy, "digital economy" and information in the framework of statistical theory, are analyzed in the article. The definition of "digital economy" and recommendations on the organization of information management through, inter alia, its digitalization as a determining factor to reduce uncertainty when choosing a more rational management decision, are proposed. The relevance of the introduction of human-machine interaction technologies for the collection and analysis of information, which is needed for making strategic decisions in the conditions of digital transformation of enterprises, is shown. Concluded that it is possible to increase the probability of implementing of a decision that meets the criteria of optimal choice by using of information on a certain program for reducing of uncertainty and achieving the goal of the strategic management.
<reponame>rust-playground/cron-exp<filename>src/errors.rs use std::num::ParseIntError; use thiserror::Error; #[derive(Error, Debug, PartialEq)] pub enum ParseScheduleError { #[error(transparent)] ParseIntError(#[from] ParseIntError), #[error("Invalid number of arguments, 5 for Crontab 6 or 7 for Vixie CRON")] ArgumentCount, #[error("Invalid Step Range {0}")] InvalidStepRange(String), #[error("Invalid Range {0}")] InvalidRange(String), #[error("Invalid Month {0}")] InvalidMonthIndicator(String), #[error("Invalid Day of Week {0}")] InvalidDayOfWeekIndicator(String), }
package httpserver import ( "crypto/rand" "crypto/tls" "fmt" "log" "net" "net/http" "sync" "time" ) type Server struct { *http.ServeMux mutex sync.Mutex listener net.Listener tls bool tlsKeyFile string tlsCertFile string } func New() *Server { return &Server{ ServeMux: http.NewServeMux(), } } func (s *Server) SetTLS(keyFile, certFile string) { s.tls = true s.tlsKeyFile = keyFile s.tlsCertFile = certFile } func (s *Server) ListenURL() string { scheme := "http" if s.tls { scheme = "https" } if s.listener != nil { if addr, ok := s.listener.Addr().(*net.TCPAddr); ok { if addr.IP.IsUnspecified() { return fmt.Sprintf("%s://localhost:%d", scheme, addr.Port) } return fmt.Sprintf("%s://%s", scheme, s.listener.Addr()) } } return "" } func (s *Server) ServeHTTP(w http.ResponseWriter, r *http.Request) { log.Printf("Started %s \"%s\"", r.Method, r.RequestURI) w = &ResponseWriteTracker{ResponseWriter: w} s.ServeMux.ServeHTTP(w, r) wt := w.(*ResponseWriteTracker) log.Printf("Completed %s %d (%d bytes written)", r.Method, wt.code, wt.size) } func (s *Server) Listen(addr string) error { s.mutex.Lock() defer s.mutex.Unlock() if s.listener != nil { return nil } var err error if s.listener, err = net.Listen("tcp", addr); err != nil { return fmt.Errorf("could not listen on %s: %s", addr, err) } if s.tls { config := &tls.Config{ Rand: rand.Reader, Time: time.Now, NextProtos: []string{"HTTP/1.1"}, } config.Certificates = make([]tls.Certificate, 1) config.Certificates[0], err = tls.LoadX509KeyPair(s.tlsCertFile, s.tlsKeyFile) if err != nil { return fmt.Errorf("could not load TLS cert: %s", err) } s.listener = tls.NewListener(s.listener, config) } return nil } func (s *Server) Serve() error { if err := http.Serve(s.listener, s); err != nil { return fmt.Errorf("could not start server: %s", err) } return nil } func (s *Server) ListenAndServe(addr string) error { if err := s.Listen(addr); err != nil { return err } return s.Serve() } func (s *Server) Stop() { s.mutex.Lock() defer s.mutex.Unlock() s.listener.Close() }
Yielding the Right of The Way: A Mixed Design Study for Understanding Drivers Yielding Behavior To understand drivers yielding behavior, field observations and semi-structured interviews were conducted. Cramers V and logistic regression analyses of the field observation on 1140 drivers and pedestrians demonstrated that driver gender and pedestrian age have significant relationships with the tendency to yield the right of way. Other than gender and age, road characteristics were also investigated to understand the nature of this relationship between drivers and pedestrians to a broader extent. From the interviews thematic analysis, four themes related to participants' thoughts about yielding behavior were obtained: "Places of Interaction," "Trust in Rules," "Factors Affecting Yielding Behavior", and "Future Solutions." Both the analysis of interviews and the observations showed that driver-pedestrian interaction is an essential factor regarding traffic safety.
“Those were his decisions. They were not communicated to me or to members of my office,” Harper told the House of Commons during question period June 5. OTTAWA—Prime Minister Stephen Harper is being accused of misleading Parliament — and Canadians — when he said that Nigel Wright, his former chief of staff, acted alone in helping Sen. Mike Duffy pay back dubious living expenses . That had New Democrat ethics critic Charlie Angus accusing Harper of being less than forthcoming. Horton said the lawyers told RCMP investigators Wright had shared his plans to personally provide the funds that allowed Duffy to pay back his expenses with three other people in the Prime Minister’s Office and Conservative Sen. Irving Gerstein , although Harper was not one of those in the loop. The statement contradicts what lawyers representing Wright told police late last month, according to a document filed with the Ottawa courthouse by RCMP Cpl. Greg Horton, who is with the Sensitive and International Investigations unit probing allegations of inappropriate living and travel expenses claimed by Duffy, Sen. Mac Harb and Sen. Patrick Brazeau. “I believe that there was an agreement between Duffy and Wright involving repayment of the $90,000 and a Senate report that would not be critical of him, constituting an offence of frauds on the government,” Horton wrote in the document, referring to section 121(1)(c) of the Criminal Code. The documents released by the Ottawa courthouse Thursday also show the RCMP believes the payout from Wright was part of a deal that led the Senate committee investigating his expense claims to alter its report in his favour. Andrew MacDougall, director of communications for Harper, did not respond to questions Friday about whether the prime minister had asked his staff if any of them knew what Wright had done before it hit the news. “What is most disturbing is that it is becoming clearer that, according to the RCMP documents, the prime minister and his key ministers misled Parliament and they misled Canadians on all the key pieces of contention regarding this potentially illegal action carried out of his office,” Angus said Friday. “Wright’s own lawyers partially confirm this by saying that Wright had two conditions of Duffy in return for the money, to pay it immediately and stop talking to the media about it,” Horton wrote. “The public allegations are that there was a deal in place whereby Duffy would publicly admit he had made the claims in error and be seen to be doing the right thing by paying the money back, and in return he would be reimbursed that money by Nigel Wright, and the Senate report would ‘go easy’ on him,” Horton wrote in the document. Horton based his reasoning on media reports, interviews with two of the senators involved in writing a committee report on Duffy’s expenses, and information from lawyers representing Wright. The Senate standing committee on internal economy, budgets and administration — which called in external auditors from Deloitte to examine the living expenses Duffy, Harb and Brazeau claimed for their time spent in the Ottawa area — tabled reports for each of them May 9 recommending they pay back the money. All three reports acknowledged the auditors from Deloitte found that criteria for determining primary residence, which must be at least 100 kilometres away from Parliament Hill for senators to be eligible for up to $22,000 in annual living expenses, to be lacking in the rules and guidelines. But unlike the reports on Harb and Brazeau, the report tabled on Duffy did not express any disagreement with this finding of ambiguity by Deloitte. It was later revealed two Conservative senators on the subcommittee in charge of the report — David Tkachuk and Carolyn Stewart Olsen — had changed the wording over the objections of Liberal Sen. George Furey. Horton wrote in the document that he participated in interviews with both Furey and Stewart Olsen, on June 19 and June 21 respectively, but had not yet had the chance to interview Tkachuk, who postponed the interview due to health reasons. Tkachuk is currently undergoing treatment for cancer and did not respond to an interview request from the Star on Friday. According to Horton, Furey said the first draft of the Duffy report received May 7 “contained three main criticisms of Duffy” and that the next day, Tkachuk and Stewart Olsen agreed, over the objections of Furey, to remove two of the three criticisms. The report was brought to the larger Senate internal economy committee on May 9, where “the Conservative majority removed the third and final criticism of Duffy from the report,” Horton wrote in the document based on information from Furey. Meanwhile, Stewart Olsen told Horton “it is normal for the draft to have changes made, and that there were many draft versions,” but “then conceded the subcommittee met to make changes only twice.” Steward Olsen said “no one directed or influenced her to make changes to the report,” according to the document, and she confirmed she and Tkachuk had talked about the report outside of subcommittee meetings. “Their job was to get the money repaid from senators if necessary, and the paragraphs removed from the Duffy report were not needed because he had paid back $90,000,” Stewart Olsen told the RCMP, according to the document, which also said she only learned about the involvement of Wright paying the money until it came out in the news. This is the same reasoning that has been provided by Tkachuk. “If I had received a cheque from Sen. Brazeau and Sen. Harb, their reports might have been a lot different as well,” Tkachuk said in the Senate during question period May 28. Horton also noted that Tkachuk had said in an interview that he had been in contact with Wright during the audit process. Horton had originally asked for the documents to be sealed, which meant they were not allowed to be released to the public or the media. “This is an ongoing investigation involving high level political officials,” Horton wrote in a document known as an “Information to Obtain production order” filed in Ottawa June 24. “While investigators have interviewed some of the people involved, there are still others who have not been interviewed. It is important that those who have not yet been interviewed, not be aware of the evidence police have, or do not have, prior to other interviews. To know the extent of the evidence collected to date, and what other witnesses said or didn’t say to police, could cause others to withhold certain facts,” wrote Horton, adding the RCMP had not yet interviewed Wright, Tkachuk or Benjamin Perrin, the former legal adviser to Harper who allegedly knew about Wright’s plans. “I believe that if those involved became aware of the investigation to date then it would compromise the nature and extent of the ongoing investigation,” Horton wrote, arguing these factors outweighed the importance of access to information by the public.
Bridging the digital divide: storage media + postal network = generic high-bandwidth communication Making high-bandwidth Internet access pervasively available to a large worldwide audience is a difficult challenge, especially in many developing regions. As we wait for the uncertain takeoff of technologies that promise to improve the situation, we propose to explore an approach that is potentially more easily realizable: the use of digital storage media transported by the postal system as a general digital communication mechanism. We shall call such a system a Postmanet. Compared to more conventional wide-area connectivity options, the Postmanet has several important advantages, including wide global reach, great bandwidth potential, low cost, and ease of incremental adoption. While the idea of sending digital content via the postal system is not a new one, none of the existing attempts have turned the postal system into a generic and transparent communication channel that not only can cater to a wide array of applications, but also effectively manage the many idiosyncrasies associated with using the postal system. In the proposed Postmanet, we see two recurring themes at many different levels of the system. One is the simultaneous exploitation of the Internet and the postal system so we can combine their latency and bandwidth advantages. The other is the exploitation of the abundant capacity and bandwidth of the Postmanet to improve its latency, cost, and reliability.
Pull type harvesting machines are towed from the tractor by a hitch arm which requires to be adjusted in angle relative to the frame of the machine for fine steering movements and more coarse movement to the transport position. Some machines are required to follow the tractor only to one side and thus include a hitch arm which is located at one end of the machine. In others in which the present invention is particularly effective, the hitch arm to the tractor extends from the frame over the header to a hitch coupling and can be swung by an operating cylinder from one side of the header to the other so that the header can be located in echelon with the tractor to one side and symmetrically to the other side. Pull-type harvesting machines of this type are well known and there are many different examples manufactured by a number of different companies. The pull type harvesting machines that are mechanically driven use a coupling which attaches the hitch arm to the tractor together with a mechanical linkage which connects to the power take off shaft of the tractor to communicate the driving power from the PTO shaft to the mechanically driven elements of the header. Disc headers which utilize as the cutting system a plurality of spaced discs across the width of the header with each disc rotating about a respective vertical axis are known and widely used. In view of the relatively high power consumption of disc headers, it is often desirable to communicate the drive hydraulically. A drive with a high power requirement is not typically better suited to be hydraulic. In fact it would often be better suited for the drive to be mechanical, as hydraulic drive would generally result in poorer drive transmission efficiencies than mechanical systems. However the hydraulic drive system generally offers more accurate control of input torque, less maintenance of the system, and fewer moving parts. Thus a pump is provided adjacent the forward end of the hitch arm which attaches to the power take off shaft of the tractor. The pump generates a flow of high pressure hydraulic fluid which passes through a hydraulic line from the pump along the hitch arm to a motor at the cutter system. A return line runs from the motor back to a filter and from the filter into a sump tank which is commonly provided as the hollow interior of the tubular hitch arm. A simple construction provides a mechanical connection of the forward end of the hitch arm to the draw bar of the tractor so that the hitch arm is directly attached to the draw bar of the tractor. In a simple construction commonly the pump is simply a separate item which attaches to the PTO shaft and is supported thereby. This arrangement is adequate for lower powered systems where the weight of the pump is relatively low so that it avoids applying significant loading to the PTO shaft which could cause damage. However in higher power systems, it is desirable that the pump is mounted on the hitch construction so that it is properly supported from the draw bar with little or no loads being transferred to the PTO shaft. One example of an arrangement of this type is shown in U.S. Pat. No. 4,838,358 (Freudendahl) issued Jun. 13, 1989. This discloses an arrangement of this type which attaches the forward end of the hitch arm to a tractor either to a draw bar or to the lower arms of the three point hitch and also attaches the pump to the tractor in a manner which supports the pump from the draw bar or the hitch rather than from the PTO shaft. This arrangement has however a number of disadvantages in that different designs are provided for the draw bar construction and for the three-point hitch construction and of course it is highly desirable that a common design is provided. Furthermore the arrangement locates the pump at a forward position which reduces the length of the connecting shaft which can be connected between the pump and the PTO shaft which thus reduces manoeuverability. In addition this arrangement provides no attention to the requirement for cooling of the hydraulic system particularly when high power transfer is required since high power of course generates a high level of heat in the pump and the motor. Another arrangement is disclosed in U.S. Pat. No. 6,625,964 (McLeod) issued Sep. 30, 2003. This construction provides a complex device for towing equipment in a row one behind the other which has achieved no commercial success.
Preparation for practice by veterinary school: a comparison of the perceptions of alumni from a traditional and an innovative veterinary curriculum. Alumni survey research can tap users' perspectives on an educational product and thereby provide valuable information for outcomes assessment aimed at improving the quality of educational programs. The study documented here compared the perceptions of two groups of alumni from two curricula offered by the same veterinary school, where the traditional lecture-based curriculum had been gradually replaced by a reformed, more student-centered curriculum. Year 1 of the new curriculum started in 1995, while the old curriculum continued to be delivered to the entering class of 1994. The aim of our study was to determine whether the new program received more positive evaluations from the alumni and whether it was perceived as offering better preparation for veterinary practice. A questionnaire was sent to all alumni who had graduated in the period 2001--2003. Compared to alumni of the traditional program, alumni of the new curriculum reported higher perceived competence levels for clinical knowledge and skills (specific competencies) and for communication skills and academic skills (generic competencies). Alumni of both programs attributed difficulties in the transition from university to work to lack of experience with practical or technical skills and with primary-care cases. They suggested that more attention be paid to these aspects of practice and to practice/business management and communication with clients. The concrete changes in the curriculum appear to have had a noticeable positive effect, without the feared detrimental effect on knowledge acquisition. The results point to further program improvements, particularly for practice-oriented specific and generic skills.
Efficient algorithms for mining outliers from large data sets In this paper, we propose a novel formulation for distance-based outliers that is based on the distance of a point from its kth nearest neighbor. We rank each point on the basis of its distance to its kth nearest neighbor and declare the top n points in this ranking to be outliers. In addition to developing relatively straightforward solutions to finding such outliers based on the classical nested-loop join and index join algorithms, we develop a highly efficient partition-based algorithm for mining outliers. This algorithm first partitions the input data set into disjoint subsets, and then prunes entire partitions as soon as it is determined that they cannot contain outliers. This results in substantial savings in computation. We present the results of an extensive experimental study on real-life and synthetic data sets. The results from a real-life NBA database highlight and reveal several expected and unexpected aspects of the database. The results from a study on synthetic data sets demonstrate that the partition-based algorithm scales well with respect to both data set size and data set dimensionality.
Give Up on Trying to "Secure the Border." Despite the recent announcement that the Justice Department is filing suit against Arizona's SB 1070, it appears Obama's promise to Arizona Gov. Jan Brewer to beef up border security wasn't just a brush-off. Yesterday, the administration asked Congress for $500 million in "emergency" funding for border enforcement, which includes two aerial drones -- the kind at work in Iraq and Afghanistan -- and 1,000 more Border Patrol agents. That's on top of the 1,200 National Guardsmen Obama sent to the area earlier last month. And on top of the 10,000 new Border Patrol agents that have been hired since 2004. In all, that's about 10 Border Patrol agents for every mile of the U.S.-Mexico border. The thing is, as Adam Serwer and I have noted repeatedly, there's no border-security emergency. The hysteria about border violence -- fueled in particular by the murder of a single Arizona rancher by what police suspected was an undocumented immigrant (it turns out, after all, the prime suspect is a citizen) -- persists despite the fact that crime along the border is low and going down, immigrants commit fewer crimes than the native-born citizens, and illegal immigration is down because of the economic downturn. What's especially upsetting is that so many on the left have climbed on the enforcement wagon in the hope of swaying Republicans to support comprehensive immigration reform, which includes a path to citizenship for the undocumented. In March, the Center for American Progress called for just the type of military drones Obama has now dispatched to the border. But progressives should realize: If having ten border patrol agents per mile doesn't count as "securing the border" to Republicans, who maintain that we still haven't done so, nothing probably will. Progressives should push to bring the 12 million undocumented immigrants living in the country out of the shadows -- and perhaps give up on trying to appease Republicans by militarizing the border. Conservative outlets are saying organizing workers "destroys diversity," but that's simply not true.
Bovine lead poisoning in Alberta: A management disease. Lead poisoning was the most common toxicosis diagnosed in cattle by Alberta Animal Health Laboratories between 1964 and 1985 (n = 738 cases, x = 33.5 cases per year). Seasonal variation in incidence was evident, and occurrence was frequently associated with change in housing or pasture. Discarded batteries or used crankcase oil were implicated in more than 80% of cases for which the source of lead was determined.Pulmonary congestion, marked congestion and hemorrhage of thymus and heart, and presence of oil or lead particles in the ingesta were the most common postmortem findings. Eighty-six percent of cases were confirmed by elevated lead levels in tissues.Lead poisoning represents a significant, unnecessary loss to producers. Increased producer awareness and improved waste management on farms could significantly reduce the incidence of lead poisoning in cattle.
Degradation of fluorotelomer alcohols: a likely atmospheric source of perfluorinated carboxylic acids. Human and animal tissues collected in urban and remote global locations contain persistent and bioaccumulative perfluorinated carboxylic acids (PFCAs). The source of PFCAs was previously unknown. Here we present smog chamber studies that indicate fluorotelomer alcohols (FTOHs) can degrade in the atmosphere to yield a homologous series of PFCAs. Atmospheric degradation of FTOHs is likely to contribute to the widespread dissemination of PFCAs. After their bioaccumulation potential is accounted for, the pattern of PFCAs yielded from FTOHs could account for the distinct contamination profile of PFCAs observed in arctic animals. Furthermore, polar bear liver was shown to contain predominately linear isomers (>99%) of perfluorononanoic acid (PFNA), while both branched and linear isomers were observed for perfluorooctanoic acid, strongly suggesting a sole input of PFNA from "telomer"-based products. The significance of the gas-phase peroxy radical cross reactions that produce PFCAs has not been recognized previously. Such reactions are expected to occur during the atmospheric degradation of all polyfluorinated materials, necessitating a reexamination of the environmental fate and impact of this important class of industrial chemicals.
# # This file is part of pysmi software. # # Copyright (c) 2015-2019, <NAME> <<EMAIL>> # License: http://snmplabs.com/pysmi/license.html # import logging from pysmi import error from pysmi import __version__ flagNone = 0x0000 flagSearcher = 0x0001 flagReader = 0x0002 flagLexer = 0x0004 flagParser = 0x0008 flagGrammar = 0x0010 flagCodegen = 0x0020 flagWriter = 0x0040 flagCompiler = 0x0080 flagBorrower = 0x0100 flagAll = 0xffff flagMap = { 'searcher': flagSearcher, 'reader': flagReader, 'lexer': flagLexer, 'parser': flagParser, 'grammar': flagGrammar, 'codegen': flagCodegen, 'writer': flagWriter, 'compiler': flagCompiler, 'borrower': flagBorrower, 'all': flagAll } class Printer(object): def __init__(self, logger=None, handler=None, formatter=None): if logger is None: logger = logging.getLogger('pysmi') logger.setLevel(logging.DEBUG) if handler is None: handler = logging.StreamHandler() if formatter is None: formatter = logging.Formatter('%(asctime)s %(name)s: %(message)s') handler.setFormatter(formatter) handler.setLevel(logging.DEBUG) logger.addHandler(handler) self.__logger = logger def __call__(self, msg): self.__logger.debug(msg) def __str__(self): return '<python built-in logging>' def getCurrentLogger(self): return self.__logger if hasattr(logging, 'NullHandler'): NullHandler = logging.NullHandler else: # Python 2.6 and older class NullHandler(logging.Handler): def emit(self, record): pass class Debug(object): defaultPrinter = None def __init__(self, *flags, **options): self._flags = flagNone if options.get('printer') is not None: self._printer = options.get('printer') elif self.defaultPrinter is not None: self._printer = self.defaultPrinter else: if 'loggerName' in options: # route our logs to parent logger self._printer = Printer( logger=logging.getLogger(options['loggerName']), handler=NullHandler() ) else: self._printer = Printer() self('running pysmi version %s' % __version__) for flag in flags: inverse = flag and flag[0] in ('!', '~') if inverse: flag = flag[1:] try: if inverse: self._flags &= ~flagMap[flag] else: self._flags |= flagMap[flag] except KeyError: raise error.PySmiError('bad debug flag %s' % flag) self('debug category \'%s\' %s' % (flag, inverse and 'disabled' or 'enabled')) def __str__(self): return 'logger %s, flags %x' % (self._printer, self._flags) def __call__(self, msg): self._printer(msg) def __and__(self, flag): return self._flags & flag def __rand__(self, flag): return flag & self._flags def getCurrentPrinter(self): return self._printer def getCurrentLogger(self): return self._printer and self._printer.getCurrentLogger() or None # This will yield false from bitwise and with a flag, and save # on unnecessary calls logger = 0 def setLogger(l): global logger logger = l
A Probabilistic Model of the Interaction between a Sitting Man and a Seat This article focuses on the biomechanical evaluation of the interaction between load forces to which a sitting man and the seat are mutually exposed. The load forces, which consider actual dispersion in the human population through histograms, are determined using a probabilistic method known as the Simulation-Based Reliability Assessment (SBRA). A simple flat model shows a basic and high-quality stochastic evaluation of all the forces that affect the man and the seat. The results and methodology can be used in many areas of biomechanics, ergonomics or industrial design.
Charles E. Clarke Biography Clarke was born in Saybrook, Connecticut on April 8, 1790. He completed preparatory studies and graduated from Yale College in 1809. He studied law in Greene County, New York, was admitted to the bar in 1815, and commenced practice in Watertown, New York. He moved to Great Bend, New York in 1840, where he owned and operated a gristmill, sawmill and distillery, and engaged in agricultural pursuits. He was also elected president of the Jefferson County Agricultural Society. He also became active in railroad development and management, including a post on the board of directors of the Carthage, Watertown and Sackets Harbor Railroad and one on the board of the Sackets Harbor and Saratoga Railroad. A Whig, he served as a member of the New York State Assembly in 1839 and 1840. Clarke was elected as a Whig to the Thirty-first Congress (March 4, 1849 – March 3, 1851). After leaving Congress he resumed the practice of law and returned to his business interests. He died in Great Bend on December 29, 1863. He was interred at Brookside Cemetery, Watertown, New York.
Shining a light on optogenetics Optogenetics is relatively new and has attracted much interest since the first publications from the field in the early 2000s. Both researchers and the media are fascinated by the notions it conjures of bionic implants. Notwithstanding potential applications, the technology has quickly become an important research tool in neuroscience with potential for developing a range of novel therapeutic approaches. Scientifically, optogenetics combines advances in optics, smallscale power generation, electronics, the manipulation of cellular activity and gene therapy, to enable the study of complete systems, including neural networks in animals and humans. Moreover, some recent studies have highlighted potential applications in plants as an alternative to genetic modification (GM) for targeted alteration of phenotypes. Since the first experiments, optogenetics has consistently expanded in scope and definition. It can now be defined as the use of light to stimulate cells into which exogenous genes coding for lightsensitive proteins have been introduced, and to measure the response of these transformed cells to stimulation. Typically, the light is generated by an artificial source powered by a battery or external electric field. The definition also embraces treatments for some forms of blindness based on implanting lightsensitive proteins in the retina. However, much of the fields' focus revolves around the optical components, their implantation in the body, and the interface with the target cells to stimulate gene expression with high spatial and temporal resolution. In practice, an implanted LED or other light source illuminates a specific target area. Within this area, the target cellsgenetically modified to express specific lightsensitive proteinsreact to this light by changing their membrane potential, which in turn starts signal cascades that activate or shut down specific target genes. The key biological challenges of optogenetics are the development of appropriate lightsensitive proteins, mechanisms for delivering their genes to specific cells,
Mausoleum of Khoja Ahmed Yasawi Location The Mausoleum of Khawaja Ahmed Yasawi is situated in the north-eastern part of the modern-day town of Turkestan (formerly known as Hazrat-e Turkestan), an ancient centre of caravan trade known earlier as Khazret and later as Yasi, in the southern part of Kazakhstan. The structure is within the vicinity of a historic citadel, which is now an archaeological site. Remains of medieval structures such as other mausoleums, mosques and bath houses characterize the archaeological area. To the north of the Mausoleum of Khawaja Ahmed Yasawi, a reconstructed section of the citadel wall from the 1970s separates the historical area from the developments of the modern town. Khawaja Ahmed Yasawi Khoja Ahmed Yasawi (Khawaja or Khwaja (Persian: خواجه pronounced khâje) corresponds to "master", whence Arabic: خواجة khawājah), also spelled as Khawajah Akhmet Yassawi, was the 12th-century head of a regional school of Sufism, a mystic movement in Islam which began in the 9th century. He was born in Ispidjab (modern Sayram) in 1093, and spent most of his life in Yasi, dying there in 1166. He is widely revered in Central Asia and the Turkic-speaking world for popularizing Sufism, which sustained the diffusion of Islam in the area despite the contemporary onslaught of the Mongol invasion. The theological school he created turned Yasi into the most important medieval enlightening center of the area. He was also an outstanding poet, philosopher and statesman. Yasawi was interred in a small mausoleum, which became a pilgrimage site for Muslims. New mausoleum The town of Yasi was largely spared during the Mongol invasion of Khwarezmia in the 13th century. Overtime, the descendants of the Mongols settled in the area and converted to Islam. The town then came under the control of the Timurid Dynasty in the 1360s. Timur (Tamerlane), the founder of the dynasty, expanded the empire's realm to include Mesopotamia, Iran, and all of Transoxiana, with its capital located in Samarkand. To gain the support of local citizens, Timur adopted the policy of constructing monumental public and cult buildings. In Yasi, he put his attention to the construction of a larger mausoleum to house Yasawi's remains, with the intention of glorifying Islam, promoting its further dissemination, and improving the governance of the immediate areas. The new mausoleum was begun in 1389. Timur imported builders from cities which he laid waste during his campaigns, including mosaic-workers from Shiraz and stonemasons and stucco-workers from Isfahan. The master builders were led by Khwaja Hosein Shirazi from Iran. It was reported that Timur himself participated in the design of the structure, where he introduced experimental spatial arrangements, types of vaults and domes. These innovations were later implemented in the religious edifices of other cities. However, the mausoleum was left unfinished, when Timur died in 1405. Decline and preservation When the Timurid Empire disintegrated, control of the immediate territory passed on to the Kazakh Khanate, which made Yasi, then renamed Turkestan, its capital in the 16th century. The khans (Turkic for "ruler") sought to strengthen the political and religious importance of Turkestan to unify the nomadic tribes within the young state. Hence, as the khanate's political center, ceremonies for the elevation of the khans to the throne and missions from neighboring states were received in Turkestan. The Kazakh nobility also held their most important meetings to decide state-related matters in the capital. The town, situated on the border of the nomadic and settled cultures, flourished as the khanate's largest trade and craft center. Fortifications were erected to safeguard this commercial role, including the 19th-century construction of defensive walls around the unfinished mausoleum, which became an important landmark and pilgrimage center of the town. In the succeeding centuries, Turkestan and its historic monuments became connected with the idea of the Kazakh state system. Political struggles and the shift in overland trade in favor of maritime routes soon led to the town's decline, before it finally passed on to the Russian Empire in 1864. The town was eventually deserted; a new town center was developed west of the area, built around a new railway station. The territory came under Soviet rule by the 20th century. The new administration carried out preservation and restoration work on site, although they considered it more as an architectural rather than a spiritual structure. Hence, the mausoleum was closed to the devotees who came to pay homage to Yasawi. Nevertheless, the local khoja based at the mausoleum allowed pilgrims to secretly enter the structure at night. Beginning in 1922, several commissions took part in the technical investigation of the building. Regular maintenance has been in place beginning in 1938, while a series of restoration campaigns were started in 1945, with the last one being held from 1993 to 2000. Among the latest conservation steps implemented were the replacement of the structure's clay foundation with reinforced concrete, the consolidation of walls, the waterproofing of the roofs, and the layering of new tiles, based on historic designs and patterns, on the domes. The continuous conservation works have been in place when Kazakhstan gained its independence. The building is protected as a national monument and is included on the List of National Properties of Kazakhstan. The site is under the administration of the Azret-Sultan State Historical and Cultural Reserve Museum, in charge with the safeguarding, research, conservation, monitoring and maintenance of the mausoleum. Architecture The unfinished state of the Mausoleum of Khawaja Ahmed Yasawi, especially at the entrance portal and sections of the interior, allow for the better architectural scrutiny of how the monument was designed and constructed. The structure is rectangular in plan, measuring 45.8 × 62.7 m (150.3 × 205.7 ft), and is 38.7 m (127.0 ft) high. It is oriented from the south-east to the north-west. The primary material used for the building is ganch—fired brick mixed with mortar, gypsum and clay—which was made in a plant located in Sauran. Layers of clay reaching a depth of 1.5 m (4.9 ft), to prevent the water penetration, were used for the original foundation. These were replaced with reinforced concrete in modern restoration works. The main entrance to the mausoleum is from the south-east, through which visitors are ushered into the 18.2 × 18.2-m (59.7 × 59.7-ft) Main Hall, known as Kazandyk (the "copper room"). The section is covered by the largest existing brick dome in Central Asia, also measuring 18.2 m (59.7 ft) in diameter. At the center of the Kazandyk is a bronze cauldron, used for religious purposes. The tomb of Yasawi is situated on the central axis at the end of the building in the northwest, with the sarcophagus located exactly at the center of the section, which has a double dome ribbed roof —the inner dome being 17.0 m (55.8 ft) high and the outer dome being 28.0 m (91.9 ft) high. The dome exterior is covered with hexagonal green glazed tiles with gold patterns. The interior is adorned with alabaster stalactites, known as muqarnas. Additional rooms in the structure, totaling more than 35, include meeting rooms, a refectory, a library, and a mosque, which had light blue geometric and floral ornaments on its walls. The mausoleum's exterior walls are covered in glazed tiles constituting geometric patterns with Kufic and Suls epigraphic ornaments derived from the Qur'an. Initial plans also called for the addition of two minarets, but this was not realized when construction was halted in 1405. Religious and cultural importance The larger mausoleum which Timurid ordered further enhanced the shrine's religious importance. During the Kazakh Khanate, prominent personalities chose to be buried within the immediate vicinity of the monument. Among these are Abulkhair, Rabi'i Sultan-Begim, Zholbarys-khan, Esim-khan, Ondan-sultan (the son of Shygai-khan), Ablai Khan, Kaz dauysty Kazbek-bi. The mausoleum's holy reputation also reached foreign lands. In the early 16th century, Ubaydullah Khan, the successor to Muhammad Shaybani Kahn of the neighboring Uzbek Khanate, stopped at the mausoleum before his battle against Babur, who would later become the founder of the Mughal Empire. He swore that if he were to emerge victorious, his rule would fully follow the sharia law. Despite the public closure of the monument during the Soviet era, the mausoleum has continued to draw pilgrims once the order was lifted. Up to contemporary times, the Mausoleum of Khoja Ahmed Yasawi has remained an object of pilgrimage for Kazakh Muslims. Hence, the town of Turkestan became the second Mecca for the Muslims of Central Asia Indeed, the mausoleum's importance to the town is attested by Turkestan's former name, Hazrat-e Turkestan, which literally means "Saint of Turkestan," a direct reference to Yasawi. As the capital of the preceding Kazakh Khanate, which saw the emergence of the distinct Kazakh nationality, Turkestan remains the cultural heart of modern Kazakhstan. Being the burial site for the Sufi theologian and the khanate's Kazakh nobility, the mausoleum has further enhanced the town's prestige. The continuance of the Kazakh nation and Central Asian Islamic faith in modern times are testaments to the historical and cultural importance of Turkestan, with the Mausoleum of Khoja Ahmed Yasawi at its center. Perceived as one of the greatest mausoleums of the Islamic world, it has survived and remains a significant monument both to faith and architectural achievement in the region.
Get the latest developments via our LIVE BLOG. Tripoli, Libya (CNN) -- An amateur league of ill-trained rebel fighters appears to be on the brink of toppling Moammar Gadhafi's 42-year rule after reportedly capturing two of the leader's sons and infiltrating the Libyan capital. But in a possible indication that the fight is not over, celebrations in Tripoli's Green Square -- renamed Martyrs' Square by the rebels -- gave way to tension Monday morning after rebels told CNN that they'd heard Gadhafi army forces were heading their way. CNN could not confirm any movement of Gadhafi forces. The uncertainty came hours after a rebel official said two of Moammar Gadhafi's sons -- Saif al-Islam and Saadi -- had been arrested by opposition forces. Jumma Ibrahim, a rebel spokesman based in Libya's western mountain region, said both were captured in Tripoli. International Criminal Court chief prosecutor Luis Moreno-Ocampo said the court plans Monday to contact authorities associated with those holding Saif al-Islam to try to arrange for his transfer to the Netherlands for an eventual trial for "crimes against humanity." The court, based in The Hague, issued an arrest warrant earlier this summer for Saif Gadhafi as well as his father and his uncle Abdullah al-Sanussi. Saadi Gadhafi, a businessman and onetime professional soccer player, helped set up an April CNN interview with a woman who claimed she'd been raped by government troops. He later told CNN that those behind the attack should be prosecuted. There was no immediate reaction from Libyan government officials to the reports of the sons' arrests. In an audio address broadcast just before midnight Sunday, Moammar Gadhafi claimed "very small groups of people who are collaborators with the imperialists" were fighting inside the capital. Should the rebels prevail, Gadhafi said NATO would not protect them and predicted massive bloodshed. To prevent such bloodshed, he said, Libyans, including women, should go out and fight. "Get out and lead, lead, lead the people to paradise," he said. Just after midnight Sunday, scores of raucous rebel supporters packed Green Square -- the same place where Gadhafi loyalists have congregated regularly -- celebrating, waving the rebel flag and even flashing the "victory" sign. NATO Secretary General Anders Fogh Rasmussen said Sunday that "the Gadhafi regime is clearly crumbling," and urged the leader to acknowledge defeat. "The rebel fighters are in control of most of the neighborhoods in Tripoli," said Ibrahim, the rebel spokesman. A main supply route into western Tripoli that had been the scene of intense fighting was clear early Monday, occupied only by rebels heading toward the capital. CNN's Sara Sidner reported around 3 a.m. that the route heading to Green Square was "eerily quiet," with cars passing by checkpoints run by opposition loyalists. Between 100 and 150 rebel fighters by then had gathered in the square, only to scatter an hour later amid concerns about possible snipers and an upcoming battle there, in the heart of the city. The advance included members of the "Tripoli Brigade," a group of rebel troops who'd once lived in the capital and could help navigate the city. But they weren't all professional soldiers, such as one IT worker who hadn't held a gun before joining the movement a few months ago. They entered a city that, after being largely free of large-scale fighting since the conflict began six months ago, became the site of intense drama and significant violence over the weekend. Libyan government spokesman Musa Ibrahim told reporters just after 11 p.m. Sunday that about 1,300 people had been killed and about 5,000 wounded in fighting in the previous 12 hours. "(The city) is being turned into a hellfire," he said. The spokesman denied a report from Arab-language news network Al-Arabiya that Gadhafi's guard had surrendered, calling it "false information." In another sign of possible trouble for the regime, the signal for state-run television -- which has long been a forum for pro-Gadhafi views -- repeatedly froze, with the station later claiming there had been "interference" due to a "hostile media campaign." The network reverted to taped broadcasts of previous pro-Gadhafi gatherings. A fierce gun battle broke out Sunday evening near the hotel where many international reporters were stationed in Tripoli. Many government officials packed their suitcases and left the hotel earlier in the day. A woman in Tripoli said late Sunday that she and others went outside, "screaming" and calling for Gadhafi's ouster -- and had plenty of company. "We realized that no one wants him, no one wants this dictator," said the resident, whom CNN is not naming for safety reasons. Musa Ibrahim told CNN on Sunday that "more than 65,000 professional men" are fighting in Tripoli, with thousands more flooding in to help defend the regime, and added they "can hold for much longer." He predicted a "humanitarian disaster" unless an immediate ceasefire is called. "It's not about who will win," he said. "The world needs to hear this message, that a massacre will be committed in Tripoli if one side wins now." Some areas of eastern Tripoli, including the suburb of Tajoura, were out of government control Sunday, according to a Libyan government official who asked not to be named. Rebels set car tires afire along barricades there, the official said. Meanwhile, Zawiya -- a key coastal city about 30 miles west of the capital -- appeared under rebel control, with celebratory gunfire and fireworks as some yelled out, "Libya is free!" Aref Ali Nayed, an ambassador in the United Arab Emirates for the Libyan rebels' Transitional National Council, said that opposition forces were calling Sunday "Day 1." "The reason we declare it 'Day 1' is because we feel Gadhafi is already finished. He is already finished, most importantly, in our hearts," he said. "We no longer fear him." Ibrahim, the government spokesman, blamed NATO for the conflict and appealed for a cease-fire. "Every drop of Libyan blood shed by these rebels is the responsibility of the Western world, especially NATO's countries," he said. "We hold (U.S. President Barack) Obama, (British Prime Minister David) Cameron and (French President Nicolas) Sarkozy morally responsible for every single unnecessary death that takes place in this country." Several U.S. officials -- including President Barack Obama, Defense Secretary Leon Panetta and Secretary of State Hillary Clinton -- were getting updates on the situation, officials said. "Tonight, the momentum against the Gadhafi regime has reached a tipping point," Obama said in a statement, claiming "Tripoli is slipping from the grasp of a tyrant. ... The surest way for the bloodshed to end is simple: Moammar Gadhafi and his regime need to recognize that their rule has come to an end." In the rebel hub of Benghazi, meanwhile, CNN iReporter Sammi Addahoumi showed video of large, boisterous crowds in the city's Freedom Square reacting as reports of the developments played on a large screen. "The spirits are quite high," said Addahoumi, a 28-year-old deli manager from South Carolina who said his father fled Benghazi decades ago. "Everyone is expecting Tripoli to fall." In the first of his speeches on state television Sunday, though, Gadhafi was still insisting the rebels -- whom he described as "infidels," "traitors" and "gangsters" -- would fail and vowed not to back down. "This is the hour of victory," he said. "This hour is the hour of defiance." CNN's Sara Sidner, Raja Razek, Jomana Karadsheh, Matthew Chance, Christine Theodorou, Kamal Ghattas, Greg Botelho, Mark Phillips, Kareem Khadder, Roba Alhenawi and Barbara Starr and journalist Mike Mount contributed to this report.
#!/usr/bin/env python # -*- coding: utf-8 -*- # Copyright 2017 theloop, Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. """Test Vote Object""" import logging import unittest import loopchain.utils as util import testcase.unittest.test_util as test_util from loopchain.peer import Vote from loopchain.baseservice import PeerManager, PeerInfo from loopchain.protos import loopchain_pb2 from loopchain import configure as conf util.set_log_level_debug() class TestVote(unittest.TestCase): __cert = None def setUp(self): test_util.print_testname(self._testMethodName) if self.__cert is None: with open(conf.PUBLIC_PATH, "rb") as der: cert_byte = der.read() self.__cert = cert_byte def tearDown(self): pass def __make_peer_info(self, peer_id, group_id): peer_info = loopchain_pb2.PeerRequest() peer_info.peer_target = peer_id + "_target" peer_info.peer_type = loopchain_pb2.PEER peer_info.peer_id = peer_id peer_info.group_id = group_id peer_info.cert = self.__cert return peer_info def test_vote_init_from_audience(self): # GIVEN peer_info1 = self.__make_peer_info("peerid-1", "groupid-1") peer_info2 = self.__make_peer_info("peerid-2", "groupid-2") audience = {peer_info1.peer_id: peer_info1, peer_info2.peer_id: peer_info2} # WHEN vote = Vote("block_hash", audience) logging.debug("votes: " + str(vote.votes)) # THEN self.assertTrue(vote.check_vote_init(audience)) def test_vote_init_from_peer_list(self): # GIVEN peer_manager = PeerManager() self.__add_peer_to_peer_manager(peer_manager, 2) # WHEN vote = Vote("block_hash", peer_manager) logging.debug("votes: " + str(vote.votes)) # THEN self.assertTrue(vote.check_vote_init(peer_manager)) def __add_peer_to_peer_manager(self, peer_manager: PeerManager, number_of_peer): for i in range(1, number_of_peer + 1): number = str(i) peer_data = PeerInfo("peerid-" + number, "groupid-" + number, "peerid-" + number + "_target", cert=self.__cert) peer_manager.add_peer(peer_data) def test_vote_init_from_different_source(self): # GIVEN peer_info1 = self.__make_peer_info("peerid-1", "groupid-1") peer_info2 = self.__make_peer_info("peerid-2", "groupid-2") audience = {peer_info1.peer_id: peer_info1, peer_info2.peer_id: peer_info2} peer_manager = PeerManager() self.__add_peer_to_peer_manager(peer_manager, 2) # WHEN vote = Vote("block_hash", audience) logging.debug("votes: " + str(vote.votes)) # THEN self.assertTrue(vote.check_vote_init(peer_manager)) def test_add_vote(self): # GIVEN peer_manager = PeerManager() self.__add_peer_to_peer_manager(peer_manager, 3) peer_manager.add_peer(PeerInfo("peerid-4", "groupid-3", "peerid-4_target", cert=self.__cert)) peer_manager.add_peer(PeerInfo("peerid-5", "groupid-3", "peerid-5_target", cert=self.__cert)) vote = Vote("block_hash", peer_manager) logging.debug("votes: " + str(vote.votes)) # WHEN vote.add_vote("groupid-1", "peerid-1", None) self.assertFalse(vote.get_result("block_hash", 0.51)) # THEN vote.add_vote("groupid-2", "peerid-2", None) self.assertTrue(vote.get_result("block_hash", 0.51)) def test_add_vote_fail_before_add_peer(self): # GIVEN peer_manager = PeerManager() self.__add_peer_to_peer_manager(peer_manager, 3) peer_manager.add_peer(PeerInfo("peerid-4", "groupid-3", "peerid-4_target", cert=self.__cert)) peer_manager.add_peer(PeerInfo("peerid-5", "groupid-3", "peerid-5_target", cert=self.__cert)) vote = Vote("block_hash", peer_manager) logging.debug("votes: " + str(vote.votes)) # WHEN vote.add_vote("groupid-1", "peerid-1", None) vote.add_vote("groupid-3", "peerid-4", None) ret1 = vote.add_vote("groupid-4", "peerid-1", None) ret2 = vote.add_vote("groupid-1", "peerid-9", None) self.assertFalse(ret1) self.assertFalse(ret2) # THEN ret = vote.get_result_detail("block_hash", 0.51) self.assertEqual(ret[5], 5) def test_fail_vote(self): # GIVEN peer_manager = PeerManager() self.__add_peer_to_peer_manager(peer_manager, 3) peer_manager.add_peer(PeerInfo("peerid-4", "groupid-3", "peerid-4_target", cert=self.__cert)) peer_manager.add_peer(PeerInfo("peerid-5", "groupid-3", "peerid-5_target", cert=self.__cert)) vote = Vote("block_hash", peer_manager) logging.debug("votes: " + str(vote.votes)) # WHEN vote.add_vote("groupid-1", "peerid-1", conf.TEST_FAIL_VOTE_SIGN) vote.add_vote("groupid-3", "peerid-4", conf.TEST_FAIL_VOTE_SIGN) vote.add_vote("groupid-3", "peerid-5", conf.TEST_FAIL_VOTE_SIGN) vote.get_result("block_hash", 0.51) # THEN self.assertTrue(vote.is_failed_vote("block_hash", 0.51)) if __name__ == '__main__': unittest.main()
Book Review : Johan Jrgen Holst/Kenneth Hunt/Anders C. Sjaastad (editors): Deterrence and Defense in the North. Oslo: Norwegian University Press, 1985, 244 pp not only of explaining the problems but also of making the reader hopefully sympathetically understanding and respecting Norways approach and endeavours in relation to national security and alliance obligations. More important, however, this mix is underlined by the fact that the two Norwegian editors are the former (A. C. Sjaastad) and the present (J. J. Holst) Norwegian Ministers of Defence, both with the major parts of their careers as senior staff members at the
# Author by CRS-club and wizard import pickle import random from PIL import Image import numpy as np import matplotlib.pyplot as plt import os def decode_pickle(sample, mode, seg_num, seglen, short_size, target_size, img_mean, img_std): pickle_path = sample try: data_load = pickle.load( open(pickle_path, 'rb'), encoding='bytes' ) vid, label, frames = data_load except: print('Error when loading', pickle_path) return None, None if mode == 'train' or mode == 'valid' or mode == 'test': ret_label = label elif mode == 'infer': ret_label = vid imgs = video_loader(frames, seg_num, seglen, mode) return imgs_transform(imgs, ret_label, mode, seg_num, seglen, short_size, target_size, img_mean, img_std) def video_loader(frames, nsample, seglen, mode): video_len = len(frames) average_dur = int(video_len / nsample) imgs = [] for i in range(nsample): idx = 0 if mode == 'train': if average_dur >= seglen: idx = random.randint(0, average_dur - seglen) idx += i * average_dur elif average_dur >= 1: idx += i * average_dur else: idx = i else: if average_dur >= seglen: idx = (average_dur - seglen) // 2 idx += i * average_dur elif average_dur >= 1: idx += i * average_dur else: idx = i for jj in range(idx, idx + seglen): imgbuf = frames[int(jj % video_len)] img = imageloader(imgbuf) imgs.append(img) return imgs def imageloader(imgbuf): img = Image.open(imgbuf) return img.convert('RGB') def imgs_transform(imgs, label, mode, seg_num, seglen, short_size, target_size, img_mean, img_std): imgs = group_scale(imgs, short_size) if mode == 'train': imgs = group_random_crop(imgs, target_size) imgs = group_random_flip(imgs) else: imgs = group_center_crop(imgs, target_size) np_imgs = (np.array(imgs[0]).astype('float32').transpose( (2, 0, 1))).reshape(1, 3, target_size, target_size) / 255 for i in range(len(imgs) - 1): img = (np.array(imgs[i + 1]).astype('float32').transpose( (2, 0, 1))).reshape(1, 3, target_size, target_size) / 255 np_imgs = np.concatenate((np_imgs, img)) imgs = np_imgs # imgs -= img_mean # imgs /= img_std imgs = np.reshape(imgs, (seg_num, seglen * 3, target_size, target_size)) return imgs, label def group_scale(imgs, target_size): resized_imgs = [] for i in range(len(imgs)): img = imgs[i] w, h = img.size if (w <= h and w == target_size) or (h <= w and h == target_size): resized_imgs.append(img) continue if w < h: ow = target_size oh = int(target_size * 4.0 / 3.0) resized_imgs.append(img.resize((ow, oh), Image.BILINEAR)) else: oh = target_size ow = int(target_size * 4.0 / 3.0) resized_imgs.append(img.resize((ow, oh), Image.BILINEAR)) return resized_imgs def group_random_crop(img_group, target_size): w, h = img_group[0].size th, tw = target_size, target_size assert (w >= target_size) and (h >= target_size), \ "image width({}) and height({}) should be larger than crop size".format(w, h, target_size) out_images = [] x1 = random.randint(0, w - tw) y1 = random.randint(0, h - th) for img in img_group: if w == tw and h == th: out_images.append(img) else: out_images.append(img.crop((x1, y1, x1 + tw, y1 + th))) return out_images def group_random_flip(img_group): v = random.random() if v < 0.5: ret = [img.transpose(Image.FLIP_LEFT_RIGHT) for img in img_group] return ret else: return img_group def group_center_crop(img_group, target_size): img_crop = [] for img in img_group: w, h = img.size th, tw = target_size, target_size assert (w >= target_size) and (h >= target_size), \ "image width({}) and height({}) should be larger than crop size".format(w, h, target_size) x1 = int(round((w - tw) / 2.)) y1 = int(round((h - th) / 2.)) img_crop.append(img.crop((x1, y1, x1 + tw, y1 + th))) return img_crop def reader(file_path, batch_size, seg_num, seglen, short_size, target_size): pkl_list = os.listdir(file_path) mean = np.array([0.485, 0.456, 0.406]).reshape([3, 1, 1]).astype(np.float32) std = np.array([1, 1, 1]).reshape([3, 1, 1]).astype(np.float32) random.shuffle(pkl_list) batch = 0 for ii in pkl_list: temp_path = os.path.join(file_path, ii) imgs, label = decode_pickle(temp_path, 'train', seg_num, seglen, short_size, target_size, mean, std) batch += 1 if batch == batch_size: yield imgs, label batch = 0 else: pass if __name__ == '__main__': data_dir = 'hmdb_data_demo/train/' for list in reader(data_dir, 1, 3, 1, 240, 224): print(list[0]) label = list[1] imgs = list[0] print(label) k = 1 for i in imgs: temp = np.transpose(i, [1, 2, 0]) plt.figure(str(k)) k += 1 plt.imshow(temp) plt.axis('off') plt.show() os.system("pause")
ValueInsured, a company that provides down payment insurance for borrowers, is now also offering equity protection for borrowers who want to refinance their mortgage. Through the +Plus Equity Protection program, borrowers pay a premium in exchange for ValueInsured agreeing to reimburse up to the full amount of their equity under certain conditions. ValueInsured, a company that provides down payment insurance for borrowers, announced Wednesday that it raised $6.5 million to fund the company’s growth. Through ValueInsured's +Plus down payment insurance program, borrowers pay a premium to ValueInsured in exchange for having their down payment insured against a downturn in the housing market should they decide to sell their home. While Americans are still confident in housing as part of the American dream, they are becoming increasingly unsure on the timing. Many expressed fears about buying now, saying home prices are facing an imminent correction. Pacific Union Financial and ValueInsured announced the launch of PacificPlus, a new mortgage program that protects a homebuyer’s down payment. PacificPlus features ValueInsured’s +Plus down payment protection written into Pacific Union Financial’s mortgages. Millennials are more likely than other generations to see another economic crash on the horizon. While many want homes, they are concerned with saving up enough for a down payment. The good news is that they haven’t given up on the American Dream, they just changed it slightly. A new program launching early next year will give borrowers the opportunity to protect their upfront investment in their home, just as lenders are able to do with mortgage insurance. Meet down payment insurance — for borrowers.
<filename>src/app/layouts/admin-layout/admin-layout.routing.ts import { Routes } from '@angular/router'; import { DashboardComponent } from '../../pages/dashboard/dashboard.component'; import { ApiInformationComponent } from '../../pages/api-information/api-information.component'; import { TablesComponent } from '../../pages/tables/tables.component'; import { UserProfileComponent } from '../../pages/user-profile/user-profile.component'; export const AdminLayoutRoutes: Routes = [ { path: 'dashboard', data: { reuse: true }, component: DashboardComponent }, { path: 'api-information', component: ApiInformationComponent }, { path: 'user-profile', component: UserProfileComponent }, { path: 'tables', component: TablesComponent }, ];
MANCHESTER UNITED are expected to start without Marcus Rashford and Alexis Sanchez against Newcastle tonight. Romelu Lukaku looks set to be named in Ole Gunnar Solksjaer's line-up for the first time following his brief appearance against Bournemouth. Rashford, 21, remains a doubt after a suspected groin injury forced him off the field during Sunday's 4-1 win over the Cherries. The 21-year-old, who was scored two goals in three games under Solskjaer, was replaced by Lukaku in the 70th minute. Lukaku, 25, missed wins over Cardiff and Huddersfield, but bounced back and scored United's fourth goal at Old Trafford. Solskjaer has ordered the 25-year-old to get fit and claimed that he will not use him as a target man in his team. Sanchez, 30, is expected to feature, but he could start the match on the sidelines following a hamstring injury. The former Arsenal ace, who has scored just one goal this season, has been training with the squad this week. Eric Bailly will miss the match at St James' Park as he will serve the first of a three-match suspension following his red card on Sunday. Defenders Chris Smalling and Marcos Rojo are absent through injury, which will leave Victor Lindelof and Phil Jones in the heart of defence. Diogo Dalot could return at full-back after he was dropped for the win over Bournemouth. Paul Pogba found himself stuck on the sidelines at times under Jose Mourinho, but the Frenchman is set to start after he scored twice against Bournemouth. Anthony Martial is expected to be in the starting XI despite being told off by the new boss for returning late from a Christmas break.
<reponame>oleg-jukovec/code-examples<gh_stars>1-10 #ifndef TEXTBROWSERLOGER_H #define TEXTBROWSERLOGER_H /* * Файл textbrowserloger.h */ #include <QTextBrowser> #include "loger.h" /* * Класс TextBrowserLoger расширяет класс Loger для вывода * сообщений в объект QTextBrowser */ class TextBrowserLoger : public Loger { // ссылка на объект QTextBrowser *browser; public: // конструирует объект класса TextBrowserLoger TextBrowserLoger(QTextBrowser *browser, Loger::level lvl); // виртуальный деструктор virtual ~TextBrowserLoger(){} protected: // переопределённая функция virtual void send(QString message) const; }; #endif // TEXTBROWSERLOGER_H
Typically, the big utilities don’t build their own solar and wind farms; instead they sign contracts to buy power for multiple years from independent developers. PG&E has contracts worth a combined $44 billion on the books, according to court papers. Many of them, especially with solar-power providers, were signed years ago, when solar was four times more expensive than now, said Severin Borenstein, an energy economist at UC Berkeley. Investment firm Credit Suisse estimated that PG&E could save $2.2 billion a year if it could buy renewable energy at today’s cheaper prices. So PG&E has financial incentive to back out on some of those contracts – and bankruptcy law generally allows bankrupt companies to cancel existing contracts as long as the judge approves. So far, PG&E is promising nothing. In fact, it’s hinting it might want to get out of some of its renewable energy agreements. The issue pits PG&E against renewable suppliers – and the federal government. On Jan. 25, the Federal Energy Regulatory Commission ruled that it has “concurrent jurisdiction” with the bankruptcy court to decide whether PG&E can back out of any renewable energy contracts. On Tuesday, the same day it filed for bankruptcy, PG&E asked the bankruptcy judge to invalidate FERC’s decision and give the bankruptcy court exclusive authority over those contracts. The utility’s lawyers argued in court papers that PG&E has plenty of electricity, is paying “above-market rates” for much of its renewable energy, and should have the freedom to withdraw from its contracts. The green-energy industry is on high alert. Even before PG&E filed for bankruptcy, Wall Street credit-rating agency Fitch downgraded to “junk bond” status the ratings of two major renewable projects that sell exclusively to PG&E: a solar farm near San Luis Obispo owned by financier Warren Buffett’s Berkshire Hathaway Energy, and a string of geothermal geysers in Sonoma and Lake counties owned by Calpine Corp. of Houston. The two projects produce a combined 1,200 megawatts of power, enough to serve 900,000 homes. The carbon displaced by the San Luis Obispo plant alone is the equivalent of taking 73,000 cars off the road, according to Berkshire Hathaway. California elected officials such as Gov. Gavin Newsom have vowed that the utility’s bankruptcy won’t derail the state’s march toward a carbon-free future. Green advocates also take comfort in PG&E’s performance during its first bankruptcy, in 2001. The company had a relatively small number of renewable energy contracts in place, which were required by federal law, and honored all of them. Now, however, the company has more contracts in place, as the California Legislature has dramatically ramped up the requirements on utilities to make use of renewable energy. The state’s first “renewable portfolio standard” was signed into law by then-Gov. Gray Davis in 2002. The law required utilities to become 20 percent renewable by 2017. A 2011 law established a 33 percent green-energy minimum by 2020 – the threshold that PG&E boasted about meeting three years early. And last September, former Gov. Jerry Brown signed SB 100, requiring utilities to be 50 percent green by 2026, 60 percent by 2030 and 100 percent by 2045. Meeting those targets will require a lot of investments by California’s utilities in the coming years. PG&E’s predicament won’t help. Neither will the fear that as mega-wildfires become more routine, other utilities could get dragged down financially.
GRAND RAPIDS, MI - Kendall College of Art and Design President David Rosen has resigned as president of the Grand Rapids art school. He made the announcement Thursday, April 10 in an email to students and faculty. Rosen, who took over as Kendall’s president in 2012, said he voluntarily resigned in March and his resignation is effective today. He said he’s “fully satisfied with the terms and conditions of my departure,” but did not elaborate on his reasons for leaving Kendall. Students and faculty rallied in support of Rosen on Wednesday after rumors of his resignation surfaced. They created a petition in his support and took to Twitter and Facebook to praise Rosen, saying he’s been an effective, forward-thinking leader. One Twitter post read: “The forced stepdown of Dr. Rosen would be a tragedy.” Related: In his message, Rosen said the demonstrations, both physical and online, have been “disruptive.” “These are not in my best interest, nor in the best interest of the college, our students, alumni, or supporters,” he said. “They are also based on misinformation. I was not terminated.” Rosen, who has not returned calls or emails, said he’s “appreciated” his time at Kendall. I “now look forward, without reservation, to new challenges,” he said. Ferris State University President David Eisler, in an email to Kendall students and staff, said he's "appreciated Dr. Rosen's nearly two years of service to Kendall and accepted his resignation with regret." Eisler said former Kendall President Oliver Evans will serve as interim president effective today. He said a search committee will be formed to find the institution's next president. "I want to thank Dr. Evans for his willingness to take on this new role," Eisler said. "His depth of experience, his dedication to students, and his commitment to the central role Kendall plays in the vitality of Grand Rapids’ arts and cultural life make him the obvious choice to further the college’s mission and goals at this time. Ferris officials declined to comment this morning on Rosen's departure, saying an official statement would be coming Thursday. Brian McVicar covers education for MLive and The Grand Rapids Press. Email him at bmcvicar@mlive.com or follow him on Twitter
Enrichment for Th1 cells in the Mel-14+ CD4+ T cell fraction in aged mice. CD4+ T cells from young and aged mice were sorted into Mel-14+ cells which are regarded as naive cells and Mel-14- cells which are regarded as memory cells. These subsets were stimulated in short-time cultures with anti-CD3 or anti-CD3/anti-CD28 in order to determine the presence of Th1 and/or Th2 cytokines. Based on the simultaneous production of IL-2, IL-4, IL-10, and IFN-gamma upon anti-CD3 stimulation by Mel-14- cells from young and aged mice, it is concluded that this cell population comprises Th1, Th2, and/or Th0 cells. Mel-14+ cells from young mice only secrete substantial amounts of IL-2 in the presence of anti-CD28 as a costimulatory signal and can therefore be regarded as Th precursor cells. By contrast, Mel-14+ cells from aged mice responded to anti-CD3 alone, not only by the production of IL-2 but also by the production of high amounts of IFN-gamma and minute amounts of IL-4 and IL-10, suggesting that these "naive" cells in aged mice are enriched for Th1 cells. This was not due to lack of CD28 triggering since anti-CD28 enhanced IFN-gamma as well as IL-4 and IL-10 to a similar extent. Our data therefore indicate that Mel-14 is not exclusively expressed on naive CD4+ T cells.
Acute Suppurative Thyroiditis Complicated with Hepatic Degeneration in a Yankassa Sheep: A Postmortem Report Suppurative thyroiditis is a rare but potentially fatal bacterial disease. Most bacterial infections of the thyroid gland occur via the pyriform sinus fistulae and by hematogenous spread from systemic bacterial diseases. A 2 year-old Yankasa ewe was presented with complaint of anorexia, weakness and a swelling 4-5cm around the ventral neck region near the larynx. Swelling was identified as abscesses. The cut section of the gland contained a thick creamy purulent exudate from which Staphylococcus aureus was isolated. Microscopically there was necrosis and accumulation of neutrophils and macrophages in the thyroid gland. The liver showed fatty degeneration of the hepatocytes. Staphylococcus aureus, a pyogenic bacterium is a normal micro biota but can also be an opportunistic pathogen especially with immunosuppression. Most of the published literature on acute suppurative thyroiditis are related to humans. Hence in this report we present a rare case of thyroiditis caused by Staphylococcus aureus in Ovine species.
/*- * ========================LICENSE_START================================= * JSoagger * %% * Copyright (C) 2019 JSOAGGER * %% * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * =========================LICENSE_END================================== */ package io.github.jsoagger.jfxcore.components.search.comps; import io.github.jsoagger.jfxcore.engine.client.utils.NodeHelper; import io.github.jsoagger.jfxcore.api.IBuildable; import io.github.jsoagger.jfxcore.api.IJSoaggerController; import io.github.jsoagger.jfxcore.viewdef.json.xml.model.VLViewComponentXML; import io.github.jsoagger.jfxcore.engine.controller.AbstractViewController; import io.github.jsoagger.jfxcore.engine.utils.ComponentUtils; import javafx.application.Platform; import javafx.scene.Node; import javafx.scene.control.Button; import javafx.scene.control.Label; import javafx.scene.layout.HBox; /** * @author <NAME> * @mailto <EMAIL> * @date 2019 */ public class SearchResutHeader implements IBuildable { private HBox rootContainer = new HBox(); private Label searchResults = new Label(); private Button saveSearchButton = new Button("Save"); AbstractViewController controller; /** * Constructor */ public SearchResutHeader() {} /** * @{inheritedDoc} */ @Override public void buildFrom(IJSoaggerController controller, VLViewComponentXML configuration) { this.controller = (AbstractViewController) controller; VLViewComponentXML config = ComponentUtils.resolveDefinition((AbstractViewController)controller, "SearchResultToolBar").orElse(null); if (config != null) { NodeHelper.styleClassAddAll(rootContainer, config, "styleClass", "ep-search-result-header-pane"); NodeHelper.styleClassAddAll(searchResults, config, "searchResultStyleClass", "ep-search-result-header-search-result-label"); } else { rootContainer.getStyleClass().add("ep-search-result-header-pane"); searchResults.getStyleClass().add("ep-search-result-header-search-result-label"); } boolean withSaveAction = config == null || config.getBooleanProperty("withSaveAction", true); saveSearchButton.setVisible(withSaveAction); if (withSaveAction) { saveSearchButton.getStyleClass().addAll("ep-search-result-header-save-search-button", "button-large", "button-accent"); } // rootContainer.getChildren().addAll(searchResults, // NodeHelper.horizontalSpacer(), saveSearchButton); rootContainer.getChildren().addAll(searchResults, NodeHelper.horizontalSpacer()); searchResults.setText(controller.getLocalised("NO_RESULT_LABEL")); saveSearchButton.setDisable(true); } /** * @{inheritedDoc} */ @Override public Node getDisplay() { return rootContainer; } public void count(Number newValue) { saveSearchButton.setDisable(1 > newValue.intValue()); String msg = controller.getLocalised("RESULT_FOUND_LABEL", newValue.intValue()); Platform.runLater(() -> { searchResults.setText(msg); }); } }
Babies for the Nation: The Medicalization of Motherhood in Quebec, 19101970 (review) treatment, and death. Her essay is a thoughtful continuation of this extended study. Mona Gleasons essay is focused on interpretation mediated through the body but adds memories of Canadian adults to compare expert sources with lived experiences. It is a concern that childrens voices have been mediated by memory or the interview process in both essays, yet there are limited methods for capturing and interpreting childrens experiences without these tools. Finding original sources remains a work in progress for many scholars in the field. The fourth section attempts to address the problems of defining and measuring children health and its consequences for policy making. In contrast, the two essays in the final section discuss qualitative representations of childrenin paintings and photographs. Healing the Worlds Children is a valuable addition to our field for its creative, cross-disciplinary approach. Yet I believe its impact would have been greater if the editors had challenged readers by including questions and commentary for each section and adding a strong conclusion to the entire volume. By building bridges among essays and showing interconnections among material with such breadth (across disciplines, place, and time), the result would have been a provocative volume that challenged historians to reevaluate their sources and perspectives. And if the editors primary goal was to draw on the past to inform future action, an epilogue could have oriented readers toward greater involvement in current debates and policy decisions. As is, Healing the Worlds Children should be on the reading list of all students and scholars needing an insightful review into past and present work in the quickly evolving field of childhood studies.
def dict_to_insert_string(dict_in: dict, sep=", ") -> str: try: vals = [[k, v] for k, v in dict_in.items()] vals = [" ".join(x) for x in vals] vals = sep.join(vals) except Exception as e: print(e) return vals
/** * Adds a {@link Collection} of observations to the current Sample. The criteria * for valid observations include: * <ol> * <li>Must be non-null</li> * <li>Must be finite (not infinite or NaN)</li> * </ol> * * @param observationsCollection The collections of elements to be added. * @return This SampleBuilder to facilitate chaining of method calls. * @throws IllegalArgumentException If any of the items is null, infinite or NaN. */ public SampleBuilder addObservations(final Collection<Double> observationsCollection) throws IllegalArgumentException { for (Double observation : observationsCollection) { Objects.requireNonNull(observation); addObservation(observation); } return this; }
Demonstration of a 200 kW/200 kWh energy storage system on an 11kV UK distribution feeder A 200kW/200kWh energy storage system connected to a UK 11kV distribution network has been used to demonstrate a range of operational duties. To maximize the information that can be gathered during the operation of the device, primary and secondary sites have been instrumented to provide power and voltage measurements. Control algorithms have been devised to perform adaptive peak-shaving operations that track the daily variations in time and magnitude of peak power flows. Results are presented from actual network measurements of scheduled power exchange operations and both simulations and trial results of peak-shaving operations. Simulation results are used in an ageing model to determine the battery lifetime effects when allowing alternative depth-of-discharge to be reached.
Comparison of a loop-mediated isothermal amplification for orf virus with quantitative real-time PCR Background Orf virus (ORFV) causes orf (also known as contagious ecthyma or contagious papular dermatitis), a severe infectious skin disease in goats, sheep and other ruminants. Therefore, a rapid, highly specific and accurate method for the diagnosis of ORFV infections is essential to ensure that the appropriate treatments are administered and to reduce economic losses. Methods A loop-mediated isothermal amplification (LAMP) assay based on the identification of the F1L gene was developed for the specific detection of ORFV infections. The sensitivity and specificity of the LAMP assay were evaluated, and the effectiveness of this method was compared with that of real-time PCR. Results The sensitivity of this assay was determined to be 10 copies of a standard plasmid. Furthermore, no cross-reactivity was found with either capripox virus or FMDV. The LAMP and real-time PCR assays were both able to detect intracutaneous- and cohabitation-infection samples, with a concordance of 97.83%. LAMP demonstrated a sensitivity of 89.13%. Conclusion The LAMP assay is a highly efficient and practical method for detecting ORFV infection. This LAMP method shows great potential for monitoring the prevalence of orf, and it could prove to be a powerful supplemental tool for current diagnostic methods. Background The orf virus (ORFV) is the prototype member of the Parapoxvirus genus within the Poxviridae family. The ORFV has a worldwide distribution and causes an infectious skin disease known as contagious ecthyma in goats, sheep and other ruminants. For susceptible young sheep in an epidemic situation, mortality can reach 90%. Therefore, a practical and reliable method for the diagnosis of ORFV infections is required. For diagnosis of such infections, clinical signs, virus isolation and electron microscopy are commonly used along with serological tests. However, these methods are laborious, time-consuming and, in some cases, not effective. For example, virus isolation can be unsuccessful at times, even when virus-like particles are observed in the lesions resulting from infection. Goats and sheep are commonly infected with the virus, yet serological tests have not confirmed the cause of clinical signs. PCRbased diagnostic assays have been developed for the sensitive and specific detection of ORFV infections. However, these assays have not been widely adopted in resource-poor regions due to their relatively complex nature, as well as the need for both expensive equipment and highly trained personnel. Loop-mediated isothermal amplification (LAMP) is a simple technique that rapidly amplifies specific DNA sequences with high sensitivity under isothermal conditions. LAMP products can easily be detected by the naked eye due to the formation of magnesium pyrophosphate, a turbid white by-product of DNA amplification that accumulates as the reaction progresses. In addition, LAMP products can be detected by direct fluorescence. Other fluorescent dyes, such as ethidium bromide, SYBR green and Evagreen, have also been used for visualization of LAMP products. Furthermore, Thekisoe et al. have reported that LAMP reagents are relatively stable even when stored at 25 or 37°C, which supports the use of LAMP in field conditions and resource-poor laboratories. Recently, LAMP assays targeting the B2L and DNA polymerase genes of ORFV have been developed, and these methods were found to be powerful diagnostic tools. The F1L gene is part of the highly conserved central region of the ORFV genome. In the present study, a LAMP assay was developed to specifically identify the F1L gene sequence to facilitate the detection of ORFV infections and the effectiveness of this method was compared with that of real-time PCR. Detection of LAMP product The LAMP products were electrophoresed on a 1.5% agarose gel stained with ethidium bromide solution and visualized under UV light. In addition, visual inspection of the LAMP products was performed by adding SYBR Green I to the reaction mixture tube and observing the fluorescent signals of the solutions under daylight conditions against a black background ( Figure 1). Sensitivity of LAMP To determine the detection limit of the LAMP assay, 10-fold serial dilutions of the PF1L were amplified using LAMP. As determined using both 1.5% agarose gel electrophoresis and color inspection with SYBR Green I dye, the detection limit of the LAMP assay was determined to be 10 copies of DNA ( Figure 2). Specificity of LAMP The specificity of the LAMP assay was evaluated using the genomic DNA of 10 known ORFV isolates, capripox virus and FMDV. Only the specific ORFV target DNA was amplified by LAMP. No cross-reactivity was observed with the DNA samples of capripox virus or FMDV. These results confirm that the LAMP assay is highly specific (Figure 3). Sensitivity and specificity of real-time PCR To determine the detection limit of the real-time PCR, the copy number of a recombinant plasmid containing the B2L gene (PB2L), which was previously constructed by our lab, was calculated as described below. PB2L was amplified from 10-fold serial dilutions using real-time PCR. The detection limit was found to be 10 copies/l. The real-time PCR slope was −3.218, with an R 2 = 1 and a reaction efficiency of 104.5%. Moreover, the standard curve generated using the 10-fold serial dilutions of the plasmid was linear over eight orders of magnitude (1 to 10 8 copies/l), demonstrating that real-time PCR can be used to accurately quantify this target DNA over a large range of concentrations ( Figure 4A). The primers chosen for real-time PCR were initially validated by monitoring product amplification with SYBR Green I. Melting curve analysis showed a unique peak at 86°C, indicating the formation of a single PCR product without the presence of nonspecific amplification products or primer dimers ( Figure 4B). To further determine the specificity of the amplification reaction with the chosen primers, the SYBR Green I-based realtime PCR was performed using DNA from 10 different isolates of ORFV, capripox virus and FMDV. All ORFV DNA samples tested using SYBR Green I-based realtime PCR yielded a positive result. However, the DNA samples from capripox virus and FMDV did not yield an amplification signals ( Figure 4C). Evaluation of the LAMP assay using samples from experimentally infected goats To evaluate the practicality and efficiency of the LAMP assay, its ability to detect ORFV infections was tested using the skin lesions from experimentally infected goats. Forty-six samples of skin lesions from four experimentally infected goats were tested using the LAMP (by both visual inspection and agarose gel electrophoresis methods) and real-time PCR assays. Forty-one samples were determined to be positive by both LAMP and realtime PCR. One sample was determined to be negative by LAMP assay but positive by real-time PCR. The sensitivities of the LAMP and real-time PCR assays were 89.13% and 91.30%, respectively (Table 1), and the results were very similar between the two assays. Discussion Orf is distributed throughout many countries [2,, and ORFV infections can cause weight loss and poor development as the disease prevents host animals from feeding. Therefore, the development of a rapid, simple and sensitive detection method for ORFV infections is required. For the diagnosis of ORFV infections, the LAMP assay has many advantages, such as simplicity, rapidity and inexpensiveness, compared with other nucleic acid-based tests. In addition, previous reports have demonstrated that the sensitivity of the LAMP is higher than that of conventional PCR or nested PCR for detecting ORFV infections. Therefore, this method shows great potential for use in resource-limited veterinary laboratories in developing countries (e.g., China), where many endemic diseases exist. In the present study, we evaluated the sensitivity and specificity of the rapid diagnostic LAMP method. The simplest way of detecting LAMP products is to visually inspect the white turbidity that results from magnesium pyrophosphate accumulation as a by-product of the reaction. However, a small amount of this white precipitate is not always distinguishable from other white precipitates, such as proteins or carbohydrates that can be derived from the templates. Therefore, existing "fieldfriendly" LAMP-based detection systems are still imperfect. Previous report has demonstrated that amplified DNA can be stained (using PicoGreen or ethidium bromide) and visualized in solution with the same sensitivity as agarose gel electrophoresis. In this study, we used the dye SYBR Green I to detect the amplified DNA products. Positive and negative reactions could be differentiated by distinctly different colors when viewed under daylight conditions against a black background (Figure 1). Consistent with previous report, this color inspection method was found to have the same detection limit as agarose gel electrophoresis (Figure 2), which should facilitate the rapid screening of samples without the need for gel electrophoresis. These results indicate that visual color inspection of LAMP products using the SYBR Green I dye should be practical under field conditions. The reliability of a LAMP assay depends largely on the specificity of the primer sets being used. These primer sets in this study-two outer primers (F3 and B3) and two inner primers (FIP and BIP)-allow for the recognition of six sites in the target sequence that are specific to the F1L gene and that are necessary for the LAMP reaction to occur. Based on the sequences of the ORFV F1L gene available in GenBank and the sequences of ORFV isolates from China, we designed and tested several sets of primers using comparative experiments, and the primer sets that yielded the highest specificity and sensitivity in the LAMP assay is reported here. Our LAMP assay showed high specificity and sensitivity, as it yielded positive results for all 10 of the known ORFV isolates but did not amplify the negative control samples (Figure 3). Samples from experimentally infected goats were tested using both the LAMP and real-time PCR assays. The LAMP assay correctly identified 41 out of 46 samples as positive (89.13%), and the real-time PCR assay correctly identified 42 out of 46 samples as positive (91.30%). ORFV DNA could be detected in most of the intracutaneous-and cohabitation-infection samples from the time of lesion presentation to recovery (Table 1). Therefore, we observed a very good agreement between the LAMP and real-time PCR results. Only one sample was identified as negative by LAMP (both by visual inspection and agarose gel electrophoresis) but as positive by real-time PCR. This discrepancy was most likely due to very low ORFV levels in this sample, which may have been beyond the detection limit of LAMP. This result suggests that the sensitivity of LAMP is slightly lower than that of real-time PCR. However, it is important to consider that real-time PCR is a time-consuming procedure that requires expensive and relatively complicated equipment, including a thermal cycler with real-time monitoring and data-analysis systems. Therefore, this LAMP-based assay has clear advantages over real-time PCR in terms of practicality, and it can be easily used in any standard diagnostic laboratory, particularly in developing countries where the disease is prevalent. Conclusions We show that a LAMP assay based on amplification of the ORFV F1L gene is rapid, highly specific and accurate for the detection of ORFV infections. The sensitivity of this LAMP (89.13%) was higher than previously reported (70% and 74.3%, respectively). Furthermore, this color inspection method with SYBR Green I dye had the same sensitivity as agarose gel electrophoresis, which should facilitate the rapid large-scale screening of samples and the rapid diagnosis of ORFV infections under field conditions without the use of agarose gel electrophoresis. Therefore, we conclude that this LAMP is a practical and reliable method for detecting ORFV infections, and we suggest that this test can be adopted as a powerful supplemental tool to current diagnostic assays. Intracutaneous and cohabitation infection of goats Four healthy 12-to 14-week-old goats were selected for this study. The ORFV strain ORFV/HB/09 was propagated in bovine testicular cells using Eagle's minimal essential medium (Shanghai Gaochuang Medical Science And Technology Co., Ltd, Shanghai, China) containing 10% fetal calf serum (TCID 50 = 10 -5.3 /0.1 ml), which was used to infect the goats to prepare the ORFV-positive samples. Two goats were inoculated intradermally on oral mucosa with viral supernatant (0.2 ml per goat) and housed individually. After 7 days, each non-inoculated goat was housed with one inoculated goat, thereby making two replicate cohabitation groups. The clinical signs and (See figure on previous page.) Figure 4 Sensitivity and specificity of real-time PCR assay. The standard curve (A) and dissociation curve (B) were generated using known concentration of recombinant plasmid containing the B2L gene from 10 8 to 10 0 copies. The dissociation curves of real-time PCR used to detect ORFV and other select viruses (C). macroscopic lesions of goats infected via both routes were observed. The samples of the skin lesions around the muzzle and lips were collected from the time of lesion presentation to recovery, and these samples were used to evaluate of the LAMP method. All experimental procedures and animal care were conducted in accordance with the guidelines and the regulations of the Gansu Animal Care and Use Committee. The experimental protocol was approved by the Ethical Committee of the Lanzhou Veterinary Research Institute, Chinese Academy of Agricultural Sciences (XYXK-(Gan) 2010-003). DNA extraction Briefly, the tissue sample (25 mg) was mechanically homogenized in 250 l of phosphate-buffered saline (PBS) in a tube using a pellet pestle device. The homogenates were centrifuged at 2000 g for 3 min, and the supernatant was collected. The DNA templates for the LAMP and RT-PCR assays were extracted using the Universal Genomic DNA Extraction kit (TaKaRa Biotechnology Co., Ltd, Dalian, China) according to the manufacturer's protocol. DNA samples extracted from healthy goats were used in parallel with the experimental samples as negative controls. LAMP assay The LAMP primer sets ( Table 2) were designed from the F1L gene region of the published sequence of ORFV isolate Jilin-Nongan (GenBank accession no. JQ271535.1) using Sensitivity and specificity of the LAMP assay The copy number of the recombinant plasmid containing the F1L gene (PF1L), which was constructed previously by our lab, was calculated as described by Wang et al.. Briefly, the concentration of PF1L (X) was determined by spectrophotometry and converted to number of molecules using the following formula: copies/ml = 6.02 10 23 X/Y (X = OD 260 50 10 -6 g/ml dilution factor; Y = the length of PF1L (bp) 660). The sensitivity of the LAMP assay was then determined using the 10-fold serial dilutions of PF1L. Additionally, the specificity of the LAMP assay was determined using DNA from 10 known isolates of ORFV, 2 strains of capripox virus and 2 strains of FMDV. Real-time PCR The primers for SYBR Green I-based real-time PCR were synthesized according to the published reference, 5-CAGCAGAGCCGCGTGAA-3, and 5-CATGAACCGC TACAACACCTTCT-3. Real-time PCR was performed with the detection of the B2L gene of ORFV on an ABI PRISM 7500 thermocycler. The real-time PCR reactions were prepared for a 25 l reaction volume containing 2 SYBR Premix Ex Taq II supplemented with ROX II, the primers (10 M each) and 3 l of DNA template. The cycling parameters were as follows: preheat at 95°C for 30 s, then 40 cycles of 95°C for 5 s and 64°C for 20 s. After amplification, the data were then analyzed using the 7500 System software. A melting curve analysis was performed to verify the uniqueness of the amplified product by its specific melting temperature.
GCMS analysis of the ruminal metabolome response to thiamine supplementation during high grain feeding in dairy cows Thiamine is known to attenuate high-concentrate diet induced subacute ruminal acidosis (SARA) in dairy cows, however, the underlying mechanisms remain unclear. The major objective of this study was to investigate the metabolic mechanisms of thiamine supplementation on high-concentrate diet induced SARA. Six multiparous, rumen-fistulated Holstein cows were used in a replicated 33 Latin square design. The treatments included a control diet (CON; 20% starch, dry matter basis), a SARA-inducing diet (SAID; 33.2% starch, dry matter basis) and SARA-inducing diet supplemented with 180 mg of thiamine/kg of dry matter intake (SAID+T). On d21 of each period, ruminal fluid samples were collected at 3 h post feeding, and GC/MS was used to analyze rumen fluid samples. PCA and OPLS-DA analysis demonstrated that the ruminal metabolite profile were different in three treatments. Compared with CON treatment, SAID feeding significantly decreased rumen pH, acetate, succinic acid, increased propionate, pyruvate, lactate, glycine and biogenic amines including spermidine and putrescine. Thiamine supplementation significantly decreased rumen content of propionate, pyruvate, lactate, glycine and spermidine; increase rumen pH, acetate and some medium-chain fatty acids. The enrichment analysis of different metabolites indicated that thiamine supplementation mainly affected carbohydrates, amino acids, pyruvate and thiamine metabolism compared with SAID treatment. These findings revealed that thiamine supplementation could attenuate high-concentrate diet induced SARA by increasing pyruvate formate-lyase activity to promote pyruvate to generate acetyl-CoA and inhibit lactate generation. Besides, thiamine reduced biogenic amines to alleviate ruminal epithelial inflammatory response. Introduction Subacute ruminal acidosis (SARA) is an important nutritional metabolic disease in high yielding dairy cows because of the increased consumption of concentrates and highlyfermentable forages (). The effects of SARA include decreased dry matter intake and lower milk yield (Enemark 2008), ruminal pH decrease, accumulation of biogenic amines and volatile fatty acids (VFAs) (Sato 2015), rumen epithelial damage () and laminitis (). Since SARA leads to considerable damage in dairy cows, it is necessary to find a suitable mitigation method to attenuate SARA. Interestingly, our previous study revealed that thiamine supplementation could attenuate high-concentrate diet induced SARA by decreasing ruminal lactate production and increasing ruminal pH value in rumen fluid (). The possible reason Fuguang Xue and Xiaohua Pan contributed equally to this work. * Yuming Guo guoyum@cau.edu.cn * Benhai Xiong xiongbenhai@caas.cn was that thiamine supplementation promoted carbohydrate metabolism, since thiamine is the coenzyme of pyruvate dehydrogenase (PDH) and -ketoneglutaric acid dehydrogenase (-KGDHC) in carbohydrate metabolism (;). However, it was not clear how thiamine supplementation affected the ruminal nutrient metabolism systematically in dairy cows. Therefore, more research on metabolic profile changes is needed to reveal the role of thiamine in ruminal metabolism regulation. Metabolomics is an innovative and high-throughput bioanalytical method and has been utilized for detecting rumen metabolite biomarkers in recent years. Ametaj et al. firstly used the metabolomics method to detect the changed compounds with increasing amount of dietary grain. They found that harmful compounds including methylamine, nitrosodime, thylamine and ethanol were increased in SARA cows. Additional metabolites that have been identified as markers of SARA are carbohydrates, biogenic amines and amino acids (;;). Therefore, the metabolomics method was chosen in this study to reveal whether thiamine supplementation affects carbohydrates, biogenic amines and amino acids metabolism or other metabolism pathways in order to interpret the metabolic mechanism of thiamine supplementation on high-concentrate diet induced SARA. Animals, experimental design and dietary treatments Animal care and experimental procedures were operated in accordance with the Chinese guidelines for animal welfare and approved by Animal Care and Use Committee of the Chinese Academy of Agricultural Sciences. Six Chinese Holstein dairy cows in second parity fitted with 10-cm ruminal cannulas (Bar Diamond, Parma, ID) were allocated to a replicated 3 3 Latin square design. Three periods were included and each experimental period consisted of 21 days (a 18-days adaptation period, followed by a 3-days period used for data and sample collection). Treatments included a control diet (CON; 20% starch, DM basis), SARA-induced diet (SAID, 33.2% starch, DM basis), and SARA induced diet supplemented with 180 mg of thiamine/kg of DMI (SAID + T). Details of ingredient analysis and chemical composition of dietary ingredients are given in Supplementary Table 1. Rumen fluid sampling On the last day of each period, rumen contents were sampled from cranial, caudal, dorsal, and ventral sites of rumen at 3 h after the morning feeding. Collected samples were strained through four layers of cheesecloth to obtain rumen fluid. Rumen fluid was divided into two parts. One part was processed to analyze the pH value, the concentration of lactate, volatile fatty acids (VFA) and thiamine content. The other part was put into liquid nitrogen immediately after adding a stabilizer and then stored at − 80 °C for further analysis of the metabolome by GC-MS. The lactate concentration in rumen fluid was measured using enzymatic methods by commercial kits (A019-2, Nanjing Jiancheng Bioengineering Institute, Nanjing, China; technical parameters: recovery rate, 99%; CV, 1.7%; sensitivity < 0.1 mmol/L; detection range, 0-6 mmol/L) at 530 nm according to the manufacturer's instructions. Individual and total VFA (TVFA) in aliquots of ruminal fluid were determined by gas chromatograph (GC-2010, Shimadzu, Kyoto, Japan). Metabolomics analysis Agilent 7890 gas chromatograph system coupled with a Pegasus HT time-of-flight mass spectrometer (LECO, St,Joseph, MI) were used to conduct GC/MS analyses of samples. One hundred microliter of each sample was firstly mixed with 370 L of solvents composed of 350L methanol and 20 L l-2-chlorophenylalanine (0.1 mg/mL stocked in dH 2 O), then the mixture were vortexed for 10 s and centrifuged for 15 min at 12,000 rpm, 4 °C. The supernatant (0.34 mL) was transferred into a fresh GC-MS glass vial, and 12 L supernatant of each sample was taken and pooled as a quality control (QC) sample. All samples were firstly dried in a vacuum concentrator without heating and then incubated for 20 min at 80 °C after adding 55 L of methoxy amination reagent (20 mg/ mL dissolved in pyridine) into each sample. Seventy-five microliter of BSTFA reagent (1% TMCS, v/v) was added to each sample then all samples were incubated for 1 h at 70-80 °C. Subsequently 10 L Fatty Acid Methyl Ester (FAMEs) (Standard mixture of fatty acid methyl esters, C8-C16:1 mg/mL; C18-C24:0.5 mg/mL in chloroform) was adding into each sample after all samples were cooled to the room temperature. After added all reagents, each sample was mixed well for GC-MS analysis. One microlitre of the analyte was injected into a DB-5MS capillary column coated with 5% diphenyl cross-linked 95% dimethylpolysiloxane (30m 250 m inner diameter, 0.25 m film thickness; J&W Scientific, Folsom, CA, USA). One microliter of the analyte was injected in splitless mode. Helium was used as the carrier gas. The front inlet purge flow was 3 mL/min, and the gas flow rate through the column was 20 mL/min. The initial temperature was kept at 50 °C for 1 min, then raised to 320 °C at a rate of 10 °C/min. The temperature was kept for 5 min at 320 °C. The injection, transfer line, and ion source temperatures were 280, 280, and 220 °C respectively. The energy was − 70 eV in electron impact mode. The mass spectrometry data were acquired in full-scan mode with the m/z range of 85-600 at a rate of 20 spectra per second after a solvent delay of 366 s. Statistical analysis Ruminal pH, VFA and thiamine content were analyzed using PROC MIXED of SAS 9.2 as shown in the following model: Y ijklm = + T i + P j + S k + C l(Sk) + O m + T i P j + T i S k + e ijklm, where Y ijklm is the dependent variable, is the overall mean, Ti the fixed effect of treatment (i = 1-3), P j is the fixed effect of period (j = 1-3), Sk is the random effect of Latin square (k = 1-2), C l(Sk) is the random effect of cow nested in square (l = 1-6), Om is the fixed carryover effect from the previous period (O = 0 if period = 1), T i P j is the interaction of treatment and period, T i S k is the interaction between treatment and Latin square replicate, and e ijklm is the random residual error. p value < 0.05 was considered to be significant and a tendency was considered at 0.05 ≤ p < 0.10. For metabolomics data analysis, Chroma TOF 4.3X software of LECO Corporation and LECO-Fiehn Rtx5 database were used for raw peaks exacting, data baselines filtering and calibration of the baseline, peak alignment, deconvolution analysis, peak identification and integration of the peak area. The retention time index (RI) method was used in the peak identification, and the RI tolerance was 5000. In order to dislodge the noise data and conduct a better analysis for downstream data, all raw data was filtered by retaining the treatments with null value ≤ 50%. Multivariate analysis including principal component analysis (PCA) and orthogonal correction partial least squares discriminant analysis (OPLS-DA) were conducted using SIMCA-P software (V 14.0, Umetrics, Umea, Sweden). Differentially expressed metabolites between two treatments were identified based on variable importance in projection (VIP) from OPLS-DA analysis and statistical analysis (VIP > 1 and p < 0.05). Kyoto Encyclopedia of Genes and Genomes (KEGG, http://www.genom e.jp/kegg/) was conducted to view the enriched pathways of different metabolites. The Hierarchical clustering analysis (HCA) and heat map analysis for different metabolites were conducted using R package version 3.3.1. Ruminal pH, VFAs, lactate and thiamine Data for rumen pH, ruminal VFAs, lactate and rumen thiamine content have been reported previously (a). Briefly, mean ruminal pH in SAID treatment was 5.93 while in CON treatment was 6.49 and in SAID + T treatment was 6.15 (p < 0.001). The ruminal acetate and thiamine were significantly decreased in SAID feeding treatment compared with CON and SAID + T treatments (p < 0.05). Ruminal lactate and propionate were significantly increased in SAID treatment compared with the other two treatments (p < 0.05). Different ruminal metabolites between the CON vs SAID treatments and SAID vs SAIDT treatments Firstly, 534 peaks were detected with GC-TOF-MS and then, all raw data was filtered by retaining the treatments with null value ≤ 50%. Finally, 510 practicable peaks were obtained. After strict quality control and identification, 286 metabolites were obtained across all samples. They were mainly organic acids, fatty acids, carbohydrate, amino acids, purines and biogenic amines. For further analysis, PCA and OPLS-DA were conducted to analyze the ruminal metabolites among three treatments. As shown in Fig. 1a, the principal component analysis revealed that PCA axes 1 and 2 accounted for 29.5 and 19.8% and PCA axes 1 and 2 of Fig. 1b accounted for 29.5 and 18.3% of the total variation, respectively. As shown in Fig. 1c, OPLS-DA axes 1 and 2 accounted for 41.1 and 29.0% of the total variation, respectively. Samples of the three treatments could be separated clearly according to both PCA and OPLS-DA analysis. As shown in Fig. 2a, b, based on OPLS-DA, an "S" plot was constructed. Pionts that located far from the axes represent metabolites that differ significantly between the two treatments. Results revealed that there were significantly changed metabolites between CON versus SAID and SAID versus SAID + T. Combined with statistical analysis and the VIP value obtained from the OPLS-DA analysis, 59 differential metabolites between CON and SAID treatments, 23 between SAID and SAID + T treatments were identified (p < 0.05 and VIP > 1). These different metabolites are mainly carbohydrates, amino acids, organic acids and biogenic amines. Some typical and representative metabolites are represented in Tables 1 and 2. Compared with CON treatment, pyruvate, lactate and ribose were significantly increased in SAID feeding; fruc-tose2, 6-biphosphatedegrprod, citric acid and succinic acid were significantly decreased in SAID feeding. Remarkable alteration in the content of purine metabolites of SAID feeding compared with CON was observed in this study. Hypoxanthine and xanthine were significantly decreased in SAID treatment. Inversely the content of some biogenic amines such as spermidine, putrescine and malonamide were all significantly increased after feeding SAID diet. Compared with SAID treatment, pyruvate and lactate, spermidine, indole-3-acetamide and bis (2-hydroxypropyl) amine were significantly decreased in SAID + T treatment. Pyruvate, lactate, bis(2-hydroxypropyl) amine and spermidine were the main metabolites that significantly increased in SAID treatment compared to CON treatment and significantly decreased after thiamine supplementation. HCA and heat map were used for further understanding of how ruminal metabolites changed in response to the SAID diet and thiamine supplementation. Results were presented in Fig. 3. As shown in Fig. 3a, compared with CON treatment, metabolites that significantly decreased or increased in SAID treatment were separated clearly. At the lower part of the figure, two significant different subclusters were located. One subcluster consists of significantly downregulated metabolites in SAID treatment compared with CON, such as glutamic acid, xanthine and inosine. The other subcluster consisted of nine significantly upregulated metabolites in SAID treatment, such as spermidine, thymidine and pyruvic acid. Figure 3b represented SAID versus SAID + T. Metabolites that significantly decreased in SAID treatment compared with SAID + T treatment or significantly increased in in SAID treatment compared with SAID + T treatment could be separated clearly. HCA revealed metabolites that significantly increased in SAID treatment compared with SAID + T treatment mainly gathered into two subclusters. One consisted of putrescine, valine and glycine; the other consisted of pyruvate, tagatose and spermindine. Fig. 1 a Principal components analysis (PCA) of ruminal metabolites from cows (n = 6) fed a control diet (CON) and cows fed SARA induced diet (SAID); b PCA of ruminal metabolites from cows (n = 6) fed SAID and cows (n = 6) fed SARA induced diet with thia-mine supplementation (SAID + T). c Orthogonal correction partial least squares discriminant analysis (OPLS-DA) of the ruminal metabolites from cows (n = 6) of the CON, the SAID and SAID + T treatments Metabolites that significantly decreased in SAID treatment compared with SAID + T treatment main gathered into one subcluster, which consisted of lactose, succinate semialdehyde and citraconic acid. Pathway analysis Functional analysis of pathways related to different metabolites was conducted using KEGG. Results of significantly changed pathways are shown in Table 3. Purine metabolism, carbon metabolism, biosynthesis of amino acids, pyruvate metabolism, glutathione metabolism, protein digestion and absorption and thiamine metabolism were detected to be the significantly changed pathways between CON and SAID. Carbon metabolism, biosynthesis of amino acids, protein digestion and absorption, thiamine metabolism and glutathione metabolism were the significantly changed pathways between SAID and SAID + T. Based on the different pathways between treatments, pathway topology analysis was conducted. Results are shown in Fig. 4. Based on the pathway impact values, Fig. 4a showed that 6 main metabolic pathways of CON versus SAID were enriched which included arginine and proline metabolism; alanine, aspartate and glutamate metabolism; purine metabolism; glycine, serine and threonine metabolism; butanoate metabolism and pyruvate metabolism. Figure 4b showed that five main metabolic pathways of SAID versus SAID + T were showed such as glycolysis or gluconecogenesis; glycine, serine and threonine metabolism; alanine, aspartate and glutamate metabolism; butanoate metabolism and pyruvate metabolism. Among these metabolic pathways, pyruvate metabolism has the largest impact following thiamine supplementation. Effects of thiamine supplementation on carbohydrate metabolism Based on the present study, we found that thiamine supplementation in SAID diet significantly increased the content of lactose, acetate and succinates; decreased pyruvate, lactate and propionate in ruminal fluid compared with SAID diet. These metabolites are involved in carbohydrate metabolism. In the rumen, dietary carbohydrates are usually converted to pyruvate and acetyl-CoA by microorganisms through the glycolytic pathway and pentose phosphate pathway, and finally acetyl-CoA are mainly metabolized to lactate, VFAs, and a small amount of carbon dioxide and methane ( In the present study, pyruvate was detected to significantly increase in SAID compared with CON and significantly decrease after thiamine supplementation. Pathway impact analysis indicated that pyruvate metabolism hold the largest pathway impact after thiamine supplementation. The possible reason for the pyruvate accumulation was that high-concentrate diets increased rumen fluid concentrations of glucose (). In ruminal conditions, pyruvate is the degradation product of glucose through the (). As the cofactor of PFL, thiamine content was detected significantly decreased when feeding SAID diet (;). As a result, the conversion of pyruvate to acetyl-CoA was restrained, and the superfluous pyruvate were then converted to lactate by lactate-producing bacteria such as S. bovis (Asanuma and Hino 2000) through LDH, which led to accumulation of lactate and SARA aggravation in dairy cows. Thiamine supplementation could increase the ruminal content of thiamine and TPP, and then improve the activity of PFL to catalyze pyruvate to produce more acetyl-CoA and less lactate, therefore leading to a significant decrease in pyruvate and lactate following thiamine supplementation. In the present study, succinates were decreased in the SAID treatment compared with the other two treatments. This result was in alignment with the results of Saleem et al., who found that when dairy cows were fed 45% grain diet, the ruminal succinates content were significantly lower than cows fed 30% grain diet. In rumen, succinates can be produced by many microorganisms, such as Anaerobiospirillum succiniciproducens and Mannheimia succiniciproducens (). However, succinate does not accumulate in the rumen because it is rapidly utilized by Succiniclasticum or metabolized to propionate through treatment by propionate-producing bacteria (). Our previous study found Succiniclasticum, as the primary succinate utilizing bacteria, accounted for 12.45% of total bacterial community from high-grain treatment and increased significantly compared with CON treatment (a). The increasing abundance of Succiniclasticum may partially explain the decreased succinates under high-grain feeding. However, the proportions of Succiniclasticum was reduced with thiamine supplementation (a), as a result, the ruminal succinate content was increased in SAID + T treatment. Effects of thiamine supplementation on amino acids metabolism In the present study, valine and glycine were significantly decreased after thiamine supplementation compared with SAID. In ruminal conditions, pyruvate and isobutyrate are the main substrates for the biogenesis of valine (Allison and Peel 1971). Thiamine supplementation in SAID decreased rumen isobutyrate () and pyruvate content which may result in the decreased valine content. Glycine was positive correlated with thiamine metabolism. Previous studies indicated that in bacteria, the thiazole moiety of thiamine was synthesized from glycine, cysteine and deoxy-d-xylulose 5-phosphate (Linnett and Walker 1968;;). The reason for the accumulation of glycine in SAID might be that, glycine was the substrate of thiamine synthesis and thiamine could be synthesized by Bacteroidetes, Fibrobacter, and Pyramidobacter in rumen (a). Feeding SAID caused the decrease of Bacteroidetes, Fibrobacter, and Pyramidobacter (a), thiamine biosynthesis was hindered which led to the accumulation of glycine. Thiamine supplementation could increase rumen Bacteroidetes, Fibrobacter, and Pyramidobacter content, improved the biosynthesis of thiamine, therefore, ruminal glycine content decreased. Fig. 3 Hierarchical clustering analysis (HCA) and heat maps for different metabolites from the three treatments. a HCA of metabolites from cows (n = 6) fed control diet (CON) versus cows fed SARA induced diet (SAID); b HCA of metabolites from cows (n = 6) fed SAID versus cows (n = 6) fed SARA induced diet with thiamine supplementation (SAID + T). Rows represent metabolites and columns represent samples. Cells were colored based on the signal intensity measured in rumen, light red represented high rumen levels while green showed low signal intensity and black cells showing the intermediate level Effects of thiamine Supplementation on biogenic amines Biogenic amines are found at low levels in rumen fluid of healthy animals, but will considerably increase when sheep or cattle are fed excessive rapidly fermentable carbohydrates (). Similarly, we found that biogenic amines including putrescine and spermidine increased in SAID compared with CON. These results were in line with Wang et al., who found that the concentration of putrescine in ruminal fluid of SARA cows were increased (p < 0.001). The increasing biogenic amines could be explained by the lower pH under SAID feeding. Since biogenic amines are produced from decarboxylation of amino acids by decarboxylase in bacteria (Hill and Mangan 1964), and the decarboxylase activity would be enhanced when pH decreased below 5.5 (Gale 1940;Hill and Mangan 1964). The higher amino acid decarboxylase activity would catalyze amino acids to form more corresponding amines. Thiamine supplementation increased the rumen pH in dairy cows (), as a result, the activity of microbial amino acid decarboxylase was reduced and therefore the content of ruminal biogenic amines decreased. On the other hand, feeding SAID altered rumen microbial population, caused gram-negative bacterium death and increased concentrations of lipopolysaccharide (LPS) in rumen fluid (;b). The increased LPS could alter epithelial barrier function, which changes transepithelial electrolyte transport and increases passive permeability of the epithelium to small and large molecules (). Destruction of epithelial barrier function during SAID feeding may hinder the absorption of ruminal biogenic amines into blood and result in the accumulation of biogenic amines (Aschenbach and Gbel 2000). Thiamine could suppress TLR4-mediated NFB signaling pathways to attenuate the epithelial inflammation during SAID feeding to promote the absorption of ruminal biogenic amines into blood (b). Therefore, ruminal biogenic amines decreased after thiamine supplementation. Glycine, l-valine Thiamine metabolism-Bos taurus (cow) Pyruvate, glycine Glutathione metabolism-Bos taurus (cow) Glycine, spermidine Fig. 4 Metabolome view map of the differentially expressed metabolites from the three treatments. a Metabolome view map of metabolites from cows (n = 6) fed control diet (CON) versus cows fed SARA induced diet (SAID); b metabolome view map of metabolites from cows (n = 6) fed SAID versus cows (n = 6) fed SARA induced diet with thiamine supplementation (SAID + T). X-axis represents pathway impact and Y-axis represents p value. The larger size of circle indicates more metabolites enriched in that pathway and the larger abscissa indicates higher pathway impact values. The darker color indicates the smaller p values Conclusion Our data revealed that SAID feeding increased the content of ruminal VFAs, pyruvate, lactic acid and biogenic amines. Accumulation of these metabolites decreased the ruminal pH and led to SARA. Thiamine supplementation could attenuate high-concentrate diet induced SARA by increasing pyruvate formate-lyase activity to promote pyruvate to generate acetyl-CoA and inhibit lactate generation. In addition, the content of biogenic amines was decreased by thiamine supplementation, which alleviated the ruminal epithelial inflammatory response during SARA challenge to some extent. Overall, our findings update understanding of thiamine's function on ruminal metabolism regulation and provide new strategies to improve dairy cows' health under high concentrate feeding pattern.
/* * ***** BEGIN GPL LICENSE BLOCK ***** * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software Foundation, * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. * * The Original Code is Copyright (C) 2005 Blender Foundation. * All rights reserved. * * The Original Code is: all of this file. * * Contributor(s): none yet. * * ***** END GPL LICENSE BLOCK ***** */ /** \file blender/nodes/shader/nodes/node_shader_normal.c * \ingroup shdnodes */ #include "node_shader_util.h" /* **************** NORMAL ******************** */ static bNodeSocketTemplate sh_node_normal_in[] = { { SOCK_VECTOR, 1, N_("Normal"), 0.0f, 0.0f, 0.0f, 1.0f, -1.0f, 1.0f, PROP_DIRECTION}, { -1, 0, "" } }; static bNodeSocketTemplate sh_node_normal_out[] = { { SOCK_VECTOR, 0, N_("Normal"), 0.0f, 0.0f, 1.0f, 0.0f, -1.0f, 1.0f, PROP_DIRECTION}, { SOCK_FLOAT, 0, N_("Dot")}, { -1, 0, "" } }; /* generates normal, does dot product */ static void node_shader_exec_normal(void *UNUSED(data), int UNUSED(thread), bNode *UNUSED(node), bNodeExecData *UNUSED(execdata), bNodeStack **in, bNodeStack **out) { float vec[3]; /* stack order input: normal */ /* stack order output: normal, value */ nodestack_get_vec(vec, SOCK_VECTOR, in[0]); /* render normals point inside... the widget points outside */ out[1]->vec[0] = -dot_v3v3(vec, out[0]->vec); } static int gpu_shader_normal(GPUMaterial *mat, bNode *UNUSED(node), bNodeExecData *UNUSED(execdata), GPUNodeStack *in, GPUNodeStack *out) { GPUNodeLink *vec = GPU_uniform(out[0].vec); if (GPU_material_use_new_shading_nodes(mat)) { return GPU_stack_link(mat, "normal_new_shading", in, out, vec); } else { return GPU_stack_link(mat, "normal", in, out, vec); } } void register_node_type_sh_normal(void) { static bNodeType ntype; sh_node_type_base(&ntype, SH_NODE_NORMAL, "Normal", NODE_CLASS_OP_VECTOR, 0); node_type_compatibility(&ntype, NODE_OLD_SHADING | NODE_NEW_SHADING); node_type_socket_templates(&ntype, sh_node_normal_in, sh_node_normal_out); node_type_exec(&ntype, NULL, NULL, node_shader_exec_normal); node_type_gpu(&ntype, gpu_shader_normal); nodeRegisterType(&ntype); }
1. Field of the Invention: This invention relates to computer systems and, more particularly, to methods and apparatus for implementing processors used in reduced instruction set computers. 2. History of the Prior Art: The development of digital computers has progressed through a series of stages beginning with processors which were able to carry out only a few basic instructions which were programmed at a machine language level and continuing to processors capable of handling very complicated instructions written in high level languages. At least one of the reasons for this development has been that high level languages are easier for programmers to use, and thus more programs are developed more rapidly. Another reason is that up to some point in the development, the more advanced machines executed operations more rapidly. There came a point, however, where the constant increase in the ability of the computers to run more complicated instructions actually began to slow the operation of the computer over what investigators felt was possible with machines operating with only a small number of basic instructions. These investigators began to design advanced machines for running a limited number of instructions, a so-called reduced instruction set, and were able to demonstrate that these machines did, in fact, operate more rapidly for some types of operations. Thus began the reduced instruction set computer which has become known by its acronym, RISC. One design of a RISC computer is based on the Scalable Process Architecture (SPARC) designed by Sun Microsystems, Inc., Mountain View, Calif., and implemented in the line of SPARC computers manufactured by that company. One salient feature of the SPARC computers is the design of the processors, especially the architecture of the general purpose registers. The general purpose registers include from forty to five hundred and twenty 32 bit registers. Whatever the total number of general registers, these registers are partitioned into eight global registers and a number of sixteen registers sets, each set divided into eight IN and eight local registers. At any time, an instruction can access a window including the eight global registers, the IN and local registers of one set of registers, and the IN registers of a logically-adjacent set of registers. These IN registers of the logically-adjacent set of registers are addressed as the OUT registers of the sixteen register set of the window including both IN and local registers. Thus, an instruction can access a window including the eight global registers, the IN and local registers of one set of registers, and the IN registers (addressed as OUT registers) of the logically adjacent set of registers. This architecture provides a number of advantages not the least of which is that the processor may switch from register set to register set without having to save memory and restore all of the information being handled by a particular register set before proceeding to the operation handled by the next register set. For example, since the IN registers of one register set are the same registers as the OUT registers of the preceding set of registers, the information in these registers may be utilized immediately by the next or previous sets of registers without the necessity of saving the information to memory and writing the information to the IN registers of the next set of registers. This saves a great deal of system operating time. Moreover, the large number of register sets which may be utilized in the SPARC architecture allows a great number of operations to be implemented simultaneously, in many cases without the need to save to memory and restore before proceeding with the operation in any particular register set. This offers great speed advantages over other forms of RISC architecture. However, no matter how philosophically advanced the SPARC architecture, it requires implementation in hardware. One such implementation, described in U.S. patent application Ser. No. 07/437,978, entitled Method and Apparatus for Current Window Cache, Eric H. Jensen, filed Nov. 16, 1989, includes a processor made up of a large register file usually constructed of random access memory divided into a plurality of sets of windowed registers. In accordance with the general SPARC architecture, each such set includes a first plurality of IN registers and a second plurality of local registers. The IN registers of each set are addressable as the OUT registers of a logically-adjacent preceding set of registers while the OUT registers of each set are addressable as the IN registers of a logically-adjacent succeeding set of registers. A set of global registers which may be addressed with each of the sets of registers is provided along with circuit means for indicating which set of windowed registers is being addressed. The processor also includes an arithmetic and logic unit and a cache memory comprising a number lines at least equal to the total of the number of registers in an addressable set of windowed registers including the set of global registers, a set of IN registers, a set of OUT registers, and a set of local registers. The cache is provided with circuitry for changing the addresses of lines of the cache holding information presently designated as information held in OUT registers to addresses designating the IN registers of the next register set and vice versa. This arrangement essentially functions as a very rapid processor by using the registers of the cache in most cases in place of the normal register file. The use of the cache for processing allows cache speeds to be attained most of the time in processing even though the register file is constructed of relatively inexpensive random access memory and includes a very large number of window sets. The use of circuitry for changing the addresses of lines of the cache holding information presently designated as information held in OUT registers to addresses designating the IN registers of the next register set and vice versa allows the single set of IN, OUT, local, and global registers of the cache to accomplish in a single cache window the transfer between windowed sets without most of the store and restore operations which usually requires multiple windowed register sets. Such a cache based processor functions well to increase the speed of operation of a SPARC based processor. There seems to be no upper level to the speed desired from a processor, however; and consequently even faster operation is desirable.
<filename>Source/Arch/x86_32/MachineCode/ArchStubCodegen.hpp /* Purpose: Author: <NAME> License: All rights reserved (2015 - 2019); licensed under the MIT license. */ #pragma once #define _STUB_JMP_BACK_TO_STUB 1 #define _STUB_RETURN_TO_CALLER 0 struct CallerStack { RegistersX32 registers; NativeFunctionPointer_p returnAddress; char stack[1]; }; typedef size_t(*StubgenCallback)(void * id, CallerStack * registers, void * stack); extern serror_t Archx32CreateStub(StubTrigger & stub, void * context, StubgenCallback handler, ExecutableMemory * buffer, size_t length); extern size_t Archx32CodegenCalcStub(StubTrigger & stub);
<gh_stars>1-10 export * from './genderCell';
The cloud is omnipresent at the Web 2.0 Summit as industry executives discuss the migration from the client to millions of virtualized servers as the information pipe. SAN FRANCISCO--The cloud was omnipresent at the Web 2.0 Summit as industry executives discussed the migration from the client to millions of virtualized servers as the information pipe. "There is a lot of hype. We think about the cloud as the next evolution in computing," said Cisco Chief Technology Officer Padmasree Warrior. "It's a way of abstracting the services and applications from the physical resources and using a more on-demand layer." Warrior believes that cloud computing will evolve from private and stand-alone clouds to hybrid clouds, which allow movement of applications and services between clouds, and finally to a federated "inter-cloud." "We will have to move to an 'inter-cloud,' with federation for application information to move around. It's not much different from the way the Internet evolved. It will take us a few years to get there. We have to think about security and load balancing and peering," she said. "Flexibility and speed at which you can develop and deploy applications are the basic advantages that will drive this transformation." Warrior laid out the cloud-computing stack as having four layers: IT foundation, flexible infrastructure, platform as a service, and applications (software as a service). Paul Maritz, CEO of VMware, noted that platforms as a service, such as Salesforce.com or Microsoft's forthcoming Azure, present a challenge for developers. "Developers have to make big bets and choose a platform. I think there is room to see other sources of technology that are more open and standardized," he said. Adobe CTO Kevin Lynch, acknowledged that compatibility at the cloud platform layer is a problem. "The level of lock-in in the cloud in terms of applications running and data aggregation is at a risky juncture right now in terms of continuity," he said. Dave Giroaurd, president of Google Enterprise, brought up the potential legal tangles of moving intellectual property between clouds. "It's an unclear area of the law as to who owns what," he said. Salesforce.com CEO Marc Benioff touted integration between his Force.com platform and Google and Facebook as an example the way cloud services can be mashed up. Eventually, cloud computing providers at all of the layers will become more open and adhere to standards that allow for federation and movement between clouds. Maritz sees cloud computing as helping to drive the information economy and stimulate new information marketplaces. "The challenge is how to selectively and securely make information available so other parties can add value," he said. But just having the data and applications in the cloud won't be enough to create dynamic information marketplaces. "We need to find new data representations and ways to annotate data," Maritz said. Indeed, cloud computing won't be very compelling without what is variously called Web 3.0 or the Semantic Web.
/** * Returns a new {@link InterpretedScript} if {@code parsedScript} can be interpreted, otherwise returns * {@code null}. * * @param parsedScript * the script node * @return the interpreted script or {@code null} */ public static InterpretedScript script(Script parsedScript) { if (!parsedScript.accept(InterpreterTest.INSTANCE, null)) { return null; } return new InterpretedScript(parsedScript); }
Mechanisms of Epithelial Cell Shedding in the Mammalian Intestine and Maintenance of Barrier Function The intestinal epithelium forms a barrier between the gut lumen and the body. The barrier is potentially challenged by the high turnover of epithelial cells being shed. Our laboratories have shown that the epithelium is punctuated by discontinuities called gaps that have the diameter of an epithelial cell and are devoid of cellular contents. At least a proportion of gaps are formed by the shedding of epithelial cells. These gaps are filled with an unknown substance that maintains local barrier function. Gaps have been identified in the mouse by in vivo confocal microscopy and in humans by confocal endomicroscopy. They can be distinguished from goblet cells by the absence of a nucleus and are found in Math1−/− mice where goblet cells are absent. Cell shedding and gap formation is increased by TNF. Barrier function is lost after TNF in approximately 20% of shedding events. These observations suggest that loss of barrier function at sites of cell shedding may be important in intestinal diseases where an increase in epithelial permeability plays a role in pathogenesis.
'Biodynamically cultivated hash, confidentially': information sharing on the dark web This article analyses the marketing mechanisms of Dark Web drug trade focusing on advertising as information sharing. Key research questions are 1) vendors use to convince the potential customers about the quality and service, 2) what kind of arguments do vendors try to build and how they do it? and 3) what kind of information is shared when illegal goods are advertised. The data were collected from Utopia, which is an archive of the Finnish cryptomarket called Sipulimarket. The sample contained all advertisements from December 6, 2019 to March 19, 2020. All the advertisements were analysed by using a qualitative content analysis. Four main elements on which the marketing speech is based are 1) quality and 2) effects of the drugs (which we discuss here together), 3) price and 4) persuasiveness of the vendor. Together with the name of drug store, they make up the image. These elements are the types of information shared mostly when convincing customers about the products. In advertisements both persuasiveness and informative contents were shared. By understanding the mechanisms used in illicit communication happening in the Dark Web, we get a new perspective on sharing information that requires anonymity.
Progressive myoclonus and epilepsy with dentatorubral degeneration: a clinicopathological study of the Ramsay Hunt syndrome. Ramsay Hunt's progressive myoclonus and epilepsy associated with dentatorubral degeneration is a rare disorder. We report a 19 year old woman with this clinical syndrome who also has a more mildly affected brother. Neuropathological in addition to dentatorubal involvement. The evidence suggests that this is a distinctive hereditary disorder producing neuromal degeneration at several levels in the central nervous system.