text
stringlengths 7
4.92M
|
---|
Ping Pong
Kiko’s photos of our ping pong match against Sucker Punch are now up on his Flickr page. Once again I need to say thanks to everyone over there for the games and the pizza. Penny Arcade’s “Team Inferno” got completely destroyed by the Sucker Punch “Rockets” but we still had an awesome time.
Our next match is Thursday the 15th against Microsoft’s casual games department. I assure you there will be nothing casual about the beating we deliver.
|
Published in Print: May 14, 2014, as Texting Is Used To Keep Students On College Track
'R U on Track for College?' Texting a New Strategy
Octavia Smoot prepares for her senior portrait at Scott High School in Madison, W.Va. Ms. Smoot is participating in a pilot program that sends text reminders, including those featured at right, to college-bound students. Starting in January of the senior year, participants receive reminders and information to keep them on track for higher education.
As educators look for ways to keep high school seniors on track for college and to avoid the "summer melt" that leads some astray in the months after they graduate, a new strategy is gaining ground: texting.
This year, West Virginia launched a pilot program that alerts students about deadlines for financial aid, registration, and student orientation, among other matters, with personalized messages on their mobile phones. The texting initiative targets students from low-income families—especially those set to become the first in their families to attend college.
It begins in January of students' senior year and continues into the summer and even through the freshman year of college. After getting a text reminder, a student may contact a counselor at his or her high school or on campus for more personal, one-on-one assistance.
Minnesota is in the second year of a similar pilot. Also, nonprofit organizations in St. Louis and New York City are trying such texting programs for students who might not get much academic guidance at home.
"We wanted to connect students with college support staff earlier," said Jessica A. Kennedy, the assistant director of communications at the West Virginia Higher Education Policy Commission. "When students transition from high school to college, they don't have anyone to reach out to in the summer. They are scrambling to build new support systems and want more."
When designing its program with 14 high schools and four colleges, West Virginia looked to the work of researchers Benjamin L. Castleman of the University of Virginia and Lindsay C. Page of the University of Pittsburgh. The two scholars have documented the effects of recent texting initiatives, finding the practice can increase matriculation by up to 11 percent in communities where students had little access to college advising or information. They also find it to be a very affordable intervention, costing about $7 per student.
The spate of texting initiatives responds to concerns that many students who are accepted to college never actually attend. Mr. Castleman, an assistant professor of education and public policy at the University of Virginia, said that based on an analysis he and Ms. Page conducted of federal longitudinal data, about 10 percent to 15 percent of students nationwide who have been accepted to college fail to enroll in the year following high school. The attrition figure is far higher in urban districts serving large numbers of low-income families they examined, about 20 percent to 30 percent.
Navigating the Systems
The snags students run into over the summer after high school graduation often revolve around finances, as they learn about new expenses, such as books or mandatory fees, the researchers found. Others have difficulty navigating the systems for housing or placement tests, they note.
"There are a lot of tasks that need to be completed that are complex," said Mr. Castleman. "Texting prompts students to think about these tasks rather than put them off. An added power of the messaging is as a vehicle to connect students with professional assistance."
At the same time, Mr. Castleman and others involved with texting initiatives caution that this strategy should not be seen as a replacement for high school counselors and college support staff, but rather as another valuable tool.
Recently, the National Student Clearinghouse has begun providing new data that are likely to build greater demand for strategies—whether texting or other approaches—to help ensure that students who are accepted to college don't slip through the cracks. For the past few years, it has given student-level reports to high schools that subscribe to its service, which show just how many of their graduates enroll in college, and where. It turns out that this figure doesn't always square with what high schools think their college-going rates are, based on exit surveys from seniors.
"It's providing a little bit of reality to the mix," said Doug Shapiro, the executive research director for the clearinghouse, a Herndon, Va.-based research organization, which last fall published its first national benchmark report, which included data from 4,000 high schools and enabled individual schools to compare their college-enrollment rates to the national average.
"We knew that schools were using numbers that were most likely to be biased upwards, saying there were far more students likely to go to college than actually go," he said. But the data now show more clearly the actual matriculation rates.
Jerry W. Pope, a college consultant for Niles North and Niles West high schools in Skokie, Ill., said the clearinghouse data showed that while the schools thought about 93 to 94 percent of their students were enrolling in college, the actual figures were closer to 81 and 84 percent respectively. This significant gap brought home the message that the high schools' job is not done when students leave for college, he said.
"There is a big awareness on the part of high schools and colleges that this is an ongoing partnership," said Mr. Pope. "For the transition from high school to college, we need to make sure no one drops the ball."
The West Virginia initiative is supported by a three-year, $225,000 grant from the Kresge Foundation to connect about 1,000 students who participate in federally funded Gaining Early Awareness and Readiness for Undergraduate Programs, known as GEAR UP.
The West Virginia Higher Education Commission worked with high school counselors and higher education administrators to develop text messages that it sends out periodically to students over 18 months. In addition, colleges in the pilot text customized messages to their incoming students with specific deadlines and reminders once accepted.
Octavia E. Smoot, a senior at Scott High School in Madison, W.Va., who plans to study criminal justice at West Virginia State University next fall, said the texts have been helpful to her.
For instance, when more information was needed for her financial-aid application, she got a text urging her to complete it. After she did so, Ms. Smoot immediately texted back and got confirmation that it went through. The busy 18-year-old said communicating via text is best.
"I never put [my phone] down, unless I'm sleeping," she said. "Teenagers would rather text than go in and talk to a counselor. Texting is the way we communicate."
'Quick and Easy'
Texting is quick and easy, said Samantha N. Fox, a student resource specialist at Marshall University in Huntington, W.Va. She has been sending messages to incoming students since January.
"It's kind of overwhelming with all the paperwork. This helps them keep things in a timeline," said Ms. Fox, who will text students about special events once they get on campus to help them get involved in the community.
Josie Lacek, a student program adviser at Southern West Virginia Community and Technical College, in Saulsville, said the most common questions she hears from students in the texting program concern financial aid.
"Others just have regular college jitters," she said. "As a community college in a rural area, many [students] are first-generation college students and they need a little extra hand-holding."
At open-enrollment institutions, students often wait to the last minute to register, so the texting is a good way to get them moving, said Darrell T. Taylor, the dean of student services and enrollment at Southern community college, who said he would like to make texting available to all incoming students eventually. However, as the "Mountain State," West Virginia has problems with cell service, so it would be a supplement to other means of communication, he added.
The latest research by Mr. Castleman and Ms. Page, who have a book—Summer Melt: Supporting Low-Income Students Through the Transition to College—coming out next fall from Harvard Education Press, included randomized trials in the summer of 2012. College-intending students from four urban school districts were sent texts reminding them of important tasks to complete over the summer, along with offers to meet with counselors to discuss finances. The districts involved serve Dallas, as well as Boston, Lawrence, Mass., and Springfield, Mass.
The messages had a positive impact on college enrollment in three of the four districts, Mr. Castleman said, particularly for low-income students without much access to college information. The intervention, however, had zero measurable effect in Boston, where there are already many school- and community-based college-planning supports.
Jennifer E. Fox, the communications assistant for the agency, introduced the program to 175 students at two high schools.
The "gentle reminder" messages began in May and continued until August, said Ms. Fox. This year it will expand to about 300 students.
Building a Relationship
Rebecca L. Schmitz, a counselor at Washington Technology Magnet School, in St. Paul, Minn., embraced the texting and found students were eager to share their contact information. The texts were strategically timed over the summer. As student responses came in, Ms. Schmitz would field questions individually.
"Honestly, I think some of them would have given up" if it weren't for the summer messaging, she said.
St. Louis Graduates, a network of K-12 and higher education college-access organizations, opened a drop-in counseling center over the summer to answer questions as graduates transitioned to college. This coming summer, text messaging will be a new feature.
"The important part is building a relationship with [the students]," said Laura B. Winter, the project manager for St. Louis Graduates. "Text messaging is never going to replace one-one-conversations in counseling, but it can remind students of deadlines and prompt them to come in."
The system that St. Louis graduates will have access to, Bridgit (a reference to the bridge from high school to college), was developed by CollegeBound, a St. Louis-based nonprofit. A pilot launched in April involves seven high schools working with 4,000 students. It will be evaluated in a randomized trial with the help of Mr. Castleman and Ms. Page. With Bridgit, students fill out a form online about their college path and issues to address, so the text messages can be personalized.
"Texting done poorly can be something that becomes a distraction," said Lisa O. Zarin, the president and CEO of College Bound. "Students shared that if texting is random and like a robo-message, they would ignore it." If messages are relevant, personalized, actionable, and contain links, they can eliminate procrastination and be helpful, she said. Even with low-income students, cell phones are ubiquitous.
"They would go without food before they would go without a phone," she said.
A Mind Shift
Last summer, iMentor, a New York City nonprofit, sent weekly, customized texts to about 500 recent high school students and their mentors about steps to complete before enrolling that fall. This summer the program will begin sooner, in May, and may extend past August, said Daniel S. Voloch, the managing director of program design at iMentor, which serves students from schools that receive federal Title I aid.
Mr. Voloch said colleges often take a hard-line approach that students are adults and need to figure out the transition on their own, but he thinks colleges would be smart to embrace texting.
"There is a mind shift needed as students graduate from high school," he said. "All those supports that led up to graduation, [they] all disappear at exactly the moment they begin to make high-stakes decisions. Texting serves as a safety net."
Special coverage on the alignment between K-12 schools and postsecondary education is supported in part by a grant from the Lumina Foundation. Education Week retains sole editorial control over the content of this coverage.
Ground Rules for Posting
We encourage lively debate, but please be respectful of others. Profanity and personal attacks are prohibited. By commenting, you are agreeing to abide by our user agreement.
All comments are public.
|
Welcome to the one-hundred fourth of the WWE Week in Review. Feel free to contact me on TWO or Wrestling 101 anytime with comments, questions, and anything in between. Make sure to check out the section at the end of the article highlighting a different WWE Superstar, Diva, or Alumni every week. I have also added a section that lists where WWE will be hosting their weekly television shows and monthly pay-per-views.
You can follow me on Twitter at Wrestling101com. I will be posting the latest news from the wrestling world via my Twitter account, as well as Wrestling101.com. You can also find me on Facebook under the username of: CiSH.W101
The second annual WWE Extreme Rules came to you, live on pay-per-view, from the 1st Mariner Arena in Baltimore, MD. In the “extreme” culmination of their intensely personal rivalry, John Cena would defend the WWE Championship against “The Animal” Batista in a Last Man Standing Match. In his first pay-per-view title defense, new World Heavyweight Champion Jack Swagger must defend his gold against “The Viper” Randy Orton in an Extreme Rules Match. In a personal rivalry that stretches back almost a full year, “The Rated-R Superstar” Edge would be looking for revenge for the recent attacks on his Achilles tendon injury as he faces his intense rival, Chris Jericho, in a Steel Cage Match. Triple H would be looking to teach Sheamus some respect as “The Game” would go one-on-one with “The Celtic Warrior” in a Street Fight. In a rematch from WrestleMania, “The Straightedge Savior” CM Punk would go one-on-one with Rey Mysterio, but this time, if CM Punk loses, he will also lose his hair. Former friends and former tag team partners would be looking to settle their personal and intense rivalry when JTG and Shad Gaspard square off in a Strap Match. After weeks of being insulted and embarrassed by Michelle McCool, Beth Phoenix would be looking for the ultimate revenge as she challenges McCool for the Women’s Championship in the first ever Extreme Makeover Match.
The show was set to kick off with the Street Fight showdown between Triple H and Sheamus, but “The Celtic Warrior” was determined to start the “extreme” early as, before Triple H could even make his entrance for the match, the cameras discovered that Sheamus had attacked Triple H in the backstage area as Sheamus pummeled “The Game”! Triple H was able to fire back, but referees were able to pull Triple H off of Sheamus and Sheamus took the opportunity to blast Triple H in the skull with the lead pipe; not once, but twice! What is the status of Triple H following the attack by Sheamus?
Then there was another unexpected surprise as the Unified WWE Tag Team Champions ShoMiz made an appearance! United States Champion The Miz states that the show did not start out as expected and says that the show should start with some “excitement” as they are the “most exciting, most entertaining, most captivating, the greatest tag team in WWE history”! Miz then says they should take Bret Hart’s “word for it” as, per their stipulation for the match between Miz & David Hart Smith two weeks ago, Bret will make the statement on the next night’s RAW that ShoMiz is the “greatest tag team in WWE history”! The Miz then “begs” for some “competition”, which brings out SmackDown General Manager Theodore Long, who announces that he has selected a team and, if this team can win a non-title match, then the team will earn a future shot at the Unified WWE Tag Team Titles! As it tends to do from time to time, The Miz’s mouth got him in trouble again as the confident Miz kept insulting and goading the GM, which led to Long announcing that ShoMiz will face three tag teams in a Tag Team Gauntlet Match! After Big Show put his hand over the mouth of The Miz to keep him from getting them in any deeper trouble, Long continued that whichever team defeats ShoMiz will earn their Unified WWE Tag Team Title match on the special 3-Hour WWE Draft edition of RAW!
First up in the three team Gauntlet Match for Unified WWE Tag Team Champions ShoMiz was the team they faced at WrestleMania, R-Truth & John Morrison! In the end, it was John Morrison applying a submission on Big Show, but he was using the ropes for leverage and, after failing to break after the referee’s five count was disqualified! After narrowly escaping R-Truth & John Morrison, ShoMiz then had to contend with The World’s Strongest Tag Team of MVP & Mark Henry! MVP was able to hit the Playmaker on The Miz in the match, but when he pinned Miz, Big Show came in from the outside with the vicious right hand of Big Show, which allowed ShoMiz to survive the second team! Led by Hall of Famer Bret “Hitman” Hart, The Hart Dynasty came out as the third team and made quick work of The Miz by hitting the Hart Attack maneuver en route to David Hart Smith pinning The Miz and earning The Hart Dynasty a shot at the Unified WWE Tag Team Titles on the 3-Hour Draft edition of RAW! On the same night where Bret Hart must declare that ShoMiz is the “greatest tag team in WWE history”, will The Hart Dynasty dethrone ShoMiz as the Unified WWE Tag Team Titles?
Backstage, Sheamus responds to his attack on Triple H by saying that if Triple H is too much of a “coward” to face him, then he should just “admit” it and announces that he is going to the ring to wait for Triple H and states that Triple H can “man up” and face him or he can “forfeit” and states that, in either case, he will be victorious! After the vicious assault by Sheamus, is Triple H in any shape to go forward with the Street Fight?
Then it would be time for CM Punk to fight for his hair as “The Straightedge Savior” would go one-on-one with Rey Mysterio in a WrestleMania rematch, but this time, if CM Punk loses, he will have his head shaved bald! After continuing to interfere on Punk’s behalf, the referee ejected Luke Gallows & Serena from ringside; leaving CM Punk to face Rey Mysterio alone! After hitting the 619 on CM Punk, Rey was set to defeat Punk, but a mystery man dressed in a hooded sweatshirt slides a steel chair into the ring which distracts the referee long enough for the stranger to pick Rey off of the apron and send Rey face first onto the floor on the outside of the ring with a modified powerbomb! CM Punk then brought Rey back into the ring and hit the GTS en route to picking up the win and keeping his hair intact! Who was this mystery man? Was this all a well-thought out plan by CM Punk and The Straightedge Society?
Then it was time for former friends and former tag team partners to settle their differences as JTG would be looking to gain revenge for the attack three weeks ago as he goes one-on-one with Shad Gaspard where they would be attached at the wrist by a leather strap in a Strap Match! In the end, it was JTG outsmarting Shad Gaspard and hitting the Box Cutter en route to touching the final corner and picking up the win over his former friend and former tag team partner!
Then it was time for Jack Swagger to make his first pay-per-view defense of the World Heavyweight Championship as “The All-American Champion” would put his gold on the line against “The Viper” Randy Orton in an Extreme Rules Match! In the end, it was Jack Swagger sending Randy Orton, spine-first, onto a steel chair and hitting the Swagger Bomb en route to successfully retaining the World Heavyweight Championship! After the match, Randy Orton got the last shot in as Orton planted Swagger with the RKO on the outside of the ring! Has Randy Orton signified that he is not done with Jack Swagger? What is next for the World Heavyweight Champion?
Following his earlier attack on Triple H, “The Celtic Warrior” Sheamus comes out and states that, if Triple H is not “man enough” to face him, then he wants the referee to raise his hand in victory! Going against the doctor’s advice not to compete, a weakened, but determined, Triple H makes his way to the ring for the Street Fight! With nerve damage in his neck preventing Triple H from using his left arm fully, “The Game” still went to war with Sheamus in a Street Fight! Triple H still managed to hold his own, but after four pump kicks in a row from Sheamus, it was all over for “The Game” as Sheamus picked up the win! After the match, EMT’s tried to get Triple H onto a backboard to stretcher Triple H out of the arena, but Triple H refused to be wheeled out of the arena! The EMT’s helped Triple H walk, but once they reached the stage, Sheamus re-emerged and delivered yet another pump kick to Triple H! After this vicious attack, the EMT’s loaded an unconscious Triple H onto the stretcher. What is the status of Triple H following the night of hell Sheamus put “The Game” through?
With a table of makeup, a mop and bucket, and an iron board at ringside and legal in the match, it was time for the first ever Extreme Makeover Match as Michelle McCool would defend the Women’s Title against “The Glamazon” Beth Phoenix! Through hairspray, makeup, buckets, and ironing boards, it was Beth Phoenix overcoming McCool and the help of Vickie Guerrero & Layla to hit the Glam Slam en route to winning the Women’s Championship for a third time! How will Michelle McCool, as well as Vickie Guerrero & Layla, respond to the Women’s Title changing hands?
Then it was time for “The Rated-R Superstar” Edge to go one-on-one with intense and personal rival Chris Jericho in a Steel Cage Match! After turning the tables on Chris Jericho by assaulting the ankle of Jericho, it was the Spear that led to Edge’s vindication as “The Rated-R Superstar” picks up the win inside the unforgiving steel structure!
Then it was time for the main event of WWE Extreme Rules as, in the culmination of their intense and personal rivalry, John Cena would defend the WWE Championship against “The Animal” Batista in a Last Man Standing Match! In an incredible war of a Last Man Standing Match that saw Batista put John Cena through a table and the ringside barricade, as well as Cena putting Batista through the announce table with the Attitude Adjustment and Batista firing back by putting Cena through a table a second time with a Spinebuster, it was after Cena failed to win the match after forcing Batista to pass out from Cena’s STF that Cena saw only one option in defeating “The Animal”; an option that will go down in history as the most unique ending to a Last Man Standing Match in WWE history as Cena actually wrapped Batista’s legs around the ring post and duct taped the ankles of Batista together! With Batista being unable to stand due to the duct tape restraint, it was John Cena who used his brains over his brawn to successfully retain the WWE Championship in a grueling and memorable match! What is next for WWE Champion John Cena and Batista? Is this the end of their intense rivalry?
The 883rd edition of WWE Monday Night RAW would host the 3-Hour 2010 WWE Draft as the annual WWE shakeup would come to you, live at a special start time of 8/7c, from the Richmond Coliseum in Richmond, VA. One night after an unforgettable WWE Extreme Rules, the entire landscape of the WWE would be changed as the Superstars of both RAW & SmackDown would be present in the arena for the 2010 WWE Draft where every Superstar, Diva, and even announcers are eligible to be drafted; regardless of the titles they hold or the teams they are a part of! In addition to the 2010 WWE Draft, the Unified WWE Tag Team Titles would be up for grabs as ShoMiz would defend the gold against the team that beat them in the Tag Team Gauntlet Match at WWE Extreme Rules, The Hart Dynasty! On the same night that ShoMiz could very well lose the Unified WWE Tag Team Titles, Hall of Famer Bret “Hitman” Hart would make an appearance on RAW to fulfill his end of the deal made two weeks ago on RAW by publicly dubbing ShoMiz as “the greatest tag team in WWE history”!
Before ShoMiz defended their Unified WWE Tag Team Titles against The Hart Dynasty, United States Champion The Miz states that The Hart Dynasty got “handed” their victory at WWE Extreme Rules and states that they have “handed” everything! The Miz then states that Stu Hart taught The Hart Dynasty what he taught the Hart family; how to be “losers”! The Miz then demands that Bret Hart come to the ring to dub ShoMiz “the greatest tag team in WWE history”! Hall of Famer Bret “Hitman” Hart comes out and says he is a “man of his word” before proclaiming that ShoMiz is “the greatest tag team in WWE history”! Bret then continues by saying that The Mountie was “the greatest Intercontinental Champion in history” and that David Arquette was “the greatest World Champion in history”! Bret says that he can say “whatever” he wants to before calling Miz a “horse-faced idiot” and proclaims that ShoMiz will soon be calling The Hart Dynasty the Unified WWE Tag Team Champions!
The opening match of the night was the match for the Unified WWE Tag Team Championship as ShoMiz would defend the gold against the team that defeated ShoMiz in a Tag Team Gauntlet Match at WWE Extreme Rules to earn the opportunity in The Hart Dynasty! After Bret Hart got involved to keep The Miz from utilizing the ropes to his illegal advantage, it was the beginning of the end for ShoMiz as The Hart Dynasty would hit the Hart Attack before Tyson Kidd locked The Miz in the Sharpshooter; forcing The Miz to tap out and earning The Hart Dynasty the Unified WWE Tag Team Titles! How will ShoMiz respond to losing the Unified WWE Tag Team Titles?
After losing the Unified WWE Tag Team Titles to The Hart Dynasty, the era of ShoMiz came to an abrupt halt as, during the commercial break that followed the title match, it was shown that Big Show left The Miz laying with his vicious Knockout Punch! With ShoMiz a thing of the past, what is next for the United States Champion and “The World’s Largest Athlete”?
Backstage, when questioned about his victory over Randy Orton at WWE Extreme Rules, still World Heavyweight Champion Jack Swagger stated that he “dominated” Randy Orton at WWE Extreme Rules and he is the “most educated” World Heavyweight Champion! Fresh off of his Steel Cage Match win over Chris Jericho, “The Rated-R Superstar” Edge confronts the World Heavyweight Champion and tells Swagger that he is next in line for the World Heavyweight Title and tells Swagger that “The All-American Champion” better hope he gets drafted to RAW!
One night after losing the Women’s Championship to Beth Phoenix in the first ever Extreme Makeover Match at WWE Extreme Rules, Michelle McCool was in action as she would team with her best friend, Layla, to take on the RAW team of the new Divas Champion, Eve Torres, and the Diva she took the gold from, Maryse with the winning team earning a Diva draft pick for their brand! It did not take long for the new Divas Champion and the former Divas Champion to clash as Eve Torres and Maryse brawled on the outside! After tagging herself into the match, Maryse and Eve Torres had another confrontation, which led to McCool hitting a big boot on Maryse en route to winning the match and earning a Diva draft pick for SmackDown! In the first draft pick of the night, Friday Night SmackDown picked up the exciting and talented Kelly Kelly for the blue brand! How will Kelly Kelly fare in this new environment?
After Kelly Kelly was drafted to SmackDown, another draft pick would be decided as, fresh off of keeping his hair by defeating Rey Mysterio, in controversial fashion, “The Straightedge Savior” would be looking to earn a draft pick for SmackDown as he went one-on-one with Evan Bourne from RAW! After the same mystery man from WWE Extreme Rules, as well as Luke Gallows & Serena, got involved, it was CM Punk hitting the GTS on Evan Bourne en route to winning the match and earning SmackDown the second straight draft pick! In terms of size, SmackDown picked up the “largest” draft pick possible as “The World’s Largest Athlete” Big Show will join the SmackDown roster! What is on the agenda of Big Show now that “The World’s Largest Athlete” has been drafted to Friday Night SmackDown?
After his brutal destruction of Triple H at WWE Extreme Rules, “The Celtic Warrior” Sheamus made an appearance on RAW and states that the “good news” is that Triple H will not get drafted to SmackDown, but the “bad news” is that Triple H will never wrestle again! Sheamus proclaims that Triple H’s career is over because of him and he is now moving on before stating that he wants the WWE Championship back! This brings out “The Viper” Randy Orton, who tells Sheamus that no one has “despised” Triple H more than him, but when it came to their match at WrestleMania last year, he faced Triple H like a “man” as he competed against him “face to face” and did not jump him from behind with a lead pipe! Orton tells Sheamus that, regardless of how, Sheamus got the “job done”, but says that Sheamus does not “deserve” a title shot! Sheamus responds by telling Randy Orton that he lost in his match for the World Heavyweight Title at WWE Extreme Rules, so he does not deserve a shot before threatening to sideline Orton like he did Triple H! Orton respond by threatening to RKO Sheamus and punt him in the skull! Sheamus tells Orton that he does not deal with “losers” and that he will be challenging John Cena for the WWE Championship and there is “nothing” that Orton can do about it! This brings out the WWE Champion himself, John Cena, who, after figuring out that there is no Guest Host of RAW for the night, revealed that he was told earlier that, as the WWE Champion, he was given the power to remedy the #1 Contender situation before announcing that Sheamus will go one-on-one with Randy Orton to determine the new #1 Contender for the WWE Championship! After this announcement, Sheamus tried to catch Orton with a pump kick and Orton dodged it before attempting the RKO to no avail! Sheamus then quickly exited the ring to avoid any further confrontation! Who will become the #1 Contender for the WWE Championship when these two go one-on-one for the opportunity?
With three Draft Picks on the line for the winning brand, a 10-Man Inter-branded Battle Royal took place on RAW as the SmackDown team of Rey Mysterio, R-Truth, Shad Gaspard, Kane, & Intercontinental Champion Drew McIntyre faced the RAW team of MVP, Mark Henry, Yoshi Tatsu, Santino Marella, & Ted DiBiase! In a surprising first elimination, Yoshi Tatsu managed to outmaneuver Drew McIntyre to eliminate the Intercontinental Champion! Shortly after this big elimination, Yoshi Tatsu found himself eliminated by Shad Gaspard! MVP was the next one eliminated as Rey Mysterio sent “The Ballin’ Superstar” packing! In a shocking move, Santino Marella was able to eliminate both R-Truth & Shad Gaspard! Following a 619 by Rey Mysterio, Kane was able to eliminate Mark Henry before Kane was low-bridged into elimination by Ted DiBiase, leaving Ted DiBiase & Santino Marella for RAW and Rey Mysterio for SmackDown! At the end of a back-and-forth war on the apron of the ring, it was Ted DiBiase finally eliminating Rey Mysterio to earn three Draft Picks for RAW! After the match, Santino Marella tried to celebrate with fellow survivor Ted DiBiase, but DiBiase responded by laying Santino out with Dream Street! Despite DiBiase not being in the celebratory mood, RAW certainly was as RAW earned three Draft Picks! The first Draft Pick for Monday Night RAW was none other than former Intercontinental Champion “The Guru of Greatness” John Morrison! The second Superstar to come over from SmackDown was none other than Morrison’s tag team partner, R-Truth! The third Draft Pick was an epic one as a former World Heavyweight Champion will be joining RAW as “The Rated-R Superstar” himself, Edge, joins Monday Nights! How will Edge’s shocking draft to RAW change the main event picture on both RAW & SmackDown?
Before his RAW Vs. SmackDown Draft Pick Match, Chris Jericho said that he did not “deserve” to be assaulted by Edge in the Steel Cage Match at WWE Extreme Rules and demands that Edge be “fined and suspended” for his attack! Jericho then states that he was thrown off his game in the Steel Cage Match by his loss to NXT Rookie Heath Slater and orders Slater to come to the ring and apologize to Chris Jericho for costing him the Steel Cage Match at WWE Extreme Rules! Heath Slater comes to the ring and says he is “sorry” that Jericho was unable to beat Edge and “sorry” that Jericho could not beat him on NXT last week and that Jericho will not beat his WWE Pro Christian! After Slater threw Jericho out of the ring, Christian from RAW went one-on-one with Chris Jericho from SmackDown with a Draft Pick on the line for the winning brand! In the end, it was Chris Jericho coming out of the clutches of defeat to hit the Codebreaker on Christian en route to picking up the win and earning a Draft Pick for SmackDown! After the match, Chris Jericho also got his revenge on Heath Slater by laying Slater out with the Codebreaker, as well! Then it was time for the Draft Pick to be announced as none other than former Intercontinental & United States Champion Kofi Kingston will be competing for SmackDown! Kofi wasted no time in making an impact as the newest SmackDown Superstar as he rushed to the ring and laid Chris Jericho out with Trouble in Paradise! How will Chris Jericho respond to Kofi Kingston’s attack?
In a rematch from this past Friday’s SmackDown, the World Heavyweight Champion from SmackDown, Jack Swagger, would go one-on-one with one of the newest additions to Monday Night RAW, “The Monday Night Delight” John Morrison with a Draft Pick on the line! In the end, “The All-American Champion” Jack Swagger was able to avenge his loss to John Morrison by defeating “The Monday Night Delight” following the Swagger Bomb to earn a Draft Pick for SmackDown and that Draft Pick will be none other than “Captain Charisma” Christian! What does Christian have planned for Friday Nights?
In the final RAW Vs. SmackDown Draft Pick Match, SmackDown Superstar Dolph Ziggler went one-on-one with RAW Superstar Hornswoggle! Hornswoggle was actually able to upset Dolph Ziggler by defeating Dolph via count-out! However, after the match, in an uncalled for attack, Dolph Ziggler locked in the sleeper hold on Hornswoggle! Despite the attack, the smallest RAW Superstar earned one of the biggest Draft Picks for RAW as Chris Jericho was drafted to RAW! With Edge & Chris Jericho both on RAW, will their intense rivalry continue on Monday Nights?
With all the Draft Picks decided, it was time for the main event of the evening as the new #1 Contender for the WWE Championship would be decided as “The Celtic Warrior” Sheamus would go one-on-one with “The Viper” Randy Orton or at least it was supposed to be the main event, but “The Animal” Batista had different plans as an irate Batista came out and declares that he is the #1 Contender and he should be the WWE Champion! Batista shouts that WWE Extreme Rules was a “joke” and that John Cena owes him a match and he is not leaving until he gets one! “The Celtic Warrior” Sheamus then comes and tells Batista that he lost and that Batista is just like Randy Orton; a “loser”! This brings out “The Viper” Randy Orton, who proposes that Batista face the winner of the match between him and Sheamus! Sheamus then jumps in and says that neither Orton nor Batista deserve the shot! This brings out WWE Champion John Cena, who simply announces that the #1 Contender’s Match is now a Triple Threat Match as “The Animal” Batista, “The Viper” Randy Orton, & “The Celtic Warrior” Sheamus would compete with the winner being named the #1 Contender for the WWE Title! In the end, Randy Orton hit the RKO on Sheamus, but as soon as Orton hit the RKO, Edge entered the ring and leveled Orton with the Spear, which allowed Batista to drape his arm over Randy Orton en route to becoming the #1 Contender for the WWE Title once again! What prompted Edge to lay Randy Orton out with the Spear and cost him a shot at the WWE Championship?
Results of the 2010 WWE Supplemental Draft: After eight Superstars found new homes on the 3-Hour 2010 WWE Draft edition of RAW, the Draft continued with the 2010 WWE Supplemental Draft, which started at 12/11c on WWE.com on Tuesday. From the start, RAW picked up a “great” draft pick from SmackDown as “The Punjabi Playboy” The Great Khali, along with his brother and translator, Ranjin Singh, is now a RAW Superstar. While The Great Khali & Ranjin Singh will join RAW, a third-generation Superstar joined SmackDown as Chavo Guerrero will compete exclusively for the blue brand. The son of a WWE Hall of Famer will be looking to pave his own way after the break up of Legacy as Cody Rhodes was drafted from RAW to SmackDown. One night after The Hart Dynasty won the Unified WWE Tag Team Titles, a piece of the trio that makes of The Hart Dynasty was drafted to RAW as Natalya joins the Divas of RAW. “The Masterpiece” will be making his presence known on Friday Nights as Chris Masters has been drafted to SmackDown. The last ECW Champion was drafted from SmackDown to RAW as “Big Zeke” himself, Ezekiel Jackson comes to Monday Night RAW. RAW will also become a little bit more “bizarre” as “The Bizarre One” Goldust is now a RAW Superstar. While SmackDown lost a dose of “bizarre” in losing Goldust, they gained a smaller dose in Hornswoggle. “The Long Island Loudmouth” Zack Ryder has to be feeling heartbroken as his lovely girlfriend, Rosa Mendes, has been drafted to SmackDown. While one couple was split up, a talented trio that though they were split up have reunited on Monday Nights as the new Unified WWE Tag Team Champions The Hart Dynasty join Natalya as Draftees to RAW. The longest reigning United States Champion in SmackDown history returns to the brand that made him as “The Ballin’ Superstar” MVP is back on Friday Nights.
The tenth edition of WWE NXT came to you from the Giant Center in Hershey, PA. With just two weeks to go before the first NXT elimination, the eight NXT Rookies would compete in another NXT challenge as the Rookies continue to try and curry favor with the WWE Pros. The NXT Rookies would also take part in tag team action as one of the newest SmackDown Superstars, Christian, would team with his Rookie, Heath Slater, to face one of the newest RAW Superstars, Chris Jericho, and his Rookie, Wade Barrett.
The show kicks off with another NXT challenge as the eight NXT Rookies would compete in the “Seal The Deal Challenge”, where the eight Rookies would go out amongst the fans to sell as much merchandise in sixty seconds as possible with the winner earning a match on next week’s NXT against a WWE Pro of their choosing! Skip Sheffield was the first NXT Rookie was the first up and he managed to sell four WWE program at $15 a piece! How will the other seven Rookies fare in the “Seal The Deal Challenge”?
The opening match of the night would see two of the Draftees from the 2010 WWE Draft compete in tag action as one of the newest SmackDown Superstars, Christian, would team with his NXT Rookie, Heath Slater, to face the team of one of the newest RAW Superstars, Chris Jericho, and his NXT Rookie, Wade Barrett! One week after the epic upset to Heath Slater, Chris Jericho was able to hit the Codebreaker on Slater en route to picking up the victory for himself and Wade Barrett!
The next NXT Rookie to take part in the “Seal The Deal Challenge” was Daniel Bryan, who decided to throw out all the WWE Programs for free; meaning that he did not make any money!
Justin Gabriel was the next NXT Rookie to take part in the “Seal The Deal Challenge” was Justin Gabriel, who took an impressive lead in the challenge by selling an astonishing twenty-two Programs!
The number seven NXT Rookie was in action on WWE NXT as he went one-on-one with the number eight NXT Rookie Darren Young, who came to the ring with Luke Gallows & Serena in tow! With some surprising help from Luke Gallows & Serena, Darren Young was able to hit his unique full nelson suplex finisher en route to picking up the win over Michael Tarver!
The next NXT Rookie to compete in the “Seal The Deal Challenge” was David “A-List” Otunga, who stated that “celebrities don’t do manual labor” before convincing a few audience members to help him sell his WWE Programs, who helped David Otunga take the lead in the challenge!
The next NXT Rookie was Heath Slater, who took a slower approach to the selling and did not beat David Otunga and neither did Darren Young! The next NXT Rookie to compete in the “Seal The Deal Challenge”, who states that he just lost a match and that WWE should “sell” him, because he is “the product” before walking out and refusing to compete in the challenge, as did Wade Barrett, who opted to pocket the money and leave!
The winner of the “Seal The Deal Challenge” was David “A-List” Otunga revealed that the WWE Pro he wants to face on next week’s NXT is none other than his own WWE Pro, R-Truth, before saying that it is about time that the “student beat the teacher”! Can David Otunga upset his WWE Pro, R-Truth, next week or will R-Truth teach his NXT Rookie some respect?
One night after losing the Unified WWE Tag Team Titles and being knocked out by his former partner “The World’s Largest Athlete” Big Show, United States Champion The Miz was set to compete in the main event against NXT Rookie Skip Sheffield, but said that Big Show “sucker punched” him on RAW and, given the condition of his jaw, he will be unable to compete and is placing his NXT Rookie Daniel Bryan in his place! After a vicious jawbreaker maneuver, Skip Sheffield was able to make relatively quick work of Daniel Bryan to pick up the first win in his Rookie career! With the first NXT elimination just a couple of weeks away, who will be sent home from the NXT competition?
The 54th edition of WWE Superstars came to you from the Richmond Coliseum in Richmond, VA and from the Giant Center in Hershey, PA. In their first match since winning the Unified WWE Tag Team Titles on RAW, the newly drafted Unified WWE Tag Team Champions The Hart Dynasty would face The Dudebusters in a non-title match. Also on WWE Superstars, Zack Ryder would go one-on-one with Primo and, in Divas action, former Women’s Champion Gail Kim would go one-on-one with “The Sour Songstress” Jillian.
The opening match of the night saw the WWE Divas in action as former Women’s Champion Gail Kim went one-on-one with “The Sour Songstress” Jillian. In the end, it was Gail hitting the Eat Defeat en route to picking up the win over Jillian!
“The Long Island Loudmouth” Zack Ryder was in action on WWE Superstars as he went one-on-one with the high-flying Primo. In the end, with a little assist by Rosa Mendes, it was Zack Ryder hitting the Zack Attack en route to picking up the win over Primo! How will Zack Ryder & Rosa Mendes fare now that Rosa has been drafted to SmackDown while Ryder remains on RAW?
Then it was time for the main event as, for the first time since winning the gold, the new Unified WWE Tag Team Champion The Hart Dynasty were in action on WWE Superstars as they faced The Dudebusters; Caylen Croft & Trent Barreta in a non-title bout! In the end, it was The Hart Dynasty hitting the legendary Hart Attack maneuver on Caylen Croft en route to The Hart Dynasty picking up the win over The Dudebusters! What other teams will The Hart Dynasty have to contend with now that they are on top of the tag team mountain as the Unified WWE Tag Team Champions?
WWE Hall of Famer Released From Contract: WWE.com announced on Friday that World Wrestling Entertainment has come to terms on the release of WWE Hall of Famer Tony Atlas! In his Hall of Fame career, Tony Atlas (real name- Anthony White) became the first African-American tag team champions with Rocky Johnson and most recently, Tony Atlas served as the sidekick for Abraham Washington on ECW. Tony Atlas was inducted into the WWE Hall of Fame in 2006.
The 558th edition of WWE Friday Night SmackDown came to you from the Giant Center in Hershey, PA. SmackDown would feature the newest SmackDown Superstars taking on the outgoing RAW Superstars as new SmackDown Superstar Kofi Kingston will get his opportunity to make an immediate impact on Friday Nights as he goes one-on-one with the newly drafted Chris Jericho! For the first time since WrestleMania, new SmackDown Superstar Cody Rhodes would be in action against new RAW Superstar “The Monday Night Delight” John Morrison!
The show kicks off with the General Manager of SmackDown, Theodore Long, who stated that SmackDown got the “better” end of things before introducing one of the newest additions to the SmackDown roster, Kofi Kingston, who would go one-on-one with one of the newest RAW Superstars, Chris Jericho, who stated that the time has come for him to leave SmackDown and become the “face of RAW”! Jericho continues that the void of his absence will be felt on Friday Nights and urges the fans to “move on” and to “grow up”! Kofi interjects and tells Jericho to “shut up” and says he will shut Jericho up! In his first night as a SmackDown Superstar, Kofi Kingston made an immediate impact by hitting Trouble in Paradise en route to pinning Chris Jericho to pick up a huge win! What heights will Kofi Kingston reach now that the high-flyer is a SmackDown Superstar?
Backstage, Chris Jericho confronts an old ally and stated that the show will be “nothing” without him and asked the person if he is even listening to him! Jericho is then knocked out by the huge right hand of “The World’s Largest Athlete” and new SmackDown Superstar, Big Show! What kind of impact will Big Show have on Friday Nights?
After being drafted back to SmackDown in the 2010 WWE Supplemental Draft, Chavo Guerrero appeared on SmackDown and encouraged the WWE fans to welcome their “favorite” Superstar back to SmackDown! Chavo is then “met” by the welcoming party, Kane, as “The Big Red Machine” welcomes Chavo back with a thunderous chokeslam!
As the new additions to SmackDown continue to try and make their mark on Friday Nights, new SmackDown Superstar Cody Rhodes would compete in his first match since being punted by Randy Orton at WrestleMania as Rhodes would go one-on-one with one of the newest additions to RAW, “The Guru of Greatness” John Morrison! In the end, it was Cody Rhodes hitting Cross Rhodes en route to picking up a huge win over John Morrison! What does the future hold for the second-generation Superstar, Cody Rhodes?
After being drafted to RAW on Monday, “The Rated-R Superstar” Edge made a special appearance on SmackDown to deliver his farewell address to the SmackDown fans! Edge admits that he does not “want to go” to RAW because he has always felt like SmackDown was his and the fans have supported him throughout his “trials and tribulations” before telling the fans that, from the bottom of his heart, he “loves” them! Business certainly picked on SmackDown with the arrival of the legendary partner and rival of Edge as “Captain Charisma” Christian arrived on SmackDown! Edge starts by wishing his best friend “luck” on Friday Night SmackDown! Christian says that everyone remembers the “history” of Edge & Christian and that they have known each other since they were kids and that they have held the tag team titles seven times together and he knows Edge possibly more than Edge knows himself! Christian then states that he “knows” that what Edge just said was a “load of crap” and that he just “used” the fans to get what he wanted! Edge then says that he is a nine-time World Champion and that Christian is yet to win a single World Title! Christian responds by saying that, when he does win a World Title, it will be on his own and he will not “step on other people’s necks” to get there before calling Edge a “liar”! Edge then admits that it is all true and that he has manipulated the fans and that he “enjoyed every second of it”! Christian responds by saying that people have been asking when Edge & Christian would reunite and run with the tag gold, but that he has realized that Edge “used” him as well! Christian then states that he does not want to see “Edge & Christian” anymore, he would rather see “Edge Vs. Christian” right then and there! The former friends and tag team partners then look like they are ready to square off, but Edge tells Christian “no”, but as soon as Christian turns his back, Edge attacks Christian and hits “Captain Charisma” with a big boot before he was set to hit the Spear, but Christian countered and the two brawled before Christian set Edge up for the Killswitch, but Edge was able to escape Christian and the ring! Now that Edge has revealed his true intentions and is now gone from SmackDown on RAW, is this conflict between Edge & Christian over? What kind of impact will Christian make on Friday Night SmackDown?
Backstage, Edge finds himself coming face-to-face with an old rival in “The World’s Largest Athlete” Big Show, who says that it is a shame that the fans will not get to see the Edge Vs. Christian match and it is a shame that they will also not get to see an Edge Vs. Big Show match before Big Show leaves “The Rated-R Superstar” laying with the vicious Knockout Punch!
Five nights after dethroning Michelle McCool in the first ever Extreme Makeover Match at WWE Extreme Rules, new Women’s Champion Beth Phoenix was in action on SmackDown as “The Glamazon” would team with one of the newest SmackDown Divas, Kelly Kelly to face former Women’s Champion Michelle McCool & Layla! In the end, it was Kelly Kelly hitting the Kelly Killer on Layla en route to picking up the win! While she teamed with the champion successfully, does Kelly Kelly have her sights set on the Women’s Championship?
After putting Hornswoggle to sleep with the sleeper hold on RAW, “The Platinum Superstar” Dolph Ziggler made an appearance on SmackDown and stated that he did everyone a “favor” and that what he did on RAW the “proudest moment” of his career! Dolph then vowed that no one will ever see Hornswoggle again and stated that he put Hornswoggle to sleep and now Hornswoggle is in “leprechaun heaven”! Have we really seen the last of Hornswoggle?
Backstage, Matt Hardy discusses the assault by Drew McIntyre on last week’s SmackDown by stating that he has had a lot of injuries in his career, but “nothing” like what McIntyre has done to him! Matt then vows that he will come back, because he “always” comes back, but Matt’s interview was abruptly brought to an end as Drew McIntyre attacked Matt Hardy yet again before the diabolical Intercontinental Champion delivered a disturbing Future Shock DDT to Matt Hardy on the cold concrete floor! After yet another heinous attack by Drew McIntyre, will Matt Hardy ever be seen again?
Five nights after retaining his hair in a match against Rey Mysterio at WWE Extreme Rules, “The Straightedge Savior” CM Punk, along with his Straightedge Society of Luke Gallows & Serena, made an appearance on SmackDown. A proud CM Punk vows that the “sobering reality” is that he “single-handedly” defeated Rey Mysterio at WWE Extreme Rules, despite Luke Gallows & Serena being ejected from ringside! CM Punk is then interrupted by one of the newest SmackDown Superstars as “The Ballin’ Superstar” MVP comes out and tells CM Punk that he is about to make SmackDown “hot” again before attacking The Straightedge Society! After the numbers game became too much for MVP, Rey Mysterio came out and made the save as MVP & Mysterio sent The Straightedge Society packing!
As a result of the four Superstars physical confrontation, an impromptu tag match took place as the team of new SmackDown Superstar, “The Ballin’ Superstar” MVP, and Rey Mysterio took on CM Punk & Luke Gallows of The Straightedge Society! In the end, it was the 619 of Rey Mysterio that led to MVP hitting a modified STO en route to picking up the win for himself and Mysterio! However, after the match, the same mysterious hooded figure that helped CM Punk at WWE Extreme Rules appeared once again and laid out Mysterio with a modified neckbreaker! Who is this new ally of The Straightedge Society?
Five nights after successfully defending the World Heavyweight Championship in an Extreme Rules Match against Randy Orton at WWE Extreme Rules, World Heavyweight Champion Jack Swagger made an appearance on SmackDown and stated that when he was a kid, his father told him that he would one day be a World Champion! “The All-American Champion” continued to list his accomplishments from youth until the present day before proclaiming that his “crowning achievement” was winning the World Heavyweight Title and vows that he is going to be World Heavyweight Champion until he “retires”! SmackDown General Manager Theodore Long comes out states that what everyone wants to hear is the identity of the new #1 Contender for the World Heavyweight Championship before revealing that the new #1 Contender for the World Heavyweight Title is none other than “The World’s Largest Athlete” Big Show! Show comes out and tells Swagger that there is one accomplishment that Swagger forgot to mention in his speech and that is “early retirement”! Big Show then proceeded to deliver the huge Knockout Punch to leave the World Heavyweight Champion laid out! In what is, no doubt, his “largest” test as the World Heavyweight Champion, can Jack Swagger survive Big Show or will “The World’s Largest Athlete” become known as World Heavyweight Champion?
Superstars of the Week: NEW Unified WWE Tag Team Champions The Hart Dynasty
AccomplishmentsOne Time WWE World Heavyweight ChampionOne Time WCW World Heavyweight ChampionTwo Time WCW United States ChampionOne Time WCW Tag Team Champion (w/ Bret Hart)
Did You Know?Goldberg holds the record for the longest undefeated streak in wrestling history with a record of 173-0.
Next Week’s WWE Television ScheduleMonday, May 3: RAW, LIVE from the Jacksonville Veterans Memorial Arena in Jacksonville, FLTuesday, May 4: WWE NXT from the North Charleston Coliseum in North Charleston, SCThursday, May 6: WWE Superstars from Jacksonville, FL & North Charleston, SCFriday, May 7: The North Charleston Coliseum in North Charleston, SC Hosts SmackDown
|
At Trans International we are moving and shipping specialists, dedicated to providing a reliable service for clients moving internationally and clients moving interstate. We ensure each move is a success by delivering what we promise and meeting each client's individual needs.
WHAT OUR CUSTOMERS SAY
'' Thank you for a job well done. From having Tom come to our home to quote through to the efficiency in packing and unpacking, we were happy every step of the way. Most importantly we were settled into our new home in London according to the original time plan. Very impressive! ''
|
Displayed by permission of The Regents of the University of California. All rights reserved. (A Britannica Publishing Partner)
The senses of predators are adapted in a variety of ways to facilitatehunting behaviour. Visual acuity is great in raptors such as the red-tailed hawk, which soars on high searching for prey. Even on a dark night owls can hear, and focus on, the rustling sound and movement of a mouse. Many insect-eating bats hunt by echolocation, emitting a pulsed, high-frequency sound—in the manner of a ship’s sonar—while flying; the sensory data thus gained guides them to their prey. A flock of white pelicans will cooperate to form a semicircle and, with much flapping of wings, drive fish into shallow water where they are easily captured.
any member of the only group of mammal s capable of flight. This ability, coupled with the ability to navigate at night by using a system of acoustic orientation (echolocation), has made the bats a highly diverse and populous order. More than 1,200 species are currently recognized, and many are...
|
News Sources
Blog Stats
Susan Stern Stern PR Omaha
By Susan L. Stern (Internet, USA) — Can you answer this question definitively – Do you know what SEO is? Turns out – 1 in 5 Americans – have heard of Search Engine Optimization, i.e., SEO…according to a survey by Matt Cutts, a senior software engineer at Google. In other words, that means 4 in 5 people – do not – know what SEO means. Cutts’ survey sample involved 1576 people, using Google Consumer Surveys, a new research service.
The survey found gender differences, too. The number of men and women who have heard of SEO stands apart. Interestingly, the research found that nearly 25% of men heard of SEO, with 16% of women aware of same.
What does that tell us Omaha internet marketers? “We need to inform the businesses we represent about the absolute necessity of having a regular SEO plan of action in place to build and maintain top search engine placement rank. That is, where your website or online directory listing appears on Google, Bing & Yahoo,” emphasizes Susan Stern, Stern PR™ Omaha.
– Click for FULL View – Courtesy of Google’s Matt Cutts
Omaha Internet Marketer Susan Stern Stern PR™ did her own informal, unscientific survey and found the same results as the Google Pro – that companies seem to be in the dark about SEO. “You can’t just have a website coded correctly to appear on the 1st page of Google. You have to constantly refresh the website content writing, the graphics (coupons), keywords, and take extra measures like write industry articles on your business blog, add website coupons or a news feed and have your SEO professional promote your online video commercial in mass monthly. On the latter note, Forbes Insight published in December 2010 found that 59% of senior executives prefer to watch video instead of reading text, if both are available on the same page,” notes Susan Stern, a Marketing Consultant in Omaha, Nebraska.
The fact that only 1 in 5 people, an estimated 20.4% of Americans have heard of SEO based on the Google study is astonishing. “Cause it’s something that every business needs to achieve website search engine success,” summarizes the Omaha Internet Marketer.
Additional Statistics. Website business owners must understand that SEO is a high stakes game that you must win. After all, if your company website sits in the top tier of search results, you may experience a big traffic and sales increase.
Another study was released in September 2011 by the Pew Internet & American Life Project that found that 58% of those surveyed search the internet for information before buying products and services, with most users only viewing the first page: Google, Bing and Yahoo search engines.
How do search engines determine which websites go where? A site’s position on Google, Bing & Yahoo is based on a mathematical formula, an algorithm, which give high rankings to sites coded correctly, packed with viable keywords and more. In terms of outsourcing your SEO, Marketing Consultant Susan Stern, Stern PR™ in Omaha offers suggestions.
With 4 out of 5 people unaware of what SEO is, that is a tell-tale sign that website business owners need to get educated on SEO, at least learn the basics, before you outsource these tasks to an internet marketing expert. When all is said and done, in today’s internet-driven technology age, regular, i.e. monthly search engine optimization is as essential as having a company website.
(Omaha, NE) — It’s an ethical dilemma. One obstacle an Omaha marketing firm faces is considering to take on clients that directly compete with another. “Recently, I have made the tough decision to turn down a potential business client because the company directly competed with an ongoing customer of mine,” states Susan Stern of Stern PR™Omaha. While Stern PR™, a marketing firm in Omaha, NE, does not sign non-compete agreements, in terms of ethics, Omaha Marketing Consultant Susan Stern feels a sense of loyalty to the clients she serves and prefers to keep them happy and not create waves.
“I have never faced this ethical issue before. Two clients who compete – simultaneously seek my Omaha marketing expertise. So, I gave the conundrum some thought. I weighed the pros and cons. Technically, if I were to take on both clients in the same business for website design & SEO work, the one who pays more for my search engine optimization services, for instance, would end up in a better spot on Google, Bing & Yahoo. In other words, the more financial investment a client commits increases the time I spend on the company’s SEO, the better their results. That doesn’t seem right,” notes Susan Stern, an up-and-coming marketing consultant in Omaha, Nebraska.
Omaha marketing consultant Susan Stern espouses strong business ethics. “I am a straight shooter. I am not going to sell you something your company does not need. As marketing consultant to your business, I will not pressure you either. I will always look out for your best interest,” says Susan.
(Omaha, NE) Technically, if you have a business plan, Stern PR™ Susan Stern, a marketing consultant in Omaha, Nebraska can make it become a reality. Help you focus. Give a valuable opinion. Put the plan into action!
“I’ve done it before, and I’ll do it again. A company comes to me, just starting up or has a clip art logo, and I help them launch their business plan, marketing-wise. Boom, done.Takes a couple weeks. I’ll unveil ‘total image marketing’: Logo. Slogan. Website. Video. Local print marketing. Registration with the state & BBB if industry neccesary. Check local, state and federal laws based on industry. I then create their legal contracts, mission statements, brochures, business cards, advertisements, etc. On your best behalf, I help cover your Aspen, Colorado, as I say,” remarks Susan Stern, owner of a one person Omaha marketing firm.
I did this labor-intensive, creative & technical work for – A Hammer for Hire™ – Waterloo, Nebraska. A quick deadline. For instance.
(Omaha, NE) — The wait is no more! The Stern PR™ Susan Stern 2012 video of services is here! Thus far, the reviews are great!
Every year, Omaha Marketing Consultant Susan Stern unveils a public portfolio showcasing the wide variety of projects to be proud of. Reminder. Omaha’s Stern PR™ offers everything that a business needs in terms of Omaha Marketing, Advertising, Public Relations & Journalism – on & offline.
“People don’t care, and may not realize the labor-intensive effort for creative & SEO-friendly video production the Stern PR™ way – done right! For example. For my own production, it took 60+ hours. Creatively. I start by shooting the video with a professional grade, high-definition & high-resolution video camera. I do same with high-resol still cam. Then, I transfer to my computer – a custom high ram, best processor, highest storage capability on-the-market 2012, an all-in-one touch-screen, flat screen, best graphics card desk top. And, no, it’s not a MAC. It’s a grand PC. Yet. reasonably priced. An IBM company created-system, on a side note.
Back to Video 101 by Stern PR™. I first choose the golden soundbites, video, etc. I had already edited in my head during shooting, so I know approximately know where to go on-the-time line – for that choice excerpt. Forward, it takes hours as I manipulate each video frame-by-frame, interspersed with custom video effects, transitions, panning & more. Do this. Change that.
I pick & choose the right music bed – in my vast commercial-purchased video library. I comb through several dozens of songs & bits – for the right track.
Once music is chosen, I place it on the – edit bar of- my industry-level video production program. I then lay down my voice-over. I zoom in each minute audio frame and edit-out breaths. Clean up copy. Import new media. Redo. Playback. Revise. Lay down new Susan Stern voice-over tracks. Render. Examine. Revise again. Re-edit. Whew!
When all is said and done. I download to appropriate video sharing sites. Redo. Redit. Delete old. Download again. Perfect. I then draft keyword rich for SEO description, title and tags after extensive research & analysis involving competition search engine 1st page placement. This is the entire process. Stern PR™. Pre & post production.
As for Stern PR’s 2012 Video Debut, time invested maxed out at 60+ hours,” stresses Susan Stern, Stern PR™, Marketing Consultant Omaha. “I worked some overnights. Many, many hours. Eventually, I get to the point – where I just know the production is great. I publicize it!”
Stern PR™ offers the same enthusiastic commitment/passion for clients – corporate videos for websites, training, boardrooms, trade shows and for a sales pitch! “Like a reporter as I use to be, I research. Learn, the product/service of each client I represent. It’s not complicated, for me. In fact, I’ve impressed one client in particular, he tried to hire me as sales director. No thanks. Much appreciated. I’ll stick with marketing consulting. Anyhoo, back to the passion of Stern PR™, I then streamline a company’s image via corporate video – complete with an ear-soothing, eye-catching slogan & entire name-branding – on & offline.”
(Stern PR™ Susan Stern) — Omaha Marketing Consultant Susan Stern Stern PR™ makes it a top priority to give back to the community in the form of organizing events for the Elk Creek Crossing Omaha HOA and handling marketing tasks at Omaha’s Friedel Jewish Academy.
“I love doing things for others. I figure, why not use my graphic design and video production expertise toward philanthropy. So, for several years I have handled the Friedel Jewish Academy End-of-Year Video production, a labor intensive production that received high reviews! I am also frequently called upon to shoot professional photos, create graphic design & copywriting mailers for the school, gratis. It’s fun and feels great to give altruistically,” notes Susan Stern Stern PR™ Omaha.
As for the ECC neighborhood association, Susan Stern of Stern PR™ passionately strives to stand by her slogan, ‘Serious Strategy Really,’ handling the website content maintenance, copywriting, photography and video. Few neighborhoods in Omaha offer an up-to-date neighborhood website like the one for ECC. Stern PR™ offers these services for next to nothing. Check it out here.
Susan Stern also spearheads events for families. “A couple of gal friends of mine are getting ready to organize the ECC neighborhood Easter Egg Hunt – a popular extravaganza that has grown over the years. So the upcoming holidays are gonna be really fun,” says Susan.
(Omaha, NE) — Attention, attention. The Susan Stern Stern PR™ 2012 Video is on the editing floor & ready for a public debut – the week of March 20! “I am super excited about publicizing this all-new video production. It shall contain the latest examples of my Omaha marketing work for such companies like Best of Omaha’s Heartland Lawns, CKF Consolidated Kitchens & Fireplaces, All Clear Windows, Snell Heating & Air Conditioning, among other great local businesses,” says Susan Stern Stern PR™.
“I am especially proud of some of the equipment upgrades in which I have invested – from a high-definition professional video camera, a few extra still camera lenses, top-notch pro lighting equipment and some superior computer software, that makes my job a heck of a lot less complicated and more polished. Clients seem to love the clarity of both my videos and photography. Good equipment is a wise investment.”
“Looking back, I remember starting my marketing business on a shoe-string budget with no extras. You know, with an ok, do-the-job, low-resolution video camera, and a computer that held hardly any memory. Boy, did it crash a lot. I still worked around it – and through it. It’s a fond memory. That said, thank goodness those good old days are behind me. Since then, thanks to great customer reviews of Stern PR™, with clients returning again and again, I am on my 4th computer, but this one has a superior processor and plenty of memory. So, I am crossing my fingers, that this may last several years.”
So, stay tuned for the debut of the all-new ‘Stern PR Video of Services 2012’
(Omaha, NE) — Stern PR Omaha’s Susan Stern offers tips on how business should deal with negative reviews online. Stay calm, act professional, respond and move on. Notes Susan, “the best advice I can give is to remember the old adage “customers are always right.” So that means, politely reply to poor online reviews in this way:
Thank the reviewer for taking time to provide feedback
Apologize to the reviewer, rectify problem and invite customer back if their gripe is legit
Offer a partial or full refund if situation warrants
Don’t reply to abusive reviewer – just ignore them, flag the complaint for removal or consultant with an attorney
Don’t offer them an explanation or excuse
If online reviewer is a fake, say from a competitor with a fictitious name, mention that no customer exists & invite them to call
If online reviewer with a personal gripe opts to defame or slander, call he or she out on it. Reply professionally. Consult w/Attorney
Another suggestion. Periodically run a Google, Bing and Yahoo search for your company online, to not only keep track of what people are saying, but to reply immediately to reviews – good and bad. Adds Susan Stern, “remember to never argue with the customer. ‘Cause yes, even though we may not feel this way, as business owners, we need to embrace the doctrine to treat each customer with respect, i.e., the customer is always right…
|
Get in touch with a representative from Lax Playground!
It doesn’t matter if it is Canada, USA, Germany, or France – the biggest goal for any laxer is making the national team. Lacrosse in Germany is small and unknown, but growing. On one hand you have to explain your equipment in public transportation, on the other hand there is a great and close lacrosse community all over Germany. Read More…
While the World Games are about to begin LPG will have a number of players from all over the world filling our readers in on what’s going on in Manchester. Dave Campbell from Team Germany has been checking in with us on his teams training as well as gear. Keep Reading…
|
AccessForms2Web (PHP and MySQL Editon) is an application to convert Microsoft Access databases (mdb) and MS Access Forms to AJAX based WEB page using PHP and MySQL. Now you can easily convert forms and their elements to Web page, filling form fields with data from the fields of your Access tables. During conversion elements' position, color pallette and fields type are saved. You have an opportunity to place your MS Access forms at Web page directly via FTP connection or save your forms to a local folder at your computer for future uploading. AccessForms2Web supports Unicode that allows you to make language special symbols displayed correctly. The program gives users an opportunity to select a table type: MyISAM, HEAP, BDB or ISAM. The software performs converting of Primary keys and Indexes. There is an ability to save data to PHP script or to a dump file that allows you to get over the restrictions on access to MySQL database if any. Sessions support allows you to save all your settings and restore them afterwards. You can organize application work using Interactive (GUI) mode as well as work through command line. User-friendly interface is the result of the combined efforts of our best specialists in software usability and Graphic User Interface design. Work with the converter is specially divided into several stages so the most complex issues of the conversion are broken into manageable parts. All necessary help documentation is provided with the software. You are welcome to evaluate the program for free. We encourage you to try our unique converter and place your MS Access forms at your web-page without wasting a lot of time and efforts. Using AccessForms2Web you get the whole range of benefits: fast conversion, excellent performance, real pleasure to work with.
Review AccessForms2Web (PHP and MySQL Editon)
Microsoft Access to MySQL database migration application is a cost effective and time saving utility for converting large volume record of MS Access into MySQL server. MS Access to MySQL converter supports all windows operating system like windows...
MS Access to MySQL database transformation program saves time to convert database created in MS Access to MySQL server format within a short time period. Microsoft Access to MySQL database migration tool is effective and flexible so it provides support...
MSSQL to Access is a tool to Convert, Migrate data from / to MS SQL to Access or from MS Access to MSSQL. You can convert multiple tables in one go from MSSQL to Access or from MS Access to MS SQL Server database. While converting you can map source...
Smart database convertor can migrate Microsoft SQL server to MySQL database by making new record or overwrites on existing MySQL database. Database conversion product is best alternate to time consuming and cost effective database migration software....
This script is an MS Access to MySQL Data Converter.
You'll need to execute the file on the same server as the the MS Access database. The connection strings for the databases are at the top of the file.
Free crm software suit to any small business by proper organizing the sales and customer details for later use.
(Ren Joe)
- Sep 18, 2017
It was a big issue while we tried to make some changes of our old payroll software which was developed using visual basic 6 but there was no source file. VBReFormer made the task easy which enabled us re design the application without old codes.
Any architectural project need to be monitored continuously and the materials has to be supplied in due time from the legitimate sources to minimize the cost. All these tasks can be maintained by VvW Control to help you finish the project in estimated time.
|
Interdisciplinary Artist | Text & Moving Image
Hold Up
Plans for reinstallation of TRP must stop. Everything must stop. There is no way–no way–the body refuses–the air refuses–to occupy any space in the ordinary way. The body refuses. The air refuses. It isn’t that TRP is beside the point now that Trump has won. It is that no action can be other than reaction. If I have a space to fill, it must be filled with outrage. Out. Rage.
|
The Holy Monastery of the Prophet Elias is a monastic community for men under the Diocese of Australia and New Zealand, ROCOR. The monastery is located in Monarto South, South Australia, and was established by Hieromonk Benjamin, who remains the abbot.
|
Week 11 Rankings (2017): Top 40 Running Backs
by Ray Kuhn
The waiver wire has been quiet for the last few weeks, but this week might be a little different. There are few options potentially available, and while they might not be the most exciting they offer some hope. How do those “fliers” fit into the rankings? Who should we be trusting overall? Let’s take a look at what we can expect and how our options rank:
Kareem Hunt – Kansas City Chiefs – at New York Giants
Le’Veon Bell – Pittsburgh Steelers – vs. Tennessee
Todd Gurley – Los Angeles Rams – at Minnesota
LeSean McCoy – Buffalo Bills – at LA Chargers
Leonard Fournette – Jacksonville Jaguars – at Cleveland
Mark Ingram – New Orleans Saints – vs. Washington
Melvin Gordon – Los Angeles Chargers – vs. Buffalo
Jordan Howard – Chicago Bears – vs. Detroit
Alvin Kamara – New Orleans Saints – vs. Washington
Jay Ajayi – Philadelphia Eagles – at Dallas
Tevin Coleman – Atlanta Falcons – at Seattle
Chris Thompson – Washington Redskins – at New Orleans
Isaiah Crowell – Cleveland Browns – vs. Jacksonville
DeMarco Murray – Tennessee Titans – at Pittsburgh
Kenyan Drake – Miami Dolphins – vs. Tampa Bay
Lamar Miller – Houston Texans – vs. Arizona
Jerick McKinnon – Minnesota Vikings – vs. LA Rams
Joe Mixon – Cincinnati Bengals – at Denver
Orleans Darkwa – New York Giants – vs. Kansas City
Doug Martin – Tampa Bay Buccaneers – at Miami
Adrian Peterson – Minnesota Vikings – at Houston
Duke Johnson – Cleveland Browns – vs. Jacksonville
Jamaal Williams – Green Bay Packers – vs. Baltimore
Rex Burkhead – New England Patriots – at Oakland
Marshawn Lynch – Oakland Raiders – vs. New England
Ameer Abdullah – Detroit Lions – at Chicago
Alfred Morris – Dallas Cowboys – vs. Philadelphia
Latavius Murray – Minnesota Vikings – vs. LA Rams
C.J. Anderson – Denver Broncos – vs. Cincinnati
Theo Riddick – Detroit Lions – at Chicago
Javorius Allen – Baltimore Ravens – at Green Bay
Dion Lewis – New England Patriots – at Oakland
Samaje Perine – Washington Redskins – at New Orleans
J.D McKissic – Seattle Seahawks – vs. Atlanta
Derrick Henry – Tennessee Titans – at Pittsburgh
Austin Ekeler – Los Angeles Chargers – vs. Buffalo
Damien Williams – Miami Dolphins – vs. Tampa BAy
Thomas Rawls - Seattle Seahawks – vs. Atlanta
Alex Collins – Baltimore Ravens – at Green Bay
James White – New England Patriots – at Oakland
Notes:
We now have official word that Rob Kelley has been placed on injured reserve and is out for the season. What does that mean for fantasy owners? Their first inclination should be to feel relief. as Kelley has been banged up all season and when he has been on the field the results haven’t exactly been there. Now Kelley can be safely released. On 62 carries he is averaging just 3.1 yards per carry while not being a factor in the passing game. The passing game is the domain of Chris Thompson ,who has two 100-plus yard efforts as part of his 38 receptions for 494 yards and three touchdowns. The Redskins try to limit Thompson’s workload on the ground to keep him fresh, but based on the results (4.6 yards per carry on 60 carries) it is going to be hard to continue to do so. Entering the season there were some expectations around Samaje Perine, but with just 3.2. yards per carry on 66 carries he has failed to distinguish himself. When Kelley was previously injured Perine didn’t exactly grab hold of the job, and it’s hard to expect a different result this time. However he is worth a glance on the waiver wire just in case. I also would be careful not to give Thompson much more of a boost, but it’s hard to argue with the success he has had so far and now we know that isn’t going away.
Another backfield that has been a mess got a little clearer with Seattle placing C.J. Prosise on injured reserve. With only 32 backfields you can’t ignore any situation, but the Seahawks’ is one that shouldn’t take too much of your attention. When healthy Eddie Lacy hasn’t done anything (128 yards on 48 carries) and I wouldn’t pay much attention to him either this week or the rest of the season. The problem is that Thomas Rawls hasn’t exactly been any better, or worse for that matter, with 125 yards on 49 carries. So, instead of chasing something that will likely never develop, we should just look to Prosise’s replacement in J.D McKissic. In spotty playing time McKissic is averaging 4.4 yards per carry on 21 carries with a touchdown, but his true value comes as a receiver. Again the sample size is small, but McKissic has 13 receptions for 126 yards and a touchdown. The fact that he has some foot speed and can catch the ball sets him apart from his competition, and if you must target one Seattle back he should be it.
This is what Tevin Coleman owners have been waiting for. Obviously, and this cannot be stressed enough, we don’t want to see any player get injured, but due to Devonta Freeman’s concussion Coleman is now the starter. Atlanta’s offense is not what it was last season, and Coleman’s workload (Freeman’s too) has left fantasy owners disappointed but the production has been there when they have been given a chance. After Freeman’s concussion last week Coleman did carry the ball 20 times and he gained a solid 83 yards while scoring a touchdown. Overal, Coleman is averaging 4.8 yards per carry on 83 carries while also catching 17 passes for 203 yards. We do have to worry about Terron Ward getting some work in replacing Freeman, but it is clear we will see Coleman’s touches increase. Against a team in Seattle that has allowed the fifth lowest point totals to opposing running backs there likely will be better match-ups, but Coleman is easily starting worthy.
We take production any place we can get it, and after last week we should be looking in Los Angeles. Or are we just overreacting? With Melvin Gordon not going anywhere for the Chargers and the fact that 15 of Aaron Ekeler’s 44 touches this season cameon Sunday, I think we might be. This doesn’t mean Ekeler isn’t going to be on my waiver wire radar, but he’s also not someone I’m going to rush out to grab. As just about every running back has done, Gordon struggled on the ground against Jacksonville as he gained 27 yards on 16 carries. Ekeler managed to pick up 42 yards on 10 carries, and the Chargers were leaning on him to control the clock at the end of the game. Once he fumbled that task went back to Gordon. Where Ekeler truly made his presence felt was through the air, as he caught five passes for 77 yards and two touchdowns. He certainly looked explosive in that role, but the Chargers do lean on Gordon in the passing game. He was targeted eight times, which led the team, and he has 35 receptions for 250 yards this season. Ekeler might have increased his role, but Gordon’s hold on the starting job isn’t going anywhere.
With Aaron Jones sidelined for a few weeks with a knee injury and Ty Mongtomery’s rib injury aggravated once again, Jamaal Williams is the next man up for Green Bay. Brett Hundley looked a little better under center this past week for the Packers, so their offense isn’t a complete bust. Whether it was Jones (two games of more than 100 yards) or Montgomery in the backfield the Packers’ running game has had success, and I would expect that to continue with Williams for Week 11. After both running backs were injured the rookie carried the ball 20 times for 67 yards while also catching one pass for seven yards. The only other healthy running back on Green Bay’s roster is Devante Mays, so Williams should see a substantial workload. It comes against Baltimore, whose run defense has been roughly league average, so Williams should have a solid afternoon.
The Eagles traded for Jay Ajayi to use him, and after their bye week that is what I would expect to see happen. Yes it is a crowded backfield, Corey Clement and LeGarrette Blount will have a role, but Ajayi is going to be the running back to own. This week Philadelphia faces the Cowboys, who are without Sean Lee, so Ajayi and company should find some room to run. Even after being acquired mid-week he gained 77 yards and scored a touchdown on eight carries two weeks ago, and being out of Miami should suit him well.
** PRE-SALE **
This weekend only, Pre-order Rotoprofessor’s 2018 Fantasy Baseball Draft Guide for just $6.25!! Click here for the details, but don’t miss out on the best bargain in fantasy baseball preparation.
Abdullah, drake, McKinnon, burkhead? I’m leaning McKinnon and Abdullah. Abdullah has been looking better the past few weeks and get Green Bay. I like drake but still usage is iffy with Williams. He’s more boom or bust. Thoughts?
10 team standard. I have Morris and MacFaddon. I prefer not to play Morris this week in flex. I have McCoy/McKinnon for RB. G. Tate/Marquise Lee for WR. Time to drop MacFaddon? Jeremy Maclin or Danny Woodhead or Jamison Crowder are available. I am also looking at ROS potential. Maclin has Houston next week. I have Zeke on the bench, but looks like we will serve full suspension now. Also, Buck Allen and Jamaal Williams available. Trying to get some help this week while looking ahead too. Your thoughts? Thanks.
What would be the logic of starting Mixon instead of Burkhead? I see that R Stanley is probably out, so I will probably bench Collins for J Williams as he should carry quite a lot given the passing limitations from both teams, and the weather there. Woodhead could return and that makes it a bigger mess even though I’d like to believe Collins could do well, but see him ranked low in your opinion.
Anyway, I’m off on a tangent, but I see Mixon ranked higher than Burkhead, though not much. I worry mostly that Mixon won’t get the carries, but then think when it seems least obvious, he’ll have a big game even at Denver. I fear starting any NE RB, as most would! I once had S Ridley on my team.
Thank you very much either way as I know you get a lot of questions, so fair enough if you can’t get to my question.
Thank you very much for writing, and excellent point, which is of course is the problem with NE RBs, and reason I stayed away from them, but trying to win division, so guess desperation overruling reality. As I noted, I suffered with Ridley (fumbles), but here I am considering Burkhead; could be White who scores more points this week, though thinking that they’ll all get their share against the Raiders, but I will start Mixon, so thanks again for bringing me to my senses!
Yea the Jacksonville situation is muddy. If I had to pick I’d go Ivory, but I’d go Anderson over that duo (and Booker). That said, it’s not a clear-cut decision. If we get some time of clarity as to Jacksonville prior to the game, it would certainly help
|
Newsletter
Connect With Us
Follow Us On Facebook:
Never Follow a Friend on a Trail Bike Into the Woods
A R1200GS, F800GS and KTM 690 try to keep up with a 350cc trail bike.
Published on 02.25.2014
Negotiating a log like this on a 500 pound Adventure Bike takes a lot of skill.
Motorcycle Adventure Dirtbike TV is one of our favorite YouTube Channels. The show is produced by a group of middle-aged friends from Sydney Australia with a love of Adventure Riding. The guys at Motorcycle Adventure Dirtbike TV enjoy testing their Adventure Bikes in the dirt and put their impressive riding skills on display in the videos they post.
In their most recent video, a friend riding a KTM Freeride 350 leads the group on what he calls an “Easy Trail.” They try to follow the little 220 pound (100 kg) trail bike on a BMW R1200GS Adventure, F800GS Adventure and KTM 690 Enduro with a Rally Raid kit. Their “friend” on the Freeride 350 quickly disappears into the woods as the trail turns out to be not so easy.
For the rest of the day the big Adventure Bikes struggle through logs, tight single track, technical hill climbs and tight squeezes. These are trails most people would never take a large adventure bike through, but the guys at Motorcycle Adventure Dirtbike TV are skilled riders and appear to enjoy the challenge. At one point the horizontally opposed cylinder heads of the R1200GS get wedged in-between a rock and a tree. The guys exhaust themselves lifting and squeezing the bike through the gap, as riders on trail bikes zoom past.
ADVERTISEMENT
It is insightful to see in the video how each of the various sized bikes (1200, 800 and 690) performs on the same section of trail. The video demonstrates how easy an obstacle can be cleared on a KTM 690 Enduro compared to a BMW R1200GS. It becomes obvious when you watch the video, how hard it is to negotiate technical trails on a R1200GS with its considerable weight.
The bikes make it home in the end, although with a smokey clutch, a dented rim and a few more scratches. Nonetheless, the guys declare it a “great day of riding.”
For more videos from Motorcycle Adventure Dirtbike TV check out their YouTube Page.
Rob Dabney started a lifelong obsession with motorcycles at the age of 15 when he purchased his first bike – a 1982 Honda MB5. Through his 20’s and 30’s he competed in off-road desert races, including the Baja 250, 500 and 1000. Eventually, his proclivity for exploration led him to dual sport and adventure riding. Rob’s never-ending quest to discover what’s around the next bend has taken him on Adventures in Mexico, North Africa, Europe, and throughout the American West. As a moto journalist, he enjoys inspiring others to seek adventure across horizons both near and far.
|
BERNE After a two-year hiatus from town politics, Kevin Crosier was re-appointed to the position of Berne Supervisor by a unanimous vote Wednesday night.
“I love being supervisor; it was that simple,” Crosier told The Enterprise when asked why he applied to fill the vacancy. “I’m looking forward to working with the board. It’s a great board, and we’ve got some enthusiastic people with a lot of good ideas. I’ve had a lot of ideas I’ve been mulling over in my head the last 18 months.”
George Gebe, a Democrat who won the race for supervisor in 2009, announced his resignation this fall for reasons relating to his family.
“My age doesn’t help,” said Gebe, who was 59 when he retired last year. “I’ve had some problems along the way, as far as my health. Maybe that brought me to some realizations, too.”
Peter Vance, whose term as town councilman ended on Dec. 31, was going to retire at the end of the year, but was appointed as supervisor soon after Gebe’s retirement. The board had originally planned on forming a committee to help find and select a replacement for Vance who would serve through the end of 2012, but decided later to keep Vance in office until a replacement was chosen this week, following an interview process. Other applicants interviewed were planning board Chairman Gerard Chartier, and planning board member Timothy Lippert.
In November 2012, Crosier will have to run to keep the supervisor’s post, and finish out the remaining year of Gebe’s four-year term. Another election will then be held in 2013, and the winner will begin a new four-year term.
In the summer of 2009, Crosier, an Albany firefighter, decided he would not be running for re-election as supervisor that fall because he wanted to spend more time with his family. He had been supervisor for two four-year terms. An enrolled Democrat, he ran on the Republican line to defeat the long-time incumbent, Alan Zuk.
“When you do public service, the biggest sacrifice is usually made by the family,” said Crosier said this week. “But, it was my daughter who actually said one night, ‘Dad, you really miss being town supervisor, don’t you?’ And I said, ‘Yea, but I left because I wanted to spend more time with you.’ And she said, ‘You did a good job, Dad. You should go back. I’ll be OK.’ So, it was my daughter and wife who both saw that I enjoyed the job, and they were willing to make that sacrifice.”
|
Historic Profile: At the time of its completion in 1915, the First National Soo Line Building was the tallest building in Minneapolis. Standing 19 stories tall, it represented a powerful symbol of corporate wealth and civic pride in Minneapolis. The building was a collaboration between two of the City’s most successful companies: the First National Bank and the Minneapolis, St. Paul, and Sault Ste. Marie Railway (the Soo Line), for their corporate offices. Heavily influenced by the 1893 World’s Columbian Exposition in Chicago, architect Robert Gibson used techniques from the Les Ecole des Beaux-Arts to design the Soo Line Building. Representing a return to classicism in architecture, the Soo Line Building stands out as one of the few tall buildings to incorporate Second Renaissance Revival details. With the exception of a second story skyway addition, the architectural integrity of the exterior remains intact.
|
Adele makes history with 800,000 sales
Adele’s new album 25 has sold more than 800,000 copies in its first week of release – the highest ever figure for a single UK chart week.
The album shifted more copies than the next 86 albums in the chart combined, and has become the first album to sell more than 100,000 downloads in a week.
In fact, 252,423 of the album’s 800,307 sales were digital with the rest on CD.
Official Charts Company chief executive Martin Talbot said: “The statistics surrounding the album are staggering.”
He added: “No album has ever sold 800,000 copies to reach number one in the history of British music.”
The previous record was held by Oasis’s Be Here Now, which reached number one with sales of 696,000 in 1997. However that album only went on sale three days before the end of the chart week.
Before this, no album had sold 100,000 copies in a single week this year. Adele’s 25 has sold 800,307.
That is more than the combined sales of the last 19 number one albums in the weeks they topped the chart.
More than 300,000 people bought 25 on its first day of release.
Ed Sheeran held the previous record for weekly digital album sales, with 95,709. Adele’s 25 has eclipsed that with 252,423 downloads.
25 has reached double platinum status already.
It still has some way to go to match the sales of Adele’s last album 21, which is owned by 4.8 million people in the UK.
Martin Talbot said: “What the future holds for 25 will unfold over the coming weeks and months, of course – but we can all be absolutely sure that more records will be toppled as Adele fever grips the nation in the run-up to Christmas.”
Adele’s third album has also “has done the seemingly impossible”, according to Billboard magazine , and sold more than three million in one week in the US.
That is the highest one-week US sales since data tracking began in 1991, overtaking the previous record of 2.4 million set by N’Sync’s No Strings Attached in 2000.
The singer has also just announced her first tour since 2011 , playing in arenas across Europe from next February.
|
---
abstract: |
In this paper we introduce the *persistent magnitude*, a new numerical invariant of (sufficiently nice) graded persistence modules. It is a weighted and signed count of the bars of the persistence module, in which a bar of the form $[a,b)$ in degree $d$ is counted with weight $(e^{-a}-e^{-b})$ and sign $(-1)^d$. Persistent magnitude has good formal properties, such as additivity with respect to exact sequences and compatibility with tensor products, and has interpretations in terms of both the associated graded functor, and the Laplace transform.
Our definition is inspired by Otter’s notion of blurred magnitude homology: we show that the magnitude of a finite metric space is precisely the persistent magnitude of its blurred magnitude homology. Turning this result on its head, we obtain a strategy for turning existing persistent homology theories into new numerical invariants by applying the persistent magnitude. We explore this strategy in detail in the case of persistent homology of Morse functions, and in the case of Rips homology.
address:
- 'Institute of Mathematics, University of Aberdeen, Aberdeen, United Kingdom AB24 3UE'
- 'Institute of Mathematics, University of Aberdeen, Aberdeen, United Kingdom AB24 3UE'
author:
- Dejan Govc
- Richard Hepworth
bibliography:
- 'rips-magnitude.bib'
title: Persistent Magnitude
---
Introduction
============
Magnitude is a numerical invariant of metric spaces arising from category theory and with nontrivial geometric content. In this paper we apply the theory of magnitude and its categorifications to the study of persistence modules and persistent homology theories.
Background
----------
Persistent homology, a fundamental notion in topological data analysis (or TDA), is a tool for measuring the shape of data sets and other objects. The general idea is to take a data set and produce an increasing sequence of topological spaces $X_s$, one for each value of a parameter $s$, where $X_s$ describes the shape of the data set ‘at scale $s$’. Taking the homology of the $X_s$ produces the homology groups $H_\ast(X_s)$ together with structure maps $H_\ast(X_s)\to H_\ast(X_{s'})$ whenever $s\leqslant s'$. This structure is called the *persistent homology* of the data set, and it is an example of an algebraic structure called a graded *persistence module*. Any (sufficiently nice) persistence module has a *barcode decomposition* describing its isomorphism class in terms of a collection of intervals called *bars*. Each bar is interpreted as a feature of the data set: the start point of the interval is the scale at which the feature first comes into being, and the end point is the scale at which the feature evaporates. Longer bars are interpreted as significant features, while shorter bars are interpreted as noise.
*Magnitude* is a numerical invariant of metric spaces introduced by Leinster [@LeinsterMetricSpace] (see also the survey [@survey]), as an instance of a general category theoretical construction. Despite its abstract origins, magnitude is a rich geometric invariant: Meckes [@MeckesMagnitudeDimensions] showed that magnitude can detect the Minkowski dimension of compact subsets of Euclidean space, Barceló-Carbery [@BarceloCarbery] showed that it can detect the volume of compact subsets of Euclidean space, and Gimperlein-Goffeng [@GimperleinGoffeng] showed that it can in addition detect surface area and the second intrinsic volume $V_2$ of appropriate subsets of odd-dimensional Euclidean space.
Magnitude of metric spaces has a categorification, called *magnitude homology*, which was introduced by Hepworth-Willerton [@richard] and Leinster-Shulman [@shulman]. The magnitude homology of a metric space is a bigraded abelian group, whose graded Euler characteristic recovers the magnitude of the metric space, at least when the space is finite. Thus the relationship between magnitude and magnitude homology is analogous to the relationship between Euler characteristic and singular homology. More recently, Otter [@Otter] has introduced a *blurred* or persistent version of magnitude homology, which relates magnitude homology to the Rips complex and, importantly, to ordinary homology.
Results
-------
Blurred magnitude homology assigns to each metric space $X$ a graded persistence module $\operatorname{BMH}_\ast(X)$. When $X$ is finite, we show that there is an attractive relationship between the barcode decomposition of $\operatorname{BMH}_\ast(X)$ and the magnitude $|X|$ of $X$: $$|X|
=
\sum_{k=0}^{\infty}
\sum_{i=1}^{m_k}
(-1)^k (e^{-a_{k,i}} - e^{-b_{k,i}})$$ where $\operatorname{BMH}_\ast(X)$ has bars $[a_{k,1},b_{k,1}),\ldots,[a_{k,m_k},b_{k,m_k})$ in degree $k\geq 0$.
Observe that the right hand side of the equation above makes sense for any graded persistence module, so long as it is subject to a finiteness condition such as being finitely presented. We turn this observation into a definition: The *persistent magnitude* or simply *magnitude* $|M_\ast|$ of a finitely presented graded persistence module $M_\ast$ is defined by $$|M_\ast|
=
\sum_{k=0}^{\infty}
\sum_{i=1}^{m_k}
(-1)^k (e^{-a_{k,i}} - e^{-b_{k,i}})$$ where $M_\ast$ has bars $[a_{k,1},b_{k,1}),\ldots,[a_{k,m_k},b_{k,m_k})$ in degree $k\geq 0$. Note that a bar $[a,b)$ makes a contribution of $\pm(e^{-a} - e^{-b})$ to the magnitude, so that longer bars make a greater contribution, in line with the general philosophy of persistent homology.
Persistent magnitude has good formal properties: we show that it is additive with respect to exact sequences, and that the magnitude of a tensor product of persistence modules is the product of the magnitudes of the factors, so long as the tensor product is understood in an appropriate derived sense.
Now suppose that we have a persistent homology theory defined for some class of mathematical objects, for example the Rips homology of metric spaces. By applying persistent magnitude to the persistent homology, we obtain a new numerical invariant of the mathematical objects in question. Our first example of this process is the case of the sublevel set persistent homology of Morse functions, where the resulting magnitude invariant is a (signed and weighted) count of the critical points of the original function.
Our most detailed example of persistent magnitude in action is the *Rips magnitude*. This is the numerical invariant of finite metric spaces obtained by taking the persistent magnitude of the Rips homology, and is given by the weighted simplex-count $$|X|_\mathrm{Rips}
=
\sum_{\emptyset\neq A\subseteq X}(-1)^{\#A-1}e^{-\operatorname{diam}(A)}.$$ We compute the Rips magnitude of cycle graphs with their path, Euclidean and geodesic metrics. In each case they are determined by a number-theoretical formula reminiscent of the sum of divisors function.
In the original setting of magnitude, defining the magnitude of infinite metric spaces is not straightforward: the simplest method is to take the supremum of the magnitude of all finite subspaces of the given infinite metric space, but there are alternatives, and currently the theory only works well in the case of *positive definite* spaces. We conclude the paper by investigating the question of whether Rips magnitude can be extended to infinite metric spaces. In the case of closed intervals in ${\mathbb{R}}$ the approach via a supremum works well and we find that $|[a,b]|_\mathrm{Rips}=1+(b-a)$. In the case of the circle with its Euclidean and geodesic metrics, which we study in detail, the results are attractive but inconclusive.
Organisation
------------
We begin the paper with a series of generous background sections: persistence modules and persistent homology in section \[section-background-persistence\], magnitude in section \[section-background-magnitude\], and magnitude homology in section \[section-background-mh\]. Section \[section-persistent-magnitude\] introduces the persistent magnitude of persistence modules, and studies its basic properties. Section \[section-sublevel\] applies persistent magnitude to the persistent homology of sublevel sets. The final part of the paper studies Rips magnitude: section \[section-rips\] introduces Rips magnitude and discusses its properties and some basic examples, section \[section-cycles\] computes it in the case of cycle graphs (with various metrics), and section \[section-infinite\] explores the possibility of defining Rips magnitude for infinite metric spaces.
Open Questions
--------------
The results obtained in this work raise several natural questions, that we have not yet been able to answer conclusively:
- What is the most general notion of tameness sufficient to develop the theory of persistent magnitude? (Our characterisation using the Laplace transform suggests that one might want to consider a notion of persistence modules of “exponential type”, meaning that the rank function is of exponential type.)
- Is there a general definition of Rips magnitude for (a suitable class of) infinite metric spaces? Can we establish asymptotic results similar to the case of the circle for higher-dimensional spheres or other manifolds? (Note that not much seems to be known about Rips filtrations of manifolds beyond the circle [@adamaszek2017vietoris].)
- The formulas for the Rips magnitudes of cycle graphs and Euclidean cycles seem reminiscent of the sum of divisors functions from number theory. Are there interesting connections between Rips magnitude of cycles and analytic number theory?
Background on persistence modules and persistent homology {#section-background-persistence}
=========================================================
Persistence modules
-------------------
Here we review some standard material on persistence modules, mostly following [@chazal2016structure; @bubenik2014categorification]. For a survey explaining the basic ideas and historical origin of persistence, see [@edelsbrunner2008persistent]. A modern exposition of the main ideas including the structure and stability theorems for persistence modules can be found in [@chazal2016structure]. For further background on persistence modules from the category theoretical perspective, see [@bubenik2014categorification]. A slightly more algebraic perspective, with a view towards multi-dimensional persistence, can be found in [@lesnick2015theory]. An account of some aspects of homological algebra for persistence modules can be found in [@BubenikMilicevic].
Throughout the paper, we will work with vector spaces over a fixed field ${\mathbbm{k}}$. The category of vector spaces over ${\mathbbm{k}}$ will be denoted by ${\mathbf{Vect}}$. In the most general setting, persistence modules can be considered over an arbitrary small category, see e.g. [@botnan2018decomposition; @bubenik2014categorification]; however, we will restrict attention to the case of $({\mathbb{R}},\leq)$-indexed persistence modules, as this is entirely sufficient for our purposes. Here $({\mathbb{R}},\leq)$ denotes either the poset ${\mathbb{R}}$ equipped with the partial order $\leq$, or the associated category with objects ${\mathbb{R}}$ and a unique morphism $x\to y$ whenever $x\leq y$.
A [*persistence module*]{} is a functor $M\colon({\mathbb{R}},\leq)\to{\mathbf{Vect}}$. A [*morphism*]{} of persistence modules is a natural transformation of such functors.
The category ${\mathbf{PersMod}}={\mathbf{Vect}}^{({\mathbb{R}},\leq)}$ of persistence modules has the structure of an abelian category. In particular, morphisms of persistence modules have well-defined kernels, and cokernels. These are again persistence modules and can be computed object-wise. The zero object of this abelian category is the persistence module $0\colon ({\mathbb{R}},\leq)\to{\mathbf{Vect}}$ all of whose components are $0$.
In some cases, we will also consider [*graded persistence modules*]{}, which are functors $M\colon ({\mathbb{R}},\leq)\to{\mathbf{GrVect}}$, where ${\mathbf{GrVect}}$ is the category of ${\mathbb{N}}_0$-graded vector spaces over ${\mathbbm{k}}$. Most of the content of this section generalises to the graded case in a completely straightforward way, so to avoid too much duplication, we only state it for the ungraded case.
To be able to extract any sort of useful information from persistence modules, we need to understand their structure. One way of doing this is by decomposing them into indecomposable summands. The indecomposables relevant in our case are known as interval modules.
A persistence module $M\colon({\mathbb{R}},\leq)\to{\mathbf{Vect}}$ is [*indecomposable*]{} if $M\cong M_1\oplus M_2$ implies that either $M_1\cong 0$ or $M_2\cong 0$.
Let $J\subseteq{\mathbb{R}}$ be an interval. The [*interval module*]{} ${\mathbbm{k}}J\colon ({\mathbb{R}},\leq)\to{\mathbf{Vect}}$ is defined as $${\mathbbm{k}}J(x)=\begin{cases}
{\mathbbm{k}};&\text{if $x\in J$,}\\
0;&\text{otherwise,}
\end{cases}$$ and $${\mathbbm{k}}J(x\leq y)=\begin{cases}
{\operatorname{id}}_{{\mathbbm{k}}};&\text{if $x,y\in J$,}\\
0;&\text{otherwise.}
\end{cases}$$
One of the main features of persistence modules over $({\mathbb{R}},\leq)$ that makes them useful in TDA is that they can frequently be decomposed as direct sums of interval modules. When such a decomposition exists, it is unique [@azumaya1950corrections]. The following version of the decomposition theorem is originally due to Crawley-Boevey [@crawley2015decomposition]. In the case of persistence modules over $({\mathbb{R}},\leq)$, it can be stated as follows.
Suppose $M\colon({\mathbb{R}},\leq)\to{\mathbf{Vect}}$ is a persistence module such that $M(x)$ is finite dimensional for every $x\in{\mathbb{R}}$. Then $M$ has a decomposition into interval modules.
Whenever a persistence module $M\colon({\mathbb{R}},\leq)\to{\mathbf{Vect}}$ decomposes as a sum of interval modules, we can represent it using a [*persistence barcode*]{}. This is defined as the multiset of all intervals that occur in the decomposition. Sometimes we represent these intervals as pairs $(a,b)$ where $a$ is the startpoint and $b$ is the endpoint of an interval in the decomposition. (These points are sometimes decorated to preserve information regarding which types of intervals the points correspond to, see [@chazal2016structure] for details.) The multiset of such pairs is called the [*persistence diagram*]{} corresponding to $M$. The notion of persistence diagram can be generalised to some cases where the interval decomposition does not exist [@chazal2016structure].
We will often concentrate on the case of *finitely presented* persistence modules. Note that a persistence module is finitely presented if and only if it is isomorphic to a finite direct sum of half-open interval modules ${\mathbbm{k}}[a,b)$, where $-\infty<a<b\leq\infty$.
The *tensor product* of two persistence modules $M$ and $N$ is given by $$(M\otimes N)(s) = \operatorname{colim}_{s_1+s_2\leq s}M(s_1)\otimes N(s_2).$$ Thus $(M\otimes N)(s)$ is the quotient of $\bigoplus_{s_1+s_2=s}M(s_1)\otimes M(s_2)$ obtained as follows. Suppose given $u_1,u_2$ with $u_1+u_2\leq s$. Then for any pair $v_1,v_2$ with $v_1+v_2=s$ and $u_1\leq v_1$, $u_2\leq v_2$, we have a composite $$\label{equation-tensor}
M(u_1)\otimes N(u_2)
\to
M(v_1)\otimes N(v_2)
\hookrightarrow
\bigoplus_{s_1+s_2=s}M(s_1)\otimes M(s_2).$$ Then $(M\otimes N)(s)$ is the largest quotient of $\bigoplus_{s_1+s_2=s}M(s_1)\otimes M(s_2)$ with the property that for all $u_1,u_2$ all such composites coincide, regardless of the choice of $v_1,v_2$. See Section 3.2 of [@BubenikMilicevic] or Section 2.2 of [@PSS].
The operation of tensoring with a fixed persistence module is right exact but not exact, and therefore induces *derived functors* denoted by $M,N\mapsto\operatorname{Tor}_i(M,N)$ for $i\geq 0$, with $\operatorname{Tor}_0(M,N)=M\otimes N$.
For finitely presented persistence modules the tensor products and $\operatorname{Tor}$-functors can be described explicitly. In order to do this, it suffices to explain what happens for interval modules. Given interval modules ${\mathbbm{k}}[a,b)$ and ${\mathbbm{k}}[c,d)$, we have $$\begin{aligned}
{\mathbbm{k}}[a,b)\otimes {\mathbbm{k}}[c,d) &= {\mathbbm{k}}[a+c,\min(a+d,b+c)),
\\
\operatorname{Tor}_1({\mathbbm{k}}[a,b), {\mathbbm{k}}[c,d)) &= {\mathbbm{k}}[\max(a+d,b+c),b+d),
\\
\operatorname{Tor}_i({\mathbbm{k}}[a,b), {\mathbbm{k}}[c,d)) &= 0
\text{ for }i\geq 2.\end{aligned}$$ See Example 7.1 of [@BubenikMilicevic].
Persistent homology
-------------------
Persistence modules have an important role in TDA, where they are used in order to study data sets in the form of finite metric spaces, also known as *point clouds*. The idea is to take a finite metric space $X$ and convert it into a simplicial complex (or topological space or other topological object) $Y$ equipped with an $({\mathbb{R}},\leq)$-filtration, i.e. a system of subsets $Y_r\subseteq Y$ for $r\in{\mathbb{R}}$, such that $\bigcup_{r\in{\mathbb{R}}}Y_r=Y$ and $Y_r\subseteq Y_{r'}$ for $r<r'$. There are many such constructions, and they are often based on the principle that $Y_r$ should capture the behaviour of $X$ ‘at length scale $r$’. Given such an $({\mathbb{R}},\leq)$-filtered complex $Y$, the assignment $r\mapsto Y_r$ defines a functor from $({\mathbb{R}},\leq)$ into simplicial complexes (or topological spaces, or other appropriate codomain). So taking the homology of the $Y_r$ then produces a graded persistence module $$r\longmapsto H_\ast(Y_r).$$ These persistence modules are called the *persistent homology* of the original object $X$. Once the persistent homology of $X$ has been obtained, the resulting barcode is then analysed. The bars are regarded as features of the metric space $X$. Longer or *persistent* bars are usually regarded as genuine features, while shorter bars are regarded as noise.
Here we will describe some important examples of this general construction, starting with the Vietoris-Rips filtration and the Čech filtration.
Suppose $(X,d)$ is a finite metric space. We define the [*Vietoris-Rips complex ${\mathcal{R}}(X)$*]{} of $(X,d)$ to be the $({\mathbb{R}},\leq)$-filtered simplicial complex with vertex set $X$, in which the simplices of the $r$-th filtration step ${\mathcal{R}}_r(X)$ are defined by the rule $$\sigma\in{\mathcal{R}}_r(X)\Leftrightarrow\operatorname{diam}\sigma\leq r.$$
In some cases, we consider $X$ as a subspace of some larger metric space $Y$, e.g. $Y={\mathbb{R}}^n$. In this case we can define the corresponding Čech complex as follows:
Suppose $(Y,d)$ is a metric space and $X\subseteq Y$ is a finite subset. We define the [*Čech complex ${\mathcal{\check{C}}}(X)$*]{} associated to $X$ to be the $({\mathbb{R}},\leq)$-filtered simplicial complex with vertex set $X$, in which the simplices of the $r$-th filtration step ${\mathcal{\check{C}}}_r(X)$ are defined by the rule $$\sigma\in{\mathcal{\check{C}}}_r(X)\iff\bigcap_{x\in\sigma}B(x,r)\neq\emptyset,$$ where $B(x,r)$ denotes the open ball in $Y$ with centre $x$ and radius $r$.
Note that both the Vietoris-Rips and the Čech complex are filtrations of the simplex spanned by the vertices of $X$.
A related source of persistence modules are sublevel set filtrations. These are associated to a function $f\colon X\to{\mathbb{R}}$, where $X$ is a topological space. They are motivated by ideas of Morse theory, where $X=M$ is assumed to be a smooth manifold and $f$ is a Morse function (smooth function whose critical points are nondegenerate).
Let $f\colon X\to{\mathbb{R}}$ be a (continuous) function on a topological space $X$. The [*sublevel set filtration*]{} associated to $(X,f)$ is the family $(X^a)_{a\in{\mathbb{R}}}$ where $X^a=f^{-1}(-\infty,a]$, which can also be viewed as a functor $S\colon ({\mathbb{R}},\leq)\to{\mathbf{Top}}$. Composing this functor with $k$-th singular homology yields a persistence module $H_k\circ S$ which is called the [*$k$-th sublevel set persistent homology of $(X,f)$*]{}.
Other examples of persistence modules that have been used are lower star filtrations of simplicial complexes, alpha (or Delaunay) complexes, wrap complexes, witness complexes, and many more besides [@edelsbrunner2010computational; @de2004topological; @bauer2017morse].
In order to ensure stability of persistence modules arising in applications despite the noise arising from imprecise measurements, it is important to be able to use approximation techniques. This is done using the notion of $\epsilon$-interleavings. These provide a way to formalise the intuitive notion of approximate isomorphism of persistence modules and can be used to define a notion of distance on the category of persistence modules. For details, see [@chazal2016structure; @bubenik2014categorification; @lesnick2015theory].
Background on magnitude of metric spaces {#section-background-magnitude}
========================================
In this section we will introduce the magnitude of metric spaces. This is a numerical invariant of metric spaces developed by Tom Leinster in [@LeinsterMetricSpace], building on earlier work defining numerical invariants of categories [@LeinsterEulerCharCategory]. Despite these abstract origins, magnitude turns out to be an interesting invariant containing meaningful geometric information. Here we will introduce the basics and attempt to give readers an impression of magnitude’s interest and reach. Readers who wish to know more are strongly recommended to take a look at Leinster’s original paper [@LeinsterMetricSpace] and Leinster and Meckes’s survey [@survey]. We note here that magnitude of metric spaces is just one instance of a more general invariant of enriched categories. The latter is developed in section 1 of [@LeinsterMetricSpace], and we will not say anything about it here.
Here, and in the rest of the paper, we will use the symbol $|X|$ to denote the magnitude of an object $X$. To avoid notational clashes, we will use the symbol $\#X$ to denote the cardinality of a finite set $X$.
Magnitude of finite metric spaces
---------------------------------
We begin with the magnitude of finite metric spaces. This is based almost entirely on section 2 of [@LeinsterMetricSpace].
Let $(X,d)$ be finite metric space. A *weighting* on $X$ is a function $w\colon X\to{\mathbb{R}}$ such that the equality $$\sum_{y\in X}e^{-d(x,y)}w(y)=1$$ is satisfied for every $x\in X$. If $X$ admits a weighting, then we define the *magnitude* of $X$ to be $$|X|=\sum_{x\in X}w(x).$$ This is independent of the choice of weighting. If no weighting exists, then the magnitude of $X$ is not defined.
Suppose that $X$ is a finite metric space with elements $x_1,\ldots,x_n$, and let $Z_X$ denote the $n\times n$ matrix with $(Z_X)_{ij}=e^{-d(x_i,x_j)}$. If it happens that $Z_X$ is invertible, then the magnitude of $X$ is defined and is given by the formula $$\label{equation-inverse}
|X| = \sum_{i,j=1}^n (Z_X^{-1})_{ij}.$$ It can happen that $|X|$ is defined (using weightings) in cases where $Z_X$ is not invertible. (See Lemma 1.1.4 of [@LeinsterMetricSpace].)
For $t>0$, we let $tX$ be the metric space $X$ rescaled by $t$, so that $d_{tX}(x,y)=td_X(x,y)$. There is no simple relationship between $|tX|$ and $|X|$, and as a consequence we gain information by considering all rescalings at once, as in the following definition.
\[definition-magnitude-function\] Let $X$ be a finite metric space. Its *magnitude function* is the (partially defined) function from $(0,\infty)$ to ${\mathbb{R}}$ given by $$t\mapsto |tX|.$$
Let $X$ denote the space consisting of a single point $x$. Then $Z_X$ is the $1\times 1$ matrix $(1)$, so that $Z_X^{-1}=(1)$ and formula gives us $|X| = 1$.
Let $X=\{x_1,x_2\}$ be the two-point space in which $d_X(x_1,x_2)=d$ for some $d>0$. Then $$Z_X = \begin{pmatrix} 1 & e^{-d} \\ e^{-d} & 1\end{pmatrix}$$ so that $$Z_X^{-1} = \frac{1}{1-e^{-2d}}
\begin{pmatrix} 1 & -e^{-d} \\ -e^{-d} & 1 \end{pmatrix}$$ and consequently $$|X|=\frac{2-2e^{-d}}{1-e^{-2d}}=\frac{2}{1+e^{-d}}.$$ The same computation shows that the magnitude function of $X$ is given by $$|tX|=\frac{2}{1+e^{-dt}}$$ with graph:
{width="200pt"}
We see in this case that $|tX|$ varies between $1$ and $2$, tending to $1$ as $t\to 0$ and to $2$ as $t\to \infty$. This suggests that magnitude is an ‘effective number of points’, regarding two points as essentially the same if they are very close, and essentially different if they are very far apart. The latter property generalises.
Let $X$ be a finite metric space. Then $|tX|\to \#X$ as $t\to\infty$, where $\#X$ denotes the cardinality of $X$.
- It is known that all metric spaces with four points or less have magnitude, but there exist spaces with five or more points that do not have magnitude (See pages 870-871 of [@LeinsterMetricSpace]).
- There is a simple formula due to Speyer for the magnitude of *homogeneous* metric spaces, i.e. those that admit a transitive group action (see Proposition 2.1.5 of [@LeinsterMetricSpace]). This allows one to compute magnitude of many simple spaces, for example complete graphs and cyclic graphs. (Graphs are always regarded as metric spaces by equipping them with the shortest path metric.)
- The magnitude function of a finite metric space $X$ can take negative values, it can take values greater than $\#X$, and it can have intervals on which it is increasing or decreasing. Example 2.2.7 of [@LeinsterMetricSpace] gives a demonstration of this on a space $X$ with 5 points.
- It is not always true that $|tX|\to 1$ as $t\to 0$. An example due to Willerton describes a metric space with $6$ points for which $|tX|\to 6/5$ as $t\to 0$. (See Example 2.2.8 of [@LeinsterMetricSpace].)
One may take a data set in the form of a finite subspace of Euclidean space, and take its magnitude or magnitude function, which in this case is always defined. The result is a potentially interesting invariant of such data sets. But for this to be useful, one would like to know that the invariant is stable under perturbations of the data set. In mathematical terms, one would like to know that magnitude is continuous with respect to the Hausdorff metric on subsets of Euclidean space. This is currently unknown, although Meckes has shown that in this situation the function $X\mapsto |X|$ is *lower semicontinuous*, meaning roughly that magnitude may jump upwards but not downwards. (See Theorem 2.6 of [@MeckesPositiveDefinite] and the paragraph that follows it.)
Magnitude of compact metric spaces
----------------------------------
Magnitude also makes sense for certain classes of compact, infinite metric spaces. Here we will recall the relevant definition and some of the main results. Good references for this section are section 3 of [@LeinsterMetricSpace] and the survey [@survey].
In the following we will consider *positive definite* metric spaces, which are metric spaces $X$ with the property that for every finite subspace $F$ the matrix $Z_F$ is positive definite. Any subset of Euclidean space, with its induced metric, is positive definite.
Let $(X,d)$ be a compact positive definite metric space. *The magnitude* of $X$ is defined by the formula: $$|X|=\sup\{|W| : W\subseteq X,\ W\text{ finite.}\}$$ The *magnitude function* of $X$ is defined by $t\mapsto |tX|$ for $t\in [0,\infty)$.
We let $S^1_\mathrm{eucl}$ denote the Euclidean circle, i.e. the unit circle in the plane with its induced metric. And we let $S^1_\mathrm{geo}$ denote the same circle with its geodesic metric of total arclength $2\pi$. Both are positive definite. Then the magnitude function of the Euclidean circle is given by $$|t\cdot S^1_\mathrm{eucl}|=\pi t+O(t^{-1})\qquad\text{as}\qquad t\to\infty$$ and the magnitude function of the geodesic circle is given by $$|t\cdot S^1_{\mathrm{geo}}|=\frac{\pi t}{1-e^{-\pi t}}.$$ See Theorems 13 and 14 of [@asymptotic]. It has been argued [@asymptotic] that the linear term $\pi t$ in these expressions corresponds to half the length of the circle, whereas the absence of the constant term corresponds to the fact that the Euler characteristic of the circle is zero.
In general, computing the magnitude of infinite spaces is difficult, and existing computations tend to require a significant amount of analysis. A useful survey on this subject is given in [@survey]. Important recent progress by Gimperlein and Goffeng [@GimperleinGoffeng] shows that for appropriate $X\subseteq{\mathbb{R}}^{2n+1}$, the asymptotics of the magnitude function as $t\to\infty$ encode geometric properties including volume, surface area and mean curvature.
Background on magnitude homology {#section-background-mh}
================================
Singular homology can be regarded as a *categorification* of the Euler characteristic: The Euler characteristic is a function taking values in the set of integers, whereas homology is a functor taking values in the category of graded abelian groups, and the function can be obtained from the functor by taking the alternating sum of the ranks: $$\chi(X) = \sum_{i=0}^\infty (-1)^i \operatorname{\mathrm{rank}}H_i(X)$$ This is a classical story, but there are more recent examples of such categorifications, notably Khovanov homology, which categorifies the Jones polynomial, and Knot Floer homology, which categorifies the Alexander polynomial.
Hepworth and Willerton [@richard] together with Leinster and Shulman [@shulman] introduced *magnitude homology*, a categorification of magnitude. (Precisely, Hepworth and Willerton first introduced magnitude homology in the case of graphs, and Leinster and Shulman later extended this to arbitrary metric spaces and very general enriched categories.) More recently, Nina Otter [@Otter] introduced a persistent version of magnitude homology called *blurred magnitude homology*.
In this section we will introduce magnitude homology and its blurred variant, and we will conclude by giving an explicit formula to extract the magnitude of a space from the barcode of its blurred magnitude homology. It is this story that we will *reverse* in the rest of the paper, using its conclusion as the *definition* of the magnitude of persistence modules. Applying this to persistent homology theories other than blurred magnitude homology, we will then obtain new notions of magnitude of metric spaces.
Magnitude homology
------------------
Given a metric space $X$ and elements $x_0,\ldots,x_k\in X$, we define $$\ell(x_0,\ldots,x_k)
=
d(x_0,x_1)+d(x_1,x_2)+\cdots+d(x_{k-1},x_k).$$ We think of this as the *length* of the tuple $(x_0,\ldots,x_k)$.
\[definition-mh\] The *magnitude chain complex* of a metric space $X$ consists of the abelian groups $$\operatorname{MC}_{k,l}(X)
=
\left\langle
(x_0,\ldots,x_k)\in X^{k+1}
\ \middle|\
\begin{array}{l}
x_{0}\neq x_1\neq\cdots\neq x_k,\\
\textstyle \ell(x_0,\ldots,x_k)=l
\end{array}
\right\rangle$$ with $l\in[0,\infty)$ and $k$ a non-negative integer. Here, and in what follows, angled brackets $\langle\quad\rangle$ denote free ${\mathbb{Z}}$-modules. The boundary operators $$\partial_{k,l}\colon \operatorname{MC}_{k,l}(X)\to \operatorname{MC}_{k-1,l}(X)$$ are defined by the rule $$\partial_{k,l}(x_0,\ldots,x_k)
=
\sum_{i=0}^k (-1)^i(x_0,\ldots,\widehat{x_i},\ldots,x_k),$$ where the term $(x_0,\ldots,\widehat{x_i},\ldots,x_k)$ is omitted if $\ell(x_0,\ldots,\widehat{x_i},\ldots,x_k)<l$. The *magnitude homology* $\operatorname{MH}_{k,l}(X)$ of $X$ is defined to be the homology of the magnitude chains $$\operatorname{MH}_{k,l}(X)=H_k(\operatorname{MC}_{\ast,l}(X))$$ where again $k$ is a non-negative integer and $l\in[0,\infty)$.
Magnitude homology is a categorification of the magnitude, in the sense that the graded Euler characteristic of magnitude homology coincides with the magnitude itself, as shown in the next proposition. This is categorification in the same sense that Khovanov homology categorifies the Jones polynomial, and that knot Floer homology categorifies the Alexander polynomial.
\[proposition-alternating\] Let $X$ be a finite metric space. Then $$|tX|=\sum_{l\in[0,\infty)}
\sum_{k=0}^\infty
(-1)^k\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l}(X))e^{-lt}$$ for $t$ sufficiently large.
\[remark-l-values\] The formula above requires some elaboration. Consider the set of real numbers occuring as $\ell(x_0,\ldots,x_k)$ for $x_0,\ldots,x_k\in X$, $k\geq 0$, with consecutive $x_i$’s distinct. Let us call these *$\ell$-values*. Since $X$ is finite, there is a positive minimum nonzero distance between elements of $X$, call it $\delta>0$, and then all $\ell$-values satisfy the following inequality: $$\label{equation-ell-bound}
\ell(x_0,\ldots,x_k)\geq \delta k$$
A first consequence of equation is that, for a fixed choice of $l\in[0,\infty)$, the set of $k$ for which $\operatorname{MH}_{k,l}(X)\neq 0$ is bounded above by $l/\delta$. That is because if $\operatorname{MH}_{k,l}(X)\neq 0$ then $l$ must be an $\ell$-value $\ell(x_0,\ldots,x_k)$. It follows that in Proposition \[proposition-alternating\] the inner sum is finite for each $l$.
The second consequence of equation is that for any positive real $N$, the collection of $\ell$-values satisfying $\ell(x_0,\ldots,x_k)\leq N$ is finite (because then $k\leq N/\delta$, and $X$ is finite). It follows that the set of all $\ell$-values can be totally ordered $0=l_0<l_1<l_2<\cdots$. Thus the outer series in Proposition \[proposition-alternating\] can be rewritten as the (infinite) sum over the $l_i$.
A graph can be regarded as a metric space by taking the set of vertices and equipping them with the shortest path metric. This is the original setting of magnitude homology in [@richard], where a number of explicit examples (done using computer algebra) are described. We include two of these here as an illustration. Figure \[TableFiveCycle\] shows the ranks of the magnitude homology $\operatorname{MH}_{k,l}(C_5)$ of the cyclic graph with $5$ vertices, and Figure \[TablePetersen\] shows the ranks of the magnitude homology $\operatorname{MH}_{k,l}(\mathit{P\!etersen})$ of the Petersen graph. (Note that the images and tables in Figures \[TableFiveCycle\] and \[TablePetersen\] are taken directly from [@richard].) Observe that in each case, the rank of $\operatorname{MH}_{0,0}(G)$ is the number of vertices, and the rank of $\operatorname{MH}_{1,1}(G)$ is the number of oriented edges. These are general features, but the question of what data is encoded in $\operatorname{MH}_{k,l}(G)$ for other choices of $k$ and $l$ remains mysterious. Another general feature visible here is that the nonzero magnitude homology groups lie in a range of pairs $(k,j)$ bounded by two diagonals, one of them the diagonal $k=j$, and the other determined by the diameter of the graph.
in [0,72,...,288]{} (+90:2cm) – (+72+90:2cm); in [0,72,...,288]{} (+90:2cm) circle (0.1cm);
[rrrrrrrrrrrrrr]{} &&&&&&&$k$\
&&0&1&2&3&4&5&6&7&8&9&10&11\
&0 & 5\
& 1 & & 10\
&2 & && 10\
& 3 &&& 10 & 10\
& 4 &&&& 30 & 10\
& 5 &&&&& 50 & 10\
$l$& 6 &&&&& 20 & 70 & 10\
& 7 &&&&&& 80 & 90 & 10\
& 8 &&&&&&& 180 & 110 & 10\
& 9 &&&&&&& 40 & 320 & 130 & 10\
&10 &&&&&&&& 200 & 500 & 150 & 10\
&11 &&&&&&&&& 560 & 720 & 170 & 10\
[rrrrrrrrrrr]{} &&&&&$k$\
&0&1&2&3&4&5&6&7&8\
& 0 & 10\
& 1 & & 30\
& 2 & && 30\
& 3 &&& 120 & 30\
$l$ & 4 &&&& 480 & 30\
& 5 &&&&& 840 & 30\
& 6 &&&&& 1440 & 1200 & 30\
& 7 &&&&&& 7200 & 1560 & 30\
& 8 &&&&&&& 17280 & 1920 & 30\
Magnitude homology has many good characteristics of homology theories and categorification:
- Magnitude homology refines magnitude: there are finite metric spaces with the same magnitude but non-isomorphic magnitude homologies [@Gu].
- Magnitude homology can contain torsion [@KanetaYoshinaga]. Thus the magnitude homology contains more data than just the ranks $\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l}(X))$.
- Magnitude homology has properties that categorify known properties of the magnitude. In the setting of graphs, a Künneth theorem categorifies the known product formula for magnitude, and a Mayer-Vietoris sequence categorifies the known inclusion-exclusion formula. See [@richard].
- Magnitude homology contains information about geometric features of a metric space, for example it can precisely detect the property of being Menger convex, and it contains obstructions to the existence of upper bounds on curvature, and to the existence of closed geodesics. See [@shulman], [@Gomi], [@Asao].
- Magnitude homology has been computed fully in several interesting examples, including trees, complete graphs, cycle graphs, and the icosahedral graph. See [@richard] and [@Gu].
Blurred magnitude homology
--------------------------
We now describe some recent work of Nina Otter [@Otter] that connects magnitude homology with persistent homology, specifically the Vietoris-Rips complex. We also give a new result that relates magnitude with barcodes for the first time.
\[definition-bmh\] The *blurred magnitude chain complex* of a metric space $X$ is the chain complex of persistence modules $\operatorname{BMC}_\ast(X)$ defined by the rule $$\operatorname{BMC}_k(X)(l)
=
\left\langle
(x_0,\ldots,x_k)\in V^{k+1}
\ \middle|\
\begin{array}{l}
x_{0}\neq x_1\neq\cdots\neq x_k,\\
\textstyle \ell(x_0,\ldots,x_k)\leq l
\end{array}
\right\rangle$$ where $l$ is the persistence parameter and $k$ is a non-negative integer. The boundary operators $$\partial_{k}\colon \operatorname{BMC}_k(X)\to \operatorname{BMC}_{k-1}(X)$$ are defined by the rule $$\partial_{k,l}(x_0,\ldots,x_k)
=
\sum_{i=0}^k (-1)^i(x_0,\ldots,\widehat{x_i},\ldots,x_k).$$ The *blurred magnitude homology* $\operatorname{BMH}_\ast(X)$ of $X$ is defined to be the homology of the blurred magnitude chains: $$\operatorname{BMH}_k(X)=H_k(\operatorname{BMC}_\ast(X))$$ for $k$ a non-negative integer.
One of the main results of Otter’s paper [@Otter] is that it compares the blurred magnitude homology of a metric space $X$ with the homology of its Rips complex. The main idea of this comparison is that there are maps $$\operatorname{BMC}_k(X)(s)\to C_k({\mathcal{R}}^\mathrm{sim}(X)(s))
\text{\ \ and\ \ }
C_k({\mathcal{R}}^\mathrm{sim}(X)(s))\to \operatorname{BMC}_k(X)(ks),$$ where ${\mathcal{R}}^\mathrm{sim}(X)$ denotes a variant of the Rips chain complex, having the same persistent homology. These comparison maps are a multiplicative version of an interleaving, and although the constant appearing here is the degree $k$ in the chain complex, and in particular is not constant, it is nevertheless sufficient for Otter to prove the following theorem.
\[theorem-nina\] $$\lim_{0\leftarrow\epsilon}\operatorname{BMH}_\ast(X)(\epsilon)
\cong
\lim_{0\leftarrow\epsilon}H_\ast({\mathcal{R}}(X)(\epsilon))$$
The quantity $\lim_{0\leftarrow\epsilon}H_\ast({\mathcal{R}}_\ast(X)(\epsilon))$ is the *Vietoris homology* of $X$, a version of homology developed for metric spaces. In good cases, e.g. when $X$ is a compact Riemannian manifold, it coincides with the singular homology of $X$. This theorem therefore demonstrates for the first time a concrete connection between magnitude homology and ordinary homology of spaces.
We now state a new result that gives the relation between magnitude and the barcode decomposition of the blurred magnitude homology.
\[theorem-magBMH\] Let $X$ be a finite metric space and let $\operatorname{BMH}_\ast(X)$ denote its blurred magnitude homology. Suppose that $\operatorname{BMH}_\ast(X)$ has barcode whose bars in degree $k\geq 0$ are $[a_{k,0},b_{k,0}),[a_{k,1},b_{k,1}),\ldots$. Then the magnitude of $X$ is given by the formula $$|tX|
=
\sum_{k=0}^\infty
\sum_{i=1}^{m_k}
(-1)^k (e^{-a_{k,i}t} - e^{-b_{k,i}t})$$ for $t$ sufficiently large.
The proof of Theorem \[theorem-magBMH\] itself is rather long and technical, thanks to the convergence issues, and so we have relegated it to Appendix \[section-long-proof\]. Instead, at this point we offer a sketch.
$$\begin{aligned}
|tX|
&\stackrel{1}{=}
\sum_{j=0}^\infty
\sum_{k=0}^\infty
(-1)^k\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l_j}(X))e^{-l_jt}
\\
&\stackrel{2}{=}
\sum_{j=0}^\infty
\sum_{k=0}^\infty
(-1)^k
\left[
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))
-
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_{j-1}))
\right]e^{-l_jt}
\\
&\stackrel{3}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{j=0}^\infty
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))(e^{-l_jt}-e^{-l_{j+1}t})
\\
&\stackrel{4}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{i=0}^\infty
(e^{-a_it}-e^{-b_it})\end{aligned}$$
Step 1 is precisely the formula of Proposition \[proposition-alternating\]. Step 2 follows as a consequence of the long exact sequences $$\cdots
\to
\operatorname{BMH}_k(X)(l_{j-1})
\to
\operatorname{BMH}_k(X)(l_j)
\to
\operatorname{MH}_{k,l_j}(X)
\to
\cdots$$ which relate the blurred and original versions of magnitude homology. (See Proposition \[proposition-absolute-blurred\].) Step 3 amounts to exchanging the order of the sums and then rearranging the inner sum. And step 4 follows by rearranging the series in line 3 as a sum over bars rather than over the lengths $l_j$.
By standard homological algebra, these definitions have the following immediate consequence, which relates ordinary and blurred magnitude homology.
\[proposition-absolute-blurred\] Let $X$ be a finite metric space and let $0=l_0<l_1<l_2<\cdots$ be the distinct real numbers occuring as $\ell(x_0,x_1,\ldots,x_k)$ for $x_0,\ldots,x_k\in X$, $k\geq 0$. Then for each $k\geq 0$ and $j>0$ we have a short exact sequence: $$0\to\operatorname{BMC}_k(X)(l_{j-1})\to\operatorname{BMC}_{k}(X)(l_j)\to\operatorname{MC}_{k,l_j}(X)\to0$$ Consequently in homology there is a long exact sequence: $$\cdots\to\operatorname{BMH}_k(X)(l_{j-1})\to\operatorname{BMH}_k(X)(l_j)\to\operatorname{MH}_{k,l_j}(X)\to\cdots$$
Magnitude of persistence modules {#section-persistent-magnitude}
================================
In Theorem \[theorem-magBMH\] in the previous section, we saw a formula expressing the magnitude function of a finite metric space $X$ in terms of the barcode decomposition of its blurred magnitude homology. In this section we will turn that result on its head, and use the formula to *define* a numerical invariant of persistence modules and graded persistence modules, and explore its formal properties.
In subsequent sections we will apply our new invariant to persistent homology groups, in order to obtain new invariants of finite metric spaces (or of whatever input the persistent homology theory accepts).
In this section we will usually work with finitely presented persistence modules, and finitely presented graded persistence modules. In the latter case, we mean that the graded persistence module has finitely many generators and relations in total, so that it is nonzero in only finitely many degrees. Thus, our persistence modules will always be direct sums of finitely many interval modules of the form ${\mathbbm{k}}[a,b)$ where possibly $b=\infty$. This restriction allows us to work with the most relevant examples such as Rips and Čech complexes while keeping technicalities to a minimum. At the end of the section we will offer two different perspectives on the persistent magnitude, via the derived associated graded module and the Laplace transform. These offer potential for extending the scope of persistent magnitude beyond the present setting.
Persistent magnitude
--------------------
\[definition-mag\] Let $M$ be a finitely presented persistence module with barcode decomposition $$M
\cong
\bigoplus_{i=1}^n
{\mathbbm{k}}[a_i,b_i).$$ The *persistent magnitude* or simply *magnitude* of $M$ is the real number $$|M|
=
\sum_{i=1}^n (e^{-a_i}- e^{-b_i})$$ where by convention $e^{-\infty}=0$.
For interval modules we have $|{\mathbbm{k}}[a,b)|=e^{-a}-e^{-b}$ and $|{\mathbbm{k}}[a,\infty)| = e^{-a}$. Thus longer intervals have greater magnitude, in line with the general philosophy of persistent homology that longer bars — the features that persist longer — are the more significant. But note also that interval modules of fixed length have greater magnitude the closer they are to $0$, i.e. the sooner they begin.
\[proposition-ses\] If $$0\to M\to N\to P\to 0$$ is a short exact sequence of finitely presented persistence modules, then $|N| = |M| + |P|$.
We will give a proof of this proposition in section \[subsection-associated-graded\] below, and another proof in section \[subsection-laplace\].
Let $M_\ast$ be a finitely presented graded persistence module. The *persistent magnitude* of $M_\ast$ is defined as follows: $$\begin{aligned}
|M_\ast|
&=
\sum_{i} (-1)^i|M_i|
\end{aligned}$$
If $C_\ast$ is a chain complex of persistence modules, then we obtain two graded persistence modules, namely $C_\ast$ itself, and the homology $H_\ast(C)$. The persistent magnitude of these is related by the following result, whose proof is a standard consequence of additivity with respect to short exact sequences. (Compare with the proof of Theorem 2.44 of [@Hatcher].)
\[proposition-maghom\] Let $C_\ast$ be a finitely presented chain complex of persistence modules. Then $$|H_\ast(C)| = |C_\ast|.$$
Rescaling and the magnitude function
------------------------------------
In Definition \[definition-magnitude-function\] the magnitude of a finite metric space was extended from a number to a function by means of rescaling the metric space. We now do the same with persistent magnitude.
Given a persistence module $M$ and a real number $t\in(0,\infty)$, we can define the *rescaled module* $tM$ to be the new persistence module defined by $$tM (s) = M(s/t)$$ for $s\in[0,\infty)$. More precisely, $tM$ is obtained from $M$ by precomposing with the functor from $[0,\infty)$ to itself that sends $s$ to $s/t$. This operation extends to graded persistence modules and chain complexes of persistence modules in the evident way.
One can think of the definition of this rescaling operation as saying that features of $M$ that occur at $s$ become features of $tM$ that occur at $ts$.
One can check that $t{\mathbbm{k}}[a,b) = {\mathbbm{k}}[ta,tb)$. Thus the effect of the rescaling operation on the barcode of a finitely presented persistence module $M$ is to simply rescale it by $t$: the barcode of $tM$ is obtained from that of $M$ by applying a scale factor of $t$ in the horizontal direction.
Rescaling of persistence modules is designed to interact nicely with rescaling of metric spaces. Recall that if $X$ is a metric space and $t\in (0,\infty)$, then the rescaling $tX$ is the metric space with the same underlying set and with metric defined by $d_{tX}(a,b) = t d_X(a,b)$. Then one can check directly that the Rips and Čech complexes satisfy $$tC_\ast({\mathcal{R}}(X)) = C_\ast{\mathcal{R}}(tX)
\quad\text{and}\quad
tC_\ast({\mathcal{\check{C}}}(X)) = C_\ast({\mathcal{\check{C}}}(tX))$$ and similarly for the persistent homology.
\[definition-persistent-magnitude-function\] The *persistent magnitude function* or simply *magnitude function* of a finitely presented persistence module $M$ is the function $(0,\infty)\to{\mathbb{R}}$ defined by $$t\longmapsto |tM|.$$ If $M$ has direct sum decomposition $M \cong \bigoplus_{i=1}^n {\mathbbm{k}}[a_i,b_i)$, then the magnitude function is given by the formula $$|tM|
=
\sum_{i=1}^n (e^{-a_it}- e^{-b_it})$$ where again by convention $e^{-\infty}=0$.
The extremal behaviour of the magnitude function singles out two special classes of bars, as we see in the next proposition. Its proof is an immediate consequence of the definitions.
\[proposition-limiting\] Let $M$ be a finitely presented persistence module. Then:
- $\lim_{t\to 0}|tM|$ is the number of bars in $M$ of the form ${\mathbbm{k}}[a,\infty)$.
- if all bars of $M$ are contained in $[0,\infty)$ (or equivalently if $M(s)=0$ for $s<0$), then $\lim_{t\to\infty}|tM|$ is the number of bars in $M$ of the form ${\mathbbm{k}}[0,b)$, including the case $b=\infty$.
One can think of this as follows: As $t\to 0$, we are scaling down the barcode of $M$, so that any finite bars eventually disappear at $0$, while any infinite bars remain, but all become indistinguishable; in this limit the magnitude function simply counts the latter. As $t\to \infty$, we are scaling up the barcode of $M$, so that any bars which begin *after* $0$ eventually disappear at infinity, while all bars that begin at $0$ remain but become indistinguishable; in this limit the magnitude function again just counts the latter.
\[remark-homeo\] Occasionally, it is useful to reparameterise a persistence module $M$ by an orientation preserving homeomorphism $h\colon{\mathbb{R}}\to{\mathbb{R}}$. In this case, we can define the [*reparameterised module*]{} $hM$ by: $$hM(s)=M(h^{-1}(s))$$ The properties of this definition generalise the ones for rescaling by a positive real number in a natural way. For instance, $$h{\mathbbm{k}}[a,b)={\mathbbm{k}}[h(a),h(b))$$ and if $M\cong\bigoplus_{i=1}^n{\mathbbm{k}}[a_i,b_i)$ we have $$|hM|=\sum_{i=1}^n (e^{-h(a_i)}- e^{-h(b_i)}).$$
This definition has the following immediate but useful consequence:
\[lemma-homeo\] Suppose $M$ is a finitely presented persistence module with magnitude function $$|tM|=\sum_{i=1}^n \lambda_i e^{-r_i t}$$ and $h\colon{\mathbb{R}}\to{\mathbb{R}}$ is an orientation preserving homeomorphism. Then the reparameterised module $hM$ has magnitude function $$|thM|=\sum_{i=1}^n \lambda_i e^{-h(r_i)t}.$$
In section 6 of [@bobrowski], Bobrowski and Borman define the *Euler characteristic* of a barcode with no bars of length $\infty$, or in other words of a finitely presented graded persistence module $M$ with the property that $M(t)=0$ for $t$ sufficiently large. The definition is given by $$\chi(M_*)=\sum_{i=1}^b(-1)^{|\beta_i|}(b_i-a_i)$$ where $\beta_1,\ldots,\beta_b$ are the bars of $M_\ast$, and $\beta_i=[a_i,b_i)$. They then describe a connection between the Euler integral of a function and the Euler characteristic of the barcode of the persistent homology of that function. Observe that the Euler characteristic of a finitely presented persistence module is related to its magnitude as follows: $$\chi(M_*)=|M_\ast|'(0)$$ Thus the magnitude of a persistence module encodes its Euler characteristic. (In order to form $|M_\ast|'(0)$ above we have extended the magnitude function $t\mapsto |tM_\ast|$ to $0$ in the evident way (see the formula in Definition \[definition-persistent-magnitude-function\]) and then taken a one-sided derivative.)
Persistent magnitude and products
---------------------------------
Now we will explore how the persistent magnitude interacts with the tensor product of persistence modules, which was described in Section \[section-background-persistence\].
\[proposition-tensor\] Let $M$ and $N$ be finitely presented persistence modules. Then $$\label{equation-products}
|M|\cdot|N|
=
|M\otimes N|
-|\operatorname{Tor}_1(M,N)|.$$
It suffices to prove this when $M$ and $N$ are interval modules. In this case both sides of the equation can be computed directly using the results stated in Section \[section-background-persistence\].
Let us explain why equation states that ‘persistent magnitude respects tensor products’, since it may look a little odd from that point of view. Homological algebra tells us that to fully understand the tensor product of $M$ and $N$, we must consider the graded object $\operatorname{Tor}_\ast(M,N)$. (Serre’s intersection formula in algebraic geometry is a good example of this principle in action.) Thus, the ‘true’ statement that persistent magnitude respects products would be $$|M|\cdot |N|
=
|\operatorname{Tor}_\ast(M,N)|
=
\sum_{i=0}^\infty(-1)^i |\operatorname{Tor}_i(M,N)|.$$ But this reduces to exactly the equation appearing in the proposition.
The usefulness of Proposition \[proposition-tensor\] is that it leads to product preserving properties of the magnitude of persistent homology theories. Indeed, suppose given a theory that assigns to objects $X$ a graded persistence module $A_\ast(X)$, and suppose that objects $X$ and $Y$ can be equipped with a product $X\times Y$ in such a way that we have a Künneth theorem: $$0\to A_\ast(X)\otimes A_\ast(Y)
\to
A_\ast(X\times Y)
\to
\operatorname{Tor}_1(A_\ast(X),A_{\ast-1}(Y))
\to
0$$ Examples (and non-examples) of such Künneth theorems are discussed in [@BubenikMilicevic], [@PSS] and [@CarlssonFilippenko]. In such a setting, Proposition \[proposition-tensor\] can be used to prove the identity $$|A_\ast(X\times Y)|
=
|A_\ast(X)|\cdot|A_\ast(Y)|.$$ Indeed, we have $$\begin{aligned}
|A_\ast(X\times Y)|
&=
|A_\ast(X)\otimes A_\ast(Y)|
+
|\operatorname{Tor}_1(A_\ast(X),A_{\ast-1}(Y))|
\\
&=
|A_\ast(X)\otimes A_\ast(Y)|
-
|\operatorname{Tor}_1(A_\ast(X),A_{\ast}(Y))|
\\
&=
|A_\ast(X)|\cdot|A_\ast(Y)|+|\operatorname{Tor}_1(A_\ast(X),A_\ast(Y))|
- |\operatorname{Tor}_1(A_\ast(X),A_\ast(Y))|
\\
&=
|A_\ast(X)|\cdot |A_\ast(Y)|\end{aligned}$$ where the first equality comes from the short exact sequence (Proposition \[proposition-ses\]) and the third comes from .
Persistent magnitude via derived associated graded modules {#subsection-associated-graded}
----------------------------------------------------------
In this subsection we will give a perspective on the definition of persistent magnitude using the homological algebra of the ‘associated graded’ or ‘causal onset’ functor. This will allow us to give a proof of Proposition \[proposition-ses\]. It also gives a potential avenue for extending the definition of persistent magnitude beyond the case of finitely presented modules.
As described in section \[section-background-persistence\] we denote by ${\mathbf{PersMod}}$ the category of persistence modules and by ${\mathbf{GrMod}}$ the category of ${\mathbb{R}}$-graded modules. These are abelian categories, and ${\mathbf{PersMod}}$ has enough projectives — they are the interval modules ${\mathbbm{k}}[a,\infty)$ for $a\in{\mathbb{R}}$. For $a\in{\mathbb{R}}$ we let ${\mathbbm{k}}_a$ denote the object of ${\mathbf{GrMod}}$ consisting of ${\mathbbm{k}}$ in grading $a$ and $0$ in all other gradings.
The *associated graded functor* ${\mathrm{Gr}}\colon{\mathbf{PersMod}}\to{\mathbf{GrMod}}$ is defined by $${\mathrm{Gr}}(M)(s) = \frac{M(s)}{\sum_{s'<s}\mathrm{im}(M(s')\to M(s))}$$ for $s\in{\mathbb{R}}$. The functor ${\mathrm{Gr}}$ is right exact, and we denote its derived functors by ${\mathrm{Gr}}_i(M)$, $i\geq 0$, with ${\mathrm{Gr}}_0(M)={\mathrm{Gr}}(M)$.
The terminology above was chosen because if the persistence module $M$ is obtained from an ${\mathbb{R}}$-filtered vector space in the evident way, then ${\mathrm{Gr}}(M)$ is nothing other than the ${\mathbb{R}}$-graded vector space associated to $M$. The functor $M\mapsto {\mathrm{Gr}}(M)_s$ appears in [@vongmasacarlsson], where it is denoted by $\mathcal{O}_s$, and called the *causal onset* functor.
\[example-gr\] For a free module ${\mathbbm{k}}[a,\infty)$ we have ${\mathrm{Gr}}_0({\mathbbm{k}}[a,\infty))={\mathrm{Gr}}({\mathbbm{k}}[a,\infty))={\mathbbm{k}}_a$ and ${\mathrm{Gr}}_1({\mathbbm{k}}[a,\infty))=0$. And for an interval module ${\mathbbm{k}}[a,b)$ with $a<b$ we have a free resolution $$\cdots\to 0 \to {\mathbbm{k}}[b,\infty)\to {\mathbbm{k}}[a,\infty)\to {\mathbbm{k}}[a,b)\to 0$$ so that ${\mathrm{Gr}}_0({\mathbbm{k}}[a,b))={\mathbbm{k}}_a$ and ${\mathrm{Gr}}_1({\mathbbm{k}}[a,b))={\mathbbm{k}}_b$. It follows that for finitely presented modules, ${\mathrm{Gr}}_i(M)=0$ for $i>1$.
The *graded magnitude* of a finitely presented object of ${\mathbf{GrMod}}$, i.e. a module of the form $\bigoplus_{i=1}^n {\mathbbm{k}}_{a_i}$ is $$\left|\bigoplus_{i=1}^n {\mathbbm{k}}_{a_i}\right|
=
\sum_{i=1}^n e^{-a_i}.$$
The graded magnitude function is clearly additive with respect to short exact sequences of finitely presented graded modules. The computations in Example \[example-gr\] give the following.
\[lemma-graded-persistent\] The persistent and graded magnitude are related as follows. Let $M$ be a finitely presented persistence module. Then $$|M| = |{\mathrm{Gr}}_0(M)| - |{\mathrm{Gr}}_1(M)|.$$
We are now in a position to prove that magnitude is additive with respect to short exact sequences.
Like any derived functors, the ${\mathrm{Gr}}_i$ convert a short exact sequence $$0\to M\to N\to P\to 0$$ into a long exact sequence $$0\to {\mathrm{Gr}}_1(M)\to {\mathrm{Gr}}_1(N)\to {\mathrm{Gr}}_1(P)
\to {\mathrm{Gr}}_0(M)\to {\mathrm{Gr}}_0(N)\to {\mathrm{Gr}}_0(P)\to 0,$$ and the statement of the proposition amounts to the claim that the alternating sum of the magnitudes of the modules in this sequence is zero. But this is a standard consequence of additivity with respect to short exact sequences, which in the case of graded magnitude is immediate from the definitions. (Compare with the proof of Theorem 2.44 of [@Hatcher].)
The proof of Proposition \[proposition-ses\] shows that the magnitude of a persistence module $M$ depends only on its ‘derived associated graded’ modules ${\mathrm{Gr}}_0(M)$ and ${\mathrm{Gr}}_1(M)$. In simpler terms, the magnitude depends not on the lengths of the bars in the barcode, but only on the collection of start and end points of bars in the barcode. One may then argue that magnitude does not contain any ‘persistent’ information, only ‘graded’ information. However, the same comment can apply to *any* invariant of persistence modules that is additive with respect to short exact sequences, thanks to the short exact sequences $$0\to {\mathbbm{k}}[b,\infty)\to {\mathbbm{k}}[a,\infty)\to {\mathbbm{k}}[a,b)\to 0.$$ From the point of view of graded modules, persistence modules and persistent homology theories should perhaps then be regarded as an excellent source of interesting examples.
Persistent magnitude and the Laplace transform {#subsection-laplace}
----------------------------------------------
Here is an alternative approach to the persistent magnitude using the Laplace transform, that we believe is the ‘correct’ way to understand persistent magnitude.
Let $M$ be a finitely presented persistence module and let $$\operatorname{\mathrm{rank}}(M)\colon{\mathbb{R}}\to{\mathbb{R}}$$ be its associated rank function, i.e. $\operatorname{\mathrm{rank}}(M)(s)=\operatorname{\mathrm{rank}}(M(s))$ for $s\in{\mathbb{R}}$. This is a step function, given by the sum of the indicator functions of the bars of $M$. It has a derivative in the distributional sense, given by $$\operatorname{\mathrm{rank}}(M)' = \sum_{i=1}^n(\delta_{a_i}-\delta_{b_i})$$ where $M\cong\bigoplus_{i=1}^n {\mathbbm{k}}[a_i,b_i)$, and where $\delta_x$ denotes the Dirac delta distribution supported at $x$. Recall that the *bidirectional Laplace transform* $\mathcal{L}\{f\}$ of a function or distribution $f$ is given by $$\mathcal{L}\{f\}(t)=\int_{-\infty}^\infty f(s)e^{-st}ds$$ for $t\in[0,\infty)$. Then one can check directly that $$|tM| = \mathcal{L}\{\operatorname{\mathrm{rank}}'(M)\}(t).$$ In particular, the right hand side can be used as an alternative definition of magnitude function, whereas magnitude is recovered by evaluating at $1$. For example, if $M={\mathbbm{k}}[a,b)$ then $\operatorname{\mathrm{rank}}(M)$ is the step function $1_{[a,b)}$ and $\operatorname{\mathrm{rank}}'(M) = \delta_a - \delta_b$ so that $$\mathcal{L}\{\operatorname{\mathrm{rank}}'(M)\}(t)
=
\int_{-\infty}^\infty (\delta_a(s)-\delta_b(s))e^{-st}ds
=
e^{-at}-e^{-bt}
=
|tM|.$$
From this point of view, the additivity of persistent magnitude with respect to short exact sequences (Proposition \[proposition-ses\]) is an immediate consequence of the fact that if $$0\to M\to N\to P\to 0$$ is a short exact sequence of persistence modules, then $\operatorname{\mathrm{rank}}(N) = \operatorname{\mathrm{rank}}(M) + \operatorname{\mathrm{rank}}(P)$.
In the case of a finitely presented graded persistence module $M_\ast$, we can associate to it its Euler characteristic curve (see [@turner2014persistent Section 3.2] and [@heiss2017streaming; @bobrowski2014topology; @fasy2018challenges] for some related work), i.e. $\chi(M_*)(s)=\sum_{i=0}^{\infty}(-1)^i\operatorname{\mathrm{rank}}(M_i(s))$ for $s\in{\mathbb{R}}$. Then we have: $$|tM_\ast|=\sum_{i=0}^{\infty}(-1)^i|tM_i|
=\sum_{i=0}^{\infty}(-1)^i\mathcal{L}\{\operatorname{\mathrm{rank}}'(M_i)\}(t)
=\mathcal{L}\{\chi'(M_i)\}(t).$$ In other words, the magnitude of a finitely presented graded persistence module is precisely the Laplace transform of the derivative of its Euler characteristic curve. This provides yet another connection between magnitude and TDA.
More explicitly, whenever $M_*$ is a finitely presented graded persistence module and $r_1<\ldots<r_n<r_{n+1}=\infty$ is the sequence of all the startpoints and endpoints in its interval decomposition, we have $$\label{magnitudeviaeuler}
|tM_*|=\sum_{j=1}^n \chi(M_*)(r_j)(e^{-r_j t}-e^{-r_{j+1} t}).$$ One interpretation of this formula is that persistent magnitude of a graded persistence module can be regarded as the ‘filtered Euler characteristic’ associated to it. We include this perspective as a useful alternative point of view, as well as a potential avenue for generalising the magnitude from finitely presented modules to more general modules that, despite not being finitely presented, may nevertheless have a ‘rank function’ or ‘rank distribution’ that we can then differentiate and subject to the Laplace transform. (Here we recall [@chazal2016structure], where persistence modules that do not admit a barcode decomposition are nevertheless equipped with a persistence diagram.)
Magnitude and persistent homology of sublevel sets {#section-sublevel}
==================================================
An important class of filtrations that can be studied by methods of persistent homology are sublevel set filtrations; the study of these is to a large extent inspired by Morse theory. Recall that if $f\colon X\to{\mathbb{R}}$ is a continuous function, then the *sublevel set persistent homology* of $(X,f)$ is the graded persistence module defined by $s\mapsto H_\ast(f^{-1}(-\infty,s])$.
Consider the case of a Morse function $f\colon M\to{\mathbb{R}}$ on a closed smooth manifold. Being Morse, it only has finitely many nondegenerate critical points. The magnitude of the sublevel set persistence module associated to $(M,f)$, which we refer to as the [*Morse magnitude of $(M,f)$*]{} and write $|t(M,f)|_{\mathrm{Morse}}$, has an explicit formula in terms of the critical points.
Let $f\colon M\to{\mathbb{R}}$ be a Morse function on a closed smooth manifold $M$, Let $S\colon ({\mathbb{R}},\leq)\to{\mathbf{Top}}$ be the sublevel set filtration given by $S(s) = f^{-1}(-\infty,s]$. Then the magnitude function of the sublevel set persistent homology $H_\ast S\colon({\mathbb{R}},\leq)\to{\mathbf{GrVect}}$ is expressed as follows: $$|t(M,f)|_{\mathrm{Morse}}=|t(H_\ast S)|=\sum_{p} (-1)^{{\operatorname{ind}}(p)}e^{-f(p)t}$$ where the sum is over all critical points of $f$.
A basic result of Morse theory [@milnor2016morse Theorem 3.1] states that if $a<b$ are real numbers such that $f^{-1}(a,b]$ contains no critical points of $f$, then $M^b=f^{-1}(-\infty,b]$ deformation retracts onto $M^a=f^{-1}(-\infty,a]$. It follows that the critical values (i.e. the values $f(p)$ of $f$ at the critical points $p$) are the startpoints and endpoints of the interval decomposition of $H_\ast S$. List the critical values as $v_1<v_2<\cdots<v_k$. We may now use the description of magnitude as the filtered Euler characteristic : $$|t(H_\ast S)|=\sum_{i=1}^k\chi(M^{v_i})(e^{-v_it}-e^{-v_{i+1}t}),$$ where $v_{k+1}$ is interpreted as $\infty$. Another basic result of Morse theory [@milnor2016morse Theorem 3.2, Remark 3.3 & Remark 3.4] states the following. Suppose that $b$ is a critical value of $f$, and $a<b$ is such that there are no critical values of $f$ in $(a,b)$, and let $p_1,\ldots,p_r$ be the critical points of $f$ with critical value $b$. Then $M^b$ has a subspace of the form $M^a\cup e^{{\operatorname{ind}}(p_1)}\cup\cdots\cup e^{{\operatorname{ind}}(p_r)}$, and $M^b$ deformation retracts onto $M^a\cup e^{{\operatorname{ind}}(p_1)}\cup\cdots\cup e^{{\operatorname{ind}}(p_r)}$. Using this result, we then have $\chi(M^b) = \chi(M^a) + \sum_{j=1}^r (-1)^{{\operatorname{ind}}(p_j)}
= \chi(M^a) + \sum_{p\colon{\operatorname{ind}}(p)=b} (-1)^{{\operatorname{ind}}(p)}$. It follows that if $v$ is a critical value of $f$, then $$\chi(M^v) = \sum_{p\colon f(p)\leq v} (-1)^{{\operatorname{ind}}(p)}$$ where the sum is over critical points with critical value at most $v$. We now have $$\begin{aligned}
|t(H_\ast S)|
&=
\sum_{i=1}^k\chi(M^{v_i})(e^{-v_it}-e^{-v_{i+1}t})
\\
&=
\sum_{i=1}^k \sum_{p\colon f(p)\leq v_i}(-1)^{{\operatorname{ind}}(p)}
(e^{-v_i t}-e^{-v_{i+1}t})
\\
&=
\sum_p
(-1)^{{\operatorname{ind}}(p)}
\sum_{v_j\colon f(p)\leq v_j}
(e^{-v_j t}-e^{-v_{j+1}t})
\\
&=
\sum_p (-1)^{{\operatorname{ind}}(p)} e^{-f(p) t}\end{aligned}$$
This could be generalised in a straightforward way to the case of the sublevel set filtration associated to any tame function $f\colon X\to{\mathbb{R}}$ on a topological space $X$ using the concept of [*homological critical value [@bubenik2014categorification; @cohen2007stability; @govc2016definition]*]{}.
Consider a subset $A\subseteq {\mathbb{R}}^n$ and filter ${\mathbb{R}}^n$ by $B(A,r)=\bigcup_{a\in A}B(x,r)$. This is the sublevel set filtration associated to the distance function $x\mapsto d(x,A)$. Applying singular homology $H_*$ to this filtration yields a graded persistence module.
For example, for the standard embedding $i\colon S^{n-1}\hookrightarrow{\mathbb{R}}^n$ we obtain the persistence module consisting of a ${\mathbbm{k}}[0,\infty)$ bar in degree $0$ and a ${\mathbbm{k}}[0,1)$ bar in degree $n-1$. In particular, the associated magnitude function, which could also be called ‘the distance magnitude function’ is $|t S^{n-1}|_{\mathrm{dist}}=1+(-1)^{(n-1)}(1-e^{-t})$.
In the case $A$ is finite, the graded persistence module obtained is isomorphic to the Čech persistent homology module associated to $A$. The corresponding magnitude function could therefore reasonably be called the ‘Čech magnitude function’ of $A$ and denoted $|t A|_{\mathrm{\check{C}ech}}$.
Rips magnitude {#section-rips}
==============
In this section we will apply the persistent magnitude developed earlier to the persistent homology of the Rips complex in order to obtain a new, variant form of magnitude of a finite metric space. Here we explore the basic properties of this new invariant, before going into further detail in later sections.
Let $X$ be a finite metric space. Then the chains $C_\ast({\mathcal{R}}(X))$ of its Rips complex are a chain complex of finitely presented persistence modules, concentrated in degrees less than the cardinality of $X$. The same therefore holds for the homology $H_\ast({\mathcal{R}}(X))$. The *Rips magnitude* of $X$ is defined to be the magnitude of the chains of the Rips complex or equivalently the magnitude of its homology: $$|X|_{\mathrm{Rips}}
=|C_\ast({\mathcal{R}}(X))|
= |H_\ast({\mathcal{R}}(X))|$$ The *Rips magnitude function* of $X$ is defined as $t\mapsto|tX|_{\mathrm{Rips}}$, which is equal to $$|tX|_{\mathrm{Rips}}
=|tC_\ast({\mathcal{R}}(X))|
= |tH_\ast({\mathcal{R}}(X))|$$
The Rips magnitude (function) of a finite metric space $X$ has the following properties.
1. The Rips magnitude is computed by the formula: $$\label{subsets-formula}
|tX|_{\mathrm{Rips}} =
\sum_{A\subseteq X,\, A\neq\emptyset}
(-1)^{\#A-1}e^{-\operatorname{diam}(A)t}$$
2. If $H_\ast({\mathcal{R}}(X))$ has barcode with bars $[a_{k,0},b_{k,0}),\ldots,[a_{k,m_k},b_{k,m_k})$ in degree $k$, then: $$\label{barcode-formula}
|tX|_{\mathrm{Rips}}
=
\sum_{k=0}^{\#X-1}\sum_{j=0}^{m_k}
(-1)^k(e^{-a_{k,j}t}-e^{-b_{k,j}t})$$
3. If $0=d_0<d_1<\ldots<d_n$ is the set of all pairwise distances between elements of $X$ arranged in a sequence and $d_{n+1}=\infty$, then: $$\label{euler-formula}
|tX|_{\mathrm{Rips}}=\sum_{j=0}^n \chi({\mathcal{R}}_{d_j}(X))(e^{-d_j t}-e^{-d_{j+1} t}).$$
4. $\lim_{t\to 0}|tX|_{\mathrm{Rips}} = 1$ and $\lim_{t\to\infty}|tX|_{\mathrm{Rips}}=|X|$.
The fourth part of the proposition suggests that the Rips magnitude is an ‘effective number of points’, in the same spirit as the magnitude.
For the first part, we use the description $|tX|_{\mathrm{Rips}} = |t C_\ast({\mathcal{R}}(X))|$. Now $C_\ast({\mathcal{R}}(X))$ has barcode with one bar for each nonempty subset $A$ of $X$, and this bar lies in degree $\#A-1$, and has type $[\mathrm{diam}(A),\infty)$. The definition of persistent magnitude gives the result immediately. The second part follows from the description $|tX|_{\mathrm{Rips}}=|t H_\ast({\mathcal{R}}(X))|$. The third part follows from either the first or the second part using the formula . The fourth part follows directly from the first, and it can also be deduced from the barcode description given there using Proposition \[proposition-limiting\].
Let $X$ denote the space consisting of a single point $x$. Then it has precisely one nonempty subset, namely $X$ itself, and $\#X=1$ while $\operatorname{diam}(X)=0$. Using formula then gives us $|tX|_{\mathrm{Rips}}=1$.
Let $X=\{x_1,x_2\}$ be the two-point space in which $d_X(x_1,x_2)=d$ for some $d>0$.
Let us compute $|tX|_{\mathrm{Rips}}$ using . The nonempty subsets of $X$ are $A_1=\{x_1\}$, $A_2=\{x_2\}$ and $A_3=X$, with $\#A_1=1$, $\#A_2=1$, $\#A_3=2$, $\operatorname{diam}(A_1)=0$, $\operatorname{diam}(A_2)=0$ and $\operatorname{diam}(A_3)=d$. Thus we have $$\begin{aligned}
|tX|_{\mathrm{Rips}}
&=
(-1)^{1-1}\cdot e^{-0t}
+
(-1)^{1-1}\cdot e^{-0t}
+
(-1)^{2-1}\cdot e^{-dt}
\\
&=
1 + 1 -e^{-dt}
\\
&=
2-e^{-dt}.
\end{aligned}$$
Let us also compute $|tX|_{\mathrm{Rips}}$ using . The Rips-homology $H_\ast({\mathcal{R}}(X))$ has barcode with bars $[0,\infty)$ and $[0,d)$ in degree $0$, and no other bars. Thus gives us $$\begin{aligned}
|tX|_{\mathrm{Rips}}
&=
(e^{-0t}-e^{-\infty t})
+
(e^{-0t} - e^{-dt})
\\
&=
(1-0)
+
(1 - e^{-dt})
\\
&=
2-e^{-dt}.
\end{aligned}$$ (Recall our convention that $e^{-\infty}=0$.)
The Rips magnitude is not necessarily increasing or convex, it can attain negative values, and it can attain values greater than the cardinality of the space. For instance, for the complete bipartite graph $K_{5,6}$ (with the graph metric) the Rips magnitude is given by $$|t K_{5,6}|_{\mathrm{Rips}}=11-30e^{-t}+20e^{-2t}.$$ with graph:
{width="200pt"}
And for the complete tripartite graph $X=K_{4,4,4}$, Rips magnitude is given by $$|t K_{4,4,4}|_{\mathrm{Rips}}=12+16e^{-t}-27e^{-2t}$$ with graph:
{width="200pt"}
Note that in general, if the metric only assumes integer values, as in the case of a graph metric, the associated Rips magnitude function is a polynomial in $q=e^{-t}$.
Now we consider the case of subsets of the real line, where the computation is a little less trivial but accessible nonetheless.
\[proposition-subsets-of-R\] Let $A$ be a finite subset of the real line ${\mathbb{R}}$, with its induced metric. Order the elements of $A$ by size, $a_1<\ldots<a_n$. Then $$|t A|_{\mathrm{Rips}}=n-\sum_{j=1}^{n-1}e^{-(a_{j+1}-a_{j})t}.$$
We can think of this result as follows. Take $A_1=\{a_1\}$, $A_2=\{a_1,a_2\}$, $A_3=\{a_1,a_2,a_3\}$ and so on, so that $A=A_n$. Then the proposition tells us that $|t A_1|_{\mathrm{Rips}}=1$, $|t A_2|_{\mathrm{Rips}}
= |t A_1|_{\mathrm{Rips}}+ (1-e^{-(a_2-a_1)t})$, $|t A_3|_{\mathrm{Rips}} = |t A_2|_{\mathrm{Rips}} + (1-e^{-(a_3-a_2)t})$, and so on. In other words, adding a point at the end increases the Rips magnitude by $1-e^{-dt}$, where $d$ is the distance of the new end point from the old one. So if $d$ is very large, we increase the Rips magnitude by almost $1$, whereas if $d$ is very small, then we increase the Rips magnitude only a tiny amount.
Given $B\subseteq A$, let $B_\mathrm{max}$ and $B_\mathrm{min}$ denote the maximum and minimum elements of $B$ respectively. Given $a\leq a'$ in $A$, let $\mathcal{B}_{a,a'}$ denote the set of $B\subseteq A$ for which $B_\mathrm{min}=a$ and $B_\mathrm{max}=a'$, and note that $\operatorname{diam}(B)=a'-a$ for all $B\in\mathcal{B}_{a,a'}$. Thus equation gives us $$|t A|_{\mathrm{Rips}} =
\sum_{a\leq a'}
e^{-(a'-a)t}
\sum_{B\in\mathcal{B}_{a,a'}}
(-1)^{\#B-1}.$$ Now note the following:
- If $a=a'$, then $\mathcal{B}_{a,a'}$ consists of $\{a\}$ alone and $\sum_{B\in\mathcal{B}_{a,a'}}(-1)^{\#B-1}=1$.
- If $a$ and $a'$ are adjacent elements of $A$, then $\mathcal{B}_{a,a'}$ consists of $\{a,a'\}$ alone and $\sum_{B\in\mathcal{B}_{a,a'}}(-1)^{\#B-1}=-1$.
- If $a$ and $a'$ are non-adjacent elements of $A$, then let $A_{a,a'}$ denote the set of those elements of $A$ that lie strictly between $a$ and $a'$. Then any $B\in\mathcal{B}_{a,a'}$ is the disjoint union of $\{a,a'\}$ with a subset $C\subseteq A_{a,a'}$. Thus $\sum_{B\in\mathcal{B}_{a,a'}}
(-1)^{\#B-1}
=
\sum_{C\subseteq A_{a,a'}}(-1)^{\#C+1}
=
-\sum_{C\subseteq A_{a,a'}}(-1)^{\#C}
=0$.
We therefore have $$\begin{aligned}
|t A|_{\mathrm{Rips}}
&=
\sum_{a}
e^{-(a-a)t}\cdot 1
+
\sum_{\substack{a<a'\\ \text{adjacent}}}
e^{-(a'-a)t}\cdot (-1)
+
\sum_{\substack{a<a'\\ \text{non-adjacent}}}
e^{-(a'-a)t}\cdot 0
\\
&=
n
-
\sum_{j=1}^{n-1}
e^{-(a_{j+1}-a_j)t}
\end{aligned}$$ as required.
Rips magnitude of cycle graphs and Euclidean cycles {#section-cycles}
===================================================
Other than the cases treated in the previous section, the topology of Rips complexes seems to be understood at all scales only in the case of finite subsets of the circle. See [@adamaszek2017vietoris] and [@AAFPPJ]. In the case of Riemannian manifolds, Rips complexes are well understood at small scales thanks to a result of Hausmann [@Hausmann Theorem 3.5]. Recently, it has also been shown that Rips complexes can be understood as nerves of certain covers via Dowker duality [@Virk].
In this section we focus on the circle $S^1$, which is equipped either with the Euclidean metric obtained from the standard embedding into ${\mathbb{R}}^2$, and denoted $S^1_\mathrm{eucl}$, or the geodesic (arclength) metric of total length $2\pi$, and denoted $S^1_\mathrm{geo}$.
We will examine the subsets of equally spaced points in these spaces, whose corresponding Rips filtrations are well understood [@adamaszek]. Let $C_n^\mathrm{eucl}$ be the subset of $n$ equidistant points in $S^1_\mathrm{eucl}$ and let $C_n^\mathrm{geo}$ be the subset of $n$ equidistant points in $S^1_{geo}$.
Both of these can be related to cycle graphs. Let $C_n$ be the set of vertices of the $n$-cycle graph, equipped with the graph metric, where two adjacent vertices are considered to be at a distance of $1$. Note that this can be described as the subset of $n$ equidistant points in a geodesic circle of total arclength $n$. The Rips filtration of $C_n$ was studied in [@adamaszek] and the Rips filtrations of $C_n^\mathrm{geo}$ and $C_n^\mathrm{eucl}$ are just reparameterised versions of it.
More precisely, extend the function $[0,2]\to[0,\pi]$ given by $r\mapsto2\arcsin\frac{r}{2}$ to a homeomorphism $\phi\colon {\mathbb{R}}\to{\mathbb{R}}$. Then, by elementary trigonometry, we have the following relations: $$\label{reparameterised}
{\mathcal{R}}_r(C_n^\mathrm{geo})={\mathcal{R}}_{\frac{n}{2\pi} r}(C_n),\qquad{\mathcal{R}}_r(C_n^\mathrm{eucl})={\mathcal{R}}_{\frac{n}{2\pi}\phi(r)}(C_n)$$ and $$\label{euclvsgeo}
\quad{\mathcal{R}}_r(C_n^\mathrm{eucl})={\mathcal{R}}_{\phi(r)}(C_n^\mathrm{geo}).$$
We now state the main results of this section and then proceed to prove them.
\[ripsmag\_cycle\] Writing $q=e^{-t}$, we have: $$|t C_n|_{\mathrm{Rips}}=\sum_{\substack{\text{odd }r|n\\r\neq n}}\frac nr q^{\frac nr \frac{r-1}2}(1-q)+q^{\lfloor\frac n2\rfloor}.$$
This is reminiscent of certain functions that appear in analytic number theory, the simplest of which is probably the sum of divisors function $\sigma_k(n)=\sum_{d|n}d^k$. The appearance of sums over divisors of integers is quite surprising to us and seems to suggest that the Rips magnitudes of $n$-cycle graphs might be intimately connected to number theory in some way. We feel this connection could be worthy of further study:
What is the connection between Rips magnitude of cycles and various functions studied in analytic number theory?
Using Lemma \[lemma-homeo\] and equations and , Proposition \[ripsmag\_cycle\] immediately allows us to infer the following two corollaries:
\[ripsmag\_eucl\] The Rips magnitude of Euclidean cycles is given by[^1]: $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sum_{\substack{\text{odd }r|n\\r\neq n}}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-\delta_n t},$$ where $$\delta_r=\operatorname{diam}(C^{\mathrm{eucl}}_r)=2\sin\left(\pi\frac{\lfloor\frac r2\rfloor}r\right)\quad\text{and}\quad\delta_{r,n}=2\sin\left(\pi\left(\frac1n+\frac{\lfloor\frac r2\rfloor}r\right)\right).$$
\[ripsmag\_geo\] The Rips magnitude of geodesic cycles is given by: $$|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}=\sum_{\substack{\text{odd }r|n\\r\neq n}}\frac nr (e^{-\eta_r t}-e^{-\eta_{r,n}t})+e^{-\eta_n t},$$ where $$\eta_r=2\pi\frac{\lfloor\frac r2\rfloor}r\qquad\text{and}\qquad\eta_{r,n}=2\pi\left(\frac1n+\frac{\lfloor\frac r2\rfloor}r\right).$$
The graph of $|t C^{\mathrm{eucl}}_{60}|_{\mathrm{Rips}}$
{width="200pt"}
looks deceptively similar to the one for $|t C^{\mathrm{geo}}_{60}|_{\mathrm{Rips}}$
{width="200pt"}
so it is perhaps more instructive to look at the difference $|t C^{\mathrm{geo}}_{60}|_{\mathrm{Rips}}-|t C^{\mathrm{eucl}}_{60}|_{\mathrm{Rips}}$:
{width="200pt"}
Note that the Rips filtration of $C_n$ only has “jumps” at the integers. More precisely: $${\mathcal{R}}_r(C_n)={\mathcal{R}}_{\lfloor r\rfloor}(C_n).$$ So it is sufficient to understand the Rips filtration at integer values of the filtration parameter $r$. For integer $r$ such that $0\leq r<\frac{n}2$, Adamaszek [@adamaszek Corollary 6.7] gives the following description of the homotopy types of the various stages of the Rips filtration: $${\mathcal{R}}_r(C_n)\simeq\begin{cases}\bigvee_{n-2r-1}S^{2l};&r=\frac l{2l+1}n,\\
S^{2l+1};&\frac l{2l+1}n<r<\frac{l+1}{2l+3}n.
\end{cases}$$ From this we can immediately infer the Euler characteristics: $$\chi({\mathcal{R}}_r(C_n))=\begin{cases}n-2r;&\text{if $\frac{n}{n-2r}$ is an odd integer,}\\
1;&\text{if $n=2r$,}\\
0;&\text{otherwise.}
\end{cases}$$ Using , this implies $$\begin{aligned}
|t C_n|_{\mathrm{Rips}}
&=\sum_{r=0}^{\lfloor\frac{n}2\rfloor-1}\chi({\mathcal{R}}_r(X))(e^{-r t}-e^{-(r+1) t})+\chi({\mathcal{R}}_{\lfloor\frac{n}2\rfloor}(X))e^{-(\lfloor\frac{n}2\rfloor) t})
\\
&=\sum_{\substack{\text{odd }d|n\\d\neq n}}\frac nd q^{\frac nd \frac{d-1}2}(1-q)+q^{\lfloor\frac n2\rfloor}\end{aligned}$$ where the indices in the first and second summations are related by $\frac{n}{n-2r}=d$. The claim follows.
Another way to calculate the Euler characteristic of ${\mathcal{R}}_r(C_n)$ would be from the simplex counts. We have computational evidence that the number of $i$-simplices in ${\mathcal{R}}_r(C_n)$ for $r<\operatorname{diam}C_n$ is given by $$N_{n,r,i}=\sum_{k=0}^{\lfloor\frac n2\rfloor}\frac n{2k+1}\binom{(2k+1)r-kn+2k}{2k}\binom{(2k+1)r-kn}{i-2k}.$$
Computational evidence seems to suggest that the Rips magnitude $|t C_n|_{\mathrm{Rips}}$ of a cycle graph is convex if and only if $$n\in\{1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 21, 24, 27, 30, 33, 36, 39, 42, 48, 51, 57\}.$$
Rips magnitude of infinite metric spaces {#section-infinite}
========================================
We will now try to understand the Rips magnitude of infinite metric spaces. In the original setting of magnitude, positive definite spaces $X$, such as subspaces of Euclidean space, have the property that if $A\subseteq B\subseteq X$ with $A,B$ finite, then $|A|\leq |B|$. Thus one definition of the magnitude of an infinite metric space $X$ is $$|X| = \sup_{\substack{A\subseteq X\\ A\text{ finite}}}|A|.$$ Proceeding by analogy, we could attempt to make the definition $$|X|_{\mathrm{Rips}} = \sup_{\substack{A\subseteq X\\ A\text{ finite}}}|A|_{\mathrm{Rips}}$$ or the stronger definition $$|X|_{\mathrm{Rips}} = \lim_{\substack{A\to X\\ A\text{ finite}}}|A|_{\mathrm{Rips}},$$ where $A\to X$ in the Hausdorff metric. The issues here are whether the supremum above exists, how one computes its actual values, and the corresponding questions for the limit.
In this section we will explore the above situation in the case of the unit interval, the circle with its Euclidean metric, and the circle with its geodesic metric. In the case of the interval the situation is as good as one can hope for, with the conclusion that the Rips magnitude of the interval ‘is’ the function $t\mapsto 1+t$. In the circle cases the situation is more ambiguous, and while the supremum above may well exist (the supremum taken over all *equally spaced* subsets certainly does), the limit does not.
To improve readability, we state the results for each of the cases treated in a separate subsection, while deferring all the proofs to one final subsection.
The unit interval
-----------------
First let us consider the unit interval. Here we can give the following definitive description of the situation.
\[theorem-interval\] Let $I=[0,1]$ denote the unit interval.
1. If $A,B\subseteq I$ are finite subsets with $A\subseteq B$, then $$|A|_{\mathrm{Rips}}\leq |B|_{\mathrm{Rips}}.$$
2. For any $t\in (0,\infty)$ we have $$\sup_{\substack{A\subseteq I\\\text{finite}}}|t A|_{\mathrm{Rips}}
= 1+t$$ and indeed $$\lim_{\substack{A\to I\\A\;\text{finite}}}|t A|_{\mathrm{Rips}}
=
1+t$$ with uniform convergence on compact subsets of $(0,\infty)$.
Thus it seems reasonable in this situation to declare the Rips magnitude of $I=[0,1]$ to be the function $|t[0,1]|_{\mathrm{Rips}}=1+t$.
Euclidean Circle
----------------
One possible approach to try and make sense of the notion of “Rips magnitude of the Euclidean circle” is by studying the behaviour of $|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$ as $n\to\infty$. As it turns out, however, this behaviour is not as straightforward as one might hope.
For instance, we show that $|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$ does not converge as $n\to\infty$, despite the fact that the Hausdorff distance $d_H(C^{\mathrm{eucl}}_n,S^1_{\mathrm{eucl}})=2\sin\left(\frac{\pi}{2n}\right)$ converges to $0$ as $n\to\infty$. We show this by first studying the behaviour of sequences of the form $|t C^{\mathrm{eucl}}_{mp}|_{\mathrm{Rips}}$, for fixed $m\in{\mathbb{N}}$ and where $p$ runs through all primes, and showing that the limit along each such subsequence exists. However, these limits are different for different values of $m$.
We then show that despite this inconsistency, the $|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$ has finite upper and lower limits ($\liminf$ and $\limsup$) as $n\to\infty$ which can be expressed explicitly. These could be considered to be the ‘upper’ and ‘lower Rips magnitude’. We also show that the ‘upper Rips magnitude’ is equal to $\sup_{n\in{\mathbb{N}}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$. (Compare this with the first proposed definition of Rips magnitude at the beginning of this section.)
\[theorem-EC-lim\] For any $m\in{\mathbb{N}}$: $$\lim_{\substack{p\to\infty\\p\text{ prime}}}|t C^{\mathrm{eucl}}_{mp}|_{\mathrm{Rips}}=e^{-2t}+2\pi t\sum_{\text{odd }r|m}\frac1r e^{-2t\cos\left(\frac{\pi}{2r}\right)}\sin\left(\frac{\pi}{2r}\right)$$
This result means in particular that $$\lim_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$$ cannot exist. For instance, we have $$\lim_{\substack{p\to\infty\\p\text{ prime}}}|t C^{\mathrm{eucl}}_p|_{\mathrm{Rips}}
=e^{-2t}+2\pi t$$ but $$\lim_{\substack{p\to\infty\\p\text{ prime}}}|t C^{\mathrm{eucl}}_{3p}|_{\mathrm{Rips}}
=
e^{-2t}+2\pi t+\frac{\pi t}3 e^{-\sqrt{3}t}$$ and the two limits do not coincide.
\[theorem-lim-sup-inf\] The Rips magnitudes of Euclidean cycles $C^{\mathrm{eucl}}_n$ satisfy $$\liminf_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=e^{-2t}+2\pi t$$ and $$\limsup_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=e^{-2t}+2\pi t\sum_{r\text{ odd}}\frac1r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right).$$ This series converges absolutely since its $r$-th term is bounded above by $\frac{\pi}{2r^2}$.
In fact, the upper limit is also the supremum of the sequence:
\[theorem-sup\] The Rips magnitudes of Euclidean cycles $C^{\mathrm{eucl}}_n$ satisfy $$\sup_{n\in{\mathbb{N}}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=e^{-2t}+2\pi t\sum_{r\text{ odd}}\frac1r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right).$$
We include a plot of the $\liminf$ and $\limsup$ for small $t$ for comparison:
{width="300pt"}
It is visible from this graph that the difference is the most pronounced for small values of $t$. Now, fix $t=\frac12$. The behaviour of $|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$ evaluated at $t=\frac12$ as $n$ grows larger can be pictured as follows, with $n$ on the horizontal axis and $|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}$ on the vertical. The values of the $\liminf$ and $\limsup$ at $t=\frac12$ are plotted as the two red lines.
{width="300pt"}
Note that the chaotic behaviour of the graph is reminiscent of various functions from analytic number theory such as for instance the sum of divisors function $\sigma(n)=\sum_{d|n}d$, and is the graphical expression of the behaviour discussed in the paragraph following Proposition \[ripsmag\_cycle\]. It does appear as though the points accumulate more along specific lines, which we suspect correspond to subsequences with certain divisibility properties.
Finally, note that restricting to equally spaced subsets of $S^1_{eucl}$ is somewhat unnatural; we leave open the following question, which would define the ‘upper and lower Rips magnitude’ of the circle intrinsically:
Does this asymptotic behaviour extend to arbitrary finite subsets of $S^1_{eucl}$? For instance, given any $\epsilon>0$, is there a $\delta>0$ such that for all finite $A\subseteq S^1_{eucl}$ with $d_H(A,S^1_{eucl})<\delta$ we have $$e^{-2t}+2\pi t-\epsilon<|tA|_\mathrm{Rips}<e^{-2t}+2\pi t\sum_{r\text{ odd}}\frac1r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right)+\epsilon$$ for all $t$ in a given interval?
Geodesic circle
---------------
Finally, we note that the case of the geodesic circle $S^1_{geo}$ of total arclength $2\pi$ can be treated using the same methods as we used for $S^1_{eucl}$. Namely, we restrict attention to equally spaced subsets $C_n^{geo}$ described in Section \[section-cycles\]. (Note that $C_n^{geo}$ is just the $n$-cycle graph $C_n$ rescaled by $\frac{2\pi}{n}$.)
We could calculate the limits along the same subsequences we examined in the case $S^1_{eucl}$ and find that they again exist, but instead we just state the final result regarding the lower and upper limit. In this case it turns out that the lower limit is still finite and can be expressed explicitly, whereas the upper limit becomes infinite. Thus the Rips magnitude of $S^1_{eucl}$ and $S^1_{geo}$ behave quite differently.
\[theorem-GC\] The Rips magnitudes of geodesic cycles $C^{\mathrm{geo}}_n$ satisfy $$\liminf_{n\to\infty}|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}=e^{-\pi t}+2\pi t$$ and $$\limsup_{n\to\infty}|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}=\infty.$$
The behaviour of $|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}$ evaluated at $t=\frac12$ as $n$ grows larger can be pictured as follows; the $\liminf$ evaluated at $t=\frac12$ corresponds to the red line and the $\limsup$ is infinite.
{width="300pt"}
We again note that it would be interesting to study the asymptotics over all finite subsets.
Proofs of the Results
---------------------
Here we prove the results stated in the preceding subsections. We only give a sketch of the proof of Theorem \[theorem-GC\] as the ideas are analogous to the ones used in the proof of Theorem \[theorem-lim-sup-inf\].
Proposition \[proposition-subsets-of-R\] shows that if $A\subseteq[0,1]$ is finite, with elements $a_1<\cdots<a_n$, then $$|A|_{\mathrm{Rips}} = n - \sum_{j=1}^{n-1} e^{-(a_{j+1}-a_j)}.$$ Suppose that $a_0<a_1$. Then $$|\{a_0\}\cup A|_{\mathrm{Rips}}
=
|A|_{\mathrm{Rips}} + (1-e^{-(a_1-a_0)})
\geq
|A|_{\mathrm{Rips}},$$ and similarly for $|A\cup\{a_{n+1}\}|_{\mathrm{Rips}}$ if $a_{n+1}>a_n$. Now suppose that $a_i<b<a_{i+1}$. Then $$\begin{aligned}
|A\cup\{b\}|_{\mathrm{Rips}}
&=
|A|_{\mathrm{Rips}} + 1 + e^{-(a_{i+1}-a_i)}- e^{-(a_{i+1}-b)}-e^{-(b-a_i)}
\geq |A|_{\mathrm{Rips}},\end{aligned}$$ the latter because one can easily see that $1+e^{-(x+y)}-e^{-x}-e^{-y}\geq 0$ for $x,y\geq 0$.
Suppose $A$ consisting of $a_1<\ldots<a_n$ is a finite subset of the interval such that $d_H(A,I)<\delta<1$. Further define $a_0=0$ and $a_{n+1}=1$. The assumption on the Hausdorff distance implies that $a_{j+1}-a_j<\delta$ for $j=0,\ldots,n$ and $\delta<1$ implies $\delta^k\leq\delta$ for $k\in{\mathbb{N}}$. Consider the function $f\colon(0,\infty)\to{\mathbb{R}}$ defined by $$\begin{aligned}
f(t)
&=
(1+t)-|t A|_{\mathrm{Rips}}
\\
&=
(1+t)-n+\sum_{j=1}^{n-1} e^{-(a_{j+1}-a_j)t}
\\
&=t+\sum_{j=1}^{n-1}(e^{-(a_{j+1}-a_{j})t}-1).\end{aligned}$$ We extend the domain of $f$ to $[0,\infty)$ in the evident way. We will show that:
1. $f(0)=0$
2. $f'(0)$ lies in the range $0\leq f'(0)\leq 2\delta$.
3. $f''(t)$ lies in the range $0\leq f''(t)\leq\delta$ for all $t\in[0,\infty)$.
It follows quickly that $$0\leq f(t)\leq \delta\cdot (2t+t^2/2)$$ for $t\in[0,\infty)$. Thus, as $\delta\to 0$ we have $f\to 0$ uniformly on any bounded subset of $[0,\infty)$, and the result follows.
It remains to check the three properties. The first and second derivatives of $f$ are as follows. $$\begin{aligned}
f'(t)
&=
1-\sum_{j=1}^{n-1}(a_{j+1}-a_j)e^{-(a_{j+1}-a_{j})t}
\\
f''(t)
&=
\sum_{j=1}^{n-1}(a_{j+1}-a_j)^2e^{-(a_{j+1}-a_{j})t}\end{aligned}$$ Then (1) is immediate, while $f'(0)=1-\sum_{j=1}^{n-1}(a_{j+1}-a_j)=(1-a_n)+a_1$ and (2) follows, and $0\leq f''(t)
\leq \sum_{j=1}^{n-1}\delta\cdot(a_{j+1}-a_j)\cdot 1$ and (3) follows.
Recall that by Corollary \[ripsmag\_eucl\], the Rips magnitudes of Euclidean cycles are given by: $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sum_{\text{odd }r|n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-\delta_n t},$$ where $$\delta_r=\operatorname{diam}(C^{\mathrm{eucl}}_r)=2\sin\left(\pi\frac{\lfloor\frac r2\rfloor}r\right)\quad\text{and}\quad\delta_{r,n}=2\sin\left(\pi\left(\frac1n+\frac{\lfloor\frac r2\rfloor}r\right)\right).$$ For an odd prime $p$, each odd divisor of $mp$ is of the form $r$ or $rp$ (or both), where $r$ is an odd divisor of $m$. Therefore, assuming $p$ is large enough, so that $p\nmid m$, we can split the Rips magnitude into three summands: $$|t C^{\mathrm{eucl}}_{m p}|_{\mathrm{Rips}}=\sum_{\text{odd }r|m}\frac{mp}r (e^{-\delta_r t}-e^{-\delta_{r,mp}t})+\sum_{\text{odd }r|m}\frac mr (e^{-\delta_{rp} t}-e^{-\delta_{rp,mp}t})+e^{-\delta_{mp} t}.$$ We can calculate the limit as $p\to\infty$ of each summand individually. To treat the first summand, define a function $\phi\colon {\mathbb{R}}\to{\mathbb{R}}$ by the formula $$\phi(x)=2\sin\left(\pi\left(x+\frac{r-1}{2r}\right)\right),$$ with derivative $$\phi'(x)=2\pi\cos\left(\pi\left(x+\frac{r-1}{2r}\right)\right).$$ Observe that $\delta_r=\phi(0)$ and $\delta_{r,mp}=\phi(\frac1{mp})$. Therefore, $$\begin{aligned}
\lim_{p\to\infty}\frac{mp}r (e^{-\delta_r t}-e^{-\delta_{r,mp}t})&=-\frac1r\lim_{p\to\infty}\frac{e^{-\phi(\frac1{mp})t}-e^{-\phi(0)t}}{\frac1{mp}}\\&=-\frac1r\frac{\mathrm d}{\mathrm dx}{\Big\vert}_{x=0}e^{-\phi(x)t}\\&=\frac1re^{-\phi(0)t}\phi'(0)t\\&=\frac{2\pi t}re^{-2t\sin\left(\pi\frac{r-1}{2r}\right)}\cos\left(\pi\frac{r-1}{2r}\right)\\&=\frac{2\pi t}re^{-2t\cos\left(\frac{\pi}{2r}\right)}\sin\left(\frac{\pi}{2r}\right).\end{aligned}$$ This takes care of the first summand. The second summand vanishes in the limit, because $$\lim_{p\to\infty}e^{-\delta_{rp} t}=\lim_{p\to\infty}e^{-\delta_{rp,mp} t}=e^{-2t}.$$ Finally, the limit of the third summand is $$\lim_{p\to\infty}e^{-\delta_{mp} t}=e^{-2t}.$$
Define $\phi_{n,r}(t)=\frac nr(e^{-\delta_r t}-e^{-\delta_{r,n}t})$ for $n\geq r$ and $0$ otherwise. Here $r$ will always be assumed to be odd. We can show that for $t>0$, $$\phi_{n,r}(t)\geq 0\qquad\text{and}\qquad\phi_{n+1,r}(t)\geq\phi_{n,r}(t)$$ always hold. The first of these inequalities reduces to the fact that $\delta_r\leq\delta_{r,n}$. For the second inequality, define $\psi(t)=1+ne^{(\delta_r-\delta_{r,n})t}-(n+1)e^{(\delta_r-\delta_{r,n+1})t}$ and observe that the inequality reduces to $\psi(t)\geq 0$ for $t>0$. To show that this is in fact true, one can then verify that:
- $\psi(0)=0$,
- $\lim_{t\to\infty}\psi(t)>0$,
- $\psi'(0)=(n+1)\delta_{r,n+1}-n\delta_{r,n}-\delta_r>0$ and
- $\psi'(t)=0$ for at most one $t\in(0,\infty)$.
To prove the third bullet point, we can write out the expression explicitly and use the addition theorem for the sine function: $$\begin{gathered}
2(n+1)\sin\left(\pi\left(\frac1{n+1}+\frac{r-1}{2r}\right)\right)-2n\sin\left(\pi\left(\frac1n+\frac{r-1}{2r}\right)\right)-2\sin\left(\pi\frac{r-1}{2r}\right)\\
=2\left[(n+1)\sin\left(\frac{\pi}{n+1}\right)-n\sin\left(\frac{\pi}{n}\right)\right]\cos\left(\pi\frac{r-1}{2r}\right)\\+2\left[(n+1)\cos\left(\frac{\pi}{n+1}\right)-n\cos\left(\frac{\pi}{n}\right)-1\right]\sin\left(\pi\frac{r-1}{2r}\right).\end{gathered}$$ One can now show that the expressions in square brackets are positive and conclude that the whole expression is positive. This proves the second inequality.
Using the explicit formula for the Rips magnitude, we now have: $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sum_{\text{odd }r|n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-\delta_n t}\leq\sum_{\text{odd }r\leq n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-\delta_n t}.$$ Therefore, $$\begin{aligned}
\limsup_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}&\leq\lim_{n\to\infty}\left(\sum_{\text{odd }r}\phi_{n,r}(t)+e^{-\delta_nt}\right)\\&=\sum_{\text{odd }r}\lim_{n\to\infty}\phi_{n,r}(t)+\lim_{n\to\infty}e^{-\delta_nt}\\&=\sum_{\text{odd }r}\lim_{n\to\infty}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-2t}\\&=\sum_{\text{odd }r}\frac {2\pi t}r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right)+e^{-2t},\end{aligned}$$ where the limit is calculated in the same way as in the proof of the previous theorem. The interchange of sum and limit is justified by the Lebesgue monotone convergence theorem. To prove the reverse inequality, let $N$ be an arbitrary positive integer. Let $m=N!$ and note that $m$ is divisible by every odd $r\leq N$. Therefore, by the previous theorem, $$\begin{aligned}
e^{-2t}+2\pi t\sum_{\text{odd }r\leq N}\frac1r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right)&\leq e^{-2t}+2\pi t\sum_{\text{odd }r|m}\frac1r e^{-2t\cos\left(\frac\pi{2r}\right)}\sin\left(\frac\pi{2r}\right)\\&=\lim_{\substack{p\to\infty\\p\text{ prime}}}|t C^{\mathrm{eucl}}_{mp}|_{\mathrm{Rips}}\\&\leq \limsup_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}.\end{aligned}$$ Taking the limit as $N\to\infty$ establishes the lower bound.
To prove the statement about the lower limit, again start from the explicit formula and note that $r=1$ is a proper odd divisor of any integer $n>1$: $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sum_{\text{odd }r|n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-\delta_n t}\geq n (e^{-\delta_1 t}-e^{-\delta_{1,n}t})+e^{-\delta_n t}.$$ Therefore $$\liminf_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}\geq\lim_{n\to\infty}\left(n (e^{-\delta_1 t}-e^{-\delta_{1,n}t})+e^{-\delta_n t}\right)=2\pi t+e^{-2t}.$$ To establish the other inequality, note that by the previous theorem, the prime indices yield a subsequence converging to the lower bound.
The upper limit of any sequence is a lower bound for its supremum, so $$\limsup_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}\leq\sup_{n\in{\mathbb{N}}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}.$$ To show the converse inequality, we first observe that $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}\leq|t C^{\mathrm{eucl}}_{2n}|_{\mathrm{Rips}}$$ holds for any odd $n\in{\mathbb{N}}$. To see this, we look at their difference. Using the facts that $n$ and $2n$ have the same odd divisors, that $\delta_n=\delta_{n,n}$ and $\delta_{n,2n}=\delta_{2n}=2$, this can be simplified to: $$|t C^{\mathrm{eucl}}_{2n}|_{\mathrm{Rips}}-|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sum_{\substack{\text{odd }r|n\\r\neq n}}\left(\phi_{2n,r}(t)-\phi_{n,r}(t)\right)+e^{-\delta_n t}-e^{-2 t},$$ where $\phi_{n,r}$ is as defined in the proof of Theorem \[theorem-lim-sup-inf\], where we also showed that $\phi_{n+1,r}\geq\phi_{n,r}$ for all $n$ and $r$. Using this latter fact and the fact that $\delta_n\leq2$, we now have $$\phi_{2n,r}(t)-\phi_{n,r}(t)\geq0\qquad\text{and}\qquad e^{-\delta_n t}-e^{-2 t}\geq 0,$$ so the difference is indeed nonnegative.
Therefore, the supremum may be calculated over the even numbers: $$\sup_{n\in{\mathbb{N}}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}=\sup_{n\text{ even}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}.$$ Now recall that for even $n$ we have: $$|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}\leq\sum_{\text{odd }r\leq n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-2t}.$$ Furthermore, we saw in the proof of Theorem \[theorem-lim-sup-inf\] that the expression on the right hand side is increasing in $n$ (because $\phi_{n+1,r}\geq\phi_{n,r}$). Taking the supremum of both sides over all even integers $n$, we therefore have: $$\sup_{n\text{ even}}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}}\leq\lim_{\substack{n\to\infty\\n\text{ even}}}\sum_{\text{odd }r\leq n}\frac nr (e^{-\delta_r t}-e^{-\delta_{r,n}t})+e^{-2t}\leq\limsup_{n\to\infty}|t C^{\mathrm{eucl}}_n|_{\mathrm{Rips}},$$ where the second inequality is immediate from the proof of Theorem \[theorem-lim-sup-inf\].
By Corollary \[ripsmag\_geo\], the explicit formulas for Rips magnitudes of geodesic cycles are $$|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}=\sum_{\substack{\text{odd }r|n\\r\neq n}}\frac nr (e^{-\eta_r t}-e^{-\eta_{r,n}t})+e^{-\eta_n t},$$ where $$\eta_r=2\pi\frac{\lfloor\frac r2\rfloor}r\qquad\text{and}\qquad\eta_{r,n}=2\pi\left(\frac1n+\frac{\lfloor\frac r2\rfloor}r\right).$$ A similar procedure as in the Euclidean case now allows for the calculation of limits of various subsequences, as well as the upper and the lower limit. The main difference is that in this case, the series obtained as the upper limit does not converge anymore: $$\limsup_{n\to\infty}|t C^{\mathrm{geo}}_n|_{\mathrm{Rips}}=\sum_{\text{odd }r}\frac{2\pi t}re^{-\pi\frac{r-1}{r}t}+e^{-\pi t}=\infty.
\qedhere$$
Proof of Theorem \[theorem-magBMH\] {#section-long-proof}
===================================
Throughout this proof we let $\delta$ denote the minimum nonzero distance between elements of $X$, and we let $n$ denote the cardinality of $X$. We let $l_0<l_1<l_2<\cdots$ be the distinct values of $l$ for which the inner sum appearing in Proposition \[proposition-alternating\] is nonzero, as in Remark \[remark-l-values\]. And we define $D(i,j,k)$ to be $1$ if $l_j$ is in $[a_{k,i},b_{k,i})$, and to be $0$ otherwise. We make a standing assumption that $t$ is large enough that $ne^{-\delta t}<1$; this is the assumption under which $t$ is large enough that the conclusions of Proposition \[proposition-alternating\] hold.
We will use the following fact several times. Let $(x_0,\ldots,x_k)$ be a tuple of elements of $X$ in which consecutive elements are distinct, and suppose that this tuple is a generator of $\operatorname{MC}_{k,l}(X)$ or $\operatorname{BMC}_k(X)(l)$. Then $\ell(x_0,\ldots,x_k)\leq l$, while $\ell(x_0,\ldots,x_k)\geq k\delta$, so that $k\delta \leq l$. It follows that, if $k$ and $l$ do not satisfy this relation, then the homology groups $\operatorname{MH}_{k,l}(X)$ and $\operatorname{BMH}_k(X)(l)$ vanish.
We now have the following computation, whose steps will be justified below. $$\begin{aligned}
|tX|
&\stackrel{1}{=}
\sum_{j=0}^\infty
\sum_{k=0}^\infty
(-1)^k\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l_j}(X))e^{-l_jt}
\\
&\stackrel{2}{=}
\sum_{j=0}^\infty
\sum_{k=0}^\infty
(-1)^k
\left[
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))
-
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_{j-1}))
\right]e^{-l_jt}
\\
&\stackrel{3}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{j=0}^\infty
\left[
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))
-
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_{j-1}))
\right]e^{-l_jt}
\\
&\stackrel{4}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{j=0}^\infty
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))(e^{-l_jt}-e^{-l_{j+1}t})
\\
&\stackrel{5}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{j=0}^\infty
\sum_{i=0}^\infty
D(i,j,k)(e^{-l_jt}-e^{-l_{j+1}t})
\\
&\stackrel{6}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{i=0}^\infty
\sum_{j=0}^\infty
D(i,j,k)(e^{-l_jt}-e^{-l_{j+1}t})
\\
&\stackrel{7}{=}
\sum_{k=0}^\infty
(-1)^k
\sum_{i=0}^\infty
(e^{-a_{k,i}t}-e^{-b_{k,i}t})\end{aligned}$$
Step 1 is precisely the formula of Proposition \[proposition-alternating\]. The series here is absolutely convergent. That is because $$\begin{aligned}
\sum_{j=0}^J
\sum_{k=0}^\infty
\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l_j}(X))
e^{-l_jt}
&=
\sum_{k=0}^\infty
\sum_{j=0}^J
\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l_j}(X))
e^{-l_jt}
\\
&\leq
\sum_{k=0}^\infty
\sum_{x_0,\ldots,x_k}
e^{-\ell(x_0,\ldots,x_k)t}
\\
&\leq
\sum_{k=0}^\infty
n^{k+1}e^{-k\delta t}
\\
&=
n\cdot\sum_{k=1}^\infty
(ne^{-\delta t})^k.\end{aligned}$$ Here, in the second line the inner sum is over all tuples $(x_0,\ldots,x_k)$ with consecutive elements distinct, and there are at most $n^{k+1}$ of these, where $n$ denotes the cardinality of $X$. Now we have $ne^{-\delta t}<1$ by our standing assumption, so that the latter sum converges and is bounded above independent of $J$. This shows absolute convergence.
To explain step 2, recall that by Proposition \[proposition-absolute-blurred\] there is a long exact sequence $$\cdots
\to
\operatorname{BMH}_k(X)(l_{j-1})
\to
\operatorname{BMH}_k(X)(l_j)
\to
\operatorname{MH}_{k,l_j}(X)
\to
\cdots$$ This sequence terminates in both directions, because the relation described in the second paragraph above fails for all three groups when $k$ is large enough. A standard fact from homological algebra then guarantees that $$\begin{gathered}
\sum_{k=0}^\infty
(-1)^k\operatorname{\mathrm{rank}}(\operatorname{MH}_{k,l_j}(X))
=
\\
\sum_{k=0}^\infty
(-1)^k
\left[\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))
-
\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X))(l_{j-1})
\right].\end{gathered}$$
For step 3, we have exchanged the order of summation. This is valid because the series is absolutely convergent (indeed, it is the same series as the one appearing in step 1).
For step 4, we have ‘telescoped’ the sum, using the fact that $$\operatorname{\mathrm{rank}}(\operatorname{BMH}_k(X)(l_j))e^{-l_jt}\to 0
\text{ as }
j\to\infty.$$ The latter holds because $\operatorname{\mathrm{rank}}(\operatorname{BMH}_k(X)(l_j))$ is at most the number of tuples $(x_0,\ldots,x_k)$ with consecutive entries distinct and $\ell(x_0,\ldots,x_k)\le l_j$. But then $l_j\ge k\delta$ so that $\operatorname{\mathrm{rank}}(\operatorname{BMH}_{k}(X)(l_j))e^{-l_jt}\leq n^{k+1}e^{-l_jt}
\le n\cdot n^{l_j/\delta}e^{-l_j t}=n\cdot(n^{1/\delta}e^{-t})^{l_j}$. But $(n^{1/\delta}e^{-t})<1$ by our standing assumption. Since $l_j\to\infty$ as $j\to\infty$, the claim follows.
Step 5 follows by simply describing $\operatorname{\mathrm{rank}}(\operatorname{BMH}_k(X)(l_j))$ as the number of bars in the barcode decomposition for $\operatorname{BMH}_k(X)$ that contain $l_j$. For step 6 we have again exchanged the order of summation, which is valid because the series consists of non-negative numbers and is convergent. Step 7 is then a direct computation of the series $\sum_{j=0}^\infty D(i,j,k)(e^{-l_jt}-e^{-l_{j+1}t})$.
[^1]: In fact, $\delta_n=\delta_{n,n}$ for odd $n$, so the condition $r\neq n$ can be omitted for Euclidean cycles.
|
<?php // $Header: /cvsroot/tikiwiki/tiki/parse_tiki.php,v 1.5 2004/06/16 01:24:10 teedog Exp $
// heaviled modified get_strings.php
// dedicated as a tool for use in an eventual test suite
// mose@tikiwiki.org
require_once('tiki-setup.php');
if($tiki_p_admin != 'y') die("You need to be admin to run this script");
$logfile = 'temp/tiki_parsed.txt';
$logfilehtml = 'temp/tiki_parsed.html';
function collect($dir) {
global $dirs;
if (is_dir($dir) and is_dir("$dir/CVS")) {
$list = file("$dir/CVS/Entries");
foreach ($list as $l) {
// if (count($dirs) > 20) return true;
if (strstr($l,'/')) {
$s = split('/',rtrim($l));
$filepath = $dir.'/'.$s[1];
if ($s[0] == 'D') {
collect($filepath);
$dirs["$dir"][] = $s[1];
$dirs["$dir"]['FILES'] = array();
} else {
if (is_file($filepath)) {
$stat = stat($filepath);
$files["$filepath"]["mtime"] = $stat['mtime'];
$files["$filepath"]["ctime"] = $stat['ctime'];
$files["$filepath"]["atime"] = $stat['atime'];
$files["$filepath"]["size"] = $stat['size'];
$files["$filepath"]["rev"] = $s[2];
$files["$filepath"]["date"] = $s[3];
$files["$filepath"]["flags"] = $s[4];
$files["$filepath"]["tag"] = $s[5];
clearstatcache();
$dirs["$dir"]['FILES'] = $files;
}
}
}
}
}
}
function echoline($fd, $fx, $outstring, $style='', $mod='', $br=true) {
if ($br) {
$br = "\n";
} else {
$br = '';
}
fwrite ($fd, $outstring.$br);
if ($mod == 'd') {
$outstring = date('D M d H:m:s Y',trim($outstring));
}
if ($style == 'eob') {
$htmlstring = "</div>";
} elseif ($style) {
if ($style == 'dir') {
$htmlstring = "<span class='$style' onclick=\"javascript:toggle('".$outstring."');\">". sprintf(" %-16s : ",$style). htmlspecialchars($outstring)."</span>";
$htmlstring.= "<div class='box' id='".$outstring."'>";
$br = '';
} else {
$htmlstring = "<span class='$style'>". sprintf(" %-16s : ",$style). htmlspecialchars($outstring)."</span>";
}
} else {
$htmlstring = htmlspecialchars($outstring);
}
fwrite ($fx, $htmlstring.$br);
}
$display = 'none';
if (isset($_REQUEST['all'])) $display = 'block';
?>
<html><head><style>
pre { padding : 10px; border: 1px solid #666666; background-color: #efefef; }
.dir { font-weight : bold; background-color: #ffffff; cursor : pointer; }
.box { padding : 10px; border : 1px solid #999999; background-color: #f6f6f6; display : <?php echo $display ?>; }
.file { font-weight : bold; }
.php { background-color: #AACCFF; }
.smarty { background-color: #FFccAA; }
.other { background-color: #cccccc; }
.image { background-color: #aaffcc; }
.sub { padding-left : 20px; font-size : 80%; }
.var { background-color: #FFFFAA; }
.url { background-color: #FFAAAA; }
.action { background-color: #AACCFF; }
.form { background-color: #AABBFF; }
.atime, .ctime, .mtime, .date { background-color: #dedede; }
.size, .rev, .tag { background-color: #ededed; }
</style><script type="text/javascript" src="lib/tiki-js.js"></script></head>
<body><form action="parse_tiki.php" method="post"><input type="submit" name="action" value="process" /></form>
<a href="<?php echo $logfile; ?>">raw report</a>
<pre>
<?php
if (isset($_POST['action'])) {
$files = $dirs = array();
collect('.');
@unlink ($logfile);
$fw = fopen($logfile,'w');
$fx = fopen($logfilehtml,'w');
foreach ($dirs as $dir=>$params) {
$dirname = basename($dir);
$path = dirname($dir);
echoline($fw,$fx,$dir,'dir');
echoline($fw,$fx,'');
if (isset($dirs["$dir"]['FILES'])) {
foreach ($dirs["$dir"]['FILES'] as $file=>$params) {
$fp = fopen ($file, "r");
$data = fread ($fp, filesize ($file));
fclose ($fp);
$requests = array();
$urls = array();
if (preg_match("/\.(tpl|ph(p|tml))$/", $file)) {
if (preg_match("/\.ph(p|tml)$/", $file)) {
echoline($fw,$fx, $file,"file php");
$data = preg_replace ("/(?s)\/\*.*?\*\//", "", $data); // C comments
$data = preg_replace ("/(?m)^\s*\/\/.*\$/", "", $data); // C++ comments
$data = preg_replace ("/(?m)^\s*\#.*\$/", "", $data); // shell comments
$data = preg_replace('/(\r|\n)/', '', $data); // all one line
preg_match_all('/\$_(REQUEST|POST|GET|COOKIE|SESSION)\[([^\]]*)\]/', $data, $requests); // requests uses
$max = count($requests[0]);
for ($i=0;$i<$max;$i++) {
echoline($fw,$fx,$requests[1][$i]." = ".$requests[2][$i],'sub var');
}
} elseif (preg_match ("/\.tpl$/", $file)) {
echoline($fw,$fx,$file,'file smarty');
$data = preg_replace('/(?s)\{\*.*?\*\}/', '', $data); // Smarty comment
$data = preg_replace('/(\r|\n)/', '', $data); // all one line
}
preg_match_all('/<(a[^>]*)>[^<]*<\/a>/im', $data, $urls); // href links
foreach ($urls[1] as $u) {
echoline($fw,$fx,$u,'sub url');
}
preg_match_all('/<(form[^>]*)>/', $data, $forms); // form uses
foreach ($forms[1] as $f) {
echoline($fw,$fx,$f,'sub action');
}
preg_match_all('/<((input|textarea|select)[^>]*)>/', $data, $elements); // form elements uses
$max = count($elements[0]);
for ($i=0;$i<$max;$i++) {
echoline($fw,$fx,$elements[1][$i],'sub form');
}
echoline($fw,$fx,trim($params['atime']),'sub atime','d');
echoline($fw,$fx,trim($params['mtime']),'sub mtime','d');
echoline($fw,$fx,trim($params['ctime']),'sub ctime','d');
echoline($fw,$fx,trim($params['date']),'sub date');
echoline($fw,$fx,trim($params['size']),'sub size');
echoline($fw,$fx,trim($params['rev']),'sub rev');
echoline($fw,$fx,substr(trim($params['tag']),1),'sub tag');
} elseif (preg_match ("/\.(gif|jpg|png)$/i", $file)) {
echoline($fw,$fx,$file,'file image');
} else {
echoline($fw,$fx,$file,'file other');
}
echoline($fw,$fx,'');
flush();
}
}
echoline($fw,$fx,'end of box','eob');
}
fclose($fw);
fclose($fx);
}
if (is_file($logfilehtml)) {
readfile($logfilehtml);
}
?>
</pre>
</body></html>
|
<p><i>A look at some interesting numbers in the SEC heading into college football's Week 10</i></p><p><b>1:</b> The number of SEC teams that haven't had a play from scrimmage this season go at least 60 yards — Auburn. The Tigers are also the only SEC team with only one play that has gone at least 50.</p><p><b>3:</b> The number of consecutive years in which Tennessee has started a season 0-5 in SEC play. The Vols had only posted such a record one other time in school history, which was in 1977.</p><p><b>8:</b> The number of consecutive games in which Alabama has scored 30 or more points, a school record. That includes every game this season as the team has bested the 1971 Tide's seven straight.</p>
|
Vladimir Putin’s Russia is treading water in a sea of red ink
Russia’s President Vladimir Putin (L) is seen through the glass of C-Explorer 5 submersible after a dive in the Gulf of Finland in the Baltic Sea, July 15, 2013. REUTERS/Aleksey Nikolskyi/RIA Novosti/Kremlin
As President Vladimir Putin looks out on to the world stage, he should be relishing Russia’s renewed status as a global player.
But when Putin looks homeward, he sees a different reality. Three months into 2015, Russia’s economic forecast ranges from gloomy to catastrophic. Yet in contrast to his aggressive response in Ukraine, Putin has been the picture of inaction domestically. He has intervened in the financial markets but not on Main Street, avoiding any hint of structural reforms.
Russian domestic and foreign policy are intimately connected, however. And the troubled domestic front is now catching up to Putin and limiting his regional and global aspirations.
Russian President Vladimir Putin attends a meeting with members of the government at the Kremlin in Moscow, March 4, 2015. REUTERS/Alexei Druzhinin/RIA Novosti/Kremlin
Putin’s economic plan essentially boils down to preserving the state sector, with all its inefficiencies, and shrinking it by just 10 percent. The across-the-board budget cuts have been felt by all state agencies except defense. Even Russia’s vaunted internal security services now have to make due with fewer resources, despite the real prospect of increased social unrest.
So there will be no large stimulus package coming from the Russian state. Instead, a $35-billion anti-crisis program has been established. So far, though, Moscow has been extremely reluctant to spend the money. Even Putin has admitted that the program exists only on paper.
The decline in public spending and accompanying decrease in the real wages of state employees has had a domino effect on private business. Every day brings new reports of cutbacks, closures and layoffs, especially in the retail and service sectors.
All this highlights the underlying structural problems with the Russian economy and Putin’s reluctance to address them. In February, Putin gathered his top economic advisers, plus former Finance Minister Alexei Kudrin, to discuss potential reforms in state administration, law enforcement and the pension system (Russian men retire at 60; women at 55).
Including Kudrin at this meeting hinted a possible renewed focus on the domestic front, even a possible turn in a liberal direction. Yet no concrete proposals emerged, and rather than clean up government, Putin signed a law on Mar. 10 reducing penalties for corruption.
Neither the domestic consumer nor the foreign investor are about to come riding to the rescue of the Russian economy. But in trying to preserve his system of state capitalism and central control, Putin is busy spending the country’s hard currency reserves, which have decreased from $490 billion to $360 billion over the past year.
And new demands keep pouring in: $50 billion has been allocated from the emergency reserve fund to plug Russia’s 2015 budget deficit, with additional payments likely required in 2016; Rosneft, the major oil producer, wants $21 billion, and Gazprom, Russia’s natural gas production company, just asked for $3.2 billion. The entire banking sector also remains fragile.
Meanwhile, Crimea requires significant resources. And no one has yet volunteered to pay the considerable debts of Russia’s regional governments, largely ignored in the Kremlin’s anti-crisis planning.
In this sea of red ink, the only possible salvation is an increase in energy prices. When and how fast this can occur, however, remains anyone’s guess. Putin most likely can survive this economic downturn — he still faces no real political opposition. But without any fundamental structural reforms, he will arrive at the same stagnant (albeit smaller) economy that Russia started with before this crisis.
There is also one last bill to be paid: Ukraine. The fighting in eastern Ukraine may have diminished, but the final implementation of the Minsk II accord is a long way off. Kiev seems in no hurry to decentralize power to the regions and again start transferring state salaries and pensions to Donetsk and Lugansk. The payments have been suspended as long as these territories are outside the control of the Ukrainian government.
Russian Foreign Minister Sergei Lavrov now demands that the West consider sanctions on Ukraine for failing to implement Minsk II. One can appreciate his apprehension, however, because if Kiev won’t pay for eastern Ukraine, Moscow will have to. That means paying for a sitting army and separate regimes in both enclaves — neither of which has shown much interest in governing.
Putin can pursue the path of negotiations while probing for other weaknesses, among the nations that issued the sanctions, for example, or inside the European Union. Yet without any new dramatic foreign policy successes, Russia will increasingly be defined by its underperforming economy.
This growing sense of economic unease is reflected in national opinion polls. In a recently announced survey, 82 percent of all Russians viewed inflation as the No. 1 problem facing the country. Some 55 percent indicated that the Russian government was not doing enough to address inflation and falling incomes.
The annexation of Crimea clearly distracted people from their economic problems. The “liberation” of Debaltseve did not. Putin can no longer push his domestic challenges to the side. Instead, they are increasingly becoming his greatest source of vulnerability.
The author always has been writing articles critical of Russia.
I have a suggestion for you Mr. Pomeranz, why don’t you focus on the sea of problems we face right here in the good old US of A????????????
Retiring at 60 is only a dream for most American workers, many of whom work well after 65.
The exception of course are federal employees and many state employees who often retire at 55 and even earlier. This is because they accumulate retirement pensions that are 40% greater than private citizens, coupled with over twice the years of service.
Sanctions should be ratcheted up without too much noise and remain in full force until Putin is removed from office, hopefully by Russians. Russians need to feel the pain so as to influence Putin’s standing but there should be a promise of rebuilding relationships once there is a change of leadership. Also we need to send weapons to Ukraine. There should be a condition that artillery not be used so that citizen’s would not be impacted so badly. Ukraine has that responsibility to its non combat citizens
The US and Russian economies are structured completely differently. For one thing, the US economy is by far more diversified, hence less affected by fluctuating gas prices. The size of Russia’s economy is similar to that of Italy or Brazil, so comparing the economies is quite difficult. Larger economies can have larger debt to GDP ratios.
Typical anti-Russian article propaganda article. No doubt they are going through tough times but these stories are so one sided and being posted on a daily and weekly basis. The US is $18 trillion in debt and keep raising the debt ceiling but I don’t see too many stories on that – and that’s a WAY more serious problem. I have an idea, how about posting a positive story about Russia for once. There’s lots of positive stories out there. We don’t need to keep demonizing Putin all the time. It’s getting really old.
Another article that is just blatant propaganda. The comment by Thoma re the Russian people removing Putin just shows how the anti Putin propaganda is working in the US. The Russian people trust him more than any other leader for an awful long time. But more importantly do they really believe that removing Putin would change the stance of the real power behind the throne in Russia anymore than in America. Figure heads are figure heads the world over.
Russia is in decline. Largest country in the world by area, and their economy is now smaller than Italy’s. The GDP per capita in Russia has slipped to a level below that of Czech Republic or Slovenia. This is a according to World Bank 2014 data. Investors are pulling out.
I hope Western readers review the comments. If you do, then can see the Putin propaganda machine at work. It’s fascinating to me to see the posts below. English speaking Russians must be a growth industry in Russia at the moment. Too bad for them though. Russia was on such a good track, painful yes, but they were heading toward freedom, representative government, and codification of all the inalienable rights we in the West take for granted. Imagine now the carnage and pain the Russian people will endure to undue all the bad acts of Putin and his corrupt oligarchs. It just makes you sad for the Russian people, very sad.
Military adventurism is costly. All those soldiers want to eat but produce nothing. And the low oil price hurts countries that produce little to export except oil and gas. Russia’s GDP is the smallest of the four BRIC developing nations, smaller even than Italy’s.
The Soviets were not defeated in war, they just collapsed because they built up the military and neglected the economy. Trained by the Soviets, Putin repeats the same mistakes.
|
Top 10 Best Overnight Treatments For Healthy Hair!
If every weekend you have been doing something for your hair to get some effective results and still have not, it’s time to rethink your hair care techniques. Do you have rough hair? dry hair? or dull hair? Not to worry. We will be sharing few effective hair treatment overnight for healthy hair. The hair treatments are used to infuse life into your strands and give shiny and soft hair.
While there are some of the treatments you can easily make in your kitchen and there are others that you can buy online. They all are super-duper effective. So why are you still waiting? Try all these hair treatments by yourself and say a very good morning to your luscious locks.
Top 10 Best Overnight Treatments For Healthy Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
1. Coconut Oil And Honey For Silky Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
If you are looking for silky hair, use a mix of coconut oil and honey on hair. Add 5 to 6 Tablespoon of natural honey and add 6-7 tablespoon of oil. Heat the mixture in a pan and blend it till it gets lukewarm. Now apply the mixture on your scalp and your split ends before going to bed. Cover your head with a shower cap to avoid sticking honey to your bed sheet. Wash off the mixture and feel the softness of your silky hair.
2. Overnight Coconut Oil Massage
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
For damaged and dry hair, an overnight hair oil treatment is a must. Remember your mum giving you hot coconut oil massage at night to bring life to hair. Take little amount of coconut oil and heat a bit. Massage your favourite hair and leave it overnight. Wash your hair with lukewarm water. This way you are giving the gift of moisture to your hair. Repeat the process twice in a week to see effective results.
3. Overnight Hair Mask
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
There are various sulphate-free products in the market. For an overnight hair treatment for frizz-free hair, get a sulphate free hair mask. The hair masque offers hair repair for extremely dry hair. The masque is fortified with palm oils, tropical acai and hyaluronic acid gives deep conditioning to your hair treatment overnight.
4. Overnight Solution for Dandruff
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
In winters, dandruff could be a problem creator and really embarrassing. Fortunately, you would be glad to know that you will not have to work hard. Simply use an anti dandruff oil or lotion before going to bed. It cleans your hair and leaves it healthy and removes dandruff. With regular use, your hair tends to get softer. Isn’t it a win-win situation for all.
5. Amazing Conditioner with Coconut Milk and Argan Oil
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Argan oil is well known as a blessing for hair conditioning and it gets better when mixed with coconut milk. The mixture infuses into your hair and leaves it radiating. This is a perfect overnight treatment to nourish your hair and keep them soft and silky.
6. Overnight Olive Oil Mask
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Olive oil needs no introduction. It makes an amazing mask foray hair treatment overnight. Adding an egg yolk and little bit of aloe vera makes this mask more effective for bringing back the lost shine to frizzy and dull hair. We all want well-hydrated hair and coat of this mixture on your hair evenly. Cover your head with the shower cap to prevent moisture from drying off. Do this atlas once a week for the best results.
7. Pumpkin and Honey For Lustrous Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
You might be thinking what sort of combination is that. Right?But pumpkin and honey together make an amazing hair mask that can be used while sleeping. Mash honey and pumpkin together and apply to your scalp. Shampoo your hair next morning. The moisturising treatment leaves your hair lustrous and soft.
8. Overnight Hair Fall Treatment With Rosemary And Castor Oil
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Are you tired of constant hair fall? Fight the hair falls with regular use of actor oil and rosemary oil mixture. Take 4-5 drops of rosemary oil and one cup of castor. Shake well and use regularly. You will not only notice the decrease in hair fall but also the quality of your hair will improve drastically.
9. Overnight Deep Conditioning With Yogurt
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Yogurt is an amazing conditioner and perfect product to make your hair hydrated and smooth. When you mix sunflower seed oil and coconut oil, it also makes hair smooth and shiny. Try a hair mask using unsweetened yogurt, banana and avocado for restoring the natural shine and rejuvenating the damaged hair.
10. Overnight Avocado Treatment
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Avocado is the best secret for soft locks, glossy and healthy hair. This homemade product for dry and rough hair bring back life into your locks. Avocado mixed with olive oil is an affection mixture for split ends. Use it twice in a week to see the results all by yourself.
Apart from creams, honey or yogurt one of the most effective hair treatment overnight comes from oils. We present to you best oil overnight treatments based on your hair types.
Best Oil for Hair Treatment Overnight
1. Rosemary Oil for Thin Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
The oil naturally stimulates the follicles and prevents the hair loss and helps hair follicles grow. It has anti-aging properties, protective compounds and many nutrients that help translate the unhealthy hair to keep young and healthy. Rosemary oil nourishes and hydrate the regenerative cells and tissues for strong and long hair. Massage your scalp with rosemary oil once a week for strong hair.
2. Avocado Oil for Course Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Avocado is quite rich in proteins and that’s exactly what our hair need. It helps in softening of course hair. With Vitamin D, A and E and high amino acids, the oil helps in repairing the crevices of the course hair and further strengthen strands to protect from the further damage. The course hair is softened and can be managed well with this oil. Try this oil every alternate night to see an early effect.
3. Hemp Seed Oil for Thick Hair
Facebook
Twitter
Google+
Digg
Pinterest
reddit
VKontakte
StumbleUpon
Tumblr
Thick hair is hard to manage and not really easy to keep hydrated. Hemp seed is rich invitamin Eand fatty acids. Hemp seed oil helps in deep conditioning the thick hair and give more nourishment and flexibility to split ends. The oil allows the hair to feel thick and straightens it from the roots. Hemp seed oil is not available easily but if you get it, Thank God for a natural savior.
Finally, the ultimate hair oil that is eligible for all types of hair is Argan oil. It is one of the rare oils but definitely worth each penny. The oil is perfect for hair treatment overnight with its high vitamin E content which helps in stimulating cell growth. The oil also encourages hair development in a healthy manner by increasing the elasticity and prevents the breakage. The oil is composed of almost 80% of fatty acid especially unsaturated such as Palmitic, Oleic, Stearic and Linoleic acids. These acids work very hard to tame the frizziness and add shine to the split and dry ends. Highly recommended for all hair types and especially for hair treatment overnight.
Simple warmth oil and massage gently onto your scalp. Leave it overnight and wash it next. Try this oil twice a week to see the results within few days. Do you still feel you need to go for the hair salon to get some hair spa? when everything is available in your kitchen.
1 Response
Thanks for the great info! I use coconut oil and Aloe with a cap(r Saran wrap!) and wrap my hair in a warm towel.. then I sleep in the cap…next day my hair is amazingly soft and it stays healthy looking, but I am going to add the honey!
I also grow my own Aloe Vera plants and make my own face and hair masks and face creams. I swear by Aloe!! Plus I love that it’s natural.
I like your blog and will continue to stop by as I also dig your hobbies and interests.
Search for Organic Tips
StylEnrich.com does not give any medical advice. All the content published in our site is strictly for informational purpose. We strongly recommend that you consult your medical adviser before trying any home remedy or tips given in our website.
|
Ensconced in one of the world’s greatest stadia – the Sydney Cricket Ground – is their iconic museum dedicated to displaying the unique sporting history of its grounds. And pride of place in the middle is the quirky Lego construction by now 14-year-old Curtis Glassford of Wentworth Falls. The Kindlehill student spent more than a year building the Sydney Cricket Ground Members’ Stand at Moore Park for a school project, sourcing 17,000 Lego bricks from around the world at a cost of $4500. “We could have paid for a membership with the money,” Dad, Sean, of Wentworth Falls told the Gazette earlier this year. Madeleine Lindsell from the Museum confirmed the Trust had acquired the piece for a year on loan and had custom made a plinth and perspex lid for it. The exhibit was seen by thousands of visitors during the recent Sydney Test against India and proved especially popular on rainy days when play was shut down and with younger visitors. “It has been popular, particularly with children … it’s at eye level and they are Lego fanatics themselves,” Ms Lindsell said. Explaining the decision to take the unique piece, she said: “We saw a picture of it and thought ‘Wow, that’s a good effort’. It took three hours to pack it and another few hours to transport from their Blue Mountains home in its custom made frame and with a specialist art mover. A plaque on the plinth quotes his interview with the Gazette last year. Mother Simone Glassford said the family was hosted on Jane McGrath day and Curtis got to meet Sydney Trust members, as well as current and former Test players. “It’s pretty special and they really honoured him on Jane McGrath day,” she said. “It was quite amazing … fantastic. Curtis was met by several of the SCG management, players, and also had a long chat about his work with Jenny Morrison, the Prime Minister’s wife. He was also part of the chairman’s (of the Sydney Cricket Ground Trust) opening speech, highlighting that kids in the next generation are not all screen junkies and will go on to great things.” Curtis has been building Lego since he was three. With a special interest in maths, Curtis got the plans for the hallowed stand, then built it to scale. It is 40cm high, 90cm deep and 130cm wide, and includes seats, a bar with beer taps, toilets and small collectible Lego figurines. “I think the whole getting to go to the cricket .. meet a few amazing people, just the whole experience,” Curtis said. “It looks really beautiful in its casing. They are talking about if they want to keep it.”
The Kindlehill student spent more than a year building the Sydney Cricket Ground Members’ Stand at Moore Park for a school project, sourcing 17,000 Lego bricks from around the world at a cost of $4500.
Madeleine Lindsell from the Museum confirmed the Trust had acquired the piece for a year on loan and had custom made a plinth and perspex lid for it.
The exhibit was seen by thousands of visitors during the recent Sydney Test against India and proved especially popular on rainy days when play was shut down and with younger visitors.
“It has been popular, particularly with children … it’s at eye level and they are Lego fanatics themselves,” Ms Lindsell said.
Explaining the decision to take the unique piece, she said: “We saw a picture of it and thought ‘Wow, that’s a good effort’.
It took three hours to pack it and another few hours to transport from their Blue Mountains home in its custom made frame and with a specialist art mover.
A plaque on the plinth quotes his interview with the Gazette last year.
Mother Simone Glassford said the family was hosted on Jane McGrath day and Curtis got to meet Sydney Trust members, as well as current and former Test players.
“It’s pretty special and they really honoured him on Jane McGrath day,” she said.
“It was quite amazing … fantastic. Curtis was met by several of the SCG management, players, and also had a long chat about his work with Jenny Morrison, the Prime Minister’s wife. He was also part of the chairman’s (of the Sydney Cricket Ground Trust) opening speech, highlighting that kids in the next generation are not all screen junkies and will go on to great things.”
Curtis has been building Lego since he was three. With a special interest in maths, Curtis got the plans for the hallowed stand, then built it to scale. It is 40cm high, 90cm deep and 130cm wide, and includes seats, a bar with beer taps, toilets and small collectible Lego figurines.
“I think the whole getting to go to the cricket .. meet a few amazing people, just the whole experience,” Curtis said. “It looks really beautiful in its casing. They are talking about if they want to keep it.”
|
New Amazon Listing Shows Xiaomi Redmi 2 Prime For India
If you’ve been into handsets, especially Android-based, then you’ll have heard of the manufacturer Xiaomi. Xiaomi is a Chinese manufacturer that was founded back in 2010 but only recently started to bring their devices outside of China to resellers in other parts of the world such as India. One of their latest devices is known as the Redmi 2, a midrange handset that released into markets but didn’t quite hit the mark Xiaomi was hoping for in areas like India. For the price of the smartphone, the competition was stiff which the Chinese OEM decided to release a more enhanced version of the smartphone, the Xiaomi Redmi 2 Prime. Today we’re learning that the smartphone has been listed on Amazon for India, but information and details are a still scarce on when consumers will actually be able to purchase the device.
First of all, if you’re unfamiliar with the Xiaomi Redmi 2, this smartphone contains a 4.7-inch HD display with a resolution of 1280×720. Cracking open the handset, you’ll find that the Xiaomi Redmi 2 is running a Qualcomm SnapDragon 410 quad-core 1.2GHz processor with Adreno 306 as its GPU. Located on the rear of this handset is an 8-megapixel camera while the front face holds a 2-megapixel camera. Running off a 2200mAH lithium-polymer battery, it’s a bit of a surprise that the operating system is currently running Android 4.4.4 KitKat rather than jumping onto the latest Android 5.0 Lollipop OS. Lastly, there is 1 GB of RAM and only 8 GB of internal storage.
Now when it comes to the enhanced version of this handset, known as the Xiaomi Redmi 2 Prime, most of the specifications are the exact same. The only difference comes with the RAM and internal storage of the smartphone. Instead of 1GB of RAM, consumers will be receiving 2GB of RAM while the storage has been bumped up from 8GB to 16GB. By increasing the RAM and internal storage, Xiaomi will be able to hold up against some of the other smartphones priced similarly.
As of right now, the Xiaomi Redmi 2 Prime was discovered as a listing for India’s Amazon domain where details on availability and pricing are unavailable. Currently, only a list of specifications is given for the handset so we’re forced into waiting for Xiaomi to make an official release announcement. Because Xiaomi is starting to breach into other markets around the world, it would be interesting to see just how well the Prime edition of the handset will do compared to other devices within the same price range.
Note: There is a poll embedded within this post, please visit the site to participate in this post's poll.
|
/*******************************************************************************
* Copyright 2012-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use
* this file except in compliance with the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file.
* This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
* *****************************************************************************
*
* AWS Tools for Windows (TM) PowerShell (TM)
*
*/
using System;
using System.Collections.Generic;
using System.Linq;
using System.Management.Automation;
using System.Text;
using Amazon.PowerShell.Common;
using Amazon.Runtime;
using Amazon.CloudFormation;
using Amazon.CloudFormation.Model;
namespace Amazon.PowerShell.Cmdlets.CFN
{
/// <summary>
/// Updates a stack as specified in the template. After the call completes successfully,
/// the stack update starts. You can check the status of the stack via the <a>DescribeStacks</a>
/// action.
///
///
/// <para>
/// To get a copy of the template for an existing stack, you can use the <a>GetTemplate</a>
/// action.
/// </para><para>
/// For more information about creating an update template, updating a stack, and monitoring
/// the progress of the update, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks.html">Updating
/// a Stack</a>.
/// </para>
/// </summary>
[Cmdlet("Update", "CFNStack", SupportsShouldProcess = true, ConfirmImpact = ConfirmImpact.Medium)]
[OutputType("System.String")]
[AWSCmdlet("Calls the AWS CloudFormation UpdateStack API operation.", Operation = new[] {"UpdateStack"}, SelectReturnType = typeof(Amazon.CloudFormation.Model.UpdateStackResponse))]
[AWSCmdletOutput("System.String or Amazon.CloudFormation.Model.UpdateStackResponse",
"This cmdlet returns a System.String object.",
"The service call response (type Amazon.CloudFormation.Model.UpdateStackResponse) can also be referenced from properties attached to the cmdlet entry in the $AWSHistory stack."
)]
public partial class UpdateCFNStackCmdlet : AmazonCloudFormationClientCmdlet, IExecutor
{
#region Parameter Capability
/// <summary>
/// <para>
/// <para>In some cases, you must explicitly acknowledge that your stack template contains certain
/// capabilities in order for AWS CloudFormation to update the stack.</para><ul><li><para><code>CAPABILITY_IAM</code> and <code>CAPABILITY_NAMED_IAM</code></para><para>Some stack templates might include resources that can affect permissions in your AWS
/// account; for example, by creating new AWS Identity and Access Management (IAM) users.
/// For those stacks, you must explicitly acknowledge this by specifying one of these
/// capabilities.</para><para>The following IAM resources require you to specify either the <code>CAPABILITY_IAM</code>
/// or <code>CAPABILITY_NAMED_IAM</code> capability.</para><ul><li><para>If you have IAM resources, you can specify either capability. </para></li><li><para>If you have IAM resources with custom names, you <i>must</i> specify <code>CAPABILITY_NAMED_IAM</code>.
/// </para></li><li><para>If you don't specify either of these capabilities, AWS CloudFormation returns an <code>InsufficientCapabilities</code>
/// error.</para></li></ul><para>If your stack template contains these resources, we recommend that you review all
/// permissions associated with them and edit their permissions if necessary.</para><ul><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-accesskey.html">
/// AWS::IAM::AccessKey</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html">
/// AWS::IAM::Group</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-instanceprofile.html">
/// AWS::IAM::InstanceProfile</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-policy.html">
/// AWS::IAM::Policy</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-iam-role.html">
/// AWS::IAM::Role</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html">
/// AWS::IAM::User</a></para></li><li><para><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-addusertogroup.html">
/// AWS::IAM::UserToGroupAddition</a></para></li></ul><para>For more information, see <a href="http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html#capabilities">Acknowledging
/// IAM Resources in AWS CloudFormation Templates</a>.</para></li><li><para><code>CAPABILITY_AUTO_EXPAND</code></para><para>Some template contain macros. Macros perform custom processing on templates; this
/// can include simple actions like find-and-replace operations, all the way to extensive
/// transformations of entire templates. Because of this, users typically create a change
/// set from the processed template, so that they can review the changes resulting from
/// the macros before actually updating the stack. If your stack template contains one
/// or more macros, and you choose to update a stack directly from the processed template,
/// without first reviewing the resulting changes in a change set, you must acknowledge
/// this capability. This includes the <a href="http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/create-reusable-transform-function-snippets-and-add-to-your-template-with-aws-include-transform.html">AWS::Include</a>
/// and <a href="http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/transform-aws-serverless.html">AWS::Serverless</a>
/// transforms, which are macros hosted by AWS CloudFormation.</para><para>Change sets do not currently support nested stacks. If you want to update a stack
/// from a stack template that contains macros <i>and</i> nested stacks, you must update
/// the stack directly from the template using this capability.</para><important><para>You should only update stacks directly from a stack template that contains macros
/// if you know what processing the macro performs.</para><para>Each macro relies on an underlying Lambda service function for processing stack templates.
/// Be aware that the Lambda function owner can update the function operation without
/// AWS CloudFormation being notified.</para></important><para>For more information, see <a href="http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-macros.html">Using
/// AWS CloudFormation Macros to Perform Custom Processing on Templates</a>.</para></li></ul>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("Capabilities")]
public System.String[] Capability { get; set; }
#endregion
#region Parameter ClientRequestToken
/// <summary>
/// <para>
/// <para>A unique identifier for this <code>UpdateStack</code> request. Specify this token
/// if you plan to retry requests so that AWS CloudFormation knows that you're not attempting
/// to update a stack with the same name. You might retry <code>UpdateStack</code> requests
/// to ensure that AWS CloudFormation successfully received them.</para><para>All events triggered by a given stack operation are assigned the same client request
/// token, which you can use to track operations. For example, if you execute a <code>CreateStack</code>
/// operation with the token <code>token1</code>, then all the <code>StackEvents</code>
/// generated by that operation will have <code>ClientRequestToken</code> set as <code>token1</code>.</para><para>In the console, stack operations display the client request token on the Events tab.
/// Stack operations that are initiated from the console use the token format <i>Console-StackOperation-ID</i>,
/// which helps you easily identify the stack operation . For example, if you create a
/// stack using the console, each stack event would be assigned the same token in the
/// following format: <code>Console-CreateStack-7f59c3cf-00d2-40c7-b2ff-e75db0987002</code>.
/// </para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String ClientRequestToken { get; set; }
#endregion
#region Parameter RollbackConfiguration_MonitoringTimeInMinute
/// <summary>
/// <para>
/// <para>The amount of time, in minutes, during which CloudFormation should monitor all the
/// rollback triggers after the stack creation or update operation deploys all necessary
/// resources.</para><para>The default is 0 minutes.</para><para>If you specify a monitoring period but do not specify any rollback triggers, CloudFormation
/// still waits the specified period of time before cleaning up old resources after update
/// operations. You can use this monitoring period to perform any manual stack validation
/// desired, and manually cancel the stack creation or update (using <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/APIReference/API_CancelUpdateStack.html">CancelUpdateStack</a>,
/// for example) as necessary.</para><para>If you specify 0 for this parameter, CloudFormation still monitors the specified rollback
/// triggers during stack creation and update operations. Then, for update operations,
/// it begins disposing of old resources immediately once the operation completes.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("RollbackConfiguration_MonitoringTimeInMinutes")]
public System.Int32? RollbackConfiguration_MonitoringTimeInMinute { get; set; }
#endregion
#region Parameter NotificationARNs
/// <summary>
/// <para>
/// <para>Amazon Simple Notification Service topic Amazon Resource Names (ARNs) that AWS CloudFormation
/// associates with the stack. Specify an empty list to remove all notification topics.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String[] NotificationARNs { get; set; }
#endregion
#region Parameter Parameter
/// <summary>
/// <para>
/// <para>A list of <code>Parameter</code> structures that specify input parameters for the
/// stack. For more information, see the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/APIReference/API_Parameter.html">Parameter</a>
/// data type.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("Parameters")]
public Amazon.CloudFormation.Model.Parameter[] Parameter { get; set; }
#endregion
#region Parameter ResourceType
/// <summary>
/// <para>
/// <para>The template resource types that you have permissions to work with for this update
/// stack action, such as <code>AWS::EC2::Instance</code>, <code>AWS::EC2::*</code>, or
/// <code>Custom::MyCustomInstance</code>.</para><para>If the list of resource types doesn't include a resource that you're updating, the
/// stack update fails. By default, AWS CloudFormation grants permissions to all resource
/// types. AWS Identity and Access Management (IAM) uses this parameter for AWS CloudFormation-specific
/// condition keys in IAM policies. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-iam-template.html">Controlling
/// Access with AWS Identity and Access Management</a>.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("ResourceTypes")]
public System.String[] ResourceType { get; set; }
#endregion
#region Parameter RoleARN
/// <summary>
/// <para>
/// <para>The Amazon Resource Name (ARN) of an AWS Identity and Access Management (IAM) role
/// that AWS CloudFormation assumes to update the stack. AWS CloudFormation uses the role's
/// credentials to make calls on your behalf. AWS CloudFormation always uses this role
/// for all future operations on the stack. As long as users have permission to operate
/// on the stack, AWS CloudFormation uses this role even if the users don't have permission
/// to pass it. Ensure that the role grants least privilege.</para><para>If you don't specify a value, AWS CloudFormation uses the role that was previously
/// associated with the stack. If no role is available, AWS CloudFormation uses a temporary
/// session that is generated from your user credentials.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String RoleARN { get; set; }
#endregion
#region Parameter RollbackConfiguration_RollbackTrigger
/// <summary>
/// <para>
/// <para>The triggers to monitor during stack creation or update actions. </para><para>By default, AWS CloudFormation saves the rollback triggers specified for a stack and
/// applies them to any subsequent update operations for the stack, unless you specify
/// otherwise. If you do specify rollback triggers for this parameter, those triggers
/// replace any list of triggers previously specified for the stack. This means:</para><ul><li><para>To use the rollback triggers previously specified for this stack, if any, don't specify
/// this parameter.</para></li><li><para>To specify new or updated rollback triggers, you must specify <i>all</i> the triggers
/// that you want used for this stack, even triggers you've specifed before (for example,
/// when creating the stack or during a previous stack update). Any triggers that you
/// don't include in the updated list of triggers are no longer applied to the stack.</para></li><li><para>To remove all currently specified triggers, specify an empty list for this parameter.</para></li></ul><para>If a specified trigger is missing, the entire stack operation fails and is rolled
/// back. </para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("RollbackConfiguration_RollbackTriggers")]
public Amazon.CloudFormation.Model.RollbackTrigger[] RollbackConfiguration_RollbackTrigger { get; set; }
#endregion
#region Parameter StackName
/// <summary>
/// <para>
/// <para>The name or unique stack ID of the stack to update.</para>
/// </para>
/// </summary>
#if !MODULAR
[System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true)]
#else
[System.Management.Automation.Parameter(Position = 0, ValueFromPipelineByPropertyName = true, ValueFromPipeline = true, Mandatory = true)]
[System.Management.Automation.AllowEmptyString]
[System.Management.Automation.AllowNull]
#endif
[Amazon.PowerShell.Common.AWSRequiredParameter]
public System.String StackName { get; set; }
#endregion
#region Parameter StackPolicyBody
/// <summary>
/// <para>
/// <para>Structure containing a new stack policy body. You can specify either the <code>StackPolicyBody</code>
/// or the <code>StackPolicyURL</code> parameter, but not both.</para><para>You might update the stack policy, for example, in order to protect a new resource
/// that you created during a stack update. If you do not specify a stack policy, the
/// current policy that is associated with the stack is unchanged.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String StackPolicyBody { get; set; }
#endregion
#region Parameter StackPolicyDuringUpdateBody
/// <summary>
/// <para>
/// <para>Structure containing the temporary overriding stack policy body. You can specify either
/// the <code>StackPolicyDuringUpdateBody</code> or the <code>StackPolicyDuringUpdateURL</code>
/// parameter, but not both.</para><para>If you want to update protected resources, specify a temporary overriding stack policy
/// during this update. If you do not specify a stack policy, the current policy that
/// is associated with the stack will be used.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String StackPolicyDuringUpdateBody { get; set; }
#endregion
#region Parameter StackPolicyDuringUpdateURL
/// <summary>
/// <para>
/// <para>Location of a file containing the temporary overriding stack policy. The URL must
/// point to a policy (max size: 16KB) located in an S3 bucket in the same Region as the
/// stack. You can specify either the <code>StackPolicyDuringUpdateBody</code> or the
/// <code>StackPolicyDuringUpdateURL</code> parameter, but not both.</para><para>If you want to update protected resources, specify a temporary overriding stack policy
/// during this update. If you do not specify a stack policy, the current policy that
/// is associated with the stack will be used.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String StackPolicyDuringUpdateURL { get; set; }
#endregion
#region Parameter StackPolicyURL
/// <summary>
/// <para>
/// <para>Location of a file containing the updated stack policy. The URL must point to a policy
/// (max size: 16KB) located in an S3 bucket in the same Region as the stack. You can
/// specify either the <code>StackPolicyBody</code> or the <code>StackPolicyURL</code>
/// parameter, but not both.</para><para>You might update the stack policy, for example, in order to protect a new resource
/// that you created during a stack update. If you do not specify a stack policy, the
/// current policy that is associated with the stack is unchanged.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String StackPolicyURL { get; set; }
#endregion
#region Parameter Tag
/// <summary>
/// <para>
/// <para>Key-value pairs to associate with this stack. AWS CloudFormation also propagates these
/// tags to supported resources in the stack. You can specify a maximum number of 50 tags.</para><para>If you don't specify this parameter, AWS CloudFormation doesn't modify the stack's
/// tags. If you specify an empty value, AWS CloudFormation removes all associated tags.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
[Alias("Tags")]
public Amazon.CloudFormation.Model.Tag[] Tag { get; set; }
#endregion
#region Parameter TemplateBody
/// <summary>
/// <para>
/// <para>Structure containing the template body with a minimum length of 1 byte and a maximum
/// length of 51,200 bytes. (For more information, go to <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-anatomy.html">Template
/// Anatomy</a> in the AWS CloudFormation User Guide.)</para><para>Conditional: You must specify only one of the following parameters: <code>TemplateBody</code>,
/// <code>TemplateURL</code>, or set the <code>UsePreviousTemplate</code> to <code>true</code>.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String TemplateBody { get; set; }
#endregion
#region Parameter TemplateURL
/// <summary>
/// <para>
/// <para>Location of file containing the template body. The URL must point to a template that
/// is located in an Amazon S3 bucket. For more information, go to <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/template-anatomy.html">Template
/// Anatomy</a> in the AWS CloudFormation User Guide.</para><para>Conditional: You must specify only one of the following parameters: <code>TemplateBody</code>,
/// <code>TemplateURL</code>, or set the <code>UsePreviousTemplate</code> to <code>true</code>.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.String TemplateURL { get; set; }
#endregion
#region Parameter UsePreviousTemplate
/// <summary>
/// <para>
/// <para>Reuse the existing template that is associated with the stack that you are updating.</para><para>Conditional: You must specify only one of the following parameters: <code>TemplateBody</code>,
/// <code>TemplateURL</code>, or set the <code>UsePreviousTemplate</code> to <code>true</code>.</para>
/// </para>
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public System.Boolean? UsePreviousTemplate { get; set; }
#endregion
#region Parameter Select
/// <summary>
/// Use the -Select parameter to control the cmdlet output. The default value is 'StackId'.
/// Specifying -Select '*' will result in the cmdlet returning the whole service response (Amazon.CloudFormation.Model.UpdateStackResponse).
/// Specifying the name of a property of type Amazon.CloudFormation.Model.UpdateStackResponse will result in that property being returned.
/// Specifying -Select '^ParameterName' will result in the cmdlet returning the selected cmdlet parameter value.
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public string Select { get; set; } = "StackId";
#endregion
#region Parameter PassThru
/// <summary>
/// Changes the cmdlet behavior to return the value passed to the StackName parameter.
/// The -PassThru parameter is deprecated, use -Select '^StackName' instead. This parameter will be removed in a future version.
/// </summary>
[System.Obsolete("The -PassThru parameter is deprecated, use -Select '^StackName' instead. This parameter will be removed in a future version.")]
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public SwitchParameter PassThru { get; set; }
#endregion
#region Parameter Force
/// <summary>
/// This parameter overrides confirmation prompts to force
/// the cmdlet to continue its operation. This parameter should always
/// be used with caution.
/// </summary>
[System.Management.Automation.Parameter(ValueFromPipelineByPropertyName = true)]
public SwitchParameter Force { get; set; }
#endregion
protected override void ProcessRecord()
{
base.ProcessRecord();
var resourceIdentifiersText = FormatParameterValuesForConfirmationMsg(nameof(this.StackName), MyInvocation.BoundParameters);
if (!ConfirmShouldProceed(this.Force.IsPresent, resourceIdentifiersText, "Update-CFNStack (UpdateStack)"))
{
return;
}
var context = new CmdletContext();
// allow for manipulation of parameters prior to loading into context
PreExecutionContextLoad(context);
#pragma warning disable CS0618, CS0612 //A class member was marked with the Obsolete attribute
if (ParameterWasBound(nameof(this.Select)))
{
context.Select = CreateSelectDelegate<Amazon.CloudFormation.Model.UpdateStackResponse, UpdateCFNStackCmdlet>(Select) ??
throw new System.ArgumentException("Invalid value for -Select parameter.", nameof(this.Select));
if (this.PassThru.IsPresent)
{
throw new System.ArgumentException("-PassThru cannot be used when -Select is specified.", nameof(this.Select));
}
}
else if (this.PassThru.IsPresent)
{
context.Select = (response, cmdlet) => this.StackName;
}
#pragma warning restore CS0618, CS0612 //A class member was marked with the Obsolete attribute
if (this.Capability != null)
{
context.Capability = new List<System.String>(this.Capability);
}
context.ClientRequestToken = this.ClientRequestToken;
if (this.NotificationARNs != null)
{
context.NotificationARNs = new List<System.String>(this.NotificationARNs);
}
if (this.Parameter != null)
{
context.Parameter = new List<Amazon.CloudFormation.Model.Parameter>(this.Parameter);
}
if (this.ResourceType != null)
{
context.ResourceType = new List<System.String>(this.ResourceType);
}
context.RoleARN = this.RoleARN;
context.RollbackConfiguration_MonitoringTimeInMinute = this.RollbackConfiguration_MonitoringTimeInMinute;
if (this.RollbackConfiguration_RollbackTrigger != null)
{
context.RollbackConfiguration_RollbackTrigger = new List<Amazon.CloudFormation.Model.RollbackTrigger>(this.RollbackConfiguration_RollbackTrigger);
}
context.StackName = this.StackName;
#if MODULAR
if (this.StackName == null && ParameterWasBound(nameof(this.StackName)))
{
WriteWarning("You are passing $null as a value for parameter StackName which is marked as required. In case you believe this parameter was incorrectly marked as required, report this by opening an issue at https://github.com/aws/aws-tools-for-powershell/issues.");
}
#endif
context.StackPolicyBody = this.StackPolicyBody;
context.StackPolicyDuringUpdateBody = this.StackPolicyDuringUpdateBody;
context.StackPolicyDuringUpdateURL = this.StackPolicyDuringUpdateURL;
context.StackPolicyURL = this.StackPolicyURL;
if (this.Tag != null)
{
context.Tag = new List<Amazon.CloudFormation.Model.Tag>(this.Tag);
}
context.TemplateBody = this.TemplateBody;
context.TemplateURL = this.TemplateURL;
context.UsePreviousTemplate = this.UsePreviousTemplate;
// allow further manipulation of loaded context prior to processing
PostExecutionContextLoad(context);
var output = Execute(context) as CmdletOutput;
ProcessOutput(output);
}
#region IExecutor Members
public object Execute(ExecutorContext context)
{
var cmdletContext = context as CmdletContext;
// create request
var request = new Amazon.CloudFormation.Model.UpdateStackRequest();
if (cmdletContext.Capability != null)
{
request.Capabilities = cmdletContext.Capability;
}
if (cmdletContext.ClientRequestToken != null)
{
request.ClientRequestToken = cmdletContext.ClientRequestToken;
}
if (cmdletContext.NotificationARNs != null)
{
request.NotificationARNs = cmdletContext.NotificationARNs;
}
if (cmdletContext.Parameter != null)
{
request.Parameters = cmdletContext.Parameter;
}
if (cmdletContext.ResourceType != null)
{
request.ResourceTypes = cmdletContext.ResourceType;
}
if (cmdletContext.RoleARN != null)
{
request.RoleARN = cmdletContext.RoleARN;
}
// populate RollbackConfiguration
var requestRollbackConfigurationIsNull = true;
request.RollbackConfiguration = new Amazon.CloudFormation.Model.RollbackConfiguration();
System.Int32? requestRollbackConfiguration_rollbackConfiguration_MonitoringTimeInMinute = null;
if (cmdletContext.RollbackConfiguration_MonitoringTimeInMinute != null)
{
requestRollbackConfiguration_rollbackConfiguration_MonitoringTimeInMinute = cmdletContext.RollbackConfiguration_MonitoringTimeInMinute.Value;
}
if (requestRollbackConfiguration_rollbackConfiguration_MonitoringTimeInMinute != null)
{
request.RollbackConfiguration.MonitoringTimeInMinutes = requestRollbackConfiguration_rollbackConfiguration_MonitoringTimeInMinute.Value;
requestRollbackConfigurationIsNull = false;
}
List<Amazon.CloudFormation.Model.RollbackTrigger> requestRollbackConfiguration_rollbackConfiguration_RollbackTrigger = null;
if (cmdletContext.RollbackConfiguration_RollbackTrigger != null)
{
requestRollbackConfiguration_rollbackConfiguration_RollbackTrigger = cmdletContext.RollbackConfiguration_RollbackTrigger;
}
if (requestRollbackConfiguration_rollbackConfiguration_RollbackTrigger != null)
{
request.RollbackConfiguration.RollbackTriggers = requestRollbackConfiguration_rollbackConfiguration_RollbackTrigger;
requestRollbackConfigurationIsNull = false;
}
// determine if request.RollbackConfiguration should be set to null
if (requestRollbackConfigurationIsNull)
{
request.RollbackConfiguration = null;
}
if (cmdletContext.StackName != null)
{
request.StackName = cmdletContext.StackName;
}
if (cmdletContext.StackPolicyBody != null)
{
request.StackPolicyBody = cmdletContext.StackPolicyBody;
}
if (cmdletContext.StackPolicyDuringUpdateBody != null)
{
request.StackPolicyDuringUpdateBody = cmdletContext.StackPolicyDuringUpdateBody;
}
if (cmdletContext.StackPolicyDuringUpdateURL != null)
{
request.StackPolicyDuringUpdateURL = cmdletContext.StackPolicyDuringUpdateURL;
}
if (cmdletContext.StackPolicyURL != null)
{
request.StackPolicyURL = cmdletContext.StackPolicyURL;
}
if (cmdletContext.Tag != null)
{
request.Tags = cmdletContext.Tag;
}
if (cmdletContext.TemplateBody != null)
{
request.TemplateBody = cmdletContext.TemplateBody;
}
if (cmdletContext.TemplateURL != null)
{
request.TemplateURL = cmdletContext.TemplateURL;
}
if (cmdletContext.UsePreviousTemplate != null)
{
request.UsePreviousTemplate = cmdletContext.UsePreviousTemplate.Value;
}
CmdletOutput output;
// issue call
var client = Client ?? CreateClient(_CurrentCredentials, _RegionEndpoint);
try
{
var response = CallAWSServiceOperation(client, request);
object pipelineOutput = null;
pipelineOutput = cmdletContext.Select(response, this);
output = new CmdletOutput
{
PipelineOutput = pipelineOutput,
ServiceResponse = response
};
}
catch (Exception e)
{
output = new CmdletOutput { ErrorResponse = e };
}
return output;
}
public ExecutorContext CreateContext()
{
return new CmdletContext();
}
#endregion
#region AWS Service Operation Call
private Amazon.CloudFormation.Model.UpdateStackResponse CallAWSServiceOperation(IAmazonCloudFormation client, Amazon.CloudFormation.Model.UpdateStackRequest request)
{
Utils.Common.WriteVerboseEndpointMessage(this, client.Config, "AWS CloudFormation", "UpdateStack");
try
{
#if DESKTOP
return client.UpdateStack(request);
#elif CORECLR
return client.UpdateStackAsync(request).GetAwaiter().GetResult();
#else
#error "Unknown build edition"
#endif
}
catch (AmazonServiceException exc)
{
var webException = exc.InnerException as System.Net.WebException;
if (webException != null)
{
throw new Exception(Utils.Common.FormatNameResolutionFailureMessage(client.Config, webException.Message), webException);
}
throw;
}
}
#endregion
internal partial class CmdletContext : ExecutorContext
{
public List<System.String> Capability { get; set; }
public System.String ClientRequestToken { get; set; }
public List<System.String> NotificationARNs { get; set; }
public List<Amazon.CloudFormation.Model.Parameter> Parameter { get; set; }
public List<System.String> ResourceType { get; set; }
public System.String RoleARN { get; set; }
public System.Int32? RollbackConfiguration_MonitoringTimeInMinute { get; set; }
public List<Amazon.CloudFormation.Model.RollbackTrigger> RollbackConfiguration_RollbackTrigger { get; set; }
public System.String StackName { get; set; }
public System.String StackPolicyBody { get; set; }
public System.String StackPolicyDuringUpdateBody { get; set; }
public System.String StackPolicyDuringUpdateURL { get; set; }
public System.String StackPolicyURL { get; set; }
public List<Amazon.CloudFormation.Model.Tag> Tag { get; set; }
public System.String TemplateBody { get; set; }
public System.String TemplateURL { get; set; }
public System.Boolean? UsePreviousTemplate { get; set; }
public System.Func<Amazon.CloudFormation.Model.UpdateStackResponse, UpdateCFNStackCmdlet, object> Select { get; set; } =
(response, cmdlet) => response.StackId;
}
}
}
|
//
// YLController.h
// MacBlueTelnet
//
// Created by Yung-Luen Lan on 9/11/07.
// Copyright 2007 yllan.org. All rights reserved.
//
#import <Cocoa/Cocoa.h>
#import "WLSitesPanelController.h"
#define scrollTimerInterval 0.12
@class WLTabView;
@class WLFeedGenerator;
@class WLTabBarControl;
@class WLPresentationController;
@class RemoteControl;
@class MultiClickRemoteBehavior;
#if MAC_OS_X_VERSION_MAX_ALLOWED <= MAC_OS_X_VERSION_10_5
@protocol NSTabViewDelegate
@end
#endif
@interface WLMainFrameController : NSObject <NSTabViewDelegate, WLSitesObserver> {
/* composeWindow */
IBOutlet NSTextView *_composeText;
IBOutlet NSPanel *_composeWindow;
IBOutlet NSWindow *_mainWindow;
IBOutlet NSPanel *_messageWindow;
IBOutlet id _addressBar;
IBOutlet id _detectDoubleByteButton;
IBOutlet id _autoReplyButton;
IBOutlet id _mouseButton;
IBOutlet WLTabView *_tabView;
IBOutlet WLTabBarControl *_tabBarControl;
/* Menus */
IBOutlet NSMenuItem *_detectDoubleByteMenuItem;
IBOutlet NSMenuItem *_closeWindowMenuItem;
IBOutlet NSMenuItem *_closeTabMenuItem;
IBOutlet NSMenuItem *_autoReplyMenuItem;
IBOutlet NSMenuItem *_showHiddenTextMenuItem;
IBOutlet NSMenuItem *_encodingMenuItem;
IBOutlet NSMenuItem *_presentationModeMenuItem;
IBOutlet NSMenuItem *_sitesMenu;
/* Message */
IBOutlet NSTextView *_unreadMessageTextView;
// Remote Control
RemoteControl *_remoteControl;
MultiClickRemoteBehavior *_remoteControlBehavior;
NSTimer* _scrollTimer;
// Full Screen
WLPresentationController *_presentationModeController;
// RSS feed
NSThread *_rssThread;
// 10.7 Full Screen
@private
NSRect _originalFrame;
NSRect _originalMainFrame;
CGFloat _screenRatio;
NSColor *_originalWindowBackgroundColor;
NSDictionary *_originalSizeParameters;
}
@property (readonly) WLTabView *tabView;
+ (WLMainFrameController *)sharedInstance;
- (IBAction)toggleAutoReply:(id)sender;
- (IBAction)toggleMouseAction:(id)sender;
- (IBAction)connectLocation:(id)sender;
- (IBAction)openLocation:(id)sender;
- (IBAction)reconnect:(id)sender;
- (IBAction)openPreferencesWindow:(id)sender;
- (void)newConnectionWithSite:(WLSite *)site;
- (IBAction)openSitePanel:(id)sender;
- (IBAction)addCurrentSite:(id)sender;
- (IBAction)openEmoticonsPanel:(id)sender;
- (IBAction)openComposePanel:(id)sender;
- (IBAction)downloadPost:(id)sender;
// Message
- (IBAction)closeMessageWindow:(id)sender;
#pragma mark -
#pragma mark Menu:View
- (IBAction)toggleShowsHiddenText:(id)sender;
- (IBAction)toggleDetectDoubleByte:(id)sender;
- (IBAction)increaseFontSize:(id)sender;
- (IBAction)decreaseFontSize:(id)sender;
- (IBAction)togglePresentationMode:(id)sender;
- (IBAction)setEncoding:(id)sender;
/*
// for portal
- (IBAction)browseImage:(id)sender;
- (IBAction)removeSiteImage:(id)sender;
- (void)openPanelDidEnd:(NSOpenPanel *)sheet
returnCode:(int)returnCode
contextInfo:(void *)contextInfo;
*/
// for resotre
- (IBAction)restoreSettings:(id)sender;
// for RSS feed
- (IBAction)openRSS:(id)sender;
@end
|
The 2015 BMW X4's odd design may narrow its appeal, but it holds up the BMW reputation for excellent handling, and its dashboard electronics include the widest range of connected features in the business.
The usefulness of connected features outweighs their hodgepodge organization in the 2014 BMW X5 xDrive35i, and the mediocre fuel economy might be a price worth paying for the excellent driving dynamics.
The 2014 BMW M6 Gran Coupe requires real skill to enjoy the extent of its capabilities, but its performance is exhilarating, while advanced cabin electronics help the driver under more sedate driving conditions.
|
Metal Score Project
Delete this if the idea has been stated elsewhere. The idea is to transcribe a selection of high quality death and black metal songs, preferably ones with complex chord variations (Close to a World Below? Obscura? Battle's Clarion?), onto musical scores and have them be played out, note for note, either by synthesizer or a few solo instrumentalists. The idea is to turn smart people onto metal when they would otherwise be disgusted by such a "noisy" and chaotic artform. I've met too many people that said, "oh well if only there wasn't growling or blastbeats". This would be a non-profit project, one that would require the dedication of a few musically literate individuals. I'm a little sketchy in the sheet music department, but how hard could it be to learn? I fully realize that in doing this, it'd be taking away what made the metal releases great which is why this project is in no way an attempt to create a new genre of music, just a good way to demonstrate and explore metal's ambitious and pensive musical properties.
This program looks amazing. I'll try to track it down on bittorrent, I suppose, but right now I'm using a computer that can only boot in safe mode which means no sound or midi. 300 dollars for a computer program, for a product that doesn't even physically exist. I suppose one day if they find a way to simulate sensory experiences for all 5 senses, software developers will have their career set for life.
Crack v2.0, comes with more realistic, burning plastic smoke taste!
But yeah, the MIDI controller should be no problem, but I never had any intention of actually playing the songs in real time on a keyboard. I feel as though repairing the wing of an F-16 fighter jet would be less difficult, for lack of a better metaphor.
I haven't done any scorewriting myself yet, but I do know that there's an alternative to programs like Finale or Sibelius. LilyPond, definitely not as user friendly as those proprietary softwares, but it gets the work done and the result is like very high quality music engraving. If you're familiar with LaTeX, LilyPond is like its equivalent for score writing.
At the end of the day, I guess it doesn't really matter what you decide do write them with, but it's an option that you could look into.
Guitar Pro automatically transcribes tabs to scores, also it plays the entire song on midi instrument imitations, but it sounds like shit from what I know.Close to a World Below would be interesting, At the Gates - Primal Breath?
MIDI controllers are not that much more helpful than knowing the hotkeys. I would save your money.
I don't think metal is complex/specialized enough to need notation yet, but I guess it would be an interesting project for archival purposes. Just make sure you don't suck at aural dictation, so we don't get a situation like what happened with "The Real Book", where half the songs contain blatant errors because the kids at Berklee who did the transcriptions didn't know what the fuck they were doing.
If you want to actually buy the program, Guitar Pro is only $50. However, Finale has superior sounding virtual instruments.
Guitar Pro might be a good start to this project. I'm definitely not looking for quality virtual sound, simple MIDI effects will work fine, as long as every note that the stringed instruments are playing are represented at equal volume, all with the same effect so it sounds as if it's all being played on one big keyboard. The broad range of tones all being played at once will all be heard, even by people who claim that even the best metal is just noise, people that have no experience to the genre but are still drawn to ambient and classical. I have no doubt that the final product will be something that resembles ambient.
I did this one just for starters, hopefully i can work on more complicated pieces of music
Somewhat of a rough draft
The rhythms need work, and at times certain melodies are obscured, though you probably realized it yourself. However, good initiative in actually doing it. I'd give it another go over before working on anything else personally. Your orchestration of this however, does certainly lend credence to the idea that this piece might actually go very well into non-metal instrumentation.
|
How can remove/uninstall the Norton Antivirus trial that was loaded into my new Toshiba Vista
laptop by Toshiba, but was never activated or used by me? There’s no uninstall program in add or remove programs.
Isn’t that tricky of Norton? They want to make it as hard as they can for you to remove their program. Especially if you don’t want/need it! Fortunately there is a relatively painless way to remove the program. Norton does give you a way to remove it’s programs from your computer. Basically it’s an uninstaller but they don’t include it with the program. Weird huh?
You can download the uninstaller here. Then just run it and follow the prompt and Norton will be gone!
|
/*
* Copyright 2011-2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://aws.amazon.com/apache2.0
*
* This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES
* OR CONDITIONS OF ANY KIND, either express or implied. See the
* License for the specific language governing permissions and
* limitations under the License.
*/
package com.amazonaws.services.s3.model.analytics;
import java.io.Serializable;
/**
* The StorageClassAnalysisDataExport class.
*/
public class StorageClassAnalysisDataExport implements Serializable {
private String outputSchemaVersion;
private AnalyticsExportDestination destination;
/**
* Sets the version of the output schema to use when exporting data.
* @param outputSchemaVersion the output schema version.
*/
public void setOutputSchemaVersion(StorageClassAnalysisSchemaVersion outputSchemaVersion) {
if (outputSchemaVersion == null) {
setOutputSchemaVersion((String) null);
} else {
setOutputSchemaVersion(outputSchemaVersion.toString());
}
}
/**
* Sets the version of the output schema to use when exporting data.
* @param outputSchemaVersion the output schema version.
* @return this object for method chaining.
*/
@SuppressWarnings("checkstyle:hiddenfield")
public StorageClassAnalysisDataExport withOutputSchemaVersion(StorageClassAnalysisSchemaVersion outputSchemaVersion) {
setOutputSchemaVersion(outputSchemaVersion);
return this;
}
/**
* @return the version of the output schema to use when exporting data.
*/
public String getOutputSchemaVersion() {
return outputSchemaVersion;
}
/**
* Sets the version of the output schema to use when exporting data.
* @param outputSchemaVersion the output schema version.
*/
public void setOutputSchemaVersion(String outputSchemaVersion) {
this.outputSchemaVersion = outputSchemaVersion;
}
/**
* Sets the version of the output schema to use when exporting data
* @param outputSchemaVersion the output schema version.
* @return this object for method chaining.
*/
@SuppressWarnings("checkstyle:hiddenfield")
public StorageClassAnalysisDataExport withOutputSchemaVersion(String outputSchemaVersion) {
setOutputSchemaVersion(outputSchemaVersion);
return this;
}
/**
* @return the place to store the data for an analysis.
*/
public AnalyticsExportDestination getDestination() {
return destination;
}
/**
* Sets the place to store the data for an analysis.
* @param destination the destination to store the data.
*/
public void setDestination(AnalyticsExportDestination destination) {
this.destination = destination;
}
/**
* Sets the place to store the data for an analysis
* @param destination the destination to store the data.
* @return this object for method chaining.
*/
@SuppressWarnings("checkstyle:hiddenfield")
public StorageClassAnalysisDataExport withDestination(AnalyticsExportDestination destination) {
setDestination(destination);
return this;
}
}
|
July 26, 2004
Outfoxed and Glick
Julie came over this weekend and we all watched “Outfoxed.” It’s got some pretty amazing moments, and it pulls some of the worst biased FOX activities all together. However, you can just watch about 10 minutes of Fox News and come to the same conclusions if you’re paying attention.
The most dramatic portion of the film was when O’Reilly (the wanker) had Jeremy Glick on his show. A 9/11 family member after having lost his father, O’Reilly proceeded to verbally abuse the boy because Glick took him to task for using the memory of his father and so many others. And also because O’Reilly simply disagreed with him.
Well, if you want to read about it, here’s Lawrence Lessig’s recent appeal to O’Reilly to come to his senses, as O’Reilly continues to plumb the depths of conservative media inanity:
Isn't it horrifying? The way he treated Glick in person was bad enough. But if I hadn't read Al Franken's book, I would never have been prepared for O'Reilly's ever-morphing description of the encounter afterwards.
"A child with a history of chronic lying should be seen by a counselor, child-guidance clinic or a mental-health professional. Chronic liars often have had difficulty establishing a true conscience that can clearly differentiate between right and wrong. These children also may be crying out for help because of disturbances in their family life or outside the home."
An intervention would be nice. Let's start with those "Fox and Friends" drones.
Musing on "O'Reilly-like behavior" -- I think I have a new phrase to express the particular combination of belligerence, arrogance, ignorance, and distortion that Fox espouses onscreen and, sadly, encourages in its viewers.
We'll start seeing this pop up on drug warning labels and in drug commercials. And on TVs tuned to Fox.
"WARNING: May induce O'Reilly-like behavior. Symptoms may include sputtering, cutting people off, telling people to 'shut up' shouting, an inability to separate fact from fiction, facial blotchiness, and a fear of other people's views."
|
Some of nature's courtship rituals are elaborate, others rather discrete. For instance the male woodcock -- an odd-looking, fist-sized bird with an outlandish 2-inch-long bill -- performs his ceremony under the cover of darkness. It's called the "Sky Dance."
The woodcock is normally a reclusive bird, it's cryptic coloration blending perfectly with the leafy forest floor. During courtship, however, the male woodcock attempts to become obvious to a female.
It's April and the stage is set. The curtain goes up at dusk, and although the Sky Dance is rated X, general audiences are admitted.
Sky Dance could be playing in your back yard, yet you may be unaware. The show starts at 20 minutes after sunset when, to a woodcock, the light is a romantic "just so.'' Don't worry about finding a seat. Sky Dance has been playing for eons, yet the theaters remain nearly audience-free.
Woodcock prefer a clear, calm, warm evening for lovemaking, and those are also the best conditions for viewing. According to some, at exactly 22 minutes after sunset, or when the light level reaches .05 foot-candles, the male woodcock flies to his stage. Personally, I have found the timing to be less precise, but courtship activity does begin nearly on that schedule. The stage can be any opening or field edge in typical woodcock habitat. Because woodcock feed primarily on earthworms, they prefer lowlands that are damp but not wet, in a mix of young alder, willow and aspen. A barren log landing in an eight- to 10-year-old aspen clear-cut is an ideal woodcock courtship site.
Bill Marchel, Special to the Star Tribune
About 20 minutes after sunset a male woodcock flys to an opening in a new growth forest. There he will perform his springtime courstship ritual, often called the Sky Dance.
A few years ago I amazed a friend when I took him to see the Sky Dance in a tiny clearing among aspen trees just a stone's throw from my home near Brainerd. On previous evenings I had photographed a male woodcock that used the opening as his stage.
We had arrived a bit early, and I took the time to explain to my friend the woodcock's courtship ritual and what he could expect to witness. At about 20 minutes after sunset I told my friend we needed to be quiet, that a woodcock will fly in any minute. Shortly, the plump little bird appeared, flying like a giant bat silhouetted against the darkening sky. It landed within 10 feet of us.
"Do you have that bird trained?" my friend later asked.
On spring evenings, when the light is right, the male woodcock will fly out of obscurity and alight at his predetermined stage. Upon arriving, the woodcock begins to call, emitting a throaty peent every three or four seconds. Each peent is preceded by a hiccup-like sound, although oddly, the strange call is inaudible to some humans. After a few peents in one direction, the bird pivots roughly 90 degrees and calls in a new direction, and so on until after a minute or so he has declared in all directions his affections to females, and warnings to other males.
Then without signal, he takes flight. As he leaves his stage, the woodcock can be seen silhouetted against the western sky as it flies low, parallel to the ground for a distance before rising in wide arcs. His circles become steeper and smaller until he is hundreds of feet high. During his flight, the bird emits a musical twitter as air rushes through odd-shaped primary wing feathers. Upon reaching its peak, the sky dancer hovers momentarily before pitching toward Earth on folded wings. Slipping sideways as it tumbles down, the bird alternately dives and then checks its fall, all the while uttering a melodic tune as it plummets earthward, returning to roughly the spot where the performance began.
The entire ritual is repeated again and again for about 45 minutes, at which point the act can be followed only by ear, the overhead sky being too dark to see even a silhouette.
Before daybreak, when again the light is just right, the performance is repeated.
During the ritual, if a male successfully attracts a female, they will mate. Subsequently, she will nest and raise the young on her own; a typical woodcock nest holds four eggs.
Somehow it seems fitting a bird as secretive as a woodcock would use the cover of darkness for its spectacular display.
Male woodcock begin courting in late March or early April and continue through mid-May, sometimes even into June.
Among birders, few avian courtship rituals rate as highly.
Bill Marchel is a wildlife photographer and outdoors columnist. He lives near Brainerd, Minn.
|
/*
* This library is part of OpenCms -
* the Open Source Content Management System
*
* Copyright (c) Alkacon Software GmbH & Co. KG (http://www.alkacon.com)
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* For further information about Alkacon Software GmbH & Co. KG, please see the
* company website: http://www.alkacon.com
*
* For further information about OpenCms, please see the
* project website: http://www.opencms.org
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
package org.opencms.workplace.tools.searchindex;
import org.opencms.configuration.CmsSearchConfiguration;
import org.opencms.i18n.CmsMessageContainer;
import org.opencms.jsp.CmsJspActionElement;
import org.opencms.main.CmsLog;
import org.opencms.main.OpenCms;
import org.opencms.search.CmsSearchManager;
import org.opencms.search.fields.CmsLuceneField;
import org.opencms.search.fields.CmsSearchField;
import org.opencms.search.fields.CmsSearchFieldMapping;
import org.opencms.search.fields.I_CmsSearchFieldConfiguration;
import org.opencms.search.fields.I_CmsSearchFieldMapping;
import org.opencms.util.CmsStringUtil;
import org.opencms.workplace.list.CmsListColumnAlignEnum;
import org.opencms.workplace.list.CmsListColumnDefinition;
import org.opencms.workplace.list.CmsListDefaultAction;
import org.opencms.workplace.list.CmsListDirectAction;
import org.opencms.workplace.list.CmsListItem;
import org.opencms.workplace.list.CmsListItemDetails;
import org.opencms.workplace.list.CmsListItemDetailsFormatter;
import org.opencms.workplace.list.CmsListMetadata;
import org.opencms.workplace.list.CmsListMultiAction;
import org.opencms.workplace.list.CmsListOrderEnum;
import org.opencms.workplace.tools.CmsToolDialog;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Collections;
import java.util.HashMap;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import javax.servlet.ServletException;
import org.apache.commons.logging.Log;
/**
* A list that displays the fields of a request parameter given
* <code>{@link org.opencms.search.fields.CmsLuceneFieldConfiguration}</code> ("fieldconfiguration").
*
* This list is no stand-alone page but has to be embedded in another dialog
* (see <code> {@link org.opencms.workplace.tools.searchindex.A_CmsEmbeddedListDialog}</code>. <p>
*
* @since 6.5.5
*/
public class CmsFieldsList extends A_CmsEmbeddedListDialog {
/** Standard list button location. */
public static final String ICON_FALSE = "list/multi_deactivate.png";
/** Standard list button location. */
public static final String ICON_TRUE = "list/multi_activate.png";
/** list action id constant. */
public static final String LIST_ACTION_EDIT = "ae";
/** list action id constant. */
public static final String LIST_ACTION_EXCERPT_FALSE = "aef";
/** list action id constant. */
public static final String LIST_ACTION_EXCERPT_TRUE = "aet";
/** list action id constant. */
public static final String LIST_ACTION_INDEX_FALSE = "aif";
/** list action id constant. */
public static final String LIST_ACTION_INDEX_TRUE = "ait";
/** list action id constant. */
public static final String LIST_ACTION_MAPPING = "am";
/** list action id constant. */
public static final String LIST_ACTION_OVERVIEW_FIELD = "aof";
/** list action id constant. */
public static final String LIST_ACTION_STORE_FALSE = "asf";
/** list action id constant. */
public static final String LIST_ACTION_STORE_TRUE = "ast";
/** list column id constant. */
public static final String LIST_COLUMN_BOOST = "cb";
/** list column id constant. */
public static final String LIST_COLUMN_DEFAULT = "cd";
/** list column id constant. */
public static final String LIST_COLUMN_DISPLAY = "cdi";
/** list column id constant. */
public static final String LIST_COLUMN_EDIT = "ced";
/** list column id constant. */
public static final String LIST_COLUMN_EXCERPT = "ce";
/** list column id constant. */
public static final String LIST_COLUMN_EXCERPT_HIDE = "ceh";
/** list column id constant. */
public static final String LIST_COLUMN_ICON = "ci";
/** list column id constant. */
public static final String LIST_COLUMN_INDEX = "cx";
/** list column id constant. */
public static final String LIST_COLUMN_MAPPING = "cm";
/** list column id constant. */
public static final String LIST_COLUMN_NAME = "cn";
/** list column id constant. */
public static final String LIST_COLUMN_STORE = "cs";
/** list column id constant. */
public static final String LIST_COLUMN_STORE_HIDE = "csh";
/** list item detail id constant. */
public static final String LIST_DETAIL_FIELD = "df";
/** list id constant. */
public static final String LIST_ID = "lsfcf";
/** list action id constant. */
public static final String LIST_MACTION_DELETEFIELD = "mad";
/** The path to the fieldconfiguration list icon. */
protected static final String LIST_ICON_FIELD_EDIT = "tools/searchindex/icons/small/fieldconfiguration-editfield.png";
/** The log object for this class. */
private static final Log LOG = CmsLog.getLog(CmsFieldsList.class);
/** Stores the value of the request parameter for the search index source name. */
private String m_paramFieldconfiguration;
/**
* Public constructor.<p>
*
* @param jsp an initialized JSP action element
*/
public CmsFieldsList(CmsJspActionElement jsp) {
this(jsp, LIST_ID, Messages.get().container(Messages.GUI_LIST_FIELDS_NAME_0));
}
/**
* Public constructor.<p>
*
* @param jsp an initialized JSP action element
* @param listId the id of the list
* @param listName the list name
*/
public CmsFieldsList(CmsJspActionElement jsp, String listId, CmsMessageContainer listName) {
this(jsp, listId, listName, LIST_COLUMN_NAME, CmsListOrderEnum.ORDER_ASCENDING, null);
}
/**
* Public constructor.<p>
*
* @param jsp an initialized JSP action element
* @param listId the id of the displayed list
* @param listName the name of the list
* @param sortedColId the a priory sorted column
* @param sortOrder the order of the sorted column
* @param searchableColId the column to search into
*/
public CmsFieldsList(
CmsJspActionElement jsp,
String listId,
CmsMessageContainer listName,
String sortedColId,
CmsListOrderEnum sortOrder,
String searchableColId) {
super(jsp, listId, listName, sortedColId, sortOrder, searchableColId);
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#executeListMultiActions()
*/
@Override
public void executeListMultiActions() {
CmsSearchManager searchManager = OpenCms.getSearchManager();
if (getParamListAction().equals(LIST_MACTION_DELETEFIELD)) {
// execute the delete multiaction
Iterator<CmsListItem> itItems = getSelectedItems().iterator();
CmsListItem listItem;
CmsLuceneField field;
List<CmsSearchField> deleteFields = new ArrayList<CmsSearchField>();
List<CmsSearchField> fields = searchManager.getFieldConfiguration(m_paramFieldconfiguration).getFields();
Iterator<CmsSearchField> itFields;
while (itItems.hasNext()) {
listItem = itItems.next();
itFields = fields.iterator();
while (itFields.hasNext()) {
String item = (String)listItem.get(LIST_COLUMN_NAME);
CmsLuceneField curField = (CmsLuceneField)itFields.next();
String fieldName = curField.getName();
if (item.equals(fieldName)) {
deleteFields.add(curField);
}
}
}
itFields = deleteFields.iterator();
while (itFields.hasNext()) {
field = (CmsLuceneField)itFields.next();
searchManager.removeSearchFieldConfigurationField(
searchManager.getFieldConfiguration(m_paramFieldconfiguration),
field);
}
refreshList();
if (checkWriteConfiguration(fields)) {
writeConfiguration(false);
}
}
listSave();
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#executeListSingleActions()
*/
@Override
public void executeListSingleActions() throws ServletException, IOException {
String field = getSelectedItem().getId();
Map<String, String[]> params = new HashMap<String, String[]>();
String action = getParamListAction();
I_CmsSearchFieldConfiguration fieldConfig = OpenCms.getSearchManager().getFieldConfiguration(
m_paramFieldconfiguration);
Iterator<CmsSearchField> itFields = fieldConfig.getFields().iterator();
CmsLuceneField fieldObject = null;
while (itFields.hasNext()) {
CmsLuceneField curField = (CmsLuceneField)itFields.next();
if (curField.getName().equals(field)) {
fieldObject = curField;
}
}
params.put(A_CmsFieldDialog.PARAM_FIELD, new String[] {field});
params.put(A_CmsFieldDialog.PARAM_FIELDCONFIGURATION, new String[] {m_paramFieldconfiguration});
params.put(PARAM_ACTION, new String[] {DIALOG_INITIAL});
params.put(PARAM_STYLE, new String[] {CmsToolDialog.STYLE_NEW});
if (action.equals(LIST_ACTION_EDIT)) {
// forward to the edit indexsource screen
getToolManager().jspForwardTool(
this,
"/searchindex/fieldconfigurations/fieldconfiguration/field/edit",
params);
} else if (action.equals(LIST_ACTION_MAPPING)) {
// forward to the new mapping screen
getToolManager().jspForwardTool(
this,
"/searchindex/fieldconfigurations/fieldconfiguration/field/newmapping",
params);
} else if (action.equals(LIST_ACTION_OVERVIEW_FIELD)) {
// forward to the field configuration overview screen
getToolManager().jspForwardTool(this, "/searchindex/fieldconfigurations/fieldconfiguration/field", params);
} else if (action.equals(LIST_ACTION_EXCERPT_FALSE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setInExcerpt(true);
writeConfiguration(true);
}
} else if (action.equals(LIST_ACTION_INDEX_FALSE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setIndexed(true);
writeConfiguration(true);
}
} else if (action.equals(LIST_ACTION_STORE_FALSE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setStored(true);
writeConfiguration(true);
}
} else if (action.equals(LIST_ACTION_EXCERPT_TRUE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setInExcerpt(false);
writeConfiguration(true);
}
} else if (action.equals(LIST_ACTION_INDEX_TRUE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setIndexed(false);
writeConfiguration(true);
}
} else if (action.equals(LIST_ACTION_STORE_TRUE)) {
// execute the excerpt false action
if (fieldObject != null) {
fieldObject.setStored(false);
writeConfiguration(true);
}
}
listSave();
}
/**
* Returns the request parameter "fieldconfiguration".<p>
*
* @return the request parameter "fieldconfiguration"
*/
public String getParamFieldconfiguration() {
return m_paramFieldconfiguration;
}
/**
* Sets the request parameter "fieldconfiguration". <p>
*
* Method intended for workplace-properietary automatic filling of
* request parameter values to dialogs, not for manual invocation. <p>
*
* @param fieldconfiguration the request parameter "fieldconfiguration" to set
*/
public void setParamFieldconfiguration(String fieldconfiguration) {
m_paramFieldconfiguration = fieldconfiguration;
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#fillDetails(java.lang.String)
*/
@Override
protected void fillDetails(String detailId) {
// get content
List<CmsListItem> items = getList().getAllContent();
Iterator<CmsListItem> itItems = items.iterator();
CmsListItem item;
while (itItems.hasNext()) {
item = itItems.next();
if (detailId.equals(LIST_DETAIL_FIELD)) {
fillDetailField(item, detailId);
}
}
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#getListItems()
*/
@Override
protected List<CmsListItem> getListItems() {
List<CmsListItem> result = new ArrayList<CmsListItem>();
// get content
List<CmsSearchField> fields = getFields();
Iterator<CmsSearchField> itFields = fields.iterator();
CmsLuceneField field;
while (itFields.hasNext()) {
field = (CmsLuceneField)itFields.next();
CmsListItem item = getList().newItem(field.getName());
String defaultValue = field.getDefaultValue();
if (defaultValue == null) {
defaultValue = "-";
}
item.set(LIST_COLUMN_NAME, field.getName());
item.set(LIST_COLUMN_DISPLAY, resolveMacros(field.getDisplayName()));
item.set(LIST_COLUMN_INDEX, field.getIndexed());
item.set(LIST_COLUMN_EXCERPT_HIDE, Boolean.valueOf(field.isInExcerpt()));
item.set(LIST_COLUMN_STORE_HIDE, Boolean.valueOf(field.isStored()));
item.set(LIST_COLUMN_DEFAULT, defaultValue);
result.add(item);
}
return result;
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#setColumns(org.opencms.workplace.list.CmsListMetadata)
*/
@Override
protected void setColumns(CmsListMetadata metadata) {
// create column for edit
CmsListColumnDefinition editCol = new CmsListColumnDefinition(LIST_COLUMN_EDIT);
editCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_EDIT_NAME_0));
editCol.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_COL_EDIT_NAME_HELP_0));
editCol.setWidth("20");
editCol.setAlign(CmsListColumnAlignEnum.ALIGN_LEFT);
editCol.setSorteable(false);
// add dummy icon
CmsListDirectAction editAction = new CmsListDirectAction(LIST_ACTION_EDIT);
editAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_EDIT_NAME_0));
editAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_COL_EDIT_NAME_HELP_0));
editAction.setIconPath(LIST_ICON_FIELD_EDIT);
editCol.addDirectAction(editAction);
// add it to the list definition
metadata.addColumn(editCol);
// create column for new mapping
CmsListColumnDefinition mappingCol = new CmsListColumnDefinition(LIST_COLUMN_MAPPING);
mappingCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_MAPPING_0));
mappingCol.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_COL_MAPPING_HELP_0));
mappingCol.setWidth("20");
mappingCol.setAlign(CmsListColumnAlignEnum.ALIGN_LEFT);
mappingCol.setSorteable(false);
// add mapping action
CmsListDirectAction mappingAction = new CmsListDirectAction(LIST_ACTION_MAPPING);
mappingAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_MAPPING_0));
mappingAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_COL_MAPPING_HELP_0));
mappingAction.setIconPath(ICON_ADD);
mappingCol.addDirectAction(mappingAction);
// add it to the list definition
metadata.addColumn(mappingCol);
// add column for name
CmsListColumnDefinition nameCol = new CmsListColumnDefinition(LIST_COLUMN_NAME);
nameCol.setAlign(CmsListColumnAlignEnum.ALIGN_LEFT);
nameCol.setName(Messages.get().container(Messages.GUI_LIST_SEARCHINDEX_COL_NAME_0));
nameCol.setSorteable(true);
nameCol.setWidth("45%");
// add overview action
CmsListDefaultAction overviewAction = new CmsListDefaultAction(LIST_ACTION_OVERVIEW_FIELD);
overviewAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_OVERVIEW_NAME_0));
overviewAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_COL_OVERVIEW_NAME_HELP_0));
nameCol.addDefaultAction(overviewAction);
metadata.addColumn(nameCol);
// add column for display
CmsListColumnDefinition displayCol = new CmsListColumnDefinition(LIST_COLUMN_DISPLAY);
displayCol.setAlign(CmsListColumnAlignEnum.ALIGN_LEFT);
displayCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_DISPLAY_0));
displayCol.setWidth("35%");
metadata.addColumn(displayCol);
// add hide column for store
CmsListColumnDefinition storeHideCol = new CmsListColumnDefinition(LIST_COLUMN_STORE_HIDE);
storeHideCol.setVisible(false);
metadata.addColumn(storeHideCol);
// add hide column for excerpt
CmsListColumnDefinition excerptHideCol = new CmsListColumnDefinition(LIST_COLUMN_EXCERPT_HIDE);
excerptHideCol.setVisible(false);
metadata.addColumn(excerptHideCol);
// add column for store
CmsListColumnDefinition storeCol = new CmsListColumnDefinition(LIST_COLUMN_STORE);
storeCol.setAlign(CmsListColumnAlignEnum.ALIGN_CENTER);
storeCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_STORE_0));
// true action
CmsListDirectAction storeTrueAction = new CmsListDirectAction(LIST_ACTION_STORE_TRUE) {
/**
* @see org.opencms.workplace.tools.A_CmsHtmlIconButton#isVisible()
*/
@Override
public boolean isVisible() {
if (getItem() != null) {
return ((Boolean)getItem().get(LIST_COLUMN_STORE_HIDE)).booleanValue();
}
return super.isVisible();
}
};
storeTrueAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_NAME_0));
storeTrueAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_HELP_0));
storeTrueAction.setConfirmationMessage(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_CONF_0));
storeTrueAction.setIconPath(ICON_TRUE);
// false action
CmsListDirectAction storeFalseAction = new CmsListDirectAction(LIST_ACTION_STORE_FALSE) {
/**
* @see org.opencms.workplace.tools.A_CmsHtmlIconButton#isVisible()
*/
@Override
public boolean isVisible() {
if (getItem() != null) {
return !((Boolean)getItem().get(LIST_COLUMN_STORE_HIDE)).booleanValue();
}
return super.isVisible();
}
};
storeFalseAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_NAME_0));
storeFalseAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_HELP_0));
storeFalseAction.setConfirmationMessage(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_CONF_0));
storeFalseAction.setIconPath(ICON_FALSE);
storeCol.addDirectAction(storeTrueAction);
storeCol.addDirectAction(storeFalseAction);
metadata.addColumn(storeCol);
// add colum for excerpt
CmsListColumnDefinition excerptCol = new CmsListColumnDefinition(LIST_COLUMN_EXCERPT);
excerptCol.setAlign(CmsListColumnAlignEnum.ALIGN_CENTER);
excerptCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_EXCERPT_0));
// true action
CmsListDirectAction excerptTrueAction = new CmsListDirectAction(LIST_ACTION_EXCERPT_TRUE) {
/**
* @see org.opencms.workplace.tools.A_CmsHtmlIconButton#isVisible()
*/
@Override
public boolean isVisible() {
if (getItem() != null) {
return ((Boolean)getItem().get(LIST_COLUMN_EXCERPT_HIDE)).booleanValue();
}
return super.isVisible();
}
};
excerptTrueAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_NAME_0));
excerptTrueAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_HELP_0));
excerptTrueAction.setConfirmationMessage(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_TRUE_CONF_0));
excerptTrueAction.setIconPath(ICON_TRUE);
// false action
CmsListDirectAction excerptFalseAction = new CmsListDirectAction(LIST_ACTION_EXCERPT_FALSE) {
/**
* @see org.opencms.workplace.tools.A_CmsHtmlIconButton#isVisible()
*/
@Override
public boolean isVisible() {
if (getItem() != null) {
return !((Boolean)getItem().get(LIST_COLUMN_EXCERPT_HIDE)).booleanValue();
}
return super.isVisible();
}
};
excerptFalseAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_NAME_0));
excerptFalseAction.setHelpText(Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_HELP_0));
excerptFalseAction.setConfirmationMessage(
Messages.get().container(Messages.GUI_LIST_FIELD_ACTION_FALSE_CONF_0));
excerptFalseAction.setIconPath(ICON_FALSE);
excerptCol.addDirectAction(excerptTrueAction);
excerptCol.addDirectAction(excerptFalseAction);
metadata.addColumn(excerptCol);
// add column for index
CmsListColumnDefinition indexCol = new CmsListColumnDefinition(LIST_COLUMN_INDEX);
indexCol.setAlign(CmsListColumnAlignEnum.ALIGN_CENTER);
indexCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_INDEX_0));
indexCol.setWidth("10%");
metadata.addColumn(indexCol);
// add column for boost
CmsListColumnDefinition boostCol = new CmsListColumnDefinition(LIST_COLUMN_BOOST);
boostCol.setAlign(CmsListColumnAlignEnum.ALIGN_CENTER);
boostCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_BOOST_0));
boostCol.setWidth("5%");
metadata.addColumn(boostCol);
// add column for default
CmsListColumnDefinition defaultCol = new CmsListColumnDefinition(LIST_COLUMN_DEFAULT);
defaultCol.setAlign(CmsListColumnAlignEnum.ALIGN_CENTER);
defaultCol.setName(Messages.get().container(Messages.GUI_LIST_FIELD_COL_DEFAULT_0));
defaultCol.setWidth("5%");
metadata.addColumn(defaultCol);
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#setIndependentActions(org.opencms.workplace.list.CmsListMetadata)
*/
@Override
protected void setIndependentActions(CmsListMetadata metadata) {
// add field configuration details
CmsListItemDetails configDetails = new CmsListItemDetails(LIST_DETAIL_FIELD);
configDetails.setAtColumn(LIST_COLUMN_NAME);
configDetails.setVisible(false);
configDetails.setShowActionName(Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_SHOW_0));
configDetails.setShowActionHelpText(
Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_SHOW_HELP_0));
configDetails.setHideActionName(Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_HIDE_0));
configDetails.setHideActionHelpText(
Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_HIDE_HELP_0));
configDetails.setName(Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_NAME_0));
configDetails.setFormatter(
new CmsListItemDetailsFormatter(Messages.get().container(Messages.GUI_LIST_FIELD_DETAIL_MAPPINGS_NAME_0)));
metadata.addItemDetails(configDetails);
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#setMultiActions(org.opencms.workplace.list.CmsListMetadata)
*/
@Override
protected void setMultiActions(CmsListMetadata metadata) {
// add add multi action
CmsListMultiAction deleteMultiAction = new CmsListMultiAction(LIST_MACTION_DELETEFIELD);
deleteMultiAction.setName(Messages.get().container(Messages.GUI_LIST_FIELD_MACTION_DELETEFIELD_NAME_0));
deleteMultiAction.setHelpText(
Messages.get().container(Messages.GUI_LIST_FIELD_MACTION_DELETEFIELD_NAME_HELP_0));
deleteMultiAction.setConfirmationMessage(
Messages.get().container(Messages.GUI_LIST_FIELD_MACTION_DELETEFIELD_CONF_0));
deleteMultiAction.setIconPath(ICON_MULTI_DELETE);
metadata.addMultiAction(deleteMultiAction);
}
/**
* @see org.opencms.workplace.list.A_CmsListDialog#validateParamaters()
*/
@Override
protected void validateParamaters() throws Exception {
// will throw NPE if something wrong
OpenCms.getSearchManager().getFieldConfiguration(getParamFieldconfiguration()).getFields();
}
/**
* Writes the updated search configuration back to the XML
* configuration file and refreshes the complete list.<p>
*
* @param refresh if true, the list items are refreshed
*/
protected void writeConfiguration(boolean refresh) {
// update the XML configuration
OpenCms.writeConfiguration(CmsSearchConfiguration.class);
if (refresh) {
refreshList();
}
}
/**
* Checks the configuration to write.<p>
*
* @param fields list of fields of the current field configuration
* @return true if configuration is valid, otherwise false
*/
private boolean checkWriteConfiguration(List<CmsSearchField> fields) {
if (fields == null) {
return false;
}
Iterator<CmsSearchField> itFields = fields.iterator();
while (itFields.hasNext()) {
CmsLuceneField curField = (CmsLuceneField)itFields.next();
if (curField.getMappings().isEmpty()) {
return false;
}
}
return true;
}
/**
* Fills details of the field into the given item. <p>
*
* @param item the list item to fill
* @param detailId the id for the detail to fill
*/
private void fillDetailField(CmsListItem item, String detailId) {
StringBuffer html = new StringBuffer();
// search for the corresponding A_CmsSearchIndex:
String idxFieldName = (String)item.get(LIST_COLUMN_NAME);
List<CmsSearchField> fields = OpenCms.getSearchManager().getFieldConfiguration(
m_paramFieldconfiguration).getFields();
Iterator<CmsSearchField> itFields = fields.iterator();
CmsLuceneField idxField = null;
while (itFields.hasNext()) {
CmsLuceneField curField = (CmsLuceneField)itFields.next();
if (curField.getName().equals(idxFieldName)) {
idxField = curField;
}
}
if (idxField != null) {
html.append("<ul>\n");
Iterator<I_CmsSearchFieldMapping> itMappings = idxField.getMappings().iterator();
while (itMappings.hasNext()) {
CmsSearchFieldMapping mapping = (CmsSearchFieldMapping)itMappings.next();
html.append(" <li>\n").append(" ");
html.append(mapping.getType().toString());
if (CmsStringUtil.isNotEmpty(mapping.getParam())) {
html.append("=").append(mapping.getParam()).append("\n");
}
html.append(" </li>");
}
html.append("</ul>\n");
}
item.set(detailId, html.toString());
}
/**
* Returns the configured fields of the current field configuration.
*
* @return the configured fields of the current field configuration
*/
private List<CmsSearchField> getFields() {
CmsSearchManager manager = OpenCms.getSearchManager();
I_CmsSearchFieldConfiguration fieldConfig = manager.getFieldConfiguration(getParamFieldconfiguration());
List<CmsSearchField> result;
if (fieldConfig != null) {
result = fieldConfig.getFields();
} else {
result = Collections.emptyList();
if (LOG.isErrorEnabled()) {
LOG.error(
Messages.get().getBundle().key(
Messages.ERR_SEARCHINDEX_EDIT_MISSING_PARAM_1,
A_CmsFieldConfigurationDialog.PARAM_FIELDCONFIGURATION));
}
}
return result;
}
}
|
Official Ghoul Squad Podcast Color Logo Hoodie
Ghoul Squad Hoodie
This is the official t-shirt of the Ghoul Squad podcast BUT IN GORGEOUS COLOR! From your horror dudes out of New Mexico! Get one for yourself or anyone you have ever come into contact with! GET EVERYONE A COLOR GHOUL SQUAD SHIRT!
|
Genetic Programming: An Introduction (BOK)
Since the early 1990s, genetic programming (GP) - a discipline whose goal is to enable the automatic generation of computer programs - has emerged as one of the most promising paradigms for fast, productive software development. GP combines biological metaphors gleaned from Darwin's theory of evolution with computer-science approaches drawn from the field of machine learning to create programs that are capable of adapting or recreating themselves for open-ended tasks. This unique introduction to GP provides a detailed overview of the subject and its antecedents, with extensive references to the published and online literature. In addition to explaining the fundamental theory and important algorithms, the text includes practical discussions covering a wealth of potential applications and real-world implementation techniques. Software professionals needing to understand and apply GP concepts will find this book an invaluable practical and theoretical guide.
|
Like Big Butts? Try Whootylicious.com’s New ‘Inked Booty’
Big butt-centric gonzo site Whootylicious.com has announced that it has released Inked Booty, the latest title from Creation Of Adam Productions, now on DVD and VOD.
“If you love girls with tattoos and big butts then this movie is for you,” a company representative said. “Our co-directors Adam and Johnny did a fantastic job putting this together on their own, and major studios need to take a look at both of them as the future.”
|
Today was my last day at work, and we are packing up all of our belongings this week and moving ourselves down to hot and humid Texas. Will I miss the mountains? The cool morning air? The snow filled afternoons when I can sit on my couch and sip a warm cup of tea? The simple evenings spent with my family and friends, eating a slice of pie or trying not to devour an entire pan of brownies?
Of course. How can you not miss home?
But Ryan and I are adventurous spirits; we crave newness, experience, a change of pace. Living in Colorado, near the place where I went to middle school and high school, doesn't challenge me enough to provoke the type of growth I crave. This growth most readily occurs when you force yourself to embrace those things that frighten or intimidate you. Even though I've only been out of college for a year and a half, I am nervous to return. Beginning my MFA and hopefully completing a PhD by the time I'm thirty has been a dream that both scares and excites me.
But we will move forward because staying stagnant can result in a life marked with regret.
I know that eventually Ryan and I will settle down. We hope to have one or two children and watch them grow up in a community that can foster our own creativity and encourage our children to explore. But as for now, we will hit the open road, and along our way, we will continue to turn to old friends and family, the people that love and support us no matter where we are.
I am in process of dipping...egg whites and then almonds
One of the people that will remain an integral part of my life and growth is my dear friend Abby. Abby is a talented poet and teacher, a woman that I've grown to love and admire over this past year. She has a wonderful blog that I hope you will take the time to explore. Her poetry is not only brilliant, but accessible, and she can make a mean strawberry jam.
Abby has been delightful enough to provide Ryan and me with homemade jam this summer. We've slathered seasonal varieties on freshly baked bread and in between layers of yellow cake. We've dipped our fingers into the jar to sneak an after dinner sugar rush (naughty, I know). And I've made these delightful jam thumbprint cookies, which have never tasted better.
The shortbread cookie seems simple, but when touched with a burst of lemon and rolled in lightly toasted almonds, it becomes spectacular. Slightly crumbly, very buttery and finished with an almond crunch. But what makes this cookie stand out is the fragrant strawberry jam I was able to dollop in the middle of each pressed bite. After taking one bite, I couldn't help but finish two, then three cookies before I sealed them away in a Zip-loc bag. The flavors of summer were well-kept in these bite-sized treats.
1. Preheat your oven to 350 degrees and line a baking sheet with parchment paper. In the bowl of a mixer fitted with the paddle attachment, beat together butter and 1/2 cup sugar on medium speed until light and fluffy (3 minutes). Add egg yolk, vanilla and lemon juice and beat until well-combined. Whisk together flour and salt in a separate bowl, and add to mixture, beating on low until combined. Allow dough to chill for 30-40 minutes. 2. Combine your finely chopped almonds and 2 TBSP of sugar in a bowl. Stir to combine. In a small bowl, lightly beat egg white. Form your dough into 1-inch balls. Dip each ball into egg white, then in almond-and-sugar mixture. Place balls on parchment-lined baking sheet. Make a deep indentation in the center of each ball with your finger.3. Bake your cookies for 10 minutes before removing from oven. Gently press down the centers with the end of a wooden spoon (don't use your fingers here!) Fill the center of each cookie with 1 teaspoon of jam. Rotate sheets, and bake until golden brown, 10 to 12 minutes more. Remove from oven, and place on a wire rack to cool.
Of note...there is one other lovely lady I wanted to mention yesterday. Lauren has a wonderfully addictive blog called Lauren's Little Kitchen that I watch like a hawk. Her prose is spot-on, her pictures are adorable, and she is simply a beautiful person, inside and out. So if you haven't already found her, go visit her as soon as you can!
How wonderful it is to follow you on Twitter because now I know when you have a new post! I'm not gonna lie, I'm very particular about my cookies, but thumbprint cookies are fantastic (thanks to the butter... vegan, eh) and look so simple to make!
It's difficult to leave the comfort of home, but you're young and have plenty of time to make new memories that will become just as dear to you. My son and his family just moved to TX last week- so far it has been cooler there than it has been here. Go figure. Your cookies are beautiful. I have some jam here waiting for them. Thanks for sharing- Betty
Thanks for sharing those two blogs - I look forward to checking them out. And I know what you mean about homemade jam. It's so hard to resist, and I too find myself putting it on anything it could possibly go with, or just scooping up a spoonful on its own.
I love what you wrote in your opening - it reminds me so much of where I was at when I was about your age, definitely not wanting my life to become stagnant, routine or full of regret. I was nervous to start grad school last year (at 28 and 6 years out of school), but it was so exciting to be back in school that the nerves disappeared pretty quickly.
Mhm, yummy cookies, Monet! But even better, so excited for you and hubby re. the move! I know how you feel about being an adventurous sort - I've been thinking about uprooting myself again recently, maybe on a slightly more permanent basis this time. Good luck sweetheart - hope it's swift and stress free! You'll have tasty cookies to munch on at least!
I was looking forward to this post/recipe after you teased it yesterday, and was definitely not let down :) Best of luck to you in Texas, though it seems that you won't need it! I absolutely know what you mean when you say you need to leave home to grow. I moved from Ohio to Arizona almost two years ago, and in going back this past summer everyone commented on how much older and more mature I seemed. Sometimes a little time away is something we all need :) Cherish it, even when you are homesick!
hey monet! i am the same way...always afraid of settling down. i have about a year left in my program. and after being in school for this long...i cannot wait to be done!!! i hope you love your new adventure. and im sure tx will be hot....but at least it is hot enough where AC is required??? ha. in co, you can get away without it...but somedays are pretty rough.
What an exciting journey! Your sentiments are very much in line with our thoughts about venturing through life with a new place and change of pace. I wish you safe travels and a delightful experience with your classes!
All the best as you move....and aren't jammy cookies the best!!!!! I love the 'rolled in almonds' bit........ must try. Take care
Reply
Jessie -- The Messie Kitchen
07/27/2010 4:27pm
Leaving home is exactly the thing I can't wait to do. I'm ready for my next chapter and I'm hoping it is where you are leaving now! Time will tell. You will just love Austin, I'm sure. I love how rustic these cookies look, and I'm sure they taste marvelous. Good luck packing up!
can i have ur skirt??!! hehe so pretty. i love how i comment less on the food and more on you and ur clothes and ur gorgeous hair hehe. but the cookie DO look incredibly tasty! i love making thumbrint cookies, filling the middle up with jam is obviously my fav part ;)
It's so refreshing to read about your new adventure! I crossed the ocean to start my adventure over 10 years ago. Thinking back, I have no idea where I got the energy and fearlessness but I can certainly tell you I have no regret! Good luck with the move! These cookies look adorable!
I LOVE thumbprint cookies. I think the simple, crumbly cookie is the perfect vehicle for a nice dollop of jam. I'm so jealous that you have homemade jam in those little cookies! I need to get on the homemade jam bandwagon.
Your cookies are really something special with your friend's homemade jam! I wish you the best in your move and all that follows! I really can identify with what you said about being challenged and growing...
These look delicious Monet. I love that you used homemade jam with them as well. it really gives them that added personal touch. You'll do great in Austin and I can't wait to read more about your upcoming adventures.
I love your adventuresome spirit (and your cookies). I love your willingness to go outside your bouNDaries (and your jam). Do it now so when it is time to have continuity in your lives - there will be no regrets.
Good luck with the move and with school! I think it's great that you and Ryan are so open to new experiences. I only just started thinking about settling down maybe two years ago and I don't regret a single move. I can't wait to hear all about Texas and your MFA program!
These are some of our favorite cookies and yours look delicious--and, jam from a friend is wonderful. I wish you well on your move. I've done that--leaving my home state of Virginia and moving with my new husband to CA. Our two children were born there. Next we moved to Texas. Then Charleston, SC and now the Chicago area. All moves were job-related. All moves brought wonderful new friends and experiences. I wish you the same.
Good luck on your move. I'm sure it will be a great adventure on your life journey. Thanks for another cookie recipe on your way. Looking forward to your future posts as an Austinite (is that what they call them there?)
I must say how impressed I am that despite moving you have time to make cookies! And delicious ones like these. We love Thumbprint cookies...Maya and I have made them a few times. She can't get over the fact she gets to stick her finger in cookie dough. It's the little things in life. :)
I have heard that Texas is a fabulous place to raise a family...it is affordable and pretty. I'm sure you will come to love it!
Monet, What a scary and exciting time, but that's what your 20s are all about, I'm finding! I've moved so many times, so I understand how you must be feeling, but I know you and Ryan will really enjoy Texas and make lots of new friends.
That being said, these cookies are absolutely adorable, with an adorable baker to go along with them!
Monet, have fun packing and good luck on the move. I like jam thumbprint cookies! Just the sour taste of the jam and the sweet of cookies are great combination. Thanks for introducing us to those wonderful bogs!
Those are one of my favorite cookies. How is the move going? My move is using what sanity I have left. :) I'm glad you and the man can stick together. Lars and I split next year. Boo. Cannot wait to hear more about the move, moving buddy.
I always enjoy a good shortbread cookie filled with delicious jam, these look great! I know this is an older post and I believe the move has already happened, but I do wish the best for you both and that you will make yourselves a wonderful home in TX!
Reply
Cristina
09/02/2010 1:33pm
I heart thumbprint cookies..can't remember the last time I had one, though. What's not to like about shortbread and then with tasty sweet jam in the middle. Lovely!
Wow these look delicious! I used to love sneaking thumbprint jam cookies, breaking off the cookie, and just eating the part that was attached to the jam. I'm sure now that I'm older, I would love the whole thing!
Emotional attention, self-control, approval, adhere to, patience but also security. These are typically among the issues that Tang Soo Can do, most with the Thai martial art attached to self defense purposes, can show buyers plus instilling inside your soul the means not just to preserve with your own eyes on the competency on the very 1st real danger stains to cure confrontation all in all.
|
/**
* Copyright (c) 2013-present, Facebook, Inc. All rights reserved.
*
* This file provided by Facebook is for non-commercial testing and evaluation
* purposes only. Facebook reserves all rights not expressly granted.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
* FACEBOOK BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
'use strict';
import {EditorState, Modifier, SelectionState} from 'draft-js';
export default function removeMediaBlock(editorState, blockKey) {
var content = editorState.getCurrentContent();
var block = content.getBlockForKey(blockKey);
var targetRange = new SelectionState({
anchorKey: blockKey,
anchorOffset: 0,
focusKey: blockKey,
focusOffset: block.getLength(),
});
var withoutTeX = Modifier.removeRange(content, targetRange, 'backward');
var resetBlock = Modifier.setBlockType(
withoutTeX,
withoutTeX.getSelectionAfter(),
'unstyled'
);
var newState = EditorState.push(editorState, resetBlock, 'remove-range');
return EditorState.forceSelection(newState, resetBlock.getSelectionAfter());
}
|
The Australian government broke international law by paying people smugglers thousands of dollars to tow boats filled with asylum seekers away from its shores, according to new report by Amnesty International.
The human-rights group investigated incidents from May and July when migrant boats were turned away from Australia and returned to Indonesia. In both occasions, Amnesty claims asylum seekers’ lives were endangered.
In the earlier case, Australian officials paid the people smugglers $32,000 to return, says Amnesty, adding that the action would make the government “accomplices in the transnational crime of people smuggling” under international law.
Australia runs a controversial program for dealing with migrants arriving on boats. All are either turned back or taken to detention centers on Papua New Guinea or the nearby Pacific island nation of Nauru. None are allowed to reach the nation’s shores despite the veracity of their individual claims.
Amnesty International said its latest investigation is based on interviews with the asylum seekers, crew and Indonesian police. It also claimed to have photographic and video evidence of misconduct.
The Operation Sovereign Borders Joint Agency Task Force denied wrongdoing in the May event after earlier accusations of the bribery were submitted to Australia’s Legal and Constitutional Affairs References Committee in June.
The Australian ships only provided “immediate assistance in accordance with our international safety at life at sea obligations and assisted the safe return of the people to Indonesia,” operation commander Major General Andrew Bottrell said about the May incident in letter addressed to the committee. “The primary concern of Operation Sovereign Borders is, and has always been, safety of life at sea.”
|
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<TargetFramework>netstandard2.0</TargetFramework>
<LangVersion>8.0</LangVersion>
<OutputPath>..\..\bin\</OutputPath>
<AppendTargetFrameworkToOutputPath>false</AppendTargetFrameworkToOutputPath>
</PropertyGroup>
<ItemGroup>
<Compile Remove="Properties\AssemblyInfo.cs" />
</ItemGroup>
<ItemGroup>
<ProjectReference Include="..\Mosa.Compiler.Common\Mosa.Compiler.Common.csproj" />
</ItemGroup>
<ItemGroup>
<PackageReference Include="dnlib" Version="3.3.2" />
</ItemGroup>
</Project>
|
Blogs
Dave O'Brien
Share
Host of Mornings With Dave O'Brien, Dave has been on the radio since 1985 and on the air in Indianapolis since 1996. Dave is married to Cheryl, a producer for Fox 59 WXIN-TV. The O'Brien’s have a 12 year old daughter who spends most of her free time riding horses and playing the stand-up bass in her school orchestra. In 2012 Dave was nominated by both the Country Music Association and the Academy of Country Music as Best Radio Personality for Large Market Radio. Dave spent his childhood in California and Virginia and graduated from the University of Virginia in 1989.
More posts from this author
Lily, a seven year old Daisy Scout, came into the studio today to talk about how many girl scout cookies she has sold and wanted to see if Dave would help her out. Dave didn't disappoint, he bought her last 10 boxes that she needed to sell to give her a grand total of 1,000...
Thomas Rhett talks about the cute video he posted about how his wife and he were friends growing up and finally got out of the friend zone! To listen to the full interview Dave did with Thomas Rhett follow this link : http://www.hankfm.com/blogs/dave-obrien/artist-interviews/acm...
Thomas Rhett's most recent song 'Make Me Wanna' just hit number one this week! This is his third number 1 as a performer and third in a row! To listen to the full interview Dave did with Thomas Rhett follow this link : http://www.hankfm.com/blogs/dave-obrien/artist-interviews/...
In 1980 there were a total of 89 of these types of businesses in the entire United States, most of them in California and Colorado. Now there are 3296 of these businesses including over 20 in Indianapolis alone. (Microbreweries)
|
Husband, father, parishioner. Also a carpenter. (r3FORMed)
We concluded our last post, “What Is & Isn’t Being Said: 3. ‘White Privilege’,” by stating the importance of recognizing, not only the 400 years long history of racialization in the United States, but also the privilege that white Americans enjoy even today, particularly in relation to black Americans. When one refuses to acknowledge this history and privilege—or simply does not understand it—one tends to propose explanations for current disparities by ahistorical means, illicitly assuming a neutral historical starting point for discussion. Given that the average white person in America does not feel himself to be personally prejudiced, thinks that racism is the sin of a rare few, and believes that all barriers to entry have been removed by Civil Rights legislation, white Americans tend to believe that something must be wrong with the black community itself. If all is thought to be equal (in terms of “access” and privilege), what else is available to explain the vast inequities cited in the previous posts? (Even popular theologians can be found offering explanations such as greater sexual sin in the black community, a persistent “victim mentality,” a tendency to see the world through “the lens of race” rather than “the lens of the gospel,” and a lack of will to work hard and succeed because of welfare.)
Drs. Christian Smith and Michael Emerson offer a parable in their book, Divided by Faith, that captures this anti-privilege, ahistorical, dynamic quite well. They have graciously granted permission to reprint it here in full. I believe attention to this parable will help clarify the danger of ignoring privilege in less controversial terms as we move forward in the series.
A Parable
Both Maridel and Parker were overweight, to the point of being unhealthy. They decided it was the time to do something drastic. Responding to an ad for a Fat-Away program, they drove to a rural area in their state, where they were taken to separate areas of the woods. For six weeks, they would be locked into these “compounds,” as they were called. In each compound, according to the ad, were the perfect ingredients needed to lose weight. Their goal was to each lose forty pounds. What they did not know is that the less-than-ethical Fat-Away organization was really a research laboratory studying the effects of various diets, exercise programs, and weight-loss expectations on people’s weight change. Without a word to Maridel and Parker, they placed Maridel in a compound designed to help her lose weight, but they placed Parker in a compound designed for Parker to gain weight.
In Maridel’s compound were running trails, a swimming pool, state-of-the-art exercise equipment, a basketball court, and a sauna. In her cabin were magazines on proper nutrition, instructional videos on how to lose weight, an abundance of natural, healthy, low-fat, low-calorie foods, and no sweets. Each day she was greeted early by fit and trim people who asked Maridel to go on a run with them, talked about how much they loved being thin, and encouraged her that she too can be thin—wonderful conditions for losing weight.
In Parker’s compound was only a tiny cabin. No exercise equipment was available whatsoever, but there were plenty of videos and movies that showed high-calorie foods looking sumptuous, more high-calorie goodies than even a sumo wrestler could desire, and just a few fruits and vegetables. The only other people Parker saw were also obese, and though they talked about losing weight, they seemed not to really care about their weight—not good conditions for losing weight.
The program called for each participant to weigh in at the start, and then every two weeks thereafter. At the end of two weeks, with neither aware of what was inside the other’s compound, Maridel and Parker were taken to the weighing room. They each took their turn on the scale. Maridel stepped on the scale first. She had lost nineteen pounds! Parker’s turn produced far less excitement. He actually gained two pounds.
Maridel, who assumed that both she and Parker had the same type of compound, was irritated with Parker. “We paid good money to be here, Parker. How can you waste it? You have to exercise, you have to eat right!” Parker tried to make his case, but it only made Maridel more irritated. Maridel told Parker he needed to try harder. Parker, though he was depressed about his weight gain and the difficulty in exercising adequately and eating right, resolved to do so.
But try as he may, Parker kept eating too many bad foods. And he exercised very little. He became depressed, and his depression only made him eat more and exercise less. After another two weeks, back he and Maridel went to the scales. Maridel, with wonderful weight-loss opportunities, and taking full advantage of them, lost another fifteen pounds. Parker, however, actually gained more weight then he had the first two weeks. Maridel could not believe what Parker was doing to himself. “Don’t you know why we are here? Parker, this place is designed for us to lose weight. If you can’t do it here, where can you?”
“I don’t think this is all that great a place to lose weight,” Parker sniped. “The food here is fatty, and exercising is next to impossible.” Maridel was taken aback. Finally she replied, “It wouldn’t matter if that were true, Parker. When we get home, the food can be fatty and exercise difficult, but you must learn to eat and exercise right, regardless.” Parker, increasingly frustrated by Maridel’s comments, retorted, “No way is it as easy as you’re making it seem. I think that Fat-Away is treating me unfairly. I’m not even sure I want to lose weight.”
With that Maridel was dumbfounded. If Parker was not even going to try, if he was going to blame others, perhaps he deserved to be obese. But she also thought that if only Parker could have a vision of what he could look like, he would take advantage of Fat-Away and lose weight. She encouraged Parker to imagine being thin, toned, and healthy. “Wouldn’t it be wonderful, Parker? If only you would try.”
Back they went for another two weeks. At the final weigh-in, with the predictable result of Parker not having lost weight, Maridel simply resigned herself to the idea that Parker wanted to be overweight. Why Parker would want this, she was not sure, but of one thing she was sure—until Parker decided he wanted to lose weight, he would not.
Maridel is partially correct in her final assessment. Parker will not lose weight unless he tries. His “attitude” will have to improve. He needs a vision, a goal, and the motivation to get there.
But she misses the vast difference in environments that render the correlation between individual initiative and outcome far less than perfect. Due to structural differences, only a very few with incredible willpower could possibly lose weight in an environment like Parker’s. And likewise, in an environment like Maridel’s, only a very few could possibly gain weight.
When one refuses to acknowledge this history and privilege—or simply does not understand it—one tends to propose explanations for current disparities by ahistorical means, illicitly assuming a neutral historical starting point for discussion. Given that the average white person in America does not feel himself to be personally prejudiced, thinks that racism is the sin of a rare few, and believes that all barriers to entry have been removed by Civil Rights legislation, white Americans tend to believe that something must be wrong with the black community itself.
|
TSA Thinks the World’s Largest Schlong is a Terrorist Threat
If you think you have a hard time getting through airport security, wait until you try getting through it packing the world’s largest pecker – because that is exactly what happened to Jonah Falcon.
On July 9th, Falcon became a part of a TSA circus sideshow that took place at the San Francisco International Airport when security guards spotted a suspicious “terrorist sized bulge” protruding from the crotch of his pants.
However, the only kind of terrorist activity that this 41-year-old New Yorker is guilty of is making every other guy in the world feel inferior thanks to his 9-inch limp dip stick – 13.5 inches fully erect!
“I had my ‘stuff’ strapped to the left. I wasn’t erect at the time,” said Falcon. “One of the guards asked if my pockets were empty and I said, ‘Yes.’ Another guard stopped me and asked me if I had some sort of growth.”
Not a growth – a freaking horse schlong!
When Jonah was 18 years old, he realized he had an exceptional wiener because his twig had far exceeded the berries – stretching out to 12 inches fully cocked. And while the Guinness Book of World Records does not have a category for the super naturally endowed, his long-dong was deemed the supreme leader of pocket rockets after being featured in a 1999 HBO documentary. Sounds more like it should have been on Cinemax.
Falcon claims that while TSA further investigated his dongosaurus, that not only did one guard slide his hand down the entire length of his shaft, but that they actually put some type of powder on his pants as a means for testing for explosives. Now that is one bomb we would not want to see go off.
Although Falcon did manage to get through airport security without missing his flight back to New York, we are still not sure how he managed to board the airline without being forced to pay for an additional piece of carry on luggage.
|
Stop it!
“I’m going to say two words to you right now. I want you to listen to them very, very carefully. Then I want you to take them out of the office with you and incorporate them into your life.
Here they are: Stop it!”
Bob Newhart as therapist Dr. Switzer
So I told you that I had make an appointment with my therapist after a six month gap. It wasn’t that I was struggling – more I wanted to know how I was doing. And that I was still spending time thinking about ‘what if I’, ‘why didn’t I”, “It’s not fair’, ‘Maybe I made the wrong choices’ and that sort of thing. My thoughts on a loop. Much better now without wine – and much better with the passing of time. But still present.
My therapist is a very wise and funny person. They said you have this free time now you are not drinking (Wrote about that here). You are filling it with this thinking. It is time to fill it differently.
And they said to ‘Stop It!’ every time I started those thoughts – jolting myself back to this moment. And my therapist then went on to explain a very funny Bob Newhart skit where Bob offers a different brand of therapy. A brief – 5 minutes – therapy called “Stop It!”.
My therapist meant this in a loving humorous way, and we had a good laugh. But boy was there a nugget of truth in there.
STOP IT is handy for us former wine drinkin’ over thinkin’ types … Every time you start your well-worn wine path, show some tough love with this new you. Say stop it! when you find yourself filling time with the past. Banish the old stories and fears to the bin with a stop it! I’ve said it out loud to myself when I’m alone in the car. I find it works.
Bob is absolutely a national treasure – and a very funny man. If you have 6 minutes, you’ll probably enjoy watching the Stop It! skit.
Share this:
Like this:
LikeLoading...
Published by bumpyyear
As Margo Channing said in All About Eve, "Fasten your seatbelts, it's going to be a bumpy night”
January 1, 2018, I set down my cocktail (wine is my self-medicating choice) — this time once and for all.
This means I have made it through 365 days sober!
But the journey doesn't stop here...
I am fastening my seatbelt for another bumpy year ahead. All *second* 365 days will be sober and full of gratitude. That's the plan - even knowing some of the bumps ahead, such as the 'Wine Witch', the 'Wall' and Wine O'Clock.
View all posts by bumpyyear
|
#include <assert.h>
/* Test of reduction on both parallel and loop directives (workers and vectors
in gang-partitioned mode, int type with XOR). */
int
main (int argc, char *argv[])
{
int i, j, arr[32768], res = 0, hres = 0;
for (i = 0; i < 32768; i++)
arr[i] = i;
#pragma acc parallel num_gangs(32) num_workers(32) vector_length(32) \
reduction(^:res)
{
#pragma acc loop gang /* { dg-warning "nested loop in reduction needs reduction clause for 'res'" "TODO" } */
for (j = 0; j < 32; j++)
{
#pragma acc loop worker vector reduction(^:res)
for (i = 0; i < 1024; i++)
res ^= 3 * arr[j * 1024 + i];
#pragma acc loop worker vector reduction(^:res)
for (i = 0; i < 1024; i++)
res ^= arr[j * 1024 + (1023 - i)];
}
}
for (j = 0; j < 32; j++)
for (i = 0; i < 1024; i++)
{
hres ^= 3 * arr[j * 1024 + i];
hres ^= arr[j * 1024 + (1023 - i)];
}
assert (res == hres);
return 0;
}
|
Debate on executive powers could get ugly
BEIRUT: Maronite parties could step up their sectarian rhetoric this week if the government fails during Tuesday’s session to agree on a legal mechanism to exercise the president’s prerogatives, parliamentary sources said Sunday.
The sources told The Daily Star that it is in the interest of everyone that the raging debate over the Cabinet’s executive powers during the presidential void be settled.
Most legal opinions back Prime Minister Tammam Salam’s viewpoint, which reportedly was based on a legal opinion by the legislation and consultancy body in the Justice Ministry, the sources said. In Salam’s view, the Cabinet’s powers in the case of a vacant presidency are clear.
Salam is adamant that these powers be practiced by the premier, especially with regard to calling the Cabinet into session and preparing its agenda.
This matter was debated during the Cabinet’s first session last Friday in light of the end of former President Michel Sleiman’s six-year term on May 25, and it was agreed that Salam would send the agenda to the ministers 72 hours ahead of the scheduled session.
This advanced notice would be tantamount to consultation that usually takes place between the president and the prime minister over this subject.
With regard the signing of Cabinet decrees and whether this needs the approval of all the ministers, a former judge who had served as the chief of the Justice Institute said that the Constitution clearly states that executive power should not be crippled.
“Why wouldn’t the formula applied by the government of [former] Prime Minister Fouad Siniora be adopted in the voting process and in exercising the president’s prerogatives?”
the judge said, speaking on condition of anonymity. “[Cabinet] decisions that need two thirds [of the Cabinet members] can be voted on this basis, while decisions that need an absolute majority can use the absolute majority basis,” he added.
According to the judge, once the Cabinet has taken decisions in this legal manner, and despite reservations by some ministers on any decision, the ministers are obligated to sign the decrees.
This is what happened when the Siniora government exercised the president’s powers.
A judge in the State Shura Council, who asked to not be identified, said that the signature of decrees by all ministers is unrealistic.
“While the president does not have the right to disrupt the Cabinet’s constitutional and legal decisions, how can we give such a right to a minister to disrupt the Cabinet’s work by refusing to sign decrees with or without any excuse?” the judge said.
One MP said that should the debate over exercising the president’s prerogatives take a negative political turn and morph into inter-Maronite one-upmanship, “this matter would undoubtedly lead to paralyzing the Cabinet institution like what is happening now with the Parliament institution.”
“But if matters during Tuesday’s Cabinet session take a turn based on a political consensus, which is essential to resolve all issues, the Salam Cabinet would have passed a [political] minefield under the slogan of law and the National Pact,” the lawmaker said.
A judicial source also weighed in on the issue that stirred a debate between Interior Minister Nouhad Machnouk and Telecommunications Minister Boutros Harb during Friday’s Cabinet session.
“The prime minister is certainly the vice president of the Higher Defense Council according to the first clause in Article 64 in the Constitution, which states that the prime minister is definitely the vice president of the Higher Defense Council.
Therefore, the council can convene upon his call,” the judicial source said.
“But any comprehensive security decision that seeks to charge the Army with missions beyond the mission previously assigned to it needs a Cabinet decision according to Article 65 in the Constitution, which puts the armed forces under the Cabinet,” the source added.
A version of this article appeared in the print edition of The Daily Star on June 02, 2014, on page 3.
Comments
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
Maronite parties could step up their sectarian rhetoric this week if the government fails during Tuesday's session to agree on a legal mechanism to exercise the president's prerogatives, parliamentary sources said Sunday.
The sources told The Daily Star that it is in the interest of everyone that the raging debate over the Cabinet's executive powers during the presidential void be settled.
This matter was debated during the Cabinet's first session last Friday in light of the end of former President Michel Sleiman's six-year term on May 25, and it was agreed that Salam would send the agenda to the ministers 72 hours ahead of the scheduled session.
This is what happened when the Siniora government exercised the president's powers.
A judicial source also weighed in on the issue that stirred a debate between Interior Minister Nouhad Machnouk and Telecommunications Minister Boutros Harb during Friday's Cabinet session.
|
Commissioner Štefan Füle signed today a Memorandum of Understanding on the National Indicative Programme for Ukraine
European Commissioner for Enlargement and Neighbourhood policy Stefan Füle signed today a Memorandum of Understanding on the National Indicative Programme for Ukraine for €470 million Euros for the period of 2011-13.
Assistance provided under the ENPI National Indicative Programme for Ukraine should focus on three priority areas: Good Governance and the Rule of Law Facilitation of the entry into force of the EU-Ukraine Association Agreement (including a Deep and Comprehensive Free Trade Area) and Sustainable Development.
The overall indicative budget for the EU assistance to Ukraine under the ENPI is €470.05 million. This includes the €43.37 million earmarked for the Comprehensive Institution Building Programme (CIB), and €30.79 million for Eastern Partnership pilot regional development programmes.
Commissioner Stefan Füle said"I was very happy to sign the Memorandum of Understanding on the National Indicative Programme for Ukraine with Mr Kluyev today. There has been progress. I took that opportunity to remind Deputy Prime Minister Kluyev that the DCFTA is part of a broader Association Agreement which includes crucial elements on human rights, democracy and fundamental freedoms. It is essential to the success of the Agreement that progress is made by the Ukrainian side in these areas. In this context, I underlined our strong desire to see critical reforms in Ukraine pursued as quickly as possible, especially on the constitutional, judicial and electoral fronts."
Background
The European Neighbourhood and Partnership Instrument (ENPI) is a policy-driven financial instrument which has as its main aim to support the establishment of an area of prosperity and good neighbourliness involving the European Union and neighbouring partner countries. Regulation (EC) No. 1638/2006 lays down the guiding principles for the provision of European Union assistance under the Instrument.
The Partnership and Co-operation Agreement between the Community and its Member States and Ukraine, the EU-Ukraine Association Agenda currently in force, the Eastern Partnership launched in May 2009 and the ongoing negotiations on a new Association Agreement between the EU and Ukraine are the main elements of the Policy Framework which has guided the programming of EU assistance. The Country Strategy Paper 2007-13 and the National Indicative Programme 2011-13 for Ukraine have been designed on the basis of these principles and this policy framework.
The present Memorandum reflects the indicative assistance priorities for the period 2011-13 as outlined in the ENPI National Indicative Programme for Ukraine 2011-2013. The actions financed by the European Union and covered by this Memorandum of Understanding are governed by the Framework Agreement between the European Commission and the Government of Ukraine.
|
He said: "I look at myself as a pretty romantic guy. I'm a creative guy. You gotta be creative, you gotta be different. And these things stick with women for the rest of their lives so I had to go above and beyond."
Speaking about his proposal to Eudoxie, he added: "I had written in the grass her name and 'will you marry me?' So once she saw it and we looped around, of course she burst out into tears and was just extremely happy. So it was a pretty original idea."
|
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.flink.statefun.flink.io.kinesis.polyglot;
import com.google.protobuf.Any;
import com.google.protobuf.InvalidProtocolBufferException;
import org.apache.flink.statefun.flink.io.generated.KinesisEgressRecord;
import org.apache.flink.statefun.sdk.kinesis.egress.EgressRecord;
import org.apache.flink.statefun.sdk.kinesis.egress.KinesisEgressSerializer;
public final class GenericKinesisEgressSerializer implements KinesisEgressSerializer<Any> {
private static final long serialVersionUID = 1L;
@Override
public EgressRecord serialize(Any value) {
final KinesisEgressRecord kinesisEgressRecord = asKinesisEgressRecord(value);
final EgressRecord.Builder builder =
EgressRecord.newBuilder()
.withData(kinesisEgressRecord.getValueBytes().toByteArray())
.withStream(kinesisEgressRecord.getStream())
.withPartitionKey(kinesisEgressRecord.getPartitionKey());
final String explicitHashKey = kinesisEgressRecord.getExplicitHashKey();
if (explicitHashKey != null && !explicitHashKey.isEmpty()) {
builder.withExplicitHashKey(explicitHashKey);
}
return builder.build();
}
private static KinesisEgressRecord asKinesisEgressRecord(Any message) {
if (!message.is(KinesisEgressRecord.class)) {
throw new IllegalStateException(
"The generic Kinesis egress expects only messages of type "
+ KinesisEgressRecord.class.getName());
}
try {
return message.unpack(KinesisEgressRecord.class);
} catch (InvalidProtocolBufferException e) {
throw new RuntimeException(
"Unable to unpack message as a " + KinesisEgressRecord.class.getName(), e);
}
}
}
|
Google Boots Up Project AraNews & Analysis 6/27/2014 9 commentsProject Ara is literally up and running, as members of Google’s Advanced Technology and Projects team demonstrated a prototype modular phone at the company’s developer conference. Although the smartphone prototype, froze while booting up, project leads were excited about the device’s potential.
Make Way for Autonomous CarsNews & Analysis 6/17/2014 1 commentGoogle's recent announcement that it would produce approximately 100 self-driving cars came as a surprise to the general public, but it's hardly a new idea within the auto industry.
Intel, Dell Ride SDN Into Telcos News & Analysis 6/16/2014 6 commentsTo handle the explosion of data in a more effective way, several service providers are advocating for a move to virtual networks driven by software and spearheaded by the telecommunications industry.
|
input_driver = "xinput"
input_device = "Controller (Xbox One For Windows)"
input_device_display_name = "XBOX One Controller"
input_vendor_id = "1118"
input_product_id = "767"
input_b_btn = "0"
input_y_btn = "2"
input_select_btn = "7"
input_start_btn = "6"
input_up_btn = "h0up"
input_down_btn = "h0down"
input_left_btn = "h0left"
input_right_btn = "h0right"
input_a_btn = "1"
input_x_btn = "3"
input_l_btn = "4"
input_r_btn = "5"
input_l2_axis = "+4"
input_r2_axis = "+5"
input_l3_btn = "8"
input_r3_btn = "9"
input_l_x_plus_axis = "+0"
input_l_x_minus_axis = "-0"
input_l_y_plus_axis = "-1"
input_l_y_minus_axis = "+1"
input_r_x_plus_axis = "+2"
input_r_x_minus_axis = "-2"
input_r_y_plus_axis = "-3"
input_r_y_minus_axis = "+3"
input_menu_toggle_btn = "10"
input_b_btn_label = "A"
input_y_btn_label = "X"
input_select_btn_label = "View"
input_start_btn_label = "Menu"
input_up_btn_label = "D-Pad Up"
input_down_btn_label = "D-Pad Down"
input_left_btn_label = "D-Pad Left"
input_right_btn_label = "D-Pad Right"
input_a_btn_label = "B"
input_x_btn_label = "Y"
input_l_btn_label = "Left Bumper"
input_r_btn_label = "Right Bumper"
input_l2_axis_label = "Left Trigger"
input_r2_axis_label = "Right Trigger"
input_l3_btn_label = "Left Thumb"
input_r3_btn_label = "Right Thumb"
input_l_x_plus_axis_label = "Left Analog X+"
input_l_x_minus_axis_label = "Left Analog X-"
input_l_y_plus_axis_label = "Left Analog Y+"
input_l_y_minus_axis_label = "Left Analog Y-"
input_r_x_plus_axis_label = "Right Analog X+"
input_r_x_minus_axis_label = "Right Analog X-"
input_r_y_plus_axis_label = "Right Analog Y+"
input_r_y_minus_axis_label = "Right Analog Y-"
input_menu_toggle_btn_label = "Guide"
|
Saturday, April 10, 2010
So I was truly blessed to have been given the chance to photograph this family. It was incredible. As I am sure everyone would imagine, the chance to photograph a family with quadruplets does not happen all the time!
I walked into the house and it was clean! Organized! And had 4 of everything! 4 swings all lined up, 4 bouncy seats all lined up, and this amazing table with 4 high chairs built into it. Whoa. There were some helpers there to help out with the changing of diapers, dressing, feeding, etc...and it was incredible how calm it was.
Then the fun began...THE PHOTOGRAPHY!
So here they are...
The whole crew...5 boys all under the age of 5. Incredible.
So when I first talked to mom, she said multiple times how she really wanted to capture each of their unique personalities, and you can really see why. At the young age of 6 months each of these little boys has such a different personality. I was amazed!
So here is the lady killer :) Oh my those eyes!!!!
This little guy was my flirt. Oh he giggled and smiled every time he looked at me. He is a little lover.
The adorable little shy-guy! So sweet and shy and oh so such a little man!
He has a little faux-hawk!!!
The pretty boy. He has the most gorgeous skin and breath taking eyes. He has some catching up to do with his brothers in the hair department...but with those eyes, no one is looking at his hair!
And of course...the big brother. SO sweet and not at all camera shy! I could hang out with this guy all day long. He was incredible to work with!
So that is the gang. I really was amazed at the whole experience. Being around all of these beautiful children was amazing. This family is truly blessed. I am sure there are crazy times ahead...but happy, healthy, kids make it oh so worth it.
Thursday, April 1, 2010
So I have been wanting to post something about this and finally had the good reason to do so! One of my good friends, who is also a great photographer in Kansas also posted something on this topic! The other night I was at a networking dinner with some local small business owners and we got to talking about photography and the pros and cons of hiring a custom photographer versus going to mall photographer.
All I could compare it to was choosing to fly direct or with a layover when you go on vacation :) Every time my family decides to travel we contemplate saving a couple bucks by taking a layover in some random state while heading to our destination...and once we do it we always say, "WHY DID WE DO THAT...I would have rather paid $500 extra dollars to get there quicker and have a nicer experience." So with that said, the same goes for when you hire a custom photographer. It may be cheaper to wait in line at the mall, but once you wait and wait and wait and the kids are crying, you are sweating, the fun is OVER! The experience is gone and all you are left is with a couple shots and still paying a fair amount for prints of your children that may not really represent who they really are!
So like I said before, I totally understand the need for saving a few bucks...but in the long run, once you decide to hire a photographer, the experience, and the little more you pay is SO WORTH IT!
|
Several flyers propagating a racist message circulated
along Jefferson Road this weekend. The flyers, which were identified
as the work of the white supremacist group, the National Alliance,
defiled African Americans in accusations of deli- berately
spreading HIV and AIDS.
"Don't Have Sex With Blacks,
Avoid Aids," read some of the text on the flyers. The
flyers picture three black men saying that they lied about their HIV
status and "had sex with dozens of white women."
The
National Alliance, whose Denver chapter appeared on the bottom
of the flyers, has been responsible for propagating hate propaganda
in the past. The same group had sent anti-Semitic propaganda
throughout Princeton Township last June.
The flyers also
printed the telephone number of the New Jersey chapter in Hewitt.
Borough Police are currently investigating the incident
as a littering offense, because the text and message are protected
by the First Amendment, Borough Police Capt. Anthony Federico
said. He went on to say that the incident has not gained the
complaint that would elevate it to a bias crime.
The National
Alliance entered area politics in July when Hopewell Borough Councilman
Marc Moran admitted that he was a member of the group. Mr. Moran's
association with the National Alliance was made public after it
was discovered that he had posted lengthy essays on white supremacy
on the organization's website. He described himself as racially
aware, but "not a racist."
At the time, many
elected representatives in the area called for Mr. Moran's resignation,
citing that his personal beliefs were not in concert with the beliefs
of his constituency. Assemblyman Reed Gusciora, whose 15th District includes
Hopewell Borough, issued a direct indictment of Mr. Moran's beliefs.
"The
appointment of Marc Moran is an insult to the close-knit families
of Hopewell Borough and the surrounding communities,"
said Mr. Gusciora. "His admittedly bigoted views toward
immigrants, mixed-race couples, Jews, and gays have no place
in the public-policy arena," he said.
Mr. Moran subsequently
left Hopewell government and quit the National Alliance. Borough
Mayor Marvin Reed voiced his concern over the incident.
"We
all think it's horrendous," he said. The mayor added that
while the text of the flyers is protected by free speech provisions
of the First Amendment, it is important that the distributor
is identified.
"If people distribute this sort of thing,
other people ought to know who they are," the mayor said.
|
Theatre (12-16 yrs)
Develop your theatrical skills in all aspects of performance from learning audition techniques, exploring the art of improvisation, detailed character study, script work as well as devising brave and exciting new theatre.
|
The DigiCube Revival
In 1996, Square established the independent subsidiary DigiCube to commemorate their entry into the PlayStation era. DigiCube served to market and distribute Square's video games, videos, books, toys, and albums. Prior to DigiCube, Square's albums were published by external record labels — Datam Polystar during the NES era and NTT Publishing during the Super Nintendo era. With packages like the Final Fantasy VII Original Soundtrack Limited Edition, DigiCube quickly became known for offering some of the highest quality and exuberant albums in the video game industry. The company went on to print the original scores, arranged albums, and occasional singles or drama CDs for practically all new entries in the Final Fantasy, SaGa, Mana, Front Mission, Chocobo, and Parasite Eve series. A few soundtracks, such as for Kingdom Hearts and Final Fantasy X-2, were published by other record labels since Square did not have the rights to publish the vocal songs.
Altogether DigiCube released over 70 album releases between 1996 and 2003, including best-sellers such as the Final Fantasy VIII Original Soundtrack. Despite the success of its albums, DigiCube was hit financially crippled by Final Fantasy: The Spirits Within's commercial failure and Final Fantasy XII's delay. While Square was rescued by being absorbed into Enix, DigiCube filed for bankruptcy in November 2003 due to their 9.5 billion yen debt. They still managed a temporary release of the long-awaited Final Fantasy VII Piano Collections but the planned Front Mission 4 Plus 1st Original Soundtrack release was shelved. By early 2004, new copies of Final Fantasy albums were rarely available, though it took a longer for stocks of less popular albums to deplete. This threatened the existence of several well-known online game music stores, since the popularity of Final Fantasy music was far greater than other soundtracks at the time.
In May 2004, Square Enix established their own record label to reprint DigiCube's albums and publish new soundtracks. They did so with the help of distributor Sony Music Distribution. They quickly reprinted the main soundtracks in the Final Fantasy series to the delight of fans and stores alike. They followed by finally releasing the Front Mission 4 Plus 1st Original Soundtrack and reviving the Final Fantasy Piano Collections albums. By late 2004, most major Final Fantasy albums had been reprinted and Square Enix had also published their first totally new album, the Final Fantasy XI Chains of Promathia Original Soundtrack. However, it often took a lot longer for other popular DigiCube albums to be reprinted and it wasn't until 2006 that Square Enix attained an output of new releases similar to that of DigiCube. Below is a list of DigiCube albums in order of release date and their Square Enix reprints where applicable:
Album Title
DigiCube Print
Square Enix Print
Tobal No. 1 Original Soundtrack
SSCX-10001
-
Tobal No. 1 Remixes Electrical Indian
SSCX-10002
-
Final Fantasy VII Original Soundtrack Limited Edition
SSCX-10003
-
Final Fantasy VII Original Sooundtrack
SSCX-10004
SQEX-10001/4
Tobal 2 Original Soundtrack
SSCX-10007
-
Final Fantasy Tactics Original Soundtrack
SSCX-10008
SQEX-10066/7
SaGa Frontier Original Soundtrack
SSCX-10009
SQEX-10001/4
Front Mission Alternative
SSCX-10010
SQEX-10081
Front Mission 2 Original Soundtrack
SSCX-10011
-
Final Fantasy VII Reunion Tracks
SSCX-10012
SQEX-10042
Xenogears Original Soundtrack
SSCX-10013
SQEX-10043/4
Chocobo's Mysterious Dungeon Original Soundtrack
SSCX-10014
SQEX-10064
Einhänder Original Soundtrack
SSCX-10015
SQEX-10090
Chocobo's Mysterious Dungeon Coi Vanni Gialli
SSCX-10016
-
Soukaigi Original Soundrack
SSCX-10017
-
Xenogears Creid
SSCX-10018
SQEX-10046
Bushido Blade II Original Soundrack
SSCX-10019
-
Parasite Eve Original Soundrack
SSCX-10020
SQEX-10222/3
Brave Fencer Musashiden Original Soundrack
SSCX-10022
-
Parasite Eve Remixes
SSCX-10023
-
Another Mind Original Soundtrack
SSCX-10024
-
Ehrgeiz Original Soundtrack
SSCX-10025
-
Chocobo's Mysterious Dungeon 2 Original Soundtrack
SSCX-10026
Digital Only
is: internal section original soundtrack
SSCX-10027
-
Final Fantasy VIII Original Soundtrack
SSCX-10028
SQEX-10005/8
Cyber Org Original Soundtrack
SSCX-10029
-
Chocobo Racing Original Soundtrack
SSCX-10030
SQEX-10121
SaGa Frontier II Original Soundtrack
SSCX-10031
SQEX-10061/3
Racing Lagoon Original Soundtrack
SSCX-10032
-
Piano Pieces SF2 ~ Rhapsody on a Theme of SF2
SSCX-10033
SQEX-10197
Seiken Densetsu Legend of Mana Original Soundtrack
SSCX-10034
SQEX-10036/7
Front Mission 3 Original Soundtrack
SSCX-10035
-
DewPrism Original Soundtrack
SSCX-10036
SQEX-10074/5
Final Fantasy VIII Fithos Lusec Wecos Vinosec
SSCX-10037
SQEX-10025
Parasite Eve II Original Soundtrack
SSCX-10038
SQEX-10224/5
Chrono Trigger Original Soundtrack
SSCX-10039
SQEX-10045
Chrono Cross Original Soundtrack
SSCX-10040
SQEX-10047/9
Final Fantasy VIII Piano Collections
SSCX-10041
SQEX-10026
Vagrant Story Original Soundtrack
SSCX-10042
SQEX-10068/9
Final Fantasy IX Original Soundtrack
SSCX-10043/6
SQEX-10009/12
Final Fantasy IX Original Soundtrack Plus
SSCX-10047
SQEX-10035
Final Fantasy IX Piano Collections
SSCX-10048
SQEX-10027
The Bouncer Original Soundtrack
SSCX-10049/50
-
Potion: Relaxin' with Final Fantasy
SSCX-10051
SQEX-100073
Square Vocal Collection
SSCX-10052
-
Final Fantasy X: Suteki da ne - Rikki
SSCX-10053
SQEX-10029
Final Fantasy X Original Soundtrack
SSCX-10054/7
SQEX-10013/6
Final Fantasy X: feel / Go dream
SSCX-10058
-
Potion 2: Relaxin' with Final Fantasy
SSCX-10059
-
All Star Pro Wrestling II Original Soundtrack
SSCX-10060
-
Final Fantasy X Piano Collections
SSCX-10064
SQEX-10028
20020220 - Music from Final Fantasy
SSCX-10065/6
SQEX-10030/1
Final Fantasy XI Original Soundtrack Limited Edition
SSCX-10067/8
-
Final Fantasy XI Original Soundtrack
SSCX-10069/70
SQEX-10017/8
Final Fantasy & Final Fantasy II Original Soundtrack
SSCX-10071/2
SQEX-10032/3
Final Fantasy X Vocal Collection
SSCX-10073
-
Unlimited SaGa Original Soundtrack
SSCX-10078/9
SQEX-10242/3
The Black Mages
SSCX-10080
SQEX-10019
Final Fantasy Tactics Advance Radio Edition Vol. 1 Premium
SSCX-10081
-
Final Fantasy Tactics Advance Radio Edition Vol. 1
SSCX-10082
-
Final Fantasy Tactics Advance Original Soundtrack
SSCX-10083/4
SQEX-10070/1
Final Fantasy Tactics Advance Radio Edition Vol. 2
SSCX-10088
-
Hanjuku Hero VS 3D - Fight! Hanjuku Hero / Without Yolk...
SSCX-10089
-
Final Fantasy Tactics Advance Radio Edition Vol. 3
SSCX-10092
-
Final Fantasy XI Rise of the Zilart Original Soundtrack
SSCX-10093
SQEX-10034
Final Fantasy Tactics Advance Radio Edition Vol. 4
SSCX-10094
-
Hanjuku Hero VS 3D Original Soundtrack
SSCX-10095/6
-
Sword of Mana Premium Soundtrack
SSCX-10097/8
SQEX-10038/40
Final Fantasy VII Piano Collections
SSCX-10111
SQEX-10020
Front Mission 4 Plus 1st Original Soundtrack
Cancelled
SQEX-10021/4
After reprinting the Final Fantasy soundtracks, Square Enix focused on reprinting other best-selling DigiCube albums. They successively reprinted albums in the Mana (Legend of Mana, Sword of Mana), Xeno (Xenogears, Xenogears Creid), Chrono (Chrono Trigger, Chrono Cross), and SaGa (SaGa Frontier, SaGa Frontier II) series between October 2004 and February 2006. Around the period of Final Fantasy XII's hype, they also reprinted Hitoshi Sakimoto's Final Fantasy Tactics, Vagrant Story, and Final Fantasy Tactics Advance soundtrack. More were surprised when Square reprinted Final Fantasy Potion and the Chocobo's Mysterious Dungeon Original Soundtrack. Since then, reprints have slowed to a rate of about two per year, but at last Square Enix begun to look beyond the popular series. Some of their latest reprints were the soundtracks for DewPrism, Front Mission Alternative, Einhänder, Chocobo Racing, and the Parasite Eve series. Once again, these released were unexpected given none of these albums were particularly popular in their original prints. Just how far did Square Enix intend to go with the reprints?
Given its reputation for high quality album releases, several companies external to Square entrusted DigiCube to publish their soundtracks back in the day. On behalf of Namco, they printed the albums for Xenosaga Episode I, Tales of Destiny 2, Tales of Symphonia, and Soul Calibur II. Their other honours included Baroque, Armored Core 3, Ragnarok Online, and the Tengai Makyou series, all of which were popular in Japan. Towards the end of their life, DigiCube even published a series of albums for the hip-hop festival B-Boy Park. Many of these albums were never reprinted after DigiCube's demise, but Yasunori Mitsuda personally re-released the Xenosaga Episode I soundtrack in enhanced form and, due to popular demand, new prints of the Tales of Symphonia and Ragnarok Online albums were created. In addition, a box set featuring the Soul Calibur II soundtrack and a completely new soundtrack to Baroque were recently published.
Album Title
DigiCube Print
Company
Tengai Makyou IV The Apocalypse Vocal Collection
SSCX-10005
Hudson
Tengai Makyou IV The Apocalypse Original Soundtrack
SSCX-10005
Hudson
Baroque Original Soundrack
SSCX-10021
Sting
Xenosaga Episode I: Kokoro - Joanne Hogg
SSCX-10061
Namco
Xenosaga Original Soundtrack
SSCX-10062/3
Namco
Tales of Destiny 2 Original Soundtrack
SSCX-10074/7
Namco
Armored Core 3 Silent Line Original Soundtrack
SSCX-10085
From Software
Soul Calibur II Original Soundtrack
SSCX-10086/7
Namco
Ragnarok Online Original Soundtrack
SSCX-10090/1
Gravity
B-Boy Park - We Are The Wild
SSCX-10101
Hip-Hop Festival
B-Boy Park 2000
SSCX-10102
Hip-Hop Festival
B-Boy Park 2001 E.P.
SSCX-10103
Hip-Hop Festival
B-Boy Park Aratanaru michi e...
SSCX-10104
Hip-Hop Festival
Tales of Symphonia Original Soundtrack
SSCX-10105/8
Namco
Tengai Makyou II Manjimaru Original Soundtrack
SSCX-10109/10
Hudson
Square Enix seems to be reprinting few arranged albums. Even though the scores for Chocobo's Mysterious Dungeon and SaGa Frontier II were reprinted, their orchestral albums weren't. This seems to be in line with the company's current policy that full-scale arranged albums aren't generally worth producing since they sell fewer copies than original scores and can be costly to record. Nonetheless, perhaps the DigiCube revival will be even more far reaching than anticipated. Square Enix recently republished three classic obscure Super Nintendo soundtracks (Bahamut Lagoon, Live A Live, Rudra no Hihou) on iTunes. Perhaps a similar treatment will be given to those great DigiCube albums that couldn't have commercially viable physical reprints. However, Square Enix are bound to be further physical reprints before then. And who knows what they're thinking? Maybe they'll once again surprise us with their love for hyperactive electronica and make the is: internal section original soundtrack their next target!
|
Sample records for line rochefort elve
Compact intracloud discharges (CIDs) persist to date as one of the most mysterious lightning manifestations. CIDs are known to be the strongest natural sources of radio-frequency radiation on Earth. At VHF frequencies, approximately above 30 MHz, their emitted power is ten times stronger than that of other lightning processes. The well-known strength of CIDs in VHF contrasts with the lack of substantial optical measurements. CID's VLF/LF electric field change waveforms resemble one full cycle of a distorted sine function, with the first half-cycle being (a few times) larger-amplitude and shorter-duration than the second. For this reason CIDs have been dubbed narrow bipolar events (NBEs). NBE waveshapes are strikingly similar to the largest initial breakdown pulses (IBPs) that occur during the earlier stages of a conventional lightning flash, called classic IBPs. The similarity between classic IBP and NBE far-field waveforms, combined with the fact that positive-polarity NBEs frequently appear as the first event in an otherwise regular positive intracloud discharge, may be indicative that the source of these two E-field pulse types share the same physical mechanism inside thunderclouds [da Silva and Pasko, JGR, 120, 4989-5009, 2015]. In this presentation, we introduce a novel way to investigate CIDs. We show evidence that CIDs can produce an unique ionospheric signature, named "elve doublets". These signatures are characterized by a pair of elves separated in time by 80-160 microseconds. Our analysis combines fast photometric elve data, equivalent-transmission-line models to describe the dynamics of CID source currents, and FDTD modeling of electromagnetic wave propagation in the Earth-ionosphere waveguide accounting for its nonlinear interaction with the lower ionosphere [Marshall et al., GRL, 42, 2015, doi:10.1002/2015GL064862]. We show that typical (negative-polarity) CID altitudes, between 14-22 km, explain the time delay observed in elve doublets, where the
Recent years of observations of the upper atmosphere and the lower ionosphere brought a fascinating collection of new phenomena including optical, radio, and gamma-ray emissions originating in the 20 to 90 km altitude range. Up to now, the most diverse phenomenology has emerged from the optical observations which have led to the identification of red sprites, blue jets, blue starts, and elves. Most of the studies have concentrated on relating such phenomena in the upper atmosphere to regular lightning discharges in the troposphere. The sprite/jet discharge itself can be caused by the runaway air breakdown, or regular air breakdown. The standard theory for optical airglow transients in the lower ionosphere above the thunderstorms also known as elves suggests that they are produced during interaction of electromagnetic pulses (EMP) from lightning with the lower ionosphere. Heating of the ambient electrons by the EMP in the D region can result in excitation of optical emissions once the optical excitation thresholds are reached. In this paper the authors suggest that in addition to this mechanism elves can be caused by an EMP generated by sprites and jets
Lightning return strokes radiate an electromagnetic pulse (EMP) which interacts with the D-region ionosphere; the largest EMPs produce new ionization, heating, and optical emissions known as elves. Elves are at least six times more common than sprites and other transient luminous events. Though the probability that a lightning return stroke will produce an elve is correlated with the return stroke peak current, many large peak current strokes do not produce visible elves. Apart from the lightning peak current, elve production may depend on the return stroke speed, lightning altitude, and ionospheric conditions. In this work we investigate the detailed structure of lightning that gives rise to elves by analyzing the characteristics of VLF/LF lightning sferics in conjunction with optical elve observations. Lightning sferics were observed using an array of six VLF/LF receivers (1 MHz sample-rate) in Oklahoma, and elves were observed using two high-speed photometers pointed over the Oklahoma region: one located at Langmuir Laboratory, NM and the other at McDonald Observatory, TX. Hundreds of elves with coincident LF sferics were observed during the summer months of 2013. We present data comparing the characteristics of elve-producing and non-elve producing lightning as measured by LF sferics. In addition, we compare these sferic and elve observations with FDTD simulations to determine key properties of elve-producing lightning.
Full Text Available French geographer, Michael Rochefort (1927-2015, built his career as an important name in the planning of his country. Part of this was because of his lengthy participation in the Comissariat General du Plan, a governmental agency in France, whose objectives are quite similar to the Brazilian Institute of Geography and Statistics (IBGE, an institution which would be one of the nodal points in Rochefort’s relationship with Brazil for over five decades. This article analyses this relationship in the 1960s, when IBGE, together with the methodologies proposed by Rochefort and François Perroux, developed important subsidy policies for planning. Despite the theoretical limitations in IBGE’s work in the 1960s, the institute’s work turned out to be of great importance for the political territories in at least the two decades following. Michael Rochefort exemplifies, through his work, the undeniable contribution of French geography to Brazilian geography during the years marked by the period of planning and national developmentalism in Brazil.
Implementation of the EU’s end-of-life vehicle (ELV) directive eight years ago had a profound influence on China’s automotive industry, leading to the consideration of concepts such as extended producer responsibility. It also provided some impetus for ELV recycling industry developments within China. This article provides insight into current thinking within China about ELV recycling as well as vehicle recovery activities.
Ice, snow and freezing temperatures have a large impact on coastal morphodynamics in Arctic polar environments. A recent warming of the Arctic climate induces many changes along the arctic shorelines. Sea-levels are rising due to thermal expansion and due to an increased fresh water flux from the glaciers and land ice masses. At the same time, the ice coverage of the coastal waters reduces and the open water periods in summer extend. There is a strong seasonal variation with open waters and active rivers in summer and ice-covered coastal waters and inactive rivers in winter. Coastal processes by waves and tides are thus limited to the summer and early fall. Besides, there is also a strong daily variation in fluvial discharges due to the daily variations in glacier melt with maximum melt in the afternoon and minimum values at night. At the same time, the actual flux of the river to the coastal bay is influenced by the tidal phase. Low tides will enhance the transport to the delta front, while high tides will create stagnant waters over the delta plain. The delta of the Røde Elv is located in southwestern Disko Island in west Greenland. It has a relatively small (ca. 101 km2) and partly glaciated drainage basin (ca. 20%) and its sediments consist of a mixture of basaltic sands and gravels. The Røde Elv delta is located at the end of a pro-glacial and fluvial valley at about 20 km from the glacier. The shores of the delta are reworked by waves, predominantly from southwestern, southern (largest fetch, over 50 km), and southeastern directions. The environment has a micro- to meso- tidal range with a spring tidal range of 2.7 m. The morphologic changes on the delta over the last decades clearly showed a seaward extension of the delta and a periodic shift in the location of the main delta channel. In this presentation, we focus on quantification of water discharges and suspended sediment fluxes to the Røde Elv delta in western Greenland, and on the morphological
Amongst today's techniques that are able to produce 3D point clouds, LIDAR and UAV (Unmanned Aerial Vehicle) photogrammetry are probably the most commonly used. Both methods have their own advantages and limitations. LIDAR scans create high resolution and high precision 3D point clouds, but such methods are generally costly, especially for sporadic surveys. Compared to LIDAR, UAV (e.g. drones) are cheap and flexible to use in different kind of environments. Moreover, the photogrammetric processing workflow of digital images taken with UAV becomes easier with the rise of many affordable software packages (e.g. Agisoft, PhotoModeler3D, VisualSFM). We present here a challenging study made at the Rochefort Cave Laboratory (South Belgium) comprising surface and underground surveys. The site is located in the Belgian Variscan fold-and-thrust belt, a region that shows many karstic networks within Devonian limestone units. A LIDAR scan has been acquired in the main chamber of the cave (~ 15000 m³) to spatialize 3D point cloud of its inner walls and infer geological beds and structures. Even if the use of LIDAR instrument was not really comfortable in such caving environment, the collected data showed a remarkable precision according to few control points geometry. We also decided to perform another challenging survey of the same cave chamber by modelling a 3D point cloud using photogrammetry of a set of DSLR camera pictures taken from the ground and UAV pictures. The aim was to compare both techniques in terms of (i) implementation of data acquisition and processing, (ii) quality of resulting 3D points clouds (points density, field vs cloud recovery and points precision), (iii) their application for geological purposes. Through Rochefort case study, main conclusions are that LIDAR technique provides higher density point clouds with slightly higher precision than photogrammetry method. However, 3D data modeled by photogrammetry provide visible light spectral information
Amongst today's techniques that are able to produce 3D point clouds, LIDAR and UAV (Unmanned Aerial Vehicle) photogrammetry are probably the most commonly used. Both methods have their own advantages and limitations. LIDAR scans create high resolution and high precision 3D point clouds, but such methods are generally costly, especially for sporadic surveys. Compared to LIDAR, UAV (e.g. drones) are cheap and flexible to use in different types of environments. Moreover, the photogrammetric processing workflow of digital images taken with UAV becomes easier with the rise of many affordable software packages (e.g., Agisoft PhotoScan, MicMac, VisualSFM). In this canvas, we present a challenging study made at the Rochefort Cave Laboratory (South Belgium) comprising surface and underground surveys. The main chamber of the cave ( 10000 m³) was the principal target of the study. A LIDAR scan and an UAV photoscan were acquired underground, producing respective 3D models. An additional 3D photoscan was performed at the surface, in the sinkhole in direct connection with the main chamber. The main goal of the project is to combine this different datasets for quantifying the orientation of inaccessible geological structures (e.g. faults, tectonic and gravitational joints, and sediments bedding), and for comparing them to structural data surveyed on the field. To go through structural interpretations, we used a subsampling method merging neighboured model polygons that have similar orientations, allowing statistical analyses of polygons spatial distribution. The benefit of this method is to verify the spatial continuity of in-situ structural measurements to larger scale. Roughness and colorimetric/spectral analyses may also be of great interest for several geosciences purposes by discriminating different facies among the geological beddings. Amongst others, this study was helpful to precise the local petrophysical properties associated with particular geological layers, what
Ground-based gravimetry is a non-invasive and integrated tool to characterize hydrological processes in complex environments such as karsts or volcanoes. A problem in ground-based gravity measurements however concerns the lack of sensitivity in the first meters below the topographical surface, added to limited infiltration below the gravimeter building (umbrella effect). Such limitations disappear when measuring underground. Coupling surface and subsurface gravity measurements therefore allow isolating hydrological signals occurring in the zone between the two gravimeters. We present a coupled surface/subsurface continuous gravimetric monitoring of 2 years at the Rochefort Cave Laboratory (Belgium). The gravity record includes surface measurements of a GWR superconducting gravimeter and subsurface measurements of a Micro-g LaCoste gPhone gravimeter, installed in a cave 35 m below the surface station. The recharge of karstic aquifers is extremely complex to model, mostly because karst hydrological systems are composed of strongly heterogeneous flows. Most of the problem comes from the inadequacy of conventional measuring tools to correctly sample such heterogeneous media, and particularly the existence of a duality of flow types infiltrating the vadose zone: from rapid flows via open conduits to slow seepage through porous matrix. Using the surface/subsurface gravity difference, we were able to identify a significant seasonal groundwater recharge within the karst vadose zone. Seasonal or perennial perched reservoirs have already been proven to exist in several karst areas due to the heterogeneity of the porosity and permeability gradient in karstified carbonated rocks. Our gravimetric experiment allows assessing more precisely the recharge processes of such reservoirs. The gravity variations were also compared with surface and in-cave hydrogeological monitoring (i.e. soil moisture, in-cave percolating water discharges, water levels of the saturated zone). Combined
Full Text Available With the rapid depletion of natural resources and undesired environmental changes globally, more interest has been shown in the research of green supply chain practices, including end-of-life vehicle (ELV recycling. The ELV recycling is mandatory for auto-manufacturers by legislation for the purpose of minimizing potential environmental damages. The purpose of the present research is to determine the best choice of ELV recycling service provider by employing an integrating hybrid multi-criteria decision making (MCDM method. In this research, economic, environmental and social factors are taken into consideration. The linguistic variables and trapezoidal fuzzy numbers (TFNs are applied into this evaluation to deal with the vague and qualitative information. With the combined weight calculation of criteria based on fuzzy aggregation and Shannon Entropy techniques, the normative multi-criteria optimization technique (FVIKOR method is applied to explore the best solution. An application was performed based on the proposed hybrid MCDM method, and sensitivity analysis was conducted on different decision making scenarios. The present study provides a decision-making approach on ELV recycling business selection under sustainability and green philosophy with high robustness and easy implementation.
Particularly intense lightning discharges can produce transient luminous events above thunderclouds, termed sprites, elves and jets. These short lived optical emissions in the mesosphere can reach from the tops of thunderclouds up to the ionosphere; they provide direct evidence of coupling from the lower atmosphere to the upper atmosphere. Sprites are arguably the most dramatic recent discovery in solar-terrestrial physics. Shortly after the first ground based video recordings of sprites, observations on board the Space Shuttle detected sprites and elves occurring all around the world. These reports led to detailed sprite observations in North America, South America, Australia, Japan, and Europe. Subsequently, sprites were detected from other space platforms such as the International Space Station and the ROCSAT satellite. During the past 15 years, more than 200 contributions on sprites have been published in the scientific literature to document this rapidly evolving new research area.
Full Text Available The paper focuses on the fantasy universes created by J.R.R. Tolkien and by the more recent French writer, Muriel Barbery. The two authors excel in their depiction of the elusive world of the elves, each offering a deeply personal vision (a man writer’s and a woman writer’s of what such magical beings may be like and how they may relate to humankind.
Early events are a Very Low Frequencies (VLF) signal perturbations recorded during a lightning activity. The properties of these signal perturbations and their association to the lightning peak current and/or Transient Luminous Events (TLEs) were widely studied. In a recently analysis a new early signal perturbations whose recovery time persists for several minutes were discovered. The underlying cause of these events is still unclear. In a recently published work, these events were attributed to the lightning peak current and the type of associated TLE. In others, and newly published papers, analyzes were done where all kind of early events were considered. Statistical results showed that the occurrence of long recovery events is independent of the lightning current amplitude and/or TLEs type. To understand which is the main cause of these events, we analyzed two types of early signal perturbations: One was a typical event (~200s time duration) in association with a Gigantic Jet and the second was a long recovery event in association with an elve recorded on December 12 2009 during the EuroSprite campaign. In addition to the VLF signal analysis, we used the Long Wave Propagation Capability (LWPC) code to simulate the unperturbed and perturbed signal parameters (amplitude and phase), to determine the signal modes attenuation coefficient and then to infer the electron density increases in the disturbed region. The results showed that the reference height was reduced from its ambient value (87km) to 66.4 km in the case of the GJ and 74.3 km for the elve. These reference heights decreases affected the propagating signal at the disturbed region by increasing the modes attenuation coefficient. Effectively, the number of modes was reduced from 28 at ambient condition to 9 modes (in the case of GJ) and 17 (in the case of elve). This high attenuation of modes leads to the appearance of null signal perturbations positions due to the interferences. Between two null positions
A 3-D finite difference time domain model is used to simulate the lightning electromagnetic pulse (EMP) and its interaction with the lower ionosphere. Results agree with the frequently observed, doughnut-shaped optical signature of elves but show that the structure exhibits asymmetry due to the presence of Earth's ambient magnetic field. Furthermore, in-cloud (horizontal) lightning channels produce observable optical emissions without the doughnut shape and, in fact, produce a much stronger optical output for the same channel current. Electron density perturbations associated with elves are also calculated, with contributions from attachment and ionization. Results presented as a function of parameters such as magnetic field direction, dipole current orientation, altitude and amplitude, and ambient ionospheric density profile demonstrate the highly nonlinear nature of the EMP-ionosphere interaction. Ionospheric effects of a sequence of in-cloud discharges are calculated, simulating a burst of in-cloud lightning activity and resulting in large density changes in the overlying ionosphere.
This paper concentrates on a study of a novel multi-sensor aided method by using acoustic and visual sensors for detection, recognition and separation of End-of Life vehicles' (ELVs) plastic materials, in order to optimize the recycling rate of automotive shredder residues (ASRs). Sensor-based sorting technologies have been utilized for material recycling for the last two decades. One of the problems still remaining results from black and dark dyed plastics which are very difficult to recognize using visual sensors. In this paper a new multi-sensor technology for black plastic recognition and sorting by using impact resonant acoustic emissions (AEs) and laser triangulation scanning was introduced. A pilot sorting system which consists of a 3-dimensional visual sensor and an acoustic sensor was also established; two kinds commonly used vehicle plastics, polypropylene (PP) and acrylonitrile-butadiene-styrene (ABS) and two kinds of modified vehicle plastics, polypropylene/ethylene-propylene-diene-monomer (PP-EPDM) and acrylonitrile-butadiene-styrene/polycarbonate (ABS-PC) were tested. In this study the geometrical features of tested plastic scraps were measured by the visual sensor, and their corresponding impact acoustic emission (AE) signals were acquired by the acoustic sensor. The signal processing and feature extraction of visual data as well as acoustic signals were realized by virtual instruments. Impact acoustic features were recognized by using FFT based power spectral density analysis. The results shows that the characteristics of the tested PP and ABS plastics were totally different, but similar to their respective modified materials. The probability of scrap material recognition rate, i.e., the theoretical sorting efficiency between PP and PP-EPDM, could reach about 50%, and between ABS and ABS-PC it could reach about 75% with diameters ranging from 14 mm to 23 mm, and with exclusion of abnormal impacts, the actual separation rates were 39.2% for PP, 41
In its bid to become a developed nation in a few years’ time, Malaysia has to consider various prevailing socio-economic and sociotechnical issues in the country. In the transportation sector per se, the ELV policy and initiative is one of the lacking parts in the country’s automotive ecosystem – in which a successful ELV program will not only cater the environmental concern but also help the safer car initiative for road users. This particular paper discusses what is regarded as the prelimin...
implies that the light sources exist not only in the troposphere but also in the mesosphere. At the image data obtained by the narrow-band filter camera (LSI-2), a pancake structure with bright spots was confirmed. Thus, we attributed the pancake structure and bright spots to a sprite halo and sprite streamers, respectively. We further analyzed a transient optical event obtained at 01:41:00.466 UT on March 30, 2013. In this event very strong pulse signals are detected only by PH1 (150-280 nm) and PH4 (600-900 nm). Since the field-of-view (FOV) of PH4 is 86.8 deg., which is larger than that of other PH channels (FOV=42.7 deg.), a lightning discharge seems to be occurred within PH4 FOV but without FOV of the other PH channels. Nevertheless, the existence of the strong FUV emission detected by PH1 means the occurrence of elves. At the presentation, we will show the results derived from LSI and PH data analysis and will discuss the photometric characteristics more in detail.
Full Text Available In its bid to become a developed nation in a few years’ time, Malaysia has to consider various prevailing socio-economic and sociotechnical issues in the country. In the transportation sector per se, the ELV policy and initiative is one of the lacking parts in the country’s automotive ecosystem – in which a successful ELV program will not only cater the environmental concern but also help the safer car initiative for road users. This particular paper discusses what is regarded as the preliminary findings on the ELV policy from the Malaysia’s automotive ecosystem study database. From a total of 484 respondents, 268 or 55.4% had agreed to the proposal to introduce an age limit for passenger vehicles in Malaysia. The majority of those who gave their nod to the policy choose 10 years of vehicle age as the limit (38.9%, and a staggering 79.8% of them supposed that the age limit should be between 5 to 10 years. Further analysis based on the Multiple Logistic Regression found out that from a total of nine important variables related to car users’ profile and ownership status, the significant predictors to “the agreement to introduce vehicle age limit” were age, income and car status (new or used. Thus, this finding might be beneficial for the policymakers to strategize the ELV policy that sooner or later should be implemented in the Malaysia’s “developed country” environment.
Full Text Available The perception of elements in a system often creates their interdependence, interconditionality, and suppression. The lines from a basic geometrical element have become the model of a reductive world based on isolation according to certain criteria such as function, structure, and social organization. Their traces are experienced in the contemporary world as fragments or ruins of a system of domination of an assumed hierarchical unity. How can one release oneself from such dependence or determinism? How can the lines become less “systematic” and forms more autonomous, and less reductive? How is a form released from modernistic determinism on the new controversial ground? How can these elements or forms of representation become forms of action in the present complex world? In this paper, the meaning of lines through the ideas of Le Corbusier, Leonidov, Picasso, and Hitchcock is presented. Spatial research was made through a series of examples arising from the projects of the architectural studio “Residential Transformations”, which was a backbone for mapping the possibilities ranging from playfulness to exactness, as tactics of transformation in the different contexts of the contemporary world.
When you think of children’s picture books, the first images that come to mind will most likely be drawings. However, in the 1950s a quarter of all children’s picture books were illustrated with photographs. The article gives an overview of the Danish photographical picture book tradition, which ...
Each alternative scheme for treating a vehicle at its end of life has its own consequences from a social, environmental, economic and technical point of view. Furthermore, the criteria used to determine these consequences are often contradictory and not equally important. In the presence of multiple conflicting criteria, an optimal alternative scheme never exists. A multiple-criteria decision aid (MCDA) method to aid the Decision Maker (DM) in selecting the best compromise scheme for the management of End-of-Life Vehicles (ELVs) is presented in this paper. The constitution of a set of alternatives schemes, the selection of a list of relevant criteria to evaluate these alternative schemes and the choice of an appropriate management system are also analyzed in this framework. The proposed procedure relies on the PROMETHEE method which belongs to the well-known family of multiple criteria outranking methods. For this purpose, level, linear and Gaussian functions are used as preference functions.
Subionospheric VLF recordings are investigated in relation with intense cloud-to-ground (CG) lightning data. Lightning impacts the lower ionosphere via heating and ionization changes which produce VLF signal perturbations known as early VLF events. Typically, early events recover in about 100 s, but a small subclass does not recover for many minutes, known as long-recovery early events (LORE). In this study, we identify LORE as a distinct category of early VLF events, whose signature may occur either on its own or alongside the short-lived typical early VLF event. Since LORE onsets coincide with powerful lightning strokes of either polarity (±), we infer that they are due to long-lasting ionization changes in the uppermost D region ionosphere caused by electromagnetic pulses emitted by strong ± CG lightning peak currents of typically > 250 kA, which are also known to generate elves. The LORE perturbations are detected when the discharge is located within ~250 km from the great circle path of a VLF transmitter-receiver link. The probability of occurrence increases with stroke intensity and approaches unity for discharges with peak currents ≥ ~300 kA. LOREs are nighttime phenomena that occur preferentially, at least in the present regional data set, during winter when strong ± CG discharges are more frequent and intense. The evidence suggests LORE as a distinct signature representing the VLF fingerprint of elves, a fact which, although was predicted by theory, it escaped identification in the long-going VLF research of lightning effects in the lower ionosphere.
In order to introduce radiation curing into the technology of manufacturing conductors with silicone insulation the suitability was tested of the individual brands of silicone rubber used for cables. The criterion was the range of doses guaranteeing the required mechanical and rheological properties of the rubber. The ELV 1 accelerator was used for irradiation. A description is given of the design of the technological equipment of the line which was put into experimental operation. (J.P.)
At just over 10 meters above street level, the High Line extends three kilometers through three districts of Southwestern Manhattan in New York. It consists of simple steel construction, and previously served as an elevated rail line connection between Penn Station on 34th Street and the many....... The High Line project has been carried out as part of an open conversion strategy. The result is a remarkable urban architectural project, which works as a catalyst for the urban development of Western Manhattan. The greater project includes the restoration and reuse of many old industrial buildings...
In this paper we present World Lines as a novel interactive visualization that provides complete control over multiple heterogeneous simulation runs. In many application areas decisions can only be made by exploring alternative scenarios. The goal of the suggested approach is to support users in this decision making process. In this setting the data domain is extended to a set of alternative worlds where only one outcome will actually happen. World Lines integrate simulation visualization and...
Full Text Available In this work, serial production lines with finished goods buffers operating in the pull regime are considered. The machines are assumed to obey Bernoulli reliability model. The problem of satisfying customers demand is addressed. The level of demand satisfaction is quantified by the due-time performance (DTP, which is defined as the probability to ship to the customer a required number of parts during a fixed time interval. Within this scenario, the definitions of DTP bottlenecks are introduced and a method for their identification is developed.
This book deals with line facilities. The contents of this book are outline line of wire telecommunication ; development of line, classification of section of line and theory of transmission of line, cable line ; structure of line, line of cable in town, line out of town, domestic cable and other lines, Optical communication ; line of optical cable, transmission method, measurement of optical communication and cable of the sea bottom, Equipment of telecommunication line ; telecommunication line facilities and telecommunication of public works, construction of cable line and maintenance and Regulation of line equipment ; regulation on technique, construction and maintenance.
Full Text Available James Worner is an Australian-based writer and scholar currently pursuing a PhD at the University of Technology Sydney. His research seeks to expose masculinities lost in the shadow of Australia’s Anzac hegemony while exploring new opportunities for contemporary historiography. He is the recipient of the Doctoral Scholarship in Historical Consciousness at the university’s Australian Centre of Public History and will be hosted by the University of Bologna during 2017 on a doctoral research writing scholarship. ‘Parallel Lines’ is one of a collection of stories, The Shapes of Us, exploring liminal spaces of modern life: class, gender, sexuality, race, religion and education. It looks at lives, like lines, that do not meet but which travel in proximity, simultaneously attracted and repelled. James’ short stories have been published in various journals and anthologies.
The traditional line balancing (LB) problem considers a production line in which stations are arranged consecutively in a line. A balance is determined by grouping tasks into stations while moving forward (or backward) through a precedence network. Recently many production lines are being arranged
The Middle Eifelian trilobite fauna of the Belgian Ardennes shows close affinities with that of the German Eifel. Two trilobite taxa are recorded from Middle Eifelian strata near the town of Jemelle, on the southern border of the Dinant Synclinorium, Belgium. Kettneraspis bayarti sp. nov. is closely
This book is about cable line engineering. It is comprised of nine chapters, which deals with summary of cable communication such as way, process of cable communication and optical communication, Line constant of transmission on primary constant, reflection and crosstalk, communication cable line of types like flat cable, coaxial cable and loaded cable, Install of communication line with types and facility of aerial line, construction method of communication line facility, Measurement of communication line, Carrier communication of summary, PCM communication with Introduction, regeneration relay system sampling and quantization and Electric communication service and general information network with mobile communication technique and satellite communication system.
Listening habit has an important share in the individual perceiving his/her environment and the world properly and complying with the social environment he/she lives. Because listening is an important skill which enables the individual to use the communication skills he/she learned both at school and out of school properly and to understand…
Vermont Center for Geographic Information — (Link to Metadata) The ELTRN layer depicts electric transmission line corridors in Vermont. Various methods have been used to digitize features. The data layer...
This thesis presents three contributions to the area of polygonal line simplification, or simply line simplification. A polygonal path, or simply a path is a list of points with line segments between the points. A path can be simplified by morphing it in order to minimize some objective function...
This thesis is devoted to the study of ensembles of dense directed lines. These lines are principally to be thought of as polymers, though they also have the morphology of flux lines in high temperature superconductors, strings of colloidal spheres in electrorheological fluids and the world lines of quantum mechanical bosons. The authors discuss how directed polymer melts, string-like formations in electrorheological and ferro-fluids, flux lines in high temperature superconductors and the world lines of quantum mechanical bosons all share similar descriptions. They study a continuous transition in all of these systems, and then study the critical mixing properties of binary mixtures of directed polymers through the renormalization group. They predict the exponents for a directed polymer blend consolute point and a novel two-phase superfluid liquid-gas critical point
A series transmission line transformer is set forth which includes two or more of impedance matched sets of at least two transmissions lines such as shielded cables, connected in parallel at one end ans series at the other in a cascading fashion. The cables are wound about a magnetic core. The series transmission line transformer (STLT) which can provide for higher impedance ratios and bandwidths, which is scalable, and which is of simpler design and construction.
Faraday introduced electric field lines as a powerful tool for understanding the electric force, and these field lines are still used today in classrooms and textbooks teaching the basics of electromagnetism within the electrostatic limit. However, despite attempts at generalizing this concept beyond the electrostatic limit, such a fully relativistic field line theory still appears to be missing. In this work, we propose such a theory and define covariant electromagnetic field lines that naturally extend electric field lines to relativistic systems and general electromagnetic fields. We derive a closed-form formula for the field lines curvature in the vicinity of a charge, and show that it is related to the world line of the charge. This demonstrates how the kinematics of a charge can be derived from the geometry of the electromagnetic field lines. Such a theory may also provide new tools in modeling and analyzing electromagnetic phenomena, and may entail new insights regarding long-standing problems such as radiation-reaction and self-force. In particular, the electromagnetic field lines curvature has the attractive property of being non-singular everywhere, thus eliminating all self-field singularities without using renormalization techniques.
A widely accessible data bank (available through Netscape) and consiting of all (or most) of the emission lines reported in the litterature is being built. It will comprise objects as diverse as HII regions, PN, AGN, HHO. One of its use will be to define/refine existing diagnostic emission line diagrams.
This new book concentrates on the mechanical aspects of distribution wood pole lines, including live line working, environmental influences, climate change and international standards. Other topics include statutory requirements, safety, profiling, traditional and probabilistic design, weather loads, bare and covered conductors, different types of overhead systems, conductor choice, construction and maintenance. A section has also been devoted to the topic of lightning, which is one of the major sources of faults on overhead lines. The book focuses on the effects of this problem and the strate
Department of Veterans Affairs — The caring responders at the Veterans Crisis Line are specially trained and experienced in helping Veterans of all ages and circumstances. Some of the responders are...
Kansas Data Access and Support Center — This data set is a digital representation of the EletcircTransmission lines for the State of Kansas as maintained by the Kansas Corporation Commission. Data is...
Department of Homeland Security — Transmission Lines are the system of structures, wires, insulators and associated hardware that carry electric energy from one point to another in an electric power...
An automated nuclear fuel fabrication line is being designed for installation in the Fuels and Materials Examination Facility (FMEF) near Richland, Washington. The fabrication line will consist of seven major process systems: Receiving and Powder Preparation; Powder Conditioning; Pressing and Boat Loading; Debinding, Sintering, and Property Adjustment; Boat Transport; Pellet Inspection and Finishing; and Pin Operations. Fuel powder processing through pellet pressing will be discussed in this paper
The Nasca Lines are located in the Pampa region of Peru, the desolate plain of the Peruvian coast 400 km south of Lima. The Lines were first spotted when commercial airlines began flying across the Peruvian desert in the 1920's. Passengers reported seeing 'primitive landing strips' on the ground below. The Lines were made by removing the iron-oxide coated pebbles which cover the surface of the desert. When the gravel is removed, they contrast with the light color underneath. In this way the lines were drawn as furrows of a lighter color. On the pampa, south of the Nasca Lines, archaeologists have now uncovered the lost city of the line-builders, Cahuachi. It was built nearly two thousand years ago and was mysteriously abandoned 500 years later. This ASTER sub-image covers an area of 14 x 18 km, was acquired on December 22, 2000, and is located at 14.7 degrees south latitude and 75.1 degrees west longitude. The U.S. science team is located at NASA's Jet Propulsion Laboratory, Pasadena, Calif. The Terra mission is part of NASA's Science Mission Directorate.
The displacement or deferral of conventional AC transmission line installation is a key benefit associated with several technologies being developed with the support of the U.S. Department of Energy's Office of Energy Management (OEM). Previous benefits assessments conducted within OEM have been based on significantly different assumptions for the average cost per mile of AC transmission line. In response to this uncertainty, an investigation of transmission line capital cost data was initiated. The objective of this study was to develop a database for preparing preliminary estimates of transmission line costs. An extensive search of potential data sources identified databases maintained by the Bonneville Power Administration (BPA) and the Western Area Power Administration (WAPA) as superior sources of transmission line cost data. The BPA and WAPA data were adjusted to a common basis and combined together. The composite database covers voltage levels from 13.8 to 765 W, with cost estimates for a given voltage level varying depending on conductor size, tower material type, tower frame type, and number of circuits. Reported transmission line costs vary significantly, even for a given voltage level. This can usually be explained by variation in the design factors noted above and variation in environmental and land (right-of-way) costs, which are extremely site-specific. Cost estimates prepared from the composite database were compared to cost data collected by the Federal Energy Regulatory Commission (FERC) for investor-owned utilities from across the United States. The comparison was hampered because the only design specifications included with the FERC data were voltage level and line length. Working within this limitation, the FERC data were not found to differ significantly from the composite database. Therefore, the composite database was judged to be a reasonable proxy for estimating national average costs
Embarking on a work of art constitutes a reduction of information – because we grasp the diversity and plurality of the manifestations we encounter by abstracting them and transforming them into manageable concepts; as we do when we draw contour lines on the landscape – they are imaginary...... and invisible but an abstraction essential for noting a difference or marking a place on a map. In the same way, a stroke in a sketch or a line in the sand is a manifestation of our ability to draw a boundary that both includes and excludes information. Where the line makes the birth of an idea visible......, it expresses through movement our tendency to mark a difference by drawing attention to and enclosing a whole series of relations that confront our preconceived notions. It is in the process of transformation in which we reduce the complexity of how we work, and rethink our ideas anew by refining the very same...
These proceedings represent papers presented at the 13th International Conference on Spectral Line Shapes which was held in Firenze,Italy from June 16-21, 1996. The topics covered a wide range of subjects emphasizing the physical processes associated with the formation of line profiles: high and low density plasma; atoms and molecules in strong laser fields, Dopple-free and ultra-fine spectroscopy; the line shapes generated by the interaction of neutrals, atoms and molecules, where the relavant quantities are single particle properties, and the interaction-induced spectroscopy. There were 131 papers presented at the conference, out of these, 6 have been abstracted for the Energy Science and Technology database
The concept of Stokes line width is introduced for the asymptotic expansions of functions near an essential singularity. Explicit expressions are found for functions (switching functions) that switch on the exponentially small terms for the Dawson integral, Airy function, and the gamma function. A different, more natural representation of a function, not associated with expansion in an asymptotic series, in the form of dominant and recessive terms is obtained by a special division of the contour integral which represents the function into contributions of higher and lower saddle points. This division leads to a narrower, natural Stokes line width and a switching function of an argument that depends on the topology of the lines of steepest descent from the saddle point
Vermont Center for Geographic Information — (Link to Metadata) This datalayer is comprised of major railroad lines for the state of Vermont. These railroad linesline up well along quadrangle boundaries, but...
Sprayed concrete, or shotcrete, was invented in the 1920s for preserving dinosaur skeletons and was used underground initially in coalmines for the preservation and fine proofing of timber supports. Its use as a support lining in rock tunnelling was developed in the 1950s and 60s. The article surveys equipment available from major manufacturers and suppliers of concrete spraying equipment (Aliva, Cifa, GIA, Industri, Ingersoll Rand, etc.), specialist cement and additive manufacturers (Castle, Cement, Moria Carbotech). manufacturers of lattice girders and fibre reinforcement, and manufacturers of instrumentation for tunnel linings. 5 tabs., 9 photos.
Glue-paste linings of (Western) canvas paintings have been performed with a variety of materials throughout history and are present in a very significant amount of artworks in collections in Europe and elsewhere. Cereal flours and animal glues were usually the main ingredients because they were r...
A brief review is given of more than a decade of work involving measurement of the strength of the K line of calcium in A-type stars. The effects of interstellar reddening are reexamined, and an improved estimate for the range in calcium abundance among field stars is obtained. (Auth.)
Automated and remotely controlled pellet inspection operations will be utilized in the Secure Automated Fabrication (SAF) line. A prototypic pellet gage was designed and tested to verify conformance to the functions and requirements for measurement of diameter, surface flaws and weight-per-unit length
Town of Chapel Hill, North Carolina — Chapel Hill Bike Map Lines from KMZ file.This data came from the wiki comment board for the public, not an “official map” showing the Town of Chapel Hill's plans or...
of judgement that distinguishes between the inside and outside of a political community, between citizens and zombies. Second, the chapter focuses on the rhetorics applied to draw the line between rights-bearers and the rightless. ‘Prophetic’ speech, echoing the language of the Old Testament prophets, is vital...
This publication is based on the Master thesis “User-driven ecoinnovation process: Towards the implementation of the Green product line at JELD-WEN” written by Ana Maria Muñoz-Marin as her Graduation Project for the MSc. Global Innovation Management degree. The company-based experiment was carried...
The magnetic field line Hamiltonian and the associated canonical form for the magnetic field are important concepts both for understanding toroidal plasma physics and for practical calculations. A number of important properties of the canonical or Hamiltonian representation are derived and their importance is explained
The present work deals with friction in mixed lubricated line contacts. Components in systems are becoming smaller and due to, for instance power transmitted, partial contact may occur. In industrial applications, friction between the moving contacting surfaces cannot be avoided, therefore it is
at 50% RH but increased the stress level severely in dry conditions and offered no support to the painting at 70-80 % RH. This means that the traditional glue-paste lining techniques and the wax-resin technique in high RH seem to limit the advisable RH fluctuation in a cultural institution. Conversely...
Antiprotons, decelerated in LEAR to a momentum of 100 MeV/c (kinetic energy of 5.3 MeV), were delivered to the experiments in an "Ultra-Slow Extraction", dispensing some 1E9 antiprotons over times counted in hours. Beam-splitters and a multitude of beam-lines allowed several users to be supplied simultaneously.
Graphical features on map, charts, diagrams and graph drawings usually must be annotated with text labels in order to convey their meaning. In this paper we focus on a problem that arises when labeling schematized maps, e.g. for subway networks. We present algorithms for labeling points on a line
textabstractIn this paper we will deal with definitions of subjective poverty lines. To measure a poverty threshold value in terms of household income, which separates the poor from the non-poor, we take into account the opinions of all people in society. Three subjective methods will be discussed
Architecture is a versatile, multifaceted area to study in the artroom with multiple age levels. It can easily stimulate a study of basic line, shape, and various other art elements and principles. It can then be extended into a more extensive study of architectural elements, styles, specific architects, architecture of different cultures, and…
Rational engineering of biosynthetic assembly lines for production of new compounds is an attractive prospect, yet it presents many challenges. Learning from biology, some of the rules for expanding the chemical diversity of non-ribosomal peptides have been uncovered in two recent studies.
The basic properties of the Hamiltonian representation of magnetic fields in canonical form are reviewed. The theory of canonical magnetic perturbation theory is then developed and applied to the time evolution of a magnetic field embedded in a toroidal plasma. Finally, the extension of the energy principle to tearing modes, utilizing the magnetic field line Hamiltonian, is outlined
Defective capital assets may be quickly restored to their operational condition by replacing the item that has failed. The item that is replaced is called the Line Replaceable Unit (LRU), and the so-called LRU definition problem is the problem of deciding on which item to replace upon each type of
This paper discusses the process of identifying factors that influence the contamination level of a given decision area and then determining the likelihood that the area remains unacceptable. This process is referred to as lines of evidence. These lines of evidence then serve as inputs for the stratified compliance sampling (SCS) method, which requires a decision area to be divided into strata based upon contamination expectations. This is done in order to focus sampling efforts more within stratum where contamination is more likely and to use the domain knowledge about these likelihoods of the stratum remaining unacceptable to buy down the number of samples necessary, if possible. Two different building scenarios were considered as an example (see Table 3.1). SME expertise was elicited concerning four lines of evidence factors (see Table 3.2): 1) amount of contamination that was seen before decontamination, 2) post-decontamination air sampling information, 3) the applied decontaminant information, and 4) the surface material. Statistical experimental design and logistic regression modelling were used to help determine the likelihood that example stratum remained unacceptable for a given example scenario. The number of samples necessary for clearance was calculated by applying the SCS method to the example scenario, using the estimated likelihood of each stratum remaining unacceptable as was determined using the lines of evidence approach. The commonly used simple random sampling (SRS) method was also used to calculate the number of samples necessary for clearance for comparison purposes. The lines of evidence with SCS approach resulted in a 19% to 43% reduction in total number of samples necessary for clearance (see Table 3.6). The reduction depended upon the building scenario, as well as the level of percent clean criteria. A sensitivity analysis was also performed showing how changing the estimated likelihoods of stratum remaining unacceptable affect the number
textabstractMicro-clones are tiny duplicated pieces of code; they typically comprise only few statements or lines. In this paper, we study the “Last Line Effect,” the phenomenon that the last line or statement in a micro-clone is much more likely to contain an error than the previous lines or
Micro-clones are tiny duplicated pieces of code; they typically comprise only few statements or lines. In this paper, we study the “Last Line Effect,” the phenomenon that the last line or statement in a micro-clone is much more likely to contain an error than the previous lines or statements. We do
The conventional no-slip boundary condition leads to a non-integrable stress singularity at a moving contact line. This makes numerical simulations of two-phase flow challenging, especially when capillarity of the contact point is essential for the dynamics of the flow. We will describe a modeling methodology, which is suitable for numerical simulations, and present results from numerical computations. The methodology is based on combining a relation between the apparent contact angle and the contact line velocity, with the similarity solution for Stokes flow at a planar interface. The relation between angle and velocity can be determined by theoretical arguments, or from simulations using a more detailed model. In our approach we have used results from phase field simulations in a small domain, but using a molecular dynamics model should also be possible. In both cases more physics is included and the stress singularity is removed.
The general Method of Lines (MOL) procedure provides a flexible format for the solution of all the major classes of partial differential equations (PDEs) and is particularly well suited to evolutionary, nonlinear wave PDEs. Despite its utility, however, there are relatively few texts that explore it at a more advanced level and reflect the method''s current state of development.Written by distinguished researchers in the field, Adaptive Method of Lines reflects the diversity of techniques and applications related to the MOL. Most of its chapters focus on a particular application but also provide a discussion of underlying philosophy and technique. Particular attention is paid to the concept of both temporal and spatial adaptivity in solving time-dependent PDEs. Many important ideas and methods are introduced, including moving grids and grid refinement, static and dynamic gridding, the equidistribution principle and the concept of a monitor function, the minimization of a functional, and the moving finite elem...
Approaches to the regulation of risk from technological systems, such as nuclear power plants or chemical process plants, in which potential accidents may result in a broad range of adverse consequences must take into account several different aspects of risk. These include overall or average risk, accidents posing high relative risks, the rate at which accident probability decreases with increasing accident consequences, and the impact of high frequency, low consequence accidents. A hypothetical complementary cumulative distribution function (CCDF), with appropriately chosen parametric form, meets all these requirements. The Farmer limit line, by contrast, places limits on the risks due to individual accident sequences, and cannot adequately account for overall risk. This reduces its usefulness as a regulatory tool. In practice, the CCDF is used in the Canadian nuclear licensing process, while the Farmer limit line approach, supplemented by separate qualitative limits on overall risk, is employed in the United Kingdom
present proceedings from the UPGEM conference "Draw the Line!" in Copenhagen May 2008. The proceedings include contributions by UPGEM researchers, conference speeches by other researchers, politicians and gender equality officers in which they relate their work and research with the research done in UPGEM......Draw the Line! International Conference, Copenhagen 2008 Papers, proceedings and recommendations is the second publication of the international three year long project "Understanding Puzzles in the Gendered European Map" (UPGEM), which is financed by the European Commission. In this publication we....... The UPGEM research has previously been published in national reports from each of the partner countries (Denmark, Estonia, Finland, Italy and Poland). In these individual national reports of universities as workplaces for male and female researchers we discuss scientific cultures in physics embedded...
The Spiral Line Induction Accelerator (SLIA) is a multi-kiloampere compact electron accelerator. It uses linear induction accelerator modules on the straight sections of a racetrack spiral, with strong-focusing bends to recirculate the electrons. The strong focusing is provided by stellarator windings on the bends. Stellarator coils are used to provide the strong focusing on the bends. The matching of the electron beam from a diode through a series of accelerator modules and stellarator bends is a major issue in the design of this accelerator. The beam line design for a proof-of-concept SLIA experiment (10 kA, 7 MeV) to be carried out at Pulse Sciences, Inc. will be presented. The design will demonstrate beam matching from element to element in the focusing system, the design of an achromatic bend, and the requirements for avoiding collective instabilities
Westinghouse Hanford Company is developing a desk-top simulation based training program on the operation of the Remote Mechanical C (RMC) Line process in the Plutonium Finishing Plant on the Hanford site, Richland, Washington. Simulations display aod contioually update current values of system parameters on computer graphics of RMC line equipment. Students are able to operate a variety of controllers to maintain proper system status. Programmed faults, selectable by the course instructor, can be used to test student responses to off-normal events. Prior to operation of the simulation, students are given computer-based tutorials on the function, processes, operation, and error conditions associated with individual components. By including the capability of operating each individual component - valves, heaters, agitators, etc. - the computer-based training (CBT) lessons become an interactive training manual. From one perspective RMC represents one step in the diffusion of the well-known and well-documented simulator training activities for nuclear reactor operators to other training programs, equally critical, perhaps, but less well scrutinized in the past. Because of the slowly responding nature of the actual process, RMC can retain many of the capabilities of practice and testing in a simulated work environment while avoiding the cost of a full scale simulator and the exposure and waste developed by practice runs of the RMC line. From another perspective RMC suggests training advances even beyond the most faithful simulators. For example, by integrating CBT lessons with the simulation, RMC permits students to focus in on specific processes occurring inside chosen components. In effect, the interactive training manual is available on-line with the simulation itself. Cost are also discussed
Many hospital administrators and boards of directors, having overcome their initial opposition to advertising and hired a marketing professional, are wondering why their marketing programs have not accomplished all that they had hoped. The answer lies in their perception of who is responsible for marketing. Marketing is not a specialty separate from the disciplines of management--it is a basic management skill. Its goal is to satisfy the customer by providing products and services that meet the customer's needs, wants, and preferences. Line managers must understand the hospital's customers and make the critical day-to-day differences in satisfying them. They are the hospital's front-line marketers, and the marketing department's role is to support them in this function. The marketing department should develop the line managers' marketing skills by furnishing them with the appropriate tools: formats, models, examples, and instructions. In addition, the marketing staff should provide such specialized services as marketing research, ad agency management, and development of communications.
The transmission of electrical signal through a coaxial line is not perfect and signal distortions are increased as much as the frequency spectrum is extended. We have designed and achieved passive filters (named equalizers) with transfer functions which are inverse of coaxial transfer functions. Doing so our attempt is to avoid definitive loss of information in the recorded data. The main feature of our equalization method lies in the fact it could be either an electrical or a numerical correction or both of them. Some examples in the use of this technique are also proposed [fr
On-line handwriting includes more information on time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been
The innominate line continues to be of value in evaluating the integrity of the sphenoid bone since plain skull radiographs remain a primary screening tool for metastatic disease, seizure disorder and headache. The detection of lesions involving the sphenoid bone can be difficult. The accuracy of the radionulcide scan is reduced because of confusion caused by uptake in the adjacent nasal and sinus mucosa. On computed tomography, the sections through the base of the skull and orbit can contain many artifictual densities caused by a combination of bone, soft tissue and sinus air interfaces. In addition, routine settings of window width and level on CT scan are designed to best demonstrate the soft tissues, and bony lesions can easily be missed. Thus, disruption of the ''integrity'' of this line on plain films, particularly the Caldwell projection, can be a sensitive first indicator of disease involving the sphenoid bone. Such a determination on plain film leads to more accurate CT scanning, in that attention will be given to the skull base and scans will be imaged with both soft tissue and bone windows. (orig./MG)
Rigidity, viscoelasticity, flexibility, radiation resistance, leaching resistance, rust-proofness, endurance, etc. are required for the lining materials to wall surfaces and floor surfaces of facilities used under the effect of radiation rays and for the inner surface protection of vessels for radioactive wastes. The present invention provides radiation resistant lining material capable of satisfying such various requirements in a well-balanced manner. That is, the material contains (A) 100 parts by weight of rapidly curing cement, (B) 50 to 300 % by weight of aggregate, and (C) 80 to 120 parts by weight of polymer emulsion. As the specific example, the ingredient (A) is commercially available under the trade name of Jet Cement. The aggregate of the ingredient (B) has preferably from about 0.6 to 0.2 mm of size and is made of material, preferably, silicon or iron grains. As the ingredient (C), acrylic resin emulsion is preferred. As a result of example, these ingredient constitutions can satisfy each of the required performance described above. (I.S.)
Full Text Available A study was conducted at the sole global producer of suspension struts for a particular vehicle manufacturer. This supplier is currently able to meet customer demand. However, it does so because of a large finished goods and work-in-progress (WIP inventory. The plant operates two production processes that are separated by a large buffer of WIP, which essentially decouples the production processes. This study aimed to reduce this WIP buffer; this would require the processes to become synchronised, bearing in mind that the reliability of delivery should not decrease. A tool that considers time, quality, and machine capacity was developed to assess the impact of line synchronisation on company performance figures. It was found that line synchronisation produced several benefits for the supplier, including batch size reduction, lower inventory levels, and associated shorter lead times. This further allowed the supplier to improve flow in the plant by introducing a pull system. Improved visual oversight could lead to further improved problem-solving and innovation.
We study the determinants of China’s bilateral local currency swap lines that were established since the recent global finance crisis. It is found that economic factors, political considerations, and institutional characteristics including trade intensity, economic size, strategic partnership, free trade agreement, corruption, and stability affect the decision of signing a swap line agreement. Once a swap line agreement decision is made, the size of the swap line is then mainly affected by tr...
using long cavity. M8 Removable Pellicle Beam Splitter for He-Ne Lineup Beam. Removed before HF or DF laser is turned on. 27 A 27 * A r of the chopper...three probe laser lines, however three lines were sequentially measured to verify the diagnostic equipment. Two of the three lines have been monitored
Background: Cell lines have been widely used in biomedical research. The community-based Cell Line Ontology (CLO) is a member of the OBO Foundry library that covers the domain of cell lines. Since its publication two years ago, significant updates have been made, including new groups joining the CLO
A Transmission Line Transformer (TLT) can be used to transform high-voltage nanosecond pulses. These transformers rely on the fact that the length of the pulse is shorter than the transmission lines used. This allows connecting the transmission lines in parallel at the input and in series at the
Topological protected wave engineering in artificially structured media is at the frontier of ongoing metamaterials research that is inspired by quantum mechanics. Acoustic analogues of electronic topological insulators have recently led to a wealth of new opportunities in manipulating sound propagation with strikingly unconventional acoustic edge modes immune to backscattering. Earlier fabrications of topological insulators are characterized by an unreconfigurable geometry and a very narrow frequency response, which severely hinders the exploration and design of useful devices. Here we establish topologically protected sound in reconfigurable phononic crystals that can be switched on and off simply by rotating its three-legged "atoms" without altering the lattice structure. In particular, we engineer robust phase delay defects that take advantage of the ultrabroadband reflection-free sound propagation. Such topological delay lines serve as a paradigm in compact acoustic devices, interconnects, and electroacoustic integrated circuits.
It is pointed out that the spectral width of a quasi-monochromatic light beam broadens when the beam is focused. A quantitative formula for this broadening is derived from classical wave theory. The effect is shown to explain some experiments on laser beams done by E. Panarella which that author has explained under the ad-hoc hypothesis that the frequency of the photons changes along with the intensity of the light beam. The line broadening by focusing might also contribute to gas ionization by incident light when the ionization potential is well above the mean photon energy. Some remarks are made on some direct applications of the Heisenberg relations in comparison with our treatment. (Author) [pt
The present study was carried out in order to examine the radiosensitivity of malignant pleural mesothelioma cell lines. Cell kinetics, radiation-induced delay of the cell cycle and DNA ploidy of the cell lines were also determined. For comparison an HeLa and a human foetal fibroblast cell line were simultaneously explored. Six previously cytogenetically and histologically characterized mesothelioma tumor cell lines were applied. A rapid tiazolyl blue microtiter (MTT) assay was used to analyze radiosensitivity and cell kinetics and DNA ploidy of the cultured cells were determined by flow cytometry. The survival fraction after a dose of 2 Gy (SF2), parameters α and β of the linear quadratic model (LQ-model) and mean inactivation dose (D MID ) were also estimated. The DNA index of four cell lines equaled 1.0 and two cell lines equaled 1.5 and 1.6. Different mesothelioma cell lines showed a great variation in radiosensitivity. Mean survival fraction after a radiation dose of 2 Gy (SF2) was 0.60 and ranged from 0.36 to 0.81 and mean α value was 0.26 (range 0.48-0.083). The SF2 of the most sensitive diploid mesothelioma cell line was 0.36: Less than that of the foetal fibroblast cell line (0.49). The survival fractions (0.81 and 0.74) of the two most resistant cell lines, which also were aneuploid, were equal to that of the HeLa cell line (0.78). The α/β ratios of the most sensitive cell lines were almost an order of magnitude greater than those of the two most resistant cell lines. Radiation-induced delay of the most resistant aneuploid cell line was similar to that of HeLa cells but in the most sensitive (diploid cells) there was practically no entry into the G1 phase following the 2 Gy radiation dose during 36 h. (orig.)
A bipolar pulse forming transmission line module for linear induction accelerators having first, second, third, fourth, and fifth planar conductors which form an interleaved stack with dielectric layers between the conductors. Each conductor has a first end, and a second end adjacent an acceleration axis. The first and second planar conductors are connected to each other at the second ends, the fourth and fifth planar conductors are connected to each other at the second ends, and the first and fifth planar conductors are connected to each other at the first ends via a shorting plate adjacent the first ends. The third planar conductor is electrically connectable to a high voltage source, and an internal switch functions to short a high voltage from the first end of the third planar conductor to the first end of the fourth planar conductor to produce a bipolar pulse at the acceleration axis with a zero net time integral. Improved access to the switch is enabled by an aperture through the shorting plate and the proximity of the aperture to the switch.
Present day electronic detectors used in high energy physics make it possible to obtain high event rates and it is likely that future experiments will face even higher data rates than at present. The complexity of the apparatus increases very rapidly with time and also the criteria for selecting desired events become more and more complex. So complex in fact that the fast trigger system cannot be designed to fully cope with it. The interesting events become thus contaminated with multitudes of uninteresting ones. To distinguish the 'good' events from the often overwhelming background of other events one has to resort to computing techniques. Normally this selection is made in the first part of the analysis of the events, analysis normally performed on a powerful scientific computer. This implies however that many uninteresting or background events have to be recorded during the experiment for subsequent analysis. A number of undesired consequences result; and these constitute a sufficient reason for trying to perform the selection at an earlier stage, in fact ideally before the events are recorded on magnetic tape. This early selection is called 'on-line filtering' and it is the topic of the present lectures. (Auth.)
We present a full analysis of the Probing Evolution And Reionization Spectroscopically (PEARS) slitless grism spectroscopic data obtained vl'ith the Advanced Camera for Surveys on HST. PEARS covers fields within both the Great Observatories Origins Deep Survey (GOODS) North and South fields, making it ideal as a random surveY of galaxies, as well as the availability of a wide variety of ancillary observations to support the spectroscopic results. Using the PEARS data we are able to identify star forming galaxies within the redshift volume 0 galaxies down to a limiting flux of approx 10 - 18 erg/s/sq cm . The ELRs have also been compared to the properties of the host galaxy, including morphology, luminosity, and mass. From this analysis we find three key results: 1) The computed line luminosities show evidence of a flattening in the luminosity function with increasing redshift; 2) The star forming systems show evidence of disturbed morphologies, with star formation occurring predominantly within one effective (half-light) radius. However, the morphologies show no correlation with host stellar mass; and 3) The number density of star forming galaxies with M(*) >= 10(exp 9) Solar M decreases by an order of magnitude at z<=0.5 relative to the number at 0.5 < z < 0.9 in support of the argument for galaxy downsizing.
Line configuration and balancing is to select the type of line and allot a given set of operations as well as machines to a sequence of workstations to realize high-efficiency production. Most of the current researches for machining line configuration and balancing problems are related to dedicated transfer lines with dedicated machine workstations. With growing trends towards great product variety and fluctuations in market demand, dedicated transfer lines are being replaced with flexible machining line composed of identical CNC machines. This paper deals with the line configuration and balancing problem for flexible machining lines. The objective is to assign operations to workstations and find the sequence of execution, specify the number of machines in each workstation while minimizing the line cycle time and total number of machines. This problem is subject to precedence, clustering, accessibility and capacity constraints among the features, operations, setups and workstations. The mathematical model and heuristic algorithm based on feature group strategy and polychromatic sets theory are presented to find an optimal solution. The feature group strategy and polychromatic sets theory are used to establish constraint model. A heuristic operations sequencing and assignment algorithm is given. An industrial case study is carried out, and multiple optimal solutions in different line configurations are obtained. The case studying results show that the solutions with shorter cycle time and higher line balancing rate demonstrate the feasibility and effectiveness of the proposed algorithm. This research proposes a heuristic line configuration and balancing algorithm based on feature group strategy and polychromatic sets theory which is able to provide better solutions while achieving an improvement in computing time.
The paper discusses the advantages and shortcomings of alternate double single track (ADST) lines with respect to double track lines for high speed lines. ADST lines consists of sequences of double and single track segments optimally selected in order to reduce the construction and maintenance costs of railway lines and to optimize the timetables used to satisfy a given demand. The single tracks are selected to coincide with expensive segments (tunnels and viaducts) and the double tracks are chosen to coincide with flat areas and only where they are necessary. At the same time, departure times are adjusted for trains to cross at the cheap double track segments. This alternative can be used for new lines and also for existing conventional lines where some new tracks are to be constructed to reduce travel time (increase speed). The ADST proposal is illustrated with some examples of both types (new lines and where conventional lines exist), including the Palencia-Santander, the Santiago-Valparaíso-Viña del Mar and the Dublin-Belfast lines, where very important reductions (90 %) are obtained, especially where a railway infrastructure already exist. (Author)
Purpose/Objective: The purpose of this presentation is to examine the various imaging devices that have been developed for portal imaging, describe some of the image registration methods that have been developed to determine geometric errors quantitatively, and discuss how portal imaging has been incorporated into clinical practice. Discussion: Verification of patient positioning has always been an important aspect of external beam radiation therapy. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems. The commercial devices include T.V. camera-based systems, liquid ionisation chamber systems, and shortly, flat panel systems. The characteristics of these imaging systems will be discussed. In addition, other approaches such as the use of kilovoltage x-ray sources, video monitoring, and ultrasound have been proposed for improving patient positioning. Some of the advantages of these approaches will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same structures on a digitized simulator film. Once the anatomic structures have been registered, any discrepancies in the position of the patient can be identified. One problem is finding a common frame of reference for the simulator and portal images, since the location of the radiation field within the pixel matrix may differ for the two images. As a result, a common frame of reference has to be established before the anatomic structures in the images can be registered - generally by registering radiation field edges identified in the simulator and portal images. In addition, distortions in patient geometry or rotations out of the image plane can confound the image registration techniques. Despite the
Purpose/Objective: The purpose of this presentation is to examine the various imaging devices that have been developed for portal imaging; describe some of the image registration methods that have been developed to determine geometric errors quantitatively; discuss some of the ways that portal imaging has been incorporated into routine clinical practice; describe quality assurance procedures for these devices, and discuss the use of portal imaging devices for dosimetry applications. Discussion: Verification of patient positioning has always been an important aspect of external beam radiation therapy. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems. The commercial devices can be classified into three categories: T.V. camera-based systems, liquid ionisation chamber systems, and amorphous silicon systems. Many factors influence the quality of images generated by these portal imaging systems. These include factors which are unavoidable (e.g., low subject contrast), factors which depend upon the individual imaging device forming the image (e.g., dose utilisation, spatial resolution) as well as factors which depend upon the characteristics of the linear accelerator irradiating the imaging system (x-ray source size, image magnification). The characteristics of individual imaging systems, such as spatial resolution, temporal response, and quantum utilisation will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same structures on a digitized simulator film. Once the anatomic structures have been registered, any discrepancies in the position of the patient can be identified. However, the task is not nearly as straight-forward as it sounds. One problem
Direct MR angiography may be performed using line scan imaging techniques combined with presaturation of stationary spins. Thus, a single line scan echo yields a projection of vessels due to the signal from reflowing unsaturated spins. Reconstruction of an angiographic image is performed line by line at slightly incremented positions. In particular, line scan angiography is direct and fast without a sensitivity to artifacts even for high flow rates. Image resolution and field of view may be chosen without restrictions, and zoom images using enhanced gradients may be recorded without aliasing artifacts. The method is robust with respect to eddy currents and pulsatile flow. Line scan MR angiograms of phantoms, animals, and human volunteers have been recorded using 90 0 radio frequency pulses and gradient-recalled echoes
The LEIR transfer lines are designed to transport the ion beam from the Linac 3 to LEIR and, after accumulation and acceleration from LEIR to the PS. A part of the transfer line is used for both, injection and extraction. Thus, it is natural to design injection and extraction optics in common. Beside optics constraints, the geometry of the existing machines (Linac 3, LEIR and PS) and transfer tunnels have to be respected. A new proposal for the LEIR transfer lines is presented.
Purpose/Objective: The purpose of this presentation is to review the physics of imaging with high energy x-ray beams; examine the various imaging devices that have been developed for portal imaging; describe some of the image registration methods that have been developed to determine errors in patient positioning quantitatively; and discuss some of the ways that portal imaging has been incorporated into routine clinical practice. Verification of patient positioning has always been an important aspect of external beam radiation therapy. Checks of patient positioning have generally been done with film, however, film suffers from a number of drawbacks, such as poor image display and delays due to film development. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems, which are intended to overcome the limitations of portal films. The commercial devices can be classified into three categories: T.V. camera-based systems, liquid ionisation chamber systems, and amorphous silicon systems. Many factors influence the quality of images generated by these portal imaging systems. These include factors which are unavoidable (e.g., low subject contrast), factors which depend upon the individual imaging device forming the image (e.g., dose utilisation, spatial resolution) as well as factors which depend upon the characteristics of the linear accelerator irradiating the imaging system (x-ray source size, image magnification). The fundamental factors which limit image quality and the characteristics of individual imaging systems, such as spatial resolution, temporal response, and quantum utilisation will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same
The coexistence line of a fluid separates liquid and gaseous states at subcritical pressures, ending at the critical point. Only recently, it became clear that the supercritical state space can likewise be divided into regions with liquidlike and gaslike properties, separated by an extension to the coexistence line. This crossover line is commonly referred to as the Widom line, and is characterized by large changes in density or enthalpy, manifesting as maxima in the thermodynamic response functions. Thus, a reliable representation of the coexistence line and the Widom line is important for sub- and supercritical applications that depend on an accurate prediction of fluid properties. While it is known for subcritical pressures that nondimensionalization with the respective species critical pressures p_{cr} and temperatures T_{cr} only collapses coexistence line data for simple fluids, this approach is used for Widom lines of all fluids. However, we show here that the Widom line does not adhere to the corresponding states principle, but instead to the extended corresponding states principle. We resolve this problem in two steps. First, we propose a Widom line functional based on the Clapeyron equation and derive an analytical, species specific expression for the only parameter from the Soave-Redlich-Kwong equation of state. This parameter is a function of the acentric factor ω and compares well with experimental data. Second, we introduce the scaled reduced pressure p_{r}^{*} to replace the previously used reduced pressure p_{r}=p/p_{cr}. We show that p_{r}^{*} is a function of the acentric factor only and can thus be readily determined from fluid property tables. It collapses both subcritical coexistence line and supercritical Widom line data over a wide range of species with acentric factors ranging from -0.38 (helium) to 0.34 (water), including alkanes up to n-hexane. By using p_{r}^{*}, the extended corresponding states principle can be applied within
The Common Core State Standards for Mathematics (CCSSM) (CCSSI 2010) outlines ambitious goals for fraction learning, starting in third grade, that include the use of the number line model. Understanding and constructing fractions on a number line are particularly complex tasks. The current work of the authors centers on ways to successfully…
Installing lined pipe by means of the reeling installation method seems to be an attractive combination, because it provides the opportunity of eliminating the demanding welds from the critical time offshore and instead preparing them onshore. However, reeling of lined pipe is not yet proven
Full Text Available This report outlines the framework for a marine line fish programme under the aegis of the South African National Committee for Oceanographic Research (SANCOR). An attempt is made to assess the state of knowledge about South African marine line...
The authors describe a global magnetospheric model with a single subsolar merging line whose position is determined neither locally by the relative orientations and strengths of the merging fields nor globally by the orientation of a separator line--the governing parameters of most previous models--but by the condition of tangential contact between the external field and the magnetopause. As in previous models, the tilt of the merging line varies with IMF orientation, but here it also depends upon the ratio of Earth's magnetic flux that leaks out of the magnetopause to IMF flux that penetrates in. In the limiting case treated by Alekseyev and Belen'kaya, with no leakage of Earth's field and total IMF penetration, the merging line forms a great circle around a spherical magnetosphere where undeviated IMF lines lie tangent to its surface. This tangent merging line lies perpendicular to the IMF. They extend their work to the case of finite leakage and partial penetration, which distort the IMF into a draped pattern, thus changing the locus of tangency to the sphere. In the special case where the penetrating IMF flux is balanced by an equal amount of Earth flux leakage, the tangent merging line bisects the angle between the IMF and Earth's northward subsolar field. This result is identical to the local merging line model result for merging fields with equal magnitude. Here a global flux balance condition replaces the local equal magnitude condition
The present study was carried out in order to examine the radiosensitivity of malignant pleural mesothelioma cell lines. Cell kinetics, radiation-induced delay of the cell cycle and DNA ploidy of the cell lines were also determined. For comparison an HeLa and a human foetal fibroblast cell line were simultaneously explored. Six previously cytogenetically and histologically characterized mesothelioma tumor cell lines were applied. A rapid tiazolyl blue microtiter (MTT) assay was used to analyze radiosensitivity and cell kinetics and DNA ploidy of the cultured cells were determined by flow cytometry. The survival fraction after a dose of 2 Gy (SF2), parameters {alpha} and {beta} of the linear quadratic model (LQ-model) and mean inactivation dose (D{sub MID}) were also estimated. The DNA index of four cell lines equaled 1.0 and two cell lines equaled 1.5 and 1.6. Different mesothelioma cell lines showed a great variation in radiosensitivity. Mean survival fraction after a radiation dose of 2 Gy (SF2) was 0.60 and ranged from 0.36 to 0.81 and mean {alpha} value was 0.26 (range 0.48-0.083). The SF2 of the most sensitive diploid mesothelioma cell line was 0.36: Less than that of the foetal fibroblast cell line (0.49). The survival fractions (0.81 and 0.74) of the two most resistant cell lines, which also were aneuploid, were equal to that of the HeLa cell line (0.78). The {alpha}/{beta} ratios of the most sensitive cell lines were almost an order of magnitude greater than those of the two most resistant cell lines. Radiation-induced delay of the most resistant aneuploid cell line was similar to that of HeLa cells but in the most sensitive (diploid cells) there was practically no entry into the G1 phase following the 2 Gy radiation dose during 36 h. (orig.).
Line tracking is a prerequisite skill for braille literacy that involves moving one's finger horizontally across a line of braille text and identifying when a line ends so the reader may reset his or her finger on the subsequent line. Current procedures for teaching line tracking are incomplete, because they focus on tracking lines with only…
The Atlas facility will use 24 radially converging, vertically oriented and tapered, oil insulated, triplate transmission lines between the Marx generators and the central load region. Among the requirements of the transmission lines are low inductance and high reliability. The inter-conductor gap is nominally 2 cm and the lines taper from a height of 1.75 m at the Marx end to 0.32 m at the output end. The aluminum conductors, held together by 20 insulating spacers, are assembled and inserted as a unit into radial oil-filled steel tanks. The negative, high-voltage, center conductor is 2.54-cm thick and the outer ground conductors are 1.59-cm thick. All 24 triplate transmission lines connect to a transition section at near 1 m radius that couples the transmission lines to a disk/conical solid- dielectric-insulated power flow channel transmission line terminating at the load. Peak operating voltage on the lines can be as high as 240 kV with an effective stress time of 0.8 mu s. Testing of small sections of the ...
A rf phase reference line in 6 segments around the 2200 meter circumference PEP storage ring is described. Each segment of the reference line is phase stabilized by its own independent feedback system, which uses an amplitude modulated reflection from the end of each line. The modulation is kept small and decoupled from the next segment to avoid crosstalk and significant modulation of the rf drive signal. An error evaluation of the system is made. The technical implementation and prototype performance are described. Prototype tests indicate that the phase error around the ring can be held below 1 degree with this relatively simple system
A rf phase reference line in 6 segments around the 2200 meter circumference PEP storage ring is described. Each segment of the reference line is phase stabilized by its own independent feedback system, which uses an amplitude modulated reflection from the end of each line. The modulation is kept small and decoupled from the next segment to avoid crosstalk and significant modulation of the rf drive signal. An error evaluation of the system is made. The technical implementation and prototype performance are described. Prototype tests indicate that the phase error around the ring can be held below 1 degree with this relatively simple system.
The separator ACCULINNA was upgraded to achieve new experimental requirements. The beam line was extended by new ion-optical elements beyond the cyclotron hall. The new arrangements yield much better background conditions. The intensities of sup 6 He and sup 8 He radioactive beams produced in fragmentation of 35 A MeV sup 1 sup 1 B ions were increased up to a factor of 10. The upgraded beam line was used in experiments to study the sup 5 H resonance states populated in the t+t reaction. A cryogenic liquid tritium target was designed and installed at the separator beam line.
Revealing the sketching sequence of a line drawing can be visually intriguing and used for video-based storytelling. Typically this is enabled based on tedious recording of artists' drawing process. We demonstrate that it is often possible
system produces plausible animated constructions of input line drawings, with no or little user intervention. We test our algorithm on a range of input sketches, with varying degree of complexity and structure, and evaluate the results via a user study
towers and recently conductors based on composite materials are available at transmission levels. In this paper it is investigated which composite based solutions are available in connection with complete overhead line systems including insulators, towers and conductors. The components are reviewed......The use of composite materials, e.g. fibreglass materials, in overhead transmission line systems is nothing new. Composite based insulators have been applied to transmission lines for over 30 years, mainly as suspension and post insulators and often as an option for special applications. Also...... with respect to solved and persisting known failures/problems of both mechanical and electrical nature. Major challenges related to extensive use of composite materials in an overhead line system are identified, as are possible benefits - both when using standard as well as customised composite components, e...
National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains the state maintained primary and secondary road network of Louisiana. Vector lines in the data set represent Interstates, U.S. Highways, and...
Minnesota Department of Natural Resources — The Control Point Generated PLS layer contains line and polygon features to the 1/4 of 1/4 PLS section (approximately 40 acres) and government lot level. The layer...
U.S. Environmental Protection Agency — NAVTEQ Railroads for the United States. The Railroads layer contains Railroad features published as lines and polylines. Attributes for this layer include the name...
Full Text Available A new observational program of telluric lines monitoring was introduced at Belgrade Astronomical Observatory. The ultimate goal of this program is to investigate the properties of Earth’s atmosphere through modeling the observed profiles of telluric lines. The program is intend to observe infrared molecular oxygen lines that were selected according to spectral sensitivity of the available CCD camera. In this paper we give the initial and the final selection criteria for spectral lines included in the program the description of equipment and procedures used for observations and reduction, a review of preliminary observational results with the estimated precision, and a short discussion on the comparison of the theoretical predictions and the measurements.
Radio and Line Transmission, Volume 2 gives a detailed treatment of the subject as well as an introduction to additional advanced subject matter. Organized into 14 chapters, this book begins by explaining the radio wave propagation, signal frequencies, and bandwidth. Subsequent chapters describe the transmission lines and cables; the aerials; tuned and coupled circuits; bipolar transistor amplifiers; field-effect transistors and circuits; thermionic valve amplifiers; LC oscillators; the diode detectors and modulators; and the superheterodyne receiver. Other chapters explore noise and interfere
An analytical chemistry system dedicated to supporting the Secure Automated Fabrication (SAF) line is discussed. Several analyses are required prior to the fuel pellets being loaded into cladding tubes to assure certification requirements will be met. These analyses, which will take less than 15 minutes, are described. The automated sample transport system which will be used to move pellets from the fabriction line to the chemistry area is also described
Observations of two new high-redshift, narrow-lined QSOs (NLQSOs) are presented and discussed together with observations of similar objects reported in the literature. Gravitational lensing is ruled out as a possible means of amplifying the luminosity for one of these objects. It is found that the NLQSOs have broad bases on their emission lines as well as the prominent narrow cores which define this class. Thus, these are not pole-on QSOs. The FWHM of the emission lines fits onto the smoothly falling tail of the lower end of the line-width distribution for complete QSO samples. The equivalent widths of the combined broad and narrow components of the lines are normal for QSOs of the luminosity range under study. However, the NLQSOs do show ionization differences from broader-lined QSOs; most significant, the semiforbidden C III/C IV intensity ratio is unusually low. The N/C abundance ratio in these objects is found to be normal; the Al/C abundance ratio may be quite high. 38 references
Since the magnetic field is responsible for most manifestations of solar activity, one of the most challenging problems in solar physics is the diagnostics of solar magnetic fields, particularly in the outer atmosphere. To this end, it is important to develop rigorous diagnostic tools to interpret polarimetric observations in suitable spectral lines. This paper is devoted to analyzing the diagnostic content of linear polarization imaging observations in coronal forbidden lines. Although this technique is restricted to off-limb observations, it represents a significant tool to diagnose the magnetic field structure in the solar corona, where the magnetic field is intrinsically weak and still poorly known. We adopt the quantum theory of polarized line formation developed in the framework of the density matrix formalism, and synthesize images of the emergent linear polarization signal in coronal forbidden lines using potential-field source-surface magnetic field models. The influence of electronic collisions, active regions, and Thomson scattering on the linear polarization of coronal forbidden lines is also examined. It is found that active regions and Thomson scattering are capable of conspicuously influencing the orientation of the linear polarization. These effects have to be carefully taken into account to increase the accuracy of the field diagnostics. We also found that linear polarization observation in suitable lines can give valuable information on the long-term evolution of the magnetic field in the solar corona.
In this article, first-grade students were taught the different kinds of lines that were part of the construction of various bridges--the curved lines of the arches of stone bridges, straight lines connecting the cables of a suspension bridge, vertical lines, horizontal lines, and so on. They gained practice in drawing structures and in fine brush…
The aetiology of morphoea (or localized scleroderma) remains unknown. It has previously been suggested that lesions of linear morphoea may follow Blaschko's lines and thus reflect an embryological development. However, the distribution of linear morphoea has never been accurately evaluated. We aimed to identify common patterns of clinical presentation in children with linear morphoea and to establish whether linear morphoea follows the lines of Blaschko. A retrospective chart review of 65 children with linear morphoea was performed. According to clinical photographs the skin lesions of these patients were plotted on to standardized head and body charts. With the aid of Adobe Illustrator a final figure was produced including an overlay of all individual lesions which was used for comparison with the published lines of Blaschko. Thirty-four (53%) patients had the en coup de sabre subtype, 27 (41%) presented with linear morphoea on the trunk and/or limbs and four (6%) children had a combination of the two. In 55 (85%) children the skin lesions were confined to one side of the body, showing no preference for either left or right side. On comparing the overlays of all body and head lesions with the original lines of Blaschko there was an excellent correlation. Our data indicate that linear morphoea follows the lines of Blaschko. We hypothesize that in patients with linear morphoea susceptible cells are present in a mosaic state and that exposure to some trigger factor may result in the development of this condition.
Standardization of beam line representations means that a single set of data can be used in many situations to represent a beam line. This set of data should be the same no matter what the program to be run or the calculation to be made. We have concerned ourselves with three types of standardization: (1) The same set of data should be usable by different programs. (2) The inclusion of other items in the data, such as calculations to be done, units to be used, or preliminary specifications, should be in a notation similar to the lattice specification. (3) A single set of data should be used to represent a given beam line, no matter what is being modified or calculated. The specifics of what is to be modified or calculated can be edited into the data as part of the calculation. These three requirements all have aspects not previously discussed in a public forum. Implementations into TRANSPORT will be discussed
We present a semi-analytical solution for the design of a high-speed rotary optical delay line that use a combination of two rotating curvilinear reflectors. We demonstrate that it is possible to design an infinite variety of the optical delay lines featuring linear dependence of the optical delay on the rotation angle. This is achieved via shape optimization of the rotating reflector surfaces. Moreover, a convenient spatial separation of the incoming and outgoing beams is possible. For the sake of example, we present blades that fit into a circle of 10cm diameter. Finally, a prototype of a rotary delay line is fabricated using CNC machining, and its optical properties are characterized.
Spent pot lining (SPL) management represents a major concern for aluminum smelters. There are two key elements for spent pot lining management: recycling and safe storage. Spent pot lining waste can potentially have beneficial uses in co-firing in cement plants. Also, safe storage of SPL is of utmost importance. Gas generation of SPL reaction with water and ignition sensitivity must be studied. However, determining the feasibility of SPL co-firing and developing the required procedures for safe storage rely on determining experimentally all the necessary SPL properties along with the appropriate test methods, recognized by emissions standards and fire safety design codes. The applicable regulations and relevant SPL properties for this purpose are presented along with the corresponding test methods.
Revealing the sketching sequence of a line drawing can be visually intriguing and used for video-based storytelling. Typically this is enabled based on tedious recording of artists\\' drawing process. We demonstrate that it is often possible to estimate a reasonable drawing order from a static line drawing with clearly defined shape geometry, which looks plausible to a human viewer. We map the key principles of drawing order from drawing cognition to computational procedures in our framework. Our system produces plausible animated constructions of input line drawings, with no or little user intervention. We test our algorithm on a range of input sketches, with varying degree of complexity and structure, and evaluate the results via a user study. We also present applications to gesture drawing synthesis and drawing animation creation especially in the context of video scribing.
Standardization of beam line representations means that a single set of data can be used in many situations to represent a beam line. This set of data should be the same no matter what the program to be run or the calculation to be made. We have concerned ourselves with three types of standardization: (1) The same set of data should be usable by different programs. (2) The inclusion of other items in the data, such as calculations to be done, units to be used, or preliminary specifications, should be in a notation similar to the lattice specification. (3) A single set of data should be used to represent a given beam line, no matter what is being modified or calculated. The specifics of what is to be modified or calculated can be edited into the data as part of the calculation. These three requirements all have aspects not previously discussed in a public forum. Implementations into TRANSPORT will be discussed
A particularity of the 32 m long four in one helium transfer line in between the cold box in USC55 and the cavern UX5 is the fact that the transfer line passes through a hole in the crane rail support beam. In order to ensure the alignment of the suspension rail in the interconnecting tunnel with the hole in the rail support as well as the connection points at both ends required precise measurements of the given geometries as well as the installation of a temporary target for the verification of the theoretical predictions.
Magnetic field line diffusion in a plasma is studied on the basis of the non-linear boundary layer equations of dissipative, incompressible magnetohydrodynamics. Non-linear steady state solutions for a class of plasma parameters have been obtained which are consistent with the boundary conditions appropriate for reconnection. The solutions are self-consistent in connecting a stagnation point flow of a plasma with reconnecting magnetic field lines. The range of the validity of the solutions, their relation to other fluid models of reconnection, and their possible applications to space plasma configurations are pointed out. (Author)
Automobile sector forms the backbone of manufacturing sector. Vehicle assembly line is important section in automobile plant where repetitive tasks are performed one after another at different workstations. In this thesis, a methodology is proposed to reduce cycle time and time loss due to important factors like equipment failure, shortage of inventory, absenteeism, set-up, material handling, rejection and fatigue to improve output within given cost constraints. Various relationships between these factors, corresponding cost and output are established by scientific approach. This methodology is validated in three different vehicle assembly plants. Proposed methodology may help practitioners to optimize the assembly line using lean techniques.
Methods and apparatus are provided for fabricating and constructing solid dielectric "Coiled Transmission Line" pulse generators in radial or axial coiled geometries. The pour and cure fabrication process enables a wide variety of geometries and form factors. The volume between the conductors is filled with liquid blends of monomers, polymers, oligomers, and/or cross-linkers and dielectric powders; and then cured to form high field strength and high dielectric constant solid dielectric transmission lines that intrinsically produce ideal rectangular high voltage pulses when charged and switched into matched impedance loads. Voltage levels may be increased by Marx and/or Blumlein principles incorporating spark gap or, preferentially, solid state switches (such as optically triggered thyristors) which produce reliable, high repetition rate operation. Moreover, these Marxed pulse generators can be DC charged and do not require additional pulse forming circuitry, pulse forming lines, transformers, or an a high voltage spark gap output switch. The apparatus accommodates a wide range of voltages, impedances, pulse durations, pulse repetition rates, and duty cycles. The resulting mobile or flight platform friendly cylindrical geometric configuration is much more compact, light-weight, and robust than conventional linear geometries, or pulse generators constructed from conventional components. Installing additional circuitry may accommodate optional pulse shape improvements. The Coiled Transmission Lines can also be connected in parallel to decrease the impedance, or in series to increase the pulse length.
When wave vortices, that is nodal lines of a complex scalar wavefunction in space, approach transversely, their typical crossing and reconnection is a two-stage process incorporating two well-understood elementary events in which locally coplanar hyperbolas switch branches. The explicit description of this reconnection is a pedagogically useful…
Growing experimental evidence suggests that temporal events are represented on a mental time line, spatially oriented from left to right. Support for the spatial representation of time comes mostly from studies that have used spatially organized responses. Moreover, many of these studies did not avoid possible confounds attributable to target…
The note presents implementation of a programmable delay line for digital signals. The tested circuit has a subnanosecond delay range programmable with a resolution of picoseconds. Implementation of the circuit was based on low-cost components, easily available on the market. (technical design note)
WHO standard of care for failure of a first regimen, usually 2N(t)RTI's and an NNRTI, consists of a ritonavir-boosted protease inhibitor with a change in N(t)RTI's. Until recently, there was no evidence to support these recommendations which were based on expert opinion. Two large randomized clinical trials, SECOND LINE and EARNEST both showed excellent response rates (>80%) for the WHO standard of care and indicated that a novel regimen of a boosted protease inhibitor with an integrase inhibitor had equal efficacy with no difference in toxicity. In EARNEST, a third arm consisting of induction with the combined protease and integrase inhibitor followed by protease inhibitor monotherapy maintenance was inferior and led to substantial (20%) protease inhibitor resistance. These studies confirm the validity of the current recommendations of WHO and point to a novel public health approach of using two new classes for second line when standard first-line therapy has failed, which avoids resistance genotyping. Notwithstanding, adherence must be stressed in those failing first-line treatments. Protease inhibitor monotherapy is not suitable for a public health approach in low- and middle-income countries.
Described is a new methods for measuring weak conversion lines with the help of the β spectrometer of the π √ 2 type which permits to increase the reliability of the results obtained. According to this method the measurements were carried out by short series with the storage of the information obtained on the punched tape. The spectrometer magnetic field was stabilized during the measuring of the conversion spectra with the help of three nmr recorders. Instead of the dependence of the pulse calculation rate on the magnetic field value was measured the dependence of the calculation rate on the value of the voltage applied between the source and the spectrometer chamber. A short description of the automatic set-up for measuring conversion lines according to the method proposed is given. The main set-up elements are the voltage multiplexer timer, printer, scaler and the pulse analyzer. With the help of the above methods obtained is the K 1035, 8 keV 182 Ta line. It is obtained as a result of the composition of 96 measurement series. Each measurement time constitutes 640 s 12 points are taken on the line
The latest CERN video news is on line. In this issue : an interview with the Director General and reports on the new home for the DELPHI barrel and the CERN firemen's spectacular training programme. There's also a vintage video news clip from 1954. See: www.cern.ch/video or Bulletin web page
In the USA and the UK, many thousands of police suspects are identified by eyewitnesses every year. Unfortunately, many of those suspects are innocent, which becomes evident when they are exonerated by DNA testing, often after having been imprisoned for years. It is, therefore, imperative to use identification procedures that best enable eyewitnesses to discriminate innocent from guilty suspects. Although police investigators in both countries often administer line-up procedures, the details ...
Shielding is an important aspect in the safety of an accelerator and the most important aspects of a bunker shielding is the door. The bunker’s door should be designed properly to minimize the leakage radiation and shall not exceed the permitted limit of 2.5μSv/hr. In determining the leakage radiation dose that passed through the door and gaps between the door and the wall, 2-dimensional manual calculations are often used. This method is hard to perform because visual 2-dimensional is limited and is also very difficult in the real situation. Therefore estimation values are normally performed. In doing so, the construction cost would be higher because of overestimate or underestimate which require costly modification to the bunker. Therefore in this study, two methods are introduced to overcome the problem such as simulation using MCNPX Version 2.6.0 software and manual calculation using 3-dimensional model from Autodesk Inventor 2010 software. The values from the two methods were eventually compared to the real values from direct measurements using Ludlum Model 3 with Model 44-9 probe survey meter.
Shielding is an important aspect in the safety of an accelerator and the most important aspects of a bunker shielding is the door. The bunker's door should be designed properly to minimize the leakage radiation and shall not exceed the permitted limit of 2.5μSv/hr. In determining the leakage radiation dose that passed through the door and gaps between the door and the wall, 2-dimensional manual calculations are often used. This method is hard to perform because visual 2-dimensional is limited and is also very difficult in the real situation. Therefore estimation values are normally performed. In doing so, the construction cost would be higher because of overestimate or underestimate which require costly modification to the bunker. Therefore in this study, two methods are introduced to overcome the problem such as simulation using MCNPX Version 2.6.0 software and manual calculation using 3-dimensional model from Autodesk Inventor 2010 software. The values from the two methods were eventually compared to the real values from direct measurements using Ludlum Model 3 with Model 44-9 probe survey meter.
Shielding is an important aspect in the safety of an accelerator and the most important aspects of a bunker shielding is the door. The bunker’s door should be designed properly to minimize the leakage radiation and shall not exceed the permitted limit of 2.5μSv/hr. In determining the leakage radiation dose that passed through the door and gaps between the door and the wall, 2-dimensional manual calculations are often used. This method is hard to perform because visual 2-dimensional is limited and is also very difficult in the real situation. Therefore estimation values are normally performed. In doing so, the construction cost would be higher because of overestimate or underestimate which require costly modification to the bunker. Therefore in this study, two methods are introduced to overcome the problem such as simulation using MCNPX Version 2.6.0 software and manual calculation using 3-dimensional model from Autodesk Inventor 2010 software. The values from the two methods were eventually compared to the real values from direct measurements using Ludlum Model 3 with Model 44-9 probe survey meter
The paper deals with adverse interactions between line stimuli ineccentric vision. Bothcontrast thresholdandjust noticeable difference of slanthave been measured for a test line as a function of the distance from a number of surrounding lines. Test lines were either parallel or perpendicular to the
Full Text Available This paper presents a population-based evolutionary optimization method for minimizing a given cost function. The mutation operator of this method selects randomly oriented lines in the cost function domain, constructs quadratic functions interpolating the cost function at three different points over each line, and uses extrema of the quadratics as mutated points. The crossover operator modifies each mutated point based on components of two points in population, instead of one point as is usually performed in other evolutionary algorithms. The stopping criterion of this method depends on the number of almost degenerate quadratics. We demonstrate that the proposed method with these mutation and crossover operations achieves faster and more robust convergence than the well-known Differential Evolution and Particle Swarm algorithms.
Measurement of the moisture content of iron ore has become a key issue for controlling moisture additions for dust suppression. In most cases moisture content is still determined by manual or automatic sampling of the ore stream, followed by conventional laboratory analysis by oven drying. Although this procedure enables the moisture content to be routinely monitored, it is too slow for control purposes. This has generated renewed interest in on-line techniques for the accurate and rapid measurement of moisture in iron ore on conveyors. Microwave transmission techniques have emerged over the past 40 years as the dominant technology for on-line measurement of moisture in bulk materials, including iron ores. Alternative technologies have their limitations. Infra-red analysers are used in a variety of process industries, but rely on the measurement of absorption by moisture in a very thin surface layer. Consequently such probes may be compromised by particle size effects and biased presentation of the bulk mater...
We consider real eigenfunctions of the Schroedinger operator in 2D. The nodal lines of separable systems form a regular grid, and the number of nodal crossings equals the number of nodal domains. In contrast, for wavefunctions of non-integrable systems nodal intersections are rare, and for random waves, the expected number of intersections in any finite area vanishes. However, nodal lines display characteristic avoided crossings which we study in this work. We define a measure for the avoidance range and compute its distribution for the random wave ensemble. We show that the avoidance range distribution of wavefunctions of chaotic systems follows the expected random wave distributions, whereas for wavefunctions of classically integrable but quantum non-separable systems, the distribution is quite different. Thus, the study of the avoidance distribution provides more support to the conjecture that nodal structures of chaotic systems are reproduced by the predictions of the random wave ensemble
Full Text Available We have studied experimentally the dynamics of the separation of a sheet of paper into two halves in a peeling configuration. The experimental setup consists of a peeling device, where a fracture front is driven along the plane of the paper, with a constant force. The theoretical picture is how an elastic line interacts with a random landscape of fracture toughness. We compare the results with theoretical simulations in several aspects. One recent finding concerns the autocorrelation function of the average front position. The data from the experiments produces so-called cusps or singularities in the correlation function, as predicted by the functional renormalization group theory for elastic lines. Comparisons with simulations with either a short range or a long range elastic kernel demonstrate that the latter agrees with the experimental observations, as expected.
In this paper, we propose a novel approach to line matching based on homography. The basic idea is to use cheaply obtainable matched points to boost the similarity between two images. Two types of homography method, which are estimated by direct linear transformation, transform images and extract their similar parts, laying a foundation for the use of optical flow tracking. The merit of the similarity is that rapid matching can be achieved by regionalizing line segments and local searching. For multiple homography estimation that can perform better than one global homography, we introduced the rank-one modification method of singular value decomposition to reduce the computation cost. The proposed approach results in point-to-point matches, which can be utilized with state-of-the-art point-match-based structures from motion (SfM) frameworks seamlessly. The outstanding performance and feasible robustness of our approach are demonstrated in this paper.
The author has analyzed high-dispersion spectra of over 100 WN stars in the Galaxy and the Large Magellenic Cloud (LMC). Most of the spectra were obtained through 4-m telescopes (Conti, Leep, and Perry 1981). The measured strengths of the WN classification lines N III lambdalambda4634-41, N IV lambda4057, N V lambda4604 (Smith 1968) for stars on WN subtypes 2.5-8 are shown. The assignments of WN subtypes are based on visual estimates of ratios of line strengths according to the scheme of Smith (1968), except that stars appearing to be earlier than WN3 are classified as WN2 or WN2.5 as explained by van der Hucht et al. (1981) and by Conti, Leep and Perry (1981). (Auth.)
Full Text Available The Transversal Lines of the Debates gathers for publication the presentations of the scholars invited to the seminar. In the papers, Yolanda Onghena observes that the evolution from the cultural to the inter-cultural travels along four axes: the relations between cultureand society; the processes of change within identity-based dynamics; the representations of the Other; and, interculturality. Throughout the presentations and subsequent debates, whenever the different participants referred to aspects of the cultural identity problematic--”angst”, “obsession”, “deficit”, manipulation”, and others, these same participants in the Transversal Lines of the Debates also showed that, in certain areas, an optimistic viewpoint is not out of the question.
In the analysis of power-line networks over a large frequency span, the time-domain method used in programs like EMTP (Electromagnetic Time domain Program) can not be used. A more rigorous analysis method must be employed. The correct analysis method (assuming TEM-mode propagation) for multiple....... An approximate analysis method must be usedIn this paper it is shown that an eigenvectormatrix, that is the propagation modes, can be chosen almost arbitrarily if the frequency interval of interest lies below the frequency, where the line length is about 1/3 times the wavelength for the propagation mode...... with the lowest phase velocity. The propagation constants corresponding to the chosen eigenvector matrix (the quasi modes) are found iteratively, which is a much simpler procedure than finding the eigenvalues....
Definite integral is a basic material in studying mathematics. At the level of calculus, calculating of definite integral is based on fundamental theorem of calculus, related to anti-derivative, as the inverse operation of derivative. At the higher level such as engineering mathematics, the definite integral is used as one of the calculating tools of line integral. the purpose of this is to identify if there is a question related to line integral, we can use definite integral as one of the calculating experience. The conclusion of this research says that the teaching experience in introducing the relation between both integrals through the engineer way of thinking can motivate and improve students in understanding the material.
We describe the topological types of the real parts of the Kummer surfaces associated with real three-dimensional quadric line complexes. The topological type of the real part of such a surface is shown to depend on the number of real singular points: it is determined by the number of such points if any exist, and otherwise the real part of the Kummer surface is either empty or consists of one or two tori.
Gamma ray lines from cosmic sources convey the action of nuclear reactions in cosmic sites and their impacts on astrophysical objects. Gamma rays at characteristic energies result from nuclear transitions following radioactive decays or high-energy collisions with excitation of nuclei. The gamma-ray line from the annihilation of positrons at 511 keV falls into the same energy window, although of different origin. We present here the concepts of cosmic gamma ray spectrometry and the corresponding instruments and missions, followed by a discussion of recent results and the challenges and open issues for the future. Among the lessons learned are the diffuse radioactive afterglow of massive-star nucleosynthesis in 26Al and 60Fe gamma rays, which is now being exploited towards the cycle of matter driven by massive stars and their supernovae; large interstellar cavities and superbubbles have been recognised to be of key importance here. Also, constraints on the complex processes making stars explode as either thermonuclear or core-collapse supernovae are being illuminated by gamma-ray lines, in this case from shortlived radioactivities from 56Ni and 44Ti decays. In particular, the three-dimensionality and asphericities that have recently been recognised as important are enlightened in different ways through such gamma-ray line spectroscopy. Finally, the distribution of positron annihilation gamma ray emission with its puzzling bulge-dominated intensity disctribution is measured through spatially-resolved spectra, which indicate that annihilation conditions may differ in different parts of our Galaxy. But it is now understood that a variety of sources may feed positrons into the interstellar medium, and their characteristics largely get lost during slowing down and propagation of positrons before annihilation; a recent microquasar flare was caught as an opportunity to see positrons annihilate at a source.
The rapid reconnection of flux lines in an incompressible fluid through a singular layer of the current density is discussed. It is shown that the liberated magnetic energy must partially appear in the form of plasma kinetic energy. A laminar structure of the flow is possible, but Alfven velocity must be achieved in eddies of growing size at the ends of the layer. The gross structure of the flow and the magnetic configuration may be obtained from variational principles. (author)
Assembly of six of the ten delay line pulse generators that will power the ten kicker magnet modules. One modulator part contains two pulse generators. Capacitors, inductances, and voltage dividers are in the oil tank on the left. Triggered high-pressure spark gap switches are on the platforms on the right. High voltage pulse cables to the kicker magnet emerge under the spark gaps. In the centre background are the assembled master gaps.
The inductive energy storage (IES) generator has long been considered to be the most efficient system for energy usage in large pulsed power system at the MA level. A number of parameters govern the efficiency of energy transfer between the storage capacitors and the load, and the level of current deliverable to the load. For high power system, the energy storage capacitors are arranged as a Marx generator. The primary constraints are the inductances in the various parts of the circuit, in particular, the upstream inductance between the Marx and the POS, and the downstream inductance between the POS and the load. This paper deals with the effect of replacing part of the upstream inductance with a transmission line and introduces the new concept of an inductive line for energy storage (ILES). Extensive parametric scans were carried out on circuit simulations to investigate the effect of this upstream transmission line. A model was developed to explain the operation of the ILES design based on the data obtained. Comparison with an existing IES generator shows that the ILES design offers a significant improvement in the maximum current and hence energy delivered to an inductive load. (author). 5 figs., 1 ref.
The laser integration line (LIL) was originally built to validate the technological choices made for the Megajoule laser that is being built nearby. The LIL is made up of a single line composed of 8 laser beams. Each laser beam consists of 4 main modules: 1) the impulse generator that delivers a 40 mm * 40 mm square cross section infrared laser beam (λ = 1053 nm); 2) the amplification module that involves 2 steps in power amplifying, the output signal is a laser impulse of 5 ns of time duration carrying an energy of 20.10 3 Joule at a wavelength of 1053 nm; 3) the transport line that leads 4 elementary laser beams through a system of 6 mirrors; and 4) the optical block of the focusing and frequency conversion system (SCF). The purpose of SCF is twofold, first to turn the 4 infrared elementary beams into 4 ultraviolet (λ = 351 nm) beams thanks to 2 KDP (potassium di-hydrogeno-phosphate) crystals, and secondly to merge and focus the 4 elementary beams on a unique spot of the target thanks to diffraction gratings with curved slits. (A.C.)
Since their first detection 15 years ago, radio recombination lines from several elements have been observed in a wide variety of objects including HII regions, planetary nebulae, molecular clouds, the diffuse interstellar medium, and recently, other galaxies. The observations span almost the entire range from 0.1 to 100 GHz, and employ both single djsh and aperture synthesis techniques. The theory of radio recombination lines has also advanced strongly, to the point where it is perhaps one of the best-understood in astro physics. In a parallel development, it has become possible over the last decade to study these same highly-excited atoms in the laboratory; this work provides further confirmation of the theoretical framework. However there has been continuing controversy over the astrophysical interpre tation of radio recombination line observations, especially regarding the role of stimulated emission. A workshop was held in Ottawa on 24-25 August, 1979, bringing together many of the active scientist...
Given Asia's record of rapid economic growth and the conceptual and empirical problems of the current international income poverty line ('dollar-a-day'), this paper discusses whether there is merit to develop an Asia-specific poverty line that addresses some of the shortcomings of the dollar-a-day line and additionally considers Asia's particular economic situation. We consider various ways of creating an Asia-specific poverty line, including an Asia-specific international income poverty line...
A rigorous mathematical proof is presented for multiline representation on the equivalent width of a molecular band which consists in the general case of n overlapping spectral lines. The multiline representation includes a principal term and terms of minor significance. The principal term is the equivalent width of the molecular band consisting of the same n nonoverlapping spectral lines. The terms of minor significance take into consideration the overlapping of two, three and more spectral lines. They are small in case of the weak overlapping of spectral lines in the molecular band. The multiline representation can be easily generalized for optically inhomogeneous gas media and holds true for combinations of molecular bands. If the band lines overlap weakly the standard formulation of line-by-line method becomes too labor-consuming. In this case the multiline representation permits line-by-line calculations to be performed more effectively. Other useful properties of the multiline representation are pointed out.
repair was investigated by disrupting the plasma membrane using laser followed by monitoring fluorescent dye entry over time in seven cancer cell lines, an immortalized cell line, and a normal primary cell line. The kinetics of repair in living cells can be directly recorded using this technique...... cancer cell lines (p immortalized cell line (p
A new equipment for on-line evaluation of index based on two-dimensional integrated backscatter from ultrasonic images is described. The new equipment is fully integrated into a B-mode ultrasonic apparatus which provides a simultaneous display of conventional information together with parameters of tissue characterization. The system has been tested with a backscattering model of microbubbles in polysaccharide solution, characterized by a physiological exponential time decay. An exponential fitting to the experimental data was performed which yielded r=0.95
This project aims to enable US module manufacturers to coat glass with Enki’s state of the art tunable functionalized AR coatings at the lowest possible cost and highest possible performance by encapsulating Enki’s coating process in an integrated tool that facilitates effective process improvement through metrology and data analysis for greater quality and performance while reducing footprint, operating and capital costs. The Phase 1 objective was a fully designed manufacturing line, including fully specified equipment ready for issue of purchase requisitions; a detailed economic justification based on market prices at the end of Phase 1 and projected manufacturing costs and a detailed deployment plan for the equipment.
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This?book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some possible
The highly convergent iterative methods developed by Trujillo Bueno and Fabiani Bendicho (1995) for radiative transfer (RT) applications are generalized to spherical symmetry with velocity fields. These RT methods are based on Jacobi, Gauss-Seidel (GS), and SOR iteration and they form the basis of a new NLTE multilevel transfer code for atomic and molecular lines. The benchmark tests carried out so far are presented and discussed. The main aim is to develop a number of powerful RT tools for the theoretical interpretation of molecular spectra.
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing electrical wiring of a home or office; and a wireless local area network (WLAN) access point.Written in a practical style that can be understood by network engineers and non-technologists alike, this volume offers tutorials on electric utility infrastru
This grant has as its overall goal the pursuit of on-line nuclear orientation experiments for the purpose of eliciting details of nuclear structure from the decays of neutron-deficient nuclei, such as those produced by the Holifield Heavy-Ion Research Facility at Oak Ridge and extracted by the UNISOR Isotope Separator. This paper discusses: refrigerator development; the decay of 184 Au; the decay of 191 Hg to 191 Au; the decay of 189 Pt to 189 Ir; the decays of 109,111 Pd; the decay of 172 Er; and solid angle corrections
The combination of an existing graphics package with a large program like TRANSPORT has often resulted in considerable modification to the large program. Use of other graphics package has resulted in essentially having to repeat the work. This difficulty has been avoided in a modification of TRANSPORT which produce layouts of beam lines. Drawings of the reference trajectory and three-dimensional images of all magnets are made by the graphics package TOP DRAWER. Nothing specific to TOP DRAWER or any other graphics has been incorporated into TRANSPORT. If a user is with a different graphics package he or she can then begin usage of this alternate package essentially immediately
Accurate numerical calculation of intensities and profiles of hydrogen recombination lines of cosmological origin is made. Relie radiation distortions stipulated by recombination quantum release at the irrevocable recombination are investigated. Mean number calculation is given for guantums educing for one irrevocably-lost electron. The account is taken of the educed quantums interraction with matter. The main quantum-matter interrraction mechanisms are considered: electronic blow broadening; free-free, free-bound, bound-bound absorptions Recombination dynamics is investigated depending on hydrogen density and total density of all the matter kinds in the Universe
An explanation of anomalously long time scales in the transient formation of forbidden lines is proposed. The concept is based on a collisionally induced density dependence of the relaxation times of metastable level populations in transient plasma. Generalization leads to an incorporation of diffusion phenomena. We demonstrate this new concept for the simplest atomic system: the He-like isoelectronic sequence. A new interpretation of the observed long duration and anomalously high intensity of spin-forbidden emission in hot plasmas is given. (author)
Among exotic nuclei those at the drip line which are unstable against neutron emission are particularly interesting because they convey information on the nuclear force in the most extreme situations. Strictly speaking they are not ''nuclei'' but they exist thanks to long living resonances between a neutron and a bound ''core'' nucleus. Adding one more neutron they become bound and are called ''borromean''. Being particularly exotic they have attracted much attention in past years. One very challenging example is 13 Be whose level ordering has been discussed in a large number of papers in which it has been studied by transfer and fragmentation experiments, or it has been discussed theoretically. Although projectile fragmentation spectra show evident similarities, the interpretations of data all differ from each other. In this paper we argue that a way trough the problem could be to try to establish first, or at the same time, the quite elusive ''nature'' of the second s-state in the Beryllium isotopes with A=9-14. On the other hand there are other recent neutron removal experiments leading to nuclei unstable by one or more proton emissions, and thus somewhat mirror to borromean nuclei, performed with nuclei close to the proton drip line. It has been shown that by taking in coincidence all (charged) particles but the removed neutron, reconstructing the invariant mass and gating on the ground state peak, it is possible to obtain the longitudinal momentum distribution of the unbound ''core''. One can link it to the original wave function of the bound orbital and thus determine the initial neutron angular momentum from the shape of the distribution and the initial occupation probability from the absolute removal cross section. Then it is clear that modern experiments and theories are able to study unstable nuclei with the same degree of accuracy as stable nuclei. Such a
An explanation of anomalously long time scales in the transient formation of forbidden lines is proposed. The concept is based on a collisionally induced density dependence of the relaxation times of metastable level populations in transient plasma. Generalization leads to an incorporation of diffusion phenomena. We demonstrate this new concept for the simplest atomic system: the He-like isoelectronic sequence. A new interpretation of the observed long duration and anomalously high intensity of spin-forbidden emission in hot plasmas is given. (author).
To succeed under the value-based business model, hospitals and health systems require effective service line analytics that combine inpatient and outpatient data and that incorporate quality metrics for evaluating clinical operations. When developing a framework for collection, analysis, and dissemination of service line data, healthcare organizations should focus on five key aspects of effective service line analytics: Updated service line definitions. Ability to analyze and trend service line net patient revenues by payment source. Access to accurate service line cost information across multiple dimensions with drill-through capabilities. Ability to redesign key reports based on changing requirements. Clear assignment of accountability.
The primary themes of this work concern the applicability of the Cook (1975) filter mechanism to line selection in hydroxyl masers, and the question of whether interstellar hydroxyl, water, and silicon monoxide masers are saturated. Whether the Cook filter is operative in celestial masers has not thus far been decided, even though it has been shown that such an effect might be occurring. The theory in its present form does not account for line broadening, nor have its consequences with regard to microwave maser emission from excited states of hydroxyl been explored. Both these topics are discussed and the findings are compared with the observations of NGC 6334A, a source which is interesting because of the strong evidence for Zeeman splitting which can be seen in some of its observed spectra. The question of whether interstellar masers are saturated has been much discussed, but a simple method for determining the state of saturation of observed masers does not exist. In particular, the importance of background radiation and of different cloud geometries on the state of saturation of interstellar masers up to now has not been fully appreciated. Both these topics are discussed. (author)
Isotope analyses from representative rainfall samples taken from different areas in Colombia were processed to yield the meteoric line. Stable isotope composition in precipitation reflects the effects of temperature, altitude and of the continental site, being affected by different sources of atmospheric humidity over the Colombian territory. There is a seasonal variation in isotopic composition of precipitation with grater σ deviation during the rainy season and lower values in the dry season. In coastal areas the variation is smaller and is more pronounced than at continental stations. Correlation between altitude and isotope content led to equations, which indicate, on a regional level, a change in isotopic composition with altitude, of about 0.5 σ units per 200 m, for O 18 and 4 σ units per 200 m for H 2 . Such equations may be used to identify the original altitude of precipitation water, in hydrological surface and groundwater studies. Meteoric line and the concepts derived from the resulting equations presented in this paper may be applied to the interpretation of isotope analysis in future hydrological studies, particularly in areas without available data
The field lines of magnetic fields that depend on three spatial coordinates are shown to have a fundamentally different behavior from those that depend on two coordinates. Unlike two-coordinate cases, a flux tube in a magnetic field that depends on all three spatial coordinates that has a circular cross section at one location along the tube characteristically has a highly distorted cross section at other locations. In an ideal evolution of a magnetic field, the current densities typically increase. Crudely stated, if the current densities increase by a factor σ, the ratio of the long to the short distance across a cross section of a flux tube characteristically increases by e 2σ , and the ratio of the longer distance to the initial radius increases as e σ . Electron inertia prevents a plasma from isolating two magnetic field structures on a distance scale shorter than c/ω pe , which is about 10 cm in the solar corona, and reconnection must be triggered if σ becomes sufficiently large. The radius of the sun, R ⊙ =7×10 10 cm is about e 23 times larger, so when σ≳23, two lines separated by c/ω pe at one location can be separated by the full scale of any magnetic structures in the corona at another. The conditions for achieving a large exponentiation, σ, are derived, and the importance of exponentiation is discussed.
In Turkey in Ankara TAEK SANAEM Proton Accelerator Facility (PAF), there is a cyclotron which produces a focused intense 30 MeV proton beam and sends this beam to four different arms, three of which uses this beam to produce pharmaceutical medicine. The remaining one is spared for R&D purposes and the idea was to use these protons coming out from the fourth arm to use space radiation tests, which cannot be done in Turkey at the moment. However, according to SCC 25100 standards which is for 30 MeV protons, the beam coming out of cyclotron is too intense and focused to use for space radiation tests. Therefore, the main aim of my project is to design a beam line which will defocus the beam and reduce the flux so that the space radiation tests can be done according to the standards of SCC 25100.
This research project assesses the economic role and impact of short line railroads in the state of Louisiana. While relatively small in : scope, with 11 operators and approximately 500 miles of track, short line railroads play a significant role in ...
The safety analysis of the FB-Line Facility indicates that the operation of FB-Line to support the current mission does not present undue risk to the facility and co-located workers, general public, or the environment
It is shown that the OH 1720-MHz line can be strongly inverted by collisions which excite the rotation states. It is also argued that radiative pumps (of any wave length) can invert strongly only the 1612-MHz line. (author)
Minnesota Department of Natural Resources — This line theme contains facilities and features for WMAs that are best represented as lines. WMAs are part of the Minnesota state recreation system created to...
California Natural Resource Agency — This dataset contains a nationwide build of the 2008 TIGER/Line datasets from the US Census Bureau downloaded in April 2009. The TIGER/Line Shapefiles are an extract...
The updated methane spectral line list GOSAT-2014 for the 5550–6240 cm −1 region with the intensity cutoff of 5×10 –25 cm/molecule at 296 K is presented. The line list is based on the extensive measurements of the methane spectral line parameters performed at different temperatures and pressures of methane without and with buffer gases N 2 , O 2 and air. It contains the following spectral line parameters of about 12150 transitions: line position, line intensity, energy of lower state, air-induced and self-pressure-induced broadening and shift coefficients and temperature exponent of air-broadening coefficient. The accuracy of the line positions and intensities are considerably improved in comparison with the previous version GOSAT-2009. The improvement of the line list is done mainly due to the involving to the line position and intensity retrieval of six new spectra recorded with short path way (8.75 cm). The air-broadening and air-shift coefficients for the J-manifolds of the 2ν 3 (F 2 ) band are refitted using the new more precise values of the line positions and intensities. The line assignment is considerably extended. The lower state J-value was assigned to 6397 lines representing 94.4% of integrated intensity of the considering wavenumber region. The complete assignment was done for 2750 lines. - Highlights: • The upgrade of the GOSAT methane line list in the 5550–6240 cm −1 region is done. • 12,146 experimental methane line positions and intensities are retrieved. • 6376 lower energy levels for methane lines are determined
This paper describes a method to achieve short rise time pulse which has been delayed with a delay-line and magnetic pulse sharpener. A delay-line and two shock-lines are designed to carry pulsed signal with a maximum voltage magnitude up to 80 kV. A pulse of High voltage with arise time of 48 ns at a level of 0.1%-0.9% were achieved, and the attenuation in the line is very small
We present a flexible illustrative line style model for the visualization of streamline data. Our model partitions view-oriented line strips into parallel bands whose basic visual properties can be controlled independently. We thus extend previous line stylization techniques specifically for
A compendium of data for computing the characteristic impedance of transmission lines based on physical dimensions. Covers both conventional structures and unusual geometries, including coaxial, eccentric and elliptic coaxial, twin-wire, wire-above-ground, microstrip and derivatives, stripline, slabline and trough line. Also details numerous configurations of coupled lines.
Contact lines are the locations where a gas, liquid and a solid meet. From everyday experience we know that such contact lines can be mobile, for example in the case of a water droplet sliding over a glass surface. However, the continuum description of the flow towards or away from a contact line
A method for forming metal lines, particularly lines which are superconductive, involves delineating a pattern on a thin metal film on a substrate by masking techniques, ion implanting the metal film to a desired depth, removing the mask and etching away the unimplanted portion of the metal film to leave the line whose width is equal to the implanted depth. (U.K.)
A bipolar pulse forming transmission line module and system for linear induction accelerators having first, second, third, and fourth planar conductors which form a sequentially arranged interleaved stack having opposing first and second ends, with dielectric layers between the conductors. The first and second planar conductors are connected to each other at the first end, and the first and fourth planar conductors are connected to each other at the second end via a shorting plate. The third planar conductor is electrically connectable to a high voltage source, and an internal switch functions to short at the first end a high voltage from the third planar conductor to the fourth planar conductor to produce a bipolar pulse at the acceleration axis with a zero net time integral. Improved access to the switch is enabled by an aperture through the shorting plate and the proximity of the aperture to the switch.
The experiment S155 was designed by the Orsay (CSNM-CNRS) Collaboration to observe the properties of exotic light nuclei. It was installed in the PS neutrino tunnel. The photo shows a mass spectrometer (in the background) on line with the PS proton beam which arrives (bottom, right) from the fast extraction FE74. Roger Fergeau stands on the left. The alkaline isotopes produced in the carbon-uranium target heated at 2000°C were swiftly extracted, mass separated, and brought to a detector behind the shielding. Sodium 34 (11 protons and 23 neutrons) was observed and its half-life of only 5 ms was measured. The excited levels 2+ of Magnesium 30 and Magnesium 32 (Sodium descendants) were localised, and the magic number 20 was found to vanish. Thus, the discovery made earlier for Sodium 30 and Sodium 32, with the same apparatus, was confirmed. (See also photo 7706511.)
Full Text Available Two areas of corrosion occur in pipe lines: corrosion from the medium carried inside the pipes; corrosion attack upon the outside of the pipes (underground corrosion. Electrolytic processes are also involved in underground corrosion. Here the moisture content of the soil acts as an electrolyte, and the ions required to conduct the current are supplied by water-soluble salts (chlorides, sulfates, etc. present in the soil. The nature and amount of these soluble materials can vary within a wide range, which is seen from the varying electrical conductivity and pH (varies between 3 and 10. Therefore the characteristics of a soil will be an important factor in under-ground corrosion.
A magnetically insulated transmission line oscillator employs self-generated magnetic fields to generate microwave energy. An anode of the oscillator includes slow-wave structures which are formed of a plurality of thin conductive vanes defining cavities therebetween, and a gap is formed between the anode and a cathode of the oscillator. In response to a pulsed voltage applied to the anode and cathode, self-generated magnetic fields are produced in a cross-field orientation with respect to the orientation of the electric field between the anode and the cathode. The cross-field magnetic fields insulate the flow of electrons in the gap and confine the flow of electrons within the gap. 11 figs.
AGU has recently established a new customer "support line"—solutions@agu.org—as the point of contact on AGU's staff for members and other individual constituents who have not been able to resolve issues or get questions answered promptly or to their satisfaction through customary channels.Over the past year, there have been many changes at AGU. Unfortunately—and perhaps as a result of these changes—communication with members and individual constituents has suffered. Some individuals report, for example, that e-mail messages are not answered to their satisfaction, or in a timely manner. Instructions on AGU's Web site are unclear in some areas. Problems related specifically to the transition to electronic publishing are cropping up.
Measurement of the moisture content of iron ore has become a key issue for controlling moisture additions for dust suppression. In most cases moisture content is still determined by manual or automatic sampling of the ore stream, followed by conventional laboratory analysis by oven drying. Although this procedure enables the moisture content to be routinely monitored, it is too slow for control purposes. This has generated renewed interest in on-line techniques for the accurate and rapid measurement of moisture in iron ore on conveyors. Microwave transmission techniques have emerged over the past 40 years as the dominant technology for on-line measurement of moisture in bulk materials, including iron ores. Alternative technologies have their limitations. Infra-red analysers are used in a variety of process industries, but rely on the measurement of absorption by moisture in a very thin surface layer. Consequently such probes may be compromised by particle size effects and biased presentation of the bulk material. Nuclear-based analysers measure the total hydrogen content in the sample and do not differentiate between free and combined moisture. Such analysers may also be sensitive to material presentation and elemental composition. Very low frequency electromagnetic probes, such as capacitance or conductance probes, operate in the frequency region where the DC conductivity dominates much of the response, which is a function not only of moisture content but also of ionic composition and chemistry. These problems are overcome using microwave transmission techniques, which also have the following advantages, as a true bulk moisture analysis is obtained, because a high percentage of the bulk material is analysed; the moisture estimate is mostly insensitive to any biased presentation of moisture, for example due to stratification of bulk material with different moisture content and because no physical contact is made between the sensor and the bulk material. This is
Full Text Available Analytical series expansions for the hydrogenic spectral line profile functions are derived starting from the three single expressions, obtained by integrating twice the convolution of the Holtsmark, Lorentz and Doppler line profile functions. We get well converging series expansions for the line wings and centers by reducing the number of arguments in the profile function by one, introducing the module of the Holtsmark and Lorentz profiles as a new argument. In the intermediate part of the line, the parabolic cylinder functions expressed via the confluent hypergeometric series, are used. The multi-component Stark splitting of the hydrogenic spectral lines and the modeled stochastic electron transitions in the electric field of the adjacent ions generate wide Doppler plateaux at the line centers, with the characteristic widths estimated from the fit to the characteristic width of the Holtsmark profile. This additional Doppler broadening of the line profile function removes the central dip typical to the Holtsmark profile.
The study based on the study and analysis of the TPM theory, based on my practice in the SMT2 production line of Victoria Electronics of Huanwei. Then it studied the promotion and implementation steps of TPM on SMT2 line. And it also introduced the improvement instance of SMT2 line. By contrasting the utilization of equipment on SMT2 line before and after the comprehensive of TPM, the necessity of implementing TPM is derived. For how to apply TPM on the production lines, and how to improve equipment comprehensive utilization, finish the order on time, provide high quality products to our customers, these are the main part of production line equipment management work. This article provides the reference for how to promote TPM on other production lines.
Full Text Available The determination of diversity among inbred lines is important for heterosis breeding. Sixty maize inbred lines were evaluated for their eight agro morphological traits during winter season of 2011 to analyze their genetic diversity. Clustering was done by average linkage method. The inbred lines were grouped into six clusters. Inbred lines grouped into Clusters II had taller plants with maximum number of leaves. The cluster III was characterized with shorter plants with minimum number of leaves. The inbred lines categorized into cluster V had early flowering whereas the group into cluster VI had late flowering time. The inbred lines grouped into the cluster III were characterized by higher value of anthesis silking interval (ASI and those of cluster VI had lower value of ASI. These results showed that the inbred lines having widely divergent clusters can be utilized in hybrid breeding programme.
The problem of robust line planning requests for a set of origin-destination paths (lines) along with their frequencies in an underlying railway network infrastructure, which are robust to fluctuations of real-time parameters of the solution. In this work, we investigate a variant of robust line planning stemming from recent regulations in the railway sector that introduce competition and free railway markets, and set up a new application scenario: there is a (potentially large) number of line operators that have their lines fixed and operate as competing entities issuing frequency requests, while the management of the infrastructure itself remains the responsibility of a single entity, the network operator. The line operators are typically unwilling to reveal their true incentives, while the network operator strives to ensure a fair (or socially optimal) usage of the infrastructure, e.g., by maximizing the (unknown to him) aggregate incentives of the line operators.
A laboratory experiment concerned with the basic physics of magnetic field line reconnection is discussed. Stimulated by important processes in space plasmas and anomalous transport in fusion plasmas the work addresses the following topics: Dynamic magnetic fields in a high beta plasma, magnetic turbulence, plasma dynamics and energy transport. First, the formation of magnetic neutral sheets, tearing and island coalescence are shown. Nonstationary magnetic fluctuations are statistically evaluated displaying the correlation tensor in the #betta#-k domain for mode identification. Then, the plasma properties are analyzed with particular emphasis on transport processes. Although the classical fluid flow across the separatrix can be observed, the fluctuation processes strongly modify the plasma dynamics. Direct measurements of the fluid force density and ion acceleration indicate the presence of an anomalous scattering process characterized by an effective scattering tensor. Turbulence also enhances the plasma resistivity by one to two orders of magnitude. Measurements of the three-dimensional electron distribution function using a novel energy analyzer exhibit the formation of runaway electrons in the current sheet. Associated micro-instabilities are observed. Finally, a macroscopic disruptive instability of the current sheet is observed. Excess magnetic field energy is converted at a double layer into particle kinetic energy and randomized through beam-plasma instabilities. These laboratory results are compared with related observations in space and fusion plasmas. (Auth.)
A data display system for embedded realtime systems has been developed for use as an operator's user interface and debugging tool. The motivation for development of the On-Line Data Display (ODD) have come from several sources. In particular the design reflects the needs of researchers developing an experimental mobile robot within our laboratory. A proliferation of specialized user interfaces revealed a need for a flexible communications and graphical data display system. At the same time the system had to be readily extensible for arbitrary graphical display formats which would be required for data visualization needs of the researchers. The system defines a communication protocol transmitting 'datagrams' between tasks executing on the realtime system and virtual devices displaying the data in a meaningful way on a graphical workstation. The communication protocol multiplexes logical channels on a single data stream. The current implementation consists of a server for the Harmony realtime operating system and an application written for the Macintosh computer. Flexibility requirements resulted in a highly modular server design, and a layered modular object- oriented design for the Macintosh part of the system. Users assign data types to specific channels at run time. Then devices are instantiated by the user and connected to channels to receive datagrams. The current suite of device types do not provide enough functionality for most users' specialized needs. Instead the system design allows the creation of new device types with modest programming effort. The protocol, design and use of the system are discussed.
In most of the radiotherapy centres the treatment planning is based on isodose lines. Isoeffect lines are also being drawn based on the concepts of TDFs and CREs. A study has been made of whether the isoeffect lines based on the concepts of TDFs, CRes and the physical isodose lines are identical in all the treatment situations. Isoeffects lines for a few treatment schedules involving treatment of carcinoma of the bladder, treatment of cancer of the uterine cervix by combined intracavitary and external beam therapies and intracavitary therapy alone have been obtained and compared. The effect of treatment mode on the isoeffect lines has also been studied. It was found that the isodose curves and the isoeffect lines using the TDF and CRE concepts were not identical in all situations. Therefore, the ultimate treatment plans based on these isoeffect lines will not be exactly the same. The dependence of the isoeffect lines with the variation of the exponents of time and number of fractions used in the empirical relationship for NSD have also been investigated. Clinical trials have been initiated in the case of cancer of the bladder and cervix uterus based on the isodose curves and isoeffect lines using CRE and TDF concepts. (author)
Continua as well as the broad emission lines in Seyfert 1 galaxies vary in different galaxies with different amplitudes on typical timescales of days to years. We present the results of two independent variability campaigns taken with the Hobby-Eberly Telescope. We studied in detail the integrated line and continuum variations in the optical spectra of the narrow-line Seyfert galaxy Mrk 110 and the very broad-line Seyfert galaxy Mrk 926. The broad-line emitting region in Mrk 110 has radii of four to 33 light-days as a function of the ionization degree of the emission lines. The line-profile variations are matched by Keplerian disk models with some accretion disk wind. The broad-line region in Mrk 926 is very small showing an extension of two to three light-days only. We could detect a structure in the rms line-profiles as well as in the response of the line profile segments of Mrk 926 indicating the BLR is structured.
We study the vortex lines that are a feature of many random or disordered three-dimensional systems. These show universal statistical properties on long length scales, and geometrical phase transitions analogous to percolation transitions but in distinct universality classes. The field theories for these problems have not previously been identified, so that while many numerical studies have been performed, a framework for interpreting the results has been lacking. We provide such a framework with mappings to simple supersymmetric models. Our main focus is on vortices in short-range-correlated complex fields, which show a geometrical phase transition that we argue is described by the CP(k|k) model (essentially the CP(n-1) model in the replica limit n→1). This can be seen by mapping a lattice version of the problem to a lattice gauge theory. A related field theory with a noncompact gauge field, the 'NCCP(k|k) model', is a supersymmetric extension of the standard dual theory for the XY transition, and we show that XY duality gives another way to understand the appearance of field theories of this type. The supersymmetric descriptions yield results relevant, for example, to vortices in the XY model and in superfluids, to optical vortices, and to certain models of cosmic strings. A distinct but related field theory, the RP(2l|2l) model (or the RP(n-1) model in the limit n→1) describes the unoriented vortices that occur, for instance, in nematic liquid crystals. Finally, we show that in two dimensions, a lattice gauge theory analogous to that discussed in three dimensions gives a simple way to see the known relation between two-dimensional percolation and the CP(k|k) σ model with a θ term.
First-principles calculations are presented of a fundamental topological line defect in graphene that was observed and reported in Nature Nanotech. 5, 326 (2010). These calculations show that atoms and smaller molecules can bind covalently to the surface in the vicinity of the graphene line defect. It is also shown that the chemistry at the line defect has a strong effect on its electronic and magnetic properties, e.g. the ferromagnetically aligned moments along the line defect can be quenched by some adsorbates. The strong effect of the adsorbates on the line defect properties can be understood by examining how these adsorbates affect the boundary-localized states in the vicinity of the Fermi level. We also expect that the line defect chemistry will significantly affect the scattering properties of incident low-energy particles approaching it from graphene.
An experimental program to measure radioiodine transmission through sampling lines is described. The transmission depends upon both deposition on and resuspension from the walls of the line. The deposition and resuspension processes are themselves controlled by the length, diameter, and material of the line and the conditions under which it is operated. The operating conditions under study are sampling flow rate, temperature and relative humidity. Measurement results have been interpreted in terms of a four-compartment model of radioiodine deposition and resuspension. The model is applied to each of twenty or more segments of the line. Experimental measurements of short-term transmission fractions and the deposition velocities derived from them are presented for six lines. Data on resuspension rates for the same lines were obtained and are also discussed
From theoretical considerations of the behaviour of gamma ray line fluxes occurring after a supernova explosion, the 1.156 and 0.847 MeV lines are seen to be the most likely to be observed. The 1.156 MeV line has been previously observed by other investigators. Observations of the 0.847 MeV line, and 1.332, 1.173 and 0.059 MeV lines using a Ge(Li) telescope aboard a stratospheric balloon which was flown in Brazil in 1977 are reported. The observation using a NaI(Tl) detector of a line in the energy interval 1.5 - 1.6 MeV, which may be due to 0 18 (p,p') 0 18 sup (*) reaction is also reported. (Author) [pt
From the experience of light ion beam transportation through the Variable Energy Cyclotron beam line, it was observed that the beam line performance has to be improved in view of heavy ion acceleration program at the centre. The aim of this work was to study the feasibility of reducing the number of operational parameters without hampering the beam transmission and at the same time, to improve the vacuum of the beam line by reducing the hardware 2 refs., 1 fig.
Full Text Available This paper contains results of transient analysis of airflow around the ACSR power line cross-section in unsymmetric multi-span. The forces applied to the power line are obtained from CFD simulations, where the wind induced vibration is studied. Effect of these forces to the maximal displacement of the power line and the maximal mechanical forces in the points of attachment are studied and evaluated.
The appearance in Moessbauer relaxation spectra of 'ghost' lines, which are narrow lines that do not correspond to transitions between real hyperfine energy levels of the resonant system, is examined. It is shown that in many cases of interest, the appearance of these 'ghost' lines can be interpreted in terms of the relaxational averaging of one or more of the static interactions of the ion. (orig.)
Full Text Available Transients on a loss less exponential transmission line with a pure resistance load are presented in this paper. The approach is based on the two-port presentation of the transmission line. Using Picard-Carson's method the transmission line equations are solved. The relationship between source voltage and the load voltage in s-domain is derived. All the results are plotted using program package Mathematica 3.0.
The Unified Process facilitates reuse for a single system, but falls short handling multiple similar products. In this paper we present an enhanced Unified Process, called UPEPL, integrating the product line technology in order to alleviate this problem. In UPEPL, the product line related activit...... activities are added and could be conducted side by side with other classical UP activities. In this way both the advantages of Unified Process and software product lines could co-exist in UPEPL. We show how to use UPEPL with an industrial mobile device product line in our case study....
Purpose: To prevent the missile phenomenon caused by broken fragments due to pipe whip phenomenon in a portion of pipe lines connected to a reactor containment from prevailing to other portions. Constitution: Various pipe lines connected to the pressure vessel are disposed at the outside of the containments and they are surrounded with a plurality of protection partition walls respectively independent from each other. This can eliminate the effect of missile phenomena upon pipe rupture from prevailing to the pipe lines and instruments. Furthermore this can afford sufficient spaces for the pipe lines, as well as for earthquake-proof supports. (Horiuchi, T.)
Long structures such as cooling sea water pipe lines of nuclear power plants have a wide range of extent along the ground surface, and are incurred by not only the inertia forces but also forces due to ground deformations or the seismic wave propagation during earthquakes. Since previous reports indicated the earthquake free design of underground pipe lines, it is discussed in this report on behaviors of pipe lines on the ground during earthquakes and is proposed the aseismic design of pipe lines considering the effects of both inertia forces and ground deformations. (author)
In high speed PCB design, microstirp lines were used to control the impedance, however, the discontinuous microstrip line can cause signal integrity problems. In this paper, we use the transmission line theory to study the characteristics of microstrip lines. Research results indicate that the discontinuity such as truncation, gap and size change result in the problems such as radiation, reflection, delay and ground bounce. We change the discontinuities to distributed parameter circuits, analysed the steady-state response and transient response and the phase delay. The transient response cause radiation and voltage jump.
Using an approximate expression for the Landau levels of the electrons located near a nodal line of a topological line-node semimetal, we obtain formulas for the magnetization of this semimetal at an arbitrary shape of its line. It is also shown that the dependence of the chemical potential on the magnetic field can be strong in these materials, and this dependence can essentially influence the de Haas-van Alphen oscillations. The obtained results are applied to the rhombohedral graphite, which is one of the line-node semimetals. For this material, we find temperature and magnetic field dependencies of its magnetic susceptibility.
The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.
Several spectrum lines from forbidden transitions in the ground configurations of highly ionized atoms have been observed in the PLT tokamak discharges. Such lines allow localized observations, in the high-temperature regions of the plasma, of ion-temperatures, plasma motions, and spatial distributions of ions. Measured absolute intensities of the forbidden lines have been compared with simultaneous observations of the ion resonance lines and with model calculations in order to deduce the mechanism of level populaions by means of electron collisions and radiative transitions
Several spectrum lines from forbidden transitions in the ground configurations of highly ionized atoms have been observed in the PLT tokamak discharges. Such lines allow localized observations, in the high-temperature regions of the plasma, of ion-temperatures, plasma motions, and spatial distributions of ions. Measured absolute intensities of the forbidden lines have been compared with simultaneous observations of the ion resonance lines and with model calculations in order to deduce the mechanism of level populaions by means of electron collisions and radiative transitions.
We report here a series of experiments conducted at the Sondre Stromfjord incoherent scatter radar, aimed at detected enhanced plasma lines associated with midnight sector auroral arcs. Using different receivers, we detected both ion and plasma lines simultaneously. The plasma line signal was recorded with the use of a filter bank of eight frequencies. Plasma lines were found to originate mainly from the topside of the particle-produced E layer. The enhanced plasma lines are sometimes a factor of 100 times larger than the thermal level. Our data show a rapid decay of the plasma lines, however. In some cases, only a 30-s integration time was needed in order to unambiguously detect both upshifted and downshifted lines. The level of the plasma lines reaches values of, for the larger cases, up to 40 0 K above the noise temperature. These are considerably higher than results from prior auroral zone plasma line experiments. In situ observations of enhanced plasma waves in this same region are reported in a companion paper. copyright American Geophysical Union 1988
The LHC is filled from the SPS through two 3 km transfer lines. The injected beam parameters need to be well under control for luminosity performance, machine protection and operational efficiency. Small fractions of beam loss on the transfer line collimation system create showers which can trigger the sensitive LHC beam loss monitor system nearby and cause a beam abort during filling. The stability of the transfer line trajectory through the collimators is particularly critical in this respect. This paper will report on the transfer line trajectory stability during the proton run in 2011, correlations with injection losses, correction frequency and the most likely sources for the observed oscillations.
A tubular lining material for pipelines having bends or curved portions comprises a tubular textile jacket made of warps and wefts woven in a tubular form overlaid with a coating of a flexible synthetic resin. It is applicable onto the inner surface of a pipeline having bends or curved portions in such manner that the tubular lining material with a binder onto the inner surface thereof is inserted into the pipeline and allowed to advance within the pipeline, with or without the aid of a leading rope-like elongated element, while turning the tubular lining material inside out under fluid pressure. In this manner the tubular lining material is applied onto the inner surface of the pipeline with the binder being interposed between the pipeline and the tubular lining material. The lining material is characterized in that a part of all of the warps are comprised of an elastic yarn around which, over the full length thereof, a synthetic fiber yarn or yarns have been left-and/or right-handedly coiled. This tubular lining material is particularly suitable for lining a pipeline having an inner diameter of 25-200 mm and a plurality of bends, such as gas service pipelines or house pipelines, without occurrence of wrinkles in the lining material in a bend.
General characteristics of emission line spectra from symbiotic stars are outlined. Data from some special line ratios in the 1000 A - 3000 A range, and others connecting the visual and the far UV lines are presented, and their application to symbiotic stars is discussed. Integrated fractional abundances for ions easily observed in the far UV are given to facilitate abundance determinations for nebular conditions. It is found that the physical conditions of the regions emitting the emission line spectra differ considerably among different symbiotic stars. (Auth.)
A theoretical study of the influence of propagating acoustic pulses in the solar chromosphere upon the line profiles of the Ca II resonance and infrared triplet lines has been made. The major objective has been to explain the observed asymmetries seen in the cores of the H and K lines and to predict the temporal behavior of the infrared lines caused by passing acoustic or shock pulses. The velocities in the pulses, calculated from weak shock theory, have been included consistently in the non-LTE calculations. The results of the calculations show that these lines are very sensitive to perturbations in the background atmosphere caused by the pulses. Only minor changes in the line shapes result from including the velocities consistently in the line source function calculations. The qualitative changes in the line profiles vary markedly with the strength of the shock pulses. The observed differences in the K line profiles seen on the quiet Sun can be explained in terms of a spectrum of pulses with different wavelengths and initial amplitudes in the photosphere. (Auth.)
Six experiments examined displacement in memory for the location of the line in illusory line motion (ILM; appearance or disappearance of a stationary cue is followed by appearance of a stationary line that is presented all at once, but the stationary line is perceived to "unfold" or "be drawn" from the end closest to the cue to the end most distant from the cue). If ILM was induced by having a single cue appear, then memory for the location of the line was displaced toward the cue, and displacement was larger if the line was closer to the cue. If ILM was induced by having one of two previously visible cues vanish, then memory for the location of the line was displaced away from the cue that vanished. In general, the magnitude of displacement increased and then decreased as retention interval increased from 50 to 250 ms and from 250 to 450 ms, respectively. Displacement of the line (a) is consistent with a combination of a spatial averaging of the locations of the cue and the line with a relatively weaker dynamic in the direction of illusory motion, (b) might be implemented in a spreading activation network similar to networks previously suggested to implement displacement resulting from implied or apparent motion, and (c) provides constraints and challenges for theories of ILM.
A handheld line information reader and a line information generator were developed for the efficient management of optical communication lines. The line information reader consists of a photo diode, trans-impedance amplifier, voltage amplifier, microcontroller unit, display panel, and communication modules. The line information generator consists of a laser diode, laser driving circuits, microcontroller unit, and communication modules. The line information reader can detect the optical radiation field of the test line by bending the optical fiber. To enhance the sensitivity of the line information reader, an additional lens was used with a focal length of 4.51 mm. Moreover, the simulation results obtained through BeamPROP ® software from Synopsys, Inc. demonstrated a stronger optical radiation field of the fiber due to a longer transmission wavelength and larger bending angle of the fiber. Therefore, the developed devices can be considered as useful tools for the efficient management of optical communication lines.
A new computer program, LINES, has been developed for simulating atomic line emission and absorption spectra using the accurate fine structure energy levels and transition strengths calculated by the (CATS) Cowan Atomic Structure code. Population distributions for the ion stages are obtained in LINES by using the Local Thermodynamic Equilibrium (LTE) model. LINES is also useful for displaying the pertinent atomic data generated by CATS. This report describes the use of LINES. Both CATS and LINES are part of the Theoretical Atomic PhysicS (TAPS) code development effort at Los Alamos. 11 refs., 9 figs., 1 tab
Power transmission line is used for power distribution purposes due to their cost effective measure compared to underlying cable. However, prolonged exposure to natural weather may cause fatigue stress to the lines as well as induce material failure. Therefore, periodical line inspection is considered uttermost important as a preventive measure to avoid power outage. However, transmission line inspection has always been a high risk and expensive work. Hazardous works that may harm operator as well as routine that requires precise handling can be performed by robots. Various types of robots have been designed and developed for line inspection but only perform well on a straight and continuous line. As these robots encounter an obstacle during the inspection, then the real problem in terms of robot stability and smooth operation arises. In this paper, conceptual design and evaluation for transmission line inspection robot is presented. The inspection robot mobile robot must be able to bypass or avoid obstacles as it travels along the power transmission line.
Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ψ i ψ j → ψ k γ with a single final state photon is typically enhanced relative to ordinary annihilation ψ i ψ-bar i → γγ into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N 3 lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter
Twelve talented web developers have travelled to CERN from all over the world to recreate a piece of web history: the line-mode browser. See the line-mode browser simulator that they created here. Read more about the birth of the web here.
In this paper we present a dynamic kanban (pull) system specifically developed for disassembly lines. This type of kanban system is much more complex than the traditional kanban system used in assembly lines. For instance, unlike the assembly line where the external demand occurs only at the last station, the demands in the disassembly case also occur at any of the intermittent stations. The reason is that as a product moves on the disassembly line, various parts are disassembled at every station and accumulated at that station. Therefore, there are as many demand sources as there are number of parts. We consider a case example involving the end-of-life products. Based on the precedence relationships and other criteria such as hazardous properties of the parts, we balance the disassembly line. The results of the disassembly line-balancing problem (DLBP) are used as input to the proposed dynamic kanban system for disassembly line (DKSDL). We compare the performance of the DKSDL to the modified kanban system for disassembly line (MKSDL), which was previously introduced by the authors. We show, via simulation, that the DKSDL is far superior to MKSDL considered.
Jul 3, 2013 ... production of flowers, apomixis (Nassar et al., 2000; ... In order to increase the stress tolerance capacity of ... stress-related procedure due to the activities of auxin ... the evaluation of the transgenic lines for rate of OES .... Some transgenic lines carrying the 35S-AOX fragment amplified using 35S303F1 and.
We consider the problem of locating a line with respect to some existing facilities in 3-dimensional space, such that the sum of weighted distances between the line and the facilities is minimized. Measuring distance using the l\\_p norm is discussed, along with the special cases of Euclidean...
We introduce a novel framework for image-based 3D reconstruction of urban buildings based on symmetry priors. Starting from image-level edges, we generate a sparse and approximate set of consistent 3D lines. These lines are then used
Sense lines are used in pressure measurements to passively transmit information from hostile environments to areas where transducers can be used. The transfer function of a sense line can be used to obtain information about the measured environment from the protected sensor. Several properties of this transfer function are examined, including frequency dependence, Helmholtz resonance, and time of flight delay.
and analysed with regard to the possibilities, limitations and risks widespread application of composite materials on EHV AC overhead transmission lines may present. To form the basis for evaluation of the useability of composite materials, dierent overhead line projects aimed at reducing the environmental...
The distortion of resonance line shapes due to the accumulation of a large number of satellite transitions is discovered by means of X-ray optical methods with simultaneous high spectral (λ/δλ≅8000) and spatial resolution (δx≅7 μm). Disappearance of the He α resonance line emission near the target surface is observed while Rydberg satellite intensity accumulates near the resonance line position. He β and He γ resonance line shapes are also shown to be seriously affected by opacity, higher-order line emissions from autoionizing states and inhomogeneous spatial emission. Opposite to resonance line emissions the He β satellites originate only from a very narrow spatial interval. New temperature and density diagnostics employing the 1s2131' and 1s3131'-satellites are developed. Moreover, even-J components of the satellite line emissions were resolved in the present high resolution experiments. Line transitions from the autoionizing states 1s2131' are therefore also proposed for space resolved Stark broadening analysis and local high density probing. Theorists are encouraged to provide accurate Stark broadening data for the transitions 1s2131 ' →1s 2 21+hv
The designs for relativistic electron beam accelerators with power levels of 20 to 100 TW are greatly restricted by the inductance of a single diode of reasonable size. This fact leads to modular designs of very large accelerators. One concept uses several small insulators at a large radius arranged around the accelerator center. The total effective inductance is then low, but the energy must then be transported by self-magnetic insulated vacuum lines to the target volume. A triplate vacuum line configuration eases many mechanical support problems and allows more A-K gaps or feeds to be packaged around a given radius. This type of vacuum transmission line was chosen for initial experiments at Sandia. The experiments were conducted on the MITE (Magnetically Insulated Transmission Experiment) accelerator. The water pulse forming lines are connected to a vacuum triplate line through a conventional stacked insulator. Diagnostics on the experiment consisted of: (1) input V; (2) input I; (3) I monitors at the input, middle, and output of both the center conductor and ground plane of the transmission line; (4) magnetic energy analyzer to view peak electron energy in the A-K gap; (5) calorimetry; and (6) Faraday cups to look at electron current flowing across the transmission line. The main goal of the experiment is to obtain input impedance of the transmission line as a function of voltage and to measure electron loss currents. These measurements are compared to theoretical models for the input impedance and energy losses
The capacitance matrix and surface charge density distribution of an unbalanced pair line with both longitudinal and balanced excitations is presented. In particular the case in which the axes of the inner wires are not restricted to lie on a line through the axis of the shield is discussed
Atomic and molecular line emission from protoplanetary disks contains key information of their detailed physical and chemical structures. To unravel those structures, we need to understand line radiative transfer in dusty media and the statistical equilibrium, especially of molecules. I describe
The Vertex Locator is one of the most important sub-detectors of the LHCb experiment, which is devoted to B physics. The signals from the silicon strip sensors are multiplexed at 40 MHz and transported by 60 m copper lines to the counting stations placed in a radiation safe area. This paper describes the development of this long transmission line and its performance.
Some aspects of the design and usage of vacuum ultraviolet beam lines are discussed. Fermat's principle for imaging is introduced and applied to grating monochromators. Some typical vacuum ultraviolet beam lines are presented, and some further topics believed to be of importance today and in the future are mentioned. (author)
Veterans Crisis Line Skip to Main Content SuicidePreventionLifeline.org Get Help Materials Get Involved Crisis Centers About Be There ... Line FAQs Veteran Suicide Welcome to the Veterans Crisis Line Website The Veterans Crisis Line connects Veterans ...
The hydrodynamics of a liquid-vapor interface in contact with a heterogeneous surface is largely impacted by the presence of defects at the smaller scales. Such defects introduce morphological disturbances on the contact line and ultimately determine the force exerted on the wedge of liquid in contact with the surface. From the mathematical point of view, defects introduce perturbation modes, whose space-time evolution is governed by the interfacial hydrodynamic equations of the contact line. In this paper we derive the response function of the contact line to such generic perturbations. The contact line response may be used to design simplified one-dimensional time-dependent models accounting for the complexity of interfacial flows coupled to nanoscale defects, yet offering a more tractable mathematical framework to explore contact line motion through a disordered energy landscape.
Bisectors of spectral line profiles in cool stars indicate the strength of convection in the photospheres of these objects. The present investigation is concerned with the feasibility of studying time variations in line bisectors, the reality of apparent line-to-line differences within the same stellar spectrum, and bisector differences between stars of identical spectral types. The differences considered pertain to the shape of the bisector. The material used in the investigation was acquired at the McDonald Observatory using a 1728 diode Reticon array at the coudefocus of the 2.1-m telescope. Observed bisector errors are discussed. It is established that different lines in the same star show significantly different bisectors. The observed error bands are shown by the shaded regions. The slope and curvature are unique for each case
Absolute infrared line intensities of several ClO lines in the rotational-vibrational (1-0) band were measured using infrared heterodyne spectroscopy near 12 microns. A measurement technique using combined ultraviolet absorption and infrared line measurements near 9.5 microns and 12 microns permitted an accurate determination of the column densities of O3 and ClO in the absorption cell and thus improved ClO line intensities. Results indicate ClO line and band intensities approximately 2.4 times lower than previous experimental results. Effects of possible failure of local thermodynamic equilibrium conditions in the absorption cell and the implication of the results for stratospheric ClO measurements in the infrared are discussed.
Full Text Available We investigate the effect on U,B,V magnitudes of the removal of emission lines from the spectra of some symbiotic stars and novae during their nebular phases. We approach this problem by the precise reconstruction of the composite UV/optical continuum and the line spectrum. The corrections ΔU, ΔB and ΔV are determined from the ratio of fluxes with and without emission lines. We demonstrate the effect for symbiotic nova V1016 Cyg during its nebular phase. We find that about 68%, 78% and 66% of the observed flux in the U, B and V filters is radiated in the emission lines. The effect should be taken into account before using the observed color indices of emission-line objects for diagnosis of their radiation in the continuum.
A specialized bioengineering ion beam line has recently been completed at Chiang Mai University to meet rapidly growing needs of research and application development in low-energy ion beam biotechnology. This beam line possesses special features: vertical main beam line, low-energy (30 keV) ion beams, double swerve of the beam, a fast pumped target chamber, and an in-situ atomic force microscope (AFM) system chamber. The whole beam line is situated in a bioclean environment, occupying two stories. The quality of the ion beam has been studied. It has proved that this beam line has significantly contributed to our research work on low-energy ion beam biotechnology
The Pulse Line Ion Accelerator concept was motivated by the desire for an inexpensive way to accelerate intense short pulse heavy ion beams to regimes of interest for studies of High Energy Density Physics and Warm Dense Matter. A pulse power driver applied at one end of a helical pulse line creates a traveling wave pulse that accelerates and axially confines the heavy ion beam pulse. Acceleration scenarios with constant parameter helical lines are described which result in output energies of a single stage much larger than the several hundred kilovolt peak voltages on the line, with a goal of 3-5 MeV/meter acceleration gradients. The concept might be described crudely as an ''air core'' induction linac where the PFN is integrated into the beam line so the accelerating voltage pulse can move along with the ions to get voltage multiplication.
Full Text Available Atomic and molecular line emission from protoplanetary disks contains key information of their detailed physical and chemical structures. To unravel those structures, we need to understand line radiative transfer in dusty media and the statistical equilibrium, especially of molecules. I describe here the basic principles of statistical equilibrium and illustrate them through the two-level atom. In a second part, the fundamentals of line radiative transfer are introduced along with the various broadening mechanisms. I explain general solution methods with their drawbacks and also specific difficulties encountered in solving the line radiative transfer equation in disks (e.g. velocity gradients. I am closing with a few special cases of line emission from disks: Radiative pumping, masers and resonance scattering.
OBJECTIVES: After removal of dentin caries lesions, cavity lining has been advocated. Non-clinical data support this approach, but clinical data are sparse and ambiguous. We aimed at evaluating the benefits and harms of cavity lining using meta-analysis and Trial Sequential Analysis. DATA: We...... included randomized clinical trials comparing restorations without versus with cavity lining for treating primary caries lesions. Only trials reporting failure (defined as need to re-retreat) after ≥1 year follow-up were included. Trial selection, data extraction, and risk of bias assessment were conducted....... STUDY SELECTION: From 128 studies, three randomized trials (89/130 patients or teeth), all treating primary teeth, were included. The trials had high risk of bias. All trials compared no lining versus calcium hydroxide lining after selective caries removal followed by adhesive restoration. Follow...
The WKB theory for differential equations of arbitrary order or integral equations in one dimension is investigated. The rules previously stated for the construction of Stokes' lines for Nth-order differential equations, N> or =3, or integral equations are found to be incomplete because these rules lead to asymptotic forms of the solutions that depend on path. This paradox is resolved by the demonstration that new Stokes' lines can arise when previously defined Stokes' lines cross. A new formulation of the WKB problem is given to justify the new Stokes' lines. With the new Stokes' lines, the asymptotic forms can be shown to be independent of path. In addition, the WKB eigenvalue problem is formulated, and the global dispersion relation is shown to be a functional of loop integrals of the action
NSGIC Local Govt | GIS Inventory — Volusia County Power Line data was aggregated by using parcel data and visual inspection of 2005 aerial photography to determine centerline of Power Lines Right of...
Here, line attractors in neuronal networks have been suggested to be the basis of many brain functions, such as working memory, oculomotor control, head movement, locomotion, and sensory processing. In this paper, we make the connection between line attractors and pulse gating in feed-forward neuronal networks. In this context, because of their neutral stability along a one-dimensional manifold, line attractors are associated with a time-translational invariance that allows graded information to be propagated from one neuronal population to the next. To understand how pulse-gating manifests itself in a high-dimensional, nonlinear, feedforward integrate-and-fire network, we use a Fokker-Planck approach to analyze system dynamics. We make a connection between pulse-gated propagation in the Fokker-Planck and population-averaged mean-field (firing rate) models, and then identify an approximate line attractor in state space as the essential structure underlying graded information propagation. An analysis of the line attractor shows that it consists of three fixed points: a central saddle with an unstable manifold along the line and stable manifolds orthogonal to the line, which is surrounded on either side by stable fixed points. Along the manifold defined by the fixed points, slow dynamics give rise to a ghost. We show that this line attractor arises at a cusp catastrophe, where a fold bifurcation develops as a function of synaptic noise; and that the ghost dynamics near the fold of the cusp underly the robustness of the line attractor. Understanding the dynamical aspects of this cusp catastrophe allows us to show how line attractors can persist in biologically realistic neuronal networks and how the interplay of pulse gating, synaptic coupling, and neuronal stochasticity can be used to enable attracting one-dimensional manifolds and, thus, dynamically control the processing of graded information.
Line attractors in neuronal networks have been suggested to be the basis of many brain functions, such as working memory, oculomotor control, head movement, locomotion, and sensory processing. In this paper, we make the connection between line attractors and pulse gating in feed-forward neuronal networks. In this context, because of their neutral stability along a one-dimensional manifold, line attractors are associated with a time-translational invariance that allows graded information to be propagated from one neuronal population to the next. To understand how pulse-gating manifests itself in a high-dimensional, nonlinear, feedforward integrate-and-fire network, we use a Fokker-Planck approach to analyze system dynamics. We make a connection between pulse-gated propagation in the Fokker-Planck and population-averaged mean-field (firing rate) models, and then identify an approximate line attractor in state space as the essential structure underlying graded information propagation. An analysis of the line attractor shows that it consists of three fixed points: a central saddle with an unstable manifold along the line and stable manifolds orthogonal to the line, which is surrounded on either side by stable fixed points. Along the manifold defined by the fixed points, slow dynamics give rise to a ghost. We show that this line attractor arises at a cusp catastrophe, where a fold bifurcation develops as a function of synaptic noise; and that the ghost dynamics near the fold of the cusp underly the robustness of the line attractor. Understanding the dynamical aspects of this cusp catastrophe allows us to show how line attractors can persist in biologically realistic neuronal networks and how the interplay of pulse gating, synaptic coupling, and neuronal stochasticity can be used to enable attracting one-dimensional manifolds and, thus, dynamically control the processing of graded information.
Power Line Communications (PLC) is a promising emerging technology, which has attracted much attention due to the wide availability of power distribution lines. This book provides a thorough introduction to the use of power lines for communication purposes, ranging from channel characterization, communications on the physical layer and electromagnetic interference, through to protocols, networks, standards and up to systems and implementations. With contributions from many of the most prominent international PLC experts from academia and industry, Power Line Communications brings togeth
Line separators are used to segregate text-lines from one another in document image analysis. Finding the separator points at every line terminal in a document image would enable text-line segmentation. In particular, identifying the separators in handwritten text could be a thrilling exercise. Obviously it would be challenging to perform this in the compressed version of a document image and that is the proposed objective in this research. Such an effort would prevent the computational burde...
Full Text Available Abstract Background Long Interspersed Nuclear Elements (LINEs are the most abundant retrotransposons in humans. About 79% of human genes are estimated to contain at least one segment of LINE per transcription unit. Recent studies have shown that LINE elements can affect protein sequences, splicing patterns and expression of human genes. Description We have developed a database, LINE FUSION GENES, for elucidating LINE expression throughout the human gene database. We searched the 28,171 genes listed in the NCBI database for LINE elements and analyzed their structures and expression patterns. The results show that the mRNA sequences of 1,329 genes were affected by LINE expression. The LINE expression types were classified on the basis of LINEs in the 5' UTR, exon or 3' UTR sequences of the mRNAs. Our database provides further information, such as the tissue distribution and chromosomal location of the genes, and the domain structure that is changed by LINE integration. We have linked all the accession numbers to the NCBI data bank to provide mRNA sequences for subsequent users. Conclusion We believe that our work will interest genome scientists and might help them to gain insight into the implications of LINE expression for human evolution and disease. Availability http://www.primate.or.kr/line
I present the automated line fitting algorithm, ALFA, a new code which can fit emission line spectra of arbitrary wavelength coverage and resolution, fully automatically. In contrast to traditional emission line fitting methods which require the identification of spectral features suspected to be emission lines, ALFA instead uses a list of lines which are expected to be present to construct a synthetic spectrum. The parameters used to construct the synthetic spectrum are optimized by means of a genetic algorithm. Uncertainties are estimated using the noise structure of the residuals. An emission line spectrum containing several hundred lines can be fitted in a few seconds using a single processor of a typical contemporary desktop or laptop PC. I show that the results are in excellent agreement with those measured manually for a number of spectra. Where discrepancies exist, the manually measured fluxes are found to be less accurate than those returned by ALFA. Together with the code NEAT, ALFA provides a powerful way to rapidly extract physical information from observations, an increasingly vital function in the era of highly multiplexed spectroscopy. The two codes can deliver a reliable and comprehensive analysis of very large data sets in a few hours with little or no user interaction.
The valves used for the circulating water pipes for condensers in nuclear and thermal power stations have become large with the increase of power output, and their specifications have become strict. The materials for the valves change from cast iron to steel plate construction. To cope with sea water corrosion, rubber lining has been applied to the internal surfaces of valve boxes, and the build-up welding of stainless steel has been made on the edges of valves. However, recently it is desired to develop butterfly valves, of which the whole valve disks are lined with hard rubber. For the purpose of confirming the performance of large bore valves, a 2600 mm bore butterfly valve of all rubber lining type was used, and the opening and closing test of 1100 times was carried out by applying thermal cycle and pressure difference and using artifical sea water. Also the bending test of hard rubber lining was performed with test pieces. Thus, it was confirmed that the butterfly valves of all rubber lining type have the performance exceeding that of the valves with build-up welding. The course of development of the valves of all rubber lining type, the construction and the items of confirmation by tests of these valves, and the tests of the valve and the hard rubber lining described above are reported. (Kako, I.)
To determine the effect of altered lip line on attractiveness and to find preferred lip line for vertical face types in both genders. Cross-sectional analytical study. The Aga Khan University Hospital, Karachi, from May to July 2009. Photographs of two selected subjects were altered to produce three face types for the same individual with the aim of keeping the frame of the smile constant. Lip line was then altered for both the subjects as: both dentitions visible, upper incisors visible, upper incisors and 2 mm gum and 4 mm gum visible. The pictures were rated by different professionals for attractiveness. Descriptive statistics for the raters and multiple factor ANOVA was used to find the most attractive lip line. The total number of raters was 100 with the mean age of 30.3 ± 8 years. The alterations in the smile parameters produced statistically significant difference in the attractiveness of faces, whereas the perception difference was found to be insignificant amongst raters of different professions. Preferred lip line was the one showing only the upper incisors in dolico and mesofacial male and female genders whereas 2 mm gum show was preferred in brachyfacial subjects. The variability in lip line showed significant difference in the perceived attractiveness. Preferred lip lines as the one showing only the upper incisors in dolico and mesofacial male and female genders whereas 2 mm gum show was preferred in brachyfacial subjects.
Beautiful teeth, visible when smiling, are in line with the present ideal of beauty. The display of teeth when smiling is determined by the smile line: the projection of the lower border of the upper lip on the maxillary teeth when smiling. On the basis of a literature search the determining methods of the smile line are discussed, demographic data of the position of the smile line are given, and factors of influence are examined. There is no unequivocal method for determining the position of the smile line. A rough distinction can be made between qualitative and (semi)-quantitative methods. The (semi)-quantitative methods have clear advantages for research purposes, but their reliability is unknown. It was demonstrated that among minimally 40% of subjects the maxillary gingiva was not visible when smiling. The mandibular gingiva was not visible when smiling among more than 90% of subjects. Furthermore, it appeared that among women the smile line was on average higher situated than among men and that it has not yet been proven that the smile line will be situated lower when growing older.
Most patients with lung cancer have non-small cell lung cancer (NSCLC) subtype and have advanced disease at the time of diagnosis. Improvements in both first-line and subsequent therapies are allowing longer survival and enhanced quality of life for these patients. The median overall survival observed in many second-line trials is approximately 9 months, and many patients receive further therapy after second-line therapy. The cytotoxic agents pemetrexed and docetaxel and the epidermal growth factor receptor (EGFR) tyrosine kinase inhibitors (TKIs) erlotinib and gefitinib are standard second-line therapies. For patients with EGFR mutation, a TKI is the favored second-line therapy if not already used in first-line therapy. For patients without the EGFR mutation, TKIs are an option, but many oncologists favor cytotoxic therapy. The inhibitor of the EML4/ALK fusion protein, crizotinib, has recently become a standard second-line treatment for patients with the gene rearrangement and has promise for patients with the ROS1 rearrangement.
Long-ranged electrostatic interactions in electrolytes modify contact angles on charged substrates in a scale and geometry-dependent manner. For angles measured at scales smaller than the typical Debye screening length, the wetting geometry near the contact line must be explicitly considered. Using variational and asymptotic methods, we derive new transcendental equations for the contact angle as functions of the electrostatic potential only at the three phase contact line. Analytic expressions are found in certain limits and compared with predictions for contact angles measured with lower resolution. An estimate for electrostatic contributions to line tension is also given
A comprehensive guide to the design, implementation, and operation of line of sight microwave link systems The microwave Line of Sight (LOS) transport network of any cellular operator requires at least as much planning effort as the cellular infrastructure itself. The knowledge behind this design has been kept private by most companies and has not been easy to find. Microwave Line of Sight Link Engineering solves this dilemma. It provides the latest revisions to ITU reports and recommendations, which are not only key to successful design but have changed dramatically in
Cyclotron lines are formed through transitions of electrons between discrete Landau levels in the accretion columns of accreting neutron stars with strong (1012 G) magnetic fields. We summarize recent results on the formation of the spectral continuum of such systems, describe recent advances in the modeling of the lines based on a modification of the commonly used Monte Carlo approach, and discuss new results on the dependence of the measured cyclotron line energy from the luminosity of transient neutron star systems. Finally, we show that Simbol-X will be ideally suited to build and improve the observational database of accreting and strongly magnetized neutron stars.
The actuator line method made it possible to describe the near wake of a wind turbine more accurately than with the actuator disk method. Whereas the actuator line generates the helicoidal vortex system shed from the tip blades, the actuator disk method sheds a vortex sheet from the edge of the rotor plane. But with the actuator line come also temporal and spatial constraints, such as the need for a much smaller time step than with actuator disk. While the latter one only has to obey the Cour...
If the imaginable lines can be counted in hundreds, at least ten of them have effectively contributed to the production of energy and among them the LWR line (reactors cooled and moderated with ordinary water) represent 3/4 of the installed power and an even greater proportion of orders for nuclear power stations. The problems of fissile material supply will undoubtly make it imperative to have massive recourse to fast reactors, superregenerating reactors that produce more fissile material than they consume. Thanks to their special characteristics, high temperature reactors should also play a part. These three lines have, moreover, the advantage of being to a great extent complementary [fr
Butterflies and elk gather in clearings near power line right-of-ways and on the edges of such clearings, where the wild flowers and plants that have widely disappeared as a result of intensive farming and subsurface drainage of fields have found a good habitat. Ornamental coniferous trees, various herbs and assorted berries do well and can be harvested near power lines from woodland clearings once thought unfit for cultivation. IVS, the nationwide network company, takes part in many projects aiming both to increase productive utilization of land areas under power lines and to promote biodiversity
This extensively revised edition of the 1999 Artech House classic, RF and Microwave Coupled-Line Circuits, offers you a thoroughly up-to-date understanding of coupled line fundamentals, explaining their applications in designing microwave and millimeter-wave components used in today's communications, microwave, and radar systems. The Second Edition includes a wealth of new material, particularly relating to applications. You find brand new discussions on a novel simple design technique for multilayer coupled circuits, high pass filters using coupled lines, software packages used for filter des
We present an approach to introducing product lines to companies that lower their initial risk by applying open source tools and a smooth learning curve into the use and creation of domain specific modeling combined with standardized variability modeling.
In this work, the electron optical project of the IFUSP microtron beam transport line is presented, including the operational values for the parameters of the dipolar and quadrupolar electromagnets, as well as their location along the beam line. Analytical calculations and computer simulations were performed to obtain these results, and a programming tool was developed in order to analyze the beam parameters and to help studying racetrack microtrons. The electron optical simulations were split into two different study cases: the microtron booster, and the transfer line. In the first case, it was determined the main operational parameters of a microtron working far from its usual stability conditions. In the latter, it was done the basic design of the linking line between the booster and main (not yet built) microtrons, and between them and the experimental hall, with a total path length of approximately 32 m including large horizontal and vertical deflections with variable beam energy. (author)
This handbook is a breakthrough in the understanding of the large number of spectral lines in diamond. Data on more than 2000 lines and bands are presented in 200 tables, including many unpublished results. With a novel organization scheme, the search for a specific line is greatly simplified as a benefit for researchers and students. In order to meet the interest in the understanding of the spectra, structure assignments for 80 % of the lines are given, of which 15 % only were published before. The majority of the structures for the 300 centers is explained in most cases for the first time. A key instrument in the interpretation is the analysis by donor-acceptor pair transitions. In a special chapter 95 such centers are listed and discussed, of which only two have been published before, the first one by the present author in 1994.
National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains sensitive biological resource data for anadromous fish species in Western Alaska. Vector lines in this data set represent species occurrences...
National Oceanic and Atmospheric Administration, Department of Commerce — A mooring line for an oceanographic buoy system includes four sections. The first section is a protected cable that is connectable to the buoy. The second section is...
Research reveals a widespread and frequently mismanaged problem--sexual harassment. Federal and state rulings, workplace guidelines and the Equal Opportunity Commission's definition of sexual harassment can help determine where to draw the line.
Kansas Data Access and Support Center — Digital line graph (DLG) data are digital representations of cartographic information. DLG's of map features are converted to digital form from maps and related...
Quantitative traits result from the influence of multiple genes (quantitative trait loci) and environmental factors. Detecting and mapping the individual genes underlying such 'complex' traits is a difficult task. Fortunately, populations obtained from crosses between inbred lines are relatively
National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains sensitive biological resource data for anadromous fish species in Columbia River. Vector lines in this data set represent locations of...
Magnetic fields play important roles in many astrophysical processes. However, there is no universal diagnostic for the magnetic fields in the interstellar medium (ISM) and each magnetic tracer has its limitation. Any new detection method is thus valuable. Theoretical studies have shown that submillimetre fine-structure lines are polarized due to atomic alignment by ultraviolet photon-excitation, which opens up a new avenue to probe interstellar magnetic fields. We will, for the first time, perform synthetic observations on the simulated three-dimensional ISM to demonstrate the measurability of the polarization of submillimetre atomic lines. The maximum polarization for different absorption and emission lines expected from various sources, including star-forming regions are provided. Our results demonstrate that the polarization of submillimetre atomic lines is a powerful magnetic tracer and add great value to the observational studies of the submilimetre astronomy.
In partnership with the Los Angeles County Metropolitan Transportation Authority (Metro) and the Federal Transit Administration (FTA), the National Bus Rapid Transit Institute (NBRTI) conducted an evaluation of the Metro Orange Line BRT service, whic...
Kansas Data Access and Support Center — Digital line graph (DLG) data are digital representations of cartographic information. DLG's of map features are converted to digital form from maps and related...
Based on extensive calculations of the excitation rates of Fe XVII, four temperature-sensitive line ratios are investigated, paying special attention to the contribution of resonances to the excitation rates and to the contributions of dielectronic recombination satellites to the observed line intensities. The predictions are compared to FPCS observations of Puppis A and to Solar Maximum Mission (SMM) and SOLEX observations of the sun. Temperature-sensitive line ratios are also computed for emitting gas covering a broad temperature range. It is found that each ratio yields a differently weighted average for the temperature and that this accounts for some apparent discrepancies between the theoretical ratios and solar observations. The effects of this weighting on the Fe XVII temperature diagnostics and on the analogous Fe XXIV/Fe XXV satellite line temperature diagnostics are discussed. 27 references
The plasma flows are discussed and various intrinsic relations along the vortex lines and their principal normals and binormals are obtained. The effects of rotations on Bernoulli surfaces are also studied. (M.K.V.)
Full Text Available Nowadays modern overhead transmission lines (OHL constructions having several significant differences from conventional ones are being used in power grids more and more widely. Implementation of compact overhead lines equipped with FACTS devices, including phase angle regulator settings (compact controlled OHL, appears to be one of the most effective ways of power grid development. Compact controlled AC HV OHL represent a new generation of power transmission lines embodying recent advanced achievements in design solutions, including towers and insulation, together with interconnection schemes and control systems. Results of comprehensive research and development in relation to 110–500kV compact controlled power transmission lines together with theoretical basis, substantiation, and methodological approaches to their practical application are presented in the present paper.
Full Text Available The Mg II lines have been extracted from the IUE archival spectra of 32 Cygni to investigate the effect of the atmospheric eclipse. The UV light curve has been reduced from the continuum flux at the center wavelength of 2807.5 Å in the IUE spectra. The equivalent width of the Mg II k absoption line has been measured for each spectra. The results of the light variation and flux tracing of the absorption line at the vicinity of the primary eclipse confirmed the atmospheric eclipse. The atmospheric effect lasted until the phase 0.06 in the absorptin line tracing, while it lasted until the phase 0.02 in the UV light curve, respectively.
Results of OSO-8 measurements of the line profiles of the solar Lyman alpha, Ca II K and Mg II k lines are presented. Observations were obtained with the Laboratoire de Physique Stellaire et Planetaire spectrometer at spectral resolutions of 0.25 and 0.060 A for Lyman alpha and 0.025 A for the Mg II and Ca II lines. The Lyman alpha profiles are found to be highly variable according to spatial position with the intensities of the three lines well correlated, and confirm previous observations of the quiet solar chromosphere. Data suggest that the quiet chromosphere is a dynamical phenomenon whose description in terms of a static model atmosphere is only qualitatively valid at best.
The line profiles of Lα, Ca II K and Mg II k were measured with the spectrometer of the Laboratoire de Physique Stellaire et Planetaire on board of OSO-8. The results of these measurements are presented. (orig.)
A method is described for reducing the width of a Debye-Scherrer line produced by diffraction from a polycrystalline medium, if this width is due to the spectral impurity of the primary characteristic radiation...
This paper addresses reconnection of vortex tubes, with particular focus on the topology of the vortex lines (field lines of the vorticity). This analysis of vortex line topology reveals key features of the reconnection process, such as the generation of many small flux rings, formed when reconnection occurs in multiple locations in the vortex sheet between the tubes. Consideration of three-dimensional reconnection principles leads to a robust measurement of the reconnection rate, even once instabilities break the symmetry. It also allows us to identify internal reconnection of vortex lines within the individual vortex tubes. Finally, the introduction of a third vortex tube is shown to render the vortex reconnection process fully three-dimensional, leading to a fundamental change in the topological structure of the process. An additional interesting feature is the generation of vorticity null points.
Department of Mechanical Engineering ... perspective on how the business operates, and ... Process simulation allows management ... improvement and change since it would be a costly ... The work content performed on an assembly line.
We study signatures of magnetic quantum oscillations in three-dimensional nodal line semimetals at zero temperature. The extended nature of the degenerate bands can result in a Fermi surface geometry with topological genus one, as well as a Fermi surface of electron and hole pockets encapsulating the nodal line. Moreover, the underlying two-band model to describe a nodal line is not unique, in that there are two classes of Hamiltonian with distinct band topology giving rise to the same Fermi-surface geometry. After identifying the extremal cyclotron orbits in various magnetic field directions, we study their concomitant Landau levels and resulting quantum oscillation signatures. By Landau-fan-diagram analyses, we extract the nontrivial π Berry phase signature for extremal orbits linking the nodal line.
Full Text Available The paper offers the results of original research made on the application of AutoCAD Map in line generalisation. The differences and similarities have been found out between the Douglas-Peucker method and the method of line simplification that is incorporated in AutoCAD Map. There have been also the inaccuracies found out in AutoCAD Map manual relating to the issues of buffer width and tolerance, and the line width before and after simplification. The paper gives recommendations about pseudo nodes dissolving. It has been noticed that AutoCAD Map simplification method is not independent of the order of points. The application of the method is illustrated by an example of coastal line of Istria.
Full Text Available Blaschko′s lines form a pattern, which many diseases are found to follow, but linear scleroderma following Blaschko′s lines is a controversial entity rarely reported in the literature. A 24-year-old man presented with multiple linear, atrophic, hyperpigmented lesions punctuated by areas of depigmentations on the left half of the trunk distributed on the anterior, lateral and posterior aspects. The lesions were distributed in a typical S-shaped line. Antinuclear antibody and antihistone antibody tests were negative. Histopathological examination of the skin from the affected area showed features suggestive of scleroderma. Here, we present a case of linear scleroderma following Blaschko′s lines in a male patient - an entity reported only three times so far.
Rectified, normalized, high S/N intensity tracings of nine Of stars were obtained from Reticon spectra in the 4550-4800-A region. The well-known relatively sharp Of emission lines are seen to stand on pedestals of broad weak emission somewhat like the broad emission lines from WR stars. It is suggested that cascades following dielectronic recombination may be an important process driving some lines of N III, C III, and C IV into the emission of Of stars, and that the sharp Of lines come from plasma that is stationary with respect to the star. The broad emission features show an extensive low-density wind from each star. The results imply that the detection of two, more or less equal, broad jumps in the rest spectra of galaxies at about 4640 and 4686 A is more indicative of Of stars than of WR stars. 32 refs
We carry out simulations of the anisotropic uniformly frustrated 3d XY model, as a model for vortex line fluctuations in high T c superconductors. We compute the phase diagram as a function of temperature and anisotropy, for a fixed applied magnetic field B. We find two distinct phase transitions. Upon heating, there is first a lower T c perpendicular where the vortex line lattice melts and super-conducting coherence perpendicular to the applied magnetic field vanishes. At a higher T cz , within the vortex line liquid, superconducting coherence parallel to the applied magnetic field vanishes. For finite anisotropy, both T c perpendicular and T cz lie well below the crossover from the vortex line liquid to the normal state
Stitch and hem and line and flight appears in four formats. There is this present one, which adheres to the manuscript design requirements as outlined by The Graduate School at The University of Utah; there is another which is a book six inches high by nine inches wide, printed in three colors, with text aligned to its gutter; and there is a broadside printed from the same forms of standing metal type on a single twelve-inch-high by nineteen-inch-wide page, where all spreads are registered to the same points so that all lines of all sections overlap exactly, excluding the last lines of the longest section, which are left immediately readable. The second and the third formats were produced in editions of fifty each, and copies are available to the reader through the Special Collections Library at the J. Willard Marriott Library. The text in the book you're holding is built from scans taken from the original letterpress pages, and so honors typos not caught before production during proofreading, but does not honor the final runs of production which overprint eight typos and overprint one duplicated "no." The text here stands as an uncorrected and reformatted transcript of the letterpress-printed pages, since all "characters must be clear and sharp. Smudged, indistinct, or blurred letters are not acceptable." The present format cannot ask (at least not in the same way) if the techniques and repetitive labor of hand printing can be read just as one might read any of the other more familiar small crises in a work: the line break, the influence of a culture or history on that work, anagnorisis, exegesis, etc. The present format doesn't seem to ask questions like: what happens to a love song when you can't read it or hear it? How does a line or letter make itself mean when cast in metal, stood up and pressed onto paper? Still, the present format is concerned with how a line sits on a page and how a line is like love is like highs is like sand. The text all these formats
National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains vector lines and polygons representing coastal hydrography used in the creation of the Environmental Sensitivity Index (ESI) for Virginia. The...
Vermont Center for Geographic Information — (Link to Metadata) The ELTRN layer depicts electric transmission line corridors in Vermont. Various methods have been used to digitize features. The data layer...
Minnesota Department of Natural Resources — Public Land Survey line delineations to the section level. Developed from manually digitized section corners captured from paper USGS seven and one-half map sources.
A major goal in many software development organizations today is to reduce development effort and cost, while improving their products' quality and diversity by developing reusable software. An organization takes advantage of its products' similarities, exploits what they have in common and manages what varies among them by building a product line infrastructure. A product line infrastructure is a reuse repository that contains exactly those common and variable artifacts, such as requirements...
Full Text Available We study some properties of an embedded variety covered by lines and give a numerical criterion ensuring the existence of a singular conic through two of its general points. We show that our criterion is sharp. Conic-connected, covered by lines, QEL, LQEL, prime Fano, defective, and dual defective varieties are closely related. We study some relations between the above mentioned classes of objects using basic results by Ein and Zak.
The paper will examines and discusses the results from a structured observational study, wherein 50 first-line managers from the public sector in Denmark in five areas of employment where observed. These observational studies are a key contribution in the ‘greenhouse for management’ project...... in first-line managers’ practice. Answering this question helps to illustrate and understand the degree of professionalism in terms of managers' usage of time....
Competition with product rivalry is examined in a model where products are differentiated by both quality and brand name. With no commitment, firms produce a full product line. When firms can commit to restrict their product offerings, firms specialize if the degree of brand-specific differentiation is small and they produce a full product line if brand-specific differentiation is large relative to intrafirm differentiation. Firms may crowd a product space when all competitors would be better...
One recovery strategy in case of a major disruption in rail network is to cancel all trains on a specific line of the network. When the disturbance has ended, the cancelled line must be reinserted as soon as possible. In this article we present a mixed integer programming (MIP) model for calculat....... The model finds the optimal solution in an average of 0.5 CPU seconds in each test case....
The possibility is studied of determining the components of the spectral line profile using Fourier transformation. The different types of the spectral line profiles are described and the conditions for their generation discussed. The main result is the discovery of the possibility to obtain the parameters of the different components directly from the interferogram without using the Fourier transformation. The method under discussion strongly simplifies evaluation while preserving or increasing accuracy. (author)
The characteristic impedance and propagation constant define the behavior of signal propagation over the transmission lines. The digital model for railway traction lines which includes railway tracks is developed, using curve fitting technique in MATLAB. The sensitivity of this model has been computed with respect to frequency. The digital sensitivity values are compared with the values of analog sensitivity. The developed model is useful for digital protection, integrated operation, control and planning of the system.
The European Commission established a mechanism of credit lines to integrate more quickly the Bulgarian economy to the open international markets. Thereby it was enabled certain Bulgarian banks to provide grant loans to private companies in the industrial sector for projects of improvement of the energy efficiency of their production. The Bulgarian experience in using of two European credit lines and their role in the current economic crisis is presented in this paper. (authors)
The paper presents data on the problem of diagnosing the lining condition at the iron and steel works. The authors describe the neural network structure and software that are designed and developed to determine the lining burnout zones. The simulation results of the proposed neural networks are presented. The authors note the low learning and classification errors of the proposed neural networks. To realize the proposed neural network, the specialized software has been developed.
Transmission line resonators are often used as coils in high field MRI. Due to distributed nature of such resonators, coils based on them produce inhomogeneous field. This work investigates application of series capacitors to improve field homogeneity along the resonator. The equations for optimal...... values of evenly distributed capacitors are presented. The performances of the segmented resonator and a regular transmission line resonator are compared....
The construction of the natural gas flow lines and export lines system of the Sabalo field, in the far South of Bolivia is an unique job in the pipeline construction area. Its execution is a turning point in terms of engineering and construction technology in this industry. Among the Aguarague Cordillera (mountains), it runs across rocky canyons for more than 5 km, a 2.100 mt long narrow tunnel to overcome the mountains and steep hills along all the ROW length, with a total extension of 70 km, in line pipes ranging from 10'' and 12'' for the flow lines, 28'' for the gas export line and 8' for the condensate line. An integrated construction work plan was settled in order to face and overcome the complex construction situations found in every feet of the pipeline. Four simultaneous work sites were mobilized, 8 independent work fronts, 700 professionals and more than 150 pieces of heavy construction equipment, brought from 3 different countries. Special techniques were adopted also to handle the challenging detail engineering . All in all, the correct conjunction of a sound engineering work, planning, human resources and equipment and the managing flexibility to create alternatives and solutions at the fast pace required by a dynamic work schedule were essential to succeed, in a job with no room for mistakes. The successfully job completion open new possibilities to other challenging projects alike.(author)
Full Text Available Models for the interpretation of line observations from protoplanetary disks are summarized. The spectrum ranges from 1D LTE slab models to 2D thermo-chemical radiative transfer models and their use depends largely on the type/nature of observational data that is analyzed. I discuss the various types of observational data and their interpretation in the context of disk physical and chemical properties. The most simple spatially and spectral unresolved data are line fluxes, which can be interpreted using so-called Boltzmann diagrams. The interpretation is often tricky due to optical depth and non-LTE effects and requires care. Line profiles contain kinematic information and thus indirectly the spatial origin of the emission. Using series of line profiles, we can for example deduce radial temperature gradients in disks (CO pure rotational ladder. Spectro-astrometry of e.g. CO ro-vibrational line profiles probes the disk structure in the 1–30 AU region, where planet formation through core accretion should be most efficient. Spatially and spectrally resolved line images from (submm interferometers are the richest datasets we have to date and they enable us to unravel exciting details of the radial and vertical disk structure such as winds and asymmetries.
Large-scale simulations of flows with moving contact lines for realistic conditions generally requires a subgrid scale model (analyses based on matched asymptotics) to account for the unresolved part of the flow, given the large range of length scales involved near contact lines. Existing models for the interface shape in the contact-line region are primarily for steady flows on homogeneous substrates, with encouraging results in 3D simulations. Introduction of complexities would require further investigation of the contact-line region, however. Here we study flows with moving contact lines on planar substrates subject to vibrations, with applications in controlling wetting/dewetting. The challenge here is to determine the change in interface shape near contact lines due to vibrations. To develop further insight, 2D direct numerical simulations (wherein the flow is resolved down to an imposed slip length) have been performed to enable comparison with asymptotic theory, which is also developed further. Perspectives will also be presented on the final objective of the work, which is to develop a subgrid scale model that can be utilized in large-scale simulations. The authors gratefully acknowledge the ANR for financial support (ANR-15-CE08-0031) and the meso-centre FLMSN for use of computational resources. This work was Granted access to the HPC resources of CINES under the allocation A0012B06893 made by GENCI.
Full Text Available Magnetic field lines are quantum objects carrying one quantum Φ0 = 2πh/e of magnetic flux and have finite radius λm. Here we argue that they possess a very specific dynamical interaction. Parallel field lines reject each other. When confined to a certain area they form two-dimensional lattices of hexagonal structure. We estimate the filling factor of such an area. Anti-parallel field lines, on the other hand, attract each other. We identify the physical mechanism as being due to the action of the gauge potential field, which we determine quantum mechanically for two parallel and two anti-parallel field lines. The distortion of the quantum electrodynamic vacuum causes a cloud of virtual pairs. We calculate the virtual pair production rate from quantum electrodynamics and estimate the virtual pair cloud density, pair current and Lorentz force density acting on the field lines via the pair cloud. These properties of field line dynamics become important in collisionless reconnection, consistently explaining why and how reconnection can spontaneously set on in the field-free centre of a current sheet below the electron-inertial scale.
Full Text Available Assembly lines take the attention of researchers and companies because of its great effect on efficiency. Efficiency in assembly lines has an important role on cost and quality which are the basic fundamentals of competition. Assembly lines contain a number of workstations and tasks (jobs are processed in these stations and are moved from station to station. The tasks are assigned to each station regarding a cycle time. The cycle time is the maximum available time for the production of a job at any workstation. The assingning of jobs to workstations is based on the objective of minimizing the workflow among the workstations, reducing the throughput time as well as the work in progress and thus increasing productivity. If the jobs are not allocated in balance, this will cause idle workstations and waste of workforce besides the loss of overall efficiency. In this study, an assebly line balancing problem was examined for a five pocket denim trousers in a clothing company. Firstly, priority associations and standard durations of operations of denim trousers were determined. Then, assembly line balancing study was carried out by using ranked positional weights assembly line balancing method developed by Helgeson and Birnie to increase the production in a clothing company manufacturing five pocket denim trousers.
The calculation of line widths constitutes theoretical and computational challenges in the calculation of opacities of hot, dense plasmas. Opacity models use line broadening approximations that are untested at stellar interior conditions. Moreover, calculations of atomic spectra of the Sun indicate a large discrepancy in the K-shell line widths between several atomic codes and the Opacity-Project (OP). In this work, the atomic code STAR is used to study the sensitivity of solar opacities to line broadening. Variations in the solar opacity profile due to an increase of the Stark widths resulting from discrepancies with OP, are compared, in light of the solar opacity problem, with the required opacity variations of the present day Sun, as imposed by helioseismic and neutrino observations. The resulting variation profile is much larger than the discrepancy between different atomic codes, agrees qualitatively with the missing opacity profile, recovers about half of the missing opacity nearby the convection boundary, and has a little effect in the internal regions. Since it is hard to estimate quantitatively the uncertainty in the Stark widths, we show that an increase of all line widths by a factor of about ∼100 recovers quantitatively the missing opacity. These results emphasize the possibility that photoexcitation processes are not modeled properly, and more specifically, highlight the need for a better theoretical characterization of the line broadening phenomena at stellar interior conditions, and of the uncertainty due to the way it is implemented by atomic codes.
Narrow line Seyfert 1 (NLSy1) galaxies constitute a class of active galactic nuclei characterized by the full width at half maximum (FWHM) of the Hα broad emission line 10 pixel-1. A strong correlation between the Hα and Hα emission lines is found both in the FWHM and flux. The nuclear continuum luminosity is found to be strongly correlated with the luminosity of Hα, Hα and [O III] emission lines. The black hole mass in NLSy1 galaxies is lower compared to their broad line counterparts. Compared to BLSy1 galaxies, NLSy1 galaxies have a stronger FeII emission and a higher Eddington ratio that place them in the extreme upper right corner of the R4570 - λEdd diagram. The distribution of the radio-loudness parameter (R) in NLSy1 galaxies drops rapidly at R>10 compared to the BLSy1 galaxies that have powerful radio jets. The soft X-ray photon index in NLSy1 galaxies is on average higher (2.9 ± 0.9) than BLSy1 galaxies (2.4 ± 0.8). It is anti-correlated with the Hα width but correlated with the FeII strength. NLSy1 galaxies on average have a lower amplitude of optical variability compared to their broad lines counterparts. These results suggest Eddington ratio as the main parameter that drives optical variability in these sources.
The subject of spectral line shapes (SLS), a.k.a. spectral line broadening, which embraces both shapes and shifts of spectral lines, is of both fundamental and practical importance. On the fundamental side, the study of the spectral line profiles reveals the underlying atomic and molecular interactions. On the practical side, the spectral line profiles are employed as powerful diagnostic tools for various media, such as neutral gases, technological gas discharges, magnetically confined plasmas for fusion, laser- and Z-pinch-produced plasmas (for fusion and other purposes), astrophysical plasmas (most importantly, solar plasmas), and planetary atmospheres. The research area covered by this special issue includes both the SLS dominated by various electric fields (including electron and ion micro fields in strongly ionized plasmas) and the SLS controlled by neutral particles. In the physical slang, the former is called plasma broadening while the latter is called neutral broadening (of course, the results of neutral broadening apply also to the spectral line broadening in neutral gases)
Full Text Available It is well known that there is an open three-dimensional subvariety Ms of the Grassmannian of lines in ℙ3 which parametrizes smooth irreducible complex surfaces of degree 4 which are Heisenberg invariant, and each quartic contains 32 lines but only 16 skew lines, being determined by its configuration of lines, are called a double 16. We consider here the problem of visualizing in a computer the real Heisenberg invariant quartic surface and the real double 16. We construct a family of points l∈Ms parametrized by a two-dimensional semialgebraic variety such that under a change of coordinates of l into its Plüecker, coordinates transform into the real coordinates for a line L in ℙ3, which is then used to construct a program in Maple 7. The program allows us to draw the quartic surface and the set of transversal lines to L. Additionally, we include a table of a group of examples. For each test example we specify a parameter, the viewing angle of the image, compilation time, and other visual properties of the real surface and its real double 16. We include at the end of the paper an example showing the surface containing the double 16.
Full Text Available In order to identify morphological variation in maize inbred lines, one hundred five inbred lines were planted under randomized complete block design with two replications at research field of National Maize Research Program, Rampur, Chitwan, Nepal during summer season (March to June, 2010. Descriptive statistics and cluster analysis were done. The results revealed a wide range of morphological variation among the tested inbred lines. The inbred lines grouped in cluster 4 namely PUTU-13, L-9, RL-105, RL-197, RL-103, RML-9, RML-41, RL-165, RL-36, RL-76, RL-125, RL-30-3, L-6, RL-107, RL-174, RL-41, L-13, RML-76 and L-5 had 0.833 days anthesis-silking interval and earlier in flowering (tasseling in 54.50 days and silking in 55.33 days. Moreover they consisted of 1.16 plant aspect, 1.25 ear aspect, 33.08 cm tassel length and 13.5 tassel branch number. Among tested lines, the above inbred lines had better morphological traits, so it was concluded that they were good candidates for development of hybrids and synthetic varieties. DOI: http://dx.doi.org/10.3126/ije.v3i2.10521 International Journal of the Environment Vol.3(2 2014: 98-107
Japan Atomic Energy Research Institute executes the retrieval service of INIS atomic energy information by batch system in cooperation with Genshiryoku Kozaikai. This service is very popular to the users in whole Japan, but the demand of on-line service has increased recently. Therefore, it was decided to begin the INIS on-line service from January, 1984, through the on-line information retrieval system of the Japan Information Center of Science and Technology. It is expected that when the operation will be started, the utilization of INIS atomic energy information in Japan will drastically increase. Also Japan Atomic Energy Research Institute has carried out the retrieval service by on-line system for those in the institute besides the batch system, accordingly, at this opportunity, the state of utilization of both systems and their distinction to use effectively, and the operation and the method of utilization of the on-line information retrieval system of JICST are explained. In the on-line system, the users are accessible to the data base themselves, and immediate information retrieval is possible, while in the batch system, the related information can be retrieved without fail, and the troublesome operation of equipment is not necessary. (Kako, I.)
We show that unusual Balmer emission-line profiles of the quasar OX 169, frequently described as either self-absorbed or double peaked, are actually neither. The effect is an illusion resulting from two coincidences. First, the forbidden lines are quite strong and broad. Consequently, the [N II] λ6583 line and the associated narrow-line component of Hα present the appearance of twin Hα peaks. Second, the redshift of 0.2110 brings Hβ into coincidence with Na I D at zero redshift, and ISM absorption in Na I D divides the Hβ emission line. In spectra obtained over the past decade, we see no substantial change in the character of the line profiles and no indication of intrinsic double-peaked structure. The Hγ, Mg II, and Lyα emission lines are single peaked, and all of the emission-line redshifts are consistent once they are correctly attributed to their permitted and forbidden-line identifications. A systematic shift of up to 700 km s-1 between broad and narrow lines is seen, but such differences are common and could be due to gravitational and transverse redshift in a low-inclination disk. Stockton & Farnham had called attention to an apparent tidal tail in the host galaxy of OX 169 and speculated that a recent merger had supplied the nucleus with a coalescing pair of black holes that was now revealing its existence in the form of two physically distinct broad-line regions. Although there is no longer any evidence for two broad emission-line regions in OX 169, binary black holes should form frequently in galaxy mergers, and it is still worthwhile to monitor the radial velocities of emission lines that could supply evidence of their existence in certain objects.
A method is presented for efficient generation of spectra using line-by-line approaches. The only approximation is replacing the line shape function with an interpolation procedure, which makes the method independent of the line profile functional form. The resulting computational savings for large number of lines is proportional to the number of frequency points in the spectral range. Therefore, for large-scale problems the method can provide speedups of two orders of magnitude or more. A method was presented to generate line-by-line spectra efficiently. The first step was to replace the explicit calculation of the profile by the Newton divided-differences interpolating polynomial. The second step is to accumulate the lines effectively reducing their number to the number of frequency points. The final step is recognizing the resulting expression as a convolution and amenable to FFT methods. The reduction in computational effort for a configuration-to-configuration transition array with large number of lines is proportional to the number of frequency points. The method involves no approximations except for replacing the explicit profile evaluation by interpolation. Specifically, the line accumulation and convolution are exact given the interpolation procedure. Furthermore, the interpolation makes the method independent of the line profile functional form contrary to other schemes using FFT methods to generate line-by-line spectra but relying on the analytic form of the profile Fourier transform. Finally, the method relies on a uniform frequency mesh. For non-uniform frequency meshes, however, the method can be applied by using a suitable temporary uniform mesh and the results interpolated onto the final mesh with little additional cost.
For Classical T Tauri Stars (CTTSs), the resonance doublets of N V, Si IV, and C IV, as well as the He II 1640 Å line, trace hot gas flows and act as diagnostics of the accretion process. In this paper we assemble a large high-resolution, high-sensitivity data set of these lines in CTTSs and Weak T Tauri Stars (WTTSs). The sample comprises 35 stars: 1 Herbig Ae star, 28 CTTSs, and 6 WTTSs. We find that the C IV, Si IV, and N V lines in CTTSs all have similar shapes. We decompose the C IV and He II lines into broad and narrow Gaussian components (BC and NC). The most common (50%) C IV line morphology in CTTSs is that of a low-velocity NC together with a redshifted BC. For CTTSs, a strong BC is the result of the accretion process. The contribution fraction of the NC to the C IV line flux in CTTSs increases with accretion rate, from ∼20% to up to ∼80%. The velocity centroids of the BCs and NCs are such that V BC ∼> 4 V NC , consistent with the predictions of the accretion shock model, in at most 12 out of 22 CTTSs. We do not find evidence of the post-shock becoming buried in the stellar photosphere due to the pressure of the accretion flow. The He II CTTSs lines are generally symmetric and narrow, with FWHM and redshifts comparable to those of WTTSs. They are less redshifted than the CTTSs C IV lines, by ∼10 km s –1 . The amount of flux in the BC of the He II line is small compared to that of the C IV line, and we show that this is consistent with models of the pre-shock column emission. Overall, the observations are consistent with the presence of multiple accretion columns with different densities or with accretion models that predict a slow-moving, low-density region in the periphery of the accretion column. For HN Tau A and RW Aur A, most of the C IV line is blueshifted suggesting that the C IV emission is produced by shocks within outflow jets. In our sample, the Herbig Ae star DX Cha is the only object for which we find a P-Cygni profile in the C IV
Genetic variability for morphological and biochemical traits among six advanced lines (F10:11) of brassica was studied at The University of Agriculture Peshawar during crop season of 2012-13. These lines were developed through interspecific hybridization. Significant differences at (p=0.01) for plant height, main, pods main raceme-1, pod length, seed yield plant-1 and protein content at (p=0.05) for 100-seed weight, oil content were recorded. The advanced line, AUP-05 produced the maximum seed yield plant-1 (19.73 g), protein content (24.56%), 100-seed weight (0.64 g). Advanced line AUP-04 had the highest erucic acid (50.31%), linolenic acid (10.60%) and was late maturing (179.33). Advanced line AUP-06 produced the high oil content (48.82%). Advanced line AUP-03 produced comparatively longer main raceme (69.32 cm). Environmental variance was smaller than genotypic variance for majority of the traits. Genotypic and phenotypic coefficients of variation ranged from 2.45 to 25.67% and 2.50 to 27.68%, respectively. Heritability was high for majority of the traits. The maximum heritability was recorded for plant height (0.61), main raceme length (0.81), pods main raceme-1 (0.74), seed yield plant-1 (0.86) and protein content (0.77). Moderate heritability was observed for oil (0.58) contents. Heritability for 100-seed weight (0.30) was the lowest. These lines may be released as new improved varieties for specific parameters. (author)
The formation of Zeeman lines in Gaussian microturbulent magnetic fields is considered assuming LTE. General formulae are derived for the local mean values of the transfer matrix elements. The cases of one-dimensional (longitudinal), isotropic, and two-dimensional (transversal) magnetic microturbulence are studied in some detail. Asymptotic formulae are given for small mean as well as for small microturbulent magnetic fields. Characteristic effects of magnetic microturbulence on the transfer coefficients are: (i) the broadening of the frequency contours, although only for the case of longitudinal Zeeman effect and longitudinal magnetic microturbulence this effect can be described analogous to Doppler broadening, (ii) the appearance of a pseudo-Zeeman structure for nonlongitudinal magnetic microturbulence, (iii) the reduction of maximal values of circular polarization, and (iv) the appearance of characteristic linear polarization effects due to the anisotropy of the magnetic microturbulence. Line contours and polarization of Zeeman triplets are computed for Milne-Eddington atmospheres. It is shown that magnetic intensification due to microturbulent magnetic fields may be much more efficient than that due to regular fields. The gravity center of a Zeeman line observed in circularly polarized light remains a reasonable measure of the line of sight component of the mean magnetic field for a line strength eta 0 < approx. 2. For saturated lines, the gravity center distance depends significantly on the magnetic microturbulence and its anisotropy. The influence of magnetic microturbulence on the ratio of longitudinal field magnetographic signals shows that unique conclusions about the magnetic microstructure can be drawn from the line ratio measurements only in combination with further spectroscopic data or physical reasoning. (orig.)
The aim of the work presented in this report is to study the mechanical behaviour of lining galleries in deep clays. This text constitutes a part of the researches on the feasibility of a geological disposal of radioactive waste, which the scope is to assure the gallery long term stabilization and also to optimize its dimensioning. In particular, we are interested here in the study of a closure controlled lining, that constitutes a direct application of the convergence-confinement method, especially well fitted to deep clays. The presentation and interpretation of the convergence controlled lining test, which was performed in the experimental gallery of Mol in Belgium, is given in this report. The instrumentation was conceived in order to find out the stress field exerced by the rockmass on the lining, the internal stress field inside the lining and the gallery closure. The analysis of all measurements results, obtained between november 1987 and December 1989, shows that they are all in good agreement and that the lining design was well chosen. Two years after the gallery construction, the average closure is of the order of 2% and the average confinement pressure is about 1.6 MPa (the third of the lithostatic pressure). The time dependent effects of the rockmass are very well modelled by the non linear elasto-viscoplastic law developed at L.M.S. with the laboratory tests. The elastic-plastic model of the lining are shown to be well fitted to simulate the sliding of the ribs. Finally, the numerical results have shown a very good agreement with the measurements results
Radio recombination lines have been observed from forty-six H II regions. The Arecibo 1000-foot radio telescope was used to provide high sensitivity and high angular resolution at 1400 MHz (gain approx. 7.7 0 K/Jy, HPBW = 3:2) and 2372 MHZ (gain approx. 6.3 0 K/Jy, HPBW = 2'). Observations were made at 1400 MHz in the frequency switching mode, and at 2372 MHz in the total power mode. Gaussians were fit to be observed lines to derive velocities, line widths, and line temperatures. From the velocities kinematic distances were derived. For eleven sources H I absorption measurements were also made. The absorption spectra enabled the kinematic distance ambiguity to be resolved for some sources. The absorption spectra themselves were found to have extremely sharp, non-gaussian edges. One explanation for these is a model where the interstellar medium contains many H I cloudlets with T/sub s/less than or equal to 100 0 K and turbulent velocities less than or equal to 3 km/s. The H I absorption spectrum is then a superposition of many narrow gaussian profiles. It was also found from a comparison of H I absorption velocities with radio recombination line velocities that peculiar motions exist in the interstellar medium with velocities of up to 10 km/s. Using the measured line temperatures and continuum temperatures, estimates were desired of emission measures, electron temperatures, and electron densities, using a non-LTE analysis. Non-LTE effects were important only for the hottest and densest H II regions. The non-LTE calculations were checked through a comparison derivation of electron temperatures using hydrogen beta lines
Full Text Available On-line software for adaptively canceling 50 Hz line frequency noise has been designed and tested at Pakistan Research Reactor 1. Line frequency noise causes much problem in weak signals acquisition. Sometimes this noise is so dominant that original signal is totally corrupted. Although notch filter can be used for eliminating this noise, but if signal of interest is in close vicinity of 50 Hz, then original signal is also attenuated and hence overall performance is degraded. Adaptive noise removal is a technique which could be employed for removing line frequency without degrading the desired signal. In this paper line frequency noise has been eliminated on-line from a nuclear power measuring channel. The adaptive LMS algorithm has been used to cancel 50 Hz noise. The algorithm has been implemented in labVIEW with NI 6024 data acquisition card. The quality of the acquired signal has been improved much as can be seen in experimental results.
The parameters of the U-line of the RHIC injection line with low β waist are described. In that lattice, the location of SA is not dispersion free and 14 quadrupoles are needed. This line has been modified to move SA to a dispersion free region (after the 8-degree bend), the length and maximum gradient of quadrupoles have been adjusted to fit the existing quadrupole parameters and the number of quadrupoles is reduced to 12. 2 refs., 3 tabs
The authors have designed a new magnetically insulated transmission line (MITL) for the Yang accelerator. The differences between the existing line and the designing one are given. The electric strength of some special regions on the lines and the inductance of the lines have been calculated. The authors have checked the states of magnetic insulation on the designing line
An ultrafast line-by-line algorithm for calculating spectral transmittance and radiance of gases is presented. The algorithm is based on fast convolution of the Voigt line profile using Fourier transform and a binning technique. The algorithm breaks a radiative transfer calculation into two steps: a one-time pre-computation step in which a set of pressure independent coefficients are computed using the spectral line information; a normal calculation step in which the Fourier transform coefficients of the optical depth are calculated using the line of sight information and the coefficients pre-computed in the first step, the optical depth is then calculated using an inverse Fourier transform and the spectral transmittance and radiance are calculated. The algorithm is significantly faster than line-by-line algorithms that do not employ special speedup techniques by a factor of 10 3 –10 6 . A case study of the 2.7 μm band of H 2 O vapor is presented. -- Highlights: •An ultrafast line-by-line model based on FFT and a binning technique is presented. •Computationally expensive calculations are factored out into a pre-computation step. •It is 10 3 –10 8 times faster than LBL algorithms that do not employ speedup techniques. •Good agreement with experimental data for the 2.7 μm band of H 2 O
Full Text Available According to the distribution network line structure and reclosing control strategy, the system simulation model of distribution network lines has established based on the real-time digital simulation RTDS. Based on this, distribution network switching impulse current characteristic has researched with different capacity, different distribution and different load power factor under the different voltage switching angles. The results of the study provide a scientific basis for distribution network line protection setting, in order to further lay the foundation for improvement the validity and reliability of distribution network line protection action.
Spectral line-shape analyses were performed for water vapor lines broadened by argon, oxygen, and xenon in the 720-nm wavelength region. A line-shape asymmetry was observed, which is attributed to statistical dependence or correlation between velocity- and state-changing collisions. The generalized (asymmetric) Galatry profile, which results from the soft-collision profile and includes correlation between velocity- and state-changing collisions, was fitted to the observed line shapes and was found to compare favorably with the observed data. The most prominent asymmetries were observed with xenon as the buffer gas.
We present high-resolution laboratory measurements in the spectral region between 165 and 175 Å that focus on the emission from various ions of C, O, F, Ne, S, Ar, Fe, and Ni. This wavelength region is centered on the λ171 Fe IX channel of the Atmospheric Imaging Assembly on the Solar Dynamics Observatory, and we place special emphasis on the weaker emission lines of Fe IX predicted in this region. In general, our measurements show a multitude of weak lines missing in the current databases, where the emission lines of Ni are probably most in need of further identification and reclassification. We also find that the wavelengths of some of the known lines need updating. Using the multi-reference Møller–Plesset method for wavelength predictions and collisional-radiative modeling of the line intensities, we have made tentative assignments of more than a dozen lines to the spectrum of Fe IX, some of which have formerly been identified as Fe VII, Fe XIV, or Fe XVI lines. Several Fe features remain unassigned, although they appear to be either Fe VII or Fe X lines. Further work will be needed to complete and correct the spectral line lists in this wavelength region.
An overview of the Pulse Line Ion Accelerator (PLIA) concept and its development is presented. In the PLIA concept a pulse power driver applied to one end of a helical pulse line creates a traveling wave pulse that accelerates and axially confines a heavy ion beam pulse The motivation for its development at the IFE-VNL is the acceleration of intense, short pulse, heavy ion beams to regimes of interest for studies of High Energy Density Physics and Warm Dense Matter. Acceleration scenarios with constant parameter helical lines are described which result in output energies of a single stage much larger than the several hundred kilovolt peak voltages on the line, with a goal of 3-5 MeV/meter acceleration gradients. The main attraction of the concept is the very low cost it promises. It might be described crudely as an ''air core'' induction linac where the pulse-forming network is integrated into the beam line so the accelerating voltage pulse can move along with the ions to get voltage multiplication
Full Text Available The aim of this study was to characterize the Zn and Fe availability by phytic acid/Zn and phytic acid/Fe molar ratios, in 22 tropical maize inbred lines with different genetic backgrounds. The Zn and Fe levels were determined by atomic absorption spectrophotometry and the P through colorimetry method. Three screening methods for phytic acid (Phy analysis were tested and one, based on the 2,2'-bipyridine reaction, was select. There was significant variability in the contents of zinc (17.5 to 42 mg.kg-1, iron (12.2 to 36.7 mg.kg-1, phosphorus (230 to 400 mg.100 g-1, phytic acid (484 to 1056 mg.100 g-1, phytic acid P (140 to 293 mg.100 g-1 and available-P (43.5 to 199.5 mg.100 g-1, and in the available-P/total-P ratio (0.14 to 0.50, Phy/Zn (18.0 to 43.5 and Phy/Fe (16.3 to 45.5 molar ratios. Lines 560977, 560978 and 560982 had greater availability of Zn and lines 560975, 560977, 561010 and 5610111 showed better Fe availability. Lines 560975, 560977 and 560978 also showed better available-P/total-P ratio. Thus, the lines 560975, 560977 and 560978 were considered to have the potential for the development of cultivars of maize with high availability of Fe and/or Zn.
The performance of a transmission line has been assessed over the years using power charts. These are graphical representations, drawn to scale, of the equations that describe the performance of transmission lines. Various quantities that describe the performance, such as sending end voltage, sending end power and compensation to give zero voltage regulation, may be deduced from the power charts. Usually required values are read off and then converted using the appropriate scales and known relationships. In this paper, the authors revisit this area of circle diagrams for transmission line performance. The work presented here formulates the mathematical model that analyses the transmission line performance from the power charts relationships and then uses them to calculate the transmission line performance. In this proposed approach, it is not necessary to draw the power charts for the solution. However the power charts may be drawn for the visual presentation. The method is based on applying derived equations and is simple to use since it does not require rigorous derivations.
Elettra is a third generation Synchrotron Light Source located in Trieste (Italy). It consists of a full energy linac injector and a storage ring with beam energies between 1.5 and 2 GeV. The facility is scheduled to be operational by end 1993. For the whole project 22 beam lines from insertion devices are foreseen, each of them is composed of a large number of measurement and controls instruments, most of them embedded in intelligent devices; in addition each beam line can be considered unique compared to the others, having been designed to provide a different kind of synchrotron radiation. This results in a large not homogenous environment where more than 200,000 physical points have to be controlled. A joint team composed of Softeco Sismat and Digital Equipment has developed a fully automated beam line control system able to give full remote controls, with different kind of access rights, to beam line users and beam line specialists as well as a full integration with experiment control systems. ((orig.))
On-Line Monitoring (OLM) of a channel's calibration state evaluates instrument channel performance by assessing its consistency with other plant indications. Industry and experience at several plants has shown this overall approach to be very effective in identifying instrument channels that are exhibiting degrading or inconsistent performance characteristics. The Halden Reactor Project has developed the signal validation system PEANO, which can be used to assist with the tasks of OLM. To further enhance the PEANO System for use as a calibration reduction tool, the following two additional modules have been developed; HRP Prox, which performs pre-processing and statistical analysis of signal data, Batch Monitoring Module (BMM), which is an off-line batch monitoring and reporting suite. The purpose and functionality of the HRP Prox and BMM modules are discussed in this report, as well as the improvements made to the PEANO Server to support these new modules. The Halden Reactor Project has established a Halden On-Line Monitoring User Group (HOLMUG), devoted to the discussion and implementation of on-line monitoring techniques in power plants. It is formed by utilities, vendors, regulatory bodies and research institutes that meet regularly to discuss implementation aspects of on-line monitoring, technical specification changes, cost-benefit analysis and regulatory issues. (Author)
The main features of the mechanical behaviour of deep clay are time dependent effects and also the existence of a long term cohesion which may be taken into account for dimensioning galleries. In this text, a lining optimization test is presented. It concerns a gallery driven in deep clay, 230 m. deep, at Mol (Belgium). We show that sliding rib lining gives both: - an optimal tunnel face advance speed, a minimal closure of the gallery wall before setting the lining and therefore less likelihood of failure developing inside the rock mass. - limitation of the length of the non-lined part of the gallery. The chosen process allows on one hand the preservation of the rock mass integrity, and, on the other, use of the confinement effect to allow closure under high average stress conditions; this process can be considered as an optimal application of the convergence-confinement method. An important set of measurement devices is then presented along with results obtained for one year's operation. We show in particular that stress distribution in the lining is homogeneous and that the sliding limit can be measured with high precision
Last weekend, proton beams came knocking on the LHC's door. Shooting from the SPS and into the two LHC transfer lines, the proton beams were dumped just short of entering the accelerator. The upper plot shows the trajectory of the first TI2 beam, which reached the end of the transfer line in a single attempt after 18 months of technical stop. Below, a smoother beam trajectory in TI2 after some corrections. For the first time since Run 1, the SPS to LHC transfer lines (TI8 and TI2) transported proton beams just short of the LHC. "We tested the beam instrumentation, the devices that measure the beam intensity, transverse beam profile, position and losses, as well as the beam collimators along the transfer lines," says Reyes Alemany Fernandez, the engineer in charge of the LHC. "We were also able to spot possible bottle necks in the beam trajectory and to perform the first optics measurements." Once the beams arrived at the transfer line beam dumps...
State-of-the-art filtered backprojection (FBP) algorithms often define the filtering operation to be performed along oblique filtering lines in the detector. A limited scan field of view leads to the truncation of those filtering lines, which causes artifacts in the final reconstructed volume. In contrast to the case where filtering is performed solely along the detector rows, no methods are available for the case of oblique filtering lines. In this work, the authors present two novel truncation correction methods which effectively handle data truncation in this case. Method 1 (basic approach) handles data truncation in two successive preprocessing steps by applying a hybrid data extrapolation method, which is a combination of a water cylinder extrapolation and a Gaussian extrapolation. It is independent of any specific reconstruction algorithm. Method 2 (kink approach) uses similar concepts for data extrapolation as the basic approach but needs to be integrated into the reconstruction algorithm. Experiments are presented from simulated data of the FORBILD head phantom, acquired along a partial-circle-plus-arc trajectory. The theoretically exact M-line algorithm is used for reconstruction. Although the discussion is focused on theoretically exact algorithms, the proposed truncation correction methods can be applied to any FBP algorithm that exposes oblique filtering lines.
Sessile drop evaporation is a phenomenon commonly came across in nature or in industry with cooling, paintings or DNA mapping. However, the evaporation of a drop deposited on a substrate is not completely understood due to the complexity of the problem. Here we investigate, with several nano-coating of the substrate (PTFE, SiOx, SiOc and CF), the influence of the dynamic of the triple line on the evaporation process. The experiment consists in analyzing simultaneously the motion of the triple line, the kinetics of evaporation, the internal thermal motion and the heat and mass transfer. Measurements of temperature, heat-flux and visualizations with visible and infrared cameras are performed. The dynamics of the evaporative heat flux appears clearly different depending of the motion of the triple line
The ballooning instability on open magnetic field lines is given a thorough mathematical analysis. It is shown that resistive bounding ends (endplates) induce the same stability properties as insulating ends. When unstable, the maximal growth rate increases monotonically with boundary resistivity. An interchange instability may be present, and one necessary condition for its stability is that ∫dl/B be constant on pressure surfaces. (This is an equilibrium existence condition for systems with closed magnetic field lines.) Another necessary condition for interchange stability has the same form as in the closed line case. Precise necessary and sufficient stability criteria are given for various types of bounding ends, including insulating, resistive, and perfectly conducting. copyright 1999 American Institute of Physics
The design features of the elements of the ESCAR (Experimental Superconducting Accelerator Ring) injection beam line are described. The junction of the proton transport system with the ESCAR injection straight section requires the design of mechanical elements compatible with the 10 -11 torr vacuum requirements of the main ring. These elements include a novel septum magnet whose salient design features include a current-carrying septum of tapered thicknesses to reduce the overall power requirements and total enclosure of the magnet coil in a metal can for vacuum compatibility. Other elements are a wire electro-static septum and several fast-rise ''bump magnets''. A transition cryopump is designed to separate the main ring vacuum from the relatively poor 10 -6 torr vacuum of the conventional beam transport line. A brief description of the conventional beam transport line from the 50 MeV proton linac, recently installed for Bevatron injection,is also included. (U.S.)
A 14.5 GHz ECR ion source along with its analyzing section was earlier installed at VECC for injecting multiply charged gaseous and metallic ions into the existing K 130 cyclotron. The injection line from this ECR ion source was connected to the vertical section of the existing injection line for integrating it with the K 130 cyclotron. The injection line comprises two solenoid magnets, a steering magnet, and a bending magnet. In between the solenoid magnets a length about 1.5 metres has been provided for future atomic physics experimental applications. Two gate valves are used to isolate this area. For beam diagnostics, two Faraday cups, designed and fabricated in this centre, have been installed
The internal corrosion of cooling water piping as well as other industrial piping is becoming an increasing problem to system reliability. There are various alternatives being offered as solutions to the problem including water treatment, coatings, and piping replacement. The in-place lining of these pipes is becoming increasingly popular as a cost-effective method to control corrosion. A cured-in-place plastic composite system can be installed with minimal dismantling or excavation. This paper will examine case histories of the installations of this lining system in power plants at three (3) locations in the United States and one in France. It will also summarize testing that has been performed on the lining system and tests that are currently being performed
Spectrophotometric observations of six broad absorption-line QSOs (BALQSOs) are presented. The continua and emission lines are compared with those in the spectra of QSOs without BALs. A statistically significant difference is found in the emission-line intensity ratio for (N V 1240-A)/(C IV 1549-A). The median value of (N V)/(C IV) for the BALQSOs is two to three times the median for QSOs without BALs. The absorption features of the BALQSOs are described, and the column densities and limits on the ionization structure of the BAL region are discussed. If the dominant ionization mechanism is photoionization, then it is likely that either the ionizing spectrum is steep or the abundances are considerably different from solar. Collisional ionization may be a significant factor, but it cannot totally dominate the ionization rate.
Out of 292 proposals for CERN's first ever "Beam line for Schools" contest, two teams of high-school students – Odysseus' Comrades from Varvakios Pilot School in Athens, Greece and Dominicuscollege from Dominicus College in Nijmegen in the Netherlands – were selected to spend 10 days conducting their proposed experiments at the fully equipped T9 beam line on CERN's Meyrin site. Dedicated CERN staff and users from across the departments have put in a huge effort to ensure the success of the project. Detector physicist Cenk Yidriz (centre, white helmet) explains the setup of the "Beamline for schools" experiment at the T9 beamline. It's finally beam time. After months of organisation, coding, engineering and even painting the experimental area, the T9 beam line is ready to deliver protons to experiments devised and built by high-school students. “They are here to collect data and experience the l...
This paper is a case study report on how safety considerations were handled in the process of redesigning a production line. The design process was characterized as a specification and negotiation process between engineers from the company and the supplier organization. The new production line...... in the specification material nor in their face-to-face meetings with the supplier. Safety aspects were not part of their work practice. On this basis, it was suggested that formal guidelines or procedures for integrating safety in the design of production lines would have no effect. Instead, the researchers set up...... became safer, but not as a result of any intentional plan to integrate safety aspects into the design process. Instead, the supplier’s design of a new piece of equipment had a higher built-in safety level. The engineering team in the company was aware of the importance of safety aspects neither...
Phase diagram of strongly interacting matter is discussed within the exactly solvable statistical model of the quark-gluon bags. The model predicts two phases of matter: the hadron gas at a low temperature T and baryonic chemical potential μ B , and the quark-gluon gas at a high T and/or μ B . The nature of the phase transition depends on a form of the bag massvolume spectrum (its pre-exponential factor), which is expected to change with the μ B /T ratio. It is therefore likely that the line of the 1 st order transition at a high μ B/T ratio is followed by the line of the 2 nd order phase transition at an intermediate μ B/T, and then by the lines of "higher order transitions" at a low μ B /T. This talk is based on a recent paper (Gorenstein, Gaździcki, and Greiner, 2005).
In any Hamiltonian relativistic theory there are ten generators of the Poincare group which are realized canonically. The dynamical evolution is described by a Hamiltonian which is one of the ten generators in Dirac's generator formalism. The requirement that the canonical transformations reproduce the geometrical transformation of world points generates the world-line conditions. The Dirac identification of the Hamiltonian and the world-line conditions together lead to the no-interaction theorem. Interacting relativistic theories with world-line conditions should go beyond the Dirac theory and have eleven generators. In this paper we present a constraint dynamics formalism which describes an eleven-generator theory of N interacting particles using 8(N+1) variables with suitable constraints. The (N+1)th pair of four-vectors is associated with the uniform motion of a center which coincides with the center of energy for free particles. In such theories dynamics and kinematics cannot be separated out in a simple fashion
Carson's formulae and Maxwell's potential coefficients are used for calculating the per unit length series impedances and shunt capacitances of the overhead lines. The per unit length values are then used for building the models, nominal pi-circuit, and equivalent pi-circuit at the harmonic frequencies. This paper studies the accuracy of these models for presenting the overhead distribution lines in steady-state harmonic solutions at frequencies up to 5 kHz. The models are verified with a field test on a 25 kV distribution line and the sensitivity of the models to ground resistivity, skin effect, and multiple grounding is reported.
To reproduce observed emission profiles of Seyfert galaxies, rotation in an accretion disk has been proposed. In this thesis, the profiles emitted by such an accretion disk are investigated. Detailed comparison with the observed profiles yields that a considerable fraction can be fitted with a power-law function, as predicted by the model. The author analyzes a series of high quality spectra of Seyfert galaxies, obtained with the 2.5m telescope at Las Campanas. He presents detailed analyses of two objects: Mkn335 and Akn120. In both cases, strong evidence is presented for the presence of two separate broad line zones. These zones are identified with an accretion disk and an outflowing wind. The disk contains gas with very high densities and emits predominantly the lower ionization lines. He reports on the discovery of very broad wings beneath the strong forbidden line 5007. (Auth.)
The device-scanning diode line is described. It is applied for beam profile measuring with space precision better than ± 0.5 mm and with discreteness of 3 mm along Y-axis and 0.25 mm along X-axis. The device is easy in construction, reliable and has a small time of information acquisition (2-5 min). The working range is from 100 to 10 6 rad/min (10 6 -10 10 part/mm 2 /s for 660 MeV protons). Radioresistance is 10 7 rad. The device can be applied for precise beam line element tuning at beam transporting and emittance measuring. The fixed diode line (a simplified device version) has smaller dimensions and smaller time of data acquisition (2-5 s). It is applied for quick preliminary beamline tuning. The flowsheet and different variants of data representation on beam profile are given
Two-parameter families of straight lines (line congruences) are implicitly present in graphics and geometry processing in several important ways including lighting and shape analysis. In this paper we make them accessible to optimization and geometric computing, by introducing a general discrete version of congruences based on piecewise-linear correspondences between triangle meshes. Our applications of congruences are based on the extraction of a so-called torsion-free support structure, which is a procedure analogous to remeshing a surface along its principal curvature lines. A particular application of such structures are freeform shading and lighting systems for architecture. We combine interactive design of such systems with global optimization in order to satisfy geometric constraints. In this way we explore a new area where architecture can greatly benefit from graphics.
The coaxial tube array tether/transmission line used to connect an SP-100 nuclear power system to the space station was characterized over the range of reactor-to-platform separation distances of 1 to 10 km. Characterization was done with respect to array performance, physical dimensions and masses. Using a fixed design procedure, a family of designs was generated for the same power level (300 kWe), power loss (1.5 percent), and meteoroid survival probability (99.5 percent over 10 yr). To differentiate between vacuum insulated and gas insulated lines, two different maximum values of the E field were considered: 20 kV/cm (appropriate to vacuum insulation) and 50 kV/cm (compressed SF6). Core conductor, tube, bumper, standoff, spacer and bumper support dimensions, and masses were also calculated. The results of the characterization show mainly how transmission line size and mass scale with reactor-to-platform separation distance
This paper is a case study report on how safety considerations were handled in the process of redesigning a production line. The design process was characterized as a specification and negotiation process between engineers from the company and the supplier organization. The new production line...... became safer, but not as a result of any intentional plan to integrate safety aspects into the design process. Instead, the supplier’s design of a new piece of equipment had a higher built-in safety level. The engineering team in the company was aware of the importance of safety aspects neither...... in the specification material nor in their face-to-face meetings with the supplier. Safety aspects were not part of their work practice. On this basis, it was suggested that formal guidelines or procedures for integrating safety in the design of production lines would have no effect. Instead, the researchers set up...
We introduce a novel framework for image-based 3D reconstruction of urban buildings based on symmetry priors. Starting from image-level edges, we generate a sparse and approximate set of consistent 3D lines. These lines are then used to simultaneously detect symmetric line arrangements while refining the estimated 3D model. Operating both on 2D image data and intermediate 3D feature representations, we perform iterative feature consolidation and effective outlier pruning, thus eliminating reconstruction artifacts arising from ambiguous or wrong stereo matches. We exploit non-local coherence of symmetric elements to generate precise model reconstructions, even in the presence of a significant amount of outlier image-edges arising from reflections, shadows, outlier objects, etc. We evaluate our algorithm on several challenging test scenarios, both synthetic and real. Beyond reconstruction, the extracted symmetry patterns are useful towards interactive and intuitive model manipulations.
On-Line Monitoring evaluates instrument channel performance by assessing its consistency with other plant indications. Elimination or reduction of unnecessary field calibrations can reduce associated labour costs, reduce personnel radiation exposure, and reduce the potential for calibration errors. On-line calibration monitoring is an important technique to implement a state-based maintenance approach and reduce unnecessary field calibrations. In this report we will look at how the concept is currently applied in the industry and what the arising needs are as it becomes more commonplace. We will also look at the PEANO System, a tool developed by the Halden Project to perform signal validation and on-line calibration monitoring. Some issues will be identified that are being addressed in the further development of these tools to better serve the future needs of the industry in this area. An outline for how to improve these points and which aspects should be taken into account is described in detail. (Author)
Full Text Available ... About About the Veterans Crisis Line FAQs Veteran Suicide Spread the Word Videos Homeless Resources Additional Information ... About About the Veterans Crisis Line FAQs Veteran Suicide The Veterans Crisis Line text-messaging service does ...
The steam line break is a PWR type reactor design accident, which concerns coupled physical phenomena. To control these problems simulation are needed to define and validate the operating procedures. The benchmark OECD PWR MSLB (Main Steam Line Break) has been proposed by the OECD to validate the feasibility and the contribution of the multi-dimensional tools in the simulation of the core transients. First the benchmark OECD PWR MSLB is presented. Then the analysis of the three exercises (system with pinpoint kinetic, three-dimensional core and whole system with three-dimensional core) are discussed. (A.L.B.)
The unified theory of line broadening by electron perturbers is generalized to include the case of a weakly turbulent plasma. The collision operator in the line shape expression is shown to be the sum of two terms, both containing effects arising from the non-equilibrium nature of the plasma. One of the two terms represents the influence of individual atom-particle interactions occuring via the nonequilibrium dielectric plasma medium. The other term is due to the interaction of the atom with the turbulent waves. Both terms contain damping and diffusion effects arising from the plasma turbulence
Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application
In this paper we report on the data recorded with the first Antares detector line. The line was deployed on 14 February 2006 and was connected to the readout 2 weeks later. Environmental data for one and a half years of running are shown. Measurements of atmospheric muons from data taken from selected runs during the first 6 months of operation are presented. Performance figures in terms of time residuals and angular resolution are given. Finally the angular distribution of atmospheric muons is presented and from this the depth profile of the muon intensity is derived. (authors)
The Hazard Inspector is a CAMAC module which divides a MWPC delay line into 8 independent signal monitor and control segments. Independent control effectively reduces delay line occupation time and cuts the number of background and non-trigger particles accepted by the 4XQT charge-time-pulse-width digitizer, a device presented in a separate communication. Only segments containing legitimate information are digitized. Non-trigger related events are gated out at the digitizer, and contaminating hits are noted for computer correction
In a lining facility for protecting structural material concretes for concrete buildings in an FBR type power plant, sodium-resistant and heat-resistant first and second coating layers are lined at the surface of concretes, and steam releasing materials are disposed between the first and the second coating layers for releasing water contents evaporated from the concretes to the outside. With such a constitution, since there is no structures for welding steel plates to each other as in the prior art, the fabrication is made easy. Further, since cracks of coating materials can be suppressed, reactor safety is improved. (T.M.)
The magnetic horn, focusing the antiprotons emanating from the target, was affixed to a sandwich line through which the 150 kA pulses were supplied. Expecting to have to change from time to time the fragile horn (inner conductor only 0.7 mm thick), the assembly was designed for quick exchange. At the lower end of the sandwich line we see the connectors for the high-current cables, at the upper end the magnet horn. It has just been lifted from the V-supports which held it aligned downstream of the target. Continue with 8010293.
A revised method of classification of narrow-line active galaxies and H II region-like galaxies is proposed. It involves the line ratios which take full advantage of the physical distinction between the two types of objects and minimize the effects of reddening correction and errors in the flux calibration. Large sets of internally consistent data are used, including new, previously unpublished measurements. Predictions of recent photoionization models by power-law spectra and by hot stars are compared with the observations. The classification is based on the observational data interpreted on the basis of these models. 63 references
An artificial neural network, based on the self-organizing map, is proposed for on-line signal trend identification. Trends are categorized at each incoming signal as steady-state, increasing and decreasing, while they are further classified according to characteristics such signal shape and rate of change. Tests with model-generated signals illustrate the ability of the self-organizing map to accurately and reliably perform on-line trend identification in terms of both detection and classification. The proposed methodology has been found robust to the presence of white noise
A 140-mm cathode length, Electron Beam Line Source with a high degree of focusing of the beam is constructed. The design principles and basic characteristic considerations for electron beam line source consists of parallel plate electrode geometric array as well as a beam power of 35kW are worked out. The dimensions of the beam at the work site are 1.25xl00mm. The gun is designed basically for the study of evaporation and deposition characteristic of refractory metals for laboratory use. However, it may be equally used for melting and casting of these metals. (author)
Observational data are given on bright emission lines (H-alpha, H-beta, and forbidden N II, S II, and O III) for 14 recently discovered Seyfert galaxies. The investigated objects can be divided into three groups, which correspond approximately to the first (5 objects), the intermediate (4 objects), and the second (4 objects) Seyfert types. Attention is drawn to the properties of the galaxy Markaryan 1018, which has features of both the first and the second type and is distinguished by the weakness of its emission lines, which is probably due to a gas deficit. 7 references
The classical electrogeometric model of shielding failure flashovers on transmission lines is investigated by analytical methods. Most of the basic elements that has appeared in the literature on the subject have been incorporated and put into a comprehensive model. These elements are: tower top geometry, structure height above ground, line insulation, lateral slope of ground, probability distribution of lightning currents, ratio of striking distances to ground wire and earth relative to conductor, and probability distribution of lightning leader approach angle to ground. Departing from a basic idealistic case, the sensitivity of the model to variations in these parameters is studied. Numerical examples are given. 8 refs, 8 figs, 1 tab
On-line routing is concerned with building vehicle routes in an ongoing fashion in such a way that customer requests arriving dynamically in time are efficiently and effectively served. An indispensable prerequisite for applying on-line routing methods is mobile communication technology....... Additionally it is of utmost importance that the employed communication system is suitable integrated with the firm’s enterprise application system and business processes. On basis of a case study, we describe in this paper a system that is cheap and easy to implement due to the use of simple mobile phones...
Full Text Available The results of patients operated on by Nepal Cleft Lip and Palate Association (NECLAPA surgeons for congenital macrostomia were prospectively studied between January 2000 and December 2002. There were four males and three females with a median age of 10 years. Three had an associated branchial arch syndrome. In all patients an overlapping repair of orbicularis oris was done. Six patients had a straight line closure with excellent cosmetic results and one a Z-plasty with a more obvious scar. All had a normal appearing commissure. Overlapping orbicularis repair with straight line skin closure for this rare congenital anomaly is recommended.
Full Text Available Presents the results of studies of innovative materials in the field of experimental and theoretical research fire resistance fireproof panels Pyro-Safe Aestuver T. Owing to the assembly simplicity, materials cheapness, high ecological standard, recycling, reuse potential, are benefit. Research work is running to improve the knowledge about fireproof panels Pyro-Safe Aestuver T for tunnel lining, its basic performance, its long term behavior and in particular also its fire proof for example when used for the lining of road tunnels.
This book employs a relatively new method for solving electromagnetic problems, one which makes use of a transmission line matrix (TLM). The propagation space is imagined to be filled with this matrix. The propagating fields and physical properties are then mapped onto the matrix. Mathematically, the procedures are identical with the traditional numerical methods; however, the interpretation and physical appeal of the transmission line matrix are far superior. Any change in the matrix has an immediate physical significance. What is also very important is that the matrix becomes a launching pad
Object recognition, robot vision, image and film restoration may require the ability to perform disocclusion. We call disocclusion the recovery of occluded areas in a digital image by interpolation from their vicinity. It is shown in this paper how disocclusion can be performed by means of the level-lines structure, which offers a reliable, complete and contrast-invariant representation of images. Level-lines based disocclusion yields a solution that may have strong discontinuities. The proposed method is compatible with Kanizsa's amodal completion theory.
We describe a novel effect related to the controlled birth of a single Josephson vortex. In this phenomenon, the vortex is created in a Josephson transmission line at a T-shaped junction. The 'baby' vortex arises at the moment when a 'mother' vortex propagating in the adjacent transmission line passes the T-shaped junction. In order to give birth to a new vortex, the mother vortex must have enough kinetic energy. Its motion can also be supported by an externally applied driving current. We determine the critical velocity and the critical driving current for the creation of the baby vortices and briefly discuss the potential applications of the found effect
The need for atomic data is one which continues to expand in a wide variety of applications including fusion energy, astrophysics, laser- produced plasma research, and plasma processing. Modern computer database and communications technology nables this data to be placed on-line and obtained by users of the Internet. Presented here is a summary of the observations and conclusions regarding such on-line atomic data access derived from a forum held at the Tenth APS Topical Conference on Atomic Processes in Plasmas.
language boundaries in their everyday work. Despite official English language policies in the three companies, our findings show that employees face a number of different language boundaries, and that ad hoc and informal solutions in many cases are vital for successful cross-language communication. Drawing......This article investigates how front-line employees respond to English language policies implemented by the management of three multinational corporations (MNCs) headquartered in Scandinavia. Based on interview and document data the article examines the ways in which front-line employees cross...
Full Text Available Power line communication, that is, using the electricity infrastructure for data transmission, is experiencing a renaissance in the context of Smart Grid. Smart Grid objectives include the integration of intermittent renewable energy sources into the electricity supply chain, securing reliable electricity delivery, and using the existing electrical infrastructure more efficiently. This paper surveys power line communications (PLCs in the context of Smart Grid. The specifications G3-PLC, PRIME, HomePlug Green PHY, and HomePlug AV2, and the standards IEEE 1901/1901.2 and ITU-T G.hn/G.hnem are discussed.
At the end of “Night the Seventh” of Blake’s The Four Zoas, Blake’s Los, against a background of “furious war”, takes a stance and then performs an act which might seem powerless and quaint against such a backdrop: he draws a line, beginning work consisting of lines which Enitharmon, his companion......, tinctures, as it emerges. Placing this moment in the context of the poem’s epic struggle, this paper explores the reasons for Blake’s choice of image at this juncture in the “history”, thereby making a contribution to our understanding of the opposition between form and formlessness in the narrative....
A theoretical investigation of the use of a coupled line section as an impedance transformer is presented. We show how to properly select the terminations of the coupled line structures for effective matching of real and complex loads in both narrow and wide frequency ranges. The corresponding...... circuit configurations and the design procedures are proposed. Synthesis relations are derived and provided for efficient matching circuit construction. Design examples are given to demonstrate the flexibility and limitations of the design methods and to show their validity for practical applications...
to be proven before one initiates real FFO applications. To achieve this goal a comprehensive set of line width measurements of the FFO operating in different regimes has been performed. FFOs with tapered shape have been successfully implemented in order to avoid the superfine resonant structure with voltage...... spacing of about 20 nV and extremely low differential resistance, recently observed in the IVC of the standard rectangular geometry. The obtained results have been compared with existing theories and FFO models in order to understand and possibly eliminate excess noise in the FFO. The intrinsic line width...
The purpose of this document is to assist in evaluating and planning for the cost, schedule, and technical project risks associated with the delivery and operation of the EC (Electron cyclotron) transmission line system. In general, the major risks that are anticipated to be encountered during the project delivery phase associated with the implementation of the Procurement Arrangement for the EC transmission line system are associated with: (1) Undefined or changing requirements (e.g., functional or regulatory requirements) (2) Underperformance of prototype, first unit, or production components during testing (3) Unavailability of qualified vendors for critical components Technical risks associated with the design and operation of the system are also identified.
The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel
You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.
Digital in-line holography is a 3D imaging technique which has been widely developed during the last two decades. This technique achieves the 3D reconstruction of volume objects from a 2D image-hologram. It is a metrological tool and therefore the improvement of resolution is one of the current challenges. However the resolution depends on several experimental parameters and the experimenters have to choose the parameters which will lead to the best resolution. This paper presents the study of resolution in in-line digital holography from the asymptotical bounds of the covariance of estimators used in hologram reconstruction.
The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility by also allowing information retrieval through web spiders. Access to HyperCLDB is provided through indexes of biological characteristics and navigation in the hypertext is granted by many internal links. HyperCLDB also includes links to external resources. Recently, an interest was raised for a reference nomenclature for cell lines and CLDB was seen as an authoritative system. Furthermore, to overcome the cell line misidentification problem, molecular authentication methods, such as fingerprinting, single-locus short tandem repeat (STR) profile and single nucleotide polymorphisms validation, were proposed. Since this data is distributed, a reference portal on authentication of human cell lines is needed. We present here the architecture and contents of CLDB, its recent enhancements and perspectives. We also present a new related database, the Cell Line Integrated Molecular Authentication (CLIMA) database (http://bioinformatics.istge.it/clima/), that allows to link authentication data to actual cell lines.
The HR role of line managers is highly discussed and criticized but little empirically researched. It is argued that line managers are not able to effectively implement HR practices because they do not have the desire, capacity and competences needed to perform well and lack support and policies &
Jan 27, 2016 ... We give here a comparative review of the line shape variability in a sample of five type 1 AGNs, those with broad emission lines in their spectra, of the data obtained from the international long-term optical monitoring campaign coordinated by the Special Astrophysical Observatory of the Russian Academy ...
Establishment of continuous cell lines from human normal and tumor tissues is an extended and useful methodology for molecular characterization of cancer pathophysiology and drug development in research laboratories. The exchange of these cell lines between different labs is a common practice that can compromise assays reliability due to contamination with microorganism such as mycoplasma or cells from different flasks that compromise experiment reproducibility and reliability. Great proportions of cell lines are contaminated with mycoplasma and/or are replaced by cells derived for a different origin during processing or distribution process. The scientific community has underestimated this problem and thousand of research experiment has been done with cell lines that are incorrectly identified and wrong scientific conclusions have been published. Regular contamination and authentication tests are necessary in order to avoid negative consequences of widespread misidentified and contaminated cell lines. Cell banks generate, store and distribute cell lines for research, being mandatory a consistent and continuous quality program. Methods implementation for guaranteeing both, the absence of mycoplasma and authentication in the supplied cell lines, has been performed in the Andalusian Health System Biobank. Specifically, precise results were obtained using real time PCR detection for mycoplasma and 10 STRs identification by capillary electrophoresis for cell line authentication. Advantages and disadvantages of these protocols are discussed.
We measure the differential microlensing of the broad emission lines between 18 quasar image pairs in 16 gravitational lenses. We find that the broad emission lines are in general weakly microlensed. The results show, at a modest level of confidence (1.8{sigma}), that high ionization lines such as C IV are more strongly microlensed than low ionization lines such as H{beta}, indicating that the high ionization line emission regions are more compact. If we statistically model the distribution of microlensing magnifications, we obtain estimates for the broad line region size of r{sub s} = 24{sup +22} {sub -15} and r{sub s} = 55{sup +150} {sub -35} lt-day (90% confidence) for the high and low ionization lines, respectively. When the samples are divided into higher and lower luminosity quasars, we find that the line emission regions of more luminous quasars are larger, with a slope consistent with the expected scaling from photoionization models. Our estimates also agree well with the results from local reveberation mapping studies.
In the first of a series of "how-to" essays on conducting qualitative data analysis, Ron Chenail points out the challenges of determining units to analyze qualitatively when dealing with text. He acknowledges that although we may read a document word-by-word or line-by-line, we need to adjust our focus when processing the text for purposes of…
for line rating computation and monitoring are identified, these are: sensors, communications, management information system and information analysis tools, which are part of integral dynamic line rating systems. Finally, the benefits and challenges of using phasor measurement units for real time capacity...
Due to the particularity of the surface of concrete tunnel lining and the diversity of detection environments such as uneven illumination, smudges, localized rock falls, water leakage, and the inherent seams of the lining structure, existing crack detection algorithms cannot detect real cracks accurately. This paper proposed an algorithm that combines lining seam elimination with the improved percolation detection algorithm based on grid cell analysis for surface crack detection in concrete tunnel lining. First, check the characteristics of pixels within the overlapping grid to remove the background noise and generate the percolation seed map (PSM). Second, cracks are detected based on the PSM by the accelerated percolation algorithm so that the fracture unit areas can be scanned and connected. Finally, the real surface cracks in concrete tunnel lining can be obtained by removing the lining seam and performing percolation denoising. Experimental results show that the proposed algorithm can accurately, quickly, and effectively detect the real surface cracks. Furthermore, it can fill the gap in the existing concrete tunnel lining surface crack detection by removing the lining seam.
The purpose of this program is to develop a basic understanding of how a molten material front spreads over a solid that is below its melting point, arrests, and freezes. Our hope is that the work will contribute toward a scientific knowledge base for certain new applications involving molten droplet deposition, including the "printing" of arbitrary three-dimensional objects by precise deposition of individual molten microdrops that solidify after impact. Little information is available at this time on the capillarity-driven motion and arrest of molten contact line regions. Schiaffino and Sonin investigated the arrest of the contact line of a molten microcrystalline wax spreading over a subcooled solid "target" of the same material. They found that contact line arrest takes place at an apparent liquid contact angle that depends primarily on the Stefan number S=c(T(sub f) -T(sub t)/L based on the temperature difference between the fusion point and the target temperature, and proposed that contact line arrest occurs when the liquid's dynamic contact angle approaches the angle of attack of the solidification front just behind the contact line. They also showed, however, that the conventional continuum equations and boundary conditions have no meaningful solution for this angle. The solidification front angle is determined by the heat flux just behind the contact line, and the heat flux is singular at that point. By comparing experiments with numerical computations, Schiaffino and Sonin estimated that the conventional solidification model must break down within a distance of order 0.1 - 1 microns of the contact line. The physical mechanism for this breakdown is as yet undetermined, and no first-principles theory exists for the contact angle at arrest. Schiaffino and Sonin also presented a framework for understanding how to moderate Weber number molten droplet deposition in terms of similarity laws and experimentation. The study is based on experiments with three molten
Full Text Available Background: There are limited data on the failure of second-line antiretroviral therapy (ART and the use of third-line ART in people living with HIV in resource-limited settings. Since 2011, the Médecins Sans Frontières (MSF HIV/tuberculosis programme in Mumbai, India, has been providing third-line ART to patients in care. Objective: To describe the experiences and programmatic challenges during management of suspected second-line ART failure and third-line ART therapy for patients living with HIV, including the use of HIV viral load (VL testing. Design: This was a retrospective, observational cohort study of patients with suspected second-line ART treatment failure, who were followed for at least 12 months between January 2011 and March 2014. Results: A total of 47 patients with suspected second-line failure met the inclusion criteria during the study period. Twenty-nine of them (62% responded to enhanced adherence support, had a subsequent undetectable VL after a median duration of 3 months and remained on second-line ART. The other 18 patients had to be initiated on a third-line ART regimen, which consisted of darunavir–ritonavir, raltegravir, and one or more appropriate nucleoside or nucleotide reverse transcriptase inhibitors, based on the results of HIV genotype testing. Of the 13 patients for whom follow-up VL results were available, 11 achieved virological suppression after a median duration of 3 months on third-line ART (interquartile range: 2.5–3.0. No serious treatment-related adverse events were recorded. Conclusions: With intensive counselling and adherence support in those suspected of failing second-line ART, unnecessary switching to more expensive third-line ART can be averted in the majority of cases. However, there is an increasing need for access to third-line ART medications such as darunavir and raltegravir, for which national ART programmes should be prepared. The cost of such medications and inadequate access to VL
of various lengths are handled by stringing together many short lines, with the assumption that each of the longer lines has a length approximated as...expressed in terms of transmission lines numbered from 2 through CAPM , connected in numerical sequence as in figure 3. Line 1 is a dummy element disconnected...from line 2 and the rest of the circuit. Lines 2 through CAPM can each be set to any impedance the user desires. Line CAPM +1 is a zero-impedance line
The characteristic X-ray emission from helium-like argon was investigated as a mean to diagnose hot plasmas. We have measured the radiation from n=2-1 parent lines and from KLn dielectronic recombination satellites with high wavelength resolution as function of the excitation energy using the Berlin Electron Beam Ion Trap. Values of wavelength relative to the resonance and forbidden line are tabulated and compared with references. The line intensity observed over a wide range of excitation energies is weighted with a Maxwellian electron-energy distribution to analyze line ratios as function of plasma temperature. Line ratios (j+z)/w and k/w compare nicely with theoretical predictions and demonstrate their applicability as temperature diagnostic. The ratio z/(x+y) shows not to depend on the electron density
Nov 26, 2010 ... achieves a unified visual and poetic whole. In totality, the rendering exhibits the professional expertise in the artist by using lines to narrate social reality and communicate the artist's perspectives to the society. Plate 2: Templates of Memory. Medium: Broomstick and black link on paper. Size: 60 cm by 50 cm.
Full Text Available The importance of line switching cannot be overemphasized as they are used to connect and disconnect substations to and from a distribution grid. At the cradle of technology line switching was achieved via the use of manual switches or fuses which could endanger life as a result of electrocution when expose during maintenance. This ill prompted the development of automated line switching using relays and contactors. With time this tends to fail as a result of wearing of the contact which is as a result of arcing and low voltage. To avert all these ills this paper presents Arduino based Radio Frequency Identification RFID line switching using Solid State Relay SSR. This is to ensure the safety of operators or technologist and to also avert the problem associated with relays and contactors using SSR. This was achieved using RFID RC-522 reader ardriuno Uno SSR and other discrete components. The system was tested and worked perfectly reducing the risk of electrocution and eliminating damage wearing of the contacts common with contactors and relays.
Extremely neutron rich hot nuclei formed in high energy collisions having high thermal excitation energies are investigated in the framework of statistical theory and the effect of level density parameter a = U/T 2 , on the drip line is analysed
Highlights: • ITER PF6 double pancakes “two-in-hand” winding line layout and main parameters were introduced, main winding sequences were also included. • Main features of each winding unit include de-spooling unit, straightening unit, sandblasting and cleaning unit, bending unit, turn insulation wrapping head, rotary table and automatic control system were depicted. • PF6 double pancake winding line was commissioned with PF5 empty jacket conductor after the installation and testing of each unit, ±0.5 mm turn positioning and ±2 turn to turn deviations were achieved. - Abstract: The Poloidal Field (PF) coils are one of the main sub-systems of the ITER magnets. The PF6 coil is being manufactured by the Institute of Plasma Physics, Chinese Academy of Sciences (ASIPP) as per the Poloidal Field coils cooperation agreement signed between ASIPP and Fusion for Energy (F4E).The ITER PF6 winding pack is composed by stacking of 9 double pancakes. Each double pancake is wound with a “two-in-hand” configuration. This paper describes the ITER PF6 double pancakes winding line, including layout and main parameters of the winding line, features of main units and the commissioning trial with PF5 empty jacket conductor.
Weishan Ma duck (WS) is the eugenic endemic breed, one of the four famous ducks in China, as well Cherry Valley duck (CV) is the largest number of breeding variety. WS is egg strain and CV is meat type. The two duck lines mainly support the. Chinese waterfowl industry. In this study, MHC class Ⅰ genes of WS and CV ...
Exploration with spreadsheets and reliance on previous skills can lead students to determine the line of best fit. To perform linear regression on a set of data, students in Algebra 2 (or, in principle, Algebra 1) do not have to settle for using the mysterious "black box" of their graphing calculators (or other classroom technologies).…
The objective of this book is to get the reader acquainted with theoretical and mathematical foundations of the concept of Wilson loops in the context of modern quantum field theory. It teaches how to perform independently with some elementary calculations on Wilson lines, and shows the recent development of the subject in different important areas of research.
Development of chemical separations for the transactinides has traditionally been performed with longer-lived tracer activities purchased commercially. With these long-lived tracers, there is always the potential problem that the tracer atoms are not always in the same chemical form as the short-lived atoms produced in on-line experiments. This problem is especially severe for elements in groups 4 and 5 of the periodic table, where hydrolysis is present. The long-lived tracers usually are stored with a complexing agent to prevent sorption or precipitation. Chemistry experiments performed with these long-lived tracers are therefore not analogous to those chemical experiments performed in on-line experiments. One way to eliminate the differences between off-line and on-line chemistry experiments is through the use of a sup 2 sup 5 sup 2 Cf fission fragment collection device. A sup 2 sup 5 sup 2 Cf fission fragment collection device has already been constructed [1]. This device is limited in its capabilities. A ...
G. Ehrlich, S. Even, and R.E. Tarjan conjectured that the graph obtained from a complete 3 partite graph K4,4,4 by deleting the edges of four disjoint triangles is not the intersection graph of straight line segments in the plane. We show that it is....
Optimization of the currents in the TMX magnet set leads to a field line configuration which has a central solenoidal region uniform in parallel B parallel to within 10 percent over a 2m length. The field design has sufficient flexibility to meet all three physics objectives of the TMX experiment
Transects consisting of multiple, connected segments with a prescribed configuration are commonly used in ecological applications of line intersect sampling. The transect configuration has implications for the probability with which population elements are selected and for how the selection probabilities can be modified by the boundary of the tract being sampled. As...
Full Text Available is in combination with ice loading. The wind load used in most codes of practice and design recommendations for transmission line design have until recently been based almost exclusively on large-scale wind storms, which may include severe storms such as hurricanes...
We present an updated, optimized version of GAME (GAlaxy Machine learning for Emission lines), a code designed to infer key interstellar medium physical properties from emission line intensities of ultraviolet /optical/far-infrared galaxy spectra. The improvements concern (a) an enlarged spectral library including Pop III stars, (b) the inclusion of spectral noise in the training procedure, and (c) an accurate evaluation of uncertainties. We extensively validate the optimized code and compare its performance against empirical methods and other available emission line codes (PYQZ and HII-CHI-MISTRY) on a sample of 62 SDSS stacked galaxy spectra and 75 observed HII regions. Very good agreement is found for metallicity. However, ionization parameters derived by GAME tend to be higher. We show that this is due to the use of too limited libraries in the other codes. The main advantages of GAME are the simultaneous use of all the measured spectral lines and the extremely short computational times. We finally discuss the code potential and limitations.
Equations of transfer and statistical equilibrium for hydronen atom with eight bound levels and continuum are solved simultaneously. A plane-parallel layer located perpendicular to the Sun surface is taken as a geometrical model. Input parameters of the physical model are optical thickness in the center of Hsub(α) line, electron temperature and concentration in the layer center are well as temperature and density gradients. Functions of sources, line profiles, total energies and the Balmer decrements, which are compared with observations and theoretical calculations made by other authors, have been calculated. The comparison shows that the results are quite acceptable and can be used when analyzing the spectrum and determining physical parameters of solar prominences. Dependence of different performances of the line (equivalent width, central intensity, halfwidth, depth of central depression etc.) on values of initial model parameters is investigated. Line halfwidth is more sensitive to the temperatuu value in the layer center, while central intensity - to the value of temperature gradient and a depth of central depression - to electron concentration. Calculated were shares of primary sources responsible for different excitation mechanism depending on total optical thickness as well as mean probabilities of quantum yield out of a medium which can be used during parametric accountancy of radiation diffusion in solar prominences [ru
The Horizon Is An Imaginary Line (THIAI) is a semi-fictional illustrated account of a young Somali woman's encounters as a refugee in India. Through Maryam, we reflect on the lived experiences of alienation and marginalization as an 'outsider' on the fringes of an increasingly bordered world...
Paper deals with the building of new gas line between Russia and the Ukraine. In September 2003 Gazprom and Naftohaz Ukraine signed protocol about conditions of Russian gas transit through Ukrainian area for 2004. There is guaranteed quantity of transported gas on the level of 127,8 billions cubic meters by Russian side, 110 billions of it should next lead to Europe. Treaty refills long-term contract between Naftohaz and Gazprom about gas transit through Ukraine for period 2003-2013. Both countries and its companies plan to accept particular capital decision about building of new gas line Novopskov-Uzgorod till end of this year, which will be parallel with gas line Soyuz. It will allow to enlarge transportation system capacity by 28 billion cubic meters. Construction of about 1600 km long ducting system will require 1.6 billion USD by annual capacity about 15 billion cubic meters. If capacity would be doubled by construction of another compressor stations, capital expenses rise to 2.2 billions USD. It can be completely built in 7 years. Its linear part with one compressor can be already built in 3 years. Slovensky Plynarensky Podnik (SPP) would certainly have advantages from possible realisation of new gas line and from consequential transit increase. (Author)
The clinical experience is presented obtained from treatment with high-energy linac radiosurgery of 22 patients with stereotactically biopsed gliomas located in middle-line, from thalamus to brain stem and from infundibulum to pineo-tectal regions, during the period 1982-1987. (H.W.). 10 refs
According to a suggestion of A. Kastler, a spark chamber was excited by an undamped radiofrequency pulse and tracks about 1 mm wide obtained; the result was interpreted by computation of the coefficients of electronic amplification and partial ambipolar diffusion. This work led us to the construction of a new fast triggering undamped wave-train generator of very high tension (patent taken out by the C.E.A. under the no.: EN 7 134 650 the 27.9.1971). Since this apparatus uses a resonant storage line, its design implied a precise knowledge of high impedance delay lines. The experimental radiofrequency spectra of the input impedance of opened or short-circuited lines were plotted completely and analysed by the circuits theory, new measuring methods were established, dispersion relations accurately checked and the equivalence of the formulas, within the third order, with theses of Debye's Dipolar Absorption demonstrated. General properties of Hilbert's transform were also investigated. From the experimental point of view, the electromagnetic energy storage process was extended to the case of a liquid nitrogen-immersed resonant delay line. The good behavior of the cryogenic experiment, where the main difficulty of icing was overcame by the construction of special electrodes, offers great promise for extrapolation to superconductivity. (author) [fr
The majority of breast cancer research is conducted using established breast cancer cell lines as in vitro models. An alternative is to use cultures established from primary breast tumours. Here, we discuss the pros and cons of using both of these models in translational breast cancer research
This work was development with the objective of obtaining information of the agronomic behavior of 34 soya mutant lines (R 4 M 18 ) for human consumption and this way to select the 2 better lines. The genetic materials were obtained starting from the variety ISAAEG-B M2 by means of the application of recurrent radiation with Co 60 gammas, to a dose of 350 Gray for the first two generations and both later to 200 Gray and selection during 17 cycles, being obtained the 34 better lines mutants with agronomic characteristic wanted and good flavor. The obtained results were that the mutant lines L 25 and L 32 produced the major quantity in branches/plant number with 7.5 and 7.25, pods/plant number with 171.25 and 167, grains/plant number with 350.89 and 333.07 and grain product (ton/ha) to 15% of humidity 5.15 and 4.68 ton/ha, respectively. (Author)
Identifying the ns - np resonance lines in alkali-metal-like ions is an important issue in fusion plasma science in the view of spectroscopic diagnostics and radiation power loss. Whereas for n=2, 3 and 4 these resonances are prominent and well studied, so far no one could clearly identify the resonance lines for n=5 in the promethiumlike sequence. We have now experimentally clarified the reason for the 'lost resonance lines. In the present study, highly-charged bismuth ions have been studied using a compact electron beam ion trap (EBIT). Extreme ultraviolet emission from the bismuth ions produced and trapped in the EBIT is observed with a grazing-incidence flat-field spectrometer. The energy dependent spectra are compared with a collisional-radiative model calculation, and we show that the 5s - 5p resonance lines are very weak in plasma with a wide range of electron density due to the presence of a long-lived metastable state. (author)
Abstract The ornamental scrub Hydrangea is generally not considered to be particularly sensitive to the phytohormone ethylene. The present study aimed at testing ethylene sensitivity in three different Hydrangea lines: 1, 2 and 3 taking into account the effect of temperature. Ethylene response...... was measured as leaf epinasty and leaf drop. Data indicated that higher temperature accelerates the effect of 2 μl L-1 ethylene over a 12-day period, and if the inhibitor 1-methylcyclopopene 1-MCP is able to attenuate this effect. Breeding line 1 and 3 dropped 3.8±0.6 and 5.0±0.4 leaves on average......, respectively, during the 12-day experimental period. Non-treated controls of line 1 and 3 dropped 1.8±0.6 and 1.8±0.4 leaves, respectively. In contrast, line 2 did not show a significant response to ethylene treatment with a leaf drop of 2.1±0.3 leaves, compared to a leaf drop of 0.8±0.3 in non...
On 19 February, the very first magnet was installed in one of the two tunnels that will house the transfer lines leading to the LHC. This magnet, recycled from a previous facility, was transported and positioned using a novel system designed for conveying large objects through narrow tunnels.
This study investigates gas injection system of the ISOLDE Off-line separator. A quadrupole mass spectrometer is used to analysis the composition of the gas. Based on these measurements a contamination of the injected gas is found and a system upgrade is purposed. Furthermore a calibration of the leak rate of the leak valve is made.
DESIGN AND IMPLEMENTATION OF CONVEYOR LINE SPEED SYNCHRONISER FOR INDUSTRIAL CONTROL APPLICATIONS: A CASE STUDY OF ... in bottles.Therefore a Proportional Integral Derivative(PID) controller was designed to act as a speed synchronizer in order to eliminate the above mentioned problems.
average cost of products (in terms of the attributes of the products’ features) and the probability of features to be (un)installed at runtime. The product lines must be modelled in QFLan, which extends the probabilistic feature-oriented language PFLan with novel quantitative constraints among features...
We observe anisotropic Hanle line shape with unequal in-plane and out-of-plane nonlocal signals for spin precession measurements carried out on lateral metallic spin valves with transparent interfaces. The conventional interpretation for this anisotropy corresponds to unequal spin relaxation times
It has been argued that numbers are spatially organized along a "mental number line" that facilitates left-hand responses to small numbers, and right-hand responses to large numbers. We hypothesized that whenever the representations of visual and numerical space are concurrently activated, interactions can occur between them, before response…
A strong foundation in early number concepts is critical for students' future success in mathematics. Research suggests that visual representations, like a number line, support students' development of number sense by helping them create a mental representation of the order and magnitude of numbers. In addition, explicitly sequencing instruction…
We present an updated, optimized version of GAME (GAlaxy Machine learning for Emission lines), a code designed to infer key interstellar medium physical properties from emission line intensities of UV/optical/far infrared galaxy spectra. The improvements concern: (a) an enlarged spectral library including Pop III stars; (b) the inclusion of spectral noise in the training procedure, and (c) an accurate evaluation of uncertainties. We extensively validate the optimized code and compare its performance against empirical methods and other available emission line codes (pyqz and HII-CHI-mistry) on a sample of 62 SDSS stacked galaxy spectra and 75 observed HII regions. Very good agreement is found for metallicity. However, ionization parameters derived by GAME tend to be higher. We show that this is due to the use of too limited libraries in the other codes. The main advantages of GAME are the simultaneous use of all the measured spectral lines, and the extremely short computational times. We finally discuss the code potential and limitations.
Development of chemical separations for the transactinides has traditionally been performed with longer-lived tracer activities purchased commercially. With these long-lived tracers, there is always the potential problem that the tracer atoms are not always in the same chemical form as the short-lived atoms produced in on-line experiments. This problem is especially severe for elements in groups 4 and 5 of the periodic table, where hydrolysis is present. The long-lived tracers usually are stored with a complexing agent to prevent sorption or precipitation. Chemistry experiments performed with these long-lived tracers are therefore not analogous to those chemical experiments performed in on-line experiments. One way to eliminate the differences between off-line and on-line chemistry experiments is through the use of a 252 Cf fission fragment collection device. A 252 Cf fission fragment collection device has already been constructed [1]. This device is limited in its capabilities. A new fission fragment device would allow the study of the chemical properties of the homologues of the heaviest elements. This new device would be capable of producing fission fragments for fast gas chemistry and aqueous chemistry experiments, long-lived tracers for model system development and neutrons for neutron activation. Fission fragment activities produced in this way should have the same chemical form as those produced in Cyclotron irradiations. The simple operation of this source will allow more rapid and reliable development of radiochemical separations with homologues of transactinide elements
Abstract not available for DE69834793D Abstract of corresponding document: US5973490 A line driver comprising a first transistor (M1), a first amplifier (A1) and a reference resistor (10) for converting an input voltage (Vin) to a first current (i1) through the first transistor (M1). A second
Abstract not available for DE69834793D Abstract of corresponding document: US5973490 A line driver comprising a first transistor (M1), a first amplifier (A1) and a reference resistor (10) for converting an input voltage (Vin) to a first current (i1) through the first transistor (M1). A second
Grooves in the ground plane of dielectric image lines are proposed as a new radiating structure. A figure is included showing the proposed groove structure as a discontinuity in a dielectric image line. A wave incident on the dielectric image line is partly reflected by the discontinuity, partly transmitted across the groove, and partly radiated into space above the line. In a travelling-wave antenna, a number of grooves are arranged below a dielectric guide, with spacings around one guide wavelength to produce a beam in the upper half space. A prescribed aperture distribution can be effected by tapering the series radiation resistance of the grooves. This can be done by adjusting the depths of the grooves with a constant width or by varying the widths of the grooves with a constant depth. Attention is also given to circular grooves. Here, the widths of the holes are chosen so that they can be considered as waveguides operating far below the cut-off frequency of the fundamental circular waveguide mode.
We're working on the theory of metamaterials providing some interesting results. The negative refraction index causes an opposite orientation of the wave vector k and the Poynting vector S of the travelling waves. Hence the metamaterial has a falling dispersion relation ∂ω(k)/∂k < 0 implying that low frequencies correspond to short wavelengths. Metamaterials are simulated by left-handed transmission lines consisting of discrete arrays of series capacitors and parallel inductors to ground. Unusual physics arises when right-and left-handed transmission lines are coupled forming a hybrid metamaterial transmission line. E.g. if a qubit is placed in front of a hybrid metamaterial transmission line terminated in an open circuit, the spontaneous emission rate is weakened or unaffected depending on the transition frequency of the qubit. Some other research interests are the general analysis of metamaterial cavities and the mode structure of hybrid metamaterial cavities for QND readout of multi-qubit operators. Especially the precise answer to the question about the definition of the mode volume of a metamaterial cavity is one of our primary goals.
This thesis contains a comprehensive 3D Navier-Stokes computational study of the characteristics of wakes of wind turbines operating in various flow conditions including interacting wakes between a row of turbines. The computations were carried out using the actuator line technique combined...
We examine the x-ray spectrum of the afterglow of GRB 970508, analyzed for Fe line emission by Piro et al (1999, ApJL, 514, L73). This is a difficult and extremely important measurement: the detection of x-ray afterglows from γ -ray bursts is at best a tricky business, relying on near-real satellite time response to unpredictable events; and a great deal of luck in catching a burst bright enough for a useful spectral analysis. Detecting a clear atomic (or cyclotron) line in the generally smooth and featureless afterglow (or burst) emission not only gives one of the few very specific keys to the physics local to the emission region, but also provides clues or confirmation of its distance (via redshift). Unfortunately, neither the likelihood ratio test or the related F-statistic commonly used to detect spectral lines adhere to their nominal Chi square and F-distributions. Thus we begin by calibrating the F-statistic used in Piro et al (1999, ApJL, 514, L73) via a simulation study. The simulation study relies on a completely specified source model, i.e. we do Monte Carlo simulations with all model parameters fixed (so--called ``parametric bootstrapping''). Second, we employ the method of posterior predictive p-values to calibrate a LRT statistic while accounting for the uncertainty in the parameters of the source model. Our analysis reveals evidence for the Fe K line.
Continuation from 8010293: Finally, the sandwich line with the horn is placed on the ground, for the horn to be inspected and, if needed, exchanged for a new one. The whole procedure was trained with several members of the AA team, for quick and safe handling, and to share the radiation dose amongst them.
Many utilities in South Africa are now implementing labor-intensive methods to combat raptor nesting on power transmission lines. Methods have typically included direct nest removal and trimming of nest materials. However, the process is often unsuccessful, and utilities are now learning to accommodate the raptor nests. This paper argued that managing nests on utility structures has solved many operational problems and has resulted in positive publicity for many line operators. Nest management options included the use of stick deflectors to prevent nest material from accumulating during initial nest construction, as well as encouraging raptors to shift their efforts to a more suitable location. Raptors will often accept alternative nesting platforms, and taller, surrogate nesting poles can be placed next to distribution line structures. Elevated platforms can also be placed on problematic distribution structures, but may result in birds coming into contact with unprotected equipment. It was concluded that a successful nest management program includes plans to make nearby lines safe for raptors and to prevent their electrocution. Providing nests with bird-friendly utility configurations can result in electric facilities enhancing wild raptor populations without impacting power reliability. 14 refs., 9 figs.
Purpose: To investigate the anti-proliferative and apoptotic activity of crude and dichloromethane fraction of A. sieberi against seven cancer cell lines (Colo20, HCT116, DLD, MCF7, Jurkat, HepG2 and L929). Methods: A. sieberi was extracted with methanol and further purification was carried out using liquidliquid extraction ...
Comparison of six high-redshift quasar spectra obtained with the Large Binocular Telescope with previous observations from the Sloan Digital Sky Survey shows that failure to correctly identify absorption and other problems with accurate characterization of the CIV emission line profile in low S/N...
SPIRES I is the first generation of the on-line Stanford Public Information Retrieval System. Designed as a prototype system, SPIRES I was later moved to the SLAC computing facility where it has been routinely available to SLAC users in the field of high-energy physics. The scope and use of the SPIRES I system are described in this manual
The doctrine of university autonomy in the UK contains a least two major "fault-lines" where the structure is inherently weak and there is danger of functional breakdown. The first occurs at the junction between the institution and the state, the second within the institution, where the unity in policy-making between academic and…
The QTLs identified are stable for these characters and are located on ... number of seeds per ear, with better thousand kernel weight and grain yield ... to determine environmentally friendly way of barley lines to withstand oat .... The analysis of variance (ANOVA) was done .... yield components, multiple QTL mapping or.
A method of matching the beam from the 200 MeV linac to the AGS without the necessity of making emittance measurements is presented. An on-line computer program written on the PDP10 computer performs the matching by modifying independently the horizontal and vertical emittance. Experimental results show success with this method, which can be applied to any matching section
... installing or removing wire or cable, strains to which poles and structures will be subjected shall be... being strung in or removed shall be kept under positive control by the use of adequate tension reels... adjacent to energized lines the tension stringing method or other methods which preclude unintentional...
The start of a long trail. The beam line from straight-section 16, where protons are fast ejected, is seen at the point where it crosses the Linac shielding wall as it leaves the PS en route to the ISR.
The developement of integrated circuits has been characterized by an exponential growth of gates on a single chip that will still continue in the coming years. In parallel the price per bit is dropping down with more or less the same law. As a consequence of this a few statements can be made: The present 16-bit minicomputer in a small configuration is going to be substituted by a 16-bit microcomputer, and the 16-bit microcomputer in a powerful configuration by a 32-bit midi having also a virtual memory facility. Fully programmable or microcoded powerful devices like the LASS hardware processor or MICE, will allow an efficient on-line filter. Higher computing speed can be achieved by a multiprocessor configuration which can be insensitive to hardware failures. Therefore we are moving towards an integrated on-line computing system with much higher computing power than now and the present distinction between on-line and off-line will no longer be so sharp. As more processing can be performed on-line, fast high quality feed-back can be provided for the experiment. In the years to come the trend towards more processing power, at a lower price, and assembled in the same hardware volume will continue for at least five years; at the same time the future large high-energy physics experiments at LEP will be carried out within a wide international collaboration. In this environment methods must be found for a large fraction of the work to be distributed amongst the collaborators. To accomplish this aim it is necessary to introduce common standard practices concerning both hardware and software, in such a way that the seperate parts, developed by the collaborators, will be plug-compatible. (orig.)
Context. The formation stage of planetesimals represents a major gap in our understanding of the planet formation process. Late-stage planet accretion models typically make arbitrary assumptions about planetesimal and pebble distribution, while dust evolution models predict that planetesimal formation is only possible at some orbital distances. Aims: We wish to test the importance of the water snow line in triggering the formation of the first planetesimals during the gas-rich phase of a protoplanetary disk, when cores of giant planets have to form. Methods: We connected prescriptions for gas disk evolution, dust growth and fragmentation, water ice evaporation and recondensation, the transport of both solids and water vapor, and planetesimal formation via streaming instability into a single one-dimensional model for protoplanetary disk evolution. Results: We find that processes taking place around the snow line facilitate planetesimal formation in two ways. First, because the sticking properties between wet and dry aggregates change, a "traffic jam" inside of the snow line slows the fall of solids onto the star. Second, ice evaporation and outward diffusion of water followed by its recondensation increases the abundance of icy pebbles that trigger planetesimal formation via streaming instability just outside of the snow line. Conclusions: Planetesimal formation is hindered by growth barriers and radial drift and thus requires particular conditions to take place. The snow line is a favorable location where planetesimal formation is possible for a wide range of conditions, but not in every protoplanetary disk model, however. This process is particularly promoted in large cool disks with low intrinsic turbulence and an increased initial dust-to-gas ratio. The movie attached to Fig. 3 is only available at http://www.aanda.org
Water can be supercooled to temperatures as low as -92 deg. C, the experimental crystal homogeneous nucleation temperature T H at 2 kbar. Within the supercooled liquid phase its response functions show an anomalous increase consistent with the presence of a liquid-liquid critical point located in a region inaccessible to experiments on bulk water. Recent experiments on the dynamics of confined water show that a possible way to understand the properties of water is to investigate the supercooled phase diagram in the vicinity of the Widom line (locus of maximum correlation length) that emanates from the hypothesized liquid-liquid critical point. Here we explore the Widom line for a Hamiltonian model of water using an analytic approach, and discuss the plausibility of the hypothesized liquid-liquid critical point, as well as its possible consequences, on the basis of the assumptions of the model. The present analysis allows us (i) to find an analytic expression for the spinodal line of the high-density liquid phase, with respect to the low-density liquid phase, showing that this line becomes flat in the P-T phase diagram in the physical limit of a large number of available orientations for the hydrogen bonds, as recently seen in simulations and experiments (Xu et al 2005 Proc. Natl Acad. Sci. 102 16558); (ii) to find an estimate of the values for the hypothesized liquid-liquid critical point coordinates that compare very well with Monte Carlo results; and (iii) to show how the Widom line can be located by studying the derivative of the probability of forming hydrogen bonds with local tetrahedral orientation which can be calculated analytically within this approach
Lamellar gratings are widely used diffractive optical elements and are prototypes of structural elements in integrated electronic circuits. EUV scatterometry is very sensitive to structure details and imperfections, which makes it suitable for the characterization of nanostructured surfaces. As compared to X-ray methods, EUV scattering allows for steeper angles of incidence, which is highly preferable for the investigation of small measurement fields on semiconductor wafers. For the control of the lithographic manufacturing process, a rapid in-line characterization of nanostructures is indispensable. Numerous studies on the determination of regular geometry parameters of lamellar gratings from optical and Extreme Ultraviolet (EUV) scattering also investigated the impact of roughness on the respective results. The challenge is to appropriately model the influence of structure roughness on the diffraction intensities used for the reconstruction of the surface profile. The impact of roughness was already studied analytically but for gratings with a periodic pseudoroughness, because of practical restrictions of the computational domain. Our investigation aims at a better understanding of the scattering caused by line roughness. We designed a set of nine lamellar Si-gratings to be studied by EUV scatterometry. It includes one reference grating with no artificial roughness added, four gratings with a periodic roughness distribution, two with a prevailing line edge roughness (LER) and another two with line width roughness (LWR), and four gratings with a stochastic roughness distribution (two with LER and two with LWR). We show that the type of line roughness has a strong impact on the diffuse scatter angular distribution. Our experimental results are not described well by the present modelling approach based on small, periodically repeated domains.
We propose a heuristic algorithm to build a railway line plan from scratch that minimizes passenger travel time and operator cost and for which a feasible and robust timetable exists. A line planning module and a timetabling module work iteratively and interactively. The line planning module......, but is constrained by limited shunt capacity. While the operator and passenger cost remain close to those of the initially and (for these costs) optimally built line plan, the timetable corresponding to the finally developed robust line plan significantly improves the minimum buffer time, and thus the robustness...... creates an initial line plan. The timetabling module evaluates the line plan and identifies a critical line based on minimum buffer times between train pairs. The line planning module proposes a new line plan in which the time length of the critical line is modified in order to provide more flexibility...
Metrology of nanoscale patterns poses multiple challenges that range from measurement noise, metrology errors, probe size etc. Optical Metrology has gained a lot of significance in the semiconductor industry due to its fast turn around and reliable accuracy, particularly to monitor in-line process variations. Apart from monitoring critical dimension, thickness of films, there are multiple parameters that can be extracted from Optical Metrology models3. Sidewall angles, material compositions etc., can also be modeled to acceptable accuracy. Line edge and Line Width roughness are much sought of metrology following critical dimension and its uniformity, although there has not been much development in them with optical metrology. Scanning Electron Microscopy is still used as a standard metrology technique for assessment of Line Edge and Line Width roughness. In this work we present an assessment of Optical Metrology and its ability to model roughness from a set of structures with intentional jogs to simulate both Line edge and Line width roughness at multiple amplitudes and frequencies. We also present multiple models to represent roughness and extract relevant parameters from Optical metrology. Another critical aspect of optical metrology setup is correlation of measurement to a complementary technique to calibrate models. In this work, we also present comparison of roughness parameters extracted and measured with variation of image processing conditions on a commercially available CD-SEM tool.
National Aeronautics and Space Administration — The development and implementation of passive phased array antennas (PAAs) offers significant performance benefits over the current active arrays. The keys to...
Full Text Available Lightning faults occupy in the majority of instantaneous fault and reclosing can usually be successful, so power supply can be restored without immediate patrol in many cases. Firstly, this paper introduces the lightning fault positioning and identifying method. Then test electrical performance of insulators after lightning strike from 110kV lines. Data shows that lightning strike has little effect on the electric performance of insulator. Finally, illustrating disposal process of the 110 kV transmission line after lightning fault, certifying that the power supply reliability be ensured without line patrol.
. (2007) [1] and Jiménez-Ramos et al. (2010) [2], radioactive particles from aircraft accidents in Palomares and Thule have been characterized. Using micro-Proton Induced X-ray Emission (μ-PIXE) and confocal X-ray fluorescence microprobe (μ-XRF), the L-lines of the main components in these particles, U......-lines present not overlapping between the main peaks in the spectra and the X-ray absorption in the sample is much lower than for L-lines....
A new technique for both on-line and off-line computation has been developed. With this technique, a reconstruction analysis in Elementary Particle Physics, otherwise prohibitively long, has been accomplished. It will be used on-line in an upcoming Fermilab experiment to reconstruct more than 100,000 events per second and to trigger on the basis of that information. The technique delivers 40 Giga operations per second, has a bandwidth on the order of Gigabytes per second and has a modest cost. An overview of the program, details of the system, and performance measurements are presented in this paper
-POROS. Protein G-based matrices are very stable showing essentially no decline in performance after 50 application-wash-elution-reequilibration cycles and being easily prepared within 2-3 h of working time with a typical antibody coupling yield of above 80%. In off-line applications where constant flow....... A systematic study was conducted to determine the most versatile antibody immobilization method for use in on-line and off-line IA chromatography applications using commonly accessible immobilization methods. Four chemistries were examined using polyclonal and monoclonal antibodies and antibody fragments. We...
General aspects of high voltage transmission line design are discussed. The relationships between line voltage and length and line dimensions and power losses are explained. Electrical interference in the line is classified under three headings: interference under normal operating conditions, interference due to insulation faults, and interference due to variations in operating conditions of the high-voltage network.
... athletic facilities. (iii) Performance of substantial services in more than one line of business. An... one line of business, such lines of business will be treated as a single line of business where and to... business. For example, assume that on the same premises an employer sells both women's apparel and jewelry...
...) BOATING SAFETY BOATS AND ASSOCIATED EQUIPMENT Fuel Systems Manufacturer Requirements § 183.562 Metallic fuel lines. (a) Each metallic fuel line that is mounted to the boat structure must be connected to the engine by a flexible fuel line. (b) Each metallic fuel line must be attached to the boat's structure...
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Straight line method. 1.167(b)-1 Section 1.167(b... Straight line method. (a) In general. Under the straight line method the cost or other basis of the... may be reduced to a percentage or fraction. The straight line method may be used in determining a...
From an idealized model of the Orion Nebula and from an analysis of line ratios it is shown that direct starlight excitation of the permitted O I line dominates over recombination and Lyman line fluorescence. The line strengths predicted by this mechanism agree reasonably well with those observed in the Orion Nebula. The application of direct starlight excitation to other ions is also discussed
|
GTAV Makes $800 Million in 24 Hours, Breaks All Sorts of Records
September 18, 2013Written by Sebastian Moss
We all knew that Grand Theft Auto V would make a lot of money, but damn. Rockstar have proudly announced that GTAV has made a whopping $800 million in its first 24 hours, something that excludes the upcoming launch in Japan and Brazil.
That means that GTAV will soon pass a billion dollars (if it hasn’t already), a feat that took Call of Duty: Black Ops 215 days to accomplish, which was a record at the time.
Strauss Zelnick, Chairman and CEO of Take-Two, said:
All of us at Take-Two are thrilled with the initial response to Grand Theft Auto V. Once again, the team at Rockstar Games have outdone themselves, setting the entertainment industry’s new standard for creativity, innovation and excellence. Beginning at midnight on Monday, consumers around the world gathered in anticipation to be among the first to experience the evolution of this remarkable series. In North America alone, more than 8,300 stores opened their doors at midnight to welcome fans whose loyalty and enthusiasm were rewarded with what The New York Times called ‘the most immersive spectacle in interactive entertainment’. We are incredibly proud of Rockstar Games’ creative achievement and could not be more pleased with the success of this launch.
Did you contribute to this astonishing figure? Let us know if you made it rain in the comments below.
|
New York City airports install new, expensive holograms to help you find your way
Tecca
Technology News BlogMay 23, 2012
The next time you're looking for help at Newark Liberty, JFK, or LaGuardia airport, the answer to your question might come from a friendly, beautiful woman. Just don't expect that woman to be an actual, live human.
As part of a new customer-service initiative, The Port Authority of New York and New Jersey has installed an avatar — interactive video projected on the plexiglass cutout of a woman's form — in each of its three member airports. The hologram-like spokesperson will be able to guide passengers towards the right gate, inform them of security checkpoint rules, and can even fire off a sales pitch for an airport's duty-free shops. This isn't the maiden voyage for the tech, though — these holographic helpers were installed in Paris's Orly airport last year.
According to The Wall Street Journal, The Port Authority entered into a six-month agreement to rent the high-tech holograms after a customer-satisfaction survey revealed people wanted more human interaction. We're not sure who decided this was the best way to provide human interaction, but nevertheless, the new avatars went into service for the first time on Monday.
How the new technology will pan out has yet to be seen, but we'll be the first to state the obvious — The Port Authority just paid $180,000 to rent three (somewhat creepy) fake humans when they could have paid half that to hire real people. Real people, who would presumably be better equipped to handle actual questions. But then again, real humans wouldn't exactly be the future, now, would they?
|
HARLINGEN - Federal and state environmental officials have given approval for a 690-megawatt electric power plant to be built just east of Valley International Airport.
La Paloma Energy Center will cost more than $500 million and take about two and a half years to build, said Kathleen Smith of Plano-based Coronado Power Ventures. The plant will be located on an 80-acre site just east of Harlingen.
The facility is going to bring 650 and 800 jobs over the next two to three years in construction alone and about 30 to 35 high-paying engineering jobs will be created after construction is completed, according to Mayor Chris Boswell.
The construction project itself will be a major economic boost for the area and the power plant — which can supply the needs of up to 700,000 homes — should draw more industry and development to the area, according to Boswell.
Power that will be produced at the Harlingen plant is now being sold on a wholesale basis to municipal and South Texas electric cooperatives.
Coronado plans a similar power plant for the Edinburg area, but it is not as far along in the development process, Smith said.
“The projects are independent of each other and the Harlingen project has received its permits and is moving forward to construction,” Smith said. “The Edinburg project is still early in development and will be a project in the future, beyond Harlingen.”
|
Cae Asaph, Llandbedr-Y-Cenin near Tal-Y-Bont, North Wales And Snowdonia
If you are thinking about summer holiday choose north wales Snowdonia this time as from Mount Snowdon to the Italianate village of Portmeirion the place has many attractions for travelers.
Visit the royal palace made by Edward, National Slate Museum located in the original Victorian Engineering workshops of the Dinorwig Slate Quarry, Wales’ highest mountain on the only rack and pinion railway in the UK Snowdon Mountain Railway, Lloyd George Museum at Llanystumdwy, Criccieth, is open from Easter to October, including bank holidays and other times by appointment.
for a better stay, you can book summer relaxing cottage Cae Asaph listed in the category of Hooplahotels. You can book it on hefty discounts.
An original, detached, stone-built, traditional cottage, within the grounds of the owner’s property, and set in a secluded elevated position on the outskirts of the village of Llanbedr-y-cennin with panoramic river valley views.
Ideal for those who want seclusion and quiet or a fantastic country activity holiday.
The studio accommodation is charming and homely with original A-frame beams and a woodburner in an inglenook fireplace.
There is a double bed, a small sofa and matching chair and dining table with two wooden chairs.
There is a small kitchen area which has a microwave and small fridge.
Outside there is a large sloping garden with two ponds which is secluded and has fantastic views of the surrounding countryside.
The cottage is set in 5-acres of gardens and woodland and there are trails through the woods for you to explore.
The native woodland reveals interesting sculptures along its paths
.
The studio is ideal for those interested in wildlife and in particular bird watching.
Buzzards and red kites soar overhead and a wide variety of birds busy themselves in the tree canopy.
Twitchers are regular visitors tothe village as they seek the elusive hawfinch.
There are some wonderful walks from the cottage and the North Wales coastline is a 20 minute drive away, together with many biking trails and centres which are all within easy reach of the property.
A lovely studio cottage providing an ideal rural retreat and base to explore the cascading waterfalls and majestic mountain landscape of the Snowdonia National Park.
|
Shopping Cart
My Account
Positive Attitude: A Success Formula
Positive Attitude – what is it? It starts with being content and self-assured with the person that you are. A strong self-image radiates love and spirit and the people who are in your company begin to feel a similar way. Having a positive demeanor is a pivotal feature for realizing success in all aspects of your life. Your disposition destines how you approach your life and is reflected in your occupation, business ventures, sporting efforts and relationships.
A winner’s attitude is essential for achieving your desires in life. People that we applaud for achieving excellence would not have accomplished their dreams by living their life with a detached disposition. The predominant ingredients for a victorious life are accepting yourself, being able to visualize your success and living with with the right attitude.
A positive attitude produces a buoyant outlook on life. You will feel happier, healthier and more energetic. Your belief in yourself and your talents will be amplified and by taking on an open and positive attitude your mind will be welcoming to the opportunities that will start to come your way. People with a negative attitude often become entirely immersed with their problems and are unable to see the opportunities that are presented to them. Once you teach your mind to automatically undertake a positive attitude your difficulties will not be as significant and you will have the ability to cope with them effortlessly.
Impulsively we are drawn towards the company of positive people. They have the ability to lift our spirits and make us feel good about life. Attitude, whether it’s positive of negative, is extremely infectious – choose wisely and spend your time with positive uplifting people and your essence will imitate the same vibration. When you choose to live your life with a positive attitude your spirit will be encircled with a light energy which will magnetically draw people towards you.
Accomplishing your desires is entirely within your power, however, you have to embark on life with a positive attitude and believe that whatever you desire can, and will, be achieved – connect this with a positive attitude and you will be irrepressible. In 1903 a renowned New York engineering professor had said that it would be impossible for man to fly. Two weeks later the Wright Brothers flew the world’s first powered airplane. These guys had a definite advantage – they unquestionably believed that their dream was achievable!
Don’t let fear of failure hold you back from pursuing your dreams – instead espouse a positive attitude and reach for your goals with faith. We can all learn from the Wright Brothers – anything is possible if you approach your dreams with a positive attitude and believe.
|
@XmlSchema(namespace="${datawave.webservice.namespace}", elementFormDefault=XmlNsForm.QUALIFIED, xmlns={@XmlNs(prefix = "", namespaceURI = "${datawave.webservice.namespace}")})
package datawave.webservice.common.result;
import javax.xml.bind.annotation.XmlNs;
import javax.xml.bind.annotation.XmlNsForm;
import javax.xml.bind.annotation.XmlSchema;
|
EURONICS Gaming is the only team, which is already qualified for the ESL S.K.I.L.L. Pro League finals in Cologne, but which team will join them?
On Wednesday the last four matches of our second season will be played and the matches between Planetkey Dynamics and Epiphany Bolt as well as PENTA Sports versus Invictum will decide which teams will directly qualify for the LAN finals and don't have to play a quarter final match and which team will be in the sixth and last slot for the playoffs. On October 28th at 20:00 CET Jason Kaplan will present you our last show from the group stage.
Our last live matches from the groupstage
With these matches we will finish our regular season as the ESL Pro League playoffs are already starting a week later on Thursday, November 5th at 20:00 CET. You can watch all matches live on Twitch.tv! On Thursday we will be able to announce the playoff matches for next week as rank 3-6 will be seeded randomly against each other.
|
In January 2016 the National Maternity Strategy for Ireland 2016 – 2026 “Creating a better future together”,was launched by the then Minister of Health Leo Varadkar. The strategy promised far reaching changes for our maternity services, and not… Read More
The government is continuing to tell the people of Ireland that they will forge ahead with their plans to enter into a church state partnership for the new National Maternity Hospital. However, this government has NO MANDATE from… Read More
On the 16th OF February AIMSI Ireland were invited to make an oral submission to the Oireachtas Joint Committee for Health on the implementation of the National Maternity Strategy. AIMSI Chair Krysia Lynch and Vice Chair Breda Kearns… Read More
There is one week remaining to you to fill out this survey on the direction you’d like to see our maternity services taking. Please take this opportunity to make your voices heard, and please share it where you… Read More
PRESS STATEMENT FROM THE ASSOCIATION FOR IMPROVEMENTS IN THE MATERNITY SERVICES IRELAND (AIMSI) – HSE RESPONSE TO HIQA REPORT ON PORTLAOISE HOSPITAL MARCH 24TH 2015 For immediate release 24th March 2015 Press statement from The Association for Improvements… Read More
What is a VBAC? A VBAC is when a woman gives birth vaginally after a previous Caesarean Section. Sometimes, you will see a number following VBAC – this indicates that a woman has had more than one previous… Read More
|
Sign up to our newsletter for daily updates and breaking news Sign up here! Thank you for subscribing See our privacy notice Invalid Email
The coach company who transported the 83 coronavirus quarantined passengers have now revealed why their bus drivers were not wearing any protective gear.
Members of the public were left confused and concerned when pictures of the Horseman Coaches drivers wearing just their normal uniforms emerged on Friday morning, January 31.
The drivers were making the trip to Arrow Park in Wirral, Liverpool, from Brize Norton after collecting the evacuees when they were seen to be dressed normally rather than in medical masks and suits.
At least seven coaches from Horseman Coaches Ltd were seen arriving at the Brize Norton RAF base in Oxfordshire at around 10am.
(Image: PA)
When the journey was taking place a number of pictures made their way onto social media and people were left questioning the safety of the drivers.
When the story went live on the Liverpool Echo Facebook page, a number of people commented saying that they should have been given something to stop the spread of any germs on the coach.
Margz said: "This is beggars belief. Accompanying escorts wearing bright yellow Hazmat suits and potential carriers of the virus wearing masks but the poor drivers have nothing, not even a mask! Disgraceful!"
Despite the publics fears the company revealed that the drivers weren't wearing protective gear: because it wasn't necessary.
Horseman Coaches was reportedly told by Public Health England that their drivers did not need protective clothing as all of the passengers had been thoroughly screened multiple times and did not present with any signs of the virus.
(Image: PA)
In a statement on its website they said: "On January 30 2020, Horseman Coaches was contacted on behalf of the British Government to assist with the repatriation of British citizens from China following the coronavirus outbreak.
"83 Britons returned to RAF Brize Norton on January 31, 2020.
"Every one of the Britons has been quarantined for the past 8 days in China and none of the individuals on the plane presented any signs of the virus.
"Horseman Coaches was advised by the Deputy Chief Medical Officer for Public Health England that drivers were not required to wear PPE equipment.
"Every individual from the plane has been fully screened every day for the past 8 days and has been deemed fit to return to the UK by medical professionals in China.
"All passengers were screened prior to boarding the plane in China and have again been screened when they landed in RAF Brize Norton before being allowed on the coaches."
The company also explained what would happen to the buses and drivers once the quarantined passengers had been dropped off at Arrowe Park.
(Image: PA)
It said: "PHE (Public Health England) has confirmed that all vehicles used will be subject to a military grade cleansing process and that there will be no risk to any future passengers.
"Every driver involved will remain at home for the next 10 working days under quarantine conditions as an additional precautionary measure.
"Each vehicle used will remain locked in a secure lock up facility for a minimum of 10 working days after a military grade cleansing process as an additional precautionary measure.
"Five Horseman Coaches were used from a fleet of 62."
James Horseman, Company Director, said: "The safety and health of our staff and passengers is our number one priority. The individuals brought back to the UK have been through unimaginable anguish and we are proud to play a small part in their healthy and safe return to the UK.
"Please be assured that all necessary precautions have been taken to ensure the safety of our staff and passengers. We will continue to work closely with the British Government departments to safeguard our drivers and uphold the required decontamination standards."
|
Posts: 23
Topic: Patty is in the Hospital
Dear fellow CC fighters,Your posts bring us so much strength and comfort. I wish that I could tell you that all is well with Patty. The news is not good though. After an EGD ( a scope in her stomach) this morning, it was discovered what is causing the blockage. The tumor in her bile duct is growing and is pressing against her stomach and has completely blocked the opening to her intestines and nothing is flowing. She has a gastric tube in place to keep her stomach empty. She is scheduled for surgery Monday at 1 pm to bypass the tumor and create an opening so food can move from her stomach to her intestines. She has a pic line in place and they are feeding her TPN nutrients. She has to stay in bed due to all the lines she has running everywhere. If all goes well, the doc said she would probably have a week recuperation from the surgery. He said that the surgery would probably take about an hour with a three inch incesion. Dear loved ones, I can't imagine going through this ordeal without the Lord at our side. Patty still has her bright smile. She knows where her eternity is. May we all be there together. What a day that will be.!! Love and God Bless,Ted and Patty
Re: Patty is in the Hospital
Re: Patty is in the Hospital
Hya Ted, Patty and everyone I am so sorry to hear about Patty. I have been following your brave stance on CC. I do hope that there will be an improvement and some movement in the flow. I hope all goes well. love and light alans mom
Re: Patty is in the Hospital
Dear caring loved ones,I just left Patty a few minutes ago. Her surgery went well without complications. She was resting comfortably, with the help of pain medication. She was in surgery three hours. The doc said he felt good about the outcome of the surgery. She was coming out of the anethesia pretty well when I left. He said she still won't be able to eat for several days and might be in the hospital until the beginning of next week. Your love and prayers and support are continuing to help see us through Yet another crisesLove and God Bless,Ted (and Patty)
Re: Patty is in the Hospital
Dear caring loved ones,I just want to send an update on Patty. She is still in the hospital and not doing well. She is weak and only gets up for the bedside potty. She has several infections and low potassium and albumin and total Protein. She still has not eaten anything and is living on the IV TPN and Lipids. She did take a few sips of apple juice this evening and kept it down. Dr. Gurino told us today that she could come home anytime she wants to, in the care of hospice. Dear ones, when the way seems the darkest, we are finding strength from the light of God's love. Heaven is not an alternative, it is everything. Love and God Bless,Ted and Patty
Re: Patty is in the Hospital
Dear ones,Patty is home now and in the care of Hospice. We are so thankful for them. Now the ascites fluid has been building and they drew off 3 liters last week. Today we are thankful for this day, this minute. We tell each other all the time that we have this minute, right now and we thank the Lord for this minute. Patty is weak and eats very little. She has nausea a lot of the time. On the good side, she is able to get up and walk around some and her eyes and that smile are as beautiful as always. She had a really great surprise birthday party Sunday with a cake and candles and a Balloon that sings happy birthday and friends that came over. Thank you for all your birthday wishes. Hospice is now on an "as needed" basis. They have been so wonderful. All of you have been so compassionate and loving beyond words. We believe that your prayers are sustaining us. We keep reminding ourselves of that beautiful day when we will all be exclaiming our praises for our Dear Redeemer and Saviour as we make the journey with all the angels on our way to Heaven. We get so homesick for Heaven and as the song says, "We Have Finally Made it Home". We love you all. Love and God Bless,Ted and Patty
Re: Patty is in the Hospital
Ted and Patty - You are both in my thoughts and prayers. Cherish every moment. I have followed your story for some time. We're neighbors here in Tampa. My dad went into the hospital nearly the same time as Patty with the same issues. He now has a stomach drain and the TPN but is transitioning to a feeding tube - they did not attempt surgery. His cancer has returned and is blocking his stomach/intestine with just a small space to let very limited fluids through. We're hoping that he can come home this weekend. God Bless.Kelly
Re: Patty is in the Hospital
Dear Ted and Patty,
I have followed your postings - the loving bond between you is clearly so strong, this relationship will never die, you will live on in each others hearts forever. I am so sorry to hear about Patty, I hope that you are able to share many tender moments together, I feel for you at this immensly testing time.
Re: Patty is in the Hospital
Ted & Patty - Your postings clearly state your love for each other and for the Lord; you are so blessed in so many ways despite the hurt and pain that you are going through now.May you continue to have peace; my thoughts and prayers are with you.Love Betty
Re: Patty is in the Hospital
Ted and Patty,
My thoughts and prayers go out to the both of you. Continue to cherish all the love that you have for one another, as you will never feel alone. Each day and minute that you have together will be a memory that will go on forever. God will guide you through this most difficult part of your journey.
Re: Patty is in the Hospital
Hi Ted and Patty, My deepest thoughts and prayers are still flowing your way. Ted you are a loving ,caring and supportive Hubby. You are the one who gives Patty the strenght to show her pretty smile and sparkling eyes. Ted, Patty will never be alone as it is so obvious God lives within her heart. Ted, you know that we are all here as a group or individually if you feel like sharing. These moments are precious but can also be very overwhelming. Just wanted you to know we/I are here for Patty and you! Just email the site or an individual member if you wish. God Bless you Both!Jeff
The information expressed is not medical advice. The discussion boards are not intended to replace the services of a trained health professional or to be a substitute for the medical advice of physicians or other healthcare providers. Read the full disclaimer.
|
|[http://www.alsa-project.org/call.php Getting support for your hardware]
|[http://www.alsa-project.org/call.php Getting support for your hardware]
Revision as of 06:57, 9 August 2007
This is a list of pages on the ALSA website that need migration to this wiki. The link on the left is to the original page, the link on the right is to a wiki page. If the wiki link is RED it means the page doesn't exist. If it is blue, it means the migration has been done.
|
This is the website/blog of Philosopher Stephen Law. Stephen is Provost of Centre for Inquiry UK, Senior Lecturer in philosophy at Heythrop College, University of London, and editor of the Royal Institute of Philosophy journal THINK. He has published several books (see sidebar). His other blog is THE OUTER LIMITS: http://www.centerforinquiry.net/blogs/blibnblob
For school talks and media email Stephen: think-at-royalinstitutephilosophy.org
Monday, October 20, 2008
Kyle S on Atonement (BOOK Club 7)
In comments on the previous post, Kyle S has been defending his version of the Biblical theory of atonement from the charge that it "doesn't make sense" (see previous post). I respond below.
Hi Kyle S
You say the Biblical account (or rather, your version of it – many Christians, such as Rev Sam, reject your version) must make sense, “Otherwise, how would we be able to discuss the precise meaning of certain statements or consider possible counter examples?”
As I said, the sense in which it “doesn’t make sense” is not that the words are meaningless, but that the theory is bonkers. E.g. Like believing that fairies are what make the flowers grow (n.b. if you read the preceding post you will see that the context makes it perfectly clear that that is what I meant.)
You then say:
“Most of the responses to me in this thread seem to be along the lines of 'but that doesn't fit well with my understanding of morality'.”
Not quite. I say that these beliefs are not moral truths:
1. All wrong doing must be “paid for” with suffering and/or blood.
2. The sins of one person can be "paid for" with the suffering/blood of another.
3. We are all so utterly steeped in sin, that only the torture and death of a sinless god/man can "pay" the price and save us from… (well, what, hell?)
You can just assert these are moral truths, of course.
However, seems to me, you yourself don’t really buy into this moral point of view: while primitive peoples might have ordered their lives in accordance with it, no modern Christian does. You would surely consider a court that, say, allowed an innocent child to be sacrificed to “pay for” a murderer’s sin to be profoundly immoral. Indeed, somewhat bonkers! This would not “make sense”, morally speaking.
BTW, do you really see each human being as so full of sin that a price must be "paid" in blood, suffering and death, and not just their blood, suffering and death (for that wouldn't be nearly a big enough "price") but that of a sinless god/man? Can't you take a step back and see, not just how bonkers that is, but also what an awful, poisonous word view it is?
This issue kind of ties in indirectly with a reformulation of the problem of evil.
One rebuttal to the PoE is that we don't know that what see in the world really is "evil"; while perhaps far-fetched, it's logically possible that our world really is the best of all logically possible worlds. Perhaps only an omniscient being can tell what is good and evil in the infinitely long run.
This rebuttal, though, requires us to "bite the bullet" philosophically speaking: we cannot know about good and evil in any naturalistic sense, i.e. by observation or reasoning. Only divine revelation could -- at least in theory -- give us accurate information about good and evil, but even then we have no way of distinguishing true divine revelation from just making stuff up or -- as some Christians (and Muslims assert) -- being fooled by Satan.
Kyle's argument that, "Most of the responses to me in this thread seem to be along the lines of 'but that doesn't fit well with my understanding of morality'. But that doesn't seem to be a very strong, or even interesting argument," causes us to have to bite the same bullet: If penal substitution doesn't fit with our understanding of morality, well, too bad for our (natural) understanding of morality.
Fundamentally, we have a practical problem to solve: How do six billion people share a relatively small planet? We have to come to broad agreement about what we coerce our neighbors to do (or not do) and what we allow our neighbors to do as they please.
If we decide good and evil is not something we can come to broad agreement about, then we have to organize our society on some other basis. But that just moves the problem around; we still need to have words that characterize that which we should compel people to do/not do, or to what ends we should institute compulsion to achieve or prevent. "Good" and "evil" are perfectly good words used to denote such characterizations.
So maybe penal substitution is true. So what? What effect does that have on our practical problems? "Jesus' sacrifice" atoned for "original sin": All right, good on ya, God, thanks for sorting that out for us. What attention do we now need to pay to the issue?
One thought did strike me in all the talk of atonement etc. It is that, if we are to make sense of Jesus death in those terms, the only half sensible idea is that God was atoning in some way, presumably for the injustices inflicted upon man.
Even then it was a pretty half hearted affair. the cosmic equivalent of the sort of thing modern politicians offer when they get found out.
Christians believe in an infinitely loving God, Muslims in an infinitely merciful God. As Ron Sexsmith points out, if this is true then all of us, believer and unbeliever alike, must go to heaven when we die. The concept of Hell is absolutely incompatible with a God of infinite love and mercy.
An infinitely merciful God could not possibly want people to go round murdering apostates or blasphemers or gays or adulterers. Don't you agree Nadia?
“As I said, the sense in which it “doesn’t make sense” is not that the words are meaningless, but that the theory is bonkers. E.g. Like believing that fairies are what makes the flowers grow”
So if we don’t know what causes something, are you suggesting that we just shouldn’t talk about it? At least not until it becomes scientific.
It seems to me that to say “something doesn’t exists unless it’s scientific”, is every bit as dogmatic as, “something exists even if it isn’t scientific.” One side follows the dogma (language) of reason, the other side follows metaphors of the intuition. And as Sam pointed out, we run into problems when we take those metaphors and form a metaphysic around them, and (I’d add) try to apply scientific principles to them. There to, the test of both sides positions is whether or not it works to it’s purpose and is consistent with what we mean (do we understand eachother). Photosynthesis is true because we agree, not because it’s absolutely so outside of our experience. To prove that is impossible.
I think you have got the wrong end of the stick. I did not say "something doesn't exist unless it's scientific". I said claims 1-3 above are bonkers - they make no moral sense. I was merely using the fairies hypothesis as an illustration of another bonkers belief, that's all.
Your consensus theory of truth ["photosynthesis is true because we agree"]doesn't hold water, but we'll leave that for another day (or read my entry on Pierce on the sidebar).
2. The sins of one person can be "paid for" with the suffering/blood of another.
3. We are all so utterly steeped in sin, that only the torture and death of a sinless god/man can "pay" the price and save us from… (well, what, hell?)
Kyle said:
Hi Stephen,
your response is starting to sound a bit like an appeal to emotion.
However, I don't think I'd really agree with the 'moral truths' you have set out here, but I can see how you might have understood that from what I said.
The idea is not that all wronging doing must be paid for by blood, or that someone can always take the punishment for someone else.
Rather, if we are to be right with God, then our sins must be paid for and that Christ can take our place, not just anyone.
The reason that our debt is so great is that it is not just that we have done bad things, it is that we are living our lives in rebellion to God. He has created us and everything around us, without him we wouldn't even continue to exist, and we have used this gift of life for ourselves, we have sought to live without him.
God character requires that if we are to spend eternity with him, then this sin must be paid for, otherwise we spend eternity seperated from him. This is just the consequence of our actions, we have rejected him, so at some point we must bear the consequences of that and be seperated from him, this is hell.
God could have left it there, but instead, he has provided a way out, at great cost to himself. Christ has died in our place, if we accept him. Christ is your substitute, if you accept him as one. You may say why didn't God just forgive, or why something else. I don't know the answers to all those questions, but this way was unimaginably costly for God, if there was an easier way, then he would have done it that way.
Now, I realise that this will seem far-fetched and totally out of line with what you believe, but then wouldn't you expect your understanding of morality and the world to be radically affected if you thought God existed?
Kyle S. "Rather, if we are to be right with God, then our sins must be paid for and that Christ can take our place, not just anyone."
But thats one of the potentially bonkers bits. It would only make sense if (i) God got something out of it as restitution for our sins or (ii) We the sinners were making a sacrifice to show contrition.
If it's Gods son supposedly being sacrificed, it fails utterly on both counts.
If, of course Jesus was just one of us, not divine or anything, just a really noble (self sacrificing) sort of bloke it makes a bit more sense. Are you happy the Jesus was a mere mortal?
In general, you're making a lot of assumptions about God that don't follow just from omnipotence, etc.
[W]e are living our lives in rebellion to God.
Or so you say. How do I know I'm living my life in rebellion to God? How can I possibly rebel against an omnipotent God? For all I know, God insists only that we "obey" physical "law".
The only people I know I'm rebelling against are priests and self-styled spokesmen for God, i.e. you.
God character requires that if we are to spend eternity with him, then this sin must be paid for.
Or so you say. How do I know that even if a "sin" could exist, that any sin must be "paid for"? And what do you mean by "paid"? If I have more money, can I buy more sin? Are there sales, discounts, mail-in-rebates?
God could have left it there, but instead, he has provided a way out, at great cost to himself.
Or so you say. What does it mean for an omnipotent being to incur a great cost? The concepts do not really fit together that well, in kind of the same sense that water and recursive enumeration don't fit together well.
realise that this will seem far-fetched and totally out of line with what you believe...
No argument there.
[W]ouldn't you expect your understanding of morality and the world to be radically affected if you thought God existed?
Why should it? Nothing at all about morality changes from Deism. You're assuming this radically different morality into existence in addition to "God".
Wouldn't you expect your understanding of morality and the world to be radically affected if you'd been subjected to constant brainwashing and indoctrination into a delusional belief system?
What Barefoot said. I do wonder why it doesn't occur to Kyle - and others who share his beliefs - that it's not just that we can't follow their reasoning. It's that the language that they use doesn't have any meaning unless you already hold the beliefs that validate that language (indeed, that require that language).
Also:
You may say why didn't God just forgive, or why something else. I don't know the answers to all those questions, but this way was unimaginably costly for God, if there was an easier way, then he would have done it that way.
So you don't know the answer to all those questions, but you're dead certain that if there was an easier way for God, he would have done it that way? How strange that God has made it possible for you to understand one but not the other.
one short thing on Pierce (as I don't see the problem) and to hopefully further my point:
If we all come to the same conclusions about a given thing (say gravity), yet on our own terms; we've done so using a tool that we've already before hand argeed upon, that being reason (science, mathmatics). Reason does not necessarily allow us to come to different conclusions. We're all buried in the dogma of reason.
The lizard people example is weak because it depends upon what we mean by lizard people. If we mean it in the literal way that we'd think of it today (green slimmy men), then that certainly isn't *reasonable*, so we'd all certainly not consent.
My arguement from above was to say that God is not something arrived at from reason and therefore does not, and never will, argree with it.
Now you're gonna' make me look stupid, but I feel pretty good about this for now.
In this debate I mostly encountered objections of the sort that I haven't explained every detail of the biblical narrative, or that it conflicts with something else you believe.
Let me remind you of the original issue:
I am asking for responses to the charge that the central Christian story of atonement clearly makes little sense.
I have tried to explain it as best I can. Just because I don't understand all of its details completely doesn't mean that it doesn't make sense. Likewise, just because you disagree with it, doesn't mean it doesn't make sense.
Noone here has yet offered an argument that shows that any of it is nonsense.
Also, Anticant, you are always asking for proof, but why do you think that belief in God requires evidential support?
I'm not just trying to avoid the question, or trying to allow a free for all in what we can believe.
There are plenty of things that we all believe without evidence, or on rather flimsy evidence.
Surely you think children can have rational beliefs about lots of things, yet for very few of their beliefs can they offer evidence.
I also have lots of beliefs, such as Columbus crossed the Atlantic ocean in 1492. I'm not sure where I learnt this, perhaps at school. Does that make it irrational. If that is irrational then I would say that most of our historical knowledge, and knowledge about the world is irrational.
So, Anticant what sorts of beliefs do you think require evidential support?
For more on this sort of position go here: http://www.leaderu.com/truth/3truth02.html
You ask me why I think that belief in God requires evidential support?
Why do you and Plantinga think that it doesn't?
You pays your money and you takes your choice!
There is, of course, much more abundant reliable evidence that Columbus crossed the Atlantic then there is that the Bible stories about God and Jesus are true.
What sorts of beliefs do I think require evidential support? Useful beliefs, as opposed to the myriad useless ones, of which belief in the existence of gods for which there is no evidence except in the minds of believers is among the most pernicious.
You may think that I'm just playing games, but it's problems like that that destroyed the verification principle. How do you verify it?”
Well, within the context of religion, historical research of early gods, mythology, folk tales etc should led the honest thinker to conclude mysticism and the supernatural have been provably wrong in describing both how our natural world operates and how our natural world came into existence. Having reached this demonstrably reasonable conclusion which most Christians should agree with as they themselves reject all other gods, a rational thinking person should then demand reasonable evidence before accepting of modern day mysticism like Christianity. Therefore given the historic unreliability of Gods/ Spirits etc, it is irrational to accept such belief systems without reasonable evidence.
“You say something like: All beliefs without evidence are irrational.But that itself is a belief. Where is your evidence?”
I think we can find enough evidence in the medieval and dark ages to support this conclusion! Not to mention modern day woo-woo like "The Secret".
I got a chuckle for example when I learnt people once believed horses peering in through a window caused bad dreams, hence ‘nightmares’. The horse in Fuselis painting makes a lot more sence to me now!
Anticant, are those beliefs supposed to be polar opposites of what I have said? They simply are not. When have I claimed that prayer will create jet engines?
I have noticed that lots of atheists frame these sorts of debates as science vs religion, or reason vs religion. I think this is very dishonest, and is one of the reasons why a lot of theists actually do reject science or reason; they have fallen for this atheist dogma.
In any case, I don't think saying
What I am saying is that all beliefs without supporting evidence are useless in dealing with the real world as it actually is.
gets you out of your hole.
Is this your principle?
AP (Anticant's Principle): Any belief that doesn't have adequte evidence is useless.
But that would mean that AP itself is useless, and yet you seem to be trying to get a great deal of use out of it.
Noone here has yet offered an argument that shows that any of it is nonsense.
Kyle, you continue to miss the point. Internally your belief system makes complete logical sense; it's been tightly, tightly, tightly coiled over the years.
The problem is that to somebody like me, the very words that you use simply don't make sense; evil, atonement, sin, etc. The problem for this discussion is that you take these words "on faith" and then fill in the gaps later.
If you can't fill in the gaps - as you admit that you can't - you are still perfectly willing to accept the whole edifice. This puzzles me; but more importantly it makes pretty much everything you say incomprehensible nonsense.
To a certain extent, Kyle S is exploiting a certain vagueness in the naturalistic account. This vagueness is superficial, however; it's an artifact of people with a naturalistic philosophy taking certain fundamental ideas for granted, not by any actual holes in naturalistic philosophy.
The charge of "not making sense" is not — as has been asserted time and again — is not made against Kyle's meaning; no one says that we are unable to parse Kyle's statements or somehow relate the underlying ideas to our own ideas.
The charge is, rather, that the truth of Kyle's ideas do not cohere with the ideas we form about the world of reality (specifically about the psychology of ethics), which rest on the evidential foundation of perceptual, sensory experience. That's what "not making sense" means in this context.
Kyle then questions why "making sense" is important or critical in the first place, but this approach brings in the problem of the social burden of proof.
Most people here, I image, come from societies in which freedom of thought is an important political and social right. In that sense, Kyle is free to believe whatever he chooses to believe, no matter how stupid or unjustified we believe his ideas to be. Even if Kyle were to believe (please note the subjunctive) the world is flat and it's "turtles all the way down," well, that would be his political prerogative.
But it's important to note, Kyle, that you came here — we didn't go to you — presumably you have something to say that you think is interesting to the readers of this blog. A bare declaration of your beliefs, standing only on your political right to believe as you please, is not, however, interesting. Not in the least.
We're interested in how you justify your beliefs, how you yourself come to believe they're not just choices but rather that you've found the truth. Not just the bullshit "true for me", which is just a dishonest way of talking about choice, but the more meaty philosophical true for everyone.
If you're not interested in talking about the justification for your beliefs, whatever that justification happens to be, then the only proper response is to pat you on the head, say, "Well, if that's what you choose to believe, it's a free country," and make snide comments behind your back.
AP (Anticant's Principle): Any belief that doesn't have adequte evidence is useless.
But that would mean that AP itself is useless, and yet you seem to be trying to get a great deal of use out of it.
First, this line of attack was fully explored in the early 20th century, and naturalistic philosophy has long since adapted to the weaknesses of logical positivism. Anticant's principle can easily be fixed up by saying any ontological belief requires evidential justification.
This statement is not an ontological belief, so it's not self-refuting, and its evidential justification is irrelevant.
Kyle is making ontological statements — he's talking about the objective truth of specific ethical assertions — so Anticant's principle is still relevant.
Kyle is fighting the last war here.
More to the point, even if any weaknesses were to exist in naturalism, those weaknesses are completely irrelevant to Kyle's fundamental task, which is the justification of his own beliefs.
Kyle rejects (or says he rejects; I'm sure he still drives with his eyes open) the requirement for evidential justification. Note that rejecting justification by the evidence of our senses concedes the point that his ethical principles indeed do not "make sense".
All right, we're skeptics, maybe "making sense" is not the be-all end-all of epistemic justification. If Kyle wants to propose a different method of justification, we're all ears.
Kyle: Can you deliver the goods? Or will you simply continue to nit-pick your superficial and naive (at best) ideas about naturalism?
But it's important to note, Kyle, that you came here — we didn't go to you — presumably you have something to say that you think is interesting to the readers of this blog. A bare declaration of your beliefs, standing only on your political right to believe as you please, is not, however, interesting. Not in the least.
I thought I was coming here for debate, but apparently I'm just coming before a jury - and a biased one at that. It appears you are prepared to uphold my right to believe what i want, but not my right to a fair trial.
Anyway, I will cooperate as best I can. You said a lot of things in those two posts, so I can't respond to everything at once.
Anticant's principle can easily be fixed up by saying any ontological belief requires evidential justification.
Oh, well that's easy then. I have lots of evidence. For example, I believe (without evidence) that 'if the world exists it was created by God', this combined with some things that I have learned using my senses leads me to the conclusion that God exists.
We're interested in how you justify your beliefs, how you yourself come to believe they're not just choices but rather that you've found the truth.
A very good question.
Firstly, I don't believe that beliefs are always justified by evidence, although clearly they are on many occasions.
However, I don't think that I am alone in this opinion.
For example, I believe that Neil Armstrong was the first man on the moon, but I don't have any evidence or an argument for it. I know that evidence for it exists (of course I don't have evidence for that belief either), but do you really think my belief is unjustified until I go and read the wikipedia article about Neil Armstrong?
Or how about my belief that 1+1=2? In fact, I have even believed this in the face of contrary evidence. At school i was shown a 'proof' that 1+1 did not equal 2, but I was unable to spot the trick. In that situation I had evidence against my belief that 1+1=2 but i continued to believe. Is that unjustified.
What if you have evidence, but it is not publicly checkable? Imagine you are in court accused of murdering your boss. The evidence against you: you were heard shouting at you boss and saying I'm going to kill you the day before the muder, you have no alibi, you were seen in the area around the time of the murder, the murder weapon belonged to you. However, you know that you were not the person who committed the murder because you can remember what you did and it wasn't murder, but you have no proof to present in court. In this case should you decide that since memory can sometimes be unreliable you should simply side with the evidence?
What do I think the heart of justification is?
A belief is justified if and only if it is produced by your belief producing cognitive faculties that are properly functioning.
We have lots of sources of belief, our senses, testimony, reason. I also think that we have an awareness of God. Clearly it doesn't work properly, or at all, in everyone, and a great number appear to be very short-sighted, but I don't think that this is a very good reason to doubt this faculty.
If you lived in the land of the blind, and yet had sight would you think yourself deluded? Me trusting my awareness of God is no different to you trusting your senses.
I was replying to barefoot bum. He told me that it was ok to believe things without evidence, unless they are ontological beliefs.
'If the world exists, it was created by God' is not an ontological belief, so according to barefoot bum it's ok to believe it without evidence.
Also, believing things without evidence doesn't mean that debate is impossible, or that it is impossible to persuade me otherwise. I believe that Neil Armstrong was the first man on the moon. I don't have evidence for it, but I could be persuaded to change my mind.
>>> (Kyle S) I also think that we have an awareness of God. Clearly it doesn't work properly, or at all, in everyone, and a great number appear to be very short-sighted, but I don't think that this is a very good reason to doubt this faculty. <<<
I thought I was coming here for debate, but apparently I'm just coming before a jury - and a biased one at that. It appears you are prepared to uphold my right to believe what i want, but not my right to a fair trial.
Get down off your cross, we need the wood. You're not going to go to jail if you "lose", so quit whining and start debating.
Oh, well that's easy then. I have lots of evidence. For example, I believe (without evidence) that 'if the world exists it was created by God', this combined with some things that I have learned using my senses leads me to the conclusion that God exists.
"If the world exists it was created by God" is not a complete premise; you need to be more specific about what you mean by "created by" and "God". Presumably "God" refers to some sort of "entity" or something like that that does or does not exist. It therefore is an ontological premise.
More importantly, you're not concluding that God exists, the existence of God (an ontological statement) is embedded in your premises; you're indirectly assuming the existence of God. Again, you're free to assume whatever you please, however stupid we might find it, but I can assure you that many readers here (myself included) do indeed find embedding the existence of God in one's premises to be stupid.
It is useless to use evidentialism in a way that can prove anything at all.
P1: If the world exists, then I'm the king of MoldaviaP2: The world exists----C: Therefore I'm the king of Moldavia
You can substitute anything you like for "I'm the king of Moldavia" and "prove" it.
Just creating a valid syllogism is not a proof of the truth of the conclusion. It's merely a demonstration that the conclusion follows validly from the premises. The truth of the premises is still in just as much doubt as when we started.
For example, I believe that Neil Armstrong was the first man on the moon, but I don't have any evidence or an argument for it.
You don't? The idea just magically popped into your head? Remember: someone telling you that Neil Armstrong was the first man on the moon is in fact evidence. The exclusion of hearsay from legal evidence is a matter of efficiency, not epistemology.
I have absolutely no interest in correcting your naive and unsophisticated failure to understand naturalism. As I noted before, even if naturalism were to completely fail, it does not help your position at all.
What I want to know is why you believe what you believe, and I why I might be persuaded that your beliefs are actually true.
A belief is justified if and only if it is produced by your belief producing cognitive faculties that are properly functioning.
This is philosophical bullshit. I understand that it's not your philosophical bullshit, that this bullshit has been promulgated by professional philosophers, but it's bullshit nonetheless. It's blatantly circular.
I also think that we have an awareness of God.
Why do you think we have an awareness of God? Since God is something we can have an awareness of, it's some kind of ontological something. You can say that we have some sort of subjective experiences, but reasoning from those experiences to the conclusion that those experiences are an awareness of something requires a justification.
Clearly it doesn't work properly, or at all, in everyone, and a great number appear to be very short-sighted, but I don't think that this is a very good reason to doubt this faculty.
This is nonsense. That some (faculty of) awareness doesn't work properly or at all in everyone is the reason to doubt the faculty. to doubt is to examine; since there's a difference between people where this faculty works one way (being aware) and where it's another way (being unaware), we have to examine the question and determine which side is correct, i.e. whether awareness is delusion or unawareness is ignorance.
A belief is justified if and only if it is produced by your belief producing cognitive faculties that are properly functioning.
We have lots of sources of belief, our senses, testimony, reason. I also think that we have an awareness of God. Clearly it doesn't work properly, or at all, in everyone, and a great number appear to be very short-sighted, but I don't think that this is a very good reason to doubt this faculty.
If you lived in the land of the blind, and yet had sight would you think yourself deluded? Me trusting my awareness of God is no different to you trusting your senses.
Remember: someone telling you that Neil Armstrong was the first man on the moon is in fact evidence.
In that case I have lots of evidence that God exists. Lots of people have told me that he does.
Presumably "God" refers to some sort of "entity" or something like that that does or does not exist. It therefore is an ontological premise.
'If the world exists, then it was creatd by God' does not commit me to the existence of anything. This statement could be true and yet nothing exist at all.
I don't really believe that this can be believed without evidence, but I'm trying to understand what you think needs evidence, and what does not.
You said that only ontological beliefs require evidence, but that is clearly too permissive.
This is philosophical bullshit. I understand that it's not your philosophical bullshit, that this bullshit has been promulgated by professional philosophers, but it's bullshit nonetheless. It's blatantly circular.
That's it? That's your knock down argument?
Why is it circular?
You can say that we have some sort of subjective experiences, but reasoning from those experiences to the conclusion that those experiences are an awareness of something requires a justification.
How do you justify using your senses? You cannot prove that the external world exists without first using your senses.
Also, very few people have even attempted to justify using their senses, does that mean that everyone elses perceptual beliefs are unjustified?
Barefoot Bum, it seems to me that this principle leads to an infinite regress because the sort of evidential justification that could be used to support an ontological belief would, I would think, presuppose at least one ontological commitment. This ontological commitment would then have to be justified, and so on.
So, I suppose the question is this: Can you provide an example of an ontological belief that can be justified without a commitment to at least one additional ontological belief (which would then, per your principle, have to be justified, and so on)?
The formulation is circular because we can determine that a cognitive faculty is functioning properly if and only if it produces true beliefs.
In that case I have lots of evidence that God exists. Lots of people have told me that he does.
This is what I'm talking about when I say you have a very deficient understanding of naturalism and evidentiary reasoning, and I don't have the time or inclination to correct you. You reject evidentiary justification anyway, so it's a waste of effort. If you're interested, I've written extensively about the Scientific Method.
Make your non-evidentiary case.
How do you justify using your senses?
I don't have to justify using my senses. My senses present impressions to my consciousness with inexorable, irresistible force. My brain (and yours) is nothing more (or less) than a machine to manage sensory impressions.
Of course you're free to deny the use of sensory impressions. Drive home from work tomorrow with your eyes closed, and I will be most impressed. Otherwise, we can take reliance on sensory impressions as mutually stipulated.
The formulation is circular because we can determine that a cognitive faculty is functioning properly if and only if it produces true beliefs.
What do you mean by this. That we would never know that someone's cognitive apparatus was malfunctioning? That's clearly not true, psychology has given us loads of examples, in fact some people with cognitive malfunction know that they have malfunction.
Perhaps you mean that we could not know that that we were functioning properly unles a significant number of us were - it might be the case that we are all malfunctioning and yet think we are functioning properly. Of course couldn't this charge be laid against your defense of the senses below?
All that the theory requires is that it is true that our cognitive faculties are mostly functioning properly most of the time, not that it is known. This belief does not enter into the justification of the theory, so it is not circular.
I don't have to justify using my senses. My senses present impressions to my consciousness with inexorable, irresistible force.
Why can't it be the same in the case of awareness of God. I don't understand why you think that the awareness of God obviously needs justification and yet the senses don't.
I'm finding this whole discussion quite frustrating. When I state something you seem to be to make a very short and vague reply dismissing it. Then when I crticise something you have said, you simply say that I don't understand.
You also consistently misrepresent what I have said. Nowhere have I said that I don't trust my senses or that I don't think beliefs can be justified by evidence.
I can only really speak for myself, in the same way that we don't really know what it is like for someone else to see a red ball, but we suppose that it is very similar to our own case.
The faculty that I think it is most similar to is our awareness of a priori truths.
I can just 'see' that 1+1=2, and in the same way I can just see that God exists. It is not a senuous experince, there is no warmth that accompanies it, or shining light. It is just the case that when I grasp the proposition I come to believe it.
Also, the a priori helps to understand why the awareness of God varies so much. Just as a talented mathematician can spot that certain things are true or false straight away, others will not have a clue, or even get it wrong.
You said - "The faculty that I think it is most similar to is our awareness of a priori truths..."
Your comparison with maths is interesting. It makes it clear that it is not a straightforward sense impression like seeing or hearing. It seems to be an interpretation of some sort. After all I may receive the idea of "1+1=2" through several alternative sensory pathways; which one in particular does not influence my appreciation or otherwise of the equation.
You don't learn mathematical truths using your senses. Your senses might help you grasp the concepts involved. You cannot see (in the literal way) that 1+1=2. Numbers are not properties of objects. When you hold your hand in front of your face you are seeing five fingers, but you are not seeing the number five.
Likewise I come to grasp the concept of God by reading the Bible or talking to people, but in it not in that way that I come to believe.
Evidentiary justification first requires that we state our evidence in non-ontological form, without talking about that evidence in terms of any conclusions. Rather, we have evidence with internal characteristics.
(Applied to experiential, phenomenological evidence, we have to state our experiences without discussing those experiences in ontological terms. We cannot, therefore, talk directly about experiencing an "awareness of God"; we are drawing our conclusion before consciously examining the evidence. Rather, we have to describe these experiences in terms of their intrinsic character, and then apply the next steps to decide if they are best explained as an "awareness of God.")
The next step is to determine the best theory: i.e. the simplest explanation that logically accounts for the neutrally-stated evidence.
This is the point where "awareness of God" hypothesis really falls down, simply because an omnipotent God cannot logically account for any evidence. To be an account, the specific character of the evidence must follow from the hypothetical theory, entailing that the opposite of the evidence is logically precluded by the theory. But an omnipotent God by definition precludes nothing. So we have to add specific characteristics to God. (Usually we add the characteristic that it's God's "intrinsic nature" to want thus-and-such.)
Furthermore, we want all these local individual accounts to cohere in a global way; this requirement is just our "simplest explanation" writ large; accounts that cohere do so because they have features in common, and the sum total of mutually coherent accounts is simpler than the sum total of incoherent accounts.
This methodology is hard to see because we often unconsciously draw conclusions about reality from our perceptions, especially our conclusions about the ordinary world. We don't see brown and green pixels on our eyeballs and go through a rigorous, conscious process and draw a conclusion, we just see a tree. But that's not because these conclusions are not susceptible to scientific investigation, but rather because the work of drawing those conclusion has been performed by evolution, not by conscious, scientific thought.
Also, I've stated the scientific method in linear form for simplicity. However since we cannot and do not start from a clean slate, we cannot ever make purely phenomenological statements. Thus science is a dialectical process, where we take existing theories, try to see where we can take out an ontological assumption or state some piece of our theory more neutrally, and modify the theory accordingly.
This rather long comment (that took me an hour to write, an hour probably wasted) is still an enormous oversimplification of scientific, evidentiary reasoning. Tens of thousands of philosophers and science have devoted considerable time to working out the subtleties of this mode of reasoning and making each of the steps more rigorous and well-defined.
This methodology is hard to see because we often unconsciously draw conclusions about reality from our perceptions, especially our conclusions about the ordinary world. We don't see brown and green pixels on our eyeballs and go through a rigorous, conscious process and draw a conclusion, we just see a tree. But that's not because these conclusions are not susceptible to scientific investigation, but rather because the work of drawing those conclusion has been performed by evolution, not by conscious, scientific thought.
Are you saying that you are justified in believing that the external world exists because evolution told you so? That what it sounds like.
The reason I'm asking these questions is because your theory seems to suggest that you know nothing.
Kyle S. "Likewise I come to grasp the concept of God by reading the Bible..."
OK. Does this awareness as you experience it ever mis-fire?
You might have had something like one of those double-take moments where something that seems at first glance to be one thing is in fact another. e.g. seeing someone who you think you recognize but who in fact turns out to be someone else entirely.
there is a problem here in that beliefs produced by our awareness of God do not come with a sign attached that says 'this is brought to you by the awareness of God', so it's hard to tell if it has or could go wrong.
However, I have had beliefs that have been false that have been very much like ones that are produced by the awareness of God.
Part of the reason for asking is to try to get a feeling for what believers are experiencing. Thanks for putting uup with my curiosity.
As to the indistinguishability of hallucinations and genuine perception I think I would have to disagree.
Firstly there are instances of people who recognize that they are hallucinating whilst they are doing so. e.g. experienced drug users. I suppose this is not dissimilar to being aware that you are dreaming at the time.
Secondly one often realises the difference afterwards. Again when you wake up from a dream you may remember the sense impressions quite vividly - e.g. colours of things but you accept it as a dream.
But neither of these are always the case. Provided that the hallucination is plausible and you are not under conditions of physical stress or pharmacological influence anyone might be unable to make a distinction.
You said the sensations from some of the false beliefs were "very much like"the others. At first reading I thought that you implied they were subtly different like say seeing red is different from seeing pink. They are still both seeing. If there is a difference however subtle it might be possible to learn more from this sense or at least more about it
So how did you tell that the beliefs that you had which were false were, in fact, false? Did the "sense of correctness" fade with time or what?
Kyle: I'm justified in believing in objective reality because it's the simplest scientific theory that accounts for my perceptions.
I do in fact believe in objective reality because my brain is the product of evolution.
The reason I'm asking these questions is because your theory seems to suggest that you know nothing.
That's an odd interpretation. What do you mean by "know"? I mean by "know" justified by the scientific method. Since the method does exist, and since it does produce actual results, I therefore do know things.
This method lets me predict future experiences with great accuracy and detail, and it allows me to share knowledge with others, two things that God-talk fails to provide.
"But of course you can distinguish between hallucination and perception: hallucinatory experiences don't cohere with anything;"
Yes. but this highlights one of the problems. Unless there is anything else to contradict it strongly enough a hallucination will still be convincing.Not only that but part of the halucination is often simply in the interpretation of the senses. Whilst in the grip of it someone may well believe the false interpretation.
OK Pink elephants flying round the room are a real stretch and won't survive much of an encounter with any other experience but what of a simple auditory hallucination of someone shouting in the distance?
You can't distinguish between halucinations and genuine perception. - and I'd add misunderstandings and instances of deceit, wishful thinking, ...
This is the problem for basic theism (there is a personal God), and for religion (the interpretation and implementation of this personal God's intentions).
We start with our senses, which are fallible, and make the best of them by the application of scepticism, reasoning, testing, falsification, repeatability, and any other tools at our disposal. The formalised modern implementation of all this is the scientific method, but that is grounded in the natural tools we acquired through evolution, some of them so basic that all living organisms have them - if it 'hurts' avoid it, if it's 'pleasurable' do it. BB's 'drive with your eyes shut or with them open' being an example. We learn not merely to trust our senses, but how to judge when and to what extent we can trust our senses, through the application of those tools.
I might disagree with the core God hypothesis of theism, but my senses and thinking tools can't help me prove there is no God. What they can do is compare this hypothesis with countless others. For me the result is that the God hypothesis has no sensory or scientific foundation.
But, I can go further with regard to other aspects of theism and religion, such as Jesus being God, the resurrection, atonement, sin, the requirement of death for Islamic apostates or the sinfulness of birth control for Catholics and all the other trappings of religion. They fail when scrutinised by the most basic tools that humans rely on. They are founded only on suspect thought processes piled one on top of another, over several centuries and millennia.
...but I don't see why that matters.
This is the beef most atheists have with most theists: on the one hand, theists are telling everyone else how to live their lives, and in many cases imposing their beliefs, often in cruel ways that appear contradictory to the tenets of the religion concerned; whereas, on the other hand, the worst imposition atheists impose on theists is insult - which, ironically, some followers of the all loving God see as fit reason to become violent.
I don't care if you believe in these theistic fictions, but I do care if you (or if not you many other theists) want to impose the consequences of your beliefs on me, or to acquire political and social advantages because of your beliefs.
Unless there is anything else to contradict it strongly enough a hallucination will still be convincing.
The point of ordinary perceptual experiences is that they do cohere, and they cohere in ways that are not analytic. If we are to explain this coherence, we must form a scientific theory that posits stable properties of something outside our conscious minds, i.e. reality.
Hallucinations, however, don't have any coherence that needs to be explained; they are just random. They especially do not cohere with the words we hear from other people.
There are people who do and say things that lead us to conclude — as the best scientific theory — that they are drawing conclusions from experiences that are idiosyncratic, that the experiences they feel are perceptual are not shared by other people.
Scientific theories are never certain; it's possible, but highly unlikely, that everything we ascribe to reality is due to pure chance.
But nu, we do the best we can with what we have. The point is that theism isn't the best we can do; far from it.
(More precisely, the ways in which some of our experiences (those we typically label as "hallucinations") cohere only in ways such that the best scientific theory to explain them does not need to posit anything outside the subconscious mind. The best scientific explanation of our ordinary perceptual experiences, however, does need to posit things outside not only our conscious minds, but our ordinary subconscious minds as well.)
BB - In general I agree - coherence is the key. However I do believe that unless the hallucination is subject to a challenge it may be believable.
Now the stereotypical visual hallucinations are rapidly blown away I agree as is anything which is subject to (dis)confirmation by others. Nonetheless in the absence of these challenges how can one distinguish hallucinations? As you point out the larger and more comprehensive hallucinations will lack internal coherence so they will get thrown out as well. Nonetheless a modest hallucination involving no obvious reference to the external world might be difficult to detect.Lets say for example I hear something, say a dog, yapping outside the house. I can believe this at least until I look out of the window or go outside. Even then if the experience is transient I would probably sat "Its gone now". It would only be if I had some other point of reference such as other peoples statements or CCTV footage that I could discount it.
What about purely internal hallucinations? That is to say ones about the state of my own body or mind.Not actually sure these are possible but can't think why not either, they seem to be possible with all the other senses. Does deja vu qualify as a hallucination about ones memory?
It seems to me that such internal senses are to some extent shielded from challenge. I can't for instance ask anyone else what I am feeling can I.
I may have stated my views in a slightly unhelpful way for the sake of brevity. Let me try and explain:
In life we form beliefs all the time, you couldn't stop it even if you tried, it's what our brain does.
Some of these beliefs we think come from a certain faculty, maybe the senses or memory. Some beliefs come from something that is definitely not a faculty of ours, testimony. And some are unclear, intuition.
I have noticed that I form beliefs, such as 'God exists' and 'God is speaking through the Bible'. So, in it a sort of conjecture that there might be a faculty that produces these.
I don't hold very strongly to the idea that this is a faculty, but it seems possible to me.
The way I differentiate between true and false beliefs (that I take to be formed by this faculty) is rather similar to the way I differentiate between true and false memories. If I remember something then I take it to be true unless I have some outweighing evidence to the contrary, or that over time it fades and I come to doubt that it was genuine.
I can't believe that you think that the external world if the best explanation of your sensory experiences. There is two problems with it. Firstly, it just doesn't fit with what people actually do, and two, there are lots of explanations of your sensory that do not posit an external world.
One:
People believe in an external world long before they can argue the case. In fact my grandmother believes in an external world and she definitely could not argue for it, does that make her irrational?
Also, young children form beliefs about the external before they are able to make inferences, so it seems one does not need an argument to believe in the external world, it also seems to suggest that we are biased before we even consider the question.
Two:
An external world of objects that it like your experiences hardly seems to be the only explanation of your experiences. It could be that you are only a mind, and that nothing else exists. The regularity exibited by the world perhaps demonstrates that your mind likes regularity. That is much simpler.
Perhaps you don't like that explanation for some reason. You could explain it by one of Descartes Demons, or Berkeley's God, or an evil scientist on Alpha Centauri, the possibilities are endless. Many of these are as good as, if not better, than the external world hypothesis.
You don't have to go to the extravagent extents of suggesting that things continue to exist when you do not perceive, we could even get rid of beliefs about past and future.
The only reason are compelled by the 'evidence' for the external world is that they can't help believing the conclusion.
I'm not trying to argue for scepticism, it is clearly false, but it is not clearly false because the external world is the best explanation.
I am somewhat troubled by your second belief though, which seems to have survived the test you describe. The Bible is full of contradictory, ambiguous and downright unpleasant stuff which ought by your method have been sufficient to disconfirm your initial feeling about it.
The Bible is full of contradictory, ambiguous and downright unpleasant stuff which ought by your method have been sufficient to disconfirm your initial feeling about it.
I think you are rather overstating this point. I admit that some parts of the Bible are difficult to understand, and that at times it seems to contradict itself, but I don't think there are any clear examples of outright contradiction.
Think about how reason works. It is quite easy to come up with paradoxes or to argue for things that are clearly false. Such things shouldn't cause us to abandon reason.
Likewise, I don't believe that the Bible is easy to understand, or that I will ever settle all the objections that have been raised against it, but I haven't seen the sorts of problems that should cause one to doubt it's authority.
We have to drill down to what we mean by "unlikely". That can mean only that some experience (or its facile interpretation) fails to cohere with the rest of our experiences.
Kyle:
I can't believe that you think that the external world if the best explanation of your sensory experiences. There is two problems with it. Firstly, it just doesn't fit with what people actually do, and two, there are lots of explanations of your sensory that do not posit an external world.
I said it was the best explanation, not the only explanation.
And it's irrelevant that people don't think consciously about whether or not reality is the best explanation; if they did think consciously about it, they would come to that conclusion.
But, as I mentioned before, most people's beliefs about reality are shaped by evolution, not conscious thought.
The regularity exibited by the world perhaps demonstrates that your mind likes regularity. That is much simpler.
It's only "simpler" if you handwave around the enthymemes. You have to be rigorous before you can evaluate simplicity.
Many of these are as good as, if not better, than the external world hypothesis.
So you say. First descrobe your theory rigorously, with no enthymemes (hidden assumptions) so that the hypotheses rigorously lead to the conclusions verified by experience, and then count the premises.
I'm not going to do your philosophical work for you, Kyle. Just because you happen to say that some theory is simpler doesn't mean it actually is.
Again, Kyle, we're going off track. The point is not to justify empirical science. The point is for you to persuade us that your belief in God is not ridiculous, ludicrous, fit only for credulous children.
Of course, you don't need to persuade us of anything. It's a free country, you can have whatever ridiculous beliefs you want. If you want to believe in God, Santa Claus, the tooth fairy, shape-shifting lizard people, timecubes or the Cubs chances in the 2009 World Series, that's fine. Believe what you want; without credulous fools we'd have a lot of priests out of work.
Many of the laws given in the OT are to a nation, so there is a certain amount of pragmatism involved. If you were to look at the laws in our country, you would certainly not think that they were clear examples of wrongdoing. Is it clearly wrong to drive more than 70mph? Or to build a house without planning permission?
Societies will be forced at some point to make illegal things that are not wrong in themselves. God's people are no longer a nation, so these laws do not apply, but we can still learn from them. For example, the OT says that if you have steps up to your roof, then you should install a rail around the edge, this seems to be some sort of health and safety regulation, so it teaches us that it is important to make sure your property is not unsafe.
2. The wiping out of other tribes and nations.
You must understand this within the narrative of the Bible. God is a holy and powerful God, and he is the sustainer of all things. People have used the gift of life and continued existence to rebel against God. this is unacceptable. God was using the nation of Isreal to punish othe evil nations. He also used other nations to punish Isreal.
There's simply no controversy over allowing perceptual facts into evidence.
However, "I saw God" is not an perceptual fact. It's a conclusion, and allowing perceptual facts into evidence is not to allow intuitive conclusions.
If we go one level deeper, we can talk about experiential facts, but the justification is more complicated. But in the same sense as above, "I feel God" is still a conclusion, not a experiential fact.
Fundamentally I don't have to justify taking perceptual facts as an evidentiary foundation the issue is not in controversy. What's controversial is how you draw conclusions from those facts. Those are two different issues, as has been explained to you time and again.
You have two choices: If you want to use well-accepted scientific epistemology to draw conclusions, then you don't need to explain or justify the method: We all know how science works, and most of the readers here accept it as sound. But you do need to actually use the method in the well-accepted manner: you must present facts, not intuitive conclusions, and you must create a rigorous theory that accounts for those facts. Then we can evaluate the theory's accuracy and simplicity.
Alternatively, you can propose an alternative method for drawing conclusions. But if you're going to present an alternative, you should at least describe that method, and explain why it is not vacuous, i.e. show it cannot be used to justify any conclusion at all.
(Kyle: If you take the Bible as authoritative with regards to truth, i.e. the Bible is true by definition, then it is analytically impossible to find any part of it false.
In order even in principle to find any part of the Bible false, you would first have to deny its authority and say that there was some other method to determine truth to which one could submit truth claims of the Bible.)
If I go outside and look at a tree, then it seems to me that there is a tree there. This is not a conclusion this is a statement about my experience 'I am being appeared to treely'. You say that this is evidence for the conclusion that 'there is a tree'.
I agree with you on that. However, you object to me doing something like this: It seems to me that God exists, I have an apparent awareness of God's existence, and I conclude from this that 'God exists'. This is not an undefeatable belief, it has the same sort of status as the tree belief, it could be wrong but I have good prima facie reason for believing it.
I claim that there is no obvious epistemic difference between these. You disagree.
It is the nature of your disagreement that I don't understand. You say that perception is acceptable because science has proved it to be acceptable. But that can't be the case. That would mean that a child who is unable to understand science is not justified. People living in the amazon rainforest who have had no contact with outsiders are unjustied. All those people who existed before the scientific method are unjustified. If you developed global amnesia would that mean that you are unjustified in taking the evidence of your senses at face value?
I believe that we have lots of sources of belief, many that we can both agree on: the senses, testimony, reason etc... I just go one further.
If I go outside and look at a tree, then it seems to me that there is a tree there. This is not a conclusion this is a statement about my experience 'I am being appeared to treely'. You say that this is evidence for the conclusion that 'there is a tree'.
Light is striking your eyeballs, creating a pattern of neurological events. Your preconscious mind is interpreting this information, using very complicated neural structures, drawing a conclusion, and presenting the conclusion to your conscious mind that you see a tree.
Cross your eyes, and your preconscious mind will draw a different conclusion, that there are two trees, and present that conclusion to your conscious mind.
What's important is that these conclusions drawn by our preconscious minds are not rigorous (although they are often true).
It's insufficient in a philosophical sense to simply say, I know a tree exists only because my preconscious mind presents me with the conclusion that a tree exists. In a philosophical sense, we want a more rigorous connection between the perception and our interpretation of reality.
You might object that people who do not apply this philosophical rigor are being "irrational". Perhaps so, but calling some mode of thought irrational is not to call it false, just insufficiently rigorous.
Now, as it happens, we can rigorously, scientifically justify the conclusion that one sees a tree when one has a particular pattern of sense impressions. And we can scientifically justify why our preconscious minds consistently come up with true beliefs under ordinary circumstances. Therefore, we are justified under ordinary circumstances in trusting our preconscious minds... keeping in mind that if we're ever in doubt, we can apply full scientific rigor to decisively get at the real truth.
Thus it is with God... Our preconscious minds draw particular conclusions. They might or might not be correct. Since we are in doubt, we must -- just as when we are in doubt about what conclusion to draw from the evidence of our senses -- apply rigorous scientific reasoning to determine what conclusions to draw from the experiences you call experiences of God.
That would mean that a child who is unable to understand science is not justified. People living in the amazon rainforest who have had no contact with outsiders are unjustied. All those people who existed before the scientific method are unjustified.
Indeed: none have a conscious rigorous scientific justification for their beliefs. So what? Just because their beliefs are not consciously justified doesn't mean they're false.
Just because their beliefs are not consciously justified doesn't mean they're false.
How is that person supposed to make a subjective distinction between perception and guessing?
You haven't answered the question about how we justify beliefs in our daily lives.
Consider this example:
Imagine you are in court accused of murdering your boss. The evidence against you: you were heard shouting at you boss and saying I'm going to kill you the day before the muder, you have no alibi, you were seen in the area around the time of the murder, the murder weapon belonged to you. However, you know that you were not the person who committed the murder because you can remember what you did and it wasn't murder, but you have no proof to present in court.
How is that person supposed to make a subjective distinction between perception and guessing?
By applying a conscious, rigorous process, i.e. science.
You haven't answered the question about how we justify beliefs in our daily lives.
They're usually not, which is why people have a lot of false, stupid beliefs when they go outside the environments where their beliefs evolved.
Imagine you are in court accused of murdering your boss. The evidence against you: you were heard shouting at you boss and saying I'm going to kill you the day before the muder, you have no alibi, you were seen in the area around the time of the murder, the murder weapon belonged to you. However, you know that you were not the person who committed the murder because you can remember what you did and it wasn't murder, but you have no proof to present in court.
In this case how is science going to help you out?
Science would help by examining more facts.
Memory itself is a real fact and could in principle (if we had much-improved brain scanning technology) be admitted as evidence.
More importantly, you present -- absent memory -- a very weak circumstantial case. There definitely could be a weight of facts (videotapes, witnesses, fingerprints and other forensic evidence) that would lead me to doubt the veracity of my own memory: the simplest explanation that accounted for all the facts might well be that I've somehow formed a false memory.
Empirical science is much much more than just "I see X, therefore X is true." It's not scientific to say only "I see a tree, therefore a tree exists." And it's equally unscientific to say only, "I feel God, therefore God exists."
Our naive intuitions are just not rigorous enough to be trusted absolutely. We must examine our naive intuitions with scientific rigor to determine when and under what conditions they are and are not reliable -- and also examine reality with equal scientific rigor to account for why they are or are not reliable under different conditions.
"You claim that I have not given adequate defence of the awareness of God, but by your own standards you seem unable to give an adequate defence of your senses."
I don't think our senses alone can be defended as a reliable route to truth, but when subject to sceptical scrutiny, testing, etc (see my earlier post) the resulting experience of using the senses plus critical thought provides the most coherent truth we can get at. Your awareness of God doesn't provide anything but a re-affirmation of itself based on the presumption there's a God in the first place. There is no experience of God that can be distinguished from the hallucinatory, and nothing about your God that can be shown in any way to require what all religions require with respect to God.
You can dream or hallucinate about fairies, but, based on your senses plus critical thinking, and with no presumption that they do exist, you conclude that they don't exist and that your experience was a dream or an hallucination. At least I assume you do.
But one might presume fairies do exist. Using our most reliable tools of the senses plus critical thinking what might we expect to see or otherwise experience as a consequence of fairies existing? We might expect to see them occasionally and capture them on VT - unless they choose to make themselves invisible to us and our instruments. Perhaps we might expect to see the consequences of their magical powers (miracles) - unless they choose not to make their miracles subjectable to scrutiny. Any fairy-ist could concoct any number of excuses as to why they still exist but they fail to conform to our understanding of the normal material world. Is all that is required to sustain a belief in fairies is that the fairy-ist presumes that they do exist, and that any 'experience' that is unexplained by ordinary sensory means is evidence that they do exist.
You find the word "sense" at the root of a lot of our epistemological words and phrases such as "sensible", "nonsense", "doesn't make sense".
The project that I'm interested in is understanding, organizing and being able to predict my subjective experiences. Pain hurts and pleasure feels good: that's how the brain works.
I think what Kyle is groping at is this. Suppose we found the best possible scientific theory, which by definition would explain all of our experiences in the simplest way. By what virtue would we believe that scientific theory has anything whatsoever to do with the truth?
The problem is, suppose science really does have nothing whatsoever to do with truth. Then what? We're screwed. The truth is simply unknowable, since our subjective experiences are all we have to work with.
I hold to the majority view that knowledge is a very common thing, that there are many beliefs that are both true and enjoy a positive epistemic status sufficient for knowledge.
On the other hand, you seem to think that knowledge is in fact very rare. This is an unusual and uncommon view. You seem to think that knowledge is true belief that is justified by science. The best that prescientific societies could hope for was simply true belief.
Memory itself is a real fact and could in principle (if we had much-improved brain scanning technology) be admitted as evidence.
This wouldn't really be of much use. It would simply show that the defendant wasn't lying. There is no cognitive difference between a genuine memory and a false memory.
Don't you think there are cases when one should reject the evidence, simply on the basis of what you believe, not on the grounds of stronger evidence?
After all, there are cases of people being sent to prison for murder, who were in fact innocent, and not becuase the court failed in it's weighing up of the evidence. In those cases do you think that the defendent was being irrational to continue protesting innocence?
"[1] Don't you think there are cases when one should reject the evidence, simply on the basis of what you believe, not on the grounds of stronger evidence?
[2] After all, there are cases of people being sent to prison for murder, who were in fact innocent, and not becuase the court failed in it's weighing up of the evidence. In those cases do you think that the defendent was being irrational to continue protesting innocence?"
[1] - No. That sounds dumb.
[2] - The innocent man has stronger evidence, as far as he is aware - his senses: he didn't do it. He just can't convince the court of the case. If the evidence upon which the court bases its case is very strong (but incorrect) the innocent man may even, quite rationally, begin to doubt his own innocence and his own sanity. But, in your hypothetical case you are giving us the third party knowledge that he is in fact innocent because he didn't do it. In normal cases this knowledge isn't available, barring witnesses that didn't come forward or other unexamined evidence.
The court is mistaken, but on the presumption that someone must have done it, and our man fits to the satisfaction of the court, the court finds him guilty.
The possibility of such mistakes is one of the reasons why the death penalty is opposed. If it later evidence becomes available at least some reparation can be made for jailing the innocent man.
In a similar way some intelligence had to create life - so God is the guilty party. Who else could it be? In God's case the theist jury is presuming guilt and manipulating the evidence to convict, and wants a sentence of eternity.
Poor old God gets a really tough deal, particularly in Christianity. First he's crucified, and then he's condemed to an eternity of running Heaven Wing, for people who are never going to turn up. What's more, for all those atheists proclaiming God's non-existance, let alone his innocence as the creator, theists are also condeming them to eternal Hell Wing.
I hold to the majority view that knowledge is a very common thing, that there are many beliefs that are both true and enjoy a positive epistemic status sufficient for knowledge.
Basically, I agree. This view accounts for the fact that people have in the past expressed many beliefs we now believe to be false: their beliefs in general did not rest upon a sound epistemic basis. It also accounts for many beliefs contradicted by scientific reasoning. It also accounts for a lot of mutually contradictory beliefs: they can't all be true, therefore the majority must be false. A reliable epistemic basis should not produce so many false beliefs.
This wouldn't really be of much use. It would simply show that the defendant wasn't lying. There is no cognitive difference between a genuine memory and a false memory.
Irrelevant. It's still a fact, and it has to be accounted for by any theory. If we could prove that the defendant really did have a memory of not killing the victim, the prosecutor would have to explain why and how the defendant acquired that false memory.
Don't you think there are cases when one should reject the evidence, simply on the basis of what you believe, not on the grounds of stronger evidence?
First, keep in mind that what I believe is evidence. My beliefs are not always veridical: the content of a belief is not always true, but that I believe X is indeed a fact, and if the fact of that belief is relevant to a theory, the theory must account for the fact.
But, in general, no, never. There is never any ground to reject evidence, to say that some theory might be true even if it entails a statement that contradicts the facts in evidence.
After all, there are cases of people being sent to prison for murder, who were in fact innocent, and not becuase the court failed in it's weighing up of the evidence.
That's simply not the case: every innocent person sent to prison happened because the court did indeed fail to weigh up the evidence. Because courts make decisions in finite time, we know these failures can and will occur. Indeed the only way we ever know that an innocent person has been falsely convicted is because more evidence compels a different conclusion.
But again: all of this is beside the point. Presumably you assert that you know a god exists. Even if evidentiary, scientific epistemology were found not relevent to knowledge about god(s) — even if science were found totally unreliable — that wouldn't help your case one bit.
You either are or are not making a truth claim about reality. If you're not making a truth claim about reality, then we have nothing to discuss. If you are making a truth claim about reality, you must show us a method that consistently validates truth claims and that I can employ using the information available to me to validate your specific claim.
Simply saying that people's beliefs are generally reliable, people believe in God, therefore we have sufficient epistemic basis to believe in God is insufficient. Simply because my beliefs are just as a priori reliable as yours and I do not believe any God exists. You must show why my beliefs are unreliable and your reliable.
Science decisively breaks the symmetry in my favor. If you reject science, you must show me an alternative method that breaks the symmetry in your favor. (And simple popularity will not do; there have been too many circumstances where the majority has been found to be mistaken.)
On the other hand, you seem to think that knowledge is in fact very rare. This is an unusual and uncommon view. You seem to think that knowledge is true belief that is justified by science. The best that prescientific societies could hope for was simply true belief.
Yes. Knowledge is rare, and the best that prescientific societies could manage was simple true belief. Evolution accounts for the fact that prescientific societies did in fact have many true beliefs even lacking a rigorous epistemic method.
|
# frozen_string_literal: true
require "spec_helper"
require "decidim/api/test/type_context"
require "decidim/core/test/shared_examples/traceable_interface_examples"
require "decidim/core/test/shared_examples/scopable_interface_examples"
module Decidim
module Budgets
describe BudgetType, type: :graphql do
include_context "with a graphql type"
let(:model) { create(:budget) }
include_examples "scopable interface"
it_behaves_like "traceable interface" do
let(:author) { create(:user, :admin, organization: model.component.organization) }
end
describe "id" do
let(:query) { "{ id }" }
it "returns all the required fields" do
expect(response).to include("id" => model.id.to_s)
end
end
describe "title" do
let(:query) { '{ title { translation(locale: "en")}}' }
it "returns all the required fields" do
expect(response["title"]["translation"]).to eq(model.title["en"])
end
end
describe "description" do
let(:query) { '{ description { translation(locale: "en")}}' }
it "returns all the required fields" do
expect(response["description"]["translation"]).to eq(model.description["en"])
end
end
describe "total_budget" do
let(:query) { "{ total_budget }" }
it "returns the total budget" do
expect(response["total_budget"]).to eq(model.total_budget)
end
end
describe "projects" do
let!(:budget2) { create(:budget) }
let(:query) { "{ projects { id } }" }
it "returns the budget projects" do
ids = response["projects"].map { |project| project["id"] }
expect(ids).to include(*model.projects.map(&:id).map(&:to_s))
expect(ids).not_to include(*budget2.projects.map(&:id).map(&:to_s))
end
end
end
end
end
|
Pages
Monday, September 14, 2015
DAWN RICHARD SPEAKS ON BEING COMPARED TO BRANDY
Singer/songwriter Dawn Richard has fallen victim to some opinions that many are trying understand where exactly they are coming from. Recently black people have been comparing her vocal styling to r&b songstress Brandy, but why? We can all agree that her former Danity Kane sound is a sure thing of the past when compared to her solo material, but will agree that she & Brandy's sound is completely different.
Read more below.
In a interview with British journalist Sope Soetan she had the following to say about the comparisons.
"I grew up loving Imogen Heap and Bjork. And one of my favourite female voices to this day is Alanis Morissette. Those voices really did something for me, growing up to me they sounded like cognac and cigar smoke, they had these cool tones that worked well with rock and alternative music. As far as what I do organically, I just go in and whatever feels good, feels good I don’t force it. Leads and adlibs are cool but my favourite thing to do when I’m in the studio is backgrounds. I can go on and on for days, there’s this sense of peace and chanting. Like an army of bad motherfuckers always behind me, like a 1000 people in believing me and 1000 people behind me every time doing these counter chants which are so African, so Creole and so New Orleans."
While all opinions are simply just that some things are just laughable. Both Dawn & Brandy have very unique sounds & talents that can't be replaced, but to say they are similar artists would be something that just isn't true in any form.
|
Prayer Rope
Use of a 100-knot prayer rope, also known as the kombasini or chotki, is the classic 'tool' used to prayer the Jesus Prayer. This rope is imported from Romanian handmade by Orthodox Christians.
|
Basic Egg White Salad Recipe – 2 Smart Points
When trying to eat a high protein/low fat diet, it’s no secret that egg whites can play a huge a role in your eating plan. I always keep a big bowl of prepared, hardboiled eggs stashed in my refrigerator for quick and easy access. Eating the yellow part of the egg does provide a lot of nutrients, healthy fats, and cholesterol, but when I want to keep my Smart Points low, I stick to just the whites. One of my favorite ways to enjoy them is in this Basic Egg White Salad Recipe. It has all the beloved flavors of a traditional egg salad, but with a lot less fat, sugar and calories. At just 2 Smart Points per serving, this egg white salad goes great on a sandwich, on top of a salad, or straight out of the bowl! You can’t go wrong with this reliable recipe.
|
The invention relates generally to lock assemblies, and more particularly to lock assemblies having an operating member recessed within the lock core.
Typically, a lock comprises a lock member, such as a latch for example, an operating member such as a handle, which is operable to release the latch, and an operating mechanism for connecting the operating member to the latch. The operating mechanism is generally enabled by the presentation of a suitable key to the lock. Without the key, the operating member cannot be operated to release the latch. In some locks, the key itself is the operating member.
Some more modern locks have replaced the conventional metal key with a card having a magnetic strip bearing an access code. The lock is provided with a card reading device which is associated with the lock operating mechanism. Typically, the lock operating mechanism includes an electromechanical device which receives electrical signals from the card reader, and whether or not the operating mechanism is enabled depends on whether or not the electromechanical device is energized.
Numerous problems exist with conventional mechanical and/or electrical locking systems. Firstly, mechanical keys for the most part can be easily copied and distributed to unauthorized users. Also, if the key is ever lost or stolen, the entire lock cylinder may need replacing in order to assure that an unauthorized user does not gain access. When the door lock system is placed on the outside of the door, the lock may be tampered with or subject to vandalism. In addition, it can also be difficult to provide electronic lock hardware that mechanically interacts with existing door locks, and it can be especially difficult to provide electronic lock hardware that can be retrofitted into installed or mounted conventional door locks.
|
# AVAILABLE NOW: [Front-End Developer Handbook 2017](https://frontendmasters.com/books/front-end-handbook/2017/)
***
## Learn Internet/Web
> The Internet is a global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks for file sharing.
><cite>— [Wikipedia](https://en.wikipedia.org/wiki/Internet)</cite>
* [How Does the Internet work](http://www.w3.org/wiki/How_does_the_Internet_work) - W3C [read]
* [How Does the Internet Work?](http://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm) - Stanford Paper [read]
* [How the Internet Works](https://www.khanacademy.org/partner-content/code-org/internet-works) [watch]
* [How the Internet Works in 5 Minutes](https://www.youtube.com/watch?v=7_LPdttKXPc) [watch]
* [How the Web Works](https://www.eventedmind.com/classes/how-the-web-works-7f40254c) [watch][$]
* [What Is the Internet? Or, "You Say Tomato, I Say TCP/IP"](http://www.20thingsilearned.com/en-US/what-is-the-internet/1) [read]
|
The Obamas Take A Private Jet From Bali To Java As The Former First Family Continue Eventful Five-Day Trip In Indonesia Where Barack Grew Up With A Spot Of Sightseeing
Former President Barack Obama and his family wrapped up their five-day vacation on Indonesia's resort island of Bali and headed to the historic city of Yogyakarta on Wednesday during a nostalgic trip to the country where Obama lived for several years as a child.
Obama, his wife Michelle and daughters Malia and Sasha drove to a luxury hotel in downtown Yogyakarta after arriving on a private jet at the city's military airport, said Indonesian air force base commander Air Vice Marshal Novyan Samyoga.
The family then went to visit the ninth-century Borobudur Temple in Magelang on Wednesday where they were seen snapping photos.
Samyoga was among local officials who greeted the Obamas at the tarmac.
He said the family looked relaxed and was smiling in response to onlookers who greeted them with cheers.
--
Gwokto La'Kitgum
----------------------------------------------------------------
"Even a small dog can piss on a tall building" Jim Hightower
-- Disclaimer:Everyone posting to this Forum bears the sole responsibility for any legal consequences of his or her postings, and hence statements and facts must be presented responsibly. Your continued membership signifies that you agree to this disclaimer and pledge to abide by our Rules and Guidelines.To unsubscribe from this group, send email to: ugandans-at-heart+unsubscribe@googlegroups.com
|
Confluence Tower Summer EventsConfluence Tower Hours or Operation:Open by appointment only from October 16th, 2017 through April 2018Call (618) 251-2680 to schedule an appointment.
HELP WANTED:HELP WANTED!The Village of Hartford is accepting applications from Hartford, Wood River, Roxana, & South Roxana forWeekend Water Plant Operator, Part-time Confluence Tower Personnel and Summer "Splash Park" Personnel. Applications may be picked up at Hartford Village Hall.
|
Can You Grasp The Sparrow’s Tail?
When tai chi chuan students learn and practice “Grasp the Sparrow’s Tail” (also called “Grasp Bird’s Tail”), they learn that the four movements are expressions of: ward off (peng), roll back (lu), press (ji) and push (an) (1). The importance of these movements is illustrated by Wong Kiew Kit 2. Wong reports that Yang Lu Chan, the patriarch of Yang-style Tai Chi Chuan, after defeating all the masters he met, earned the title, Yang the Ever Victorious. According to Master Wong, Yang Lu Chan used “Grasp the Sparrow’s Tail” as his principal move.
Master Wong describes the postures as the “four primary Tai Chi Chuan hand movements” (2) (p.56). As students flow through the four movements, Master Wong explains how the force starts at the foot, is controlled by the waist, is expressed at the hands, and is executed from the spine. This delivery of force is executed with “full mindfulness” (p. 56). The four postures are presented below.
Fig. 1: Ward Off
Fig. 2: Roll Back
Fig. 3: Press
Fig. 4: Push
When university students studied the course, “Taoism, Tai Chi and Mindfulness,” their tai chi training focused on experiencing both gentle exercise and moving meditation. Master Wong devotes chapter 21 of his book to Taoism and spirituality (2), whereby he describes tai chi’s relationship with the Tao Te Ching’s verses. In another section, Wong emphasizes the importance of learning the essential principles of qigong (Chapter 6) as a path to receiving the full benefits of tai chi prompted the inclusion of The Eight Pieces of Brocade Qigong in the course (3).
For three mornings each week during the semester, novice tai chi students gathered in the university’s dance studio to learn and practice qigong and tai chi. During the third week of tai chi instruction, (we learned the Yang 24 Forms, also called the Simplified Tai Chi Set) “Grasp the Sparrow’s Tail” was taught (4). Readers familiar with Yang 24 Forms will recall that this form occurs at movements 7 and 8.
Along with their instruction in the studio, students were assigned written reflections on their experiences with qigong and tai chi (see McBrien & Gutierrez) (5). Here is the assignment. The reflection follows.
Assignment: In the Tao Te Ching, Verse 26 states:
The heavy is the root of the light;
The still is the master of unrest.
To be light is to lose one’s root.
To be restless is to lose one’s control.
In tai chi, this passage serves as a warning concerning root and balance and offers a strategy for applying tai chi principles in our life. Preparation for your reflection:
Take time to find your personal quiet space and take a few minutes to warm up using tai chi principles.
Stand in the wu chi posture for about 10 or more slow deep breaths.
Perform “Grasp Sparrow’s Tail” to the left and the right (just as we do performing Yang 24 in class). Move slowly, breathe into the belly and allow yourself to relax completely. Repeat the movements at least four times.
Take a moment or two to stand in wu chi and breathe slowly. Now you are ready to write. Reflect on how the verse from the Tao Te Ching is expressed while performing Grasp Sparrow’s Tail.
Learning Yang 24 with the goal of developing a mindful awareness, students are encouraged to become aware of what is experienced when employing the essential principles. Emphasis on standing in wu chi at the start of each class helps learners move towards mastery of this “keystone” posture. This posture is also emphasized in qigong.
Within the first two weeks of the class, students, on arrival to the studio, were able to quietly stand in wu chi as they waited for class to begin. It was very satisfying to see the students take their place, stand with feet parallel and about shoulder-width apart, slightly bend their knees, tuck in their tail bone, and stand straight with head gently held high. Learning to relax the shoulders down and broaden the back was a challenge for some. Most were taught to stand with a “proud chest.” This was a habit that needed to be changed. Using the imagery of holding an egg in each armpit was helpful.
Below, Natasha’s reflection as she practiced the four postures of “Grasp the Sparrow’s Tail” begins with her experience with the wu chi posture.
When I stand in the wu chi posture and I feel the heaviness of my feet rooted on the floor, I feel more secure with my practice of tai chi. I am able to feel the control of my movements in a heavy manner than when I do not try to position myself correctly in a light way. I have noticed that if I do not place myself correctly and if I do not feel firm, I usually end up losing my balance, which disrupts chi flow. This is not the right “way of energy.” However, when I am positioned to my comfort level and I am firmly grounded, I feel in control of my forms and my forms are able to flow gracefully like they should. Whenever I want to practice any form, I always start in the wu chi position, since it is better to feel much more balanced than if I just go straight to the form.
Learning and practicing “Grasp the Sparrow’s Tail” has several challenges. Maintaining the “bow and arrow” stance while moving through the four hand postures seemed daunting for some students. We learn how the reading of Verse 26 helps Natasha overcome this challenge in her practice.
So, when I want to do “Grasp Sparrow’s Tail” and I want to feel my feet rooted, sometimes I have to shift around until I feel the right spot. As I perform “Grasp Sparrow’s Tail,” my rooted posture allows me to gain confidence and do the movements to my liking. Though my left side is fine, I feel that my right side still needs more practice, but if I stay rooted and focused, I should be able to perform the right side just as well as my left side in good time.
As we read the reflection, we appreciate how Natasha understands that the Tao Te Ching brings a deeper understanding to her experience as she does tai chi.
When Verse 26 states that “[t]he heavy is the root…; [and] to be light is to lose one’s root”, this definitely applies to my learning of tai chi because when I am rooted, I do not lose my control. When I have control, I am able to be “the master of unrest”, which makes me feel more accomplished about my practice of tai chi.
Students’ reflective essays indicate that a mindful awareness of correct alignment, diaphragmatic breathing, and an inner feeling of harmony is experienced. This sense of harmony is one of the benefits of practicing “Grasp the Sparrow’s Tail.” Striving to be in harmony with nature is a key goal to achieving a Taoist or Tai Chi frame of mind. When their tai chi experiences generate feelings of harmony, students go beyond reading and talking about discovering the way of energy. They experience feelings of harmony and are newly aware of mastering the unrest as they discover how to “Grasp the Sparrow’s Tail.”
Dr. Bob McBrien is a Professor Emeritus of Education and was the instructor of the tai chi section of the course: Tao, Tai Chi and Mindfulness taught during the Fall semester of 2011 at Salisbury University in Salisbury, Maryland. Dr McBrien has been teaching Tai Chi for Health classes and has studied Qigong, Sun and Yang tai chi styles as well as the 32 Sword Form
Natasha Shangold graduates from Salisbury University in May 2014 with a B.A. in Environmental Studies and minors in Religious Studies and Biology. She would like to work in Environmental Education. Though she has always appreciated keeping her qi in balance, this course was her first experience with tai chi and qigong.
Like us on Facebook
Follow us on Twitter
Disclaimer:
Information on Yang-Sheng.com is for educational purpose only. The opinions expressed are those of the authors and do not necessarily reflect the views of the publisher or editors. In addition, the information is not intended nor implied to provide any medical advice.
|
Chadbourne hails 'toughest' MTB XC title
Ridebike.co.uk rider Mark Chadbourne has spoken of his delight after securing his ‘toughest' National MTB XC Championship win.
Chadbourne was crowned British champion in the veterans' category for riders aged 45 to 49, while teammate Simon Willlats finishing runner up in the 40 to 44 age group. Chadbourne said his sixth title had been the toughest yet with an early crash and a mechanical incident forcing him to deliver a determined solo effort in heavy conditions.
"I was pleased. I led the start but Paul Hopkins took off on the first climb and I thought, ‘I'm not sure I can live with that little surge!' Simon set off after Paul on the next climb and was obviously on a mission," Chadbourne said.
"There was a group of us following through a wooded area, but I made a mistake on a rooty section and Lewis [King] rode in to me and over my bike. When I came out on to the single track section someone said my quick release mechanism was undone. It only took a couple of seconds but the two riders ahead of me had pulled out a gap of about 20 or 30 metres," he added.
Heavy rain had turned trails to quagmire, creating conditions in which Chadbourne usually excels. But he admitted finding the treacherous course surprisingly difficult and dug deep to produce a gold medal winning performance.
"The whole way round was painful. There was no relaxing. It was the toughest of all my national championships. It was just very hard work. It was just a case of grit your teeth, remember why you're there, and get on with it," he said.
Chadbourne praised teammate, Simon Willats, who produced a superb performance to finish a close second to national veterans' champion Paul Hopkins (Merida). Willats, who had returned to England from his home in Perth, Australia, to compete in the championships, said he was delighted with his performance.
He said: "It's the best I've done. I was third last year and third the year before. I just didn't want third again so I'm happy to have got silver! It was a good result. I felt I was actually racing. The climbs on the first half of the circuit were really tough and the second half was into the wind, which made it feel like a climb!"
Rain-soaked conditions had lowered Willats' expectations but he delivered his best performance in weather far removed from the sun-soaked Australian climate in which he had prepared.
"I'm normally a fast and furious, hot, sunny, dusty kind of a rider. But it was just one of those days when everything went right. The bike didn't clog with mud, and the tyres were great. I ran 2.1" Rockin' Rons and let them down as much as I could," he said.
Willats vowed to return from Australia for next year's national championships, where he hopes to finish one place higher and mount the top step of the podium. Ride owner Ritchie Hilton-Foster praised the efforts of all the riders supported by the shop.
"We support the guys to give something back to the sport we love, so results like this are an added bonus. We know Mark and Simon are quick - we've all suffered trying to keep up with them - so it's nice to see their dedication rewarded on the national stage," he said.
|
/*
* Copyright (C) 2015 Karumi.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.byl.qrobot.menu;
import android.view.View;
/**
* Interface used to notify click events performed in ExpandableItems inside an ExpandableSelector
* widget.
*/
public interface OnExpandableItemClickListener {
void onExpandableItemClickListener(int index, View view);
}
|
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT license.
#include "pch.h"
#include "XamlUiaTextRange.h"
#include "../types/TermControlUiaTextRange.hpp"
#include <UIAutomationClient.h>
// the same as COR_E_NOTSUPPORTED
// we don't want to import the CLR headers to get it
#define XAML_E_NOT_SUPPORTED 0x80131515L
namespace UIA
{
using ::ITextRangeProvider;
using ::SupportedTextSelection;
using ::TextPatternRangeEndpoint;
using ::TextUnit;
}
namespace XamlAutomation
{
using winrt::Windows::UI::Xaml::Automation::SupportedTextSelection;
using winrt::Windows::UI::Xaml::Automation::Provider::IRawElementProviderSimple;
using winrt::Windows::UI::Xaml::Automation::Provider::ITextRangeProvider;
using winrt::Windows::UI::Xaml::Automation::Text::TextPatternRangeEndpoint;
using winrt::Windows::UI::Xaml::Automation::Text::TextUnit;
}
namespace winrt::Microsoft::Terminal::TerminalControl::implementation
{
XamlAutomation::ITextRangeProvider XamlUiaTextRange::Clone() const
{
UIA::ITextRangeProvider* pReturn;
THROW_IF_FAILED(_uiaProvider->Clone(&pReturn));
auto xutr = winrt::make_self<XamlUiaTextRange>(pReturn, _parentProvider);
return xutr.as<XamlAutomation::ITextRangeProvider>();
}
bool XamlUiaTextRange::Compare(XamlAutomation::ITextRangeProvider pRange) const
{
auto self = winrt::get_self<XamlUiaTextRange>(pRange);
BOOL returnVal;
THROW_IF_FAILED(_uiaProvider->Compare(self->_uiaProvider.get(), &returnVal));
return returnVal;
}
int32_t XamlUiaTextRange::CompareEndpoints(XamlAutomation::TextPatternRangeEndpoint endpoint,
XamlAutomation::ITextRangeProvider pTargetRange,
XamlAutomation::TextPatternRangeEndpoint targetEndpoint)
{
auto self = winrt::get_self<XamlUiaTextRange>(pTargetRange);
int32_t returnVal;
THROW_IF_FAILED(_uiaProvider->CompareEndpoints(static_cast<UIA::TextPatternRangeEndpoint>(endpoint),
self->_uiaProvider.get(),
static_cast<UIA::TextPatternRangeEndpoint>(targetEndpoint),
&returnVal));
return returnVal;
}
void XamlUiaTextRange::ExpandToEnclosingUnit(XamlAutomation::TextUnit unit) const
{
THROW_IF_FAILED(_uiaProvider->ExpandToEnclosingUnit(static_cast<UIA::TextUnit>(unit)));
}
XamlAutomation::ITextRangeProvider XamlUiaTextRange::FindAttribute(int32_t /*textAttributeId*/,
winrt::Windows::Foundation::IInspectable /*val*/,
bool /*searchBackward*/)
{
// TODO GitHub #2161: potential accessibility improvement
// we don't support this currently
throw winrt::hresult_not_implemented();
}
XamlAutomation::ITextRangeProvider XamlUiaTextRange::FindText(winrt::hstring text,
bool searchBackward,
bool ignoreCase)
{
UIA::ITextRangeProvider* pReturn;
const auto queryText = wil::make_bstr(text.c_str());
THROW_IF_FAILED(_uiaProvider->FindText(queryText.get(), searchBackward, ignoreCase, &pReturn));
auto xutr = winrt::make_self<XamlUiaTextRange>(pReturn, _parentProvider);
return *xutr;
}
winrt::Windows::Foundation::IInspectable XamlUiaTextRange::GetAttributeValue(int32_t textAttributeId) const
{
// Copied functionality from Types::UiaTextRange.cpp
if (textAttributeId == UIA_IsReadOnlyAttributeId)
{
return winrt::box_value(false);
}
else
{
// We _need_ to return XAML_E_NOT_SUPPORTED here.
// Returning nullptr is an improper implementation of it being unsupported.
// UIA Clients rely on this HRESULT to signify that the requested attribute is undefined.
// Anything else will result in the UIA Client refusing to read when navigating by word
// Magically, this doesn't affect other forms of navigation...
winrt::throw_hresult(XAML_E_NOT_SUPPORTED);
}
}
void XamlUiaTextRange::GetBoundingRectangles(com_array<double>& returnValue) const
{
returnValue = {};
try
{
SAFEARRAY* pReturnVal;
THROW_IF_FAILED(_uiaProvider->GetBoundingRectangles(&pReturnVal));
double* pVals;
THROW_IF_FAILED(SafeArrayAccessData(pReturnVal, (void**)&pVals));
long lBound, uBound;
THROW_IF_FAILED(SafeArrayGetLBound(pReturnVal, 1, &lBound));
THROW_IF_FAILED(SafeArrayGetUBound(pReturnVal, 1, &uBound));
long count = uBound - lBound + 1;
std::vector<double> vec;
vec.reserve(count);
for (int i = 0; i < count; i++)
{
double element = pVals[i];
vec.push_back(element);
}
winrt::com_array<double> result{ vec };
returnValue = std::move(result);
}
catch (...)
{
}
}
XamlAutomation::IRawElementProviderSimple XamlUiaTextRange::GetEnclosingElement()
{
return _parentProvider;
}
winrt::hstring XamlUiaTextRange::GetText(int32_t maxLength) const
{
BSTR returnVal;
THROW_IF_FAILED(_uiaProvider->GetText(maxLength, &returnVal));
return winrt::to_hstring(returnVal);
}
int32_t XamlUiaTextRange::Move(XamlAutomation::TextUnit unit,
int32_t count)
{
int returnVal;
THROW_IF_FAILED(_uiaProvider->Move(static_cast<UIA::TextUnit>(unit),
count,
&returnVal));
return returnVal;
}
int32_t XamlUiaTextRange::MoveEndpointByUnit(XamlAutomation::TextPatternRangeEndpoint endpoint,
XamlAutomation::TextUnit unit,
int32_t count) const
{
int returnVal;
THROW_IF_FAILED(_uiaProvider->MoveEndpointByUnit(static_cast<UIA::TextPatternRangeEndpoint>(endpoint),
static_cast<UIA::TextUnit>(unit),
count,
&returnVal));
return returnVal;
}
void XamlUiaTextRange::MoveEndpointByRange(XamlAutomation::TextPatternRangeEndpoint endpoint,
XamlAutomation::ITextRangeProvider pTargetRange,
XamlAutomation::TextPatternRangeEndpoint targetEndpoint) const
{
auto self = winrt::get_self<XamlUiaTextRange>(pTargetRange);
THROW_IF_FAILED(_uiaProvider->MoveEndpointByRange(static_cast<UIA::TextPatternRangeEndpoint>(endpoint),
/*pTargetRange*/ self->_uiaProvider.get(),
static_cast<UIA::TextPatternRangeEndpoint>(targetEndpoint)));
}
void XamlUiaTextRange::Select() const
{
THROW_IF_FAILED(_uiaProvider->Select());
}
void XamlUiaTextRange::AddToSelection() const
{
// we don't support this
throw winrt::hresult_not_implemented();
}
void XamlUiaTextRange::RemoveFromSelection() const
{
// we don't support this
throw winrt::hresult_not_implemented();
}
void XamlUiaTextRange::ScrollIntoView(bool alignToTop) const
{
THROW_IF_FAILED(_uiaProvider->ScrollIntoView(alignToTop));
}
winrt::com_array<XamlAutomation::IRawElementProviderSimple> XamlUiaTextRange::GetChildren() const
{
// we don't have any children
return {};
}
}
|
My mom often lost track of her reading glasses. The moment I ran into EyeGlassHolders.com, I knew I finally found a perfect gift for her! A beaded eyeglass leash or necklace would provide a stylish solution to this common problem. Some of you may still remember my review and giveaway of BooJeeBeads ID necklace. EyeGlassHolders.com is the sister site of BooJeeBeads.com. Founded by the same brilliant women entrepreneurs, the store is also dedicated to uniting fashion with function. Their beautiful eyeglass holders speak for themselves.
I received this colorful Kaleidoscope EyeGlass Leash for review. Both mom and I are deeply impressed with its fabulous design and high quality beads. It's easy to attach to her glasses and goes well with any outfit. And most important of all, it keeps mom's glasses within easy reach! There are no more instances of scouring the house gingerly for a pair of glasses.
These stunning leashes and necklaces have a starting price as low as $12! In addition, EyeGlassHolders.com also carries a number of cute EyeGlass Pins and EyeGlass Cases. It's definitely a great place to look for the most fashionable eyeglass accessories.
The Giveaway
EyeGlassHolders has generously offered to give one of my lucky readers an EyeGlass Leash or Necklace of her choice, valued up to $30!
Required Entry: Visit EyeGlassHolders.com, and leave a comment telling me your favorite product from the site. (Please leave a valid email address in your comment or make sure one is visible in your blogger profile).
Blog about this giveaway and link back to EyeGlassHolders.com and Me, and leave the link in your comment (1 extra entry for mentioning this giveaway on your blog; 3 extra entries for a separate blog post).
Giveaway ends at 11:59 Central Time on 10/10/09Open to U.S. & Canadian Residents.Winner will be chosen using random.org and will have 72 hours to respond before a new winner is chosen.Thanks for entering and good luck!
I have readers stashed everywhere and still have a hard time finding a pair when I need them! I haven't had much luck with the leashes, but the necklace idea looks great! I like the Copper Freshwater Pearls EyeGlass Necklace!
Ah yes, this is EXACTLY what I need!! I'm forever putting on and taking off my reading glasses and then forgetting where I laid them. The Amethyst and Silver Necklace is stunning!! I'd love to win that.
|
IN THE SUPREME COURT OF TEXAS
══════════
No. 19-0260
══════════
IN RE COMMITMENT OF GREGORY A. JONES
══════════════════════════════════════════
ON PETITION FOR REVIEW FROM THE
COURT OF APPEALS FOR THE SECOND DISTRICT OF TEXAS
══════════════════════════════════════════
PER CURIAM
A civil-commitment trial conducted under chapter 841 of the Texas Health and Safety Code
is generally governed by the Texas Rules of Civil Procedure, which provide that a verdict may be
rendered by the agreement of ten members of a jury of twelve. However, by statute, a civil-
commitment verdict finding that the defendant is a sexually violent predator must be unanimous.
We are asked to decide whether a final verdict for the defendant declining to find that the defendant
is a sexually violent predator must likewise be unanimous. 1 In the event that agreement of ten out
of twelve jurors is sufficient to reach such a verdict, we must determine whether the trial court’s
error in instructing the jury that unanimity was required was harmful in this case. The court of
appeals held that the trial court committed harmful error when it declined to submit an instruction
explaining that a verdict for the defendant required only ten votes and accordingly reversed the
1
By “final verdict for the defendant declining to find that the defendant is a sexually violent predator,” we
mean that the jury answers “no” to the charge question asking whether the jury finds that the defendant is a sexually
violent predator. In the event an insufficient number of jurors can agree on an answer, e.g., if six answer “yes” and
six answer “no,” the result is a mistrial, not a verdict. See Stevens v. Travelers Ins. Co., 563 S.W.2d 223, 225 (Tex.
1986).
trial court’s judgment and commitment order. Because we agree with the court of appeals that the
trial court erred but disagree that the error was harmful in this case, we reverse the court of appeals’
judgment and reinstate the judgment of the trial court.
Gregory A. Jones was convicted of several attempted sexual-assault offenses in 2001. In
January 2017, just under two years before Jones’s sentence discharge date, the State of Texas
brought a civil suit against Jones to commit him as a sexually violent predator (SVP) under Texas
Health and Safety Code chapter 841. See TEX. HEALTH & SAFETY CODE § 841.003(a), (b)
(providing that a person is a “sexually violent predator” for purposes of chapter 841 if he “is a
repeat sexually violent offender”—i.e., he “is convicted of more than one sexually violent offense
and a sentence is imposed for at least one of the offenses”—and “suffers from a behavioral
abnormality that makes the person likely to engage in a predatory act of sexual violence”). The
case was tried to a jury, and two expert witnesses testified for the State. 2 Jones also testified.
The jury charge asked one question: “Do you find beyond a reasonable doubt that
GREGORY A. JONES is a sexually violent predator?” Jones requested an instruction explaining
that a unanimous verdict was required to answer “yes” to that question, but that only ten out of
twelve votes were required to answer “no.” The trial court declined to submit the requested
instruction. Instead, the trial court instructed the jury that “all 12 of the jurors must agree upon the
answer made and to the verdict” and did not distinguish between “yes” and “no” answers.
During deliberations, the jury requested definitions of terms and portions of the record to
review testimony. After five-and-a-half hours, the jury declared that it was deadlocked, and the
2
In addition to the 2001 convictions, the expert testimony addressed other nonsexual assault convictions that
were not included as predicate offenses in the State’s petition.
2
trial court issued a modified Allen charge urging the jury to continue deliberating. 3 After another
hour and a half of deliberation, the jury returned with a unanimous verdict for the State finding
that Jones was an SVP. The trial court rendered judgment on the verdict and ordered Jones civilly
committed for treatment and supervision in accordance with chapter 841.
Jones appealed, arguing that the evidence was legally and factually insufficient to find him
an SVP and that the trial court committed harmful error when it declined to submit Jones’s 10–2
instruction to the jury.4 The court of appeals held that the evidence was sufficient to support the
jury’s finding but nevertheless reversed the judgment and remanded the case for a new trial,
concluding that the trial court committed harmful error in declining to submit Jones’s instruction.
571 S.W.3d 880, 881 (Tex. App.—Fort Worth 2019). The State petitioned this Court for review.
Texas Health and Safety Code chapter 841 provides that “a civil commitment proceeding
is subject to the rules of procedure and appeal for civil cases” but that, “[t]o the extent of any
conflict between this chapter and the rules of procedure and appeal for civil cases, this chapter
controls.” TEX. HEALTH & SAFETY CODE § 841.146(b). Thus, we must evaluate whether and to
what extent chapter 841’s requirements for commitment verdicts conflict with the relevant
procedural rules.
The pertinent rule of civil procedure for jury verdicts provides, with one exception
discussed below, that “a verdict may be rendered in any cause by the concurrence . . . of the same
3
See Allen v. United States, 164 U.S. 492, 501–02 (1896) (upholding a federal trial court’s charge urging
jurors to continue deliberating and to consider the views of their fellow jurors). Allen charges are permitted in Texas
courts so long as they are not impermissibly coercive. See Stevens, 563 S.W.2d at 228–29.
4
The State, as appellee, did not argue that unanimity is required for a “no” verdict but argued only that the
trial court’s failure to submit a 10–2 instruction was not harmful.
3
ten or more members of an original jury of twelve.” TEX. R. CIV. P. 292(a). Meanwhile,
chapter 841’s provisions governing commitment verdicts provide:
(a) The judge or jury shall determine whether, beyond a reasonable doubt, the
person is a sexually violent predator. Either the state or the person is entitled
to appeal the determination.
(b) A jury determination that the person is a sexually violent predator must be
by unanimous verdict.
TEX. HEALTH & SAFETY CODE § 841.062. Subsection (a) addresses the standard of proof for an
SVP finding, while subsection (b) addresses juror agreement. Under subsection (b), there is no
question that for a jury to find that a person is an SVP, the jury must do so unanimously. Id.
§ 841.062(b). Because subsection (b) conflicts with Texas Rule of Civil Procedure 292(a) in that
regard, subsection (b) controls. See id. §§ 841.062, .146(b); TEX. R. CIV. P. 292(a).
But subsection (b) addresses only the number of votes needed for a “yes” verdict, that is, a
verdict for the State finding “that the person is a sexually violent predator.” TEX. HEALTH &
SAFETY CODE § 841.062(b) (emphasis added). Subsection (b) says nothing about the number of
votes needed for a “no” verdict, that is, a verdict for the defendant declining to find that the
defendant is an SVP. 5 Had the Legislature intended for subsection (b) to apply to both “yes” and
“no” verdicts, it could easily have done so, for example, by requiring unanimity for a
“determination of whether the person is a sexually violent predator.” See Zanchi v. Lane, 408
S.W.3d 373, 380 (Tex. 2013) (noting that if the Legislature had intended the service-of-citation
rule to apply to service of expert reports in a health care liability claim, it “knew how to do so”).
5
We note that a negative answer to a charge question means only that the party bearing the burden of proof
has failed to carry that burden and is not a positive finding of the converse of the question. See Phila. Indem. Ins. Co.
v. White, 490 S.W.3d 468, 488 (Tex. 2016). Similarly, a verdict is simply “a written declaration by a jury of its
decision.” TEX. R. CIV. P. 290. Thus, in a civil-commitment proceeding under chapter 841, a “no” verdict reflects a
jury’s determination that the State failed to prove beyond a reasonable doubt that the defendant is an SVP.
4
The State argues that allowing different numbers of jurors to agree for “yes” and “no”
verdicts in this case would be unprecedented. But the Texas Civil Practice and Remedies Code
provides for just such an asymmetry with respect to awards of exemplary damages. See TEX. CIV.
PRAC. & REM. CODE § 41.003(d)–(e). 6 In line with those provisions, this Court has approved
model jury instructions that include an instruction requiring unanimity for a “yes” verdict as to
malice or gross negligence in order to award exemplary damages but requiring only ten jurors to
agree to reach a “no” verdict. See TEX. R. CIV. P. 226a, Approved Instructions. Thus, an
asymmetry in votes required for a “yes” verdict versus a “no” verdict is nothing new.
The State attempts to distinguish verdicts for exemplary damages by pointing out that the
jury need not be unanimous on the threshold liability finding, but the State is incorrect; the statute
requires a unanimous verdict on both “liability for and the amount of exemplary damages.” TEX.
CIV. PRAC. & REM. CODE § 41.003(d). The State also notes that Texas Rule of Civil Procedure
292 specifically requires unanimity for a “yes” verdict on exemplary damages, arguing that the
Legislature has more explicitly distinguished between unanimous and 10–2 verdicts for exemplary
damages than for civil commitment. See TEX. R. CIV. P. 292(b). But both the exemplary-damages
statute and the civil-commitment statute are silent about 10–2 verdicts, so the inclusion of the
unanimity requirement for a “yes” verdict on exemplary damages in Rule 292 does not answer the
6
Those subsections provide:
(d) Exemplary damages may be awarded only if the jury was unanimous in regard to finding
liability for and the amount of exemplary damages.
(e) In all cases where the issue of exemplary damages is submitted to the jury, the following
instruction shall be included in the charge of the court:
“You are instructed that, in order for you to find exemplary damages, your answer to the
question regarding the amount of such damages must be unanimous.”
TEX. CIV. PRAC. & REM. CODE § 41.003(d)–(e).
5
question of whether a 10–2 “no” verdict is allowed for exemplary damages—never mind civil
commitment.
The State also argues that section 841.062 is ambiguous and therefore presents arguments
based on legislative history, opinions by courts in other states, and public policy. But
section 841.062 is not ambiguous. Furthermore, it is generally in the Legislature’s discretion to
decide when a verdict must be unanimous. The State’s legislative-history and public-policy
arguments are that because the purpose of civilly committing an SVP is to protect the public, any
reading of the statute that makes it more likely that such a person would not be committed is
incorrect. Not only does that argument ignore the text, but it also does not address the pertinent
question, which is how to determine that a person is an SVP in the first place.
In sum, because the plain language of section 841.062(b) applies only to a “yes” verdict,
Texas Rule of Civil Procedure 292(a) applies to a “no” verdict. Thus, a unanimous verdict is
required to find that a defendant is an SVP, but only ten votes are necessary to reach a verdict for
the defendant declining to find that the defendant is an SVP. Consequently, a defendant who
requests that the jury be instructed to that effect is entitled to the submission of such an instruction.
The trial court accordingly erred when it denied Jones’s request.
However, the trial court’s error is reversible only if it was harmful. Texas Rule of Appellate
Procedure 44.1(a) provides:
(a) No judgment may be reversed on appeal on the ground that the trial court
made an error of law unless the court of appeals concludes that the error
complained of:
(1) probably caused the rendition of an improper judgment; or
(2) probably prevented the appellant from properly presenting the case
to the court of appeals.
6
TEX. R. APP. P. 44.1(a). 7 Thus, the rule presents two scenarios in which a trial court’s error could
be harmful: (1) by causing the rendition of an improper judgment; and (2) by preventing the
appellant from properly presenting his appeal. Under either prong, the trial court’s legal error must
have “probably” caused the harm.
It is unclear whether the court of appeals based its conclusion of harm on the trial court’s
rendition of an improper judgment, on Jones’s being prevented from properly presenting his
appeal, or on both. For example, the harm standard that the court of appeals recited—whether “the
appellate court is reasonably certain that the jury was not significantly influenced by issues
erroneously submitted to it”—is taken from an opinion of this Court decided under the prevented-
from-presenting prong. See 571 S.W.3d at 891 (citing Romero v. KPH Consolidation, Inc., 166
S.W.3d 212, 227–28 (Tex. 2005)). But the court of appeals also deemed it significant that the
requested instruction related to a “contested, critical issue,” citing an opinion of this Court decided
under the improper-judgment prong. See id. (citing Transcon. Ins. Co. v. Crump, 330 S.W.3d 211,
225 (Tex. 2010)). The parties are similarly not explicit about which prong they are addressing.
Under the improper-judgment prong, an appellate court must review the entire record to
determine whether the trial court’s error probably caused the rendition of an improper judgment.
Crump, 330 S.W.3d at 225. In the jury-instruction context, that inquiry focuses on what the jury
could be expected to consider and conclude based on the information presented to it, such as the
evidence the trial court admitted and the instructions the trial court submitted. See, e.g., id. at 225–
7
Texas Rule of Appellate Procedure 61.1 provides a substantially identical rule for review by this Court. See
TEX. R. APP. P. 61.1.
7
27; Columbia Rio Grande Healthcare, L.P. v. Hawley, 284 S.W.3d 851, 862 (Tex. 2009); Shupe
v. Lingafelter, 192 S.W.3d 577, 579–80 (Tex. 2006).
The prevented-from-presenting prong, on the other hand, generally applies when
something prevents an appellate court from evaluating harm under the improper-judgment prong.
For example, when a trial court submits both valid and invalid theories of liability in a single broad-
form jury question, it is impossible to determine whether the jury based its verdict on the valid
theory or the invalid one. See Crown Life Ins. Co. v. Casteel, 22 S.W.3d 378, 381 (Tex. 2000).
The trial court’s error in that circumstance is harmful because an appellate court cannot determine
from the record whether the error probably caused the rendition of an improper judgment. See
Columbia, 284 S.W.3d at 865. Thus, the proper inquiry under the prevented-from-presenting
prong is whether the appellate court can review the record to determine whether the trial court’s
error probably caused the rendition of an improper judgment. See id. at 864–65. If the trial court’s
error prevents the appellate court from doing so, the error is harmful unless, at least in the jury-
instruction context, the appellate court is “reasonably certain that the jury was not significantly
influenced by” the error. Romero, 166 S.W.3d at 227–28 (quotation omitted).
In this case, the prevented-from-presenting prong does not apply because the record
contains evidence enabling us to determine that the trial court’s failure to submit a 10–2 instruction
did not probably cause the rendition of an improper judgment. Namely, the jury’s unanimous
verdict finding that Jones is an SVP shows that the trial court’s error did not affect the jury’s
verdict.
We have explained that a juror should vote based on her “deliberate judgment, sound
reflection, and conscientious convictions.” Kindy v. Willingham, 209 S.W.2d 585, 587 (Tex.
8
1948). If a party suspects that the jury did not reach its verdict in that manner, the party may
challenge the verdict on the basis that the verdict was the result of “chance or lot” or that the court’s
charge, including an Allen charge, was impermissibly coercive. See id.; Stevens v. Travelers Ins.
Co., 563 S.W.2d 223, 228–29 (Tex. 1978). But Jones does not challenge the jury’s method of
deliberation or the court’s modified Allen charge. Thus, we must presume that the jurors voted the
way they did because they were conscientiously convinced of the result they reached. The jury’s
unanimous finding that Jones is an SVP means that each member of the jury was convinced—
based on the evidence presented, the charge assigned, and the instructions given—that Jones is an
SVP. Because the members of the jury all came to that conclusion, an instruction explaining that
a vote of ten of the jurors was sufficient for a verdict declining to find that Jones is an SVP would
not have changed the outcome of this case.
Jones argues that the length of time the jury spent deliberating indicates that the jurors were
divided or undecided on the question submitted to them. That may be so. But because the jury
ultimately voted unanimously for a “yes” verdict and Jones does not challenge the jury’s method
of deliberation or the court’s modified Allen charge, we must presume that the jurors voted the
way they did because it was their conscientious conviction. If the jurors had been unable to agree,
the trial court could have declared a mistrial. See Fleet v. Fleet, 711 S.W.2d 1, 2–3 (Tex. 1986).
But all twelve jurors ultimately voted “yes,” and Jones has provided us no basis on which to
second-guess their deliberation process.
Because it is apparent from the face of the record that the trial court’s failure to submit the
requested 10–2 instruction did not probably cause the rendition of an improper judgment, the trial
court’s legal error was harmless, and the court of appeals erred in reversing and remanding for a
9
new trial. Accordingly, without hearing oral argument, we reverse the court of appeals’ judgment
and reinstate the judgment of the trial court. TEX. R. APP. P. 59.1.
OPINION DELIVERED: April 24, 2020
10
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# This is a Pester test suite to validate the Format-Hex cmdlet in the Microsoft.PowerShell.Utility module.
<#
Purpose:
Verify Format-Hex displays the Hexadecimal value for the input data.
Action:
Run Format-Hex.
Expected Result:
Hexadecimal equivalent of the input data is displayed.
#>
Describe "FormatHex" -tags "CI" {
BeforeAll {
$newline = [Environment]::Newline
Setup -d FormatHexDataDir
$inputFile1 = New-Item -Path "$TestDrive/SourceFile-1.txt"
$inputText1 = 'Hello World'
Set-Content -LiteralPath $inputFile1.FullName -Value $inputText1 -NoNewline
$inputFile2 = New-Item -Path "$TestDrive/SourceFile-2.txt"
$inputText2 = 'More text'
Set-Content -LiteralPath $inputFile2.FullName -Value $inputText2 -NoNewline
$inputFile3 = New-Item -Path "$TestDrive/SourceFile literal [3].txt"
$inputText3 = 'Literal path'
Set-Content -LiteralPath $inputFile3.FullName -Value $inputText3 -NoNewline
$inputFile4 = New-Item -Path "$TestDrive/SourceFile-4.txt"
$inputText4 = 'Now is the winter of our discontent'
Set-Content -LiteralPath $inputFile4.FullName -Value $inputText4 -NoNewline
$certificateProvider = Get-ChildItem Cert:\CurrentUser\My\ -ErrorAction SilentlyContinue
$thumbprint = $null
$certProviderAvailable = $false
if ($certificateProvider.Count -gt 0) {
$thumbprint = $certificateProvider[0].Thumbprint
$certProviderAvailable = $true
}
$skipTest = ([System.Management.Automation.Platform]::IsLinux -or [System.Management.Automation.Platform]::IsMacOS -or (-not $certProviderAvailable))
}
Context "InputObject Paramater" {
BeforeAll {
enum TestEnum {
TestOne = 1; TestTwo = 2; TestThree = 3; TestFour = 4
}
Add-Type -TypeDefinition @'
public enum TestSByteEnum : sbyte {
One = -1,
Two = -2,
Three = -3,
Four = -4
}
'@
}
$testCases = @(
@{
Name = "Can process bool type 'fhx -InputObject `$true'"
InputObject = $true
Count = 1
ExpectedResult = "00000000 01 00 00 00"
}
@{
Name = "Can process byte type 'fhx -InputObject [byte]5'"
InputObject = [byte]5
Count = 1
ExpectedResult = "00000000 05"
}
@{
Name = "Can process byte[] type 'fhx -InputObject [byte[]](1,2,3,4,5)'"
InputObject = [byte[]](1, 2, 3, 4, 5)
Count = 1
ExpectedResult = "00000000 01 02 03 04 05 ....."
}
@{
Name = "Can process int type 'fhx -InputObject 7'"
InputObject = 7
Count = 1
ExpectedResult = "00000000 07 00 00 00 ...."
}
@{
Name = "Can process int[] type 'fhx -InputObject [int[]](5,6,7,8)'"
InputObject = [int[]](5, 6, 7, 8)
Count = 1
ExpectedResult = "00000000 05 00 00 00 06 00 00 00 07 00 00 00 08 00 00 00 ................"
}
@{
Name = "Can process int32 type 'fhx -InputObject [int32]2032'"
InputObject = [int32]2032
Count = 1
ExpectedResult = "00000000 F0 07 00 00 ð..."
}
@{
Name = "Can process int32[] type 'fhx -InputObject [int32[]](2032, 2033, 2034)'"
InputObject = [int32[]](2032, 2033, 2034)
Count = 1
ExpectedResult = "0000000000000000 F0 07 00 00 F1 07 00 00 F2 07 00 00 ð...ñ...ò..."
}
@{
Name = "Can process Int64 type 'fhx -InputObject [Int64]9223372036854775807'"
InputObject = [Int64]9223372036854775807
Count = 1
ExpectedResult = "0000000000000000 FF FF FF FF FF FF FF 7F ÿÿÿÿÿÿÿ�"
}
@{
Name = "Can process Int64[] type 'fhx -InputObject [Int64[]](9223372036852,9223372036853)'"
InputObject = [Int64[]](9223372036852, 9223372036853)
Count = 1
ExpectedResult = "0000000000000000 F4 5A D0 7B 63 08 00 00 F5 5A D0 7B 63 08 00 00 ôZÐ{c...õZÐ{c..."
}
@{
Name = "Can process string type 'fhx -InputObject hello world'"
InputObject = "hello world"
Count = 1
ExpectedResult = "0000000000000000 68 65 6C 6C 6F 20 77 6F 72 6C 64 hello world"
}
@{
Name = "Can process PS-native enum array '[TestEnum[]]('TestOne', 'TestTwo', 'TestThree', 'TestFour') | fhx'"
InputObject = [TestEnum[]]('TestOne', 'TestTwo', 'TestThree', 'TestFour')
Count = 1
ExpectedResult = "0000000000000000 01 00 00 00 02 00 00 00 03 00 00 00 04 00 00 00 ................"
}
@{
Name = "Can process C#-native sbyte enum array '[TestSByteEnum[]]('One', 'Two', 'Three', 'Four') | fhx'"
InputObject = [TestSByteEnum[]]('One', 'Two', 'Three', 'Four')
Count = 1
ExpectedResult = "0000000000000000 FF FE FD FC .þýü"
}
)
It "<Name>" -TestCase $testCases {
param ($Name, $InputObject, $Count, $ExpectedResult)
$result = Format-Hex -InputObject $InputObject
$result.count | Should -Be $Count
$result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$result.ToString() | Should -MatchExactly $ExpectedResult
}
}
Context "InputObject From Pipeline" {
BeforeAll {
enum TestEnum {
TestOne = 1; TestTwo = 2; TestThree = 3; TestFour = 4
}
Add-Type -TypeDefinition @'
public enum TestSByteEnum : sbyte {
One = -1,
Two = -2,
Three = -3,
Four = -4
}
'@
}
$testCases = @(
@{
Name = "Can process bool type '`$true | fhx'"
InputObject = $true
Count = 1
ExpectedResult = "0000000000000000 01"
}
@{
Name = "Can process byte type '[byte]5 | fhx'"
InputObject = [byte]5
Count = 1
ExpectedResult = "0000000000000000 05"
}
@{
Name = "Can process byte[] type '[byte[]](1,2) | fhx'"
InputObject = [byte[]](1, 2)
Count = 1
ExpectedResult = "0000000000000000 01 02 ��"
}
@{
Name = "Can process int type '7 | fhx'"
InputObject = 7
Count = 1
ExpectedResult = "0000000000000000 07 00 00 00 � "
}
@{
Name = "Can process int[] type '[int[]](5,6) | fhx'"
InputObject = [int[]](5, 6)
Count = 1
ExpectedResult = "0000000000000000 05 00 00 00 06 00 00 00 � � "
}
@{
Name = "Can process int32 type '[int32]2032 | fhx'"
InputObject = [int32]2032
Count = 1
ExpectedResult = "0000000000000000 F0 07 00 00 ð� "
}
@{
Name = "Can process int32[] type '[int32[]](2032, 2033) | fhx'"
InputObject = [int32[]](2032, 2033)
Count = 1
ExpectedResult = "0000000000000000 F0 07 00 00 F1 07 00 00 ð� ñ� "
}
@{
Name = "Can process Int64 type '[Int64]9223372036854775807 | fhx'"
InputObject = [Int64]9223372036854775807
Count = 1
ExpectedResult = "0000000000000000 FF FF FF FF FF FF FF 7F ÿÿÿÿÿÿÿ�"
}
@{
Name = "Can process Int64[] type '[Int64[]](9223372036852,9223372036853) | fhx'"
InputObject = [Int64[]](9223372036852, 9223372036853)
Count = 1
ExpectedResult = "0000000000000000 F4 5A D0 7B 63 08 00 00 F5 5A D0 7B 63 08 00 00 ôZÐ{c� õZÐ{c� "
}
@{
Name = "Can process string type 'hello world | fhx'"
InputObject = "hello world"
Count = 1
ExpectedResult = "0000000000000000 68 65 6C 6C 6F 20 77 6F 72 6C 64 hello world"
}
@{
Name = "Can process string type amidst other types { 1, 2, 3, 'hello world' | fhx }"
InputObject = 1, 2, 3, "hello world"
Count = 2
ExpectedResult = "0000000000000000 01 00 00 00 02 00 00 00 03 00 00 00 � � � "
ExpectedSecondResult = "0000000000000000 68 65 6C 6C 6F 20 77 6F 72 6C 64 hello world"
}
@{
Name = "Can process jagged array type '[sbyte[]](-15, 18, 21, -5), [byte[]](1, 2, 3, 4, 5, 6) | fhx'"
InputObject = [sbyte[]](-15, 18, 21, -5), [byte[]](1, 2, 3, 4, 5, 6)
Count = 2
ExpectedResult = "0000000000000000 F1 12 15 FB ñ��û"
ExpectedSecondResult = "0000000000000000 01 02 03 04 05 06 ������"
}
@{
Name = "Can process jagged array type '[bool[]](`$true, `$false), [int[]](1, 2, 3, 4) | fhx'"
InputObject = [bool[]]($true, $false), [int[]](1, 2, 3, 4)
Count = 2
ExpectedResult = "0000000000000000 01 00 00 00 00 00 00 00 �"
ExpectedSecondResult = "0000000000000000 01 00 00 00 02 00 00 00 03 00 00 00 04 00 00 00 � � � �"
}
@{
Name = "Can process PS-native enum array '[TestEnum[]]('TestOne', 'TestTwo', 'TestThree', 'TestFour') | fhx'"
InputObject = [TestEnum[]]('TestOne', 'TestTwo', 'TestThree', 'TestFour')
Count = 1
ExpectedResult = "0000000000000000 01 00 00 00 02 00 00 00 03 00 00 00 04 00 00 00 � � � � "
}
@{
Name = "Can process C#-native sbyte enum array '[TestSByteEnum[]]('One', 'Two', 'Three', 'Four') | fhx'"
InputObject = [TestSByteEnum[]]('One', 'Two', 'Three', 'Four')
Count = 1
ExpectedResult = "0000000000000000 FF FE FD FC ÿþýü"
}
)
It "<Name>" -TestCases $testCases {
param ($Name, $InputObject, $Count, $ExpectedResult, $ExpectedSecondResult)
$result = $InputObject | Format-Hex
$result.Count | Should -Be $Count
$result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$result[0].ToString() | Should -MatchExactly $ExpectedResult
if ($result.count -gt 1) {
$result[1].ToString() | Should -MatchExactly $ExpectedSecondResult
}
}
$heterogenousInputCases = @(
@{
InputScript = { [sbyte[]](-15, 18, 21, -5), "hello", [byte[]](1..6), 1, 2, 3, 4 }
Count = 4
ExpectedResults = @(
"0000000000000000 F1 12 15 FB ñ��û"
"0000000000000000 68 65 6C 6C 6F hello"
"0000000000000000 01 02 03 04 05 06 ������"
"0000000000000000 01 00 00 00 02 00 00 00 03 00 00 00 04 00 00 00 � � � � "
)
ExpectedLabels = @(
"System.SByte[]"
"System.String"
"System.Byte"
"System.Int32"
).ForEach{ [regex]::Escape($_) } -join '|'
}
@{
InputScript = { $inputFile1, "Mountains are merely mountains", 1, 4, 5, 3, [ushort[]](1..10) }
Count = 6
ExpectedResults = @(
"0000000000000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 Hello World"
"0000000000000000 4D 6F 75 6E 74 61 69 6E 73 20 61 72 65 20 6D 65 Mountains are me"
"0000000000000010 72 65 6C 79 20 6D 6F 75 6E 74 61 69 6E 73 rely mountains"
"0000000000000000 01 00 00 00 04 00 00 00 05 00 00 00 03 00 00 00 � � � � "
"0000000000000000 01 00 02 00 03 00 04 00 05 00 06 00 07 00 08 00 � � � � � � � � "
"0000000000000010 09 00 0A 00 � � "
)
ExpectedLabels = @(
$inputFile1.FullName
"System.String"
"System.Int32"
"System.UInt16[]"
).ForEach{ [regex]::Escape($_) } -join '|'
}
@{
InputScript = { $true, $false, $true, 123, 100, 76, $true, $false }
Count = 3
ExpectedResults = @(
"0000000000000000 01 00 00 00 00 00 00 00 01 00 00 00 � �"
"0000000000000000 7B 00 00 00 64 00 00 00 4C 00 00 00 { d L"
"0000000000000000 01 00 00 00 00 00 00 00 �"
)
ExpectedLabels = @(
"System.Boolean"
"System.Int32"
).ForEach{ [regex]::Escape($_) } -join '|'
}
)
It 'can process jagged input: <InputScript>' -TestCases $heterogenousInputCases {
param($InputScript, $Count, $ExpectedResults, $ExpectedLabels)
$Results = & $InputScript | Format-Hex
$Results | Should -HaveCount $Count
$ExpectedResults | Should -HaveCount $Count
for ($Number = 0; $Number -lt $Results.Count; $Number++) {
$Results[$Number] | Should -MatchExactly $ExpectedResults[$Number]
$Results[$Number].Label | Should -MatchExactly $ExpectedLabels
}
}
}
Context "Path and LiteralPath Parameters" {
$testDirectory = $inputFile1.DirectoryName
$testCases = @(
@{
Name = "Can process file content from given file path 'fhx -Path `$inputFile1'"
PathCase = $true
Path = $inputFile1
Count = 1
ExpectedResult = $inputText1
}
@{
Name = "Can process file content from all files in array of file paths 'fhx -Path `$inputFile1, `$inputFile2'"
PathCase = $true
Path = @($inputFile1, $inputFile2)
Count = 2
ExpectedResult = $inputText1
ExpectedSecondResult = $inputText2
}
@{
Name = "Can process file content from all files when resolved to multiple paths 'fhx -Path '`$testDirectory\SourceFile-*''"
PathCase = $true
Path = "$testDirectory\SourceFile-*"
Count = 2
ExpectedResult = $inputText1
ExpectedSecondResult = $inputText2
}
@{
Name = "Can process file content from given file path 'fhx -LiteralPath `$inputFile3'"
Path = $inputFile3
Count = 1
ExpectedResult = $inputText3
}
@{
Name = "Can process file content from all files in array of file paths 'fhx -LiteralPath `$inputFile1, `$inputFile3'"
Path = @($inputFile1, $inputFile3)
Count = 2
ExpectedResult = $inputText1
ExpectedSecondResult = $inputText3
}
)
It "<Name>" -TestCase $testCases {
param ($Name, $PathCase, $Path, $ExpectedResult, $ExpectedSecondResult)
if ($PathCase) {
$result = Format-Hex -Path $Path
} else {
# LiteralPath
$result = Format-Hex -LiteralPath $Path
}
$result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$result[0].ToString() | Should -MatchExactly $ExpectedResult
if ($result.count -gt 1) {
$result[1].ToString() | Should -MatchExactly $ExpectedSecondResult
}
}
It 'properly accepts -LiteralPath input from a FileInfo object' {
$FilePath = 'TestDrive:\FHX-LitPathTest.txt'
"Hello World!" | Set-Content -Path $FilePath
$FileObject = Get-Item -Path $FilePath
$result = $FileObject | Format-Hex
if ($IsWindows) {
$Result.Bytes[-1] | Should -Be 0x0A
$Result.Bytes[-2] | Should -Be 0x0D
$Result.Bytes.Length | Should -Be 14
} else {
$Result.Bytes[-1] | Should -Be 0x0A
$Result.Bytes.Length | Should -Be 13
}
}
}
Context "Encoding Parameter" {
$testCases = @(
@{
Name = "Can process ASCII encoding 'fhx -InputObject 'hello' -Encoding ASCII'"
Encoding = "ASCII"
Count = 1
ExpectedResult = "0000000000000000 68 65 6C 6C 6F hello"
}
@{
Name = "Can process BigEndianUnicode encoding 'fhx -InputObject 'hello' -Encoding BigEndianUnicode'"
Encoding = "BigEndianUnicode"
Count = 1
ExpectedResult = "0000000000000000 00 68 00 65 00 6C 00 6C 00 6F h e l l o"
}
@{
Name = "Can process BigEndianUTF32 encoding 'fhx -InputObject 'hello' -Encoding BigEndianUTF32'"
Encoding = "BigEndianUTF32"
Count = 2
ExpectedResult = "0000000000000000 00 00 00 68 00 00 00 65 00 00 00 6C 00 00 00 6C h e l l"
ExpectedSecondResult = "0000000000000010 00 00 00 6F o"
}
@{
Name = "Can process Unicode encoding 'fhx -InputObject 'hello' -Encoding Unicode'"
Encoding = "Unicode"
Count = 1
ExpectedResult = "0000000000000000 68 00 65 00 6C 00 6C 00 6F 00 h e l l o "
}
@{
Name = "Can process UTF7 encoding 'fhx -InputObject 'hello' -Encoding UTF7'"
Encoding = "UTF7"
Count = 1
ExpectedResult = "0000000000000000 68 65 6C 6C 6F hello"
}
@{
Name = "Can process UTF8 encoding 'fhx -InputObject 'hello' -Encoding UTF8'"
Encoding = "UTF8"
Count = 1
ExpectedResult = "0000000000000000 68 65 6C 6C 6F hello"
}
@{
Name = "Can process UTF32 encoding 'fhx -InputObject 'hello' -Encoding UTF32'"
Encoding = "UTF32"
Count = 2
ExpectedResult = "0000000000000000 68 00 00 00 65 00 00 00 6C 00 00 00 6C 00 00 00 h e l l "
ExpectedSecondResult = "0000000000000010 6F 00 00 00 o "
}
)
It "<Name>" -TestCase $testCases {
param ($Name, $Encoding, $Count, $ExpectedResult)
$result = Format-Hex -InputObject 'hello' -Encoding $Encoding
$result.count | Should -Be $Count
$result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$result[0].ToString() | Should -MatchExactly $ExpectedResult
}
}
Context "Validate Error Scenarios" {
$testDirectory = $inputFile1.DirectoryName
$testCases = @(
@{
Name = "Does not support non-FileSystem Provider paths 'fhx -Path 'Cert:\CurrentUser\My\`$thumbprint' -ErrorAction Stop'"
PathParameterErrorCase = $true
Path = "Cert:\CurrentUser\My\$thumbprint"
ExpectedFullyQualifiedErrorId = "FormatHexOnlySupportsFileSystemPaths,Microsoft.PowerShell.Commands.FormatHex"
}
@{
Name = "Type Not Supported 'fhx -InputObject @{'hash' = 'table'} -ErrorAction Stop'"
InputObjectErrorCase = $true
Path = $inputFile1
InputObject = @{ "hash" = "table" }
ExpectedFullyQualifiedErrorId = "FormatHexTypeNotSupported,Microsoft.PowerShell.Commands.FormatHex"
}
)
It "<Name>" -Skip:$skipTest -TestCase $testCases {
param ($Name, $PathParameterErrorCase, $Path, $InputObject, $InputObjectErrorCase, $ExpectedFullyQualifiedErrorId)
{
if ($PathParameterErrorCase) {
$result = Format-Hex -Path $Path -ErrorAction Stop
}
if ($InputObjectErrorCase) {
$result = Format-Hex -InputObject $InputObject -ErrorAction Stop
}
} | Should -Throw -ErrorId $ExpectedFullyQualifiedErrorId
}
}
Context "Continues to Process Valid Paths" {
$testCases = @(
@{
Name = "If given invalid path in array, continues to process valid paths 'fhx -Path `$invalidPath, `$inputFile1 -ErrorVariable e -ErrorAction SilentlyContinue'"
PathCase = $true
InvalidPath = "$($inputFile1.DirectoryName)\fakefile8888845345345348709.txt"
ExpectedFullyQualifiedErrorId = "FileNotFound,Microsoft.PowerShell.Commands.FormatHex"
}
@{
Name = "If given a non FileSystem path in array, continues to process valid paths 'fhx -Path `$invalidPath, `$inputFile1 -ErrorVariable e -ErrorAction SilentlyContinue'"
PathCase = $true
InvalidPath = "Cert:\CurrentUser\My\$thumbprint"
ExpectedFullyQualifiedErrorId = "FormatHexOnlySupportsFileSystemPaths,Microsoft.PowerShell.Commands.FormatHex"
}
@{
Name = "If given a non FileSystem path in array (with LiteralPath), continues to process valid paths 'fhx -Path `$invalidPath, `$inputFile1 -ErrorVariable e -ErrorAction SilentlyContinue'"
InvalidPath = "Cert:\CurrentUser\My\$thumbprint"
ExpectedFullyQualifiedErrorId = "FormatHexOnlySupportsFileSystemPaths,Microsoft.PowerShell.Commands.FormatHex"
}
)
It "<Name>" -Skip:$skipTest -TestCase $testCases {
param ($Name, $PathCase, $InvalidPath, $ExpectedFullyQualifiedErrorId)
$output = $null
$errorThrown = $null
if ($PathCase) {
$output = Format-Hex -Path $InvalidPath, $inputFile1 -ErrorVariable errorThrown -ErrorAction SilentlyContinue
} else {
# LiteralPath
$output = Format-Hex -LiteralPath $InvalidPath, $inputFile1 -ErrorVariable errorThrown -ErrorAction SilentlyContinue
}
$errorThrown.FullyQualifiedErrorId | Should -MatchExactly $ExpectedFullyQualifiedErrorId
$output.Length | Should -Be 1
$output[0].ToString() | Should -MatchExactly $inputText1
}
}
Context "Cmdlet Functionality" {
It "Path is default Parameter Set 'fhx `$inputFile1'" {
$result = Format-Hex $inputFile1
$result | Should -Not -BeNullOrEmpty
, $result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$actualResult = $result.ToString()
$actualResult | Should -MatchExactly $inputText1
}
It "Validate file input from Pipeline 'Get-ChildItem `$inputFile1 | Format-Hex'" {
$result = Get-ChildItem $inputFile1 | Format-Hex
$result | Should -Not -BeNullOrEmpty
, $result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$actualResult = $result.ToString()
$actualResult | Should -MatchExactly $inputText1
}
It "Validate that streamed text does not have buffer underrun problems ''a' * 30 | Format-Hex'" {
$result = "a" * 30 | Format-Hex
$result | Should -Not -BeNullOrEmpty
$result | Should -BeOfType Microsoft.PowerShell.Commands.ByteCollection
$result[0].ToString() | Should -MatchExactly "0000000000000000 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 aaaaaaaaaaaaaaaa"
$result[1].ToString() | Should -MatchExactly "0000000000000010 61 61 61 61 61 61 61 61 61 61 61 61 61 61 aaaaaaaaaaaaaa "
}
It "Validate that files do not have buffer underrun problems 'Format-Hex -Path `$InputFile4'" {
$result = Format-Hex -Path $InputFile4
$result | Should -Not -BeNullOrEmpty
$result.Count | Should -Be 3
$result[0].ToString() | Should -MatchExactly "0000000000000000 4E 6F 77 20 69 73 20 74 68 65 20 77 69 6E 74 65 Now is the winte"
$result[1].ToString() | Should -MatchExactly "0000000000000010 72 20 6F 66 20 6F 75 72 20 64 69 73 63 6F 6E 74 r of our discont"
$result[2].ToString() | Should -MatchExactly "0000000000000020 65 6E 74 ent "
}
}
Context "Count and Offset parameters" {
It "Count = length" {
$result = Format-Hex -Path $InputFile4 -Count $inputText4.Length
$result | Should -Not -BeNullOrEmpty
$result.Count | Should -Be 3
$result[0].ToString() | Should -MatchExactly "0000000000000000 4E 6F 77 20 69 73 20 74 68 65 20 77 69 6E 74 65 Now is the winte"
$result[1].ToString() | Should -MatchExactly "0000000000000010 72 20 6F 66 20 6F 75 72 20 64 69 73 63 6F 6E 74 r of our discont"
$result[2].ToString() | Should -MatchExactly "0000000000000020 65 6E 74 ent "
}
It "Count = 1" {
$result = Format-Hex -Path $inputFile4 -Count 1
$result.ToString() | Should -MatchExactly "0000000000000000 4E N "
}
It "Offset = length" {
$result = Format-Hex -Path $InputFile4 -Offset $inputText4.Length
$result | Should -BeNullOrEmpty
$result = Format-Hex -InputObject $inputText4 -Offset $inputText4.Length
$result | Should -BeNullOrEmpty
}
It "Offset = 1" {
$result = Format-Hex -Path $InputFile4 -Offset 1
$result | Should -Not -BeNullOrEmpty
$result.Count | Should -Be 3
$result[0].ToString() | Should -MatchExactly "0000000000000001 6F 77 20 69 73 20 74 68 65 20 77 69 6E 74 65 72 ow is the winter"
$result[1].ToString() | Should -MatchExactly "0000000000000011 20 6F 66 20 6F 75 72 20 64 69 73 63 6F 6E 74 65 of our disconte"
$result[2].ToString() | Should -MatchExactly "0000000000000021 6E 74 nt "
}
It "Count = 1 and Offset = 1" {
$result = Format-Hex -Path $inputFile4 -Count 1 -Offset 1
$result.ToString() | Should -MatchExactly "0000000000000001 6F o "
}
It "Count should be > 0" {
{ Format-Hex -Path $inputFile4 -Count 0 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.FormatHex"
}
It "Offset should be >= 0" {
{ Format-Hex -Path $inputFile4 -Offset -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.FormatHex"
}
It "Offset = 0" {
$result = Format-Hex -Path $InputFile4 -Offset 0
$result | Should -Not -BeNullOrEmpty
$result.Count | Should -Be 3
$result[0].ToString() | Should -MatchExactly "0000000000000000 4E 6F 77 20 69 73 20 74 68 65 20 77 69 6E 74 65 Now is the winte"
$result[1].ToString() | Should -MatchExactly "0000000000000010 72 20 6F 66 20 6F 75 72 20 64 69 73 63 6F 6E 74 r of our discont"
$result[2].ToString() | Should -MatchExactly "0000000000000020 65 6E 74 ent "
}
}
}
|
State braces for another blast of too much summer
RACHEL AFFLICK27 Jan 2014, 10:18 p.m.
Prepare yourself for another heatwave Ballarat.
State braces for another blast of too much summer
Chris, James and Matthew Burt kept cool on Australia Day by joining in the fun at the Brown Hill pool. Ballarat – and the rest of the state – is set to endure a run of high temperatures for the rest of this week.
Much of state will again face scorching conditions and elevated fire risks in coming days, with temperatures in some towns in the state’s north-west likely to exceed 40 degrees for at least six days in a row.
Weatherzone meteorologist Kim Westcott said Ballarat would be 39 degrees and windy today, and it was just the start of more heat to come.
Although a cool change will bring relief tomorrow, the hot weather is just taking a break and will return to region in time for the weekend.
“Saturday and Sunday, we’re going to get back to those hot temperatures again, so 38 and 39 degrees,” Ms Westcott said. By Sunday, most of the state, along with south-eastern SA and southern NSW, will have severe heatwave conditions.
Victoria’s heatwave earlier this month broke records, with Melbourne recording four consecutive days above 41 degrees for the first time.
Health authorities estimate that as many as 139 people died, in excess of the numbers normally expected, with the extreme heat a likely factor. State control centre spokesman Paul Huggett said Victoria was entering the peak of the fire season just as the heat returned.
“Tomorrow will be what we call the ‘spike day’,” Mr Huggett said.
He said given the hot and dry conditions of the last couple of weeks, most parts of the state “are very dry and ready to burn’’.
|
For more than 100 years, the sunken ship off Key Largo, Fla., was merely known as "Mike's Wreck," named after the employee of a local dive shop. But a team of archaeologists have finally identified the ship that sunk here in 1911 as the Hannah M. Bell, built in England in 1893.
The vessel once hauled sugar, cotton and other cargo between Europe, the United States and South America, according to a statement from the Florida Keys National Marine Sanctuary, where the Hannah M. Bell rests.
The 315-foot (96 meter) steamship ran aground on a shallow reef known today as Elbow Reef, located about 6 miles (10 kilometers) off Key Largo, on April 4, 1911. The vessel was loaded with coal bound for Vera Cruz, Mexico.
For days, salvagers tried to rescue the Hannah M. Bell, but gave up after its holds filled with water, according to the statement. By May, waves had torn the ship apart and left its remnants in shallow water, making it accessible and visible today only to snorkelers and scuba divers.
NOAA
A NOAA diver takes notes above the wreck of the Hannah M. Bell in September 2012 off the coast of Key Largo, Fla.
A team of maritime archaeologists took an expedition to the wreck in September, after which they positively identified the ship.
"Similar to the way detectives use forensic information to solve a crime, we compared the dimensions and construction characteristics of the shipwreck known locally as 'Mike's Wreck' with historic shipping records in order to solve this mystery," said Matthew Lawrence, a maritime archeologist, in a statement from the sanctuary. "Measurements of the shipwreck and the records for Hannah M. Bell were virtually identical, as were the reported sinking location and the actual location of the wreck."
The steamship was built by Ropner and Son in England and named for the woman who christened it, according to the release.
The Florida Key's shallow coral reefs have claimed many ships over the years, and helped spawn a once-thriving salvaging industry, in which people would reclaim and repair marooned ships and their cargo, both legally and otherwise.
The Hannah M. Bell rests close to two other shipwrecks: the USS Arkansas and City of Washington.
The Hannah M. Bell contributed to the loss of another vessel in 1920, when the U.S. Shipping Board steamer Quoque wrecked directly on top of its sunken remains, according to the release.
This led to confusion about the identity of the original wreck, and its name was misidentified in local news reports, said Matthew Lawrence, a maritime archaeologist with the National Oceanographic and Atmospheric Administration. "Considering that there are a number of steamship wrecks on Elbow Reef, exact wreck identities probably slipped from the public's consciousness," he wrote in an email.
|
/*
* Copyright (C) 2018 - present Instructure, Inc.
*
* This file is part of Canvas.
*
* Canvas is free software: you can redistribute it and/or modify it under
* the terms of the GNU Affero General Public License as published by the Free
* Software Foundation, version 3 of the License.
*
* Canvas is distributed in the hope that it will be useful, but WITHOUT ANY
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
* A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
* details.
*
* You should have received a copy of the GNU Affero General Public License along
* with this program. If not, see <http://www.gnu.org/licenses/>.
*/
import React, {Component} from 'react'
import {string, func} from 'prop-types'
import {Badge} from '@instructure/ui-elements'
import {ScreenReaderContent} from '@instructure/ui-a11y'
export default class Indicator extends Component {
static propTypes = {
title: string.isRequired,
variant: string.isRequired,
indicatorRef: func
}
static defaultProps = {
indicatorRef: () => {}
}
render() {
return (
<div ref={this.props.indicatorRef}>
<Badge standalone type="notification" variant={this.props.variant} />
<ScreenReaderContent>{this.props.title}</ScreenReaderContent>
</div>
)
}
}
|
Canada's Indian community to give rock star welcome to Modi
Ottawa: The Indo-Canadian community is set to give a rock star like welcome to Indian Prime Minister Narendra Modi who landed here on Tuesday for his three-day visit.Modi was welcomed by Canadian Multiculturalism Minister Jason
Ottawa: The Indo-Canadian community is set to give a rock star like welcome to Indian Prime Minister Narendra Modi who landed here on Tuesday for his three-day visit.
Modi was welcomed by Canadian Multiculturalism Minister Jason Kenney and Indian High Commissioner Vishnu Prakash and a large number of Indo-Canadian leaders on his arrival at Ottawa airport from Germany.
There is a palpable buzz in Canada about Modi's visit as he is the first Indian prime minister to come here in 42 years since Indira Gandhi's visit in 1973. Canadian prime ministers have, however, been visiting India quite regularly.
Modi arrived in Canadian capital Ottawa after completing his France and Germany sojourn.
Bilateral trade and investment top the agenda of Modi's talks with his Canadian counterpart Stephen Harper and CEOs of major Canadian companies.
In particular, Modi is wooing Canadian pension funds which hold over $600 billion. A deal may be clinched for first Uranium supplies from Canada's Cameco under the nuclear deal signed by the two countries in 2010.
Though a breakthrough on the proposed free trade agreement is unlikely, the process is going to get the impetus during Modi's talks with Canadian leaders.
Both sides showed some urgency to clinch the free trade accord as they had proposed to triple their bilateral trade to $15 billion by 2015, but both the targets have eluded them as Canada is reluctant on giving free access to Indian temporary workers and visitors and India is also wary of giving unhindered access to Canadian goods.
The bilateral trade between India and Canada is still stuck in the region of $6 billion, much lower than Canada's trade of over $60 billion with China.
In fact, India accounts for just one percent of Canada's foreign trade, with fertiliser, iron ore, wood, lentils and canola oil among its major export items to India.
With Modi wooing investment for India's infrastructure and making a pitch for his Make In India programme, both countries are likely to fast-track ratification of the investment treaty signed in 2012 to give safeguards to investors against unfair treatment.
Major Canadian companies such as Bombardier, McCain Foods Ltd, Sun Life Financial Inc, BlackBerry, Brookfield Asset Management Inc., etc, have a presence in India.
Modi will impress upon Canadian investors about his government's agenda to open more sectors to foreign investment. There is also buzz about an announcement by Modi for visa on arrival for Canadians.
Apart from official discussions, Modi's engagements with the 1.2 million-strong Indo-Canadian community include a Madison Square Garden-like 'concert' at Toronto's Ricoh Coliseum with a full house of 10,000.
The newly formed National Alliance of Indo-Canadians (NAIC) is organising the event in which Canadian Prime Minister Stephen Harper will also speak.
After his Toronto engagements, Modi will travel to Vancouver where he will visit the oldest Ross Street Sikh temple. He will also visit the Laxmi Narayan Temple in Vancouver's neighbour city of Surrey which is home to the largest concentration of Indians in Canada.
Giving a typical Bollywood welcome to Modi in Toronto, Ottawa and Vancouver, choreographer Shiamak Davar's troupe will perform in the three cities.
Modi's three-day visit ends with a dinner with the host PM in Vancouver.
|
Dance Instruction for Children and Adults
Posts tagged ‘Dance’
Hello new and returning dance families! It’s time to register for classes at Weaverville Dance Academy once again. Remember, we are your full-service dance studio near Asheville, NC, offering affordable classes for everyone from preschoolers to adults.
The smallest dancers can sign up for our Creative Movement class, where they’ll have a blast learning the basics of dance and building a strong foundation for future classes. Once they’re ready to move on, they can try their hands–or feet, we should say–at ballet, jazz, tap, hip-hop, and more.
Think you’re too old to start something new? Nonsense! We offer adult classes as well, and our adult classes put on some of the greatest performances at our two yearly recitals.
If you’re looking for a dance studio in Weaverville or Asheville, come check us out. We’re a quick trip up 25/70 from Asheville, NC, and an easy jump onto interstate 26. We’ve been here more than 20 years, and we’d love to have your business. We’re more than just a dance studio, we’re family.
Registration is at our studio, located 76-2 Garrison Branch Road (Just off 25/70), on the following dates:
Hi WDA dancers and families, hope you’re all enjoying the beginning of this busy holiday season.
Please remember these important dates coming up in the next couple weeks:
Saturday, December 7 is the Weaverville Christmas Parade. We will meet between 11:30 and 12:00 in the large parking lot near Arby’s and Big Lots in Weaverville. The parade begins at 1:00, and we will meet back in that parking lot when the parade is over. Please remember to dress for the weather!
Our Christmas Recital is at 10:00 am on Saturday, December 14, in Moore Auditorium at Mars Hill College. Please arrive a little early; once the lights go down and the recital begins, it will be hard to find your classmates and teacher!
Look for more important dates for after the new year to be posted soon-hope everyone has a safe and happy holiday.
|
Katadyn 1120070 Siphon Video Transcript
Hey everyone, Aquaman here with FilterDoctor.com. Today we’re looking at the Katadyn 1120070 Siphon filter. This utilizes a 0.2 micron silver impregnated ceramic to produce 1.4 gallons of filtered water per hour. You simply put the ceramic element in any elevated container, then run this long six foot rubber hose down to a vessel that can collect the filtered water, and let the siphon action take over. There’s absolutely no pumping necessary. The ceramic is a really neat material, it filters down to 0.2 microns, which means it removes bacteria, microbial cysts like cryptosporidium and giardia, even algae and protozoa are captured in this element. And the silver impregnation causes the filter to be bacteriostatic and self-sterilizing, meaning that microorganisms cannot live and grow on this filter media. Perhaps the greatest feature of this ceramic filter is the reusability factor. It can be washed and reused many many times. Simply take the provided green Scotchbrite and scrub the exterior surface, either under running water or in a pool of water, and then you’re back in business. They’ve even provided a tool to measure the outside diameter of the filter. Once the tool can go over the filter, it’s too thin and it needs to be replaced. Filter life is approximately 5,000 gallons. Again, this is the Katadyn 1120070 Siphon filter, and I’m your host Aquaman with FilterDoctor.com. Thanks for watching.
|
Find a Used Ford Transit Connect for Sale
Ideal packaging: 2017 Ford Transit Connect Cargo Van
Ford’s compact Transit Connect is set to provide cost-conscious commercial fleets and small business owners unmatched fuel economy and versatility in the expanding commercial vehicle market. The Ford Transit Connect drives and parks like a car, hauls more payload many full-size pickup trucks and delivers fuel efficiency unmatched by any other commercial vehicle in North America today.
The Transit Connect is available in the following configurations: cargo van and passenger wagon...
|
Synopsis
During the Mexican revolution mine owner Colonel Alfonso Garcia (Eduardo Fajardo) hires Sergei Kowalski (Franco Nero) a Polish mercenary to protect seven tonnes of silver being transported to the US. Kowalski arrives only to discover the repressed peasant workers, led by Paco Roman (Tony Musante), have taken control of the mine by force. Always eager to make good his losses Kowalski persuades Roman, now in a tight spot with Garcia's army bearing down on him, to hire his services. A sadistic homosexual mercenary called Curly (Jack Palance), wanting the silver himself tries to ambush Kowalski, but Roman thwarts his plans and Curly's men are killed. Kowalski renews his partnership with Roman and after liberating a town the bandits are joined by Columba (Giovanna Ralli) an idealist who's farther was hung for being a revolutionary. With the promise of making Roman as famous as Pancho Villa and all the gang rich in exchange for a hefty daily fee plus expenses, under Kowalski's guidance Roman earns the reputation of a great revolutionary liberator. Garcia's army still desperate to capture the bandits are joined by Curly in their search. Kowalski's financial demands for guidance increase but Roman now married to Columbia sees the true importance of the revolution to the Mexican people. Realising his responsibility for his fellow countrymen Roman reneges on the deal and takes all Kowalski's money for the great cause. The bandits keep Kowalski tied up as a prisoner, but in a devastating attack by Garcia's army he escapes. Kowalski tracks Roman to a rodeo where he is in hiding working as a clown, Curly also trails him there and the scene is set for the final showdown. --The Halitosis Kid 11:08, 27 May 2007 (CEST)
Trivia
During the production, the cameraman thought he spotted a UFO, continued filming it and subsequently the team even sent pictures to NASA
|
Throwback to Miss World Philippines 2011: Its first stand-alone National Pageant
In what was the first breakaway title from Bb. Pilipinas, the franchise of Miss World had a changing of guards after the 2010 edition (which left Bb. Pilipinas World 2010 Czarina Gatbonton with no actual successor to crown during Bb. Pilipinas 2011) where a dedicated national pageant was staged at the PICC for Miss World Philippines. It was a momentous inaugural edition under Cory Quirino which saw the winner getting a cool million pesos, a condominium unit from SMDC, a GMA7 management contract and the right to represent the country in London for Miss World 2011. Gwendoline Ruais was an unstoppable force in that batch. Aside from a statuesque height, she articulated herself well and possessed the X-factor that could be the winning formula in getting the blue crown. And she almost did after placing 1st Runner-Up to Ivian Sarcos of Venezuela. It won’t be for another two years before the country won its first Miss World crown, but that is topic for another entry during this throwback-filled home quarantine period.
I always thought she benefitted from JM culinary school.
Placememt is higher than what she really deserved.
She placing higher than Puerto Rico (yes, the more deserving Puerto Rican) was beyond me. I always thought it was due to her being the inaugural MWP under a new ND, and the connection her family has with the British Royals.
One of the biggest WTF moment In BbP when Gatby ‘PUNO’ beat Not only Gwen R. but other deserving candidates that year. I still believe a conspiracy theory that one of the coach(she no longer work the following year), manipulated the results putting Gatbys name in the semi finalist and the rest is history. I also believe that was the year when JM just lost it all, taking the franchise away from MSA.😅
It’s the BIGGEST REVENGE of GWENDOLINE RUAIS to STELLA ARANETA (and CZARINA GATBONTON). MSA CROWNED a SO-SO (therefore ordinary) candidate, SO TALO SA MW. In Joseph Vitug’s pre-pageant review, he said that if MAJORITY of the JUDGES are MALES, most likely Czarina WOULD WIN a CROWN. Indeed, he was right – majority of the judges were males & Czarina won.
TO AVOID of BECOMING ANOTHER JANINA SAN MIGUEL (her kababayan by the way), Czarina OPTED TO USE FILIPINO in answering the question. Was her answer excellent? My answer is NO. But, again the predominantly male judges loved her EXOTIC beauty. Gwedoline’s loss, however, gave her more time to hone herself and be a far better competitor, hence she won the first ever MWP title. She was also very competitive in London given her preliminary scores. Her 1st runner up placement was well deserved. She just lost points to Ms. Venezuela in terms of FACIAL BEAUTY & that Barbie doll like gown of the latter (I believe).
NOW, the question FLOR is – Ganito rin kaya ang mangyayari sa first ever Miss Universe Philippines? Will MICHELLE GUMABAO win the MUP title and earn the first runner up placement in Miss Universe this year? Sabi kasi ni Flor (dapat) hanggang 1st runner up LANG DAW muna ang AIM natin ngayong taong ito for a number of reasons. One of which is that Patch Magtanong is slated to join MUP in 2021.
With Flor’s CONCERN of Gazini NOT HAVING a successor, pabayaan na natin siyang manahimik. After all, SHE DID NOT DESERVE to WIN THE 2019 MUP title JUST LIKE the case of Czarina Gatbonton in 2010. Either ang Miss Grand International or runner up position lang muna ang dapat ibinigay kay Gazini. Hannah Arnold and Vickie Rushton gave WEAK ANSWERS (to their questions), BUT Gazini gave A WRONG REPLY and still won the MUP title. THAT’S INJUSTICE. So abangan ang susunod na kabanata…
@ Pierro Rocco I thought Gwendolyn’s connection to Parisian political elite was foremost on JM’s mind…,. Her uncle was a former Mayor of Paris?
I thought you were mulling MG for MWP? Anyway, granted MG does win MUP 2020, it would give MUP organization the STAR FACTOR they need BADLY to create BUZZ, which I think no one (else) in the current batch can match. Had Teresita Ssen joined, I could envision both “artistas” as the Final 2. Let’s face it! Pageantry, after the experience with Pia and Catriona, NEEDS SHOW BUSINESS to financially survive nowadays. It should “jolog-ize”, cut away its elitist origins.
What I meant when I said that we do not need to win yet is based on a comment I (also) saw here (in the blog) that alleges JG and company are working towards our fifth MU crown within as many years; anyway, they are just starting. Mahirap nga naman kung manalo on their first year tapos zero afterwards; better to take it progressively higher. Para quantifiable ang progression.
Gwen answer in MWP is the same as hers in MW. I think Catriona did the same back in 2016. But Megan Young tried not to copy paste her answers when she competed in both local and international pageant of MW in 2013.
March ends tomorrow. Two (2) WHOLE months – April & May – of on-line pageant activities, assuming the community quarantine will require extension….
June should hopefully allow some unlocking in time for the 2021-22 academic calendar to begin. Or, can we use this as opportunity to finally synchronize with the international/global scholastic schedule by starting ALL schools in August? Dep-Ed will have sufficient time to prepare….
I think August-September for all Nationals will be OK. Sunod-sunod na para matapos agad. Mr. Tinio, advise your organization contacts to plan for an August resumption. Anything within the next four (4) months might be a stretch, if not impossible given current situation.
August could be the earliest best-case…. But could run into Ghost Month…. How is July like to your Chinese geomancy experts? Will Metal Rat weaken with the Summer Solstice, 21 June?
Your Blogger
Hi! Norman here. When I'm not working, I spend most of my free time planning on daily blogs. If you will notice, I always make sure that a fresh topic comes out everyday - not an easy thing to do but it's all good. Thanks for dropping by and enjoy the visit!
DISCLAIMER
"By viewing this blog, the viewer acknowledges that s/he has read and agrees to the terms of this disclaimer and assumes total responsibility and risk for his/her use of this blog. The content of this blog is published as an information service only and is presented “as is.” Please recognize that the information is general in nature and does not constitute and is not intended to be viewed as expert, legal or professional advice.
It confers no warranties, rights or merchantibility and makes no representations as to its accuracy, completeness or validity. In addition, those opinions expressed by readers and third parties who have elected to post their comments and opinions are theirs alone and do not reflect the opinions of the author who is not responsible for the accuracy of any of the information supplied by such readers and/or third parties.
The author of this blog is not liable for any errors, omissions, delays, losses, injuries or damages -- be it direct, indirect, incidental, consequential, special, punitive, or other -- arising from its display or use.
The author of this blog is also not responsible for the content of, accuracy of, or opinions expressed in third party sites to which this blog links. "
|
const merge = require('webpack-merge')
const common = require('./webpack.common.js')
const WebpackCopyPlugin = require('copy-webpack-plugin')
module.exports = merge(common, {
plugins: [
new WebpackCopyPlugin([{
from: 'README.md',
to: 'README.md'
}, {
from: 'LICENSE',
to: 'LICENSE'
}, {
from: 'CHANGELOG.md',
to: 'CHANGELOG.md'
}, {
from: 'manifest.json',
to: 'manifest.json'
}, {
from: 'oidc-callback.html',
to: 'oidc-callback.html'
}, {
from: 'oidc-silent-redirect.html',
to: 'oidc-silent-redirect.html'
}])
],
mode: 'production',
devtool: 'none',
resolve: {
alias: {
vue: 'vue/dist/vue.min.js'
}
}
})
|
How to get started with Network Virtualisation and NSX
I have worked in “the industry” for the last 17+ years, so picking up new technologies and learning as much as I can (or at least as much I need to know to be dangerous) has become second nature to me.
If I was just starting out in IT today, I’m not sure where I would start. I know when I started back in the day with software packaging with WISE Package Studio, Networking was a dark art. Still today, some of its intricacies are a mystery to me and thats not because it is particularly difficult, its because there is only so much time in the day and so much you can know.
Enough about me… I wanted to put this post together because I think VMware NSX is not only a “big thing” right now, I think it will be a “big thing” for a little while longer so if you are starting out in the IT industry and want to work within the virtualisation space then Network Virtualisation (and VMware NSX) is a good place to look to move into.
Advice from a “IT Veteran”
So my advice for people starting out on the Network Virtualisation learning path is this:
1. Understand your goal
It is important to understand what you want to get out of this path you are taking.
Do you want to just learn the technology to enable yourself to work on cool and innovative projects?
Do you want to stretch your learning and earn a new certification?
Do you want to bolster your CV, so that you can earn more money?
Do you want to change direction in your career because your not being challenged?
I guess the point is, people do things for different reasons and those reasons are right for that person at that stage in their career.
2. Get a Good Foundation
Something built on a rocky or non-existant foundation will soon crack, so get a good understanding of the basics.
My recommendation would be to learn/know one of those topics relatively in-depth. You may decide to go further moving to CCNA-DC, CCNP or VCAP. Only you can decide what level of background you need.
3. Get Official VMware NSX Training
I’m a big fan of official training, some of the courses can be a little slow but I understand that you have to cater for all skill levels when delivering a course. Even after all this time, I don’t think I have ever been on an official course and come away from it having not learned anything.
Note: If you are not already a VCP in another track (i.e. DCV, CMA or DTM) then you will need to attend at least one official training course to be eligible to obtain the VCP6-NV. You can take the exam(s) without it, but you wont be awarded the certifications.
4. Put in the EXTRA time and effort
So many people expect to go on a course and to become an expert overnight. In my view, this is proliferated by companies putting a huge amount of pressure on people after they have been on training. After 15 years and 20+ certifications (including 5 Advanced Professional certification), I still refuse to call myself an expert… in anything. Yes, I may know more than a lot of people when it comes to my field of “expertise”, but there is always someone who knows more.
You may be surprised to know that normally one of the courses doesn’t cover all the content required for the VCP6-NV or the VCAP6-NV and it is a combination of the Install, Configure, Manage (ICM), Troubleshooting & Operations and Design and Deploy that will help you in your goal to learn all you need/want to know (and become certified).
However, in my eyes, there is nothing like practical “hands on” experience, so building your own lab environment with VMware NSX is a good start. I know not everyone can afford to do this. Therefore, to me, using free the VMware Hands On Lab is a very good way to learn the technology and get hands on with the products. Yes they can be a little laggy sometimes but did I say it was free? Also just because there are objectives in a lab, it doesn’t mean you can;t play around and break the lab, after all you can just end your session and start a new one…
5. Use ALL of the NSX resources available
If you have completed one of the courses and you still want to learn more and have a more structured way of learning the blueprint material, I cannot recommend enough the VCP6-NV official cert guide.
There is a huge amount of google+ forums and general community support. #GoogleIsYourFriend
6. Show your knowledge… get VMware certified
When you think you are ready to take the exams, take them. Are they always needed? No. In my view, if you can provide demonstrable experience and skills that will be much more valued than a piece of paper and no real experience. You do have to start somewhere though and sometimes that certification may just open the door to get some more hands on experience.
Note: Remember to check the exam version you are booking, you maybe playing with NSX 6.3.x for example, but the exam may only be NSX 6.2.x.
7. There is no “silver bullet”
Learning any product / technology like VMware NSX takes time and so does learning the foundation technologies such as vsphere or networking. There are, of course, ways to expedite your progression (aka BrainDumps, TestKing whatever you want to call them) but these should be avoided at all costs. Not only do they break the NDA you agree to (which could cause you to be striped of your certification) but passing exams by memorising answers to questions rather than passing because you know a subject or know a subject well enough to understand what isn’t the right answer is much more valuable in my experience.
Note: I used the words “expedite your progression” not “expedite your learning”, it is very rare you will learn anything from cheating.
Good Luck!
Final Note: this is my advice, not a rule and there maybe additional work/ exam prerequisites required so please check and make sure you take the path to least resistance.
|
Whatever weight Leonardo DiCaprio put on for his role in J. Edgar has already been worked off. We’d like the number of his trainer, please? He walked the red carpet for the world premiere of the film, held yesterday at Grauman’s Chinese Theatre in Hollywood, looking slick and streamlined in a black suit and silver tie. Complementing him was Naomi Watts, who shimmered in a plunging sequined gown. Director Clint Eastwood didn’t seem too happy to face the cameras, but he did bring two of his children — actors Alison Eastwood and Scott Eastwood — who seemed quite comfortable amid the mayhem. There were also a host of other familiar faces spotted at the premiere. Armie Hammer, who also has a strong role in the movie, came with his beautiful wife, Elizabeth Chambers. Hilary Swank, Ed Westwick, Liev Schreiber (who accompanied wife Naomi) and Jennifer Love Hewitt all gave great red carpet face. Make sure to check out our gallery for all the action.
|
Online Dental Education Library
Our team of dental specialists and staff strive to improve the overall health of our patients by focusing on preventing, diagnosing and treating conditions associated with your teeth and gums. Please use our dental library to learn more about dental problems and treatments available. If you have questions or need to schedule an appointment, contact us.
BioHorizons®
About tooth loss
Tooth loss can be detrimental to your long term oral health. Bone loss is one of the leading side effects of missing teeth - not to mention the effect on your smile. The stimulation that your jaw bone receives from your teeth maintains its strength. If you have dentures or even a partial denture, you are losing bone. Your teeth provide you with more function than just chewing.
Reliability
Leading dental organizations now consider dental implants the "standard of care" for the replacement of missing teeth. Your doctor uses dental implants from BioHorizons, which have long-term documented success rates that are above the industry average. See for yourself what thousands of patients already know.
Confidence
Dental implant treatment restores confidence in your smile. You can speak clearly and eat the foods you love, without the fear of loose, ill-fitting dentures causing embarrassment. What a wonderful way to improve your health and quality of life! Turn back the clock and feel like yourself again. You are going to love your new smile.
What are dental implants?
Dental implants are titanium alloy screws which are anchored into the jawbone. Titanium alloy is the same material that is used in other implants such as hip and knee replacements. Implants are designed to "fuse" (osseointegrate) to the bone to ensure strength and security. An abutment attached to the implant will hold the crown in place.
Are you a candidate for dental implants?
With 100 million people having lost some or all of their teeth, dental implants have become the treatment of choice for replacing teeth. If you are wearing a full or partial denture or are missing one or more teeth, dental implants may be the best option for you. The hope of restoring something that has been lost is an exciting possibility. With dental implants, it's not just a hope. It's a reality!
What should you expect?
Dental implant surgery has proven successful for hundreds of thousands of people. In fact, dental implants have the highest success rate of any implanted prosthetic device. Most procedures are done in your dentist's office, or the office of one of their colleagues, as an outpatient procedure. You will be placed on a soft food diet for several days, and asked to refrain from strenuous physical activities. Most patients return to their normal daily activities in just a few days.
How long will it take?
Implant therapy typically requires several steps over a period of 3 to 9 months, depending on your treatment plan. After the implants have bonded to the bone, your dentist will attach a crown(s) and/or a denture to your implants. Home care for your implants will consist of brushing and flossing. Regular dental visits are recommended. Your dentist will monitor your progress and design a maintenance program specific to your needs. If properly cared for, your dental implants can last a lifetime.
Are there any age restrictions?
There are certain general conditions that are favorable for the placement of any prosthetic device. Age is not a factor as much as general health. Due the rapid loss of bone mass due to missing teeth, you may need a bone graft before the placement of a dental implant. Your dentist will be able to review your individual case to ensure the best possible treatment plan for you.
How do you care for implants?
There are certain general conditions that are favorable for the placement of any prosthetic device. Age is not a factor as much as general health. Due the rapid loss of bone mass due to missing teeth, you may need a bone graft before the placement of a dental implant. Your dentist will be able to review your individual case to ensure the best possible treatment plan for you.
Loose Dentures?
Dental implants can be used to stabilize or support a denture. Worry of slipping dentures and dealing with messy adhesives will be a thing of the past. Implants will also maintain the surrounding bone, protecting your long-term facial appearance. Once again, you can eat and speak with comfort and confidence.
Missing a single tooth?
If you are missing a single tooth, the placement of an implant may be the best choice for you. Conventional "crown and bridge" therapy requires the healthy teeth on each side of the missing tooth to be ground down to serve as support for the bridge. Replacing the missing tooth with an implant leaves your remaining teeth untouched. A single tooth implant will restore a natural appearance to your smile and preserve vital bone structure adjacent to the missing tooth.
|
Oscar Watch
Oscar Watch
Gosh… I haven’t seen any of them! “Goodnight, and Good Luck” has pretty high chance to win according to critique and reviews. Or it could be “Capote”? if “Brokeback mountain” won, that would make a history.
|
DIY Aloe Vera Juice
Instead of buying those expensive bottles of aloe vera juice at the gym and organic markets, make your own with this quick tutorial on creating this beneficial and hydrating drink!
I grew up in a home where every ailment was solved with two words: aloe vera. Does you stomach hurt? Drink some aloe vera juice. Did you get a massive sunburn? Rub some fresh allow vera on your skin. Is your hair dried out after one too many pool party? Add some aloe vera to your shampoo. Seriously, my parents – specially my Dad – has an affinity with aloe vera and it’s health benefits. And to keep us all well stocked, we had around 15-20 aloe vera plants in our front year at our disposal!
And surprise, surprise! Our local grocery store on Martha’s Vineyard carries full aloe vera leaves in the produce section, so I’m pretty sure your local market also has some tucked between the yucca, mangoes, and plantains. It’s smooth down the front and back, but the sides have princely thorns that could pinch you, so be careful! (At my local Stop and Shop, one aloe vera leaf was $1.99, which is the same cost of one 8-ounce bottle of it’s juice! And from one leaf, you’ll get a lot more than 8 ounces!)
Now, not only can you make aloe vera juice and sip on it, but there are many other uses for the aloe vera gel, like:
As you can see in the pictures above and below, the inside of the aloe leaf is slippery and slimy! One of my favorite uses which I’ve lately discovered is freezing the aloe in cubes and keeping them in an airtight bag in the freezer – they make the perfect healthy addition to your morning smoothies!
Below I’ve listed some of my favorite smoothies to which you can add aloe to:
To remove the aloe crystal slowly peel both sides. The inside will be very slimy, this is normal.
Remove all green peel and cut into one-inch cubes.
To make aloe vera juice: place 6-8, one-inch cubes in the blender with about 6 cups of filtered water. Blend until the aloe crystal has been fully incorporated. If you'd like, you can flavor with a squeeze for fresh lemon or lime.
To freeze for future use: place on a tray in one layer and freeze for 3-4 hours. Remove from tray and store in an airtight plastic bag. These frozen aloe cubes could be used as ice cubes for your drinks, or as a healthy addition to your smoothies.
|
Dedicated Server Solutions
Decide on an OS, click on BUY NOW and you are ready to GO! Alchemy utilizes the most reliable and latest hardware and software solutions for your server needs. Our Dedicated Server Solutions best serve customers who need root level access, a private ("unshared") server, provide e-services, or customers looking to take the next step into their hosting needs.
The Alchemy Dedicated Server 100% Uptime Guarantee
Alchemy Communications has a solid commitment to providing you with the very best dedicated server service that we can - that's why we can offer you a straightforward and rocksolid Dedicated Server 100% Uptime Guarantee!
Contact Us
Offers valid for a limited time only. Setup fee and other terms and conditions may apply. Click on a purchase for full promotional offer details.
All of Alchemy's data facilities are SSAE 16 SOC 2 Type 2 audited.
DreamHost owns a large equity stake in Alchemy Communications.
About DreamHostOver the last decade or so, DreamHost has grown to more than 1500 servers, state-of-the-art data centers, and a full time staff of more than 100 employees. They now host more than 1 million domains.
Irvine Data Center
Alchemy's newest data center in Irvine, CA, is a state-of-the-art, 42,500 sq. ft. facility located near John Wayne Airport. This carrier-neutral facility is equipped with every essential to house and protect your data.
Resellers
Your time. Your business. Your reseller solution.Become a reseller with us today! After submitting your information, you will be contacted by Alchemy's reseller department, which will work directly with you to ensure your success.
|
Warehousing: Function, Benefits and Types of Warehousing
A warehouse may be defined as a place used for the storage or accumulation of goods. The function of storage can be carried out successful with the help of warehouses used for storing the goods.
ADVERTISEMENTS:
Warehousing can also be defined as assumption of responsibility for the storage of goods. By storing the goods throughout the year and releasing them as and when they are needed, warehousing creates time utility.
Functions of Warehousing:
1. Storage:
This is the basic function of warehousing. Surplus commodities which are not needed immediately can be stored in warehouses. They can be supplied as and when needed by the customers.
2. Price Stabilization:
Warehouses play an important role in the process of price stabilization. It is achieved by the creation of time utility by warehousing. Fall in the prices of goods when their supply is in abundance and rise in their prices during the slack season are avoided.
3. Risk bearing:
When the goods are stored in warehouses they are exposed to many risks in the form of theft, deterioration, exploration, fire etc. Warehouses are constructed in such a way as to minimise these risks. Contract of bailment operates when the goods are stored in wave-houses.
ADVERTISEMENTS:
The person keeping the goods in warehouses acts as boiler and warehouse keeper acts as boiler. A warehouse keeper has to take the reasonable care of the goods and safeguard them against various risks. For any loss or damage sustained by goods, warehouse keeper shall be liable to the owner of the goods.
4. Financing:
Loans can be raised from the warehouse keeper against the goods stored by the owner. Goods act as security for the warehouse keeper. Similarly, banks and other financial institutions also advance loans against warehouse receipts. In this manner, warehousing acts as a source of finance for the businessmen for meeting business operations.
5. Grading and Packing:
Warehouses nowadays provide the facilities of packing, processing and grading of goods. Goods can be packed in convenient sizes as per the instructions of the owner.
Importance of Warehousing In the Development of Trade and Commerce:
Warehousing or storage refers to the holding and preservation of goods until they are dispatched to the consumers. Generally, there is a time gap between the production and consumption of products. By bridging this gap, storage creates time utility.
ADVERTISEMENTS:
There is need for storing the goods so as to make them available to buyers as and when required. Some amount of goods is stored at every stage in the marketing process. Proper and adequate arrangements to retail the goods in perfect condition are essential for success in marketing. Storage enables a firm to carry on production in anticipation of demand in future.
A warehouse is a place used for the storage or accumulation of goods. It may also be defined as an establishment that assumes responsibility for the safe custody of goods. Warehouses enable the businessmen to carry on production throughout the year and to sell their products, whenever there is adequate demand.
Need for warehouse arises also because some goods are produced only in a particular season but are demanded throughout the year. Similarly certain products are produced throughout the year but demanded only during a particular season. Warehousing facilitates production and distribution on a large scale.
Benefits from Warehouses:
1. Regular production:
Raw materials need to be stored to enable mass production to be carried on continuously. Sometimes, goods are stored in anticipation of a rise in prices. Warehouses enable manufacturers to produce goods in anticipation of demand in future.
2. Time utility:
ADVERTISEMENTS:
A warehouse creates time utility by bringing the time gap between the production and consumption of goods. It helps in making available the goods whenever required or demanded by the customers.
Some goods are produced throughout the year but demanded only during particular seasons, e.g., wool, raincoat, umbrella, heater, etc. on the other hand, some products are demanded throughout the year but they are produced in certain region, e.g., wheat, rice, potatoes, etc. Goods like rice, tobacco, liquor and jaggery become more valuable with the passage of time.
3. Store of surplus goods:
Basically, a warehouse acts as a store of surplus goods which are not needed immediately. Goods are often produced in anticipation of demand and need to be preserved properly until they are demanded by the customers. Goods which are not required immediately can be stored in a warehouse to meet the demand in future.
4. Price stabilization:
Warehouses reduce violent fluctuations in prices by storing goods when their supply exceeds demand and by releasing them when the demand is more than immediate productions. Warehouses ensure a regular supply of goods in the market. This matching of supply with demand helps to stabilise prices.
5. Minimisation of risk:
ADVERTISEMENTS:
Warehouses provide for the safe custody of goods. Perishable products can be preserved in cold storage. By keeping their goods in warehouses, businessmen can minimise the loss from damage, fire, theft etc. The goods kept in the warehouse are generally insured. In case of loss or damage to the goods, the owner of goods can get full compensation from the insurance company.
6. Packing and grading:
Certain products have to be conditioned or processed to make them fit for human use, e.g., coffee, tobacco, etc. A modern warehouse provides facilities for processing, packing, blending, grading etc., of the goods for the purpose of sale. The prospective buyers can inspect the goods kept in a warehouse.
7. Financing:
Warehouses provide a receipt to the owner of goods for the goods kept in the warehouse. The owner can borrow money against the security of goods by making an endorsement on the warehouse receipt. In some countries, warehouse authorities advance money against the goods deposited in the warehouse. By keeping the imported goods in a bonded warehouse, a businessman can pay customs duty in installments.
Type of Warehouses:
There are three types of warehouses as described below:
Private Warehouses:
The private warehouses are owned and operated by big manufacturers and merchants to fulfill their own storage needs. The goods manufactured or purchased by the owner of the warehouses have a limited value or utility as businessmen in general cannot make use of them because of the heavy investment required in the construction of a warehouse, some big business firms which need large storage capacity on a regular basis and who can afford money, construct and maintain their private warehouses. A big manufacturer or wholesaler may have a network of his own warehouses in different parts of the country.
Public Warehouses:
A public warehouse is a specialised business establishment that provides storage facilities to the general public for a certain charge. It may be owned and operated by an individual or a cooperative society. It has to work under a license from the government in accordance with the prescribed rules and regulations.
Public warehouses are very important in the marketing of agricultural products and therefore the government is encouraging the establishment of public warehouses in the cooperative sector. A public warehouse is also known as duty-paid warehouse.
Public warehouses are very useful to the business community. Most of the business enterprises cannot afford to maintain their own warehouses due to huge capital Investment. In many cases the storage facilities required by a business enterprise do not warrant the maintenance of a private warehouse. Such enterprises can meet their storage needs easily and economically by making use of the public warehouses, without heavy investment.
Public warehouses provide storage facilities to small manufacturers and traders at low cost. These warehouses are well constructed and guarded round the clock to ensure safe custody of goods. Public warehouses are generally located near the junctions of railways, highways and waterways.
They provide, therefore, excellent facilities for the easy receipt, despatch, loading and unloading of goods. They also use mechanical devices for the handling of heavy and bulky goods. A public warehouse enables a businessman to serve his customers quickly and economically by carrying regional stocks near the important trading centres or markets of two countries.
Public warehouses provide facilities for the inspection of goods by prospective buyers. They also permit packaging, grading and grading of goods. The public warehouses receipts are good collateral securities for borrowings.
Bonded Warehouses:
Bonded warehouses are licensed by the government to accept imported goods for storage until the payment of custom duty. They are located near the ports. These warehouses are either operated by the government or work under the control of custom authorities.
The warehouse is required to give an undertaking or ‘Bond’ that it will not allow the goods to be removed without the consent of the custom authorities. The goods are held in bond and cannot be withdrawn without paying the custom duty. The goods stored in bonded warehouses cannot be interfered by the owner without the permission of customs authorities. Hence the name bonded warehouse.
Bonded warehouses are very helpful to importers and exporters. If an importer is unable or unwilling to pay customs duty immediately after the arrival of goods he can store the goods in a bonded warehouse. He can withdraw the goods in installments by paying the customs duty proportionately.
ADVERTISEMENTS:
In case he wishes to export the goods, he need not pay customs duty. Moreover, a bonded warehouse provides all services which are provided by public warehouses. Goods lying in a bonded warehouse can be packaged, graded and branded for the purpose of sale.
|
We should have the same desire expressed by Sir John A MacDonald to Queen
Victoria, the Mother of Confederation, "to live under the sovereignty
of Your Majesty and your family for ever."
A Christian Monarchist Canadian Tory Blog
Friday, September 10, 2010
I feel a close kinship with the Christians of Iraq. St Thomas visited what is now Iraq before he came to Kerala in the the first century. I marvel how the world goes crazy over potentially burning a Koran by a moronic marginal preacher and ignores the wholescale persecution and murder of Christians in Muslim lands.
2 comments:
The real issue here, Dr. Roy, is the out-of-control Muslims and their reaction to a two-bit pastor's THREAT to burn ONE Koran. A video on CTV last night showed Muslims burning an American flag. Where was the outrage over THAT, an actual violation of good will and decency?
I didn't hear any outrage from any of our leaders about that.
Why is it always we in the West who need to show "tolerance" and good will, whereas Muslims can go ballistic, go on a rampage, burn, pillage, and murder because of "an offence" to them, and somehow, they're the victims?
I sense that we're at a turning point. There is a lot of genuine and justly provoked anger in the West about this double standard which always demands that Westerners grovel and pull back, whereas Muslims are, somehow, "permitted" to continue in their infantile temper tantrums and worse with no consequences.
I am angry that Prime Minister Harper and his Defense Minister, Peter MacKay, acquiesced to the unreasonable Muslim threats, asking US to "do the right thing" -- or, if the Muslim street erupted, the fault was ours. (http://www.ottawacitizen.com/news/Pastor+bashing+didn+peace/3503329/story.html#ixzz0z9XI6VCD)
ENOUGH, ALREADY. It's time to take back our Western civilization. Where's Winston Churchill when you need him?
I sense a turning point too. Bill O'Reilly challenged Saudi Arabia this week in his Talking Points Memo saying that tolerance goes both ways. He was referring the GZ mosque and those Muslims who insist allowing the mosque is an issue of religious tolerance. Indeed, where are churches allowed allowed in Saudi Arabia?
And honestly, just how much longer can the moral equivalence crowd keep insisting that Muslim violence is legitimate religious expression?
|
Business model disadvantages
Which business model is best to choose for our online startup?
Choosing a business model that is best for your online startup is similar to choosing which girl to ask to your high-school prom. Any business model might work (i.e. she might say yes) and you can certainly try any of them (i.e. you can ask any girl), but finding the one that works best for you is a difficult task. What is right for you in the business model/prom date equation might not be what is right for similar businesses/your friends, so use the information below to determine the best business model for your company and then adapt this information to suit your companies’ specific needs.
Price per user or price per copy model
What is it? Users pay for a product or a lifetime subscription to your service.
Examples: Microsoft Office, Iphone premium apps
Advantages: This is a great way to bring in revenue if you are planning to access markets with large customer bases (i.e. if you want to sell subscriptions to businesses for each of their employees).
Disadvantages: It is hard to get a steady stream of revenue using a price per user/copy model unless your service has a large and constantly expanding user-base or unless you’re willing to keep developing new versions of your product to sell to repeat customers.
Tips:
Focus marketing on companies that are willing to buy your product for many of their employees.
Reaching unique users is often not cost-effective in a price per user/copy model, so determine a goal number of users and then pursue that number through B2B or large-scale marketing.
Ecommerce model
What is it? A site that facilitates the buying and selling of products and/or services. There are numerous different types of Ecommerce sites. Check some of them out here: TheMyndSet. The revenue of ecommerce sites generally comes from a share of the product/service being sold.
Examples: Amazon, Louis Vuitton, LegalZoom.com
Advantages: You can try to corner a marketplace (either vertically- like Zappos did with shoes or horizontally- like Ebay did with selling used goods) or you can provide a forum for selling your products/services.
Disadvantages: There is not much profitability information available online regarding ecommerce sites, so it is somewhat uncharted territory, but it is clear that without a large user-base it is tough to run an effective ecommerce site.
Source: spinnakr.com
M-Commerce: Technologies, Services, and Business ModelsBook (Wiley)
ISBN13: 9780471135852
Condition: New
Notes: BRAND NEW FROM PUBLISHER! 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!
Pick up a copy of NOLO's Guide to
by ilima
Starting & Running a Small Business.
It discusses differences, advantages/disadvantages, and gives you some good ideas to keep the tax man happy.
And you're not locked in to one mode forever. You could start as a sole proprietorship at first, for example, and then change to another model.
Varies by state law.
by pbp
What you can do varies by state law. I am not in Reno so am not familar with your law. If you google "nonprofit association" and "Nevada" you will probably find articles on your sitution.
You are not a nonprofit at this point. In order to be a nonprofit you will need to register with your state and probably incorporate as a nonprofit business. In order for your donors to be able to deduct thier donations from their taxes you would need to register with the IRS.
The advantages for registering as a nonprofit: Donations to you are deductable. Most grant making organizations require you to be a nonprofit before they will allow you to apply for grants
You might also like
Shifting a Business Marketing Strategy
WE Marketing Group: A New Business Model for the ...
Social enterprise and Social business model
Seafood park proposed to meet demands — FISFurther project objectives are to stress successful business models, address supply chain and infrastructure related issues, increase income levels of fishermen by linking them with demand side of the food chain and provide a platform for industry ..
Doing God's work in a Capitalist World — Forbes India Every morning in the African bush there wakes a gazelle, looks at the morning sun and thinks, “How am I going to outrun the fastest lion?” That same morning rises a lion, looks at the same sun and thinks, ” Will I be able to outrun the slowest gazelle?”.
More than €500m needed to repair water system — The Nationalist.. and paying it back," said Gerry Grant, Head of Asset Management at Irish Water. "That is the model that both ESB and Bord Gáis use to invest in their infrastructure.
Spatial Microsimulation: A Reference Guide for Users (Understanding Population Trends and Processes)Book (Springer)
The disadvantages of aggregate deductibles (Discussion paper)Book (Harvard Law School, John M. Olin Center for Law, Economics, and Business)
Screen data is visible only to persons directly in front of the monitor. 3M privacy technology darkens on-screen data when viewed from the side.
Keeps your electronic information confidential, making it excellent for use in high traffic areas.
Helps protect your fragile LCD screen from damage
Filter is reversible. Choose matte side for anti-glare or glossy side for increased clarity.
Made in USA
Provides 1.5 times more effective privacy than competitive models.
New Metro-North rail schedule riles some commuters — Middletown PressAn agency spokesman did not immediately respond to a request for comment. Ridership has doubled on the Waterbury line, according to Gildea and Anders. “Successful business models invest in their product first, realizing customers will follow,” Gildea said.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.