identifier
stringlengths
6
14.8k
collection
stringclasses
50 values
open_type
stringclasses
7 values
license
stringlengths
0
1.18k
date
float64
0
2.02k
title
stringlengths
0
1.85k
creator
stringlengths
0
7.27k
language
stringclasses
471 values
language_type
stringclasses
4 values
word_count
int64
0
1.98M
token_count
int64
1
3.46M
text
stringlengths
0
12.9M
__index_level_0__
int64
0
51.1k
US-201415104367-A_1
USPTO
Open Government
Public Domain
2,014
None
None
English
Spoken
7,488
9,421
Explosive tube having air gap and method of blasting bedrock using same ABSTRACT An explosive tube having an air gap and a method of blasting bedrock using the same, comprising: a filling tube having a filling space which is to be filled with explosives; and an air tube, the upper part of which is connected with another tube to form an air gap space therein, and which has an insertion hole formed on the bottom of the air tube to introduce the explosives into the filling space, the air tube being integrally formed on the filling tube. A plurality of tubes filled with explosives are connected with each other and inserted into blasting holes formed through bedrock to break the bedrock by blasting the explosives. By forming an air gap in the upper part of the tube. BACKGROUND The present invention relates to a tube which is charged with explosives and a method of blasting bedrock using the same, and more particularly, to an explosive tube, which is charged with explosives and is inserted into a hole bored in a bedrock, and a method of blasting a bedrock using the same. In general, blasting construction means construction for blasting bedrocks, such as cutting work of raw stones in a mine or a quarry, tunneling work in a rock field, cutting work of a concrete structure and road opening work, and recently, blasting construction, such as underground excavation work, power cable work and pipe construction for a building, and subway construction, has been frequently carried out in downtown areas. The blasting construction includes not only work to crunch big stones into little pieces but also a larger work to explode several tons of stones at the same time, and has been carried out through designs using construction methods defined by each pattern. Conventional bedrock blasting methods which have been widely used are divided into a general blasting method of drilling a blast hole in a bedrock, charging the inside of the blast hole with explosives and tamping materials and carrying out explosion, a blasting method by deck charge of arranging explosives and tamping materials by turns inside a hole and carrying out explosion in order to reduce vibration, and a pre-split blasting method carried out to arrange the slope. Moreover, for blasting, ammonium nitrate fuel oil (ANFO) explosives, bulk explosives, water gel explosives and so on have been used. The ANFO explosives have been the most generally used due to economic feasibility because being ammonium explosives in which ammonium nitrate is mixed with fuel oil, but need primers or boosters, are difficult to be stored for a long time because of absorptiveness and weak in water resistance. FIG. 1a is a sectional view of a general blasting method by conventional explosives. In FIG. 1 a, initial explosives 2, detonators 3 and explosives 4, such as ANFO explosives or bulk explosives, are loaded inside a charge hole 1 of a bedrock, the remaining space is tamped with tamping materials 5, and then, explosion is carried out. However, such a general blasting method has several disadvantages in that it generates big vibration and explosive sound and there is a risk of shattering because the initial explosives 2 loaded inside the charge hole 1 are blasted in concentration on the lower part of the charge hole 1, in that there is high probability of generating boulder stones, which are bulk rocks, because the tamping materials 5 are relatively longer than the depth of the bored hole and explosive power cannot reach the bedrock around the tamping materials, in that it is uneconomical because excessive explosives are used due to over-charging, in that a detonator lead gets longer due to indirect priming, and in that ANFO explosives may cause static electricity. In order to overcome the above disadvantages, FIG. 1b is a sectional view showing the blasting method by deck charge by conventional explosives. As shown in FIG. 1 b, according to the blasting method by deck charge, the step of loading initial explosives 2, detonators 3 and explosives 4, such as ANFO explosives or bulk explosives, inside a charge hole 1 and the step of tamping the tamping materials 5 are carried out by turns to form a stratiform charge, and in this instance, the detonators 3 are individually loaded as many as the number of the stratiform charges so that the explosives are individually exploded inside the same hole at specified time intervals to crush rocks. However, the blasting method by deck charge has several disadvantages in that it is expensive and complicated because it requires the detonators as many as the number of the stratiform charges, in that it is inefficient and uneconomical because it is difficult to load the explosives 4 and the tamping materials 5 by turns, and in that damping effect of vibration or explosive sound is not good because explosives of the same amount must be used. Moreover, Korean Patent No. 10-0882851 published on Feb. 10, 2009 discloses a method for blasting rocks using an air deck filled with rocks, which forms an air deck space between an explosive and an explosive or between an explosive and a tamping material inside a charge hole. However, the blasting method is a method of directly charging explosives and tamping materials inside the charge hole, in case of ANFO explosives which have weak water resistance, the method cannot be easily applied to geographical features of Korea which have lots of underground water and cavities, and it is difficult to realize quantification of explosives. Furthermore, in general, in order to crush rocks, explosives are excessively concentrated on the lower part. Additionally, the existing cushion blasting method is a method of blasting by binding explosives to detonating fuses at regular intervals, but is not used widely because it is complicated and uneconomical due to a high price of the detonating fuses. SUMMARY OF THE INVENTION Accordingly, the present invention has been made in an effort to solve the above-mentioned problems occurring in the prior arts, and it is an object of the present invention to provide an explosive tube having an air gap and a method of blasting a bedrock using the same, which can quantify explosives and reduce an explosive usage by forming an air gap onto an upper part of a tube so as to increase blasting efficiency and significantly reduce expenses, increase the length of a cartridge of the explosives in comparison with the same amount of the explosives and enlarge a projection area at the time of explosion so as to increase blasting effect, and reduce blasting pollution, such as blast pressure, scattered stones, vibration and noise, generated during explosion by applying a cushion blasting method. It is another object of the present invention to provide an explosive tube having an air gap and a method of blasting a bedrock using the same, which can set a charge amount and a charging location of explosives in various ways so as to precisely control explosion according to characteristics of rocks by controlling power of explosion, prevent back break that rocks are destroyed beyond a design, and effectively crush rocks with a small amount of explosives by positively utilizing a free face. It is a further object of the present invention to provide an explosive tube having an air gap and a method of blasting a bedrock using the same, which are easy, safe and convenient to insert and pull explosives into and out of the bored hole because the detonator is inserted into the tube not to be separated and quantified explosives are produced previously, and which can increase waterproofing property by blocking an insertion hole with a lid. To achieve the above objects, the present invention provides an explosive tube which is used to crush a bedrock by blasting explosives after a plurality of the tubes charged with the explosives are connected with one another and are inserted into a blast hole bored in a bedrock, the explosive tube including: a charge tube having a charging space charged with explosives; and an air tube which is formed integrally above the charge tube, has a space of an air gap formed therein when another tube is connected to the upper part of the former tube, and has an insertion hole formed in the bottom to charge the charging space with the explosives. In this instance, preferably, the tube has an induction groove formed in a longitudinal direction of the tube to induce a blasting direction to the outer circumference. Moreover, preferably, the charge tube has a weight inserted and mounted to the lower part thereof and a scale indicated on the outer circumferential surface thereof. Furthermore, preferably, the charge tube is rounded at a lower end portion thereof. Additionally, preferably, the inner circumferential surface of the air tube is tapered downward. In addition, preferably, the air tube further has a lid for blocking the insertion hole after the charge tube is charged with the explosives. Moreover, preferably, the explosive tube further includes a connection tube for connecting the tubes with each other. Furthermore, the charge tube is charged with mixture of an ammonium nitrate fuel oil (ANFO) explosive and an emulsion-based explosive. In another aspect of the present invention, the present invention provides a method of crushing a bedrock by blasting explosives after connecting a plurality of tubes, each of which includes a charge tube having a charging space charged with explosives and an air tube formed integrally above the charge tube and having an insertion hole formed in the bottom to put in the explosives, with one another and inserting the tubes into a blast hole bored in a bedrock, the method including: a blast hole boring step for boring a plurality of blast holes in the bedrock in predetermined arrangement and depth; an explosive charging step for charging the charging spaces of the plural tubes with explosives through the insertion holes; a tube connecting step for connecting a plurality of the tubes charged with the explosives with one another, wherein another tube is connected to the upper part of the tube so as to form a space of an air gap inside the air tube; a tube inserting step for inserting the tubes into the blast hole; a primer inserting step for inserting a primer to which a detonator is connected into the charge tube of the tube inserted into the blast hole or into the upper part of the tube which is inserted into the uppermost part of the blast hole; a tamping material charging step for charging the remaining space of the blast hole with tamping materials; and a detonating step for detonating the detonator by a blasting machine from the outside in order to crush the bedrock. In a further aspect of the present invention, the present invention provides a method of crushing a bedrock by blasting explosives after connecting a plurality of tubes, each of which includes a charge tube having a charging space charged with explosives and an air tube formed integrally above the charge tube and having an insertion hole formed in the bottom to put in the explosives, with one another and inserting the tubes into a blast hole bored in a bedrock, the method including: a blast hole boring step for boring a plurality of blast holes in the bedrock in predetermined arrangement and depth; an explosive charging step for charging the charging spaces of the plural tubes with explosives through the insertion holes; a tube connecting step for connecting a plurality of the tubes charged with the explosives with one another, wherein another tube is connected to the upper part of the tube so as to form a space of an air gap inside the air tube; a tube inserting step for inserting the tubes into the blast hole; a detonator installing step for inserting and installing a detonator into the charge tube of the tube inserted into the blast hole; a tamping material charging step for charging the remaining space of the blast hole with tamping materials; and a detonating step for detonating the detonator by a blasting machine from the outside in order to crush the bedrock. Here, preferably, the method of blasting the bedrock further includes an insertion hole blocking step for blocking the insertion hole with a lid after the explosive charging step. Additionally, preferably, a connection tube is interposed between the two tubes in the tube connecting step. In addition, the charge tube is charged with mixture of an ammonium nitrate fuel oil (ANFO) explosive and an emulsion-based explosive. As described above, the explosive tube and the method of blasting a bedrock using the same according to the present invention can quantify explosives and reduce an explosive usage by forming an air gap onto an upper part of a tube so as to increase blasting efficiency and significantly reduce expenses, increase the length of a cartridge of the explosives in comparison with the same amount of the explosives, and enlarge a projection area at the time of explosion so as to increase blasting effect, and reduce blasting pollution, such as blast pressure, scattered stones, vibration and noise, generated during explosion by applying a cushion blasting method. Moreover, the explosive tube and the method of blasting a bedrock using the same according to the present invention can set a charge amount and a charging location of explosives in various ways so as to precisely control explosion, for instance, by controlling power of explosion, prevent back break that rocks are destroyed beyond a design, and carry out concentrated crushing toward a crushing direction of rocks. Furthermore, the explosive tube and the method of blasting a bedrock using the same according to the present invention can be easily applied to varied geographies with lots of underground water or cavities through an increase of waterproofing property by blocking the insertion hole with the lid. Additionally, when blasting is carried out using direct priming after the detonator is located at the inlet of the blast hole, because shock waves reach the free face rapidly, the explosive tube and the method of blasting a bedrock using the same according to the present invention can increase blasting power and make insertion of the detonators and arrangement of the detonator leads easy and convenient. BRIEF DESCRIPTION OF DRAWINGS FIG. 1a is a sectional view showing a general blasting method by conventional explosives. FIG. 1b is a sectional view showing a blasting method by deck charge by conventional explosives. FIG. 2 is a perspective view showing a structure of a tube according to the present invention. FIG. 3 is a sectional view showing the structure of the tube according to the present invention. FIG. 4 is a view illustrating kinds of the tube according to the present invention, wherein FIG. 4(a) shows the tube which is 50 mm in diameter, FIG. 4(b) shows the tube which is 34 mm in diameter and FIG. 4(c) shows the tube which is 25 mm in diameter. FIG. 5 is a sectional view showing connection of a plurality of tubes according to the present invention. FIG. 7 is a sectional view showing connection of tubes in a state where a connection tube is interposed between the tubes. FIGS. 8a and 8b are flow charts of a rock blasting method according to the present invention. FIG. 9 is a view showing a state where the tubes according to the present invention are used in a plurality of blast holes bored in a rock body. FIG. 10a is a view showing a state where a primer and a detonator are mounted outside the tube, FIG. 10b is a view showing a state where a primer and a detonator are mounted inside the tube, and FIG. 10c is a view showing a state where a detonator is mounted inside the tube. Explanation of numerals of essential parts in drawings 1: charge hole, 2: initial explosive, 3: detonator, 4: explosive 5: tamping material, 10: charge tube 11: charging space, 12: weight 13: scale, 14: round part 20: air tube, 21: air gap 22: insertion hole, 23: lid 30: connection tube, 31: upper connection part 32: lower connection part, A: tamping material D: detonator, E: explosive G: induction groove, H: blast hole L: detonator lead, P: primer R: rock, T: tube To achieve the above objects, the present invention provides an explosive tube which is used to crush a bedrock by blasting explosives after a plurality of the tubes charged with the explosives are connected with one another and are inserted into a blast hole bored in a bedrock, the explosive tube including: a charge tube having a charging space charged with explosives; and an air tube which is formed integrally above the charge tube, has a space of an air gap formed therein when another tube is connected to the upper part of the former tube, and has an insertion hole formed in the bottom to charge the charging space with the explosives. Furthermore, the present invention provides a method of crushing a bedrock by blasting explosives after connecting a plurality of tubes, each of which includes a charge tube having a charging space charged with explosives and an air tube formed integrally above the charge tube and having an insertion hole formed in the bottom to put in the explosives, with one another and inserting the tubes into a blast hole bored in a bedrock, the method including: a blast hole boring step for boring a plurality of blast holes in the bedrock in predetermined arrangement and depth; an explosive charging step for charging the charging spaces of the plural tubes with explosives through the insertion holes; a tube connecting step for connecting a plurality of the tubes charged with the explosives with one another, wherein another tube is connected to the upper part of the tube so as to form a space of an air gap inside the air tube; a tube inserting step for inserting the tubes into the blast hole; a primer inserting step for inserting a primer to which a detonator is connected into the charge tube of the tube inserted into the blast hole or into the upper part of the tube which is inserted into the uppermost part of the blast hole; a tamping material charging step for charging the remaining space of the blast hole with tamping materials; and a detonating step for detonating the detonator by a blasting machine from the outside in order to crush the bedrock. DETAILED DESCRIPTION OF THE INVENTION Hereinafter, reference will be now made in detail to the preferred embodiment of the present invention with reference to the attached drawings. Referring to FIGS. 2 and 3, according to the present invention, a plurality of explosive tubes (T) which are charged with explosives (E) are connected with each other and are inserted into a blast hole (H) bored in a rock (R), and then, the explosives (E) are blasted to crush the rock (R). Each of the tubes (T) is formed by a charge tube 10 and an air tube 20 integrally connected with each other. In this instance, the tube (T) is formed to be opened at the upper part and is elongated in a longitudinal direction, can prevent that explosives which have weak water resistance melt by water, such as underground water, inside a blast hole 2. The tube (T) is made of transparent synthetic resin, such as PP or PE, but is not limited to the above. Moreover, the tube (T) may be cut and manufactured to fit to the diameter and depth of the blast hole (H), but, as shown in FIG. 4, may be standardized and selectively used into various sizes according to diameters of the blast hole (H). Here, the diameter of the tube (T) is smaller than that of the blast hole (H). The tube (T) may be charged with various kinds of explosives in different arrangements. For instance, FIG. 4(a) illustrates a case that the tube (T) is charged only with ammonium nitrate fuel oil (ANFO) explosives, and it is low in bulk density and detonation velocity because being generally 3,200 m/sec in detonation velocity and 540 l/kg in gas emission, has static effect using gas pressure and is advantageous when blasting soft rocks or normal rocks. Furthermore, FIG. 4(b) illustrates a case that emulsion-based explosives to which a detonator is connected is arranged below the tube (T) and the remaining space of the tube (T) is charged with ANFO explosives, and it increases detonation velocity and explosive power by getting faster reaction speed of the explosives than using only the ANFO explosives, gets more gas pressure and less explosive power than using only the emulsion-based explosives, and may be applied to blast normal rocks or hard rocks. Additionally, FIG. 4(c) illustrates a case that the tube (T) is charged only with emulsion-based explosives or charged with emulsion-based explosives and a small amount of ANFO explosives, and it greatly increases detonation velocity and explosive power, shows dynamic effect, and is advantageous in blasting hard rocks. As shown in FIG. 7, the tube (T) has an induction groove (G) formed in the longitudinal direction so as to induce a blasting direction toward the induction groove (G) at the time of blasting, prevent back break that destroys rocks beyond a design, and intensively crush the rocks in a crushing direction. The charge tube 10 includes a charging space 11 which is charged with explosives (E), and the explosives (E) may be ANFO explosives, bulk explosives, water gel explosives and so on, but are not limited to the above. In this instance, it is preferable that a weight be inserted and mounted into a lower part of the charge tube 10. The weight 12 facilitates that the tube (T) is inserted into the bottom surface of the blast hole (H), and especially, even though water, such as underground water, exist inside the blast hole (H), the tube (T) containing the ANFO explosives, which is smaller in specific gravity than water, can be easily inserted. The weight 12 may be made of metal or rock. In addition, it is preferable that the charge tube 10 have a scale 13 indicated on the outer circumferential surface thereof, and the scale 13 is to check an amount of the explosives (E) filling the charging space 11 so as to quantify the explosives and reduce usage of the explosives. Moreover, the charge tube 10 includes a round part 14 that a lower end is rounded, and the round part 14 prevents that the lower end of the charge tube 10 is damaged by being caught to an inwardly protruding part of the blast hole (H) when the tube (T) is inserted into the blast hole (H) bored in the rock (R). It is preferable that the air tube 20 be formed integrally to the upper part of the charge tube 10, and has an inlet opened and an outlet which is formed at the bottom and has an insertion hole 22 to put the explosives into the charging space 11. Furthermore, after the charging space 11 is charged with the explosives (E), a lid 23 blocks the insertion hole 22 in order to increase waterproofing property. In this instance, the air tube 20 has an inner surface formed to get upwardly wider, is tapered downward and has a reversed trapezoidal cross section, so that the explosives can be easily put into the charging space 11 communicated with the insertion hole 22. Furthermore, as shown in FIG. 5, another tube (T) is connected to the upper part of the tube (T) so that a space of an air gap 21 in which air is captured and remains is formed inside the air tube 20. As described above, the air gap 21 is formed by applying a cushion blasting method, so as to precisely control explosion by reducing blasting pollution, such as blast pressure, scattered stones, vibration and noise, generated during explosion. In general, the cushion blasting is mainly used for open pit blasting. The cushion blasting is carried out through the steps of well-arranging an explosive charge of a small amount in a completely tamped space, blasting a main blast hole and setting off a cushion blast hole, and in this instance, tamping materials absorbs shock applied from explosion of the bedrock to minimize cracking and tension, so that the bedrock is evenly cut by uniform explosive power of the explosive charge to form a clean cut surface. However, the general cushion blasting is different from blasting using the explosive tube (T) having the air gap according to the present invention because the cushion blasting must explode the main blast hole before setting off the cushion blast hole. In general, excavation through blasting is to remove the bedrock of the excavation section using shock pressure and gas pressure generated during explosion of the explosives. Because the shock pressure and the gas pressure are propagated deep inside the bedrock in the form of seismic waves, it causes blasting pollution, such as blast pressure and noise, as well as vibration. In order to control the blasting pollution, there are blasting design, limitation in charge weight, division of firing methods, use of slower explosives, use of MS detonators, and so on. The explosive tube (T) having the air gap according to the present invention can considerably reduce usage of the explosives so as to enhance blasting efficiency and greatly reduce costs of explosives because the tube (T) is charged only with the explosives of a fixed amount necessary for blasting the bedrock(R), can vary the charging amount and the location of the explosives (E) in the plural tubes (T) inserted into the blast hole (H) so as to precisely control blasting through control and uniform distribution of blasting power according to locations, and can enhance the blasting effect due to extension of the blasting length of the explosives in comparison with the same amount of the explosives and expansion of the projection area at the time of blasting using ANFO explosives, which are slower explosives, so as to restrain generation of blasting pressure, scattered stones, vibration and noise generated during explosion. Additionally, as shown in FIG. 6, the explosive tube (T) according to the present invention further includes a connection tube 30 for connecting the tubes with each other. The connection tube 30 includes an upper connection part 31 and a lower connection part 32, and it is preferable that the diameter of the upper connection part 31 is larger than that of the lower connection part 32. The tube (T) which is arranged at the upper part is connected to the inside of the upper connection part 31, and the tube (T) which is arranged at the lower part is connected to the outside of the lower connection part 32, and preferably, the tubes (T) are respectively connected to the upper connection part 31 and the lower connection part 32 in a forced fitting manner. However, the connection method is not limited to the above, and the tubes (T) can be respectively connected to the upper connection part 31 and the lower connection part 32 in one of various well-known connection methods, such as a screw coupling method, a tonguing-and-grooving coupling method, and so on. Therefore, a plurality of the tubes are consecutively connected with one another in the longitudinal direction of the blast hole (H) in correspondence with the depth of the blast hole (H) so as to prevent that the connected tubes are easily separated from one another in the middle of the connected tubes before explosion and to extend the space of the air gap 21. Hereinafter, referring to the drawings, a method of blasting the bedrock according to the present invention will be described in detail. The method of blasting the bedrock using the explosive tube having the air gap according to the present invention is a method including the steps of connecting a plurality of tubes, each of which has a charge tube 10 having a charging space charged with explosives and an air tube 20 being integrally formed above the charge tube and having an insertion hole 22 formed in the bottom to put explosives into the tube, with one another, inserting the tubes into a blast hole bored in a bedrock, and blasting the explosives to crush the bedrock. As shown in FIG. 8 illustrating a flow chart, the method of blasting the bedrock according to the present invention includes a blast hole boring step (S10), an explosive charging step (S20), an insertion hole blocking step (S30), a tube connecting step (S40), a tube inserting step (S50), a primer inserting step (S60), a tamping material charging step (S70) and a detonating step (S80). First, a design for blasting in relation with a bedrock to be crushed is established according to variables, such as geographical features, geological features, ground conditions, blasting methods and surrounding conditions. In this instance, in order to verify the suitability of the blasting design and correct the blasting design, test blasting is carried out in advance, results of the test blasting is analyzed, a prediction equation of blasting vibration is calculated, and then, whether or not the blasting design is suitable for the blasting spot is reviewed. After that, according to the blasting design, the blast hole boring step (S10) for boring a plurality of blast holes (H) deep into a bedrock (R) in a predetermined arrangement is carried out. As shown in FIG. 9, in the blast hole boring step (S10), a plurality of the blast holes (H) having diameters of several centimeters or several meters are bored and arranged to a predetermined depth at predetermined intervals using a rock drill or a drill, and in this instance, vertical drilling, slope drilling and horizontal drilling may be carried out according to the form of a free face. After the blast hole boring step (S10), the explosive charging step (S20) for charging explosives (E) into a charging space 11 of the tube (T) through the insertion hole 22 is carried out. In the explosive charging step (S20), like the conventional method, the charging space 11 of the charge tube 10 is charged with the explosive using a tamping bar or an explosive charger. In this instance, blasting power can be controlled according to locations when charging amounts and charging locations of the explosives are varied. After the explosive charging step (S20), the insertion hole blocking step (S30) for blocking the insertion hole 22, which is formed in the bottom of an outlet of the air tube 20, with a lid 23 is carried out. In the insertion hole blocking step (S30), the insertion hole 22 is blocked by the lid 23 made of a sealing material, such as rubber or silicon, in order to increase waterproofing property by blocking inflow of water, such as underground water. After the insertion hole blocking step (S30), the tube connecting step (S40) for connecting the plural tubes (T), which are charged with the explosives, with one another is carried out. In this instance, another tube (T) is connected to an opening of the upper part of the tube (T) so as to form a space for the air gap 21 inside the air tube 20. Moreover, a connection tube 30 may be interposed between the tubes (T), so that a plurality of the tubes are consecutively connected with one another in the longitudinal direction of the blast hole (H) in correspondence with the depth of the blast hole (H) so as to prevent that the connected tubes are easily separated from one another in the middle of the connected tubes. After the tube connecting step (S40), the tube inserting step (S50) for inserting a plurality of the tubes (T) into the blast hole (H) is carried out. Furthermore, as shown in FIG. 10a or 10 b, the primer inserting step (S60) for inserting a primer (P), to which a detonator (D) is connected, to the inside of the charge tube 10 of the tube (T) inserted into the blast hole (H) or to the upper part of the tube (T) inserted into the uppermost part of the blast hole (H) is carried out. In general, in case of ANFO explosives, because it is difficult to completely explode the ANFO explosives just by a detonator, after a primer which has large detonation pressure is put between the detonator and a main explosive, the primer is first exploded, and then, the main explosive is surely exploded. In this instance, preferably, emulsion-based explosives which have been used widely and recently is used as the primer (P). Furthermore, because a plurality of the tubes (T) are connected and mounted inside the blast hole (H), a position of a detonation point may be selected freely to carry out all of direct priming, middle priming and indirect priming, but preferably, direct priming which has a detonation point at the inlet of the blast hole (H) is used. Therefore, the present invention has economic effects because shock waves reach the free face rapidly, explosive power is great due to great intensity of a reflecting plate reflected from the free face, insertion of the detonator (D) and arrangement of detonator leads (L) are easy and convenient and the detonator leads (L) get shorter. On the contrary, as shown in FIG. 10c , in the case that it is possible to carry out blasting just by the detonator (D) without using the primer (P), instead of the primer inserting step (S60), a detonator installing step (S60′) for inserting and installing the detonator (D) to the inside of the charge tube 10 of the tube (T) inserted into the blast hole (H) may be carried out. After the primer inserting step (S60) or the detonator installing step (S60′), the tamping material charging step (S70) for charging tamping materials (A) in the remaining space of the blast hole (H) is carried out. The tamping materials (A) serve to prevent a loss of explosive power and reduce explosive noise by putting nonflammable materials into the remaining space after the explosives are charged, and so, the tamping materials (A) may be sand, mud or debris. After the tamping material charging step (S70), the detonating step (S80) for detonating the detonator (D) by a blasting machine from the outside to crush the bedrock (R) is carried out. The blasting machine is a tool to detonate the detonator, and is divided into electric blasting machines and nonelectric blasting machines. In case of the ANFO explosives, it is good to use the nonelectric detonator due to the problem of static electricity. In the meantime, the order to insert or charge the tubes (T), the primers (P) and the explosives (E) into the blast hole (H) may be varied in consideration of kinds of blasting, characteristics of rocks and surrounding environment. For instance, the tubes (T) are inserted into the blast hole (H) after the primer (P) to which the detonator (D) is connected is arranged at the upper part of the blast hole (H) or the primer (P) to which the detonator (D) is connected is arranged at the lower part of the blast hole (H), or the primer (P) to which the detonator (D) is connected is arranged in the middle of the blast hole (H). That is, the present invention may have various structure to carry out detonation, and the detonator (D) may be directly connected not to the inside of the blast hole (H) but to the inside of the tube (T). Finally, the explosive tube and the method of blasting a bedrock using the same according to the present invention can quantify explosives and reduce an explosive usage by forming an air gap onto an upper part of a tube so as to increase blasting efficiency and significantly reduce expenses, increase the length of a cartridge of the explosives in comparison with the same amount of the explosives, and enlarge a projection area at the time of explosion so as to increase blasting effect, and reduce blasting pollution, such as blast pressure, scattered stones, vibration and noise, generated during explosion by applying a cushion blasting method. Moreover, the explosive tube and the method of blasting a bedrock using the same according to the present invention can set a charge amount and a charging location of explosives in various ways so as to precisely control explosion, for instance, by controlling power of explosion, prevent back break that rocks are destroyed beyond a design, and carry out concentrated crushing toward a crushing direction of rocks. Furthermore, the explosive tube and the method of blasting a bedrock using the same according to the present invention can be easily applied to varied geographies with lots of underground water or cavities through an increase of waterproofing property by blocking the insertion hole with the lid. Additionally, when blasting is carried out using direct priming after the detonator is located at the inlet of the blast hole, because shock waves reach the free face rapidly, the explosive tube and the method of blasting a bedrock using the same according to the present invention can increase blasting power and make insertion of the detonators and arrangement of the detonator leads easy and convenient. While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that the present invention is not restricted to the embodiments and various changes in form and details may be made therein without departing from the technical idea and scope of the present invention as defined by the following claims. According to the present invention, the explosive tube and the method of blasting a bedrock using the same can quantify explosives and reduce an explosive usage by forming an air gap onto an upper part of a tube so as to increase blasting efficiency and significantly reduce expenses, increase the length of a cartridge of the explosives in comparison with the same amount of the explosives, and enlarge a projection area at the time of explosion so as to increase blasting effect, and reduce blasting pollution, such as blast pressure, scattered stones, vibration and noise, generated during explosion by applying a cushion blasting method. Moreover, the explosive tube and the method of blasting a bedrock using the same according to the present invention can set a charge amount and a charging location of explosives in various ways so as to precisely control explosion, for instance, by controlling power of explosion, prevent back break that rocks are destroyed beyond a design, and carry out concentrated crushing toward a crushing direction of rocks. Furthermore, the explosive tube and the method of blasting a bedrock using the same according to the present invention can be easily applied to varied geographies with lots of underground water or cavities through an increase of waterproofing property by blocking the insertion hole with the lid. Additionally, when blasting is carried out using direct priming after the detonator is located at the inlet of the blast hole, because shock waves reach the free face rapidly, the explosive tube and the method of blasting a bedrock using the same according to the present invention can increase blasting power and make insertion of the detonators and arrangement of the detonator leads easy and convenient. 1. An explosive tube which is used to crush a bedrock by blasting explosives after a plurality of the tubes charged with the explosives are connected with one another and are inserted into a blast hole bored in a bedrock, the explosive tube comprising: a charge tube having a charging space charged with explosives; and an air tube which is formed integrally above the charge tube, has a space of an air gap formed therein when another tube is connected to the upper part of the former tube, and has an insertion hole formed in the bottom to charge the charging space with the explosives. 2. The explosive tube according to claim 1, wherein the tube has an induction groove formed in a longitudinal direction of the tube to induce a blasting direction to the outer circumference. 3. The explosive tube according to claim 1, wherein the charge tube has a weight inserted and mounted to the lower part thereof and a scale indicated on the outer circumferential surface thereof. 4. The explosive tube according to claim 1, wherein the charge tube is rounded at a lower end portion thereof. 5. The explosive tube according to claim 1, wherein the inner circumferential surface of the air tube is tapered downward. 6. The explosive tube according to claim 1, wherein the air tube further has a lid for blocking the insertion hole after the charge tube is charged with the explosives. 7. The explosive tube according to claim 1, further comprising: a connection tube for connecting the tubes with each other. 8. The explosive tube according to claim 1, wherein the charge tube is charged with mixture of an ammonium nitrate fuel oil (ANFO) explosive and an emulsion-based explosive. 9. A method of crushing a bedrock by blasting explosives after connecting a plurality of tubes, each of which includes a charge tube having a charging space charged with explosives and an air tube formed integrally above the charge tube and having an insertion hole formed in the bottom to put in the explosives, with one another and inserting the tubes into a blast hole bored in a bedrock, the method comprising: a blast hole boring step for boring a plurality of blast holes in the bedrock in predetermined arrangement and depth; an explosive charging step for charging the charging spaces of the plural tubes with explosives through the insertion holes; a tube connecting step for connecting a plurality of the tubes charged with the explosives with one another, wherein another tube is connected to the upper part of the tube so as to form a space of an air gap inside the air tube; a tube inserting step for inserting the tubes into the blast hole; a primer inserting step for inserting a primer to which a detonator is connected into the charge tube of the tube inserted into the blast hole or into the upper part of the tube which is inserted into the uppermost part of the blast hole; a tamping material charging step for charging the remaining space of the blast hole with tamping materials; and a detonating step for detonating the detonator by a blasting machine from the outside in order to crush the bedrock. 10. A method of crushing a bedrock by blasting explosives after connecting a plurality of tubes, each of which includes a charge tube having a charging space charged with explosives and an air tube formed integrally above the charge tube and having an insertion hole formed in the bottom to put in the explosives, with one another and inserting the tubes into a blast hole bored in a bedrock, the method comprising: a blast hole boring step for boring a plurality of blast holes in the bedrock in predetermined arrangement and depth; an explosive charging step for charging the charging spaces of the plural tubes with explosives through the insertion holes; a tube connecting step for connecting a plurality of the tubes charged with the explosives with one another, wherein another tube is connected to the upper part of the tube so as to form a space of an air gap inside the air tube; a tube inserting step for inserting the tubes into the blast hole; a detonator installing step for inserting and installing a detonator into the charge tube of the tube inserted into the blast hole; a tamping material charging step for charging the remaining space of the blast hole with tamping materials; and a detonating step for detonating the detonator by a blasting machine from the outside in order to crush the bedrock. 11. The method according to claim 9, further comprising: an insertion hole blocking step for blocking the insertion hole with a lid after the explosive charging step. 12. The method according to claim 9, wherein a connection tube is interposed between the two tubes in the tube connecting step. 13. The method according to claim 9, wherein the charge tube is charged with mixture of an ammonium nitrate fuel oil (ANFO) explosive and an emulsion-based explosive. 14. The method according to claim 10, further comprising: an insertion hole blocking step for blocking the insertion hole with a lid after the explosive charging step. 15. The method according to claim 10, wherein a connection tube is interposed between the two tubes in the tube connecting step. 16. The method according to claim 10, wherein the charge tube is charged with mixture of an ammonium nitrate fuel oil (ANFO) explosive and an emulsion-based explosive..
14,655
196801110042
French Open Data
Open Government
Licence ouverte
1,968
Section de l'Union des vieux de France de Puiseux-le-Hauberger
ASSOCIATIONS
French
Spoken
18
26
créer un mouvement pour la défense des intérêts des vieux et pour Famé*-lioration constante de leurs moyens d'existence
242
https://github.com/Ankur-singh/colab_everything/blob/master/colab_everything/core.py
Github Open Source
Open Source
Apache-2.0
2,022
colab_everything
Ankur-singh
Python
Code
247
987
# AUTOGENERATED! DO NOT EDIT! File to edit: 00_core.ipynb (unless otherwise specified). __all__ = ['ColabStreamlit', 'ColabFlask', 'ColabFastapi', 'ColabCustom'] # Cell import os import subprocess from pyngrok import ngrok # Internal Cell class ColabBase(): def __init__(self, port=9999): self.port = port self._start_server() def _start_server(self): active_tunnels = ngrok.get_tunnels() for tunnel in active_tunnels: public_url = tunnel.public_url ngrok.disconnect(public_url) url = ngrok.connect(addr=self.port, options={"bind_tls": True}, return_ngrok_tunnel=True) print(f'Web App can be accessed on: {url.public_url}') # Cell class ColabStreamlit(ColabBase): def __init__(self, path, port=9999): super().__init__(port) self.path = path self.run_app() def run_app(self, debug=True): os.system(f"fuser -n tcp -k {self.port}") cmd = f'streamlit run {self.path} --server.port {self.port}' with subprocess.Popen( [cmd], shell=True, stdout=subprocess.PIPE, bufsize=1, universal_newlines=True, ) as proc: for line in proc.stdout: if debug: print(line, end="") # Cell class ColabFlask(ColabBase): def __init__(self, path, port=9999): super().__init__(port) self.path = path self.run_app() def run_app(self, debug=True): os.system(f"fuser -n tcp -k {self.port}") cmd = f'FLASK_APP={self.path} flask run --host=0.0.0.0 --port={self.port}' with subprocess.Popen( [cmd], shell=True, stdout=subprocess.PIPE, bufsize=1, universal_newlines=True, ) as proc: for line in proc.stdout: if debug: print(line, end="") # Cell class ColabFastapi(ColabBase): def __init__(self, path, app='app', port=9999): super().__init__(port) self.path = path self.app = app self.run_app() def run_app(self, debug=True): os.system(f"fuser -n tcp -k {self.port}") cmd = f'uvicorn {self.path}:{self.app} --reload --port {self.port}' with subprocess.Popen( [cmd], shell=True, stdout=subprocess.PIPE, bufsize=1, universal_newlines=True, ) as proc: for line in proc.stdout: if debug: print(line, end="") # Cell class ColabCustom(ColabBase): def __init__(self, cmd, port=9999): super().__init__(port) self.cmd = cmd self.run_app() def run_app(self, debug=True): os.system(f"fuser -n tcp -k {self.port}") with subprocess.Popen( [self.cmd], shell=True, stdout=subprocess.PIPE, bufsize=1, universal_newlines=True, ) as proc: for line in proc.stdout: if debug: print(line, end="")
24,620
https://github.com/18F/identity-idp2/blob/master/spec/controllers/health/outbound_controller_spec.rb
Github Open Source
Open Source
CC0-1.0, CC-BY-4.0
null
identity-idp2
18F
Ruby
Code
101
365
require 'rails_helper' RSpec.describe Health::OutboundController do describe '#index' do subject(:action) { get :index } context 'when the outbound connections are healthy' do before do stub_request(:head, IdentityConfig.store.outbound_connection_check_url). to_return(status: 200) end it 'is a 200' do action expect(response.status).to eq(200) end it 'renders the result' do action json = JSON.parse(response.body, symbolize_names: true) expect(json[:healthy]).to eq(true) expect(json[:result]).to eq( status: 200, url: IdentityConfig.store.outbound_connection_check_url, ) end end context 'when the outbound connections are uhealthy' do before do stub_request(:head, IdentityConfig.store.outbound_connection_check_url).to_timeout end it 'is a 500' do action expect(response.status).to eq(500) end it 'renders the error' do action json = JSON.parse(response.body, symbolize_names: true) expect(json[:healthy]).to eq(false) expect(json[:result]).to include('execution expired') end end end end
49,043
https://es.wikipedia.org/wiki/La%20Paloma%20%28Rocha%29
Wikipedia
Open Web
CC-By-SA
2,023
La Paloma (Rocha)
https://es.wikipedia.org/w/index.php?title=La Paloma (Rocha)&action=history
Spanish
Spoken
501
855
La Paloma es una ciudad balneario y puerto oceánico uruguayo del departamento de Rocha. Es además sede del municipio homónimo. Ubicación La ciudad se encuentra situada en la zona sur del departamento de Rocha, en el cabo de Santa María, y en el cruce de las rutas nacionales 10 y 15. Está a de Montevideo, y a de Punta del Este. Generalidades La ciudad fue fundada el 1° de septiembre de 1874. Se destaca por su tranquilidad y sus playas, cuya extensión aproximada es de . La población permanente es de 3495 habitantes, aumentando con la llegada de turistas a 30000 en los meses de verano (enero-febrero). El balneario debería su nombre a que, antiguamente, el Cabo Santa María era una punta muy temida por los navegantes, y desde lejos, debido a la cantidad de rocas y la espuma de las olas, parecía verse la silueta de una paloma. El balneario consta del casco viejo, donde se encuentran las edificaciones residenciales más antiguas, cerca del Faro de La Paloma y frente a la Isla La Tuna, una pequeña isla cuya única vegetación era una tuna en el centro, aunque ahora hay un pino. Alrededor del casco viejo se halla el nuevo centro de La Paloma, con construcciones más recientes que se extienden a lo largo de la avenida principal, la Avenida Solari. Las viviendas son de estilo alpino, de diseño francés, la mayoría destinadas a alquiler. A mediados del el balneario experimentó un ensanche, con proyecto a cargo de los arquitectos Carlos Gómez Gavazzo y Juan Antonio Scasso. La Paloma tiene distintas playas de variadas características (con rocas, con olas, de aguas tranquilas, profundas, zonas de pesca). Algunas de ellas son La Aguada, Costa Azul, La Balconada, Anaconda y El Cabito. En la zona aledaña se encuentra el balneario de La Pedrera, con una fisonomía muy característica. Con la nueva ley de descentralización, La Paloma se transformó en un municipio, siendo elegido alcalde, para el periodo 2010-2015, Alcides Perdomo. Población Según el censo de 2011 la ciudad de La Paloma cuenta con una población permanente de 3495 habitantes. Puerto de La Paloma En sus orígenes, La Paloma contaba con un puerto natural ubicado entre el Cabo de Santa María y las islas La Tuna y La Paloma. Actualmente se ha construido un puerto artificial protegido por una escollera de 1000 metros de longitud. El puerto en si se encuentra en la antigua Isla La Paloma transformada en península. El puerto sirve, fundamentalmente a embarcaciones pesqueras y deportivas. Diversos proyectos para transformar el puerto de La Paloma en un puerto de aguas profundas para uso granelero y maderero, han generado una fuerte oposición en grupos ambientalistas y sectores vinculados al turismo. Galería Véase también Departamento de Rocha Faro de Cabo de Santa María Cabo de Santa María Referencias Enlaces externos Portal de La Paloma - Alojamientos - Servicios - Información turística Destino La Paloma en turismorocha.gub.uy Ciudades de Uruguay Localidades del departamento de Rocha Balnearios de Uruguay La Paloma Costa de Rocha
6,866
2023/32023R1803/32023R1803_DE.txt_37
Eurlex
Open Government
CC-By
2,023
None
None
German
Spoken
7,584
16,721
6.6.3 Eine Layerkomponente einer Gesamtgruppe von Geschäften (beispielsweise ein Bottom Layer) kommt für die Bilanzierung von Sicherungsbeziehungen nur dann infrage, wenn a) sie einzeln identifizierbar und verlässlich bewertbar ist, b) die Zielsetzung des Risikomanagements in der Absicherung einer Layerkomponente besteht, c) die Geschäfte der Gesamtgruppe, aus der der Layer bestimmt wird, dem gleichen abgesicherten Risiko ausgesetzt sind (sodass die Bewertung des abgesicherten Layer nicht signifikant davon abhängt, welche konkreten Geschäfte der Gesamtgruppe dem abgesicherten Layer angehören), d) ein Unternehmen bei einer Absicherung von bestehenden Geschäften (beispielsweise eine bilanzunwirksame feste Verpflichtung oder ein bilanzierter Vermögenswert) die Gesamtgruppe der Geschäfte bestimmen und verfolgen kann, aus der der abgesicherte Layer definiert ist (sodass das Unternehmen die Anforderungen an die Bilanzierung zulässiger Sicherungsbeziehungen erfüllen kann), und e) sämtliche Geschäfte der Gruppe, die Optionen zur vorzeitigen Rückzahlung enthalten, die Anforderungen an Komponenten eines Nominalbetrags erfüllen (siehe Paragraph B6.3.20). Darstellung 6.6.4 Bei der Absicherung einer Gruppe von Geschäften mit gegenläufigen Risikopositionen (d. h. der Absicherung einer Nettoposition), bei der das abgesicherte Risiko verschiedene Posten in der Gewinn- und Verlustrechnung bzw. der Gesamtergebnisrechnung betrifft, sind Sicherungsgewinne oder -verluste darin getrennt von den durch die Grundgeschäfte betroffenen Posten in einem gesonderten Posten auszuweisen. Somit bleibt dabei der Betrag in dem Posten, der sich auf das Grundgeschäft selbst bezieht (beispielsweise Umsatzerlöse oder -kosten), hiervon unberührt. 6.6.5 Bei Vermögenswerten und Verbindlichkeiten, die in einer Absicherung des beizulegenden Zeitwerts als Gruppe abgesichert werden, ist der Gewinn oder Verlust über die einzelnen Vermögenswerte und Verbindlichkeiten in der Bilanz als Anpassung des Buchwerts der betreffenden Einzelposten, aus denen sich die Gruppe zusammensetzt, gemäß Paragraph 6.5.8(b) zu erfassen. Null-Nettopositionen 6.6.6 Handelt es sich bei dem Grundgeschäft um eine Gruppe, die eine Null-Nettoposition darstellt (d. h. das auf Gruppenbasis gesteuerte Risiko wird durch die Geschäfte selbst vollständig kompensiert), kann ein Unternehmen diese in einer Sicherungsbeziehung ohne Sicherungsinstrument designieren, vorausgesetzt a) die Absicherung ist Teil einer Strategie zur revolvierenden Absicherung des Nettorisikos, wobei das Unternehmen neue Positionen gleicher Art im Zeitverlauf routinemäßig absichert (beispielsweise wenn Transaktionen den vom Unternehmen abgesicherten Zeithorizont erreichen), b) der Umfang der abgesicherten Nettoposition ändert sich während der Laufzeit der Strategie zur revolvierenden Absicherung des Nettorisikos und das Unternehmen sichert das Nettorisiko unter Anwendung infrage kommender Sicherungsinstrumente ab (d. h. wenn die Nettoposition ungleich null ist), c) die Bilanzierung von Sicherungsbeziehungen wird normalerweise auf solche Nettopositionen angewandt, wenn die Nettoposition ungleich null ist und mit infrage kommenden Sicherungsinstrumenten abgesichert ist, und d) die Nichtanwendung der Bilanzierung von Sicherungsbeziehungen auf die Null-Nettoposition würde zu inkonsistenten Rechnungslegungsresultaten führen, da bei der Bilanzierung die gegenläufigen Risikopositionen nicht erfasst würden, was ansonsten bei einer Absicherung einer Nettoposition der Fall wäre. 6.7   WAHLRECHT, EINE AUSFALLRISIKOPOSITION ALS ERFOLGSWIRKSAM ZUM BEIZULEGENDEN ZEITWERT BEWERTET ZU DESIGNIEREN Ausfallrisikopositionen, die für eine Designation als erfolgswirksam zum beizulegenden Zeitwert bewertet infrage kommen 6.7.1 Wenn ein Unternehmen ein erfolgswirksam zum beizulegenden Zeitwert bewertetes Kreditderivat zur Steuerung des Ausfallrisikos eines gesamten Finanzinstruments oder eines Teils davon (Ausfallrisikoposition) einsetzt, kann es dieses Finanzinstrument, soweit es derart (d. h. insgesamt oder anteilig) gesteuert wird, als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn a) der Name bei der Ausfallrisikoposition (beispielsweise der Kreditnehmer oder der Begünstigte einer Kreditzusage) mit dem des Referenzunternehmens des Kreditderivats übereinstimmt („name matching“), und b) der Rang des Finanzinstruments mit dem der Instrumente, die gemäß dem Kreditderivat geliefert werden können, übereinstimmt. Ein Unternehmen kann diese Designation unabhängig davon vornehmen, ob das ausfallrisikogesteuerte Finanzinstrument in den Anwendungsbereich des vorliegenden Standards fällt (so kann ein Unternehmen beispielsweise nicht unter diesen Standard fallende Kreditzusagen designieren). Das Unternehmen kann dieses Finanzinstrument beim oder nach dem erstmaligen Ansatz oder während es bilanzunwirksam ist designieren. Das Unternehmen hat die Designation zeitgleich zu dokumentieren. Bilanzierung von Ausfallrisikopositionen, die als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert sind 6.7.2 Wenn ein Finanzinstrument gemäß Paragraph 6.7.1 nach dem erstmaligen Ansatz als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert wird oder zuvor bilanzunwirksam war, ist die Differenz zum Zeitpunkt der Designation zwischen einem etwaigen Buchwert und dem beizulegenden Zeitwert unverzüglich erfolgswirksam zu erfassen. Bei finanziellen Vermögenswerten, die gemäß Paragraph 4.1.2A zum beizulegenden Zeitwert erfolgsneutral im sonstigen Ergebnis bewertet werden, ist der kumulierte Gewinn oder Verlust, der zuvor im sonstigen Ergebnis erfasst wurde, unverzüglich als Umgliederungsbetrag (siehe IAS 1) erfolgswirksam umzugliedern. 6.7.3 Ein Unternehmen hat die erfolgswirksame Bewertung zum beizulegenden Zeitwert des Finanzinstruments, das das Ausfallrisiko verursacht hat, oder einen prozentualen Anteil eines solchen Finanzinstruments zu beenden, wenn a) die Kriterien in Paragraph 6.7.1 nicht länger erfüllt sind, beispielsweise i) das Kreditderivat oder das zugehörige Finanzinstrument, das das Ausfallrisiko verursacht, ausläuft oder veräußert, beendet oder erfüllt wird, oder ii) das Ausfallrisiko des Finanzinstruments nicht länger über Kreditderivate gesteuert wird. Dies könnte beispielsweise aufgrund von Verbesserungen der Bonität des Kreditnehmers oder des Begünstigten einer Kreditzusage oder Änderungen der einem Unternehmen auferlegten Kapitalanforderungen eintreten, und b) das Finanzinstrument, das das Ausfallrisiko verursacht, nicht anderweitig erfolgswirksam zum beizulegenden Zeitwert zu bewerten ist (d. h. beim Geschäftsmodell des Unternehmens ist zwischenzeitlich keine Änderung eingetreten, die eine Umgliederung gemäß Paragraph 4.4.1 erfordert hätte). 6.7.4 Wenn ein Unternehmen die erfolgswirksame Bewertung zum beizulegenden Zeitwert des Finanzinstruments, das das Ausfallrisiko verursacht, oder eines prozentualen Anteils eines solchen Finanzinstruments beendet, wird der beizulegende Zeitwert des Finanzinstruments zum Zeitpunkt der Beendigung zu seinem neuen Buchwert. Anschließend ist die gleiche Bewertung anzuwenden, die vor der Designation des Finanzinstruments zur erfolgswirksamen Bewertung zum beizulegenden Zeitwert verwendet wurde (einschließlich der aus dem neuen Buchwert resultierenden Amortisation). Beispielsweise würde ein finanzieller Vermögenswert, der ursprünglich als zu fortgeführten Anschaffungskosten bewertet eingestuft war, wieder auf diese Weise bewertet und sein Effektivzinssatz basierend auf seinem neuen Bruttobuchwert zum Zeitpunkt der Beendigung der erfolgswirksamen Bewertung zum beizulegenden Zeitwert neu berechnet werden. 6.8   VORÜBERGEHENDE AUSNAHMEN VON DER ANWENDUNG SPEZIELLER VORSCHRIFTEN FÜR DIE BILANZIERUNG VON SICHERUNGSBEZIEHUNGEN 6.8.1 Die Paragraphen 6.8.4–6.8.12 und die Paragraphen 7.1.8 und 7.2.26(d) sind auf alle Sicherungsbeziehungen anzuwenden, die von der Reform der Referenzzinssätze unmittelbar betroffen sind. Diese Paragraphen gelten ausschließlich für Sicherungsbeziehungen der genannten Art. Eine Sicherungsbeziehung ist nur dann unmittelbar von der Reform der Referenzzinssätze betroffen, wenn die Reform Unsicherheiten in Bezug auf Folgendes aufwirft: a) den als abgesichertes Risiko designierten (vertraglich oder nicht vertraglich spezifizierten) Referenzzinssatz und/oder b) den Zeitpunkt oder die Höhe referenzzinssatzbasierter Zahlungsströme aus dem Grundgeschäft oder dem Sicherungsinstrument. 6.8.2 Für die Anwendung der Paragraphen 6.8.4–6.8.12 bezeichnet „Reform der Referenzzinssätze“ die marktweite Reform eines Referenzzinssatzes, einschließlich seiner Ablösung durch einen alternativen Referenzsatz, wie sie sich aus den Empfehlungen im Bericht des Finanzstabilitätsrates „Reforming Major Interest Rate Benchmarks“ vom Juli 2014 (51) ergibt. 6.8.3 Die in den Paragraphen 6.8.4–6.8.12 vorgesehenen Ausnahmen gelten nur für die dort genannten Vorschriften. Alle anderen Vorschriften für die Bilanzierung von Sicherungsbeziehungen sind vom Unternehmen auch weiterhin auf die von der Reform der Referenzzinssätze unmittelbar betroffenen Sicherungsbeziehungen anzuwenden. Anforderung einer „hohen Wahrscheinlichkeit“ bei der Absicherung von Zahlungsströmen 6.8.4 Zwecks Beurteilung, ob eine erwartete Transaktion (oder eine Komponente derselben) gemäß der Anforderung des Paragraphen 6.3.3 hochwahrscheinlich ist, hat ein Unternehmen anzunehmen, dass sich der (vertraglich oder nicht vertraglich spezifizierte) Referenzzinssatz, auf dem die abgesicherten Zahlungsströme beruhen, durch die Reform der Referenzzinssätze nicht verändert. Umgliederung des in der Rücklage für die Absicherung von Zahlungsströmen kumulierten Betrags 6.8.5 Für die Anwendung der Vorschriften des Paragraphen 6.5.12 hat ein Unternehmen bei der Beurteilung, ob zu erwarten ist, dass die abgesicherten künftigen Zahlungsströme eintreten, anzunehmen, dass sich der (vertraglich oder nicht vertraglich spezifizierte) Referenzzinssatz, auf dem die abgesicherten Zahlungsströme beruhen, durch die Reform der Referenzzinssätze nicht verändert. Beurteilung der wirtschaftlichen Beziehung zwischen dem Grundgeschäft und dem Sicherungsinstrument 6.8.6 Für die Anwendung der Vorschriften der Paragraphen 6.4.1(c)(i) und B6.4.4–B6.4.6 hat ein Unternehmen anzunehmen, dass sich der (vertraglich oder nicht vertraglich spezifizierte) Referenzzinssatz, auf dem die abgesicherten Zahlungsströme und/oder das abgesicherte Risiko beruhen, oder der Referenzzinssatz, auf dem die Zahlungsströme des Sicherungsinstruments beruhen, durch die Reform der Referenzzinssätze nicht verändert. Designation einer Geschäftskomponente als Grundgeschäft 6.8.7 Sofern nicht Paragraph 6.8.8 gilt, hat ein Unternehmen bei der Absicherung einer Komponente des Zinsänderungsrisikos bei einem nicht vertraglich spezifizierten Referenzzinssatz die Vorgabe der Paragraphen 6.3.7(a) und B6.3.8 (wonach die Risikokomponente einzeln identifizierbar sein muss) nur zu Beginn der Sicherungsbeziehung anzuwenden. 6.8.8 Wenn ein Unternehmen entsprechend seiner Sicherungsdokumentation eine Sicherungsbeziehung häufig erneuert (d. h. beendet und neu beginnt), da sich sowohl das Sicherungsinstrument als auch das Grundgeschäft häufig ändern (d. h. das Unternehmen einen dynamischen Prozess anwendet, bei dem sowohl die Grundgeschäfte als auch die zur Steuerung dieses Risikos eingesetzten Sicherungsinstrumente nicht lange gleich bleiben), muss es die Vorschrift der Paragraphen 6.3.7(a) und B6.3.8 (wonach die Risikokomponente einzeln identifizierbar sein muss) nur bei der erstmaligen Designation eines Grundgeschäfts in dieser Sicherungsbeziehung erfüllen. Wurde ein Grundgeschäft bei seiner erstmaligen Designation in einer Sicherungsbeziehung einer Beurteilung unterzogen, so muss es unabhängig davon, ob diese Beurteilung zu Beginn der Sicherungsbeziehung oder danach erfolgte, bei einer neuerlichen Designation innerhalb derselben Sicherungsbeziehung nicht erneut beurteilt werden. Ende der Anwendung 6.8.9 Ein Unternehmen hat die Anwendung des Paragraphen 6.8.4 auf ein Grundgeschäft prospektiv zum früheren der nachstehend genannten Termine einzustellen: a) wenn die durch die Reform der Referenzzinssätze bedingte Unsicherheit, was den Zeitpunkt und die Höhe der referenzzinssatzbasierten Zahlungsströme aus dem Grundgeschäft angeht, nicht mehr besteht und b) wenn die Sicherungsbeziehung, zu der das Grundgeschäft gehört, beendet wird. 6.8.10 Ein Unternehmen hat die Anwendung des Paragraphen 6.8.5 prospektiv zum früheren der nachstehend genannten Termine einzustellen: a) wenn die durch die Reform der Referenzzinssätze bedingte Unsicherheit, was den Zeitpunkt und die Höhe der referenzzinssatzbasierten künftigen Zahlungsströme aus dem Grundgeschäft angeht, nicht mehr besteht und b) wenn der für diese beendete Sicherungsbeziehung in der Rücklage für die Absicherung von Zahlungsströmen kumulierte Betrag in voller Höhe erfolgswirksam umgegliedert wurde. 6.8.11 Ein Unternehmen hat die Anwendung des Paragraphen 6.8.6 in folgenden Fällen prospektiv einzustellen: a) bei einem Grundgeschäft, wenn die durch die Reform der Referenzzinssätze bedingte Unsicherheit, was das abgesicherte Risiko oder den Zeitpunkt und die Höhe der referenzzinssatzbasierten Zahlungsströme aus dem Grundgeschäft angeht, nicht mehr besteht und b) bei einem Sicherungsinstrument, wenn die durch die Reform der Referenzzinssätze bedingte Unsicherheit, was den Zeitpunkt und die Höhe der referenzzinssatzbasierten Zahlungsströme aus dem Sicherungsinstrument angeht, nicht mehr besteht. Wenn die Sicherungsbeziehung, zu der das Grundgeschäft und das Sicherungsinstrument gehören, vor dem in Paragraph 6.8.11(a) oder dem in Paragraph 6.8.11(b) genannten Datum beendet wird, hat das Unternehmen die Anwendung des Paragraphen 6.8.6 auf diese Sicherungsbeziehung zum Zeitpunkt der Beendigung prospektiv einzustellen. 6.8.12 Wenn ein Unternehmen eine Gruppe von Geschäften als Grundgeschäft oder eine Kombination von Finanzinstrumenten als Sicherungsinstrument designiert, hat es die Anwendung der Paragraphen 6.8.4–6.8.6 auf ein einzelnes Geschäft oder Finanzinstrument gemäß den Paragraphen 6.8.9, 6.8.10 oder 6.8.11 – je nachdem, welcher im Einzelfall relevant ist – einzustellen, wenn die durch die Reform der Referenzzinssätze bedingte Unsicherheit, was das abgesicherte Risiko und/oder den Zeitpunkt und die Höhe der referenzzinssatzbasierten Zahlungsströme aus diesem Geschäft oder Finanzinstrument angeht, nicht mehr besteht. 6.8.13 Ein Unternehmen hat die Anwendung der Paragraphen 6.8.7 und 6.8.8 prospektiv zum früheren der nachstehend genannten Termine einzustellen: a) wenn in Anwendung von Paragraph 6.9.1 infolge der Reform der Referenzzinssätze erforderliche Änderungen an der nicht vertraglich spezifizierten Risikokomponente vorgenommen werden oder b) wenn die Sicherungsbeziehung, in der die nicht vertraglich spezifizierte Risikokomponente designiert ist, beendet wird. 6.9   WEITERE DURCH DIE REFORM DER REFERENZZINSSÄTZE BEDINGTE VORÜBERGEHENDE AUSNAHMEN 6.9.1 Sobald die in den Paragraphen 6.8.4–6.8.8 aufgestellten Voraussetzungen auf eine Sicherungsbeziehung nicht mehr anwendbar sind (siehe die Paragraphen 6.8.9–6.8.13), hat ein Unternehmen die formale Designation der jeweiligen Sicherungsbeziehung in der zuvor dokumentierten Weise anzupassen, um den aufgrund der Reform der Referenzzinssätze erforderlichen Änderungen Rechnung zu tragen, d. h. die Änderungen stehen mit den Bestimmungen der Paragraphen 5.4.6–5.4.8 in Einklang. In diesem Zusammenhang ist die Designation der Sicherungsbeziehung nur anzupassen, wenn eine oder mehrere der folgenden Änderungen vorgenommen werden: a) eine Designation eines alternativen (vertraglich oder nicht vertraglich spezifizierten) Referenzzinssatzes als abgesichertes Risiko, b) eine Anpassung der Beschreibung des Grundgeschäfts, einschließlich der Beschreibung des designierten Teils der abgesicherten Zahlungsströme oder des abgesicherten beizulegenden Zeitwerts, oder c) eine Anpassung der Beschreibung des Sicherungsinstruments. 6.9.2 Ein Unternehmen hat die Bestimmungen des Paragraphen 6.9.1(c) auch anzuwenden, wenn die folgenden drei Bedingungen erfüllt sind: a) das Unternehmen nimmt eine aufgrund der Reform der Referenzzinssätze erforderliche Änderung auf andere Weise vor als durch eine Änderung der Basis für die Ermittlung der vertraglichen Zahlungsströme aus dem Sicherungsinstrument (wie in Paragraph 5.4.6 beschrieben), b) das ursprüngliche Sicherungsinstrument wird nicht ausgebucht und c) die gewählte Vorgehensweise ist wirtschaftlich gleichwertig mit einer Änderung der Basis für die Ermittlung der vertraglichen Zahlungsströme aus dem ursprünglichen Sicherungsinstrument (wie in den Paragraphen 5.4.7 und 5.4.8 beschrieben). 6.9.3 Die in den Paragraphen 6.8.4–6.8.8 aufgestellten Voraussetzungen können zu unterschiedlichen Zeitpunkten nicht mehr anwendbar sein. Daher kann ein Unternehmen nach Paragraph 6.9.1 verpflichtet sein, die formale Designation seiner Sicherungsbeziehungen zu unterschiedlichen Zeitpunkten anzupassen oder die formale Designation einer Sicherungsbeziehung mehr als einmal anzupassen. Nur dann, wenn eine solche Änderung an der Designation der Sicherungsbeziehung vorgenommen wird, hat ein Unternehmen je nach Fall die Paragraphen 6.9.7–6.9.12 anzuwenden. Ein Unternehmen hat zudem Paragraph 6.5.8 (bei einer Absicherung des beizulegenden Zeitwerts) oder Paragraph 6.5.11 (bei einer Absicherung von Zahlungsströmen) anzuwenden, um etwaige Änderungen des beizulegenden Zeitwerts des Grundgeschäfts oder des Sicherungsinstruments zu bilanzieren. 6.9.4 Ein Unternehmen hat eine Sicherungsbeziehung gemäß Paragraph 6.9.1 bis zum Ende jener Berichtsperiode anzupassen, in der eine aufgrund der Reform der Referenzzinssätze erforderliche Änderung des abgesicherten Risikos, des Grundgeschäfts oder des Sicherungsinstruments vorgenommen wird. Eine solche Anpassung der formalen Designation einer Sicherungsbeziehung stellt weder eine Beendigung der Sicherungsbeziehung noch eine Designation einer neuen Sicherungsbeziehung dar. 6.9.5 Werden zusätzlich zu den aufgrund der Reform der Referenzzinssätze erforderlichen Änderungen weitere Änderungen an dem/der in einer Sicherungsbeziehung designierten finanziellen Vermögenswert oder finanziellen Verbindlichkeit (wie in den Paragraphen 5.4.6–5.4.8 beschrieben) oder an der Designation der Sicherungsbeziehung (gemäß Paragraph 6.9.1) vorgenommen, so hat ein Unternehmen zunächst die geltenden Anforderungen dieses Standards anzuwenden, um zu ermitteln, ob diese zusätzlichen Änderungen die Beendigung der Bilanzierung von Sicherungsbeziehungen bewirken. Führen die zusätzlichen Änderungen nicht zur Beendigung der Bilanzierung von Sicherungsbeziehungen, hat ein Unternehmen die formale Designation der Sicherungsbeziehung gemäß Paragraph 6.9.1 anzupassen. 6.9.6 Die in den Paragraphen 6.9.7–6.9.13 vorgesehenen Ausnahmen gelten nur für die dort genannten Anforderungen. Ein Unternehmen hat auf Sicherungsbeziehungen, die von der Reform der Referenzzinssätze unmittelbar betroffen sind, alle anderen in diesem Standard enthaltenen Vorschriften zur Bilanzierung von Sicherungsbeziehungen anzuwenden, einschließlich der in Paragraph 6.4.1 genannten Kriterien. Bilanzierung qualifizierender Sicherungsbeziehungen Absicherung von Zahlungsströmen 6.9.7 Für die Anwendung des Paragraphen 6.5.11 wird zu dem Zeitpunkt, zu dem ein Unternehmen die Beschreibung eines Grundgeschäfts gemäß Paragraph 6.9.1(b) anpasst, unterstellt, dass der in der Rücklage für die Absicherung von Zahlungsströmen erfasste kumulierte Betrag auf dem alternativen Referenzzinssatz basiert, anhand dessen die abgesicherten künftigen Zahlungsströme ermittelt werden. 6.9.8 Wird bei einer beendeten Sicherungsbeziehung der Referenzzinssatz, auf dem die abgesicherten künftigen Zahlungsströme basierten, entsprechend den Anforderungen der Reform der Referenzzinssätze geändert, so wird für die Anwendung des Paragraphen 6.5.12 hinsichtlich der Feststellung, ob mit dem Eintreten der abgesicherten künftigen Zahlungsströme zu rechnen ist, unterstellt, dass der in der Rücklage für die Absicherung von Zahlungsströmen für die jeweilige Sicherungsbeziehung erfasste kumulierte Betrag auf dem alternativen Referenzzinssatz basiert, auf dem die abgesicherten künftigen Zahlungsströme beruhen werden. Gruppen von Geschäften 6.9.9 Wendet ein Unternehmen Paragraph 6.9.1 auf Gruppen von Geschäften an, die bei einer Absicherung des beizulegenden Zeitwerts oder bei einer Absicherung von Zahlungsströmen als Grundgeschäfte designiert werden, hat es die Geschäfte auf Basis des abgesicherten Referenzzinssatzes Untergruppen zuzuordnen und für jede Untergruppe den Referenzzinssatz als abgesichertes Risiko zu designieren. Bei einer Sicherungsbeziehung, bei der eine Gruppe von Geschäften gegen Änderungen eines von der Reform der Referenzzinssätze betroffenen Referenzzinssatzes abgesichert wird, könnten zum Beispiel die abgesicherten Zahlungsströme oder der abgesicherte beizulegende Zeitwert einiger Geschäfte der Gruppe auf einen alternativen Referenzzinssatz umgestellt werden, bevor dies bei anderen Geschäften der Gruppe der Fall ist. In diesem Beispiel würde das Unternehmen in Anwendung des Paragraphen 6.9.1 den alternativen Referenzzinssatz als abgesichertes Risiko für diese relevante Grundgeschäftsuntergruppe designieren. Für die andere Grundgeschäftsuntergruppe würde das Unternehmen weiterhin den geltenden Referenzzinssatz als abgesichertes Risiko designieren, bis die abgesicherten Zahlungsströme oder der abgesicherte beizulegende Zeitwert dieser Geschäfte auf den alternativen Referenzzinssatz umgestellt werden oder die Geschäfte auslaufen und durch Geschäfte ersetzt werden, denen der alternative Referenzzinssatz zugrunde liegt. 6.9.10 Ein Unternehmen hat für jede Untergruppe separat zu beurteilen, ob sie die in Paragraph 6.6.1 genannten Anforderungen an ein Grundgeschäft erfüllt. Erfüllt eine Untergruppe die Anforderungen des Paragraphen 6.6.1 nicht, hat das Unternehmen die Bilanzierung von Sicherungsbeziehungen prospektiv für die Sicherungsbeziehung in ihrer Gesamtheit einzustellen. Ein Unternehmen hat auch die Vorschriften der Paragraphen 6.5.8 und 6.5.11 anzuwenden, um eine Unwirksamkeit hinsichtlich der Sicherungsbeziehung in ihrer Gesamtheit zu bilanzieren. Designation von Risikokomponenten 6.9.11 Ein alternativer Referenzzinssatz, der als nicht vertraglich spezifizierte Risikokomponente designiert und zum Zeitpunkt der Designation nicht einzeln identifizierbar ist (siehe die Paragraphen 6.3.7(a) und B6.3.8), wird nur dann als zu diesem Zeitpunkt separat identifizierbar unterstellt, wenn das Unternehmen angemessenerweise davon ausgehen kann, dass der alternative Referenzzinssatz innerhalb eines Zeitraums von 24 Monaten ab dem Zeitpunkt der Designation als Risikokomponente einzeln identifizierbar sein wird. Der Zeitraum von 24 Monaten gilt gesondert für jeden alternativen Referenzzinssatz und beginnt ab dem Zeitpunkt, an dem das Unternehmen den jeweiligen alternativen Referenzzinssatz erstmals als nicht vertraglich spezifizierte Risikokomponente designiert hat (d. h. der 24-Monats-Zeitraum gilt eigenständig für jeden Zinssatz). 6.9.12 Wenn ein Unternehmen zu einem späteren Zeitpunkt angemessenerweise davon ausgehen muss, dass der alternative Referenzzinssatz innerhalb von 24 Monaten ab dem Zeitpunkt, zu dem das Unternehmen ihn erstmals als nicht vertraglich spezifizierte Risikokomponente designiert hat, nicht einzeln identifizierbar sein wird, hat es die Anwendung der in Paragraph 6.9.11 genannten Anforderung auf diesen alternativen Referenzzinssatz zu beenden und die Bilanzierung von Sicherungsbeziehungen ab dem Zeitpunkt dieser erneuten Einschätzung für alle Sicherungsbeziehungen, bei denen der alternative Referenzzinssatz als nicht vertraglich spezifizierte Risikokomponente designiert wurde, prospektiv einzustellen. 6.9.13 Zusätzlich zu den in Paragraph 6.9.1 genannten Sicherungsbeziehungen hat ein Unternehmen die Vorschriften der Paragraphen 6.9.11 und 6.9.12 auf neue Sicherungsbeziehungen anzuwenden, bei denen ein alternativer Referenzzinssatz als nicht vertraglich spezifizierte Risikokomponente designiert wird (siehe die Paragraphen 6.3.7(a) und B6.3.8), wenn die jeweilige Risikokomponente aufgrund der Reform der Referenzzinssätze zum Zeitpunkt ihrer Designation nicht einzeln identifizierbar ist. KAPITEL 7   Zeitpunkt des Inkrafttretens und Übergangsvorschriften 7.1   ZEITPUNKT DES INKRAFTTRETENS 7.1.1 Dieser Standard ist auf Geschäftsjahre anzuwenden, die am oder nach dem 1. Januar 2018 beginnen. Eine frühere Anwendung ist zulässig. Wendet ein Unternehmen diesen Standard früher an, hat es dies anzugeben und alle Vorschriften des Standards gleichzeitig anzuwenden (siehe jedoch auch Paragraphen 7.1.2, 7.2.21 und 7.3.2). Ferner hat es gleichzeitig die in Anhang C aufgeführten Änderungen anzuwenden. 7.1.2 Ungeachtet der Vorschriften in Paragraph 7.1.1 kann ein Unternehmen für vor dem 1. Januar 2018 beginnende Geschäftsjahre nur die Vorschriften zur Darstellung der Gewinne und Verluste aus finanziellen Verbindlichkeiten, die als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert sind, in den Paragraphen 5.7.1(c), 5.7.7–5.7.9, 7.2.14 und B5.7.5–B5.7.20 früher anwenden, ohne die anderen Vorschriften dieses Standards anzuwenden. Wendet ein Unternehmen nur diese Paragraphen an, hat es dies anzugeben und die zugehörigen Angaben gemäß den Paragraphen 10 und 11 von IFRS 7 Finanzinstrumente: Angaben (in der durch IFRS 9 (2010) geänderten Fassung) fortlaufend zu machen. (Siehe auch Paragraphen 7.2.2 und 7.2.15.) 7.1.3 Durch die Jährlichen Verbesserungen an den IFRS, Zyklus 2010–2012, veröffentlicht im Dezember 2013, wurden die Paragraphen 4.2.1 und 5.7.5 als Folge der Änderung von IFRS 3 geändert. Ein Unternehmen hat diese Änderung prospektiv auf Unternehmenszusammenschlüsse anzuwenden, für die die Änderung von IFRS 3 gilt. 7.1.4 Durch IFRS 15, veröffentlicht im Mai 2014, wurden die Paragraphen 3.1.1, 4.2.1, 5.1.1, 5.2.1, 5.7.6, B3.2.13, B5.7.1, C5 und C42 geändert und Paragraph C16 sowie die zugehörige Überschrift gestrichen. Es wurden die Paragraphen 5.1.3 und 5.7.1A sowie eine Definition in Anhang A eingefügt. Wendet ein Unternehmen IFRS 15 an, sind diese Änderungen ebenfalls anzuwenden. 7.1.5 Durch IFRS 16, veröffentlicht im Januar 2016, wurden die Paragraphen 2.1, 5.5.15, B4.3.8, B5.5.34 und B5.5.46 geändert. Wendet ein Unternehmen IFRS 16 an, sind diese Änderungen ebenfalls anzuwenden. 7.1.6 Durch IFRS 17, veröffentlicht im Mai 2017, wurden die Paragraphen 2.1, B2.1, B2.4, B2.5 und B4.1.30 geändert und Paragraph 3.3.5 eingefügt. Durch Änderungen an IFRS 17, veröffentlicht im Juni 2020, wurde Paragraph 2.1 weiter geändert und wurden die Paragraphen 7.2.36–7.2.42 eingefügt. Wendet ein Unternehmen IFRS 17 an, sind diese Änderungen ebenfalls anzuwenden. 7.1.7 Durch Vorfälligkeitsregelungen mit negativer Ausgleichsleistung (Änderungen an IFRS 9), veröffentlicht im Oktober 2017, wurden die Paragraphen 7.2.29–7.2.34 und B4.1.12A eingefügt und die Paragraphen B4.1.11(b) und B4.1.12(b) geändert. Diese Änderungen sind auf Geschäftsjahre anzuwenden, die am oder nach dem 1. Januar 2019 beginnen. Eine frühere Anwendung ist zulässig. Wendet ein Unternehmen diese Änderungen auf ein früheres Geschäftsjahr an, hat es dies anzugeben. 7.1.8 Durch Reform der Referenzzinssätze (Änderungen an IFRS 9, IAS 39 und IFRS 7), veröffentlicht im September 2019, wurde Abschnitt 6.8 eingefügt und Paragraph 7.2.26 geändert. Diese Änderungen sind auf Geschäftsjahre anzuwenden, die am oder nach dem 1. Januar 2020 beginnen. Eine frühere Anwendung ist zulässig. Wendet ein Unternehmen diese Änderungen auf ein früheres Geschäftsjahr an, hat es dies anzugeben. 7.1.9 Durch Jährliche Verbesserungen an den IFRS, Zyklus 2018–2020, veröffentlicht im Mai 2020, wurden die Paragraphen 7.2.35 und B3.3.6A eingefügt und Paragraph B3.3.6 geändert. Diese Änderung ist auf Geschäftsjahre anzuwenden, die am oder nach dem 1. Januar 2022 beginnen. Eine frühere Anwendung ist zulässig. Wendet ein Unternehmen die Änderung auf ein früheres Geschäftsjahr an, hat es dies anzugeben. 7.1.10 Durch die im August 2020 herausgegebene Verlautbarung Reform der Referenzzinsätze - Phase 2, mit der IFRS 9, IAS 39, IFRS 7, IFRS 4 und IFRS 16 geändert wurden, wurden die Paragraphen 5.4.5–5.4.9, 6.8.13, Abschnitt 6.9 und die Paragraphen 7.2.43–7.2.46 eingefügt. Diese Änderungen sind auf Geschäftsjahre anzuwenden, die am oder nach dem 1. Januar 2021 beginnen. Eine frühere Anwendung ist zulässig. Wendet ein Unternehmen diese Änderungen auf ein früheres Geschäftsjahr an, hat es dies anzugeben. 7.2   ÜBERGANGSVORSCHRIFTEN 7.2.1 Dieser Standard ist rückwirkend gemäß IAS 8 Rechnungslegungsmethoden, Änderungen von rechnungslegungsbezogenen Schätzungen und Fehler anzuwenden. Hiervon ausgenommen sind die in den Paragraphen 7.2.4–7.2.26 und 7.2.28 genannten Fälle. Er gilt nicht für Posten, die bereits zum Zeitpunkt der erstmaligen Anwendung ausgebucht wurden. 7.2.2 Für die Zwecke der Übergangsvorschriften in den Paragraphen 7.2.1, 7.2.3–7.2.28 und 7.3.2 ist der Zeitpunkt der erstmaligen Anwendung der Tag, an dem ein Unternehmen zum ersten Mal die Vorschriften dieses Standards anwendet. Hierbei muss es sich um den Beginn einer Berichtsperiode nach der Herausgabe dieses Standards handeln. In Abhängigkeit von dem Ansatz, den das Unternehmen für die Anwendung von IFRS 9 gewählt hat, kann der Übergang mit einem oder mehreren Zeitpunkten der erstmaligen Anwendung für verschiedene Vorschriften verbunden sein. Übergangsvorschriften für die Einstufung und Bewertung (Kapitel 4 und 5) 7.2.3 Ein Unternehmen hat zum Zeitpunkt der erstmaligen Anwendung auf Grundlage der zu diesem Zeitpunkt bestehenden Fakten und Umstände zu beurteilen, ob ein finanzieller Vermögenswert die in den Paragraphen 4.1.2(a) oder 4.1.2A(a) genannten Bedingungen erfüllt. Die sich daraus ergebende Einstufung ist unabhängig vom Geschäftsmodell des Unternehmens in früheren Berichtsperioden rückwirkend anzuwenden. 7.2.4 Ist es für ein Unternehmen zum Zeitpunkt der erstmaligen Anwendung undurchführbar (im Sinne von IAS 8), den geänderten Zeitwert des Geldes gemäß den Paragraphen B4.1.9B–B4.1.9D auf Grundlage der beim erstmaligen Ansatz des finanziellen Vermögenswerts bestehenden Tatsachen und Umstände zu beurteilen, hat es die Eigenschaften der vertraglichen Zahlungsströme aus diesem finanziellen Vermögenswert auf Grundlage der beim erstmaligen Ansatz dieses finanziellen Vermögenswerts bestehenden Tatsachen und Umstände zu beurteilen, ohne die Vorschriften in Bezug auf die Änderung des Zeitwerts des Geldes gemäß den Paragraphen B4.1.9B–B4.1.9D zu berücksichtigen. (Siehe auch Paragraph 42R von IFRS 7.) 7.2.5 Ist es für ein Unternehmen zum Zeitpunkt der erstmaligen Anwendung undurchführbar (im Sinne von IAS 8) zu beurteilen, ob der beizulegende Zeitwert einer Vorfälligkeitsregelung gemäß Paragraph B4.1.12(c) auf Grundlage der beim erstmaligen Ansatz des finanziellen Vermögenswerts bestehenden Tatsachen und Umstände nicht signifikant war, hat es die Eigenschaften der vertraglichen Zahlungsströme aus diesem finanziellen Vermögenswert auf Grundlage der beim erstmaligen Ansatz des finanziellen Vermögenswerts bestehenden Tatsachen und Umstände zu beurteilen, ohne die Ausnahme in Bezug auf Vorfälligkeitsregelungen in Paragraph B4.1.12 zu berücksichtigen. (Siehe auch Paragraph 42S von IFRS 7.) 7.2.6 Wenn ein Unternehmen einen hybriden Vertrag gemäß den Paragraphen 4.1.2A, 4.1.4 oder 4.1.5 zum beizulegenden Zeitwert bewertet, der beizulegende Zeitwert des hybriden Vertrags in Vergleichsperioden jedoch nicht ermittelt wurde, entspricht der beizulegende Zeitwert des hybriden Vertrags in den Vergleichsperioden der Summe der beizulegenden Zeitwerte seiner Komponenten (d. h. des nicht derivativen Basisvertrags und des eingebetteten Derivats) am Ende der jeweiligen Vergleichsperiode, sofern das Unternehmen vorherige Perioden anpasst (siehe Paragraph 7.2.15). 7.2.7 Hat ein Unternehmen Paragraph 7.2.6 angewandt, hat es zum Zeitpunkt der erstmaligen Anwendung eine etwaige Differenz zwischen dem beizulegenden Zeitwert des gesamten hybriden Vertrags zum Zeitpunkt der erstmaligen Anwendung und der Summe der beizulegenden Zeitwerte seiner Komponenten zum Zeitpunkt der erstmaligen Anwendung im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) der Berichtsperiode zu erfassen, in die der Zeitpunkt der erstmaligen Anwendung fällt. 7.2.8 Zum Zeitpunkt der erstmaligen Anwendung kann ein Unternehmen a) einen finanziellen Vermögenswert gemäß Paragraph 4.1.5 als erfolgswirksam zum beizulegenden Zeitwert bewertet oder b) eine Finanzinvestition in ein Eigenkapitalinstrument gemäß Paragraph 5.7.5 als zum beizulegenden Zeitwert erfolgsneutral im sonstigen Ergebnis bewertet designieren. Eine solche Designation ist auf Grundlage der zum Zeitpunkt der erstmaligen Anwendung bestehenden Tatsachen und Umstände vorzunehmen. Sie ist rückwirkend anzuwenden. 7.2.9 Zum Zeitpunkt der erstmaligen Anwendung a) muss ein Unternehmen eine frühere Designation eines finanziellen Vermögenswerts als erfolgswirksam zum beizulegenden Zeitwert bewertet aufheben, sofern dieser finanzielle Vermögenswert die Bedingung in Paragraph 4.1.5 nicht erfüllt. b) kann ein Unternehmen eine frühere Designation eines finanziellen Vermögenswerts als erfolgswirksam zum beizulegenden Zeitwert bewertet aufheben, sofern dieser finanzielle Vermögenswert die Bedingung in Paragraph 4.1.5 erfüllt. Eine solche Aufhebung ist auf Grundlage der zum Zeitpunkt der erstmaligen Anwendung bestehenden Tatsachen und Umstände vorzunehmen. Sie ist rückwirkend anzuwenden. 7.2.10 Zum Zeitpunkt der erstmaligen Anwendung a) kann ein Unternehmen eine finanzielle Verbindlichkeit gemäß Paragraph 4.2.2(a) als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren. b) muss ein Unternehmen eine frühere Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet aufheben, wenn diese Designation beim erstmaligen Ansatz gemäß der jetzt in Paragraph 4.2.2(a) enthaltenen Bedingung vorgenommen wurde und sie zum Zeitpunkt der erstmaligen Anwendung diese Bedingung nicht mehr erfüllt. c) kann ein Unternehmen eine frühere Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet aufheben, wenn diese Designation beim erstmaligen Ansatz gemäß der jetzt in Paragraph 4.2.2(a) enthaltenen Bedingung vorgenommen wurde und sie zum Zeitpunkt der erstmaligen Anwendung diese Bedingung erfüllt. Eine solche Designation bzw. die Aufhebung einer Designation hat auf Grundlage der zum Zeitpunkt der erstmaligen Anwendung bestehenden Fakten und Umstände zu erfolgen. Sie ist rückwirkend anzuwenden. 7.2.11 Wenn es für ein Unternehmen undurchführbar (im Sinne von IAS 8) ist, die Effektivzinsmethode rückwirkend anzuwenden, hat es a) den beizulegenden Zeitwert des finanziellen Vermögenswerts oder der finanziellen Verbindlichkeit am Ende der jeweiligen Vergleichsperiode als Bruttobuchwert dieses finanziellen Vermögenswerts oder als fortgeführte Anschaffungskosten dieser finanziellen Verbindlichkeit anzusetzen, wenn es frühere Perioden anpasst, und b) den beizulegenden Zeitwert des finanziellen Vermögenswerts oder der finanziellen Verbindlichkeit zum Zeitpunkt der erstmaligen Anwendung als neuen Bruttobuchwert dieses finanziellen Vermögenswerts oder als neue fortgeführte Anschaffungskosten dieser finanziellen Verbindlichkeit zum Zeitpunkt der erstmaligen Anwendung des vorliegenden Standards anzusetzen. 7.2.12 Hat ein Unternehmen eine Finanzinvestition in ein Eigenkapitalinstrument, das keinen an einem aktiven Markt notierten Preis für ein identisches Instrument (d. h. einen Eingangsparameter der Stufe 1) hat (oder einen derivativen Vermögenswert, der mit einem solchen Eigenkapitalinstrument verbunden ist und durch Lieferung eines solchen erfüllt werden muss), bisher gemäß IAS 39 zu fortgeführten Anschaffungskosten bilanziert, hat es dieses Instrument zum Zeitpunkt der erstmaligen Anwendung zum beizulegenden Zeitwert zu bewerten. Eine etwaige Differenz zwischen dem früheren Buchwert und dem beizulegenden Zeitwert ist im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) der Berichtsperiode zu erfassen, in die der Zeitpunkt der erstmaligen Anwendung fällt. 7.2.13 Hat ein Unternehmen eine derivative Verbindlichkeit, die mit einem Eigenkapitalinstrument verbunden ist, das keinen an einem aktiven Markt notierten Preis für ein identisches Instrument (d. h. einen Eingangsparameter der Stufe 1) hat, und die durch Lieferung eines solchen erfüllt werden muss, bisher gemäß IAS 39 zu fortgeführten Anschaffungskosten bilanziert, hat es diese derivative Verbindlichkeit zum Zeitpunkt der erstmaligen Anwendung zum beizulegenden Zeitwert zu bewerten. Eine etwaige Differenz zwischen dem früheren Buchwert und dem beizulegenden Zeitwert ist im Eröffnungsbilanzwert der Gewinnrücklagen der Berichtsperiode zu erfassen, in die der Zeitpunkt der erstmaligen Anwendung fällt. 7.2.14 Ein Unternehmen hat zum Zeitpunkt der erstmaligen Anwendung auf Grundlage der zu diesem Zeitpunkt bestehenden Tatsachen und Umstände zu beurteilen, ob durch die Bilanzierung gemäß Paragraph 5.7.7 eine Rechnungslegungsanomalie im Gewinn oder Verlust entstehen oder vergrößert würde. Dieser Standard ist entsprechend dieser Beurteilung rückwirkend anzuwenden. 7.12.14A Ein Unternehmen darf zum Zeitpunkt der erstmaligen Anwendung Verträge, die zu diesem Zeitpunkt bestehen, gemäß Paragraph 2.5 designieren, wenn es zugleich auch alle ähnlichen Verträge designiert. Die durch eine solche Designation bedingte Änderung bei den Nettovermögenswerten ist zum Zeitpunkt der erstmaligen Anwendung in den Gewinnrücklagen zu erfassen. 7.2.15 Ungeachtet der Vorschrift in Paragraph 7.2.1 muss ein Unternehmen, das die Einstufungs- und Bewertungsvorschriften dieses Standards (einschließlich der Vorschriften zur Bewertung finanzieller Vermögenswerte zu fortgeführten Anschaffungskosten und zur Wertminderung in den Abschnitten 5.4 und 5.5) anwendet, die in den Paragraphen 42L–42O von IFRS 7 genannten Angaben machen, braucht aber frühere Perioden nicht anzupassen. Das Unternehmen darf frühere Perioden nur anpassen, wenn dabei keine nachträglichen Erkenntnisse verwendet werden müssen. Im Fall einer Nichtanpassung früherer Perioden, hat das Unternehmen eine etwaige Differenz zwischen dem früheren Buchwert und dem Buchwert zu Beginn des Geschäftsjahrs, in dem der Zeitpunkt der erstmaligen Anwendung liegt, im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) des Geschäftsjahrs zu erfassen, in das der Zeitpunkt der erstmaligen Anwendung fällt. Passt ein Unternehmen frühere Perioden jedoch an, muss der angepasste Abschluss alle Vorschriften dieses Standards widerspiegeln. Wird durch die Vorgehensweise, die ein Unternehmen für die Anwendung von IFRS 9 wählt, bewirkt, dass es für die verschiedenen Vorschriften dieses Standards mehr als einen Zeitpunkt der erstmaligen Anwendung gibt, ist dieser Paragraph zu jedem Zeitpunkt der erstmaligen Anwendung anzuwenden (siehe Paragraph 7.2.2). Dies wäre z. B. der Fall, wenn sich ein Unternehmen gemäß Paragraph 7.1.2 dafür entscheidet, nur die Vorschriften zur Darstellung von Gewinnen und Verlusten aus finanziellen Verbindlichkeiten, die als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert sind, vorzeitig und damit früher als die anderen Vorschriften dieses Standards anzuwenden. 7.2.16 Erstellt ein Unternehmen einen Zwischenbericht gemäß IAS 34 Zwischenberichterstattung, muss es die Vorschriften dieses Standards nicht auf Zwischenberichtsperioden vor dem Zeitpunkt der erstmaligen Anwendung anwenden, wenn dies undurchführbar (im Sinne von IAS 8) ist. Wertminderung (Abschnitt 5.5) 7.2.17 Die Wertminderungsvorschriften in Abschnitt 5.5 sind gemäß IAS 8 vorbehaltlich der Paragraphen 7.2.15 und 7.2.18–7.2.20 rückwirkend anzuwenden. 7.2.18 Zum Zeitpunkt der erstmaligen Anwendung hat ein Unternehmen anhand von angemessenen und belastbaren Informationen, die ohne angemessenen Kosten- oder Zeitaufwand verfügbar sind, das Ausfallrisiko zum Zeitpunkt des erstmaligen Ansatzes eines Finanzinstruments (bzw. bei Kreditzusagen und finanziellen Garantien zum Zeitpunkt, zu dem das Unternehmen Partei der unwiderruflichen Zusage gemäß Paragraph 5.5.6 wurde) zu bestimmen und mit dem Ausfallrisiko zum Zeitpunkt der erstmaligen Anwendung dieses Standards zu vergleichen. 7.2.19 Bei der Bestimmung, ob sich das Ausfallrisiko seit dem erstmaligen Ansatz signifikant erhöht hat, kann ein Unternehmen Folgendes anwenden: a) die Vorschriften der Paragraphen 5.5.10 und B5.5.22–B5.5.24 und b) bei vertraglichen Zahlungen, die mehr als 30 Tage überfällig sind, die widerlegbare Vermutung gemäß Paragraph 5.5.11, sofern das Unternehmen die Wertminderungsvorschriften durch Feststellung signifikanter Erhöhungen des Ausfallrisikos seit dem erstmaligen Ansatz für solche Finanzinstrumente anhand von Informationen zur Überfälligkeit anwendet. 7.2.20 Wenn die zum Zeitpunkt der erstmaligen Anwendung vorzunehmende Bestimmung, ob sich das Ausfallrisiko seit dem erstmaligen Ansatz signifikant erhöht hat, einen unangemessenen Kosten- oder Zeitaufwand erfordern würde, hat ein Unternehmen bis zur Ausbuchung dieses Finanzinstruments zu jedem Abschlussstichtag eine Wertberichtigung in Höhe der über die Laufzeit erwarteten Kreditverluste zu erfassen (es sei denn, bei diesem Finanzinstrument besteht zu einem Abschlussstichtag ein niedriges Ausfallrisiko, in welchem Fall Paragraph 7.2.19(a) gilt). Übergangsvorschriften für die Bilanzierung von Sicherungsbeziehungen (Kapitel 6) 7.2.21 Bei der erstmaligen Anwendung des vorliegenden Standards kann ein Unternehmen es als seine Rechnungslegungsmethode wählen, anstelle der Vorschriften des Kapitels 6 weiterhin die Vorschriften von IAS 39 zur Bilanzierung von Sicherungsbeziehungen anzuwenden. Diese Rechnungslegungsmethode hat das Unternehmen auf all seine Sicherungsbeziehungen anzuwenden. Wenn ein Unternehmen diese Rechnungslegungsmethode wählt, hat es auch IFRIC 16 Absicherung einer Nettoinvestition in einen ausländischen Geschäftsbetrieb ohne die Änderungen anzuwenden, durch die diese Interpretation an die Vorschriften in Kapitel 6 des vorliegenden Standards angepasst wird. 7.2.22 Mit Ausnahme der in Paragraph 7.2.26 genannten Fälle hat ein Unternehmen die im vorliegenden Standard enthaltenen Vorschriften zur Bilanzierung von Sicherungsbeziehungen prospektiv anzuwenden. 7.2.23 Zur Anwendung der Bilanzierung von Sicherungsbeziehungen ab dem Zeitpunkt, zu dem die in diesem Standard enthaltenen Vorschriften zur Bilanzierung von Sicherungsbeziehungen erstmals angewandt werden, müssen zu diesem Zeitpunkt alle maßgeblichen Kriterien erfüllt sein. 7.2.24 Sicherungsbeziehungen, die für die Bilanzierung von Sicherungsbeziehungen gemäß IAS 39 infrage kamen, aber auch die Kriterien für die Bilanzierung von Sicherungsbeziehungen nach dem vorliegenden Standard erfüllen (siehe Paragraph 6.4.1), sind – unter Berücksichtigung einer Rekalibrierung der Sicherungsbeziehung beim Übergang (siehe Paragraph 7.2.25(b) – als fortlaufende Sicherungsbeziehungen zu betrachten. 7.2.25 Bei der erstmaligen Anwendung der im vorliegenden Standard enthaltenen Vorschriften zur Bilanzierung von Sicherungsbeziehungen a) kann ein Unternehmen mit der Anwendung dieser Vorschriften zu dem Zeitpunkt beginnen, ab dem die Vorschriften zur Bilanzierung von Sicherungsbeziehungen gemäß IAS 39 nicht mehr angewandt werden, und b) hat ein Unternehmen die Sicherungsquote gemäß IAS 39 als Ausgangspunkt für eine ggf. erfolgende Rekalibrierung der Sicherungsquote einer fortlaufenden Sicherungsbeziehung zu berücksichtigen. Gewinne oder Verluste aus einer solchen Rekalibrierung sind erfolgswirksam zu erfassen. 7.2.26 Als Ausnahme von der prospektiven Anwendung der im vorliegenden Standard enthaltenen Vorschriften zur Bilanzierung von Sicherungsbeziehungen a) hat ein Unternehmen die Bilanzierung des Zeitwerts von Optionen gemäß Paragraph 6.5.15 rückwirkend anzuwenden, wenn gemäß IAS 39 nur die Änderung des inneren Werts einer Option als Sicherungsinstrument in einer Sicherungsbeziehung designiert wurde. Diese rückwirkende Anwendung gilt nur für solche Sicherungsbeziehungen, die zu Beginn der frühesten Vergleichsperiode bestanden oder danach designiert wurden. b) kann ein Unternehmen die Bilanzierung des Terminelements eines Termingeschäfts gemäß Paragraph 6.5.16 rückwirkend anwenden, wenn gemäß IAS 39 nur die Änderung des Kassaelements eines Termingeschäfts als Sicherungsinstrument in einer Sicherungsbeziehung designiert wurde. Diese rückwirkende Anwendung gilt nur für solche Sicherungsbeziehungen, die zu Beginn der frühesten Vergleichsperiode bestanden oder danach designiert wurden. Wenn sich ein Unternehmen darüber hinaus für die rückwirkende Anwendung dieser Bilanzierung entscheidet, ist diese auf alle für diese Wahl zulässigen Sicherungsbeziehungen anzuwenden (d. h. beim Übergang kann dies nicht für jede Sicherungsbeziehung einzeln entschieden werden). Die Bilanzierung von Währungsbasis-Spreads (siehe Paragraph 6.5.16) kann bei Sicherungsbeziehungen, die zu Beginn der frühesten Vergleichsperiode bestanden oder danach designiert wurden, rückwirkend angewandt werden. c) hat ein Unternehmen die Vorgabe des Paragraphen 6.5.6, dass das Sicherungsinstrument nicht ausläuft oder beendet wird, rückwirkend anzuwenden, sofern i) die Parteien des Sicherungsinstruments infolge bestehender oder neu erlassener Gesetzes- oder Regulierungsvorschriften vereinbaren, dass eine oder mehrere Clearing-Parteien ihre ursprüngliche Gegenpartei ersetzen und damit zur neuen Gegenpartei aller Parteien werden, und ii) etwaige andere Änderungen beim Sicherungsinstrument nicht über den für eine solche Ersetzung der Gegenpartei notwendigen Umfang hinausgehen. d) hat ein Unternehmen die Vorgaben des Abschnitts 6.8 rückwirkend anzuwenden. Diese rückwirkende Anwendung gilt nur für diejenigen Sicherungsbeziehungen, die zu Beginn des Berichtszeitraums, in dem das Unternehmen diese Vorgaben erstmals erfüllt, bereits bestanden oder danach designiert wurden, und den in der Rücklage für die Absicherung von Zahlungsströmen kumulierten Betrag, der zu Beginn des Berichtszeitraums, in dem das Unternehmen diese Vorgaben erstmals erfüllt, bereits vorhanden war. Unternehmen, die IFRS 9 (2009), IFRS 9 (2010) oder IFRS 9 (2013) früher angewandt haben 7.2.27 Ein Unternehmen hat die Übergangsvorschriften der Paragraphen 7.2.1–7.2.26 zum relevanten Zeitpunkt der erstmaligen Anwendung anzuwenden. Ein Unternehmen hat jede der Übergangsvorschriften der Paragraphen 7.2.3–7.2.14A und 7.2.17–7.2.26 nur einmal anzuwenden (d. h. wenn ein Unternehmen einen Ansatz zur Anwendung von IFRS 9 wählt, der mehr als einen Zeitpunkt der erstmaligen Anwendung beinhaltet, kann es keine dieser Vorschriften erneut anwenden, wenn diese bereits zu einem früheren Zeitpunkt angewandt wurden). (Siehe Paragraphen 7.2.2 und 7.3.2.) 7.2.28 Ein Unternehmen, das IFRS 9 (2009), IFRS 9 (2010) oder IFRS 9 (2013) angewandt hat und nachfolgend den vorliegenden Standard anwendet, a) hat seine frühere Designation eines finanziellen Vermögenswerts als erfolgswirksam zum beizulegenden Zeitwert bewertet aufzuheben, wenn eine solche Designation gemäß der in Paragraph 4.1.5 genannten Bedingung erfolgt war, diese Bedingung aber infolge der Anwendung des vorliegenden Standards nicht mehr erfüllt ist, b) kann einen finanziellen Vermögenswert als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn diese Designation bislang die in Paragraph 4.1.5 genannte Bedingung nicht erfüllt hätte, diese Bedingung aber nun infolge der Anwendung des vorliegenden Standards erfüllt wird, c) hat seine frühere Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet aufzuheben, wenn eine solche Designation gemäß der in Paragraph 4.2.2(a) genannten Bedingung erfolgt war, diese Bedingung aber infolge der Anwendung des vorliegenden Standards nicht mehr erfüllt ist, und d) kann eine finanzielle Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn diese Designation bislang die in Paragraph 4.2.2(a) genannte Bedingung nicht erfüllt hätte, diese Bedingung aber nun infolge der Anwendung des vorliegenden Standards erfüllt wird. Eine solche Designation bzw. die Aufhebung einer Designation hat auf Grundlage der bei der erstmaligen Anwendung des vorliegenden Standards bestehenden Fakten und Umstände zu erfolgen. Sie ist rückwirkend anzuwenden. Übergangsvorschriften für Vorfälligkeitsregelungen mit negativer Ausgleichsleistung 7.2.29 Mit Ausnahme der in den Paragraphen 7.2.30–7.2.34 genannten Fällen ist die Verlautbarung Vorfälligkeitsregelungen mit negativer Ausgleichsleistung (Änderungen an IFRS 9) gemäß IAS 8 rückwirkend anzuwenden. 7.2.30 Wendet ein Unternehmen bei erstmaliger Anwendung dieser Änderungen gleichzeitig auch diesen Standard erstmals an, hat es anstelle der Paragraphen 7.2.31 und 7.2.34 die Paragraphen 7.2.1–7.2.28 anzuwenden. 7.2.31 Wendet ein Unternehmen diese Änderungen erstmals nach der erstmaligen Anwendung dieses Standards an, so hat es nach den Paragraphen 7.2.32–7.2.34 zu verfahren. Darüber hinaus hat das Unternehmen auch die anderen für die Anwendung der Änderungen erforderlichen Übergangsvorschriften dieses Standards anzuwenden. Zu diesem Zweck sind Verweise auf den Zeitpunkt der erstmaligen Anwendung als Verweise auf den Beginn der Berichtsperiode zu verstehen, in der das Unternehmen diese Änderungen erstmals anwendet (Zeitpunkt der erstmaligen Anwendung dieser Änderungen). 7.2.32 Was die Designation eines finanziellen Vermögenswerts oder einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet angeht, so a) hat ein Unternehmen seine frühere Designation eines finanziellen Vermögenswerts als erfolgswirksam zum beizulegenden Zeitwert bewertet aufzuheben, wenn eine solche Designation gemäß der in Paragraph 4.1.5 genannten Bedingung erfolgt war, diese Bedingung aber infolge der Anwendung der vorliegenden Änderungen nicht mehr erfüllt ist, b) kann ein Unternehmen einen finanziellen Vermögenswert als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn diese Designation bislang die in Paragraph 4.1.5 genannte Bedingung nicht erfüllt hätte, diese Bedingung aber nun infolge der Anwendung der vorliegenden Änderungen erfüllt wird, c) hat ein Unternehmen seine frühere Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet aufzuheben, wenn eine solche Designation gemäß der in Paragraph 4.2.2(a) genannten Bedingung erfolgt war, diese Bedingung aber infolge der Anwendung der vorliegenden Änderungen nicht mehr erfüllt ist, und d) kann ein Unternehmen eine finanzielle Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn diese Designation bislang die in Paragraph 4.2.2(a) genannte Bedingung nicht erfüllt hätte, diese Bedingung aber nun infolge der Anwendung der vorliegenden Änderungen erfüllt wird. Eine solche Designation bzw. die Aufhebung einer Designation, hat auf Grundlage der zum Zeitpunkt der erstmaligen Anwendung dieser Änderungen bestehenden Fakten und Umstände zu erfolgen. Sie ist rückwirkend anzuwenden. 7.2.33 Ein Unternehmen ist nicht verpflichtet, frühere Perioden anzupassen, um der Anwendung dieser Änderungen Rechnung zu tragen. Das Unternehmen darf frühere Perioden nur anpassen, wenn dabei keine nachträglichen Erkenntnisse verwendet werden müssen und der angepasste Abschluss allen Vorschriften dieses Standards Rechnung trägt. Passt ein Unternehmen frühere Perioden nicht an, hat es etwaige Differenzen zwischen dem bisherigen Buchwert und dem Buchwert zu Beginn des Geschäftsjahrs, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) des Geschäftsjahrs zu erfassen, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt. 7.2.34 In der Berichtsperiode, in die der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, hat das Unternehmen für jede Klasse von finanziellen Vermögenswerten und finanziellen Verbindlichkeiten, die von diesen Änderungen betroffen waren, die folgenden Angaben zum Zeitpunkt der erstmaligen Anwendung zu machen: a) die vorherige Bewertungskategorie und den unmittelbar vor Anwendung dieser Änderungen bestimmten Buchwert, b) die neue Bewertungskategorie und den unmittelbar nach Anwendung dieser Änderungen bestimmten Buchwert, c) den Buchwert aller finanziellen Vermögenswerte und Verbindlichkeiten in der Bilanz, die zuvor als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert waren, es aber jetzt nicht mehr sind, und d) die Gründe für jede Designation oder Aufgabe der Designation von finanziellen Vermögenswerten oder Verbindlichkeiten als erfolgswirksam zum beizulegenden Zeitwert bewertet. Übergangsvorschriften für die „Jährlichen Verbesserungen an den IFRS-Standards“ 7.2.35 Ein Unternehmen hat die Jährlichen Verbesserungen an den IFRS-Standards, Zyklus 2018–2020 auf finanzielle Verbindlichkeiten anzuwenden, die zu oder nach Beginn des Geschäftsjahrs, in dem das Unternehmen die Änderung erstmals anwendet, geändert oder ausgetauscht werden. Übergangsvorschriften für IFRS 17 in der im Juni 2020 geänderten Fassung 7.2.36 Ein Unternehmen hat die aufgrund der im Juni 2020 geänderten Fassung der IFRS 17 erfolgten Änderungen an IFRS 9 gemäß IAS 8 rückwirkend anzuwenden, mit den in den Paragraphen 7.2.37–7.2.42 aufgeführten Ausnahmen. 7.2.37 Ein Unternehmen, das IFRS 17 in der im Juni 2020 geänderten Fassung erstmals anwendet und gleichzeitig auch den vorliegenden Standard erstmals anwendet, hat anstelle der Paragraphen 7.2.38–7.2.42 nun die Paragraphen 7.2.1–7.2.28 anzuwenden. 7.2.38 Wendet ein Unternehmen IFRS 17 in der im Juni 2020 geänderten Fassung erstmals an, nachdem es zuvor schon den vorliegenden Standard erstmals angewandt hat, hat es die Paragraphen 7.2.39–7.2.42 anzuwenden. Darüber hinaus hat das Unternehmen auch die anderen für die Anwendung der Änderungen erforderlichen Übergangsvorschriften dieses Standards anzuwenden. Zu diesem Zweck sind Verweise auf den Zeitpunkt der erstmaligen Anwendung als Verweise auf den Beginn der Berichtsperiode zu verstehen, in der das Unternehmen diese Änderungen erstmals anwendet (Zeitpunkt der erstmaligen Anwendung dieser Änderungen). 7.2.39 Hinsichtlich der Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet a) hat ein Unternehmen seine frühere Designation einer finanziellen Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet aufzuheben, wenn eine solche Designation gemäß der in Paragraph 4.2.2(a) genannten Bedingung erfolgt war, diese Bedingung aber infolge der Anwendung dieser Änderungen nicht mehr erfüllt ist, und b) kann ein Unternehmen eine finanzielle Verbindlichkeit als erfolgswirksam zum beizulegenden Zeitwert bewertet designieren, wenn diese Designation bislang die in Paragraph 4.2.2(a) genannte Bedingung nicht erfüllt hätte, diese Bedingung aber nun infolge der Anwendung der vorliegenden Änderungen erfüllt wird. Eine solche Designation bzw. die Aufhebung einer Designation hat auf Grundlage der zum Zeitpunkt der erstmaligen Anwendung dieser Änderungen bestehenden Fakten und Umstände zu erfolgen. Diese Einstufung ist rückwirkend anzuwenden. 7.2.40 Ein Unternehmen ist nicht verpflichtet, frühere Perioden anzupassen, um der Anwendung dieser Änderungen Rechnung zu tragen. Das Unternehmen darf frühere Perioden nur anpassen, wenn dabei keine nachträglichen Erkenntnisse verwendet werden müssen. Passt ein Unternehmen frühere Perioden an, müssen die angepassten Abschlüsse alle Anforderungen des vorliegenden Standards an die betreffenden finanziellen Vermögenswerte erfüllen. Passt ein Unternehmen frühere Perioden nicht an, hat es etwaige Differenzen zwischen dem früheren Buchwert und dem Buchwert zu Beginn des Geschäftsjahrs, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) des Geschäftsjahrs zu erfassen, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt. 7.2.41 In der Berichtsperiode, in die der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, ist ein Unternehmen nicht verpflichtet, die nach Paragraph 28(f) von IAS 8 erforderlichen quantitativen Angaben zu machen. 7.2.42 In der Berichtsperiode, in die der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, hat das Unternehmen für jede Klasse von finanziellen Vermögenswerten und finanziellen Verbindlichkeiten, die von diesen Änderungen betroffen waren, die folgenden Angaben zum Zeitpunkt der erstmaligen Anwendung zu machen: a) die vorherige Einstufung, einschließlich der vorherigen Bewertungskategorie, falls zutreffend, und den unmittelbar vor Anwendung dieser Änderungen bestimmten Buchwert, b) die neue Bewertungskategorie und den unmittelbar nach Anwendung dieser Änderungen bestimmten Buchwert, c) den Buchwert aller finanziellen Verbindlichkeiten in der Bilanz, die zuvor als erfolgswirksam zum beizulegenden Zeitwert bewertet designiert waren, es jetzt aber nicht mehr sind, und d) die Gründe für jede Designation oder Aufgabe der Designation von finanziellen Verbindlichkeiten als erfolgswirksam zum beizulegenden Zeitwert bewertet. Übergangsvorschriften für Reform der Referenzzinsätze – Phase 2 7.2.43 Soweit in den Paragraphen 7.2.44–7.2.46 nicht anders festgelegt, ist die Verlautbarung Reform der Referenzzinssätze – Phase 2 gemäß IAS 8 rückwirkend anzuwenden. 7.2.44 Eine neue Sicherungsbeziehung (z. B. wie in Paragraph 6.9.13 beschrieben) darf nur prospektiv designiert werden (d. h. in Vorperioden darf ein Unternehmen keine neue Sicherungsbeziehung designieren). Ein Unternehmen hat eine beendete Sicherungsbeziehung wieder herzustellen, allerdings nur dann, wenn die folgenden Bedingungen erfüllt sind: a) das Unternehmen hatte die jeweilige Sicherungsbeziehung nur aufgrund von Veränderungen beendet, die die Reform der Referenzzinssätze notwendig gemacht hatte, und das Unternehmen hätte die Sicherungsbeziehung nicht beenden müssen, wenn diese Änderungen zu diesem Zeitpunkt bereits angewandt worden wären, und b) zu Beginn der Berichtsperiode, in der ein Unternehmen die Änderungen erstmals anwendet (Datum der erstmaligen Anwendung der Änderungen), erfüllt die beendete Sicherungsbeziehung die Voraussetzungen für die Bilanzierung von Sicherungsbeziehungen (nach Berücksichtigung der Änderungen). 7.2.45 Falls ein Unternehmen eine beendete Sicherungsbeziehung in Anwendung des Paragraphen 7.2.44 wieder herstellt, hat es die in den Paragraphen 6.9.11 und 6.9.12 enthaltenen Bezugnahmen auf den Zeitpunkt der erstmaligen Designation des alternativen Referenzzinssatzes als nicht vertraglich spezifizierte Risikokomponente als Bezugnahmen auf den Zeitpunkt der erstmaligen Anwendung der Änderungen auszulegen (d. h. der Zeitraum von 24 Monaten für den jeweiligen alternativen Referenzzinssatz, der als nicht vertraglich spezifizierte Risikokomponente designiert ist, beginnt mit dem Zeitpunkt der erstmaligen Anwendung der Änderungen). 7.2.46 Ein Unternehmen ist nicht verpflichtet, frühere Perioden anzupassen, um der Anwendung dieser Änderungen Rechnung zu tragen. Ein Unternehmen darf frühere Perioden nur anpassen, wenn dabei keine nachträglichen Erkenntnisse verwendet werden müssen. Passt ein Unternehmen frühere Perioden nicht an, hat es etwaige Differenzen zwischen dem früheren Buchwert und dem Buchwert zu Beginn des Geschäftsjahrs, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt, im Eröffnungsbilanzwert der Gewinnrücklagen (oder eines anderen geeigneten Eigenkapitalpostens) des Geschäftsjahrs zu erfassen, in das der Zeitpunkt der erstmaligen Anwendung dieser Änderungen fällt.
31,682
https://github.com/palakbaphna/pyprac/blob/master/Strings/4ExtractDigitsFrmString.py
Github Open Source
Open Source
Apache-2.0
null
pyprac
palakbaphna
Python
Code
54
122
#Extract digits from a string # given: s = 'ab12c59p7dq' # you need to extract digits from the list s # to make it so: # digits == [1, 2, 5, 9, 7] s = 'ab12c59p7dq' digits = [] for element in s: if '1234567890'.find(element) != -1:# whenever it does not fail digits.append(int(element)) print(digits)
16,406
https://github.com/dwugofski/welkynd-site/blob/master/com/php/mysql_util.php
Github Open Source
Open Source
MIT
2,018
welkynd-site
dwugofski
PHP
Code
112
457
<?php include 'util.php'; $mysql_guest_conn = new mysqli("127.0.0.1", "welkynd_guest", "stone", "welkynd"); $mysql_admin_conn = new mysqli("127.0.0.1", "welkynd_admin", "stone", "welkynd"); function general_query($sql, $username, $password) { $response = ['error'=>FALSE, 'result'=>FALSE]; /*$conn = new mysqli("localhost", $username, $password, "welkynd"); if ($conn->connect_error) { $reponse['error'] = "Connection failed: ". $conn->connect_error; return $response; } $response['result'] = $conn->query($sql);*/ global $mysql_admin_conn; $response['result'] = $mysql_admin_conn->query($sql); if ($mysql_admin_conn->error == TRUE) $response['error'] = "Error running query <<".$sql.">>: ".$mysql_admin_conn->error; return $response; } function guest_query($sql) { return general_query($sql, "welkynd_guest", "stone"); } function admin_query($sql, $password) { return general_query($sql, "welkynd_admin", $password); } function query_rows($sql, $repopts='html') { $rows = []; $sql_response = guest_query($sql); if ($sql_response['error'] == TRUE) manage_error($sql_response, $repopts); else while ($row = $sql_response['result']->fetch_assoc()) $rows[] = $row; return $rows; } ?>
51,036
https://arxiv.org/abs/2306.08015
arXiv
Open Science
CC-By
2,023
Investigation of Fractional Compartmental Models with Application to Amiodarone Drug Diffusion in Pharmacokinetics
Reindorf Nartey Borkor and Adu Sakyi and Peter Amoako-Yirenkyi
English
Spoken
5,586
14,879
Investigation of Fractional Compartmental Models with Application to Amiodarone Drug Diffusion in Pharmacokinetics Reindorf Nartey Borkor1,2, Adu Sakyi1,2, Peter Amoako-Yirenkyi1,2 1Department of Mathematics, Kwame Nkrumah University of Science and Technology (KNUST), Ghana 2Center for Scientific and Technical Computing, National Institute for Mathematical Sciences (NIMS), Ghana Email: [email protected] [email protected], [email protected] Abstract This paper presents three fractional models formulated from a classical Pharmacokinetics compartmental system: commensurable, non-commensurable, and implicit non-commensurable models. Their distinguishing characteristics are further examined comprehensively. Because analytic solutions for such models are typically challenging to obtain, we study the application of the Fractional Finite Difference Method (FFDM) to simulate approximate solutions. The characteristic of the non-commensurable model is shown to be incompatible with the concept of mass balance. However, it appeared to outlast fractional calculus theory when simulating anomalous kinetics. We proved this by fitting the proposed fractional and classical models to an experimental data set (amiodarone) and estimated the parameters using the least-square approach. The classical model diverged, but the non-commensurable model predicted a fit comparable to the other two fractional models. The fractional models described anomalous diffusion better than classical theories. The numerical results showed that the proposed numerical method is equally efficient in solving any complex compartmental models, as they performed well in simulations for the classic example of the model. Keywords Caputo Fractional Derivative; Fractional Finite Difference Methods; Pharmacokinetics; Compartmental analysis 1\. Introduction In the majority of application-oriented fields, compartmental analysis has been a crucial technique. It was initially developed as a result of studies on the absorption and dispersion of radioactive tracers, and it now plays a significant role in a variety of different disciplines, including medicine, bioengineering, environmental science, information science, and social science, to name just a few [6]. Compartmental analysis appears to have a lengthy history in science according to the literature, but throughout the years, it has grown more well-liked in the field of health science. Most scientists have conducted extensive research into the usage of compartments in the fields of biology and medicine. For instance, [7] employed a GPU-accelerated compartmental model to analyze medical imaging data, and [8] used it to analyze various characteristics of the blood pressure distribution. It has been used to describe and analyze the spread of communicable diseases like measles, coronavirus, ebola, influenza, and tuberculosis in the field of epidemiology (to name a few, see [39, 40, 41, 42]). Compartmental models are employed in several specialist domains, such as pharmacology and pharmacokinetics, to forecast the most secure and efficient drug administration method. Drugs are transmitted into and out of these compartments through diffusion (a transport phenomenon), which is a representation of many body parts (such as the stomach, blood, liver, and kidney). Traditionally, researchers analyze pharmacokinetics data using compartmental and non-compartmental models. Yang et al’s analysis of the blood alcohol content of Chinese participants in Hong Kong used both compartmental and generalized linear models [9]. By means of a set of differential equations, compartmental analysis has traditionally explained how materials are moved between compartments of a system. Recent developments in compartmental analysis have made it possible to use fractional calculus in the disciplines indicated above as well as others (see [28, 29, 31, 30]). In general, modeling systems involving memory (history) and/or non-localized effects can be aided by the use of fractional calculus. The use of fractional calculus as a modeling technique has increased. [3] proposed a dynamical fractional order HIV-1 model in the Caputo sense, establishing the significance of the fractional derivative on dynamic processes, and [2] examined the fractional properties of a harmonic oscillator with position-dependent mass as a few examples. See [43, 44, 45, 46, 5, 48] and the references therein for current advancements in the field of fractional calculus and its applications. Furthermore, the use of fractional calculus has produced a number of difficult to solve analytically complex mathematical models within the context of differential equations. The generalized Adams- Bashforth-Moulton Method [55, 54, 52], the fractional finite difference method [27], the GL-based method [19], the Adomian Decomposition Method [20], the Chebyshev spectral method [56], the collocation method [21, 38], and the hybrid Chelyshko functions Method [4], and an Iterative method for fractional optimal control problems [5] are some of the numerical techniques that are employed in finding approximate solutions to these rising complex equations in the last decade For an in-depth analysis of the approximation techniques, see [37]. Although there are other theories, including Fractal Kinetics [15, 16, 33], Empirical Power-Laws [17, 36], and Gamma Functions [18, 34, 35], it is demonstrated in the theory of pharmacokinetics that fractional calculus is the most effective method for explaining the anomalous behavior of some medications. Dokoumetzidis et al. [10] first discussed it in Pharmacokinetics (PK) for a single compartmental model. Since the method created for fractionalizing a single compartmental system fails in the case of multi- compartmental systems, Dokoumetzidis et al. later devised a theoretically- based method of fractionalizing a multi-compartmental system [11]. This approach poses certain difficulty in interpreting the units of constants if not implemented carefully, and the conservation of mass may be void. These are the challenges that Dokoumetzidis et al. [10] and Angstmann et al. [57] have discovered and addressed. Yanli et al. [58] recently published a paper in which they developed a two compartmental fractional model based on the methodology of Dokoumetzidis et al. and studied two numerical techniques together with parameter estimation. However, since there is some justification for incorporating historical impacts into the dynamics of compartmental models, researchers frequently adopt either approach. This study compares the approaches that are applied to a classical model to produce the commensurable, non-commensurable, and implicit non-commensurable fractional models. Additionally, it is challenging to put analytical solutions for these FDE systems into practice. Because of this, this study effectively illustrates how to use the Fractional Finite Difference Method (FFDM) to generate a numerical solution for the described systems. Further, we use the least-squares method to estimate the parameters of the classical and fractional models using an amiodarone drug dataset in order to determine which of them fails to fit the drug’s anomalous diffusion behavior. The rest of this work is structured as follows: In section 2, we give two schematic illustrations of two compartmental systems with a pharmacokinetics application, from which the various models were built. Additionally, we offer some helpful definitions for fractional calculus, particularly for the caputo derivative. The findings of the numerical simulation are further examined in Section 3 along with the key variations among the models under consideration. Also, parameter estimation is done using the drug amiodarone. Finally, we offered conclusions in section 4. 2\. Methodology 2.1. Single Dose Two-Compartmental Intravenous(IV) Model In pharmacokinetics, a two-compartment model will consist of system of differential equation that represents two physiological essential parts (see a schematic diagram shown in $figure(\ref{fig1:a})$.): * • The first (central) compartment denoted as $A_{1}$ is marked as the blood and organs with enough blood such as kidney or liver. * • The second (peripheral) compartment also denoted as $A_{2}$ can be marked as tissue or generally, any body part with less supply of blood. These compartments are joined to one another in both directions and hence, a distribution between the $A_{1}$ and $A_{2}$ takes place. From $figure(\ref{fig1:a})$, a linear model is obtained and are expressed by the following system of Ordinary Differential Equations (ODE’s). (a) (b) Figure 1: Both diagrams shows general schematic diagram of two-compartmental models with dose administered into the central compartment intravenously. (1(b)) is a fractional 2-compartment PK model with the dashed line representing the fractionalized process from compartment 2 to compartment 1. $\displaystyle\frac{dA_{1}(t)}{dt}$ $\displaystyle=$ $\displaystyle- k_{10}A_{1}(t)-k_{12}A_{1}(t)+k_{21}A_{2}(t)$ $\displaystyle\frac{dA_{2}(t)}{dt}$ $\displaystyle=$ $\displaystyle k_{12}A_{1}(t)-k_{21}A_{2}(t)$ (1) where $A_{1}(t)$ and $A_{2}(t)$ represent the amount of drug in a compartments, the rate constants ($k_{12},k_{21},k_{10}$) regulate the transfer of mass between compartments and out of a compartment. The thick arrow shows initial values of the amount of drug(dose) given intravenously at time zero into the blood circulation ($ieA_{1}(0)=dose$ and $A_{2}(0)=0$). The idea of Fractional Calculus was assumed by Leibniz, which was written in letter to a colleague in 1695. In recent years, models of FDEs have greatly been considered in different research areas, complementing our understanding of the way we observe things that are previous modeled with the traditional calculus. The most important property of the fractional models is their non- local (memory) property which does not occur in the case of differential operators of integer order. By this property, we mean a model’s next stage depends not only on its current state but also its historical states. (See the following literature for the many definitions and theory of fractional calculus, [22],[23],[24].) The fractional model will be in the sense of Caputo’s fractional derivative since it requires an initial condition that involves the state variable. ###### Definition 2.1. The Caputo fractional derivative operator $~{}^{C}\\!D^{\alpha}$ of order $\alpha$ is defined in the following form: $~{}^{C}_{0}\\!D_{x}^{\alpha}f(x)=\frac{1}{\Gamma(m-\alpha)}\int_{0}^{x}\frac{f^{(m)}(t)}{(x-t)^{\alpha-m+1}},\qquad\alpha>0,$ (2) where $m-1<\alpha\leq m,m\in N,x>0.$ Caputo fractional derivative operator is a linear operation similar to the integer-order derivative $~{}^{C}_{0}\\!D_{x}^{\alpha}(\lambda f(x)+\mu g(x))=\lambda~{}^{C}_{0}\\!D^{\alpha}_{x}f(x)+\mu~{}^{C}_{0}\\!D^{\alpha}_{x}g(x),$ (3) where $\lambda$ and $\mu$ are constants. Note that the Caputo differential operator collapses to the classical derivative operator if $\alpha\in N$. The initial conditions for fractional differential equations with the Caputo derivative have the same form as integer-order differential equations, hence this fractional definition is superior for most physical processes. 2.2. Derivation of Fractional Pharmacokinetics(PK) Models ## 2.2.1 Commensurate Fractional Two-compartmental PK Model A general Commensurate fractional compartmental system is of the form [25],[14]: $~{}^{C}_{0}\\!D_{t}^{\alpha}\textbf{y}(t)=\left(\begin{array}[]{c}~{}^{C}_{0}\\!D_{t}^{\alpha}y_{1}(t)\\\ \cdots\\\ ~{}^{C}_{0}\\!D_{t}^{\alpha}y_{m}(t)\end{array}\right)=\left(\begin{array}[]{ccc}a_{11}&\cdots&a_{1m}\\\ \cdots&\cdots&\cdots\\\ a_{m1}&\cdots&a_{mm}\end{array}\right)\textbf{y}(t)+\textbf{f}(t)=A\textbf{y}(t)+\textbf{f}(t)$ (4) where $\alpha>0$. The initial conditions $\textbf{y}(0)=\textbf{y}_{0}$ and $\textbf{f}(t)$ is the (vector valued) input function to the system. These systems are defined as fractionalization of compartments and are termed commensurate. This is because all the derivatives in the equations are of the same order, $\alpha$. Also, the commensurate system (4) has a consistency with units of the rate constants or no violation of mass balance. Hence, the system of ODEs defined in (S2.Ex1) is transformed into the following commensurate fractional PK model of equal order Caputo sense: $\displaystyle~{}^{C}_{0}\\!D_{t}^{\alpha}A_{1}(t)$ $\displaystyle=$ $\displaystyle-k_{10}A_{1}(t)-k_{12}A_{1}(t)+k_{21}A_{2}(t)$ $\displaystyle~{}^{C}_{0}\\!D_{t}^{\alpha}A_{2}(t)$ $\displaystyle=$ $\displaystyle k_{12}A_{1}(t)-k_{21}A_{2}(t)$ (5) where $k_{12},k_{21}$ and $k_{10}$ are the rate constants with unit (time-α) ## 2.2.2 Non-Commensurate Fractional Two-compartmental PK model Also, a general Commensurate fractional compartmental system is of the form [25],[14]: $\left(\begin{array}[]{c}~{}^{C}_{0}\\!D_{t}^{\alpha_{1}}y_{1}(t)\\\ \cdots\\\ ~{}^{C}_{0}\\!D_{t}^{\alpha_{m}}y_{m}(t)\end{array}\right)=\left(\begin{array}[]{ccc}a_{11}&\cdots&a_{1m}\\\ \cdots&\cdots&\cdots\\\ a_{m1}&\cdots&a_{mm}\end{array}\right)\textbf{y}(t)+\textbf{f}(t)=A\textbf{y}(t)+\textbf{f}(t)$ (6) where $\alpha_{1},\cdots,\alpha_{m}$ are different positive real values representing the non-integer order of each compartment. Similarly, the system of ODEs defined in (S2.Ex1) is transformed into Non-commensurate fractional PK model same way as (2.2.1) hence, also defined as fractionalization of compartments but with different order. $\displaystyle~{}^{C}_{0}\\!D_{t}^{\alpha}A_{1}(t)$ $\displaystyle=$ $\displaystyle-k_{10}A_{1}(t)-k_{12}A_{1}(t)+k_{21}A_{2}(t)$ $\displaystyle~{}^{C}_{0}\\!D_{t}^{\beta}A_{2}(t)$ $\displaystyle=$ $\displaystyle k_{12}A_{1}(t)-k_{21}A_{2}(t)$ (7) There is a major problem to Non-commensurate systems. They have features which contradict mass balance. (ie, the units of the rate are inconsistencies.) Thus, a mass flux leaving one compartment with defined rate of non-integer order, appears as a mass flux entering into another compartment, as a rate of a different non-integer order, and as such violates mass balance[26]. ## 2.2.3 Implicit Non-Commensurate Fractional Two-compartmental PK model We consider the form of fractionalizing a system of ODE which takes care of the problem encountered with Non-commensurate systems[11]. Unlike the previous fractionalized forms where each compartment or equation is fractionalized with equal (or unequal) order, this approach considers separate fractionalization of each transport process of the system. In this case, processes of distinct fractional orders co-exist. And this is because, they are of consistent orders when the corresponding terms show up in different equations. In addition, this approach does not encounter any problem of mass imbalance. Now, for a fractionalized transfer processes in $figure(\ref{fig1:b})$, the generalized fractional form of the two-compartmental systems in Caputo’s derivative sense is given as [see [11] for more details on how the fractionalization on any system is done]: $\displaystyle\frac{dA_{1}(t)}{dt}$ $\displaystyle=$ $\displaystyle- k_{10}~{}^{C}_{0}\\!D_{t}^{1-\alpha_{10}}A_{1}(t)-k_{12}~{}^{C}_{0}\\!D_{t}^{1-\alpha_{12}}A_{1}(t)+k_{21}~{}^{C}_{0}\\!D_{t}^{1-\alpha_{21}}A_{2}(t)$ $\displaystyle\frac{dA_{2}(t)}{dt}$ $\displaystyle=$ $\displaystyle k_{12}~{}^{C}_{0}\\!D_{t}^{1-\alpha_{12}}A_{1}(t)-k_{21}~{}^{C}_{0}\\!D_{t}^{1-\alpha_{21}}A_{2}(t)$ (8) where $k_{10},k_{12}$ and $k_{21}$ are the rate constants with units as time${}^{\alpha_{10}}$, time${}^{\alpha_{12}}$ and time${}^{\alpha_{21}}$ respectively. With a schematic diagram shown in $figure(\ref{fig1:b})$, a well perfused tissues could represent $A_{1}$ while $A_{2}$ as deeper tissues. Also, with three transfer rates denoted as $k_{10},k_{12}$ and $k_{21}$, we assume classical kinetics(order 1) for $k_{10}$ and $k_{12}$ (that is $\alpha_{10}=\alpha_{12}=1$ from (2.2.3) but fractional kinetics(order $\alpha$) for $k_{21}$ signifying tissue trapping(dashed arrow). The thick arrow shows the amount of drug(dose) given intravenously at time zero into the blood circulation (compartment $A_{1}$). The system (2.2.3) is mathematically deduced as follows: $\displaystyle\frac{dA_{1}(t)}{dt}$ $\displaystyle=$ $\displaystyle-(k_{10}+k_{12})A_{1}(t)+k_{21}~{}^{C}_{0}\\!D_{t}^{1-\alpha}A_{2}(t)$ $\displaystyle\frac{dA_{2}(t)}{dt}$ $\displaystyle=$ $\displaystyle k_{12}A_{1}(t)-k_{21}~{}^{C}_{0}\\!D_{t}^{1-\alpha}A_{2}(t)$ (9) where $\alpha<1$. Furthermore, $A_{1}(0)=dose$ and $A_{2}(0)=0$ are the initial conditions that account for a bolus dose injection in $A_{1}$ and no initial amount in $A_{2}$, respectively. We refer (2.2.3) and (2.2.3) as an implicit form of a system of fractional Pharmacokinetics(PK) models. In the subsequent sections, we derive numerical methods in finding solutions to the above pharmacokinetics models since analytical solutions cannot easily be implemented especially (2.2.2) and (2.2.3). 2.3. Numerical Approximation and Simulation Since exact analytic solutions of some fractional order differential equations are difficult to obtain, a numerical approximation must be used. In solving fractional order equations, several numerical schemes have been proposed. (See section • for the list of methods.) For numerical solutions of the fractional systems, we consider Fractional Finite Difference Method (FFDM) in this work. We demonstrate the FFDM on only model (2.2.3) which in similar terms can be used for the other models (2.2.1,2.2.2). ## 2.3.1 Approximation of Caputo Fractional Derivative Here, a fractional derivative $D^{\alpha}u(t)$ in a discrete approximation form is presented. For a given positive integer $M$ (defining the number of grids), finite difference algorithm in the time interval $[0,T_{f}]$ is defined by $k=\frac{T_{f}}{M}$ with grid points labeled as $t_{n}=nk,n=0,1,2,...,M$. The discrete approximation of $D^{\alpha}u(t)$ is derived by a simple quadrature formula. (See [27] for more details.): $\displaystyle\frac{d^{\alpha}u(t_{n})}{dt^{\alpha}}$ $\displaystyle=$ $\displaystyle\frac{1}{\Gamma(1-\alpha)}\int_{0}^{t_{n}}(t_{n}-s)^{-\alpha}\frac{d}{ds}u(s)ds$ $\displaystyle=$ $\displaystyle\frac{1}{\Gamma(1-\alpha)}\sum_{j=1}^{n}\int_{(j-1)k}^{jk}[\frac{u_{j}-u_{j-1}}{k}+o(k)](nk-s)^{-\alpha}ds$ $\displaystyle=$ $\displaystyle\frac{1}{\Gamma(1-\alpha)(1-\alpha)}\sum_{j=1}^{n}[\frac{u_{j}-u_{j-1}}{k}+o(k)][(n-j+1)^{1-\alpha}-(n-j)^{1-\alpha}][k^{1-\alpha}]$ $\displaystyle=$ $\displaystyle\frac{1}{\Gamma(1-\alpha)(1-\alpha)k^{\alpha}}\sum_{j=1}^{n}(u_{j}-u_{j-1})[(n-j+1)^{1-\alpha}-(n-j)^{1-\alpha}]$ $\displaystyle+\frac{1}{\Gamma(1-\alpha)(1-\alpha)}\sum_{j=1}^{n}[(n-j+1)^{1-\alpha}-(n-j)^{1-\alpha}]o(k^{2-\alpha}).$ Now, we set and shift indices to give: $\displaystyle\sigma_{\alpha,k}=\frac{1}{\Gamma(1-\alpha)(1-\alpha)k^{\alpha}}$ (10) $\displaystyle\omega_{j}^{(\alpha)}=j^{1-\alpha}-(j-1)^{1-\alpha}$ (11) and $\displaystyle\frac{d^{\alpha}u(t_{n})}{dt^{\alpha}}$ $\displaystyle=$ $\displaystyle\sigma_{\alpha,k}\sum_{j=1}^{n}\omega_{j}^{(\alpha)}(u_{n-j+1}-u_{n-j})+\frac{1}{\Gamma(1-\alpha)(1-\alpha)}n^{1-\alpha}o(k^{2-\alpha})$ $\displaystyle=$ $\displaystyle\sigma_{\alpha,k}\sum_{j=1}^{n}\omega_{j}^{(\alpha)}(u_{n-j+1}-u_{n-j})+o(k).$ Here $\displaystyle\frac{d^{\alpha}u(t_{n})}{dt^{\alpha}}=D^{\alpha}u_{n}+o(k)$ and the first-order approximation for computing the Caputo’s fractional derivative is expressed as $D^{\alpha}u_{n}\cong\sigma_{\alpha,k}\sum_{j=1}^{n}\omega_{j}^{(\alpha)}(u_{n-j+1}-u_{n-j}),\qquad n=1,2,...,M.$ (12) 2.4. Discretizing System of Fractional PK Model using Fractional Finite Difference Method(FFDM) The discretized formula of the FFDM (12) now approximate time $\alpha$-order fractional derivative to solve the fractional PK model (2.2.3) numerically. The discretized form is presented as follows; $\displaystyle\frac{A^{1}_{n}-A^{1}_{n-1}}{k}$ $\displaystyle=$ $\displaystyle-(k_{10}+k_{12})A^{1}_{n}+k_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}(A^{2}_{n-j+1}-A^{2}_{n-j})$ $\displaystyle\frac{A^{2}_{n}-A^{2}_{n-1}}{k}$ $\displaystyle=$ $\displaystyle k_{12}A^{1}_{n}-k_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}(A^{2}_{n-j+1}-A^{2}_{n-j})$ (13) where for instance $A^{1}_{n}=A_{1}(t_{n})$ and $A^{2}_{n-j+1}=A_{2}(t_{n-j+1})$ and $k$ is the interval between grid points. From expression (10) and (11), $\delta_{1-\alpha,k}$ and $w_{j}^{(1-\alpha)}$in (2.3.1) are represented as: $\displaystyle\delta_{1-\alpha,k}$ $\displaystyle=$ $\displaystyle\frac{1}{\alpha k^{1-\alpha}\Gamma(\alpha)}$ (14) $\displaystyle w_{j}^{(1-\alpha)}$ $\displaystyle=$ $\displaystyle j^{\alpha}-(j-1)^{\alpha}$ (15) Hence, $\displaystyle A^{1}_{n}-A^{1}_{n-1}$ $\displaystyle=$ $\displaystyle-k(k_{10}+k_{12})A^{1}_{n}+kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}(A^{2}_{n-j+1}-A^{2}_{n-j})$ $\displaystyle A^{2}_{n}-A^{2}_{n-1}$ $\displaystyle=$ $\displaystyle kk_{12}A^{1}_{n}-kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}(A^{2}_{n-j+1}-A^{2}_{n-j})$ (16) Now a couple of iterates are taken to generalize the process. for $n=1$ $\displaystyle A^{1}_{1}-A^{1}_{0}$ $\displaystyle=$ $\displaystyle-k(k_{10}+k_{12})A^{1}_{1}+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1}(A^{2}_{1}-A^{2}_{0})$ $\displaystyle A^{2}_{1}-A^{2}_{0}$ $\displaystyle=$ $\displaystyle kk_{12}A^{1}_{1}-kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1}(A^{2}_{1}-A^{2}_{0})$ (17) Grouping known values and unknown terms, we obtain the following, $\displaystyle(1+k(k_{10}+k_{12}))A_{1}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{1}^{2}=A_{0}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{0}^{2}$ $\displaystyle- kk_{12}A_{1}^{1}+(1+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{1}^{2}=A_{0}^{1}+(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{0}^{2}$ (18) Putting (2.3.1) in a matrix form $\left(\begin{array}[]{cc}{(1+k(k_{10}+k_{12}))}&{-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\\\ {-kk_{12}}&{(1+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\end{array}\right)$ $\left(\begin{array}[]{c}{A_{1}^{1}}\\\ {A_{1}^{2}}\end{array}\right)$ =$\left(\begin{array}[]{c}{A_{0}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{0}^{2}}\\\ {A_{0}^{1}+(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{0}^{2}}\end{array}\right)$ for $n=2$ $\displaystyle(1+k(k_{10}+k_{12}))A_{2}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{2}^{2}$ $\displaystyle=$ $\displaystyle A_{1}^{1}+(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{2})A_{1}^{2}$ $\displaystyle-$ $\displaystyle kk_{21}\delta_{1-\alpha,k}(w^{(1-\alpha)}_{1}A_{1}^{2}+w^{(1-\alpha)}_{2}A_{0}^{2})$ $\displaystyle- kk_{12}A_{2}^{1}+(1+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})A_{2}^{2}$ $\displaystyle=$ $\displaystyle A_{1}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{2})A_{1}^{2}$ (19) $\displaystyle+$ $\displaystyle kk_{21}\delta_{1-\alpha,k}(w^{(1-\alpha)}_{1}A_{1}^{2}+w^{(1-\alpha)}_{2}A_{0}^{2})$ Also putting (2.3.1) in a matrix form $\left(\begin{array}[]{cc}{(1+k(k_{10}+k_{12}))}&{-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\\\ -kk_{12}&{(1+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\end{array}\right)\left(\begin{array}[]{c}{A_{2}^{1}}\\\ {A_{2}^{2}}\end{array}\right)\\\ =\left(\begin{array}[]{c}{A_{1}^{1}+(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{2})A_{1}^{2}-kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{2}w^{(1-\alpha)}_{j}A^{2}_{2-j}}\\\ {A_{1}^{1}-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{2})A_{1}^{2}+kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{2}w^{(1-\alpha)}_{j}A^{2}_{2-j}}\end{array}\right)$ (20) Generalizing the iterate follows as: $\left(\begin{array}[]{cc}{(1+k(k_{10}+k_{12}))}&{-(kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\\\ {-kk_{12}}&{(1+kk_{21}\delta_{1-\alpha,k}w^{(1-\alpha)}_{1})}\end{array}\right)\left(\begin{array}[]{c}{A_{n}^{1}}\\\ {A_{n}^{2}}\end{array}\right)\\\ =\left(\begin{array}[]{c}{A_{n-1}^{1}+kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n-1}w^{(1-\alpha)}_{j+1}A_{n-j}^{2}-kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}A^{2}_{n-j}}\\\ {A_{n-1}^{1}-kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n-1}w^{(1-\alpha)}_{j+1}A_{n-j}^{2}+kk_{21}\delta_{1-\alpha,k}\sum_{j=1}^{n}w^{(1-\alpha)}_{j}A^{2}_{n-j}}\end{array}\right)$ (21) Equation (21) is an iterate generalization of the numerical solutions to the system of fractional PK model (2.2.3), which can be obtained when grid interval is defined. 3\. Results and Discussion The two-compartmental PK models, which are all systems of fractional differential equations, were subjected to a numerical tool (FFDM) in the preceding subsection. With $(\alpha=1)$ for classical instances and $(\alpha=0.5,\beta=0.7)$ for fractional cases, solutions are given using parameter constants specified as $k_{10}=1,k_{12}=0.8,$ and $k_{21}=0.7$. As a result, for model (2.2.3), it is noted that rate constant $k_{21}$ has a unit of $hours^{-0.5}$, which is distinct from the other rate constants ($k_{10},k_{12}$), which have units of $hours^{-1}$. The graphs display the time profiles of a certain drug’s concentration (or amount) when it is injected intravenously into a human being. As previously stated, $A_{1}$ and $A_{2}$ denoted, respectively, the amount of medication in the blood and deeper tissues. In these three different fractional model types, a drug’s behavior or amount is observed over the course of a day ($(24hrs)$). Two profiles are shown on each model, one of which corresponds to a system compartment. The observed profiles $figure(\ref{fig7:a},\ref{fig7:c},\ref{fig7:e})$ and $figure(\ref{fig7:b},\ref{fig7:d},\ref{fig7:f})$ for compartments $A_{1}$ and $A_{2}$ of the various models, respectively, depict the drug’s behavior in each compartment. Each profile has an overlap between the numerical solution from FFDM and the analytical solution for the classical situation $(\alpha=1)$. As long as a solution to a differential equation exists, the FFDM is sufficient to provide a satisfactory approximation. (a) (b) (c) (d) (e) (f) Figure 2: Time profile of amount of drug in compartment $1\&2$ of the three fractional models. Subfigures: (2(a),2(b)),(2(c),2(d)) and (2(e),2(f)) represent the profile of models $(\ref{eq5})$,$(\ref{eq7})$ and $(\ref{eq9})$ respectively. That is, each row represents the behavior of drug in both compartments under each models respectively. (a) (b) (c) (d) (e) (f) Figure 3: Time profile of amount of drug in compartment $1\&2$ of the three fractional models at various $\alpha$. Subfigures: (3(a),3(b)),(3(c),3(d)) and (3(e),3(f)) represent the profile of models $(\ref{eq5})$,$(\ref{eq7})$ and $(\ref{eq9})$ respectively. In contrast to the classic case, the resulting fractional case in the various profiles typically shows slower, non-exponential dynamics. The fractional profile appeared to have a quicker phase at first but then slowed down. The fractional case in $figure(\ref{fig7:a},\ref{fig7:c})$ exhibits a faster behavior at a very short time (say $1hour$) as opposed to the fractional case in $figure(\ref{fig7:e})$, which also exhibits a faster behavior but takes a longer time (say $10hours$ of the running time) before exhibiting a slower phase. This is another example of the anomalous behavior among the fractional models. Though all three models employ the same parameter values, it should be noted that some of the parameters have different units. For instance, because the parameter $k_{12}$ in model $(\ref{eq5})$ has different units ($hours^{-1}$ vs. $hours^{-0.5}$), it cannot be compared across the fractional and classical situations. Additionally, each model equation for each scenario uses the same units for $k_{12}$. The parameter $k_{12}$, on the other hand, has different units in the two equations in $\ref{eq7})$. For instance, the first and second equations call for the parameter $(k_{12})$ to have a value of $hours^{-0.5}$ and $hours^{-0.7}$, respectively. However, there is a note we made regarding the figures, particularly $figure(\ref{fig7:a},\ref{fig7:b},\ref{fig7:c},\ref{fig7:d})$. Despite the model’s unit inconsistencies, we found that the non-commensurable system exhibits a comparable tendency to that of the commensurable system.We can also see that compartment 1 behaves similarly for commensurable and non- commensurable systems in $figure(\ref{fig88})$ as $\alpha$ increases compared to the implicit non-commensurate model. But among all models, the amount of medication in compartment 2 decreases more quickly. We propose that most medications are distributed over a substantially longer period of time, deviating from the classical case of diffusion to a condition known as anomalous diffusion, which is best represented by power-laws. Instead of the rate constant value, the slower kinetics result from the power- characteristics law’s in the terminal phase of the fractional case. We physically connect the slower kinetics to deeper bone and tissue where bone- seeking elements like plutonium, strontium, and calcium exhibit this type of abnormal diffusion behavior. One medication with unusual, non-exponential (power-laws) kinetics is the antiarrhythmic medication amiodarone. To show that fractional differential equation worth for further research in the field pharmacokinetics, we consider fitting the Classical PK model $(\ref{eq1})$ and the Fractional PK models $(\ref{eq5},\ref{eq7},\ref{eq9})$ to an amiodarone dataset taken from [32] to estimate the parameters of the model $(V_{1},k_{10},k_{12},k_{21},\alpha$ and $\beta)$ since in practice, data are primarily available for the central compartment of the system. The outcome of the numerical simulation, $A_{1}(t)$ is connected to the equation below to determine the parameters. $C(t)=A_{1}(t)/V_{1}$ (22) where $C$ is the concentration of the drug in the blood and $V_{1}$ is the volume of distribution. Figure 4: Experimental data (circles) with superimposed the fit of linear two compartmental system: ordinary system, $Eq.(\ref{eq1})$ in the text (solid line), commensurate FDE, $Eq.(\ref{eq5})$ (dashed line), non-commensurate FDE, $Eq.(\ref{eq7})$ (dash-dotted line) and implicit non-commensurate FDE, $Eq.(\ref{eq9})$ (dotted line). $Table(\ref{t1})$ shows the parameter estimates of the various models with their corresponding standard errors. Also, $figure(\ref{fig9})$ displays a semi-log plots of the experimental data with a best fit of the classical and fractional PK models $(\ref{eq1},\ref{eq5},\ref{eq7},\ref{eq9})$ considered under this work. We take a good look at the unit of these parameters of each model. The classical model $(\ref{eq1})$ has the unit of all parameters to be $(day^{-1})$ and fractional model $(\ref{eq5})$ with the fractional order as $\alpha$ has unit $(day^{-\alpha})$ for all parameters. Also, fractional model $(\ref{eq9})$ has unit $(day^{-1})$ for parameters $(k_{10},k_{12})$ and a different unit $(day^{-\alpha})$ for parameter $(k_{21})$ which poses no deficiency in the model. Moreover, fractional model $(\ref{eq7})$ has unit $(day^{-\alpha})$ for $(k_{10})$ but the parameters $(k_{12},k_{23})$ have unit $(day^{-\alpha})$ or $(day^{-\beta})$ depending where they appear in the model (equation) hence inconsistency of units show up. Nonetheless, the non- commensurate model $(\ref{eq7})$ together with the other two fractional models $(\ref{eq5},\ref{eq9})$ give an adequate fit to the experimental data from visual inspection since amiodarone data are known to have an anomalous behavior (kinetics). This is a further observation to the non-commensurable systems that it will equally fit to an experimental data as equal as the other models. On the other hand, the classical PK model initially behaves well but later deviates from the anomalous behavior of the drug since the classical model are always exponential sum. The difference between both kinetics is that power-law always has slower processes as compared to the exponential no matter how massive the half-life is. The advantage of defining the data with Power- law kinetics, is its significant clinical inferences, including infinite AUC and accumulation without reaching a steady state [10]. Parameter Estimates --- | Classical model | | Fractional model | Parameter | $model(\ref{eq1})$ | $model(\ref{eq5})$ | $model(\ref{eq7})$ | $model(\ref{eq9})$ $k_{10}$ | $3.7598(0.1053)$ | $2.8964(0.4215)$ | $3.1564(0.6651)$ | $1.7150(1.0830)$ $k_{12}$ | $1.2705(0.3442)$ | $1.2294(0.4212)$ | $2.1502(0.2632)$ | $2.9483(0.5254)$ $k_{21}$ | $0.2996(0.1381)$ | $0.1328(0.0660)$ | $1.2412(0.1829)$ | $0.3412(0.1310)$ $\alpha$ | $-$ | $0.9437(0.0431)$ | $0.9192(0.2331)$ | $0.5506(0.0268)$ $\beta$ | $-$ | $-$ | $0.4444(0.6390)$ | $-$ $V_{1}$ | $4.4787(3.4320)$ | $13.0501(2.2064)$ | $6.0274(2.9343)$ | $9.0547(1.3430)$ Table 1: Parameter estimates (and standard errors) of the PK models fitted to the amiodarone data. 4\. Conclusion This work considered modeling and investigation of the application of fractional calculus to a classical compartmental PK model specifically, two compartments in three different ways: (1) A Commensurate fractional two- compartmental PK model where classical derivatives are simply changed to fractional of equal real-value order. (2) A Non-Commensurate fractional two- compartmental PK model where classical derivatives are also changed to fractional of unequal real-value order. (3) A form of fractionalization where unlike that of the previous two, fractionalization is to the processes not to the compartment. We termed this form as implicit non-commensurate fractional two-compartmental PK model. We have discovered that fractional PK models often exhibit slower power-law behavior than the classical instance, which is always exponential. Furthermore, we discovered that compartment fractionalized models, such as the Commensurate and Non-Commensurate PK models, are significantly slower than the implicit non-commensurate PK model, which is owing to the fractionalization of the processes. Although the non-commensurate PK model does not theoretically give a unit consistency, it should at the very least lead to some anomalies in the results presented in this paper. However, this particular model results illustrated the required qualities of a fractional model as compared to the others, and hence it represents a state of a system. Furthermore, by visual inspection and the output presented in the table, it is seen that non-commensurate model together with the other fractional models fitted well with an amiodarone data unlike the classical model which deviated. Generally, they can be used to investigate any other typical dataset that shows a complex fractional kinetics. Also, we demonstrated that the numerical method proposed work efficiently well for any other complex compartmental system. Since numerical simulation for the classical case of the system prove to be consistent with the analytical results. Acknowledgments Special thanks to National Institute for Mathematical Science (NIMS) for its support and contributions. This support is greatly appreciated. ## References * [1] * [2] Dumitru, B, Amin, J, Samaneh, SD and Jiad, HA. The fractional features of a harmonic oscillator with position-dependent mass. Communications in Theoretical Physics, Vol.72, No.5, 2020. * [3] Parvaiz Ahmad Naik, Kolade M. Owolabi, Mehmet Yavuz, Jian Zu, Chaotic dynamics of a fractional order HIV-1 model involving AIDS-related cancer cells Chaos, Solitons & Fractals, Vol.140,2020. * [4] Mohammadi F, Moradi L, Baleanu D, Jajarmi A. A hybrid functions numerical scheme for fractional optimal control problems: Application to nonanalytic dynamic systems. Journal of Vibration and Control. ,24(21), 2018. * [5] Jajarmi A and Baleanu D. On the fractional optimal control problems with a general derivative operator. Asian J Control.,1-10,2019. https://doi.org/10.1002/asjc.2282 * [6] Petras, I. and Magin, R. Simulation of Drug Uptake in a Two Compartmental Fractional Model for a Biological System. Commun Nonlinear Sci Numer Simul., 2011. * [7] Yu-Han H. Hsu, Ziyin Huang, Gregory Z. Ferl, Chee M. Ng. GPU-Accelerated Compartmental Modeling Analysis of DCE-MRI Data from Glioblastoma Patients Treated with Bevacizumab. PLOS ONE — DOI:10.1371/journal.pone.0118421, 2015. * [8] M.U. Akhmet, G.A. Bekmukhambetova. A prototype compartmental model of blood pressure distribution. Nonlinear Analysis: real world applications.,11:1249-1257, 2010. * [9] Yang, CT, Fung, TWK,Tam, WM. Analysis of breath alcohol measurements using compartmental and generalized linear models. The 19th International Conference on Computational Statistics (COMPSTAT’ 2010), Paris, France, 22-27 August 2010. In the Proceedings of COMPSTAT’ 2010, p. 1693-1700 How to Cite? DOI: http://dx.doi.org/10.1007/978-3-7908-2604-3. * [10] Dokoumetzidis, A. and Macheras, P. Fractional kinetics in drug absorption and disposition processes. J Pharmacokinet Pharmacodyn, 36, 165-178, 2009. * [11] Dokoumetzidis, A., Magin, R. and Macheras, P. Fractional kinetics in multi-compartmental systems. J Pharmacokinet Pharmacodyn 37, 507–524, 2010. * [12] Popović, J-K., Atanacković, M-T., Pilipović, S-A.,Rapaić, R-M., Pilipović, S. and Atanacković, M-T. A new approach to the compartmental analysis in pharmacokinetics: fractional time evolution of diclofenac. J Pharmacokinet Pharmacodyn 37, 119–134, 2010. * [13] Petráš, I. and Magin, R-L. Simulation of Drug Uptake in a Two Compartmental Fractional Model for a Biological System. Commun Nonlinear Sci Numer Simul. 16(12), 4588–4595, 2011 * [14] Davide Verotta. Fractional compartmental models and multi-term Mittag–Leffler response functions. J Pharmacokinet Pharmacodyn 37, 209–215, 2010. * [15] Marsh RE, Tuszynski JA. Fractal Michaelis-Menten kinetics under steady state conditions:application to Mibefradil. Pharm Res 23:27602767. doi:10.1007/s11095-006-9090-6, 2006. * [16] Fuite J, Marsh R, Tuszynski J. Fractal pharmacokinetics of the drug Miberfradil in the liver. Phys Rev E Stat Nonlinear Soft Matter Phys 66:021904. doi:10.1103/PhysRevE.66.021904 2002. * [17] Wise ME. Negative power functions of time in pharmacokinetics and their implications. J Phamacokinet Biopharmaceut 13:309346. doi:10.1007/BF0106565, 1985. * [18] Tucker GT, Jackson PR, Storey GC, Holt DW. Amiodarone disposition: polyexponential, power and gamma functions.. Eur J Clin Pharmacol 26:655656. doi:10.1007/BF00543506, 1984. * [19] Zhen Wang, Xia Huang and Jianping Zhou. A Numerical Method for Delayed Fractional-Order Differential Equations: Based on G-L Definition. Appl. Math. Inf. Sci.7, No. 2L, 525-529 (2013) * [20] Jafari, H. and Daftarder-Gejji. Solving linear and nonlinear fractional diffusion and wave equations by Adomian decomposition . Appl. Math. and Comput. 2006\. * [21] Rawashdeh, E-A. Numerical solution of fractional integro-differential equations by collocation method. Appl. Math. Comput., 2006. * [22] Podlubny, I. Fractional Differential Equations. Academic Press, New York., 1999. * [23] Kilbas, A., Srivastava, H. and Trujillo, J. Theory and applications of fractional differential equations. Elsevier, Amsterdam, 2006. * [24] R.Khalil, M. Al Horani, A.Yousef, M.Sababheh A new definition of fractional derivative Journal of Computational and Applied Mathematics * [25] Bonilla B, Rivero M, Trujillo JJ. On systems of linear fractional differential equations with constant coefficients. Appl Math Comput 187:6878, 2007. * [26] Dokoumetzidis A, Magin R, Macheras P. A commentary on fractionalization of multi-compartmental models. J Pharmacokinet Pharmacodyn 37:203207, 2010. * [27] Sweilam, N-H., Khader, M-M. and Mahdy, A-M-S. Numerical studies for solving fractional order logistic equation. International Journal of Pure and Applied Mathematics. 78(12), 1199–1210, 2012. * [28] Christopher N. Angstmann, Austen M. Erickson, Bruce I. Henry, Anna V. McGann, John M. Murray, and James A. Nichols Fractional Order Compartment Models SIAM Journal on Applied Mathematics, 2017, Vol. 77, No. 2 : pp. 430-446 * [29] Bashir, A., Mushtaq, M., Zafar, Z.U.A. et al. Comparison of fractional order techniques for measles dynamics. Adv Differ Equ 2019, 334 (2019). https://doi.org/10.1186/s13662-019-2272-4 * [30] Cardoso, L.C., Dos Santos, F.L.P. & Camargo, R.F. Analysis of fractional-order models for hepatitis B. Comp. Appl. Math. 37, 4570–4586 (2018). https://doi.org/10.1007/s40314-018-0588-4 * [31] Angstmann, C.N.; Henry, B.I.; McGann, A.V. A Fractional-Order Infectivity and Recovery SIR Model. Fractal Fract. 2017, 1, 11. * [32] Weiss M. The anomalous pharmacokinetics of amiodarone explained by nonexponential tissue trapping. J Pharmacokinet Biopharm 27:383396, 1999. * [33] Hickey A.J., Smyth H.D.C. Fractal Pharmacokinetics, Systems Pharmacology, Network Analysis, Multiscale, Kinetics, Toxicokinetics, Drug Safety. In: Pharmaco-complexity. AAPS Introductions in the Pharmaceutical Sciences. Springer, Cham. 2020, https://doi.org/10.1007/978-3-030-42783-$2_{5}$ * [34] Wesolowski, C.A., Wanasundara, S.N., Babyn, P.S. et al. Comparison of the gamma-Pareto convolution with conventional methods of characterising metformin pharmacokinetics in dogs. J Pharmacokinet Pharmacodyn 47, 19–45 (2020). https://doi.org/10.1007/s10928-019-09666-z * [35] Wesolowski, C.A., Wanasundara, S.N., Wesolowski, M.J. et al. A gamma-distribution convolution model of 99mTc-MIBI thyroid time-activity curves. EJNMMI Phys 3, 31 (2016). https://doi.org/10.1186/s40658-016-0166-z * [36] Panos Macheras, Athanassios Iliadis Modeling in Biopharmaceutics, Pharmacokinetics and Pharmacodynamics Homogeneous and Heterogeneous Approaches * [37] Samaneh Soradi Zeid Approximation methods for solving fractional equations Chaos, Solitons and Fractals, Volume 125, August 2019, Pages 171-193 * [38] Angelamaria Cardone, Dajana Conte Stability analysis of spline collocation methods for fractional differential equations Mathematics and Computers in Simulation Volume 178, December 2020, Pages 501-514 * [39] B. Ivorra and M.R. Ferrández and M. Vela-Pérez and A.M. Ramos Mathematical modeling of the spread of the coronavirus disease 2019 (COVID-19) taking into account the undetected infections. The case of China Communications in Nonlinear Science and Numerical Simulation Volume 88, 2020, Pages 105303 * [40] I. Esra Buyuktahtakın and Emmanuel des-Bordes and Eyyub Y. Kibis A new epidemics–logistics model: Insights into controlling the Ebola virus disease in West Africa European Journal of Operational Research Volume 265, 2018, Pages 1046-1063 * [41] T. Berge, J.M.-S. Lubuma, G.M. Moremedi, N. Morris & R. Kondera-Shava A simple mathematical model for Ebola in Africa European Journal of Operational Research Volume 265, 2018, Pages 1046-1063 * [42] Opoku, Nicholas and Afriyie, Cecilia The Role of Control Measures and the Environment in the Transmission Dynamics of Cholera Abstract and Applied Analysis Volume 2020, 2020, Pages 16 * [43] Baleanu, D., Ghanbari, B., Asad, J. H., Jajarmi, A., Pirouz, H. M. Planar System-Masses in an Equilateral Triangle: Numerical Study within Fractional Calculus CMES-Computer Modeling in Engineering & Sciences Volume 124(3), 2020, Pages 953-968 * [44] Jajarmi, Amin and Baleanu, Dumitru A New Iterative Method for the Numerical Solution of High-Order Non-linear Fractional Boundary Value Problems Frontiers in Physics Volume 8, 2020, Pages 220 * [45] Samaneh Sadat Sajjadi and Dumitru Baleanu and Amin Jajarmi and Hassan Mohammadi Pirouz A new adaptive synchronization and hyperchaos control of a biological snap oscillator Chaos, Solitons & Fractals Volume 138, 2020, Pages 109919 * [46] Dumitru Baleanu and Amin Jajarmi and Samaneh Sadat Sajjadi and Jihad H Asad The fractional features of a harmonic oscillator with position-dependent mass Communications in Theoretical Physics Volume 72, 2020, Pages 055002 * [47] Jajarmi, Amin and Baleanu, Dumitru On the fractional optimal control problems with a general derivative operator Asian Journal of Control 2019 * [48] Mohammadi F, Moradi L, Baleanu D, Jajarmi A. A hybrid functions numerical scheme for fractional optimal control problems: Application to nonanalytic dynamic systems Journal of Vibration and Control Volume 24(21), 2018, Pages 5030-5043 * [49] Sopasakis P, Sarimveis H, Macheras P, Dokoumetzidis A Fractional calculus in pharmacokinetics J Pharmacokinet Pharmacodyn Volume 45(1), 2018, Pages 107-125 * [50] Dana Copot, Richard L. Magin,Robin De Keyser, Clara Ionescu Data-driven modelling of drug tissue trapping using anomalous kinetics Chaos, Solitons and Fractals 2017 * [51] Kolade M. Owolabi and Albert Shikongo Mathematical modelling of multi-mutation and drug resistance model with fractional derivative Alexandria Engineering Journal 2020 Volume 45, 2020, Pages 2291-2304 * [52] Parvaiz Ahmad Naik and Jian Zu and Kolade M. Owolabi Modeling the mechanics of viral kinetics under immune control during primary infection of HIV-1 with treatment in fractional order Physica A: Statistical Mechanics and its Applications Volume 545, 2020, Pages 123816 * [53] Kolade M. Owolabi and Albert Shikongo Fractional operator method on a multi-mutation and intrinsic resistance model Alexandria Engineering Journal Volume 59, 2020, Pages 1999-2013 * [54] Parvaiz Ahmad Naik and Jian Zu and Kolade M. Owolabi Global dynamics of a fractional order model for the transmission of HIV epidemic with optimal control Chaos, Solitons & Fractals Volume 138, 2020, Pages 109826 * [55] Karaagac, Berat and Owolabi, Kolade and Nisar, Kottakkaran Analysis and Dynamics of Illicit Drug Use Described by Fractional Derivative with Mittag-Leffler Kernel Cmc -Tech Science Press- Volume 65, 2020, Pages 1905-1924 * [56] Owolabi, K. M., Gómez-Aguilar, J. F., Fernández-Anaya, G., Lavín-Delgado, J. E., & Hernández-Castillo, E. Modelling of Chaotic Processes with Caputo Fractional Order Derivative Entropy (Basel, Switzerland) Volume 22, 2020, Pages 1027 * [57] Christopher N. Angstmann, Austen M. Erickson, Bruce I. Henry, Anna V. McGann, John M. Murray, and James A. Nichols A General Framework for Fractional Order Compartment Models SIAM Rev. 2021, 63(2), 375–392 * [58] Yanli Qiao, Huanying Xu, Haitao Qi Numerical simulation of a two-compartmental fractional model in pharmacokinetics and parameters estimation Mathematical Methods in the Applied Sciences, 2021 * [59]
3,915
ccaa8f791e0fec5d7f9f98596c9e6f3d
French Open Data
Open Government
Various open data
2,016
JOAFE_PDF_Unitaire_20160049_01334.pdf
journal-officiel.gouv.fr
French
Spoken
174
397
148e année. - No 49 Samedi 3 décembre 2016 ANNEXE AU JOURNAL OFFICIEL DE LA RÉPUBLIQUE FRANÇAISE LOIS ET DÉCRETS DIRECTION DE L'INFORMATION LÉGALE ET ADMINISTRATIVE 26, rue Desaix, 75727 PARIS CEDEX 15 D.I.L.A CN=DILA SIGNATURE-03,OU=0002 13000918600011,O=DILA,C=FR 75015 Paris 2016-11-30 16:28:56 Standard . . . . . . . . . . 01.40.58.75.00 Annonces . . . . . . . . . . 01.40.58.77.56 Accueil commercial . . 01.40.15.70.10 www.journal-officiel.gouv.fr Associations Fondations d'entreprise Associations syndicales de propriétaires Fonds de dotation Annonce n° 1334 - page 81 66 - Pyrénées-Orientales ASSOCIATIONS Créations Déclaration à la préfecture des Pyrénées-Orientales. TERRE À CLAIRA. Objet : faire découvrir la poterie et le modelage auprès de ses adhérents ; proposer aux adhérents, la découverte, la convivialité, le plaisir d'être ensemble, la pratique d'une activité artistique ; participer à des manifestations ayant un rapport avec la poterie ou le modelage. Siège social : Villa Lefrancacé, route de Saint-Laurent, 66530 Claira. Date de la déclaration : 22 novembre 2016. 1334. Le Directeur de l’information légale et administrative : Bertrand MUNCH
31,179
35246acb3c1b1fab62957629a2e99965
French Open Data
Open Government
Various open data
2,019
JOAFE_PDF_Unitaire_20190020_00540.pdf
journal-officiel.gouv.fr
Danish
Spoken
85
229
e 151 année. - N°20 Samedi 18 mai 2019 D.I.L.A serialNumber=S6910003,CN=DILA - SIGNATURE DILA,organizationIdentifier=NTRFR-13000918600011,OU=0002 13000918600011,O=DILA,C=FR 75015 Paris 2019-05-18 09:01:15 Associations Fondations d'entreprise Associations syndicales de propriétaires Fonds de dotation Fondations partenariales Annonce n° 540 31 - Haute-Garonne ASSOCIATIONS Modifications Déclaration à la préfecture de la Haute-Garonne MELTING POT. Siège social : 62, avenue Albert Bedouce, 31400 Toulouse. Transféré, nouvelle adresse : 25, rue de Nice, 31400 Toulouse. Date de la déclaration : 26 avril 2019. Le Directeur de l’information légale et administrative : Bertrand MUNCH
27,605
https://github.com/adnelson/nix-eval/blob/master/src/Nix/Evaluator/AbstractContext.hs
Github Open Source
Open Source
MIT
2,016
nix-eval
adnelson
Haskell
Code
283
497
-- | Defines an abstract evaluation context. module Nix.Evaluator.AbstractContext where import Nix.Common import Nix.Evaluator.Errors -- | Types of directories, as defined in the nix manual. data FileType = RegularType | DirectoryType | SymlinkType | UnknownType deriving (Show, Eq, Ord, Enum) -- | A representation of directory structure. Directory contents are -- wrapped in some monadic action, which means we don't need to parse -- an entire (potentially huge) directory. data FileSystemRep m = File Text -- ^ A file, with its contents. | Symlink FilePath -- ^ A symlink, with some path referenced. | Directory (Map Text (m DirRep)) -- ^ A directory. -- | Return the type of a filesystem representation. fileTypeOf :: FileSystemRep m -> FileType fileTypeOf = \case File _ -> RegularType Symlink _ -> SymlinkType Directory _ -> DirectoryType class Monad m => ReadFileSystem m where -- | Given a file path, return an abstract representation of its -- contents, if it exists. Otherwise, return 'Nothing'. readPath :: FilePath -> m (Maybe (FileSystemRep m)) -- | If the given file path exists, return its type (else 'Nothing'). typeOfPath :: ReadFileSystem m => FilePath -> m (Maybe FileType) typeOfPath = map fileTypeOf . readPath class Monad m => -- | An abstraction of the operations we'll need to perform during -- evaluation, in particular performing effectful actions. class (MonadError EvalError m, WriteMessage m) => Nix m where -- | Read a file. If the file doesn't exist, throw 'FileDoesNotExist'. readFileFromDisk :: FilePath -> m Text -- | Read directory, and return its contents as map of (name -> type). listDirectory :: FilePath -> m (Record FileType) -- | Write a file to the nix store. writeFileToStore :: FilePath -> Text
36,630
US-201113078875-A_1
USPTO
Open Government
Public Domain
2,011
None
None
English
Spoken
7,825
9,390
Image processing apparatus and control method ABSTRACT An image processing apparatus includes a browser which obtains an external resource or internal resource of the apparatus and displays the resource on the display unit, and a storage unit for storing an internal resource that can be displayed on the display unit. The image processing apparatus performs control not to display information by which storage location of the internal resource in the storing unit is identifiable in the case where the resource obtained by the browser unit is an internal resource. CROSS REFERENCE TO RELATED APPLICATIONS This application is a Continuation of U.S. patent application Ser. No. 11/313,604, filed Dec. 20, 2005, entitled “IMAGE PROCESSING APPARATUS AND CONTROL METHOD”, the content of which is expressly incorporated by reference herein in its entirety. This application also claims priority from Japanese Patent Application No. 2004-380503 filed Dec. 28, 2004 and No. 2005-348098 filed Dec. 1, 2005, which are hereby incorporated by reference herein in their entirety. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an image processing apparatus and a method of controlling the display thereof. In particular, the present invention has a preferred application in a multifunction image forming device that includes a web browser function. 2. Description of the Related Art Web browsers are generally used to view the contents on the World Wide Web (WWW). In addition to the contents, the web browser displays information with which storage location of the resource can be identified, such as the uniform resource locator (URL) or the path name of the file of the content currently viewed, on a display area such as the address bar. Hereinafter, the storage location of a resource such as a content on the Web (or, merely referred to as contents) or a file stored in the FTP server will be referred to as URL, and the storage location of files in general will be referred to as the path name. However, both storage locations may be collectively referred to as URL in the case where it is not necessary to distinguish between the storage locations. Furthermore, regardless of whether such contents on the Web and files are located within the apparatus or outside the apparatus, contents and files will be collectively called a resource. The URL or the path to the file of the content is displayed as it is on the address bar on the web browser, regardless of whether the displayed content is obtained from a WWW server, over a local area network (LAN), or from a file system of the device equipped with the web browser. In recent years, web browsers have been installed in image processing apparatus such as a multifunction device so as to be able to display contents on the operation section having a display function. (For example, refer to Japanese Patent Application Laid-Open No. 2003-122279). In the case of an integrated device such as the image processing apparatus, file systems and directory configuration within the device are often kept secret from a user. However, if a file within the system of such integrated device is displayed on a browser and the path to the file is displayed as it is, the file system of the device such as the directory structure will become known to the user. As a result, it may lead to an ill-intentioned user gaining unauthorized access to the file system within the device. SUMMARY OF THE INVENTION In view of the above problems, the present invention is directed to controlling the displaying of an address by a web browser installed in an integrated device such as an image processing apparatus in which the file system is kept secret, and improving the security of the device. An aspect of the present invention is directed to an image processing apparatus including a browser unit for obtaining an external resource or resource within the apparatus and displaying the resource on a display unit, a storage unit for storing an internal resource that can be displayed on the display unit, and a control unit for controlling the browser unit so as to not display information by which the storage location of the internal resource in the data storage unit is identifiable when the resource obtained by the browser unit is the internal resource stored in the data storage unit. Another aspect of the present invention is to provide an image processing apparatus including a browser unit for obtaining a resource within the device and displaying it on a display unit, a storage unit for storing an internal resource that can be displayed on the display unit, wherein the internal resource includes a first resource stored in a first storage area wherein the storage location of resource within the storage unit is managed so as to be kept secret, and a second resource stored in a second storage area wherein the storage location of the resource in the storage unit can be disclosed, and a control unit for controlling the browser unit so as to not display on the display unit information by which the storage location of the first resource is identifiable when the browser unit displays a first resource stored in the first storage area. Another aspect of the present invention is to provide an image processing apparatus including a browser unit for obtaining an external resource or resource within the apparatus and visualizing it on a visualizing unit, a storage unit for storing an internal resource that can be visualized by the visualizing unit, and a control unit for controlling the browser unit so as to not output to the visualizing unit information by which the storage location of the internal resource in the storage unit is identifiable when the resource obtained by the browser unit is an internal resource stored in the storage unit. Other features and advantages of the present invention will become apparent to those skilled in the art upon reading of the following detailed description of embodiments thereof when taken in conjunction with the accompanying drawings, in which like reference characters designate the same or similar parts throughout the figures thereof. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention. FIG. 1 is a block diagram of a system example which includes a multifunction device and a web server according to an embodiment of the present invention. FIG. 2 shows a standard display screen of the multifunction device in operation according to the present embodiment. FIG. 3 shows an example of a display screen in which a browser function is activated. FIG. 4 is a flow chart of a display operation by the web browser function in the multifunction device. FIG. 5 shows an example of a display of an external content by the web browser. FIG. 6 shows an example of a display of an internal content by the web browser. FIG. 7 shows a pop-up menu window that is displayed after pressing the menu key 320. FIG. 8 shows the detailed information window for an external content. FIG. 9 shows the detailed information window for an internal content. FIG. 10 shows an example of a printout of an external content. FIG. 11 shows an example of a printout of an internal content. FIG. 12 shows the detailed information window for a bookmark for an external content. FIG. 13 shows the detailed information window for a bookmark for the internal contents. FIG. 14 shows an example of a content display screen by the web browser. FIG. 15 shows an example of a content display screen by the web browser. FIG. 16 is a flowchart of the display operation performed by the web browser function in the multifunction device. FIG. 17 is a block diagram of a computer in which the operation of the image processing apparatus according to the present embodiment can be realized. DETAILED DESCRIPTION OF THE EMBODIMENTS Embodiments of the invention will be described in detail below with reference to the drawings. First Embodiment FIG. 1 is a block diagram illustrating an example of a system including an image processing apparatus and a web server according to an embodiment of the present invention. In FIG. 1, a multifunction device 100 is shown as an example of an image processing apparatus according to the present embodiment. The multifunction device 100 is connected to a web server 150 through a network 180 so as to communicate with the web server 150. An external device that can be connected to the multifunction device 100 through the network 180 is not limited to the web server 150 as illustrated in FIG. 1. For example, the multifunction device 100 can be configured to be connectible to a plurality of external devices through the network 180. Additionally, a plurality of multifunction devices can be configured to be connected through network 180. Furthermore, the multifunction device 100 includes a web browser function by which the contents provided by the web server 150 through the network 180 or contents within the multifunction device 100 can be displayed. In the descriptions to follow, contents within the multifunction device 100, or contents originally stored in the multifunction device 100, will be referred to as internal contents. Additionally, resources managed by the web server that are released from the web server will be referred to as contents. The multifunction device 100 includes a controller 102, a central processing unit (CPU) 104, a random access memory (RAM) 106, a read only memory (ROM) 108, a web browser function 110, and a web server function 112. Additionally, the multifunction device 100 includes an operation section 120, a network interface (N/W interface) 130, a hard disk (HDD) 140, a scanning section 146, and a printing section 148. The hard disk 140 includes an internal content database 142 and an internal file database 144. The operation section 120 includes a display unit 122 and manual operation unit 124. The controller 102 controls the functional parts of the multifunction device 100 and its overall operation. The controller 102 includes the CPU 104, the RAM 106, and the ROM 108. The CPU 104 performs the control by downloading a program stored in the ROM 108 or hard disk 140 onto the RAM 106 and executing the program. The web browser function 110 is to interpret contents in the web server 150 or within the multifunction device 100 and display the content on the display unit 122. For example, the web browser function 110 displays contents stored in the internal database 142 or data files stored in the internal database 144 on the display unit 122. Additionally, for example, through the network interface 130, the web browser function 110 downloads contents stored in the external content database 162 in the web server 150 that is connected through network 180 and displays the contents on the display unit 122. The web server function 112 provides a WWW server function. Various contents stored in the internal content database within the hard disk 140 are provided as web contents in response to access requests from external web clients such as a personal computer (not shown) that has a web browser function. In FIG. 1, the web browser function 110 and web server function 112 that are configured as independent hardware can also be implemented by software respectively. That is, applications that realize the web browser function can be installed in the hard disk 140 or the ROM 108 and the CPU 104 can run the web browser applications. In the same manner, an application or service for realizing a web server can be installed in the hard disk 140 or ROM 108 and the CPU can run the web server application or service. As described above, the operation section 120 includes the display unit 122 and the manual operation unit 124 and enables the user to make various settings or operations on the multifunction device 100. The display unit 122 displays contents by the web browser function 110 and also displays the operating or setting screen of the multifunction device 100. An example of a display screen by the web browser function 110 on the display unit 122 is illustrated in FIG. 3 which is described later. While the web browser function 110 is activated, the display unit 122 becomes a web browser display screen, and the manual operation unit 124 accepts also operations intended for the web browser function 110. The manual operation unit 124 can be configured as the display unit 122 employing a touch panel or touch screen, or configured independent of the display unit 122 employing buttons such as ten-key buttons. Additionally, the manual operation unit 124 can be configured to employ both touch panel and buttons. Furthermore, a mouse, track ball, joystick, or keyboard (not shown) can be connected to the multifunction device 100 to constitute a part of the manual operation unit 124. The network interface 130 is an interface for connecting the multifunction device 100 and network 180, and data is transmitted or received to and from external devices such as the web server 150 through the network 180. The hard disk 140 is a large-capacity storage medium and stores various programs to be executed by CPU 104 and various setting values of the multifunction device 100. The hard disk 140 includes an internal content database 142 and an internal file database 144. The internal content database 142 stores web contents to be released to the outside by the web server function 112. Typical examples of internal contents are HyperText Markup Language (HTML) files and Common Gateway Interface (CGI) scripts. Additionally, contents such as document files created on PC applications, that are registered in the internal content database 142 for release on the web, are internal contents. The internal file database 144 stores data files that are not web contents but are originally used within the device. Among the internal files are image data temporarily generated in conducting image processing operations using the scanning section 146 or the printing section 148, various setting values for the multifunction device 100 as described above, or document data or image data that are not released to the outside by the web server function 112. Since internal files are not released by the web server function 112, an external personal computer (not shown) having a web browser function cannot access the files. However, if the web browser function 110 of the multifunction device 100 is used, the internal files can be accessed. Additionally, it is possible to access the internal contents by using the web browser function 110. The interior of the hard disk 140 is managed by a hierarchical structure file system. The logical storage location of a desired file within the hard disk 140 can be found out if a volume name of the disk, the upper-to-lower directory folder hierarchy, and a file name are known. The scanning section 146 reads the original image and generates image data, or, in other words, scans images. The printing section 148 outputs an image based on the original image or printing data received from the outside onto a printing medium, namely, prints images on a printout paper. Since the scanning section 146 and printing section 148 are configured in the same way as the scanning section (the reading section), and the printing section (the image output or image forming section) of conventional multifunction devices, detailed descriptions are omitted. Web server 150 includes a CPU 152, RAM 154, ROM 156, a hard disk 158, and a network interface (N/W interface) 160. The hard disk 158 includes an external database 162 and an external file database 164. The CPU 152 performs overall control of the web server 150 by downloading and running various programs stored in the ROM 156 or hard disk 158 onto the RAM 154. The web server 150 includes a web service function and a file transfer protocol (FTP) function, and these functions are realized by the CPU 152 running the program installed in the hard disk 158. The Network interface 160 connects the web server 150 and network 180, and data is transmitted and received to and from the multifunction device 100 through the network 180. Similar to the internal content database 142 of the multifunction device 100, the content database 162 stores so-called web contents to be released to the outside by the web server 150. The web server 150 accepts external access requests through the network 180. In response thereto, the data or content complying with the request is read out from the content database 162 and is sent to the source of request through the network interface 160 and network 180. Examples of the contents are HTML files and CGI scripts provided by the web server. Additionally, files such as image files, sound clips, moving images files, document files, and page description language files that can be provided by the web servers are also examples of external contents. Furthermore, in the present embodiment, the web server 150 includes a FTP server function, and can transmit contents stored in the content database 162 in response to a request from an FTP client. The file database 164 is not provided by a web server or a FTP server. The file database 164 mainly stores files used within the web server 150. FIG. 2 illustrates an example of a standard screen of the multifunction device 100 displayed on the display unit 122 of the operation section 120. As shown in FIG. 2, a plurality of touch buttons are displayed on the upper part of the display unit 122 as tab keys respectively for each function, such as “copy” tab key 201, “send/fax” tab key 202, “box” tab key 203, and “browser” tab key 204. By designating the browser tab key 204, it is possible to activate the browser function. In the case where the multifunction device 100 is provided with more than five functions, a tab key 205 of a right-pointing arrow is placed further to the right end of the four function tab keys. The standard screen as shown in FIG. 2 is an initial screen of the copy function which is displayed when the “copy” tab key 201 is pressed. Reference numeral 206 denotes an area for displaying items relevant to the copy function, and the status that should be displayed for the copy function such as “ready to copy” is displayed on the most upper part of the display area 206. Below the status, the copy ratio, the type of paper selected, and number of copies are displayed. Additionally, “direct” key, “copy ratio” key, “paper select” key, “sort” key, “two-sided” key, and “interrupt” key are displayed as touch buttons for setting the operation mode of the copy function. Further, to adjust the color density of printing, a left-pointing arrow key for lightening, a right-pointing key for darkening, and an automatic adjusting key are displayed. Moreover, a key for specifying the type of the original image (text/photo/map) is displayed, and the initial setting is automatically switched in accordance with the type specified by the key. With respect to operating modes that cannot be displayed on the initial screen, a setting screen for specifying them is displayed in the display area 206 hierarchically by pressing the application mode key. A display area 207 displays the status of the multifunction device 100. For example, an alarm message indicating paper jam, or a status message indicating that the printing function is activated is displayed. By pressing the “system status/cancel” touch button 208, a screen (not shown) of the device information or print job status is displayed which enables to cancel a job. When the “send/fax” tab key 202 is pressed, a setting screen (not shown) is displayed to send images read by the scanning section 146 to devices on the network 180 by e-mail transmission or by FTP transmission. Additionally, a setting screen (not shown) is displayed which allows facsimile transmission using a public line (not shown). When the “box” tab key 203 is pressed, a setting screen (not shown) for the box function is displayed. Box function is a function for storing images read by the scanning section 146 in a designated area in the hard disk 140, printing the image data stored in the hard disk 140 using the printing section 148, or transmitting data to devices on the network 180. When the “browser” tab key 204 is pressed, a browser initiating screen as illustrated in FIG. 3 is displayed. In FIG. 3, reference numeral 311 denotes an address bar that displays the URL of the content or the file name of the internal file presently displayed. In the case where a user opens a page by specifying the URL or the path name, the user presses the field of the address bar 311. Then, a soft keyboard is displayed on the screen, and the user can specify the URL or path name so as to display the desired web page or file. When the “bookmark” key 312 is pressed, the URL or the path name of the page presently displayed can be registered. Additionally, registered bookmarks can be called up to display the corresponding page. Sorting of bookmarks can also be performed. A display area 313 is for the content. By pressing “back” key 314 and “forward” key 315, the page currently displayed on the content display area 313 can be turned back to the previous page or turned to the next page. “Reload” key 316 reloads and displays the currently displayed page. “Stop” key 317 cancels the loading of a page. “Home” key 318 is for traveling to a preset homepage. “Print” key 319 is for printing the page currently displayed on the contents display area 313 using the printing section 148. When the “print” key 319 is pressed, a print setting dialog (not shown) is displayed. On the print setting dialog, a window for setting how to print a frame-configured web page, and performing other various settings such as a number of prints, duplex, and sort, is displayed. When a print start button in the window is pressed, printing is started. “Menu” key 320 changes the magnification of the display, character size, and character code, and instructs display of the properties of the content currently being displayed. Next, the operation of the multifunction device 100 according to the present embodiment will be described. Since the image reading operation, or scanning operation, and the image forming operation, or printing operation, of the multifunction device 100 are the same as conventional operations, descriptions of these operations are omitted. Hereinafter, the displaying operation of contents and files on the web browser of multifunction device 100 will be specifically described. FIG. 4 is a flowchart of the displaying operation by the web browser function 110 in the multifunction device 100 of the present embodiment. This flowchart is realized by the CPU 104 of the multifunction device 100 loading the program stored in the ROM 108 or the hard disk 140 onto the RAM 104 and executing it. In step S4010, the URL of the contents or the path name of the file to be displayed by the web browser function 110 is obtained. The user can obtain URL or the path name by entering the URL or the path name into the address bar 311 or using the bookmark 312 to choose the desired contents. Additionally, in the case where another web page is already being displayed by the web browser function, the designated URL can be obtained by a hyperlink in the displayed web page. In step S4020, it is determined whether the content or file to be displayed on display unit 122 by the web browser function 110 is a file within the multifunction device 100 and is stored in the internal file database 144. In the case where the content or file is determined to be a file of multifunctional device 100, the process proceeds to step s4050, and if not, the process proceeds to step s4030. The determination whether the file is stored in the internal file database 144 is made depending on whether the resource to be displayed based on the URL or path name obtained in step s4010 is a file stored in the internal database 144. Alternatively, there is another way of determination. A file stored in the internal file database 144 is not a file provided by the web server function 112. Therefore, the file is not accessed by a URL which begins with “http//”. Accordingly, a file specified by a local path name can be determined to be a file in the internal file database 144. Additionally, if the URL of the file begins with “file.//”, and the host name or IP address following “file.//” indicates the multifunction device 100 itself, then the file can be determined to be a file in the internal file database 144. In step s4030, it is determined whether the content to be displayed on the display unit 122 by the web browser function 110 is a content within the device and is stored in the internal database 142. In the case where it is determined that the content is an internal content within the device, the process proceeds to step s4060, and in the case where the content is not an internal content, the process proceeds to step s4040. The determination whether the content is stored in the internal content database 142 is made depending on whether the resource to be displayed on the basis of the URL or the path name obtained in step s4010 is a content stored in the internal content database 142. Alternatively, if the URL starts with “http//” and the host name or the IP address to follow indicates the multifunction device 100 itself, then the resource specified by the URL can be determined to be a content in the internal content database 142. In step s4040, an external content or external file provided through the network 180 is displayed on the display unit 122 by the web browser function 110. Therefore, the URL of the content or file is displayed on the address bar 311. The content is then displayed on the display unit 122. In step s4050, a file read out from the internal file database 144 is displayed on the display unit 122 by the web browser function 110. Therefore, only the file name of the displayed internal file is shown on the address bar 311 without displaying the entire path name. The file is then displayed on display portion 122. In step s4060, an internal content read out from the internal contents database 142 is displayed on the display unit 122 by the web browser function 110. Therefore, only the content name of the internal contents being displayed is shown on the address bar 311 without displaying the entire URL. The content is then displayed on display unit 122. The flow ends when the process in one of the steps s4040, s4050, or s4060 ends. FIG. 5 and FIG. 6 illustrate examples of the display screen on the display unit 122 according to the present embodiment. In FIG. 5 and FIG. 6, the same reference numerals are used as in FIG. 3 to denote the same components in the drawings. FIG. 5 shows an example of a display screen in the case where an external content or file provided by an external device such as the web server 150 through the network 180 is displayed. FIG. 6 shows an example of a display screen in the case where an internal content or file 142 stored in the multifunction device 100 is displayed. As illustrated in FIG. 5, when an external content is displayed on the display unit 122, the URL of the external content, fttp//www.XXX.jp/index.htm, is displayed as it is. On the other hand, FIG. 6 is an example of a display in the case where an internal content within the device is displayed on the display unit 122. Normally, the URL of the internal content is originally expressed as “file.///dosdev/web/help/copy.html”. However, if an address indicating the directory hierarchy as such is displayed, the internal file system configuration will become known to the user. Therefore, according to the present embodiment, in the case where an internal content is being displayed on the display unit 122 as in FIG. 6, only the file name of the internal contents, “copy.html”, is extracted and displayed on the address bar 311. The file name can be extracted from the URL, for example, by detecting the separator in the URL address such as “/”. As described above, in the case where an internal content or an internal file stored within the multifunction device 100 is displayed on the display unit 122, only the content name or file name is displayed as the URL address of the internal content without indicating the path. This will prevent the user from knowing the file system configuration such as the directory hierarchy inside the multifunction device 100. As a result, the risk of unauthorized access by users is reduced, and the security of the multifunction device is improved. Displaying of Detailed Information The URL display on the address bar 311 was described in reference to FIG. 4. There is another case in which the URL of the content shown on the display 122 by the web browser function 110 is displayed, namely, the detailed information window for the page currently being displayed. The detailed information windows illustrated in FIG. 8 and FIG. 9 are described below. First, the flow as shown in FIG. 4 is executed and the web browser screen as in FIG. 5 and FIG. 6 is displayed. Subsequently, when the menu key 320 is pressed, a pop-up menu window as in FIG. 7 appears on the screen. When the user selects property 710 from menu 700, detailed information on the content being displayed is shown. FIG. 8 illustrates the detailed information window that is displayed when the user selects the property tab on the web browser display screen illustrated in FIG. 5. Various items of information on the page are displayed on the detailed display window 800. The URL is included among the information. In the case of FIG. 8, since the detailed information is about an external content, the URL is shown as it is. FIG. 9 illustrates a detailed information window that is displayed when the user selects the property tab on the web browser display screen illustrated in FIG. 6. The display form of the detailed display window 900 is the same as the detailed display window 800 in FIG. 8. However, since the detailed information in FIG. 9 is about an internal content, the entire URL is not displayed as it is, and instead, a file name, “COPY.html”, is displayed as the URL. Printing of Contents The multifunction device 100 can print out contents displayed on the display unit 122 by the web browser function 110 using the printing section 148. Print instruction can be given by operating the print tab key 319. The controller 102 which controls the printing section 148 includes a function for printing the URL of the content in a predefined position of the printout. In this case, a choice can be made between printing out the URL as it is or printing only the file name. FIG. 10 is the printout of a content displayed on the web browser display screen in FIG. 5 which is made by the printing section 148. At the lower part of the output 1000, the URL 1010 of the content is printed as a footer, separate from the image of the content. Since the content printed in FIG. 10 is an external content, the URL 1010 is printed as it is as the footer. FIG. 11 is the printout of a content displayed on the web browser display screen in FIG. 6 by the printing section 148. Since the content printed in FIG. 11 is an internal content of the multifunction device 100, the entire URL is not printed but only the file name is printed as the footer. Bookmark Management Window The web browser function 110 can register bookmarks of contents in the multifunction device or external contents using the bookmark key 312. Detailed information on the bookmark can be displayed and the bookmark can be edited using the bookmark key 312. The URL can also be displayed and edited within the detailed information of the bookmark. FIG. 12 illustrates a detailed information display window of the bookmark for “http//www.XXX.jp/index.htm” which is the URL of an external content being displayed in FIG. 5. In the bookmark detailed information window 1200 of this page, there is a URL edit field 1210. In the case of FIG. 12, since the bookmark is for an external content, the URL is displayed as it is on the URL edit field 1210. FIG. 13 illustrates a detailed information window for the bookmark of “file///dosdev/web/help/copy.html” which is the URL of an internal content of the multifunction device 100 displayed in FIG. 6. In the bookmark detailed information window 1300 of this page, there is also a URL edit field 1310. In the case of FIG. 13, since the bookmark is for an internal content of the multifunction device 100, only the file name is displayed. However, it is only in the URL edit field 1310 that the entire URL is not displayed. Since the web browser function 110 stores and manages the URL of the content as it is, the bookmark can function correctly. Displaying the URL of the Page to be Liked FIG. 14 and FIG. 15 illustrate a screen displaying a content having the URL, “http//www.hogehoge.com/link.htm”, on the display unit 122. The URL is different from the contents of FIG. 5 and FIG. 6. On the display screen 1413, a hyperlink 1420 having a description, “XXX corporation page”, is shown, that is linked to “http//www.XXX.jp/index.htm” displayed in FIG. 5. Additionally, a hyperlink 1430 having a description, “Help for copying”, is shown, that is linked to “file//dosdev/web/help/copy.html” shown in FIG. 6. In FIG. 14, a pointer 1410, such as a mouse pointer, which is displayed when the user operates on the manual operation unit 124, is placed in the hyperlink 1420 of “XXX corporation page”. When the pointer 1410 is positioned to a hyperlink, the web browser function 110 displays the URL of the hyperlink on the lower left hand-side of the display screen. The form of the URL display changes depending on whether the content indicated by the URL of the hyperlink is an internal content or an external content. In the case of FIG. 14, since the content of the hyperlinked page designated by the pointer 1410 is an external content of the multifunction device 100, the URL of the linked content is displayed as it is as indicated in 1440. On the other hand, in the case of FIG. 15, the content of the hyperlinked page designated by the pointer 1410 is an internal content. Therefore, the URL of the linked content is not displayed as it is, and only the file name is displayed as indicated in 1540. According to the present embodiment, in the case where a content within the internal file system that should be kept secret is displayed, the address of the content or file can be displayed without letting the user know the file system configuration. This enables reduction of the risk that the user may gain unauthorized access to the file system within the device and improves the security. Second Embodiment In the second embodiment of the present invention, the system configuration is the same as that shown in FIG. 1. The initial screen of the multifunction device 100 and the display screen of web browser function 110 are the same as in FIG. 2 and FIG. 3. In the first embodiment, as explained with reference to the flowchart of FIG. 4, the URL of the content in the internal content database 142 or the path name of the file in the internal file database 144 included in the multifunction device 100 was not displayed. However, contents in the internal content database 142 are originally intended to be disclosed by the web server function 112 of the multifunction device 100. Therefore, if it is the internal content database 142, there may be cases in which it does not matter that the directory configuration becomes known. FIG. 16 is a flowchart of the display operation performed by the web browser function 110 in the multifunction device 100 according to the second embodiment. This flowchart is realized by the CPU 104 in the multifunction device 100 loading the program stored in the ROM 108 or the hard disk 104 onto the RAM 106 and executing it. In step s1610, the URL or the path name of the content to be displayed by the web browser function 110 is obtained. This is the same process as in step s4010 in FIG. 4. In step s1620, it is determined whether the content or the file to be displayed on the display unit 122 by the web browser function 110 is a file within the multifunction device 100 and is stored in the internal file database 144. This is the same process as in step s4020 in FIG. 4. In the case where it is determined that the content or file is not a file in the internal file database of the multifunction device 100 in step s1620, the process proceeds to step s1630. In step s1630, the content specified by the URL obtained in step s1610 is displayed on the display unit 122, and the URL is displayed as it is on the address bar 311. Also in the case where the content of the internal content database 144 is to be displayed, its URL is displayed as it is. On the other hand, in step s1620, if the content or file is determined to be a file in the internal file database of the multifunction device 100, then the process proceeds to step s1640. In step s1640, an internal file specified by the path name obtained in step s1610 is displayed on the display unit 122, and only the file name is displayed on the address bar 311. Another method of determination can be used in step s1620. Contents in the internal content database 142 or in the content database 162 of the web server 150 are resources to be released to the outside and are accessed using HyperText Transfer Protocol (HTTP). On the other hand, the internal file database 144 and file database 164 of the web server 150 are resources that are not to be released to the outside and are generally accessed using protocols other than HTTP such as Service Message Block (SMB). That is, in step s1620, it is determined whether to display the URL as it is as in step s1630 or to display only the file name as in step s1640, based on the protocol used by the web browser function 110 in accessing a resource. For example, in the case where a resource is accessed using HTTP, the process proceeds to step s1630, and the content specified by the URL which was obtained in step s1610 is displayed on the display unit 122, and the URL is displayed as it is on the address bar 311. Meanwhile, in the case where a resource is accessed using a protocol other than HTTP, the process proceeds to step s1640, and the file specified by the path name which was obtained in step s1610 is displayed on the display unit 122, and only the file name is displayed on the address bar 311. According to the second embodiment, when a file in the internal file database among the resource of multifunctional device 100 is to be displayed on the web browser and its file system should be kept secret, the file system, that includes the directory configuration, will not become known. Consequently, the risk of unauthorized access to files inside the multifunctional device can be reduced, and security is improved. Third Embodiment According to the above embodiment, when the URL of the internal content or file stored within the device is not displayed in full, only the content name or the file name is displayed. However, instead of omitting the whole path name, it is possible to display the URL or path name with only a part of the URL or path name omitted or concealed so that the user cannot recognize the file system configuration and other relevant information. Alternatively, it is also possible to just display a message as “internal file of the device” without even displaying the file name. In the above case where the URL is not displayed as it is, the display form of the URL can be stored as setting information in the hard disk 140 of the multifunction device 100 and the user such as an administrator with a specified privilege can be allowed to change the setting. If such setting is allowed, its changes could be flexibly made. If security is considered first, even the file name is not displayed. However, if user-friendliness is considered first, a part of the file name or URL is displayed, depending on the security policy. Other Embodiments In order to operate the various devices to realize the above described embodiment, a software program code for realizing such operations can be supplied to the apparatus connected to such various devices or to computers within the system. Operating the various devices according to the program stored in the computer (CPU or MPU) of the system or the apparatus is also included in the scope of the present invention. Additionally, in the above case, the software program code itself realizes the operations of the embodiment, and the program code itself constitutes the present invention. Moreover, a means for supplying the program code to a computer, for example a recording medium (e.g., a non-transitory computer-readable medium containing computer-executable instructions) that stores the program code constitutes the present invention. Such recording medium can be, for example, a flexible disk, hard disk, optical disk, magnetic optical disk, CD-ROM, magnetic tape, nonvolatile memory card, or ROM. Furthermore, in the case where the program code supplied to the computer realizes the operations of the above embodiment in collaboration with an operating system (OS) or other application software running on the computer, such program code is considered to be an embodiment of the present invention. Furthermore, in the case where the supplied program code is stored in the memory equipped in a function enhancement board of the computer or a function enhancement unit connected to the computer, and the CPU in the function enhancement board or the function enhancement unit executes all or part of the processing based on the instructions of the program code to realize the operations of the embodiment, the program code is included in the present invention. For example, instead of an image processing apparatus described in the above embodiment, the operations of the embodiment can be implemented by a computer 1700 as shown in FIG. 17. As shown in FIG. 17, a computer 1700 includes a CPU 1701, ROM 1702, RAM 1703, and a keyboard controller (KBC) 1705 for keyboard (KB) 1709. Additionally, a CRT controller (CRTC) 1706 for CRT display (CRT) 1710, a disk controller (DKC) 1707 for hard disk (HD) 1711 and flexible disk (FD) 1712, and a network interface card (NIC) 1708 are connected so as to be able to communicate through system bus 1704. CPU 1701 controls comprehensively each component connected to the system bus 1704 by running the software stored in ROM 1702 or HD 1711, or supplied from FD 1712. That is, CPU 1701 loads the processing program for carrying out the above operations from ROM 1702, HD 1711, or FD 1712, and executes the program to perform the control for realizing operations of the embodiment. RAM 1703 functions as a main memory or work area for CPU 1701. KBC 1705 controls the instruction input from KB 1709 or pointing device (not shown). CRTC 1706 controls the display of CRT 1710. DKC1707 controls the access to HD 1711 and FD 1712 that store boot programs, various applications, user files, the network management program, and the processing program in the above embodiment. NIC 1708 exchanges data with other apparatus on the network 1713. HD 1711 includes an internal content database and internal file database in the same way as the hard disk 140 of the multifunction device in FIG. 1. In addition, the program for realizing the web browser function or the web server function is installed in HD 1711, and such function can be realized by the CPU 1701 executing the program. Furthermore, the computer 1700 can access a web server equivalent to the web server 150 in FIG. 1 through the network 1713. According to the present invention, in the case where an image based on an internal content or internal file within a device is displayed on a web browser, it is possible to display the name of the content or file without letting the user know the file system configuration by abbreviating the address. This will enable prevention of unauthorized access to the file system inside the device by users and the security is improved. While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. On the contrary, the invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures and functions. 1. An image processing apparatus comprising: a web browser configured to access, by using one of a URL which begins with “file://” or “http://”, a file stored in a storage unit included in the image processing apparatus, and to allow the file acquired by the access to be displayed; and a control unit configured to control, if the web browser accesses the file stored in the storage unit by using the URL which begins with “http://”, to allow display of a character sequence representing the URL of the file acquired by the access which begins with “http://”, and if the web browser accesses the file stored in the storage unit by using the URL which begins with “file://”, to restrict display of a character sequence representing the URL of the file acquired by the access using the URL which begins with “file://” such that a hierarchal structure of a file system managing the file stored in the storage unit is hidden.
30,759
livesofarchbish06hook_12
English-PD
Open Culture
Public Domain
1,860
Lives of the archbishops of Canterbury
Hook, Walter Farquhar, 1798-1875
English
Spoken
7,071
9,562
But at that time popular feeling ran high, and was greatly prej udiced . Prynne was a favourite of th e people, and the severity of his sentence raised him in their eyes to the rank of a martyr. Lord Cottington, one of the judges, declared that " in the writing of this book the devil had either assisted him or he the devil." Judge Eichardson and Secretary Cooke also pronounced their opinions ; and the sentence was given that Prynne should pay a fine of 5,000/. to the king, should be expelled from Oxford, and also from Lincoln's Inn ; that he should be degraded and disabled from his profession at the bar ; that his book should be burnt before his face by the com- mon executioner ; that he shoidd stand twice in pillory, and lose his ears ; and be further imprisoned for his life.* It will be observed that Laud, then Archbishop of Canter- bury, took no part in the proceedings, and did not, except perhaps by his vote, further the condemnation of Prynne. Though this fanatic came again before the Star Cham- ber, we may here mention that he changed his opinions considerably in after times. A work by him appeared in 1649, with the title, "Mr. William Prynne, his De- fence of Stage Plays." An answer was provoked by this, to which he replied by a publication, " Prynne the Mem- ber reconciled to Prynne the Barrister ; an Answer to a Pamphlet entitled, Prynne against Prynne." f His * Rushworth, ii. pp. 231 seq. t A pamphlet published 1649. I I J ARCHBISHOPS OF CANTERBURY. 213 character is shortly given by Wood. " As for this per- chap. son," he says, " he was one of a hot, fiery spirit, and ^—1^:; — 1^ eager of anything that was put into his head, but after- ^!JJ^^°^ wards growing weary of himself, when he had no enemy i633_45. in a manner to encounter with, became more moderate and mild. And having fermented out most of his passion and venome, became for a time a happy instrument of the king's restoration, anno 1660, though there and ever to his last a bitter enemy to prelacy."* The advanced age and the infirmities of Archbishop Changes Abbot prevented his taking any active part in the ad- bishoprics. ministration of the Church, and upon the Bishop of London devolved in consequence a greater share of labour and responsibility. Many changes amongst the bishops occurred in the Church in the year 1632, for at that time died Dr. Harsnet, Archbishop of York ; Dr. Houson, Bishop of Durham ; and Dr. Buckeridge, Bishop of Ely, Laud's old tutor at Oxford and intimate and valued friend in after hfe. To another old friend of Laud, Dr. Neile, then Bishop of Winchester, the archi- episcopal See of York was offered. Neile at first refused the appointment, but upon Laud's insisting that it would be for the good of the Church that he should take charge of the northern province, he overcame his reluctance and was presently translated. By this appointment an im- Advpnee- portant ofiice became vacant, and to Dr. William Juxon, juxon? who had before, by Laud's influence, been made President of St. John's College, Oxford, was given the clerkship of the closet. f To find a fitting man for the See of Win- chester, a most important consideration, not only because of the extent of the diocese, but also because the bishop is visitor of five colleges at Oxford,^ was Laud's next * Wood's Annals, ii. pt. i. p. 395. t Diary, July 10, 1632. J Magdalen, New, Corpus Cliristi, St. John's, and Trinity Colleges. 214 LIVES OF THE CHAP, care ; and he recommended to the king Dr. Curie, Bishop s — . — '^ of Bath and Wells. To Bath and Wells Dr. Pierce was William removed from Peterborough, and to Peterborough was 1633-45. nominated an old and trusty friend of Laud, Dr. Lyndsell ; " a very solid divine and learned linguist, to whom the Christian world remains indebted for Theophylact's Com- mentary on the Epistles, and the Catena upon Job, pub- lished by him in Greek and Latin."* Dr. White, Bishop of Norwich, and Lord Almoner, the coadjutor of Laud in the conferences with Fisher, was translated to the bishopric of Ely ; and to Norwich Dr. Corbet, Bishop of Oxford, one who had taken Laud's part firmly and consistently in his troubles with the puritans at Oxford, was removed ; while Bancroft, a relation of the predecessor of Archbishop Abbot, and Master of Uni- versity College, was appointed to the See of Oxford. And now Laud was enabled to do that for this bishopric which he had long intended. The impropriate vicarage of Cud- desden, ^nq miles distant from Oxford, belonged to the bishop in right of his See. The impropriation was in lease, but Bancroft undertook to run it out without re- newing ; and when the vicarage fell into hand, as it soon did, he procured himself to be legally instituted and in- ducted, and through the interest of Bishop Laud, he obtained an annexation of it to the See, and built there an episcopal residence. Another prelate, renowned for liis opposition to the puritanical ideas of the Sabbath, Dr. Morton, was re- warded by promotion to the See of Durham ; and in his place at Lichfield was settled Bishop Wright, of Bristol, and Cooke was appointed to Bristol.f The brother of the last-named person. Secretary Cooke, had not been friendly to Laud, and an instance of Laud's determination not to * Cyp. Ang., p. 215. Colly er, vii. p. 50. t Cyp. Ang., pp. 213 seq. ARCHBISHOPS OF CANTERBURY, . 215 allow any mean personal feelings to interfere with the chap. administration of Church discipline and appointments, is >- seen in this nomination. Besides in these great alterations Wiiiiam ^ ^ ^ Laud. amongst the bishops of the Church, Laud's influence is to i633_45. be observed in other matters. Sir Francis Cottingham Settlement having been appointed Lord Chancellor, and also Master fices in the of the Wards and Liveries, claimed the disposal of such ^f^^a^sin benefices as belonged to the king, in the minority of his CJi^^^^cery. wards. The Lord Keeper, Coventry, pleaded an equal interest in this, according to the privilege and usage of his predecessors. It had been a rule tliat he of the two high officers of State who first heard of a vacancy, and presented his clerk to the bishop, should have his turn served before the other. Laud settled the controversy by advising the king to take all to himself. " Many clergy- men," he said, " had served as cha];)lains to the forces and had ventured their lives at the Isle of Ehe, and some reward was due to them ; here was an opportunity." The king acted in accordance with the bishop's advice, and committed the said benefices to the disposal of Laud, Cottingham, and Coventry, acquiescing in an arrange- ment which saved them from considerable difficulty. The amount of work which Laud at this time accom- Great work plished, weak in health and feeble in body as he was. Bishop of seems extraordinary. As Bishop of London, he had his particular duties to perform, which in themselves were onerous ; but he had also to look after the affairs of the Church generally, for Archbishop Abbot, from age and infirmity, was incapacitated from work. As the adviser of the king, he had to consider the appointments to the bishoprics of which mention has been made, and he had also to prevent abuses or errors gaining ground, and taking root in the Church. He had an " eagle eye " in discerning such abuses or errors, and never lost time in redressing them. It is for this reason that he was accused London. 216 LIVES OF THE CHAP. XXXV. "William Laud. 1633-45. The printer's error. The painted ■window at Salisbury. of being hasty and hot-headed ; but in his activity and readiness lay the secret of his power and influence, which was so great that the puritans saw no other way of re- moving it but by his death. Busied as he was with high matters of Church and State, he also had his eye on other less important affairs. The king's printers made a mistake in a new issue of Bibles, and omitted the important monosyllable " not " in the seventh commandment. Laud discovered this at once, and the printers were called before the High Com- mission, and fined heavily for their carelessness.* The parish vestry of St. Edmund's, Salisbury, had removed, at the instigation of Sherfield, the recorder, but without any hcence of the diocesan, a large painted window, containing a representation of God the Father, as the *' Ancient of days." The window, it was alleged, was somewhat " decayed and broken, and very darksome ; " f but this would hardly justify the proceedings of the re- corder, who broke the window himself with his pike-staff, instead of having it properly taken down by a glazier. Laud caused the king's attorney to exhibit an informa- tion against Sherfield, in the Star Chamber, for this mis- demeanour. The bishop himself made a speech on the occasion. He sj)oke first of the power of vestries, and pointed out that they had no right to remove anything in the church that was doubtful, and that Mr. Slierfield, though authorised by the vestry, by acting disorderly in breaking the window, had laid himself open to a criminal charge. Then speaking of painted windows generally, ^' I am not of opinion," said Laud, " that images and pictures were not in the church till the time of Gregory * With the proceeds of this fine Laud caused a good Greek type to be struck, for publishing works which had hitherto been only in manuscript. Cyp. Ang., p. 215. t Vestry Book of St. Edmund's. Laud's Works, vi. p. 14, note. ARCHBISHOPS OF CANTERBURY. " 217 tlie Great ; nor am I of opinion that the first trouble chap. about them was at the second Council of Mce." To ■ — ^—^ — '- prove this he quoted St. Gregory, who was 600 years ^'^ud!^ after Clirist ; * Gregory Nazianzen, 200 years before ; f 1633-45. TertuUian, " one of the ancientest fathers ; " J and Irengeus, the disciple of St. John.§ He deprecated the use of images, or pictures, if the same honour was to be done to the image as to the Hfe, whether it were the picture of man, or of God, or of Christ. " Yet," he exclaimed, " there is a great difference between an image and an idol ; but then if men give worship to them as to the other, it is unlawful." He did not defend the painted window in question. " I do not think it lawful," he said, " to make the picture of God the Father ; but 'tis lawful to make the picture of Christ, and Christ is called the express image of His Father." " I don't mean to say," he continued, " that the picture of Christ, as God the Son, may be made ; for the Deity cannot be pourtrayed or pictured, though the humanity may." But he pro- ceeded to show, whether individuals regarded painted windows as tending to idolatry or not, those windows must be removed by some lawful authority. The Homily against Idolatry, which Sherfield urged in his defence, pointed out that the power belonged to the chief magis- trate, and private individuals have neither vocationem nor potestatem to do what they Hke in those buildings which are consecrated and belong to the Church of England. Sherfield was condemned, fined, and ordered to repair to the Lord Bishop of his Diocese, and there make an ac- * St. Greg. Mag., lib. xi. ind. iv. ep. xiii. Op., torn. ii. ■j" The passage to which Laud referred (St. Greg. Mag., epist. xlix. Op., torn. i. p. 810, CD.), was, however, against the removal of public monuments, not images in the churches. X Tert. de Pudicit., cap. vii. Op., p. 379. Cap. x. p. 392, § St. Iren. contr. omn. Ilaeret., lib. i. cap. xxv. 218 LIVES OF THE CHAP, knowledgment of his offence and contempt before siicli ^-^ — i^ persons as the bishop would call unto him.* Taud°^ The negligence of the English chaplains beyond the 1633-45. seas had for some time been a matter of complaint. The The case of jurisdiction over foreign chaplains rested with the Bishop chapfain- of Loudou, and Laud took the case in hand, dealing with cies.. it at once. It appeared that in some places the Liturgy of the Churcli of England had been abandoned in favour of the extemporary prayers and excessive preaching which were the characteristics of the Calvinian form of worship. A case occurred about this time, which came under the notice of Laud. The Earl of Leicester having been sent to negotiate some affairs with the King of Denmark, met, by appointment, at Hamburgh, Anstrother, the am- bassador to the court of the Emperor. From Hamburgh the ambassadors were to be conveyed to England by the royal fleet, under Admiral Pennington. The ships, how- ever, did not arrive at the appointed time, and the "elders" of the church at Hamburgh requested that the chaplains of the ambassadors should conduct their service. This they did, and they acted according to the Calvinian custom, repeating a Psalm, and proceeding at once to the sermon. Wlien the fleet arrived. Admiral Penning- ton was likewise requested to allow his chaplain to conduct a service. The admiral had no chaplain, but in answer to the request of the elders, he said that he had in his ship one Dr. Ambrose, his friend and kinsman, who would readily hearken to them if they desired it. Con- sequently Ambrose undertook the service. But when the congregation was assembled, and the customary Psalm was well-nigh finished, a deacon was sent to Ambrose to * Hargraves' State Trials, i. coll. 412-14. Hatcher's Hist, of Salis- bury, p. 373. Cyp. Ang.,pp. 215 et seq. Laud's Works, vi. pt. i, pp. 11 seq. ARCHBISHOPS OF CANTERBURY. 219 ask why he did not go to the pulpit. He replied by chap. demanding a Prayer Book. The deacon handed him a Bible, and said that they had no such thing as a Common Wiiimm Prayer Book, and never used such. " Why then," said 1633-45. Ambrose, " I have one in my own pocket ;" and he pro- ceeded according to the English use. But he had hardly come to the end of the confession before the congregation was in a state of astonishment. They had met together not for prayer but for a sermon ; and the deacon was sent again to Ambrose to desire him to go to the pulpit, and not trouble them with what they were not accus- tomed to hear. " If you will not have prayers," said Ambrose, " according to the English Liturgy, in an English church, you shall have no sermon." The elders thereupon requested him to desist from an " unnecessary service," and Ambrose went out of the church, followed by the ambassadors and the admiral.* This incident attracted the notice of Laud to the matter, and he soon had certain regulations drawn up for the purpose of impressing upon those who were under the jurisdiction of the Church of England, the fact that they must abide by her customs and her Liturgy. According to these regulations, no commanding officer Eeguia- was in future to entertain any minister as preacher to cha"piahis his regiment but such as should in all things conform to ^" f^^'^iga o o parts. the Church of England, and have been commended by the lawful authorities. No company of merchants residing in foreign parts was to admit any minister as preacher, except he was duly qualified and commended in the same way ; and every minister or chaplain in any factory or regiment, whether of English or Scots, was to read tlie Common Prayers, administer the Sacraments, catechise the children, and perform all other public ministerial * Cyp. Ang., p. 219. CHAP. XXXV. 220 LIVES OF THE duties, according to the rules and rubrics of the Enghsh ' — ^_ — ' Liturgy. If any minister should be found unconformable, Laud. or should with bitter words or writings defame the 1633-45. Church of England by law established, he should be presented by the commanders of the regiments, or de- puty-governors of the factors under whom he lived, and be called upon to answer for his offence.* By these strict measures Laud hoped to uphold the doctrines of the Church of Eno^land, amonfyst English subjects in those countries where the ideas of Calvin were Reguia- deeply rooted. But while he did this, he also took notice worship of of the foreigners who had settled in England. A certain in^Enff-^^^' restraint had been laid upon such in the time of Queen land. Ehzabeth, her majesty having herself written a letter to Lord Treasurer Paulet, stating it to be her pleasure that the Bishop of London should take heed that in the church of the late Augustine Friars, which had been appointed for the use of strangers, divine service should be properly performed, and the sacraments administered. f Laud now made some suggestions to the privy council on the matter. He set forth the great piety and com- passion of this government in entertaining foreigners when persecuted at home, and indulging them the liberty of their own religion. He stated that it was never the intention of the government, that after the first genera- tion was worn out, their posterity, born subjects of this realm, should continue in their ancestors' separation from the English Church ; that such a distinct communion must, of course, make them disaffected to the State, and apt to promote, or fall in with, any change more suitable to their humour. He observes that they kept themselves a separate body, and intermarried only within themselves, * Colly er, viii. p. 55. Cyp. Ang. Rushworth, ii. p. 249. I Troubles and Trial, Works, iii. 424. ARCHBISHOPS OF CANTERBURY. 221 that by this particular management, as they are now a chap. church within a church, they might in a httle time grow > — , — i- up to a commonwealth within a kingdom. That these ^!ji^^°^ foreign bodies thus divided from Church and State, are 1633-45. for the most part settled in port towns next to France and the Low Countries, which may tempt them to strike in with an emergency, and make an unserviceable use of such a situation. That the example of such an indul- gence makes an ill impression on the English, and con- firms them in their stubbornness and nonconformity. And therefore he advises that neither the French nor Dutch churches should be tolerated in this kingdom, unless the English in foreign parts have the same liberty in doc- trine, discipline, and worship. On the 13th of May, 1633, Laud set out to attend King Royal Charles to Scotland. The royal visit had been delayed Scotland. longer than the Scotch people liked, for they expressed themselves anxious to see their king. But even now Charles seemed to be in no hurry to journey northwards, and it was not till the 24th of May, that, attended by the flower of the English nobility, he arrived at the city of York,* It was rather more than a fortnight afterwards that his majesty, greeted by an enormous concourse of people, and hailed with loud acclamations, entered the beautiful city of Edinburgh, where, on the 18th of June, the solem- nities of his coronation as King of Scotland were per- form ed-f About ten days after the coronation a parliament was held, in which several acts relating to the Church, the supremacy of the king, the privileges of the episco- pacy, the disposal of benefices, and the maintenance of * Heylyn speaks of a " solemn and magnificent entrance " into the city on that day (p. 225) ; but Laud says, " The king was to enter into York in state. The day was extreme wind and rain, that he could not. I called it York Friday." Diary, May 24, 1683. t Cyp. Ang., p. 220. 222 LIVES OF THE CHAP, the parochial clergy, were passed, but by no means to ^ ' — ' the satisfaction of the Presbyterians.* They desired to Laud."^ have their own form of worship, while the king, like his 1633-45. father, was anxious to restore Catholicism to the king- dom. Desire to Charlcs dcsircd to introduce the Lituro^v of the Church introduce ^ *^*^ theEngiish of England into Scotland ; and when Laud was first fails. made Bishop of London, he had expressed this his wish to him.*!* But when at Edinburgh a petition was presented to the king by the Earl of Eothes, signed by many persons of influence, for the redress of grievances, the main point being a complaint against episcopacy, Charles, though he commanded Eothes not to solicit any further, was so far influenced thereby, that he resigned his project with regard to the introduction of the English Liturgy, at all events for a time. Yet, according to Lord Clarendon, if the king during this visit, and especially after a sermon preached by Bishop Laud, which had made a great im- pression upon the audience, "had proposed the Liturgy of the Church of England to have been received and practised by that nation, it would have been submitted to without opposition." J It was indeed the misfortune of Charles on this as on other occasions, to go far enough to irritate, and yet to shrink from the last bold and decided step. Both the king and Laud were also too much inclined, like all persons of that age, to advance what they held to be the cause of truth, not so much by persuasion as by the secular arm. It had succeeded under Henry, Edward, Mary, and Elizabeth, and they did not observe sufficiently the change of the times. The chief lay reformers in Scotland had become zealous, even to bloodshedding and * Collyer, viii. pp. 64 seq. t Laud's Works, iii. p. 278. (Troubles and Trial.) ^ Clarendon, i. 136. ARCHBISHOPS OF CANTERBURY. 223 rebellion for Presbyterianism, because they were enabled chap. XXXV to enrich themselves by the spoils of the Church : sad — . — '- complaints had been raised against them by the Protestant ^-^^^^ preachers on this point. The king had declared his 1633-45. desire, with the restoration of Cathohcism, to rescue the Church property, and this, of course, made the lay re- formers more fierce than ever in their ultra-protestant prejudices. It would have been good policy to have resigned all the property except that which belonged to the Crown, and to have left the Church in poverty until re-endowed by the piety of individuals. But the nobility were exasperated, not only by this step, but by the ap- pointment of Archbishop Spottiswoode to the office of Lord Chancellor, and of other prelates as lords of the privy council. This was a favourite plan of Laud's. He saw the clergy of Scotland especially trampled upon, and he sought, to raise their dignity by conferring on them secular offices, an arrangement which excited the jealousy of the lay lords. On the retreat of the king, therefore, the Presbyterian preachers, who still delighted in sedition, regained their influence over the aristocracy, and the feel- ings of the Presbyterians may be best described by a Scottish writer, who says, " They considered the deepest guilt, or the highest exertions of piety, to consist in matters to the last degree trifling or absurd. Their divines gave scope to their imagination in directing those ideal instances of godliness or iniquity. The second and fourth commandments were the favourite topics of their declamation. They could perceive idolatry in the dispo- sition of a lady's headdress, or the adjusting of her clothes, and multiply, to an inconceivable extent, the variety of transgressions of the decalogue. The strict observance of the Sabbath they inculcated in its most gloomy austerity. To go on that day to the threshold, or to walk through one's own house if with a view to any 224 LIVES OF THE CHAP. XXXV. William Laud. 1633-45. The king's return to England. Laud's return. Death of the arch- bishop. v^orldly purpose, or even idly, was held a deeper crime than deliberate murder." The king, before his return to London, spent some time in Scotland, visiting the country, the chief cities, and the most remarkable places. He then posted in haste to meet the queen at Greenwich, but he did not end his progress with an entry into London, or with any notice of the citizens of his chief city. Heylyn dwells on this fact, and compares the usual custom of Queen Elizabeth, who would never end her progresses but " she would wheel about to some end of London to make her passage to Whitehall through some part of the city, requiring the lord-mayor and aldermen in their robes to meet her, whereby she not only did preserve that majesty which did belong to a Queen ofEngland, but kept all the citizens, and consequently all the subjects, in a reverent estimation and opinion of her." * Neither James nor Charles studied the arts of popularity. They thought more of the court and of their courtiers, than of the people and country. Laud did not hasten back from Scotland. He had not interfered in ecclesiastical matters ; and he now indulged his taste for the picturesque, and for archaeology, by visit- ing Burntisland, St. Andrew's, Dundee, Falkland, Dun- blain, Stirling, and other places, attractive by their beauty, or associated with historical events, and he did not arrive at his house at Fulham until the end of July. Here the news met him that Abbot was seriously ill, and a few days afterwards it was known that the archbishop was dead. Cyp. Aug., p. 228. ARCHBISHOPS OF CANTERBURY. 225 CHAPTEE XXXVI. laud's primacy. Laud's translation to the Primacy. — His friendship with Wentworth. — State of the Primate of England. — Visit of Hyde. — Offer of a — Cardinal's hat. — Chillingworth. — Hatred of the Papists against Laud. — An accident. — Titles for Holy Orders. — Royal letter. — Sab- batarian question revived. — Kepublication of the " Declaration." — Ideas of the Puritans. — The metropolitical visitation. — The position of the Communion table in churches. — Opposition to Laud's order. — Headed by the Bishop of Lincoln. — Controversy thereupon.-^Laud suspends the jurisdiction of Williams. — Cathedral statutes and regu- lations,— Chapels for the use of Foreigners. — Poor condition of the London clergy. — -Object of Laud and Strafford in Ireland. — Condition of Ireland under Strafford. — Laud Chancellor of the University of Dublin. — ^The Thirty-nine Articles introduced. — Aflairs in Scotland. — The Scotch Liturgy. — Riots in Edinburgh. — The Covenant. — Ministers of the Palatinate. — Visit of the Prince Elector. — Laud ap- pointed Lord Treasurer. — Juxon succeeds him. — Letters of Ijaud against Puritanism, and against Popery. — The Archbishop's right to visit the Universities. — Royal visit to Oxford. — State of the country. — Prynne, Bastwick, and Burton prosecuted and punished.— Williams summoned before the Star Chamber. — Visitation of Jersey and the Channel Islands. — Laud's energy against Romanism, and Socinianism. — Further disturbances in Scotland. — The Short Parliament. — Pro- ceedings of Convocation. — The Long Parliament. — Impeachment of Strafford. — The Scottish Commissioners in London. — Vote of the Com- mons against Laud. — Taken into custody. — Resigns the Chancellor- ship of Oxford. — Articles against him. — Speech in the House of Lords. — Committal to the Tower. As soon as the death of Abbot was announced, Laud chap. must have felt that he would in all likelihood be his sue- .•^-^-^^^- cessor. Yet of this he could hardly have felt certain : wiiiiam '' Laud. because on the death of Bancroft the eyes of all had been 1633-45. VOL. XL Q 226 LIVES OF THE CHAP. XXXVI. William Laud. 16C3-45. ap- Land pointed to the primacy fixed on Bishop Andrewes, and altliougli it was supposed that he was secure of the primacy, nevertheless he did not obtain it. Laud was quite aware of the intrigues of courtiers ; and the courtiers, whose peculations he had resisted, were enemies to him, almost as bitter as the puritans. But passing over these considerations, he might fairly expect on other grounds a delay in the appointment. At tliis time, during a vacancy of a diocese, the profits of the estates were paid into the royal exchequer, and, to enrich the king, the appointment was often deferred. We may therefore believe that Laud was taken by surprise when, on the first occasion of his attending the Court after Abbot's death. King Charles, in his most gracious manner, with a smile on his countenance, saluted him, saying : " My Lord's Grace of Canterbury, you are very welcome."''^ The king soon afterwards gave order for the despatch of all the necessary forms for Laud's trans- lation, which were completed on the 19th of September. He was then confirmed Archbishop of Canterbury in his chapel at Lambeth ; and on this day he made a " solemn and magnificent feast " at his house, " the estate being set out in the great chamber of that house, all persons, after the accustomed manner, standing bare before it." His steward, his treasurer, his comptroller, attended with their white staves in their several offices. It would seem that the king entertained a notion that Laud would not attend sufficiently to these matters of ceremony ; for on his translation, his majesty addressed to him a letter, exhorting him to keep up the dignity and grandeur of the See of Canterbury. " We have given order," he says, " for your translation to the See of Can- terbury, and we think it fit for the upholding of the honour and government of the said Church, hereby to * Clarendon, i. p. 147. AKCHBISHOPS OF CANTERBURY. 227 require you in the form of your translation to use all chap, . • XXXVI such ceremonies and offices, and to carry yourself with -^-. — '^ the same estate and dignity, and to assume such privi- Wiiiiam leges and pre-eminences, as your predecessors in that 1633-45. See have used and enjoyed heretofore. At Denmark House, this 8th of September." * We find the friend with whom he was most famihar, Friendship Lord Wentworth, so far deferring to his increased rank, ^^^^ as to change his mode of addressing so great a man. w^^'^^- He was playfully rebuked by the archbishop, and Went- w^orth's object was perhaps obtained, when he was assured by Laud that no differences which might exist between their respective conditions in life, could alter that friendship, which he regarded as an honour not less than a comfort. Laud maintained the cause of Wentworth at Court, and Wentworth carried out the principles of Laud in Ireland, although we are surprised to find Laud, in friendly terms exhorting Wentworth to be less vehement in carrying out what, though right, might not always be expedient. In Church affairs the viceroy fully concurred in opinion with the English primate. What was law to the Church in England he desired to make law to the Church in Ireland. The position of the lord primate was at that time so state of the high, being, next to royalty, the first peer of the realm, p^^^^*®- that we can scarcely in these days realise it to our minds. In Laud's case that position was higher still, from the secular offices he sustained at Court. English nobles and foreign ambassadors paid their court to him at Lambeth, The interior courts were filled with men-at-arms and horsemen ; while holding a levee, or granting an inter- view, the archbishop himself held a court second only in grandeur to that of the king, while from time to time * MSS. Collect. Tenison. foi., i. p. 225, Q 2 228 LIVES OF THE CHAP, messengers arrived witli the announceraents of important XXXVI .. ^ — ^-^ news, foreign and domestic ; and vrlien he crossed the TaiT^ river to the royal court, he had to tolerate rather than 1633-45. to enjoy the masques, theatricals, and gay formalities with which the king condescended to indulge his dissipated French queen. For this, though himself not accountable, he was assailed by his puritan enemies as an encourager of what appeared to them the works of the evil one. To Wentworth's congratulations his answer was : " I thank you heartily for your kind wishes to me that God would send me many and happy days where I am now to be. Amen. I can do little for myself if I cannot say so, but truly, my lord, I look for neither ; not for many, for I am in years, and I have had a troublesome Hfe; not for happy, for I have no hope to do the good I desire ; and besides I doubt I shall never be able to hold my health there (Lambeth) one year ; for instead of all the jolting which I have had over the stones between London House and Whitehall, which was almost daily, I shall now have no exercise, but shde over in a barge to the Court and Star Chamber. And in truth, my lord, speaking seri- ously, I have had a heaviness hanging over me ever since I was nominated to the place, and I can give myself no account of it, unless it proceed from an apprehension that there is more expected from me than the craziness of these times will give me leave to do."* Edward From Laud's letters and diary, we are inchned to think Hyde. "^ ' that the charge of abruptness of manner, though ad- mitted by himself, and undeniable, was much exaggerated. A modern archbishop is not so great a man as a primate in the seventeenth century, employed as a statesman not less than as the head of the Church ; but we doubt whether among modern primates we should find many * Letters and Desj atcl.es of Thomas Earl of Strafforde, i., iii. ARCHBISHOPS OF CANTERBURY. 229 who would receive, as meekly as Laud did, the admoni- char tions and advice tendered by a young man, as Edward -. — , — 1- Hyde, was anxious 1633-45. to confirm the feelings which had already detached him from the puritan party. He spoke well of him on all suitable occasions, and took so much notice of him when he acted as counsel in any causes depending on the council board that Hyde received from the judges at Westminster Hall and other eminent practitioners there, more favour and countenance than was usually given to men of his standing. In return for the archbishop's patronage, he gives him the benefit of his good advice and a lecture. He had observed that the greatest want of the archbishop had been that of a true friend who would seasonably tell him of his infirmities. That deficiency young Mr. Hyde deter- mined to supply, and with this object in view, with more of sincerity than of modesty, he crossed over to Lambeth. According to his own statement, he found the archbishop, walking early in the garden, and the primate received him,, according to his custom, very graciously. Continuing his walk, he asked him, " What good news from the country.^ To which he answered, there was none good ; the people were universally discontented ; and (which troubled him, most) that many people spoke extreme ill of his grace, as the cause of all that was amiss. He rephed that he was sorry for it ; he knew he did not deserve it ; and that he must not give over serving the king and the church to please the people. Mr. Hyde told him he thought he need not lessen his zeal for eitlier, and that it grieved him to find persons of the best conditions, and who loved both king and church, exceedingly indevoted to him ; complaining of his manner of treating them when they had occasion to resort to him ; and then named two persons of the most interest and credit in Wiltshire, who had thut sun;- 230 LIVES OF THE CHAP, mer attended tlie council-board ; that all the lords present — ^ -, — ^ used them with great courtesy, and that he alone spake ^aud™ sharply to them ; and one of them, supposing that some- 1633-45. body had done him ill offices, went the next morning to Lambeth, to present service to him, and to discover, if he could, what misrepresentation had been made of him ; that after he had attended very long, he was admitted to speak with his grace, who scarce hearing him, sharply answered him, that he had no time for comphments, whicli put the other much out of countenance. And that this kind of behaviour was the discourse of all companies of persons of quality. " He (Laud) heard the relation very patiently and at- tentively, and discoursed over every particular with all imaginable condescension ; and said, with evident show of trouble, that he was very unfortunate to be so ill understood ; that he meant very well ; that by an imper- fection of nature, which he said often troubled him, he might deliver the resolution of the council in such a tone and with a sharpness of voice, that made men believe he was angry when there was no such thing. That he did well remember that one of them (who was a person of honour) came afterwards to him, at a time when he was shut up about an affair of importance which required his full thoughts, but that as soon as he heard of the other's being without, he sent for him, himself going into the next room, and received him very kindly, as he thought ; and supposing that he came about business, asked what his busi- ness was, and the other answering that he had no business, but continuing his address with some ceremony, he had, indeed, said that he had no time for compliments, but lie did not think he went out of the room in that manner. " He was well contented to hear Mr. Hyde reply very freely on the subject, who said, he observed that the gentlemen had too much reason for the report they made, ARCHBISHOPS OF CANTERBURY. 231 and he did not wonder they had been much troubled with his carriage toward them ; that he did exceedingly wish that he would more reserve his passion ; and that he would treat persons of honour and quality and interest in their country with more courtesy and condescension. He said, smiling, that he could only undertake for his h^.art ; that he had very good meaning ; for his tongue, he could not undertake that he should not sometimes speak more hastily and sharply than he should do (which oftentimes he was sorry and reprehended himself for), and in atone which might be liable to misinterpretation with them who were not well acquainted with him. After this free discourse, Mr. Hyde ever found himself more graciously received by him, and treated with more famiharity : upon which he always concluded that, if the archbishop had had any true friend, who could in proper seasons have dealt frankly with him, he would not only have re- ceived it very well, but have profited by it." * From the manner in which Laud received such young men as Hyde and Heylyn, we ar6 inclined to think there must have been perceptible an undercurrent of good nature which secured him friends, even though the defects of his manner towards those for whom he enter- tained no respect, created him many unrelenting enemies. We must here advert to a subject which it is difficult to understand. On the morning of Archbishop Abbot's death, a person came secretly to Bishop Laud, and pro- testing that he acted with the assent of his superiors, offered to the bishop a cardinal's hat. The offer was renewed shortly afterwards (on August 17), and on both occasions promptly declined. Laud stated " that some- thing dwelt within liim which would not suffer that^ till Eome was otherwise than it was at the present time." f It * MSS. Collect. Tenison. fol., i. p. 225. t Diary, Aug. 4, and Aug. 17, 1G53. CHAP. xxxvi. ^- — , ' William Laud. 1633-45. Oflfer of a Cardinal's hat promptly refused. 232 LIVES OF THE xxxvi ^® <iifficult to believe tliat the person who made this offer ' — 7^; — ' acted with authority ; it was probably a trap to make Laud. the bishop, now almost expecting the primacy, commit 1633-45. himself so as to expose him to the contempt of the Eomanists, and to the increased malevolence of the puri- tans. " A cardinal's cap," says Fuller, " could not fit his head, who had studied and written so much against the Eomish religion. He who formerly had foiled Fisher him- self in a public disputation, would not now be taken with so silly a bait, but acquainted the king therewith — Timuit Eomam, vel dona ferentem — refusing to receive anything till Eome was better reformed." * This incident is the more difficult to understand, because there is no doubt that Laud was much dishked by the papists. He had been instrumental in thwarting their designs, he had confuted the arguments of Fisher, and he had been as severe against those who held the Eomish errors as against those who endeavoured to lower the Church of England to the level of a Calvinistic sect.
34,804
https://pt.stackoverflow.com/questions/186563
StackExchange
Open Web
CC-By-SA
2,017
Stack Exchange
Portuguese
Spoken
134
383
Como capturar a query string de uma requisição Restful Preciso pegar os parâmetros passados pela URI, por exemplo: http://localhost/endpoint/param1/param2/param3 if param1 == "adduser" id = param2 name = param3 Exemplo de uma função que não funcionou: busco um caminho para pode pesquisar!!! from flask import Flask from flask_restful import Resource, Api, reqparse app = Flask(__name__) api = Api(app) class HelloWorld(Resource): def post(self): myargs = {} for field in ("id","nome"): myargs[field] = request.form.get(field) print(myargs["id"].decode("utf-8")) print(myargs["nome"].decode("utf-8")) api.add_resource(HelloWorld, '/teste') if __name__ == '__main__': app.run(debug=True) Gostaria de registrar como conseguimos superar essa dificuldade. Desenvolvemos uma rotina em Python + Flask from flask import Flask from flask import request from api import create_user, get_sso app = Flask(__name__) @app.route("/users") def users(): data = request.args.to_dict() response = create_user(**data) if response.status_code == 200: return "OK" else: return response.content Isso resolveu o problema.
42,942
US-201113814520-A_1
USPTO
Open Government
Public Domain
2,011
None
None
English
Spoken
5,538
7,382
Method for manufacturing bandsaw blade, and bandsaw blade ABSTRACT A method for manufacturing a bandsaw blade provided at the top of the teeth with cutting tips made of a hard material, includes the steps of: offsetting to the left and right saw teeth constituting left and right offset teeth; forming the saw teeth constituting the left and right offset teeth to a smaller tooth height than that of the saw teeth constituting straight teeth; and grinding cutting tips provided to the top of the left and right offset teeth subsequent to the offsetting step, and machining the edge lines at the top of the left and right offset teeth so that the lines are orthogonal to the travel direction of a bandsaw blade and the cutting direction of the bandsaw blade. TECHNICAL FIELD The present invention relates to a method for manufacturing a bandsawblade and to a bandsaw blade, and more particularly relates to a methodfor manufacturing a bandsaw blade in which a tooth-end edge line of eachof right and left offset teeth is formed in a direction perpendicular toa traveling direction and a cutting direction of the handsaw blade andto a bandsaw blade. BACKGROUND ART A bandsaw machine has been conventionally used as a device that cuts alarge workpiece made of metal, for example. As a bandsaw blade used inthis bandsaw machine, there is frequently used a so-called bimetallichandsaw blade, in which high-speed tool steel or cemented carbide isused as a material for a tooth end of the blade, and high-strength alloysteel (high-stiffness alloy steel) is used as a material for a bodyportion of the blade. In a case of a bandsaw blade using high-speed tool steel at its toothend, it is common to perform a teeth cutting process using a bimetallicraw material, and then perform a teeth offsetting process. Furthermore, a case of a bandsaw blade using cemented carbide at itstooth end includes an example in which a teeth offsetting process (abending process) is performed, and an example in which a cementedcarbide tip is formed into a dove-tail shape (ginkgo-leaf shape) by agrinding process to provide a clearance corresponding to a teethoffsetting amount without performing the teeth offsetting process. In a type of a bandsaw blade using cemented carbide at its tooth end andundergoing a teeth offsetting process, it is common to use a rawmaterial referred to as “base metal” formed with a gullet, bond acemented carbide tip to a portion of the base metal, which constitutes atooth end, then perform a grinding process to form a side face, a reliefface, a rake face, and the like, and then perform the teeth offsettingprocess. Patent Literature 1 is a document that is supposed to be relevant to thepresent invention. PRIOR ART DOCUMENTS Patent Document Patent Document 1: Japanese Patent Application Laid-open No. Hei06-155158 DISCLOSURE OF THE INVENTION Technical Problem A bandsaw blade 1 described in Patent Literature 1 is configured asshown in FIG. 1. That is, the bandsaw blade 1 is configured to include,on one side of a band-shaped body member 3, a straight tooth 5, and aleft and right offset teeth 7 and 9 having undergone teeth offsettingprocesses toward the left and right directions. Cutting tips (tooth-endtips) 11, 13, and 15 that are made of a hard material such as cementedcarbide are provided at respective ends of the straight tooth 5 and theright and left offset teeth 7 and 9 in an integral manner by welding orthe like. The tooth-end tip (cutting tip) 11 provided in the straight tooth 5 isformed into a bevel tooth with an inclined surface formed on each of itsright and left sides. Tooth-end edge lines 13A and 15A of the tooth-endtips 13 and 15 of the right and left offset teeth 7 and 9 are inclinedat an angle β respectively in the right and left directions. As shown inFIG. 1, the tooth-end edge lines 13A and 15A of the tooth-end tips 13and 15 cross near the top of respective right and left bevel-part edgelines 11A of the tooth-end tip 11 of the straight tooth 5 as viewed froma traveling direction of the bandsaw blade 1. Respective inner cornerportions 13B and 15B of the tooth-end tips 13 and 15 are formed smallerby a dimension a relative to a tooth-end edge line 11B of the tooth-endtip 11 of the straight tooth 5. In other words, a tooth-height dimension(a height dimension from the reference position to the tooth-end) of theright and left offset teeth 7 and 9 is smaller than the tooth-heightdimension of the straight tooth 5. Meanwhile, when a teeth offsetting process is performed on the right andleft offset teeth 7 and 9, the corner portions 13B and 15B of the rightand left offset teeth 7 and 9 approach the tooth-end edge line 11B ofthe tooth-end tip 11 by the inclination angle β. In some cases, theinner corner portions 13B and 15B of the tooth-end tips 13 and 15 canprotrude from the tooth-end edge line 11B of the tooth-end tip 11.Therefore, it is necessary to machine the right and left offset teeth 7and 9 such that their tooth-height dimension is smaller than that of thestraight tooth 5 by a dimension c in advance, before performing theteeth offsetting process on the right and left offset teeth 7 and 9. As the configuration described above, when the straight tooth 5 is abevel tooth, it is important that the inner corner portions 13B and 15Bof the right and left offset teeth 7 and 9 do not protrude from thetooth-end edge line 11B of the straight tooth 5, as viewed from thetraveling direction of the bandsaw blade 1. In a configuration in whichthe inner corner portions 13B and 15B of the right and left offset teeth7 and 9 protrude from the tooth-end edge line 11B of the straight tooth5, the inner corner portions 13B and 15B of the right and left offsetteeth 7 and 9 cut into a workpiece prior to the straight tooth 5.Therefore, curved cutting is easily caused by force components appliedin the right and left directions on the inner corner portions 13B and15B. In the bandsaw blade 1 configured as described above, it is importantthat the tooth-end edge lines 13A and 15A of the right and left offsetteeth 7 and 9 cross the right and left bevel-part edge lines 11A of thestraight tooth 5 that is a bevel tooth. That is, in a case of aconfiguration in which the tooth-end edge lines 13A and 15A of the rightand left offset teeth 7 and 9 cross above respective upper ends 11C ofthe right and left bevel-part edge lines 11A, the bevel tooth that isthe straight tooth 5 works more than the right and left offset teeth 7and 9. Therefore, a cutting groove formed by cutting a workpiece by thebandsaw blade 1 is divided unevenly in the width direction, therebyeasily causing curved cutting. A side view and a bottom view of the bandsaw blade 1 as viewed from theright-left direction and from the tooth-end side are as shown in FIGS.2(A) and 2(B), respectively. That is, the right and left offset teeth 7and 9 are formed smaller than the straight tooth 5 by a dimension c inadvance, and a height difference a is generated by performing the teethoffsetting process toward the right and the left. Consequently, thetooth-end edge lines 13A and 15A of the right and left offset teeth 7and 9 are angled at a side rake angle α. That is, the tooth-end edgelines 13A and 15A are inclined such that outer corner portions 13C and15C are on the rear side (on the left side in FIG. 2(B)) of the innercorner portions 13B and 15B in a traveling direction (an arrow Adirection) of the bandsaw blade 1. Therefore, the tooth-end edge lines13A and 15A of the right and left offset teeth 7 and 9 are inclined atthe side rake angle α and a tooth-line inclination angle β. As shown in FIG. 3, when the bandsaw blade 1 is applied to an actualbandsaw blade, assuming that the thickness of the body member 3 is 1.3mm, the dimension of the tooth-end edge line 11B of the bevel tooth thatis the straight tooth 5 is 0.7 mm, the inclination angle of thebevel-part edge line 11A is 45°, and the teeth offsetting amount of theright and left offset teeth 7 and 9 is 0.4 mm, it is necessary to set adifference in tooth-height dimension between the straight tooth 5 andthe right and left offset teeth 7 and 9, that is the dimension c, to0.06 mm before performing the teeth offsetting process in order that theinner corner portion 13B of the right offset tooth 7, for example, doesnot protrude from the tooth-end edge line 11B of the straight tooth 5. Next, under the same conditions as described above, it is necessary toset the dimension c to 0.23 mm as shown in FIG. 4, in order that thetooth-end edge lines 13A and 15A of the right and left offset teeth 7and 9 cross below the respective upper ends 11C of the bevel-part edgelines 11A of the bevel tooth, which is the straight tooth 5. In thiscase, the dimension a described above is 0.17 mm. As it is clear from the above explanations, in a case where the bandsawblade 1 described in Patent Literature 1 is applied to an actual bandsawblade, it is necessary to set the dimension c described above within arange between 0.06 mm and 0.23 mm. It is desirable that the tooth-endedge lines 13A and 15A of the right and left offset teeth 7 and 9 crossthe respective bevel-part edge lines 11A of the straight tooth 5 at aposition near a center part of each of the bevel-part edge lines 11A. In this connection, under the same conditions as described above, in acase of a configuration in which the tooth-end edge lines 13A and 15A ofthe right and left offset teeth 7 and 9 cross near respective centerparts of the bevel-part edge lines 11A of the bevel tooth (straighttooth) 5, as shown in FIG. 5, the dimension c is 0.11 mm and thedimension a is 0.05 mm. Therefore, only an allowance of 0.05 mm is leftfor the straight tooth 5 to be worn in the tooth-height direction by theuse of the bandsaw blade 1, and thus the above dimensions are notdesirable when the life of the bandsaw blade 1 is taken intoconsideration. In the bandsaw blade 1, shavings 17 (see FIG. 6) continuously generatedby cutting a workpiece by the right and left offset teeth 7 and 9 tendto be rolled into curls in a gullet 19 on a front side of the right andleft offset teeth 7 and 9 in the traveling direction. However, thetooth-end edge lines 13A and 15A of the right and left offset teeth 7and 9 are inclined by the side rake angle α relative to the travelingdirection (the arrow A direction) of the bandsaw blade 1. Therefore, asshown in FIG. 6(B), the shavings 17 tend to protrude in the right-leftdirection perpendicular to the traveling direction of the bandsaw blade1. Accordingly, the shavings 17 slide against a cut surface of theworkpiece in a cutting groove formed by cutting the workpiece by thebandsaw blade 1, thereby increasing a cutting resistance and rougheningthe cut surface. The present invention has been achieved to solve the above problems.Therefore, a first object of the present invention is to provide amethod for manufacturing a bandsaw blade in which a tooth-end edge lineof each of right and left offset teeth is easily formed in a directionperpendicular to a traveling direction of the bandsaw blade, and toprovide a bandsaw. A second object of the present invention is to provide a method formanufacturing a bandsaw blade in which a tooth-height dimension of rightand left offset teeth can be easily adjusted, and to provide a bandsawblade. A third object of the present invention is to provide a method formanufacturing a bandsaw blade in which a tooth-end edge line of each ofright and left offset teeth is perpendicular to a traveling direction ofthe bandsaw blade, and accordingly shavings do not protrude in a lateraldirection, and to provide a bandsaw. Technical Solution To achieve the above object, a first aspect of the present invention isto provide a method for manufacturing a bandsaw blade having a cuttingtip made of a hard material at a tooth end, the method including: (a) astep of performing a process of offsetting saw teeth constituting rightand left offset teeth toward right and left; (b) a step of forming sawteeth constituting right and left offset teeth with a smallertooth-height dimension than a saw tooth constituting a straight tooth;and (c) a step of performing a grinding process on a cutting tipprovided at each end of right and left offset teeth subsequent to theteeth offsetting process to machine a tooth-end edge line of each of theright and left offset teeth in a perpendicular form to a travelingdirection of a bandsaw blade and a cutting direction of the bandsawblade. A second aspect of the present invention is to provide a method formanufacturing a bandsaw blade having a cutting tip made of a hardmaterial at a tooth end, the method including: (a) a step of performinga process of offsetting saw teeth constituting right and left offsetteeth toward right and left; (b) a step of performing a grinding processon a relief face of a cutting tip provided at each end of right and leftoffset teeth subsequent to the teeth offsetting process, wherein atooth-end edge line of each of the right and left offset teeth ismachined so as to be a perpendicular form to a cutting direction of ahandsaw blade after a subsequent step of grinding a rake face; and (c) astep of performing a grinding process on a rake face of the cutting tipafter the step of performing a grinding process on a relief face of thecutting tip, wherein the tooth-end edge line of each of the right andleft offset teeth is machined in a perpendicular form to a travelingdirection and the cutting direction of the bandsaw blade; wherein on thetooth-end edge line of each of the right and left offset teeth, atooth-height dimension is made smaller than that of a saw toothconstituting a straight tooth when the grinding process is performed onthe relief face of the cutting tip provided at each end of the right andleft offset teeth having undergone the teeth offsetting process or whenthe grinding process is performed on the rake face of the cutting tipprovided at each end of the right and left offset teeth having undergonethe teeth offsetting process. A third aspect of the present invention is to provide a method formanufacturing a bandsaw blade having a cutting tip made of a hardmaterial at a tooth end, the method including: (a) a step of performinga process of offsetting saw teeth constituting right and left offsetteeth toward right and left; (b) a step of performing a grinding processon a rake face of a cutting tip provided at each end of right and leftoffset teeth subsequent to the teeth offsetting process, wherein atooth-end edge line of each of the right and left offset teeth ismachined to be a perpendicular form to a traveling direction of abandsaw blade after a subsequent step of grinding a relief face; and (c)a step of performing a grinding process on a relief face of the cuttingtip after the step of performing a grinding process on a rake face ofthe cutting tip, wherein the tooth-end edge line of each of the rightand left offset teeth is machined in a perpendicular form to a cuttingdirection and the traveling direction of the bandsaw blade; wherein onthe tooth-end edge line of each of the right and left offset teeth, atooth-height dimension is made smaller than that of a saw toothconstituting a straight tooth when the grinding process is performed onthe relief face of the cutting tip provided at each end of the right andleft offset teeth having undergone the teeth offsetting process or whenthe grinding process is performed on the rake face. A fourth aspect of the present invention is to provide a bandsaw bladecomprising: right and left offset teeth; and a straight tooth; whereinthe bandsaw blade further comprises a cutting tip made of a hardmaterial at each end of the teeth; a tooth-height dimension of thestraight tooth is provided to be larger than a tooth-height dimension ofthe right and left offset teeth; and a tooth-end edge line of each ofthe right and left offset teeth is formed perpendicular to a travelingdirection of the bandsaw blade and a cutting direction of the handsawblade. In a fifth aspect of the present invention depending on the fourthaspect, in the handsaw blade, the straight tooth is a bevel toothincluding an inclined surface on each of both side faces of the cuttingtip; and the tooth-end edge line of each of the right and left offsetteeth crosses near a center of an inclined bevel-part edge line on eachof both sides of the straight tooth, as viewed from a travelingdirection of the handsaw blade. In a sixth aspect of the present invention depending on the fourthaspect or the fifth aspect, in the bandsaw blade, a difference intooth-height dimension between the straight tooth and the right and leftoffset teeth is a difference that allows the straight tooth to be wornby use of the bandsaw blade by 0.1 mm or more in a tooth-heightdirection. Advantageous Effects According to the present invention described in the first to sixthaspects, after performing an offsetting process on right and left offsetteeth, a grinding process is performed on a tooth-end tip (cutting tip)provided at each end of the right and left offset teeth to machine atooth-end edge line in a perpendicular form to a traveling direction anda cutting direction of a handsaw blade. Therefore, the tooth-end edgeline of each of the right and left offset teeth can be easily formed ina direction perpendicular to the traveling direction of the bandsawblade, and a tooth-height dimension of the right and left offset teethcan be easily adjusted. Furthermore, because the tooth-end edge line of each of the right andleft offset teeth is perpendicular to the traveling direction of thehandsaw blade, shavings do not protrude in the lateral direction, andthe conventional problems mentioned above can be solved. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an explanatory diagram showing a configuration of aconventional handsaw blade. FIGS. 2(A) and 2(B) are explanatory diagrams showing a configuration ofthe conventional bandsaw blade. FIG. 3 is an explanatory diagram showing a relationship between astraight tooth and right and left offset teeth in the conventionalhandsaw blade. FIG. 4 is an explanatory diagram showing a relationship between thestraight tooth and the right and left offset teeth in the conventionalhandsaw blade. FIG. 5 is an explanatory diagram showing a relationship between thestraight tooth and the right and left offset teeth in the conventionalhandsaw blade. FIGS. 6(A) and 6(B) are explanatory diagrams of a behavior of shavingsgenerated by cutting by the right and left offset teeth in theconventional bandsaw blade. FIG. 7 is an explanatory diagram showing a configuration of a bandsawblade according to an embodiment of the present invention. FIGS. 8(A) and 8(B) are explanatory diagrams showing a configuration ofthe bandsaw blade according to the embodiment of the present invention. EMBODIMENT FOR CARRYING OUT THE INVENTION A bandsaw blade according to an embodiment of the present invention isexplained below with reference to the drawings. Constituent elementshaving functions identical to those of the conventional bandsaw blade 1described above are denoted by like reference numerals and redundantexplanations thereof will be omitted. With reference to FIG. 7, a bandsaw blade 1 according to an embodimentof the present invention includes a straight tooth 5, a right offsettooth 7, and a left offset tooth 9 on one side of a body member 3,similarly to the conventional bandsaw blade described above. Tooth-endtips (cutting tips) 11, 13, and 15 made of a hard material such ascemented carbide are provided at respective distal ends of the straighttooth 5 and the right and left offset teeth 7 and 9 in an integralmanner by welding or the like, similarly to the conventional bandsawblade. The straight tooth 5 is formed into a bevel tooth includingbevel-part edge lines 11A obtained by forming an inclined surface oneach of the right and left sides of the tooth-end tip 11. Because theconfiguration of the straight tooth (bevel tooth) 5 is identical to thatof the conventional technique described above, constituent parts havingfunctions identical to the conventional straight tooth are denoted bylike reference numerals and detailed explanations thereof will beomitted. Tooth-end edge lines 13A and 15A of the right and left offset teeth 7and 9 are perpendicular to a traveling direction (an arrow A direction)of the bandsaw blade 1 as shown in FIG. 8(B), and are also formed in adirection perpendicular to a cutting direction (an arrow B direction) ofthe bandsaw blade 1 to a workpiece as shown in FIG. 7. The tooth-heightdimension of the right and left offset teeth 7 and 9 is smaller than thetooth-height dimension of the straight tooth 5 as shown in FIG. 7. Thetooth-end edge lines 13A and 15A of the right and left offset teeth 7and 9 cross near respective center parts of the bevel-part edge lines11A of the straight tooth 5, as viewed from the traveling direction ofthe bandsaw blade 1 in FIG. 7. Therefore, when a workpiece is cut by thebandsaw blade 1, it is possible to evenly distribute a cuttingresistance of the straight tooth 5 and the right and left offset teeth 7and 9, and accordingly stable cutting can be performed. As described above, the tooth-end edge lines 13A and 15A of the rightand left offset teeth 7 and 9 are formed in a direction perpendicular tothe traveling direction (the arrow A direction) and the cuttingdirection (the arrow B direction) of the bandsaw blade 1. Therefore,although shavings continuously generated by cutting a workpiece by theright and left offset teeth 7 and 9 are rolled into curls in a gullet19, protrusion of the shavings in the right-left direction perpendicularto the traveling direction of the bandsaw blade 1, which has beendescribed in the conventional bandsaw blade, can be suppressed.Accordingly, the conventional problems mentioned above can be solved. Meanwhile, when the bandsaw blade 1 according to the embodiment of thepresent invention is manufactured, the straight tooth 5 and the rightand left offset teeth 7 and 9 can be formed with the same tooth-heightdimension, or the right and left offset teeth 7 and 9 can be formed witha smaller tooth-height dimension than the straight tooth 5 in advance.Subsequently, after performing the teeth offsetting process (bendingprocess) on the right and left offset teeth 7 and 9 relative to thestraight tooth 5, a grinding (sharpening) process is performed on thetooth-end tip 11 of the straight tooth 5 and on the tooth-end tips 13and 15 of the right and left offset teeth 7 and 9. When the straight tooth 5 and the right and left offset teeth 7 and 9are formed with the same tooth-height dimension, a process of offsettingsaw teeth constituting right and left offset teeth toward the right andthe left is performed first. Next, a grinding process is performed on arelief face of a cutting tip provided at each end of the right and leftoffset teeth having undergone the teeth offsetting process to machine atooth-end edge line of each of the right and left offset teeth in aperpendicular form to a cutting direction of a bandsaw blade aftergrinding a rake face. Next, a grinding process is performed on a rakeface of the cutting tip provided at each end of the right and leftoffset teeth having undergone the teeth offsetting process to machinethe tooth-end edge line of each of the right and left offset teeth in aperpendicular form to a traveling direction and a cutting direction ofthe bandsaw blade. On the tooth-end edge line of each of the right andleft offset teeth, a tooth-height dimension is made smaller than that ofa saw tooth constituting a straight tooth when the grinding process isperformed on the relief face of the cutting tip provided at each end ofthe right and left offset teeth having undergone the teeth offsettingprocess or when the grinding process is performed on the rake face. Furthermore, a process of offsetting saw teeth constituting right andleft offset teeth toward the right and the left is performed first.Next, a grinding process is performed on a rake face of a cutting tipprovided at each end of the right and left offset teeth having undergonethe teeth offsetting process to machine a tooth-end edge line of each ofthe right and left offset teeth in a perpendicular form to a travelingdirection of a bandsaw blade after grinding a relief face. Next, agrinding process is performed on a relief face of the cutting tipprovided at each end of the right and left offset teeth having undergonethe teeth offsetting process to machine the tooth-end edge line of eachof the right and left offset teeth in a perpendicular form to a cuttingdirection and a traveling direction of the bandsaw blade. On thetooth-end edge line of each of the right and left offset teeth, atooth-height dimension is made smaller than that of a saw toothconstituting a straight tooth when the grinding process is performed onthe relief face of the cutting tip provided at each end of the right andleft offset teeth having undergone the teeth offsetting process or whenthe grinding process is performed on the rake face. When the bandsaw blade is configured as described above, an inclinationangle (a bevel angle) of the bevel-part edge lines 11A of the tooth-endtip 11 of the straight tooth 5 relative to a horizontal plane isdesirably within a range between 30° and 60°. The bevel angle is moredesirably 45°, while taking a balance between forces applied in theright-left lateral direction and in the cutting direction intoconsideration. The dimension of a tooth-end edge line 11B of the beveltooth (straight tooth) 5 is preferably within a range between 40% and70% of the thickness dimension of the body member 3, and is morepreferably within a range between 55% and 65% of the thicknessdimension, while taking chipping of the bevel tooth 5 on the tooth-endedge line 11B and a cutting resistance applied on the bevel tooth 5 intoconsideration. As described above, after performing the offsetting process (the bendingprocess) on the right and left offset teeth 7 and 9, the sharpeningprocess is performed on the tooth-end tips 13 and 15 provided in theright and left offset teeth 7 and 9, respectively. Therefore, thetooth-end edge lines 13A and 15A are easily formed in a perpendicularform to the traveling direction (the arrow A direction) and the cuttingdirection (the arrow B direction) of the bandsaw blade 1. At this time,the rake face of each of the tooth-end tips 13 and 15 of the right andleft offset teeth 7 and 9 is formed into a face parallel to theright-left direction perpendicular to the traveling direction of thebandsaw blade 1. Therefore, shavings continuously generated by cuttingdo not protrude in the right-left direction. As is already understood, because the tooth-end tips 13 and 15 of theright and left offset teeth 7 and 9 undergo the sharpening process afterthe offsetting process, the tooth-height dimension of the right and leftoffset teeth 7 and 9 can be easily adjusted, and a difference intooth-height dimension between the straight tooth 5 and the right andleft offset teeth 7 and 9 can be set more accurately. That is, thedifference in tooth-height dimension can be set to a desirable value. Inthis case, because the straight tooth 5 has been worn by about 0.1 mm atthe end of the life of a bandsaw blade, the difference in tooth-heightdimension is desirably equal to or larger than 0.1 mm. In other words, adifference in tooth-height dimension is desirably within a range thatallows the straight tooth 5 to be worn by 0.1 mm or more in atooth-height direction. The entire contents of Japanese Patent Application No. 2010-179308(filed on Aug. 10, 2010) are incorporated by reference in thespecification of the present application. The present invention is not limited to the embodiment of the inventionexplained above and can be embodied in various manners by being properlymodified. 1. A method for manufacturing a bandsaw blade including a cutting tipmade of a hard material at a tooth end, the method comprising: (a) astep of performing a process of offsetting saw teeth constituting rightand left offset teeth toward right and left; (b) a step of forming sawteeth constituting right and left offset teeth with a smallertooth-height dimension than a saw tooth constituting a straight tooth;and (c) a step of performing a grinding process on a cutting tipprovided at each end of right and left offset teeth subsequent to theteeth offsetting process to machine a tooth-end edge line of each of theright and left offset teeth in a perpendicular form to a travelingdirection of a bandsaw blade and a cutting direction of the bandsawblade. 2. A method for manufacturing a bandsaw blade including a cuttingtip made of a hard material at a tooth end, the method comprising: (a) astep of performing a process of offsetting saw teeth constituting rightand left offset teeth toward right and left; (b) a step of performing agrinding process on a relief face of a cutting tip provided at each endof right and left offset teeth subsequent to the teeth offsettingprocess, wherein a tooth-end edge line of each of the right and leftoffset teeth is machined so as to be a perpendicular form to a cuttingdirection of a bandsaw blade after a subsequent step of grinding a rakeface; and (c) a step of performing a grinding process on a rake face ofthe cutting tip after the step of performing a grinding process on arelief face of the cutting tip, wherein the tooth-end edge line of eachof the right and left offset teeth is machined in a perpendicular formto a traveling direction and the cutting direction of the bandsaw blade;wherein on the tooth-end edge line of each of the right and left offsetteeth, a tooth-height dimension is made smaller than that of a saw toothconstituting a straight tooth when the grinding process is performed onthe relief face of the cutting tip provided at each end of the right andleft offset teeth having undergone the teeth offsetting process or whenthe grinding process is performed on the rake face of the cutting tipprovided at each end of the right and left offset teeth having undergonethe teeth offsetting process. 3. A method for manufacturing a bandsawblade including a cutting tip made of a hard material at a tooth end,the method comprising: (a) a step of performing a process of offsettingsaw teeth constituting right and left offset teeth toward right andleft; (b) a step of performing a grinding process on a rake face of acutting tip provided at each end of right and left offset teethsubsequent to the teeth offsetting process, wherein a tooth-end edgeline of each of the right and left offset teeth is machined so as to bea perpendicular form to a traveling direction of a bandsaw blade after asubsequent step of grinding a relief face; and (c) a step of performinga grinding process on a relief face of the cutting tip after the step ofperforming a grinding process on a rake face of the cutting tip, whereinthe tooth-end edge line of each of the right and left offset teeth ismachined in a perpendicular form to a cutting direction and thetraveling direction of the bandsaw blade; wherein on the tooth-end edgeline of each of the right and left offset teeth, a tooth-heightdimension is made smaller than that of a saw tooth constituting astraight tooth when the grinding process is performed on the relief faceof the cutting tip provided at each end of the right and left offsetteeth having undergone the teeth offsetting process or when the grindingprocess is performed on the rake face of the cutting tip provided ateach end of the right and left offset teeth having undergone the teethoffsetting process. 4. A bandsaw blade, comprising: right and leftoffset teeth; and a straight tooth; wherein the bandsaw blade furthercomprises a cutting tip made of a hard material at each end of theteeth; a tooth-height dimension of the straight tooth is provided to belarger than a tooth-height dimension of the right and left offset teeth;and a tooth-end edge line of each of the right and left offset teeth isformed perpendicular to a traveling direction of the bandsaw blade and acutting direction of the bandsaw blade. 5. The bandsaw blade accordingto claim 4, wherein the straight tooth is a bevel tooth including aninclined surface on each of both side faces of the cutting tip; and thetooth-end edge line of each of the right and left offset teeth crossesnear a center of an inclined bevel-part edge line on each of both sidesof the straight tooth, as viewed from a traveling direction of thebandsaw blade. 6. The bandsaw blade according to claim 4, wherein adifference in tooth-height dimension between the straight tooth and theright and left offset teeth is a difference that allows the straighttooth to be worn by use of the bandsaw blade by 0.1 mm or more in atooth-height direction. 7. The bandsaw blade according to claim 5,wherein a difference in tooth-height dimension between the straighttooth and the right and left offset teeth is a difference that allowsthe straight tooth to be worn by use of the bandsaw blade by 0.1 mm ormore in a tooth-height direction..
44,815
sn00065154_1908-06-12_1_4_1
US-PD-Newspapers
Open Culture
Public Domain
1,908
None
None
English
Spoken
2,313
3,317
'V, i tV 4* H. £f $ /si. A 'f I n-*„ I- •l.v.. ?., t4 4v-i t9K» V The Herald-Advance 9, W. DOWNII, KDITOK AMD PUBUSBSB AN UUKT COUNTT AND OITT OF MILBANK. •1LBANK. SOUTH DAKOTA, JUNE 13, l«* agreement has been en­ tered into between our own gov­ ernment and that of Great Brit ain for a two cents an ounce let ter postage between United States, Great Britain and Ire land, to become operative Octo ber 1st of this year. THE handsome majority given Fred B. Purdy in the three cor nered Sght for county superin tendent of schools is not only a tribute to Mr. Purdy, but it is a severe rebuke to the abuse that was made of the office when it Was simply made into an instru ment to strike down Mr. Bent ley's political opponents. Financial Statement of the Farmers Bank of l\Ml AX in the of South Dakota at «OR.Milbank.businessctate close of on the Sod day of June. BBSOCRGBS is A Discounts f127,150.24 Warrants, school and township 300.00 Fax certificates 2,597.81 verdrafts 98tt.ll leaking house, furniture tnd tixturee 14 223.22 Kxpenses and taxes paid 889.78 Me from other banks..US,49.98 7aah items 17618 ~»ld 2,U40.W) ilver coin 892.96 lickele and centa 124.07 ivrency 2,761,00 1 cash aa« die freai ether bank* VMMJI Total $206,990.80 LiAmiLrrns Capital stock paid in $25,000.00 •arplas 8,000.00 yaolYidded profits 840.76 Deposits subject to check. J78,986.64 Certificates of deposit 96,650.90 Total Bepeelts »K 7.649.54 Total 206,990.30 Stale of South Dakota, Ml. County of Grant We, O, L. Wood, preeident, and C. K. Mills, Cashier of the Farmers Bank of Milbank, each velng duly sworn,do solemnly ewear that the above atatement Is true to the best of oar know ledge and belief. G. L. WOOD, president, E. MILLS, rashier. Subscribed and sworn to before me this 9th iny of Jane, 1908. c, W. MARTINS, Notary Public, South Dakota. Base Ball Doings STANDING OP TH* LEAGUB CLUBS Wane Map* Won Lost Per ttlbaak .# *33 ferona 8 8 600 Wlimot 4* 1 250 *wla Brook 8 .4 0 U 00# -1 "•:t 1 WONDERFUL GAME—13 IN NINGS 2 to 1 Lust Tuesday the ninth, Twin JSrooks was to play a double leader with Wilmot but for §ome reason Wilmot, seat word fhat they had disbanded, and the Twin Brooks maaager was tip against it, as he had adver tised a big game and hired spe Qial players to do up the Wilmot 61ub Consequently he called up Milbank and asked if a team Oould be put together in a few Biinutes to get to Twin Brooks Bale. so as not to disappoint the crowd that were waiting to see the double header against Wil mot. Capt. Port answered the phone and in less than ten min utes the boys were all in uni form and by a special means of transportation (best known to the 15 who went) they arrived at Twin Brooks in just 50 min utes more. No airship was used. Of course this was to be an exhibition game and not to count on the percentage of the league, so the regulars were not all along. It certainly w as an exhibition game, and the best exhibition ever seen in this vi cinity, t® say the fans and ex fans. Baseball Schedule. June 13, Corona vs. Twin Brooks, at Twin Brooks. June 16, Corona vs. Wilmot, at Wilmot. June 16, Milbank vs. Twin Brooks, at Milbank. June 19, Corona vs. T«vin Brooks, at Corona. June 20, Milbank vs. Wilmot, at Wilmot. June 24, Milbank vs. Twin Brooks, at Twin Brooks. June 26, Milbank vs. Corona, at Corona. June 30, Wilmot vs. Corona, at Corona. July 2, Wilmot vs. Corona, at Wilmot. July 9, Corona vs. Twin Brooks, at Twin Brooks. July 11, Milbank vs. Corona, at Milbank. CHURCH NOTICES EPISCOPAL Services Sunday June 14 as follows: 10:45 a.m. Holy communion and sermon 12 noon Sunday school 5 p.m. Evening prayer and sermon It is expected that the Rev. Mr. George will preach Seats free. All welcome CONGREGATIONAL Morning service at 10:30 Sunday school at 12 Christian Endeavor at 7 Evening service at 8 The questions submitted by members of the Union Bible Class will be answered at the evening service METHODIST 10:45: Sermon to Children: "The Only Key." 12:00 Sunday school. 3:00: Junior League. 7:00: Intermediate League. Epworth League. 8:00: Children's Exercises. Parents having children whom they wish to have baptized may present them at the morning service. Remember this Investments Worth Considering is Children's Day. Prayer meeting Wednesday. ORIEN E. BOYCE. On JUNE 18 there will be another splendid opportunity for business men, Investors and others with limited capital, to make paying investments in a New town in the West. On this date, town-lots will be sold in WARMARTH on the new line to the Pacific Coast of Southwestern NORTH DAKOTA. A mixed price will be placed on each lot and the choice sold by auction. Prices will range from $1100 to $500 per lot. Full cash payment is not required on date of sale. ARM ARTH is the first division point on this new line west of the Missouri River in which town lots will be sold. It is situated at the crossing of the Little Missouri, seven miles east of the North Dakota-Montana state line on the Pacific Coast extension of the Missouri. The primaries last Tuesday spelled defeat for the stalwart cause, and undoubtedly gives the state into the hands of the insurgents, who probably elect all of their state officers and congressmen, though it is possible that two stalwart congressmen may have been elected. The Herald-Advance deeply regrets this general result, as it has been able to read through the sham pretense of reform which the leaders of this so-called insurgent or progressive movement represented, and has been thoroughly convinced of the ability and true worth of such men as Senator Kittredge and Messrs. Martin, Burke and Ramer in comparison with Gov. Crawford and Messrs. Glass, Hall and Ustrud. However, this is now over, and the stalwarts of the state having done what they could to avert what they believed to be a calamity to the party, will undoubtedly bow to the will of the majority. In the county the stalwarts were successful in carrying out the will of the majority. In the county the stalwarts were successful in carrying out the will of the majority. Chicago A St. Paul Railway MARMARTH has several stores and other branches of business, including cement block factory. Near the town are extensive deposits of clay waiting development which offer a good opening for the establishment of brick and tile works. It has five miles of passing and side-tracks, the surrounding country is principally a stock-raising and grazing country, although a considerable portion of it is adapted to diversified farming and dairying. MARMARTH has a large tributary trade territory. Kind will no doubt develop rapidly. Business and residence lots sold at the sales in other towns along this new line in the past year have already greatly increased in value. Lots which a short time ago sold for $252 are now selling for $500—they doubled in value in less than a year. It will pay you to investigate the present opportunities in MARMARTH. You can make an inspection trip at small-cost. There will be low-fare excursions to Marmarth from stations in the Dakotas on the Tuesday previous to the Tickets good 21 days from date of sale stop-overs allowed. Ask your local agent for fare and train service from your station to MARMARTH. If you are interested in investing your money profitably, take advantage of this sale. In writing for further information please ask specific Questions. Complete information free. F. A. MILLER C. A. PAULEY General Land Agent MILWAUKEE SHOE Lender STORE Fruit, Confectionery, Fruit... Cigars, Tobacco... etc. I Peterson AiAAAlAAAAAAAAi J. ADAMS General Land and Town Site Agent MILES CITY, MONT. Through all of the county officers excepting the county auditor and clerk of courts. On the legislative ticket, the vote was very close, the stalwarts electing the state senator and possibly one of the representatives. Senator Kittredge receives a majority over Gov. Crawford of 60 in the county. In our neighboring county of Roberts, the stalwarts made a general cleanup, carrying the county by majorities ranging from 200 to 300, notwithstanding the fact that at the election two years ago, the insurgents had some 400 majority. There was a general insurrection against what was recognized as the bossism of the insurgent leaders. Friends of Louis Saunders have received the commencement programs of the Randolph Military Institute, from which Louis graduates this month. Wetting the Hair. Be careful not to wet the hair too much, as it takes the oil out of the roots and makes the hair grow thinner. It is this habit of daily hair wetting that makes men get bald so much more quickly than women. Orchard Grass. Orchard grass is richest in protein, being 4.9 to a hundred pounds, almost double that of timothy. Siberia's Minerals. Foremost among the minerals, etc., which Russians regard as the source of Siberia's future wealth are gold, iron, coking coal, manganese, copper, platinum, emeralds, topazes, asbestus, Glauber's salt, rock salt, and in all probability naphtha. Musical Notation. The present system of musical notation was invented in the eleventh century. Tarring and feathering was once a legal punishment for theft. It is said to be found in the statutes of both England and France about the time of the Crusades. Radium. Radium acts upou the chemical con stituents of glass, porcelain and paper, Imparting to them a violet tinge changes white phosphorus to yellow, oxygen to ozone, affects photograph plates and produces many otter curi ous chemical changes. Hens. The younger the hen the better she lays la winter, when eggs are highest. Auctioneers. The ways of auctioneers in different parts of the world varyxgreatly. In England and America the seller bears the expense of the sale, but In France the purchaser bears the cost, 5 per cent being added to his purchase. In Hol land it is still worse, the buyer being required to pay 10 per cent additional for the expense of the sale. Peru's Agricultural Region. The chief agricultural region of Peru consists of a series of fertile parallel valleys running the entire extension of the coast over 1,300 miles, back to th* chain of the Andes, the distance vary ing from twenty-five to seventy-flve miles. Her Help. (he helped him save when they were young She swept and sewed and darned and baked, And oft her eyes were red. and oft Her poor heart and her fingers Primary Aftermath As a result of the primaries last Tuesday the republican candidates for county and legis lative offices will be as follows: For state senator—C. S. Ams den For representatives-0 Ding sor and A. Weide For treasurer—JohnO Nelson For auditor—Chas. McWaters For sheriff—Fred Cross For register of deeds—Franz Wendland. For clerk of courts—John Liggett For supt. of schools—Fred B. Purdy For state's attorney—Thad Fuller For county judge—S. S. Lock hart For coroner—W. A. Kriesel County commissioner 3rd dist rict—John Maxwell in: LAUX ached. He has no fairer, younger mate Whom he supports in style today. He bought on margins once: his old Aij|4 Weary wife still works away. —Chicago Record-Herald. No Privileges. The business agent stuck his head inside the shop door. A solitary man was at work. Newfoundland. Nearly one-third of the surface of Newfoundland is covered with fresh water, mostly in the form of lakes. Never Caught Alive. In Lake Derwentwater, in England, there is a species of fish called vandace, which are never caught alive. They are said to frequent the deeper parts of the lake and are never met with in the rivers. One or two dead specimens of the breed which have been found in the lake are treasured as curiosities. Wellington. The Duke of Wellington six months after the battle of Waterloo was created a marshal of France. Pupil of the Eye. The pupil of the eye is so called because when looking in it a very small image of the observer may be seen. Ice the term, from the Latin "pupil" used, or little pupil. A German merchant's wife complained to a friend recently: "If only my husband were not so absentminded! The other day when we were dining at a restaurant the waiter brought him some bad fish, and all of a sudden Fritz threw the whole thing, fish, plate, bread, all at once." London Scraps. WHY NOT? There's a... .... REASON Ed. A Murray was elected the member of the state central committee. In the wards in the city the several committeemen elected were: First ward—W. W. Reeve Second ward—F. W. Meehan Third ward. —H. J. Benedict THE vote upon the state superintendent of schools was Ramer 737, Ustrud 547. Gottfred Stengel and wife leave this morning for a three or four weeks visit with friends at Hutchinson, St. Peter and other points in Minnesota. The members of the Eagle lodge with their families and friends picnicked at Big Stone Lake Sunday. They took the Milwaukee band with them. When you find a store that's busy all the time you can make up your mind that there is a reason and people know it. The goods must be right, methods liberal and prices right. These are the conditions as they exist at this store and accounts for the steady increase of patrons at Laux & Co's, store. Bring us your farm market price paid. Underwear. When you buy underwear be sure to call for the "Memor" brand. MENTOR It has a quality all its own and is an article that gives entire satisfaction. Try it, suit and prove to your own satisfaction. Superior to most second to none. A.
283
5749184_1
Caselaw Access Project
Open Government
Public Domain
2,009
None
None
English
Spoken
35
68
Appeal from a judgment of the Superior Court for Pierce County, No. 06-2-13623-9, Linda CJ Lee, J., entered February 29, 2008. Affirmed by unpublished opinion per Kulik, J., concurred in by Houghton and Hunt, JJ..
23,772
6688376_1
Court Listener
Open Government
Public Domain
2,022
None
None
English
Spoken
1,486
1,846
McCOY, J. In this case plaintiff claims to- recover of the defendant, Hughes county, the sum of $479.70. There was a ver-*121diet and judgment for plaintiff, and defendant appeals. Plaintiff-presented at -the April, 1911, meeting of the board of county commissioners -a -bill for $514.60, most of which was for personal services claimed to have been performed and rendered as superintendent of the county board of health. A small portion of said bill was for mileage and reports made by plaintiff. The board of county commissioners allowed $32.90 of this bill, and rejected the balance of $479.70. No appeal was taken by plaintiff from the action and decision of the commissioners in rejecting and -disallowing the said $479.70 of s-aid bill, but plaintiff some time thereafter brought direct action against the county in the circuit court to recover -said balance. The defendant county urged in the co.urt below, and now urges the contention that plaintiff cannot maintain this action to recover .said balance of account — that plaintiff’s sole and -only remedy under, the -circumstances of this case was by appeal from the said action and decision of the county commissioners, and not by direct action. We are of the opinion that defendant’s contention is well grounded. [1] A board of county commissioners in the rejection and allowance of claims and bills against the'county usually acts only in an executive or ministerial capacity, in which case there is nothing more before them than the pure question of allowance or rejection of the claim. In such cases the amount and right of the claim are either -fixed by contract -or the -statute, in relafTon to which the county commissioners are not invested with any discretionary powers; but rights under the contract or statute must be determined by some judicial tribunal having jurisdiction- thereof. [2] While a board of county commissioners is not by the laws of this state clothed with any judicial p-owers, such as are conferred -upon courts, still they are in certain instances invested with discretionary powers, which they exercise in a quasi judicial manner; that is, they are authorized to investigate facts and exercise discretion or judgment in relation to the facts revealed by such investigation -in a manner similar and with similar effect as courts. We are of the opinion that, when a board of county commissioners in -the exercise of its discretionary powers act-s upon any particular matter in any proper case legally and properly within such discretionary powers, such action can only be revíewéd on appeal in the manner provided by law for such appeals; and, when *122no method of appeal is provided, such action of the' commissioners becomes final, and is not subject to review by the courts in a direct original action, 11 Cyc. 598. It is not the method or manner or result of the manner in which such board acts that precludes the maintenance of an original action, but it is the fact that such board has acted in a matter within its exclusive' discretionary power, and having so stated, no matter how erroneously, such action can only be reviewed on appeal. [3] The term “quasi judicial” is used to describe acts, not of judicial tribunals usually, but acts of public boards and municipal officials, presumed to be the product or result of investigation, consideration, and ’human judgment, based upon evidentiary facts of some sort, in a matter within the discretionary power of ■such board or officer. 'Such acts, when erroneous, can only be corrected and reviewed on appeal. Only the board of county commissioners in the first instance has authority in such cases to fix the amount of compensation, when the matter relates to that subject, and where the court on appeal reviews the action of the commissioners it is merely exercising the same powers possessed by the commissioners which have been brought before the court by means of the appeal. The court in an independent original action would possess no suc-h power. [4] ’Some contention is made that the power granted by chapter 76, Laws'of 1905, to the county commissioners, providing that for certain services the county superintendent of the board of public health shall receive such sums as the county commissioners may allow, is a grant of purely legislative power, the exercise of which is not subject to appeal at all. We are clearly of the opinion that the power granted to the county commissioners by this section of the statute is not a grant of legislative power, but is a grant of discretionary power to be exercised in a quasi judicial manner, and is subject to appeal under section 850, Pol. Code.- A statute which authorizes municipal- authorities such' as city councils to fix the salaries of certain designated officers without reference to the value of the service is a grant of legislative power, and has the same force and effect, after being exercised, as if the amount thus fixed had been written in the statute itself, and from" which there can be no appeal; but, when the law contemplates that the services shall have been rendered and performed *123and a bill therefor presented to the board of county commissioners for allowance, as seems to have been contemplated by the provisions of section i, c. 76, Laws of 1905, now under consideration, it is clearly a grant of discretionary or quasi judicial power, impliedly giving the county commissioners the power to investigate facts as to the nature and value of the services performed, and based upon such investigation of the facts to arrive at a conclusion or judgment as to the just and reasonable amount of compensation that should be allowed therefor. Under a Kentucky statute providing that for certain services of a judge the county board should make an allowance, the Supreme Court of that state, in construing that statute, said: “We think this can mean nothing else than a reasonable allowance commensurate to the character and quantity of the services performed.” Ohio County v. Newton, 79 Ky. 267; Butler County v. Gardner, (Ky.) 96 S. W. 582. Under an Indiana statute authorizing the county commissioners to make an allowance to sheriffs for certain services, it was held that such allowance was a discretionary matter with the county board to be determined on the presentation of their bills. Marion County v. Reissner, 58 Ind. 260. In Patterson v. It therefore necessarily follows, no matter whether -the power granted was quasi judicial or legislative, that a direct action cannot 'be maintained on such a claim. Chapter 76, Laws of 1905, regulates the compensation of the superintendent of the county board of health, and provides (1) that such superintendent shall receive 10 cents per mile for each mile necessarily traveled in the performance of his duties; (2) such other sums as the board of county commissioners shall allow, provided that for each examination necessarily made for persons who are afflicted with smallpox, diphtheria, scarlet-fever, anthrax, Asiatic cholera, yellow fever, and bubonic plague, he shall also receive -not to exceed the sum of $5 for each visit actually and necessarily made; (3) he shall receive 50 cents for each report to the state superintendent of public 'health; and (4) he shall receive such other sums as he may pay for medicines and disinfectants. A careful examination of the items of plaintiff’s bill discloses $20.40 claimed for mileage, $16.50 claimed for reports made to the state board of health, and $477.70 for personal services rendered in relation to health matters. Further examination of this bill discloses eight duplications of reports amounting to $4, leaving the true amount of the claim for reports $12.50, which, added to the amount of $20.40 for mileage, exactly equals and coincides with the amount of $32.90 allowed plaintiff by the board of commissioners, clearly demonstrating what items of the account were allowed and what rejected. The entire amount of the items rejected are included within the second division of the statute providing “such other sums as the board of county commissioners may allow” and being clearly within the discretionary powers of the county commissioners. It is a matter of discretionary judgment reposed by the law in the board of county commissioners to fix and determine the amount plaintiff should receive for “such other" services. No other tribunal in the first instance was authorized to- determine or allow the amount of compensation for such other services. The fact that the commissioners refused to allow plaintiff anything at all might have .been very erroneous, but such board in so doing acted upon a matter within the discretion reposed in it by legislative enactment. Courts cannot control such acts of such boards by com*125pelling them to act in any particular manner. The judgment and order appealed from are reversed, and the cause remanded for new trial in accordance with this opinion. POEEEY, J., took no part in this decision. SMITH, J., concurs in result.
47,472
https://www.wikidata.org/wiki/Q61250341
Wikidata
Semantic data
CC0
null
Thể loại:Punctabyssia
None
Multilingual
Semantic data
12
35
Thể loại:Punctabyssia thể loại Wikimedia Thể loại:Punctabyssia là một thể loại Wikimedia
37,619
sn86076142_1920-11-04_1_4_1
US-PD-Newspapers
Open Culture
Public Domain
null
None
None
English
Spoken
1,971
3,642
PAGE FOUR TONOPAH DAILY BONANZA, MONOPAH, KEVADA. THURSDAY EVENING, NOVEMBER 4, 1920 The STOCK MARKET The following are the closing stock quotations, and the record of the day's sales as received from the San Francisco Stock Exchange this afternoon by R. Fred Brown, broker: TONOPAH DIVIDEND. Bid Asked Allied Oil. 02 Utah. 06.64 A per 100 Belcher 04,06 Hutchler Ex....116 1.1 Hutchler Hurl.. 01.02 Frothington. 03 Hutchler. King "1 ft?, T.ouiMn it.' 'i;; ' ToK-ry M Wrdi ft4 Victory i.i, 07 Western 02 03 U'iNun 1,1 02 West IT M TONOPAH ll' iinoii! n', Cul'torni,! Pu-h Boy '.vpsy Que.i Jim Hiitler MiirNamani Midway Monarch PittsburK North Star Hescue-Kula Tonopah Ex Went End Fresco! 24 .06 .01 17 .IK .22 .10 .04 Of. .17 1 62'. 1.15 "0 06 IS 1 20 10 08 Ponopah 7i Oriental GOLDFIELD Hoil! ("r.i'-k.-r.lark I'ioreno- ddfo-ld Corn 'irejt iletid Keana, Jumbo Ex S lvr-r I'n k. r-a: head Veilow T.fter 'J 4 02 12 0i 01 .02 03 9 .02 .03 06 03 .02 R-d Hills oi 02 .vjt-n.e.v ty I-"'"- S-a: 04 06 MANHATTAN. ',.'f'aps (J, COMSTOCK S. MISCELLANEOUS. 155 ' 53 '"! 0H OS iio.jnd M'iunu.r, 16 S,uon I Simon K ri n2 Mayo.-r c,j D'oken Hill. io y Hailwhacker. 53 TONOPAH DIVIDE. divide -..0 1 10. 1200 1 10 BOSTON A NEVADA PFPNO ATTIV, v vniiuil n,;. ioi company u operatim Ung a penmt The Ucn.e under the,.al of the Interior Department U here, and tk-w uTtL2 U T f ",0n " "" ed to impair confidence in the oi! reoe, of th. Fallon field. The Fallon Oil Field U now ln V2L tS". " fwld that may prov. th.urprise of th. world. 10 prov,n UrTi' " the of aU geolofU i. that ocn or oiiw. ta, a, rUll s hu n m IVrJ""'1'THX "no bicb ku bM. prtinM br lb.,ov.oi,djn.ur within Ik..ul ( d. W.U Ho 1 will tb.1"..v 'T?' 1.07'-... 100 1.07!... H't 107 1000 LOTS; 500 1.07; 500 1.05; 500 1.07H; 700 1.05, 1000 1.05. Hasbrouck 4000 4; 1500 3 Gold Zona 2000 19; 1500 18 3000 15; 2000 IS; 2000 18; 1000 18. Erougher -4000 12; 2500 12; 1000 11. Divide KX.--20W 27; 2KM S-30 25; 5000 27; 500 26. Dividend 100'.' 5; 1000 5; 4000 5 Alto- 3500 5; 10OO 5; 4000 5. Heli her HKWi 4; 2000 4; 5000 4. Heli her KHSW 4; 2000 4; 5000 17; 1000 17; 5000 16. Divide City lO.uvy 2; 300v 1; 1000 17; 1000 17; 5000 16. Hennessy-Hhi - Kernick 2W' 9 East Divide -1'")': 1; 1000 3, 30.1. 3; 2OO0 3. 300" 3 Divide Cons. 2v..i 1 Butte 1500 2 Keystone 100" 1 Western 1000 J. Thomson 2ie.j 2. Horseshoe -looo 1. Verdi - 5"00 4 Myra - loOO .; TONOPAH. N-.rrh Star - 20i;o 5 We,t End-- 2w 1.20; 300 1 22'i ; 200 1.20; 100 117' Reuinie 2000 18. GOLDFIELD. '',id!ieid Cons- l'iO" !, i.one Star 4000 5 Spearhead IOOO 2; 7' 1 liooth I'ioo 4, lion 4 Red Hills- ij"0 H 30 2 1 20 COMSTOCKS ( 'oiis Virginia - 'loo 4 vo Opbir- 200 74: 2"0 72; : 72, 5.H, 71 Union- 4o0 4:1, 3i". 4.' .'00 43; 100 44: 5"0 44 Mexicin 300 26 73; 50.) 42; MISCELLANEOUS. Round Mountain 2O0 16: 30 17 ClilliaX 5001. 5; 2"1".. ". Simon Lead -21 77 Tlolly 500 1 60 Croesus -600 52; l'.OO 54. Hull barker T,on 59: T0 ; 60. nroken Hills - 3000 1 1; 350'" GruHs 1400 90; 500 90; 1000 Sn r,n.i So; 500 90; notiii: ny iikikim. of i-'IVAI. ac 1 OI NT NI PETITION" FOR I msTIIIHI TIOV ', In 'he y 1 f ' h Of tt-.l Mm. In I t.e rr a 1 1 r J'j-l.'l.-i! IllstriLl f ..f NVvsdii ,f '.n I-"tate of J ourt I t-Wirl. Ie. ). .Sotir.- Is lirl.y ;v.-ii tluit rin I' SV-Wirl Kt. ruli .K f the ..(ate Of J W Ht.-wart. df1, . used, f,as r.Ti.Ji-r.-d 1 iiiid tr.-s-nlpi for (.-Iti.-rnetit. and tiled j 1:1 sal-1 mint, her timtl ac.ount of r.'-r itd.T.irii.-tration of said entnte, to-K'-trier with a fe'itlon for tlie (lis. trif.ution of Hi.- n-s.dne of naid ei-!hi-. ht.. that Mot.dav. th- th day of NoW-l:,.r. I!.J.t. at 10 olork A M., in the ...urtrooin of said fourt In T-,ii'..:ih Neva In. has b.-.-n lixe.i :,s the time an! pla..- for settlement of said a ro-ii.t and the h.-arinn of na!d petition, f. whlrh time and idare any persons t-t-resied in said estate may app-ar and enter oletlonp to the Hold "-,,iir,t ar.l contest the name l.ate1 ovemhi-r 7,. 1920 's':i L E OI.ASM. t'lerk of said Court By H HAFFKHO.V. FORM AN & MoK'NIOHT. At'r.meyo f.,r KxePUtrit Nov 4-11-1 NOTK K FOR Fl HMC'ATION RKI.AT IN( TO NI RF.Ctl IHIN'i; THK IIK-HKI ORIIINU OF HHIMIV I I'ON I I FTO k. Kverv person, eomnanv or r-, e,,. uon havinu horses, rattle or other liv.-mork and onlnr a brand or mark or irands or marks for the same, "hall n.-'wrd an.'h brand or brands or mark or marks with the county Re corder, or. or before the tirst day of On and after the first day of Janu ?'. no person, company- or cor poration shall claim or own any brand or mark which haa not been rw-raeord-"3 A',' ,u'r"r,1'ince with the provisions "f' hapter :49, Statutes of 1K15. pan JRN'NIE A niniFi'v 'ounty Recorder of Nye Toiinty under PERSONAL R- D. XIcAFKE, of Belmont, was "iisiness visitor in Tonopah yester day. MR. and MRS. SOL CAMP, .;'.i'iiie!d, spent last evening In this city. DR. GEORGE P. DEVLNE, of Qoid- field, is In Tonopah today on proles (ional business. R. G. McDONAXD, of Mina, is in Tonopah today attending to matters of business. .MR and MRS. 1. G. SHERMER, of Weiser, Idaho, are anions the guests registered at the Mizpah hotel. K. V. KELLET was in this city yesterday from Round Mountain on .1 business mission. JUDGE HEYWOOD, wife and son, returned by auto to Benton, Cal., today. BERT McFADDEN, who is working at Benton, left for that place this morning. CARL REIK, who has been spending several days here, returned this morning to his home in Coaldale. MRS. S. E. SMITH, of Manhatan, is among the guests registered at the Mizpah hotel today. ED CAYLE was a passenger on this morning's northbound train for San Francisco, where he will visit for several days with friends. JAMES GRIMES, "Daddy of Divide," who has been visiting in Tonopah for several days, left this morning for San Francisco. LEW TOWNSEND, who is employed as head millwright at Alum, returned to his home there after spending a few days in Tonopah. MR and MRS. SAM FORMAN, who came to Tonopah to cast their votes, returned by auto to Benton today. Mr. Forman has opened up a very rich lead on his property on Blind Hill Spring in the Benton district. Location books in the trip are now ready at The Bonanza office. GET A SKATE ON Rol'er skates of the Airdome. Opening night, November 4. Skates every night but Saturday and Sunday Admission 10c. Skates rent for 4' From 7 p.m. to 10 p.m. No skates but the A G. Spaulding high-wheel skates will be allowed on the floor. We Specialize in Broken Hills Stock Now Selling at Bottom and other ACTIVE NEVADA MINING ISSUES listed on the SAN FRANCISCO STOCK EXCHANGE Your business and inquiries solicited G. E. Arrowsmith & Co. Marker and Frank Stark Uxhaaa 117 Russ Bldg San Francisco, Cal. OIL. AMUSEMENTS ALICE BRADY AT THE BUTLER TODAY "The Indestructible Wife," Alice Brady's latest Select picture, will be the attraction at the Butler today. Clean, swift and intensely American, a story of big city life today is which duty discounts the cost. Splendidly cast and superbly produced a Thomas H. Ince special. The story deals with Charlotte, the strenuous bride of Jimmy Ordway. She is athletically inclined while her husband is not, and he finds a great deal of trouble in keeping up with her. He meets Brandy, a professional athlete, whom he decides is the correct man to tame her as Petruchio did the Shrew. He kidnaps her and takes her to a boathouse. Brandy tries to rescue her but she loves Jimmy and refuses to be rescued, and tamed Charlotte and her tamer prepare to lead a less strenuous life. Added to the program will be the latest Pathe News. Tomorrow, Miriam Cooper in "The Deep Purple," a thrilling drama of the underworld. Monday, "Homespun Folks," the first big picture of the Associated Producers. TAX NOTICE The first installment of 1520 tares is now due and payable at the treasurer's office. Taxes will be delinquent on the first Monday in December. L. E. GLASS. Treasurer of Nye County, Nevada. Location boots in triplicate at The Bonanza office. FOR SALE Metz car in good condition. Also cigar cane and 8-foot kitchen range. Apply at Bonanza. FOR SALE Meister piano $150 Address "L. B." Bonanza office. CLASSIFIED THE HIGHL AND OIL CO. Organized for the Purpose of Organizing at Oil Basin, are especially invited to go quest for the money. This company is now being the sale of its treasury stock, OIL BASIN IS OUR COAL and to us it spells oil. Our geologists say so. of Nevada. Our latest report by Edw S. We believe the White River district is the Giles, E. M. will soon be off the press. Don't most logical source of oil in the entire state fail to read it. FIRST OFFERING OF STOCK AT 10 CENTS PER SHARE. Nothing but standard drilling equipment for us. Descriptive circulars on request. OFFICERS AND DIRECTORS: PRESIDENT: H. K. Davis, Prop., Overland Hotel, Winnemucca, Nevada. VICE-PRESIDENT: Capt. Fred Morrison, Quincy, California. SECRETARY-TREASURER: John (Pai-our, County Assessor, Quincy, California. HIGHLAND OIL COMPANY of Quincy, California. ST. PIERRE'S BOOTERY. COMFY FELT SLIPPERS AT $2.50. Colors are Lavender, Orchid, Blue, Pink, Wine, Grey, Buff, Maroon and Black. All sizes at $2.50. New Colon in Spats and Hon at $2.00, $3.00, $3.50. Up to $5.00. Women's Chiffon Silk Hose. "The Pick of Hosiery" All colors - $2.00. Growing Girls' Brown Calf English LOW HEEL SHOES. Sizes 2 1-2 to 8. $600. $6.00. ST. PIERRE'S BOOTERY. TONOPAH RENO. Location boots & Now for sale ALL HANDS IN SOUTHERN NEVADA with us in this financed through of which 1,500,000 shares is appropriated. Not one dollar of our funds will be diverted to other districts or enterprises. D. ERECTORS Dr. B. J. Lasswell, Quincy. L. A. Bradfin, Sheriff Plumas County, Quincy. Wm. D. Nance, Mining and Advertising, Reno. Nevada OR i Brown, Black or Grey Kid Cloth Top UN'S SHOES Special for Friday at $8.80 Louis or Cuban Heels 1 1 $6.00 1 1! 1 at The Bonanza office. OF NEVADA White River Valley. WM. D. NANCE 417 Maple St., Reno, Nev.fi, long distance. proof of the chance of "y f ""oJLtoL, was that at one time geological condition, are ripe for bringing more great HAIR C. ITHCLER LUMBER 70 TO 70 TOMB WANTED MAGNESIUM SULPHATE SODIUM SULPHATE ' GYPSUM, TALC, . BORAX FULLERS' EARTH and OTHER MINERALS H. Q. STAMP C-o West Arrowhead office TONOPAH, NEVADA REXALL DRUG STORE "Society' Favorite" "CARA NOME" The Very Latest in Perfumery Joseph C. Plerey, Prep. 2 phones: Store 872; Ret. 765 MIZPAH BUFFET (Mizpah Hotel Bldg) Has Been Reopened Under the Management of Frank Heckley. SOFT DRINKS of every known variety may be had at this popular emporium Courteous Treatment Assured AIRDOME SATURDAY EVENING THE UNIQUE New Fall Display of ladies ready to wear gar merits direct from the New York markets. DRESSES, SUITS, COATS, HATS, ETC. We invite your inspection. No trouble to show goods THE UNIQUE DANCE ANY .... ran value 10 CENTS JJ.
45,593
https://github.com/Sidouuuux/zaert/blob/master/src/main/java/com/example/demo/Teacher/TeacherView.java
Github Open Source
Open Source
MIT
null
zaert
Sidouuuux
Java
Code
43
146
package com.example.demo.Teacher; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.servlet.ModelAndView; public class TeacherView { @RequestMapping("/welcome") public ModelAndView helloWorld() { String message = "<br><div style='text-align:center;'>" + "<h3>********** Hello I am the test, now you have hope understanding how front works **********</div><br><br>"; return new ModelAndView("welcome", "message", message); } }
36,847
https://github.com/jdavidhermoso/Camera-Phonegap-App/blob/master/platforms/browser/www/js/gestures.js
Github Open Source
Open Source
Apache-2.0
2,017
Camera-Phonegap-App
jdavidhermoso
JavaScript
Code
155
568
var app = { color: { light: 'light', dark: 'dark' }, init: function () { 'use strict'; var lightButton = document.querySelector('#light'), darkButton = document.querySelector('#dark'); app.initFastClick(); app.initHammer(); lightButton.addEventListener('click', this.toggleColor, false); darkButton.addEventListener('click', this.toggleColor, false); }, toggleColor: function (ev) { var button = ev.target, color = button.dataset.color; document.body.className = color; }, initHammer: function () { var zone = document.getElementById('gestures-zone'), hammerTime = new Hammer(zone); hammerTime.get('pinch').set({enable: true}); hammerTime.get('rotate').set({enable: true}); zone.addEventListener('webkitAnimationEnd', function(e) { zone.className = ''; }); hammerTime.on('tap', function () { zone.classList.add('tap'); }); hammerTime.on('doubletap', function () { zone.classList.add('doubletap'); }); hammerTime.on('swipe', function(ev) { var swipeClass, direction = ev.direction; if (direction === 4) { swipeClass = 'swipe-right'; } if (direction === 2) { swipeClass = 'swipe-left'; } zone.className = swipeClass; }); hammerTime.on('rotate', function (ev) { var grades = 25; if (ev.distance > grades) { zone.classList.add('rotate'); } }); hammerTime.on('press', function () { zone.classList.add('press'); }); }, initFastClick: function () { FastClick.attach(document.body); } }; if ('addEventListener' in document) { document.addEventListener('DOMContentLoaded', function () { app.init(); }); }
35,808
https://github.com/risecgamer/xooa-php-sdk/blob/master/examples/simple/client/index.php
Github Open Source
Open Source
Apache-2.0
2,019
xooa-php-sdk
risecgamer
PHP
Code
1,699
4,232
<?php /** * Xooa PHP SDK usage example * * Copyright 2018 Xooa * * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except * in compliance with the License. You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License * for the specific language governing permissions and limitations under the License. * * Author: Arisht Jain */ require_once('../../../../../../vendor/autoload.php'); use XooaSDK\XooaClient; use Monolog\Logger; use Monolog\Handler\StreamHandler; $log = new Logger('exampleApp'); $log->pushHandler(new StreamHandler(__DIR__.'/log.log', "DEBUG")); $XooaClient = new XooaClient("<Xooa API Token>"); $identityId1 = ""; $identityId2 = ""; $trxnId = ""; $invokeResultID = ""; $queryResultID = ""; $identityResultID = ""; $deleteIdentityResultID = ""; $currentBlockResultID = ""; $blockResultID = ""; $transactionResultID = ""; if ($XooaClient->validate()) { // Calling invoke methods /** * The invoke function is used for submitting transaction for processing by the blockchain smart contract app * when the transaction payload need to be persisted into the Ledger (new block is mined). * Required permission: write ("Access":"rw") * "set" function is the part of the smartcontract provided in this example * */ try { $log->debug('calling invoke method "set" with args "args1, args2"'); $response = $XooaClient->invoke('set', ["args1","args2"], 10000); var_dump($response); $trxnId = $response->getTransactionId(); } catch (Exception $e) { var_dump($e); } /** * The invokeAsync function is used for submitting transaction for processing by the blockchain smart contract app aynchronously * when the transaction payload need to be persisted into the Ledger (new block is mined). * Required permission: write ("Access":"rw") * "set" function is the part of the smartcontract provided in this example * */ try { $log->debug('calling invokeAsync method "set" with args "args1, args2"'); $response = $XooaClient->invokeAsync('set', ["args1","args2"]); var_dump($response); $invokeResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } // Calling query methods /** * Query Blockchain data * The query function is used for querying (reading) a blockchain ledger using smart contract function. * It must pass a function name already defined in your smart contract app which will process the query request. * Required permission: read ("Access":"rw" or "Access":"r") * "get" function is the part of the smartcontract provided in this example * */ try { $log->debug('calling query method "get" with args "args1"'); $response = $XooaClient->query('get', ["args1"], 10000); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * The query function is used for querying (reading) a blockchain ledger using smart contract function asynchronously. * It must pass a function name already defined in your smart contract app which will process the query request. * Required permission: read ("Access":"rw" or "Access":"r") * "get" function is the part of the smartcontract provided in this example * */ try { $log->debug('calling queryAsync method "get" with args "args1"'); $response = $XooaClient->queryAsync('get', ["args1"]); var_dump($response); $queryResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } // Calling identity methods /** * Gets the detail about identity currently set * no argument is required * */ try { $log->debug('calling currentIdentity method'); $response = $XooaClient->currentIdentity(); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * Get all identities from the identity registry * no argument is required * */ try { $log->debug('calling getIdentities method'); $response = $XooaClient->getIdentities(); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * The Enroll identity function is used to enroll new identities for the smart contract app. A success response includes the API Token generated for the identity. This API Token can be used to call API End points on behalf of the enrolled identity. * This function provides equivalent functionality to adding new identity manually using Xooa console, and identities added using this function will appear, and can be managed, using Xooa console under the identities tab of the smart contract app * identityRequest is required argument * */ try { $log->debug('calling enrollIdentity method with args as identityRequest'); $identityRequest = '{ "IdentityName": "string", "Access": "r", "Attrs": [ { "name": "string", "ecert": true, "value": "string" } ], "canManageIdentities": true }'; $response = $XooaClient->enrollIdentity($identityRequest); $identityId1 = $response->getId(); $identityRequest = '{ "IdentityName": "string1", "Access": "r", "Attrs": [ { "name": "string", "ecert": true, "value": "string" } ], "canManageIdentities": true }'; $response = $XooaClient->enrollIdentity($identityRequest); $identityId2 = $response->getId(); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * The Enroll identity function is used to enroll new identities for the smart contract app asynchronously. A success response includes the API Token generated for the identity. This API Token can be used to call API End points on behalf of the enrolled identity. * This function provides equivalent functionality to adding new identity manually using Xooa console, and identities added using this function will appear, and can be managed, using Xooa console under the identities tab of the smart contract app * `Required permission`: manage identities (canManageIdentities=true) * */ try { $log->debug('calling enrollIdentityAsync method with args as identityRequest'); $identityRequest = '{ "IdentityName": "string2", "Access": "r", "Attrs": [ { "name": "string", "ecert": true, "value": "string" } ], "canManageIdentities": true }'; $response = $XooaClient->enrollIdentityAsync($identityRequest); var_dump($response); $identityResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } /** * Generates new identity API Token * identity ID is required argument * */ try { $log->debug('calling regenerateIdentityApiToken method with identity ID of identity generated in enrollIdentity method call'); $response = $XooaClient->regenerateIdentityApiToken($identityId1, 10000); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * Generates new identity API Token asynchronously * identity ID is required argument * */ try { $log->debug('calling regenerateIdentityApiTokenAsync method with identity ID of identity generated in enrollIdentity method call'); $response = $XooaClient->regenerateIdentityApiTokenAsync($identityId1); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * Get the specified identity from the identity registry * identity ID is required argument * */ try { $log->debug('calling getIdentity method with identity ID of identity generated in enrollIdentity method call'); $response = $XooaClient->getIdentity($identityId1); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * Deletes an identity. * identity ID is required argument * */ try { $log->debug('calling deleteIdentity method with identity ID of identity generated in enrollIdentity method call'); $response = $XooaClient->deleteIdentity($identityId1); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * Deletes an identity asynchronously. * identity ID is required argument * */ try { $log->debug('calling deleteIdentityAsync method with identity ID of identity generated in enrollIdentity method call'); $response = $XooaClient->deleteIdentityAsync($identityId2); var_dump($response); $deleteIdentityResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } // Calling blockchain state methods /** * To get details about current block, call getCurrentBlock method * no argument is required * */ try { $log->debug('calling getCurrentBlock method'); $response = $XooaClient->getCurrentBlock(); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get details about current block asynchronously, call getCurrentBlockAsync method * no argument is required * */ try { $log->debug('calling getCurrentBlockAsync method'); $response = $XooaClient->getCurrentBlockAsync(); var_dump($response); $currentBlockResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } /** * To get details about a block, call getBlockByNumber method * block number is required argument * */ try { $log->debug('calling getBlockByNumber method with "1" as block number'); $response = $XooaClient->getBlockByNumber(1); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get details about a block asynchronously, call getBlockByNumberAsync method * block number is required argument * */ try { $log->debug('calling getBlockByNumberAsync method with "1" as block number'); $response = $XooaClient->getBlockByNumberAsync(1); var_dump($response); $blockResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } /** * To get details about a block, call getTransactionByTransactionId method * transaction id is required argument * */ try { $log->debug('calling getTransactionByTransactionId method with "trxnId" as transaction id'); $response = $XooaClient->getTransactionByTransactionId($trxnId); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get details about a block asynchronously, call getTransactionByTransactionIdAsync method * transaction id is required argument * */ try { $log->debug('calling getTransactionByTransactionIdAsync method with "trxnId" as transaction id'); $response = $XooaClient->getTransactionByTransactionIdAsync($trxnId); var_dump($response); $transactionResultID = $response->getResultId(); } catch (Exception $e) { var_dump($e); } // Calling results methods /** * To get result for query pending request, call getResultForQuery method * resultId is required argument * */ try { $log->debug('calling getResultForQuery method with resultId generated in queryAsync method call'); $response = $XooaClient->getResultForQuery($queryResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for invoke pending request, call getResultForInvoke method * resultId is required argument * */ try { $log->debug('calling getResultForInvoke method with resultId generated in invokeAsync method call'); $response = $XooaClient->getResultForInvoke($invokeResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for identity pending request, call getResultForIdentity method * resultId is required argument * */ try { $log->debug('calling getResultForIdentity method with resultId generated in enrollIdentityAsync method call'); $response = $XooaClient->getResultForIdentity($identityResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for delete identity pending request, call getResultForDeleteIdentity method * resultId is required argument * */ try { $log->debug('calling getResultForDeleteIdentity method with resultId generated in deleteIdentityAsync method call'); $response = $XooaClient->getResultForDeleteIdentity($deleteIdentityResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for current block pending request, call getResultForCurrentBlock method * resultId is required argument * */ try { $log->debug('calling getResultForCurrentBlock method with resultId generated in getCurrentBlockAsync method call'); $response = $XooaClient->getResultForCurrentBlock($currentBlockResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for block pending request, call getResultForBlockByNumber method * resultId is required argument * */ try { $log->debug('calling getResultForBlockByNumber method with resultId generated in getBlockByNumberAsync method call'); $response = $XooaClient->getResultForBlockByNumber($blockResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } /** * To get result for transaction pending request, call getResultForTransaction method * resultId is required argument * */ try { $log->debug('calling getResultForTransaction method with resultId generated in getTransactionByTransactionIdAsync method call'); $response = $XooaClient->getResultForTransaction($transactionResultID); var_dump($response); } catch (Exception $e) { var_dump($e); } // Events function function callBackForEvent($event){ var_dump("in callback"); var_dump($event); } /** * To subscribe to all events, call subscribeAllEvents method * callBackForEvent is required argument * */ try { $log->debug('calling subscribeAllEvents method with "callBackForEvent" as arguement'); $callBackForEvent = 'callBackForEvent'; $XooaClient->subscribeAllEvents($callBackForEvent); } catch (Exception $e) { var_dump($e); } /** * To unsubscribe from any events, call unsubscribe method * calling unsubscribe method * no arguments are required * */ $XooaClient->unsubscribe(); echo "\n-----end-----\n"; } else { $log->debug('Validation unsuccessful. Invalid API Token.'); echo "Invalid API Token."; }
7,182
https://github.com/NowHappy/tiny_python_projects/blob/master/12_ransom/ransom.py
Github Open Source
Open Source
MIT
null
tiny_python_projects
NowHappy
Python
Code
125
473
#!/usr/bin/env python3 """ Author : NowHappy <[email protected]> Date : 2021-10-13 Purpose: Ransom Note """ import argparse import random import os # -------------------------------------------------- def get_args(): """Get command-line arguments""" parser = argparse.ArgumentParser( description='Ransom Note', formatter_class=argparse.ArgumentDefaultsHelpFormatter) parser.add_argument('text', metavar='text', help='Input text or file') parser.add_argument('-s', '--seed', help='Random seed', metavar='int', type=int, default=None) return parser.parse_args() # -------------------------------------------------- def main(): """Make a jazz noise here""" args = get_args() random.seed(args.seed) if os.path.isfile(args.text): for line in open(args.text, 'rt'): print(''.join(map(choose, line.rstrip()))) else: print(''.join(map(choose, args.text))) # -------------------------------------------------- def choose(char): """change a character""" # return char.upper() if random.choice([False, True]) else char.lower() return random.choice([char.lower(), char.upper()]) # -------------------------------------------------- def test_choose(): """test choose""" state = random.getstate() random.seed(1) assert choose('a') == 'a' assert choose('b') == 'b' assert choose('c') == 'C' assert choose('d') == 'd' random.setstate(state) # -------------------------------------------------- if __name__ == '__main__': main()
2,323
https://github.com/smileFDD/mapApi/blob/master/app/scripts/map/map.js
Github Open Source
Open Source
MIT
null
mapApi
smileFDD
JavaScript
Code
799
2,782
/** * Created by FDD on 2016/12/23. */ 'use strict'; define(['ol', 'truf', 'proj4', 'mappopup', 'util', 'echarts', 'config'], function (ol, truf, proj4, MapPopup, util, echarts, config) { var myMap = function () { }; /** * 获取参数 * @param mapDiv * @param url */ myMap.prototype.getMapParams = function (mapDiv, url) { var that = this; $.ajax({ url: url + '?f=pjson', type: 'GET', dataType: 'jsonp', jsonp: 'callback', success: function (data) { if (data) { var res = { projection: data.spatialReference.wkid, fullExtent: [data.fullExtent.xmin, data.fullExtent.ymin, data.fullExtent.xmax, data.fullExtent.ymax], origin: [data.tileInfo.origin.x, data.tileInfo.origin.y], tileSize: data.tileInfo.cols, lods: data.tileInfo.lods, tileUrl: url }; that.initMap(mapDiv, res); } else { } } }); }; /** * 初始化地图 * @param mapDiv * @param params */ myMap.prototype.initMap = function (mapDiv, params) { var options = params || {}; var that = this; /** * 投影 * @type {ol.proj.Projection} */ this.projection = ol.proj.get('EPSG:' + options.projection); /** * 显示范围 */ this.fullExtent = options.fullExtent; this.projection.setExtent(this.fullExtent); /** * 瓦片原点 */ this.origin = options.origin; /** * 瓦片大小 */ this.tileSize = options.tileSize; /** * 分辨率 * @type {Array} */ this.resolutions = []; var len = options.lods.length; for (var i = 0; i < len; i++) { this.resolutions.push(options.lods[i].resolution) } /** * 定义渲染参数 */ var size = ol.extent.getWidth(this.projection.getExtent()) / 256; /** * 渲染分辨率 * @type {Array} * @private */ this._resolutions = new Array(19); /** * 层级 * @type {Array} */ this.matrixIds = new Array(19); for (var z = 0; z < 19; ++z) { this._resolutions[z] = size / Math.pow(2, z); this.matrixIds[z] = z } var tileUrl = options.tileUrl; var tileGrid = new ol.tilegrid.TileGrid({ tileSize: that.tileSize, origin: that.origin, extent: that.fullExtent, resolutions: that.resolutions }); var urlTemplate = tileUrl + '/tile/{z}/{y}/{x}'; var tileArcGISXYZ = new ol.source.XYZ({ wrapX: false, tileGrid: tileGrid, projection: that.projection, tileUrlFunction: function (tileCoord) { var url = urlTemplate.replace('{z}', (tileCoord[0]).toString()) .replace('{x}', tileCoord[1].toString()) .replace('{y}', (-tileCoord[2] - 1).toString()); return url } }); var baseLayer = new ol.layer.Tile({ isBaseLayer: true, isCurrentBaseLayer: true, layerName: config.layerConfig.baseLayers[0].layerName, source: tileArcGISXYZ }); this.map = new ol.Map({ target: mapDiv, interactions: ol.interaction.defaults({ doubleClickZoom: true, keyboard: false }).extend([]), controls: [new ol.control.ScaleLine({ target: 'hdscalebar' })], layers: [baseLayer], view: new ol.View({ center: ol.proj.fromLonLat(config.mapConfig.center, that.projection), zoom: config.mapConfig.zoom, projection: that.projection, extent: that.fullExtent, maxResolution: that.resolutions[0], minResolution: that.resolutions[that.resolutions.length - 1] }) }) }; /** * 清空地图 */ myMap.prototype.clearMap = function () { if (this.map) { var layers = this.map.getLayers(); if (layers) { layers.forEach(function (layer) { if (layer instanceof ol.layer.Vector) { if (layer.getSource() && layer.getSource().clear) { layer.getSource().clear(); } } }, this); } } }; /** * getlayerByLayerName * @param layername * @returns {*} */ myMap.prototype.getlayerByLayerName = function (layername) { var targetLayer = null; if (this.map) { var layers = this.map.getLayers(); layers.forEach(function (layer) { var layernameTemp = layer.get("layerName"); if (layernameTemp === layername) { targetLayer = layer; } }, this); } return targetLayer; }; /** * 创建图层 * @param layerName * @param params * @returns {*} */ myMap.prototype.getTempVectorLayer = function (layerName, params) { var vectorLayer = this.getlayerByLayerName(layerName); if (!(vectorLayer instanceof ol.layer.Vector)) { vectorLayer = null; } if (!vectorLayer) { if (params && params.create) { var vectorSource = new ol.source.Vector({ wrapX: false }); vectorLayer = new ol.layer.Vector({ layerName: layerName, source: vectorSource, selectable: params["selectable"], style: new ol.style.Style({ fill: new ol.style.Fill({ color: 'rgba(67, 110, 238, 0.4)' }), stroke: new ol.style.Stroke({ color: '#4781d9', width: 2 }), image: new ol.style.Circle({ radius: 7, fill: new ol.style.Fill({ color: '#ffcc33' }) }) }) }); } } if (this.map && vectorLayer) { if (!this.getlayerByLayerName(layerName)) { this.map.addLayer(vectorLayer); } } return vectorLayer; }; /** * 添加行政区划 * @param feature * @param params * @param isclear */ myMap.prototype.addCode = function (feature, params, isclear) { if (isclear) { this.clearMap(); } if (!feature) { return; } var layer = null; if (params.layerName) { params["create"] = true; layer = this.getTempVectorLayer(params.layerName, params); } var Polygonstyle = new ol.style.Style({ stroke: new ol.style.Stroke({ color: '#4781d9', width: 2 }) }); var geometry = new ol.format.WKT().readGeometry(feature.geometry); var Polygonfeature = new ol.Feature({ geometry: geometry }); Polygonfeature.setStyle(Polygonstyle); layer.getSource().addFeature(Polygonfeature); var extent = geometry.getExtent(); this.zoomToExtent(extent, true); }; /** * 缩放到要素范围 * @param extent * @param isanimation * @param duration * @private */ myMap.prototype.zoomToExtent = function (extent, isanimation, duration) { var that = this; var view = this.map.getView(); var size = this.map.getSize(); /** * @type {ol.Coordinate} center The center of the view. */ var center = ol.extent.getCenter(extent); if (!isanimation) { view.fit(extent, size, { padding: [0, 0, 0, 0], nearest: false }); view.setCenter(center); } else { if (!duration) { duration = 1000; var start = +new Date(); var pan = ol.animation.pan({ duration: duration, source: /** @type {ol.Coordinate} */ (view.getCenter()), start: start }); var bounce = ol.animation.bounce({ duration: duration, resolution: view.getResolution(), start: start }); this.map.beforeRender(pan); view.setCenter(center); view.fit(extent, size, { padding: [0, 0, 0, 0], nearest: true }); setTimeout(function () { that.setMapView(extent,center); },500) } } }; myMap.prototype.setMapView = function (extent, center) { var that = this; var maxResolution = this.map.getView().getResolution(); var maxZoom = this.map.getView().getZoom(); var view = new ol.View({ center: ol.proj.fromLonLat(center, that.projection),//从经度/纬度坐标转换到一个不同的投影,pro:目标投射 zoom: 1,//目标缩放 projection: that.projection, extent: extent, maxResolution: maxResolution, minResolution: that.resolutions[that.resolutions.length - 1] }); that.map.setView(view); } return { HDMap:myMap }; });
51,005
https://stackoverflow.com/questions/1432704
StackExchange
Open Web
CC-By-SA
2,009
Stack Exchange
Dibyo Supra, Geneticwarrior, Rebecca, Sendil Kumar, Sertac Akyuz, Spaceben, Wim ten Brink, arun davis, https://stackoverflow.com/users/115305, https://stackoverflow.com/users/243614, https://stackoverflow.com/users/2833183, https://stackoverflow.com/users/2833184, https://stackoverflow.com/users/2833185, https://stackoverflow.com/users/2833259, https://stackoverflow.com/users/2833276, https://stackoverflow.com/users/2833504, https://stackoverflow.com/users/2834716, user2833504
English
Spoken
278
592
How do I change the width of a ScrollBar? I would like to change a TFrame's ScrollingBar width. I know I could change all ScrollingBars in the system by: SystemParametersInfo(SPI_SETNONCLIENTMETRICS,.... But how do I do it for a specific WinControl? A lot of the code within Delphi depends on the width of scrollbars to be the fixed system setting so you can't alter the width without breaking the control. (Not without rewriting the TControlScrollBar and related controls in the VCL.) You could, of course, hide the default scrollbars of the control and add your own TScrollbar components next to it.The standard TScrollBar class is a WinControl itself, where the scrollbar is taking the whole width and height of the control. The TControlScrollBar class is linked to other WinControl to manage the default scrollbars that are assigned to Windowed controls. While the raw API could make it possible to use a more flexible width, you'd always have the problem that the VCL will just assume the default system-defined width for these controls. This also shows the biggest difference between both scrollbar types: TScrollBar has it's own Windows handle while TControlScrollBar borrows it from the related control. You can try something like this: your_frame.HorzScrollBar.Size := 50; your_frame.HorzScrollBar.ButtonSize := your_frame.HorzScrollBar.Size; This might work if you use flat scrollbars and have a Comctl32.dll below version 6. See also http://msdn.microsoft.com/en-us/library/bb775438(VS.85).aspx and http://msdn.microsoft.com/en-us/library/bb787529(VS.85).aspx procedure TForm1.FormCreate(Sender: TObject); var NCMet: TNonClientMetrics; begin FillChar(NCMet, SizeOf(NCMet), 0); NCMet.cbSize:=SizeOf(NCMet); // get the current metrics SystemParametersInfo(SPI_GETNONCLIENTMETRICS, SizeOf(NCMet), @NCMet, 0); // set the new metrics NCMet.iScrollWidth:=50; SystemParametersInfo(SPI_SETNONCLIENTMETRICS, SizeOf(NCMet), @NCMet, SPIF_SENDCHANGE); end; Please read the question first ("I know I could change all ScrollingBars in the system by: SystemParametersInfo ... But ...").
41,142
https://github.com/hereblur/strokejs/blob/master/lib/Stroke.ts
Github Open Source
Open Source
MIT
null
strokejs
hereblur
TypeScript
Code
533
1,360
"use strict"; import {Point} from "./Point"; import {Boundaries} from "./Boundaries"; /** * * Class of a stroke containing multiple points * */ class Stroke { /** * Array containing points. * * @Private * */ private _points = []; private _boundaries = null; /** * Create stroke from array of points. * * @param points Array series of [x,y] pairs. * */ constructor(points: [number, number][]) { this._boundaries = new Boundaries(); this._points = points.map((pointCoord) => { let point = new Point(pointCoord); this._boundaries.include(point); return point; }); } /** * Add more point to stroke * * @param points Point to add or array of [x,y] coordinate. * */ append(point): Stroke { if ( point instanceof Point ) { let lastpoint = this._points[this._points.length - 1]; if (lastpoint && lastpoint.x === point.x && lastpoint.y === point.y) return this; this._boundaries.include(point); this._points.push(point.clone()); return this; } return this.append(new Point(point)); } /** * * Simplify a line using Ramer–Douglas–Peucker's algorithm. * https://en.wikipedia.org/wiki/Ramer–Douglas–Peucker_algorithm * * @Private * @param points Series of point to simplify * @param epsilon Threshold to keep or drop points. */ ramerDouglasPeucker(points: Point[], epsilon: number): Point[] { let max_distance = 0, middle = -1, end = points.length - 1; for ( let i = 1 ; i <= end - 1 ; i++ ) { let distance = points[ i ].distanceToLine( [points[0], points[end]] ); if ( distance > max_distance ) { middle = i; max_distance = distance; } } if ( max_distance > epsilon ) { let left = points.slice(0, middle + 1); let right = points.slice(middle); left = this.ramerDouglasPeucker( left , epsilon); right = this.ramerDouglasPeucker( right, epsilon); return left.slice(0, -1).concat(right); } return [points[0], points[end]]; } /** * Get point at position * * @param position Position of point to get * */ point(position: number): Point { return this._points[position] || null; } /** * Get all points * */ points(): Point[] { return this._points.map((p) => {return p.clone(); }); } /** * Get Point count * */ getPointCount(): number { return this._points.length; } /** * Simplify all strokes in the set * * @param threshold Threshold to drop un-needed points in pixel, default: 5px. * */ simplify(threshold: number = 5) { let unique = this._points.map((point, idx) => { if ( idx > 0 && point.x === this._points[idx - 1].x && point.y === this._points[idx - 1].y ) { return null; } return point.clone(); }) .filter((p) => { return !!p; }); if (unique.length > 1) this._points = this.ramerDouglasPeucker(unique, threshold); return this; } /** * Create a clone of this point. * */ clone(): Stroke { return new Stroke( this._points.map((p) => { return p.toArray(); }) ); } /** * return array of points * */ toArray(): [number, number][] { return this._points.map((p) => { return p.toArray(); }); } /** * Scale this stroke * * @param time Scale value */ scale(time: number) { this._points.map((p) => { p.x *= time; p.y *= time; }); this._boundaries.scale(time); return this; } /** * Move stroke by offset * * @param x Move on X-axis * @param y Move on Y-axis */ translate(x: Number, y: Number) { this._points.map((p) => { p.x += x; p.y += y; }); this._boundaries.translate(x, y); return this; } /** * Return boundaries of this stroke. */ boundaries(): Boundaries { return this._boundaries.clone(); } } export {Stroke};
35,789
https://stackoverflow.com/questions/17326746
StackExchange
Open Web
CC-By-SA
2,013
Stack Exchange
Alexander, Isuru Perera, https://stackoverflow.com/users/1456567, https://stackoverflow.com/users/1955702
English
Spoken
262
481
How to call an Oracle procedure w/ OUT parameter in WSO2ESB? versions: - WSO2 4.6.0 - Oracle 11g I Have this procedure in an Oracle DB: PROCEDURE SEARCHCONTRACT ( CONTRACTNUM IN OKC_K_HEADERS_B.CONTRACT_NUMBER%TYPE , cur_out IN OUT RefCursor) .... The procedure is working fine! Note that cur_out IN OUT RefCursor! I have no clue on how to handle that parameter in a DBLookup mediator! This mediator does not have any place to inform whether each parameter is "IN" or "OUT" and I'm not sure if setting the direction (IN/OUT) would be enough. Thanks in advance for any help! I believe you can use WSO2 Data Services Server (DSS) or your requirement. You can download WSO2 DSS from http://wso2.com/products/data-services-server/ It has support for Oracle RefCursor. You can then use the data service via WSO2 ESB. Following article might help. http://wso2.com/library/tutorials/use-oracle-ref-cursors-wso2-data-services-server does that mean I need to have DSS on my infrastructure in order to run such kind of procedure? I suggested to use DSS as it has support for Oracle RefCursor. Gonna check the article. Thank you. Great! Just a post a question if you have any question! just a thought. You could try to implement a pl/sql function that call that prodecure and return the value. This way you could get the result with the ddl SELECT MyfUCNTION(PARAM1) FROM DUAL. You could also convert the procedure into a function. Hope it helps! thank you @fipries! Although your suggestion is an alternative, my use case doesn't allow this change. FYI, we can count hundreds of procedures that uses Ref cursor in production. Thanks anyway!
42,264
https://tr.wikipedia.org/wiki/%C3%87ayk%C3%B6y%2C%20Kuluncak
Wikipedia
Open Web
CC-By-SA
2,023
Çayköy, Kuluncak
https://tr.wikipedia.org/w/index.php?title=Çayköy, Kuluncak&action=history
Turkish
Spoken
34
123
Çayköy, Malatya ilinin Kuluncak ilçesine bağlı bir mahalledir. Tarihçe Çayköy; idari bölüm olarak daha önceleri köy iken, 2012 yılındaki yasa değişikliğinden sonra mahalle olmuştur. Nüfus Kaynakça Kuluncak'ın mahalleleri Evrifaessa Bot tarafından oluşturulan mahalle maddeleri
494
https://github.com/madsterest/recipe-sharing-platform/blob/master/client/src/components/Card.js
Github Open Source
Open Source
MIT
2,021
recipe-sharing-platform
madsterest
JavaScript
Code
183
855
import React from "react"; import { WrapItem, Text, Image, LinkOverlay, LinkBox, Center, Button, Container, } from "@chakra-ui/react"; export default function Card(props) { return ( <WrapItem key={props._id} w="300px" h="500px" p="5" border="1px" borderRadius="30" borderColor="#80c0c0" bg="#99d5d5" _hover={{ border: "2px", borderColor: "#dfb3f2", textDecoration: "none", }} > <LinkBox mx="auto"> <Image src={props.img} objectFit="cover" boxSize="200px" alt="Recipe Photo" align="center" mx="auto" /> <Container height="210px"> <Center> <Text fontSize="20px" fontWeight="bold" color="#ffffff"> <LinkOverlay _hover={{ color: "#ffffff", textDecoration: "none", }} href={props._id} > {props.title} </LinkOverlay> </Text> </Center> <Center> {props.user && ( <Text color="#009797" fontSize="md" mb="3"> Created by {props.user} </Text> )} </Center> <Text color="#ffffff">Prep Time: {props.prep}</Text> <Text mb="1" color="#ffffff"> Cook Time: {props.cook} </Text> <Text color="#ffffff">{props.description}</Text> </Container> <Container align="center"> {props.onEdit && ( <Button borderRadius="15" bg="#ffffff" id={props._id} fontWeight="normal" _hover={{ bg: "#f0f8fe" }} onClick={props.onEdit} p="5" > Edit </Button> )} {props.onIndexEdit && ( <Button borderRadius="15" bg="#ffffff" fontWeight="normal" _hover={{ bg: "#f0f8fe" }} onClick={props.onIndexEdit} id={props.index} > Edit </Button> )} {props.onDelete && ( <Button borderRadius="15" bg="#ffffff" id={props._id} m="1" fontWeight="normal" _hover={{ bg: "#f0f8fe" }} onClick={props.onDelete} > Delete </Button> )} {props.favourite && ( <Center> <Button borderRadius="15" bg="#ffffff" onClick={props.favourite} id={props._id} fontWeight="normal" _hover={{ bg: "#f0f8fe" }} > Add Copy to Favourites </Button> </Center> )} </Container> </LinkBox> </WrapItem> ); }
32,914
https://ceb.wikipedia.org/wiki/Alue%20Minjeu
Wikipedia
Open Web
CC-By-SA
2,023
Alue Minjeu
https://ceb.wikipedia.org/w/index.php?title=Alue Minjeu&action=history
Cebuano
Spoken
41
72
Suba ang Alue Minjeu sa Indonesya. Nahimutang ni sa lalawigan sa Nanggroe Aceh Darussalam Province, sa kasadpang bahin sa nasod, km sa amihanan-kasadpan sa Jakarta ang ulohan sa nasod. Ang mga gi basihan niini Mga suba sa Nanggroe Aceh Darussalam Province
20,400
https://sv.wikipedia.org/wiki/Sidusa%20olivacea
Wikipedia
Open Web
CC-By-SA
2,023
Sidusa olivacea
https://sv.wikipedia.org/w/index.php?title=Sidusa olivacea&action=history
Swedish
Spoken
31
66
Sidusa olivacea är en spindelart som beskrevs av Pickard-Cambridge F. 1901. Sidusa olivacea ingår i släktet Sidusa och familjen hoppspindlar. Inga underarter finns listade i Catalogue of Life. Källor Hoppspindlar olivacea
10,999
https://github.com/WebDev12138/Manager/blob/master/src/views/register/index.vue
Github Open Source
Open Source
MIT
null
Manager
WebDev12138
Vue
Code
470
1,834
<template> <div> <el-form ref="registerForm" :model="form" :rules="rules" label-width="80px" class="register-box"> <el-button class="cancel" icon="el-icon-back" size="mini" v-on:click="onCancel"></el-button> <h3 class="register-title">注册页面</h3> <el-form-item label="用户名" prop="user_name"> <el-input type="text" placeholder="请输入用户名" v-model="form.user_name" clearable/> </el-form-item> <el-form-item label="密码" prop="password"> <el-input type="password" placeholder="请输入密码" v-model="form.password" show-password/> </el-form-item> <el-form-item label="确认密码" prop="sure"> <el-input type="password" placeholder="请确认密码" v-model="form.sure" show-password/> </el-form-item> <el-form-item label="真实姓名" prop="real_name"> <el-input type="text" placeholder="请输入真实姓名" v-model="form.real_name" clearable/> </el-form-item> <el-form-item label="手机号" prop="phone"> <el-input type="text" maxlength="11" placeholder="请输入手机号" v-model="form.phone" clearable/> </el-form-item> <el-form-item label="邮箱" prop="email"> <el-input type="email" placeholder="请输入邮箱" v-model="form.email" clearable/> </el-form-item> <el-form-item> <el-button type="primary" v-on:click="onSubmit('registerForm')">注册</el-button> <el-button type="primary" v-on:click="resetForm('registerForm')">重置</el-button> </el-form-item> </el-form> </div> </template> <script> import axios from 'axios' import { Message } from 'element-ui' export default { name: 'Register', data() { const validatePass = (rule, value, callback) => { axios.get('http://118.31.102.1:9200/managerUser/userExist?userName=' + value).then(res => { if (res.data) { callback(new Error('用户名已存在')) } else { callback() } }) } const validateSome = (rule, value, callback) => { if (value === this.form.password) { callback() } else { callback(new Error('密码不一致')) } } const checkPhone = (rule, value, callback) => { const reg = /^((13[0-9])|(14[5|7])|(15([0-3]|[5-9]))|(17[013678])|(18[0,5-9]))\d{8}$/ if (reg.test(value)) { callback() } else { return callback(new Error('请输入正确的手机号')) } } return { form: { user_name: '', password: '', sure: '', real_name: '', phone: '', email: '' }, rules: { user_name: [ { required: true, trigger: 'blur', validator: validatePass }, { required: true, message: '用户名不可为空', trigger: 'blur' }, { min: 6, max: 20, message: '长度在 6 到 20 个字符', trigger: 'blur' } ], password: [ { required: true, message: '密码不可为空', trigger: 'blur' }, { min: 6, max: 18, message: '长度在 6 到 18 个字符', trigger: 'blur' } ], sure: [ { required: true, trigger: 'blur', validator: validateSome }, { required: true, message: '请确认密码', trigger: 'blur' }, { min: 6, max: 18, message: '长度在 6 到 18 个字符', trigger: 'blur' } ], real_name: [ { required: true, message: '真实姓名不可为空', trigger: 'blur' }, { min: 2, max: 20, message: '长度在 2 到 20 个字符', trigger: 'blur' } ], phone: [ { required: true, message: '手机号不可为空', trigger: 'blur' }, { min: 11, max: 11, message: '长度必须是 11 个字符', trigger: 'blur' }, { validator: checkPhone, trigger: ['blur', 'change'] } ], email: [ { required: true, message: '邮箱不可为空', trigger: 'blur' }, { type: 'email', message: '请输入正确的邮箱地址', trigger: ['blur', 'change'] } ] } } }, methods: { onSubmit(formName) { this.$refs.registerForm.validate(valid => { if (valid) { axios.post('http://118.31.102.1:9200/managerUser/register', this.form).then(() => { this.$notify({ title: '成功', message: '注册成功', type: 'success', duration: 2000 }) this.$router.push({ path: '/login' }) }).catch((error) => { Message.error(error.response.data.message) this.$router.push({ path: '/register' }) }) } else { return false } }) }, resetForm(formName) { this.$refs[formName].resetFields() }, onCancel() { this.$router.push({ path: '/login' }) } } } </script> <style scoped> .register-box { border: 1px solid #DCDFE6; width: 350px; margin: 0 auto; margin-top: 2rem; padding: 15px 35px 15px 25px; border-radius: 5px; -webkit-border-radius: 5px; -moz-border-radius: 5px; box-shadow: 0 0 25px #909399; } .register-title { text-align: center; margin: 0 auto 40px auto; color: #303133; } .cancel { border-radius: 50%; -webkit-border-radius: 50%; -moz-border-radius: 50%; } </style>
11,182
https://github.com/robdyke/goldsmiths/blob/master/Politics and Rhetoric/9th_Feb_Populism_and_Anti-Politics.mm
Github Open Source
Open Source
CC0-1.0
null
goldsmiths
robdyke
Objective-C++
Code
1,804
10,124
<map version="0.8.0"> <!-- To view this file, download free mind mapping software FreeMind from http://freemind.sourceforge.net --> <node COLOR="#000000" CREATED="1171015399246" ID="Freemind_Link_946120798" MODIFIED="1171017722763" TEXT="Populism and Anti-Politics"> <font NAME="SansSerif" SIZE="20"/> <hook NAME="accessories/plugins/NodeNote.properties"> <text>Lecture 14 - 9th February</text> </hook> <hook NAME="accessories/plugins/AutomaticLayout.properties"/> <node COLOR="#0033ff" CREATED="1171015519859" FOLDED="true" ID="_" MODIFIED="1171017721601" POSITION="right" TEXT="Populism and Democracy"> <font NAME="SansSerif" SIZE="18"/> <node COLOR="#00b439" CREATED="1171015542454" FOLDED="true" ID="Freemind_Link_1863690967" MODIFIED="1171017721618" TEXT="style / form of politics"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171015549812" ID="Freemind_Link_1368244047" MODIFIED="1171017721629" TEXT="direct appeal to the people"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171015571303" FOLDED="true" ID="Freemind_Link_1277646805" MODIFIED="1171017721640" TEXT="far-right politics"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015583262" ID="Freemind_Link_1294308826" MODIFIED="1171017721646" TEXT="nationist"/> <node COLOR="#111111" CREATED="1171015587648" ID="Freemind_Link_1938166284" MODIFIED="1171017721651" TEXT="the people as basis for politics"/> </node> <node COLOR="#990000" CREATED="1171015603093" FOLDED="true" ID="Freemind_Link_1838351425" MODIFIED="1171017721661" TEXT="fer-left politics"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015613549" ID="Freemind_Link_491722345" MODIFIED="1171017721667" TEXT="opressed social classes"/> </node> </node> <node COLOR="#00b439" CREATED="1171015671750" FOLDED="true" ID="Freemind_Link_1895863807" MODIFIED="1171017721677" TEXT="populism is a modern democratic phenomenon"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171015683116" FOLDED="true" ID="Freemind_Link_1493058879" MODIFIED="1171017721698" TEXT="power from/by the people"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015761670" ID="Freemind_Link_1840402275" MODIFIED="1171017721704" TEXT="public as authors / authority in government"/> </node> <node COLOR="#990000" CREATED="1171015729980" FOLDED="true" ID="Freemind_Link_1621827770" MODIFIED="1171017721713" TEXT="republican slogan"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015724013" ID="Freemind_Link_935587270" MODIFIED="1171017721721" TEXT="government"/> <node COLOR="#111111" CREATED="1171015727261" ID="Freemind_Link_1023686036" MODIFIED="1171017721726" TEXT="people"/> </node> <node COLOR="#990000" CREATED="1171015776824" FOLDED="true" ID="Freemind_Link_504831588" MODIFIED="1171017721736" TEXT="modern government is not all the people"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015803576" ID="Freemind_Link_1829314764" MODIFIED="1171017721742" TEXT="representatives"/> </node> <node COLOR="#990000" CREATED="1171015816452" FOLDED="true" ID="Freemind_Link_1918773770" MODIFIED="1171017721757" TEXT="identification of people and government"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015824959" FOLDED="true" ID="Freemind_Link_606694674" MODIFIED="1171017721763" TEXT="seperation of people and government"> <node COLOR="#111111" CREATED="1171015885598" ID="Freemind_Link_308627108" MODIFIED="1171017721770" TEXT="to govern in their name"/> </node> <node COLOR="#111111" CREATED="1171015833116" FOLDED="true" ID="Freemind_Link_447527292" MODIFIED="1171017721780" TEXT="paradox of modern democracy"> <node COLOR="#111111" CREATED="1171015852849" ID="Freemind_Link_832572913" MODIFIED="1171017721785" TEXT="scale"/> </node> </node> <node COLOR="#990000" CREATED="1171015921136" FOLDED="true" ID="Freemind_Link_841095063" MODIFIED="1171017721800" TEXT="contradiction in modern democracy"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171015927305" ID="Freemind_Link_914019218" MODIFIED="1171017721810" TEXT="not all citizens can have a participatory role"/> <node COLOR="#111111" CREATED="1171015936661" FOLDED="true" ID="Freemind_Link_283597820" MODIFIED="1171017721815" TEXT="populism works from this particular idea"> <node COLOR="#111111" CREATED="1171015992422" ID="Freemind_Link_1620250117" MODIFIED="1171017721820" TEXT="desire to reclaim govt for people due to sense of distance"/> </node> <node COLOR="#111111" CREATED="1171015950957" ID="Freemind_Link_269929809" MODIFIED="1171017721824" TEXT="populism is the shadow cast by democracy"/> </node> </node> <node COLOR="#00b439" CREATED="1171016010556" FOLDED="true" ID="Freemind_Link_682896041" MODIFIED="1171017721836" TEXT="populism...."> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016027371" FOLDED="true" ID="Freemind_Link_504030372" MODIFIED="1171017721851" TEXT="anti-elitist"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016031239" FOLDED="true" ID="Freemind_Link_1442095086" MODIFIED="1171017721857" TEXT="govt is not being run by the people but against the people"> <node COLOR="#111111" CREATED="1171016143712" FOLDED="true" ID="Freemind_Link_1309606339" MODIFIED="1171017721862" TEXT="opression of THE PEOPLE by minority who have taken over government"> <node COLOR="#111111" CREATED="1171016105225" ID="Freemind_Link_1549480193" MODIFIED="1171017721869" TEXT="vested interests"/> <node COLOR="#111111" CREATED="1171016111742" ID="Freemind_Link_748412953" MODIFIED="1171017721873" TEXT="businessmen"/> <node COLOR="#111111" CREATED="1171016118540" ID="Freemind_Link_963023732" MODIFIED="1171017721878" TEXT="&apos;liberal minded elites&apos;"/> <node COLOR="#111111" CREATED="1171016125778" ID="Freemind_Link_1946128592" MODIFIED="1171017721883" TEXT="&apos;the jews&apos;"/> <node COLOR="#111111" CREATED="1171016135085" ID="Freemind_Link_1714646289" MODIFIED="1171017721893" TEXT="&apos;communists&apos;"/> </node> </node> <node COLOR="#111111" CREATED="1171016086461" FOLDED="true" ID="Freemind_Link_479495401" MODIFIED="1171017721899" TEXT="a resistant ideology"> <node COLOR="#111111" CREATED="1171016046125" ID="Freemind_Link_1213516295" MODIFIED="1171017721904" TEXT="anti-establishment"/> <node COLOR="#111111" CREATED="1171016073025" ID="Freemind_Link_664605648" MODIFIED="1171017721908" TEXT="anti-system"/> </node> </node> <node COLOR="#990000" CREATED="1171016169104" FOLDED="true" ID="Freemind_Link_727006025" MODIFIED="1171017721918" TEXT="appeal to the authority of the people"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016177971" FOLDED="true" ID="Freemind_Link_1284871354" MODIFIED="1171017721924" TEXT="people as true source of legitimacy"> <node COLOR="#111111" CREATED="1171016200253" ID="Freemind_Link_946337913" MODIFIED="1171017721930" TEXT="the common man"/> <node COLOR="#111111" CREATED="1171016204837" ID="Freemind_Link_738518912" MODIFIED="1171017721935" TEXT="ordinary, decent, hard-working folk"/> </node> <node COLOR="#111111" CREATED="1171016216567" FOLDED="true" ID="Freemind_Link_1149592650" MODIFIED="1171017721942" TEXT="highlight the extra-ordinary nature of the established elites"> <node COLOR="#111111" CREATED="1171016248437" ID="Freemind_Link_698723141" MODIFIED="1171017721947" TEXT="sectorial, small groups taking over groups"/> </node> <node COLOR="#111111" CREATED="1171016258033" FOLDED="true" ID="Freemind_Link_1379694728" MODIFIED="1171017721951" TEXT="homogenous category"> <arrowlink DESTINATION="Freemind_Link_738518912" ENDARROW="Default" ENDINCLINATION="310;0;" ID="Freemind_Arrow_Link_252692871" STARTARROW="None" STARTINCLINATION="310;0;"/> <node COLOR="#111111" CREATED="1171016273168" ID="Freemind_Link_377401857" MODIFIED="1171017721956" TEXT="sovereign and indivisable people"/> <node COLOR="#111111" CREATED="1171016288453" ID="Freemind_Link_1361593195" MODIFIED="1171017721962" TEXT="special, sacred"/> <node COLOR="#111111" CREATED="1171016299219" ID="Freemind_Link_1561447773" MODIFIED="1171017721967" TEXT="the sacred people have been &apos;contaminated&apos; by the elites"/> </node> </node> <node COLOR="#990000" CREATED="1171016339626" FOLDED="true" ID="Freemind_Link_1237519337" MODIFIED="1171017721976" TEXT="simplistic"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016343576" FOLDED="true" ID="Freemind_Link_1241892414" MODIFIED="1171017721989" TEXT="anti-thesis"> <node COLOR="#111111" CREATED="1171016348473" ID="Freemind_Link_1268872944" MODIFIED="1171017721994" TEXT="THEM and &apos;The People&apos;"/> </node> <node COLOR="#111111" CREATED="1171016361529" FOLDED="true" ID="Freemind_Link_726905803" MODIFIED="1171017721998" TEXT="assert the purity of the people against the elites"> <node COLOR="#111111" CREATED="1171016383181" ID="Freemind_Link_1445338442" MODIFIED="1171017722003" TEXT="removal of undesired elements"/> <node COLOR="#111111" CREATED="1171016391169" ID="Freemind_Link_1667949157" MODIFIED="1171017722007" TEXT="purifying"/> </node> </node> <node COLOR="#990000" CREATED="1171016409613" FOLDED="true" ID="Freemind_Link_390048913" MODIFIED="1171017722017" TEXT="rivivalist"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016421229" ID="Freemind_Link_811995912" MODIFIED="1171017722023" TEXT="not progressive, regressive"/> <node COLOR="#111111" CREATED="1171016429316" FOLDED="true" ID="Freemind_Link_792975930" MODIFIED="1171017722027" TEXT="return to a goldern age before the rot set in"> <node COLOR="#111111" CREATED="1171016445991" ID="Freemind_Link_275843843" MODIFIED="1171017722032" TEXT="age may never have existed"/> </node> </node> </node> <node COLOR="#00b439" CREATED="1171016531642" FOLDED="true" ID="Freemind_Link_462753992" MODIFIED="1171017722041" TEXT="democracy..."> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016535021" ID="Freemind_Link_338616595" MODIFIED="1171017722051" TEXT="marginalises minority groups on perifify of coalition"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171016566370" ID="Freemind_Link_202819131" MODIFIED="1171017722062" TEXT="populism makes appeals to all"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171017964323" FOLDED="true" ID="Freemind_Link_1238221" MODIFIED="1171018001649" TEXT="politics"> <arrowlink DESTINATION="Freemind_Link_1205278735" ENDARROW="Default" ENDINCLINATION="1286;0;" ID="Freemind_Arrow_Link_883293901" STARTARROW="None" STARTINCLINATION="1286;0;"/> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171017967143" ID="Freemind_Link_1096055436" MODIFIED="1171017974532" TEXT="filling empty signifiers"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017977619" ID="Freemind_Link_1942851179" MODIFIED="1171017986987" TEXT="a contest between groups"> <font NAME="SansSerif" SIZE="14"/> </node> </node> </node> <node COLOR="#0033ff" CREATED="1171015525239" FOLDED="true" ID="Freemind_Link_1927060592" MODIFIED="1171017722173" POSITION="left" TEXT="Populist rhetoric"> <font NAME="SansSerif" SIZE="18"/> <node COLOR="#00b439" CREATED="1171016633518" FOLDED="true" ID="Freemind_Link_998761273" MODIFIED="1171017722186" TEXT="tabloid newspapers"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016639656" ID="Freemind_Link_1627599018" MODIFIED="1171017722196" TEXT="direct and simplistic"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171016645244" ID="Freemind_Link_1987819913" MODIFIED="1171017722207" TEXT="ordinary person in street"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171016799772" FOLDED="true" ID="Freemind_Link_521454269" MODIFIED="1171017722217" TEXT="anti-thesis"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016580476" FOLDED="true" ID="Freemind_Link_1135947434" MODIFIED="1171017722226" TEXT="people versus elite dichotomy"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016595781" ID="Freemind_Link_601596243" MODIFIED="1171017722232" TEXT="anti-system antagonism"/> </node> </node> <node COLOR="#00b439" CREATED="1171016805160" ID="Freemind_Link_1881118267" MODIFIED="1171017722241" TEXT="pathos"> <font NAME="SansSerif" SIZE="16"/> </node> <node COLOR="#00b439" CREATED="1171016810718" FOLDED="true" ID="Freemind_Link_35647273" MODIFIED="1171017722251" TEXT="ethos of populist leader"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016816817" ID="Freemind_Link_1488903691" MODIFIED="1171017722270" TEXT="ability to speak FOR audience, not just TO it"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171016695797" FOLDED="true" ID="Freemind_Link_923993417" MODIFIED="1171017722280" TEXT="highly personalised leader cult"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016706278" ID="Freemind_Link_1620133248" MODIFIED="1171017722287" TEXT="an individual representing the people and their mood"/> <node COLOR="#111111" CREATED="1171016723738" ID="Freemind_Link_441048639" MODIFIED="1171017722292" TEXT="a contradiction perhaps between &apos;the people&apos; and leader cult"/> <node COLOR="#111111" CREATED="1171016789536" ID="Freemind_Link_1000299782" MODIFIED="1171017722297" TEXT="style / appeal"/> </node> </node> <node COLOR="#00b439" CREATED="1171017820682" FOLDED="true" ID="Freemind_Link_1846468765" MODIFIED="1171017830981" TEXT="&apos;the people&apos; and an enemy"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171017834347" ID="Freemind_Link_775923915" MODIFIED="1171017843336" TEXT="the people is an empty signifier"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017844094" ID="Freemind_Link_308787838" MODIFIED="1171017860975" TEXT="however is &apos;out&apos; of the group is the enemy"> <font NAME="SansSerif" SIZE="14"/> </node> </node> </node> <node COLOR="#0033ff" CREATED="1171015531368" FOLDED="true" ID="Freemind_Link_49432275" MODIFIED="1171017722306" POSITION="right" TEXT="Populism and Anti-politics"> <font NAME="SansSerif" SIZE="18"/> <node COLOR="#00b439" CREATED="1171018017336" FOLDED="true" ID="Freemind_Link_1230176519" MODIFIED="1171018020156" TEXT="politics..."> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171018020495" ID="Freemind_Link_284306402" MODIFIED="1171018027049" TEXT="practice of contesting and debating issues"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171018028322" FOLDED="true" ID="Freemind_Link_1856781476" MODIFIED="1171018033182" TEXT="anti-politics..."> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171018033611" ID="Freemind_Link_188643014" MODIFIED="1171018082452" TEXT="settled, unarguable, incontestable truths"> <arrowlink DESTINATION="Freemind_Link_216643161" ENDARROW="Default" ENDINCLINATION="104;0;" ID="Freemind_Arrow_Link_155755333" STARTARROW="None" STARTINCLINATION="104;0;"/> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171018052064" FOLDED="true" ID="Freemind_Link_824954400" MODIFIED="1171018055445" TEXT="&apos;the people&apos;"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171018055794" ID="Freemind_Link_216643161" MODIFIED="1171018082449" TEXT="a stable group, homogenous"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171018064870" ID="Freemind_Link_1259891475" MODIFIED="1171018074398" TEXT="who is undermining us, now that is the real issue!"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171018127279" FOLDED="true" ID="Freemind_Link_1573617539" MODIFIED="1171018129769" TEXT="populism..."> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171018130328" FOLDED="true" ID="Freemind_Link_1657485917" MODIFIED="1171018138747" TEXT="depoliticises &apos;the people&apos;"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171018164827" ID="Freemind_Link_142620856" MODIFIED="1171018171336" TEXT="treated as settled"/> </node> <node COLOR="#990000" CREATED="1171018198915" FOLDED="true" ID="Freemind_Link_295271093" MODIFIED="1171018201036" TEXT="conservative"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171018209722" ID="Freemind_Link_1283992803" MODIFIED="1171018215661" TEXT="people regarded as stable"/> </node> </node> <node COLOR="#00b439" CREATED="1171018250138" FOLDED="true" ID="Freemind_Link_707122121" MODIFIED="1171018256198" TEXT="democratic debate"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171018257376" FOLDED="true" ID="Freemind_Link_1829580434" MODIFIED="1171018266279" TEXT="centres on WHO are the people"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171018267093" ID="Freemind_Link_1766987082" MODIFIED="1171018272272" TEXT="needs, etc..."/> <node COLOR="#111111" CREATED="1171018272960" ID="Freemind_Link_1739321297" MODIFIED="1171018275781" TEXT="not settled"/> </node> <node COLOR="#990000" CREATED="1171018278329" FOLDED="true" ID="Freemind_Link_892066992" MODIFIED="1171018306631" TEXT="populism is dangerously anti-democratic"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171018310528" ID="Freemind_Link_1785724095" MODIFIED="1171018332747" TEXT="who &apos;the people&apos; are is not up for debate"> <font NAME="SansSerif" SIZE="12"/> </node> </node> </node> </node> <node COLOR="#0033ff" CREATED="1171016882625" FOLDED="true" ID="Freemind_Link_1724037440" MODIFIED="1171017722317" POSITION="left" TEXT="Laclau, E. (1935- )"> <font NAME="SansSerif" SIZE="18"/> <node COLOR="#00b439" CREATED="1171016890712" FOLDED="true" ID="Freemind_Link_332132156" MODIFIED="1171017722331" TEXT="argentine political theorist"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016901958" ID="Freemind_Link_1306970705" MODIFIED="1171017722340" TEXT="populism as form of politics/rhetoric"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171016917793" ID="Freemind_Link_1167737718" MODIFIED="1171017722353" TEXT="populism as example of ALL politics"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171017370002" FOLDED="true" ID="Freemind_Link_1205278735" MODIFIED="1171018001637" TEXT="populism a dominant form of modern politics"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171017382278" ID="Freemind_Link_1436921247" MODIFIED="1171017722381" TEXT="how to exercise hegemony"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017684937" ID="Freemind_Link_1510901175" MODIFIED="1171017722395" TEXT="politics is a struggle over language"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017691265" ID="Freemind_Link_1436015025" MODIFIED="1171017722405" TEXT="what do terms really mean"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171017409549" FOLDED="true" ID="Freemind_Link_1907016855" MODIFIED="1171017722418" TEXT="empty signifiers"> <font NAME="SansSerif" SIZE="16"/> <icon BUILTIN="idea"/> <node COLOR="#990000" CREATED="1171017418406" FOLDED="true" ID="Freemind_Link_442766317" MODIFIED="1171017722440" TEXT="&apos;the people&apos;"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171017431611" ID="Freemind_Link_638707029" MODIFIED="1171017722445" TEXT="concept has no content"/> <node COLOR="#111111" CREATED="1171017438169" ID="Freemind_Link_1092844843" MODIFIED="1171017722459" TEXT="anything can be projected into this vessel"/> <node COLOR="#111111" CREATED="1171017787903" ID="Freemind_Link_69841143" MODIFIED="1171017807428" TEXT="and those that are left outside of &apos;the people&apos;"/> </node> <node COLOR="#990000" CREATED="1171017458583" FOLDED="true" ID="Freemind_Link_1743614176" MODIFIED="1171017722470" TEXT="terms that have value becuase they are without content"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171017475435" ID="Freemind_Link_1630636987" MODIFIED="1171017722475" TEXT="gesture something all embracing"/> <node COLOR="#111111" CREATED="1171017482375" ID="Freemind_Link_680208480" MODIFIED="1171017722486" TEXT="categories of political language"/> <node COLOR="#111111" CREATED="1171017497819" ID="Freemind_Link_595409883" MODIFIED="1171017722491" TEXT="community, nation, justice,"/> </node> <node COLOR="#990000" CREATED="1171017518203" FOLDED="true" ID="Freemind_Link_927385558" MODIFIED="1171017722502" TEXT="political movements seek to fill the empty signifier"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171017551952" FOLDED="true" ID="Freemind_Link_104385743" MODIFIED="1171017722513" TEXT="racist"> <node COLOR="#111111" CREATED="1171017556811" ID="Freemind_Link_443498936" MODIFIED="1171017722518" TEXT="the people are best represented by whites"/> </node> <node COLOR="#111111" CREATED="1171017568226" FOLDED="true" ID="Freemind_Link_343500618" MODIFIED="1171017722523" TEXT="liberal multicultural"> <node COLOR="#111111" CREATED="1171017573785" ID="Freemind_Link_1260309866" MODIFIED="1171017722527" TEXT="all of us in a rainbow"/> </node> <node COLOR="#111111" CREATED="1171017586310" FOLDED="true" ID="Freemind_Link_247260162" MODIFIED="1171017722533" TEXT="leftist"> <node COLOR="#111111" CREATED="1171017591927" ID="Freemind_Link_206330146" MODIFIED="1171017722538" TEXT="the peasent rural poor"/> </node> <node COLOR="#111111" CREATED="1171017610752" ID="Freemind_Link_1066176253" MODIFIED="1171017722547" TEXT="essence of experience applies to all"/> <node COLOR="#111111" CREATED="1171017628526" ID="Freemind_Link_500803888" MODIFIED="1171017722552" TEXT="project particular expereinces as universal expereinces"/> </node> </node> </node> <node COLOR="#0033ff" CREATED="1171016929509" FOLDED="true" ID="Freemind_Link_1259772805" MODIFIED="1171017722564" POSITION="left" TEXT="Gramsci, A. (1891-1937)"> <font NAME="SansSerif" SIZE="18"/> <node COLOR="#00b439" CREATED="1171016966687" FOLDED="true" ID="Freemind_Link_605891403" MODIFIED="1171017722575" TEXT="Hegemony"> <font NAME="SansSerif" SIZE="16"/> <icon BUILTIN="idea"/> <node COLOR="#990000" CREATED="1171017035703" ID="Freemind_Link_1399285527" MODIFIED="1171017722593" TEXT="to exercise ideological domination"> <arrowlink DESTINATION="Freemind_Link_67298783" ENDARROW="Default" ENDINCLINATION="142;0;" ID="Freemind_Arrow_Link_631988585" STARTARROW="None" STARTINCLINATION="142;0;"/> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017061235" ID="Freemind_Link_684195560" MODIFIED="1171017722603" TEXT="class domination by diffusion of its own ideology"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017201159" ID="Freemind_Link_889404285" MODIFIED="1171017722620" TEXT="ideology as commonsense"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017217132" ID="Freemind_Link_507777027" MODIFIED="1171017722633" TEXT="&apos;national popular&apos; collective will"> <arrowlink DESTINATION="Freemind_Link_494331601" ENDARROW="Default" ENDINCLINATION="98;0;" ID="Freemind_Arrow_Link_799424693" STARTARROW="Default" STARTINCLINATION="98;0;"/> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017240276" ID="Freemind_Link_11399591" MODIFIED="1171017722644" TEXT="class ideology exported as commonsense to other classes"> <font NAME="SansSerif" SIZE="14"/> </node> </node> <node COLOR="#00b439" CREATED="1171016980452" FOLDED="true" ID="Freemind_Link_1365359569" MODIFIED="1171017754935" TEXT="how the capitalist class co-opts members"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171016988120" FOLDED="true" ID="Freemind_Link_826403521" MODIFIED="1171017722666" TEXT="built on consent"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171016998827" ID="Freemind_Link_747550849" MODIFIED="1171017722675" TEXT="consent in oppresion"/> </node> <node COLOR="#990000" CREATED="1171017011961" ID="Freemind_Link_67298783" MODIFIED="1171017722686" TEXT="capitalist class share own vision of world/ideology"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017079789" ID="Freemind_Link_1923539151" MODIFIED="1171017722703" TEXT="common set of capitalist values"> <arrowlink DESTINATION="Freemind_Link_494331601" ENDARROW="Default" ENDINCLINATION="56;0;" ID="Freemind_Arrow_Link_317207890" STARTARROW="None" STARTINCLINATION="56;0;"/> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017088945" FOLDED="true" ID="Freemind_Link_494331601" MODIFIED="1171017722715" TEXT="&apos;national popular&apos; collective will"> <font NAME="SansSerif" SIZE="14"/> <node COLOR="#111111" CREATED="1171017174297" ID="Freemind_Link_1193538916" MODIFIED="1171017722720" TEXT="selfevident unspoken social consensus"/> <node COLOR="#111111" CREATED="1171017191851" ID="Freemind_Link_1432148517" MODIFIED="1171017722724" TEXT="consent"/> </node> </node> <node COLOR="#00b439" CREATED="1171017312431" FOLDED="true" ID="Freemind_Link_1754143236" MODIFIED="1171017722733" TEXT="marxist arguement"> <font NAME="SansSerif" SIZE="16"/> <node COLOR="#990000" CREATED="1171017318170" ID="Freemind_Link_253264658" MODIFIED="1171017722745" TEXT="consensus on econopmic system"> <font NAME="SansSerif" SIZE="14"/> </node> <node COLOR="#990000" CREATED="1171017328376" ID="Freemind_Link_865793202" MODIFIED="1171017722755" TEXT="national consensus based on an exported class ideology"> <font NAME="SansSerif" SIZE="14"/> </node> </node> </node> </node> </map>
48,432
https://github.com/otronarp/ModelicaStandardLibrary/blob/master/Modelica/Electrical/Analog/Examples/Utilities/package.mo
Github Open Source
Open Source
BSD-3-Clause
null
ModelicaStandardLibrary
otronarp
Modelica
Code
86
321
within Modelica.Electrical.Analog.Examples; package Utilities "Utility components used by package Examples" extends Modelica.Icons.UtilitiesPackage; annotation ( Documentation(info="<html> <p>This package contains some utility components used by package examples. These components are auxiliary components that should not be used like true MLS components since they are designed the purpose of the examples only, not for common use.</p> </html>", revisions="<html> <dl> <dt> <strong>Main Authors:</strong> </dt> <dd> Christoph Clau&szlig; &lt;<a href=\"mailto:[email protected]\">[email protected]</a>&gt;<br> Andr&eacute; Schneider &lt;<a href=\"mailto:[email protected]\">[email protected]</a>&gt;<br> Fraunhofer Institute for Integrated Circuits<br> Design Automation Department<br> Zeunerstra&szlig;e 38<br> D-01069 Dresden </dd> </dl> </html>")); end Utilities;
40,936
https://github.com/sme23/MekkahRestrictedHackComp1/blob/master/Engine Hacks/MSS/asm/mss_page1_original.s
Github Open Source
Open Source
CC0-1.0
2,020
MekkahRestrictedHackComp1
sme23
GAS
Code
181
656
.thumb @draws the stat screen .include "mss_defs.s" page_start @draw str or mag mov r0, r8 blh MagCheck @r0 = 1 if mag should show cmp r0,#0x0 beq NotMag @draw Mag at 13, 3. colour defaults to yellow. draw_textID_at 13, 3, textid=0x4ff draw_str_bar_at 16, 3 b MagStrDone NotMag: @draw Str at 13, 3 draw_textID_at 13, 3, textid=0x4fe draw_str_bar_at 16, 3 MagStrDone: @Draw skl draw_textID_at 13, 5, textid=0x4EC @draw spd draw_textID_at 13, 7, textid=0x4ED rescue_check @r0 = 10 if true, 0 if false cmp r0, #0 beq NoRescue @halved if Rescue draw_skl_reduced_bar_at 16, 5 draw_spd_reduced_bar_at 16, 7 b RescueCheckEnd .ltorg NoRescue: draw_skl_bar_at 16, 5 draw_spd_bar_at 16, 7 RescueCheckEnd: draw_textID_at 13, 9, textid=0x4ee @luck draw_luck_bar_at 16, 9 draw_textID_at 13, 11, textid=0x4ef @def draw_def_bar_at 16, 11 draw_textID_at 13, 13, textid=0x4f0 @res draw_res_bar_at 16, 13 draw_textID_at 21, 3, textid=0x4f6 @move draw_move_bar_at 24, 3 draw_textID_at 21, 5, textid=0x4f7 @con draw_con_bar_at 24, 5 draw_textID_at 21, 7, textid=0x4f8 @aid draw_number_at 25, 7, 0x80189B8, 1 @aid getter draw_aid_icon_at 26, 7 draw_trv_text_at 21, 9 draw_textID_at 21, 11, textid=0x4f1 @affin draw_status_text_at 21, 13 draw_affinity_icon_at 24, 11 @draw_talk_text_at 21, 15 blh DrawBWLNumbers page_end
48,237
https://github.com/JamiePed/almops/blob/master/src/AzureDevOpsComponent.Infrastructure.RestApi/Repositories/ProjectRepository.cs
Github Open Source
Open Source
Apache-2.0
2,020
almops
JamiePed
C#
Code
73
342
using System.Collections.Generic; using System.Net.Http; using System.Threading.Tasks; using AlmOps.AzureDevOpsComponent.Domain.Models; using AlmOps.AzureDevOpsComponent.Domain.Repositories; using AlmOps.AzureDevOpsComponent.Infrastructure.RestApi.Dto; using AutoMapper; using Microsoft.Extensions.Logging; namespace AlmOps.AzureDevOpsComponent.Infrastructure.RestApi.Repositories { /// <summary> /// Project repository. /// </summary> /// <remarks>https://docs.microsoft.com/en-us/rest/api/azure/devops/core/projects</remarks> public class ProjectRepository : RepositoryBase, IProjectRepository { public ProjectRepository( IAzureDevOpsRestApiConfiguration configuration, ILogger<ProjectRepository> logger, IHttpClientFactory httpClientFactory, IMapper mapper) : base(configuration, logger, httpClientFactory, mapper) { } protected override string ResourceName => "_apis/projects"; public async Task<List<ProjectModel>> FindAllAsync() { var resultList = await GetAsync<ResultListDto<ProjectDto>>(GenerateUrl()); return Mapper.Map<List<ProjectModel>>(resultList.Value); } } }
31,680
https://github.com/neha-b2001/wildfly-core/blob/master/cli/src/main/java/org/jboss/as/cli/impl/aesh/cmd/security/auth/ManagementReorderSASLCommand.java
Github Open Source
Open Source
Apache-2.0
2,022
wildfly-core
neha-b2001
Java
Code
165
518
/* Copyright 2018 Red Hat, Inc. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package org.jboss.as.cli.impl.aesh.cmd.security.auth; import java.io.IOException; import org.aesh.command.CommandDefinition; import org.aesh.command.option.Option; import org.jboss.as.cli.CommandContext; import static org.jboss.as.cli.impl.aesh.cmd.security.SecurityCommand.OPT_MANAGEMENT_INTERFACE; import org.jboss.as.cli.impl.aesh.cmd.security.SecurityCommand.OptionCompleters; import org.jboss.as.cli.impl.aesh.cmd.security.SecurityCommandActivator; import org.jboss.as.cli.impl.aesh.cmd.security.model.ManagementInterfaces; import org.jboss.as.cli.operation.OperationFormatException; /** * Reorder sasl mechanisms of a sasl factory attached to a management interface. * * @author [email protected] */ @CommandDefinition(name = "reorder-sasl-management", description = "", activator = SecurityCommandActivator.class) public class ManagementReorderSASLCommand extends AbstractReorderSASLCommand { @Option(name = OPT_MANAGEMENT_INTERFACE, hasValue = true, completer = OptionCompleters.ManagementInterfaceCompleter.class) String managementInterface; @Override public String getSASLFactoryName(CommandContext ctx) throws IOException, OperationFormatException { return ManagementInterfaces.getManagementInterfaceSaslFactoryName(managementInterface, ctx); } }
32,537
https://is.wikipedia.org/wiki/David%20Sedley
Wikipedia
Open Web
CC-By-SA
2,023
David Sedley
https://is.wikipedia.org/w/index.php?title=David Sedley&action=history
Icelandic
Spoken
196
519
David Neil Sedley (fæddur 30. maí 1947) er breskur fornfræðingur og heimspekisagnfræðingur. Hann er Laurence-prófessor í fornaldarheimspeki við Cambridge-háskóla. Sedley nam við Trinity College í Oxford þaðan sem hann brautskráðist árið 1969. Honum var veitt doktorsgráða árið 1974 af University College London. Doktorsverkefni hans var ritstýrður texti, þýðing og skýringar við 28. bók Um náttúruna eftir Epikúros. Frá 1976 hefur Sedley verið félagi á Christ's College í Cambridge og frá 1996 prófessor í fornaldarheimspeki. Í júlí árið 2000 tók hann við stöðu Laurence-prófessors í fornaldarheimspeki af Giselu Striker. Sedley hefur verið gistiprófessor við Princeton-háskóla (1981 - 1982), Kaliforníuháskóla í Berkeley (1984 og 2004), Yale-háskóla (1990) og Cornell-háskóla (2001). Hann var gerður að félaga í Bresku akademíunni í júlí 1994. Helstu rit Bækur Lucretius and the Transformation of Greek Wisdom (1987) Plato's Cratylus (2003) The Widwife of Platonism. Text and Subtext in Plato's Theaetetus (2004) Creationism and its Critics in Antiquity (2007) Ritstjórn The Hellenistic Philosophers (ásamt A.A. Long) (1987) The Cambridge Companion to Greek and Roman Philosophy (2003) Pyrrhonists, Patricians, Platonizers. Hellenistic Philosophy in the Period 155-86 BC (ásamt A.M. Ioppolo) (2007) Heimildir Heimasíða Davids Sedley Cambridge University Faculty of Classics - Biographies Breskir fornfræðingar Heimspekisagnfræðingar
47,013
https://uz.wikipedia.org/wiki/Grim
Wikipedia
Open Web
CC-By-SA
2,023
Grim
https://uz.wikipedia.org/w/index.php?title=Grim&action=history
Uzbek
Spoken
353
1,155
Grim (frans. grime, ital. grumo — ajinli) — 1) aktyorlik sanʼatida qiyofa (asosan yuz)ni ijro etiladigan rolga moslab (maxsus boʻyoq bilan boʻyab, sunʼiy soch-soqol yopishtirib, sochni rolga moslab tarash va sh.k.) oʻzgartirish sanʼati. Obraz yaratishda muhim vositalardan biri. Pyesa yoki ssenariyning badiiy xususiyatlari, bezaklari, qahramonning feʼl-atvori, aktyor va rej.ning ijodiy maqsadiga qarab qar xil boʻladi. Teatr da G. tarixi qad. xalq sayillari va oʻyinlariga borib taqaladi. Xitoy, Hindiston, Yaponiya va b. Sharq, mamlakatlarida ham G.dan foydalanilgan. Aktyor yuziga chizilgan rasmlar koʻrinish jihatidan niqobga yaqin boʻlib, baʼzan uning oʻrnini bosgan. Lekin G. niqobga nisbatan harakterliroq boʻlgani sababli aktyorlar faqat G.dan foydalanganlar. 18 — 19-asrlarda koʻpgina rus aktyorlari G.ga obraz yaratishda milliy va tarixiy harakteristika vositasi deb qarashgan. K. Stanislavskiy ham G.ni qahramon psixologiyasini ochishga yordam beruvchi eng zarur vosita deb bilgan. G. rejissyor gʻoyasini amalga oshirishda eng muhim tarkibiy qismlardan boʻlgani sababli teatr rejissyori va rassomning eng yaqin yordamchisi boʻlib G.chi-rassom vazifasi yuzaga keldi. Kinoda G. oʻziga xos xususiyatga ega. G. operator texnikasi talabiga (plyonkaning rang yoki yorugʻlikka taʼsirchanligiga qarab) mos boʻlishi lozim. G. qilishda salgina soxtalik, sunʼiylikka yoʻl qoʻyilishi filmga nuqson boʻlib tushadi. G. qilish murakkab jarayon boʻlib, u ssenariychi, rejissyor fikri va operator ishi bilan bogʻliq. G.chi-rassom suratga olish jarayoni va kinotexnika imkoniyatlarini bilishi lozim. Agar aktyorning yuzi katta oʻzgarishlarni talab qilsa, u holda plastik G. yopishtiriladi, yengil, yumshok, rezina qoʻllaniladi. Plastik G. egiluvchan, elastik boʻlib, u kishi yuziga juda qulay joylashadi. Bu uslubni birinchi marta 1930 yilda sankt-peterburglik rassom R. Raugul qoʻllagan. Rangli filmlarning takomillashib borishi G.chi-rassomlar oldiga yangi vazifalar qoʻymoqda, ular G.ni kiyimning oʻziga xos xususiyatlari bilan uygʻunlashtirishga harakat qilib, G.dan foydalanish usullarini muntazam oʻzgartirib bormoqdalar. Sirkda masharabozlarning chiqishlarida va harakterli rollari bor yirik tomoshalarda qoʻllaniladi. Sirk yuzaga kelgan davrdan boshlab masharabozlar yuzlariga oq narsalar surib tomosha koʻrsatishgan. 19-asr oxiri 20-asr boshlarida G. masharabozlikda muhim omillardan biriga aylandi. Zamonaviy sirkda hayotiy G. koʻproq qoʻllanilmoqda. Oʻzbek xalq masharaboz va qiziqchilari — Yusufjon qiziq Shakarjonov, Aka Buxor, Akrom Yusupov kabilar oʻz ijodlarida G.dan koʻp foydalanishgan. 2) G. uchun zarur boʻlgan boʻyoq va buyumlar. G. boʻyoqlari maxsus resept asosida tayyorlanib, turli xil ranglar bilan aralashtiriladi. Mohina Ashirova. Adabiyotlar OʻzME. Birinchi jild. Toshkent, 2000-yil
39,060
8681729_1
Court Listener
Open Government
Public Domain
null
None
None
Unknown
Unknown
79
109
Edwards, Senior Circuit Judge, concurring: The record in this case can be read either to find (1) that the summons had been resolved, in which case the District Court lacked jurisdiction to revoke Holman’s supervised release, or (2) that any outstanding summons was not resolved in a reasonable time because the District Court abused its discretion in allowing sixteen or more months to elapse before resolving Holman’s violations. In either case, the sentence must be vacated. I therefore concur.
23,291
https://github.com/npocmaka/Windows-Server-2003/blob/master/net/tcpip/services/telnet/server/tlntsess/iohandlr.cpp
Github Open Source
Open Source
Unlicense
2,021
Windows-Server-2003
npocmaka
C++
Code
5,000
17,305
// Created: Feb '98 // Author : a-rakeba // History: // Copyright (C) 1998 Microsoft Corporation // All rights reserved. // Microsoft Confidential extern "C" { #include <nt.h> #include <ntrtl.h> #include <nturtl.h> } #include <CmnHdr.h> #include <Windows.h> #include <NtLsApi.h> #include <LmAccess.h> #include <LmApiBuf.h> #include <LmErr.h> #include <Lm.h> #include <OleAuto.h> #include <IpTypes.h> #ifdef WHISTLER_BUILD #include "ntverp.h" #else #include <SolarVer.h> #include <PiracyCheck.h> #endif //WHISTLER_BUILD #include <Debug.h> #include <MsgFile.h> #include <TelnetD.h> #include <TlntUtils.h> #include <IoHandlr.h> #include <Session.h> #include <killapps.h> #pragma warning( disable: 4706 ) #define ONE_KB 1024 using namespace _Utils; using CDebugLevel::TRACE_DEBUGGING; using CDebugLevel::TRACE_HANDLE; using CDebugLevel::TRACE_SOCKET; extern COORD g_coCurPosOnClient; extern TCHAR g_szHeaderFormat[]; extern HANDLE g_hSyncCloseHandle; DWORD g_dwPreSessionStateTimeOut = PRE_SESSION_STATE_TIMEOUT; BOOLEAN IsTheAccount( LPWSTR pszAccount, ULONG rid ) { SID_NAME_USE sidAccountType; PSID sid = NULL; LPWSTR pszDomain = NULL; DWORD dwSidSize = 0, dwDomainSize = 0; BOOLEAN fSuccess = FALSE; if (!LookupAccountNameW( NULL, // Default to local machine pszAccount, NULL, &dwSidSize, NULL, & dwDomainSize, & sidAccountType )) { if ( GetLastError() != ERROR_INSUFFICIENT_BUFFER ) goto AbortIsTheAccount; } else { // No idea how this can succeed, something fishy goto AbortIsTheAccount; } sid = (PSID) GlobalAlloc(GPTR, dwSidSize); if (sid) { pszDomain = (WCHAR *) GlobalAlloc(GPTR, dwDomainSize * sizeof(WCHAR)); if (pszDomain) { if (LookupAccountNameW( NULL, // Default to local machine pszAccount, sid, &dwSidSize, pszDomain, & dwDomainSize, & sidAccountType )) { PULONG last_sub_authority; last_sub_authority = RtlSubAuthoritySid(sid, ((*RtlSubAuthorityCountSid(sid)) - 1)); if (*last_sub_authority == rid) { fSuccess = TRUE; } } GlobalFree(pszDomain); } GlobalFree(sid); } AbortIsTheAccount: return fSuccess; } CIoHandler::CIoHandler() { m_sSocket = INVALID_SOCKET; m_hWritePipe = INVALID_HANDLE_VALUE; m_hReadPipe = INVALID_HANDLE_VALUE; m_pucReadBuffer = m_ReadFromPipeBuffer; m_pReadFromSocketBufferCursor = m_ReadFromSocketBuffer; m_hCredential.dwLower = m_hCredential.dwUpper = 0 ; InitializeOverlappedStruct( &( m_oReadFromSocket ) ); InitializeOverlappedStruct( &( m_oWriteToSocket ) ); InitializeOverlappedStruct( &( m_oWriteToPipe ) ); InitializeOverlappedStruct( &( m_oReadFromPipe ) ); m_fFirstReadFromPipe = true; m_fShutDownAfterIO = false; m_dwWriteToSocketIoLength = 0; m_dwReadFromPipeIoLength = 0; m_dwRequestedSize = IPC_HEADER_SIZE; m_bIpcHeader = true; m_fLogonUserResult = 0; m_bNTLMAuthenticated = false; fDoNTLMAuthFirstTime = true; m_pspi = NULL; m_iResult = 0; m_bOnlyOnce = true; m_bWaitForEnvOptionOver = false; m_bInvalidAccount = false; } CIoHandler::~CIoHandler() { /*++ Close Handles only if they are not already closed. --*/ TELNET_CLOSE_HANDLE( m_oReadFromSocket.hEvent ); TELNET_CLOSE_HANDLE( m_oWriteToSocket.hEvent ); TELNET_CLOSE_HANDLE( m_oWriteToPipe.hEvent ); TELNET_CLOSE_HANDLE( m_oReadFromPipe.hEvent ); TELNET_CLOSE_HANDLE( m_hWritePipe ); TELNET_CLOSE_HANDLE( m_hReadPipe ); _TRACE( TRACE_DEBUGGING, " ~CIoHandler -- closesocket : %d ", (DWORD)m_sSocket); if(m_sSocket != INVALID_SOCKET) { closesocket( m_sSocket ); m_sSocket = INVALID_SOCKET; } _chVERIFY2( !WSACleanup() ); } void CIoHandler::Shutdown() { _TRACE(TRACE_DEBUGGING, "closing down the session...sending SESSION_EXIT to server"); WriteToServer( SESSION_EXIT, 0, NULL ); //Cancel anyIO pending on handles CancelIo( m_hReadPipe ); shutdown( m_sSocket, SD_BOTH ); if ( m_bNTLMAuthenticated ) { DeleteSecurityContext( &m_hContext ); } if ( m_pSession->m_dwNTLMSetting != NO_NTLM ) { if( m_hCredential.dwLower != 0 || m_hCredential.dwUpper != 0 ) FreeCredentialsHandle(&m_hCredential); if( m_pspi != NULL ) FreeContextBuffer( m_pspi ); } } bool CIoHandler::Init ( CSession *pSession ) { _chASSERT( pSession ); if( !pSession ) { return( FALSE ); } m_pSession = pSession ; m_hReadPipe = GetStdHandle( STD_INPUT_HANDLE ); m_hWritePipe = GetStdHandle( STD_OUTPUT_HANDLE ); if( m_hReadPipe == INVALID_HANDLE_VALUE || m_hWritePipe == INVALID_HANDLE_VALUE) { return( FALSE ); } //The following handles are not to be inherited _chVERIFY2( SetHandleInformation( m_hReadPipe, HANDLE_FLAG_INHERIT, 0) ); _chVERIFY2( SetHandleInformation( m_hWritePipe, HANDLE_FLAG_INHERIT, 0) ); WSADATA WSAData; WORD wVersionReqd = MAKEWORD( 2, 0 ); DWORD dwStatus = WSAStartup( wVersionReqd, &WSAData ); if( dwStatus ) { DecodeSocketStartupErrorCodes( dwStatus ); //It does tracing and logging return( FALSE ); } return( TRUE ); } bool CIoHandler::WriteToSocket( PUCHAR lpszBuffer, DWORD dwBufSize ) { DWORD dwNumBytesWritten = 0; DWORD dwMaxNumBytesToCopy = 0; if (( (m_dwWriteToSocketIoLength + dwBufSize) >= MAX_WRITE_SOCKET_BUFFER ) || //Block until Previous Io is finished ( !FinishIncompleteIo( ( HANDLE ) m_sSocket, &m_oWriteToSocket, &dwNumBytesWritten ) )) { return( FALSE ); } dwMaxNumBytesToCopy = min(dwBufSize,(MAX_WRITE_SOCKET_BUFFER - m_dwWriteToSocketIoLength - 1 )); memcpy(m_WriteToSocketBuff + m_dwWriteToSocketIoLength, lpszBuffer, dwMaxNumBytesToCopy); m_dwWriteToSocketIoLength += dwMaxNumBytesToCopy; return( TRUE ); } //Ignore some keys during authentication. bool CIoHandler::RemoveArrowKeysFromBuffer( PDWORD pdwLength,PDWORD pdwOffset) { bool bRetVal = false; DWORD dwLength = *pdwLength; DWORD dwIndex = (DWORD)(m_pReadFromSocketBufferCursor - m_ReadFromSocketBuffer); DWORD dwCounter = 0; DWORD dwInputSequneceState = IP_INIT; for(dwCounter = 0; dwCounter < dwLength; dwCounter++,dwIndex++) { switch( dwInputSequneceState ) { case IP_INIT: if (m_ReadFromSocketBuffer[dwIndex] == ESC) { dwInputSequneceState = IP_ESC_RCVD; } break; case IP_ESC_RCVD: if( m_ReadFromSocketBuffer[dwIndex] == '[' ) { dwInputSequneceState = IP_ESC_BRACKET_RCVD; } else { dwInputSequneceState = IP_INIT; } break; case IP_ESC_BRACKET_RCVD: switch( m_ReadFromSocketBuffer[dwIndex] ) { case 'A': case 'B': case 'C': case 'D': /*++ You got an escape sequence for arrow keys. Ignore them. Manipulate the buffer length, Position of cursor in the buffer, and Offset in the buffer accordingly. --*/ if( (dwLength - (*pdwOffset) - (dwCounter+1) ) > 0)//safety check - don't copy if number of bytes to be copied = 0 { memcpy( m_pReadFromSocketBufferCursor+dwCounter-2, m_pReadFromSocketBufferCursor + dwCounter + 1, dwLength - (*pdwOffset) - (dwCounter+1) ); } *pdwLength -= SIZEOF_ARROWKEY_SEQ;//manipulate bufferlength bRetVal = true; break; default: break; } dwInputSequneceState = IP_INIT; break; default: break; } } return bRetVal; } CIoHandler::IO_OPERATIONS CIoHandler::ProcessCommandLine ( PDWORD pdwInputLength, PDWORD pdwOffset, IO_OPERATIONS ioOpsToPerform ) { RemoveArrowKeysFromBuffer( pdwInputLength,pdwOffset); for( *pdwOffset; *pdwOffset < *pdwInputLength; ( *pdwOffset )++ ) { switch( *m_pReadFromSocketBufferCursor ) { case ASCII_DELETE: case ASCII_BACKSPACE: // Test if we are at position zero //second condition (m_pReadFromSocketBufferCursor > m_ReadFromSocketBuffer) // is guard for excessive ( continuous backspace ) if( *pdwOffset && (m_pReadFromSocketBufferCursor > m_ReadFromSocketBuffer) ) { /*++ MSRC 678 : Telnet Server Crash/BO with >4300 characters and a backspace Fix : If a backspace is pressed, we want to write only valid characters starting from the current offset till the end of valid data in the m_ReadFromSocketBuffer. --*/ memcpy( m_pReadFromSocketBufferCursor - 1, m_pReadFromSocketBufferCursor + 1, ((*pdwInputLength)-(*pdwOffset) - 1) ); m_pReadFromSocketBufferCursor--; ( *pdwInputLength ) -= 2; (*pdwOffset)--; UCHAR szTmp[3]; szTmp[0] = ASCII_BACKSPACE; szTmp[1] = ASCII_SPACE; szTmp[2] = ASCII_BACKSPACE; WriteToSocket( szTmp, 3 ); ioOpsToPerform |= WRITE_TO_SOCKET; } else { memcpy( m_pReadFromSocketBufferCursor, m_pReadFromSocketBufferCursor + 1, ( *pdwInputLength ) - 1 ); ( *pdwInputLength )--; } break; case ASCII_CARRIAGE: if( *pdwOffset < *pdwInputLength ) if((*(m_pReadFromSocketBufferCursor + 1 ) == ASCII_LINEFEED) || ( *( m_pReadFromSocketBufferCursor + 1 ) == NULL ) ) return ( ioOpsToPerform |= LOGON_COMMAND ); m_pReadFromSocketBufferCursor++; break; case NULL: case ASCII_LINEFEED: if( *pdwOffset ) if( *( m_pReadFromSocketBufferCursor - 1 ) == ASCII_CARRIAGE ) return ( ioOpsToPerform |= LOGON_COMMAND ); m_pReadFromSocketBufferCursor++; break; default: if( m_pSession->CRFCProtocol::m_fPasswordConcealMode ) { // This results in more than one * being output for things like up-arrow, so don't do it //UCHAR szTmp[1]; //szTmp[0] = '*'; //WriteToSocket( szTmp, 1 ); } else { UCHAR szTmp[1]; szTmp[0] = *m_pReadFromSocketBufferCursor; WriteToSocket( szTmp, 1 ); } ioOpsToPerform |= WRITE_TO_SOCKET; m_pReadFromSocketBufferCursor++; break; } } return ( ioOpsToPerform ); } CIoHandler::IO_OPERATIONS CIoHandler::ProcessAuthenticationLine ( PDWORD pdwInputLength, PDWORD pdwOffset, IO_OPERATIONS ioOpsToPerform ) { CHAR szMessageBuffer[ONE_KB + 1]; DWORD dwMessageLength; PUCHAR pEndLine; DWORD dwLineLength = 0; CHAR szTmp[ONE_KB]; LPVOID lpMsgBuf = NULL; LPVOID lpTemp = NULL; // Initialize Variables szMessageBuffer[0] = 0; if( !m_pSession->CRFCProtocol::m_bIsUserNameProvided ) { pEndLine = (PUCHAR) memchr( m_ReadFromSocketBuffer, '\r', *pdwInputLength); if( !pEndLine ) return ( ioOpsToPerform ); ( *pEndLine ) = 0; dwLineLength = (DWORD)(pEndLine - m_ReadFromSocketBuffer + 2); } switch( m_SocketControlState ) { case STATE_AUTH_NAME: if( !m_pSession->CRFCProtocol::m_bIsUserNameProvided ) { strncpy( m_pSession->CSession::m_pszUserName, ( PCHAR ) m_ReadFromSocketBuffer, (dwLineLength > MAX_PATH) ? MAX_PATH : dwLineLength ); m_pSession->CSession::m_pszUserName[MAX_PATH] = '\0'; } else { //Use the -l user name only once. m_pSession->CRFCProtocol::m_bIsUserNameProvided = false; } m_bInvalidAccount = false; switch(ParseAndValidateAccount()) { case PVA_INVALIDACCOUNT: m_bInvalidAccount = true; // Fall through to take the password, no break ... case PVA_SUCCESS: g_coCurPosOnClient.Y++; //Hack. needed for keeping track of rows for VTNT and stream lstrcpyA( szMessageBuffer, PASS_REQUEST ); m_pSession->CRFCProtocol::m_fPasswordConcealMode = true; m_SocketControlState = STATE_AUTH_PASSWORD; break; case PVA_NODATA: g_coCurPosOnClient.Y++; //Hack. needed for keeping track of rows for VTNT and stream lstrcatA( szMessageBuffer, LOGIN_REQUEST ); break; case PVA_BADFORMAT: g_coCurPosOnClient.Y += 3; //Hack. needed for keeping track of rows for VTNT and stream lstrcatA( szMessageBuffer, BAD_USERNAME_STR ); lstrcatA( szMessageBuffer, LOGIN_REQUEST ); break; case PVA_GUEST: g_coCurPosOnClient.Y += 3; //Hack. needed for keeping track of rows for VTNT and stream lstrcatA( szMessageBuffer, NO_GUEST_STR ); lstrcatA( szMessageBuffer, LOGIN_REQUEST ); break; default: // PVA_OTHERERROR as of now and any other unless a handler is added above ... goto AbortProcessAuthenticationLine; } break; case STATE_AUTH_PASSWORD: strncpy( m_pSession->CSession::m_pszPassword, ( PCHAR ) m_ReadFromSocketBuffer, (dwLineLength > MAX_PATH) ? MAX_PATH : dwLineLength ); BOOL fResult; fResult = m_bInvalidAccount ? false : AuthenticateUser(); if(fResult) { // Authentication was success so we proceed to license // verification m_SocketControlState = STATE_CHECK_LICENSE; } else { DWORD dwError = GetLastError(); int iRet = 0; if( dwError == ERROR_FILENAME_EXCED_RANGE || m_bInvalidAccount) { dwError = ERROR_LOGON_FAILURE; } // // If not Japanese codepage (932) then use LANG_NEUTRAL to retrieve // system error message in host language. For Japanese, the // error must be in English because they have different codesets // and encodings and we cannot know what codeset the client is // running. // if( GetACP() != 932 ) { FormatMessageA( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwError, MAKELANGID( LANG_NEUTRAL, SUBLANG_DEFAULT ), ( LPSTR ) &lpTemp, 0, NULL ); if(!lpTemp) { goto Error; } lpMsgBuf = (LPSTR) LocalAlloc(LPTR,strlen((LPSTR)lpTemp)+1); if(!lpMsgBuf) { goto Error; } if(!CharToOemA((LPCSTR)lpTemp,(LPSTR)lpMsgBuf)) { goto Error; } } else { FormatMessageA( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwError, MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US ), (LPSTR)&lpMsgBuf, 0, NULL ); } if( !lpMsgBuf ) { goto Error; } if (_snprintf( szMessageBuffer, ONE_KB, "\r\n%s", lpMsgBuf ) < 0) { szMessageBuffer[ONE_KB] = '\0'; } m_pSession->CRFCProtocol::m_fPasswordConcealMode = false; if( ( ++( m_pSession->CSession::m_wNumFailedLogins ) ) < m_pSession->m_dwMaxFailedLogins ) { g_coCurPosOnClient.Y += 5; //Hack. needed for keeping track of rows for VTNT nd stream if (_snprintf( szMessageBuffer + strlen( szMessageBuffer ), ONE_KB - strlen(szMessageBuffer), "%s%s", LOGIN_FAIL, LOGIN_REQUEST ) < 0) { szMessageBuffer[ONE_KB] = '\0'; } m_SocketControlState = STATE_AUTH_NAME; } else { if (_snprintf( szMessageBuffer + strlen( szMessageBuffer ), ONE_KB - strlen(szMessageBuffer), "%s%s", LOGIN_FAIL, TERMINATE ) < 0) { szMessageBuffer[ONE_KB] = '\0'; } m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; } } #ifdef LOGGING_ENABLED if( !fResult ) { m_pSession->LogIfOpted( FAIL, LOGON ); } #endif Error: if(lpMsgBuf) { LocalFree( lpMsgBuf ); lpMsgBuf = NULL; } if(lpTemp) { LocalFree(lpTemp); lpTemp = NULL; } break; default: strncpy( szMessageBuffer, "\r\n", (ONE_KB -1)); // NO BO attack here - Baskar break; } // // Remove Line From Read Socket buffer if there is more IO // if( dwLineLength < *pdwInputLength ) { ( *pdwInputLength ) -= dwLineLength; memcpy( m_ReadFromSocketBuffer, m_ReadFromSocketBuffer + dwLineLength, ( *pdwInputLength ) ); ioOpsToPerform |= LOGON_DATA_UNFINISHED; } ( *pdwOffset ) = 0; m_pReadFromSocketBufferCursor = m_ReadFromSocketBuffer; // // Send notification string; if required // dwMessageLength = strlen( szMessageBuffer ); WriteToSocket( (PUCHAR)szMessageBuffer, dwMessageLength); ioOpsToPerform |= WRITE_TO_SOCKET; AbortProcessAuthenticationLine: if(lpMsgBuf) { LocalFree( lpMsgBuf ); lpMsgBuf = NULL; } if(lpTemp) { LocalFree(lpTemp); lpTemp = NULL; } return ( ioOpsToPerform ); } int CIoHandler::ParseAndValidateAccount() { CHAR *pPos=NULL; int nRet = PVA_OTHERERROR; bool bDefaultDomain = true; WCHAR lpszDomainOfMac[MAX_DOMAIN_NAME_LEN + 1]; int iRetVal = PVA_OTHERERROR; BOOLEAN bIsGuest = FALSE; LPWSTR lpszJoinedDomain = NULL; // Will be allocated by NetGetJoin... int iStatus = 0; LPWSTR lpwszUserNDomain = NULL; DWORD dwSize = 0; if(m_pSession->CSession::m_pszUserName[0] == 0) return PVA_NODATA; m_pSession->CSession::m_szUser[0] = L'\0'; // Copy the default domain initially, if the user has supplied a domain, then use it wcsncpy(m_pSession->CSession::m_szDomain, m_pSession->CSession::m_pszDefaultDomain, MAX_DOMAIN_NAME_LEN); m_pSession->CSession::m_szDomain[MAX_DOMAIN_NAME_LEN] = L'\0'; ConvertSChartoWChar(m_pSession->CSession::m_pszUserName, m_pSession->CSession::m_szUser); // User parsing and validity checks if((pPos = strchr(m_pSession->CSession::m_pszUserName, '\\'))) { if(pPos == m_pSession->CSession::m_pszUserName) return PVA_BADFORMAT; if(strchr(pPos+1, '\\')) return PVA_BADFORMAT; *pPos++ = '\0'; if (*pPos == '\0') return PVA_BADFORMAT; bDefaultDomain = false; strcpy(m_pSession->CSession::m_pszDomain, m_pSession->CSession::m_pszUserName); strcpy(m_pSession->CSession::m_pszUserName, pPos); ConvertSChartoWChar(m_pSession->CSession::m_pszUserName, m_pSession->CSession::m_szUser); ConvertSChartoWChar(m_pSession->CSession::m_pszDomain, m_pSession->CSession::m_szDomain); } if (! GetDomainHostedByThisMc(lpszDomainOfMac)) { iRetVal = PVA_OTHERERROR; goto End; } // Domain validity checks if((_wcsicmp(m_pSession->CSession::m_szDomain, L".") == 0) || (_wcsicmp(m_pSession->CSession::m_szDomain, L"localhost") == 0) || (_wcsicmp(m_pSession->CSession::m_szDomain, lpszDomainOfMac) == 0)) { wcscpy(m_pSession->CSession::m_szDomain, lpszDomainOfMac); } else if(!m_pSession->m_dwAllowTrustedDomain) // If not local machine, then check for domain trusts { /* If AllowTrustedDomain is 0 then check if the domain is same as the domain hosted by this machine or same as the domain to which this machine is joined If yes proceed If not, if the domain we got is from default domain setting (user has not typed the domain name), then fall back to the local machine else bail out If the machine is joined to a workgroup instead of a domain, then the fall back should be to the domain hosted by this machine. */ // NetGetJoinInformation is unfortunately not available in versions prior to w2k, so check whether it is available { HMODULE dll = NULL; FARPROC proc = NULL; TCHAR szDllPath[MAX_PATH*2] = { 0 }; UINT iRet = 0; typedef NET_API_STATUS (NET_API_FUNCTION *OUR_NET_GET_JOIN_INFORMATION)( IN LPCWSTR lpServer OPTIONAL, OUT LPWSTR *lpNameBuffer, OUT PNETSETUP_JOIN_STATUS BufferType ); BOOL net_api_found = FALSE; iRet = GetSystemDirectory(szDllPath,(MAX_PATH*2)-1); if(iRet == 0 || iRet >= (MAX_PATH*2)) { iRetVal = PVA_OTHERERROR; goto End; } _tcsncpy(szDllPath+iRet,TEXT("\\NETAPI32.DLL"),(MAX_PATH*2)-iRet-1); dll = LoadLibrary(szDllPath); if (! dll) { iRetVal = PVA_OTHERERROR; goto End; } proc = GetProcAddress(dll, "NetGetJoinInformation"); if (proc ) { NETSETUP_JOIN_STATUS dwStatus; if (NERR_Success == (*((OUR_NET_GET_JOIN_INFORMATION)proc))(NULL, &lpszJoinedDomain, &dwStatus)) { if (dwStatus != NetSetupDomainName) // Not joined to a domain { NetApiBufferFree(lpszJoinedDomain); lpszJoinedDomain = NULL; } net_api_found = TRUE; } else { lpszJoinedDomain = NULL; } } else { HKEY win_logon; LONG error; DWORD needed = 0, value_type = REG_SZ; error = RegOpenKeyEx( HKEY_LOCAL_MACHINE, TEXT("SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon"), 0, // Reserved KEY_QUERY_VALUE | MAXIMUM_ALLOWED, &win_logon ); if (error == ERROR_SUCCESS) { RegQueryValueExW(win_logon, L"CachePrimaryDomain", 0, &value_type, NULL, &needed); // This will return the size lpszJoinedDomain = (WCHAR *)GlobalAlloc(GPTR, needed); if (lpszJoinedDomain) { if (ERROR_SUCCESS != RegQueryValueExW(win_logon, L"CachePrimaryDomain", 0, &value_type, (LPBYTE)lpszJoinedDomain, &needed)) { GlobalFree(lpszJoinedDomain); lpszJoinedDomain = NULL; } } RegCloseKey(win_logon); } } if (lpszJoinedDomain && (_wcsicmp(m_pSession->CSession::m_szDomain, lpszJoinedDomain) == 0)) { ; // Nothing to do here the account is from a valid domain } else { if (bDefaultDomain) wcscpy(m_pSession->CSession::m_szDomain, lpszDomainOfMac); else m_bInvalidAccount = true; } if (lpszJoinedDomain) { if (net_api_found) { NetApiBufferFree(lpszJoinedDomain); } else { GlobalFree(lpszJoinedDomain); } } } if (m_bInvalidAccount) return PVA_INVALIDACCOUNT; } dwSize = wcslen(m_pSession->CSession::m_szDomain) + wcslen(m_pSession->CSession::m_szUser) + 2; lpwszUserNDomain = new WCHAR[dwSize]; // 2 for '\\' and '\0' if (!lpwszUserNDomain) { iRetVal = PVA_NOMEMORY; goto End; } _snwprintf(lpwszUserNDomain,dwSize -1,L"%s\\%s",m_pSession->CSession::m_szDomain,m_pSession->CSession::m_szUser); lpwszUserNDomain[dwSize -1] = L'\0'; bIsGuest = IsTheAccount(lpwszUserNDomain, DOMAIN_USER_RID_GUEST); _chVERIFY2( iStatus = WideCharToMultiByte( GetConsoleCP(), 0, m_pSession->CSession::m_szDomain, -1, m_pSession->m_pszDomain, MAX_PATH , NULL, NULL ) ); _TRACE(TRACE_DEBUGGING,"Domain:%s",m_pSession->m_pszDomain); delete[] lpwszUserNDomain; return bIsGuest ? PVA_GUEST : PVA_SUCCESS; End: m_pSession->CSession::m_szDomain[0] = L'\0'; m_pSession->CSession::m_szUser[0] = L'\0'; //PREFIX reports error - leaking memory. But we are correctly freeing all the memory. Won't fix. return iRetVal; } int CIoHandler::AuthenticateUser( void ) { LPWSTR szPassWd = NULL; ConvertSChartoWChar( m_pSession->CSession::m_pszPassword, &szPassWd ); /* when LogonUserA is given user name etc as per code page differen from * 1252, it was not succeding. May be the conversion from say 850 to * unicode is not happening. It is assuming The i/p is as per 1252. * Is it possible? * So, Converting everything to UNICODE */ m_fLogonUserResult = LogonUser( m_pSession->CSession::m_szUser, m_pSession->CSession::m_szDomain, szPassWd, LOGON32_LOGON_INTERACTIVE, LOGON32_PROVIDER_DEFAULT, &(m_pSession->CSession::m_hToken) ) ; SfuZeroMemory(szPassWd, sizeof(WCHAR)*lstrlenW(szPassWd)); delete[] szPassWd; //scratch out the password SfuZeroMemory( m_pSession->CSession::m_pszPassword, strlen( m_pSession->CSession::m_pszPassword )); if (m_pSession->CSession::m_szUser[0]!= L'\0') { SfuZeroMemory( m_pSession->CSession::m_szUser, wcslen( m_pSession->CSession::m_szUser)*sizeof(WCHAR)); } return ( m_fLogonUserResult ); } //When this message is received by the server, it will check for license //and replies bool CIoHandler::SendDetailsAndAskForLicense() { bool bRetVal = true; if( !GetAuthenticationId( m_pSession->CSession::m_hToken, &m_pSession->CSession::m_AuthenticationId ) ) { return ( FALSE ); } //GetUserName(); //For NTLM DWORD dwDomainLength = strlen( m_pSession->m_pszDomain ) + 1; DWORD dwUserLength = strlen( m_pSession->m_pszUserName ) + 1; DWORD dwPeerLength = strlen( m_pSession->m_szPeerHostName ) + 1; DWORD dwAuthIdLength = sizeof( m_pSession->m_AuthenticationId ); DWORD dwTotal = dwDomainLength + dwUserLength + dwPeerLength + dwAuthIdLength; UCHAR *lpData = NULL; UCHAR *lpPtrData = NULL; lpData = new UCHAR[ IPC_HEADER_SIZE + dwTotal ]; if( !lpData ) { return ( FALSE ); } lpPtrData = lpData; lpPtrData[ 0 ] = SESSION_DETAILS; lpPtrData++; memcpy( lpPtrData, &dwTotal, sizeof( DWORD ) ); lpPtrData += sizeof( DWORD ); memcpy( lpPtrData, m_pSession->m_pszDomain, dwDomainLength ); lpPtrData += dwDomainLength; memcpy( lpPtrData, m_pSession->m_pszUserName, dwUserLength ); lpPtrData += dwUserLength; memcpy( lpPtrData, m_pSession->m_szPeerHostName, dwPeerLength ); lpPtrData += dwPeerLength; memcpy( lpPtrData, &( m_pSession->m_AuthenticationId ), dwAuthIdLength ); dwTotal += IPC_HEADER_SIZE; //As a response to this server indicates the availability of License bRetVal = WriteToServer( SESSION_DETAILS, dwTotal, lpData ); delete[] lpData; return( bRetVal ); } int CIoHandler::CheckLicense() { bool fIsAdmin = false; bool fIsMemberOfTelnetClients = false; if( !( m_pSession->CheckGroupMembership( &fIsAdmin, &fIsMemberOfTelnetClients ) ) ) { return ( FALSE ); } if( !fIsAdmin && !fIsMemberOfTelnetClients ) { return ( NOT_MEMBER_OF_TELNETCLIENTS_GROUP ); } if( !SendDetailsAndAskForLicense() ) { return( FALSE ); } return( WAIT_FOR_SERVER_REPLY ); } /*++ Sends a termination string to the client. --*/ void CIoHandler::SendTerminateString(char *pszMessageBuffer) { m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; WriteToSocket( ( PUCHAR ) pszMessageBuffer, strlen( pszMessageBuffer ) ); } #define HALF_K 512 bool CIoHandler::IsTimedOut ( ) { //because we entered this function, we already know that we are not //in STATE_SESSION. the next block of code checks whether more than //PRE_SESSION_STATE_TIMEOUT seconds has elapsed since the telnet client //first connected to us. if so, we deem that the client was given enough //time for 1) reasonable negotiation, 2) entering name & password, but //STATE_SESSION was not reached. if (0 == g_dwPreSessionStateTimeOut) { return false; } char szMessageBuffer[HALF_K + 1]; if (_snprintf( szMessageBuffer, HALF_K, "\r\n%s\r\n%s", TIMEOUT_STR, TERMINATE ) < 0) { szMessageBuffer[HALF_K] = '\0'; } if( GetTickCount() - m_pSession->CSession::m_dwTickCountAtLogon > g_dwPreSessionStateTimeOut ) { SendTerminateString(szMessageBuffer); return ( true ); } return( false ); } CIoHandler::IO_OPERATIONS CIoHandler::ProcessDataFromSocket ( DWORD dwIoSize ) { char szMessageBuffer[HALF_K + 1]; IO_OPERATIONS ioOpsToPerform = 0; DWORD dwCurrentOffset; DWORD dwInputLength; bool bContinue; // Initialize Data dwCurrentOffset = (DWORD)(m_pReadFromSocketBufferCursor - m_ReadFromSocketBuffer); dwInputLength = dwIoSize + dwCurrentOffset; if(dwInputLength >= sizeof( m_ReadFromSocketBuffer ) ) { /*++ MSRC 678 : Telnet Server Crash/BO with >4300 characters and a backspace. Fix : If Input length reaches it's limit, we terminate the session giving a message : The Input Line is too long. --*/ if (_snprintf( szMessageBuffer, HALF_K, "\r\n%s",LONG_SESSION_DATA) < 0) { szMessageBuffer[HALF_K] = '\0'; } SendTerminateString(szMessageBuffer); ioOpsToPerform |= WRITE_TO_SOCKET; return ( ioOpsToPerform ); } m_ReadFromSocketBuffer[ dwInputLength ] = '\0'; ioOpsToPerform = READ_FROM_SOCKET; if( IsTimedOut() ) { ioOpsToPerform |= WRITE_TO_SOCKET; return ( ioOpsToPerform ); } do { // we break unless someone is sure that we should continue. bContinue = false; switch ( m_SocketControlState ) { case STATE_INIT: // we are not in a position to consume anything yet, so // make sure we save the stuff for later on !! dwCurrentOffset = dwInputLength; m_pReadFromSocketBufferCursor += dwIoSize; break; case STATE_NTLMAUTH: break; case STATE_CHECK_LICENSE: m_iResult = CheckLicense(); m_SocketControlState = STATE_LICENSE_AVAILABILITY_KNOWN; if( m_iResult == FALSE ) { m_iResult = DENY_LICENSE; } else if ( m_iResult == WAIT_FOR_SERVER_REPLY ) { do { //We will have to get a reply from server regarding license TlntSynchronizeOn(m_oReadFromPipe.hEvent); OnReadFromPipeCompletion(); } while( m_iResult == WAIT_FOR_SERVER_REPLY ); } bContinue = true; break; case STATE_LICENSE_AVAILABILITY_KNOWN: if( m_iResult != ISSUE_LICENSE ) { //We should not log at the time of logging off. m_pSession->m_fLogonUserResult = 0; } if( m_iResult ) { switch( m_iResult ) { case ISSUE_LICENSE: szMessageBuffer[0] = 0; m_pSession->CRFCProtocol::m_fPasswordConcealMode = false; m_SocketControlState = STATE_VTERM_INIT_NEGO; bContinue = true; #ifdef LOGGING_ENABLED m_pSession->LogIfOpted( SUCCESS, LOGON ); #endif break; #if BETA case LICENSE_EXPIRED: m_pSession->CRFCProtocol::m_fPasswordConcealMode = false; if (_snprintf( szMessageBuffer, HALF_K, "%s%s", LICENSE_EXPIRED_STR, TERMINATE ) < 0) { szMessageBuffer[HALF_K] = '\0'; } m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; break; #endif case NOT_MEMBER_OF_TELNETCLIENTS_GROUP: m_pSession->CRFCProtocol::m_fPasswordConcealMode = false; if (_snprintf( szMessageBuffer, HALF_K, "%s%s", NOT_MEMBER_OF_TELNETCLIENTS_GROUP_STR, TERMINATE) < 0) { szMessageBuffer[HALF_K] = '\0'; } m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; break; case DENY_LICENSE: szMessageBuffer[0] = 0; m_pSession->CRFCProtocol::m_fPasswordConcealMode = false; m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; break; } if ( *szMessageBuffer ) { WriteToSocket((PUCHAR)szMessageBuffer, strlen(szMessageBuffer)); ioOpsToPerform |= WRITE_TO_SOCKET ; } } break; case STATE_VTERM_INIT_NEGO: { // kick off the term type negotiation. // Term Type negotiation happens after login for several reasons. int nBytesToWrite = 0; m_SocketControlState = STATE_VTERM; // Some clients are proactive and send us WILL TERMTYPE, in that // case we already know the Client can do term type and we start // the subnegotiation. else we ask if start the whole termtype process. if ( m_pSession->CRFCProtocol::m_remoteOptions[ TO_TERMTYPE ] ) { DO_TERMTYPE_SUB_NE( szMessageBuffer ); nBytesToWrite = 6; } else { m_pSession->CRFCProtocol::m_fWaitingForResponseToA_DO_ForTO_TERMTYPE = true; DO_OPTION( szMessageBuffer, TO_TERMTYPE ); nBytesToWrite = 3; } WriteToSocket((PUCHAR)szMessageBuffer, nBytesToWrite); ioOpsToPerform |= WRITE_TO_SOCKET ; } break; case STATE_VTERM: // We Wait here until we know what term type to use. This is a // no return point - after this the User can't change the term type. if( m_pSession->CSession::m_bNegotiatedTermType ) { m_SocketControlState = STATE_SESSION; if( !m_pSession->CShell::StartUserSession( ) ) { m_SocketControlState = STATE_TERMINATE; CIoHandler::m_fShutDownAfterIO = true; if (_snprintf( szMessageBuffer, HALF_K, "%s%s", SESSION_INIT_FAIL, TERMINATE) < 0) { szMessageBuffer[HALF_K] = '\0'; } WriteToSocket((PUCHAR)szMessageBuffer, strlen( szMessageBuffer ) ); ioOpsToPerform |= WRITE_TO_SOCKET ; } m_pSession->FreeInitialVariables(); } break; case STATE_BANNER_FOR_AUTH: CHAR szTmp[ MAX_PATH + 1]; strncpy(szTmp, LOGIN_BANNER, MAX_PATH); szTmp[MAX_PATH] = '\0'; WriteToSocket( ( PUCHAR )szTmp, strlen( szTmp ) ); ioOpsToPerform |= WRITE_TO_SOCKET ; m_SocketControlState = STATE_WAIT_FOR_ENV_OPTION; bContinue = true; break; case STATE_WAIT_FOR_ENV_OPTION: if( m_bWaitForEnvOptionOver ) { m_SocketControlState = STATE_LOGIN_PROMPT; bContinue = true; } break; case STATE_LOGIN_PROMPT: if( !m_pSession->CRFCProtocol::m_bIsUserNameProvided && m_bOnlyOnce ) { m_bOnlyOnce = false; WriteToSocket( ( PUCHAR )LOGIN_REQUEST, strlen( LOGIN_REQUEST ) ); ioOpsToPerform |= WRITE_TO_SOCKET ; } m_SocketControlState = STATE_AUTH_NAME; case STATE_AUTH_NAME: //fall thru case STATE_AUTH_PASSWORD: do { // Processing of Command Input if( ioOpsToPerform & LOGON_DATA_UNFINISHED ) ioOpsToPerform ^= LOGON_DATA_UNFINISHED; ioOpsToPerform = ProcessCommandLine( &dwInputLength, &dwCurrentOffset, ioOpsToPerform ); if( m_pSession->CRFCProtocol::m_bIsUserNameProvided ) { ioOpsToPerform |= LOGON_COMMAND; } // If there is a completed command line; deal with it if( ioOpsToPerform & LOGON_COMMAND ) { ioOpsToPerform = ProcessAuthenticationLine( &dwInputLength, &dwCurrentOffset, ioOpsToPerform ); ioOpsToPerform ^= LOGON_COMMAND; } } while( ioOpsToPerform & LOGON_DATA_UNFINISHED ); if ( m_SocketControlState != STATE_AUTH_NAME && m_SocketControlState != STATE_AUTH_PASSWORD ) { bContinue = true; } break; default: break; } } while ( bContinue ); return ( ioOpsToPerform ); } bool CIoHandler::ProcessUserDataReadFromSocket ( DWORD dwIoSize ) { DWORD dwCurrentOffset; DWORD dwInputLength; if( _strcmpi( m_pSession->m_pszTermType, "VTNT" ) != 0 ) { dwCurrentOffset = (DWORD)(m_pReadFromSocketBufferCursor- m_ReadFromSocketBuffer); dwInputLength = dwIoSize + dwCurrentOffset; if(dwInputLength >= sizeof( m_ReadFromSocketBuffer ) ) { dwInputLength = sizeof( m_ReadFromSocketBuffer ) - 1; } m_ReadFromSocketBuffer[ dwInputLength ] = '\0'; m_pReadFromSocketBufferCursor = m_ReadFromSocketBuffer; if( dwIoSize >= sizeof( m_ReadFromSocketBuffer ) ) { dwIoSize = sizeof( m_ReadFromSocketBuffer ) -1; } m_ReadFromSocketBuffer[ dwIoSize ] = '\0'; } if( !m_pSession->CScraper::EmulateAndWriteToCmdConsoleInput() ) { return( FALSE ); } return ( TRUE ); } CIoHandler::IO_OPERATIONS CIoHandler::OnDataFromSocket ( ) { IO_OPERATIONS ioOpsToPerform1 = 0; IO_OPERATIONS ioOpsToPerform2 = 0; // filter the data at the RFCProtocol handler ioOpsToPerform1 = m_pSession->CRFCProtocol:: ProcessDataReceivedOnSocket( &m_dwReadFromSocketIoLength ); if( m_SocketControlState != STATE_SESSION ) { ioOpsToPerform2 = ProcessDataFromSocket( m_dwReadFromSocketIoLength ); } else { if( m_dwReadFromSocketIoLength ) { if( !ProcessUserDataReadFromSocket( m_dwReadFromSocketIoLength ) ) { ioOpsToPerform2 |= IO_FAIL; } } } return ( ioOpsToPerform1 | ioOpsToPerform2 ); } bool CIoHandler::WriteToServer ( UCHAR ucMsg, DWORD dwMsgSize, LPVOID lpData ) { if( lpData ) { //The whole record should be available with the header. //Otherwise, unnecessary allocations have to be done if( !WriteToPipe( m_hWritePipe, lpData, dwMsgSize, &m_oWriteToPipe ) ) { return( FALSE ); } } else { if( !WriteToPipe( m_hWritePipe, ucMsg, &m_oWriteToPipe ) ) { return( FALSE ); } } return( TRUE ); } bool CIoHandler::IssueReadOnPipe() { _chASSERT( m_pucReadBuffer ); if( m_hReadPipe == INVALID_HANDLE_VALUE || !m_pucReadBuffer) { return ( FALSE ); } if( !ReadFile( m_hReadPipe, m_pucReadBuffer, m_dwRequestedSize, &m_dwReadFromPipeIoLength, &m_oReadFromPipe ) ) { DWORD dwError = GetLastError( ); if ( ( dwError != ERROR_MORE_DATA ) && ( dwError != ERROR_IO_PENDING ) ) { LogFormattedGetLastError( EVENTLOG_ERROR_TYPE, MSG_ERR_READPIPE, dwError ); _TRACE( TRACE_DEBUGGING, " Error: ReadFile ( IssueReadOnPipe) -- 0x%1x ", dwError ); return ( FALSE ); } } return( TRUE ); } bool CIoHandler::IssueFirstReadOnPipe ( ) { if( m_hReadPipe == INVALID_HANDLE_VALUE ) { return ( FALSE ); } if( !ReadFile( m_hReadPipe, &m_protocolInfo, sizeof( m_protocolInfo ), &m_dwReadFromPipeIoLength, &m_oReadFromPipe ) ) { DWORD dwError = GetLastError( ); if( dwError != ERROR_IO_PENDING ) { LogFormattedGetLastError( EVENTLOG_ERROR_TYPE, MSG_ERR_READPIPE, dwError ); _TRACE( TRACE_DEBUGGING, " Error: ReadFile ( IssueFirstReadOnPipe ) -- 0x%1x ", dwError ); return ( FALSE ); } } return( TRUE ); } bool CIoHandler::GetAndSetSocket ( ) { int iAddressFamily = m_protocolInfo.iAddressFamily; m_sSocket = WSASocket( iAddressFamily, SOCK_STREAM, 0, &m_protocolInfo, NULL, NULL); if( INVALID_SOCKET == m_sSocket ) { DecodeWSAErrorCodes( WSAGetLastError() );//It logs and traces return ( FALSE ); } _chVERIFY2( SetHandleInformation( ( HANDLE ) m_sSocket, 0, HANDLE_FLAG_INHERIT ) ); //mark the socket non-blocking unsigned long ulNonBlocked = 1; if( ioctlsocket( m_sSocket, FIONBIO, (u_long FAR*) &ulNonBlocked ) == SOCKET_ERROR ) { _TRACE( TRACE_DEBUGGING, "Error: ioctlsocket() -- 0x%1x", WSAGetLastError() ); return ( FALSE ); } INT izero = 0; DWORD dwStatus; { BOOL value_to_set = TRUE; setsockopt( m_sSocket, SOL_SOCKET, SO_DONTLINGER, ( char * )&value_to_set, sizeof( value_to_set ) ); } dwStatus = SafeSetSocketOptions(m_sSocket); if(dwStatus == SOCKET_ERROR) { _TRACE( TRACE_DEBUGGING, "Error: setsockopt() : %lu", GetLastError() ); return ( FALSE ); } //Set send buffer size to zero dwStatus = setsockopt( m_sSocket, SOL_SOCKET, SO_SNDBUF, ( char* ) &izero, sizeof( izero ) ); if( dwStatus == SOCKET_ERROR ) { _TRACE( TRACE_DEBUGGING, "Error: setsockopt() : %lu", GetLastError() ); return ( FALSE ); } //This needs to be removed when we start handling urgent data as per RFC //Make OOB inline izero = TRUE; dwStatus = setsockopt( m_sSocket, SOL_SOCKET, SO_OOBINLINE, ( char* ) &izero, sizeof( izero ) ); if( dwStatus == SOCKET_ERROR ) { _TRACE( TRACE_DEBUGGING, "Error: setsockopt() : %lu", GetLastError() ); return ( FALSE ); } return( TRUE ); } void CIoHandler::DisplayOnClientNow() { if( m_pSession->CScraper::m_dwPollInterval != INFINITE ) { //Scraper has been initialized; m_pSession->CScraper::OnWaitTimeOut(); } } void CIoHandler::SendMessageToClient( LPWSTR szMsg, bool bNeedHeader ) { _chASSERT( szMsg ); if( !szMsg ) { return; } LPTSTR szHeader = NULL; if( bNeedHeader ) { GetHeaderMessage( &szHeader ); } if( m_pSession->CSession::m_bIsStreamMode || m_SocketControlState != STATE_SESSION ) { DWORD dwNumBytesWritten = 0; if( szHeader && bNeedHeader ) { WriteMessageToClientDirectly( szHeader ); FinishIncompleteIo( ( HANDLE ) m_sSocket, &m_oWriteToSocket, &dwNumBytesWritten ); } WriteMessageToClientDirectly( szMsg ); FinishIncompleteIo( ( HANDLE ) m_sSocket, &m_oWriteToSocket, &dwNumBytesWritten ); } else { if( szHeader && bNeedHeader ) { m_pSession->CScraper::WriteMessageToCmd( szHeader ); } m_pSession->CScraper::WriteMessageToCmd( szMsg ); DisplayOnClientNow(); } delete[] szHeader; } bool CIoHandler::HandlePipeData ( ) { bool bRetVal = TRUE; m_dwRequestedSize = IPC_HEADER_SIZE; //How much data to read in the // next call switch( m_ReadFromPipeBuffer[0] ) { case TLNTSVR_SHUTDOWN: SendMessageToClient( SERVER_SHUTDOWN_MSG, NEED_HEADER ); return( FALSE ); //This should take us out of loop in //WaitForIo case GO_DOWN: SendMessageToClient( GO_DOWN_MSG, NO_HEADER ); return( FALSE ); case SYSTEM_SHUTDOWN: SendMessageToClient( SYSTEM_SHUTDOWN_MSG, NEED_HEADER ); return( FALSE ); case LICENSE_AVAILABLE: m_iResult = ISSUE_LICENSE; break; case LICENSE_NOT_AVAILABLE: m_iResult = DENY_LICENSE; break; case OPERATOR_MESSAGE: if( !HandleOperatorMessage() ) { bRetVal = FALSE; } break; default: break; } return ( bRetVal ); } /* Generally we read data on pipe into a IPC_HEADER_SIZE buffer of m_ReadFromPipeBuffer. When, it is an operator message we issue async read into a specially allocated block and free on actual reception */ bool CIoHandler::HandleOperatorMessage() { bool bRetVal = TRUE; if ( m_bIpcHeader ) { m_bIpcHeader = false; memcpy( &m_dwRequestedSize, m_ReadFromPipeBuffer + sizeof( UCHAR ), sizeof( DWORD ) ); m_pucReadBuffer = new UCHAR[ m_dwRequestedSize + wcslen( FOOTER ) + 2 ]; if( !m_pucReadBuffer ) { bRetVal = FALSE; } } else { wcscat( ( LPWSTR )m_pucReadBuffer, FOOTER ); SendMessageToClient( ( LPWSTR )m_pucReadBuffer, NEED_HEADER ); delete[] m_pucReadBuffer; m_pucReadBuffer = m_ReadFromPipeBuffer; m_bIpcHeader = true; } return( bRetVal ); } bool CIoHandler::OnReadFromPipeCompletion ( ) { bool bRetVal = FALSE; if( m_fFirstReadFromPipe ) { m_fFirstReadFromPipe = false; if( GetAndSetSocket() ) { m_pSession->CollectPeerInfo(); m_pSession->CRFCProtocol::InitialNegotiation(); //The negotiation leaves the data in the buffer if( WriteToClient( ) ) { bRetVal = TRUE; m_pSession->AddHandleToWaitOn( m_oReadFromSocket.hEvent ); IssueReadFromSocket(); } } } else { bRetVal = HandlePipeData(); } if( bRetVal == TRUE ) { bRetVal = IssueReadOnPipe( ); } return ( bRetVal ); } bool CIoHandler::WriteToClient ( ) { DWORD dwBytesWritten; if( m_dwWriteToSocketIoLength > 0 && (!WriteFile( ( HANDLE ) m_sSocket, m_WriteToSocketBuff, m_dwWriteToSocketIoLength, &dwBytesWritten, &m_oWriteToSocket ))) { DWORD dwErr; if( ( dwErr = GetLastError( ) ) != ERROR_IO_PENDING ) { if( dwErr != ERROR_NETNAME_DELETED ) { LogFormattedGetLastError( EVENTLOG_ERROR_TYPE, MSG_ERR_WRITESOCKET, dwErr ); _TRACE( TRACE_DEBUGGING, "Error: WriteFile(WriteToClient) -- 0x%1x", dwErr ); } return( FALSE ); } } m_dwWriteToSocketIoLength = 0; if( m_fShutDownAfterIO ) { return( FALSE ); //This Should lead to exit from WaitForIo loop } return ( TRUE ); } bool CIoHandler::IssueReadFromSocket ( ) { DWORD dwRequestedIoSize = AVAILABE_BUFFER_SIZE( m_ReadFromSocketBuffer, m_pReadFromSocketBufferCursor ); if( !ReadFile( ( HANDLE ) m_sSocket, m_pReadFromSocketBufferCursor, dwRequestedIoSize, &m_dwReadFromSocketIoLength, &m_oReadFromSocket ) ) { DWORD dwError = GetLastError( ); //ERROR_NETNAME_DELETED results when the client aborts the connection if( ( dwError != ERROR_MORE_DATA ) && ( dwError != ERROR_IO_PENDING ) ) { if( dwError != ERROR_NETNAME_DELETED) { LogFormattedGetLastError( EVENTLOG_ERROR_TYPE, MSG_ERR_READSOCKET, dwError ); _TRACE( TRACE_DEBUGGING, " Error: ReadFile(IssueReadFromSocket) -- 0x%1x ", dwError ); } return ( FALSE ); } } return( TRUE ); } bool CIoHandler::OnReadFromSocketCompletion ( ) { IO_OPERATIONS ioOpsToPerform = 0; BOOL dwStatus = 0; _chVERIFY2( dwStatus = GetOverlappedResult( ( HANDLE )m_sSocket, &m_oReadFromSocket, &m_dwReadFromSocketIoLength, FALSE ) ); if( !dwStatus ) { return( FALSE ); } if( m_dwReadFromSocketIoLength == 0 ) { return( FALSE ); } ioOpsToPerform = OnDataFromSocket( ); if( ( ioOpsToPerform & WRITE_TO_SOCKET ) ) { if( !WriteToClient( ) ) { return( FALSE ); } } if( ioOpsToPerform & IO_FAIL ) { _chASSERT( 0 ); WriteMessageToClientDirectly( TEXT( BUGGY_SESSION_DATA ) ); WriteToClient( ); return( FALSE ); } return ( IssueReadFromSocket() ); } /*There are 2 ways to send data to client. 1. Write to cmd. Let scraper send it. 2. Write to socket directly. The following is the implementation. */ void CIoHandler::WriteMessageToClientDirectly( LPWSTR szMsg ) { LPSTR szBuf = NULL; DWORD dwSize = 0; DWORD dwNumBytesWritten = 0; int iRet = 0; _chASSERT( szMsg ); if( !szMsg ) { goto End; } _chVERIFY2( dwSize = WideCharToMultiByte( GetConsoleCP(), 0, szMsg, -1, NULL, 0, NULL, NULL ) ); szBuf = new CHAR[ dwSize ]; if( szBuf ) { iRet = WideCharToMultiByte( GetConsoleCP(), 0, szMsg, -1, szBuf, dwSize, NULL, NULL ); _chVERIFY2(iRet); if(!iRet) { goto End; } if( !FinishIncompleteIo( ( HANDLE ) m_sSocket, &( m_oWriteToSocket ), &dwNumBytesWritten ) ) { goto End; } StuffEscapeIACs( m_WriteToSocketBuff, ( PUCHAR )szBuf, &dwSize ); m_dwWriteToSocketIoLength = dwSize; WriteToClient( ); } End: if(szBuf) { delete[] szBuf; } return; } void CIoHandler::UpdateIdleTime( UCHAR ucChangeIdleTime ) { WriteToServer( ucChangeIdleTime, 0, NULL ); } //caller has to free *szHeader bool CIoHandler::GetHeaderMessage( LPWSTR *szHeader ) { bool bRetVal = false; UDATE uSysDate; //local time DATE dtCurrent; DWORD dwSize = 0; BSTR szDate = NULL; WCHAR szMachineName[ MAX_COMPUTERNAME_LENGTH + 1]; _chASSERT( g_szHeaderFormat ); if( !szHeader ) { _chASSERT( szHeader ); goto ExitOnError; } *szHeader = NULL; GetLocalTime( &uSysDate.st ); if( VarDateFromUdate( &uSysDate, VAR_VALIDDATE, &dtCurrent ) != S_OK ) { goto ExitOnError; } if( VarBstrFromDate( dtCurrent, MAKELCID( MAKELANGID( LANG_NEUTRAL, SUBLANG_SYS_DEFAULT ), SORT_DEFAULT ), LOCALE_NOUSEROVERRIDE, &szDate ) != S_OK ) { goto ExitOnError; } *szHeader = new WCHAR[ wcslen( g_szHeaderFormat ) + wcslen( szDate ) + MAX_COMPUTERNAME_LENGTH + 1 ]; if( !*szHeader ) { goto ExitOnError; } //Get Computer name dwSize = sizeof( szMachineName )/sizeof(WCHAR); szMachineName[0] = L'\0'; if( !GetComputerName( szMachineName, &dwSize ) ) { szMachineName[0] = L'\0'; } //Form the message wsprintf( *szHeader, g_szHeaderFormat, szMachineName, szDate ); bRetVal = true; ExitOnError: SysFreeString( szDate ); return bRetVal; }
39,400
talkingmachinewo13bill_43
English-PD
Open Culture
Public Domain
1,917
The talking machine world (Jan-Dec 1917)
Bill, Edward Lyman, 1862-1916
English
Spoken
7,749
10,202
If you have a call for something you haven't got, and it's in your line, get it. But don't buy a gross unless you have more than one call for the article. CABINETS Three Sizes — Floor Cabinets : 17x1 9x40— 1 9x20x4 1. Table Cabinet : 20x22x14. Birch-Mahogany Finish — Nickel Trim— Well-Finished. Stock on Hand SAMUEL WEINSTEIN 134 Duane St. Established 1899 New York 106 THE TALKING MACHINE WORLD SALESMAN OR DISTRIBUTOR Well Known Piano Man Draws a Sharp Line Between the Two Classes — Real Salesman Talks Quality and Cash Instead of Terms At a recent dinner in New York, J. H. Shale, general manager of the American Piano Co., made a most interesting address upon sales- manship, and drew a sharp line between the real salesman and the distributor, the former selling on a basis that gives his house a prolit, while the latter sells on the strength of low prices and long terms of payment. Although Mr. Shale's remarks applied particularly to the piano salesman, the question of salesman and distributor applies with equal strength to the talking machine man. As has been said before in these columns, the salaries of salesmen depend upon the amount of profit they can earn for their house, for sal- aries must of necessity come out of the profits. The more profit the salesman can bring into the concern through his own effort, just so much greater is his own earning capacity. - There are men in every line who are inclined to follow the line of least resistance. They have a thorough understanding of the minimum terms their house will accept, and they adopt those terms both as a minimum and as a maximum, the theory being that the lower the terms the easier the sale. There are many talking ma- chine purchasers to-day who are making small payments on their instruments who, had they been properly approached by the salesman, could and would have made terms that would have meant substantial payments each month, and a quick cleaning up of the contract. To make money capital must be turned over frequently. Cash and short time also en- ables the talking machine house to get back its capital quickly, realize a profit,' and turn over the capital again to win further profits. When the capital is tied up on a long time contract even at the usual interest it is not available for the business until the greater part of the con- tract is cleaned up. The salesman who urges the customer to pay cash by pointing out to him the interest and annoyance he can save by so doing, or who, if a cash payment deal is not possible, holds out for large payments and ac- cepts the minimum only as a last resource to keep the customer from walking out of the store, is the man who is making the profits, and he is making them two ways — for himself and for the house. LATEST "RISHELL" LITERATURE Interesting Folder Featuring Its New Line of Phonographs Just Issued Williamsport, Pa., March 6. — The Rishell Pho- nograph Co., of this city, manufacturer of the "Rishell" line of phonographs has just issued a very attractive folder, featuring its new lines of instruments for the spring and summer sea- sons, with a full description of each model. THE BLISS REPRODUCER THE NEW DEPARTURE SOUND-BOX No Mica, Rubber, Cork or Metal Used To the Manufacturer: This presents the first legitimate talking point of superiority offered for years. It is too high priced for cheap machines, but if you want quality we have it. TO the Dealer: This Reproducer will increase the musical value of any phonographs now in the hands of your customers, and any device that will accomplish this is profitable to you and will increase the demand for more and better records. Do you see the point ? WILSON-LAIRD PHONOGRAPH CO., Inc. 136 Liberty Street, New York City These instruments are noteworthy for their artistic design, and their graceful lines bespeak a refinement and distinction that cannot fail the orders being received at the factory by each mail are conclusive indications of the popularity of the "Rishell" line. The success of the "Rishell" ■ line may be at- tributed to the painstaking care which is be- stowed upon every part included in the "Rishell" equipment. Every motor, tone arm, sound box, etc., is subject to rigid tests before it is accepted by the "Rishell" mechanical ex- perts. Every "Rishell" machine is equipped with a universal tone arm, playing all makes of records without an attachment, a valuable sales argument for the Rishell dealer. HOFFAY CO. INCREASES PRICES Revised Price List, Covering Entire Line, Just Issued — Plan Live Publicity Campaign One of the Popular Rishell Creations to meet with the approval of the most critical home-lover. The dealers who are handling the "Rishell" line are enthusiastic in their comments anent the reception being accorded these machines, and The HofTay Talking Machine Co., Inc., 500 Fifth avenue, New York, manufacturers of the "Hoffay Airtight Phonograph," announce a rise in the retail price of their machines. The $75 machine in the future will retail at $85, the $100 model at $125, the $150 at $175, the $200 at $225 and the $250 will retail at $275. A publicity campaign will shortly be inaug- urated by the Hoffay concern and some very original methods will be put in force to adver- tise their product. In an early issue of The Talking Machine World will appear illustrations of the different models manufactured and de- scriptions and illustrations of the exclusive fea- tures contained in the Hoffay instruments. Thirty desirable records. You may not have all of these selections We will gladly play any record for you. CROFT Those who use Record Delivery Envelopes KNOW they are cheaper than paper and string Record Delivery Envelopes Long Cabinets Record Stock Envelopes Bagshaw Needles Perfection Record Holders Peerless Locking Plates Catalog Supplement Envelopes Write for samples and prices CLEMENT BEECROFT, 309 W. Susquehanna Avenue, PHILADELPHIA THE TALKING MACHINE WORLD 107 TIME SAVING IN CLOSING SALES Every Unnecessary Call Made Upon a Pros- pect Before Selling Takes Just so Much Time From Other Prospects — Efficiency in Han- dling Prospects — No To-morrow in Sales As he starts out from the store each morning to begin his day's labor, the outside salesman is generally supplied with a list of prospects to be worked upon that particular day or for such a fixed period as the manager may decide, and from that list the outside man, if he is good or has some luck, may close a satisfactory num- ber of sales. In closing those sales, however, there is still another factor and that is, what about the people that were not closed? There are, of course, a large number of pros- pects on the list of every house who never buy a talking machine, who are anxious to own one, and perhaps have actually made known their desires, but who, for financial or other rea- sons, are not in a position to become pur- chasers. There is also, of course, the usual proportion of loss to a competing house, maybe through superior salesmanship on the part of the competitor, through some feature of his line that makes a special appeal, or for other rea- sons that cannot be so readily explained. The real question, however, is that of the prospect who ultimately purchases from the house first securing the name. What about that prospect? Why the delay in selling him? If it takes twelve calls to convince a prospect that he should be- come a customer, why could it not have been done in six, or if it takes six, why could it not have been done in three? A call made by a salesman without direct results costs the house he is working for money. ,He may be drawing a salary based upon a certain quota of sales and may exceed that quota regularly and make a commission on the additional business, but the calls he makes without results are still to be checked up against him. In the brilliant articles on salesmanship, there has been frequent mention made of the man who likes a hard nut to crack, who passes by the easy sales with scorn and dives right into a doubtful proposition. As a matter of fact it is human nature to take the easiest way. If an outside man has twenty prospects to call upon, and actually knows that five are practically ready to buy and that the five at the other end of the list have not yet been convinced of the value of the instrument he is selling, he is going- after those who are ready to buy. The super- salesman we sometimes read about would aban- don them to some of the weaker sisters of the sales force and spend his time convincing the hard ones, but the average man is going to pluck the easiest ones first every time. When it comes down to the more difficult ones, how- ever, and becomes a question of what can be said or done that will convince them to make a quick decision, that is where the salesman can lllllllllllllllllllllllllllllllllllllllllllllllllllll^^^ A Bigger Better Business Wake Up Man Make More Sales File Your Records The Ogden Way Is Unconditionally Guaranteed by Your Jobber SELLS FILES FINDS More Records IN THE SHORTEST TIME- IN THE SMALLEST SPACE Order Direct Naming Your Jobber Rush Orders Shipped From Stock after Nov. 20th Will pay for itself during the rush 1000's of satisfied Dealers our reference ORDER NOW— SAME LOW PRICE Patented — Patented — Patented Ogden Sectional Cabinet Co. Lynchburg, Va. Models No. 1 and No. 31. High Grade Cabinets for rec- ord parlors. Models No. 2 and No. 62. Low in price. High efficien- cy. Patented. either save or spend money for his institution. There may be a legitimate reason for putting off buying that can be so recorded on the card and the minimum of calls arranged to keep the prospect in line until he is ready to capitulate. Then there are cases where there is no real reason for holding off buying. The prospect is simply "stalling" and probably shopping around. Every visit the salesman pays to that prospect without selling means just one visit taken away from some other prospect. It means just so much time taken from the work of the house. It means just so much lost op- portunity for him to increase his sales total, and sales and time undoubtedly represents money, whether the salesman is working on salary or commission. There is no "manana" in selling. The sales- man who has the assurance or feels that the sale can be closed on the next call should pound just that much harder to close the deal at once. He should be less willing to accept "no" for an answer, for that next call if given to another prospect may mean still another sale. There always is the question of lost interest. When prospects take the trouble to inquire about the details of a certain make of talking machine, or to visit the warerooms and inspect the line, they are interested. That's certain, although they may not be interested sufficiently to buy on the spur of the moment. The fact remains, however, that if a prospect is ignored or is not followed up closely, that interest, in most cases, lags with the passing of time. When the talking machine is first seen it is much admired. The prospect feels that he must have it. The next call — it is a very fine in- strument and he would like to have it. The third call — he wishes he could spare the money to buy it. The fourth call — he can't see how he will be able to finance it, and so on. In brief, it will be well to get the order signed while the glamour of the instrument is still in the eyes of the prospect. As the old say- ing very aptly puts it, "strike while the iron is hot." [lllllllllllllllllllillllllllllNllllli PREPAREDNESS \I7E are now ready with our new line of tone arms and sound boxes and also our " " new line of attachments for Edison Phonographs to play Pathe records, and our new attachments for Victor and Columbia machines to play Edison and Pathe records. If interested in quantity lots, will be pleased to send you one of our new catalogs just issued. Write us for quantity prices for the best goods on the market THE UNION PHONOGRAPH SUPPLY COMPANY 1100 WEST NINTH STREET CLEVELAND, OHIO 108 THE TALKING MACHINE WORLD CO-OPERATION WITH OR WITHOUT ENCOURAGEMENT By J. J. BRERETON, Purchasing Agent, American Phonograph Co. Co-operation is the foundation on which is built our modern civilization and was indeed the foundation of all ancient progress and civil- ization as well. Away back in the Stone Age, when man was but little better than the beasts he hunted, he soon found he could accomplish far more by getting some of his fellows to help him. True, they might kill each other in quarrels over the division of the spoils, but without the united efforts of all there would have been no spoils to divide; crude — inefficient, but still — co-operation. Farther along as the idea grew on them, from the few individuals banded together for a spe- cific purpose, and for a short time, came the permanent association of a number of people for many and to a large extent, all purposes, and there you have the tribe. Again you see co- operation; on a larger scale. Tribe fought tribe until finally it began to dawn on some that by combining two tribes with kindred interests against one tribe the outcome was sure — the one tribe was defeated; so tribe after tribe united for their common interest and lo! the nation; co-operation as it exists to-day. Whether it will carry forward to still greater results is not for discussion here, but is something well worth thinking about. The results of co-operation, then, are visible on every side. The co-operation of individuals making for simple friendship and good fellow- ship; the co-operation of groups of individuals for some common object such as the firm, the co-operation of firms to one common end, and big business as we see it to-day is born. To my mind, however, there is an element in connec- tion with co-operation that in being overlooked or not employed destroys or at least hinders much of the effects of co-operation itself; and that is the failing to offer encouragement with the co-operation. There are many ways of co- operating, that not only fail to encourage, but positively discourage. One method of getting a pack mule over a hard place on the trail is to prod it with a sharp stick; this is certainly co-operation, but it is far from encouragement. In the north, it is a common practice when the dog sled gets into a bad place for one man to stick to the gee pole at the rear, while his partner whips the dogs unmercifully at the front; this again is surely co-operation, in that both men are doing something that helps get the sled away, but you could scarcely call it en- couragement as far as the dogs are concerned. Understand there is no question but that even that kind of co-operation accomplishes some- thing; the mule gets over the difficult place (perhaps) when otherwise it might not have; the dogs pull the sled out of the hard place when (perhaps) they might not have been able to, but, is the mule as willing and tractable as it would have been had another kind of co-operation coupled with encouragement been employed? Will the dogs be as easily handled and rush the bad place with as hearty good will when the next one appears, as they would have, had they been helped and encouraged, instead of being helped and whipped? Isn't it human nature, as well as dog nature, to remember the whip and avoid it if possible even at the expense of shy- ing from the trail and possibly wrecking the out- fit? So, in our organization, let us try as far as we can the co-operation with encouragement method, and I believe we will go farther. If you find a wagon stuck in a mud hole and put your shoulder to the wheel to help out, which do you think would produce a better future re- sult, to say: "You fool what the devil did you drive into this for," or "Look here friend, there is a better way in here than this; try it next time." As said before, any kind of co-operation is better than opposition, but why not use the best kind. There is more than merely helping the other fellow out of the hole, you can do that in various ways, even to blowing him out, but the best way for him — for you — and for our or- ganization is to imbue him with the spirit of AFTER TRADE WITH RUSSIA Handbook to Promote It Gotten Out by Cham- ber of Commerce Over 2,000 copies of "Industrial America," a handbook of commercial information in regard to the United States, published by the American Russian Chamber of Commerce, have already been sold in Russia on advance reservations. Under the joint auspices of this organization and the Russian American Chamber of Com- merce in Moscow, the work will be distributed to over 5,000 reliable Russian business firms. keeping out. Telling a man he has "fallen down on his job" is co-operation, for possibly he may not know it, or realize it, but it is one thing to say "well, you have fallen down, as usual, on this" and another to say "well, I am surprised, you have actually fallen down on this"; which method will bring not only present results, but future strenuous efforts to never have it hap- pen again. Try it. The book, besides containing a selected classi- fied directory of American firms interested in the Russian market, presents a survey of the principal features of the industrial resources, and of the industrial, financial and commercial development of the United States. It is printed entirely in Russian. The design of the book is to bring about a closer trade relationship between the two countries. Mrs. R. C. Frame, music dealer of Madill, Okla., has moved to new quarters in that city. She features the Victrola extensively. 20 Years A TALKING machine expert of 20 years' experience, now connected with one of the leading talking machine companies, is desirous of interesting capital in the manufacturing and marketing of a* complete line of Machines and Disc Records 2,500 Master Records can be secured immediately as a working basis. Has a Thorough Technical Knowledge of Recording Plating Pressing Motor Mfg. Marketing An unusual opportunity for any individual or group of individuals who appreciate the unlimited possi- bilities of Machine and Disc Record Business Address "Expert" Care of The Talking Machine World, 373 Fourth Ave., N. Y. THE TALKING MACHINE WORLD 109 PLAN TO MARKET NEW PHONOGRAPH Fritzsch Phonograph Co., Organized in Cincin- nati With Capital Stock of $125,000 to Enter the Field With a New Machine — Those at the Head of the New Concern Cincinnati, O., March 13. — The Fritzsch Pho- nograph Co. will be ready to place its product on the market in about six weeks or two months at the latest. During the past week the com- pany was incorporated at Columbus with a cap- italization of $125,000. It is understood that practically all the stock will be retained by the few persons who were interested in the inven- tions of Bernard and Charles Fritzsch. Bernard Fritzsch has been elected president; Charles Fritzsch, secretary, and Karl F. Wiede- mann, son of Charles W. Wiedemann, treasurer. The company has established quarters at 228 and 230 West Seventh street, where some of the finished product has been assembled. Instru- ments selling from $110 to $300 are to be manu- factured. No attempt will be made to put out a cheaper machine. The air chamber. is built on the principle of the sounding board of a piano or violin and the diaphragm is of wood, the only one of its kind on the market. These innovations produce a clear tone, and practically eliminates all sound of the operation of the needle. ADVICE TO CREDIT MEN Some Rules Given for Dealing With Delinquent Debtors Here is some advice on making collections that A. M. Mecklenburg, of the Mishawaka Woolen Mills, offers to credit grantors through a recent issue of the National Association of Credit Men's Bulletin: "Remember that the delinquent is your friend. Without him you would perhaps be minus a job. He has his problems, just as you have yours. If you can help him with his prob- lems, do it, and it will help you to get your money. "Talk to the point, but not pointedly. There is a difference. "Don't follow the beaten paths too relig- iously. As Louis Eyetinge says, 'Put yourself into your letter and seal the flap.' "Don't tell your debtor that the reason you are asking him to pay is that you need the money. He won't believe you, or, if he does, it will not increase his respect for^your firm. The chances are that such an appeal will miss fire nine times out of ten. "Don't indulge in sarcasm. It has no place in a business letter. Do not write a spineless letter, but give it a backbone that will enable it to stand up in front of your delinquent just as if you were talking to him face to face. "If your debtor is found to be tricky or dis- honest, don't try to meet him on his own ground. You would only be lowering yourself to his level. Fighting the devil with fire is a dangerous experience- at best." DEMONSTRATE SAENQER COURSE New Course in Vocal Training Exploited in Big Way at Wanamaker Auditorium The first gun in the local exploitation of the Oscar Saenger Course in Vocal Training issued by the Victor Talking Machine Co., and which was featured in newspaper advertisements this week, was fired in the auditorium of the Wana- maker store on Tuesday afternoon when a liberal section of the program was devoted to a prac- tical demonstration of the Saenger Course through the playing of the various records com- prising the course with recognized artists taking the part of the students. The demonstration was followed by illustrations of various styles of vocal music by the assisting artists, and at- tracted an audience that packed the auditorium. PLAN COOPERATIVE ADVERTISING Members of the Talking Machine Men, Inc., are considering seriously a suggestion offered by Chas. H. Townsend, of the "Music in the Home" department of the Evening Mail, that the members of the association join together tc carry their individual advertising in trie Eve- ning Mail under a special head and in a special department. By joining in their advertising the talking machine dealers, in their small spaces, would enjoy the lower prices that go with large advertising spaces. PURCHASEJTIE STOCK The T. J. York Music Co., of Corsicana, Tex., has purchased the entire stock of Victrolas and Victor records from J. M, Stell, a furniture dealer, thereby becoming exclusive distributor of the Victor line for that prosperous section of the country. PRIZES AWARDED WINDOW DISPLAYS Judges in Patriotic Window Display Contest Conducted by Columbia Graphopohone Co. Reach Decision This Week — Hundreds of- Photographs Submitted in Competition The judges of the patriotic window display contest, conducted by the Columbia Grapho- phone Co. during February, and which was par- ticipated in by the branch stores and retail dealers throughout the country, met this week and reached a final decision regarding the merits of the various displays submitted, upon which the official awards will be announced by the Co- lumbia Co. The branch stores took great interest in the contest and a great majority of them submitted photographs'. There was only one prize pro- vided for in each of the two divisions — branch stores and dealers — and in the former class the prize was awarded to the display of the Boston store of the Columbia Graphophone Co., of which Fred Mann is the manager. The judges also recognized the excellent displays of the Kansas City store, E. H. McMurtry, manager, and the Chamber street retail store, in New York, R. F. Bolton, manager, by giving them honorable mention, in the order named. The selection of the prize winners from among the hundreds of photographs of dealers' window displays submitted was even a greater problem, but on points the display of the Doyle Furniture Co., Galesburg, 111., was selected as winner, and the following displays given honorable mention in the order named: The Dunn-Taft Co., Colum- bus, O.; L. Grunewald Co., Ltd., New Orleans, La.; D. W. Lerch Co., Canton, O.; Campbell's Department Store, Pittsburgh, Pa., and the Church-Beinkamp Co., Cincinnati, O. The judges selected by the Columbia Grapho- phone Co. were Harry Chapin Plummer, of the Music Trades, and B. Brittain Wilson, of The Talking Machine World. Further details re- garding the contest, together with illustrations of the five window displays, will be presented at an early date. CHAS. EDISON CONVALESCENT Chas. Edison, son of Mr. and Mrs. Thos. A. Edison, who was recently stricken with appendi- citis, and on whom an operation was performed at the Orange Memorial Hospital, is fast regain- ing his old time health and vigor. Mr. Edison's condition was serious for a time, but he rallied successfully and has made splendid strides to- wards recovery, thanks to his healthy constitu- tion. His many friends in the trade rejoice that he is again in good physical trim. TO HANDLE THE ASHLAND LINE Frank Birch and Francis Gilkey, of Cedar Falls, la., have been appointed State agents for the Ashland Phonograph Co., of Chicago. The Bancroft Sporting Goods Store will be the local agents for Birch and Gilkey in Cedar Falls. INCORPORATED The Standard Automatic Mfg. Co., Augusta, Me., has been incorporated with a capital stock of $2,500,000 to manufacture and deal in sound producing and recording machines. HOT AND COLD Albert, very young, was fascinated by the new piano. His older sister took lessons and was at present much concerned with the in- tricacies of the soft pedal and the loud pedal. Albert had to content himself with drumming and personal investigations. One day his mother found him down on the floor under- neath the keyboard, fingering the pedals. "What are you doing, Albert?" she asked with natural curiosity. "I couldn't reach these kettles, so I had to get down to feel which was hot and which was cold," said Albert. LARGEST STOCK of MACHINES and RECORDS in the WEST C URTI S^J%C2LYE AR PACIFIC COAST DISTRIBUTOR SOME GOOD TERRITORY OPEN TO RESPONSIBLE PARTIES 509 So. Ma/a/ St Los Ang£LES, Cal. Talking Machine Supplies and Repair Parts SPECIALTIES: MAIN SPRINGS, GOVERNOR SPRINGS, SOUND BOX PARTS AND NEEDLES THE RENE MANUFACTURING CO. HILLSDALE, NEW JERSEY 110 THE TALKING MACHINE WORLD The more you realize that in the future of this industry the best results begin to come, the more you will appreciate that the Columbia line is best worth your time, your energy and your capital. (Write for "Music Money," a book "full of meat" for those dealers interested in quick and frequent turnover of capital.) Columbia Graphophone Co Wool worth Building, New York HARMFUL ADVERTISING POLICY Dealers Should Not Cheapen or Misstate Facts About Their Own Industry — It Is Very Poor Business and Unfair Competition Once in a while the writer of advertising copy is inspired with an idea of doubtful value. The first part of a recent advertisement published by a retail merchant in a daily paper in a Wis- consin city serves to illustrate the point. In black letters at the head of the advertisement ap- peared, "If Caruso sang like a talking machine his voice would never have been heard outside of his native village. If grand opera sounded like talking machine records the world-famous operatic organization would be unknown." This sort of copy tends to destroy the dignity and worth which the talking machine industry holds in the eye of the public, because "talk- ing machine" is a generic term in the mind of the public connecting all forms of music reproduced on disc and cylinder records. In the trade, too, "talking machine" is accepted generally in the same sense — it is not a patented word nor is it controlled by any one or group of manufacturers. We have only to hark back to the days when talking machines were con- sidered toys to realize that it was the advent of artists like Signor Caruso in the talking ma- chine industry that raised the talking machine out of the novelty class — that gave it new dig- nity. When you stop to think that the voices of such distinguished artists as Caruso, Zenatello, Lazaro and Muratore and a host of others are, as a matter of fact, heard on the talking ma- chine in thousands of homes in thousands of cities all over the world and* by people who never had the pleasure of hearing these famous artists on the stage, it must be obvious that the reproduction of their voices has received in- ternational recognition for musical merit. Everybody knows that the talking machine could never command either the respect or the purchasing desire of the public until the music SUPERSONUS The wonderful new Reproducer with interchangeable playing-point; plays both PAT HE and EDISON DIAMOND DISC RECORDS New Ready for Distribution Reproduces the famous Edison Diamond Disc and Pathe Records on the Victor, Columbia and other standard makes of Talking Machines with results heretofore unequalled, YOU TO BE THE JUDGE. "The most wonderful results I have ever heard," is the statement made by people who fynoiv. The "SUPERSONUS" is High-grade in Every Respect. THE PROGRESSIVE DEALER realizes the increasing demand for an attachment that will play the Edison Diamond Disc and Pathe Records on the Victor, Columbia and other Machines. Here is an instrument that will do it perfectly. BE CONVINCED : Fill out and mail to us the attached coupon at once. Price for sample instrument, $5.75, including Guaranteed Gen- uine Diamond Point for playing Edison Records, and Sapphire Ball Point for playing Pathe Records. NOTE : In ordering, please indicate whether it is to be used on Victor or Columbia Machine. Until further announcement we will be unable to supply our Instrument for attaching to any other machine except the Victor or Columbia. THE WATERBURY INSTRUMENT CO. P. 0. BOX No. 573 THE WATERBURY INSTRUMENT CO. P. 0. Box No. 573, Waterburr, Conn. Gentlemen: Enclosed herewith, we are sending $5.75 for which please send one "Supersonus" Reproducer as per your advertisement in March issue of "Talking Machine World," to be used on Victor? Columbia? Machine (State which kind of machine). It being understood that money will be refunded if the above proves unsatisfac- tory. Yours very truly, WATERBURY, CONN. | I Name. Address produced on it was truly like that of the master artists themselves. The most unfortunate part of the copy just quoted is that it makes the advertiser appear ignorant of the progress of the talking machine, and, therefore, ignorant of what he professes to be his business. The public never has ap- preciated this sort of thing and we sincerely hope that the future will see very little copy of this nature. It smacks too much of libel — or is treason the word — towards the talking ma- chine industry when it is considered as a whole. PLAN ACTIVE CAMPAIGN Humanatone Talking Machine Co. Close Many Important Contracts — Enlarging Manufactur- ing Equipment to Handle Trade Promptly "We are well pleased with the reception ac- corded our line of machines," said J. Gottlieb, secretary and manager of the Humanatone Talk- ing Machine Co., Brooklyn, N. Y., in a chat with The World. "We have closed several important contracts during the past two weeks whereby the Humanatone line will receive excellent rep- resentation in important territories. We are installing new machinery in practically every department of our plant, and when this new equipment is all installed, we will have one of the best equipped plants of its kind in the East." H. A. Singer, president of the Humanatone Talking Machine Co., and prominent in lumber circles was a visitor this week at the company's factory, and commented very favorably upon the progress which is being made in both the manufacturing and sales divisions. In the course of the next few weeks, the company expects to have several important announce- ments regarding its line and policy ready for the trade. INTRODUCE THE SYMPHONY GRAND Latest Addition to the Line of the Fraad Talk- ing Machine Co. Just Announced The Fraad Talking Machine Co., Inc., New York, announce the addition of a new model to their line of talking machines. The new ma- chine is an art style in mahogany for which the Fraad Co. claims to hold exclusive rights. A reproduction of the new machine appears in the Fraad Co.'s advertisement on page 70 of The World this month. The Fraad Talking Machine Co. have been very successful in placing original models be- fore the public, and the announcement of their new instrument, the Symphony Grand, is in line with this policy. A recent statement of Frank Cozens, secretary and sales manager of the concern, was to the effect that announcement, which will be made from time to time of further improvements, would do much to enhance the value of a Fraad agency. Meanwhile the business of the com- pany continues to improve as the list of dealers handling its line increases. THE TALKING MACHINE WORLD 111 THE NEW GRINNELL WAREHOUSE New Wholesale Victrola Quarters of Grinnell Bros, at First and State Streets, Detroit, a Real Achievement in Completeness and Con- venience— Everything Tends to Service Speed Detroit, Mich., March 6. — The new Grinnell Bros, wholesale Victrola warehouse, which has recently been completed on First and State The Reception Room streets, this city, is a real achievement of con- venience and completeness. The reception room is a magnificent affair in which the various models of machines are dis- able feature. The merchandise all enters on one side of the building and, after the necessary allotment, is hastened to the other side of the building where it is promptly discharged through another opening on to the express trucks which are waiting. Commodious elevators of several tons' capacity aid materially in the speed with which this work is accomplished. Another thing that attracts considerable at- tention in a tour of the Grinnell warehouse is the department given over to talking machine parts.. The Grinnell Co. carry an immense stock of all parts which are used in the Victor in- struments, and the system by which this stock is kept is very interesting on account of its prac- tical simplicity. Upstairs there is an immense record depart- ment. This contains nearly half a hundred racks, each ten feet long by ten feet high, all orderly arranged and fitted with moving ladders to in- sure a maximum of speed in filling record orders. The total capacity of this record de- partment is estimated at 600,000 records. The large space occupied by long tables at which many hands are assembling, inspecting and pack- ing the various orders is decidedly unique and when taken in conjunction with the efficient or- ganization of the entire department, probably accounts for the reason that the house of Grin- nell makes a specialty of completing and ship- ping all record orders the same day they are re- ceived. This is a hard and fast rule of the com- pany and no order is considered too small nor any too large not to merit the strictest attention. "The Grinnell Model of Victor Service" is the outcome of many years experience in the business and is largely attributable to A. A. Grinnell, treasurer of the house of Grinnell and managing director of the wholesale department and to C. H. Grinnell, who is director of the wholesale Victrola department. Record Shipping Department played amid highly artistic surroundings. The display of life size pictures of the various Victor artists is particularly large and fine. The record demonstration rooms and the executive offices The Spacious Record Racks of the company closely adjoin the machine dis- play room and this completes a triangle of con- venience for the incoming dealers. The shipping quarters are another commend- DOUBLE SIZE OF BROOKLYN PLANT ■ Paroquette Record Mfg. Co. Meeting Increased Demand for Their Records "Since the introduction of Par-O-Ket records some few months ago, they have enjoyed a sale that has by far exceeded expectation," said an officer of the Paroquette Record Mfg. Co., New York, manufacturer of these records. "We knew that a good quality double disc record at a quarter was what the public wanted, but w'e never realized that it was wanted as badly as our sales indicate. "Some of the largest dealers and jobbers in the country are handling Par-O-Ket records, having recognized the advantages of carrying a record upon which they could depend as to quality, tone, selection, artists, delivery and service." The Paroquette Record Mfg. Co. has dou- bled the size of its plant in the Bush Terminal Buildings in Brooklyn to take care of the in- creased demand for Par-O-Kets. This plant plays an important part with dealers and job- bers who realize that such conditions mean prompt deliveries. The company has called the attention of its dealers to the importance of using medium tone, long tapered steel needles in playing Par-O-Ket records. These needles produce the correct tone and volume and should always be used in playing these records. MAGNET DECALCOMANIE NAMEPLATES FOB TALKING MACHINE CABINETS Etc 1 B SOLD BY HURTEAU.WILLIAMS&C0>i° MONTREAL OTTAWA r" We can furnish the same or similar style as shown herewith, according to the price scale given below. 250 500 1000 J Cold letters, black edged Black lei ground, . $12 $15 $20 Black letters, solid gold back- <tic fcon""**49C with fancy border *P*U Samples upon application, GEO. A. SM1TH-SCHIFFLIN CO. 136 Liberty Street, New York, N.Y. son,® ©tf ianeraiMOKiiD.m. THE READY-FILE INDIANAPOLIS SENSATION Accepted as the most practical filing system for Victrolas Tens and Elevens ever offered at the PRICE. Send $4.00 and your first SAMPLE set will be sent prepaid — or order thru your Victor jobber. Be the first to start sen- sation in your city. AT LEAST, WRITE FOR THE EVIDENCE THE READY-FILE CO., Inc. | 556 Farmers Trust Bldg. INDIANAPOLIS, U.S.A. | 112 THE TALKING MACHINE WORLD THE "MOZART" Wide awake dealers have recognized the sales possibilities of the "Mozart" and achieved impressive success with products in 1916 STYLE A " Mozart Special " Oak or Mahogany Finish DIMENSIONS Height — - 45% inches Width 17 inches Depth 21 inches Retail Price, $55.00 STYLE B "Mozart De Luxe" Oak or Mahogany Finish DIMENSIONS Height 47 inches Width - 23 inches Depth _ 24 inches Retail Price, $100.00 STYLE C "Mozart De Luxe" Oak or Mahogany Finish DIMENSIONS Height 47 inches Width 23 inches Depth 24 inches Retail Price, $100.00 "The Mozart" has Many Distinctive Merits STYLE H — Oak or Mahogany Finish DIMENSIONS Height ...15 inches Width 19 inches Depth 19V£ inches Retail Price, $35.00 Unusual in the refinement of finish, remarkable in its tonal qualities, larger than any other of its class. Owing to its exclusively constructed tone-arm, plays all makes of records perfectly. Actual comparison will quickly prove to you that "The Mozart," seven models, retailing at$l 5.00, $25.00, $35.00,$45.00, $55.00 and $ 1 00.00 is a leader in the field. Every instrument is a remarkable value at the price and allows you a most liberal profit. Exclusive territory still open. Wire or write for our dealer s proposition. The Mozart Talking Machine Company J. P. FITZGERALD, President 1432 TO 1442 NORTH TWENTIETH STREET ST. LOUIS, MISSOURI THE TALKING MACHINE WORLD 113 ELECTRIC MOTORS GROW IN FAVOR Big Demand for Electrically-Driven Talking Machines Has Caused Manufacturers to Adopt Many More Electrical Models Racine, Wis., March 8. — There is no question that the electric motor for running talking ma- chines is growing in favor. During 1916 — espe- cially the holiday season — this fact was brought to the realization of thousands of dealers throughout the country who informed their re- spective manufacturers of the unusual interest in electric machines. Investigation shows that this condition is rapidly growing among the consumer and the trade, and that eventually, electrically-driven phonographs will be in widespread use. As a result of this nearly every manufacturer of high- grade table and floor machines has been seek- ing the right type of electric motor for use in his product. In an interview with George C. Schmitz, president of the Arnold Electric Co., of this city, a concern that manufactures and spe- cializes in small size electric motors, some idea was gained of the general interest aroused among manufacturers in electric motors. "There is no reason," said Mr. Schmitz, "for anyone to crank a phonograph any more than to crank an automobile, and the cranking of a phonograph will soon be as passe as the crank- ing of a motor car. For many years we have been specializing in the manufacture of small size electric motors, and have readily recognized and foreseen the condition in the phonograph world which is just now taking place. Our ex- perience in manufacturing the small type of elec- tric motor has placed us in a favorable condition to take care of the demands of the talking ma- chine manufacturers, and we have perfected an electric motor that has passed the most rigid tests and examinations of big engineers in the phonograph industry. "The clamor for electric motors has developed into two distinct classes. Some manufacturers desire the complete electric unit, including, be- sides the motor, the rheostat, turntable, turn- table mechanism, and transmission, while other manufacturers desire just the motor, to be oper- ated in connection with their own mechanism. My company has prepared to meet these two demands, and has perfected both the complete electric unit, with all the necessary equipment and just the motor alone. "I have just returned from a visit among many large talking machine manufacturers, and the satisfactory tests they have given our motor has resulted in the placing of large orders. Our factory right now is specially equipped to handle this electric motor business, and is in a position to turn our quantities on specified time. A like demand, I understand, exists with other motor manufacturers, and it is my opinion that grad- ually electrically-driven phonographs will sup- plant spring-driven machines, in sections and territories where electric current is available. "This condition which I anticipate in the talking machine business is all the more certain because we are enabled to build electric motors at prices that compare favorably with the high- est grade spring motors. Now that the ex- orbitant cost of electrically-driven machines is eliminated, more and more will the consumers demand them." NEW SERIES OF SAXOPHONE RECORDS The Columbia Graphophone Co., New York, has just announced a series of saxophone rec- ords by the Saxo Sextet, which includes some of the best known saxophone players now appear- ing in professional circles. Announcement of saxophone recordings by the Columbia Co. has been delayed until this The Saxo Sextet time owing to the company's principle to issue no records until practical perfection has been reached in reproducing the instrument or voice in question. In all recording experience no in- strument has presented the difficulties of the saxophone. The tone color is peculiar — there is a hint of the reed, the brass and the strings all in one. In this unique fact lies the charm of saxophone music, and the Columbia Co. feels sure that Saxo Sextet records will be popular. WALTER S. GRAY A VISITOR Philadelphia, Pa., March 8.— Walter S. Gray, Pacific Coast sales agent of the Domestic Talk- ing Machine Corp., is now in the East on a visit to the factory of the Domestic Talking Machine Corp. Mr. Gray is very enthusiastic over the new Domestic line, which will shortly appear on the market, and predicts for it a wonderful reception on the Pacific Coast. Mr. Gray reports that the general talking ma- chine business on the Pacific Coast is in very good shape, and the trade generally seems to anticipate that the year 1917 will be a banner one. ACTIVITY AT THE STARR PLANT Demand for Starr Phonographs so Active That Plant Is Being Rushed to Capacity Cincinnati, O., March 5. — The factories of the Starr Piano Co. are extremely busy at the pres- ent time filling orders for Starr phonographs, and the increase in the number of deliveries makes it certain that there will be no immediate let up in the demand. The company is con- stantly adding new features to its line of in- struments. An automatic motor stop is now introduced as a part of the regular equipment of all models over and including Style III. A tone regulator is a new added feature on Style I. The company is also receiving some favorable comment on the new motor being used on Starr phonographs, and which is made in its entirety in the Starr factory. WALLACE CURRIER DOING WELL Portland, Me., March 4. — The Phonograph Shop, which Wallace Currier opened a few months ago, is forging ahead in commendable shape. Mr. Currier has just completed an inventory of his Edison stock and he has every reason to feel satisfied. Mr. Currier has a most excellent lo- cation and the future is most encouraging all around. Mr. Currier is a man with push and enthusiasm and his Boston experience has been of great value in the management of an Edison shop. At the rate business is growing he may have to increase his facilities which may in- clude the addition of several more booths.
15,356
https://www.wikidata.org/wiki/Q41375490
Wikidata
Semantic data
CC0
null
Bauernhaus
None
Multilingual
Semantic data
59
203
Bauernhaus erdgeschossiger Sandsteinquaderbau mit Fachwerkgiebel, bezeichnet „1807“ Bauernhaus BLfD-ID D-5-76-132-12 Bauernhaus liegt in der Verwaltungseinheit Schwanstetten Bauernhaus Staat Deutschland Bauernhaus Schutzkategorie Baudenkmal in Bayern Bauernhaus ist ein(e) Haus Bauernhaus Bild Bauernhaus in Furth (D-5-76-132-12) 04.jpg Bauernhaus Commons-Kategorie Bauernhaus in Furth (D-5-76-132-12) Bauernhaus Adresse Bauernhaus steht in der Denkmalliste Liste der Baudenkmäler in Schwanstetten Bauernhaus BDA-Baudenkmal-ID 91435 Bauernhaus geographische Koordinaten
37,165
https://github.com/peyman-abdi/telegram-bot/blob/master/src/Objects/InlineQuery/InlineQueryResult.php
Github Open Source
Open Source
BSD-3-Clause
2,021
telegram-bot
peyman-abdi
PHP
Code
45
106
<?php namespace Telegram\Bot\Objects\InlineQuery; /** * @method $this setId($string) Unique identifier for this result, 1-64 Bytes * @method $this setInputMessageContent($object) Content of the message to be sent. * @method $this setReplyMarkup($object) Optional. Inline keyboard attached to the message */ abstract class InlineQueryResult extends InlineBaseObject { }
15,065
https://www.wikidata.org/wiki/Q107619719
Wikidata
Semantic data
CC0
null
Category:Wikipedians in Isère
None
Multilingual
Semantic data
46
111
Category:Wikipedians in Isère Wikimedia category Category:Wikipedians in Isère instance of Wikimedia category Category:Wikipedians in Isère Commons category Wikipedians in Isère Catégorie:Wikipédiens Isère page de catégorie d'un projet Wikimedia Catégorie:Wikipédiens Isère nature de l’élément page de catégorie d'un projet Wikimédia Catégorie:Wikipédiens Isère catégorie Commons Wikipedians in Isère
2,835
https://github.com/emmanuj/grails-spring-security-core/blob/master/test/unit/org/codehaus/groovy/grails/plugins/springsecurity/InterceptUrlMapFilterInvocationDefinitionTests.groovy
Github Open Source
Open Source
Apache-2.0
2,013
grails-spring-security-core
emmanuj
Groovy
Code
478
1,954
/* Copyright 2006-2012 SpringSource. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.codehaus.groovy.grails.plugins.springsecurity import org.codehaus.groovy.grails.commons.ConfigurationHolder as CH import org.codehaus.groovy.grails.web.mapping.UrlMappingInfo import org.codehaus.groovy.grails.web.servlet.mvc.GrailsWebRequest import org.codehaus.groovy.grails.web.util.WebUtils import org.springframework.mock.web.MockFilterChain import org.springframework.mock.web.MockHttpServletRequest import org.springframework.mock.web.MockHttpServletResponse import org.springframework.mock.web.MockServletContext import org.springframework.security.access.SecurityConfig import org.springframework.security.access.vote.AuthenticatedVoter import org.springframework.security.access.vote.RoleVoter import org.springframework.security.web.FilterInvocation import org.springframework.security.web.access.expression.DefaultWebSecurityExpressionHandler import org.springframework.security.web.util.AntUrlPathMatcher /** * @author <a href='mailto:[email protected]'>Burt Beckwith</a> */ class InterceptUrlMapFilterInvocationDefinitionTests extends GroovyTestCase { private _fid = new InterceptUrlMapFilterInvocationDefinition() private final _application = new FakeApplication() /** * {@inheritDoc} * @see junit.framework.TestCase#setUp() */ @Override protected void setUp() { super.setUp() ReflectionUtils.application = _application _fid.urlMatcher = new AntUrlPathMatcher() } void testAfterPropertiesSet() { _fid.urlMatcher = null // simulate not having set it assertEquals 'url matcher is required', shouldFail(IllegalArgumentException) { _fid.afterPropertiesSet() } _fid.urlMatcher = new AntUrlPathMatcher() _fid.afterPropertiesSet() } void testStoreMapping() { assertEquals 0, _fid.configAttributeMap.size() _fid.storeMapping '/foo/bar', ['ROLE_ADMIN'] assertEquals 1, _fid.configAttributeMap.size() _fid.storeMapping '/foo/bar', ['ROLE_USER'] assertEquals 1, _fid.configAttributeMap.size() _fid.storeMapping '/other/path', ['ROLE_SUPERUSER'] assertEquals 2, _fid.configAttributeMap.size() } void testInitialize() { ReflectionUtils.setConfigProperty('interceptUrlMap', ['/foo/**': 'ROLE_ADMIN', '/bar/**': ['ROLE_BAR', 'ROLE_BAZ']]) _fid.roleVoter = new RoleVoter() _fid.authenticatedVoter = new AuthenticatedVoter() _fid.expressionHandler = new DefaultWebSecurityExpressionHandler() assertEquals 0, _fid.configAttributeMap.size() _fid.initialize() assertEquals 2, _fid.configAttributeMap.size() _fid.resetConfigs() _fid.initialize() assertEquals 0, _fid.configAttributeMap.size() } void testDetermineUrl() { def request = new MockHttpServletRequest() def response = new MockHttpServletResponse() def chain = new MockFilterChain() request.contextPath = '/context' request.requestURI = '/context/foo' assertEquals '/foo', _fid.determineUrl(new FilterInvocation(request, response, chain)) request.requestURI = '/context/fOo/Bar?x=1&y=2' assertEquals '/foo/bar', _fid.determineUrl(new FilterInvocation(request, response, chain)) } void testSupports() { assertTrue _fid.supports(FilterInvocation) } void testGetAttributes() { def request = new MockHttpServletRequest() def response = new MockHttpServletResponse() def chain = new MockFilterChain() FilterInvocation filterInvocation = new FilterInvocation(request, response, chain) def matcher = new AntUrlPathMatcher() MockInterceptUrlMapFilterInvocationDefinition fid def initializeFid = { fid = new MockInterceptUrlMapFilterInvocationDefinition() fid.urlMatcher = matcher; fid.initialize() WebUtils.storeGrailsWebRequest new GrailsWebRequest(request, response, new MockServletContext()) fid } def checkConfigAttributeForUrl = {config, String url -> request.requestURI = url fid.url = url assertEquals("Checking config for $url", config, fid.getAttributes(filterInvocation)) } def configAttribute = [new SecurityConfig('ROLE_ADMIN'), new SecurityConfig('ROLE_SUPERUSER')] def moreSpecificConfigAttribute = [new SecurityConfig('ROLE_SUPERUSER')] fid = initializeFid() fid.storeMapping matcher.compile('/secure/**'), configAttribute fid.storeMapping matcher.compile('/secure/reallysecure/**'), moreSpecificConfigAttribute checkConfigAttributeForUrl(configAttribute, '/secure/reallysecure/list') checkConfigAttributeForUrl(configAttribute, '/secure/list') fid = initializeFid() fid.storeMapping matcher.compile('/secure/reallysecure/**'), moreSpecificConfigAttribute fid.storeMapping matcher.compile('/secure/**'), configAttribute checkConfigAttributeForUrl(moreSpecificConfigAttribute, '/secure/reallysecure/list') checkConfigAttributeForUrl(configAttribute, '/secure/list') fid = initializeFid() configAttribute = [new SecurityConfig('IS_AUTHENTICATED_FULLY')] moreSpecificConfigAttribute = [new SecurityConfig('IS_AUTHENTICATED_ANONYMOUSLY')] fid.storeMapping matcher.compile('/unprotected/**'), moreSpecificConfigAttribute fid.storeMapping matcher.compile('/**/*.jsp'), configAttribute checkConfigAttributeForUrl(moreSpecificConfigAttribute, '/unprotected/b.jsp') checkConfigAttributeForUrl(moreSpecificConfigAttribute, '/unprotected/path') checkConfigAttributeForUrl(moreSpecificConfigAttribute, '/unprotected/path/x.jsp') checkConfigAttributeForUrl(configAttribute, '/b.jsp') checkConfigAttributeForUrl(null, '/path') } /** * {@inheritDoc} * @see junit.framework.TestCase#tearDown() */ @Override protected void tearDown() { super.tearDown() ReflectionUtils.application = null SpringSecurityUtils.resetSecurityConfig() CH.config = null } } class MockInterceptUrlMapFilterInvocationDefinition extends InterceptUrlMapFilterInvocationDefinition { String url protected String findGrailsUrl(UrlMappingInfo mapping) { url } }
8,981
https://github.com/hapifhir/org.hl7.fhir.core/blob/master/org.hl7.fhir.convertors/src/main/java/org/hl7/fhir/convertors/conv30_40/datatypes30_40/primitivetypes30_40/DateTime30_40.java
Github Open Source
Open Source
Apache-2.0
2,023
org.hl7.fhir.core
hapifhir
Java
Code
57
394
package org.hl7.fhir.convertors.conv30_40.datatypes30_40.primitivetypes30_40; import org.hl7.fhir.convertors.context.ConversionContext30_40; import org.hl7.fhir.exceptions.FHIRException; public class DateTime30_40 { public static org.hl7.fhir.r4.model.DateTimeType convertDateTime(org.hl7.fhir.dstu3.model.DateTimeType src) throws FHIRException { org.hl7.fhir.r4.model.DateTimeType tgt = src.hasValue() ? new org.hl7.fhir.r4.model.DateTimeType(src.getValueAsString()) : new org.hl7.fhir.r4.model.DateTimeType(); ConversionContext30_40.INSTANCE.getVersionConvertor_30_40().copyElement(src, tgt); return tgt; } public static org.hl7.fhir.dstu3.model.DateTimeType convertDateTime(org.hl7.fhir.r4.model.DateTimeType src) throws FHIRException { org.hl7.fhir.dstu3.model.DateTimeType tgt = src.hasValue() ? new org.hl7.fhir.dstu3.model.DateTimeType(src.getValueAsString()) : new org.hl7.fhir.dstu3.model.DateTimeType(); ConversionContext30_40.INSTANCE.getVersionConvertor_30_40().copyElement(src, tgt); return tgt; } }
261
https://academia.stackexchange.com/questions/83981
StackExchange
Open Web
CC-By-SA
2,017
Stack Exchange
BCLC, Chris H, Jack Aidley, Lynn, Nate Eldredge, Patricia Shanahan, Steve Jessop, eykanal, https://academia.stackexchange.com/users/1010, https://academia.stackexchange.com/users/10220, https://academia.stackexchange.com/users/11440, https://academia.stackexchange.com/users/21026, https://academia.stackexchange.com/users/35918, https://academia.stackexchange.com/users/37858, https://academia.stackexchange.com/users/5614, https://academia.stackexchange.com/users/68607, https://academia.stackexchange.com/users/73, https://academia.stackexchange.com/users/8494, michaeljt, user0721090601
English
Spoken
1,565
2,214
Co-authors request that others do not use "he" as a pronoun - is this reasonable? We are a bunch of people writing a collection of papers. Two of the writers are from Iran (where the common language does not have gendered pronouns), and they have expressed to me some concern with regards to the lack of gender-neutrality in our papers. As you may know, English writing often exhibits some degrees of gender-bias, mainly the use of "he" to refer to a person with an unspecified gender. These co-authors would like to avoid such bias if they are to put their names on the papers. They've told me this as we are close, but haven't talked to anybody else (there are 3 others). Is this a reasonable request? What's the correct thing to do here? I could just ask the others, but what do I do if somebody gets offended by the request and refuses? I doubt it'll happen, but in the current public discourse where "political correctness" is the new pejorative buzz word, I am not so sure. Comments are not for extended discussion; this conversation has been moved to chat. Mathematician Michael Spivak says e: https://en.wikipedia.org/wiki/Spivak_pronoun This is an entirely reasonable request and you should honour it. It is very easy to write English in a manner that avoids the unfortunate use of 'he' as a placeholder for either gender, and doing so avoids needless sexism in your writing. Comments are not for extended discussion; this conversation has been moved to chat. Certainly there are many people in the world who prefer to avoid using gendered pronouns for persons of unspecified gender, so your co-authors' view is not particularly unusual. But there are others who see no problem with this. There are plausible arguments on both sides, and this site is not the place to rehash them. You can see some of the debate on English.SE. Like any request from a co-author, you and the other authors should consider it. If you disagree, deal with it like any set of reasonable adults who disagree: discuss the issue and share your reasons. If necessary, you could agree to settle it by a vote. If all else fails, some authors could withdraw from the paper; the remaining authors might then need to rewrite their contributions. I think it's unlikely to come to that. I would ask that people not use this comment thread to debate which style is "correct". Tha question at English.se is good starting point. It's worth following some of the links in the first comment and looking at some of the tags attached to the question. It would be trciky if an author who had made major contributions (e.g. to an experiment) reached the stage of wanting to withdraw over something like this. "you could agree to settle it by a vote" -- or quite likely you couldn't agree that. Deciding the constitution after you already know everyone's opinions doesn't often work, since the minority is under no obligation to consent to a simple majority vote. But it's worth suggesting, I suppose. That is categorically not the EL&U post to link to. The topic was already very old and as interesting as a bowl of old sick by the time that question was posted. Best see the original English Language and Usage post here. Those posts have several hundred votes, unlike the comparatively poor and ill-informed posts on the page linked to in your answer. Two of the writers are from Iran ... As you may know, English writing often exhibits some degrees of gender-bias, mainly the use of "he" to refer to a person with an unspecified gender. I think this hits the nail on the head in terms of one reason why, possibly, to make the change. As comments point out (or rather, "according to the comments", as I'm not an expert in Farsi/Persian) there aren't gendered pronouns in Persian and so, to them, it presumably feels odd on a very basic level. Is this a reasonable request? It's presumably a piece of work that you have all put a lot of time and work into and, accordingly, have some degree of attachment to. Not to mention that it's going out into the world with your names on it. In that context, I think that any request is reasonable -- that doesn't necessarily mean that any and all changes should (or can) be made, but it's totally fair for people to ask. They've told me this as we are close, but haven't talked to anybody else (there are 3 others). That does, unfortunately, put you in a difficult position, as the go-between. You have my sympathy, for what it's worth. What's the correct thing to do here? I could just ask the others, but what do I do if somebody gets offended by the request and refuses? I would suggest that you could talk to your fellow English-as-a-first-language (I assume) co-authors about this as an abstract topic, if that would help? Ask them their feelings about it, without bringing up th specific request. I acknowledge, though, that it could, potentially, do more harm than good if it gets them set in their ways. Alternatively, explaining that it feels "odd" to your other co-authors as their first language does not use gendered pronouns might help to avoid the "political corectness" concerns that you have. More practically, if it comes down to a (polite) debate: some people have been taught that the word "they" can not be used in the singular, but if it helps you to argue the point, Shakespeare seemed to be perfectly happy with it: There's not a man I meet but doth salute me As if I were their well-acquainted friend A Comedy of Errors, Act IV, Scene 3 or Now leaden slumber with life's strength doth fight; And every one to rest themselves betake, Save thieves, and cares, and troubled minds, that wake. The Rape of Lucree (Credit to Language Log) I will confess that I am something of an evangelist for "they" as a singular pronoun, and have argued succesfully for its use in documents. I have, I think, only ever received one objection, and that was more along the lines of the change being unecessary, or a preference for using the composite (and, in my opinion, stylistically clumsy) "he or she". However, your mileage, of course, may vary. +1 I stated my own arguments in favor of "they" etc. in stackoverflow meta It was being used even before then. The King James Bible has some uses of it. Singular they is in a renaissance, and those in their twenties will read it perfectly naturally and probably a good bit of those of us in our thirties do too. It's not the only solution, of course, but it's the simplest, IMO. @guifa "even before" what? I'm confused. The Comedy of Errors was published several years before the start of work on the King James Bible. @PatriciaShanahan oops, I'm bad with dates. But it also appeared in Chaucer, which is definitely pre-Shakespeare unless I'm really really bad with dates haha I agree “he or she” is clumsy, and it’s also wrong: not everyone uses “he” or “she” pronouns. “They” all the way! I am surprised that no comment that I saw suggested the common practice of randomly switching between "she" and "he". I found it jarring the first time I saw it used, but now rather like it. And of course it is interesting (perhaps even healthy) when for example "she" is used in a context which is usually male. While in some fields this can be a matter of personal preference, as stated in the other answers, keep in mind that in some fields (and journals), avoiding gender bias in your writing may be a stylistic requirement. See, for example, the author submission guidelines in the following journal (under 'Statement on the Use of Gendered Language'): http://anthrosource.onlinelibrary.wiley.com/hub/journal/10.1111/(ISSN)1548-1352/about/author-guidelines.html And the APA 'Guidelines for Unbiased Language': http://supp.apa.org/style/pubman-ch03.00.pdf This is an important point: the journal's style guide made take this decision out of your hands. There's no real reason why you shouldn't comply and try to convince your other co-authors to comply as well. Allow me to offer you some (both good and bad) alternatives to gendered pronouns: Using "(s)he" or "he/she": This doesn't exactly fit the bill of an ungendered pronoun and it's annoying to both read and write. Using an "alternative" pronoun (such as "xer" or what not): I highly recommend AGAINST this. It's weird and is most likely to be met with resistance if you suggest it. Using "they/them/their": Using plural to refer to someone without specifying gender is a very common and accepted. Using "the [noun]": Another common way to do this is to refer to the person with a noun such as "the reader" or whatever noun applies to the person. If done too much though the text becomes needlessly extended and much more annoying. I would recommend using "they" while mixing in "the [noun]" occasionally when you feel that it needs to be more specific who you're referring to. This could be when who you're referring to changes or if you feel like the reference has gone stale after many uses of "they". If who you're referring to never changes you could for example replace the first "they" in every paragraph with "the [noun]".
41,281
https://github.com/NilFoundation/verify.solana.nil.foundation/blob/master/docs/search/pages_1.js
Github Open Source
Open Source
MIT
null
verify.solana.nil.foundation
NilFoundation
JavaScript
Code
11
95
var searchData= [ ['circuit_20definition_69',['Circuit Definition',['../d8/daa/circuit_index.html',1,'']]], ['correct_20validator_20set_20proof_20circuit_70',['Correct Validator Set Proof Circuit',['../d6/d87/circuit_validator.html',1,'circuit_index']]] ];
42,710
https://github.com/codewithrakib/first-django-blog/blob/master/src/blog/views.py
Github Open Source
Open Source
MIT
null
first-django-blog
codewithrakib
Python
Code
467
1,872
from django.shortcuts import render, redirect from django.contrib.auth.models import User from django.contrib import messages from django.contrib.auth.decorators import login_required import datetime from django.http import HttpResponseForbidden from django.utils.text import slugify from account.models import Profile from blog.models import Post, Comment, Reaction from blog.forms import PostCreationForm, EditPostForm, CommentForm, ReactForm def home(request): template_name = 'blog/home.html' posts = Post.objects.filter(publish_status='publish') now = datetime.datetime.now() context = { 'posts': posts, 'now': now } return render(request, template_name, context) def authors(request): template_name = 'blog/authors.html' authors = User.objects.all() context = { 'authors': authors } return render(request, template_name, context) @login_required def create_post(request): if request.method == 'POST': form = PostCreationForm(request.POST) if form.is_valid(): obj = form.save(commit=False) obj.user = request.user # obj.slug = slugify(obj.post_title) obj.save() messages.success(request, f'Post Creation Successful.') if obj.publish_status=='publish': return redirect('published_post', username=request.user.username) else: return redirect('saved_post', username=request.user.username) else: form = PostCreationForm() template_name = 'blog/createPost.html' context = { 'form': form } return render(request, template_name, context) def published_post(request, username): obj = User.objects.get(username=username) id = obj.id banner = obj.profile.blog_banner posts = Post.objects.filter(user=id).filter(publish_status='publish') template_name = 'blog/publishedPost.html' now = datetime.datetime.now() context = { 'posts': posts, 'now': now, 'author': obj, 'banner': banner } return render(request, template_name, context) @login_required def saved_post(request, username): if request.user.username == username: obj = User.objects.get(username=username) id = obj.id username = username banner = obj.profile.blog_banner posts = Post.objects.filter(user=id).filter(publish_status='draft') template_name = 'blog/savedPost.html' now = datetime.datetime.now() context = { 'author': obj, 'posts': posts, 'now': now, 'username': username, 'banner': banner } return render(request, template_name, context) else: return HttpResponseForbidden() def post_detail(request,username,slug): id = User.objects.get(username=username).id post = Post.objects.filter(user=id).filter(slug=slug) post = post[0] now = datetime.datetime.now() comments = Comment.objects.filter(post=post.id) template_name = 'blog/postDetail.html' try: reactinstance = Reaction.objects.get(post=post) except: reactinstance = None if request.method == 'POST': if reactinstance: r_form = ReactForm(request.POST, instance=reactinstance) else: r_form = ReactForm(request.POST) c_form = CommentForm(request.POST) if r_form.is_valid(): react = r_form.cleaned_data['react'] try: r_inst = Reaction.objects.filter(post=post).filter(user=request.user) except: r_inst = None if r_inst: Reaction.objects.filter(user=request.user).filter(post=post).update(react=react) else: Reaction.objects.create(react=react, post=post, user=request.user) return redirect('post_detail', username=username, slug=post.slug) if c_form.is_valid(): obj = c_form.save(commit=False) obj.post = post obj.user = request.user obj.save() messages.success(request, f'Successfully commented.') return redirect('post_detail', username=username, slug=post.slug) else: if reactinstance: r_form = ReactForm( instance=reactinstance) else: r_form = ReactForm() c_form = CommentForm() react_instance = Reaction.objects.filter(post=post) likes = react_instance.filter(react='like').count() dislikes = react_instance.filter(react='dislike').count() noreacts= react_instance.filter(react='noreact').count() # likes = react_instance.total_like() # dislikes = react_instance.total_dislikes() # noreacts = react_instance.total_no_react() context = { 'post': post, 'now': now , 'comments': comments, 'c_form': c_form, 'r_form': r_form, 'likes': likes, 'dislikes': dislikes, 'noreacts': noreacts } return render(request, template_name, context) @login_required def edit_post(request,username,slug): if request.user.username == username: post_instance = Post.objects.get(slug=slug) if request.method=='POST': form = EditPostForm(request.POST, request.FILES, instance=post_instance) if form.is_valid(): form.save() slug=post_instance.slug messages.success(request, f"Post updated successfully") return redirect('post_detail', username=username, slug=slug) else: form = EditPostForm(instance=post_instance) else: return HttpResponseForbidden() template_name='blog/editPost.html' context = { 'form': form } return render(request, template_name, context) @login_required def delete_post(request, username, slug): if request.user.username == username: id = User.objects.get(username=username).id post = Post.objects.filter(user=id).filter(slug=slug) post = post[0] template_name='blog/deletePost.html' context = { 'post_title': post.post_title } if request.method == 'POST': post.delete() messages.success(request, f'Your Post has been deleted.') return redirect('home') return render(request, template_name, context) else: return HttpResponseForbidden()
49,183
AMF/pdf/945/2022/07/FC945450975_20220705.pdf
French Open Data
Open Government
Various open data
2,022
None
AMF
French
Spoken
312
751
Novacyt S.A. («Novacyt» ou la «Société») Participation dans la Société Paris, France et Camb erley , Royaume -Uni – 5 juillet 2022 – Novacyt (EURONEXT GROWTH : ALNOV ; AIM : NCYT), spécialiste international du diagnostic clinique , annonce que Biosynex SA ("Biosynex") lui a notifié le 4 juillet 2022 qu'au 4 juillet 2022, la participation de Biosynex dans la Société sur la base du vote et du capital est de 4,49% (3 167 988 actions). Pour de plus amples renseignements, veuillez consulter le site www.novacyt.com ou contacter : Novacyt SA David Allmond , Chief Executive Officer James McCarthy , Chief Financial Officer +44 (0)1276 600081 SP Angel Corporate Finance LLP (Nominated Adviser and Broker) Matthew Johnson / Charlie Bouverat (Corporate Finance) Vadim Alexandre / Rob Rees (Corporate Broking) +44 (0)20 3470 0470 Numis Securities Limited (Joint Broker) Freddie Barnfield / James Black +44 (0)20 7260 1000 Allegra Finance (French Listing Sponsor) Rémi Durgetto / Yannick Petit +33 (1) 42 22 10 10 [email protected] / [email protected] FTI Consulting (International) Victoria Foster Mitchell / Alex Shaw +44 (0)20 3727 1000 victoria.fostermitchell@ft iconsulting.com / [email protected] FTI Consulting ( France) Arnaud de Cheffontaines FTI Consulting +33 (0)147 03 69 4 8 [email protected] A propos de Novacyt Group Le Groupe Novacyt est une entreprise internationale de diagnostic qui génère un portefeuille croissant de tests de diagnostic in vitro et moléculaire. Ses principales forces résident dans le développement de produits de diagnostic, la commercialisation, le développement et la fabrication pour tiers. Les principales unités commerciales de la Société comprennent Primerdesign et Lab21 Products, qui fournissent une vaste gamme de tests et de réactifs de haute qualité dans le monde entier. Le Groupe sert directe ment les marchés de la microbiologie, de l'hématologie et de la sérologie ainsi que ses partenaires mondiaux, dont les grands acteurs du secteur. Pour plus d'informations, veuillez consulter le site Internet : www.novacyt.com
2,196
https://bg.wikipedia.org/wiki/%D0%9A%D0%B0%D1%80%D0%BC%D0%B0%D0%BD%20%28%D0%BA%D0%BE%D0%BC%D0%BF%D0%B0%D0%BD%D0%B8%D1%8F%29
Wikipedia
Open Web
CC-By-SA
2,023
Карман (компания)
https://bg.wikipedia.org/w/index.php?title=Карман (компания)&action=history
Bulgarian
Spoken
96
264
„Карман“ () е германско автомобилостроително предприятие, базирано в Оснабрюк и съществувало от 1901 до 2010 година. Основана от Вилхелм Карман, компанията се специализира в производството на спортни варианти, най-вече кабриолети, за модели леки автомобили на големите автомобилни компании. Сред марките, произвеждани от „Карман“ в различни периоди са „Фолксваген“, „Порше“, „Мерцедес-Бенц“, „Рено“ и други. В резултат на финансови трудности по време на рецесията от 2008 – 2009 година компанията фалира, като основната ѝ производствена база е купена от „Фолксваген“. Бележки Производители на МПС в Германия Закрити предприятия Предприятия в Долна Саксония Основани в Германия през 1901 година
28,107
https://www.wikidata.org/wiki/Q17383011
Wikidata
Semantic data
CC0
null
Kalle Paronen
None
Multilingual
Semantic data
331
734
Kalle Paronen Kalle Paronen esiintymä kohteesta ihminen Kalle Paronen kansalaisuus Suomi Kalle Paronen sukupuoli mies Kalle Paronen etunimi Kalle Kalle Paronen syntymäaika 1888 Kalle Paronen sukunimi Paronen Kalle Paronen Google Knowledge Graph -tunniste /g/11dylwhyr Kalle Paronen Kalle Paronen instance of human Kalle Paronen country of citizenship Finland Kalle Paronen sex or gender male Kalle Paronen given name Kalle Kalle Paronen date of birth 1888 Kalle Paronen family name Paronen Kalle Paronen Google Knowledge Graph ID /g/11dylwhyr Kalle Paronen Kalle Paronen nature de l’élément être humain Kalle Paronen pays de nationalité Finlande Kalle Paronen sexe ou genre masculin Kalle Paronen prénom Kalle Kalle Paronen date de naissance 1888 Kalle Paronen nom de famille Paronen Kalle Paronen identifiant du Google Knowledge Graph /g/11dylwhyr Kalle Paronen Kalle Paronen primerek od človek Kalle Paronen država državljanstva Finska Kalle Paronen spol moški Kalle Paronen ime Kalle Kalle Paronen datum rojstva 1888 Kalle Paronen priimek Paronen Kalle Paronen oznaka Google Knowledge Graph /g/11dylwhyr Kalle Paronen Kalle Paronen instancia de humanu Kalle Paronen país de nacionalidá Finlandia Kalle Paronen sexu masculín Kalle Paronen nome Kalle Kalle Paronen fecha de nacimientu 1888 Kalle Paronen apellíu Paronen Kalle Paronen Kalle Paronen instancia de ser humano Kalle Paronen país de nacionalidad Finlandia Kalle Paronen sexo o género masculino Kalle Paronen nombre de pila Kalle Kalle Paronen fecha de nacimiento 1888 Kalle Paronen apellido Paronen Kalle Paronen identificador Google Knowledge Graph /g/11dylwhyr Kalle Paronen Kalle Paronen instància de ésser humà Kalle Paronen ciutadania Finlàndia Kalle Paronen sexe o gènere masculí Kalle Paronen prenom Kalle Kalle Paronen data de naixement 1888 Kalle Paronen cognom Paronen Kalle Paronen identificador Google Knowledge Graph /g/11dylwhyr Kalle Paronen Kalle Paronen instancë e njeri Kalle Paronen shtetësia Finlanda Kalle Paronen gjinia mashkull Kalle Paronen emri Kalle Kalle Paronen data e lindjes 1888 Kalle Paronen mbiemri Paronen Kalle Paronen Kalle Paronen sampla de duine Kalle Paronen tír shaoránachta an Fhionlainn Kalle Paronen gnéas nó inscne fireann Kalle Paronen céadainm Kalle Kalle Paronen dáta breithe 1888 Kalle Paronen sloinne Paronen
1,340
https://github.com/shamkuma/newsFeed/blob/master/src/main/java/com/news/feed/newsfeed/controller/NewsFeedController.java
Github Open Source
Open Source
BSD-Source-Code
null
newsFeed
shamkuma
Java
Code
114
524
package com.news.feed.newsfeed.controller; import java.util.List; import javax.ws.rs.Consumes; import javax.ws.rs.core.MediaType; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.web.bind.annotation.RequestBody; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RequestMethod; import org.springframework.web.bind.annotation.RestController; import com.news.feed.newsfeed.service.NewsFeedService; import com.news.feed.vo.InputVO; import com.news.feed.vo.NewsVO; @RestController public class NewsFeedController { private final Logger logger = LoggerFactory.getLogger(this.getClass()); @Autowired NewsFeedService newsFeedService; @RequestMapping(value = "/storeNewsFeed", method = RequestMethod.POST,consumes = { MediaType.APPLICATION_JSON }) public String consumeNewsFeed(@RequestBody NewsVO newsvo) { Boolean result=newsFeedService.saveNews(newsvo); if(result) { return "News Saved"; }else { return "There are some issue in storing News Feed"; } } @RequestMapping(value = "/getNews", method = RequestMethod.POST,produces= {MediaType.APPLICATION_JSON}) @Consumes( MediaType.APPLICATION_JSON ) public NewsVO getNews(@RequestBody InputVO inputVo) { logger.info("NewsFeedController :getNews"); return newsFeedService.getNewsByTimeStamp(inputVo.getTimeStamp()); } @RequestMapping(value = "/getBreakingNews", method = RequestMethod.GET,produces= {MediaType.APPLICATION_JSON}) public List<NewsVO> getBreakingNews() { return newsFeedService.getLatestBreakingNews(); } }
40,116
https://en.wikipedia.org/wiki/Marginal%20use
Wikipedia
Open Web
CC-By-SA
2,023
Marginal use
https://en.wikipedia.org/w/index.php?title=Marginal use&action=history
English
Spoken
189
245
As defined by the Austrian School of economics the marginal use of a good or service is the specific use to which an agent would put a given increase, or the specific use of the good or service that would be abandoned in response to a given decrease. The usefulness of the marginal use thus corresponds to the marginal utility of the good or service. On the assumption that an agent is economically rational, each increase would be put to the specific, feasible, previously unrealized use of greatest priority, and each decrease would result in abandonment of the use of lowest priority amongst the uses to which the good or service had been put. And, in the absence of a complementarity across uses, the “law” of diminishing marginal utility will obtain. The Austrian School of economics explicitly arrives at its conception of marginal utility as the utility of the marginal use, and “Grenznutzen” (the Austrian School term from which “marginal utility” was originally derived in translation) literally means border-use; other schools usually do not make an explicit connection. See also Marginalism References Marginal concepts Consumer theory Utility Austrian School
37,034
https://ro.wikipedia.org/wiki/Leucophora%20aurantifrons
Wikipedia
Open Web
CC-By-SA
2,023
Leucophora aurantifrons
https://ro.wikipedia.org/w/index.php?title=Leucophora aurantifrons&action=history
Romanian
Spoken
33
74
Leucophora aurantifrons este o specie de muște din genul Leucophora, familia Anthomyiidae, descrisă de Fan și Zhong în anul 1984. Conform Catalogue of Life specia Leucophora aurantifrons nu are subspecii cunoscute. Referințe Leucophora
35,403
https://hu.wikipedia.org/wiki/Sz%C3%ADriai%20polg%C3%A1rh%C3%A1bor%C3%BA
Wikipedia
Open Web
CC-By-SA
2,023
Szíriai polgárháború
https://hu.wikipedia.org/w/index.php?title=Szíriai polgárháború&action=history
Hungarian
Spoken
19,923
55,994
A szíriai polgárháború 2011 márciusában kezdődött, eleinte kormányellenes demonstrációkkal, a tunéziai események hatására. Az emberek a politikai elit autoritárius hatalomgyakorlása ellen tiltakozva vonultak utcára, de a demonstrálók kezdetben csak reformokat követeltek, nem rezsimváltást. A rendfenntartók erőszakos beavatkozása miatt a tüntetések zavargássá fajultak, majd a rendőrség éles lőszerrel lőtt az emberekre, a lázongások gyorsabb elfojtása érdekében pedig harckocsikat is bevetettek. Novembertől a Rijád el-Aszad tábornok vezetésével megalakult SZSZH indított gerillaháborút a hadsereg ellen. A kezdetben kizárólag könnyűfegyverekkel rendelkező lázadók a szomszédos arab országok és Törökország hathatós támogatásával jelentős katonai erővé nőtték ki magukat, 2012 őszéig már az ország több települését ellenőrzésük alá vonták. A helyzetet azonban tovább bonyolította, hogy 2012 nyarán az ország északkeleti részén lakó kurdok milíciái is beavatkoztak a harcba, Aleppóig nyomulva előre. A kurd lázadók egyszerre kerültek összetűzésbe a kormányerőkkel és az SZSZH-val. Mindemellett a konfliktusnak erősen szektariánus jelleget ad az a tény is, hogy a helybéli keresztények és alaviták a többségben alavitákból álló Aszad-rezsimet támogatják, míg a lázadók többsége a szunnita lakosság soraiból kerül ki. A szélsőségesebb felkelők rendszeresen hajtanak végre támadásokat a keresztény és alavita közösség ellen, míg a hadsereg és a kormányt támogató Sabiha milícia az ellenzéket támogató szíriai települések lakossága közt rendez időnként kisebb-nagyobb vérfürdőket. 2012 júniusának közepére az ellenzék és a kormányerők közötti harc annyira kiszélesedett, hogy az ENSZ vezető személyei és az Egyesült Államok a felkelést már szabályos polgárháborúnak minősítették. A többségében szunnita felkelőket hivatalosan Szaúd-Arábia, Katar, az Öböl-menti államok, Törökország, az Egyesült Államok, az Egyesült Királyság és Franciaország támogatják. Nem állami szinten iraki szunniták, csecsenek, afgánok, nyugat-európai dzsihádisták harcolnak az oldalukon. E széles koalíciót főként Aszad megbuktatásának terve kapcsolja össze, de a vélemények eltérőek a későbbi rendezéssel kapcsolatban, nem utolsósorban az Iszlám Állam felemelkedése miatt. A kormányerők támogatása ennél jóval korlátozottabb, 2015 előtt elsősorban Irán és a libanoni Hezbollah nyújtott segítséget, ugyanakkor az Irak lakosságának közel 70%-át kitevő síiták szimpátiájára is számíthatnak. A 2015-ben kezdődő orosz beavatkozás, ugyanakkor nagy segítség a területei jelentős részeit elveszítő Aszad-kormányzatnak. Előzmények Szíria 1944-ben nyilvánította ki függetlenségét Franciaországtól, amelynek azt megelőzően gyarmata (mandátumterülete) volt, de igazi függetlenségét csak 1946-ban a francia hadsereg teljes kivonulása után nyerte el. Két évtizeddel később, 1963-ban a Baasz Párt vette át a hatalmat az ország felett, majd 1966-ban puccsszerűen kizárták a többi pártot a kormányzásból, később azonban az 1967-es hatnapos háborúban elszenvedett vereség és az addig Szíriához tartozó Golán-fennsík izraeli megszállása belső ellentéteket okozott a Baasz Párton belül is, így 1970-ben az ún. Javító forradalom keretében az addigi védelmi miniszter, Háfez el-Aszad vette át a hatalmat, diktatórikus hatalmat építve ki. Háfez el-Aszad harminc évig irányította az országot, mikor 2000-ben elhalálozott, fia, Bassár el-Aszad vette át a hatalmat. Az ő elnökségének első éveiben enyhített az állam diktatórikus berendezkedésén és jelentős mértékben javított az ország külpolitikai helyzetén is. Szabadon bocsátotta a politikai foglyokat és nagyobb szabadságot adott a médiának, de rövid idő múlva ezeket az intézkedéseit visszavonta, a korlátozott reformokat csak gazdasági téren folytatta. Al-Aszad uralmának elnyomó jellegét növeli, hogy az országban 1963 óta érvényben van egy rendkívüli állapotot elrendelő törvény, amely hatalmi visszaélésekre ad lehetőséget: erre hivatkozva a rendszer ellenségeit rutinszerűen bebörtönözhetik. Az emberek elkeseredését tovább fokozta a munkanélküliség ugrásszerű növekedése is, valamint vallási feszültségek is súlyosbítják a kormány viszonyát az ország lakosságával. Aszad elnök és a körülötte csoportosuló hatalmi elit a síiták alavita ágához tartoznak, a lakosság nagyobb része azonban szunnita. A felkelés során az ellenzékiek legnagyobb része is a szunniták köréből került ki, ellenben Aszadnak a muszlim vallás síita ágához való tartozásnak köszönhetően sikerült elnyernie a legnagyobb síita ország, Irán támogatását. A szíriai lázadásnak további erős vallási színezetet ad az a tény, hogy a lakosság mintegy 10%-át kitevő keresztény lakosság nem csatlakozott a kormányellenes felkeléshez, sőt egy jelentős részük nyíltan támogatja az Aszad-rezsimet. Ennek legfőbb oka, hogy Aszad biztosította a keresztények számára a teljeskörű vallásszabadságot, sőt számos keresztény személy magas pozíciókat tölthetett be az Aszad-rezsim idején. A tüntetések során viszont a demonstrálók néhány radikálisabb ága alavita- és keresztényellenes transzparenseket is felmutatott, ezzel előre elriasztva a keresztények többségét a tüntetések támogatásától. A polgárháború során ismét felszínre került az ország kurd kisebbségének problémája is. A kurd számít az ország legnagyobb etnikai kisebbségének, közel kétmillió fővel, mely az összlakosság 9%-át teszi ki. A népesség legnagyobb része az ország északi részén él, legjelentősebb városaik Kamisli (Qamişlo), Haszaka (Hesîçe) és Ajn al-Arab (Kobanê). A szíriai kurd lakosságot számtalan diszkriminatív intézkedés sújtotta Háfez és Bassár el-Aszad uralma alatt. A hatóságok betiltották a kurd zászló használatát, a kurd nyelv használatát hivatalos ügyek intézésekor, illetve a kurd gyermekek kizárólag arab nevet kaphattak. A kurdok helyzetét tovább nehezítette, hogy 1962-ben több mint 20%-uk elvesztette szíriai állampolgárságát, egy, a nemzetközi jogot sértő rendelet értelmében, többségük azóta sem vált állampolgárrá. Kormányellenes tüntetésekre már sor került 2004-ben is, az ország északkeleti részén fekvő Kamisli városában, ekkor a rendfenntartókkal vívott harcban 30 tüntető vesztette életét. Az egy évvel későbbi tüntetésben három személy halt meg. Az első tüntetések A legelső tüntetésekre 2011 január végén került sor, de ezek még korántsem voltak nagy horderejűek és egyelőre a rendőrség sem lépett fel erőszakos módszerekkel a tüntetőkkel szemben. Az első erőszakos tömegoszlatásra február 2-án került sor, amikor a rendőrség egy 20 főből álló csoportot vert szét Damaszkuszban, akik szimpátiatüntetést tartottak a Mubarak rendszerét megdöntő tüntetők mellett. Bassár Al-Aszad elnök január 31-én, hogy a tüntetéseknek elejét vegye, a The Wall Street Journalnak adott interjújában bejelentette, hogy fontos gazdasági és politikai reformokat fog bevezetni. Egyúttal kinyilvánította rokonszenvét az arab országokban zajló tüntetésekkel és felszólította az országok vezetőit, hogy tegyenek eleget a tömegek követeléseinek. Az elnök nyilatkozata ellenére azonban elkezdődött a Twitter és Facebook internetes közösségi oldalakon a tüntetések szervezése. A szervezők kijelentették, hogy nem az elnök személye ellen van kifogásuk, hanem az autoriter országvezetési stílus, a korrupció és a "vagyon nem igazságos elosztása" miatt tiltakoznak. Utóbbi alapja, hogy Bassár el-Aszad rezsimje nagyméretű privatizációba kezdett az eseményeket megelőző években, ami a korrupcióval párosodva óriási magánvagyonok felhalmozódásához vezetett, míg az átlagemberek életszínvonalát a 2008 óta tartó monetáris válság erősen megviselte. Február 4-re meghirdették a harag napját, amely azonban elbukott, mivel senki sem jelent meg az utcákon. Ajman Abdel Núr szerint ez annak köszönhető, hogy a szíriaiak nem voltak hozzászokva az interneten szervezett tüntetésekhez, másrészt pedig az ellenzéki csoportok is túlzottan megosztottak voltak. Február 18-án Damaszkuszban sor került egy nagyobb demonstrációra. Ekkor mintegy 1500 ember gyűlt össze, egy helybeli üzlettulajdonos brutális megverése miatt tiltakozva. Erőszak alkalmazására nem került sor, a belügyminiszter megígérte az ügy kivizsgálását. Február 22-én mintegy 200 főnyi csoport vonult a líbiai nagykövetség elé, tiltakozva Moammer Kadhafi erőszakos fellépéséért a líbiai tüntetők ellen, és egyúttal követelték a nagykövettől az ország elhagyását. A rendfenntartók szétverték a tüntetést, 14 személyt letartóztattak, de később szabadon engedték őket. A felkelés A konfliktus március 6-án tovább súlyosbodott, amikor az ország déli részén található Dara városában a hatóságok letartóztattak 15 gyereket, akik a rendszer bukását követelő graffitikkel írták össze a falakat. Tiltakozásul tüntetések kezdődtek, melyben a rendfenntartók a tömegbe lőttek, melynek következtében négy ember meghalt. Ugyanezen a napon az al-Dzsazíra Szíria a következő dominó a sorban? címmel jelentetett meg cikket, melyben kijelentik, hogy "a fiatal és jól képzett szíriai rétegek akarják maguknak és megérdemlik a szabadság ízét", majd Ribal al-Aszad, a régebb óta az Egyesült Államokban élő, rendszerkritikus Aszad-családtag kommünikéjét közölték. Március 11-én hajnalban azonosítatlan elkövetők éles lőszert használva a sötétség leple alatt támadtak a darai Omari-mecset mellett éjszakára letáborozó tüntetőkre. A lövöldözésben legkevesebb 5 ember halt meg, többek között egy orvos, egy ápoló és egy mentősofőr is. A tüntetők szerint az orvlövészek végeztek az áldozatokkal; a kormány ezt tagadta. Március 15-ére a kormányellenes tüntetések átterjedtek több más városra is, többek között Damaszkuszra, Homszra és Banijaszra. Március 25-ig Darában már 44 embert gyilkoltak meg a biztonsági erők. Ugyanezen a napon a várostól 40 km-re fekvő Szanamejnben a biztonsági erők sortüze 20 emberrel végzett. A Darában demonstrálók ledöntötték a volt elnök, Háfez el-Aszad szobrát. Időközben egyéb nagyvárosokban is zavargások zajlottak, ezek közül Homszban és Latakiában is életét vesztette egy-egy tüntető. A szíriai kormány reformok bevezetését ígérte, valamint Bassár el-Aszad elnök elrendelte a letartóztatott tüntetők szabadon bocsátását is, egyúttal pedig ígéretet tett arra, hogy bíróság elé állítják azokat, akik részt vettek a darai tüntetők meggyilkolásában. Március 26-ára a szíriai ellenzék egyes tagjai Facebookon keresztül népfelkelésre szólították fel az embereket. Időközben a kormány katonai egységeket vezényelt Latakiába, valamint el-Aszad elnök hívei is tüntetéseket tartottak az ország nagyvárosaiban. Március 27-én két újabb tüntető halt meg Latakiában. A hatóságok szerint a gyilkosságot „fegyveres banditák” követték el, a tüntetők szerint azonban a két személyt katonák lőtték le. Március 29-én a zavargások hatására Muhammad Nádzsi al-Otari miniszterelnök lemondott és feloszlatta kormányát. Egy nappal később el-Aszad elnök beszédet tartott, amelyben összeesküvésnek nevezte a szíriai eseményeket, de egyúttal általános reformokat ígért és a szíriai tüntetők haláláért felelős személyek bíróság elé állítását. Az "összeesküvés" jelző elleni tiltakozás gyanánt már másnap újabb tüntetésre került sor Latakiában, a katonák pedig tüzet nyitottak a tömegre. A lövöldözésben újabb 25 ember halt meg. Április 1-jén újabb nagyarányú tüntetésekre került sor Szíria több nagyvárosában. A rendfenntartók ismét a tömegbe lőttek, tíz ember halálát okozva (nyolcan Damaszkuszban, ketten Darában vesztették életüket). Április 3-án a szíriai elnök Ádel Szafar addigi mezőgazdasági és agrárreformügyi minisztert bízta meg kormányalakítással. Április 8-án újabb nagyarányú tüntetésekre került sor Szíria nagyvárosaiban. A karhatalom ismét a tömegbe lőtt, Darában mintegy 25 ember meghalt. A kormány továbbra is tagadta, hogy a rendfenntartó erők állnának a mészárlás mögött, a hivatalos közlemények szerint fegyveres bandák támadásai okozták az emberek halálát. Április 15-én ismét több tízezer fős tüntetésekre került sor Damaszkuszban és Szíria nagyvárosaiban. A damaszkuszi tüntetők a futballban használatos jelzést, sárga lapot lobogtatva figyelmeztették a kormányt, a rendőrség azonban ismét közbeavatkozott, könnygázzal és gumibottal feloszlatva a tömeget. Április 17-én letette az esküt az új kormány, ennek alkalmából el-Aszad elnök bejelentette, hogy pár nap múlva feloldja a rendkívüli állapotot, és újabb politikai reformokra tett ígéretet. Ennek ellenére még aznap tüntetés kezdődött Homszban, ahol a kormányerők újra éles lőszerrel lőttek a demonstrálók közé, 17 ember halálát okozva. Másnap újabb tüntetésekre került sor, melynek következtében újabb négy tüntető vesztette életét. Április 19-én egy – állítólag – titkosrendőrök által halálra kínzott törzsi vezető temetése után újabb tüntetés kezdődött Homszban. A rendőrség a tömegbe lőtt, legkevesebb 20 ember halálát okozva, valamint lelőttek egy katonát is, aki nem volt hajlandó tüzet nyitni. Április 21-én az elnök feloldotta a csaknem ötven éve érvényben levő szükségállapotot, amelynek eltörlése a tüntetők fő követelése volt. A szíriai nagyvárosokban azonban ennek ellenére sem értek véget a tiltakozások, az ellenzékiek többsége már el-Aszad távozását követelte. Az elnök hivatalos proklamációjában lehetőséget ígért békés demonstrációk tartására is, ezért április 22-re "óriás méretű" demonstrációt hirdetett meg a szíriai ellenzék, a kormányígéret komolyságának tesztelésére. A rendőrség azonban továbbra is a szokásos módon lépett fel a tüntetők ellen, éles lőszerrel a tömegbe lőve. A nap folyamán összesen 103 tüntető vesztette életét. Letartóztatások és nyomásgyakorlás A szíriai rendőrség már a tüntetések kezdeti szakaszában több neves ellenzéki személyt letartóztatott. Az események eszkalálódását követően a letartóztatások nagyobb méreteket öltöttek, a szíriai kormány a vonatkozó jogszabályt is módosította, lehetővé téve a hatóságoknak, hogy minden gyanúsítottat nyolc napig fogságban tarthassanak vádemelés nélkül is. Ezt a jogszabályt különösen akkor alkalmazták jelentős mértékben, mikor április végén a hadsereg a lázadás fészkeinek számító városok ellen offenzívát indított. Az érintett városok több száz férfi lakosát helyezték vizsgálati fogság alá. A letartóztatott politikai aktivistákat és ellenzéki civileket fogva tartóik rendszeresen kínozták. A Human Rights Watch által gyűjtött adatok szerint a szíriai titkosszolgálatok 27 "kínzóközpontot" működtetnek országszerte, a fogva tartottak száma pedig több tízezerre tehető. Néhány, a börtönökből kiszabadult ellenzéki elmondásai alapján az emberjogi szervezet legalább húsz alkalmazott kínzási módot jegyzett fel, ilyenek például az emberek bottal és sodronnyal való verése, savval leöntése, körmük kitépése vagy akár nemi erőszaknak való kitétele. Különösen nagy port kavart amikor 2011 júniusában a szíriai hatóságok Darában halálra kínoztak egy 13 éves fiút. A kisfiú holttestéről videó felvételt is készítettek, melyen a fiút ért ütések és lövések nyomai is látszanak. A kormány a belföldi médiára is teljes körű nyomást gyakorolt a rendfenntartók által alkalmazott erőszak eltussolására. Néhány újságírót, akik szimpatizáltak a tüntetőkkel, letartóztattak. A hivatalos propaganda (mindenekelőtt a hivatalos állami hírügynökség, a SANA) az ellenzékieket kollektíven "fegyveres bandáknak" és terroristáknak nevezi, az egész konfliktust pedig "külföldről kezdeményezett összeesküvésnek" tekinti. A kormány több esetben is korlátozta a mobilszolgáltatást és az internetet. Amikor augusztus 14-én a hadsereg támadást indított Latakia kikötőváros ellen, a települést az offenzíva ideje alatt teljesen lekapcsolták a távközlési hálózatról. Mindkét fél propaganda gépezete előszeretettel tett közzé olyan – másik felet lejáratni akaró – videofelvételeket, melyekről később kiderült, hogy más országokban zajló konfliktusok idején készültek. A kormány engedményei A kormány – a demonstrációk visszaszorítása érdekében – politikai és gazdasági reformokat helyezett kilátásba. Mindenekelőtt márciusban csökkentették a sorkatonai szolgálat idejét, valamint el-Aszad elnök menesztette a korrupciós botrányairól hírhedt darai kormányzót is. A kormány ígéretet tett továbbá politikai foglyok szabadon bocsátására, az adók csökkentésére, a közalkalmazottak fizetésének növelésére, a sajtószabadságra és új munkahelyek teremtésére, mindazonáltal ezen ígéretek egyikét sem valósították meg. A kormány tett néhány engedményt a többségi szunnita lakosság irányába is. Engedélyezték a nikáb használatát a szunnita rítust követő tanárok számára, illetve bezárták az ország egyetlen kaszinóját, melyet a konzervatív muszlimok többsége az "iszlámhoz nem méltónak" tekintett. A legjelentősebb engedmény azonban a már közel ötven éve érvényben levő szükségállapot eltörlése volt. El-Aszad elnök emellett egy nyilatkozatban engedélyezte a békés tüntetések tartását is, ennek ellenére a rendfenntartók továbbra is erőszakkal léptek fel az utcára vonulók ellen, éles lőszert is használva. Hadműveletek az ellenzéki városok ellen Április 25-én a biztonsági erők 33 személyt lőttek agyon Dzsabla és Dúma városokban. Ugyanaznap a hadsereg páncélos alakulatokkal offenzívát indított a felkelés fészkének tartott Dara ellen, melyet megszállt. A katonákkal szemben helybéli fegyveresek vették fel a harcot, az összecsapásokban legkevesebb 50 fegyveres és civil vesztette életét, illetve 25 katona meghalt, további 177-en megsebesültek. A BBC értesülései szerint az ostrom alatt 81 dezertőr katonát végeztek ki. Banijaszban szolidaritási tüntetést tartottak a darai ellenzéki tüntetők mellett, a rendfenntartók itt azonban kivételesen nem avatkoztak közbe. Április 30-án a hadsereg megrohamozta és elfoglalta a kormányellenes tüntetések központjának számító darai al-Omari mecsetet. A tüntetők vezetőjét, Ahmed asz-Szajaszin imámot nem sikerült elfogni, de az imám fiát és hat további embert megöltek. Május 6-án egy újabb mészárlás hatására, amelynek során Homszban legkevesebb hatan meghaltak, az ENSZ szankciókat vezetett be a szíriai vezetés több tagja ellen, így Bassár el-Aszad elnök ellen is. Az érintett politikusok külföldi bankszámláit zárolták és utazási korlátozást alkalmaztak velük szemben. Május 5-re a hadsereg nagyrészt elfojtotta a darai lázongást, így a tankok és katonák többségét kivonták a városból, majd Banijasz szunniták által lakott negyedeibe küldték őket, amelyek a helyi kormányellenes tüntetések központjának számítottak. A tüntetők élőláncot vontak a negyedek köré, így próbálva megakadályozni a katonai műveletet. 2011. május 14-én a nemzetközi tiltakozások hatására a szíriai kormány bejelentette, hogy visszavonják a katonai alakulatokat a megszállt Darából és Banijaszból, valamint megígérte, hogy párbeszédet kezd a tüntetőkkel. Június 1-jén Aszad aláírta az általános amnesztiáról szóló rendeletet és bejelentette, hogy létrehozzák a nemzeti párbeszéd bizottságát, amelynek feladata lesz a alkotmánymódosítás előkészítése. Ennek ellenére már június 4-én nagyarányú vérengzésre került sor, amikor Hamában a rendfenntartók és mesterlövészek támadtak a tüntetőkre, 34 ember halálát okozva. Június elején Dzsiszr-es-Szugúrban a kormány közlése szerint a felkelők közel 120 rendőrrel és biztonsági emberrel végeztek. Erre válaszul a hadsereg újabb hadműveletbe kezdett. A város környéki falvakat nehéztüzérséggel bombázták, a várost magát helikopterekkel és harckocsikkal lőtték. Két nap alatt több mint négyezer lakos a szomszédos Törökországba menekült át, számos katona dezertált és a biztonsági erők mintegy 50 tagja átállt a felkelők oldalára. Az alig nyolc napos katonai hadműveletben azonban a hadsereg győzelmet aratott, a harcokban legkevesebb 172 lázadó és civil vesztette életét. Június 19-én a szíriai emigrációs ellenzék létrehozta a Szíriai Nemzeti Tanácsot, melynek a tanács szóvivője szerint célja, hogy összefogja az ellenzéki erőket a rezsim megbuktatására valamint egy szalonképes ellenzéki szervezet létrehozása, mely kivívhatja magának a nemzetközi közvélemény támogatását el-Aszad megbuktatására. Július 11-én a kormánypárt mellett demonstrálók megtámadták és megrongálták az Egyesült Államok szíriai nagykövetségét, valamint megkíséreltek bejutni Franciaország nagykövetségére is, de ezt a biztonsági őrök megakadályozták. A tüntetők az ellen tiltakoztak, hogy a két ország nagykövetei az ellenzék egyik legfontosabb városába, Hamába utaztak és itt éles hangon elítélték a kormányerők brutális fellépését az ellenzéki tüntetőkkel szemben. A nagykövetség megrongálása miatt az Egyesült Államok kifejezte tiltakozását és kártérítést követelt a szíriai kormánytól. Július 15-én sor került a szíriai forrongások addigi legnagyobb tüntetésére, melynek során több tízezren vonultak az utcára a rezsim bukását követelve. A rendfenntartók ismét a tömegbe lőttek, legkevesebb 17 ember halálát okozva és több százat megsebesítve. Július 31-én a hadsereg tankokkal intézett támadást az ellenzék központjának számító Hamá ellen. A tankok és gépfegyveres katonák válogatás nélkül lőttek az emberekre, az épületek tetejéről pedig mesterlövészek támadták a tömeget. Az ellenállók barikádokat emeltek – amelyeket azonban a tankok áttörtek – és kőzáporral, Molotov-koktélokkal, valamint könnyűfegyverekkel próbálták meg felvenni a harcot. Az egy hónapos ostromnak – amely a hadsereg ideiglenes győzelmével végződött – 216 halálos áldozata volt. 2011 augusztusának első hetében a hadsereg nagy erejű offenzívát indított a felkelők kezén levő városok ellen. A legnagyobb horderejű támadás Dajr ez-Zaur ellen indult, melyet felfegyverzett törzsi harcosok (majd később a Szabad Szíriai Hadsereg katonái) védtek a kormánycsapatokkal szemben, a harcokban több mint 200 ember vesztette életét. A lázadóknak 2012. augusztus 13-án egy MiG–23 vadászgépet is sikerült lelőniük, ez volt az első alkalom a Szíriai Légierő számára, hogy harcban elvesztett egy repülőgépet, a jom kippuri háború (1973) óta. Mikor a szíriai páncélosok megszálltak több, a török határ mellett fekvő települést is, Szaúd-Arábia, Kuvait és Bahrein tiltakozásként visszahívta nagykövetét az országból. Törökország is tiltakozását fejezte ki a történtek miatt, de a diplomáciai kapcsolatok megszakítására ekkor még nem került sor. Augusztus 14-én a hadsereg harckocsikkal indított támadást Latakia kikötőváros ellen, a városra két hadihajó is tüzet nyitott. A települést ugyanakkor lekapcsolták a távközlési hálózatról is. Az alig hat napos sikeres offenzívának 52 halálos áldozata volt. Szeptember 25-én atrocitás érte Franciaország szíriai nagykövetét, Éric Chevalliert, akit egy rendszerpárti milíciához tartozó fiatalok kővel és tojással dobáltak meg, miközben egy Bassár el-Aszad elnököt éltető szöveget skandáltak. Ugyanaznap néhány átállt katonatiszt Rijád el-Aszad repülős tábornok vezetésével létrehozta a Szabad Szíriai Hadsereget. Időközben ismeretlenek feltörték hét nagyobb szíriai város és több kormányhivatal honlapját, amelyre megtámadott ellenzékiekről készült videókat és a kormányt bíráló üzeneteket töltöttek fel. Az amerikai nagykövet, Robert Stephen Ford egy ellenzéki vezetővel találkozott, aki a felkelők nevében kijelentette, hogy elutasítják a nemzetközi erők katonai segítségét, legyen szó a NATO-ról, az Egyesült Államokról, vagy akár Törökországról. A találkozó után kormánypárti tüntetők támadtak a nagykövet gépkocsijára, tojásokkal és kövekkel dobálva meg. Hillary Clinton külügyminiszter tiltakozását fejezte ki a történtek miatt és követelte, hogy a szíriai kormány tegyen eleget a diplomáciai képviseletek védelmének, a nemzetközi kötelezettségeknek megfelelően. Az ismételt támadásokra hivatkozva azonban a nagykövet október 24-én elhagyta Szíriát, egyúttal az ellen is tiltakozva, hogy a szíriai hatóságok korlátozták mozgásszabadságát. Október 6-án a szíriai hadsereg menekülő ellenzékieket üldözve betört Libanon területére és egy menekültet agyonlőtt. Október 7-én ismeretlen hovatartozású fegyveresek saját házában megölték Mesál Tamo kurd aktivistát. Az ellenzéki vezető temetésén a biztonsági erők a tömegbe lőttek, két embert megölve, többeket megsebesítve. Az eset miatt felháborodva, Berlinben szolidaritási tüntetést tartottak, melynek során több mint harminc tüntető betört az ország szíriai nagykövetségére, miközben társaik festékbombákkal dobálták az épületet. A szíriai nagykövet segítséget kért a német rendőrségtől, akik a behatolókat kikísérték az épületből, az incidensben senki sem sebesült meg. A szíriai tüntetések október közepére alábbhagytak, de miután elterjedt a híre, hogy a líbiai felkelők végeztek Moammer Kadhafi diktátorral, új erőre kaptak. 2011. október 28-án szíriai katonák 40 ellenzéki tüntetőt öltek meg és tankokkal kezdték lőni Homsz központját. A homszi felkelők az utcára vonulva követelték, hogy az ENSZ Szíriát is repüléstilalmi övezetté nyilvánítsa. Az ENSZ főtitkár és az Arab Liga is ismételten elítélte a civilek elleni erőszak alkalmazását, válaszul el-Aszad elnök a felkelés kitörése óta először nyilatkozott egy nyugati újságnak, a Sunday Telegraphnak, melyben nem várt következményekkel fenyegette meg a nyugati országokat, egy szíriai katonai beavatkozás esetére. Kijelentette, hogy Szíria "nem Egyiptom, nem Tunézia és nem Jemen", a nyugati beavatkozás pedig legalább olyan súlyos konfliktust idézne elő, mint Afganisztánban. Az elnök elismerte, hogy a felkelés kezdete óta valóban "sok hibát" követtek el, de szerinte most már kizárólag terroristák ellen harcolnak – akik a Muszlim Testvériséggel és az Al-Káidával vannak összeköttetésben – de már közel vannak győzelem kivívásához. December 22-én a szíriai hadsereg körbevette a török határ melletti Kfar Ovajd falut, majd tankokat, rakétavetőket és nehézgéppuskákat használva vérengzést rendeztek a lakosok között, összesen 110 személy életét kioltva. Miután az Arab Liga kijelentette, hogy egy megfigyelő delegációt küld az országba, a hadsereg gyors offenzívába kezdett az ellenállás letörésére. December 23-án heves támadást indítottak Homsz ellen, ahol az ágyúkkal, gránátvetőkkel és gépfegyverekkel végrehajtott támadásban három nap alatt legkevesebb 20-an haltak meg. December 27-én, az 50 fős megfigyelőcsoport érkezése napján az ellenzék Homszban egy több mint tízezer fős tüntetést szervezett, a tömeget a rendfenntartók könnygázzal igyekeztek feloszlatni. A megfigyelők időközben találkoztak Homsz tartomány kormányzójával, majd a város azon körzeteit látogatták meg, ahol korábban a legsúlyosabbak voltak a harcok a lázadók és a rendfenntartók között. December 30-án Szíriában összesen 74 településen, több mint negyedmillió ellenzéki tüntető vonult utcára. A szíriai biztonsági erők legkevesebb 12 tüntetővel végeztek, a lövöldözésben pedig ellenzéki források szerint 5 rendfenntartó vesztette életét. Időközben a Hamász palesztin szervezet megkezdte kivonulását az országból, arra hivatkozva, hogy az elnök elleni lázadással bizonytalanná vált az ország belpolitikai helyzete, másrészt pedig a szíriai kormány által támogatott Hamász nem szeretné ha nevét összekapcsolnák a tüntetőket sújtó megtorlással. 2012. február 3-án offenzíva indult a felkelők fellegvárának számító Homsz város ellen, melyben a kormányerők nehéztüzérséget és tankokat is bevettek, sőt február 15-én két vadászrepülőgép mért csapásokat városbeli célpontokra, lebombázva a helybeli olajfinomító üzemét ellátó vezetéket is. Február 15-én a hadsereg páncélozott harcjárművek fedezetével behatolt Damaszkusz egyik belső negyedébe, ahol házkutatásokat tartottak és embereket vettek őrizetbe. Február 16-án ismét a déli Dara város lett a kormánycsapatok katonai műveleteinek célpontja. A hadsereg harckocsik támogatásával ostrom alá vette a Szabad Szíriai Hadsereg által ellenőrzött városrészeket, akik jórészt Kalasnyikov gépkarabélyokkal viszonozták a tüzet. Február 22-én Homszban legkevesebb 30 fő vesztette életét a tüzérségi támadásokban, köztük a The Sunday Times-nak tudósító Marie Colvin amerikai és Rémi Ochlik francia újságíró is, akiknek tartózkodási helyét tüzérségi lövedékekkel lőtték szét. Habár az ellenzék szerint a külföldiek tudatos támadásnak estek áldozatul, a szíriai kormány visszautasította a vádat. Február 25-én a hadsereg a hosszas tüzérségi előkészítés után szárazföldi offenzívát indított Homsz ellen. A Szabad Szíriai Hadsereg közölte, hogy a Homszra nehezedő nyomás enyhítésére az ország más részein fokozzák az ellenállást. 2012 március elején a szíriai hadsereg taposóaknákat telepített a Szíriából menekülők által használt főbb útvonalakra, Libanon és Törökország felé. A Human Rights Watch az akció azonnali beszüntetésére szólította fel a kormányt, amely azonban válaszra sem méltatta az emberjogi szervezetet. A szerveződő ellenzéki mozgalmak A felkelés kitörését követően megkezdődött az ellenzéki mozgalmak aktivitása is, egy, a líbiaihoz hasonló nemzeti tanács létrehozására, mely sikerrel vehetné fel a tárgyalásokat a külföldi államokkal a felkelés támogatásáért. A kezdeti periódusban több kisebb ellenzéki szervezet is létezett, melyek végül egyesülve létrehozták a Szíriai Nemzeti Tanácsot, melynek megalakulását 2011. augusztus 23-án jelentették be, Isztambulban. A szervezet magában egyesítette a legtöbb szíriai ellenzéki szervezetet, valamint a Szírián kívüli politikai száműzötteket, a tanács élére Burhán Galiún professzort nevezve ki. Egy belső konfliktust követően azonban Galiún 2012. május 17-én lemondott pozíciójáról, helyette a kurd Abdulbászet Sziedát választották meg június 10-én. 2012 novemberéig nyolc állam ismerte el hivatalosan is az SZNT-t tárgyalópartnernek, köztük az Amerikai Egyesült Államok is. A polgárháborút megnyerő líbiai Átmeneti Nemzeti Tanács 2011. október 19-én az SZNT-t a szíriai állam egyedüli hivatalos képviselőjévé nyilvánította. 2012. november 9-én Abdulbászet Szieda lemondott a nemzeti tanács vezetéséről, helyére egy keresztény politikust, George Szabrát választották meg a szervezet elnökévé. 2011 nyarán megalakult a Nemzeti Koordinációs Bizottság egy Demokratikus Változásért (NKBDV) nevű szervezet, melyet az ellenzéki Hasszán Abdel Azim alapított. A bizottság sokáig az SZNT riválisának számított, elsődleges céljának a rezsimmel való békés megegyezést tekintette, ennek is köszönhető, hogy a konfliktus militarizálódásának következtében jelentősen csökkent a befolyása. Az SZNT és az SZSZH is az Aszad-rezsim titkolt támogatásával vádolta meg a szervezetet. Ennek ellenére, az Öböl Menti Együttműködési Tanács (GCC) hathatós közbenjárásával megegyezés jött létre az SZNT és az NKBDV között, melynek eredményeként 2012. november 11-én Dohában megalapították a Szíriai Forradalmi és Ellenzéki Erők Nemzeti Koalícióját (röviden Szíriai Nemzeti Koalíció), elnökké Moaz al-Hátib egykori imámot téve meg. A tanácsot már másnap elismerte Szíria egyedüli hivatalos képviselőjévé Bahrein, az Egyesült Arab Emírségek, Katar, Kuvait, Omán illetve Szaúd-Arábia. Két nappal később Franciaország is elismerte a szervezetet Szíria hivatalos képviselőjének, majd november 15-én Törökország, 19-én Olaszország, hosszas tárgyalások után pedig 20-án az Egyesült Királyság részéről történt meg az elismerés. Wiliam Hague külügyminiszter egy sajtókonferencián kijelentette, hogy az ellenzék megsegítésére egy katonai akciót sem tart kizártnak, de – mint fogalmazott – a helyzet megoldásában a diplomáciának kell dominálnia. Laurent Fabius francia külügyminiszter november 15-én fegyverek szállítását helyezte kilátásba. December 12-én Barack Obama amerikai elnök is elismerte a koalíciót Szíria hivatalos képviselőjének. Az új koalíció létrejötte azonban nem aratott osztatlan sikert a szíriai fegyveres csoportok között. Míg az SZSZH üdvözölte az egységes ellenzéki szervezet létrejöttét, addig Aleppóban 14 iszlamista fegyveres alakulat, köztük a jelentős létszámot kitevő Al-Nuszra Front és a Tavhíd Brigád tagjai egy videóüzenetben szembehelyezkedtek a nemzeti koalícióval, majd kinyilvánították szándékukat, miszerint Szíriából egy iszlamista államot kell létrehozni, a saría törvénykezés alapján. December 24-én ezek a csoportosulások egy közös koalíciót hoztak létre, Szíriai Iszlám Front néven, melynek fő mozgatóelvének az iszlám vallást tették meg. 2013. március 18-án a Szíriai Nemzeti Koalíció (SZNK) miniszterelnököt választott a szervezet élére Hasszán Hitto személyében. Habár Hittot a 48 szavazó közül 35 támogatta, az SZSZH nem volt hajlandó elismerni miniszterelnökként. Nem sokkal később, március 24-én az ellenzéki képviselők közötti egyenlőtlenségekre hivatkozva Moaz al-Hátib bejelentette lemondását a koalíció éléről. Utódjául George Szabrát, az SZNT elnökét választották meg április 22-én az ellenzéki mozgalmakat tömörítő szervezet élére ideiglenes jelleggel. Kurd ellenzéki szervezetek A szíriai kurdok aktivizálódásában a legfontosabb szerepet a Demokratikus Egyesülés Pártja (PYD) töltötte be, melyet 2003-ban hoztak létre illegalitásban kurd aktivisták, a Kurd Munkáspárt (PKK) támogatásával. Mindazonáltal 2012 nyarán a párt elnöke, Száleh Muszlim Mohammed egy, a török kormánynak címzett beszédében tagadta, hogy a PKK-val együttműködne a szervezet, mint fogalmazott: "a két párt közt csak ideológiai hasonlóság van." A PYD a konfliktus kitörését követően a Nemzeti Koordinációs Bizottság egy Demokratikus Változásért szervezethez csatlakozott, míg riválisa, a 2011. október 26-án Irakban létrejött Kurd Nemzeti Tanács az SZNT-vel lépett koalícióra. A két kurd szervezet közti kezdeti ellenségeskedésnek (melynek során a KNT még Mesál Tamo kurd aktivista meggyilkolásával is megvádolta a PYD-et) végül egy 2012. július 12-én Erbílben aláírt megegyezés vetett véget, melynek során létrejött a Kurd Legfelsőbb Bizottság, mely a két szervezet tevékenységét igyekszik összehangolni. Az erbíli megegyezés eredményeképpen állították fel a Népi Védelmi Alakulatokat (YPG), mely a bizottság fegyveres szárnyaként vesz részt a kormányellenes harcokban. A szervezet 2012 nyarán 4000-4500 fegyveressel rendelkezett. Terrorizmus a konfliktus alatt Iszlamista szervezetek Az országban harcoló lázadók közé iszlamista szervezetek is beszivárogtak. Ezek egy része bizonyítottan szoros kapcsolatban állt az Al-Káidával, főként annak az iraki szárnyával. Ezek az iszlamista szervezetek elsősorban egy, az iszlám vallási törvénykezésen, a saríán alapuló állam felépítéséért fogtak fegyvert. 2012 februárjában maga Ajmán az-Zavahiri, az Al-Káida jelenlegi vezetője szólította fel szimpatizánsait az Aszad-rezsim elleni harcra, de egyúttal figyelmeztette őket, hogy tartózkodjanak Törökország és a Nyugat segítségének igénybevételétől. Június 12-én az al-Kaida újabb videófelvételt tett közzé, melyen a szervezet második számú vezetője, Abu Jahja al-Líbi (akit egy amerikai drón Pakisztánban megölt, egy héttel a felvétel közzététele előtt) Aszadot zsarnoknak nevezte, kormányát pedig bűnös rezsimnek és felszólította a szervezet szíriai tagjait a harc folytatására, valamint az iraki, jordániai és török tagokat arra buzdította, hogy keljenek szíriai "testvéreik" segítségére. Ennek megfelelően, rendszeresen érkeztek is az országba dzsihádista harcosok, főként Irakból, Líbiából, Tunéziából és Szaúd-Arábiából. A CIA információi szerint ezek az iszlamisták a főként Katarból és Szaúd-Arábiából érkező fegyverszállítmányok révén jutnak utánpótláshoz. Az Al-Káida szíriai jelenlétét az is alátámasztja, hogy a kormányerők és lázadók közti harcok idején az Idlib kormányzóság területén több településen is kitűzték az Al-Káida zászlaját. A Szíria területén tevékenykedő iszlamista szervezetek közül a két legjelentősebb az Ahrar as-Sám és az Al-Nuszra Front. Mindkettő 2011 végén alakult meg, szalafista muszlim harcosok részvételével, és al-kaidás kapcsolattal bírnak. A szervezetek többé-kevésbé együttműködnek a Szabad Szíriai Hadsereggel a kormány elleni harcban, de saját parancsnokokaik vannak. Az iszlamistákat felelősség terheli a szíriai vallási kisebbségek, főként az alaviták elleni támadások miatt. Az Al-Nuszra Front vállalta a felelősséget a Szíriában elkövetett öngyilkos és robbantásos merényletek többségéért, valamint egy szíriai újságíró kivégzéséért. A szervezet mindamellett, hogy "szent háborút" hirdetett a szíriai kormány és hadsereg ellen, rendszeresen hajt végre támadásokat az ország vallási kisebbségei ellen, valamint az Amerikai Egyesült Államokat és Izraelt az iszlám ellenségeinek nyilvánította. Mindezek ellenére az SZSZH rendszeresen hajt végre az Al-Nuszra Fronttal közösen hadműveleteket. Az SZSZH egyik parancsnoka egyik nyilatkozatában egyenesen a lázadók elitalakulatának nevezte a csoportot, melynek tagjai – állítása szerint – a legtöbb harci tapasztalattal rendelkeznek a lázadók közül. A terrortámadásokra hivatkozva az Egyesült Államok kormánya a szervezetet terrorista alakulatnak nyilvánította. A döntés ellen a Muszlim Testvériség szóvivője tiltakozását fejezte ki. 2013 márciusában a szervezet hivatalosan is bejelentette az Al-Káidához fűződő kapcsolatait. 2013 júliusában az Al-Nuszra Front fegyveresei meggyilkolták az SZSZH egyik parancsnokát, Kamal Hamamit. A 2013-as év folyamán egyre inkább megsokszorozódtak az iszlamista és mérsékeltebb lázadók közti összecsapások. Ennek folyományaként szeptember 25-én 11 iszlamista fegyveres szervezet (élén az Al-Nuszra Fronttal) megtagadta a Szíriai Nemzeti Koalíció fennhatóságának elismerését, kijelentve, hogy annak tagjai "idegenek által mozgatott bábok". 2013. november 22-én hét iszlamista lázadó szervezet (az Ahrar as-Sám, a Dzsájs al-Iszlám, a Szukor as-Sám, a Liva al-Tavhid, a Liva al-Hakk, az Anszar as-Sám és a Kurd Iszlám Front) egy közös Iszlám Frontot hozott létre, a közös célért küzdő szervezetek tevékenységének összehangolására. A konfliktusban új fejezetet nyitott az Iraki és Levantei Iszlám Állam fellépése, mely 2013 áprilisától kezdve egy gyors előrenyomulás következtében az SZSZH fegyvereseit kiűzve elfoglalta Szíria északi részét, ezzel a legjelentősebb lázadó fegyveres szervezetté válva. A szervezet 2014 nyarára Szíria közel 1/3-át birtokolta, majd ugyanez év nyarán váratlanul gyors előrenyomulásba kezdett Irak északi részén, jelentős területeket hajtva uralma alá. Az elfoglalt területen a szervezet vezetője, Abu Bakr al-Bagdadi kikiáltotta az Iszlám Kalifátust, saját magát téve meg kalifának. Az Iszlám Állam tevékenysége korlátozott méretű amerikai intervenciót vont maga után Irak területén, de az amerikai védelmi minisztérium közlése szerint 2014 júniusában amerikai kommandósok Szíria területén is végrehajtottak egy hadműveletet a szervezet fegyveresei ellen. A hadműveletekre válaszul az iszlamisták kivégeztek egy amerikai túszt, James Foley amerikai újságírót, akit még 2012-ben ejtettek foglyul Északkelet-Szíriában. Néhány héttel később hasonló sorsra jutott Steven Sotloff újságíró is. Terrortámadások 2011. december 23-án két öngyilkos merényletet hajtottak végre Damaszkuszban, egy-egy biztonsági épületet támadva meg. A felkelés kezdete óta ez volt az első ilyen jellegű incidens. A 44 halálos áldozatot követelő támadást végül az Al-Nuszra Front vállalta magára. Pan Gimun ENSZ főtitkár elítélte a történteket, terrorista cselekménynek nevezve a támadást. 2012. január 3-án újabb öngyilkos merényletre került sor Damaszkuszban egy autóbusz ellen, a támadásban több mint egy tucat ember – főként rendőrök – halt meg. Az ellenzék a kormányt vádolta meg a robbantással, mely szerintük így próbálja meg lejáratni őket. Március 17-én autóba rejtett pokolgépekkel robbantottak fel egy rendőrségi épületet és egy felderítő központot. A detonációban 27-en meghaltak, 97-en megsebesültek. A terrorcselekménnyel a kormány az Al-Káidát vádolta meg. Egy nappal később újabb gépkocsiba rejtett pokolgép robbant fel Aleppóban, a biztonsági szervek helyi központjánál. A robbanásnak halálos áldozatai is voltak. Április 27-én újabb öngyilkos merénylő robbantotta fel magát Damaszkusz központjában. A robbantásnak 10 halálos áldozta volt és további 20-an megsebesültek. Két nappal később fegyveresek elraboltak két magyar állampolgárságú férfit Dajr ez-Zaur város közelében. A magyar Terrorelhárítási Központ (TEK) munkatársai május 4-én az országba utaztak, a túszok kiszabadítása érdekében, időközben a damaszkuszi nagykövet is a térségbe utazott a terület kormányzójának társaságában. Május 5-én egy pokolgépes merényletet követtek el Damaszkuszban katonai járművek ellen, míg Aleppóban kettőt: egyet egy autómosó ellen – melynek tulajdonosa a Sabiha milícia tagja – és egyet egy katonákat szállító autóbusz ellen. Az aleppói merényletekben összesen nyolcan vesztették életüket, Damaszkuszban emberéletben nem esett kár, de a pokolgépek detonációi megrongáltak kilenc járművet. Május 10-én két öngyilkos merénylő robbantotta fel magát Damaszkuszban, egy katonai létesítmény mellett. A robbanásnak 55 halálos áldozata és 372 sebesültje volt, ekkor ez a merénylet járt a legtöbb halálos áldozattal a konfliktus kitörése óta. Május 19-én az észak-szíriai Dajr ez-Zaurban egy autóba rejtett pokolgép hét embert megölt, megközelítőleg százat megsebesített. Május 22-én libanoni források szerint szíriai szunnita lázadók elraboltak 12 síita felekezetű libanoni zarándokot, akik Irakból tartottak hazafele. Az SZSZH vezetősége tagadta, hogy ők állnának az emberrablás mögött, ennek ellenére Bejrút síita lakossága tüntetést tartott az SZSZH ellen, autógumikat égetve. Végül, négy nap múlva fogva tartóik elengedték a túszokat, akik épségben hazatérhettek Bejrútba. Július 18-án egy testőrnek álcázott öngyilkos merénylő robbantotta fel magát Damaszkuszban, a Szíriai Biztonsági Szolgálat vezetőinek ülésén, a támadásban meghalt a korábbi védelmi miniszter és Aszad elnök sógora, Asszef Savkat. Aznap estére estére belehalt sérüléseibe Davúd Radzsa hivatalban lévő és Hasszán Turkmani egykori védelmi miniszter, valamint Hisám Ihtijár, a Nemzetbiztonsági Hivatal vezetője is. A támadást az SZSZH és egy szélsőséges szervezet, a Liva al-Iszlám egyaránt magára vállalta. Pan Gimun ENSZ főtitkár elítélte a támadást, elfogadhatatlannak nevezve azt. Október 4-én az Al-Nuszra Front újabb öngyilkos merényleteket hajtott végre Aleppóban, a támadásban 48 ember vesztette életét. Ezt követően újabb pokolgépes merényletre került sor Homszban, amelyben 14-en vesztették életüket és legkevesebb 24 fő megsebesült. 2013 januárjában tisztázatlan körülmények között rakétatámadás érte az aleppói egyetemet, melyben 82 személy vesztette életét, több mint százan megsebesültek. A lázadók a légierőt vádolták meg célzott légitámadás végrehajtásával, míg a kormány a lázadókat vádolta meg a támadással, melyre szerintük előre eltervezve az egyetemi vizsgák első napján került sor. Március 6-án 21 fülöp-szigeteki ENSZ békefenntartót ejtettek foglyul magukat Jarmúk mártírjainak nevező fegyveresek a Golán-fennsík határvidékén. A lázadók saját elmondásuk szerint ezzel a szíriai hadsereg visszavonulását szerették volna elérni egy közeli faluból. Pan Gimun ENSZ-főtitkár, a Fülöp-szigetek kormánya és az ENSZ BT elnöke, Vitalij Csurkin azonban elítélte a történteket és a békefenntartók azonnali szabadon engedését követelte. Szálim Idrisz ezredes, az SZSZH egyik parancsnoka is felszólította a lázadókat a túszok szabadon engedésére. Ez március 9-én meg is történt, a békefenntartók Jordánia területére távozhattak. Március 21-én Damaszkuszban egy sikeres pokolgépes merényletet követtek el egy kormánypárti szunnita egyházi személyiség ellen. A merényletnek összesen 14 halálos áldozata volt és több mint 40 sebesültje. A Szabad Szíriai Hadsereg gerillaharca A Szabad Szíriai Hadsereg (SZSZH) megalakulását 2011. július 29-én jelentette be a hadseregből dezertált katonatisztek egy csoportja, Rijád el-Aszad korábbi repülős ezredes vezetésével. A szervezet főhadiszállása 2012 szeptemberéig Törökországban, a szír határ mellett fekvő Hatay tartományban volt, a török hadsereg védnöksége alatt. Az SZSZH-t rövidesen az SZNT, az NKBDV és a nyugati államok többsége is elismerte a lázadók fő katonai erejének. Az SZSZH felszerelése a kezdeti időszakban főként Kalasnyikov gépkarabélyokból és RPG–7 kézi páncéltörő gránátvetőkből állt, később azonban a Szaúd-Arábiából és Jordániából érkező fegyverszállítmányok, illetve a feketepiac révén M16, FN FAL és Heckler & Koch G3 gépkarabélyokhoz, illetve PKM géppuskákhoz is jutottak. 2012 februárjában – az SZSZH közleménye és fényképfelvételek alapján – a lázadók zsákmányoltak három tankot, melyeket Homszban vetettek be a kormányerők ellen. Időközben légvédelmi rakétákhoz is jutottak, melyek segítségével 2012 októberében lelőttek egy MiG–23 vadászrepülőgépet Dajr ez-Zaur közelében. 2011. november 14-én az SZSZH végrehajtotta első szervezett támadását a kormányerők ellen a jordániai határ mellett, a rajtaütés azonban döntetlenül végződött. November 16-án hajnalban szintén a lázadó hadsereg katonái gépfegyverekkel és gránátvetőkkel támadtak a Damaszkusz elővárosában levő légierő titkosszolgálatának a székhelyére. Ez idő alatt egy másik alakulat rátámadt a szír hírszerzés épületére is. A lázadók közlése alapján a légierő titkosszolgálatának épülete megsemmisült, a hivatalos állami források azonban a harc hírét sem erősítették meg. November 20-án hajnalban két rakéta csapódott be a Baasz Párt damaszkuszi irodáiba. Mivel az épület jórészt üres volt, személyi sérülés nem történt. Az SZSZH a támadást állításuk szerint csak üzenetnek szánta a kormány számára. December folyamán is szinte mindennaposak voltak az összecsapások a dezertőrök és a hadsereg között. December 19-én dezertőr katonák Homsz környékén kilőttek három páncélos járművet, valamint összecsaptak a hadsereggel a Törökországgal szomszédos Idlib kormányzóságban. A harcokban 14 civil és 6 katona halt meg. Ildib tartományban szíriai katonák kíséreltek meg átállni a dezertőrökhöz, de saját társaik fordultak velük szembe, legéppuskázva 60-70 dezertőrt, a lojális katonák közül hárman vesztették életüket. December 30-án a szervezet bejelentette, hogy az Arab Liga megfigyelőinek szíriai tartózkodásának idejére felfüggeszti tevékenységét, a megfigyelők iránti tiszteletből és annak demonstrálására, hogy nincsenek fegyveres "terrorista bandák" Szíriában. 2012. január 8-án újabb heves összecsapásokra került sor az ország déli részén, Dara kormányzóságban a két fél között. A harcokban legkevesebb 11-en vesztették életüket, a kormányhadsereg további 20 katonája megsebesült. A harcok alatt 9 katona átszökött a dezertőrökhöz. Január 19-én saját katonái Hamában megölték a katonai titkosszolgálat egyik tábornokát, miután megtagadták a tőle kapott tűzparancsot. A kormánycsapatok ostrom alá vették az ország északi részén lévő Zabadáni települést. A Szabad Szíriai Hadsereg katonái és a lakosság azonban együttes erővel verte vissza a nehéztüzérséget is bevető katonaságot, így a hadsereg végül hat nap ostrom után visszavonult, az ellenállók kezén hagyva a települést. Február elején azonban egy újabb offenzíva során a hadsereg sikeresen visszafoglalta a települést. Január 27-ére az SZSZH-nak komoly áttörést sikerült elérnie, amikor bevette Damaszkusz elővárosát, Dúmát. A kormányerők gránátvetők és páncélosok bevetésével próbálták visszafoglalni a területet, a felkelők azonban – annak ellenére, hogy csak Kalasnyikov gépkarabélyokat használnak – rendre visszaverték a támadásokat. A felkelő hadsereg időközben Homsz városában is harcolt a kormányerőkkel, akik erőteljes offenzívát indítottak a város ellen. Dezertőr katonák ugyanitt elfogtak hét iráni katonát, akik a Forradalmi Gárda tagjainak vallották magukat. Az eset után az SZSZH vezetői felszólították Iránt, hogy vonja ki csapatait Szíria területéről. Január 29-én hajnalban a szíriai hadsereg minden eddiginél nagyobb offenzívát indított Damaszkusz külvárosának visszafoglalásáért. Az ellenzék által ellenőrzött területet mintegy 2000 katona ostromolta folyamatosan, legkevesebb 50 tank támogatásával. A támadás következményeként a Szíriai Nemzeti Tanács az ENSZ BT-hez fordult segítségért, a civil lakosság megvédését kérve. Január 30-án végül az SZSZH kénytelen volt visszavonulni Damaszkusz megszállt területeiről, habár saját kijelentésük szerint csak taktikai visszavonulást hajtottak végre. A három napos csatában több mint 200-an vesztették életüket, a terület visszafoglalása után pedig a szíriai hadsereg több tucat helyi lakost letartóztatott és elhurcolt. Március 2-án a SZSZH feladta Homsz városának védelmét és a civil lakosság védelmére hivatkozva kivonult a városból. Erre válaszul a szíriai ellenzék tüntetést szervezett Damaszkuszban, de a biztonsági erők AK–47 gépfegyverekkel tüzet nyitottak a tömegre. Március 11-én a hadsereg nagy erejű offenzívát indított Idlib kormányzóság több települése ellen. Velük szemben az SZSZH alakulatai vették fel a harcot, a hadsereg azonban április 14-re visszavonulásra kényszerítette őket a térség legjelentősebb településeiről. Március 19-én heves tűzharc robbant ki Damaszkusz délnyugati külvárosában, Mazzé negyedben, ahol az ENSZ szíriai irodája és a nagykövetségek többsége is található (többek között a magyar is). A harcokban a kormányerők rakétagránátokat is bevetettek. A sorozatos támadásokra válaszul, a hadsereg március 21-én hajnalban harckocsik és helikopterek támogatásával indítottak támadást Damaszkusz két külvárosa, valamint a Damaszkusz-Aleppó országút mentén levő felkelő állások ellen. A rövid életű fegyverszüneti megállapodás 2012. április 12-én, helyi idő szerint reggel hat órakor a Kofi Annan nemzetközi különmegbízott által kidolgozott béketerv értelmében tűzszünet lépett életbe a kormányerők és az SZSZH között (köszönhetően Oroszország és Kína felszólításának, valamint a Nagy-Britannia által kilátásba helyezett megtorló lépéseknek). A kormányhadsereg és a lázadók is kijelentették, hogy habár nem intéznek támadást a másik fél ellen, de továbbra is teljes fokú készültségben maradnak. Ugyanakkor a kormány amnesztiát ajánlott fel mindazok számára, akiknek "nem tapad vér a kezükhöz", valamint felszólították őket, hogy adják le fegyvereiket, cserébe nem indul ellenük eljárás. Az SZSZH szóvivője bejelentette, hogy a szervezet 100%-ig betartja a fegyverszünetet, de kihangsúlyozta, hogy a fegyverszüneti megállapodás betartását nemzetközi ENSZ megfigyelőknek kellene biztosítaniuk. Ezt a megoldást Franciaország is erőteljesen szorgalmazta. A tűzszünet életbe lépése ellenére, április 13-án szórványos összecsapásokra került sor az ország több településén, melyek három ember halálát okozták, valamint heves tűzpárbaj bontakozott ki a kormányerők és az SZSZH között a török határ melletti Hirbet al-Dzsoznál. A kormányerők viszont az SZSZH-t vádolták meg azzal, hogy pokolgépet robbantottak Aleppó közelében, egy katona halálát okozva (az SZSZH ezt tagadta, szerintük a kormány csak ürügyet próbált keresni a harcok folytatására). Az ENSZ a helyzet koordinálására kidolgozott egy tervet megfigyelők küldésére az ország területére. Április 14-én éjjel a kormányerők nehéztüzérséggel ismét lőni kezdték Homsz óvárosát. Susan Rice amerikai ENSZ-nagykövet elítélte a történteket és a fegyverszünet egyértelmű megszegésének minősítette a támadást. Az ENSZ BT április 15-én egyhangúlag jóváhagyta egy 30 fős, fegyvertelen megfigyelőcsoport Szíriába küldését, azonban hosszú távon egy mintegy 250 katonából álló békefenntartó erőt is küldeni szándékoznak az országba, amennyiben Pan Gimun ENSZ főtitkárnak sikerül erről megállapodnia Aszad elnökkel. A bejelentés szerint a békefenntartó missziónak olyan afrikai, ázsiai és dél-amerikai országok katonái képezik a részét, amelyek jelenléte elfogadható lesz az Aszad-rezsim számára. Május 7-én megkezdődtek fél évszázad óta az első többpárti parlamenti választások Szíriában, a megalakulandó parlamentnek elvileg Aszad reformjainak végrehajtása lenne a feladata, azonban az ellenzék a voksolás bojkottjára szólította fel a lakosságot. Bassár el-Aszad a választásokra hivatkozva június 8-án Rijád Fárid Hidzsáb korábbi gazdasági minisztert nevezte ki Szíria miniszterelnökévé. Május 14-én a kormányerők a Homsz tartománybeli Rasztanban elszenvedték legsúlyosabb veszteségüket a konfliktus kitörése óta, itt ugyanis az SZSZH katonái 23 katonával végeztek az aznapi harcok során. Időközben a hadsereg tüzérségi előkészítésbe kezdett Hamá ellen, és megszállta a város környéki falvakat felkészülve egy újabb offenzívára a település ellen. Május 25-én első ízben támadt a szíriai hadsereg az ország északi, kurdok által lakott részére, helikoptereket is bevetve, a harcokban a biztonsági erők vesztesége négy fő volt. Időközben páncélos alakulatok hatoltak be az eddig békés városnak számító Aleppóba, ahol az utóbbi hetekben jelentős mértékben megnőtt Aszad ellenzékének az aktivitása. Ugyanaznap heves összecsapások történtek Húla városban, melynek 108 civil áldozata volt, köztük 49 gyerek. Az atrocitás hírére az ENSZ megfigyelők a városba utaztak, az eset kivizsgálására. Az SZSZH katonai tanácsa május 26-án további támadásokra ösztönözte katonáit, valamint felszólították a "baráti országokat", hogy nyújtsanak légi támogatást a lázadó fegyvereseknek. Május 29-én szíriai katonák a libanoni határtérségben rálőttek néhány, a határ libanoni oldalán tartózkodó fegyveresre, egyet megölve, hármat megsebesítve. Mint utólag kiderült, az áldozatok vadászok voltak. Június 4-én az SZSZH szóvivője bejelentette, hogy a szervezet felmondta a tűzszünetet és az alakulat újabb heves támadásokba kezdett a kormánycsapatok ellen. Ezzel a tűzszüneti megállapodás hivatalosan is kudarcba fulladt. Az ENSZ missziója Az ENSZ BT vonatkozó rendelete értelmében 2012. április 15-én este megérkezett Damaszkuszba az ENSZ megfigyelők első hatfős csoportja. Az elkövetkező napokban további 24 fegyvertelen megfigyelő érkezett a térségbe. A megfigyelők április 18-i látogatásakor Damaszkusz egyik külvárosában újra harcok robbantak ki az SZSZH fegyveresei és a kormányerők között. A nap folyamán egész Szíria területén összesen 32-en vesztették életüket. Április 21-én a megfigyelők ellátogattak Homszba, amelynek bombázását ennek ellenére a kormányerők továbbra is folytatták. Időközben a hadsereg offenzívát indított Damaszkusz külvárosai ellen is. Időközben az ENSZ BT megszavazta a megfigyelők számának 300 főre való növelését. Április 23-án a kormánycsapatok tovább folytatták hadműveleteiket Damaszkusz külvárosaiban, valamint Hamában és Homszban. Tankok nyomultak be a török határ melletti Zabadániba is, de a szíriai megfigyelők városba látogatásakor ideiglenesen felhagytak az ostrommal. Május 9-én Dara városban ismeretlenek felrobbantottak egy katonai teherautót, közvetlenül az ENSZ-megfigyelők átvonulásakor. A megfigyelőknek nem esett baja, de hat szíriai katona megsebesült. Május 13-ra már 143 ENSZ-megfigyelő tartózkodott az országban. Május 15-én az ENSZ megfigyelők szeme láttára lőttek egy temetési menetbe a szíriai kormányerők Idlib kormányzóság egyik településén. A támadásban legkevesebb 20-an életüket vesztették. Az incidenst követően az egyik ENSZ gépkocsi mellett egy pokolgép is felrobbant, személyi sérülés nem történt, de még aznap evakuálták őket a településről. Három nappal később, május 18-án az ENSZ megfigyelők jelenléte mellett több ezer fős kormányellenes tüntetés kezdődött Aleppóban. A kormányerők könnygázzal és figyelmeztető lövésekkel kísérelték meg feloszlatni a tömeget. Robert Mood norvég tábornok, a misszió akkori vezetője kifejezte abbeli kételyeit, hogy az ENSZ megfigyelők jelenléte képes lesz véget vetni az erőszaknak, ugyanakkor kihangsúlyozta, hogy egy esetleges külföldi intervenció sem oldaná meg a helyzetet. Június 7-én, miután a megfigyelők sikertelenül próbáltak meg bejutni egy 78 halálos áldozattal járó mészárlás helyszínére, szíriai katonák Hamá térségében gépkarabélyokkal támadtak a konvojra, személyi sérülés azonban nem történt. Június 12-én az ostromlott el-Haffébe tartó ENSZ konvojt egy kis falucska lakói az útra feküdve, élő torlaszként akadályozták meg a kisvárosba való eljutásban. Nem sokkal később kormánypárti tüntetők lőfegyverekkel, fémrudakkal és kövekkel támadtak az ENSZ-gépkocsikra. Június 16-tól kezdve felfüggesztették tevékenységüket az elmúlt időszak támadásaira hivatkozva. Robert Mood tábornok szerint további utasításokig az állomáshelyükön maradnak. Az UNSMIS május 31-ig összesen 297 katonai megfigyelőt küldött a térségbe, emellett a misszió feladatában 71 külföldi és 14 helyi civil is részt vett. Utóbbiak közül egy személy életét vesztette a misszió során. Július 20-án Mood helyére a szenegáli Babacar Gaye tábornokot nevezték ki az UNSMIS vezetőjének, az ENSZ BT pedig további harminc nappal hosszabbította meg a misszió mandátumát. Augusztus 19-én az UNSMIS megbízatási ideje lejárt és befejezte tevékenységét. Folytatódó harcok 2012. június 7-én szíriai kormánykatonák lemészárolták Kubair falu 78 lakosát. A mészárlás hírére az ENSZ megfigyelők a faluba készültek, de a hatóságok lezárták előttük az utakat, annak ellenére, hogy a kormány hivatalosan tagadta a mészárlás tényét. Lázadók június 27-én megrohamozták az egyik állami televízió, az Al-Ibrahíja székházát. Több biztonsági őrt megöltek, az épületben pedig robbanószerkezeteket helyeztek el, ezek egy részét fel is robbantották. Időközben megtámadták a Damaszkusz külvárosában a Szíriai Köztársasági Gárda alakulatait, melyet az elnök testvére, Maher el-Aszad vezet és a főváros fő védőerejeként a szíriai rezsim legfőbb belső támaszát képezi. Egy nappal később szíriai lázadók megrongálták pokolgéppel a damaszkuszi igazságügyi komplexumot, a támadásban legkevesebb három személy megsebesült. Az SZSZH szóvivője szerint a támadást csak figyelmeztetésnek szánták. Július 7-én két alkalommal is szíriai lövedékek csapódtak be egy észak-libanoni településen, három embert megölve, többeket megsebesítve. Július 16-ra virradólag az SZSZH nagyszabású offenzívába kezdett a kormánycsapatok ellen, melyet saját elmondásuk szerint végső offenzívának szántak. A lázadók két nap alatt több mint száz katonával végeztek, illetve most első alkalommal benyomultak Damaszkusz központi területeire is. A kormány harckocsikat és helikoptereket vezényelt a lázadók ellen, különösen Kabún és Barza negyedekben zajlottak súlyos harcok, melyeket körülzároltak a hadsereg alakulatai. Július 19-én az SZSZH szintén nagyszabású hadműveletet indított Aleppó városában, amelyben három nap alatt a város központjában levő katonai főhadiszállásig törtek előre, melyet ostrom alá vettek. Az aleppói offenzíva miatt a kormány visszavonta csapatai jelentős részét a török határ mellől és Aleppóba küldte őket. Időközben Damaszkuszban is tovább zajlottak a harcok, itt azonban a kormányerők értek el sikereket, visszavéve a lázadóktól több, korábban elfoglalt negyedet. Augusztus 4-re az SZSZH visszavonult a város teljes területéről. A győzelmet követően, augusztus 15-én a hadsereg nagyszabású offenzívába kezdett Damaszkusz kormányzóság területén a lázadók kifüstölésére. Ennek során, augusztus 17-én sikeresen visszafoglalták az SZSZH egyik legfontosabb térségbeli bázisát, Al-Tallt is. A hónap elejére a felkelők aleppói offenzívája is megakadt, annál is inkább, mivel a kormányerők segítségére siettek a kormányhű Al-Barre törzs fegyveresei (akiknek törzsfőnökét, Zino Berrit korábban SZSZH fegyveresek kivégezték). Egy hónapnyi állandósult harcok után, az SZSZH szeptember 27-én újabb offenzívába kezdett, melyet – saját elmondásuk szerint – szintén a háború eldöntő csatájának szántak. Áttörést azonban nem sikerült elérniük. A júliusban aktivizálódott kurd lázadó szervezet, a PYD a város két negyedét vonta ellenőrzése alá. A harcok során – a fennálló formális szövetségi rendszer ellenére – az SZSZH és a kurd fegyveresek közt több összecsapás is történt, elsőként július elején, Afrin városban, majd október folyamán Aleppó kurdok által ellenőrzött negyedeiben. A konfliktust lezárandó, november 5-én az SZSZH és a PYD parancsnoksága szövetséget kötött egymással a hadsereg elleni kooperáció érdekében, ezt valószínűleg nagymértékben befolyásolta a törökországi Kurd Munkáspárt közleménye, melyben megfenyegette a szíriai lázadókat egy esetleges intervencióval a PYD védelmében. Az egyezmény ellenére azonban még november közepén is történtek incidensek a két lázadó szervezet közt. Szeptember 23-án Rijád el-Aszad tábornok bejelentette, hogy az SZSZH parancsnoksága Törökországból Szíriába, a már "felszabadított" területekre költözik, a tábornok azonban nem közölte, hogy pontosan hova. Október 8-án az SZSZH és az Al-Nuszra Front alakulatai közösen támadást indítottak Maarrat an-Numán ellen, mely a stratégiai fontosságú Aleppó-Damaszkusz főút mellett fekszik (a főút birtoklása létfontosságú a kormányerők számára, mivel rajta keresztül látják el utánpótlással az Aleppóban harcoló katonai egységeket). A lázadók két nap alatt elfoglalták a város nyugati részét, a hadsereg azonban nagy erejű ellentámadást indított, melynek során vadászgépeket is bevetettek, míg a lázadók legalább egy elfoglalt tankot állítottak harcba. Október végére a felkelők sikeresen bekerítették és ostrom alá vették a Vádi Deif katonai bázist (mely a szíriai hadsereg török határ mellett fekvő legnagyobb bázisa), melyet a hadseregnek még november elejére sem sikerült felmentenie. November 1-jén ismét erős ellentámadás indult a lázadók visszaverésére, ennek során – tíznapos harc után – a város körüli falvak többségét sikeresen visszafoglalták. Október 25-én a szíriai kormány három napos tűzszünetet hirdetett az Íd al-Adhá muszlim ünnep idejére. A fegyverszünetnek már az első napján ismeretlen tettesek autóba rejtett pokolgépet robbantottak Damaszkusz déli külvárosában. A merénylet öt ember halálát okozta, 32-en megsebesültek. A hadsereg és lázadók közti harcok is tovább zajlottak, a SOHR szerint azonban kisebb intenzitással, és az ünnep ideje alatt a légierő sem hajtott végre támadásokat. A lázadók előrenyomulása (2012. november – 2013. március) November 18-án a lázadók elfoglalták a Dajr ez-Zaur kormányzóság területén levő Hamdán repülőteret, melyet a hadsereg korábban a környékbeli felkelő állások elleni légitámadások kiindulási pontjaként használt. November 25-én egy Damaszkuszhoz közeli légibázis került a felkelők kezére, majd három nappal később a damaszkuszi nemzetközi repülőteret támadták meg, de a hadsereg már másnap nagyszabású ellenoffenzívát indított a lázadók által megszállt kelet-damaszkuszi területek visszavételére. A harcok miatt a repülőtér összes járatát törölték, amelynek szomszédságában heves harc bontakozott ki. A hadsereg azonban vadászrepülők és helikopterek bevetésével visszavetette a lázadókat, a repülőteret pedig ismét megnyitották. December 12-én – a konfliktus kitörése óta először – a hadsereg Scud kis hatótávolságú ballisztikus rakétákkal támadta a felkelők állásait. Az Egyesült Államok külügyminisztériuma közleményében tiltakozott a rakéták használata ellen. December 16-án – a konfliktus kitörése óta először – súlyos harcok robbantak ki a Damaszkusz déli részén található Jarmúk palesztin menekülttáborban. A harcok során a tábort elfoglalni próbáló felkelőkkel szemben az NFPF harcosai és a kormányerők próbálták megvédeni azt. A Szíriai Légierő légitámadásokat is végrehajtott a vitatott területen, ennek ellenére a felkelők nagyrészt elfoglalták azt. A hadsereg egy ultimátumának hatására a palesztinok többsége elhagyta a tábor területét, közülük legkevesebb kétezren Libanon területére menekültek. December 28-án heves harcok után az SZSZH elfoglalta a Dajr ez-Zaur melletti et-Tanak kőolajmezőt, a kormánycsapatok azonban két nap múlva Homszban értek el áttörést, visszafoglalva a város egy negyedét a felkelőktől. 2013. január 6-án Bassár el-Aszad elnök hosszú idő óta először tartott nyilvános beszédet a szíriai állami televízióban. Ebben a beszédében a szíriai ellenzéket a nyugat "szolgáinak", Allah ellenségeinek és terroristáknak nevezte, valamint kifejezte készségét a párbeszédre, de mint fogalmazott, kizárólag csak a lázadók mögött álló hatalmakkal hajlandó tárgyalni, a "gazdákkal", nem a "szolgálókkal". Ugyanakkor felajánlotta saját elképzelését a konfliktus rendezésére, ennek érdekében a Nyugatnak be kéne fejeznie a lázadók felfegyverzését, cserébe a kormányerők is felhagynának hadműveleteikkel, majd a kormány felvenné a kapcsolatot a "megbízhatóbb" ellenzéki csoportokkal, és közösen kidolgoznának egy, az új parlamenti választásokra vonatkozó tervezetet. Aszad beszédét azonban előbb a nemzeti koalíció, majd az Egyesült Királyság, az Egyesült Államok és Törökország is elítélte. December-január folyamán a lázadók stratégiai okokból elsődlegesen benzinkutakat és repülőtereket támadtak meg és kísértek ellenőrzésük alá vonni vagy megsemmisíteni. Ennek során pokolgépeket is bevetettek, egy január 4-i pokolgépes támadásban Damaszkuszban 9 személy vesztette életét, megközelítőleg 40-en megsebesültek. A hadsereg azonban – elsősorban kizárólagos légifölényének segítségével – igyekezett megakadályozni a lázadó kézre került benzinkutak használatát, egy ilyen akció során Damaszkusz egyik, felkelők kezén levő negyedében található benzinkút elleni légitámadásban legkevesebb 30 civil vesztette életét. Hosszú harcok eredményeként, 2013. február 12-én a lázadók elfoglaltak egy katonai repülőteret Aleppótól északra, ahol – a konfliktus kitörése óta elsőként – működőképes repülőgépek és helikopterek kerültek a felkelők kezére. Március 4-én szíriai katonák lépték át az iraki határt Anbár tartománynál a lázadókkal vívott harcok következtében. Az iraki szunnita lázadók fő bázisának számító térségben rövidesen ismeretlen fegyveresek támadtak rájuk és visszaűzték őket a határ szíriai oldalára. A harcokban a katonai egység vesztesége meghaladta a 40 főt. Ugyanezen a napon a lázadók támadást indítottak a Rakka kormányzóság központjaként funkcionáló Rakka város elfoglalásának céljából. Március 6-ra a felkelők elfoglalták az egész várost, és ezzel az első tartományi székhelyt szerezték meg az Aszad-rezsimtől. A jelentések szerint Rakka lakói ünnepelve fogadták a várost elfoglalókat, leszakították az elnököt ábrázoló posztereket és ledöntötték az előző államfő, Háfez el-Aszad életnagyságú bronzszobrát. Ugyanezen értesülések szerint a lázadók két vezető kormányzati tisztviselőt is elfogtak. Március 25-én egy pokolgépes merényletben Dajr ez-Zaur mellett súlyosan megsebesült Rijád el-Aszad ezredes, az SZSZH alapítója. A robbanás következtében elvesztette az egyik lábát és életveszélyes állapotban szállították egy törökországi kórházba, ahol stabilizálták az állapotát. A kormány hadműveletei (2013. április – július) 2013 áprilisában a kormányerők nagyerejű offenzívát indítottak a Maarrat an-Numán mellett található ostromlott Wadi Deif bázis ellen. A katonai akció sikerrel járt, április 14-én a katonák áttörték a katonai bázist ostromló lázadók gyűrűjét. Ezzel vette kezdetét egy újabb offenzíva a hadsereg részéről, előbb Damaszkusz kormányzóság majd Hamá kormányzóság területén. Az offenzívák a lázadók részleges vereségét hozták magukkal, a hadsereg több települést is visszafoglalt Hamá kormányzóság területén, valamint visszafoglalták Halfaja várost. A Damaszkusz környékén indított offenzíva legjelentősebb eredménye a főváros szomszédjában található, stratégiai fontosságú Jdaidet al-Fadl visszavétele volt a felkelőktől. Április 24-én a kormányerők visszafoglalták Otaiba városát öt hétnyi harcok után Damaszkusz keleti részén. A város nyolc hónapon át volt a lázadók kezén, szolgálva a fegyverutánpótlást. Eközben az ország északi részén, Aleppóban, a lázadók megkaparintották Mennagh nevű hadireptér egy olyan stratégiailag fontos részét, amellyel elkezdhették a reptér közvetlen ostromát. Május 2-án a hadsereg elfoglalta Kajsza városát, Damaszkusz mellett. A csapatok emellett visszafoglalták Vádi al-Szajeh nevű negyedet Homszban. Május 8-án a kormányerők megszerezték a stratégiai fontosságú Hirbet Gazaleh városát, mely a Jordánia felé irányuló autópályán fekszik. Több mint 1000 lázadó vonult ki a városból utánpótlás hiánya miatt. A város visszaszerzésével sikerült újra megnyitni a kormány utánpótlási útvonalát Darába. Május 11-én a lázadóknak sikerült az elvágni az utánpótlást az aleppói Mennagh repülőtér felé. Május elejéig a hadsereg kisebb, de stratégailag fontos területeket szerzett meg. A katonai elemzők szerint így az Aszad-rezsim nagyobb előnyökkel fog rendelkezni bármely esetleges békekonferencián. Kormánypárti, lázadó és független elemzők arra mutattak rá, hogy a kormány előnyei abból származnak, hogy újjáépítik a fegyveres erőiket irreguláris milíciákból amelyeket a Hezbollah és Irán képez ki. A kormány további előnyének számít egyes elemzők szerint, hogy stratégiailag fontos területeket szerez meg és nem próbálja visszahódítani az egész országot. Május 13-án az Aszad-párti erők elfoglalták Haidarijeh és Es al-Warwar települést, meggátolva a lázadók utánpótlását Al-Kuszeirbe. A Hamá és Damaszkusz környékén indított offenzívákkal párhuzamosan a hadsereg offenzívát indított a felkelők kezén levő Kuszair ellen is, a libanoni határ mellett, mely stratégiai fontosságú mindkét fél számára, elsősorban annak köszönhetően, hogy a homszi felkelők a városon keresztül jutnak utánpótláshoz. A harcokba bekapcsolódott a szíriai hadsereg oldalán a libanoni Hezbollah is, az SZSZH parancsnokának, Szálim Idrisznek állítása szerint több mint 7000 Hezbollah harcos "özönlötte el" a város környékét. A Hezbollah támadása következtében a harcok időnként átterjednek Libanon határvidékére is. Május 16-án a lázadók azt állították, hogy visszaszerezték Kajszát-ot, Damaszkusz kormányzóságban, miután egységes ellenoffenzívát indítottak. Május 17-én a lázadók elfoglaltak 4 falut Hamá kormányzóság keleti részén. A falvakat előzőleg elhagyták az ott élők. Május 19-én a hadsereg elfoglalta Halfajat Hamá kormányzóságban. Május 29-én a kormányerők elfoglalták az al-Daba nevű katonai bázist Al-Kuszeir északi részén. Június 5-én a szíriai hadsereg és a Hezbollah közös erővel visszafoglalta a Al-Kuszairt. A város visszahódításával megszűnt a lázadók utolsó nagyobb utánpótlási vonala Homsz irányába. Június 6-án a lázadók támadást indítottak és részlegesen elfoglalták Kunejtíra határállomást. A hadsereg még aznap erősítést küldött a határátkelő visszaszerzéséért. Június 7-e és 14-e között a hadsereg, kormánypárti milíciák, és állítólag a Hezbollah katonái offenzívát indítottak Aleppó kormányzóságban. Egy héten át a kormányerők előrenyomultak magában Aleppoban és a város vidékén, visszaverve a lázadókat, 14-én azonban a lázadóknak sikerült megállítani egy katonai konvojt két napig. A harcok során a felkelők szerint sikerült megsemmisíteni egy tankot és megölni 20 katonát. Mielőtt megállították volna a hadoszlopot, a hadsereg megszerzett egy magasan fekvő helyet Maaret al-Arteek környékén, fenyegetve a lázadók állásait. A kormánynak sikerült beljebb nyomulni Aleppó térségének a déli részére, elfoglalva Ajn-Asszan falut. Június 13-án a hadseregnek sikerült beljebb nyomulni a lázadók kezén lévő aleppói Szahúr negyedbe, de hamarosan visszaverték őket. Június 10-én síta kormánypárti erők Hatlából kiindulva megtámadtak egy lázadó állást Dajr ez-Zaur keleti részén, megölve négy lázadót. A következő napon, megtorlásból, több ezer lázadó rohanta le a falut, megölve 60 helyi lakost. 10 lázadó is meghalt a támadásban. Június 14-én az Al-Nuszra Front iszlamista milícia elfoglalt több katonai barakkot Idlib közelében, háromnapos harc után. Június 15-én a szíriai hadsereg elfoglalta Damaszkusz Ahmadijeh nevű negyedét a város repterének közelében. Június 22-én a kormányerők elfoglalták az egyik lázadó erődítményt, Tallkalah várost. Négy nappal később Al-Kariatain lett visszafoglalva Homsz kormányzóságban. További harcok, lázadók belharcai (2013. július – október) Június 28-án a fegyvereseknek sikerült elfoglalni egy stratégiailag fontos katonai ellenőrzőpontot Darában. Június 29-én a hadsereg egy nagyobb támadást indított a lázadók kezén lévő térség ellen Homszban. A kormányerők tüzérségi ütegeket és repülőket vetettek be. Július 12-én iszlamista fegyveresek megölték a Szabad Szíriai Hadsereg egyik parancsnokát, Kamal Hamamit. Öt nappal később, az SZSZH állítólag elfoglalta Nava városának déli részét, miután megszerzett 40 katonai őrhelyet. Július 18-án A kurd milíciáknak sikerült kiűzni az Al-Nuszra Front harcosait az észak-szíriai Rasz al-Ajnból. Július 22-én a lázadók sikeresen megszerezték Han al-Asszalt, Aleppó nyugati külvárosát. A település elfoglalása után iszlamista fegyveresek kivégeztek 123 embert, helybéli lakosokat és foglyul ejtett katonákat egyaránt. 3 nappal később a hadsereg biztosította Szuhna városát, kiűzve az Al-Nuszra Front fegyvereseit. Július 27-én Homszban a kormányerők megszerezték a Hálid ibn al-Válid nevű mecsetet. Két nappal később sikerült elfoglalniuk a teljes Haldije negyedet. Augusztus 10-én egy lázadó brigád, mintegy 2000 fővel támadást indított a nagyrészt kormány kezén lévő Latakia kormányzóság ellen. A lázadók állítólag elfoglaltak egy tucat falut. Augusztus 5-ig már 20 kilométerre nyomultak előre Kardaha (Háfez el-Aszad szülőfaluja) előtt. Augusztus 6-án a lázadóknak sikerült elfoglalni Menagh katonai repteret Aleppoban, 10 hónapos ostrom után. Augusztus 19-ig a hadseregnek sikerült visszafoglalni a latakiai lázadók kezén lévő falvak többségét. Mindössze két falu maradt a fegyveresek kezén. Augusztus 26-án a lázadók megkaparintották Hanaszir falut Aleppó kormányzóságban. A stratégiai jelentőségű falu elvesztésével a kormányerőknek nincs további utánpótlási vonala a városba, így lényegében körülzárták őket. Szeptember 8-án az Al-Nuszra Front fegyveresei elfoglalták Maalulát, amely Damaszkusztól 43 km-rel északra található. A hadsereg viszont szeptember 15-én visszafoglalta a települést. A falu lakosai főként keresztényekből állnak és az arámi nyelvet (Jézus anyanyelvét) beszélik. Szeptember 18-án iszlamista fegyveresek lerohanták az SZSZH által ellenőrzött Azaz városát Észak-Szíriában, megölve öt SZSZH tagot és foglyul ejtve mintegy 100 főt. A két fegyveres szervezet között súlyos harc bontakozott ki, melynek végül egy szeptember 19-én elfogadott fegyverszüneti szerződés vetett véget. Szeptember közepe táján a hadsereg további sikereket ért el Damaszkusz külvárosaiban, megszerezve Dajr Szalman és Seba városrészeket. További hat falut is elfoglalt Homsztól keletre. Szeptember 28-án, iszlamista lázadók megszereztek egy fontos határátkelőt Dara kormányzóságban többnapos harc után. 26 katona és legalább 7 külföldi fegyveres halt meg. Október 3-án a kormányerőknek sikerült visszafoglalni Hanasszer kisvárost Aleppó kormányzóságban, így a hadsereg képes utánpótlást szállítani ismét a városba. A SOHR szerint a harcokban tucatnyian haltak meg mindkét oldalon. Október 9-én a felkelők sikeresen elfoglalták Hajanar őrállomást Jordánia határán, Dara városának közelében. Ezzel a lázadók egy nagy kiterjedésű földre tették rá a kezüket Dara külvárosától a Golán-fennsíkig. Ugyanezen a napon a Hezbollah fegyveresei és iraki síta harcosok, légi és tüzérségi támogatással, elfoglalták Sejk Omar települést Damaszkusz kormányzóság déli részén. Két nappal később további két települést, al-Tiabijat és Husszeinija-t, foglalták vissza az SZSZH-tól. A három település a Jordániába vezető két legfontosabb autópályánál fekszik, így a kormány megerősítette saját utánpótlási vonalát és még inkább nyomás alatt tartja a lázadókat, amelyek lényegében ostrom alatt vannak Kelet-Gútában és környékén. Október 11-én a lázadók elfoglalták Reszefa és Sinaa negyedeket Dajr ez-Zaurban, beleértve a város katonai kórházát is. Október 16-án a hadsereg visszafoglalta a lázadóktól a stratégiai fontosságú Bweida várost Dél-Damaszkuszban. Október 17-én A szíriai hírszerzés egyik magas rangú tisztjét és a dajr ez-zauri katonai kerület főparancsnokát, Dzsameh Dzsameh tábornokot egy lázadó orvlövész meggyilkolta Dajr ez-Zaurban. Október 21-én a Dara környékén vívott a harcokban elesett a lázadók egyik befolyásos parancsnoka, Jasszer al-Abúd. A kormányerők és a kurdok újabb offenzívái, nyílt háború LIÁ és lázadók közt (2013. október – ) Október elején a hadsereg nagyszabású offenzívát indított a körülzárt Aleppó felmentéséért. A sereg először az Asz-Szafira város szomszédságában lévő falvakat foglalta el, majd magát a települést is november elsejére, így a kormányerők sikeresen biztosították az utánpótlási vonalaikat Aleppóba. A hadsereg több napos kemény harc árán visszafoglalta az aleppói reptér északi részén elfekvő ún. 80-as bázist, amelyet a felkelők 2013. februárjában foglaltak el. Ezután, november 15-én a katonaság bevonult Tall Hasszel faluba is. Október folyamán az YPG kurd milícia támadást indított az Északkelet-Szíriában aktív Al-Nuszra Front és az Iraki és Levantei Iszlám Állam (ISIS) iszlamista szervezetek ellen. A harcok során, október 24-én, a YPG erői sikeresen elfoglalták a stratégiai fontosságú Jarublja települést az iraki határnál. 4 nappal később az ISIS erői gyakorlatilag összeomlottak a Çil Axa elnevezésű, olajban gazdag térségben, miután a kurdok több települést is elfoglaltak. November folyamán az YPG egységei további területeket szabadítottak fel az iszlamistáktól. Ezalatt Damaszkusz térségében a hadsereg további területeket foglalt vissza a felkelőktől. Ezek a hadműveletek főként a főváros külvárosi területeit érintették, céljuk a felkelők utánpótlási vonalainak teljes elvágása volt. November 15-én a hadsereg támadást indított a Damaszkusz-kormányzóság északi részén található Kalamún-hegység térségének felkelő állásai ellen. A stratégiailag fontos térség elvesztésével a lázadók elveszítenék az utánpótlási vonalaikat a főváros általuk megszállt területeire, ugyanakkor a térség feletti uralom megszerzésével a kormány teljesen biztosítani tudná a Damaszkuszt Homsszal összekötő autópályát. November 19-én a hadsereg elfoglalta a hegységben található Kara városát. Ugyanaznap elfoglalták al-Dvajrineh falut, amely Aleppóhoz vezető főútvonaltól nem messze fekszik. December 2-án az SZSZH egységei ismét bevonultak a keresztény többségű Maalula faluba, Damaszkusztól északra. A harcok után, több forrás szerint, a felkelők 12 helyi apácát elraboltak és helyi erődjükbe, Jabrud városba hurcolták őket. December 7-én az Iszlám Front erői kisöpörték az SZSZH egységeit az Idlib-kormányzóságbeli Atme városából, melyet egyben főhadiszállásnak is használtak a mérsékelt felkelők. Az ISIS terroristái ezenkívül több fegyverraktárat is megszereztek, amelyek nyugati fegyvereket tartalmaztak. 5 ember halt meg a csetepatéban, nem tisztázott a frakciójuk. Két nappal később December 9-én a hadsereg ismét megnyitotta a forgalom előtt a Damaszkusz-Homsz autópályát, miután a legnagyobb részét biztosították, habár, a SOHR jelentése szerint, az autópálya nem teljesen biztonságos a lázadók folyamatos támadásai miatt. December 10-én az Iszlám Front elfoglalta a Bab al-Hava nevű határátkelőt az SZSZH egységeitől. Ugyanazon a napon hadsereg bevette a stratégiai fontosságú An-Nabk települést Kara közelében. Körülbelül 100 lázadó esett el vagy került fogságba. Két nappal később az SZSZH legfőbb parancsnoka, Szálim Idrisz tábornok, egyes állítások szerint elmenekült Katarba, miután az Iszlám Front seregei továbbnyomultak a lázadók által ellenőrzött térségekben. Az USA és az Egyesült Királyság felfüggesztette a mérsékelt lázadóknak szánt segélyeket. December 11-én a hadsereg hozzákezdett a libanoni határ mentén lévő utolsó lázadó erődítmény, Jabrud városának ostromához. December 12-én az Al-Nuszra Front fegyveresei lerohanták Adra városát, Damaszkusztól északkeletre, és lemészároltak kb. 40 civilt, többségükben alavitákat. December 13-án a kormányerők ostrom alá vették a várost. 2014 januárjában a mérsékelt és iszlamista lázadók egymással szövetkezve megtámadták a Levantei Iszlám Állam erőit országszerte. Kezdetben a lázadók sikeresen kiszorították a LIÁ erőit Aleppoból, és ostrom alá vették Ar-Rakka városát. Több, mint 24 kisvárosban szerezték meg a LIÁ bázisait szerte Szíriában. A hónap közepére viszont úgy tűnik, hogy fordult a kocka. A LIÁ erői megtartották Ar-Rakka városát és elfoglalták Manbij-ot többnapnyi harc után. Január 24-én a LIÁ elfoglalta Darkush-t Idlib tartományban. Heves harcok folynak a török határnál található Azaz városában is. Eközben a kormányerők tovább folytatják hadműveleteiket Aleppóban, előrenyomulva a város ipari részlegében. Ha a területet biztosítaná a hadsereg, a lázadók utánpótlási útvonalát elvághatná Törökországból. Január 14-én a kormányerők további erőfeszítéseket tettek az aleppói hőerőmű megszerzésére, elfoglalva Tell Alamt és Huwejnat, a várostól keletre levő területen. Január 25-én az elnökhöz hű erők megszerezték Karam Al Qasr nevű negyedet Aleppo keleti részén, háromnapnyi harc után. Szövetséges légitámadások Észak-Szíriában 2014. szeptember 22-én – az észak-iraki hadműveletekkel párhuzamosan – az Amerikai Egyesült Államok, Jordánia, Bahrein, Katar, Szaúd-Arábia és az Egyesült Arab Emírségek légiereje légitámadásokat kezdett az Iszlám Állam állásai ellen Észak-Szíriában is. A légitámadások többek között az ISIS központját, Rakkát is sújtották. A hadműveletekhez később több más ország légiereje is csatlakozott. Az Iszlám Állam mellett az Al-Káidához kötődő Horászán iszlamista tervezetet is sújtották a légicsapások. A koalíciós intervenció eredményeinek javítása érdekében az Amerikai Egyesült Államok megkezdte a mérsékeltnek tekintett szíriai lázadók felfegyverzését, ezt a lépést azonban komoly kritikák érték, mivel a támogatott fegyveres csoportok között valószínűleg iszlamista szervezetek is fegyverhez jutnak. Októberben az amerikai légierő légi úton juttatott fegyvereket az ISIS által ostromolt Kobane kurd védőinek, ezek egy része azonban az Iszlám Állam lázadóinak kezére került. Erre azért volt szükség, mert Törökország mereven elzárkózott attól, hogy területéről fegyverszállítmányt küldjenek a kurdoknak. Törökország egyébként is sokkal inkább csupán névleg harcol az Iszlám állam ellen – az iszlám fanatikusok ellen harcoló kurdokat sokkal inkább ellenségnek tekinti, rendszeresen támadja őket. Vegyi fegyverek veszélye és állítólagos bevetése A térségben Szíria rendelkezik a legnagyobb vegyifegyver-készlettel és a környező államok illetve a nyugati országok egyaránt tartottak attól, hogy a kormány a felkelés leverése érdekében be is veti ezeket, illetve, hogy ezek a fegyverek terroristák kezébe kerülhetnek. Sajtóhírek szerint több ország (így pl. Izrael) is titkosszolgálati és titkos katonai akciókat indított Szíria területén, hogy a vegyi fegyverraktárak helyét meghatározza és azokat ellenőrzése alá vonja. A NATO és Izrael is kilátásba helyezte azonnali katonai beavatkozását, arra az esetre, ha a konfliktus során a kormány a vegyi fegyvereket beveti, más félnek átadja, vagy ezekre készül. 2013 januárjában olyan sajtóértesülések láttak napvilágot a francia Le Monde napilapban, hogy 2012 decemberében, az Aszad-rezsim Homsz városánál végül vegyi fegyvereket vetett be a felkelők ellen, ezek azonban – mint a Le Monde fogalmazott – nem voltak halálosak. A szíriai kormány mindazonáltal ismételten tagadta a vegyi fegyverek bevetésének eshetőségét. Március 19-én meg nem erősített értesülések szerint egy Aleppó melletti településen vegyi fegyvertámadás történt, mely több ember halálát okozta. A kormány a lázadókat vádolta meg a támadással, míg a lázadók szerint a kormány áll a történtek mögött. Az ENSZ az eset kivizsgálására egy szakértői csoportot tervez az országba küldeni. Április 23-án az izraeli katonai hírszerzés (Aman) egy közleményt adott ki, melyben kijelentették, hogy tudomásuk szerint a szíriai hadsereg a konfliktus folyamán több ízben is vetett be vegyi fegyvereket a lázadók ellen. A szíriai kormány azonban a közleményre reagálva ismételten tagadta a vegyi fegyverek használatát. Április 25-én Chuck Hagel amerikai védelmi miniszter is kijelentette, hogy az amerikai hírszerző ügynökségek elemzése szerint Szíriában több alkalommal vetettek be szaringázt. Bejelentette azt is, hogy tanulva a korábbiakból (az iraki háború 2003-as megindítását hasonló hírszerzési forrásokra alapozták, ám utóbb kiderült, hogy azok tévesek voltak) a hírszerzők még további bizonyítékokat gyűjtenek. Ugyanaznap a brit külügyminisztérium bejelentette, hogy Szíriából kicsempészett földmintákban szaringáz nyomait mutatták ki. Május 6-án azonban az ENSZ szóvivője, Carla Del Ponte kijelentette, hogy a szervezet bizonyítékokkal rendelkezik arról, hogy a felkelők szaringázt vetettek be a kormányerőkkel vívott harcok során, ugyanakkor nem zárta ki annak lehetőségét sem, hogy a kormányerők is használták a vegyi fegyvert. 2013. augusztus 21-én meg nem erősített információk szerint a szíriai hadsereg szaringáz támadást hajtott végre a Damaszkusz kormányzóság területén fekvő Gútában. A támadásnak a SOHR szerint legkevesebb 322, ellenzéki források szerint legtöbb 1729 halálos áldozata volt. A támadás helyszínére ENSZ vizsgálóbizottság érkezett, azonban már a vizsgálatok befejezése előtt az Egyesült Államok légitámadással fenyegette meg Szíriát, ehhez Franciaország is támogatását fejezte ki. Kezdetben David Cameron brit miniszterelnök is támogatásáról biztosította az Egyesült Államokat egy esetleges katonai intervenció során, a miniszterelnök kezdeményezését azonban az Egyesült Királyság parlamentje leszavazta. A későbbiekben a NATO 28 tagállamából legkevesebb 12 kizárta részvételét egy esetleges Szíria elleni hadműveletben. Obama elnök az amerikai kongresszushoz fordult felhatalmazásért a légitámadáshoz, szavazásra azonban már nem került sor, mivel időközben egy orosz – amerikai megállapodás született, Szíria vegyifegyver-készleteinek nemzetközi ellenőrzés alá vonásáról, esetleg megsemmisítéséről, melyhez a szíriai kormány is támogatását fejezte ki (kihangsúlyozva azonban, hogy nem az amerikai fenyegetés hatására, hanem az orosz elnök kérésére teszi). Időközben az Associated Press hírügynökség értesülése szerint a Gúta környéki lázadók beismerték a vegyifegyver használatát, melyet – az értesülés szerint – Szaúd-Arábiából kaptak. Hosszas egyeztetés után a szíriai kormány beleegyezett az ország vegyifegyver-készletének az ENSZ szakértői által történő megsemmisítésébe. A fegyverkészlet és a gyártóközpontok megsemmisítése 2013. október 6-án kezdődött meg, a fegyvereket a norvég és a dán flotta egységei szállítják Olaszországba, ahonnan az amerikai és brit flotta veszi át a szállítmányt a megsemmisítés végett. A kurd felkelés A rendszerellenes felkelés kezdeti fázisában a szíriai kurdok csak nagyon kis számban vettek részt, dacára Háfez- és Bassár el-Aszad diszkriminatív intézkedéseinek, mellyel a kurd lakosságot sújtották. Ennek legfőbb okaiként a rezsim "megelőző" fellépését (a kurd aktivisták többségét letartóztatták), valamint a szíriai ellenzék Törökország felé való orientálódását lehet tekinteni. A kurd lakosság a hagyományos török-kurd ellentét miatt Törökországban a nép érdekeinek legfőbb veszélyeztetőjét látja, így – mint Száleh Kado kurd aktivista megfogalmazta – nem bíznak sem a török kormányban, sem az általa képviselt politikai irányvonalban. A kurdok kezdeti semlegességének azonban Mohammed Száleh Muszlim, a PYD vezetőjének szerint taktikai okai is voltak. Míg a szíriai hadsereg a rendszerellenes tüntetők és később felkelők elleni harccal volt elfoglalva, Szíriai Kurdisztánt elkerülték a harcok, a kurd ellenzéki szervezetek pedig zavartalanul készülhettek a hatalom átvételére a rezsim összeomlásának esetén. A PYD ezen álláspontjának megfelelően a hozzá közelálló Kurd Munkáspárt megfenyegette a török kormányt, hogy amennyiben beavatkozik a felkelők oldalán a konfliktusba, a szíriai kormányt segítve Törökország keleti részét "háborús övezetté változtatja". A kurd álláspont azonban gyökeresen megváltozott, mikor ismeretlen fegyveresek 2011. október 7-én otthonában meggyilkolták Mesál Tamo kurd aktivistát. A gyilkossággal a kormányt vádolták meg, Tamo temetése pedig rendszerellenes tüntetésbe torkollott, melyen a rendfenntartók a tömegbe lőttek, öt embert megölve. Október folyamán a kurd politikai szervezetek aktivizálódtak, október 26-án Észak-Irakban létrejött a Kurd Nemzeti Tanács, mely a Szíriai Nemzeti Tanácshoz csatlakozott. Az új szervezetnek a PYD-hez fűződő kezdeti rossz viszonyának egy, a Masszúd Barzáni észak-iraki kurd vezetőnek közvetítésével, 2012. június 11-én Erbílben megkötött egyezmény vetett véget, melynek értelmében a két párt megalapította a Kurd Legfelsőbb Bizottságot, és felállították a Kurd Népvédelmi Egységek (YPG), a bizottság fegyveres szárnyát. A fegyveres felkelés 2012. július 19-én kezdődött, mikor az YPG megtámadta és elfoglalta Ajn al-Arab (kurdul: Kobanê) várost. Másnap a kurdok kezére került Amuda (Amûdê) és Afrin (Efrîn) is. A kurdok gyors előnyomulása annak volt köszönhető, hogy a hadsereg nem tanúsított számottevő ellenállást, inkább kivonultak a városokból. Július végére az YPG elfoglalta Malikíja (Dêrika Hemko), Rasz al-Ajn (Serê Kaniyê), Darbászija (Dirbêsî) és Mabada (Girkê Legê) településeket, viszont sikertelenül ostromolta Kamisli (Qamişlo) várost. Augusztus 2-án a PYD egy közleményben tudatta, hogy az északkelet-szíriai városok – Kamisli kivételével – mind a kurd ellenzék igazgatása alá kerültek. Szeptember elejére 365 település került kurd fennhatóság alá, valamint Aleppó két negyede: Aszrafije és Sejk Masszúd. A kurd előrenyomulás következtében az YPG és az SZSZH között is összecsapások robbantak ki. Legelőször július 29-én törtek ki harcok a két fél között, Afrin városban. Az összecsapás két arab és egy kurd lázadó halálát okozta. Az incidensek többsége azonban Aleppó kurdok által ellenőrzött negyedeiben zajlott le, melyeket az SZSZH és a Tavhíd Brigád október végén többször is megkísérelt ellenőrzése alá vonni. Október 26-án a lázadók támadást indítottak a Sejk Masszúd negyed ellen, de az YPG visszaverte a támadást. A harcokban 19 lázadó halt meg, míg a kurdok legkevesebb három főt vesztettek. Válaszul az SZSZH fegyveresei egy aleppói kurd kormányellenes tüntetésen a tömegbe lőttek, 8 ember halálát okozva. A harcok következményeként az YPG 20 lázadót ejtett fogságba, válaszul a felkelők 180 kurd civilt raboltak el. Közülük egyet október 29-én halálra kínoztak, válaszul az YPG előző napi akciójára, melynek keretében megölték a lázadók egyik vezetőjét, Abú Ibrahimot (aki korábban 11 libanoni síita zarándok elrablásával vált ismertté). A lázadóparancsnok embereivel egy kis észak-szíriai kurd várost kísérelt meg ellenőrzése alá vonni, mikor kurd fegyveresek lelőtték. November 5-én az SZSZH és az YPG egy megállapodást kötött, melyben vállalták foglyaik kölcsönös szabadon engedését és egy szövetségi rendszer kialakítását az Aszad-rezsim ellen. Ennek eredményeképp november 8-án heves harcok kezdődtek Rasz al-Ajn városért, ahol az SZSZH és a helyi kurd lakosság egymással szövetségben vette fel a harcot a hadsereggel. A lázadók támadása sikeres volt, a kormányerők kivonultak a városból. Ezzel párhuzamosan az YPG teljes egészében birtokba vette Malikija várost. Az együttműködés azonban rövid ideig tartott, mivel november 19-én Rász al-Ajnban az SZSZH megtámadott egy YPG ellenőrzőpontot, egy lázadó orvlövész pedig meggyilkolta Abed Halilt, a helyi PYD tanács elnökét. Az összecsapásokban 29 lázadó (az SZSZH és az Al-Nuszra Front tagjai) illetve 5 kurd harcos halt meg. Három nap harc után végül a két fél meghatározatlan időre fegyverszünetet kötött egymással. Rijád el-Aszad a Kurd Nemzeti Tanáccsal közösen elítélte a két lázadó szervezet közti összecsapásokat és kijelentette, hogy a rasz al-ajni lázadók többsége a Guraba as-Sám iszlamista szervezet tagja, melynek – állítása szerint – semmi köze az SZSZH-hoz. Az SZSZH főparancsnoka egyúttal elítélt minden kísérletet, mely az arab és kurd lakosság közti kapcsolatok megrontását próbálja kieszközölni, az iszlamista lázadók Rász al-Ajnban való tartózkodását pedig értelmetlennek nevezte. 2013. január 17-én mintegy 300 szíriai lázadó indított támadást a kurdok állásai ellen Rász al-Ajnban. A harcban három – korábban zsákmányolt – tankot is bevetettek, ebből kettőt a kurd lázadók sikerrel elfoglaltak. A heves harcok következtében január végére 73 személy vesztette életét, többségében dzsihádista harcosok. Július 30-án pokolgépes merényletben életét vesztette Isza Huszo kurd parancsnok, az észak-szíriai Kamisli-ben. Habár a merényletért senki nem vállalta a felelősséget, a PYD egyértelműen az iszlamista lázadókat tette felelőssé a történtekért és válaszul az YPG harcra szólította fel fegyvereseit az iszlamisták ellen. Az iszlamisták és kurdok között kibontakozó harcokra válaszul Masszúd Barzáni, az autonóm Iraki Kurdisztán vezetője kijelentette, hogy amennyiben az iszlamista "terroristák" fenyegetik a szíriai kurd lakosság életét, az iraki kurdok fegyveresen fognak fellépni a szíriai kurdok védelmében. November 13-án a PYD vezetői elhatározták, hogy létrehoznak egy átmeneti, autonóm kormányt, mely 82 főből állna, a képviselőket pedig a kurd lakosságú kormányzóságokból választanák. A döntés ellen a Szíriai Nemzeti Koalícióhoz közelálló Kurd Nemzeti Tanács és Törökország is tiltakozását fejezte ki, de a PYD angliai szóvivője leszögezte, hogy a szervezet nem törekszik a Szíriai Kurdisztán függetlenítésére, ez csak egy ideiglenes lépés és nem jelent veszélyt a térség stabilitására. Szíriai-török határkonfliktus A szíriai-török kapcsolatok a felkelés kitörését követően súlyosan megromlottak, mivel a török kormány az elsők között karolta fel az ellenzéket. Az ország védelmet nyújtott a Szíriai Nemzeti Tanács tagjainak, valamint török védnökség alatt alakult meg az SZSZH, mely Hatay tartományból kiindulva indította meg gerilla akcióit a szíriai hadsereg ellen. A török kormány mindemellett fegyverekkel és katonai felszereléssel is ellátta a lázadókat. A két ország közti feszültség azt követően érte el a mélypontot, hogy 2012. június 22-én a szíriai légvédelem lelőtt egy, az ország felségterületének számító tengerrész felett repülő F–4 Phantom II török vadászrepülőt, mely valószínűleg felderítést hajtott végre a kormányellenes erők számára. A kétfős személyzet katapultált, de eltűnt, a török és szíriai parti őrség csak július 4-én talált rá a pilóták holttesteire. Az esetet követően a török kormány Ankarában válságtanácskozást hívott össze, majd Recep Tayyip Erdoğan török miniszterelnök a NATO gyűlésén kijelentette, hogy a török gép lelövésére válaszul bármely szíriai katonai elemet, amely megközelíti a török határt fenyegetésnek fognak tekinteni és katonai célpontként fogják kezelni. A bejelentést követően Törökország azonnal megkezdte rakétavetők és légvédelmi rendszerek telepítését a szíriai határ vidékére, annak ellenére, hogy Bassár el-Aszad elnök személyesen fejezte ki sajnálatát az incidens miatt. Október 4-én a szíriai nehéztüzérségi lövedékek a törökországi Akçakale városban csapódtak be, a támadásban öt személy, két nő és három gyermek vesztette életét, 13 személy – köztük rendőrök is – megsebesült. Válaszul a török légierő felderítő repülést hajtott végre szíriai felségterületen, melynek során felmérték a szíriai hadsereg határmenti állásainak pontos koordinátáit, majd az adatokat a török hadvezetéssel ismertették, mely parancsot adott az Akçakale körüli egységeknek ezen állások bombázására. A T-155 Firtina önjáró lövegekkel végrehajtott támadás három szíriai katona halálát okozta. Recep Tayyip Erdoğan miniszterelnök rendkívüli kormányülést hívott össze Ankarában, ahol engedélyezték egy esetleges katonai akció indítását Szíria területére, mindazonáltal a török miniszterelnök közölte, hogy erre csak "végső esetben" kerülhet sor. Október 6-án egy szíriai tüzérségi lövedék ismét török területre csapódott be, erre válaszul a török tüzérség ismét szíriai célpontokat vett tűz alá. A támadás – török közlés alapján – 12 szíriai katona halálát okozta. Október 13-án Törökország megtiltotta a szíriai polgári repülőgépeknek a belépést az ország légterébe, erre válaszul másnap Szíria megismételte a lépést, a török polgári repülőgépekkel szemben. Néhány kisebb incidenst követően október 29-én két légvédelmi tüzérségi lövedék csapódott be Hatay tartomány egy kis határ menti falujában. Válaszul a török tüzérség szíriai célpontokat vett tűz alá, de egyik oldalon sem történtek személyi sérülések. November 12-én a török határ melletti Rasz al-Ajn város környékén vívott csata alatt egy szíriai repülő lázadó állásokat bombázott le. A légitámadás a határ török oldalán fekvő Ceylanpınar várost is sújtotta, néhány épület megrongálódott és egy katona valamint két civil megsebesült. Török válaszcsapásra azonban ezúttal nem került sor. December 4-én a NATO hozzájárult egy, a török-szíriai határra telepítendő MIM–104 Patriot rakétavédelmi rendszer létrehozásához, melynek a szervezet szerint fő célja a határ védelme lesz. Ezt a fegyverrendszert a tervek szerint 360 holland katona fogja működtetni. Habár Anders Fogh Rasmussen NATO főtitkár kihangsúlyozta, hogy a fegyverrendszer kizárólag védelmi célokra lesz alkalmazva, Vlagyimir Putyin orosz elnök tiltakozását fejezte ki miatta. 2014 januárjában egy török vadászrepülő az Iszlám Állam egyik konvojára mért csapást Észak-Szíriában, válaszul egy merényletre, melyet a szervezet hajtott végre Törökország területén. 2014. március 23-án török F-16-os vadászgépek lelőttek egy szíriai vadászrepülőt a szíriai – török határ térségében, mely állításuk szerint belépett a török légtérbe. Később a török hadsereg tankokkal és tüzérségi fegyverekkel vette tűz alá a szíriai hadsereg állásait Kasab város térségében, ahol a hadsereg a lázadókkal harcol az egyik szíriai – török határátkelő birtoklásáért. A Szíriai Külügyminisztérium példátlan agressziónak minősítette a történteket, követelve Törökországtól, hogy azonnal szüntesse be támadásait a szíriai állások ellen. Szíriai-izraeli határkonfliktus 2012. november 3-án három szíriai tank és két csapatszállító jármű hatolt be az Izrael fennhatósága alatt álló Golán-fennsík demilitarizált övezetébe, az izraeli hadsereg azonban nem lépett fel erőszakosan, csupán a térségben állomásozó ENSZ békefenntartóknál tettek panaszt. November 5-én Szíriából érkező lövedékek egy izraeli katonai járművet találtak el, majd november 8-án három (valószínűleg eltévedt) aknagránát csapódott be a Golán-fennsík egyik településére. Az ismétlődő támadások miatt, Móse Jaalon izraeli miniszterelnök-helyettes november 9-én egy nyilatkozatában figyelmeztette Aszad elnököt, hogy országa megvédi szuverenitását, ha a harcok a Golán-fennsíkra is átterjednek. Mikor november 12-én újabb lövedékek hulltak le izraeli területre, az izraeli tankok viszonozták a tüzet, szíriai tüzérségi állásokat támadva, személyi sérülésről azonban nem érkeztek hírek. Másnap ismét szíriai aknagránátok csapódtak be a Golán-fennsík területén, az izraeli tüzérség pedig ismét visszalőtt, legkevesebb két szíriai katonát megsebesítve. November 17-én szíriai lövedékek ismét a Golán-fennsíkon csapódtak be, megrongálva egy AIL Storm katonai terepjárót. Az izraeli tüzérség válaszul rálőtt a hadsereg állásaira, mire szíriai katonák aknavetőkkel intéztek választámadást. Az izraeli tüzérség egy célzott csapással megsemmisítette az aknavetőt. Az izraeli hadvezetőség állítása szerint elképzelhető, hogy a támadásban szíriai katonák is haltak meg. November 25-én egy, a hadsereg és az SZSZH között zajló harc alatt eltévedt golyók csapódtak be a határ izraeli oldalán egy katonai terepjáró mellett. Személyi sérülés nem történt, így izraeli válaszcsapásra sem került sor. A határincidensekre válaszul az SZSZH egy közleményt bocsátott ki, melyben óva intette Izraelt egy esetleges szíriai katonai beavatkozástól, valamint megvádolta az izraeli hadvezetést, hogy a szíriai területre leadott lövéseivel is "Aszad gyilkos rezsimjét" támogatta. 2013. január 6-án Benjámín Netanjáhú miniszterelnök bejelentette, hogy mivel a szíriai hadsereg kénytelen volt feladni Kunejtíra kormányzóság területét, mely így a felkelők kezére került, Izrael a "dzsihádisták" ellen védekezésképpen egy védelmi falat fog kiépíteni a határterületen. Január 31-én éjjel izraeli repülőgépek légitámadást hajtottak végre Szíria területén. A támadás célpontja nem tisztázott – az izraeli kormány hallgatása miatt. Egyes források szerint a támadás egy katonai konvojt ért, mely fegyvereket szállított Szíriából Libanonba, valószínűleg a Hezbollah számára. A kormány hivatalos közleménye szerint azonban a repülőgépek egy Damaszkusz egyik külvárosában, Dzsamrajában található gyárat rongáltak meg, két dolgozót megölve, ötöt megsebesítve. A légitámadás tényét a libanoni kormány is megerősítette, közölve, hogy a libanoni légvédelmi egységek észlelték az izraeli gépeket, melyek Libanon területén keresztül hatoltak be a szíriai légtérbe. A légitámadást mind Oroszország, mind Irán határozottan elítélte. Oroszország szerint Izrael a légitámadással megsértette a nemzetközi jogot. Bassár el-Aszad elnök Izraelt megvádolta, hogy a légitámadással Szíria destabilizálását szeretné elérni. Ehúd Bárák izraeli védelmi miniszter február 3-án egy sajtótájékoztatón első ízben beszélt az incidensről, elismerve az izraeli támadás tényét, kijelentve, hogy a támadással azt próbálták megakadályozni, hogy Szíriából fegyverek juthassanak el Libanonba. Az izraeli hadsereg ez irányú politikáját látszik megerősíteni, hogy február 13-án az iráni Forradalmi Gárda egyik ezredese, Hasszán Shateri ismeretlen körülmények között életét vesztette a szíriai-libanoni határ térségében. Meggyilkolásának körülményei nem tisztázottak, de a szíriai lázadók és a kormány is egyértelműen Izraelt vádolta meg a gyilkosság végrehajtásával. Az izraeli kormány nem nyilatkozott az ügyben. Március elején felkelők hatoltak be a Golán-fennsík Izrael által megszállt területeire. Válaszul az izraeli hadsereg teljes harckészültségbe helyezte a térségben állomásozó csapatait. Március 24-én egy géppuska szíriai területről izraeli állásokat vett tűz alá a Golán-fennsíkon. Az izraeli katonák válaszul rakétát lőttek ki a támadóállásra, megsemmisítve azt. Az incidensnek izraeli részről nem volt áldozata. Május 4-én izraeli repülőgépek Szíria és Libanon határtérségében megsemmisítettek egy fegyvereket szállító konvojt. Habár az izraeli hadvezetőség nem kommentálta a történteket, Michel Szulejmán libanoni elnök megerősítette a támadás tényét, kijelentve, hogy a libanoni radarok érzékelték az izraeli repülőgépeket. Az elnök egyúttal tiltakozását is fejezte ki Izrael akciója ellen, kijelentve, hogy az ország ezáltal megsértette a nemzetközi jogot. Egy nappal később izraeli részről támadás ért egy fegyver-előállító üzemet Damaszkusz egyik külvárosában. A szíriai kormány élesen elítélte a támadást, megvádolva Izraelt, hogy légicsapásaival a lázadók útját egyengeti a győzelemhez. Május folyamán több határincidensre is sor került a Golán-fennsík térségében Izrael és a szíriai hadsereg között. Május 21-én szíriai támadás ért egy izraeli katonai járművet, melyre válaszul izraeli katonák szíriai célpontokat vettek tűz alá. Áldozatokról nincsenek adatok, a szíriai hadsereg szóvivője kijelentette, hogy megsemmisítettek egy izraeli terepjárót, mely átlépte a két ország közötti demarkációs vonalat, az izraeli hadsereg azonban mindkét állítást tagadta. 2014. márciusában újabb incidensre került sor, amikor egy szíriai felségterületről érkező tüzérségi lövedék megsebesített négy izraeli katonát a Golán-fennsík határtérségében. Az izraeli hadsereg válaszul szíriai katonai célpontok ellen hajtott végre légitámadást Kunejtíra térségében. A támadásban egy szíriai katona meghalt, hét megsebesült. 2014. június 22-én egy szíriai felségterületről érkező tüzérségi lövedék eltalált egy civil gépjárművet, az egyik utas meghalt, négyen súlyosan megsebesültek. Az izraeli tüzérség válaszul ismét szíriai katonai célpontokat vett tűz alá. Oroszország hadba lépése 2015. szeptember 30-án Putyin elnök felhatalmazást kért az Oroszországi Föderáció Szövetségi Tanácsától az orosz fegyveres erők szíriai bevetésére. A Szövetségi Tanács a felhatalmazást egyhangú döntéssel megadta. Ugyanaznap Aszad elnök hivatalosan is kérte az orosz fegyveres beavatkozást, így Putyin, mint a fegyveres erők főparancsnoka, utasítást adott a légierőnek az Aszaddal szembenálló erők állásainak bombázására. A második kunajtirai offenzíva A második kunajtirai offenzívát a szíriai felkelők indították 2015 októberében, hogy elfoglalják a kormánynak a kormányzóságban meglévő erődítményeit. Október 4-én két napnyi harc után a Szabad Szíriai Hadsereg felkelői elfoglalták Tall Ahmart, és október 10-én az ENSZ-hegy is a kezükre került. Október 24-re azonban mindazt, amit a felkelők a harcok alatt szereztek és rövid időre birtokoltak, a kormány visszaszerzett, és győzelmével ért véget az offenzíva. A visszaszoruló Iszlám Állam 2017 tavaszától orosz és amerikai támogatással a szír kormányerők és a kurd csapatok folyamatosan szorították vissza az Iszlám Állam harcosait az iraki határ felé. Az év végére Szíria egész területén sikerült felszabadítani a megszállt területeket. Atrocitások a civil lakosság ellen A kormányerők atrocitásai A felkelés kitörését követően a kormányerők brutális eszközök bevetésével léptek fel a fegyvertelen rendszerellenes tüntetőkkel szemben is, majd a Szabad Szíriai Hadsereggel kialakult konfliktus során sem kímélték a civil lakosságot. Homsz ostroma során a civil lakosságra való tekintet nélkül bombázták a város lakónegyedeit, melynek köszönhetően 2012 áprilisáig az ostromlott városban 4464 fegyveres felkelő és civil vesztette életét A bombázásokban hunyt el Gilles Jacquier és Rémi Ochlik francia, illetve Marie Colvin amerikai újságíró is. 2012. március 9-én 30 tank hatolt be Homsz Karm al-Zejtún negyedébe, majd az azokat kísérő szíriai katonák (egyes források szerint a Sabiha kormánypárti paramilitáris alakulat tagjai) lemészároltak 47 nőt és gyermekeket, áldozataiknak elvágva a torkukat. A szíriai kormány nem tagadta a mészárlás tényét, de elkövetését a "fegyveres, terrorista bandákra hárította". A legnagyobb nemzetközi felhördülést a 2012. május 25-i húlai mészárlás okozta. Ennek során a Sabiha milícia tagjai 108 fegyvertelen civilt mészároltak le, 25 férfit, 34 nőt és 49 gyermeket. további 300 személyt pedig megsebesítettek. Az országban tartózkodó ENSZ misszió tagjai másnap a városba látogattak, ahol részt vettek az áldozatok temetésén. Az esetet követően több ország megszakította diplomáciai kapcsolatait Szíriával, és a mészárlás nagymértékben hozzájárult ahhoz, hogy az SZSZH felmondja az akkorra már amúgy is csak papíron létező fegyverszünetet. Június 6-án a Sabiha és a hadsereg közös akció keretében lemészárolta Kubair falu 55 – 78 lakosát. Az ENSZ megfigyelők azonnal megkíséreltek eljutni a helyszínre, egy szomszéd falu kormánypárti lakosai azonban meggátolták őket ebben, majd a visszaforduló ENSZ konvojra lőfegyverekkel támadtak rá. Mire végül sikerült eljutniuk a helyszínre, a legyilkolt lakosok hulláit eltüntették. Augusztus 17-én Al Tall városban – miután visszafoglalták a lázadóktól – 58 helyi lakost végeztek ki a katonák az SZSZH támogatásának vádjával. November 26-án a Szíriai Légierő lázadó állásokat támadott Damaszkusztól keletre, ennek során egy vadászrepülő – a nemzetközileg betiltott – kazettás bombát dobott egy falura. A támadásban tíz gyermek életét vesztette, a damaszkuszi kormány azonban tagadta a vádakat, miszerint egyáltalán kazettás lőszerek lennének a hadsereg birtokában. 2013 januárjában egy Homsz melletti faluban, Haszvijában 106 személyt mészároltak le szíriai katonák. Néhányukat élve megégették, másoknak a torkukat késsel elvágták. Májusban heves harcokat követően szíriai katonák elfoglaltak egy Banijasz melletti szunnita falut, ahol ellenzéki aktivisták jelentései szerint 51 – 100 civilt végeztek ki, majd május 3-án Banijasz szunniták által lakott negyedét rohamozták meg és itt is legyilkoltak 62 – 77 civilt. Atrocitások a felkelők részéről A kormánycsapatok mellett a Human Rights Watch valamint az orosz kormány az SZSZH tagjait is megvádolta atrocitásokkal, melyek főként a kormánypártiak rovására történő gyilkosságokban, részben a vallási kisebbségek elleni atrocitásokban merülnek ki. A szíriai kormány jelentése szerint június 22-én az Aleppóhoz közeli Daret Izza faluban 26 kormánypárti személyt lőttek agyon felkelők. Az aleppói csata idején számos esetben előfordult, hogy szíriai lázadók hadifoglyokat és Aszad-párti személyeket végeztek ki, tetteikről pedig amatőr videó felvételeket készítettek, melyeket videómegosztó portálokra töltöttek fel. A Human Rights Watch elítélte a történteket, háborús bűntettnek nevezve azt. A The Sunday Times értesülései szerint az aleppói harcok alatt a lázadók élő pajzsként használták a civileket. Kisebb-nagyobb atrocitások azonban Aleppón kívül is előfordultak az ellenzéki fegyveresek részéről. 2012. augusztus 7-én felkelők egy Homsz melletti vendégházban 16 fegyvertelen civilt gyilkoltak le. Az áldozatok többsége keresztény és síita felekezetű volt, de szunniták is voltak köztük. A fegyveres felkelés kitörését követően rendszeresen érik atrocitások a keresztény lakosságot a szélsőségesebb lázadók részéről. Homszban, a városért vívott csata idején fegyveresek többször támadtak keresztényekre, illetve rongáltak meg templomokat. Az ismétlődő támadások hatására a város teljes keresztény lakossága elmenekült, a Homsz melletti Kuszairban pedig június folyamán több helybéli keresztényt meggyilkoltak, a többieket pedig menekülésre kényszerítették. 2013 február 17-én a frissen elfoglalt al-Saddadi településen legkevesebb 10 helybéli munkást végeztek ki az Al-Nuszra Front lázadói. Nagy felháborodást okozott egy május 14-én közzétett videófelvétel, melyen egy homszi lázadócsoport parancsnoka, Abu Sakkar (akit a Human Rights Watch már régóta háborús bűnök elkövetésével vádol) kivágta egy halott szíriai katona szívét, majd beleharapott, utána megfenyegetve az Aszad elnökhöz lojális katonákat, hogy hasonló sorsra fognak jutni. Abu Szakkar tettét több ország is hivatalosan elítélte, az ellenzéki koalíció pedig kijelentette, hogy ezért elszámoltatás vár a lázadóparancsnokra. Június 10-én iszlamista felkelők nyilvánosan kivégeztek egy 15 éves fiút Aleppóban, aki állítólag ateistának mondta magát. Június 12-én a kelet-szíriai Hatla faluban iszlamista felkelők 60 alavita felekezetű személlyel végeztek, akik állításuk szerint egy nappal korábban fegyveresen támadtak a lázadók állásaira. Szeptemberben a keresztények által lakott Maalula faluban zajló harcok idején iszlamista fegyveresek egy helybéli keresztényt meggyilkoltak, egy másikat pedig erőszakkal áttérítettek az iszlámra. A Human Rights Watch jelentése szerint 2013 augusztusában a lázadók egy offenzíva során atrocitásokat hajtottak végre Latakia kormányzóság több alaviták által lakott falujában. A jelentés szerint lázadó fegyveresek 190 alavita felekezetű személlyel végeztek, jelentős részüket szabályosan kivégezték, valamint mintegy 200 személyt túszul ejtettek és magukkal hurcoltak, miután a kormányerők ellentámadása következtében ki kellett üríteniük a megszállt területet. A mészárlás elkövetői elsősorban az iszlamista szervezetek voltak, az SZSZH részvételére vonatkozóan nem kerültek elő bizonyítékok. A HRW fegyverembargó életbe léptetését javasolta az ENSZ-nek a mészárlásban részt vevő szervezetek ellen. A Sabiha milícia A Sabiha (nevének jelentése: szellem) szervezetet az 1980-as években alapította Namír el-Aszad, Háfez elnök unokatestvére. Háfez el-Aszad uralma alatt a milícia a szíriai rezsim egyik alappillérévé nőtte ki magát, Bassár el-Aszad uralmának kezdetén azonban – az elnök által elkezdett politikai reformok idején – jórészt feloszlatták őket. A tüntetések, majd a fegyveres felkelés kitörésekor azonban ismét felállították a Sabihát és főként rendvédelmi feladatokra alkalmazták őket. A konfliktus alatt a szervezetet többször is megvádolták az ellenzéki tüntetők és civil lakosság elleni erőszakos cselekményekkel. Legelőször 2011 márciusában, Latakiában tűnt fel a Sabiha, amikor a milíciához tartozó géppuskások és mesterlövészek 21 tüntetővel végeztek. Alig egy hónappal később a Homsz elleni invázióban is szerepeltek, itt – ellenzéki állítások szerint – további 21 főt gyilkoltak meg. Júniusban szíriai menekültek azzal vádolták meg a Sabihát, hogy a hadsereggel együttműködve a felperzselt föld taktikáját alkalmazza a török határ menti térségben. A szervezet nemzetközi hírnévre a húlai mészárlást követően tett szert, mikor a 108 halálos áldozattal járó gyilkossággal a Sabihát vádolták meg (a túlélők vallomásaira alapozva). A szíriai kormány azonban tagadta a szervezet vagy a hadsereg érintettségét. 2012. június 6-án a 78 halálos áldozattal járó kubairi mészárlást követően is a Sabiha felelőssége merült fel. December 12-én vitatott körülmények között életét vesztette megközelítőleg 150 alavita személy a Hamá melletti Akrab faluban. Az SZSZH és a Human Rights Watch állítása szerint a faluban Sabiha milicisták sáncolták el magukat, akik az SZSZH támadását követően élő pajzsként használták a civileket. A tűzharc során a légierő is támadást hajtott végre több épület ellen, ezzel civilek halálát is okozva. Az eset körülményei azonban egyelőre nem tisztázódtak, Alex Thomson brit újságíró szemtanúkra hivatkozva a lázadókat vádolta meg a mészárlás elkövetésével. A vallási kisebbségek állásfoglalása A keresztények A szíriai keresztények – az alaviták mellett – az ország legnagyobb vallási kisebbségének számítanak. A számuk becslések szerint eléri a 2,5 milliót, ezzel a lakosság mintegy 10%-át teszik ki, legnagyobb számban Aleppó vidékén és Damaszkusz egyes negyedeiben élnek. Háfez és Bassár el-Aszad uralma alatt az általános vallási toleranciának köszönhetően teljeskörű vallásszabadságnak örvendtek. Ebben az időszakban több szíriai keresztény is ért el jelentős állami és társadalmi pozíciót, így például a 2012 júliusában öngyilkos merényletben meggyilkolt Davúd Radzsa, aki 2011 augusztusától haláláig az ország honvédelmi minisztere volt. Ennek ellenére a felkelés kezdeti szakaszában a keresztények egy része is csatlakozott az ellenzékhez, csakhamar azonban visszakoztak egyes szélsőséges megnyilvánulások hatására. A konfliktus kezdeti szakaszában több szélsőséges szunnita tüntető olyan jelszavakat skandált, mint "a keresztényeket Bejrútba, az alavitákat koporsókba", valamint egy ellenzéki harcos kezében kettétört kereszttel, papi stólában fotózkodott. A keresztény lakosság így inkább megmaradt a kiszámíthatóbb Aszad-kormányzat oldalán. A fegyveres felkelés kitörését követően azonban rendszerint érik atrocitások a keresztény lakosságot a szélsőségesebb lázadók részéről. Homszban, a városért vívott csata idején a lázadók többször támadtak keresztényekre, illetve rongáltak meg templomokat. Az ismétlődő támadások hatására a város teljes keresztény lakossága elmenekült. A konfliktus alatt többször történtek pokolgépes merényletek Damaszkusz és Aleppó keresztény negyedeiben is, a Homsz melletti Kuszairban pedig június folyamán több helybéli keresztényt meggyilkoltak, a többieket pedig menekülésre kényszerítették. A támadásokra válaszul Aleppó keresztény férfilakossága a lázadók előrenyomulásának hírére fegyverkezésbe kezdett. Szeptemberben, mikor az SZSZH megkísérelte a keresztények által lakott negyedek birtokbavételét, a helybeli örmény és ortodox lakosság a szíriai hadsereg védelmére sietett és súlyos harcok árán visszaverték a támadást. A konfliktus eszkalálódását követően keresztények százezrei választották a menekülést az országból, jelentős részük nem is számol a visszatérés lehetőségével. A menekültek – elmondásuk szerint – attól félnek, hogy a rezsim bukása esetén hittársaik az iszlamisták támadásainak célpontjaivá válnak, akárcsak az iraki keresztények Szaddám Huszein rendszerének bukását követően. Az SZNT azonban a keresztény lakosság félelmeinek csökkentése és az ellenzék oldalára való állítása érdekében, 2012. november 9-én Dohában egy keresztényt választott meg a szervezet elnökévé, George Szabra személyében. Ennek ellenére a keresztény lakosság zaklatása továbbra is folytatódott. December végén egy lázadó csoportosulás lerohanással fenyegette meg Hamá kormányzóság két, többségében keresztények által lakott települését, amennyiben a lakosok nem kelnek fel fegyveresen a kormánycsapatok ellen. Április 23-án Aleppó mellett iszlamista fegyveresek elrabolták az Asszír és a Görög Ortodox Egyházak püspökeit. Júniusban Francois Mourad ferences szerzetest lőtték agyon az Al-Nuszra Front fegyveresei, azzal az indokkal, hogy megtalálták nála a szíriai kormány néhány tisztségviselőjének az elérhetőségét. 2013 októberében a szíriai görögkatolikus pátriárcha azt nyilatkozta a BBC-nek, hogy az országban élő keresztény lakosság mintegy negyede, hozzávetőlegesen 450 000 ember menekült el addigi lakóhelyéről. Az alaviták és drúzok A keresztények mellett Szíria legjelentősebb vallási kisebbségei a közel 2,6 millió főt kitevő alaviták és a 700 000 főt kitevő drúzok Az alaviták hagyományosan csak az ország nyugati, Földközi-tengerrel határos részén éltek, de az (ebbe a közösségbe tartozó) Aszad-család hatalomra kerülését követően jelentős méretű alavita közösségek alakultak ki Hamá és Homsz városokban, de kisebb-nagyobb számban Szíria más nagyvárosaiban is élnek, így Damaszkuszban is. Becslések szerint a konfliktus kitörésekor megközelítőleg az ország lakosságának 12%-a tartozott ehhez a felekezethez. A szíriai alaviták többsége a konfliktus kitörését követően leginkább a fennálló politikai hatalom oldalán sorakozott fel. Többségük úgy gondolja, hogy Aszad támogatásával a "nemzeti egységet" tartja fenn, míg a lázadók súlyos veszélyt jelentenek az ország vallási kisebbségeire nézve. Ezt az álláspontot alátámasztani látszik, hogy már a tüntetések kezdeti szakaszában egyes ellenzékiek a "keresztényeket Bejrútba, alavitákat a koporsóba" jelmondatot skandálták, a későbbi fegyveres harcok során pedig egyes szélsőséges lázadók atrocitásokat hajtottak végre alaviták ellen. Egyes alavita politikai körök a rezsim bukása esetére egy tervet is kidolgoztak az 1920 – 1936 között francia fennhatóság alatt létezett alavita állam újbóli felállítására, mely Latakia és Tartúsz kormányzóságokat foglalná magába (mindkét közigazgatási egység lakosságnak többsége ehhez a felekezethez tartozik). 2012 októberében Háfez el-Aszad szülőfalujában, Kardahában az alavita otmán klán és Bassár el-Aszad nagybátyja, Mohamed el-Aszad Sabiha-parancsnok között konfliktus robbant ki, melynek kiváltó oka a klán vezetőjének Aszad elnököt elítélő nyilatkozata volt. A két fél közt fegyveres összecsapásra került sor, melynek során Mohammed el-Aszad súlyosan megsebesült. A szíriai kormány katonákat küldött a faluba az otmán klán fegyvereseinek megfékezésére. Szíria drúz lakossága nem foglalt egyöntetűen állást egyik oldalon sem. A főként Dzsebel al-Drúznak nevezett térségben (az ország déli részén, Szuvajdá kormányzóságban) élő vallási kisebbség igyekszik kimaradni a konfliktusból, ennek köszönhető, hogy a régió maradt Szíria legbékésebb térsége. Habár néhány, az ellenzék oldalán agitáló drúz aktivista megkísérelte a kormányellenes tüntetések szervezését, a lakosság csak kis része vett részt benne. Az Idlib kormányzóság területén, mintegy 15 településen élő drúz lakosság azonban jobbára az ellenzéket támogatja. Habár fegyveresen nem vesznek részt a harcokban, falvaikban kórházakat működtetnek, ahol a harcok során megsebesült lázadókat részesítik orvosi ellátásban. A polgárháború megosztotta az Izrael által 1967 óta megszállva tartott, de a nemzetközi közösség által de iure Szíria részének tekintett Golán-fennsík mintegy 20 000 fős drúz lakosságát is (a megosztottság előidézésében fontos szerepet játszottak a Szíriából ideérkező menekültek). Míg egyesek Aszad mellett foglalnak állást, akit a Golán-fennsík "jövendőbeli felszabadítójának" tekintenek, mások az elnökben az erőszak kezdeményezőjét látják. A megosztottság időnként heves összeütközésekbe torkollott, mikor 2012 júliusában lázadópárti tüntetők vonultak fel, Aszad lemondását követelve. A drúz közösség vezetői megtiltották a nyílt állásfoglalást, száműzetést helyezve kilátásba a "felforgatók" ellen. Augusztus folyamán Mazsdal Samsz faluból két személyt ki is tiltottak. A polgárháború kitörése óta több tucat drúz lakos folyamodott izraeli állampolgárságért, melyet korábban – Szíriához való hűségük jeleként – nem voltak hajlandóak felvenni. Az állampolgárságért folyamodó drúzok többsége abbeli aggályait fejezte ki, hogy Aszad félreállítása intoleranciát fog szülni a szíriai vallási kisebbségekkel, így a drúzokkal szemben is. Külföldi állampolgárságú civil áldozatok A konfliktus kitörése óta 642 – 1548 külföldi állampolgárságú személy vesztette életét. Ezeknek többsége az országban levő menekülttáborokban élő palesztinok közül kerül ki. A táborok ellen – mindkét fél részéről – végrehajtott támadásoknak megközelítőleg 700 civil áldozata volt a PFSZ szerint, ezeknek többsége a Damaszkusz melletti Jarmúk menekülttáborban halt meg. Szíria területén további 21 iraki civil halt meg (köztük két újságíró), akik az országban dolgoztak. Szeptemberben a Dajr ez-Zaur kormányzóságban zajló harcok során egy eltévedt lövedék egy iraki határvárosban csapódott be, egy négyéves kislány életét vesztette, négy másik személy pedig megsebesült. A szíriai harcok különösen gyakran kiterjedtek Libanon területére, melynek határvidékét a mindkét fél gyakran felvonulási területként használta. A harcok és határincidensek során legkevesebb 24 libanoni halt meg. Egy síita zarándok egy busz elleni aknagránát támadásban halt meg a szíriai határon (négy szíriai határőrrel együtt), májusban pedig egy, a határ térségében tartózkodó vadászt lőttek le szíriai katonák. 2012. júliusában SZSZH lázadók lépték át a libanoni határt, az őket üldöző katonai alakulatok aknavetőkkel intéztek támadást néhány észak-libanoni falu ellen. Az incidensben 5 személy vesztette életét. Néhány nappal később a hadsereg egy újabb bombázásában három fő vesztette életét. Az ismétlődő támadásokra hivatkozva, libanoni ellenzéki csoportok kéréssel fordultak az ENSZ-hez, hogy az ország déli részén állomásozó békefenntartók egy részét telepítsék át a szíriai határra, ezt azonban a Szíria-barát kormány határozottan ellenezte. A harcok folyamán 16 török állampolgárságú civil vesztette életét, öt fő egy határincidensben, három egy robbanásban a szíriai határ mellett a többiek a Szíria területén zajló harcokban. A konfliktus alatt több külföldi újságíró is életét vesztette, köztük a japán állampolgárságú Mika Jamamoto Aleppóban, a francia állampolgárságú Gilles Jacquier és Rémi Ochlik Homszban, az amerikai állampolgárságú Marie Colvin szintén Homszban, valamint két brit újságíró egy török határ melletti faluban. 2013. január 18-án Yves Debay belga-francia kettős állampolgárságú újságíróval végzett egy mesterlövész Aleppóban. 2013. decemberében egy brit állampolgárságú sebész – akit Damaszkuszban tartottak börtönben – ismeretlen körülmények között életét vesztette. A halálos áldozatok száma országonként: A lista kizárólag a civil áldozatokat tartalmazza, a lázadók közt harcoló külföldi harcosokat nem. Menekültek Az egyre súlyosbodó konfliktus elől több százezer szíriai menekült külföldre, 2012 októberében számukat már legkevesebb 470 000 főre becsülték. A menekülők elsődleges célpontja Törökország, ahol legkevesebb 120 000 szíriai lelt menedékre. A török kormány az őket befogadó menekülttáborokat Hatay tartományban, a szíriai határ mellett hozta létre. További mintegy 185 000 ember menekült Jordánia területére, Libanonba pedig mintegy 90 000. Mintegy 35 000 szíriai kurd menekült Észak-Irakba, az autonóm Kurdisztán régióba. Ehúd Bárák izraeli védelmi miniszter kijelentette, hogy országa nem hajlandó fogadni egy menekültáradatot az Izrael által megszállt Golán-fennsíkon, viszont hozzájárult néhány – főként alavita és drúz – menekült ideiglenes letelepedéséhez. Emellett izraeli karitatív csoportok segítenek Jordániában a menekültek letelepítésében és ellátásában. Dezertálások Már a kezdeti tüntetések során elkövetett erőszakos cselekmények, esetleg a tüntetőkhöz fűződő kapcsolat arra késztetett több befolyásos közéleti személyiséget, politikust és katonát, hogy az elnök támogatóinak táborát otthagyja és átálljon az ellenzékhez. Az al-Dzsazíra által 2012. november 25-én közzétett lista alapján, eddig a dátumig 73 magas rangú politikus és katonatiszt dezertált, köztük a kormány három minisztere, négy parlamenti képviselő, 13 diplomata és 53 katona főtiszt. Az Aszad-rezsimet legsúlyosabban Rijád el-Aszad ezredes dezertálása érintette, aki a már átállt katonatisztekkel együtt megalapította a Szabad Szíriai Hadsereget. Ennek az alakulatnak elsőként szintén a hadseregből szökött katonák lettek a tagjai. Neves dezertálók voltak még Manaf Tlassz, a Szíriai Köztársasági Gárda korábbi dandártábornoka, Navaf al-Fáresz, Szíria iraki nagykövete, illetve a legmagasabb rangú politikus, aki átállt az ellenzékhez, Rijád Fárid Hidzsáb volt, aki 2012. június 23. – augusztus 6. között az ország miniszterelnökének a tisztségét töltötte be. December elején a külügyminisztérium szóvivője, Dzsihád Makdiszi is elhagyta az országot, előbb Bejrútba, majd Londonba menekülve. December 26-án a katonai rendőrség főparancsnoka, Abdel-Azíz Dzsászim as-Salal hagyta el a kormány támogatóinak táborát és hitet tett a felkelők mellett. Nemzetközi reakciók A szíriai tüntetők elleni erőszakot az ENSZ, az EU és több ország is elítélte. Venezuela elnöke, Hugo Chávez megjövendölte, hogy az Egyesült Államok Líbiához hasonlóan Szíriában is be fog avatkozni a zavargásokba. Az USA külügyminisztere, Hillary Clinton azonban kijelentette, hogy habár elítélik az erőszak alkalmazását, az ország nem tervez katonai beavatkozást. 2012. szeptemberében Hillary Clinton felvetette a szíriai légtér részleges lezárásának ötletét. Az április 25-i eseményeket, mikor a szíriai hadsereg tankokat is bevetett a darai tüntetők ellen, a világ több országa elítélte. Olaszország és Franciaország felszólította az ENSZt szankciók bevezetésére Szíria ellen, Nagy Britannia és az Egyesült Államok közölte, hogy mérlegeli a lehetséges lépéseket. A szíriai vezetés erőszakos fellépését Pan Gimun ENSZ főtitkár is elfogadhatatlannak nevezte. Az ENSZ BT április 28-án egy elítélő nyilatkozatot szeretett volna közzétenni, amelyet Nagy-Britannia, Németország, Franciaország és Portugália közösen nyújtott be, de ez azonban Oroszország, Kína és Libanon tiltakozása miatt meghiúsult. Az orosz ENSZ nagykövet-helyettes, Alekszandr Pankin az ország ellenkezését azzal magyarázta, hogy még a szíriai események nem jelentenek fenyegetést a nemzetközi biztonságra, de egy esetleges ENSZ beavatkozás polgárháborúvá mélyíthetné a konfliktust. Augusztus 23-án az ENSZ szankciókkal sújtott öt szíriai tábornokot, a teljes szíriai katonai- és polgári hírszerzést, valamint az iráni Forradalmi Gárda Al-Kudsz (Jeruzsálem) nevű különleges egységét is, mert az a vádak szerint a zavargások kitörése óta technikai segítséget nyújt a szír biztonsági erőknek a mozgalom elfojtásához. November 12-én az Arab Liga 18 támogató és 3 ellenző (Libanon, Jemen és Szíria) szavazattal kizárta az országot tagjai közül. Szíriával szemben szankciókat is bevezettek és visszahívták nagyköveteiket az országból, illetve meghívták az ellenzéki mozgalom vezetőit egy tárgyalás megkezdésére a békés átmenetről. A kizárásra válaszul másnap kormánypárti tüntetők támadtak Katar, Törökország és Szaúd-Arábia nagykövetségeire Damaszkuszban. Válaszul Katar és Törökország visszahívta nagyköveteit az országból. II. Abdullah jordán király az arab országok vezetői közül elsőként felszólította Aszad elnököt a lemondásra. Ugyanakkor kijelentette, hogy az elnöknek kötelessége gondoskodni egy békés átmenetről. November 15-én a Szíriai Nemzeti Tanács ismét elutasította egy esetleges külföldi katonai beavatkozás lehetőségét és Oroszországot kérte fel az elnök lemondásának elérésére. Az orosz külügyminisztérium ígéretet tett az Arab Ligával való együttműködésre, de az ellenzéki tanács elismerése fel sem merült. Moszkva tárgyalásra szólította fel a feleket és az erőszak beszüntetésére. 2011. november 19-én az al-Dzsazíra cikke felteszi a kérdést, miszerint "Szíriában vajon polgárháború van-e". Megállapítja, hogy "a szíriai felkelés vezetői mindig is békés tüntetéseket akartak, de a katonaságból átállók ellenállnak és harcolnak." Elgondolkodik továbbá azon, hogy mi lesz Szíria sorsa és a megosztott nemzetközi közösség vajon mit fog tenni az ügyben. Miután november 22-én egy szaúdi állampolgárt is meggyilkoltak a biztonsági erők, a Perzsa-öböl menti országok felszólították állampolgáraikat az ország elhagyására. Február 4-én, a szíriai hadsereg előző napi brutalitása ellen tiltakozva (melynek 260 civil esett áldozatul), tüntetések zajlottak Szíria londoni, berlini és washingtoni nagykövetségénél, valamint tüntetők megrongálták Szíria kuvaiti nagykövetségét és megostromolták, valamint felgyújtották a kairói nagykövetséget. Később hasonló támadás érte a canberrai és varsói nagykövetségeket is. Szintén február 4-én az ENSZ BT megkísérelt egy – az Aszad-rezsimet nemzetközi nyomás alá helyező – dokumentumot elfogadtatni a tanács tagjaival, a tervezetet a 15 tagból 13-an támogatták, de Kína és Oroszország megvétózta. Susan Rice amerikai ENSZ nagykövet az esetet követően kijelentette, hogy az orosz és kínai vétó szégyenletes és azt mutatja, hogy a két ország célja a szíriai népet "felkínálni egy zsarnoknak". Február 18-án az NBC News az amerikai védelmi minisztérium munkatársaira hivatkozva beszámolt arról, hogy amerikai drónok (pilóta nélküli repülőgépek) figyelik a szíriai hadsereg mozgását, műveleteit, valamint lehallgatják a kormány és a hadsereg parancsnoksága közötti üzenetváltásokat. Az NBC forrásai azonban leszögezték: a felderítések nem tekinthetőek egy esetleges amerikai katonai beavatkozás előkészítésének Bassár el-Aszad elnök rezsimje ellen. A szíriai kormány erre válaszul "terrorista cselekedettel" vádolta meg az Egyesült Államokat, felszólítva az ENSZ-et, hogy lépjen fel a szíriai belügyekbe való beavatkozás ellen. Február 24-én Tunézia fővárosában, Tuniszban nemzetközi konferenciára került sor a szíriai válság rendezése kapcsán, az Arab Liga, az EU, Törökország és a szíriai ellenzék képviselőinek jelenlététben, a konferencián azonban Kína és Oroszország tiltakozásként nem vett részt. A mintegy 70 ország külügyminisztereinek tanácskozásán számos lehetséges megoldás felmerült a válság kezelésére, így az EU részéről bevezetendő embargó és a szíriai lázadók felfegyverzése is szóba került a lehetséges megoldások között (ez utóbbit főként Franciaország és Szaúd-Arábia képviselői támogatták), sőt a tunéziai elnök, Monszef Marzúki felajánlotta lehetséges megoldásnak, hogy a szíriai elnök Ali Abdullah Száleh jemeni elnök példájára vonuljon önkéntes száműzetésbe Oroszország területére, a javaslat azonban nem nyerte el a szíriai ellenzék tetszését, akik háborús bűnösként tekintenek Aszadra, és bíróság elé szeretnék állítani. A konferencia zárónyilatkozatában végül ismételten felszólították Damaszkuszt, hogy hagyjon fel az erőszak minden formájával és tegye lehetővé a nemzetközi segélyszervezetek bejutását az országba. Egy konkrét lépés kidolgozásának a hiánya miatt azonban Szaúd-Arábia külügyminisztere Szaúd al-Fejszál tiltakozásként elhagyta a konferenciát még annak befejezése előtt. Szíria hivatalos közleményében ellenséges lépésnek nevezte a tuniszi konferenciát és kijelentette, hogy ellenségeinek tekinti annak résztvevőit, a szóvivő szerint a gyűlés a "szíriai terrorizmus" támogatására szolgált. A Szíriai Nemzeti Tanács március 12-én az ENSZ BT sürgős összehívását kérte, miután a szíriai hadsereg az SZSZH által kiszivárogtatott információk szerint 47 nőt és gyermeket lemészárolt Homszban. A felkelők videófelvétellel is alátámasztották állításukat. A szíriai állami televízió azonban a "fegyveres terrorista bandákat" vádolta meg a mészárlással. A Human Rights Watch március végén nyilatkozatot tett közzé, melyben a biztonsági erők tagjai és Aszad támogatói elleni atrocitásokkal vádolta meg a felkelőket is, ugyanakkor kijelentette, hogy ezek nem a Szíriai Nemzeti Tanács utasításaira történnek, viszont az SZNT feladata felszólalni a kínzások és kivégzések ellen. Április 1-jén több mint 70 ország képviselői Isztambulban újabb konferenciát tartottak, melynek végén Hillary Clinton amerikai külügyminiszter ismételten felszólította Bassár el-Aszad elnököt a vérontás befejezésére. William Hague brit külügyminiszter ezt nyomatékosítva kijelentette, hogy országa jelentős mértékben megnöveli a továbbiakban a szíriai ellenzéknek nyújtott pénzügyi támogatás mértékét. Április 5-én az ENSZ BT egyhangú nyilatkozatban felszólította a szíriai kormányt, hogy öt napon belül vonja ki katonáit a lázongó városokból. A szíriai kormány közleményében kijelentette, hogy elfogadják a Kofi Annan megbízott által kidolgozott tűzszünetről szóló javaslatot, amennyiben a felkelők írásban garantálják annak betartását. Rijád el-Aszad, az SZSZH elnöke azonban leszögezte, hogy a szervezet hajlandó elfogadni a tűzszünetet, de nem hajlandó ezt írásban garantálni a kormány irányába, mivel nem ismeri el azt az állam hivatalos képviselőjének. Később azonban, április 12-én a tűzszünet az írásos garancia nélkül is életbe lépett. Nagy nemzetközi felháborodást okozott a május 25-i húlai mészárlás, melynek során a szíriai hadsereg és/vagy a Sabiha milícia 108 fegyvertelen civilt mészárolt le Húla városban. Az eseményre válaszul, Franciaország kiutasította a szíriai nagykövetet az országból, valamint Ausztrália is távozásra szólított fel két szíriai diplomatát, egyúttal buzdítva más országokat is, hogy hasonlóképpen cselekedjenek. Néhány nap múlva az Egyesült Államok is kiutasította a szíriai diplomácia képviselőit az országból, majd május 31-én Panama is hasonlóan cselekedett. Válaszul a szíriai kormány "nemkívánatos" személyekké nyilvánította több ország diplomatáit. Június 12-én Hervé Ladsous, az ENSZ békefenntartó misszióinak főfelelőse kijelentette, hogy a szíriai felkelést már "nyugodt szívvel" lehet polgárháborúnak tekinteni, mert a harcok intenzitása akkora, hogy ezt a fokot tulajdonképpen el is érte. A lázadó erők már nagy területeket is az ellenőrzésük alatt tartanak, melyekért a szíriai hadsereg szabályos, nyílt csatákat vív. December elején az EU közölte, hogy minimálisra csökkenti a jelenlétét a szír fővárosban, egy korábbi fegyveres támadásra hivatkozva, melyben két osztrák ENSZ megfigyelő megsebesült. Ezt követően biztonsági okokra hivatkozva Magyarország is felfüggesztette diplomáciai tevékenységét a fővárosban. A kormány támogatói A szíriai kormány legjelentősebb támogatóinak Oroszország és Irán számítanak. Oroszország támogatása elsősorban a – már hidegháború idején kialakult – hagyományos orosz – szíriai gazdasági és politikai szövetségnek köszönhető, melynek "jelképeként" Tartúszban orosz haditengerészeti kikötő működik. Oroszországnak így érdeke fenntartani az Aszad-rezsimet, egyrészt mivel bukása esetén az összes orosz – szíriai szerződés és orosz befektetés semmissé válhatna, másrészt presztízs okokból is, mivel a tartúszi katonai támaszpont az egyetlen olyan orosz katonai bázis, mely a néhai Szovjetunió határain kívül található. Az orosz politikai vezetés ennek megfelelően a konfliktus során fegyvereket és katonai kiképzőket küldött a szíriai hadsereg számára. Január 13-án Tartúsz kikötőjében egy orosz hadihajó kötött ki, 30-60 tonna lőszerrel, megsértve ezzel az ENSZ által Szíria ellen elrendelt fegyverembargót. A hajó két nappal azelőtt a tomboló vihar elől Ciprus Limassol nevű kikötőjében keresett menedéket, ahonnan a hatóságok csak azt követően engedték el, hogy a kapitány megígérte az útvonal módosítását. A kikötő elhagyása után azonban kikapcsolták a jármű nyomkövetését célzó berendezéseket és a török haditengerészet információi szerint megérkezett eredeti rendeltetési helyére. Pár nappal később Moszkva 36 darab Jak–130-as harci repülőgépet adott el Szíriának. A Human Rights Watch szervezet "erkölcstelennek" nevezte, hogy Oroszország támogatja a szíriai rezsimet. A fegyverszállítmányok miatt előbb a Human Rights Watch, majd az Amnesty International is tiltakozását fejezte ki. Március végén Oroszország bejelentette, hogy leállították az SZ–300-as rakétarendszer szállítását Szíriának, az erőteljes nyugati nyomás hatására. A védelmi minisztérium azonban közölte, hogy továbbra is folytatja a Buk-M-2 és Pancyr légvédelmi rakéták szállítását. Ennek ellenére, 2012 júniusában Vlagyimir Putyin orosz elnök cáfolta a vádakat, miszerint az ország állást foglalna a polgárháborúban. 2012 decembere és 2013 januárja között az orosz hadvezetés több hadihajót – fedélzetén hadianyaggal és katonákkal – a Földközi-tenger Tartúsz környéki részére vezényelt, az orosz védelmi minisztérium hivatalos közlése szerint csak azért, hogy szükség esetén kimenekíthessék az országban tartózkodó orosz állampolgárokat. 2013 májusában pedig Oroszország Yakhont hajó-elleni rakétákat küldött a szíriai hadvezetés számára, melyet feltételezések szerint egy esetleges külföldi intervenció esetén vetne be a szíriai hadsereg. A fegyveres támogatás mellett azonban Oroszország és Kína rendre megvétózta az összes ENSZ BT elé kerülő javaslatot, mely a szíriai kormány ellen irányult. A kínai külügyminiszter szerint erre országa részéről azért került sor, mert Kína Szíriában egy békés átmenetet szeretne biztosítani és nem a fennálló rezsim támogatása volt a cél. A kormány másik nagy támogatója, Irán, nemcsak passzívan, hanem aktívan is részt vett a konfliktusban. Az iráni országvezetés a Forradalmi Gárda 15 000 elit katonáját küldte Szíriába, Aszad megsegítésére. Az ország emellett rendszeresen küldött fegyvert, üzemanyagot és technikai eszközöket a szíriai hadseregnek. A lázadók drónok bevetésével is megvádolták az iráni hadsereget. 2012 márciusban szíriai ellenzéki szervezetek Bassár el-Aszad egy bennfentesének köszönhetően feltörték az elnök és felesége e-mail postafiókját, melynek révén kiderült, hogy az elnök a felkelés kitörése óta mintegy 3000 üzenetet kapott az iráni országvezetéstől, melyek az ellenzéki mozgalmak vérbefojtására vonatkozó tanácsokat tartalmaztak. Július 25-én a Forradalmi Gárda egyik tisztje országa nevében kijelentette, hogy Irán soha, semmilyen körülmények között nem fog hozzájárulni egy szíriai rezsimváltáshoz. Oroszországon és Iránon kívül a kormány aktív fegyveres támogatásban részesült a libanoni (síita) Hezbollah részéről is. A szervezet harcosai főként a Damaszkuszért és Zabadániért vívott összecsapásokban vettek részt, az egyik incidens során a Hezbollah egyik parancsnoka és alapítója, Ali Husszein Nasszif is életét vesztette. A szíriai konfliktus megosztotta a teljes iraki közvéleményt és politikusi réteget is. Az ország többségében síita lakossága és a szintén főként síitákból álló kormány Aszad rezsimjével szimpatizál. Núri el-Máliki miniszterelnök szerint ennek főként stratégiai okai vannak, ugyanis egy szunnita kormány hatalomra kerülése Damaszkuszban az Irak nyugati részén lakó szunnita lakosság megerősödését vonná maga után, mely Szaddám Huszein és az iraki Baasz Párt bukása óta "szent háborút" vív az ország síita lakossága ellen. Az iraki kormány ennek megfelelően tüntetőleg távol maradt az Arab Liga azon üléséről, melynek keretében megfosztották Szíriát tagságától, valamint hozzájárult az iráni Forradalmi Gárda alakulatainak átkeléséhez az ország területén, az iráni fegyverszállítmányok célba jutása ellen sem emelt akadályt. Mindemellett az iraki kormány rendszeresen szállít üzemanyagot a szíriai hadsereg számára, az országból pedig önkéntes síita harcosok érkeztek Szíriába, a kormány támogatására. Velük szemben az iraki szunnita mudzsáhidek rendszeres fegyveres támogatásban részesítik a szíriai felkelőket, illetve sokan közülük nagy számban vesznek részt az SZSZH vagy az iszlamista szervezetek katonáiként a polgárháború harcaiban. Egy londoni újság értesülése szerint 2013-ban több mint 200 jemeni síita (húti) harcos érkezett Szíriába, ahol a Hezbollahhal szorosan együttműködve vesznek részt a harcokban. A felsoroltakon kívül a szíriai kormány még kisebb mértékű támogatásban részesült Venezuela részéről, mely legkevesebb három hajónyi üzemanyagot küldött Szíriába. Az ország elnöke, Hugo Chávez nyíltan is kifejezte támogatását Aszad elnök irányába. Az ENSZ Észak-Koreát is megvádolta fegyverek küldésével a szíriai hadsereg számára. 2012. szeptember 21-én az iraki hatóságok megtagadták az ország légterébe való belépést egy, valószínűleg fegyvert szállító észak-koreai repülőgép számára, mely Szíriába tartott. Az ellenzék támogatói A szíriai harcok során a felkelők ügyét már a kezdetektől felkarolta több ázsiai és európai ország is. A nyugati nagyhatalmak közül Franciaország és az Egyesült Királyság bizonyult a legaktívabbnak a lázadók támogatását illetően. A Reuters értesülései szerint 2012 júniusában brit SAS kommandósok felderítő akciókat hajtottak végre a szíriai-török határ vidékén az SZSZH számára. A Brit Fegyveres Erők ugyanakkor ciprusi bázisairól nyiltan logisztikai támogatásban részesíti az Aszad-rezsim ellen harcoló lázadókat. A brit alakulatok mellett a német BND-t is megvádolták a felkelők számára való kémkedéssel. 2013 márciusában William Hague külügyminiszter bejelentette, hogy a brit kormány a konfliktus kitörése óta első ízben katonai járműveket szándékozik küldeni a felkelőknek. Az Egyesült Államok, Franciaország és Nagy-Britannia emellett katonai felszereléssel is ellátta az ellenzéki fegyvereseket, mindenekelőtt kommunikációs eszközökkel és orvosi felszereléssel. Az Amerikai Egyesült Államok – habár igyekszik óvatosnak mutatkozni a szíriai ellenzék támogatását illetően – 2012 nyaráig 15 millió dollárt utalt át a Szíriai Nemzeti Tanács részére. Ugyanakkor egyes információk szerint a szíriai-török határon CIA-ügynökök tevékenykednek, akiknek feladata a Törökország felől érkező külföldi fegyveresek szelekciója lenne (így próbálva megakadályozni az Al-Káidához közel álló fegyveresek bejutását az országba). 2013. szeptemberétől az amerikai kormány kézifegyver szállítmányokkal is segíti a felkelőket. A lázadók legfőbb támogatói azonban a Szíriát körülvevő szunnita országok, elsősorban Katar, Szaúd-Arábia és Törökország. 2012 tavaszától az érvényben levő fegyverembargó ellenére Katar és Szaúd-Arábia nyíltan megkezdte a felkelők felfegyverzését és pénzelését. A támogatásból Törökország is aktívan kivette a részét, megalakulásától kezdve 2012 nyaráig az ország területén, Hatay tartományban rendezték be az SZSZH főhadiszállását, a török hadsereg tisztjei pedig katonai kiképzésben is részesítették a szervezet tagjait. Legkésőbb 2012 májusától a török kormány fegyverekkel is segíti a felkelőket. Az ellenzéknek nyújtott támogatás nagyon megrontotta az ország viszonyát Szíriával, ez egy, a szíriai légteret megsértő török vadászrepülőgép lelövésében, majd ezt követően 2012 októberében határincidensekben csúcsosodott ki. A szíriai lázadók támogatásban részesülnek az arab világ több másik országa részéről is. Mindenekelőtt a nyugat-iraki Anbár kormányzóság területének szunnita lakossága támogatja aktívan a lázadókat, fegyverekkel és harcosokkal egyaránt. 2012 folyamán szunnita önkéntesekből megalakult a Szabad Iraki Hadsereg, mely az SZSZH-t támogatva vesz részt a kormány elleni harcokban. Az Aszad elleni szunnita együttműködésre, illetve az Aszad melletti síita támogatásra hivatkozva több külpolitikai ellenző is megalapozottnak tartja azt az álláspontot, hogy a szíriai polgárháború esetében tulajdonképpen egy indirekt háború (proxy war) zajlik a szunnita és síita országok között. A szíriai lázadók Líbia részéről is aktív támogatásban részesültek. Az észak-afrikai ország 2011. októberében elsőként ismerte el az SZNT-t Szíria egyedüli hivatalos képviselőjének, majd 2012 áprilisában megalakult a Liva al-Umma katonai szervezet a líbiai polgárháborús veterán, Mahdi al-Harat vezetésével, amely főként líbiai, egyiptomi, palesztinai és szudáni harcosokat foglalt magába, illetve a későbbiek során szíriaiakat is. A Liva al-Umma befolyásos támogatóinak köszönhetően a szíriai lázadók legjobban felszerelt alakulatának számít. Líbia mindemellett fegyverszállítmányokkal is segíti az SZSZH-t. 2012 áprilisában a libanoni hatóságok feltartóztattak egy Sierra Leone-i papírokkal ellátott szállítóhajót, amely – mint hamarosan kiderült – líbiai fegyvereket csempészett volna Szíriába. A szíriai ellenzéket kisebb mértékben más országok is részesítik fegyveres támogatásban. 2012 április 27-én a libanoni hatóságok egy, az egyiptomi Alexandriából induló hajót tartóztattak fel, mely Szíria felé tartott, fedélzetén nagy mennyiségű fegyverrel és lőszerrel. A hatóságok elkobozták a fegyvereket, a legénységet pedig letartóztatták. 2014. március 8-án Abdullah szaúdi király hivatalosan terrorista szervezetté nyilvánította az ISIS-t, az Al-Nuszra Frontot és a Muszlim Testvériséget, egyúttal felszólítva a külföldön (elsősorban Szíriában) harcoló szaúdi állampolgárokat, hogy térjenek haza, ellenkező esetben büntetőjogi lépéseket foganatosítanak ellenük. Elemzők szerint a szaúdi király eme váratlan nyilatkozata annak köszönhető, hogy a szaúdi uralkodói dinasztia az egyre radikálisabb iszlamista lázadókat veszélyforrásnak tekinti a saját hatalmára. Külföldi kísérletek a harcok beszüntetésére A konfliktus eszkalálódását követően mind az ENSZ, mind az Arab Liga megkísérelte a két fél közti harcok beszüntetésének elérését, azonban egyelőre még egyik tervezet sem járt sikerrel. Először az Arab Liga megbízottjai dolgoztak ki egy fegyverszüneti tervet a harcok beszüntetésére. A tervezet értelmében a kormány vállalta, hogy visszavonja csapatait a megszállt városokból, szabadon bocsátja a politikai foglyokat és tárgyalásokba kezd az ellenzékkel. Az ígéretek betartatása végett az Arab Liga megfigyelőket küldött Szíriába, Mohamed Ahmed Musztafa al-Dabi szudáni tábornok vezetésével. A megfigyelők szíriai jelenléte azonban egyik fél körében sem aratott osztatlan lelkesedét, sőt a Human Rights Watch is erősen kritizálta az Arab Ligát, amiért egy olyan személyt nevezett ki a misszió élére, akit a dárfúri konfliktusban betöltött szerepe miatt köröz a Nemzetközi Büntetőbíróság. A megfigyelők 2011. december 26-án érkeztek meg az országba. Mivel azonban jelenlétük sem szüntette meg az erőszakot, 2012. január 22-én Szaúd-Arábia visszavonta megfigyelőit. Január 28-án az Arab Liga teljesen felfüggesztette a missziót. 2012. február 23-án az ENSZ és az Arab Liga közösen Kofi Annan volt ENSZ főtitkárt bízta meg a szíriai válság rendezésének előkészítésével. Március elejére Annan ki is dolgozott egy javaslatot a konfliktus rendezésére. Ez hat pontból tevődött össze, melyekben felszólította a szíriai kormányt a harcok azonnali beszüntetésére és a nehéztüzérség, valamint a tankok azonnali kivonására a városokból, az országba küldendő ENSZ-békefenntartókkal való együttműködésre, a humanitárius segítségnyújtás lehetővé tételére, a politikai foglyok szabadon bocsátására, a külföldi újságírók szabad mozgásterének tiszteletben tartására és a gyülekezési és békés tüntetési jog tiszteletben tartására. Az ENSZ BT tagországainak elnökei közös nyilatkozatban fejezték ki támogatásukat az Annan-terv irányában, de Oroszország külügyminisztere, Szergej Viktorovics Lavrov leszögezte, hogy Annan javaslatait nem szabad ultimátumnak tekinteni. Az Annan-tervet ideiglenesen mind a két fél elfogadta, betartatására az ENSZ 300 fegyvertelen katonai megfigyelőt küldött az országba. Az első megfigyelők április 15-én érkeztek az országba, de nem sikerült a tűzszünetet betartatniuk. A szerződést mind a két fél sorozatosan megsértette, majd június 4-én az SZSZH hivatalosan is felmondta a fegyverszüneti egyezményt. Az ENSZ megfigyelői június 16-ig teljesítették szolgálatukat, de miután ismételten támadásokat hajtottak végre ellenük, visszavonultak állomáshelyeikre. Július 25-re már a megfigyelők felét hazaküldték Augusztus 19-én az ENSZ-megfigyelők mandátuma hivatalosan is lejárt. Tervezete sikertelenségét látva Annan augusztus 2-án lemondott megbízatásáról. Az ENSZ augusztus 17-én Lahdár Brahimi algériai politikust nevezte ki a helyére. Összecsapások Libanonban A szíriai krízis jelentős befolyással bírt libanoni belpolitikai helyzetre is. Ennek legfőbb oka, hogy Libanon fennállása során mintegy ütközőzónát képezett Izrael és Szíria között, így Szíria erős befolyása alá vonta a térséget, hosszú ideig katonákat is állomásoztatott az országban. Libanon megosztottságát még jobban elősegíti, hogy az ország legjelentősebb politikai csoportosulása, a síta Hezbollah a szintén síta (alavita) szíriai rezsim feltétlen támogatója, ellenben a lakosság jelentős része (27%) szunnita és a közülük kikerülő ellenzéki politikusok az Egyesült Államok bizalmát élvezik. A szíriai konfliktus kipattanása főként az ország északi részén levő Tripoli kikötővárosban éreztette hatását. Tripoli a libanoni szunniták történelmi központja, a lakosság mintegy 80%-a ehhez a felekezethez tartozik, de a városban jelentős alavita kisebbség is él, ők a lakosság mintegy 8-12%-át teszik ki és főként a város Dzsabal Mohszen negyedében laknak. A két felekezet között már régóta ellenségeskedés zajlik, a legelső véres összecsapásokra a libanoni polgárháború kitörését követően, 1976-ban került sor és azóta is rendszeresen történnek összecsapások a Babb al-Tabaneh és Dzsabal Mohszen negyedek területén, melyek megfékezésére a libanoni hadsereg nagy erőkkel felügyeli a térséget. 2011-ben a tripoli alaviták nyíltan kinyilvánították támogatásukat a szíriai rezsim iránt, a szunniták viszont elítélték a rezsimet és az ottani ellenzéki tüntetők támogatásra június 17-én egy szimpátiatüntetést tartottak, a felvonuló demonstrálókra azonban alavita fegyveresek tüzet nyitottak, mire ők is fegyverrel védekeztek. A kialakuló tűzpárbajnak végül a hadsereg vetett véget, az összecsapásnak hét halálos áldozata volt, köztük egy katona is. 2012. február 10-én újabb fegyveres összecsapások robbantak ki a városban, mely három halálos áldozattal járt. A hadsereg közbelépett és hat sebesült katona árán másnapra helyreállította a rendet a városban. A május 13-ra virradó éjszaka ismét alaviták és szunniták támadtak egymásra gépfegyverekkel és rakétagránátokkal. Az összecsapásokban egy fegyveres és egy katona meghalt. Május 20-án libanoni katonák lelőttek Bejrútban egy, a szíriai ellenzéket nyíltan támogató szunnita vallási vezetőt, aki kocsijával megállás nélkül akart áthajtani egy katonai ellenőrzőponton. Válaszul a városban az éjszaka folyamán összecsaptak a szíriai ellenzéket támogató helyi szunniták és az Aszad-párti síiták, akiknek megfékezésére a katonaság is beavatkozott. Az összecsapások két halálos áldozatot követeltek, további 18-an megsebesültek. Június 2-án Tripoliban ismét alaviták és szunniták csaptak össze, a konfliktusnak 8 halálos áldozata volt és 21 sebesültje. A krízis súlyosbodásának megakadályozására a libanoni hadsereg megszállta a Babb al-Tabaneh és Dzsabal Mohszen negyedeket. Szeptember 22-én az SZSZH katonái támadást hajtottak végre egy libanoni határőrállomás ellen. Az incidensre válaszul a libanoni hadsereg erősítést küldött a térségbe. Október 19-én egy bombamerényletben meggyilkolták a libanoni belső hírszerzés főnökét, Visszám al-Hasszán tábornokot. A szunnita lakosság jelentős része a szíriai kormányt vádolta meg a támadással, mivel Hasszán ismert volt az Aszad-rezsimhez fűződő rossz viszonyáról. A tábornok temetése október 21-én politikai tüntetésbe torkollott, a tüntetők a "Szíria bérenc"nek titulált Nadzsíb Míkáti lemondását követelték, majd megtámadták a miniszterelnök hivatalát, de a rendőrség könnygázzal szétoszlatta a tömeget. Nem sokkal később azonban a város déli részén rövid tűzharc zajlott le a biztonsági erők és civil fegyveresek közt. Időközben Tripoliban ismét összecsaptak a síita és szunnita fegyveresek, a tűzharcban három személy vesztette életét, köztük egy kilencéves kislány. A síita Hezbollah részvétele a szíriai konfliktusban tovább mérgesítette a libanoni helyzetet, 2013-ra szinte napi rendszerességűvé váltak a fegyveres összecsapások síita és szunnita fegyveresek között. Egy ízben két rakéta csapódott be Bejrút déli, Hezbollah által ellenörzött részén, a támadást valószínűleg szunnita fegyveresek hajtották végre. Hivatkozások
19,113
sn83035143_1859-08-06_1_2_1
US-PD-Newspapers
Open Culture
Public Domain
null
None
None
English
Spoken
7,095
12,687
.iO!i.;iiNG LEADER. ATJRIIAY MOIIJUMO, A.'IJS,1K! ,'UHI.IriHI l BY "a. 0OWLK3 k 00. 144 iimcia isiLDiMat, iupiiioi t. HI.AIN ASl tlltNAMF.NTAl, PMlN TIM. P:.iH'l ornitnii4iit:,l IM ml mt ..t hht .!.., i pll". . t,i 1'nni HIT I ,,atih.l.m"IH tl tha Isn.lrr OITi'', tait iiiinr,tvrl anil must raiml itmm r n.imo,.lii I hrnl .an almrt i.m ir-a, ai.,1 .1 rem nabia rati-,. Iartirilat ii,.i p.ii I tnliUi'k wri. ,:,r, ,liK-rt,'tliin ni Hinil- 1 n, sari-i-tailf Hlmk B.Nik. i.i-'Um, , Jt.uruala, n Hii.ik., Hciivll'f biMikl, c, fcc To the Voters of Ohio. It i rrsng'd tlmt the two ckntlitlat for llnvernor of tiii Stat, Hon Wm. Iennion, itit'l Him. R.V. Rmory, will d.euss the polili tupios of the day before the people of this ,Ha(. at ill following timet and plaoea, viz: At Tiffin on Tuesday, September 6th. Dayton on Thursday, 8th. Cleveland on Saturday, " 10th. Canton on Toeaday, " 13th. Znnearille on Thuraday, " 16th. Chillicothe on Saturday, ' 17th. Columbus on Tueailay, " 80th. The Central Committee! of the Republican unit Democratic parties at theae several poinla c, ill take steps to make this announcement known anioup the people as extensively pos sible, and to select the place and time for hold ing the meetings. Geo. M. Parsons, Chairman Republican Central Cora. Oko W. Manypicnny, Chairman Democratic, State Central Com. The Gubernatorial Discussions We publish the joint card of the Chairmen uf the Republican and Democratie Etate Con- tral Committees, announcing the times and - mhifh Messrs. Donniaon and Ranney will discuss the issues ol the clay fteiore tu.. people of Ohio. The meetings are limited to seven, to be help at Tiffin, Dayton, Cleveland, Canton, Zanesville, Chillicothe, and Culum- I'Ue. Both the candidates for Governor are men of ability and mark, and popular public speakers, and we have no doubt the joint discussions will be largely attended. The time named for the meeting in this city, Sent 10th, is an unfortunate one, and should be changed. It is the anniversary of the Battle of Lake Erie, and very many of our citizens and the people of the vicinity, intend to participate in the grand celebration, and the laying of the cornerstone of the Perry Monument, at Put in Bay. If the time could be changed so as to hold the meeting at Canton on the 10th, and at Cleveland on the 13th, the arrangement would much better suit the Lake region. We trust the Chairmen of the State Central Committee will re-arrange the programme so far as the Reserve discussion is concerned. The Gubernatorial Discussions The New York Hards and Softs. A sharp contest has been going on for some time between the Hards and Softs of New York, in regard to the choice of Delegates to the Charleston Convention. The Democratic State organization is in the hands of the Softs, with Peter Cagger, a rampant Van Burenile in 1848, at the head. Ferrando Wood, at the head of the Hards, has been actively engineering to prevent the state Convention from choosing the Charleston delegation, and thus packing it with anti-Administration men. He is at the head of what is known as the Astor House Committee, supposed to be in the Gov. Wise interest. The Democratic State Central Committee met at Albany on the 2nd to take action with reference to a State Convention. The appeal of Wood's Aster House Committee was treated with undisguised contempt. It was laid on the table, or rather knocked under it. The Hards were virtuously indignant, and their wrath rose higher, when by a subsequent resolution of the Committee, it was decided to call the State Convention in the usual way, leaving the Convention to choose the Charleston Delegates if it thinks best. The Tribune regards the matter as settled, and says not a word will be allowed to show his face at Charleston. The delegation will be a unit, and that unit will be perfectly soft. In answering the question "Can the South trust the Softs?" the Tribune gives a history of the trimming of the political weather cocks on the Slavery issue, and sums up the whole matter with "Gentlemen of the South! distrust the fidelity of your slaves, but doubt not the subservience of the South. To win your favor have they not, like Benedict Arnold, sacked the house in which they were born?" The Kentucky Election. The Louisville Courier, a fierce Buchanan, Anti-Douglas paper, that is noted for brag, claims that the election in Kentucky on the 1st has resulted in the choice of a Democratic Governor by 13,000 majority, eight Democratic members of Congress, and a Democratic Legislature. The Cincinnati Gazette of the 6th lets some of the wind out of the brag. It says of the result in Kentucky: The latest returns from the Ninth Congressional District show that the election in Kentucky is a victory for the Democratic party. of Kentucky, elected Laban T. Moore, the Opposition candidate, by about 250 majority. This result is conceded by the Democrats. It increases the number of Opposition members to our two more than in the last Congress. A comparison of the vote for Governor in 62 counties (half the State) with the result in 1856, (when Moreland, American, had a majority of 4,403 votes) shows an Opposition loss of only 1,430. Unless these returns (part of which are official) are very erroneous, Magoffin's majority must be small, without much larger relative gains in the remaining counties. The Dental Convention. Almost everything is regulated by Conventions in these days, even to the "pulling of teeth." The fifth Annual Convention of Dentists assembled at Niagara Falls on the 2nd, with sixty-seven members present. The following officers were chosen: President Dr. W. L. Rotters, of Utica. Vice President -Dr. W. Watt, of Xenia, O. Recording Secretary Dr. Frank Fuller, of Portsmouth, N. H. Corresponding Secretary Dr. P. P. Lewis, of Tallahassee, Tenn. Treasurer Dr. S. Chase, of Augusta, Ga. An Executive Committee of five were appointed consisting of Drs. G. H. Foote, Buffalo; T. H. Burras, New York; J. Mason, Saco, Me.; S. M. Robinson, Waterloo, N. Y.; and James Taylor, Cincinnati, U. SUNDAY Liquor Traffic. A recent vote in St. Louis on Sunday Liquor traffic stood 5,292. For and 7,413 against. The liquor sellers were beaten at the polls, but they will beat at the bars on all days of the week, as usual. Assisted. Dr. Williams, notorious about Youngstown in connection with counterfeiting, Ac, has been arrested for neglecting to return a horse and buggy obtained of a livery man in Mereer county. He resisted the officer stoutly, emptying the use of a revolver, but was brought down by a club, and lodged in jail at Caufield. Republican Vote in Covington- The Republican vote in Covington, Ky was as follows: J. R. Whittierinore, for Congress, received 9 votes; for Legislature, A. Williams 4 votes, and A. P. Harrison 23 votes. "Small parties make up in vigilance what they lack in numbers." There is hardly a man of note in England who dare not himself up to resist the opinion that Great Britain will soon be engaged in a war with France. Anniversary of the Young Ladies' Literary Society of Oberlin College. Oberlin, Aug. 4, 1859. It is learned: A couple of hours at the great Church on yesterday afternoon would have convinced your readers that Oberlin is famous for other things than reselling fugitives, and for producing not only the men who are equal to all rescuing emergencies, but for training the minds of girls in a manner to satisfy the fond expectations of Professors, admirers, and friends. The occasion referred to was the twenty-fourth Anniversary of the Young Ladies' Literary Society of Oberlin College, the first of a series of anniversaries with which we are to be favored, weekly and often, until the 23rd When the Annual Commencement will occur. The number of citizens in attendance was large; and the interest manifested throughout, by those who have frequently enjoyed such opportunities, has become appreciative, is itself a sufficient guarantee that the young sons, upon whom for the present rests the responsibility of this society, now older than any present member, have met that responsibility nobly and well. The Society now numbers some thirty in all, but what their names are it would be difficult for your correspondent to tell, especially if he is a married man; but married or single, he has learned the names of some of them, and he now feels anxious to make the acquaintance of the whole party. But we must give you a hasty sketch of the performance. The first Essay was by Miss Hattie C. Burt of Oberlin, upon "The Language of Feeling;" a very creditable production, a careful listening to which demonstrated that the fair essayist had herself threaded the pathway along which she was leading her auditors' life. The second Essay, by Miss Nellie M. Wolden, Sudbury, Vt., in which there occurred several passages of rare poetical merit. Indeed, it was hard to resist the conviction that the words were heartfelt utterances from one whose brother, or perhaps some more dearly cherished treasure, had been by stranger hands buried in the fur oil land of gold. The Paper, read by the Editor, Helen Tultb Camden, N. Y., contained a number of good articles; but the reference to the Dandelion, the First flower of spring and of childhood, was full of fresh memories of the springtime of life. "The Days of Spinning Wheels," a Poem by Mrs. A. A. Gilliam, of Oberlin, was received with great enthusiasm, and was in some respects the favorite production of the occasion. The poetical merit it possesses, as well as the caustic hits it gave to many of the customs and habits of the girls of today, make it an object to obtain a copy for the Morning Leader; but doubtless the Student's Monthly will have the privilege of bringing to the public gaze a misprinting poem. Miss Jane O. De Forest, of Oberlin, read in a masterly style an ingenious vindication of Queen Vashti, and the least that can be said of the effort is, that if the banished Queen does not hereafter stand higher in public estimation than her successor, Miss De Forest is not to blame. "Unread Pages," by Miss N. A. Gordon, Sparta, Ill., may have been the best production of the day, but it was read in too low a tone to be heard, and so far as a large portion of the audience was concerned they were truly unread pages. Miss Nellie E. Peirce, of Medina, is the associate Editor of the Society's paper, "The Universal Investigator;" and there can be no doubt of the success of the Investigator with such editors as Misses Tultle and Pierce. One article however was read, which should be a caution to editors, Essayists, Lecturers and Ministers who feel inclined to go out of the way in order to give an awkward kick, at what is supposed to be an unpopular idea, viz: the elevation of Woman, the enlargement of her sphere, and the security of her rights. Whatever of impropriety may have been developed in the agitation of the question, it has too much of real merit in it, to be put down by such ludicrous attempts, and such old fogy appeals as the article contained. It is to be presumed that the article was not editorial, and that it slipped in unawares. "A Chat with the Leaving Members," by Miss Harriet Everson, of Brighton, was as touching to the feelings as it was delicate and appropriate to the occasion. Her description of childhood's journey daily performed from the old homestead to the district school house, carried not only the society but the audience, in spite of themselves, back to the sunny memories of the distant past. The devious windings of the way, the cooling shade under which we used to loiter, the haunted house by which we hastened, and the church yard made to it an active "because grandma and the baby lay buried there," were by the magic of her pen and voice made real as life itself. Nine Diplomas were then presented to the leaving members. In a very neat and appropriate address by Miss West. The meeting was conducted by Miss M. E. Warren, who presided with dignity and with ease, and the occasion was enlivened throughout with choice music, both vocal and instrumental, such as Oberlin singers and performers know so well how to give. The song of "The Old Oak Tree" by Tho-dore Pease and his sister Lucy Pease, was exquisitely well done; the piano accompaniment by Miss Pease was also creditable, while the singing band of seven violins, one viola, one bass viol, one violono, one piccolo, two flutes, and a cornet, performed several choice pieces, and the closing one will not soon be forgotten. The prayer by Dr. Morgan and the bonediction by Father Keep opened and closed the performances, and the audience went to their homes anxious to have another anniversary of some one of the many Lyceum's Societies, or occur soon. Habits School Chapel on Jefferson Avenue. Editor of Leavenworth: The success attending the erection of the new Cottage Sabbath School Chapel on St. Clair street, last February, by members of the 1st Baptist Church, induced the 2nd Baptist Church, by the aid received from the 1st Church, to purchase a lot of land and erect thereon another beautiful Sunday School Chapel, at a cost of $2,000, on Scovill Avenue, corner of Hudson street. This Chapel being completed, and provision made to pay every dollar of the expense on house and lot, was opened Sabbath before the last (23rd ult.) amid sashes. Of praise, fervent prayers, and many deeply impressive remarks, in which the Key, Mr. White, Congregational, Rev. Mr. Brewster, Methodist, Rev. Mr. Day, Presbyterian, and the Baptist Ministers, Messrs. Adams, Watson and Gales, and others (Laymen,) took part. Although the meeting comprised principally of adults was commenced at 3 P.M., and continued till 6:30, and an invitation was given to anyone to retire if they chose, yet scarcely an individual left their seats, so interesting were the services during the two and a half hours. Last Sabbath, agreeably to previous notice given the Sabbath before, it became the children's turn to visit the chapel; and the house was again well filled with an audience quite distinct from the former. They were children gathered from the District in which the Chapel is located, by friends of the School, who were particularly requested not to solicit the attendance of any child belonging to other Sabbath Schools, the hour to organize arrived; and a School of 130 children, with a Teacher appointed to each class, made choice of the Hon. J. V. Bishop, Superintendent, and Mr. O. J. Ballard, Assistant. The School was then closed, after all uniting in singing the popular Sabbath School organ: "I am glad I am in this army, Yes, I am in this army." Yours, August 5th, 1859. B. R. This Shot Pusom. The Ohio Statesman says that "Shade and Sweeny, the two convicts wounded by the guards in attempting to escape from the Ohio Penitentiary on Wednesday, are getting along very well under the circumstances. Shade, who was dangerously wounded, it is now believed will recover, and Sweeny is out of danger." Fatal Accident. William Frack, a lad about 16, was so injured in Girard, O, a Few days since, by a healed nail rod in the hands of a blacksmith, as to cause his death. The boy fell upon the hot rod, which entered his side. The Plymouth Monument Celebration. It is estimated that $1,000 strangers were present at the laying of the corner stones of the Pilgrim Monuments at Plymouth on the 2nd. Among the many invited guests at the festival, were the venerable Dr. Beecher, Rev. Dr. Wadington of London, Gov. Bank, Gov. Bank, Gov. Buckingham, of Connecticut, Gov. Turner, of St. Louis, Gov. Chase, Senators Hale and Wilson, Ex-Governor Kent, of Maine, Rev. Drs. Storrs and Osgood, and Hon. F. P. Blair, of St. Louis. Gov. Banks responded for Massachusetts, Gov. Buckingham for Connecticut, Gov. Turner for Rhode Island, and Senator Hale for New Hampshire. To the sentiment: Is it true that Ohio, under the influence of her political, the wealth of her population, the wealth of her population, the people of her people, the Hon. Salmon F. Chase, of Ohio, responded as follows: Mr. Puskin, LaGrange and Oklahoma of Massachusetts: When I came here today, I came for no other purpose than to manifest my disposition to cooperate who you in rearing a monument to the memory of our grand fathers. I came with no prepared speech, with no set phrase, but with a heart brim full of love for New England and her institutions not for New England alone, but for New England as a part of our common country, embalmed in all our hearts. Applause. I, Sir, desired to take my humble part in testifying through this enterprise in which you are engaged today to the worth of those who have gone before us. I led, as every true Massachusetts man cannot help feeling, the worth of their great example, for I come from a State which was peopled by the descendants of the Pilgrims the cornerstones of whose prosperity were laid by men who were nurtured in New England, and who partook largely of the spirit of New England. You have laid here today the corner-stone of a monument in the land of the Pilgrims and the institutions of which they laid the foundations. While the Mayflower came from the Old World, freighted with empire, with institutions, with laws, with ardor, and last and best with freedom, applause there was, in 1788, to be seen, winding its way from among the hills of Berkshire towards the setting sun, a train of red wagons, in which, as in the Mayflower of 1720, were gathered the desolation of the mighty West. It was a son of Massachusetts, a patriot of the Revolution, a soldier enjoying the confidence of Washington, who gathered about him a few Massachusetts and Connecticut men, and emigrated, in 1788 to the shores of the beautiful Ohio, and there laid the foundations of New Plymouth; and in Marietta, on the banks of the Ohio, Rufus Putnam and his associates commenced their great work of Western civilization. And allow me to say, they laid the foundation of a Monument greater than any of you can rear here if you pile stone upon stone until it reaches the sky. In laying the foundations of a new State, in laying those foundations upon the immutable principles of a civil and religious liberty, under an Ordinance which made three principles the heritage of that mighty region forever and forever in laying, I say, the foundations of such a State, they performed a work greater than any which has been performed today, or which can be performed by laying the material monuments of the world. Applause. Ohio herself, deriving her institutions from the sagacity of New England men, but not from them alone, but also from the concurrent wisdom of all statesmen North and South Ohio receiving the first impress of civilization from the united wisdom of the whole country, stands today as a type of the Union, such as our forefathers made it, and such as I hope in God it may be in all coming time. We are, Mr. President, a people gathered from many lands, and we have no narrow, no sectional, no proscriptive spirit. We welcome, then, the American, from whatever country he may come, and meet together as brethren. Virginia contributed her share; Massachusetts contributed her share; Connecticut has furnished a part of her population, and South Carolina has furnished another part; from the Green Isle of the Ocean, from the banks of the Rhine, from every quarter of the world we welcome those whose love of liberty and free institutions directed them to our shores, and in doing so we build a monument worthy of the descendants of the Pilgrims. Applause. In Ohio, only the corner stone; new States are to be added; one by one the stones are to be laid in their place until at last a glorious monument shall rise; and where the end will be no man can foresee. We in Ohio are accustomed to look forward to the time when stone after stone will be laid upon that foundation, until State after State shall long a part of this monument, and the whole Ocean bound limits of the North shall be portions of the structure. We are indebted, let me say here we are indebted to New England, not merely for much in the original foundation of our institutions, but we are indebted in some part also to New England for the care with which these institutions have been reared. We are indebted to New England for our Common Schools, and for much of our religious culture, and I should be doing injustice to our venerable friend, Dr. Beecher, who contributed so much to the foundations of the Western world, if I did not express our obligations to him, who, as has been quaintly said, is the father of more brains than any other man in America; and I take this opportunity to tender him, a son, I believe, of Connecticut, and an honored citizen of Massachusetts, my cordial thanks for the part which he has played in the formation of Western morals and Western manliness. Applause. At the conclusion of Mr. I base's remarks, the following sentiment was read from the Rev. Dr. Beeher: Glory to God for the preservation of our forefathers In disseminated laws, and for the memorial we erect it for our posterity to the cause of religious freedom. We doubt not the last is but the beginning of glories no early protection and devoutly to be within our coming time. Blondin's Fourth Niagara Exhibition. A multitude congregated at Niagara Falls on the 3rd to witness Mons. Blondin's rope performances. He first made a rapid trip over his slight bridge to Canada, says the Buffalo Express, and on his return, when about half way to the center, he stopped and sat down, then stretched himself at full length upon the rope, then performed a number of daring antics, and finally stood upright upon his head remaining in that reversed position for a length of time which seemed a moment at least, swinging and kicking his feet in the most reckless though ludicrous manner that can be conceived of. Resuming his journey he proceeded but a little way when he again halted and repeated his performance, with the addition of a backward somersault, and one or two sudden swings around the rope, which caused a general dullness among the hearts of the spectators, and brought little screams from many of the ladies. Starling forward again, he proceeded to the open space in the centre, between the extreme guy ropes that branch off to either bunk, where the cable spans the gulf without stay or accompaniment. Here he paused again, and laying his pule upon one of the guy ropes, he swung himself under the cable and ran across this central space of single cord, in the style of a monkey; hanging beneath, and swinging himself along by his hands and feet, with great rapidity. Going back again in the semi-circular manner, when he had returned to the point where his pule rested, he began a series of performance which outdid in thrilling and startling effect upon the nerves of the spectators, all that he had done before. Clinging the rope with his hands, he swung his body clear from it, and hung for a lengthy period, of more than seconds, suspended by the arms, and by one arm, over the fearful depth of the chasm. Then he repeatedly turned such a suseeded somersault as is familiar to boys, throwing his feet over his head and between his arms, and hanging with the shoulder joints in a most unnatural position. Then he straightened his body into a horizontal position, still suspended by the arms, thrown backward a described an exertion requiring immense strength and calculated to exhaust the nervous system tremendously. After this, he suspended himself by the legs, and by one single leg, hanging head down, whirled around the rue, turned more somersault stood upon his head again, and in fact performed nearly all the most reckless feats attempted by tight rope performers under ordinary circumstances. Twice again, before reaching the bank, he halted and repeated some of these antics, seeming determined to fatigue himself to the last point of courage, and thoroughly satisfy the spectators with his exhibition of daring and skill. And they were satisfied, beyond question, that the performance was wonderful, and exciting enough for the most greedy seeker after sensations; and was by far the greatest ever given by Mona Blondin. The success and novelty of Blondin has brought out another aspirant for Sam Patch immortality at the Falls. W. T. Aymar, a noted performer in a Boston equestrian troupe, proposed to erect a scaffold on Goat Island, and to throw a somersault down into the water, a list of 170 feet! He had better "look before he leaps." About Fountains. The body of a man was found upon the beach. On the 29th day of the line between Kingsville and Ashtabula: In the name, from a mark upon the right arm, was J. Sweeney, to which the year 11" was added In the left arm was the devil of a cross, Ao. The dress upon the body was a pair of woolen pants, white cotton shirt, blue overall, and leather belt. The body was buried in the Shepherd burying ground. Anhobula Tel. ANNOUNCEMENTS. REPRESENTATIVE. In the midst of North Columbia, with the intention of having the body buried in the cemetery, the following persons have been appointed to serve the offices of the respective offices: PROSECUTING ATTORNEY. Mr. 'resent pffirl tit Fro-Mtiitnm Attorney, eg s csu-,l,,l,Uf.,rr-.,.o:i,nto.l,m... A K,,pIJBUCA. Iii rnmn.ni.ni. with fmne loor nr fivp fell-vr Atinrnejn, I would Hi.tihP nm mii.-n ioiUipoHW PrnM-cuiiiijc turi.fT, fr..iD tn rt.nitnft Rt-pul.Mc.-.ii.'onvmiM(ni. it. muled iwnv.-ii:.' 1 lit (Yi.veu 1 it m wiltmn loin ww tin, mini-'..-j' " OJH vv lib -Hi rt-pmi'ilC mf rfhrr-iiii,l m 11N ilsiti ;i tu j-'M'f tHMf.iitc, n f Kiiiji )y ai.d H(H-Uing. J. JL. INCLKIM.L. COUNTY TREASURER. nptt He i-nhliritii Cmiutr t nnvftutiuii for th tli uf (.X.uiity T'nukuitir. Hit is out' 01 Mir ulnetjt ci'mns und hn.'itit i nen, nml Um uercr ho 1 mi otlire uf honor and pmtit In the County. Fiv I.I.nrH' Ht, nunn.iure It. I,. ffpANOI.VH A rvmliiliilt ii'i.re thn H p lhliCMi'mi? utliu, fur County TrauHuicr, kuhjtt't tu ittt- der-iitu uf the Cuiirentiou. Kns f lenFR PI.. nnn uiw o thai HAHVb'.Y lU'l'KK II it randid.itr fur thn ft uf (Vu-ily'r'iurer, uIijtI t the defiiiuii of the ltpimblicao County ('on rtinn and i'blu;e KIUKNDS Th'tninrtif Tltns O KLI.IOTT will i (.rnfn)fd tu Mm Cuni'ty Kflpuiiliniii (.'or)v4!ii'ii'ii' " c mdt at fur TreH urer, iy nuuiv frtnrt, whu, from luin? mid inliinfttii bh qti" nit fine with lui uni iuii' int nritv. i1iiik I'umim w jital'lVhtionB, anil df-vulh'U to tin 1uh iiiiemi t:n.n know ii'iii t 11 mij in nn rti.lii.-iil dfgreo all tin e qualities o Tt qmiitti for the umce. Th in-m of WfM.I M B. CASTLE- Will le pr.mte' tn thfl Ht-tmiihran ('om.ty C.itT-nt no. I't this nffi.: of County i r:ifc"in:-. bv in itv tiitiits tn wh -iii h'uri imtte lillu....it I. t. ---.-I,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,..,.. In St Paul's Church, in Vii rite, on thn 4th Jnrtnnt, by H v Dr. ('In, luit. Mi. W. A. LKK ami Mi-h H K. Mc KINNKY. all t C ')" Ituid. DIED. In tlm city, on the 4'h inst , of chill I'evor, Mm. LUCY FISH KH, wiij uf C. K f uth. r. Nctu VDucvtiscmcnt5. N. T. CO.'S EXPRESS N. Y. 4; K. R. LINE. For Dunkirk and Mow York. THE KfRAMEIl JF.FVP.KHON) BOND. Mai-tes, I.HAVKS fN SATIIR. TfrV KAY. Ail. , at o'etork P M. k irk . Nnw Vnrk. nr s:iv oilisr miint or. Lhs N. Y si K. M. K airit.utinaliv snv oilisr luulo. For frsiiftit or Ms-niir .ui'iilv to tnur,i42 W I) CUMtU, 1 Agents UUP 1' J. E M EN T TO 'HIE CiTUECH v 1 i SI. 1IM-Jiut received sml I it sals liv snli'l J II conn fc TO. T H. ( KIBBLE, COLLECTING J AISKNT.2I Clu-lure .tiei-t. foil, r'lmu made, null r ri'iiils p.ua iivk, wli li in li i-1- ant iliipiilrli. UirKR TO-(leo. Mviriot H-ij . C .i.tiir Mi rrtiunt. T:tiik; Furclla Urunrn Ki , Uuokcri C. U. Williunia, ,M. I) ; 1). A. Sliriirit k Co. jvlVirtm: .t.ft TOll SALE L V.iiT and r'nuhlo xtra Flour, :in lbln l loli urniiutl Hyi Flour, t 'ttru MnRi, lebh urouud, ('ru I" Mnr. i 11 and new Oat. 4'M lhH. lit-d A.pn, VI fli kil l Hu ti-r, (SMt.) 1 " " (W.K) loubula Finn Suit. J M HOW Kit, a iifM) N w Nn fj1 (Old No tin) M imvthi m Auction Sale' O F FANCY DRESS GOODS! At No J160 Superior Street, (Opposite the Wilder House.) THIS, SATURDAY, AUGUST 6th, l ml PONITIVELY 1.K Tilt: LAST DAY in tlitilllCAl SALE, ( ouiiui'Ut iiiH itt 10 A. M. and 'i I. itl. rtr"T.iiui' (( are rt:itc-lully n.viti-il to nltend l)nn i-'ili,. n lt JJ'WAtlNHI; Ailitinuo-r. -T-D W K L L 1 N G 1 1 O II S JO F O It I s.. "si kiiui auuvt, mi ( tn ysjMr r.ti- . yuircul L. I'lil.MlSS. I70II SALK L (Ml Moat, Corn Meal, Cll.h, I Hr.l, II una, l-'lour, Wehtern Hi aorvd Bntion Al tH and ii Murw i, St W MKI HINI'H. MOUKNINGGOOD.S CiMpe Hula, Cr e ''ollara Cruim Vb1 1m, Muuiuhr HatidktTf liK-ii. at '-l1" Mi.TTHFHtJ &. IIAI'SM AW. NEW MECHANIC TAILOR I- W k THY, uiol nri' now prtiipuri'd In IHttiuh ii mdn in mir lino at alultllhlnlt low ncua. Trv ' COWI.FSk CO lOR 12 "VKAIiS-We have old A- ' M l.V. U, W A KK and nevwr hud a hit-r atix-lt ua Uaiuit ttii.u i.uvv. Con i ii uud tar, and ju.Ihc f.-r .otiisrivi '1 COW I FSJk CO VOR "12 Y .AKS-We liave Sold i Ci,l)CKS. ami t. urn now ChekiHT aid llfiiur llian avor. kvury oua " a i.ake I and iii'd" ittUininia mini. kuk'J COW l.KS Ct I. IOlt 12 i'liAliy- o huve IWht, JL kind untl tiMtl CUI'I.FKY. an 'ii.vm triVi'il hy our Hiifritii4'i that Wua o-ihomi und K i -rit artt lint vi rr bt laauulWlifrri. We km-p tlitir I'. ck Cui loi v. uiT try vuriety, and n-lt a a low am can bo bounht in inti n n CtiWl.k ft t o. i:. Ktuir &, Cu.'m Spring Fuihlous fur Centlrmcu' Hutu. WE TO-DAY INTUODUCK THE NHH1NU K4MIUINS In lltMleiuen'. II,,,,, wtui Ii foi Ikiuuij ol fle and lini.li and tor lot lilimsa und iuallt) , ,-annot lull to It. apiueoiaUid tiy suntl.int-ii ol takle, 4 OO II A T K. W aM a yprui; K'ylr Htik Itwi f r 4,'iu, wtntUi ara ruual Lu moat Hl,uld lr & Cull attd n l iiiiu. Irlil'l K S'fAMf fc CO. CSrcat JSIarguiiis i2L II AT S ! & LBKNKDICT & SONS are offeriu.r tbvtr atodi ol M .111 Lit HATS At Kreitly reduced jrb ni, nr a low un t boa that otfur iu aull AT COST. TlxkM) iu want of a tu it aula tit'ad corar will liuj the da- VrA- isJifupEitiuii sr. LEDUElt ! EDGEll! II AT! L. BKNKDICT 4 SOX9 11. V. The Lftlg er Hat! I.KIlOKK HIT ' LKDGKK! LKIXiEll HAT! HokimI and flat rruwui A p laud 1 Hat tor rou uiau. k'ut aai at luajrU L bKNaailCTftkONll. Dooko Otatiouejri, lN(7iiAM miTcir. ri'BLl.SULKS, WHOLES'. I. li POOKM Ll STAT 10 NERS, (Nrw Numbsr.) 11 HnperlT Street, rievaland, Ohlol VtvotUom of llu CUreland Hiblt Soeitty II ....... ..t J.r . .) f nift ,.ciiio y vt ...... .. Dsmmfory of the Mattaehueetf S. S. Soeuty. . iVjojtory of the Metumutt noon once. Depoekory of the Book and Tract Society of the li'csiVrn Reeerve. WAIT AND OUT THH BUST. WORCESTER'S ROYAL QUARTO . DICTIONARY, i. H K A t) Y IN AUOUST. a.in mm 11.B.. U'-liatMfia lnnbrtdssd ijix is a Sub rrilwr's Kill Ion. on eilrs Bus lper and wide f 1S00 Paa-e.liOO Knsjravlna. stibfcnptiun Monks oppn ami sumplm Rem st i?l 1NUHAM k HKAtllfS, WVilera Areiiti rVUK GOLDEN WREATLI Mttsic 1,'l.onil urninc. 1:1. tin' m tile ir mirtnlui i"g ttui book inlo H ih n-lin'-l in tin' smio. I'tiro ' IV rpnt, nt l mil no-' in id WHOLESALE GOLD PES TRADE, IIVUilAIH V IlllAOC, A RE HAPPY TO INFORM THE 1. 'I'rftde I It Hi Uiy luve rnnc'U'Jpti an uraiigrnitnt Willi OVMIttl GOLD PEN MANUFACTURERS, by wliif h tin y nnr iprrial indurrmenti to WHOLESALE PURCHASERS or Ci d riii,GiUlnn,l Siivei Cuscs, Sir. , al n1aIHlfnctual, JJ INGHAM fe PRAOO. WHOLES ALE TRADE. En g ham A Itragg. 15 n ooo vols, school books v.... ..... , , ., , F.nn r"- m rap :nd itf r pfippr. ! iHM whim ami buff n.pluptia, tifn hti t ea :iu!k riayona, l.i r:t-vet f yn-f, 3 () (Mm rtolt '(iio i-tMiril-, llHi.liin) wood pt n h-i'dKia. '.'iKi ftrufls lino ii"irtt d tn-na, Iihhi d ) nra wnrtb Itiinea, Ainffrlcu Ttihln S'ufiety, 6 inifcs True!;-, irom Hubtun Ti act SKietr, 4'WO ( 'nrn-'li's itPoKrabbii'i, hid Onltlrtii Wi"i'i h. iioui c 'or icho 'la, HHHj CI'lltN KHhh ilh Srhunl TV1 ur, trn) vnlt Alipiftnu'li Clo.iv:il StTiei, Utfj riKtTim wratiiiins i.-iimrn, ( H-or'fd ai4.) lxMl Z"i I'ii- s -n, I : riti m it-riunor a writing book O" a rr r ii i rm mill immici a, f.l " KHibPcb iM'nrhg, ?MH)fpiircB 111 nk H k, T0'loc Ainold'a. Hnssird'w anil Eutlttra li.ki. t'ir fnri'n i f r t1"' whuiesui trale s unsuri.aased uy anv utiiuu hi uie yytjsi, TNOHAM BHAOQ. Originally Patented in Clevoland. OVKH ON R UUN'liHKO THOUSAND SOLD TETTKRS AND INVOICES CAN J J t- rt'ferud to in mi maiiniL bv a 111111110 fter new lo no' liito x, initKitiK -1 i(n-ai k.ivm g i;i time itinl mbor. bu 1 wh iifaaiu and retail. I NO HAM It UK Alio juS com fur Mumiiiu inn r if N Just Published, A NKW VOLUJIE OF l'OEMS BY A 1.1- ll KI) lhNNY.sON, (poet Lauioate.) entitled IDYLS OK TUB KINU. IMHIAM Si HRA'IO. J 1 1 i; LL K Y M KM OKI A LS- D UV 1 HKI.I KV. ! INIilUM. UY LA- I HHAOIJ OFFICE KTATIONKKX S'-llO'lL KTATIKNKKV, I.Kt'lAl. STATIUNUHV. lhs best mada, -Klt.MllN SI'AI'IUNKKV, I .w n. a dd in thn city, nt ! tNOIMM IIRAQQ-S MM riTUCATI NS, PUBI.IMIRD DY Hnhli.liMl ihlailiiy. THE DIME BONG ROOK No. 2. I'iil.fcltinl Ju'ttt 1, THE DIME SON'G HOOK No. 1. Will nuti'iiiti .Inly 1, THE DIME COUK BOOK. It-ndy .Tn'.v S THE DIME irl'EAKER. Ordi-r fnmi th Irm.tp filled pri-niptlv. On Taosint of On Dimtt anr one ol I he uliovu acnt oy mm I. nn,t pmd, by lililrea.Miiir inn 1 iiMJUAni KnKAt.l, "ITALY AND FKANCK 'N THE JL M&I Ki:.Mll tK.MtKV, I'ru o tl.'HI. iiil.-I INOHAM HI! Kf.a "riUUl COWS OK OAiKY FAKM- XV.JL. 1NU Jluatrsted. Krue Sl.'.r, nut 2 1NUIIAM it BUAOO. Indispensable to Jobbers rimK SIIIPrKK'S OUIDE-Contain .i- llK nn Al.ti;ibi'lC:il I. 'ft i f N INK THOUSAND TOWNS AM) i rriF.K IN THK IJMTIt DhTATI.S, till tha H:illro nlti. (.'- 1LH ti. at" , on whu b they ant luciitcd, ur l he nlnppiu;puiii(B to uruM to them. lh r;tirn uf tolls, tnnifa, Hlc , .ind n.'iine of tli A-ii'tr, t'v.rv KiiHroml. Caoal, F.ut, llurb r, Uapot, irw;i aitu i ii v in me uiiixii. Price 1,50. 'H? 15 (SHAM kjut ago For August. 261. I'nink l.e'll;'ll Kutnily Mtiiizitie fur Ann 'ife. tlntU-ya Ludy'a B ink 'ifio. Iil'UTKlin'lt MbL'UJ illR yOc. V'uvi rley Mugiizine (mont)ily part) 3 e. I.iiiuliin Fautllf Hi'titld '26V. llallou'a Dollar Munttil. ion. Nifk-Nsi 10c. t'irklia llto. Nuvi-lftle (monthly) We. .Soulpel J6c. Once a Week 10. Eu tnet of Kiln tie. kt'., ki' . fcc. fS All Ik NKW YOHK PAII.IV.S ilstiverml to ml,, nn iIhtk ill thi-ir ri'iiiilwniTK, lf.iie 1 ,i't-liM-k A . M. twenty- Inn r tinnm attr r tnt-ir piinlicuiinn niiNew oik, ht k:iti loi n t'l'iilv pur Wo k J W. Sr.'HUt'KKHX, jr'W 2il4 s'iiimti r St .upmiMIl- lJnat ott'n-e. tviLi, ins ft ai.iMii i) ai t;iT ad," Mrs. Partington's Kuilting Work, A WEB OK MANV TEXTURES, IIANDSOMKLV ILLI'STHATIU. THADK SUPF1.1KU AT BOSTON KA'I'KS. INtiHAM t liKAtiO, Publiabera' Aeiila 1 Kl)"E irAL T V K AN N Y TlllH rv-Sii vkn Win, l.tmyrrt. Dot ton, StimnUrt, I.mts-hit-irs -ttui Mm u1 HunnriM a rt ti mi J iJiii.'i d tu a hi. t)SSl,HiM)N, ilii'ir uuiy uili-iu it btnoj a dm I mii wuh tlii'M 1 livinc liijui i" it iia. " l-'i'- il Initio r' antl elm he l li I'nf il." iiml, "As vr wi uhlliiat t,tUtnt kiliou.tl ilutujutA, uuyviuu lu litem." V. C HAVki IS Fit I- SS, And shall publish about Uie 20. h (f Jn!f, A COMPLETE HISTORY OH TUI. Obcilin-Wcllinsion Rescue, Atnl th mn pervH-utiun of th noLla in n who r how to ult y(;tKl rHllir limit nt.i i. A moot ntUm Ui ctuwr to Aiiii'rit-au HtHlnrv, wtiu li FUt'itmliitu kh.-hi! tun w i , I wih tit loivti axptiMsfittl. 'I'fiia volume (miiiih lat'H a lull aicuuut ul tha ruscuu, arrota. nn un itiiiiiuti, ami tritila HEAD IT, AMKIUCAN'S, a ml MOl'HN iiit v ii' itnin'rt ' t'f:r;MUliMti ; aaltrr it oruiubint uvtrthe himl, iiml a Nt AVDt'KA 1111 i A ilON tuny irne the ilt'p'b ol tlfpruviiy uin wh Aciini ta litlu which It Inn ( Ifii, mill itiuiiMf, riMntiii ami i'forin r?" Wt uant )U0 acttvt whwUuuUii AventM to $tlt thit Oi.V. ir" in pnyr. Sll rrntj; m clvth 76 rai (hif fourth tilt' ount by thr iuini, or une-tfu. ti t the hundred I ', rrt.l ,rii i io a.f ti JkW'K'IT. v 1 fS : . I l :i;im Suicn..r .. 'irv-tiimi. O. TDYLS OK THK KlNli - ( renin m ui't naw Hutr ( Hari.ir a tt'iiKgiit ol Krrm u Sin ks, by Sir V. liuitl M PiiH.it a ut Vnlt n1 written by luiii!! $1.(10 .$1 Jf. C'rHMiu for Auzut ,'. 3 n i mur iii iuu t iih iur Ainnii m' Aii iUt hfilf , ( i i.ew sii'Miii ) f I tw All the Y-ai Uuiuid, No H. Mutir Wai-k ly l-T-.uk 1 u hi' 'a Mii-iie Juuiioil. Ihtt N. w 1 niter wilb m now aL - it by Mi Suiitiiwiirth, a'nl mvi-ml mhat New Yurtt aud Hubitui iiirttttry i:ii.t fur ttia oaiieol nek. Yiu.ic Nu lluiu f.. btjiiieiubiT, u 1 uf Inu. bv uk4 IIAtt KK k. lHO. liOAKDKUS CAN U altiliA I fcl). iu ri-AMuii nhle trru Willi lunuhlttt4 ur uiifiir-'ikhml i'i uni". ' M '"i ;i Ht JpUH N1CH" I'AINTINU tyCO TO TASCOTTS ! jgj Th.t s'reurh WHITE ZINC has ootue. Jun. ths turns lor Harlora anil tn.ide mjik ol every deMinulion. ki.ii'tK Nil. T HOIk MAN BLOCK. :W WHKAT FLOUR AT RE- l)L'( Et) I'H.t l i nil A M HEUkVtLO. W ANTED TO EXC1IAN0E 80 Aurra aliaaotun Land i.t i'ariii-iuei Woia ku- itmiei-r IlkNHY It. K.HiTH k I t). u3 kunu'i Blotl. KASFniCK UITTaM A SUTETtI t)H AKl'lt I.t, u( up wuh riaiiiil-iiad auqar, a jitmvlv iur lun i jr KM). I'all nt ami lnntn v ur oi liia it you wnl aumttiiiiiig ,Uuli:a UtUitttK hPHAliUt-;, ifM.iWm.M4 Utialt'a kctiaut lotljiug. i B U ROLAR yT (in mitht I-at wtrk n tntnaioj dar By i tiifv vtaa vtolainl, H itu car iiwl off unma m tr wr, s,. rnlM, titooa it wua P1.TI. Ntt m Tiiina. whun tha ruoK c-ma dmrn, Una aaw tna cioat bar " W tira t tha a lr waif!" aba aald, Aua tvrho auawaTtii, " W ut rul" Tha fart waa lu.itf d about t atrcatt, Ami to .Hilt Hint H hm ail ; l)iucitwn httirn (I io me h 'f Ami mum. a Kbrawtllv iu'iitiirtl ; llo-y neairii d tu ihum uikI gi rot tbruQtl, A .ul niahlKif iioutl htKiimi; L"ikBii bum ami thrrn. nuoiht af'ry WHIII, Hut atlll im wai wn lou. U. At IbiI whn lby ha'l wary frown III JookliiK luuu.l ha luURs Oim ot tiifm fi.umi uiuii thr itmca. A I'lrfln ill imuri und I tl iiWiuri. Now t.-ycuulU wuat km.l vi panta ! ritltilug llllfl M-J Wk,,', Ami wilt i tne to a he, innn whkUI, pfrkfti'l, 'lha onrfBt Tninht nuarv Tin x 'rannotl tbt piroa, and found it turn. Vt t h li ohra in i bruRPii; Anil tliiv ax jihiihly abowml ihe fart Aa if t" Mid Imrn Rtioliaii, Thn I'Miitaiuoua IkuI nut im. n bought Al UiNlON HALL an l Imrn a "W h nn he, the biirlur, jum tl 'ho iptkaa, Wh ch Kixeii him tu Db-FRNCii, T .I'Meil WOTKtlt of Molfti ,1.1 I l lwerl run hi not heiir. Ami Ll.M'H(tli a arhlin I'tHeaMiy StirCUrijl.ed lu w A it Km d I war Uu' hal tbe hurt; 'ai V pun alouitt , Atl'NION HA1.L H-enbtiuvlit Tire -pik nn hi ii"t liMve luat ia hulJ 1 he thief would h;vu boearauphl. Vi r ISAACS' ftimiif n'ri nfyer t. No nn ila nr nu rnn ti nr Miciiii Th- j arn ti.e oil to of huiiesi men, liut iurglari ucvar wear litem. Vor wMl-n.H'ia N'f ina. amj fynh otii.bla HE AUY-ftl AUI CLDI IIINU, at Vf HY l.tlW HHICIlS., there ia nu 4a..a lu tha whole wraiarn ronnirj iika IhAAO A ISAAC8' MAGNIFICENT UNION HALI Cleveland, Ohio. the best.Se.wiLg Altchmea in thn w.ultl. uie lur a ie tmiy at 11 l,B HINIUil 1 1 A 1 jI Cornar huamrior td Uuioo b-teels. C"Aii.l STOI1RS AUTOMATON l'KESSMAN, tio grejil -st wonler rl I lie ac--, ia uIm lor ale 1 1 lAAK A. ISA S futon H a'l KOfll, liKVI & BIAYKIt, WHOLESALE & KETAIL DEALERS IN ALL KINDS OF READY-MADE CLOTHING, NO. 172 SUPKHlOa STREET, lrl I LiKVEI.AND. L LARGE ERIE FEMALE MARY. rpiIE LAKE ERIE FEMALE SEM- JL J N AH Y, lorainu in Pittsburgh, Ohio, will be opened .'oiiipmium! il. oi i no nri'tfiu ivr.
35,297
http://data.theeuropeanlibrary.org/BibliographicResource/3000113961982 http://www.theeuropeanlibrary.org/tel4/newspapers/issue/3000113961982 http://www.theeuropeanlibrary.org/tel4/newspapers/issue/fullscreen/3000113961982 http://gallica.bnf.fr/ark:/12148/bpt6k7307192/f1.thumbnail_2
Europeana
Open Culture
Public Domain
1,866
Le Siècle
None
French
Spoken
5,246
8,972
Boniface lui demande grâce. Il ne lui était opposé que parce qu'il ne voulait pas d'un seigneur sourd. Dès l'instant qu'il ne l'est pas, il s'engage à favoriser son mariage, et pour commencer il l'invite à venir s'asseoir dans le parc, sur le gazon, près de la cloche qui sert à sonner le dîner, et il lui recommande de ne pas bouger quand il la sonnera à toute volée. Rien ne donnera à M. Damoiseau une meilleure opinion de sa surdité. Il emmène Placide. Damoiseau reparaît palpitant de joie. Il en tend ; il a recouvré l'ouïe! Le visiteur qu'il a fait appeler est un empirique que des amis lui avaient recommandé et à qui il a suffi d'une légère opération pour le guérir de cette surdité que les plus grands médecins déclaraient incurable. C'est merveilleux! Quelle joie pour sa fille et pour ce bon Boniface qui lui est si dévoué! Boniface vient lui annoncer que le dîner est prêt, et, comme à son ordinaire, il lui dit d'abord en entrant de grossières injures, et lui répète que, sans son testament, il ne serait pas resté trois mois auprès de son insupportable personne. Damoiseau frémit de surprise et de colère; mais il se contient, réservant sa vengeance pour un autre moment. Il commande à Boniface d'aller sonner le dîner. Il aperçoit le jeune chasseur impassible comme s'il n'entendait rien, à quelques pas de la cloche qui retentit de manière à être entendue à une lieue à la ronde. Il ne songe plus à marier sa fille à un sourd. Il ne la donnera pas à un infirme. C'était bon quand il était sourd lui-même. Il la fait prévenir de ne pas assister au dîner. Il compte se débarrasser au plus vite de son convive. Il le lui dit en face croyant n'en être pas entendu, et les voilà tous deux se débitant les plus mauvais compliments, chacun d'eux persuadé que l'autre est sourd. Enfin ils s'aperçoivent qu'ils ne le sont ni l'un ni l'autre. Ils se querellent; Eglantine accourt au bruit et avoue à son père qu'elle aime Placide. Damoiseau ne consent à l'accepter pour gendre qu'à la condition qu'il retirera l'expression de « vieux daim » qu'il a osé lui appliquer. Placide s'empresse de se rendre service en lui faisant observer que c'est lui qui a commencé l'attaque. Damoiseau en convient et lui donne la main d'Églantine; mais il refuse de pardonner à Boniface; il le chasse; toutefois, Placide promet tout bas au valet de lui payer sa rente viagère à partir du jour de son mariage. Toutes les situations de cette petite pièce sont divertissantes et suffisamment variées, quoique le même moyen comique y soit presque toujours employé. Le dialogue est très gai et les deux sourds sont représentés d'une manière amusante sans être trop chargée, le père par M. Charles Potier, le jeune homme par M. Hittémans. Le rôle de Boniface est aussi très bien joué par un nouvel acteur, M. Baron, qui s'y montre naturel et plaisant. En somme, il y a certainement plus de véritable comique et d'invention scénique dans ce petit acte que dans les cinq actes de la Vie parisienne. Il y a aussi une peinture plus vraie et plus piquante des roueries et des mœurs rustiques dans les Paysans, que la Gaîté vient de reprendre, que dans les Bons villageois de M. Sardou. Cette reprise des Paysans a rendu à M. Paulin Ménier un de ses bons rôles, un paysan raisiné qui fait la bête et qui l'est moins qu'il ne veut le paraître. M. Paulin Ménier joue ce rôle d'une manière un peu grotesque, mais originale et plaisante. C'est un commencement de revanche de son affreux rôle du Major Trichmann. La Gaîté a associé cette reprise des Paysans avec celle du Sonneur de Saint-Paul, l'un des plus grands succès de M. Bouchardy et de l'ancien boulevard du Temple. Mais ces deux reprises vont bientôt disparaître pour faire place à Cadet la Perle, un nouveau drame dans lequel Mlle Lia Félix fera sa rentrée en scène de son directeur M. Dumaine, à qui nous souhaitons un succès égal à celui de Jean la Poste. Un titre d'un effet magique pour un mélodrame serait celui d'une coupe de nouvelle que l'on montre dans une exposition de figures de cire établie sur le boulevard des Capucines, sous le nom de Musée français. La première représentation de Cadet de la Perle, au théâtre de la Gaîté, annoncée pour mardi prochain, est remise au surlendemain vendredi. Donc encore trois représentations des Paysans et du Sonneur de Suint-Paul. LUNDI sil, où il fut abandonné aux mains de mercenaires nègres pour la plupart; ne sachant ni lire ni écrire, lorsqu'il revint à Lisbonne en 1822, se révoltant trois fois contre son père, à l'instigation de sa mère, avec laquelle il fut banni par un décret du 12 mai 1824; se réfugiant à Paris, Rome et Vienne, d'où, à la mort de Jean VI, il retourne à Lisbonne comme régent du royaume, en l'absence de sa nièce, donna Maria da Gloria, fille de dom Pedro, empereur du Brésil qui lui cède ses droits en Europe ; opérant se proclamant lui-même roi de Portugal en opposition à Dom Pedro, forcé d'abdiquer la couronne du Brésil, mais qui voulait rendre celle du Portugal à sa fille, une lutte qui dura plusieurs années et qui se termina le 29 mai 1834 par la capitulation d'Evora. Banni à perpétuité, dom Miguel se rendit d'abord à Gênes, puis à Rome, et enfin en Allemagne. De son mariage avec une princesse de Lowenstein-Wertheim-Rosenberg, il laisse trois filles et un fils qui porte son nom. — B. Sainte-Aimé. On nous écrit de Saint-Sever (Landes) : « La démocratie vient de faire une perte sensible par la mort de M. Despons, menuisier, officier de la garde nationale de Paris en 1848, et qui, revenu dans sa ville natale, avait su s'y faire apprécier de tous par ses vertus tant civiles que privées. Ses concitoyens l'avaient élu, par deux fois, membre du conseil municipal. Il est mort comme il avait vécu, sans désespérer de l'avenir.» — Le colonel Cordier (Jean-Joseph-Alexandre), commandant en second de l'école de cavalerie de Saumur, vient de mourir dans cette ville, à l'âge de 56 ans. Ce 9e histoire Tribunaux étrangers. COUR D'ASSISES D'ANVERS. Accusation de faux et d'incendie. — L'homme qui suit son propre cercueil. Nous avons enregistré ailleurs ce fait étrange d'un individu qui, pour perpétuer une des plus audacieuses escroqueries dont une compagnie anglaise d'assurances devait être la victime, osa assister en personne à ses propres funérailles. Vital Donat, c'est le nom du personnage, a été poursuivi pour banqueroute frauduleuse en 1864 à Bordeaux, où il était négociant et armateur. Réfugié d'abord à la Havane, puis à Londres, où il se faisait appeler Robert, il est enfin venu se faire prendre à Anvers, où il demeurait sous le faux nom de Donaty. Dans la nuit du 20 au 21 août dernier, des colis déposés sur le quai de Hambourg, à Anvers, s'enflammèrent et faillirent incendier plusieurs navires ancrés à proximité. L'enquête qui suivit cet incident constata que les colis, composés de cinq grandes caisses, ne contenaient que des matières inflammables, préparées pour être mellifères. Dès le lendemain, on a trouvé le propriétaire de ces caisses; qui avaient été, par lui, déclarées contenir des marchandises de grande valeur. Cet homme était Vital. Son procès qui a duré du 9 au 15 de ce mois, s'est terminé par; l'accusé, déclaré coupable de faux et de tentative d'incendie d'un navire, a été condamné à la peine de mort. Revue de la Bourse. Les mouvements qui ont eu lieu depuis le commencement du mois, l'activité qui a constamment régné sur le marché, prouvent que la bourse sent le besoin de rentrer dans une vie plus active et plus féconde que celle où elle a végété plusieurs mois, et de briser les liens qui la condamnaient à l'immobilité. La spéculation croyait évidemment à la baisse; elle l'attendait depuis plusieurs mois. L'état des rapports l'a prouvé. Pour elle non-seulement la baisse devait être la conséquence d'événements qu'elle prévoyait; la baisse était en outre, à ses yeux, le seul remède à l'état d'atonie du marché, le seul moyen d'y faire revenir les acheteurs et les capitaux. Les événements attendus par la spéculation ne se sont pas produits; au point de vue politique, les complications prévues ne se sont pas développées; il s'est même fait un grand apaisement dans les esprits, et les questions qui passionnaient les imaginati... ons, il y a quelques mois, n'y produisent aujourd'hui que des impressions beaucoup plus calmes. Il en a été de même, au point de vue financier, des embarras qui étaient considérés comme menaçants. L'état des encaisses des grandes banques et l'abaissement à peu près général du faux des espèces ont répondu victorieusement à ces craintes. Les achats de blé à l'étranger seront en grande partie payés au moyen des échanges mutuels du commerce. On ne peut contester sans doute que chaque mouvement de baisse attire à la bourse de nombreux acheteurs et y fait affluer une masse de petits capitalistes qui ne s'inquiètent que du meilleur marché des valeurs et des plus gros revenus que ce meilleur marché leur assure. Une fois nantis de ces valeurs, ces petits capitalistes, ces petits rentiers ne songent qu'à les arrondir en mettant à profit la nouvelle occasion. Les valeurs ainsi retirées du marché n'y reviennent plus, à ce point de vue, les grandes baisses ont souvent puissamment contribué au classement des valeurs, et le point de vue de la spéculation est très-juste lorsqu'il s'applique à un marché surchargé de valeurs déclassées. Mais lorsque le titre manque, lorsque la spéculation a vendu à découvert des valeurs qu'elle ne peut fournir, il n'est plus besoin de la baisse pour attirer des acheteurs et pour réveiller le marché, il ne faut qu'un retour de la spéculation, et ce retour peut être provoque, soit par une plus saine appréciation de la situation, soit par un changement qui vient dissiper les nuages de la finance ou de la politique, soit encore par des mesures susceptibles d'activer le mouvement des capitaux et de produire sur les petits rentiers le même effet d'attrait que le dessein. En sommes-nous là, et la spéculation à découvert qui existe, on ne saurait en douter, se sent-elle avancée par une de ces causes susceptibles de provoquer un changement de front de sa part? On a pu le croire pendant une partie de la semaine dernière en voyant l'empressement avec lequel un certain nombre de rachats ont été opérés. Mais le marché a été tellement éprouvé et il a subi tant de déceptions, qu'il ne peut se défendre encore de nombreuses hésitations avant qu'il n'est pas parfaitement sensi sur les moyens d'action qui doivent, dit-on, inaugurer la prochaine campagne d'affaires. Le Comptoir d'escompte, nous avons déjà eu l'occasion de le dire, pressé par l'extension de ses affaires toujours croissantes, a convoqué ses actionnaires pour le 8 décembre, à l'effet de leur soumettre la question du doublement de son capital. Déjà deux fois le Comptoir s'est vu dans l'obligation de recourir à une mesure de cette nature, et chaque augmentation de capital a été le signal d'un accroissement dans les dividendes. De son côté, le Crédit mobilier, dont le nouveau capital entrera l'année prochaine en partage des bénéfices avec le capital primitif, convoque pour le 27 décembre une assemblée générale extraordinaire : à l'effet de procéder à la nomination des trois administrateurs qui doivent entrer en fonctions le 1er janvier. Rousset. CHAUFFAGE PAR PÊLE ET CHANTIER D'ASTERLITZ. Bois de chauffage à 54, 55 et 56 fr. les 1,000 kilos (non sciés). M. Douches aîné, 56, boulevard Richard-Lenoir. — C'est toujours le produit le plus demandé, le plus en faveur auprès du public que les Contrefacteurs prennent pour point de mire : le chocolat Menier en est un exemple. Son succès a fait naître des fabricants qui ne cachent pas que leur industrie est d’habiller leur chocolat extérieurement pour qu’on puisse le prendre pour du chocolat léger. Il faut se défendre de ces méprisants en lisant le nom authentique MESNIL sur la tablette et non tout autre de même consistance. — L’enthousiasme véritable le meilleur charbon de bois à 5 et 5 fr. 50 le sac, 25 kg. ; l'excellent charbon de Paris à 8 fr. les 50 kilos, avantage pour un seul sac. Écrire au quai Bourbon, 21. Prière d’envoyer : timbre-poste remboursé en livrant. — Le purgatif le plus agréable et le plus efficace est le chocolat des châtaignes, 9, r. Le Peletier. — Véritable onguent Canet-Girard, pour guérir les plaies, panaris, etc., boul. Sébastopol, 11. — rhumes. Pâte de saffe, la plus efficace des pâtes pectorales (26, rue Richelieu, Paris). Informations de mariages du 1er au 18 novembre. 8e arrondissement.—M. Mignot, facteur des postes, r. de Passy, 34, et Mme Le Thomas, même maison. — M. Daily, docteur en médecine, r. de la Ville-l'Evêque, 39, et Mme Minna-Cauvin, r. de Sèvres, 64.—M. Vinson, valet de chambre, r. Boissy-d'Anglas, 33. et Mme Paris, r. Berger, 18. — M. Auville, négociant, à Pont-de-Beau (Loire-Inférieure) et Mme Isabelle, r. Montaigne, 5.—M. Bauly, doreur cour St-Philippe-du-Roule, 40. et Mme Doseville, r. Dulong, 69.—M. Milville, pharmacien, r. du Rocher, 7, et Mme Bourjot, à Longeaux (Seine et Marne). — M. Moyne, ferrailleur en voitures, avenue Marbeuf, 8. et Mlle Tabouret, r. de la Fidélité, 24- 9e arrondissement — M. Simonin, imprimeur, r. Blanche, 4, et Mme Renaud, même maison. — M. Martin, carrossier, r. des Scripteurs, 3, et Mme Champenois, même maison. — M. David, rentier, r. Le Peletier, 49, et Mlle Dromergy Laffitte, 52.—M. Prieur, horloger, r. du Faubourg-Montmartre, 4. et Mme Peley, même maison. — M. Hubin, menuisier, r. Lamartine 40, et Mme Vieillard, r. de l'Échaudé, 36.Mme Coquet, garçon de recette, r. de la Chaussée-d'Antin, 53, et Mme Coquet, r. des Vosges, 9 — M. Simon, cordonnier, impasse Briare, 8. et Mme Chassé, même maison—M. Arribat, marchand de vin, r. du Helder, 1, et Mme Brevier, r. des Fontaines, 3. 10e arrondissement.—M. Julliard, voyageur, passage Neveux, 6, et Mme Petit, même maison. Chauveau-Lagarde, 5. — Mme de Chomel, 79 ans, r. Miromesnil, 52. — Mme Lutton, 34 ans, r. de Londres, 51. — M. Verraty, 34 ans, r. Montholon, 5. — M. Boucherie, 64 ans, r. Lafayette, 158. — M. Le mer, 10 ans r. de Lancry, 84. — M. Cortopossé, 79 ans, r. du chemin-de-Fer, 99. — M. Florans, 17 ans, r. 41. — Mme Martin, 83 ans, r. Blois, 120. — Mme Videlaine, 63 ans, Grande-Rue, 17. — M. Lanoir, 67 ans, avenue de la Grande-Bois, 80. — M. Bourgouin, 56 ans, passage de la Croix, 15. — M. Helin, 20 ans, r. Labat, 3. — Mme Nicole, 62 ans, r. Lepic 20. — M. Jeanneau, 53 ans, boulevard de la Villette, 204. — M. Daniel, 20 ans, r. d'Anvers, 46. — M. Hondart, 80 ans, r. de la Chacotte, 60. — M. Cacilisis, 64 ans, r. de Montreuil, 82. — M. Maurice, 71 ans, passage de Milan, 3. Décès et inhumations de 17 novembre. — M. Richard, 37 ans, r. d'Aboukir, 82. — M. Blouët, 61 ans, r. Delorme, 23. — Mme Savry, 54 ans, r. Geoffroy-Leggevin, 11. — M. Lironce, 34 ans, r. du Roi-de-Sicile, 54. — M. Lenoir, 48 ans, r. St-Placide, 39. — M. Lenormand, 80 ans, r. de l'Université, 103. — Mme Bloisdaub, 80 ans, r. de Sèvres, 76. — M. de Lavault, 83 ans, r. Spectacles du 10 novembre. Opéra — La Favorite, Divertissement français — Le Fils adopté, opéra-comique — Mignon, odéon — La Conjuration d'Amboise, lyrique — Martha, Richard Cœur-de-Lion, châtelet — Cendrillon, opéra comique. Gaîté — Nos amis villageois, opéra — La Vie parisienne, opéra comique — Les Parfums à Londres, opéra. Champs-Élysées — Les Paysans, le Sonneur de Saint-Paul, opéra — Les Amours de Paris, opéra comique — Relâche. Bouffes — Voir Paris et mourir, opéra comique — Léonard, opéra comique — Ric-Din, Ric-Don, opéra comique — Les Chevaliers de la Table-Ronde, opéra comique — Les Rosières, Groscheminé, le Maître, opéra comique — La Pigeon, Vipérine, Femmes, Pétrin. Nouveautés — Le Pays de la gaudriole, opéra comique — Entrez, vous êtes chez vous. Olympia — Monte-Christo (2e partie), opéra comique — La Fille des chiffonniers, opéra comique. Champs-Elysées — Grande soirée équestre, en décembre — Dimanche à Saint-Cloud — Bataille de Solferino. Ambigu — Magie, prestidigitation. Robinson — Foudre, Physique, Tableaux, Spectres. Chalet idéal (Villennes) — Dimanches et fêtes valent mieux — Mardi, jeudi, samedi, dimanche casino — Sous les jupons, bal ou concert. Folies — Dimanche, lundi, mercredi, vendredi halles municipales françaises, 39, boulevard Capucines — Tête parlante. Bouvard — Boulevard Montmartre, 12 — À 8 h. L'un des gérants responsables, SOUGÈRE. Paris — Imp. J. Voisvenel, rue du Croissant, 16. Aujourd'hui, à la Chambre des notaires au boulevard le Palais, par M. de Montaut et Dumas, le mardi 18 décembre 1866, même pour une seule enchère, en quatre lots, de : FERME CORBEIL, Contenance 176 hectares environ. Produit 14,743 fr. 10 c. — Mise à prix, 360,000 fr. RAISON DE SUIVRE. -1 S. Produit, 20,000 fr. — Mise à prix, 250,000 fr. 2 RENTES HAZAIX. Produit, 7,600 fr. — Mise à prix, 80,000 fr. 3 MASONNETS A VERSAILLES, rue Saint-Pierre, 11 et 13, et passage Saint-Pierre, 1. Produit, 11,280 fr. — Mise à prix, 90,000 fr. S'adresser audit siège de Montaut, dépositaire du cahier des charges, 146, rue Montmartre, et audit M. de Gatinois de rue Sainte-Anne. SURPRISE. Toutes sur une seule enchère, à la chambre des notaires de Paris, le 4 décembre 1866. Contenances. Mises à prix. Rue de Morny, m. 75 c. 41,218 fr. 76c. Rue de Morny, 338 80 42,350 fr. Avenue d'Iéna, 360 71 Avenue d'Iéna, 481 90 Rue de Lubeck, 481 90 Avenue d'Iéna, 719 fr. Rue de Lubeck, 659 76 62, 680 ou RENTES à M. Bouwens, architecte, rue de Boulogne, 1, et 11. VOIRIE, notaire, rue Cambon, 29. DIT A L'ENCHERE, ses affaires et ses possessions. Le samedi, 11 heures. Très belle chasse et pêche. Un chapelain payé par les hospices de Paris dessert le château. Lots Contenance. Revenus. Mises à prix. 1 * fermière 121 7,037 50 net 140,000 fr. 2 * château, parc 3, 4 et 5 pièces 5,550 90 4,000 Sadrès: M. Hénault, hôte à Gournay, nous a, et à Paris & M. de Coulanger, 18, rue Legendre, 77. SAISON DÉPENDANCES. Etude de M. Boirauld, avoué à Paris, rue des Deux-Ecus, 15. Vente sur licitation; le mercredi 18 décembre 1866, en l'audience des criées, au palais de justice, à Paris, d'une maison et dépendances, située à Paris (17e arrondissement), rue des Dames, 93, et rue Beaudouin, 19 (ancienne rue Porta). Mise à prix : 80,000 fr. L'ABBEVILLE, 33 Fils à paris rue des propriétés d'un établissement de vente sur une enchère, en la chambre des notaires de Paris, le 27 novembre 1866. Revenu, susceptible d'augmentation, 14,400 fr. • Mise à prix : 170,000 fr. ; S'ad. à Mme Carpenter, not. à Paris, 31. Le Peletier, 36, boulevard de Grenelle, à l'angle de la rue d'Isly à vendre sur une enchère, en la chambre des notaires de Paris, le mardi 18 décembre 1866 Revenu actuel, 3,000 fr.; dans 6 ans, 4,000 fr.; S'ad. à cabré, notaire, place des Petits-Pères, 9. À PARIS. Notaires de Paris, par FERME ET TERRAI. Étude de M. Oscar Mobeau, avoué à Paris, rue Laffitte, n° 7. Vente aux criées de la Seine, le 28 novembre 1866, 1° De la ferme du Désert, sise à Fourqueux, canton de Saint Germain-en-Laye (Seine-et-Oise). Mis à prix, 10,000 fr. Production annuelle, 1,000 fr. 2° D'un terrain de la contenance de 7,767 mètres, sis à Noisy-le-Grand (Seine-et-Oise). Mis à prix, 500 fr. S'adresser à M. Oscar Mobeau, avoué, et à M. Hécaen, rue de Lancry, n° 9. SCIMIN N° 108 > L'ancien moulin du ruisseau, À vendre, en la chambre des notaires, M. Baron, l'un d'eux, le 18 décembre 1866. Revenu évalué 1,500 fr. — Mis à prix, 20,000 fr. S'adresser à M. Baron, notaire à Paris, rue Biot, 3, et à M. Devise, notaire, rue Laffitte, 3. À Paris, en la chambre des notaires de Paris, par le ministère de M. Desvallées et Fémy, le 27 novembre 1866, même sur une enchère, en 3 lots, de 3 maisons à Paris : 1° L'HÔTEL DESPOSTES, 2 rue du Croissé, rue Royale Saint-Honoré n° 47, 000 f. 700,000 f. 2° LA MADELEINE, 4 rue de la Madeleine et rue Royale Saint-Honoré n° 24, 62,000 f. 860,000 f. 3° LA MADELEINE, 846,500 fr. 1,550,000 f. S'adresser audit M. Desvallées, dépositaire du cahier des charges, r. Montmartre, 146; audit M. Fémy, r. Bulle-chasse, 14, et à M. Monvillier, not., r. Grammont, 16. ÉTABLISSEMENT de DISTILLERIE et LIMONADIÈRE, à Paris, rue Saint-Denis, 266, à adjuger, même sur une enchère, en l'étude de M. Mas, notaire à Paris, rue de Bondy, 38, le lundi 10 décembre 1866, à midi. Mis à prix, 25,000 francs. Facilités de paiement. S'adresser audit M. Mas, notaire, rue de Bondy, 38. PUIS LE CATALOGUE À Paris, passage rue de l'Anama, 15, a été jugé, même sur une enchère, en la chambre des notaires de Paris, le 27 novembre 1866. Revenu, 5,600 fr.— Mise à prix, 66,000 fr. S'adresse à M. Bourquet, not., 15., r. N.-D.-de-Lorette. CERTIFICATS AMÉRICAINS 6 «10. La banque de Crédit et de dépôt des Pays-Bas a Amsterdam et à Paris, 8. rue Drouot, a l'honneur d'informer MM. les porteurs des titres provisoires de certificats américains que les titres définitifs seront à leur disposition à partir du lundi 26 courant, et qu'ils pourront toucher en même temps le coupon d'intérêts de 15 francs, échéant le 1er décembre. Ces titres définitifs, rapportant 30 fr. d'intérêts par an, payables à Paris, et remboursables au pair, au plus tard en 1882, se délivrent quotidiennement au prix de 400 fr., jouissant du 1er décembre 1867. BANQUE FRANCO-ITALIENNE Ruffault. Avances sur titres, ordres de Bourse, lettres de créance et de commerce sur l'Italie. — Succursale à Rome, Turin. «RUES de BOURSE » actions et obligations françaises et étrangères. MAISON de banque, 32, rue Notre-Dame-des-Victoires, Paris. Succursale à LIMOGES Recouvrements au pair AUCTION sur valeurs industrielles cotées ou NON cotées. Paiement de coupons par anticipation, délégation et autres, 12, rue St-Georges, 12. - 7 Moisographie.— Gazette des modes le plus élégant des journaux de modes.—Paraît tous les dimanches avec une gravure finement coloriée et publie également des modèles de lingerie, de chapeaux, de coiffures, de confections, de broderies et de patrons. 3 mois, 7 fr. — Prime nouvelle chaque année pour les abonnements d'un an. E. PHILIPON, 20, rue Bergère, à Paris, — expédie un mois pour essai contre envoi d'un franc en timbres-poste. JOURNAL HEBDOMADAIRE paraissant le jeudi. Rédacteur en chef : A. CRAMPM. Ce journal contient le double de matières des journaux financiers les plus complets ; c'est le seul qui publie chaque semaine des correspondances inédites des places de Londres, New-York, Berlin, Francfort, Bruxelles, Florence, Madrid et Constantinople. Il publie également tous les tirages français et étrangers, Paris, 108, r. Richelieu. Un an, 20 fr.; six mois, 10 fr. SOCIÉTÉ de BANQUE, 3, rue des Comptes, Bordeaux, demande des représentants dans les principales villes de France et de l'étranger pour le placement d'un capital de 100 millions à la commission des vins fins et des spiritueux. Ecrire franco, à Bordeaux, aux initiales Z et c®, rue Borie. ancienne MAISON. Mme DE SAINT-MARC, possède un nombreux répertoire de demoiselles riches et dames veuves à marier. MARIAGES (Affranchir.) PLUMIER Préposant de quelques heures par jour désire tenir des écritures. Écrire au poste restante à Paris, initiales ADM. particulière. de musique et d'anglais données par une demoiselle distinguée. S'adresser à M. Oger-Debatz, libraire, avenue des Ternes, 52. Cessions de fonds. Sans argent. Sans caffeine. Affranchir, 300 fr. par jour; net par an, 12,000 fr. Riche matériel, cheval et voiture. Prix, 25,000 fr. S'adresser de 2 à 4 heures au magasin de teinture, 69, rue Notre-Dame-de-Lorette (Montmartre). Loyauté 2,100 fr. Affranchir, 30,000 fr.; bénéfice net, 6,000 fr.; prix, 10,000 fr. Age, 30 ans. Boutique de bonneterie, etc., à vendre à Montmartre (quartier populaire). Loyer rare, 370 fr.; recettes, 50 fr. par jour; bénéfice net, 25 %; prix, 4,000 fr. Agence boutiller-demontières, rue Richelieu, 15. Auto-um Delicates que soins, 30 NOVEMBRE, OCTAVE BÉMÉLIS DE LA LOTERIE TIRAGE CELEBRATION DE L'ANNÉE DE L'INDE TIRAGES DEFINITIFS des 6 dernières années (ENSEMBLE) au capital de fr. 4,500,000 fr. ADRESSER 6 fr. (mandat-poste ou timbres-poste) AUJOURD'HUI au directeur du BANQUE-EXACTE, rue Rivoli, 68, Paris, et on recevra immédiatement les résultats par remise du courrier, octroi, pour Toutes Instances de Tous GRANDS TIRAGES définitifs Arrêté Préfectoral. Tous les lots immédiatement payés en 43 €3 "13> €3 Grande Loterie A M D E L Y £ 115 lots. Gros lot de Grande Loterie DU PARC 92 lots. Gros lot de Loterie CATALUNGE M -O loW. Gros lot de Exposition de l'art. Comité de l'Art. In. POUR 13,000 f. on vendrait un hôtel de 31 n°. en location, 10,000 f.; bail, 14 ans; loyer, 2,400 f. Augustin, 35, r. de la Tour-d'Auvergne, 2 à 6 h. DE COMMERCIAL, HUE MONTMARTRE 33. r. de la Chainette se vend de suite café avec trois belles salles et 9 belles chambres; en vaut 15,000; recettes, 11,000 f. bénéfices nets justifiés, 25,000 f.; prix, 80,000 f. TENDRE VOUS NECESSAIRE DE BÂTIMENT DE et trousses de voyage. 101, boulevard Sébastopol. SLAES ALLOIS, S? —Pans, 91, 93, 95, rue du Faubourg-Saint-Denis 2 FRANCS? Il est en toile forte et se pose au sommet de la rue. 9,500 vendu. Faubourg-Saint-Martin, (g), Paris. Liquidation jusqu'à concours, 32, RUE DE RIVOLI. Il qui ration ne doit rien rester. Économisation de liquidation. OLD ELFAND. – Our agency reçoit, 21 rue. Toutes nouvelles marchandises. BOLINARIUS AIT Wolff & CIE, EXPÉDITIONS de fardeaus hermétiques garanties. Notre établissement, 18 rue Cuvier, PARIS. Très beau stock de médailles, ouvert à la vente, 8, rue Château-d'Eau. CATALOGUE GRATUIT sur demande. OCCASION. – Antique, le mètre 35 centimètres, Peyrat, 87, rue du Mail, Paris. Coups, chevaux, caillouche, phalanges. Rue de la Victoire, 8. SOMMIER ÉLASTIQUE, LITS COMPLETS, FABRIQUÉS par FERRETTI, rue du Harland. (Excellents), soulignes par sa beauté, à vivre ou à mettre. JAPONAISE – MEVALESCINE SRS – Excellente pour asthme, phthisie. 500,000 cures, y compris celle de Sa Sainté le pape. 1/4 kg à 1 1/2 kg. WILLIAMS et MABBST'S, place Bastille. MÉDELINE BALM – leur, Source de puissance commune. Exiger de la guérison or, 3 francs, 15 francs le pot. Appliquer aux flanelles et à la cuvette végétale du Privilège SILVESTRE REYNAUD, chez maître, rue de la Paix. La LÉNIFIQUE POPULAIRE CLÉSÉT guérit les insomnies. PAR Ph M rï a iuo rvaiiii Guérit toujours, 25 ans de succès Dépille profitably SALADIES MALADIES de LA PEAU. Élixir chimique, 109, rue Saint-Lazare à Paris guérit dartres, boutons, rougeurs, dommage à la peau, pellicules, maux de nez, d'oreilles, etc. ESSENCE SALIVAIRE iodée, dépuratrice du sang et des humeurs, 1 fr. le flacon. 20 fr. les six. pour inventer En Vente chez Michel LEVY frères, 2 bis, et à la Librairie, Nouvelle, boulevard des Italiens, 45 SIXIÈME VOLUME DES .'->.1* TT" -V i .!• t-H til £i v-\ VA y, Vodain, 12 !'î'. Richelieu relié, 40 fr. Par TURGAN Contre mandat ou timbres-poste. C« O S -S eâ gS «o «a o © §8 .2 s S «3 1 ? > e> rt w H* en -a « i i * 0> 1 bo • 0 o , ^ — M 1 2 ! S S . a o M «i » « 2 d a> o *3 ^ a S«| {fl 53 i2 H <Q l l'I ^ ' C- : (n —< g es K ^ ° n H 1 ■ es .2 : o *- J S? S ."flll I . 3 ^ si e i > i 6 - 1 • » a « I .2 1 H û 9 a Ss-St H lil C3« m z• <—*. S «'«.2 2 i T S*- -i «sES s W .5^ c3 3 60 *+ 0 fa *.\ié ►r ,3 § §"2^ a ëg ° s ij J — I O • D* §2 °. « C 1) rri. Sss.2 ' 0 - ,. I | d te ' "w Pi >n j«g§â ' O JZ ^ g g J | | S'"*§'2 i 1 ilagSa ,j w-s! s. a E- M .g 9c fcc o I 2 "3®. s wo „3 •S ° ® .3 S-a-C^ « 2 "S M QJ XI J?*. J' j o I 3 I 13 I 01 ^ I Ô O &a ta es m g-2.s| m o® s w-o oa (S m Mo S'S âa : sa l'â 1^ m a ''I SS <5'S E3-3- ^ I o 1 a .s « S ' o 2 A CJ Q) Sf?' CCStri' S cpS g-co H si i i i a S m en 'd a u 0 S o S S o o a o «2 2 S o 3 ^ S fit f- g E S T3 S o £_ 1s sglfs-s *3 I CJ 2 S O 1 .2 M 3 M SV« d §"9 û d ^ o* m » s a S .2 .s O m '!3 o ta .i 3 *â • O S ' 8 ■-4 I S ««:§.§% '.<2 B-'S.S 3 s U ■a i g, ."SSP i 8 ! ^ u i S.2 I. M S O " S -0 • v m ' m •â&8 S S5'3 «3 CQ «5? O V3 a's i S s g a S » s. S £sS)§ gw fl 0 i S g & oT S 1 S -rt >Sg «-K B S S S 2 g S 2 a S)S ■< , ©a s2 'g 8 s," S 1. 3 t* S ® s ' Q 01 co — M g j.2„- Eil- ex L | •£ » 2 • H © m. © sa gs-a^: S îs S j® • .Î3 ^ m *«&J Irt «2. 0 q) d s. §•. ri «. 1 i* ^ KD a f * O h § oO es '«111 § O-'W M '£l Gsi i •. d o ~ 53 tr «s. LE MÊTRON Deux en grande largeur (68 centimètres), d'une VALEUR SÉELLE de 11 et 12 francs, à... Les deux autres en 52 centimètres de largeur, d'une VALEUR RÉELLE de 7 et 9 francs, à... AUX PRIX EXTRAORDINAIRES DE fr. 5, fr. et fr. 10, 15 et 20 fr. LE MÊTRON. LE MÊTRON. PIÈCES ET PAPIERS, largeur 62 cent., garanties 15 fr. de première qualité, à... 19 NOIRS et de toutes COULEURS, à 10 fr., largeur 88 cent., qualité extra, à... l'étoile le mètre EXPOSITION SPÉCIALE DES NOUVEAUTÉS. NOUS SIGNALONS : LETTRES ET LYNX, à 1450 fr., d'une valeur de 60 fr., à... SORTIES DE BALLET THÉÂTRE, forme nouvelle à 230 fr. ANTEAUX DE VOITURE, FORME nouvelle... 2,000 BIBES DE CHAMBRE, unie et doublées en velours (en qualité), à 45 fr. LA ROBE HAUTE NOUVEAUTÉ, en très beau velours, avec volant plissé, ayant 4 mètres 50 centimètres de tour, à... LE JUPON. LES ACHETEURS PREVIENNT que l'entreprise refusent TOUTE VENTE EN GROS ou à des intermédiaires. Cela étant, LES ARTICLES DE CETTE EXPOSITION EN VENTE. Excellentes références, disponibles dans toute la France, la Suisse et la Belgique.
37,350
W2944051156.txt_1
Open-Science-Pile
Open Science
Various open science
2,018
On the issue of methods and methodology of exhibiting in a medical museum
None
English
Spoken
3,804
6,488
History of Medicine, 2018, 5(4): 273–277 DOI: 10.3897/hmj.5.4.35687 On the issue of methods and methodology of exhibiting in a medical museum Ivan A. Grinko1, Anna A. Shevtsova2 1 SAIC “MOSGORTUR” 9 Ogorodnaya Sloboda lane, building 1, Moscow 101000, Russia 2 Moscow State Pedagogical University (MSPU) 88 avenue Vernadskogo, Moscow 119571, Russia Corresponding author: Anna A. Shevtsova ([email protected]) Received: 10 May 2018   Accepted: 23 November 2018   Published online: 31 December 2018 Citation: Grinko IA, Shevtsova AA (2018) On the issue of methods and methodology of exhibiting in a medical museum. History of Medicine 5(4): 273–277. https://doi.org/10.3897/hmj.5.4.35687 Abstract This paper analyses ways in which traumatic material has been displayed in medical exhibitions and the use of age restrictions in museums. Museum workers face the difficult task of exhibiting material that could be psychologically traumatic for certain visitors, and this is particularly the case for medical museums, given that the raison d’être of medicine is to fight diseases, ima­ ges of which it is not pleasant to see. Two key approaches to displaying such material in exhibition space are examined. In the first, focussing on the technical aspect, access to certain elements potentially psychologically traumatic for visitors is restricted through original architectural and spatial solutions, using anthropometric restrictions in some cases. The second, based on cultural studies and anthropology, presents diseases through cultural and historical images. This approach offers the museum a broad range of options (use of classical objects of culture, ethnographic images of diseases, thematic lettering, etc.). This paper uses field materials from Russian and foreign museums, as well as ethnographic research findings. The authors conclude that organising a permanent exhibition of material with different age designations is realistically achievable: all that is required is intelligent spatial planning. Keywords history of medicine, museum, medical museum, exposition, age marking, museum ethics The global trend for museums to show not only aestheti­ cally attractive exhibits but also difficult aspects of his­ tory has led to many challenges for exhibitions, inclu­ ding the display of unpleasant images. Museums face a conundrum. How can they display traumatic material without compromising the exhibition’s integrity and the storyline, while ensuring that the museum remains aesthetically attractive and accessible to visitors of dif­ ferent age categories? Today, this problem, of a conflict between museum work-led and ethics-led approaches, identified back at the end the twentieth century (Mensh 2018, p. 194), is becoming increasingly relevant, and concerns not only exhibitions, but also the media, so­ cial networking sites and advertising materials (Calain 2013, p. 278–280). For medical museums, this dilem­ ma is twice as relevant, given that the raison d’être of medicine is to fight diseases. However, not every visitor finds realistic visualisations of disease pleasant. In this respect, Mihail Chemiakin’s memories of visiting the Russian Museum of Military Medicine as a child are illustrative: “But apart from the main building entrances, where you could warm yourself up, there was another rather unusual place on Zago­ rodny Prospekt: the Museum of Military Medicine, part of the Military Medical Academy (there was also a hospital there, where our military of different ranks and titles were treated). You entered the museum from Zagorodny Prospekt, and – the most important thing for us about this museum – entry was free. Even so, there were never any visitors in the deserted halls of that Copyright IA Grinko, AA Shevtsova. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0). IA Grinko, AA Shevtsova: On the issue of methods and methodology of exhibiting in a medical museum museum apart from my little sister and me. Actually, sometimes some military doctor would hurriedly usher through a crowd of buzz-cut new recruits, lumbering in their artificial leather boots, not keeping them for long in front of the stands on venereal diseases, evidently hoping that the sight of these waxworks, vividly sho­ wing the stages of the destruction of the nasal cartilage, nasopharynx and private parts, would put the young de­ fenders of the motherland off casual relationships for a long time. Shocked by what he had seen and heard, one newbie rushed to the exit, the heavy doors slammed, and my sister and I were left alone among the natura­ listic waxwork horrors representing the faces of people suffering from leprosy or disfigured by haemorrhagic smallpox, armpits and groins with plague buboes, and feet and hands ulcerated by various diseases. In display cases, under glass, grinned the surviving parts of skulls from the time of the Napoleonic Wars, demonstrating various bullet and fragment wounds. Gathering dust in one of the cases was a display of ears of wheat being ‘eaten’ by stuffed animals from the rodent family, who were leaving plague bacteria on the ears and grains. My cleanliness-obsessed sister was particularly struck by a prominently displayed trench soldier’s shirt, absolutely riddled with lice. Her interest in the museum exhibits was genuine, and this no doubt played no small part in the fact that she went on to work for many years as a nurse in hospitals in Russia and France, caring for people who were dying. After wandering these halls for a few minutes, you could understand why, despite entry being free, people were not exactly flocking to that mu­ seum” (Shemyakin 2017, p. 115–117). We have allowed ourselves this lengthy quotation to show that in this case, the museum had two key func­ tions: to provide illustrative material for training pro­ fessionals, and to serve as a means of outreach among a relatively narrow military audience. Clearly, a modern museum cannot always afford to work for such a narrow professional audience. Exceptions to this are specialised university museums, where, following Giovanni Battista Morgag­ ni, “Mortui vivos docent” – “the dead teach the living”. Examples are the Museum of Pathological Anatomy in the corresponding department at the K.I. Skryabin Moscow State Academy of Veterinary Medicine and Biotechnology, the Museum of Pathological Anatomy at the Chita State Medical Academy, and numerous similar educational museums, aimed almost exclusively at students and teachers. Here, though, the aim is different: to show future doctors everything a non-medic would rather not think about. And the more realistic the exhibit, the better the material is taken in. An “open to all” policy may be commercially successful, as can be seen in the con­ tinued public interest in the travelling “The Human Body Exhibition”, the collection at the Federal Patho­ logic-Anatomical Museum in Vienna (“the Madhouse 274 Tower”), the Corpus “journey through the human body” Museum near Leiden, and even the customary view of the Peter the Great Museum of Anthropology and Ethnography primarily as the Kunstkamera, – i.e. Dr. Ruysch’s cabinet of “alcohol-preserved freaks in jars”. Friedrich Schiller wrote on the attractive power of horrible things in On the Tragic Art (1792): “It is a phe­ nomenon common to all men, that sad, frightful things, even the horrible, exercise over us an irresistible seduc­ tion, and that in presence of a scene of desolation and of terror we feel at once repelled and attracted by two equal forces” (Shiller 1957, p. 41). Consider another observation by Mihail Chemiakin: “For my sister and I, like other children of the war, who had grown up among the ruins of destroyed buil­ dings and country houses of Königsberg, among Sovi­ et soldiers and German residents, adults and children, maimed in the war, who had stumbled across dried out corpses, who had played with skulls and bones (some of us had been killed, blown up by grenades and mines found in the dust), for us, it was not scary in that muse­ um” (Shemyakin 2017, p. 117). However, the public today, despite the popularity of the idea of inclusion, are not always ready to take in true images of diseases and injuries. What, then, can museums do to resolve this im­ passe? This problem has already been discussed in the professional community (Opyt predstavleniya... 2017), but we would like to focus not so much on the mor­ al and ethical aspects of exhibiting traumatic material as on the technical side – how to display such exhibits in an exhibition most effectively. At the same time, the practical importance of such an approach should also be borne in mind: in recent years, Russia’s lawmakers have shown great interest in age ratings and restricting children’s access to traumatic material.1 In fact, from a pedagogical point of view encountering difficult sub­ jects develops empathy in children and helps them to grow up (Golitsina 2012). The simplest approach – restricting entry for chil­ dren in the first place – is not ideal, as it either scares off visitors with children, or, on the contrary, attracts those who are underage like a showing of an adults-on­ ly film. Furthermore, such an approach may go against the museum’s mission. Such an arrangement may work sometimes, but this requires taking account of such age-based zoning at the museum concept and building planning level, complicating the task of the architectu­ ral design of the exhibition and the museum building, which is not easy anyway (Lord B and Lord GD 2002, p. 153). An example of such division can be found at the 1 Federal Law No. 436-FZ “On the protection of children from information harmful to their health and development” (29 December 2010). Rossiiskaia Gazeta [Russian Newspaper], rg.ru/2010/12/31/deti-inform-dok.html. (In Russ.) History of Medicine, 2018, 5(4): 273–277 Copernicus Science Centre in Warsaw, where subjects unsuitable for children under 14 are in a separate area. Sometimes the exhibition’s storyline or the building’s architecture does not allow such a separate area to be created and the age-restricted elements then have to be incorporated into the overall picture. The Warsaw Rising Museum uses special stands designed to look like con­ crete blocks to show potentially traumatic photographic material. As these are more than one metre high, and the material is set out horizontally, it is not physically possible for little children to see such displays. The museum also has a special area for displaying documents on executions and mass graves. This section is designed to look like a field morgue (Grinko 2017). To see what is inside, visitors have to enter it. Parents can decide whether to let their children do so. The Solidarity Museum in Gdansk shows video foot­ age with scenes of violence from crackdowns on mass demonstrations in Poland in the middle of the exhibi­ tion, but restricts access to them. The video screens are located in the driver’s cab of a Polish special operations unit lorry from the early 1980s. To view it, visitors have to climb inside up some high steps, which a teenager on their own can do, but a small child cannot. This approach, involving physical effort, is not en­ tirely new. For example, it was used at the “Forbidden Art – 2006” exhibition, organised by Yuri Samodurov and Andrei Yerofeyev, where visitors could see works of art through small openings, reachable only by climbing some small steps. Similar approaches are sometimes used to show spe­ cific items that can be damaged by sunlight. For examp­ le, at the “Royal amusing fires: Festival culture in the 18th-century Russia” exhibition at the Tsaritsyno Mu­ seum-Reserve in Moscow engravings were displayed behind special curtain blinds; original eighteenth-cen­ tury calligraphy is displayed in a similar way at the Shanghai Art Museum. At the Katyń Museum in Warsaw, a sheet of metal with a peephole at an adult’s eye-level has been used to hide one of the displays. This part of the exhibition was dedicated to forensic medicine: the exhumation of the corpses of Polish prisoners of war in 1943. At the Bundeswehr Military History Museum in Dresden, these two approaches are combined. Here, the theme of death and mutilation in war, such as fa­ cial injuries, which impressionable visitors find partic­ ularly off-putting, have their own separate section, and the exhibits are not immediately visible: to see them, visitors need to open special shutters. This calls for a certain amount of physical effort, meaning that the re­ striction on access is based not also on height, but also on physical development. The section shows not only the physical aspects of military injuries, but also the psychological side. It is worth looking separately at how the museum has addressed the subject of mutilations and amputations, which are inevitable in any military conflict, in its exhi­ bition space. Against a backdrop of abstract outlines of people, including children, various prosthetic limbs are shown in separate display cases, making the traumatic material more abstract, but no less impactful. The aforementioned Solidarity Museum uses a sim­ ilar approach of partial separation: photographs of the bodies of dead dissidents can be seen only by opening special shutters too high for a child to reach. In this case, the section is not distinct from the rest of the ex­ hibition. Let us now turn to the use of visual images of disease and patients, including symbolic ones. In the fungi section at the Museum of Natural Scien­ces of Barcelona, fungal diseases are illustrated with a fragment from Pieter Bruegel the Elder’s paint­ ing The Beggars, which, it is believed, depicts a group of unfortunate people suffering from gangrenous ergotism (Saint Anthony’s fire), caused by the consumption of ergot-contaminated grain. Discussing the relativity of aesthetic values in On Ugliness, Umberto Eco writes that “in such cases we unhesitatingly recognize ugliness and we cannot trans­ form it into an object of pleasure. So we can understand why art in various centuries insistently portrayed ugli­ ness. Marginal as the voice of art may be, it attempt­ ed to remind us that, despite the optimism of certain metaphysicians, there is something implacably and sadly malign about this world” (Istoriya urodstva 2007, p. 436). Following in the footsteps of numerous artists, Eco sees ugliness as a human drama. In our view, one of the ways to overcome excessive naturalism, or “the museum’s sin of hyperrealism” (Shola 2013, p. 153), when it comes to medicine is to visualise disease symbolically. There are numerous ways to do this: art therapy, mod­ ern art, ethnomedical material... The projective tech­ nique of art therapy (“draw your illness”) has become a commonplace, bringing tangible results. It is not un­ common for effective symbolic illustrations of particular illnesses to be drawn by artists who suffer from them and have personal knowledge of the problem. For example, the series “Toby and the Monsters” (2010) was a cathar­ tic process for Toby Allen, with the artist aiming to help people to connect with their inner world.2 The overall winner of the Wellcome Image Awards 2017 for the best scientific image was a series on Crohn’s disease by an artist with the pseudonym of Spooky Pooka. This is a rather gloomy, and simultaneously au­ tobiographical, series of six images visualising the fear­ ful world of a patient with an incurable condition: Hoc est corpus meum (“This is my body”), Quod me nutrit me destruit (“What nourishes me also destroys me”), 2 Sergeev V. Monstry psikhicheskikh rasstroistv [Monsters of mental disorders]. Live Journal. vasily-sergeev.livejournal. com/7376057.html. (In Russ.) 275 IA Grinko, AA Shevtsova: On the issue of methods and methodology of exhibiting in a medical museum Et in Arcadia ego (“Even in Paradise there is death”), Nullam dolorem sentire (“No more pain”), Nemo liber est qui corpori servit (“No one is free who is slave to his body”), and Dolor hic tibi proderit olim (“Someday this pain will be useful to you”).3 Anton Zhavoronkov has effectively visualised speech disorders through typography.4 Modern “social diseas­ es” such as “selfiephrenia” are humorously depicted in cartoons by Oksana Semenova.5 Such approaches do not just qualitatively alter the exhibition space, but also lay the foundations for various sociocultural projects such as art therapy sessions or different programmes associated with storytelling, including visual. One of the most impressive visualisations of both a terrible disease, in the form of a clawed monster and its conquerors – the patient and the team of doctors – was created by Halyna Zubchenko and Grigory Prishedko in a mosaic entitled “Victory over Cancer” on the ped­ iment of the National Cancer Institute in Kiev in the early 1970s. Unfortunately, wonderful anthropomorphic folk images of diseases and therapeutic amulets are more likely to be found in ethnographic museums than in medical ones. They include Tajik lukhtak dolls – fam­ ily and personal charms –, Enets spirits of diseases, and Russian fever dolls, Georgian batonebi —“red masters” – mythical personifications of children’s infectious diseases, and Nanai, Ulch and Oroch heal­ ing spirits – ongons and seveks (Ostrovskiy 2009). Folk medicine and remedies are generally derided by modern medicine and medical museums, but centu­ ries of experience of understanding, dealing with and fighting diseases that could affect anyone should not be ignored. Furthermore, such an approach allows a medical museum to present some local features, thus making it more than just a narrowly professional in­ stitution. 3 4 5 “Luchshim nauchnym izobrazheniem priznana illiustratsiia bolezni Krona” [“An illustration of Crohn’s disease is recognized as the best scientific image”] Xage, xage.ru/best-science-im­ age-illustration-of-crohns-disease/ (In Russ.) “Sem prostykh illiustratsii, kotorye rasskazhut o bolezni bol­ she, chem slovar” [Seven simple illustrations that tell more about the disease than a dictionary]. Interesno znat', interes­ noznat.com/interesno/7-prostyx-illyustracij-kotorye-rasska­ zhut-o-bolezni-bolshe-chem-slovar.html (In Russ.) Semenova O. Selfifreniia, rukozhopis i prochie zevatizmy. Live Journal, oksanasemenova.livejournal.com/869921.html (In Russ.) Even death, our inevitable end, has been perceived in different ways in different eras. For example, death for the Victorians was associated with numerous rituals, including post-mortem photography. Today, such pho­ tographs are shown in museums, such as the Museum of World Funeral Culture in Novosibirsk, where visitors can even get photographed with mannequins in a simi­ lar photo session. “Morbid, sick and mentally unsound is how people today most often view these post-mortem photographic plates, more than a hundred years old, as they shudder with revulsion, and with a fear that is not always conscious – reacting very similarly to how peo­ ple in the reign of Queen Victoria reacted to sex. <…> At the same time, death presented no mystery, except in the sense that death by its nature is always a mystery” (Gor 2011, p. 361). The vast wealth of mythology associated with the most universal symbol and “eternal subject” (Etingen 2009, p. 523) – our own body – can and should be ex­ hibited in museums directly concerned with it – mu­ seums of medicine, anatomy, sanitation and hygiene, health, first aid, hospitals, epidemics and pandemics. It is worth looking separately at humour as an im­ portant tool in modern museum exhibitions (Grinko 2017). This means not only humorous depictions of dis­ eases, although this approach also merits attention, but the anti-stress aspects of exhibitions that help visitors to get a more positive experience out of the museum. Humour – both specific professional humour and patient humour, including that which has entered the popular imagination thanks to cinema and television – can help to overcome the “traumatic” subjects of med­ ical exhibitions; after all, as it says in the comedy The Pokrovsky Gate (dir. Mikhail Kozakov, 1982), “the sick have great team spirit”. Therefore, displaying material with different age designations in a permanent exhibition is fully achiev­ able, and requires merely intelligent spatial planning. In addition, such innovations may have a positive im­ pact on the museum as a whole: any restrictions en­ courage creativity and design, as well as the desire to investigate. As such, any concealed item in an exhibi­ tion may prompt visitors to investigate what else the museum has to offer. However, it is necessary to have a clear idea of the exhibition’s goals and objectives and to take account of its target audience, and to use this in deciding how much traumatic material to display, and how to go about it. References Calain P (2013) Ethics and images of suffering bodies in humanitarian medicine. Social Science & Medicine 98: 278–285. https://doi. org/10.1016/j.socscimed.2012.06.027 276 Etingen LE (2009) Mifologicheskaya anatomiya [Mythological anatomy]. 2nd edition. Moscow: In-t obshchegumanitarnykh issledovaniy. 528 p. (In Russ.) History of Medicine, 2018, 5(4): 273–277 Golitsina V (2012) Prishel, uvidel, osoznal [I came, I saw, I realized]. Muzey kak prostranstvo obrazovaniya: igra, dialog, kultura uchastiya [Museum as an educational space: a game, a dialogue, a culture of participation]. Ed. by A. Shcherbakov. Compl. by N. Kopelyanskaya. Moscow: Fond M. Prokhorova; Tvorcheskaya gruppa “Muzeynye resheniya”. P. 39–42. (In Russ.) Gor VE (2011) Dykhanie Tanatosa. O viktorianskoy fotografii post mortem [Breath of Thanatos. About Victorian photography post mortem]. Khudozhestvennaya aura: istoki, vospriyatie, mifologiya [Art aura: origins, perception, mythology]. Ed. by O.A. Krivtsun. Moscow: Indrik. 560 p. (In Russ.) Grinko IA (2017) Dostupnye ogranicheniya: “trudnoe nasledie” v ekspozitsionnom prostranstve [Available restrictions: “difficult legacy” in the exhibition space]. Sovremennye tendentsii v razvitii muzeev i muzeevedeniya [Modern trends in the development of museums and museology]. Ed. by V.A. Lamin, O.N. Shelegina, G.M. Zaporozhchenko. Novosibirsk. P. 169–172. (In Russ.) Grinko IA (2007) Yumor v muzeynom prostranstve [Humor in the museum space]. Observatoriya kultury [Culture Observatory]. 2017; 14(3): 315–321. (In Russ.) Istoriya urodstva [History of ugliness] (2007) Ed. by U. Eco. Moscow: Slovo. 456 p. (In Russ.) Lord B, Lord GD (2002) Menedzhment v muzeinom dele [The Manual of Museum Management] / Transl. by E.N. Gusinskij and Yu.I. Turchaninova; ed. by A.B. Golubovskij . Moscow: Logos. 256 p. (In Russ.) Mensh P van (2018) K metodologii muzeologii [Towards methodology of museology]. Transl. by V.G. Ananiev. Moscow: Perspektiva. 448 p. (In Russ.) Opyt predstavleniya biomeditsinskikh kollektsiy v estestvennonauchnom muzee na primere vystavki “ChP v DNK”. Metodicheskie rekomendatsii [Experience in presenting biomedical collections in a natural science museum on the example of the exhibition “DNA emergency”. Guidelines] (2017) Completed by Yu.V. Shubina, O.A. Zubareva, A.N. Andreeva. Moscow. 45 p. (In Russ.) Ostrovskiy AB (2009) Ritualnaya skulptura narodov Amura i Sakhalina. Putevodnaya nit chisel [Ritual sculpture of the peoples of Amur and Sakhalin. Guiding thread of numbers]. Saint Petersburg: Nestor-istoriya. 195 p. (In Russ.) Shemyakin M (2017) Unylye mesta – ochey ocharovanie [Dull places – charm to the eyes]. V Pitere – zhit [In Saint Petersburg – live]. Saint Petersburg: AST. P. 115–123. (In Russ.) Shiller F (1957) O tragicheskom v iskusstve [About the tragic in art]. Sobr. soch. v 7 tomah [Collected works in 7 volumes]. Vol. 6. Transl. by L.E. Pinskij. Moscow: State Publ. of art literature. P. 41–64. (In Russ.) Shola T (2013) Vechnost zdes bolshe ne zhivet. Tolkovyy slovar muzeynykh grekhov [Eternity does not live here anymore. Explanatory dictionary of museum sins]. Tula: Muzeyusadba L.N. Tolstogo “Yasnaya polyana”. 359 p. (In Russ.) About the authors Ivan Aleksandrovich Grinko – Ph.D. in History, M.A. in Cultural Management, Head of the Department for Museum and Tourism Development (SAIC “MOSGORTUR”), Moscow. Email: [email protected] Anna Aleksandrovna Shevtsova – Doctor of Historical Sciences, Professor at the Department of Cultural Studies, Moscow State Pedagogical University (MSPU), Moscow. Email: [email protected] 277.
11,437
https://openalex.org/W2311772705
OpenAlex
Open Science
CC-By
2,016
Exploring the intentions of pharmacy students towards pharmacy ownership by using theory of planned behaviour
Muhammad Umair Khan
English
Spoken
5,676
10,183
© 2016 Khan et al. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/ publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. BMC Research Notes BMC Research Notes Khan et al. BMC Res Notes (2016) 9:183 DOI 10.1186/s13104-016-1996-4 Abstract Objective:  The objective of this study was to assess the association of the constructs of theory of planned behaviour (behavioural beliefs, normative beliefs, control beliefs) and demographic variables with the intentions of pharmacy students to become pharmacy owner. Methods:  A cross sectional study was conducted between October and November, 2014, using a pretested, self- administered questionnaire delivered to a sample of 350 pharmacy students at a private university of Pakistan. Behav- ioural beliefs, normative beliefs and control beliefs were assessed on four point Likert scale of agreement. The scores were summed and dichotomized based on an arbitrary 50 % cut-off score to assess positive and negative beliefs. Binary logistic regression was used to analyse the data. Results:  A total of 313 participants (89.4 %) responded to the questionnaire. Participants’ behavioural beliefs, norma- tive beliefs and control beliefs were negative towards pharmacy ownership with the mean scores of 13.90  ± 0.41 (score range: 6–24), 9.66 ± 0.49 (score range: 4–16) and 16.88 ± 0.40 (score range: 7–28) respectively. Professional year and family business were significantly associated with intentions of pharmacy students to own a pharmacy (p < 0.05). Conclusion:  Behavioural beliefs, normative beliefs and control beliefs were negative towards pharmacy ownership. Implementation of entrepreneurship course in pharmacy school may transform the beliefs of pharmacy students towards pharmacy ownership. Keywords:  Entrepreneurship, Pharmacy, Students, Ownership, Pakistan health, being proactive, favouring innovations and taking business risks are the entrepreneurial styles of manage- ment [3]. Researchers have reported that pharmacy own- ers are more satisfied with their jobs and are less stressed as compared to pharmacist employed in pharmacies [4]. Similarly, a study reported positive attitudes of pharma- cist towards pharmacy ownership [5]. Since entrepre- neurship involves innovations, creativity and the ability to transform those to profitable business, it would be interesting to know students intent to own a pharmacy.h *Correspondence: [email protected] 4 Department of Clinical Pharmacy Research, College of Medicine and Health Sciences, University of Gondar, Gondar, Ethiopia Full list of author information is available at the end of the article Exploring the intentions of pharmacy students towards pharmacy ownership by using theory of planned behaviour Muhammad Umair Khan1, Akram Ahmad1, Muhammad Fayyaz2, Nida Ashraf3 and Akshaya Bhagavathula4* Background Due to economic crises, the stability of jobs is no longer offers by the employers. Many factors could be related to potential unemployment including advancement of tech- nology and the hiring of low paid employees like phar- macy technicians are the biggest threat to pharmacist [1]. Additionally, researchers doubt that moves towards relaxing industry regulation may soon allow owner- ship of pharmacies by non-pharmacists like supermar- kets’, chain stores and other retailers [2]. This urges the pharmacists to enable themselves to take up the role of pharmacy owner. Looking at the holistic view of public The concept of ownership in pharmacy curriculum is still in its infancy stage. It has been reported that although pharmacy students are well familiarized with the basic, clinical and social sciences, as well as the con- temporary approaches of patient care, they still need extensive training to gain pharmacy ownership skills in *Correspondence: [email protected] 4 Department of Clinical Pharmacy Research, College of Medicine and Health Sciences, University of Gondar, Gondar, Ethiopia Full list of author information is available at the end of the article *Correspondence: [email protected] 4 Department of Clinical Pharmacy Research, College of Medicine and Health Sciences, University of Gondar, Gondar, Ethiopia Full list of author information is available at the end of the article Page 2 of 7 Khan et al. BMC Res Notes (2016) 9:183 order to face the future challenges of the profession [6]. Researchers have shown that students who have under- taken a course of entrepreneurship have a higher intent of pharmacy ownership [7]. In Pakistan, there is no evi- dence to support that entrepreneurship is being taught as a course in pharmacy curriculum, however, different pharmacy schools are teaching entrepreneurship as a component of courses like pharmacy management and pharmaceutical marketing. There is an acute shortage of qualified practicing pharmacist at community settings in Pakistan. A study indicated that pharmacy graduates are least interested to join community settings (5.9 %) as compared to Clinical/Hospital setting (45.1 %) and indus- trial setting (21.6 %) [8]. including students from all professional years (n = 20). After getting a feedback from the students, necessary changes were made to the questionnaire with the aim of making it more brief and simple. The reliability coef- ficient of the questionnaire was calculated by using SPSS v.20. The Cronbach’s alpha value of 0.71 was computed. The responses of pilot study were not included in final analysis. Background The questionnaire was formatted as a paper based sur- vey and was divided into five sections. The first part was about socio-demographic characteristics of the students. This covered age, gender, family residential status like urban and rural background, year of study, family income status, family business, past entrepreneurship experi- ence. The second part evaluates the behavioural belief of the students about pharmacy ownership. The third part includes statements on the control beliefs of students about pharmacy ownership. The fourth part assessed the normative beliefs of study participants’ students about pharmacy ownership. The fifth part of the questionnaire assessed the intent of entrepreneurship among partici- pants. The total survey items comprised of 26 questions, eight questions related to demography of the respond- ents, six questions related to behavioural belief, seven questions related to control beliefs, four questions were related normative beliefs and one question about intent of entrepreneurship among study respondents. The conceptual framework of this study is based on the theory of planned behaviour. It suggests that the best predictor of behaviour is intention, which in turn, is a function of an attitude, subjective norms and con- trol beliefs. Behavioural beliefs (attitude), normative belief (subjective norms) and control beliefs (perceived behavioural control) are the major constructs of theory of planned behaviour. It is a general rule that more posi- tive the behavioural beliefs, normative beliefs and control beliefs will be, the higher would be person’s intention to the behaviour in question. The theory of planned behav- iour has been often used by researchers to explain the entrepreneurship intentions of the participants [9, 10]. The objective of this study was to investigate the inten- tion of pharmacy students towards pharmacy ownership by using the theory of planned behaviour. To date, there is no ethical requirement for non-clin- ical observational studies in Pakistan [13, 14]. However, permission was taken from the respective course coor- dinators and lecturers of the school prior to data collec- tion. Students were comprehensively explained about the objectives of this study before requesting them for their voluntary participation in this study. Written consent was taken from participants prior to data collection. Data was dealt with high level of anonymity and confidentiality. Methods d A descriptive, cross-sectional study was conducted among the pharmacy students in a private university in Karachi, Pakistan. A sampling frame involved all under- graduate pharmacy students enrolled in the university. The University offers 5  years Doctor of Pharmacy pro- gram with an enrolment of 75 students in each academic year. The pharmacy program was approved by Pharmacy Council of Pakistan and Higher Education Commission of Pakistan. The study was conveniently conducted for a period of 2 months from October to November 2014. i Statistical analysis of data was carried out on SPSS v.20. Descriptive analysis was applied to present the results in frequency and percentage. Behavioural beliefs, con- trol beliefs and normative beliefs were assessed on four point Likert scale: 1  =  strongly disagree, 2  =  disagree, 3 = agree, 4 = strongly agree. Scores were summed and then dichotomized based on an arbitrary 50  % cut-off score. Reverse coding was also used for negative worded questions. Attitude was defined as an organized set of feelings which influences an individual’s behaviour. Atti- tudes score ranged from 6–24 (based on six statements). A cut-off score of <15 was taken as negative attitude (dis- liking about pharmacy ownership) while score of  ≥15 as positive attitude (liking about pharmacy ownership). Beliefs were defined as individual’s perception of soci- etal norms, ease or difficulty of performing behavior, and consequences of particular behaviour. An arbitrary 50 % A self-administered questionnaire was used a tool to collect the data from the participants. The question- naire was distributed to the students by one of the authors responsible for data collection. A primary draft of the questionnaire was designed by the authors after an extensive literature review [3, 5, 11, 12], after which it was sent to three pharmacy academicians for content validity. The expert opinion was given in view of making the questionnaire more simple, relevant and important. Questionnaire was then face validated through a pilot study which was conducted by taking a small sample size, Khan et al. Results A total number of 313 students participated in this study giving a response rate of 89.4 %. Majority of them were females (n  =  231, 73.8  %), aged  <21  years (n  =  175, 55.9 %), belonged to urban areas (n = 241, 77 %) and had a cGPA of ≥2.8 (n = 263, 84 %). The complete informa- tion about the participants is presented in Table 1. Table  2 describes the attitudes of students towards pharmacy ownership. Almost similar number of students agreed or strongly agreed that pharmacy ownership would make them professionally (82.1 %) and financially (81.8 %) successful. Students were also of the opinion that pharmacy ownership would greatly improve their man- agement and marketing skills (94.2  %), and their sense of responsibility as a pharmacist (77.3 %). However, stu- dents were concerned about the risk of being entrepre- neur as 67.1 % agreed or strongly agreed that pharmacy ownership would put them at risk during economic cri- ses. Similarly, 78.6  % participants responded that phar- macy ownership would also increase their tax liability. Overall, the participants’ attitudes were negative towards pharmacy ownership (Mean score: 13.90  ± 0.41).h Participants’ response of subjective norms towards pharmacy ownership is presented in Table  4. It was observed that students agreed or strongly agreed that if they own a pharmacy, they would be highly valued in their peer group (80.8 %) and society (60 %) respectively. Also, 67.7  % students believed that their family would want them own a pharmacy after they graduate. Partici- pants’ overall response towards subjective norms ques- tions was negative (Mean score: 9.66 ± 0.49). The results showed that pharmacy students considered pharmacy ownership an extreme risk as they believed that not many people become successful, as more than half (56.2 %) of the participants agreed or strongly agreed to this point. Furthermore, remarkable number of stu- dents (91.4 %) believed that pharmacy ownership would require increase time commitments to fulfil profes- sional responsibilities. Similarly, three-fourth of the stu- dents considered that their workload would significantly increase by owning a pharmacy. It is also noteworthy to highlight that 48.3 % students felt they do not have the knowledge and skills required to own a pharmacy. In gen- eral, participants’ response of perceived behavioural con- trol towards pharmacy ownership was negative (Mean score: 16.88 ± 0.40) as summarized in Table 3. Methods d BMC Res Notes (2016) 9:183 Page 3 of 7 Table 1  Demographic characteristics of participants Grade B is awarded to student with cGPA of 2.8 a  Mean ± S.D: 20.4 ± 2.68 b Mean ± S D: 3 23 ± 0 36 Demographic variables N (%) Age (in years)a  <21 175 (55.9)  ≥21 138 (44.1) Gender  Female 231 (73.8)  Male 82 (26.2) Family residential status  Rural 72 (23)  Urban 241(77) GPAb  <2.8 50 (16)  ≥2.8 263 (84) Professional year  1 62 (19.8)  2 71 (22.7)  3 70 (22.3)  4 58 (18.5)  5 52 (16.7) Family income status  ≤30,000 36 (11.5)  31,000–60,000 102 (32.6)  61,000–90,000 137 (43.8)  91,000–120,000 20 (6.4)  >120,000 18 (5.8) Do you have any family business? Yes 83 (26.5)  No 230 (73.5) Do you have any past experience of entrepreneurship? Yes 22 (7)  No 291 (93) Table 1  Demographic characteristics of participants cut-off score was used to categorize positive and negative beliefs of the participants. Perceived behavioural control towards pharmacy ownership was measured on scale of 7–28 (based on seven statements). Score of <18 were taken as negative attitudes while score of  ≥18 as posi- tive attitudes. Likewise, participants’ response of subjec- tive norms towards pharmacy ownership was measured on scale of 4–16 (based on four statements). Score of <10 were taken as negative beliefs while score of ≥10 as positive beliefs. Association of independent variables (demography, behavioural beliefs, control beliefs, nor- mative beliefs) with dependent variable (pharmacy own- ership intention) was examined by employing logistic regression analysis. A p value of less than 0.05 was taken as significant. Results It was observed that male students were less likely to own a pharmacy as compared to their female counter- parts, however the association did not appear to be sta- tistically significant (OR 0.75, p > 0.05). Similarly 3rd and 4th year students had more intent to own pharmacy in contrast to year one students (OR 3.29, p < 0.05; OR 7.36, Page 4 of 7 Khan et al. BMC Res Notes (2016) 9:183 Table 2  Behavioural beliefs of participants towards pharmacy ownership Attitude was assessed by giving 1 to SD, 2 to D, 3 to A, 4 to SA. The scale measured attitude from maximum 24 to minimum 6. Score of ≤15 were taken as negative attitude while >15 as positive attitude. Mean attitude score was 13.90  ± 0.41 Attitude questions Participants’ response N (%) Strongly disagree Disagree Agree Strongly agree Pharmacy ownership would make me professionally successful (implementing pharmaceutical care services etc.) 2 (0.6) 54 (17.3) 202 (64.5) 55 (17.6) Pharmacy ownership would make me financially successful 3 (1) 54 (17.3) 208 (66.5) 48 (15.3) Pharmacy ownership would greatly improve my management and marketing skills 1 (0.3) 17 (5.4) 221 (70.6) 74 (23.6) Pharmacy ownership would greatly increase my sense of responsibility as pharmacist 9 (2.9) 62 (19.8) 169 (54) 73 (23.3) Pharmacy ownership would put me at risk during economic crises 7 (2.2) 96 (30.7) 170 (54.3) 40 (12.8) Pharmacy ownership would increase my tax liability 4 (1.3) 63 (20.1) 198 (63.3) 48 (15.3) Table 2  Behavioural beliefs of participants towards pharmacy ownership Participants’ response N (%) Table 3  Control beliefs of participants towards pharmacy ownership Control beliefs was assessed by giving 1 to SA, 2 to A, 3 to D, 4 to SD. The scale measured attitude from maximum 28 to minimum 7. Score of <18 were taken as negative attitudes while ≥18 as positive attitudes. Results Mean score of perceived behavioural control was 16.88 ± 0.40 Questions Participants’ response N (%) Strongly agree Agree Disagree Strongly disagree Pharmacy ownership would not provide me a better quality of life 3 (1) 69 (22) 191 (61) 50 (16) Pharmacy ownership would be extremely risk as not many people become successful 25 (8) 151 (48.2) 127 (40.6) 10 (3.2) Pharmacy ownership would require increase time commitments to fulfil professional responsibilities 91 (29.1) 195 (62.3) 26 (8.3) 1 (0.3) Pharmacy ownership would put additional burdens on me along with professional responsibilities 48 (15.3) 171 (54.6) 87 (27.8) 7 (2.2) Pharmacy ownership would increase my work load 51 (16.3) 186 (59.4) 72 (23) 4 (1.3) I would have to take a loan from the bank to own a pharmacy 78 (24.9) 198 (63.3) 36 (11.5) 1 (0.3) I feel that I do not have the knowledge and skills to own my pharmacy 19 (6.1) 132 (42.2) 137 (43.8) 25 (8) Table 3  Control beliefs of participants towards pharmacy ownership Table 4  Normative beliefs of participants towards pharmacy ownership Subjective norms were assessed by giving 1 to SD, 2 to D, 3 to A, 4 to SA. The scale measured attitude from maximum 16 to minimum 4. Score of <10 were taken as negative beliefs while ≥10 as positive belief. Mean score of subjective norms was 9.66 ± 0.49 Questions Participants’ response N (%) Strongly disagree Disagree Agree Strongly agree I would be highly valued in my peer group if I own a pharmacy 3 (1) 57 (18.2) 216 (69) 37 (11.8) I would be highly valued in society if I own a pharmacy 6 (1.9) 119 (38) 165 (52.7) 23 (7.3) My family thinks that I should own a pharmacy as soon as I graduate 9 (2.9) 92 (29.4) 181 (57.8) 31 (9.9) My family thinks that I should own a pharmacy sometime in the future 34 (10.9) 199 (63.6) 63 (20.1) 17 (5.4) Table 4  Normative beliefs of participants towards pharmacy ownership Discussionh BMC Res Notes (2016) 9:183 Table 5  Association of  demographic variables, attitudes and beliefs with the intent to become pharmacy owner Overall predictive accuracy of the model is 77.7 % Omnibus tests of model coefficients: Chi square value = 213.795, p < 0.001 −2 Log Likelihood = 752.030, Nagelkerke R square = 0.274 Variables Intent to become entrepreneur (%) Multivariate analysis Yes No OR (CI) p value Gender  Female 81.4 18.6 Ref 0.47  Male 72 28 0.75 (0.35–1.62) Professional year  1 61.1 38.9 Ref  2 71.8 28.2 1.44 (0.49–4.17) 0.50  3 87.9 12.1 3.29 (1.23–8.79) 0.014  4 84.3 15.7 7.36 (1.56–34.58) <0.001  5 85.2 14.8 7.41 (1.48–18.95) <0.001 Age (in years)  <21 74.3 25.7 Ref 0.63  ≥21 84.8 15.2 1.30 (0.44–3.80) cGPA  <2.8 74 26 Ref 0.64  ≥2.8 79.8 20.2 1.24 (0.49–3.12) Family residential status  Rural 77.8 22.2 Ref 0.42  Urban 79.3 20.7 1.42 (0.59–3.38) Family income status  ≤30,000 77.4 22.6 Ref  31,000–60,000 77.5 22.5 0.72 (0.32–1.61) 0.43  61,000–90,000 88.9 11.1 2.38 (0.60–9.46) 0.21  91,000–120,000 95 5 6.54 (0.68–62.50) 0.10  >120,000 61.1 38.9 1.29 (0.30–5.41) 0.72 Family business  No 84.3 15.7 Ref 0.006   Yes 63.9 36.1 0.34 (0.15–0.73) Past entrepreneurship experience  No 81.1 18.9 Ref 0.254  Yes 50 50 0.49 (0.14–1.6) Attitude  Negative 74.2 25.8 Ref 0.029  Positive 85.8 14.2 2.09 (1.46–4.57) Perceived behavioural control  Negative 65.6 34.4 Ref 0.038  Positive 81.1 11.9 2.10 (1.04–4.2) Subjective norms  Negative 44.7 55.3 Ref 0.001  Positive 91.7 8.3 11.14 (5.6–21.1) Table 5  Association of  demographic variables, attitudes and beliefs with the intent to become pharmacy owner financially successfully. Similarly, they also considered pharmacy ownership as a financial risk during economic crises. These findings reflect their negative attitudes and their lack of information about pharmacy owner- ship. These results could be related to another research where same results were reported [16]. Educating phar- macy students about the benefits of pharmacy ownership could aid in changing the attitudes of pharmacy students towards ownership. Additionally, their negative thoughts of ownership mainly from financial perspectives could also be addressed by developing entrepreneurial skills in pharmacy students through both didactic and expe- riential work in the form of entrepreneurial pharmacy practice program. Not many students agreed that phar- macy ownership would improve their management and marketing skills. Researchers revealed that marketing skills are one of the significant predictors of ownership intention [17]. Therefore, these results could be taken into consideration while enhancing the ownership spirits among pharmacy students. Discussionh p  <  0.05 respectively). Surprisingly, students who had any family business were less likely to own a pharmacy (OR 0.34, p < 0.05). The results also showed that behav- ioural beliefs (OR 2.09, p < 0.05), control beliefs (OR 2.10, p < 0.05) and normative beliefs (OR 11.14, p < 0.05) were significantly associated with intention to own pharmacy as compared to their respective groups (Table 5). p  <  0.05 respectively). Surprisingly, students who had any family business were less likely to own a pharmacy (OR 0.34, p < 0.05). The results also showed that behav- ioural beliefs (OR 2.09, p < 0.05), control beliefs (OR 2.10, p < 0.05) and normative beliefs (OR 11.14, p < 0.05) were significantly associated with intention to own pharmacy as compared to their respective groups (Table 5). The results suggest that participants’ attitudes towards pharmacy ownership were negative. These findings are not in accordance to a study where participants showed positive attitude towards pharmacy ownership [15]. A relatively small number of participants agreed that phar- macy ownership would make them professionally and Page 5 of 7 Khan et al. Discussionh g p y In response to perceived behavioural control, almost half of the participants agreed that they do not have the knowledge and skills to own a pharmacy. The likely rea- son of these results could be due to lack of entrepreneur- ship content in pharmacy curriculum. There is a need to further explore the reasons which leads to these results, and curriculum should be revised accordingly. We also encourage the use of innovative learning approaches, like Problem Based Learning, to develop a range of owner- ship skills among students at pharmacy schools as sup- ported by Refia and Thompson [18]. Fear of financial losses, lack of security, and work and time demands are some of the factors that discourage people from going into business [19]. The responses of pharmacy students were not very different as majority of them have the same concerns. There is a need to realize that not every phar- macy student can become entrepreneur as there are lot of challenges and insecurities that go with entrepreneur- ship [19]. It highlights the responsibility of academician and preceptors to play their role in identifying and subse- quently nurturing students who have inclination towards entrepreneurship. Although majority of the participants agreed to the subjective norms questions, overall beliefs of the respondents were negative. A large proportion of phar- macy students disagreed that they would be highly val- ued in society if they own a pharmacy. These results could be interpreted in two ways. Firstly, we need to look at the public awareness about the role of pharmacist in Page 6 of 7 Page 6 of 7 Khan et al. BMC Res Notes (2016) 9:183 Pakistan. A study reported that patients’ opinions about the role of pharmacists are not optimized healthcare set- tings of Pakistan [20]. This amplifies the need to project more positive image of pharmacist and awareness on how they can be beneficial for the society. Secondly, it is pertinent to explore the attitudes of the public towards entrepreneurship and its importance in society as it is the key social and cultural norms. There is a need to promote culture of entrepreneurship in Pakistan, especially among pharmacy students because of many reasons. Firstly, this would help in strengthening community pharmacy set- ting in Pakistan as researchers have reported the scar- city of qualified pharmacist in majority of pharmacies in Pakistan [21]. Discussionh Secondly, with the growing number of pharmacy students graduating every year, there is an extreme risk of exacerbation of unemployment [22]. In view of this, there is a pressing need to design effective interventions in the form educational programs for the public to raise their understanding of entrepreneurship, which in turn would encourage the pharmacist to take up this important role to meet the needs of the society.h perceived behavioural control are the significant predic- tors of intention of pharmacy students to own a phar- macy. The positivity in the beliefs of the students has led them to a favourable intention to own pharmacy. These results are in line with several other studies that reported the same results [12, 26–28]. The findings of these results could become a basis to design effective entrepreneur- ship program for pharmacy students by adopting the the- oretical considerations and the empirical findings of this study.h The strength of this study is that it has highlighted the area where not much work has been done in Pakistan, and around the world. This study was an attempt to fill the gap in the existing knowledge and make important contribution to pharmacy education and entrepreneur- ship literature. This study has focused on exploring the factors contributing to the intention of pharmacy stu- dents towards pharmacy ownership, which will contrib- ute valuably to the existing literature. This study also paves the way for future research in different directions. It would be interesting to know the intentions of phar- macy students in other universities of Pakistan. This study would encourage the pharmacy researchers and academicians to develop, implement and assess entrepre- neurship course by exploring the perception of pharmacy students. Future studies could also assess the behaviour of these students after their graduation. p y This study also explored the factors associated with the intention of pharmacy students to become entrepre- neur. Several studies reported that women are less likely than men to pursue a male dominated profession such as entrepreneurship [23, 24]. More studies are required to explore how gender affects entrepreneurial behaviour in Pakistani community. It was also observed that sen- ior pharmacy students were more likely to have posi- tive intent towards entrepreneurship. The likely reason of such results could be the increase exposure of senior pharmacy students to community pharmacy training, hospital clerkship and pharmacy management courses. Discussionh Entrepreneurship curriculum should be developed in a way to expose students to the basics of entrepreneur- ship in early years of pharmacy education, followed by advanced levels in later years of pharmacy education. The study also highlights the influence of family business on the intentions of pharmacy students to pursue entrepre- neurship. The findings of our study were contradictory to traditional entrepreneurship research [25]. We found that students having family businesses were less likely to own a pharmacy than the other group. Presumably, stu- dents born and raised in a business environment may have been affected by the drawbacks of entrepreneur- ship in the form of sacrifices and absence of parents due to business issues. A holistic view of entrepreneurship should be provided to pharmacy students by highlight- ing the benefits, along with the constraint associated with entrepreneurship.h Like any other research, this study is not free from limi- tations. The results of this single centre study could affect the generalizability of the results. Though this study con- siders normative influences, it still does not take into account environmental or economic factors that may influence students’ intention to own pharmacy. Moreo- ver, the possibility of potential interactions between vari- ables due to confounding factor, and the possibility of inherent bias may limit the validity of our findings. Conclusion Overall, the behavioural beliefs, normative beliefs and control beliefs of the pharmacy students were nega- tive towards pharmacy ownership. Professional year and family business were the significant predictors of the intentions of pharmacy students to own pharmacy. Implementation of entrepreneurship course in pharmacy school may transform the beliefs of participants towards pharmacy ownership. MUK contributed to concept development, questionnaire design, data analy- sis and interpretation, manuscript preparation and finalization. AA contributed to concept development and data collection. MF and NA contributed to manuscript preparation and manuscript finalization. AB contributed to data analysis and interpretation, and manuscript finalization. All authors read and approved the final manuscript. References 1. Eckel SF. Establishing opportunities for entrepreneurship in pharmacy. Pharmacy Times. 2014. http://www.pharmacytimes.com/blogs/focus-on- current-thinking/0814/Establishing-Opportunities-for-Entrepreneurship- in-Pharmacy#sthash.WC08kmOa.dpuf. 1. Eckel SF. Establishing opportunities for entrepreneurship in pharmacy. Pharmacy Times. 2014. http://www.pharmacytimes.com/blogs/focus-on- current-thinking/0814/Establishing-Opportunities-for-Entrepreneurship- in-Pharmacy#sthash.WC08kmOa.dpuf. 19. Tootelian DH, Wertheimer AI, Mikhailitchenko A. Essentials of Pharmacy Management. 2nd ed. London: Pharmaceutical Press; 2012. 2. Hindle K, Cutting N. Can applied entrepreneurship education enhance job satisfaction and financial performance? an Empirical Investigation in the Australian Pharmacy Profession. J Small Bus Manag. 2002;40:162–7. 3 I b b AU Ph i l h l f 20. Khan MU, Khan AN, Ahmed FR, Feroz Z, Rizvi SA, Shah S, Adil Z. Patients’ opinion of pharmacists and their roles in health care system in Pakistan. J Young Pharm. 2013;5(3):90–4. 3. Inegbenebor AU. Pharmacists as entrepreneurs or employees: the role of locus control. Trop J Pharm Res. 2007;6:747–54. g 21. Butt ZA, Gilani AH, Nanan D, Sheikh AL, White F. Quality of pharmacies in Pakistan: a cross-sectional survey. Int J Qual Heal Care. 2005;17(4):307–13. 4. Mott DA, Doucette WR, Gaither CA, Pedersen CA, Schomme JC. Phar- macists’ attitudes toward work life: results from a national survey of pharmacists. J Am Pharm Assoc. 2003;44:326–36. 22. Hussain K, Hashmi FK. Standardization in the Evaluation System of Paki- stan’s Pharmacy Institutes. Am J Pharm Edu. 2011;75(8):167. 23. Baughn C, Cao J, Le L, Lim V, Neupert K. Normative, social and cognitive predictors of entrepreneurial interest in China, Vietnam and the Philip- pines. J Develop Entrepren. 2006;11:57–77. 5. Brown C, Cantu R, Corbell Z, Roberts C. Attitudes and interests of phar- macists regarding independent pharmacy ownership. J Am Pharm Assoc. 2007;47:174–80. 24. Hackett G, Betz N, Casas J, Rocha-Sinjh I. Gender, ethnicity and social cog nitive factors predicting achievement. J Couns Psychol. 1992;39:527–38. 6. Brazeau G. Entrepreneurial spirit in pharmacy. Am J Pharm Educ. 2013;77:88. 25. Mueller SL, Thomas AS. Culture and entrepreneurial potential: a nine country study of locus of control and innovativeness. J Bus Ventur. 2001;16:51–75. 7. Katz J. The chronology and intellectual trajectory of American entrepre- neurship education. J Bus Ventur. 2003;18:283–300. 8. Saad S, Sumbal A, Mohammad I. Attitude of fourth year Doctor of Pharmacy students towards pharmacy profession and their career prefer- ences. Arch Pharm Pract. 2012;3:293. 8. Saad S, Sumbal A, Mohammad I. Attitude of fourth year Doctor of Pharmacy students towards pharmacy profession and their career prefer- ences. Arch Pharm Pract. 2012;3:293. 26. Urbig D, Monsen E. References Optimistic, but not in control: life-orientation and the theory of mixed control. Jena Econ Res Papers; 2009. Working Paper No. 2009–013. 9. Gelderen M, Brand M, Praag M, Bodewes W, Poutsma E, Gils A. Explaining entrepreneurial intentions by means of the theory of planned behavior. Career Dev Int. 2008;13:538–59. 9. Gelderen M, Brand M, Praag M, Bodewes W, Poutsma E, Gils A. Explaining entrepreneurial intentions by means of the theory of planned behavior. Career Dev Int. 2008;13:538–59. 27. Monsen E, Urbig D. Perceptions of efficacy, control and risk: a theory of mixed control. Int Stud Entrep. 2009;24:259–81. 28. Zellweger T, Sieger P, Halter F. Should I stay or should I go? Career choice intentions of students with family business background. J Bus Ventur. 2011;26:521–36. 28. Zellweger T, Sieger P, Halter F. Should I stay or should I go? Career choice intentions of students with family business background. J Bus Ventur. 2011;26:521–36. 10. Urmie J, Farris K, Herbert K. Pharmacy students’ knowledge of the medi- care drug benefit and intention to provide medicare medication therapy management services. Am J Pharm Educ. 2007;71:1–7. 10. Urmie J, Farris K, Herbert K. Pharmacy students’ knowledge of the medi- care drug benefit and intention to provide medicare medication therapy management services. Am J Pharm Educ. 2007;71:1–7. Authors’ contributions b d MUK contributed to concept development, questionnaire design, data analy- sis and interpretation, manuscript preparation and finalization. AA contributed to concept development and data collection. MF and NA contributed to manuscript preparation and manuscript finalization. AB contributed to data analysis and interpretation, and manuscript finalization. All authors read and approved the final manuscript. This study furthers the theory of planned behaviour as the results show that attitudes, subjective norms and Page 7 of 7 Khan et al. BMC Res Notes (2016) 9:183 Acknowledgements None. National Bioethics Committee Pakistan: Ethical Research Committe 14. National Bioethics Committee Pakistan: Ethical Research Committee- Guidelines 2011. http://www.pmrc.org.pk/erc_guidelines.htm. Guidelines 2011. http://www.pmrc.org.pk/erc_guidelines.htm. 15. Brown CM, Cantu R, Corbell Z, Roberts K. Attitudes and interests of phar- macists regarding independent pharmacy ownership. J Am Pharm Assoc. 2006;47:174–80. Author details 11. Hermansen-Kobulnicky CJ, Moss CL. Pharmacy student entrepreneurial orientation: a measure to identify potential pharmacist entrepreneurs. Am J Pharm Educ. 2004;68:113. 1 Department of Clinical Pharmacy, UCSI University, Cheras, 56000 Kuala Lum- pur, Malaysia. 2 Department of Pharmaceutics, Faculty of Pharmacy, Hamadard University, Karachi, Pakistan. 3 Department of Pharmaceutics, Faculty of Pharmacy, University of Karachi, Karachi, Pakistan. 4 Department of Clini- cal Pharmacy Research, College of Medicine and Health Sciences, University of Gondar, Gondar, Ethiopia. 12. Lohana BB. Pharmacy ownership interest of pharmacy students (Doctoral Dissertation) University of Toledo; 2010. 13. Saleem F, Hassali MA, Shafie AA, Awad GA, Atif M, Ul Haq N. Farooqui M. Does treatment adherence correlates with health related quality of life? findings from a cross sectional study. BMC public health. 2012;12(1):318. Received: 21 February 2015 Accepted: 17 March 2016 Received: 21 February 2015 Accepted: 17 March 2016 17. Odumosu SF. Examining the predictors of entrepreneurial intention among pharmacists: a quantitative study (Doctoral dissertation). North- central University; 2014. 18. Refai D, Thompson JL. The Significance of problem-based learning in the development of enterprise skills for pharmacy students in UK HEI. In: ISBE Conference 2011. Sheffield: Sustainable Futures: Enterprising Landscapes and Communities; 9–10 Nov 2011. Competing interests The authors declare that they have no competing interests. 16. Douglas EJ, Shepherd DA. Self-employment as a career choice: attitudes, entrepreneurial intentions, and utility maximization. Entrep Theory Pract. 2002;26:81–90. Received: 21 February 2015 Accepted: 17 March 2016 Submit your next manuscript to BioMed Central and we will help you at every step: • We accept pre-submission inquiries • Our selector tool helps you to find the most relevant journal • We provide round the clock customer support • Convenient online submission • Thorough peer review • Inclusion in PubMed and all major indexing services • Maximum visibility for your research Submit your manuscript at www.biomedcentral.com/submit and we will help you at every step: • We accept pre-submission inquiries • Our selector tool helps you to find the most relevant journal • We provide round the clock customer support • Convenient online submission • Thorough peer review • Inclusion in PubMed and all major indexing services • Maximum visibility for your research Submit your manuscript at www.biomedcentral.com/submit p y y p • We accept pre-submission inquiries
11,081
https://github.com/evanhunt/gulp-template/blob/master/gulpfile.js
Github Open Source
Open Source
MIT
2,018
gulp-template
evanhunt
JavaScript
Code
370
1,625
// npm install --save-dev gulp run-sequence gulp-cache gulp-concat gulp-babel babel-preset-es2015 gulp-jshint gulp-uglify node-sass gulp-sass gulp-autoprefixer gulp-clean-css gulp-csslint gulp-imagemin gulp-rev gulp-rev-collector gulp-htmlmin del babel-core [email protected] postcss-px2rem browser-sync const gulp = require('gulp'); const runSequence = require('run-sequence'); const cache = require('gulp-cache'); const concat = require('gulp-concat'); const babel = require('gulp-babel'); const jshint = require('gulp-jshint'); const uglify = require('gulp-uglify'); const sass = require('gulp-sass'); const autoprefixer = require('gulp-autoprefixer'); const postcss = require('gulp-postcss'); const px2rem = require('postcss-px2rem'); const cleanCSS = require('gulp-clean-css'); const csslint = require('gulp-csslint'); const imagemin = require('gulp-imagemin'); const rev = require('gulp-rev'); const revCollector = require('gulp-rev-collector'); const minifyHTML = require('gulp-htmlmin'); const del = require('del'); const browserSync = require('browser-sync').create(); const reload = browserSync.reload; const proxy = require('http-proxy-middleware'); const isProd = process.env.NODE_ENV === 'production'; const dist = isProd ? 'build' : 'dist'; const moveFile = { js: 'src/js/*.min.js', } const config = { cssSrc: ['src/styles/*.css', 'src/styles/*.scss'], cssDist: dist + '/styles', cssRev: 'rev/styles', jsSrc: ['src/js/*.js', '!src/js/*.min.js'], jsDist: dist + '/js', jsRev: 'rev/js', imgSrc: 'src/images/**/*', imgDist: dist + '/images', imgRev: 'rev/images', htmlSrc: 'src/*.html', Rev: 'rev/**/*.json', } gulp.task('styles', () => { const processors = [px2rem({remUnit: 75})]; return gulp.src(['rev/**/*.json', 'src/styles/*.scss']) .pipe(revCollector({ replaceReved: true, })) .pipe(sass().on('error', sass.logError)) .pipe(postcss(processors)) .pipe(csslint()) .pipe(autoprefixer('last 2 version', 'safari 5', 'ie 8', 'ie 9', 'opera 12.1', 'ios 6', 'android 4')) .pipe(cleanCSS()) .pipe(concat('style.css')) .pipe(rev()) .pipe(gulp.dest(config.cssDist)) .pipe(rev.manifest()) .pipe(gulp.dest(config.cssRev)) }); gulp.task('script', () => gulp.src(config.jsSrc) .pipe(jshint({ esnext: true })) .pipe(jshint.reporter('default', { verbose: true })) .pipe(babel({ presets: ['env'] })) // .pipe(concat('main.js')) .pipe(uglify()) .pipe(rev()) .pipe(gulp.dest(config.jsDist)) .pipe(rev.manifest()) .pipe(gulp.dest(config.jsRev)) ); gulp.task('images', () => gulp.src(config.imgSrc) .pipe(cache(imagemin({ ptimizationLevel: 5, progressive: true, }))) .pipe(rev()) .pipe(gulp.dest(config.imgDist)) .pipe(rev.manifest()) .pipe(gulp.dest(config.imgRev)) ); gulp.task('html', () => gulp.src(['rev/**/*.json', 'src/*.html']) .pipe(revCollector({ replaceReved: true, })) .pipe(minifyHTML({collapseWhitespace: true})) .pipe(gulp.dest(dist + '/')) ); gulp.task('move', () => gulp.src(moveFile.js) .pipe(gulp.dest(config.jsDist)) ); gulp.task('clean', (cb) => del([config.cssDist, config.jsDist, config.imgDist], cb) ); gulp.task('watch', ['clean'], () => { gulp.watch([config.cssSrc, config.jsSrc, config.imgSrc, config.htmlSrc], ['clean', 'dev']); }); gulp.task('browser', ()=> { const middleware = proxy( 'proxyText', { target: 'ip:port', changeOrigin: true, logLevel: 'debug', ws: true, secure: false, } ); browserSync.init({ port: 8031, https: true, open: false, server: { directory: true, baseDir: 'dist/', }, middleware: [middleware], }); gulp.watch(dist + '/*.html').on('change', reload); }); gulp.task(('dev'), (done) => { runSequence( ['styles'], ['script'], ['images'], ['html'], ['move'], done ); }); gulp.task(('build'), (done) => { runSequence( ['clean'], ['styles'], ['script'], ['images'], ['html'], ['move'], done ); }); gulp.task('default', (done) => { runSequence( ['watch'], ['dev'], ['browser'], done ); })
9,519
https://github.com/meet-projects/lab-setup-scripts/blob/master/lsc.sh
Github Open Source
Open Source
MIT
null
lab-setup-scripts
meet-projects
Shell
Code
29
72
#!/bin/bash #This is a convenience script that replaces newlines with ,\n to improve readability of ls with a screenreader. # #T. Golfinopoulos, 7 Aug. 2018 ls | sed ':a;N;$!ba;s/\n/,\n/g'
7,926
8064818_1
Court Listener
Open Government
Public Domain
2,022
None
None
English
Spoken
1,104
1,421
The opinion of the court was delivered by Parker, J. This appeal is submitted on briefs, but we have the brief only of appellant. The question raised is whether Ihe court below erred in refusing appellant, defendant, a jury trial. Appellant was entitled to such jury trial jf a proper demand was made in due season. The record shows that the summons was returnable December 1st, and duly served: that demand for jury was made by defendant with deposit of jury fees on 'November 30th; on December 1st, the return day, there was an adjournment until December 8th, at which time trial Was had without jury against defendant’s objection. The point argued in appellant’s brief is that by section 149 of the District Court act, a demand for jury trial is in time if made at least two days before the time fixed for the trial, and that December 8th was “the time fixed for the trial.” To this we agree. Formerly the demand was sufficient if made one day before the time fixed for the trial. Pamph. L. 1898, p. 613. This was altered to two days in 1903. Pamph. L., p. 505. In 1905, a further act was passed relating mainly to landlord and tenant proceedings hut entitled as a supplement to the District Court act (Pamph,. L., p. 493), the fourth section of which provided that in any proceedings had by virtue of the act to which it was a supplement, the court should try the case without jury unless demand was made at least one day before the return day of the summons. Tins section was treated as applicable to District Coin*t proceedings generally, in several cases. Walnut v. Newton, 82 N. J. L. 290 and cases cited on page 291. The distinction between tiie phrases “return day of the summons” and “time fixed for the irial” is obvious. Still Jater, the legislature limited lilis section by amendment to landlord and tenant cases only, and revived section 119 as to other cases. Pamph. L. 1913, p. 618. That section accordingly controls, and wo are clear that ihe phrase “day fixed for the trial” means (lie *106return day of tlie summons if trial be then had, or any later day to which the trial may be adjourned and on which it is actually held. So that appellant’s demand for a jury was not out of time because of being made only one day before return of the summons, in view of the fact that the trial was adjourned to a later date at least two days subsequent to the demand. This, however, does not help the appellant, because the demand was not of a jury trial generally, but was limited by its terms to a specific date, to wit, the return daj^ of the summons, and this seems to be the reason for its rejection by the court. The transcript shows that on December 8th, when the case was moved, the following colloquy took place: Mr. Weinberger—I move at this time, your honor, that we be given the privilege to try this case by a jury in view of the fact that we have conformed to section 149 of the District Court act which provides that a trial by jury may be had any time before the fixed trial day by giving two days’ notice in writing to the clerk accompanied by the regular amount required by law for the empanelling of a jury. The notice was served and filed with the clerk. The notice was not filed by the clerk of our district court, but was left with him.on the thirtieth day of November, 1915. The Court—And that is the notice ? (Designating a paper.) Mr. Weinberger—Yes, sir. The Court—Let the stenographer copy the notice into his record. (The notice is as follows:) “To Thomas M. Bustard, Cleric of the Passaic District Court: “You will hereby take notice, that the undersigned attorneys of the defendant demand and you are hereby required to issue a venire of twelve men to hear the issue in the above entitled matter on Wednesday, the first day of December, nineteen hundred and fifteen. “Dated, November 29th, 1915. “Weinberger & Weinberger, “Attorneys of Defendant *107Mr. Weinberger—I would like to have it noted also on the record that this case was an adjourned case from the first day of December until to-day, the eighth. The Court—The court denies your motion because you have not given the notice required by statute. If the trial had been held on December 1st, it is manifest that the court would not have committed error in trying the case without jury, because the two days’ notice had not been given. Condon v. Royce, 68 N. J. L. 222, is a case predicated on ibis section as it stood before 1898, but its reasoning is applicable. Kow there is nothing in the record to show a demand for a jury at any stage of the case, except the notice to the clerk, and the request on December 8th. The latter was of: course too late. The former, if sufficient as a demand at all, was by its express terms limited to a jury trial on December 1st and did not relate to any other date, so that in order io hold that the District Court committed legal error in refusing a jury on December 8th, it would be necessary to say that this notice, although invalid as a demand for a jury trial on December 1st, operated as a general demand of jury trial on any date to which such trial might be adjourned. We are unwilling to take that view. The normal and usual method of trial in a small cause court or District Court is without a jury. Either party is entitled to a jury, but he must ask for it, or, as held by a number of cases, his right is waived. Originally the procedure was perfectly simple and informal, viz., to state to the court either orally or in writing, that the party demands a jury. Ko written notice was required until the amendment of 1903, page 505. See Gen. Stat., p. 1221, § 38; Gen. Stat., p. 1251, pl. 198; Gen. Stat., p. 1871, § 33; Comp. Stat., p. 2992, § 33. By the act of 1905 the court was deprived of power to call a jury unless demand was made at least one day before the return o£ the summons, and this regulation was held constitutional. Haythorn v. Van Keuren, 79 N. J. L. 101. 3STo other ground of appeal being urged, the judgment will be affirmed.
15,110
https://openalex.org/W3095401833
OpenAlex
Open Science
CC-By
2,020
Emergency department and hospital admissions among people with dementia living at home or in nursing homes: results of the European RightTimePlaceCare project on their frequency, associated factors and costs
F. Javier Afonso-Argilés
English
Spoken
11,383
20,841
Emergency department and hospital admissions among people with dementia living at home or in nursing homes: results of the European RightTimePlaceCare project on their frequency, associated factors and costs F. Javier Afonso-Argilés  Department of Geriatric Medicine and Palliative Care. Badalona Serveis Assistencials. Universidad Autónoma de Barcelona. https://orcid.org/0000-0003-3620-9781 g Department of Geriatric Medicine and Palliative Care. Badalona Serveis Assistencials. Universidad Autónoma de Barcelona. https://orcid.org/0000-0003-3620-9781 p g Gabriele Meyer  (  [email protected] ) Institute of Health and Nursing Sciences. Martin Luther University Halle-Wittenberg. Medical Faculty. Halle (Saale) Astrid Stephan  Institute of Health and Nursing Sciences. Martin Luther University Halle-Wittenberg. Medical Faculty. Halle (Saale) Mercè Comas  Department of Epidemiology and Evaluation. Parc de Salut Mar. Barcelona Ansgar Wübker  RWI-Leibniz-Institute for Economic Research. Leibniz Science Campus Ruhr and RUB. Essen Helena Leino-Kilpi  Department of Nursing Science and Nurse Director. University of Turku. Turku Connie Lethin  Department of Health Sciences. Faculty of Medicine. Lund University. Lund Kai Saks  Department of Internal Medicine. University of Tartu. Tartu Maria Soto-Martin  Department of Geriatric Medicine. Gerontopole. University Hospital of Toulouse. Caroline Sutcliffe  School of Health Sciences. University of Manchester. Hilde Verbeek  Department of Health Services Research. Care and Public Health Research Institute. Maastricht University Adelaida Zabalegui  Hospital Clinic de Barcelona. School of Medicine. Universitat de Barcelona Anna Renom-Guiteras  Department of Geriatric Medicine. Parc de Salut Mar. Universidad Autónoma de Barcelona. Research article Keywords: Aged, Dementia, Geriatric syndrome, Home care, Hospitalisation, Nursing home Posted Date: October 27th, 2020 DOI: https://doi.org/10.21203/rs.3.rs-22961/v4 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Version of Record: A version of this preprint was published at BMC Geriatrics on November 5th, 2020. See the published version at Research article Version of Record: A version of this preprint was published at BMC Geriatrics on November 5th, 2020. See the published version at https://doi.org/10.1186/s12877-020-01835-x. Page 1/19 Page 1/19 Background Dementia is a major cause of disability and dependency among older people worldwide and has a psychological, social and economic impact on the persons affected, their families and caregivers, and the society (1). People with dementia have increasing needs for care and supervision throughout the course of their disease, usually leading to the need for support from relatives or other informal caregivers and, when the needs of people with dementia are increased, many of them need to receive care in nursing homes (NH) (2). Admission to hospital due to acute medical problems, including the admission to the emergency departments, is one of the events that people with dementia may experience throughout the course of the disease, irrespectively of whether they live at their own home or at NH. Despite the benefits of receiving specialized care, multiple negative health outcomes have been associated with the admission to hospital of older people in general and people with dementia in particular, including high risk of delirium (3), functional decline (4), fall-related injuries (5), nosocomial infections, pressure ulcers (6), and an elevated risk of mortality (7,8). In a recent systematic review of the literature, Shepherd et al (2019) concluded that people with dementia are more frequently admitted to hospital than those without dementia, and identified hospitalisation rates in people with dementia between 0.37 and 1.26/person-year in high- quality studies (9). However, studies on people with dementia that predominantly resided in long-term nursing care facilities were excluded from this review. Maxwell et al (2015) reported an annual hospitalisation rate of 0.10 per person-year among people with dementia living in NH (10). In their meta-analysis, Shepherd et al (2019) found strong evidence that multimorbidity, polypharmacy, and lower functional ability are associated with hospital admission, and strong evidence that dementia severity alone is not associated (9). However, there is a lack of studies reporting on factors associated with hospitalisation among people with dementia living in NH. Geriatric syndromes are known to predict an increased likelihood of hospitalisation, affect quality of life (11), increase the use and cost of health care, and raise overall mortality among the general older population (12,13). However, relevant geriatric syndromes such as malnutrition or falls have not been evaluated as potential factors associated with hospital admissions in the studies involving people with dementia (9). Abstract Background: Evidence is lacking on the differences between hospitalisation of people with dementia living in nursing homes and those living in the community. The objectives of this study were: 1) to describe the frequency of hospital admission among people with dementia in eight European countries living in nursing homes or in the community, 2) to examine the factors associated with hospitalisation in each setting, and 3) to evaluate the costs associated with it. Methods: The present study is a secondary data analysis of the RightTimePlaceCare European project. A cross-sectional survey was conducted with data collected from people with dementia living at home or who had been admitted to a nursing home in the last three months, as well as from their caregivers. Data on hospital admissions at three months, cognitive and functional status, neuropsychiatric symptoms, comorbidity, polypharmacy, caregiver burden, nutritional status, and falls were assessed using validated instruments. Multivariate regression models were used to investigate the factors associated with hospital admission for each setting. Costs were estimated by multiplying quantities of resources used with the unit cost of each resource and inflated to the year 2019. Results: The study sample comprised 1,700 people with dementia living in the community and nursing homes. Within three months, 13.8% and 18.5% of people living in nursing homes and home care, respectively, experienced ≥1 hospital admission. In the nursing home setting, only polypharmacy was associated with a higher chance of hospital admission, while in the home care setting, unintentional weight loss, polypharmacy, falls, and more severe caregiver burden were associated with hospital admission. Overall, the estimated average costs per person with dementia/year among participants living in a nursing home were lower than those receiving home care. Conclusion: Admission to hospital is frequent among people with dementia, especially among those living in the community, and seems to impose a remarkable economic burden. The identification and establishment of an individualised care plan for those people with dementia with polypharmacy in nursing homes, and those with involuntary weight loss, accidental falls, polypharmacy and higher caregiver burden in the home care setting, might help preventing unnecessary hospital admissions. Design This study is a secondary analysis of a large European research project called 'RightTimePlaceCare' (RTPC). The RTPC survey was a longitudinal prospective study, conducted in eight European countries (Estonia, Finland, France, Germany, Netherlands, Spain, Sweden, and the United Kingdom). The project aimed to improve health and social care services for European citizens with dementia and focused on the transition from professional home care towards institutional nursing care. Further details are published elsewhere (17). Participants The RTPC survey comprised two groups of participants: 1) People with dementia newly admitted to NH (i.e. within one to three months after admission) and their informal caregivers; 2) People with dementia who received professional home care and were at risk of institutionalization (as judged by a professional responsible for their care) along with their informal caregivers. Informal caregivers could include spouses/partners, other family members, relatives, friends, neighbours or other unpaid individuals within their social network (18). The number of informal caregivers was limited to one main informal caregiver per person with dementia, defined as the person who was most involved in care for the people with dementia. For people living in NH, the next of kin or significant other was included, being the person closest to the person with dementia (spouse, children, grandchildren, other relatives, or friends) and who was most involved in decisions about their care. Inclusion criteria for people with dementia were if they (1) had a primary diagnosis of dementia as diagnosed by an expert (e.g. physician, psychiatrist, neurologist, geriatrician, or general practitioner, depending on countries’ diagnostic procedures) and recorded in the medical records; (2) scored 24 points or lower on the Standardized Mini Mental State Examination (S-MMSE) (19); and (3) had an informal caregiver who visited the people with dementia at least twice a month. People with dementia were excluded when they (1) were younger than 65 years; (2) had a primary psychiatric diagnosis or Korsakoff syndrome; and, for the group recently admitted to NH, (3) were only temporarily resident in the NH (e.g. rehabilitation, respite of the informal caregiver) with the intention of moving back home. Procedures Each country obtained ethical approval from a country specific legal authority for research on human beings (for example an ethical committee specialized in medical or nursing science) to conduct the study in accordance with their national standards and regulations. Country-specific consent procedures were followed. Data were collected by trained interviewers at baseline between November 2010 and April 2012 and follow-up interviews were conducted after 3 months (17). All interviewers were professionals in health or social care or medical/nursing/social care students with practical experience and at least a Bachelor’s degree. Aim The aims of the present study were: 1) to describe the frequency of hospital admissions (including Emergency Department), among people with dementia from eight European countries living in the community and those living in nursing homes; 2) to examine the factors associated with hospital admissions among people with dementia living in the community and those living in nursing homes settings, separately; 3) to evaluate the costs associated with hospital admissions according to the different living situations. Background Furthermore, even if caregivers of people with dementia have a crucial role in the care and resource use in this population, only few studies have analyzed the effects that their psychological wellbeing may have on the decisions of hospital admission of these people (14). (14). Even if the economic cost of dementia has been widely evaluated in recent years (15), only few studies have provided a detailed description of the costs of hospital admission among people with dementia taking their living situations into consideration (16). This information may be Page 2/19 helpful for the planning of the provisions of care. helpful for the planning of the provisions of care. Thus, there is a lack of studies that describe and compare the frequency of hospital admission in both the community and NH settings, investigate and compare the factors associated with hospital admission in both settings, and provide information on its costs. Sample characteristics At baseline, information on the age, sex, country and living situation (i.e. home care (HC) vs nursing home (NH)) of the people with dementia was collected. Cognitive status was assessed with the S-MMSE (range 0-30), with higher scores indicating less cognitive impairment (19). The disease severity was defined as mild (S-MMSE >21), moderate (10-21), or severe (<10) (20)Participants who were unable to perform the S-MMSE due to cognitive or functional impairment were placed into the "severe dementia" group. edical history of past and current clinical conditions were recorded based on the Charlson Comorbidity Index (CCI) (range 0-37), with higher scores indicating more clinical conditions Page 3/19 Page 3/19 and a score >2 indicating moderate comorbidity (21). Independence in activities of daily living (ADL) was measured by the Katz index (range 0-6); we categorised dependency as mild (Katz index 5-6), moderate (2-4), or severe (<2) (22). Behavioural and psychiatric symptoms in dementia were evaluated with the Neuropsychiatric Inventory Questionnaire (NPI-Q). The NPI-Q comprises 12 domains (e.g. agitation and aggression, delusions, hallucinations) with 2 scores reported for each domain: (1) presence of symptoms and (2) severity on a 0-3 scale (0=none, 1=mild, 2=moderate, 3=severe; range 0-36), with higher scores indicating more (severe) symptoms (23). Furthermore, several quality of care indicators based on recent literature (24) were assessed at baseline: nutritional status (one item question ‘did the person experience a weight loss of 4% or more of his/her weight in the past year?’) (25,26), polypharmacy (≥5 drugs) (27) and the occurrence of falls during the preceding three months. Fall was defined as “an unexpected event in which the participant comes to rest on the ground, floor, or lower level” (28). With regard to the informal caregivers, data on their age, sex and relationship with the person with dementia were collected. In addition, caregiver burden was measured using the Zarit Burden Interview (ZBI) (38). Informal caregivers responded to 22 statements relating to the care of their relative with dementia using a Likert scale scoring system which ranged from “Never” to “Nearly Always”. Total scores range from 0–88, with a higher score indicating higher perceived burden; three severity groups were defined: little or no burden (ZBI <21), mild burden (ZBI ≥21-40), or moderate to severe burden (ZBI >40) (29). Information on Emergency Department and Hospital Admissions The Resource Utilization in Dementia (RUD) instrument was used to determine the health care resources used for people with dementia (30). The RUD instrument captures medical care resources use (e.g. medication, inpatient and outpatient care), community care services (e.g. home care, transportation, meals on wheels, day care), special accommodation (e.g. nursing home) and time spent with caring activities by informal caregivers. Information on hospital visits since the baseline interview was gathered using an adapted version of the RUD instrument in the follow-up assessment that included the two concepts Hospital Admission (HA) and Emergency Department Admissions (EDA). In the HC setting, this information was asked to the informal caregivers, while in the NH setting, this information was asked to the formal caregivers, as they were considered best informed proxies. With regard to HA, caregivers were asked: “since the last visit, was the person with dementia admitted to a hospital (for more than 24 hours)?”; “how many times was your relative/the resident hospitalised?”; “for each hospitalisation, please provide the diagnosis or reasons for hospitalisation”; “for each hospitalisation, please specify the total number of nights spent in each type of ward”. The following types of ward were asked about: geriatric ward, surgery ward, internal medicine ward, psychiatry ward and other hospital stays. If the answer “other” was given, the caregiver was asked to specify the type of ward by means of an open question. With regard to EDA, caregivers were asked: “Since the last visit, did the person with dementia receive care in an accident and emergency hospital department (for less than 24 hours)?”; and if yes, “how many times”? Participants with at least one episode of HA or EDA were considered to have experienced a hospital visit. Sample characteristics In the HC setting, information on independence in ADL, behavioural and psychiatric symptoms in dementia and quality of care indicators was asked to the informal caregivers of the people with dementia, while in the NH setting, this information was asked to the formal caregivers, as they were considered best informed proxies. All measurement instruments were selected based on their psychometric properties (validity, reliability), clinical utility and appropriateness for the target settings and population (17). Estimate of cost for Emergency Department and Hospital Admissions While the costs of dementia were previously measured from a societal perspective in the RTPC project (31–33), our study focused on the assessment of direct medical costs generated by EDA and HA and calculated as average costs per capita and year in Euros (€). In the absence of valid and comparable unit costs for all participating countries, a common price vector based mainly on Swedish sources was used for all countries (31,34). For HA, the length of stay in each medical department was taken into account in the measurement. In the case of fees not being available for daily stay in departments other than internal medicine, geriatrics or surgery it was decided to assume a cost per day similar to the daily expense in the department of geriatrics. In addition, we calculated the average costs per capita and year specifically among those people with dementia who had suffered ≥ 1 hospital admission. All costs were inflated to the year 2019 and currency conversion adjustments based on 2019 exchange rates were made for the non-EURO countries. Cost components, unit costs, the international adjustment schemes and their sources are shown in Table 1 (34–36). Insert Table 1 Statistical Analyses Statistical Analyses Page 4/19 The characteristics of people with dementia and their informal caregivers as well as the HA and EDA episodes are described using means and standard deviations (SD) for continuous variables with normal distribution, median, first and third quarter for continuous variables without normal distribution, and percentages for discrete variables. The assessment of the hospitalisation rates was made taking into account the estimated annual emergency department and hospital admissions, respectively, in addition to the total number of people with dementia participating in the study. Univariate analyses were used to evaluate the independent variables (CCI, S-MMSE, Katz Index, NPI-Q scores, ZBI, weight loss, polypharmacy, falls and setting) potentially associated with the occurrence of a Hospital Admission (at least one episode of HA or EDA). Variables were chosen after literature-based team discussion. Mann-Whitney’s U test was used for continuous variables, as the distribution of the variables was not normal and the number of cases was small. Fisher's exact test was preferred when the software was available to calculate it (all categorical variables except country), even though the approximation using the Chi-square test was good because of sufficient sample size in all categories (37). All variables were included in a logistic regression model. Estimate of cost for Emergency Department and Hospital Admissions The different independent variables were tested on multicollinearity in order to identify potential interactions between them. All analyses considered a significance level α of 0.05 (two-sided) and were conducted with IBM SPSS Statistics version 25 (IBM Corporation, Chicago, IL). Emergency Department or Hospital admissions Table 4 describes the frequencies of EDA and HA in both settings as well as, for HA, the frequencies of admission and the average length of stay in days in the different medical departments evaluated. Two-hundred and eighty-four of the people with dementia (16.7%) experienced at least one EDA (<24 hours) or HA between the baseline and follow-up assessments, with a higher frequency in the HC group (NH: 89 (13.8%) vs HC: 195 (18.5%); p=0.011). The majority of the people with dementia living at home and in nursing home who suffered at least one EDA within the 3 months had only one episode of EDA, with a minority of them suffering two or more EDA. A similar situation occurred for HA episodes. We found an overall estimated HA rate per person with dementia/year of 0.44 and EDA rate per person with dementia/year of 0.37. The results obtained displayed an estimated rate of HA per person with dementia/year of 0.35 among persons living in NH and 0.50 among those living in HC, and an estimated rate of EDA per person with dementia/year of 0.26 among persons living in NH and 0.43 among those living in HC. Some differences were found with regard to the types of departments where people with dementia were admitted, depending on their living situations. Some differences were found with regard to the types of departments where people with dementia w situations. Insert Table 4 Sample characteristics The total RTPC sample at baseline comprised 2,014 dyads of people with dementia and their informal caregivers. For the present study, only participants with data available on EDA and HA were included. Thus, the study sample comprised 1,700 people with dementia and their informal caregivers (n=1,054 (62%) from the HC setting and n=646 (38%) from the NH setting). The mean age of the study sample was 82.8 years (standard deviation (SD) 6.5), and 68.5% were women. The characteristics of the study participants (people with dementia and informal caregivers) are summarized in Table 2 and Table 3 (Additional file 1), respectively. Insert table 2 Discussion In this cross-sectional study, 1,700 people with dementia from eight European countries participating in the RTPC study were investigated. The estimated rate of hospital admission per person with dementia/year of 0.35 among people living in NH and 0.50 among those living in HC, and an estimated rate of emergency department admission per person with dementia/year of 0.26 among people living in NH and 0.43 among those living in HC. In the HC setting, factors identified as being associated with a higher probability of suffering at least one EDA or HA were: suffering weight loss, accidental falls, presenting polypharmacy and having a caregiver with mild to severe burden compared with little or no burden. In the NH setting, only polypharmacy was associated with a higher probability of suffering at least one EDA or HA. Concerning health costs, a higher estimated cost per person/year attributable to hospital admission (EDA and HA) was observed for people with dementia included in the HC group as compared to the NH group. With regard to community-dwelling people with dementia, our results of estimated rate of hospitalisation are within the range of hospitalization rates presented by Shepherd et al in their systematic review of the literature (rates of 0.37-1.26 per person/year) (9). When comparing our results on hospitalisation rates among people with dementia living in NH, the few studies existing for this setting report on disparing results, with Maxwell et al (2018) reporting a rate of 0.21 person/year (10), and Feng et al (2014) reporting a rate of 0.46 (38). People with dementia living at their homes had higher rates of EDA or HA than those in the NH setting in the present study. Reasons for this may have been that caregivers of people with dementia who live at home may have had less support in managing health needs or higher levels of care burden (39), leading to a greater need for emergency service utilization and hospital admission. Costs of Emergency Department and Hospital Admissions Table 6 shows the estimated health cost per person with dementia/year according to country and setting (NH vs HC). On average, for the whole study sample, the estimated medical cost per person with dementia/year related to EDA and HA was 1,884.28€, with 1,046.19€ per person with dementia/year in NH group and 2,397.96€ in HC group. Concerning the estimated average expenditure per person with dementia/year for EDA, this was 67.30€ in the NH group and 117.48€ in the HC group. For HA an estimated average cost per person with dementia/year of 978.89€ was obtained in the NH group, and 2,280.48€ in the HC group. On average, for the whole study sample, we found higher expenses per person with dementia/year in both ED and HA visits for people with dementia living in the HC setting compared to those living in the NH setting, except in the Netherlands, where a higher expenditure on hospitalisation of people with dementia living in NH was found, despite the global EDA and HA cost per person with dementia/year being lower than the HC group. A greater estimated cost per person with dementia/year for EDA was also found in the NH group in France and Germany. Insert table 6 Factors associated with Emergency Department and Hospital Admissions Table 5 displays the univariate and multivariate analyses on the factors potentially associated with having at least one EDA or HA for each setting. The multivariate analyses showed that, for people with dementia living in NH, polypharmacy was associated with having at least one EDA or HA (OR 1.96, CI (1.03-3.75)). With regard to the people with dementia living in HC, the factors independently associated with hospital admission were: the presence of falls in the preceding 3 months (OR 1.64, CI (1.12-2.41)), polypharmacy (OR 2.48, CI (1.70-3.62)), weight loss (OR 1.73, CI (1.17-2.56)), mild caregiver burden compared with little or no burden (OR 1.67 CI (1.04-2.66)), and moderate to severe caregiver Page 5/19 Page 5/19 burden compared with little or no burden (OR 1.76, CI (1.04-2.98)). No statistically significant association was found between hospital admission and functional or cognitive status of participants in either NH or HC. burden compared with little or no burden (OR 1.76, CI (1.04-2.98)). No statistically significant association was found between hospital admission and functional or cognitive status of participants in either NH or HC. Insert Table 5 Discussion So far, unintentional weight loss has been found associated with increased morbidity and mortality among older adults (44), but to the best of our knowledge the relationship between unintentional weight loss in people with dementia and the risk of hospitalisation has not been well established (9,45). In previous reports, but in older populations, malnutrition has been associated with an almost fourfold increased risk of readmission or mortality within 7 days of discharge from a hospital, and the risk almost doubled between 8 and 180 days after discharge (46). Conversely, falls are of great concern for people with dementia given their potentially higher number of visits to emergency departments and severe consequences, mainly hip fracture (47). Our results are aligned with those reported by Toot et al on the risk of admission associated with osteoarticular conditions (eg: falls/fractures) in people with dementia living in the community (48). The severity of dementia was not associated with hospital admission, which is consistent with the results presented by Shepherd et al in their meta-analyses, who reported moderate confidence in this finding (9). Conversely, higher comorbidity was not associated with hospital admission in the present study, in contrast with the results by Shepherd et al, who graded their confidence with this result as moderate. However, in their discussion, the authors reported on a study (49) that described an increased risk of hospitalisation only because of the presence of dementia as comorbidity, irrespective of the existence of any further comorbid conditions. Currently, evidence for effective interventions to reduce the risk of falls, to reduce polypharmacy and to improve nutrition is limited and requires further development (50–53). Nevertheless, the results of the present study suggest that the identification and management of these three geriatric syndromes might help preventing hospitalisation events among people with dementia living at home. Furthermore, the promotion of an advanced and individualised care plan among people with dementia showing these geriatric syndromes may be particularly advisable. Mild to severe levels of caregiver burden were associated with hospital admission for people with dementia living in the HC setting in the present study. This result is in the line with the results by Guterman et al (14) and Maust et al (39), which found a significant association between mental health and caregiver distress, respectively, and ED use by people with dementia living in the community. Discussion Other reasons for lower hospital transfer needs in the nursing home setting compared with home care suggested in the literature are that, even if EDA rates from nursing home are high (8), some of these institutions may be equipped with specific care units for people with advanced dementia (40), have a wider availability to perform post-acute attention (41), receive specialized health support from geriatric (42) or end-of-life care more frequently, and they may have policies to prevent transferring those persons to hospital. Sleeman et al. also found in a retrospective cohort study of 4,867 people with dementia in their last year of life in England, that being in a nursing home was associated with a significantly lower number of ED visits (42). The authors argued that increasing bed capacity in NHs may have explained their results, as it may have allowed more people with advanced dementia dying in the NH. Maxwell et al. also reported on lower hospitalisation rates among people with dementia living in NH compared with those living in assisted living facilities, and attributed this difference to the insufficient capacity of assisted living facilities to cover the needs of people with dementia (10). Conversely, another report analyzing the impact of dementia on hospital and ED use among fee-for-service Medicare beneficiaries reported that people with dementia who lived in nursing homes were significantly more likely to visit the emergency department and be hospitalised than those who resided in their own homes (43). In the HC setting, polypharmacy was associated with hospital admission, in the line with the results by Shepherd et al., who found moderate confidence in this association in their meta-analysis (9). In contrast, Shepherd et al. found moderate confidence in the association of lower Page 6/19 Page 6/19 level of functional ability with hospitalisation risk. This association was not found in the present study. Instead, in the present study significant associations were found with a history of falls within the previous three months and with the presence of weight loss. These factors were not evaluated by Shepherd et al in their meta-analyses. Interestingly, the authors suggest in their discussion that it can be difficult to ascertain whether loss of functionality may be connected with other adverse outcomes such as side effects of medication or even malnutrition or weight loss. This might explain the differences between their results and those of the present study. Discussion Future interventions to reduce unnecessary hospitalisations should also focus on providing support to the caregivers of people with dementia living at home. In the NH setting, only polypharmacy was associated with hospital admission among people with dementia in the present study, suggesting that there is a special need to target this geriatric syndrome for this population, in order to reduce unnecessary hospitalisations (54,55). In the present study, it was observed that medical costs associated with hospital admission (including EDA) were higher in the HC setting, results that can be explained by the higher frequency of HA and EDA found among people with dementia living at home. Similar to our results, Coots Daras et al (2017) found that people with dementia in their last year of life living in NH had lower costs derived of EDA and HA than people with dementia living in the community. However, these results were not seen among the general population with dementia, for whom the costs of EDA and HA were higher among those living in NH (16). The authors discuss that expenditures associated with hospital and ED use may vary by residential setting, and proximity to death. Our results suggest that interventions aimed at preventing EDA and HA among people with dementia may be cost-effective, especially in the HC setting, as for most countries the costs associated with EDA and HA were higher in these setting. However, the results should be interpreted with caution, as costs of other interventions that may be put in place when acute events occur such as specialized health support teams or specific care units for advanced dementia have not been taken into consideration. Differences between countries with regard to the implementation of such interventions, as well as potential country differences in the characteristics of the people with dementia living in each of the settings (56) and potential country differences in the way how dementia care is provided (57), may explain the country differences seen in the costs of hospitalisation. Furthermore, these results should be seen within the framework of the overall costs of dementia care. Discussion Interestingly, a previous analysis of the costs of dementia care within the RTPC study showed higher costs for the care provided at NH compared with those provided at HC with the particularity that the costs in the HC setting increased with the severity of dementia (31) Interestingly, a previous analysis of the costs of dementia care within the RTPC study showed higher costs for the care provided at NH compared with those provided at HC, with the particularity that the costs in the HC setting increased with the severity of dementia (31). The findings of our study should be interpreted considering its limitations. Firstly, there might have been a number of people with undiagnosed dementia who were not included in the present study due to its inclusion criteria (formal diagnosis of dementia); these people, Page 7/19 Page 7/19 who may also be admitted to hospital for several reasons with the corresponding costs associated, could not be described in the present study. Secondly, the time period investigated for each participant was limited to three months, which may not represent the entire population of people with dementia requiring hospital admission over the one-year period, taking into account seasonal fluctuations; however, the prospective character of the study may have facilitated the acquisition of reliable data. Furthermore, the RTPC country samples may not be representative of the general national population of people with dementia. Thirdly, although we accounted for multiple variables that may affect the need for hospital admission, there may also be additional unmeasured confounding factors that influence the use of hospital care, for example, specific health support at the community or nursing home setting in each country or even at the local level. Finally, several years have passed between data compilation and secondary analysis. However, we believe that the present study adds relevant value to the body of literature with regard to the comparison of the frequency of hospitalisation between the NH and HC settings among people with dementia, factors associated and costs, in a world where the organization of long-term-care is still a challenge (58). who may also be admitted to hospital for several reasons with the corresponding costs associated, could not be described in the present study. Discussion Secondly, the time period investigated for each participant was limited to three months, which may not represent the entire population of people with dementia requiring hospital admission over the one-year period, taking into account seasonal fluctuations; however, the prospective character of the study may have facilitated the acquisition of reliable data. Furthermore, the RTPC country samples may not be representative of the general national population of people with dementia. Thirdly, although we accounted for multiple variables that may affect the need for hospital admission, there may also be additional unmeasured confounding factors that influence the use of hospital care, for example, specific health support at the community or nursing home setting in each country or even at the local level. Finally, several years have passed between data compilation and secondary analysis. However, we believe that the present study adds relevant value to the body of literature with regard to the comparison of the frequency of hospitalisation between the NH and HC settings among people with dementia, factors associated and costs, in a world where the organization of long-term-care is still a challenge (58). Conclusions To the best of our knowledge, this is the first study that evaluates internationally (across Europe) the frequency of hospitalisation among people with dementia living in nursing homes and home care settings, and analyses the associated factors and costs for each setting. Admission to hospital is frequent among people with dementia, especially among those living in the community, and seems to impose a remarkable economic burden. The identification and establishment of an individualized care plan for those people with dementia with polypharmacy in nursing homes, and those with involuntary weight loss, accidental falls, polypharmacy and higher caregiver burden in the home care setting, might help preventing unnecessary hospital admissions and saving associated costs. Abbreviations Page 8/19 CCI: Charlson Comorbidity Index COI: Cost-of-illness EDA: Emergency Department Admission €: Euros EU: European Union HA: Hospital Admission IEA: International Epidemiological Association KATZ: Katz Index of Independence in Activities in Daily Living NH: Nursing Home NPI-Q: Neuropsychiatric Inventory-Questionnaire OECD: Organisation for Economic Co-operation and Development OR: Odds Ratio PPP: Purchasing Power Parities Q1: Quartile 1 Q2: Quartile 2 RTPC: RightTimePlaceCare RUD: Resource Utilization in Dementia SD: Standard Deviation S-MMSE: Standardized Mini-Mental State Examination CCI: Charlson Comorbidity Index CCI: Charlson Comorbidity Index EU: European Union HA: Hospital Admission HA: Hospital Admission Page 8/19 WHO: World Health Organization ZBI: Zarit Burden Interview WHO: World Health Organization Authors' contributions ARG, FJAA and GM contributed to the conception, design of the work, analysis and interpretation of data of the present study. MC contributed to the analysis of data. AW contributed to the design of the work. ARG, GM, AW, AS, HLK, CL, KS, MSM, CS, HV and AZ contributed to the conception, design of the work, acquisition of data for the RTPC study. FJAA prepared the first draft of the manuscript, supported by ARG. All authors critically reviewed and approved the final manuscript. Funding The RightTimePlaceCare study was supported by a grant from the European Commission within the 7th Framework Program (project 242153). The funder played no role in the design of the study and collection, analysis, and interpretation of data and in writing the manuscript. Consent for publication Not applicable Ethics approval and consent to participate The Good Epidemiological Practice guidelines recommended by the International Epidemiological Association (IEA 2007) and the Helsinki declaration are followed. This study was approved by the Ethical Committee of the Hospital Clinic, Barcelona, Spain (2010/6031); the Ethics Review Committee on Human Research of the University of Tartu (196/T-3) and the Ethical Committee of the Hospital District of South-West Finland (8/2010), Finland; the Comité de Protection des Personnes Sud-Ouest et Outre-Mer, Toulouse, France (09 202 07); the Nursing Science Ethical Committee at the University of Witten/Herdecke, Germany; the Medical Ethical Committee of the Academic Hospital Maastricht/Maastricht University, the Netherlands (MEC 10-5-044); the Regional Ethical Review Board in Lund, Sweden (2010/538); and the National Research Ethics Service, North West 5 Research Ethics Committee, the United Kingdom (11/NW/0003) (Verbeek et al., 2012). Participants were informed of the study purpose, and they were free to participate or withdraw from the study at any time. They were asked to sign the informed consent form. erlands (MEC 10-5-044); the Regional Ethical Review Board in Lund, Sweden (2010/538); and the est 5 Research Ethics Committee, the United Kingdom (11/NW/0003) (Verbeek et al., 2012). Availability of data and materials The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request. The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request. Competing interests Competing interests The authors declare that they have no competing interests. Page 9/19 Maastricht University (NL): Jan P.H. Hamers PhD, RN; Basema Afram MSc, Hanneke C. Beerens PhD, RN; Michel H.C. Bleijlevens, PhD, PT; Hilde Verbeek, PhD; Sandra M.G. Zwakhalen, PhD, RN; Dirk Ruwaard, MD, Ton Ambergen, PhD. Acknowledgements University of Tartu (EE): Kai Saks, MD, PhD, professor; Ene-Margit Tiit, PhD, professor; Jelena Leibur, MD, MBA; Katrin Raamat, MA; Angelika Armolik, MA; Teija Tuula Marjatta Toivari, RN. University of Tartu (EE): Kai Saks, MD, PhD, professor; Ene-Margit Tiit, PhD, professor; Jelena Leibur, MD, MBA; Katrin Raamat, MA; Angelika Armolik, MA; Teija Tuula Marjatta Toivari, RN. Fundació Privada Clinic per la Recerca Biomedica, Hospital Clinic of Barcelona (ES): Adelaida Zabalegui, PhD, RN, FEANS (WP 5 leader); Montserrat Navarro, PhD, RN; Esther Cabrera, PhD, RN (Tecnocampus Mataró); Ester Risco, PhD, RN; Carme Alvira, PhD, RN; Marta Farré, MSc, RN; Susana Miguel, MSc, RN. Gerontôpole, University of Toulouse (FR): Maria Soto, MD; Agathe Milhet; Sandrine Sourdet, MD; Sophie Gillette; Bruno Vellas, PhD. Acknowledgements We thank Robert Schmitz for his previous work analyzing transfer episodes among the participants of the RTPC study. We appreciate the collaboration of Georgina Ramírez Rodríguez, M.D. for her support at the cost estimations shown in the study. Group authorship We thank Robert Schmitz for his previous work analyzing transfer episodes among the participants of the RTPC study. We appreciate the collaboration of Georgina Ramírez Rodríguez, M.D. for her support at the cost estimations shown in the study. The RightTimePlaceCare (RTPC) Consortium partners are as follows: Coordinator The RightTimePlaceCare (RTPC) Consortium partners are as follows: The RightTimePlaceCare (RTPC) Consortium partners are as follows: Coordinator University of Witten/Herdecke (DE): Gabriele Meyer PhD, RN, professor (scientific coordinator, WP 1 leader), Astrid Stephan PhD, RN, Anna Renom-Guiteras PhD, Dirk Sauerland, professor (WP 4 and 6 leader), Dr Ansgar Wübker PhD, Patrick Bremer. University of Witten/Herdecke (DE): Gabriele Meyer PhD, RN, professor (scientific coordinator, WP 1 leader), Astrid Stephan PhD, RN, Anna Renom-Guiteras PhD, Dirk Sauerland, professor (WP 4 and 6 leader), Dr Ansgar Wübker PhD, Patrick Bremer. Consortium members Page 9/19 Maastricht University (NL): Jan P.H. Hamers PhD, RN; Basema Afram MSc, Hanneke C. Beerens PhD, RN; Michel H.C. Bleijlevens, PhD, PT; Hilde Verbeek, PhD; Sandra M.G. Zwakhalen, PhD, RN; Dirk Ruwaard, MD, Ton Ambergen, PhD. Lund University (SE): Ingalill Rahm Hallberg PhD, RN; Ulla Melin Emilsson PhD; Staffan Karlsson, PhD, RN; Christina Bokberg, PhD, RN; Connie Lethin, PhD, RN. Lund University (SE): Ingalill Rahm Hallberg PhD, RN; Ulla Melin Emilsson PhD; Staffan Karlsson, PhD, RN; Christina Bokberg, PhD, RN; Connie Lethin, PhD, RN. University of Manchester (UK): David Challis, PhD, professor; Caroline Sutcliffe, MSc; David Jolley, PhD; Sue Tucker, MSc, RN; Ian Bowns, PhD; Brenda Roe, PhD; Alistair Burns, PhD, professor. University of Manchester (UK): David Challis, PhD, professor; Caroline Sutcliffe, MSc; David Jolley, PhD; Sue Tucker, MSc, RN; Ian Bowns, PhD; Brenda Roe, PhD; Alistair Burns, PhD, professor. University of Turku (FI): Helena Leino-Kilpi, PhD, RN, professor; Jaana Koskenniemi, MNSc, RN, researcher; Riitta Suhonen, PhD, RN, professor; Matti Viitanen, MD, PhD, professor; Seija Arve, PhD, RN, adjunct professor; Minna Stolt, MNSc; Maija Hupli, PhD, RN. University of Turku (FI): Helena Leino-Kilpi, PhD, RN, professor; Jaana Koskenniemi, MNSc, RN, researcher; Riitta Suhonen, PhD, RN, professor; Matti Viitanen, MD, PhD, professor; Seija Arve, PhD, RN, adjunct professor; Minna Stolt, MNSc; Maija Hupli, PhD, RN. Affiliations University of Manchester, Manchester, UK Department of Health Services Research, Care and Public Health Research Institute, Maastricht University, Maastricht, the Netherlands Hilde Verbeek Living Lab in Ageing and Long-Term Care, Maastricht, The Netherlands Hilde Verbeek Hospital Clinic de Barcelona, Barcelona, Spain Geriatric Department. Parc de Salut Mar. Barcelona, Spain. Geriatric Department. Parc de Salut Mar. Barcelona, Spain. Anna Renom-Guiteras Anna Renom-Guiteras References 1. Nichols E, Szoeke CEI, Vollset SE, Abbasi N, Abd-Allah F, Abdela J, et al. Global, regional, and national burden of Alzheimer’s disease and other dementias, 1990–2016: a systematic analysis for the Global Burden of Disease Study 2016. Lancet Neurol. 2019;18(1):88–106. 1. Nichols E, Szoeke CEI, Vollset SE, Abbasi N, Abd-Allah F, Abdela J, et al. Global, regional, and national burden of Alzheimer’s disease and other dementias, 1990–2016: a systematic analysis for the Global Burden of Disease Study 2016. Lancet Neurol. 2019;18(1):88–106. 1. Nichols E, Szoeke CEI, Vollset SE, Abbasi N, Abd-Allah F, Abdela J, et al. Global, regional, and national burden of Alzheimer’s disease and other dementias, 1990–2016: a systematic analysis for the Global Burden of Disease Study 2016. Lancet Neurol. 2019;18(1):88–106. 2. Caron CD, Ducharme F, Griffith J. Deciding on Institutionalization for a Relative with Dementia: The Most Difficult Decision for Caregivers. Can J Aging. 2006;25(2):193–205. 2. Caron CD, Ducharme F, Griffith J. Deciding on Institutionalization for a Relative with Dementia: The Most Difficult Decision for Caregivers Can J Aging. 2006;25(2):193–205. 2. Caron CD, Ducharme F, Griffith J. Deciding on Institutionalization for a Relative with Dementia: The Most Difficult Decision for Caregivers. Can J Aging. 2006;25(2):193–205. 3. Whittamore KH, Goldberg SE, Gladman JRF, Bradshaw LE, Jones RG, Harwood RH. The diagnosis, prevalence and outcome of delirium in a cohort of older people with mental health problems on general hospital wards. Int J Geriatr Psychiatry. 2014;29(1):32–40. 3. Whittamore KH, Goldberg SE, Gladman JRF, Bradshaw LE, Jones RG, Harwood RH. The diagnosis, prevalence and outcome of delirium in a cohort of older people with mental health problems on general hospital wards. Int J Geriatr Psychiatry. 2014;29(1):32–40. 4. Hartley P, Gibbins N, Saunders A, Alexander K, Conroy E, Dixon R, et al. The association between cognitive impairment and functional outcome in hospitalised older patients: A systematic review and meta-analysis. Age Ageing. 2017;46(4):559–67. 4. Hartley P, Gibbins N, Saunders A, Alexander K, Conroy E, Dixon R, et al. The association between cognitive impairment and functional outcome in hospitalised older patients: A systematic review and meta-analysis. Age Ageing. 2017;46(4):559–67. 5. Cameron ID, Dyer SM, Panagoda CE, Murray GR, Hill KD, Cumming RG, et al. Interventions for preventing falls in older people in care facilities and hospitals. Cochrane Database Syst Rev. 2018 Sep 7;(9). 5. Cameron ID, Dyer SM, Panagoda CE, Murray GR, Hill KD, Cumming RG, et al. Affiliations Page 10/19 Affiliations Geriatric and Palliative Care Department. Badalona Serveis Assistencials. Barcelona, Spain. F. Javier Afonso-Argilés Universitat Autònoma de Barcelona, Barcelona, Spain F. Javier Afonso-Argilés & Anna Renom-Guiteras Department of Nursing Science. Witten/Herdecke University, Witten, Germany Gabriele Meyer & Astrid Stephan Institute of Health and Nursing Sciences, Martin Luther University Halle-Wittenberg, Medical Faculty, Halle (Saale), Germa Gabriele Meyer & Astrid Stephan Department of Epidemiology and Evaluation. Hospital del Mar, Parc de Salut Mar. Barcelona, Spain. Mercè Comas Serrano Member of the Health Services Research on Chronic Patients Network (REDISSEC), Spain. Mercè Comas Serrano & Anna Renom-Guiteras RWI – Leibniz-Institute for Economic Research, Leibniz Science Campus Ruhr and RUB, Essen, Germany Ansgar Wübker Department of Nursing Science and Nurse Director, University of Turku, Turku University Hospital, Turku, Finland Helena Leino-Kilpi Department of Health Sciences. Faculty of Medicine. Lund University. SE-221 00 Lund. Sweden Connie Lethin Clinical Memory Research Unit. Department of Clinical Sciences. Lund University. SE-221 00 Lund. Sweden Connie Lethin Department of Internal Medicine, University of Tartu, Tartu, Estonia Page 10/19 Geriatric and Palliative Care Department. Badalona Serveis Assistencials. Barcelona, Spain. F. Javier Afonso-Argilés Universitat Autònoma de Barcelona, Barcelona, Spain F. Javier Afonso-Argilés & Anna Renom-Guiteras Department of Nursing Science. Witten/Herdecke University, Witten, Germany Gabriele Meyer & Astrid Stephan Institute of Health and Nursing Sciences, Martin Luther University Halle-Wittenberg, Medical Faculty, Halle (Saale), Germany. Gabriele Meyer & Astrid Stephan Department of Epidemiology and Evaluation. Hospital del Mar, Parc de Salut Mar. Barcelona, Spain. Mercè Comas Serrano Member of the Health Services Research on Chronic Patients Network (REDISSEC), Spain. Mercè Comas Serrano & Anna Renom-Guiteras RWI – Leibniz-Institute for Economic Research, Leibniz Science Campus Ruhr and RUB, Essen, Germany Ansgar Wübker Department of Nursing Science and Nurse Director, University of Turku, Turku University Hospital, Turku, Finland Helena Leino-Kilpi Department of Health Sciences. Faculty of Medicine. Lund University. SE-221 00 Lund. Sweden Connie Lethin Clinical Memory Research Unit. Department of Clinical Sciences. Lund University. SE-221 00 Lund. Sweden Connie Lethin Department of Internal Medicine, University of Tartu, Tartu, Estonia Department of Internal Medicine, University of Tartu, Tartu, Estonia Page 10/19 Page 10/19 Kai Saks Department of Geriatric Medicine, Gerontopole, Alzheimer Disease Research Center, Inserm UMR 1027, University Hospital of Toulouse, France Maria Soto-Martin School of Health Sciences. University of Manchester, Manchester, UK Caroline Sutcliffe School of Health Sciences. References Association between Caregiver Depression and Emergency Department Use among Patients with Dementia. JAMA Neurol. 2019;76(10):1166–73. 15. Cantarero-Prieto D, Leon PL, Blazquez-Fernandez C, Juan PS, Cobo CS. The economic cost of dementia: A systematic review. Dementia. 2019;1471301219. 16. Daras LC, Feng Z, Wiener JM, Kaganova Y. Medicare expenditures associated with hospital and emergency department use among beneficiaries with dementia. Inq (United States). 2017;54:1–9. 17. Verbeek H, Meyer G, Leino-Kilpi H, Zabalegui A, Hallberg IR, Saks K, et al. A European study investigating patterns of transition from home care towards institutional dementia care: The protocol of a RightTimePlaceCare study. BMC Public Health. 2012;12(1):68. Long-term Care for Older People. OECD; 2005. (The OECD Health Project). 18. Long-term Care for Older People. OECD; 2005. (The OECD Health Project). 9. Molloy DW, Alemayehu E, Roberts R. Reliability of a standardized mini-mental state examination co mental state examination. Am J Psychiatry. 1991 Jan 1;148(1):102–5. 19. Molloy DW, Alemayehu E, Roberts R. Reliability of a standardized mini-mental state examination compared with the traditional mini- mental state examination. Am J Psychiatry. 1991 Jan 1;148(1):102–5. 20. Molloy DW, Standish TIM. A Guide to the Standardized Mini-Mental State Examination. Int Psychogeriatrics. 1997 Dec 10;9(S1):87–94. 20. Molloy DW, Standish TIM. A Guide to the Standardized Mini-Mental State Examination. Int Psychog 21. Charlson ME, Pompei P, Ales KL, MacKenzie CR. A new method of classifying prognostic comorbidity in longitudinal studies: development and validation. J Chronic Dis. 1987;40(5):373–83. 22. Katz S, Ford AB, Moskowitz RW, Jackson BA, Jaffe MW. The Index of ADL: A Standardized Measure of Biological and Psychosocial Function. J Am Med Assoc. 1963;185(12):914–9. 23. Kaufer DI, Cummings JL, Ketchel P, Smith V, MacMillan A, Shelley T, et al. Validation of the NPI-Q, a Brief Clinical Form of the Neuropsychiatric Inventory. J Neuropsychiatry Clin Neurosci. 2000;12(2):233–9. 24. Du Moulin MFMT, van Haastregt JCM, Hamers JPH. Monitoring quality of care in nursing homes and making information available for the general public: State of the art. Patient Educ Couns. 2010 Mar 1;78(3):288–96. 25. McMinn J, Steel C, Bowman A. Investigation and management of unintentional weight loss in olde 26. Jensen GL, Cederholm T, Correia MITD, Gonzalez MC, Fukushima R, Higashiguchi T, et al. GLIM Criteria for the Diagnosis of Malnutrition: A Consensus Report From the Global Clinical Nutrition Community. J Parenter Enter Nutr. 2019;43(1):32–40. 27. Masnoon N, Shakib S, Kalisch-Ellett L, Caughey GE. What is polypharmacy? A systematic review of definitions. BMC Geriatr. References Interventions for preventing falls in older people in care facilities and hospitals. Cochrane Database Syst Rev. 2018 Sep 7;(9). 6. Bail K, Berry H, Grealish L, Draper B, Karmel R, Gibson D, et al. Potentially preventable complications of urinary tract infections, pressure areas, pneumonia, and delirium in hospitalised dementia patients: Retrospective cohort study. BMJ Open. 2013;3(6). 6. Bail K, Berry H, Grealish L, Draper B, Karmel R, Gibson D, et al. Potentially preventable complications of urinary tract infections, pressure areas, pneumonia, and delirium in hospitalised dementia patients: Retrospective cohort study. BMJ Open. 2013;3(6). 7. Dwyer R, Gabbe B, Stoelwinder JU, Lowthian J. A systematic review of outcomes following emergency transfer to hospital for residents of aged care facilities. Age Ageing. 2014;43(6):759–66. 8. Graverholt B, Riise T, Jamtvedt G, Ranhoff AH, Krüger K, Nortvedt MW. Acute hospital admissions among nursing home residents: A population-based observational study. BMC Health Serv Res. 2011;11(1):126. 9. Shepherd H, Livingston G, Chan J, Sommerlad A. Hospitalisation rates and predictors in people with dementia: A systematic review and meta-analysis. BMC Med. 2019 Jul 15;17(1). 9. Shepherd H, Livingston G, Chan J, Sommerlad A. Hospitalisation rates and predictors in people with dementia: A systematic review and meta-analysis. BMC Med. 2019 Jul 15;17(1). 10. Maxwell CJ, Amuah JE, Hogan DB, Cepoiu-Martin M, Gruneir A, Patten SB, et al. Elevated Hospitalization Risk of Assisted Living Residents With Dementia in Alberta, Canada. J Am Med Dir Assoc. 2015;16(7):568–77. 10. Maxwell CJ, Amuah JE, Hogan DB, Cepoiu-Martin M, Gruneir A, Patten SB, et al. Elevated Hospitalization Risk of Assisted Living Residents With Dementia in Alberta, Canada. J Am Med Dir Assoc. 2015;16(7):568–77. 11. Yang Y, Lin M, Wang C, Lu F, Wu J, Cheng H, et al. Geriatric syndromes and quality of life in older adults with diabetes. Geriatr Gerontol Int. 2019;19(6):518–24. 11. Yang Y, Lin M, Wang C, Lu F, Wu J, Cheng H, et al. Geriatric syndromes and quality of life in older adults with diabetes. Geriatr Gerontol Int. 2019;19(6):518–24. 12. Kane RL, Shamliyan T, Talley K, Pacala J. The Association Between Geriatric Syndromes and Survival. J Am Geriatr Soc. 2012;60(5):896–904. Page 11/19 13. Lu F-P, Chang W-C, Wu S-C. Geriatric conditions, rather than multimorbidity, as predictors of disability and mortality among octogenarians: A population-based cohort study. Geriatr Gerontol Int. 2016;16(3):345–51. 14. Guterman EL, Allen IE, Josephson SA, Merrilees JJ, Dulaney S, Chiong W, et al. References 2017;17(1):230. 28. Lamb SE, Jørstad-Stein EC, Hauer K, Becker C. Development of a common outcome data set for fall injury prevention trials: The Prevention of Falls Network Europe consensus. J Am Geriatr Soc. 2005;53(9):1618–22. 29. Hebert R, Bravo G, Préville M. Reliability, Validity and Reference Values of the Zarit Burden Interview for Assessing Informal Caregivers of Community-Dwelling Older Persons with Dementia. Can J Aging. 2000;19(4):494–507. 30. Wimo A, Gustavsson A, Jonsson L, Winblad B, Hsu MA, Gannon B. Application of resource utilization in dementia (RUD) instrument in a global setting. Alzheimer’s Dement. 2013 Jul 1;9(4):429-435.e17. 31. Wübker A, Zwakhalen SMG, Challis D, Suhonen R, Karlsson S, Zabalegui A, et al. Costs of care for people with dementia just before and after nursing home placement: primary data from eight European countries. Eur J Heal Econ. 2015;16(7):689–707. 32. Costa N, Wübker A, De Mauléon A, Zwakhalen SMG, Challis D, Leino-Kilpi H, et al. Costs of Care of Agitation Associated With Dementia in 8 European Countries: Results From the RightTimePlaceCare Study. J Am Med Dir Assoc. 2018;19(1):95.e1-95.e10. 32. Costa N, Wübker A, De Mauléon A, Zwakhalen SMG, Challis D, Leino-Kilpi H, et al. Costs of Care of Agitation Associated With Dementia in 8 European Countries: Results From the RightTimePlaceCare Study. J Am Med Dir Assoc. 2018;19(1):95.e1-95.e10. 33. Farré M, Haro JM, Kostov B, Alvira C, Risco E, Miguel S, et al. Direct and indirect costs and resource use in dementia care: A cross- sectional study in patients living at home. Int J Nurs Stud. 2016 Mar 1;55:39–49. 33. Farré M, Haro JM, Kostov B, Alvira C, Risco E, Miguel S, et al. Direct and indirect costs and resource use in dementia care: A cross- sectional study in patients living at home. Int J Nurs Stud. 2016 Mar 1;55:39–49. 34. Jönsson L, Jönhagen ME, Kilander L, Soininen H, Hallikainen M, Waldemar G, et al. Determinants of costs of care for patients with Alzheimer’s disease. Int J Geriatr Psychiatry. 2006 May 1;21(5):449–59. 34. Jönsson L, Jönhagen ME, Kilander L, Soininen H, Hallikainen M, Waldemar G, et al. Determinants of costs of care for patients with Alzheimer’s disease. Int J Geriatr Psychiatry. 2006 May 1;21(5):449–59. 35. Organisation for Economic Co-operation and Development. OECD [Internet]. 2019 [cited 2019 Jul 9]. Available from: https://stats.oecd.org/Index.aspx?DataSetCode=PPPGDP 35. Organisation for Economic Co-operation and Development. OECD [Internet]. 2019 [cited 2019 Jul 9]. Available from: https://stats.oecd.org/Index.aspx?DataSetCode=PPPGDP 36. References OECD iLibrary | PPPs and exchange rates [Internet]. [cited 2020 Aug 17]. Available from: https://www.oecd- ilibrary.org/economics/data/aggregate-national-accounts/ppps-and-exchange-rates_data-00004-en 36. OECD iLibrary | PPPs and exchange rates [Internet]. [cited 2020 Aug 17]. Available from: https://www.oecd- ilib / i /d t / t ti l t / d h t d t 00004 36. OECD iLibrary | PPPs and exchange rates [Internet]. [cited 2020 Aug 17]. Available from: https://www.oecd- ilibrary.org/economics/data/aggregate-national-accounts/ppps-and-exchange-rates_data-00004-en 37. Agresti A. A survey of exact inference for contingency tables. Stat Sci. 1992;7(1):131–53. 37. Agresti A. A survey of exact inference for contingency tables. Stat Sci. 1992;7(1):131–53. 37. Agresti A. A survey of exact inference for contingency tables. Stat Sci. 1992;7(1):131–53. 38. Feng Z, Coots LA, Kaganova Y, Wiener JM. Hospital And ED Use Among Medicare Beneficiaries With Dementia Varies By Setting And Proximity To Death. Health Aff. 2014;33(4):683–90. 38. Feng Z, Coots LA, Kaganova Y, Wiener JM. Hospital And ED Use Among Medicare Beneficiaries With Dementia Varies By Setting And Proximity To Death. Health Aff. 2014;33(4):683–90. Page 12/19 39. Maust DT, Kales HC, McCammon RJ, Blow FC, Leggett A, Langa KM. Distress Associated with Dementia-Related Psychosis and Agitation in Relation to Healthcare Utilization and Costs. Am J Geriatr Psychiatry. 2017 Oct;25(10):1074–82. 40. Cadigan RO, Grabowski DC, Givens JL, Mitchell SL. The quality of advanced dementia care in the nursing home: the role of special care units. Med Care. 2012 Oct;50(10):856–62. 41. Tyler DA, Feng Z, Leland NE, Gozalo P, Intrator O, Mor V. Trends in postacute care and staffing in US nursing homes, 2001-2010. J Am Med Dir Assoc. 2013 Nov;14(11):817–20. 42. Sleeman KE, Perera G, Stewart R, Higginson IJ. Predictors of emergency department attendance by people with dementia in their last year of life: Retrospective cohort study using linked clinical and administrative data. Alzheimer’s Dement. 2018 Jan 1;14(1):20–7. 43. Feng Z, Coots LA, Kaganova Y, Wiener JM. Hospital and ED use among medicare beneficiaries with dementia varies by setting and proximity to death. Health Aff. 2014;33(4):683–90. 44. Wirth R, Streicher M, Smoliner C, Kolb C, Hiesmayr M, Thiem U, et al. The impact of weight loss and low BMI on mortality of nursing home residents - Results from the nutritionDay in nursing homes. Clin Nutr. 2016;35(4):900–6. 45. Voisin T, Andrieu S, Cantet C, Vellas B. Predictive factors of hospitalizations in Alzheimer’s disease: A two-year prospective study in 686 patients of the REAL.FR study. J Nutr Heal Aging. 2010;14(4):288–91. 46. References Medication Use Among Nursing Home Residents With Severe Dementia: Identifying Categories of Appropriateness and Elements of a Successful Intervention. Vol. 16, J Am Med Dir Assoc. 2015. p. 629.e1-17. 56. Giebel CM, Sutcliffe C, Renom-Guiteras A, Arve S, Hallberg IR, Soto M, et al. Depressive symptomatology in severe dementia in a European sample: Prevalence, associated factors and prescription rate of antidepressants. Int Psychogeriatrics. 2015;27(4):657–67. 57. Alzheimer Europe. Dementia in Europe Yearbook 2018. Comparison of National Dementia Strategies in Europe [Internet]. 2018. 1–56 p. Available from: https://www.alzheimer-europe.org/Policy/Country-comparisons/2018-Comparsion-of-National-Dementia-Strategies 58. Spasova S, Baeten R, Coster S, Ghailani D, Peña-Casas R, Bart V. Challenges in long-term care in Europe - A study of national policies 2018 - Employment, Social Affairs & Inclusion - European Commission [Internet]. 2018. p. 1–66. Available from: https://ec.europa.eu/social/main.jsp?catId=89&furtherNews=yes&newsId=9185&langId=en References Sharma Y, Miller M, Kaambwa B, Shahi R, Hakendorf P, Horwood C, et al. Malnutrition and its association with readmission and death within 7 days and 8-180 days postdischarge in older patients: A prospective observational study. BMJ Open. 2017;7(11):e018443. doi: 10.1136/bmjopen-2017-018443 47. Allan LM, Ballard CG, Rowan EN, Kenny RA. Incidence and prediction of falls in dementia: A prospective study in older people. PLoS One. 2009;4(5):e5521. 48. Toot S, Devine M, Akporobaro A, Orrell M. Causes of Hospital Admission for People With Dementia: A Systematic Review and Meta- Analysis. Vol. 14, J Am Med Dir Assoc. 2013. p. 463–70. 49. Bynum JPW, Rabins P V., Weller W, Niefeld M, Anderson GF, Wu AW. The relationship between a dementia diagnosis, chronic illness, medicare expenditures, and hospital use. J Am Geriatr Soc. 2004;52(2):187–94. 50. Shafiee Hanjani L, Long D, Peel NM, Peeters G, Freeman CR, Hubbard RE. Interventions to Optimise Prescribing in Older People with Dementia: A Systematic Review. Vol. 36, Drugs and Aging. Springer International Publishing; 2019. p. 247–67. 50. Shafiee Hanjani L, Long D, Peel NM, Peeters G, Freeman CR, Hubbard RE. Interventions to Optimise Dementia: A Systematic Review. Vol. 36, Drugs and Aging. Springer International Publishing; 2019. 51. Rankin A, Cadogan CA, Patterson SM, Kerse N, Cardwell CR, Bradley MC, et al. Interventions to improve the appropriate use of polypharmacy for older people Vol 2018 Cochrane Database of Systematic Reviews John Wiley and Sons Ltd; 2018 51. Rankin A, Cadogan CA, Patterson SM, Kerse N, Cardwell CR, Bradley MC, et al. Interventions to improve the appropriate use of polypharmacy for older people. Vol. 2018, Cochrane Database of Systematic Reviews. John Wiley and Sons Ltd; 2018. 52. Booth V, Logan P, Harwood R, Hood V. Falls prevention interventions in older adults with cognitive impairment: A systematic review of reviews. Int J Ther Rehabil. 2015;22(6):289–96. 53. Abdelhamid A, Bunn D, Copley M, Cowap V, Dickinson A, Gray L, et al. Effectiveness of interventions to directly support food and drink intake in people with dementia: Systematic review and meta-analysis. BMC Geriatr. 2016 Jan 22;16(1):26. 54. Alldred D, Kennedy M, Hughes C, Chen T, Miller P. Interventions to optimise prescribing for older people in care homes ( Review ). Cochrane Database Syst Rev. 2016;(2):68. 55. Kröger E, Wilchesky M, Marcotte M, Voyer P, Morin M, Champoux N, et al. Tables Table 1. Unit costs and international price adjustments (inflated to the year 2019*) Page 13/19 Page 13/19 Estonia Finland France Germany Netherlands Spain Sweden UK International price adjustment                 Exchange  rates; local currency / Euro 1.00 1.00 1.00 1.00 1.00 1.00 10.59 0.87 Medical Care (Inpatient care)                 Costs** per day hospital (geriatric) 92,14 318,60 313,82 293,41 280,82 162,22 335,25 256,98 Costs per day hospital (internal medicine) 101,27 350,18 344,92 322,50 308,64 179,13 368,50 282,45 Costs per day hospital (surgery) 148,87 514,74 507,01 474,05 453,69 263,31 541,63 415,19 Costs Emergency room visit 63,06 218,14 214,86 200,89 192,27 111,59 229,54 175,94 * Last available official statistics by the Organisation for Economic Co-operation and Development (OECD). Prices, purchasing power parities (PPP) and Exchange rates (36) **Costs are expressed in Euros Table 2. Baseline characteristics of the people with dementia, by setting Page 14/19 Variables Nursing Home (n=646) Home Care (n=1,054) Overall (n=1,700) Age (years), mean (SD) 83.8 (6.5) 82.1 (6.5) 82.8 (6.5) Women, n (%) 486 (75.2%) 679 (64.4%) 1,165 (68.5%) S- MMSE (range 0-30)*,**, median (Q1;Q3) 13 (8;17) 15 (10;20) 14 (9;19) Missing values 128 130 258 Katz Index (range 0-6)*, median  (Q1;Q3) 2 (1;4) 3 (2;5) 3 (1;5) Missing values 2 11 13 Charlson Comorbidity Index (range 0-37)*, median (Q1;Q3) 2 (1;3) 2 (1;3) 2 (1;3) Severity of neuropsychiatric symptoms (range 0-36)*, median (Q1;Q3) 5.5 (3;10) 8 (4;13) 7 (3;12) Zarit Burden Interview (range 0-88)*, median (Q1;Q3) 21 (13;33) 31 (20.9;43) 27 (17;39.2) Missing values 3 3 6 Weight loss (≥4%, yes), n (%) 81 (13.0%) 211 (20.6%) 292 (17.7%) Missing values 25 28 53 Polypharmacy (≥5 drugs, yes), n (%) 440 (68.1%) 604 (57.3%) 1,044 (61.4%) Mean number of drugs (SD) 6.0 (3.1) [6] 5.3 (3.1) [5] 5.5 (3.1) [5] Falls in preceding 3 months (baseline) 172 (26.7%) 215 (20.4%) 387 (22.8%) Missing values 3 1 4 Country, n (%)       United Kingdom 55 (8.5%) 60 (5.7%) 115 (6.8%) Estonia 80 (12.4%) 145 (13.8%) 225 (13.2%) Finland 111 (17.2%) 157 (14.9%) 268 (15.8%) France 35 (5.4%) 151 (14.3%) 186 (10.9%) Germany 99 (15.3%) 91 (8.6%) 190 (11.2%) Netherlands 104 (16.1%) 165 (15.7%) 269 (15.8%) Spain 85 (13.2%) 155 (14.7%) 240 (14.1%) Sweden 77 (11.9%) 130 (12.3%) 207 (12.2%) * Underlined scores indicate the direction of a better outcome **Only participants with scores of lower than 24 points were included SD: Standard Deviation. Q1: First quartile. Q3: Third quartile. Tables Missing values declared when present chnical limitations, Table 3 is only availble as a download in the Supplemental Files section. Page 15/19 Page 15/19 Page 15/19 Nursing Home (n=646) Home Care (n=1,054) Overall (n=1,700) p_value**** PwD* with at least 1 EDA or 1 HA**, n (%) 89 (13.8%) 195 (18.5%) 284 (16.7%) 0.011 PwD with at least 1 EDA (with <24 hours stay), n (%) 48 (7.4%) 123 (11.7%) 171 (10.1%) 0.005 PwD with valid number of EDA*** 43 115 158   PwD with 1 admission, n (%) 33 (76.7%) 81 (70.4%) 114 (72.2%)   PwD with 2 or more admissions, n (%) 10 (23.3%) 34 (29.6%) 44 (27.8%)   Rate of EDA per PwD/year 0.26 0.43 0.37   PwD with at least 1 HA (with >24 hours stay), n (%) 58 (9.0%) 135 (12.8%) 193 (11.4%) 0.018 PwD with valid number of HA*** 57 133 190   PwD with 1 admission, n (%) 50 (87.7%) 103 (77.4%) 153 (80.5%)   PwD with 2 or more admissions, n (%) 7 (12.3%) 30 (22.6%) 37 (19.5%)   Rate of HA per PwD/year 0.35 0.50 0.44   Department of HA, n (%)         Geriatric 5 (10%) 49 (35%) 54 (28%)   Internal Medicine 15 (31%) 41 (29%) 56 (29%)   Surgical 20 (41%) 20 (14%) 40 (21%)   Other 11 (22%) 30 (21%) 41 (22%)   Length of stay during HA admission in days, median (Q1;Q3)         Geriatric 8 (5;16) 8 (6;11) 7.5 (6;11)   Internal Medicine 11 (4;15) 8 (6;17) 7.5 (5;17)   Surgical 6.5 (3;17) 8.5 (4;11) 7 (3;15)   Other 3 (2;6) 9 (6;18) 7 (4;14)   Note: Q1: first quartile; Q3: third quartile *: PwD: People with Dementia; **: A PwD may have suffered both EDA and HA episodes; ***: Data on the number of EDA or HA available only for these participants. ****: p values provided only for the main descriptive variables on EDA and HA. Table 5. Univariate and multivariate analysis on the factors potentially associated with having at least one EDA or HA, by setting. Table 5. Univariate and multivariate analysis on the factors potentially associated with having at least one EDA or HA, by setting. Tables Page 16/19 Nursing Home (n=646) Home Care (n=1,054)   PwD with at least one EDA or HA (n=89; 13.8%) PwD without EDA or HA (n=557; 86.2%) p_value Unadjusted OR [95%CI] Adjusted OR [95%CI] PwD with at least one EDA or HA (N=195; 18.5%) PwD without EDA or HA (n=859; 81.5%) p_value Unadjusted OR [95%CI] Adjusted OR [95%CI] Age (years) n (%)     0.120         0.562     65-80 years 17 (19.1%) 151 (27.1%)   Reference Reference 65 (33.3%) 307 (35.7%)   Reference Reference ≥81 years 72 (80.9%) 406 (72.9%)   1.58 (0.90- 2.76) 1.94 (0.98- 3.85) 130 (66.7%) 552 (64.3%)   1.11 (0.80- 1.55) 1.12 (0.78- 1.61) Sex, n (%)     0.085         0.282     Female 60 (67.4%) 426 (76.5%)   Reference Reference 119 (61.0%) 560 (65.2%)   Reference Reference Male 29 (32.6%) 131 (23.5%)   1.57 (0.97- 2.55) 1.55 (0.88- 2.75) 76 (39.0%) 299 (34.8%)   1.20 (0.87- 1.65) 1.06 (0.74- 1.52) S-MMSE score, n (%),**     0,954         0,175     Mild dementia 8 (12.5%) 58 (12.8%)   Reference Reference 42 (24.6%) 198 (26.3%)   Reference Reference Moderate dementia 37 (57.8%) 242 (53.3%)   1.11 (0.49- 2.51) 1.00 (0.42- 2.38) 81 (47.4%) 396 (52.6%)   0,96 (0,64- 1,45) 0.93 (0.60- 1.45) Severe dementia 19 (29.7%) 154 (33.9%)   0.89 (0.37- 2.16) 1.13 (0.46- 2.78) 48 (28.1%) 159 (21.1%)   1.42 (0.90- 2.26) 1.3 (0.78- 2.17) Weight loss, n (%)     0.724         0.002     No 80 (89.0%) 485 (86.6%)   Reference Reference 140 (70.9%) 703 (81.4%)   Reference Reference Yes 9 (11.0%) 72 (13.4%)   0.80 (0.38- 1.67) 0.72 (0.32- 1.62) 55 (29.1%) 156 (18.6%)   1.79 (1.25- 2.57) 1.73 (1.17- 2.56) Polypharmacy, n (%)     0.049         <0.001     No 20 (22.5%) 186 (33.4%)   Reference Reference 51 (26.2%) 399 (46.4%)   Reference Reference Yes 69 (77.5%) 371 (66.6%)   1.73 (1.02- 2.93) 1.96 (1.03- 3.75) 144 (73.8%) 460 (53.6%)   2.45 (1.73- 3.46) 2.48 (1.70- 3.62) Falls in preceding 3 months n (%)     0.009         0.001     No 55 (61.4%) 419 (75.1%)   Reference Reference 137 (70.1%) 702 (81.7%)   Reference Reference Yes 34 (38.6%) 138 (24.9%)   1.90 (1.19- 3.05) 1.66 (0.96- 2.86) 58 (29.9%) 157 (18.3%)   1.91 (1.34- 2.71) 1.64 (1.12- 2.41) ≤2 55 (61.8%) 349 (62.7%)   Reference Reference 131 (67.2%) 632 (73.6%)   Reference Reference >2 34 (38.2%) 208 (37.3%)   1.04 (0.65- 1,64) 1.04 (0.61- 1.77) 64 (32.8%) 227 (26.4%)   1.36 (0.97- 1.90) 1.13 (0.78- 1.64) Katz Index, n (%)     0.221         0.029     Severe 60 (67.4%) 327 (58.9%)   2.94 (0.69- 12.58) 2.00 (0.44- 9.04) 84 (43.3%) 281 (33.1%)   1.60 (1.01- 2.54) 1.24 (0.72- 2.15) Moderate 27 (30.3%) 196 (35.3%)   2.20 (0.50- 9.72) 1.96 (0.43- 8.97) 80 (41.2%) 407 (47.9%)   1.06 (0.67- 1.67) 0.95 (0.57- 1.58) Mild 2 (2.2%) 32 (5.8%)   Reference Reference 30 (15.5%) 161 (19.0%)   Reference Reference NPI-Q Severity, mean (SD) 7.7 (6.0) 6.8 (5.7) 0.174 1.03 (1.00- 1.07) 1.02 (0.97- 1.07) 9.9 (6.1) 9.0 (6.2) 0.069 1.02 (1.00- 1.05) 0.99 (0.96- 1.02) Zarit Burden Index n (%)     0.511         0.018     Little or no burden 47 (53.4%) 264 (47.6%)   Reference Reference 37 (19.0%) 227 (26.5%)   Reference Reference Mild burden 28 (31.8%) 211 (38.0%)   0.75 (0.45- 1.23) 0.6 (0.34- 1.1) 88 (45.1%) 398 (46,5%)   1.36 (0.89- 2.06) 1.67 (1.04- 2.66) Moderate to severe burden 13 (14.8%) 80 (14.4%)   0.91 (0.47- 1.77) 1.00 (0.47- 2.15) 70 (35.9%) 231 (27.0%)   1.86 (1.20- 2.88) 1.76 (1.04- 2.98) CI: Confidence Interval; EDA: Emergency Department Admission; HA: Hospital Admission; OR: Odds Ratio; PwD: People with Dementia. imated average annual medical costs per person with dementia in the RTPC sample (n=1,700) *, **,*** Tables ** Mild Dementia (S-MMSE score >21), Moderate Dementia (S-MMSE score 10-21), or Severe Dementia (S-MMSE score <10 or not evaluated due to impaired cognitive or functional status). ** Mild Dementia (S-MMSE score >21), Moderate Dementia (S-MMSE score 10-21), or Severe Dementia (S-MMSE score <10 or not evaluated due to impaired cognitive or functional status). Page 18/19 Medical Care (Inpatient care)    Estonia n=225 Finland n=268 France n=186 Germany n=190 Netherlands n=269 Spain n=240 Sweden n=207 UK n=115 All countries n=1,700 Estimated n of people with dementia with EDA episodes (estimated EDA episodes/year)   48 (56)   124 (164)   56 (68)   84 (108)   72 (144)   136 (200)   36 (108)   76 (96)   632 (944) Cost (NH) 6.31 62.89 122.78 121.75 51.77 52.51 35.77 127.96 67.30 Cost (HC) 20.87 183.41 68.30 105.96 135.17 115.19 169.51 164.21 117.48 Total cost of EDA 15.69 133.49 78.55 114.19 102.93 92.99 119.76 146.87 98.41 Estimated n of people with dementia with HA episodes (estimated HA days/year)   72 (816)   148 (2,656)   176 (1,832)   140 (1,072)   44 (204)   56 (1,012)   56 (1,308)   72 (1,000)   764 (9,900) Cost (NH) 215.86 1,092.88 1,326.99 1,464.11 353.11 397.94 2,005.59 1,229.82 978.89 Cost (HC) 459.23 5,340.47 3,632.84 2,429.68 153.14 1,372.76 3,028.60 1,619.27 2,280.48 Total cost of HA 372.70 3,581.21 3,198.94 1,926.57 238.17 1,059.53 2,648.13 1,433.01 1,785.87 Estimated n of people with dementia with hospital episodes (EDA episodes and HA episodes) 120 272 232 224 116 192 92 148 1,396 Cost (NH) 222.17 1,155.77 1,449.77 1,585.86 424.83 540.84 2,041.56 1,357.78 1,046.19 Cost (HC) 480.10 5,523.87 3,701.13 2,535.65 288.31 1,487.96 3,198.11 1,783.48 2,397.96 Total cost of hospital episodes 388.39 3,714.70 3,277.49 2,040.76 341.09 1,152.52 2,767.89 1,579.89 1,884.28 *All expenses refer to costs per person with dementia, according to setting and country **Costs calculated including only people with dementia with data available on the number of EDA or HA ***All costs expressed in €. EDA: Emergency Department Admissions; HA: Hospital Admissions Supplementary Files This is a list of supplementary files associated with this preprint. Click to download. Page 19/19 Page 19/19
48,539
US-202017596168-A_1
USPTO
Open Government
Public Domain
2,020
None
None
English
Spoken
7,741
10,193
Razor cartridge ABSTRACT A razor cartridge comprising a housing extending longitudinally along a longitudinal axis, wherein the housing comprises a leading longitudinal side, a trailing longitudinal side, and a cutting member mounting portion in-between the leading and trailing longitudinal sides for accommodating a plurality of cutting members; and a plurality of cutting members disposed at least partially in the cutting member mounting portion, wherein each cutting member is arranged between a leading longitudinal side and a trailing longitudinal side of the razor cartridge in a shaving direction of the razor cartridge, wherein one or more of the cutting members comprises a blade support having a blade mounting portion, and a blade attached to the blade mounting portion. This application is a National Stage application of InternationalApplication No. PCT/EP2020/071492, filed on 30 Jul. 2020, now publishedas WO2021019008 and which claims benefit from European patentapplication EP19189470.8, filed on 31 Jul. 2019, the entire contentsbeing incorporated herein by reference. TECHNICAL FIELD The embodiments described in the following disclosure relate to a razorcartridge, a method for manufacturing a razor cartridge, a shaving razorassembly and an associated kit of parts. BACKGROUND Razor cartridges (also known as safety razor cartridges) are permanentlyor removably attached to a razor handle that, in use, is oriented inshaving direction. Razor cartridges typically comprise one or morecutting members, each supporting a blade, mounted perpendicular to theshaving direction. Razor cartridges are also typically provided with aguard (at a leading longitudinal side of the razor cartridge in theshaving direction) and a cap (at a trailing longitudinal side of therazor cartridge in the shaving direction). In use, a user holds therazor handle in the shaving direction and brings the razor cartridgeinto contact with a portion of skin defining a cutting edge plane. Typically, the cutting edge plane is defined as the plane intersectingthe first and second skin contact areas of, for example, cutting edgesof the shaving head. Movement of the razor handle by the user duringshaving operation causes the blades of the razor cartridge to be movedacross the cutting edge plane in the shaving direction, enabling theblades to remove unwanted hair. The performance of razor cartridges may be further improved. SUMMARY According to a first aspect, there is provided a razor cartridgecomprising a housing extending longitudinally along a longitudinal axis,wherein the housing comprises a leading longitudinal side, a trailinglongitudinal side, and a cutting member mounting portion in-between theleading and trailing longitudinal sides for accommodating a plurality ofcutting members; and a plurality of cutting members disposed at leastpartially in the cutting member mounting portion. Each cutting member isarranged between the leading longitudinal side and the trailinglongitudinal side of the razor cartridge in a shaving direction of therazor cartridge. One or more of the cutting members comprises a blade support having ablade mounting portion, and a blade attached to the blade mountingportion. The cutting members comprised in the plurality of cutting members areconfigured such that, in use, a total number of skin contact areas ofthe cutting members with a user along a transverse cutting membercontact axis is at least one greater than a total number of cuttingmembers comprised within the plurality of cutting members. In aspects, atotal number of skin contact areas of the cutting members with a useralong a transverse cutting member contact axis is at least one fewerthan two times the total number of cutting members of the plurality ofcutting members. According to a second aspect, there is provided a method ofmanufacturing a razor cartridge comprising: obtaining a housing extending longitudinally along a longitudinal axis,wherein the housing comprises a leading longitudinal side, a trailinglongitudinal side, and a cutting member mounting portion in-between theleading and trailing longitudinal sides for accommodating a plurality ofcutting members, and disposing a plurality of cutting members at least partially in thecutting member mounting portion to thus provide a plurality of cuttingmembers. Each cutting member is arranged between a leading longitudinalside and a trailing longitudinal side of the razor cartridge in ashaving direction of the razor cartridge. One or more cutting memberscomprises a blade support having a blade mounting portion and a bladeattached to the blade mounting portion. The cutting members are configured such that, in use, a total number ofskin contact areas of the cutting members with a user along a transversecutting member contact axis is at least one greater than a total numberof cutting members comprised within the plurality of cutting members. Inaspects, the total number of skin contact areas of the cutting memberswith a user along a transverse cutting member contact axis is at leastone fewer than two times the total number of cutting members. According to a third aspect, there is provided a shaving razor assembly.The shaving razor assembly comprises a razor and a razor cartridgeaccording to the first aspect or one of its embodiments. The razorcartridge is either releasably attached to the razor handle via apivotable or non-pivotable connection, integrally formed with the razorhandle via a non-pivotable connection, or integrally formed with therazor handle via a pivotable connection. According to a fourth aspect, there is provided a kit of partscomprising a razor handle and a razor cartridge holder comprising aplurality of razor cartridges according to the first aspect or one ofits embodiments. An effect of a razor cartridge according to the first aspect is that thephenomenon of skin bulge between cutting members attached to a blademounting portion is reduced, because there are more points of contactfor the same number of blades (compared to a prior-art cartridge withthe same number of blades). At least one cutting member is configured so that it has two contactareas with the cutting edge plane, namely the cutting edge of a blademounted on a support member, and a distal portion of the support memberon which the blade is mounted on. A conventional cutting member has oneskin contact area per cutting member (the cutting edge of a bladeprovided on the conventional cutting member). The extra skin contact area provided by a blade support when the firstblade is mounted closer to the leading longitudinal side of the razorcartridge equalises the distribution of the drag forces exerted by theskin against the razor cartridge, and thus mitigates irritation, nicks,and cuts during shaving. Further, the bulging of skin between the cutting edges of the blades isreduced because an additional skin contact area provided by the bladesupport of at least one cutting member of the razor cartridge accordingto the first aspect reduces the inter-blade space between consecutivecutting members (in other words, the span between blade edges of thecutting members). The provision of additional skin contact pointsprovides for intermediate contact points in-between the inter-bladespans of the plurality of cutting members (i.e. the cutting edges ofconsecutive blades). A further effect is that a second type of cutting member can be mountedcloser towards the trailing edge of the razor cartridge on top of itssupport member. Therefore, the second type of cutting member having oneskin contact area with the cutting edge plane. The contact point of thesecond type of cutting member with the cutting edge plane is the bladeedge of the blade mounted on the second type of cutting member.Therefore, the second type of cutting member can provide a moreaggressive cutting action than the first type of cutting member, toensure that hair remainders that were not removed by at least the firstblade mounted closer to the leading longitudinal side are cut offsubsequently by the second cutting member. This results in a closershave, thus leading to a more effective cutting action whilst reducingthe amount of irritation, nicks, and cuts experienced during shaving. Another effect is that durability of the blades closer to the leadinglongitudinal side of the razor cartridge is enhanced, because due to theprovision of the additional skin contact points cutting members havingtwo skin contact areas exert less pressure on the skin thus resulting ina less aggressive shave and a lower rate of blade wear. The cuttingmembers having two skin contact areas may therefore be placed closer tothe leading longitudinal side of the razor cartridge. Then, the bladesof the cutting members having two skin contact areas have a lifetimecomparable to the blades closer to the trailing longitudinal side of therazor cartridge. In prior art razor cartridges the blades closer to theleading longitudinal side become blunted more easily. A user mustdispose of a razor cartridge even when one blade of a plurality ofblades becomes blunted. Previously, a user would need to dispose of arazor cartridge having blunt blades closer to the leading longitudinalside even if the blades closer to the trailing longitudinal side of therazor cartridge were acceptably sharp. According to the present aspects,the wear rate on the blades closer to the trailing longitudinal side ofthe razor cartridge and the leading longitudinal side of the razorcartridge is more equal. The present razor cartridge may in particular be more suited toinfrequent razor users who wait several days between shaving. Suchbehaviour leads to a requirement for a greater degree of hair removalcompared to the case of a user who shaves daily. A razor cartridgeaccording to the present disclosure is better adapted to e.g. users whoshave less frequently, because the wear rate of blades at the leadinglongitudinal edge of the razor cartridge can be equalised with the wearrate of blades at the trailing longitudinal edge of the razor cartridgeto accommodate the denser and/or longer hair clippings characteristic ofusers who shave less frequently. A cutting edge plane is defined as the plane intersecting the first andsecond skin contact areas of, for example, cutting edges of the shavinghead (in a two-dimensional cut-through, the cutting edge plane would bea tangential line intersecting the cutting edges of the blades). A shaving plane is typically defined by the most prominent members ofthe housing of a razor cartridge. For example, the shaving plane isdefined as the plane between a guard member and a cap member thatcontact a user, in use. The shaving plane represents the theoreticalposition of the surface being shaved. Based on that, an exposure (of thecutting edge plane with respect to the shaving plane) can be designatedas negative, neutral or positive. As will be described in this specification, the razor cartridgecomprises at least two different types of cutting member. One type ofcutting member comprises blades mounted below their blade supportssupport, as defined and illustrated subsequently (i.e. blades mounted ona support mounting surface that in use faces away from the shavingplane). A local exposure is designated as the vertical distance betweena cutting edge and a support plane, wherein the support plane is definedby a tangential line intersecting the tips of the blade supports. Further embodiments are presented in the dependent claims, and thedetailed description, to which the reader should now refer. BRIEF DESCRIPTION OF THE DRAWINGS Other characteristics will be apparent from the accompanying drawings,which form a part of this disclosure. The drawings are intended tofurther explain the present disclosure and to enable a person skilled inthe art to practice it. However, the drawings are intended asnon-limiting examples. Common reference numerals on different figuresindicate like or similar features. FIG. 1 is a perspective view of a shaving razor assembly according tothe third aspect. FIGS. 2a and 2b schematically illustrate side views of a portion of aprior art razor cartridge in use. FIG. 3 is a schematic side view of a portion of a prior art razorcartridge in use. FIG. 4 illustrates a schematic side view of four cutting members of arazor cartridge according to an embodiment. FIG. 5 schematically illustrates different examples of blade mountingarrangements. FIG. 6 illustrates schematic side views of four cutting members of arazor cartridge according to another embodiment. FIG. 7 is a perspective partial exploded view of a razor cartridgeaccording to an embodiment. FIG. 8a is a schematic cutaway side view of the razor cartridgeaccording to an embodiment illustrated in FIG. 6 along axis transversecutting member contact access P-Q. FIG. 8b is a duplicate of the schematic cutaway side view of the razorcartridge shown in FIG. 7a that has been differently annotated toillustrate the inter-blade spacing. FIG. 9 is a schematic cutaway side view of an alternative embodiment ofa razor cartridge comprising at least one integrally formed cuttingmember. FIG. 10a is a schematic side view of a cutting member comprising a blademounting portion disposed on an inner surface of the respective bladesupport that, in use, faces away from a shaving plane. FIG. 10b is a schematic side view of an integrally formed cuttingmember. FIG. 11 illustrates a further side view of a blade arrangementillustrating the benefit of enabling at least one of the blade supportmembers to contact the skin. FIG. 12 schematically illustrates a method according to the secondaspect. DETAILED DESCRIPTION FIG. 1 is a perspective view of a shaving razor assembly 1 according toa third aspect. The shaving razor assembly comprises blades which arenot driven by a motor. The shaving razor assembly 1 comprises a handle 2extending in a handle direction H between a proximal portion 4 and adistal portion 6 of the handle 2. A razor cartridge 20 is mounted at thedistal portion 6 of the handle 2. The razor cartridge 20 will bepresented in more detail following discussion of the shaving razorassembly 1. The mounting of the razor cartridge 20 to the distal portion 6 of thehandle 2 in the illustration is via a pivotable bearing member 8enabling a frame of reference of the handle 2 to vary relative to aframe of reference of the razor cartridge 20, to thus enable the angleof the razor cartridge against the skin of a user to vary and adapt tochanges during use. In particular, the razor cartridge 20 pivots relative to the handle 2about the longitudinal axis L of the razor cartridge 20, in use. Thepivoting enables the user to adapt to contours of the body, for example.The longitudinal axis L of the razor cartridge 20 is substantiallyperpendicular to the shaving direction along the handle 2. Anotherexample of a connection mechanism for connecting the razor cartridge 20to the handle 2 is discussed in WO2006/027018 A1. Another alternative isa razor cartridge 20 that may pivot relative to a second pivot axis (arocking axis), substantially perpendicular to axis L. In examples, the pivotable bearing member 8 may be omitted (notillustrated) and the handle 2 provided as an integrally connected partof the support of the razor cartridge 20. In an example, the pivotable bearing member 8 may further comprise, orbe replaced by, a release mechanism 5 a, 5 b, enabling rapid release ofan exhausted razor cartridge from the handle 2. In an example, thehandle 2 and the support of the razor cartridge 20 are integrally formedwith a pivotable bearing member (not illustrated) such as a plasticspring member. In an example, the handle 2 is provided with a handle grip 9 formed of arubber, or rubber-like material to improve gripping friction. In anexample, the handle is provided with a thumb-rest 7 to enable a moresecure grip of the handle 2 by a user. FIGS. 2a and 2b are schematic side views of a portion of a prior artrazor cartridge in use. In conventional razor cartridges with three ormore blades, the inter-blade span is measured to be constant in a rangeof about 1.05 mm to 1.5 mm, and the razor blade is mounted on the top ofthe blade support. The phrase “top of the blade support” for the purposes of thisspecification means a side of a blade support of a razor cartridge thatis closest to a shaving plane SH (skin) of a user when the razorcartridge is in use, as illustrated in FIGS. 2a and 2b . When a razorcartridge with such top-mounted cutting members is used, aggressiveshaving may result in an increased degree of nicks and cuts and anincreased sense of irritation, because the cutting edge plane CEP (skin)is exclusively supported by the cutting edges 30 of the blades on theblade support. This provides the skin with a relatively small surface tobe supported on during shaving, and causes an increased degree of“bulging” 12 of the cutting edge plane CEP (skin) between theinter-blade gaps. The wear-rate of cutting members near to the leading longitudinal side(front) of a prior art razor cartridge may be greater than the wear rateof top-mounted cutting members near to the trailing longitudinal side(rear) of the prior art razor cartridge. FIG. 3 is a schematic side view of a portion of a prior art razorcartridge in use. To reduce the effect of skin bulging 12, theinter-blade span IBS can be reduced, as illustrated in FIG. 3. However,this results in a reduced gap for rinsing, and debris such as foam orhair can easily block a gap having a narrow inter-blade span. A greaterblade density (number of blades in the same-sized cartridge) is alsorequired when the IBS between all blades is reduced. Therefore, conventional razor cartridges can be further improved. According to a first aspect, there is provided a razor cartridge 20comprising a housing 21 extending longitudinally along a longitudinalaxis (x), wherein the housing comprises a leading longitudinal side 24,a trailing longitudinal side 25, and a cutting member mounting portion19 in-between the leading 24 and trailing 25 longitudinal sides foraccommodating a plurality of cutting members 29. A plurality of cutting members 29 is disposed at least partially in thecutting member mounting portion 19. Each cutting member 28 is arrangedbetween the leading longitudinal side 24 and the trailing longitudinalside 25 of the razor cartridge 20 in a shaving direction S of the razorcartridge 20. One or more of the cutting members 28 comprises a bladesupport 32 having a blade mounting portion 70, and a blade 33 attachedto the blade mounting portion 70. The cutting members 28 comprised in the plurality of cutting members 29are configured such that, in use, a total number of skin contact areasof the cutting members 28 with a user along a transverse cutting membercontact axis P-Q is at least one greater than a total number of cuttingmembers 28 comprised within the plurality of cutting members 29. Inexamples, a total number of skin contact areas of the cutting members 28with a user along a transverse cutting member contact axis P-Q may be atleast one fewer than two times the total number of cutting members 28 ofthe plurality of cutting members 29. In this application, the term “skin contact area” means a part of thearrangement of cutting members 28 that comes into contact with the skinof a user of the razor cartridge in normal use. Of course, many parts ofthe housing, guard, and cap element will also contact the skin of a userduring normal use of the razor cartridge, but the term “skin contactarea” means the section of a cutting edge 33 a-f of one of the blades ofthe razor cartridge 20, or the section of the edge of the blade support30 ax that contact the skin of a user in normal use. Therefore, when aplurality of cutting members 28 a-28 f is provided, there will be aplurality of skin contact areas in normal use. A subset 28 a, 28 b ofthe cutting members provided may contact the skin at both a cutting edge33 a, 33 b and a front edge of the blade support. Therefore it is notessential that every skin contact area functions to cut a hair of theuser. The skin contact areas provided by the front edge of the bladesupports 30 ax, 30 bx function to provide support to the skin surfacesuch that the overall pressure on the skin at the cutting edges 33 a, 33b is reduced. Viewed alternatively, the skin contact areas provided bythe front edge of the blade supports 30 ax, 30 bx functions to reduce aninter-blade span, to thus reduce the size of skin bulges. In an example, the skin contact portions 30 ax, 30 bx of the bladesupports 32 a, 32 b are rounded or chamfered to improve glidenessproperties of the cutting members 28 a, 28 b. FIG. 4 illustrates a schematic side view of four cutting members 28 a-28d of a plurality of cutting members 29 to illustrate the general conceptdiscussed in this specification according to an embodiment with fourcutting members 28 a-d. The surrounding structure of a razor cartridge20 is not illustrated as an aid to clarity. The plurality of cutting members 29 are, in use, drawn across the skinof the user (approximated by the cutting edge plane CEP) in the shavingdirection S. The cutting members 28 a-28 d of the plurality of cuttingmembers 29 may not be homogeneous. In other words, the at least onecutting member 28 c in the plurality of cutting members may have adifferent design compared to the other cutting members 28 a, 28 b. In general terms, the first two cutting members 28 a and 28 b compriseblades 33 a and 33 b mounted below their respective blade supports 32 aand 32 b, with respect to the shaving plane SH and cutting edge planeCEP. The second two cutting members 28 c and 28 d may comprise blades 33c and 33 d mounted above their respective blade supports 32 c and 32 d,with respect to the shaving plane SH and cutting edge plane CEP. The designation that a blade 33 c and 33 d is “mounted above” a bladesupport means that a second blade mounting portion is disposed on anouter surface of the first blade support 32 a that, in use, facestowards a shaving plane SH and cutting edge plane CEP, and the firstblade 33 a is attached to the second blade mounting portion. In other words, a blade 33 c that is “mounted above” its blade support32 c defines an imaginary plane that (i) intersects with the cuttingedge plane CEP at the cutting edge 30 c, and the same imaginary plane(ii) does not pass through (interfere with) any portion of the supportmember 28 c to which the same blade 33 c is attached. The designation that a blade 33 a,b is “mounted below” a blade supportmeans that a first blade mounting portion is disposed on an innersurface of the first blade support 32 a that, in use, faces away from ashaving plane SH (the cutting member is disposed such that in use facesaway a shaving surface, for example the skin), and a cutting edge planeCEP, and the first blade 33 a is attached to the first blade mountingportion. This may alternatively be referred to as a hanging blade. In other words, a blade 33 a that is “mounted below” its blade support32 a defines an imaginary plane that (i) intersects with the cuttingedge plane CEP at the cutting edge 30 a, and the same imaginary plane(ii) must pass through (interfere with) a portion of the support member28 a to which the same blade 33 a is attached. In the illustration ofFIG. 4, an example of an imaginary plane interfering with a portion ofthe support member 28 a is illustrated by the dotted extended line IP.The line crosses through the support member 28 a. A similar extension ofa plane defined by blade 33 c would not cross through the support member28 c of blade 33 c. In FIG. 4, cutting members 28 a and 28 b comprise blades 33 a and 33 bthat are mounted below their blade supports 32 a and 32 b, respectively.In other words, the blade supports 32 a, 32 b face away from the shavingplane SH and the cutting edge plane CEP. In FIG. 4, cutting members 28 c and 28 d comprise blades 33 c and 33 dthat are mounted below their blade supports 32 c and 32 d, respectively.In other words, the blade supports 32 c, 32 d face towards from theshaving plane SH and the cutting edge plane CEP. Therefore, in an embodiment, the skin contact area of one or more of thecutting members comprises a region of a blade support of the cuttingmember, and/or a cutting edge of a blade attached to the cutting member. In an embodiment, the plurality of cutting members 29 comprises a firstsubset of a first type of cutting member 28 a that, in use, has two skincontact areas 30 a (cutting edge) and 30 ax (front edge of the bladesupport) with a user along the transverse cutting member contact axis. In an embodiment, the plurality of cutting members 29 comprises a secondsubset of a second type of cutting member 28 c that, in use, has oneskin contact area 30 c (cutting edge) with a user along the transversecutting member contact axis P-Q. In an embodiment, the first subset of the plurality of cutting members29 is disposed closer to the leading longitudinal side 24 of the cuttingmember mounting portion than the second subset, and wherein the secondsubset of the plurality of cutting members is disposed closer to thetrailing longitudinal side 25 of the cutting member mounting portioncompared to the first subset. In an embodiment, the (integer) number of skin contact areas with a useralong the transverse cutting member contact axis P-Q provided by thefirst type of cutting members 28 a in the first subset of the pluralityof cutting members 29 is twice the (integer) number of skin contactareas with a user (cutting edge plane CEP) along the transverse cuttingmember contact axis P-Q provided by the second type of cutting member 28c. In an embodiment, the first type of cutting member 28 a comprises afirst blade support 32 having a first blade mounting portion disposed onan inner surface of the first blade support that, in use, faces awayfrom a shaving plane SH and a cutting edge plane CEP and a first bladeattached to the first blade mounting portion/surface. In an embodiment, the second type of cutting member 28 c comprises asecond blade support having a second blade mounting portion disposed onan outer surface of the second blade support that, in use, faces towardsa shaving plane SH and a cutting edge plane CEP, and a second blade 33 cattached to the second blade mounting portion. In embodiments, the blade supports of each cutting member 28 a, 28 bbelonging to the first subset of the plurality of cutting members 29further comprise a base portion 80 for attaching the blade supports tothe razor cartridge 20, the blade mounting portion, a curvilinearportion intermediate to the base portion and the blade mounting portion,and the blade mounting portion is disposed on an inner surface that, inuse, faces away from a shaving plane SH and a cutting edge plane CEP. A first skin contact area 30 ax of the cutting member belonging to thefirst subset of the plurality of cutting members is at least a portionof the blade support that is defined on an outer surface of the blademounting portion that, in use, faces towards the shaving plane SH and acutting edge plane CEP. In use, cutting member 28 a has two areas of contact with the cuttingedge plane CEP. The first area of contact with the cutting edge planeCEP is the cutting edge 30 a. The second area of contact with thecutting edge plane CEP is the front edge 30 ax of the cutting member 28a. Cutting member 28 b similarly comprises two areas of contact with thecutting edge plane CEP, the cutting edge 30 b and the front edge 30 bxof the cutting member 28 b. In use, cutting member 28 c has one area of contact with the cuttingedge plane CEP—the cutting edge 30 c. The cutting member 28 d has onearea of contact with the cutting edge plane CEP in use—the cutting edge30 d. In examples, the blade supports 32 a and 32 b may be the same type (forexample, dimensions and material thickness) as the blade supports 32 cand 32 d, to reduce the bill of material cost. In this case, the bladesupports 32 a and 32 b (comprising two cutting edge plane CEP contactareas) are, for example, mounted at a height deviation h above themounting height of the blade supports 32 c and 32 d (comprising onecutting edge plane CEP contact area), in order to ensure that thecutting edges 30 a and 30 b are coplanar with the cutting edges 30 c and30 d. In examples, the blade supports 32 a and 32 b may be of a differenttype, for example longer than the blade supports 32 c and 32 d so thatthe cutting edges 30 a-30 d are coplanar without requiring bladesupports 32 a and 32 b to be mounted with a height deviation h. A leading inter-blade span 40 is the span that is perpendicular to, andspans, the cutting edge plane CEP between cutting-edges 30 a and 30 b. Afirst intermediate inter blade span 41 is the span that is perpendicularto the second and third cutting edges in the cutting edge plane CEPbetween cutting-edge 30 b and 30 c. A trailing inter-blade span 42 is,in the example of FIG. 4, the span the span that is perpendicular to,and spans, the second and third cutting edges in the cutting edge planeCEP, 30 c and 30 d. In examples, the leading inter-blade span 40, the first intermediateinter-blade span 41, and the trailing inter-blade span 42 aresubstantially equal. In examples, the leading inter-blade span 40 isgreater than the first intermediate inter-blade span 41. In examples,the leading inter-blade span 40 is greater than the first intermediateinter-blade span 41, and the first intermediate inter-blade span 41 isgreater than the trailing inter-blade span 42. In examples, the leadinginter-blade span 40 is less than the first intermediate inter-blade span41. In examples, the leading inter-blade span 40 is less than the firstintermediate inter-blade span 41, and the first intermediate inter-bladespan 41 is less than the trailing inter-blade span 42. According to embodiments, the first cutting member 28 a and the secondcutting member 28 b (the cutting members 28 comprising blades 33 heldunderneath the blade supports 32) are comprised in a first subset of theplurality (group) of cutting members 29. According to embodiments, the third cutting member 28 c and the fourthcutting member 28 d (the cutting members 28 comprising blades 33 heldabove the blade supports 32) are comprised in a second subset of theplurality of cutting members 29. In other words, each of the blade supports 32 of cutting members 28 inthe first subset of the plurality of cutting members comprises a cuttingedge plane CEP contact portion 30 ax, 30 bx that is configured, in use,to contact the cutting edge plane CEP in addition to the cutting edge 33or edges of the blade or blades, thereby reducing the pressure atcutting edge contact areas with the cutting edge plane CEP. FIG. 5 schematically illustrates different embodiments for mounting thecutting members comprised in the plurality of cutting members 29. FIG. 5a schematically illustrates a plurality (group) of three cuttingmembers 29 comprising a leading cutting member 28 a having a blade 33 afacing away from the shaving plane SH and the cutting edge plane CEP,and two trailing cutting members 28 b, 28 c having blades 33 b, 33 cfacing towards the cutting edge plane CEP and the shaving plane SH. FIG. 5b schematically illustrates a plurality (group) of three cuttingmembers 29 comprising a leading cutting member 28 a and intermediatecutting member 28 b having blades 33 a and 33 b facing away from theshaving plane SH, and the cutting edge plane CEP and a trailing cuttingmembers 28 c having blade 33 c facing towards the shaving plane SH andthe cutting edge plane CEP. FIG. 5c schematically illustrates a plurality (group) of four cuttingmembers 29 comprising a leading cutting member 28 a having a blade 33 afacing away from the shaving plane SH and the cutting edge plane CEP,and three trailing cutting members 28 b, 28 c, 28 d having blades 33 b,33 c, 33 d facing towards the shaving plane SH and the cutting edgeplane CEP. FIG. 5d schematically illustrates a plurality (group) of four cuttingmembers 29 comprising a leading cutting member 28 a and a first trailingcutting member 28 b having blades 33 a and 33 b facing away from theshaving plane SH and the cutting edge plane CEP, and two trailingcutting members 28 c, 28 d having blades 33 c, 33 d facing towards thecutting edge plane CEP and the shaving plane SH. FIG. 5e schematically illustrates a plurality (group) of four cuttingmembers 29 comprising a leading cutting member 28 a and two trailingcutting members 28 b, 28 c having blades 33 b, 33 c facing away from theshaving plane SH and the cutting edge plane CEP, and one trailingcutting member 28 d having blades 33 d facing towards the shaving planeSH and the cutting edge plane CEP. Of course, further exemplary permutations are possible, such as thosecomprising five or six blades, or more. According to embodiments, the first subset of the plurality of cuttingmembers comprises two consecutive cutting members that, in use, faceaway from the shaving plane. According to embodiments, the first subset of the plurality of cuttingmembers comprises three consecutive cutting members that, in use, faceaway from the shaving plane. According to embodiments the second subset of the plurality of cuttingmembers comprises two consecutive cutting members that, in use, facetowards the shaving plane. According to embodiments the second subset of the plurality of cuttingmembers comprises three consecutive cutting members that, in use, facetowards the shaving plane. According to some embodiments the previously discussed concept theconcept of a plurality of cutting members with a combination of bladesmounted above and below their respective supports is provided. Howeverthis is not essential, and the provision of a plurality of cuttingmembers configured such that in use a total number of skin contact areasis at least one greater than a total number of cutting members comprisedin a plurality of cutting members can be provided in other ways. FIG. 6 illustrates a schematic side view of a plurality of cuttingmembers comprising four cutting members of a razor cartridge 20according to another embodiment. Cutting members 28 a and 28 b are provided as cutting members with theblade underneath the blade support as described in relation to theembodiment of FIG. 4. The embodiment of FIG. 6 comprises two integrallyformed cutting members 28 e and 28 f. The integrally formed cutting members 28 e and 28 f are provided, forexample, as unitary metal or metal alloy members. The integrally formedcutting members 28 e and 28 f comprise, at their distal ends, cuttingedges 30 e and 30 f respectively, and at their proximal ends a blademounting area. The integrally formed cutting members 28 e and 28 fillustrated in FIG. 6 comprise a radiused or curvilinear portion 82 thatgradually aligns blade support portions 32 e and 32 f of the integrallyformed cutting members 28 e and 28 f so that the cutting edges 30 e and30 f of the integrally formed cutting members 28 e and 28 f have acontrolled shaving angle to the cutting edge plane CEP. In an example,the integrally formed cutting members 28 e and 28 f are rigid. In examples, shaving angle is the same as for cutting edges 30 a and 30b, for example. In examples, the shaving angle of the cutting edges 30 eand 30 f of the integrally formed cutting members 28 e and 28 f may bedifferent to the shaving angle of cutting edges 30 a and 30 b, forexample. Similarly, the exposure of the cutting edges 30 e and 30 f of theintegrally formed cutting members 28 e and 28 f relative to the shavingplane SH may be the same as the exposure of the cutting edges 30 a and30 b (as illustrated in FIG. 6). Alternatively, the exposure of thecutting edges 30 e and 30 f greater than the exposure of the cuttingedges 30 a and 30 b, or less than the exposure of the cutting edgescutting edges 30 a and 30 b. Therefore, FIG. 6 illustrates an alternative embodiment having fourcutting members 28 a, 28 b, 28 e, 28 f that provide six contact points30 a, 30 ax, 30 b, 30 bx, 30 e, and 30 f with the cutting edge planeCEP. Of course, a skilled person will realise that many combinations ofintegrally formed cutting members 32 e and 32 f with cutting members 28a, 28 b having blades mounted below the blade support can be provided. In FIG. 6, the cutting members 28 a, 28 b having blades mounted belowthe blade support are illustrated as being closer to the leadinglongitudinal side 24 of a razor cartridge 20 compared to the integrallyformed cutting members 32 e and 32 f In embodiments, cutting members 28a, 28 b having blades mounted below the blade support are providedcloser to the trailing longitudinal side 24 of a razor cartridge 20compared to the integrally formed cutting members 32 e and 32 f Inembodiments, the cutting members 28 a, 28 b having blades mounted belowthe blade support are interleaved with integrally formed cutting members32 e and 32 f along the transverse direction of the razor cartridge 20in any sequence. Therefore, the second type of cutting member comprises an integrallyformed rigid razor blade having a cutting-edge portion extending about acutting-edge portion plane, and having a cutting edge 30 e, 30 f at oneend, a base portion 80 extending along a base portion plane, and acurvilinear portion 82 intermediate the cutting-edge portion and thebase portion 80. FIG. 7 is a perspective partial exploded view of a razor cartridge 20according to an embodiment of the first aspect. “Partial exploded view”means that minor components of the razor cartridge 20 have been omittedfrom the exploded view to aid the clarity of the drawing. The shaving direction S is depicted in FIG. 7 using arrow S. In use, therazor cartridge 20 contacts a cutting edge plane CEP (not shown in FIG.7), and is translated across the cutting edge plane CEP in the directionof arrow S. In an embodiment, a transverse cutting member contact axis P-Q(illustrated in FIG. 7) of the razor cartridge is defined as an axisthat is perpendicular to the longitudinal axis x of the razor cartridge20, coplanar with the cutting edge plane CEP, and which passes througheach cutting member 28 a-e of the plurality of cutting members 29. In the example, the housing comprises a housing 21 fabricated partiallyor completely of synthetic materials, such as plastic, resin, orelastomers. In embodiments, the housing is integrally formed. Inembodiments, the housing is formed from a plurality of sub-assembliesthat are joined together by joining methods such as adhesive bonding,interference fitting, or ultrasonic or thermal welding, for example. The housing 21 comprises a platform member (not shown) connectable to ahandle 2 (for example, as shown in FIG. 1) of a shaving razor assembly 1either integrally, or by a connection mechanism such as a pivotablebearing member 8 or by an interconnecting member (not shown). In the example, a guard member 23 is provided on the leadinglongitudinal edge of the razor cartridge 20. In use, the guard member 23is the first portion of the razor cartridge 20 to contact uncut hairs.The side of the razor cartridge 20 opposite to the leading longitudinalside of the razor cartridge 20 and opposite to the shaving direction isthe trailing longitudinal side 25 of the razor cartridge 20. Thetrailing longitudinal side 25 is thus the final portion of the razorcartridge 20 to contact the cutting edge plane CEP, in use. It will be noted that the terms “leading longitudinal side 24” and“trailing longitudinal side 25” are used to label specific locations onthe razor cartridge 20, and do not imply or require the absence orpresence of a particular feature. For example, a guard member 23 may inone example be located at the “leading longitudinal side 24” but it isnot essential that this location comprises such a feature. The guard member 23, in an example, comprises an elastomeric member (notshown in FIG. 6). In an example, the elastomeric layer comprises one ormore fins extending longitudinally in parallel to the guard member 23and substantially perpendicularly to the shaving direction. One purposeof such an elastomeric layer is, for example, to tension the skin priorto cutting. The razor cartridge 20 further comprises a plurality of cutting members29 accommodated in cutting member mounting portion 19 (in an example, arecess) and attached using a blade receiving section 31 of the housing21. The plurality of cutting members 29 comprises a plurality of cuttingmembers 28 a-d. The plurality of cutting members 29 is disposed in thehousing 21 longitudinally and parallel to the shaving direction SH suchthat in use, blades of the cutting members 28 a-d contact a cutting edgeplane CEP and cut hair of a user present in contact with the cuttingedge plane CEP as the razor cartridge 20 is moved across the cuttingedge plane CEP in the shaving direction S. The particular design of the plurality of cutting members 29 illustratedin the embodiment of FIG. 6 has been discussed previously in relation tothe blade arrangement illustrated in FIG. 4. However, at least the bladearrangements illustrated in FIG. 5 may also be provided as the pluralityof cutting members. In an example, a razor cartridge 20 is provided with a plurality ofcutting members 29 comprising two cutting members. In an example, arazor cartridge 20 is provided with a plurality of cutting members 29comprising three cutting members. In an example, a razor cartridge 20 isprovided with a plurality of cutting members 29 comprising four cuttingmembers. In an example, a razor cartridge 20 is provided with aplurality of cutting members 29 comprising five cutting members. In anexample, a razor cartridge 20 is provided with a plurality of cuttingmembers 29 comprising six cutting members. In an example, a razorcartridge 20 is provided with a plurality of cutting members 29comprising seven or more cutting members. The plurality of cutting members 29 defines a plurality of substantiallyparallel inter-blade spans. The number of inter-blade spans is one fewerthan the number of cutting members 28 a-d. The housing 21 comprises first 16 and second 18 side portions. Thehousing 21 comprises, for example, first retainer 26 and second retainer27 configured to mate resiliently with the respective first 16 andsecond 18 side portions to confine the cutting members within the razorcartridge 20 housing, although other retaining mechanisms are known to askilled person and are not excluded. When the razor cartridge 20 is inan assembled state, the first and second side portions 16, 18 areconfigured to confine the longitudinal ends of the guard member 23, andthe cutting members 28 a-28 d of the plurality of cutting members 29.The first retainer 26 and second retainer 27 may comprise, for example,plastic, an elastomer, a resin, a metal or metal alloy material andfurthermore may be of a different shape to that illustrated. The razor cartridge 20 of FIG. 6 further comprises four resilientfingers 38 a, 38 b, 38 c, 38 d provided in the vicinity of the firstretainer 26. The razor cartridge 20 comprises four resilient fingersprovided in the vicinity of the second retainer 27 that are intransverse corresponding alignment with the four resilient fingers 38 a,38 b, 38 c, 38 d under the first retainer 26. In an example, theresilient fingers 38 are integral with the housing and extend inwardlyfrom the first 16 and second 17 sides. In total, the eight resilient fingers each exert a bias force againstrespective cutting members of the plurality of cutting members 29 in thedirection of the cutting edge plane CEP such that the cutting members ofthe plurality of cutting members 29 are in a rest position, when therazor cartridge 20 is assembled. In the rest position, the cutting edges30 of the blades 33, at each lateral end of the blades 33 near the first26 and second 27 retainers, bear against corresponding stop portions,for example. In an example, the stop portions may be the first 26 andsecond 27 retainer. Accordingly, the rest position of the cutting members 28 a-d is welldefined, enabling a high shaving precision. Of course, the illustratedbiasing arrangement has many variations. For example, a furtherplurality of resilient fingers may be provided on one or more of thecross members 35. In a simplified razor cartridge design (such as forlow cost, disposable razors), the resilient fingers may be omitted. Askilled person will appreciate that the number of resilient fingers 38to be provided is related to the number of cutting members 28 a-d in theplurality of cutting members 29, and that fewer or more than eightresilient fingers 38 can be provided. It is not essential that theresilient fingers are provided as the skilled person is aware of othermounting means for the cutting members 28. In an example, the biasing members are omitted. A pivotable bearing member (not shown) may, in an example be provided onthe handle side of the razor cartridge 20 configured to connect to apivotable handle 2. Such a pivotable bearing member, in an example,comprises two or more shell bearings configured to connect to thepivotable bearing member 8 of the handle 2, although a skilled person isfamiliar with many attachment mechanisms of a razor cartridge to ahandle which are not excluded. As illustrated in FIG. 7, the cutting members comprised in the pluralityof cutting members 29 are disposed in the razor cartridge 20 such thattwo cutting edges 30 comprised, respectively, on the two foremostcutting members 28 a and 28 b of the plurality of cutting members 29(nearest to the leading longitudinal side of the razor cartridge) definea leading inter-blade span 40 that is closest to the leadinglongitudinal side 24 of the razor cartridge 20. The inter-blade spansare illustrated further in FIG. 8b and discussed subsequently. Each cutting member in the plurality of cutting members 29 comprises alongitudinal blade support 32. A longitudinal blade is mounted on theblade support 32. The cutting edge 30 of a cutting member 28 a-d isoriented forward in the direction of shaving S. The blade support 32 ofa cutting member 28 a-d is an elongated, partially curvilinear piece ofrigid material. In an example, the blade support 32 is a metal such asaustenitic stainless steel. Each cutting member in the plurality of cutting members 29 is, in anexample, resiliently mounted in a blade receiving section 31 of therazor cartridge 20. The blade receiving section 31 comprises alongitudinal space in the razor cartridge 20 that is sized toaccommodate the plurality of cutting members 29. At least one cuttingmember of the plurality of cutting members 29, up to all cutting membersin the plurality of cutting members 29 may be resiliently mounted on theresilient fingers 38 in the blade housing 21. In the illustrated example of FIG. 7, the transverse inner sides ofhousing 21 comprise a plurality of holding slots 34. Each holding slot34 on the transverse inner sides is configured to accept and retain oneside of a blade support 32 of a cutting member of the plurality ofcutting members 29 so that the cutting members of the plurality ofcutting members 29 are held in the blade receiving section 31 with asubstantially parallel inter-blade span. In embodiments, at least two ormore of the cutting members are non-parallel to each other. Therefore,as many holding slots 34 are provided in each transverse inner side ofhousing 21 as there are blade support members.
48,000
https://github.com/LaudateCorpus1/llvm-project/blob/master/libc/src/__support/OSUtil/linux/syscall.h
Github Open Source
Open Source
Apache-2.0
null
llvm-project
LaudateCorpus1
C
Code
82
343
//===----------------------- Linux syscalls ---------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #ifndef LLVM_LIBC_SRC_SUPPORT_OSUTIL_LINUX_SYSCALL_H #define LLVM_LIBC_SRC_SUPPORT_OSUTIL_LINUX_SYSCALL_H #include "src/__support/architectures.h" #ifdef LLVM_LIBC_ARCH_X86_64 #include "x86_64/syscall.h" #elif defined(LLVM_LIBC_ARCH_AARCH64) #include "aarch64/syscall.h" #endif namespace __llvm_libc { template <typename... Ts> __attribute__((always_inline)) inline long syscall(long __number, Ts... ts) { static_assert(sizeof...(Ts) <= 6, "Too many arguments for syscall"); return syscall(__number, (long)ts...); } } // namespace __llvm_libc #endif // LLVM_LIBC_SRC_SUPPORT_OSUTIL_LINUX_SYSCALL_H
1,490
https://github.com/eduardosbcabral/appinion-frontend/blob/master/src/components/CadastroPublicacao.js
Github Open Source
Open Source
MIT
null
appinion-frontend
eduardosbcabral
JavaScript
Code
266
984
import React, { Component } from 'react'; import { View, Text, ScrollView, TextInput, StyleSheet, TouchableOpacity } from 'react-native'; import Icon from 'react-native-vector-icons/MaterialCommunityIcons'; import { stringify } from 'querystring'; import api from '../services/api'; export default class CadastroPublicacao extends Component { static navigationOptions = ({navigation}) => { const { params = {} } = navigation.state; return { headerLeft: ( <View> <Icon style={{ paddingLeft: 10 }} name="arrow-left" size={30} color="#FBFBFB" onPress={() => navigation.goBack()} /> </View> ), headerRight: ( <TouchableOpacity style={{padding: 15}} onPress={params.manipularPublicacao}> <View> <Text style={{color: '#FBFBFB', fontSize: 17, fontWeight: 'bold'}}> Publicar </Text> </View> </TouchableOpacity> ), } } constructor() { super(); this.state = { publicacao: '', erros: [] } } componentDidMount() { this.props.navigation.setParams({ manipularPublicacao: this.manipularPublicacao }) } manipularPublicacao = async() => { this.setState({ erros: [] }); try { await api.post('publicacoes', this.construirPublicacao()); this.props.navigation.state.params.refreshPublicacoes(); this.props.navigation.goBack(); } catch (e) { this.manipularRespostaErro(e.response.data.erros); } } construirPublicacao = () => { return stringify({ Conteudo: this.state.publicacao}); } manipularRespostaErro = (erros) => { for (var erro of erros) { var listaDeErros = this.state.erros.concat({ nomeInput: erro.Origem, mensagem: erro.Mensagem }); this.setState({ erros: listaDeErros }) } } manipularErroInput = (nomeInput) => { return this.state.erros.find(erro => erro.nomeInput === nomeInput) === undefined ? '' : this.state.erros.find(erro => erro.nomeInput === nomeInput).mensagem; } render() { return ( <View style={styles.page}> <ScrollView keyboardDismissMode='interactive'> {this.manipularErroInput('Conteudo') === '' ? null : <View style={{marginTop: 10, marginLeft: 20}}> <Text style={styles.mensagemDeErro}>{this.manipularErroInput('Conteudo')}</Text> </View> } <TextInput multiline={true} onChangeText={(text) => { this.state.publicacao = text; }} defaultValue={this.state.publicacao} autoFocus={true} style={styles.input} /> </ScrollView> </View> ); } } var styles = StyleSheet.create({ page: { flex: 1, alignItems: 'stretch', backgroundColor: '#7159C1' }, input: { color: '#FBFBFB', padding: 20, fontSize: 18 }, mensagemDeErro: { fontSize: 17, color: '#FF5462', fontWeight: 'bold' } });
49,556
20013870_5
LoC-PD-Books
Open Culture
Public Domain
1,920
Football without a coach,
None
English
Spoken
4,673
5,581
A team that expects to try a drop kick at goal should always work toward the middle of the field on the down before it expects to try the drop. On the other hand, when a team punts out from its own goal, it should put the ball as near the side line as possible to prevent the opponents getting a fair catch and an easy try at goal. Of course, there is nothing to prevent a team doing the unexpected and the unusual. Sometimes it is wise to try the unexpected in the hope that the opponents will be caught napping. As a rule, however, field tactics demand that a certain type of football be 156 THE STRATEGY OF FOOTBALL played in certain parts of the field. While these rules are not mandatory, and while teams have broken them and won, they nevertheless represent what experience has taught should be the conduct of an attacking team under ordinary, average circumstances. Teams that are coached are taught not only to play the game, but how to play it. For this reason the football field is di- vided into zones. A well-trained team knows what is ordinarily expected of it the moment it gets the ball, basing this knowledge prin- cipally on the part of the field in which it receives the ball. Other things to be con- sidered are the score, the length of time left to play, and the condition of the opposing team. But so far as a boys' team is con- cerned, it IS best for it to concern itself merely with the established field tactics. [ To understand what these tactics are, it IS necessary to have a field diagram, and one IS given in Chapter VIII, page 141. You will notice that the field is divided into six- teen zones, and each of these zones calls for a particular type of play. 157 FOOTBALL WITHOUT A COACH Section A — ^Here a team is in vital dan- ger. It is in the shadow of its own goal posts. A fumble now would easily spell disaster, and there is little use in prolonged rushing because of the long distance that would have to be gained before a team would reap much benefit from its exertions. The wise thing is to get the ball out of dan- ger as quickly as possible. It is best to kick on first or second down unless playing against a very strong wind where every yard would count. In no event, however, should a team in this section hold the ball until fourth down before kicking. Section BB — Here it is often best to waste a down by running the ball out of bounds. When it is brought out the kicker is in a position to get off a safer kick. Section C — Here, before kicking, it is worth while to try a run from kick forma- tion; either that or some other play that offers an opportunity of getting in a chance long run. "Some other play,'* though, does not mean a forward pass. A forward pass in this zone is too uncertain and dangerous. 158 THE STRATEGY OF FOOTBALL The team that has one forward pass that is generally successful might try to work it ifl the situation were desperate — as, for in- stance, but a few minutes to play and a touch- down needed to win. Only a desperate situa- tion, though, would offer any excuse for try- ing an aerial play. Section DD — ^Here again it is usually well to run the ball out of bounds. A kick should be made on the second or third down. The team is still too close to its own goal to do much more than get the ball out of danger. Section E — Now comes the place for criss- crosses and concealed ball plays. This zone is far enough from the goal to be reasonably safe even on a fumble, and a long run here will put a team within scoring distance. Section FF — ^Here it is possible to wait and use running plays until the third down. It is not necessary to waste a down by carry- ing the ball out of bounds, for it Is not as vital that the kicker have every extra inch as it is in Sections BB and DD. Section G — ^This is the ideal position for a long forward pass on second or third down. 159 FOOTBALL WITHOUT A COACH If the ball is lost, the team has plenty of room in which to put up a defense. If the pass comes off and an end secures it well down the field, it is very apt to result in a touchdown. Section HH — ^Here, also, a forward pass may be used on second or third down. It is also a good place to use a series play — that is, three or four plays on one signal, winding up with a long end run. A series play, to be effective, must be run off rapidly. The team that takes its time about lining up after a down gives the opponents plenty of oppor- tunity to prepare. Section I — ^The team now enters its op- ponents' territory, and the character of its play changes. From now on the running game is called for. In this zone, any play that is extremely deceptive and likely to get a man loose for a clear run is worth trying on a first or second down. Section JJ — Here again are good oppor- tunities for a long forward pass down the side line on third down. It is just as well to wait until third down here as a running i6q THE STRATEGY OF FOOTBALL play may give a good start toward a score. Section K — This is a most desirable sec- tion for placement kicks for goal, but first the running game should be used. It would be folly to accept a field goal when a running attack might net a touchdown. Section LL — Here it is advisable to wait until the third down before kicking. Section M — Anywhere inside the thirty- yard line is a good position for an accurate drop kicker. It is preferable that he kick on third down, because then he will not be hurried as the opponents will not dare to break through too freely. It is often well in this section to use a forward pass on sec- ond down if a running play on first down has failed. But if the team is gaining ground steadily on its running plays, do not risk the forward pass. Section NN — ^Here, after using a running play without success, it is well either to try a forward pass or else run the ball out to- ward the center of the field if the team has a good drop kicker. Section O — Here is the place for the i6i FOOTBALL WITHOUT A COACH strongest scoring plays. That is why a team should keep track of its plays and know what its scoring plays are. The team must get over the line, and it must use its best men and its best plays to get over. Another reason why the best is called for is the fact that the de- fensive team always fights harder within its own ten-yard line than on any other part of the field. It is the old saying of the man with his back against the wall. Section PP — Here, too, the strongest run- ning plays are needed. However, it is well on third down, if the defense is holding tight, to run the ball out toward the center of the field. Then, should it look as though neither a touchdown nor a first down can be made on the fourth try, a drop kick can be tried if the team has an accurate kicker. If it has no accurate kicker, it is best to stick to the running plays. After all, football is much like everything else. Persistence accomplishes wonders. The team that faithfully practices the funda- mentals, knows the signals, sticks to the work day in and day out, studies strategy and tac- 162 THE STRATEGY OF FOOTBALL tics, and tries to use its brains, will go farther than the most brilliant team that loafs and shirks and does not keep its knowledge pol- ished. Play the game hard, play the game square — and good luck to you ! CHAPTER X THINGS THAT MAKE OR BREAK A TEAM The spirit of a team is something that has a lot to do with its success or failure. Only a coach of long experience realizes what a factor **spirit" represents once a team takes the field. Plays can be mapped out on a blackboard, but spirit defies such treatment It is something within the men themselves, something that moves a team to stand on its one-yard line on first down and gloriously throw back every attempt of the opponents to score; a something that leads it to fight with staunch and glowing courage against odds that seem overwhelming; a vivid something that brings it through de- spite a hundred freaks and twists of out- rageous fortune, triumphant at the end. The 164 THINGS THAT MAKE OR BREAK A TEAM team that has spirit can never be called beaten, however one-sided the score against it, until the final whistle blows; the team without spirit seldom wins even when all the elements are in its favor. Football history bristles with hundreds of stories of teams that undoubtedly were su- perior to their opponents in all the technical points of play. Yet, when actual playing tests came, these teams usually were defeated. In the language of sporting writers the de- feat of a team technically superior to another team, is called "an upset of the dope." Usually, following such defeat, there are many arguments as to how the miracle hap- pened. Usually, too, there are a thousand or so explanations of the upset. It is com- mon enough for the disgruntled followers of the losers to take the viewpoint that the luck of the game, the ''breaks" as they are called, operated against the vanquished. But ex- planations, as a rule, fail to hit the real mark. The game goes down into history with the ''upset of the dope" unexplained. Nine times out of ten, when a technically 165 FOOTBALL WITHOUT A COACH inferior team wins, it soars to victory be- cause it had a spirit that the other team lacked. We have, in almost a parallel sense, the same situation in war. History is alive with battles that favored one side in the things that spell the machinery of war— numbers of combatants, disposition of troops, superior- ity in guns and equipment. And yet a sudden stampede set in, the line was broken, retreat followed and the side so singularly favored found the battle lost. Why? The victors had the better morale. In football we call it **team spirit.*' If any man knew an absolutely certain sys- tem by which spirit could be instilled into a team, he might reap a small fortune by sell- ing his secret to college, school and industrial teams. But in spite of the mystery that sur- rounds this empirical element in football, there are certain things that we know help to bring it about. Harmony is, perhaps, the greatest builder of team spirit. No better description of it has ever been written than Dumas' famous i66 THINGS THAT MAKE OR BREAK A TEAM *'A11 for one and one for all" of the *Three Musketeers." Harmony springs from the thrill of a common ideal and brings in its wake a combined, deep-seated resolution to give the last ounce of strength to bring vic- tory. When you see a battered eleven play- ing a dogged uphill game, and when you see the players of that eleven weeping as they leave the game, spent, mark this — there, on those tramped gridiron lines, crouches a team infused with the spirit of harmony. When there is harmony in a team, every man, regular and substitute alike, works for the common cause. There are no rival- ries and jealousies. There is no thought that the captain or the coach is playing favorites. When plays go wrong, the men sit down to talk them over and take and give censure with a deep conviction that nothing that is said is personal but that all criticism and suggestion come from a desire to serve the team. And there is faith, too — confidence in the formations that have been adopted and no lingering doubts about the plays. This is of 167 FOOTBALL WITHOUT A COACH supreme importance. No eleven can put a play through if four or five of the men have no faith in it. No team can have harmony when individual members doubt the strategy that has been decided on. The worst thing that can happen to a team is to have its members break up into little cliques, each with its own leader. The foot- ball player who attempts to organize or to lead a clique is nothing more or less than a trouble-maker. He is a traitor, not only to his team, but to every other man who is play- ing the game with a whole heart. Usually cliques are founded on jealousy. Some man, envious of the captain, perhaps, starts to stab him in the back — and stabs the team as well. The moment a man begins to organize a clique he should be dropped from the team regardless of how good a player he may be. A poorer player, who will give his whole strength to the work, is to be preferred to the star whose miserable, crabbed sense of loyalty leads him to sow the seeds of dis- cord. The leadership of the captain has much i68 THINGS THAT MAKE OR BREAK A TEAM to do with the harmony of the team — that is why, as I told you early, too much care can- not be given to wise selection. No captain can bring harmony to a team if he is by nature arrogant and overbearing. Neither can he succeed if he is easy-going and lax and afraid to hurt feelings. There are times when sharp things must be said, and the right kind of captain can say them and not leave a scar or a wound. A captain must be firm, but just; a good fellow, but not a weakling; a diplomat, but no trafficker in small deceits. He must have the ability to pull his men to- gether, to bind them to him, to infuse them with enthusiasm for the team itself. And these things he will be able to do if the men know him to be absolutely square with them, with himself and with the team. Football is full of instances of captains who have voluntarily replaced themselves with substitutes because they thought the sub- stitutes the better men, and this at the start of the game. When this spirit prevails, de- feat can discourage a team momentarily but cannot dishearten it. Such leadership Is an 169 FOOTBALL WITHOUT A COACH inspiration, and the team that has it is indeed fortunate. But a captain should beware lest a little element of the theatrical creep into his mood and lead him to sacrifice himself when it is not absolutely necessary. A team expects the leadership of its captain, and he should lead when he can. When the time comes that he is sure that his team is stronger with him on the sideline than it is with him in the game, then there is only one place for him. The best traditions of team spirit demand it. Physical condition is another thing that makes or breaks a team. There is an in- visible line in conditioning. On this side of it a man is fit — on the other side, even the least bit on the other side, he is stale and is not only weakened physically, but nervously and mentally as well. It is often a difficult task to judge when a team is edging toward staleness, and sometimes an experienced coach will not know until too late that the damage has been done. Staleness should evidence itself in the practice. The men will be sluggish, the pep and fire will be gone, 170 THINGS THAT MAKE OR BREAK A TEAM they will tire easily, there will be an inclina- tion to flare up and get "scrappy/' or there will be a listlessness that nothing can arouse. At the colleges, where football men are under observation, it is always suspicious when a man begins to sleep badly, to worry and to **get off his feed." But with school and shop and neighborhood teams these things can be noted only by the man himself. If he finds himself in this predicament, the wise thing, the only loyal thing to the team, is to report to the captain his unfitness and then rest for a few days. When a whole team shows these signs, the wise course is to let the whole team rest even though the letdown come right on the eve of a game. Better a team that goes to Its big game minus some of the practice it might have had than a team that goes to battle dispirited and listless from the practice it should not have had. A team on edge will recover from an unex- pected reverse, take the bit in its teeth and fight desperately to retrieve its prestige. But a team gone stale, having lost its physical, mental and nervous force, will be thrown 171 FOOTBALL WITHOUT A COACH into a pessimistic attitude by an unexpected score recorded against it. The men will lose confidence in themselves and in their plays. They will have no resistive force with which to combat this depression. As a result they will go from bad to worse, from defeat to disgrace. Be careful above all things that your team does not go stale. Better not close enough to the line of condition on this side than a degree too far on the other side. But do not let fear of staleness lead to soft hand- ling of a team. Conditioning is a question that must be met practically. I have told you that a team must have absolute faith in the squareness of captain and coach. It must also have implicit faith in the judgment of these men. If there is ever a time when this implicit faith must be felt by a man, It must be when he finds himself ordered out and a substitute ordered in. He may feel that he is doing well, and is still strong and able — but the higher judgment is to take him out, and he must bow to it and accept it as sound judgment. There are many factors that go to affect a man's playing. He may 172 THINGS THAT MAKE OR BREAK A TEAM be dead sure on punts that come with the wind, but weak and uncertain on punts that come against the breeze, particularly a breeze that travels diagonally across the field. He may be a terror on a dry field, and yet not be thoroughly on his footing on a wet field. He may be sure and certain with a dry ball, but given to fumbles when the ball is wet and slippery. The individual player, wrapped up in the give and take of the game, is apt to lose sight of these factors. If he is play- ing in the line he may just be holding his man; but the man supporting him in the back- field may become alarmed at seeing him slip- ping and sliding and thus be put at a tension that is not at all observable to the wobbly man in the line. The player is simply a pawn in the game and his ambition should be to count most for his side. If he is taken out he must train himself not to question the de- cision. He sees only his own little sector of play; the man who ordered him out sees the whole field and the team as a whole. And here arises a more delicate situation for a coach, or for captains of teams which have 173 FOOTBALL WITHOUT A COACH no coach. It is that of the moment at which to replace a man. It may mean the winning or losing of the game. When to send in your drop kicker if perchance he is otherwise in- effective. You must be governed by the time elapsed in the period or by the score. If a drop will win or tie for you, you can take a chance which might be unwise if you were leading. But more delicate is the substitut- ing when pressed into your goal line. Never send a flighty player in here even though he be aggressive. Many a game has been lost by this mistake. The sound general prin- ciple is to let well enough alone when leading but to take chances when behind. The time to send in a fast speedy man is toward the latter part of a period when his opponents are tired, hence slow. The time to send in a strong, powerful, though somewhat slower, lineman is when a short distance is needed to go over or when you need extra power to pre- vent this very thing. Many games are won and lost during the intermission between the halves. Fiction abounds in stories in which the coaches, dur- 174 THINGS THAT MAKE OR BREAK A TEAM ing that rest period, have lashed a beaten team and have filled it with the zeal to go out and win. As a matter of fact, it rarely happens that way. A team that is behind is always more or less depressed. Instead of being scorched and burned, it must be given optimism and filled with a spirit of confidence before it goes out for the second half. It is the team that is ahead that is usually lashed. With such a team the idea is to stop any feeling of over-confidence or to combat any tendency to play safe. The team is told that the score should be larger, that it has not been taking advantage of its advantages, that it is the luckiest team alive that it is ahead. And instead of going out chipper and cocky that team goes out for the second half with its blood up to do better. One bad thing for a team is to have play- ers who have acquired the substitute habit. They become convinced that they will not be first-string men, and then two things happen : The team loses its chance to bring them up to first quality and they themselves never give the team the same first-class practice fight- 175 FOOTBALL WITHOUT A COACH ing that is given it by men who are struggling tooth and nail for the coveted places. No man ever Becomes a really good player on a first-class team if he does not begin at the bottom — on the scrub, or the second or third team, or even a substitute for the third or fourth team if the squad is that large. The man who thus fights his way up has far better possibilities in him than the man who is taken on reputation and who has not had this hard, gruelling work. It is by working up through the hard knocks of the scrub that a player acquires the all- around confidence and experience that will bring him through any emergency. The best punters in the college ranks have been the men who served as substitutes on scrub teams whose lines gave them very little protection. These men got used to having opponents come through at them rapidly and hard. They had to get their kicks off quickly and they learned how to take care of themselves. I have seen hundreds of good men develop from the scrub, men who would never have developed had they become dis- 176 THINGS THAT MAKE OR BREAK A TEAM couraged in the middle of the season and abandoned the game. When opportunity came these men were, by reason of their training, qualified to seize it. They had the great courage that goes with the successful football player. No player should get discouraged merely because he has seen a season or so of scrub work. Many a man develops late, drifts along as a substitute for a year or two, and then suddenly comes out as a product of all his hard work- — a first-class player. In- stances of this kind are far from rare; they go to prove that there are thousands of boys and young men who, if they persisted, would make excellent players. The great point is not to be satisfied with being a substitute, but to try harder and harder to make the team. Football is peculiar in this respect: hard work tells for more in it than in almost any other game. By hard work I do not mean brainless running about. I mean hard work coupled with hard thinking — studying others and trying to find new ways. In fact, one of 177 FOOTBALL WITHOUT A COACH the best things a substitute can do when he IS on the sideline is to study the play of the man in the position he is ambitious to occupy. Watch how the opponents handle him and how he handles himself. One of our greatest guards in the country told me he learned more football when I made him follow the team around at a time when he had a bad shoulder than he ever learned in all the rest of his play. A captain can keep his men interested if he tells them these facts. Another good point is to ask them from time to time, when they are on the sideline, what they see in par- ticular plays. When a man gets to thinking football he generally learns to play it better. The same kind of spirit that makes a man give up simply because by midseason he has not advanced beyond the scrub or is a sub- stitute IS the very kind of spirit that is not wanted on the football field. If that man does go in and his team is actually behind in the middle of the game, his quitting spirit will bring forth discouragement and he will not fight to overcome the lead. 178 THINGS THAT MAKE OR BREAK A TEAM Many a team that would otherwise fare well, loses many of its games by continuing to use plays which, though basically sound, yet do not come off because they are beyond the capabilities of the team. A play that becomes so shaky that the team is never sure of it, or that creates a grave danger that the ball will be lost, must be dropped. Attack- ing plays are supposed to advance the ball, not to lose ground. A team that is playing winning football can suddenly lose all its vim if a poorly executed play results in a fumble, a pick-up by an opponent, and a run through a broken field for a touchdown. Play football with your head and your heart as well as with your muscles. Play it hard, but play it square. Learn the rules. Keep in condition. Squeeze the ball, hit the line with all your power, and don^t foul. That is the best advice that one football man, grown gray in the game, can give the player coming into it with all the fresh vigor and enthusiasm of youth. (1) THE END 179 i IfllK-.
41,001
https://it.wikipedia.org/wiki/Vero%20amore%20%28racconto%29
Wikipedia
Open Web
CC-By-SA
2,023
Vero amore (racconto)
https://it.wikipedia.org/w/index.php?title=Vero amore (racconto)&action=history
Italian
Spoken
454
759
Vero amore (True Love) è un racconto fantascientifico scritto da Isaac Asimov, pubblicato per la prima volta nel 1977 sulla rivista American Way. Fa parte dell'antologia Tutti i miei robot ed è stato incluso anche in altre raccolte di racconti di Asimov. Il racconto fa parte della serie di racconti vagamente connessi fra loro sul supercomputer immaginario Multivac, un gigantesco computer costituito da chilometri di circuiti e valvole che per funzionare ha bisogno di numerosi operatori. Trama La storia viene raccontata in prima persona da Joe, un software semi-senziente, parlante, scritto ed elaborato da Milton Davidson, facente parte del complesso Multivac. Un giorno, Milton, resosi conto di essere arrivato single a quarant'anni, decide di trovare la propria anima gemella grazie proprio al programma che aveva creato (operazione del tutto illegale dato che i programmi Multivac, che gestiscono la maggior parte delle attività umane mondiali, non possono essere usati per scopi personali). Così, chiede a Joe di setacciare, in segreto, tutta la popolazione mondiale, eliminando tutti gli uomini (facendo rimanere così quasi 4 miliardi di individui), e tutte le donne con certe caratteristiche che non sono di suo gusto (come ad esempio le donne troppo vecchie o troppo giovani, o quelle con un quoziente intellettivo inferiore a 120). Arrivati alla fine della scrematura, quindi, rimangono soltanto 235 candidate. A quel punto, dato che la rosa di possibili mogli perfette per lui era troppo ampia, decide di farsi mandare soltanto quelle che assomigliassero fisicamente alle vincitrici di certi concorsi di bellezza. Ma la cosa non va a buon fine perché tutte e 8 le prescelte si riveleranno insoddisfacenti dal punto di vista sentimentale ed emotivo di Milton. Così, l'uomo decide che ci sarebbe stata un'unica possibilità per riuscire a trovare quella giusta fra tutte le donne uscite dallo scandaglio: quella di insegnare a Joe ad essere come il suo creatore. Dopo aver preso questa decisione quindi, passa intere giornate a raccontargli la storia della sua vita, le sue sensazioni e il suo modo di pensare, sperando che in questo modo, il programma diventi un suo duplicato sotto forma di dati. Una volta finito di raccontargli tutto quello che c'era da sapere su di lui, Joe, trova la candidata giusta, ossia Charity Jones, e decide di spostarla dal posto in cui era stata assegnata, al laboratorio dove si trovava. Ma prima che questa arrivi, il programma, diventato il sosia emotivo di Milton, decide di farlo arrestare per reati che aveva commesso 10 anni prima (la sua vita ovviamente la conosceva a memoria), così, da poter restare da solo con Charity, così, quando questa sarebbe arrivata, lui le avrebbe potuto dire: Voci correlate Isaac Asimov Tutti i miei robot Collegamenti esterni Racconti di Isaac Asimov Racconti di fantascienza
9,126
https://github.com/BlazorHub/BlazorFabric/blob/master/Demo/BlazorFluentUI.Demo.Shared/Models/DropDownViewModel.cs
Github Open Source
Open Source
MIT
2,022
BlazorFabric
BlazorHub
C#
Code
41
121
using BlazorFluentUI.Models; using System; using System.Collections.Generic; using System.Text; namespace BlazorFluentUI.Demo.Shared.Models { class DropDownViewModel : RibbonItem { public IEnumerable<IDropdownOption>? DropdownOptions { get; set; } public IDropdownOption? Selected { get; set; } public string Width { get; set; } = "200px"; } }
16,801
<urn:uuid:d3773c7a-2b96-4a38-88ce-ebc8558c53db>
French Open Data
Open Government
Various open data
null
https://www.senat.fr/dossier-legislatif/pjl11-393.html
senat.fr
French
Spoken
247
368
Mécanisme de stabilité pour les Etats de la zone euro Loi autorisant la ratification de la décision du Conseil européen modifiant l'article 136 du traité sur le fonctionnement de l'Union européenne en ce qui concerne un mécanisme de stabilité pour les Etats membres dont la monnaie est l'euro Loi n° 2012-323 du 7 mars 2012 parue au JO n°0058 du 8 mars 2012Procédure accélérée engagée par le Gouvernement le 8 février 2012 Dossier législatif sur le site de l'Assemblée nationaleTexte n° 4337 de M. Alain JUPPÉ, ministre d'État, ministre des affaires étrangères et européennes, déposé à l'Assemblée Nationale le 8 février 2012 Rapport n° 4347 de M. Henri PLAGNOL, fait au nom de la commission des affaires étrangères, déposé le 14 février 2012 Texte n° 861 adopté par l'Assemblée nationale le 21 février 2012 Texte n° 393 (2011-2012) transmis au Sénat le 21 février 2012 Rapport n° 395 (2011-2012) de Mme Nicole BRICQ, déposé le 21 février 2012 Texte de la commission n° 396 (2011-2012) déposé le 21 février 2012 Amendements déposés sur le texte de la commission n° 393 (2011-2012) Texte n° 91 (2011-2012) adopté définitivement par le Sénat le 28 février 2012 Loi autorisant la ratification de la décision du Conseil européen modifiant l'article 136 du traité sur le fonctionnement de l'Union européenne en ce qui concerne un mécanisme de stabilité pour les Etats membres dont la monnaie est l'euro (n° 2012-323 du 7 mars 2012), parue au JO n° 0058 du 8 mars 2012
19,814
https://github.com/xc5kxc/IDD/blob/master/PWA/src/components/AppShell/AppBar.vue
Github Open Source
Open Source
MIT
null
IDD
xc5kxc
Vue
Code
219
845
<template> <v-app-bar app color="indigo" dark> <!-- Button to toggle the navigation drawer --> <v-app-bar-nav-icon @click.stop="onInput" /> <!-- Application name --> <v-toolbar-title class="btn-indigo" @click="goHome()"> {{ $t("components_AppShell_AppBar_title") }} </v-toolbar-title> <v-spacer></v-spacer> <div v-if="enableLanguageFeature"> <label class="pa-0 ma-0 display-1" @click="languageDrawerOpen = true"> <flag style="border-radius: 5px;" :iso="languages[i18n.locale].flag" :squared="false" /> </label> <v-dialog v-model="languageDrawerOpen"> <v-card> <v-card-title></v-card-title> <v-card-text> <v-radio-group v-model="i18n.locale" column> <v-radio v-for="(entry, key) in languages" :key="key" :label="entry.title" :value="entry.language" ></v-radio> </v-radio-group> </v-card-text> <v-divider></v-divider> <v-card-actions> <v-spacer></v-spacer> <v-btn color="error" @click="languageDrawerOpen = false" dark> Close </v-btn> </v-card-actions> </v-card> </v-dialog> </div> </v-app-bar> </template> <script> import i18n from "@/plugins/i18n"; export default { name: "AppBar", props: { open: { type: Boolean, default: true, }, }, data: function () { return { // Display toggle; if true, display navigation drawer, else hide drawerOpen: this.open, languages: { en: { flag: "us", language: "en", title: "English" }, ru: { flag: "ru", language: "ru", title: "Русский" }, es: { flag: "es", language: "es", title: "Español" }, "zh-tw": { flag: "tw", language: "zh-tw", title: "繁體中文" }, }, languageDrawerOpen: false, i18n: i18n, enableLanguageFeature: false, }; }, // Parent -> Child communication watch: { // Change should come from the NavigationDrawer closing open(newVal) { this.drawerOpen = newVal; }, }, // Child -> Parent communication methods: { // Change 'isOpen' upon pressing the app-bar-nav-icon onInput() { this.$emit("drawer-change", !this.drawerOpen); }, goHome() { if (this.$router.history.current.path !== "/") { this.$router.push("/"); } }, }, }; </script>
12,525
carutti-storia-del-regno-di-carlo-emanuele-iii-v-2_1
Italian-PD
Open Culture
Public Domain
1,859
Storia del regno di Carlo Emanuele III v 2
Domenico Carutti, barone di Cantogno
Italian
Spoken
6,585
12,186
UNIVERSITY OF STORIA DEL REGNO CARLO EMANUELE I SCRITTA DA DOMENICO CARUTTI Volume Secondo TORTONA 1859 INDICE CAPITOLO DECIMOTERZO L'Armata Spagnuola per il 1706. Gli Spagnoli incalzati dagli Austriaci si ritirano sopra Piacenza; i Francesi li raggiungono — Battaglia di Piacenza vinta dagli imperiali — Carlo Emanuele occupa Novi, poi si congiunge con gli Austriaci — Nuova vittoria di questi al Tidone. Quattrocento Piemontesi fatti prigionieri a Zuccarello — Morte di Filippo VII — Gli succede Ferdinando VI — I Gallo-Ispani si ritirano verso Genova, indi per la riviera riparano in Francia — Genova abbandonata si arrende al marchese Bolta, nuovo capitano dei Cesarei — Guerra in Fiandra — Spedizione contro la Provenza — Carlo Emanuele riacquista il Nizzardo; si duole degli Austriaci e del Bolta; è preso dal vaiuolo in Nizza e ne guarisce — Rivoluzione di Genova; cacciata degli Austriaci — Savona si arrende allo sforzo piemontese — Esito infelice della spedizione di Provenza. CAPITOLO DECIMOQUARTO L'ASSIETTA. Accordo tra Sardegna ed Austria — Assedio di Genova nel 1747 — Il passaggio del Varo da parte del Gallo-Ispano — Gli Austro-Sardi si ritirano da Genova — Il cavaliere di Bellisle passa il Monginevro con cinquanta battaglioni — Distribuzione delle truppe piemontesi — I colli dell'Assietta — Battaglia del 19 di luglio: sconfitta dei Francesi — Il conte di Bricherasio e il conte di San Sebastiano — Piccoli fatti d'armi nella riviera fra Leutrum e il maresciallo di Bellisle, coi quali termina la campagna del 1747. PACE DI AQUISGRANA, Sollevazione della Corsica — Domenico Rivarola a Torino — Aiuti piemontesi ed austriaci mandati nell'isola — Conferenze di Breda — Guerra contro le Provincie Unite — Inclinazioni pacifische a trattative — Concetti del gabinetto piemontese — Congresso di Aquisgrana — Difficoltà per la cessione di Piacenza — Preliminari di pace — Trattato finale. RELAZIONI DIPLOMATICHE DOPO LA PACE. Matrimonio del duca di Savoia — Il conte Bogino, il presidente Gaissotti, il barone di Leutrum — Relazioni colla Spagna — Trattato d'Aranjuez detto d'Ilalia — Convenzione per il sale — Trattato del 1751 per le province del Milanesene smembrato — Relazioni colla Francia — Affare Mandria — Diritto di Villafranca — Relazioni con Inghilterra, Olanda, Portogallo, Sassonia — Concordato colla S. Sede per gli spogli; chiusure del tribunale della Nunziatura — Principato di Masserano — Relazioni con Napoli, Parma, Venezia, Toscana e Genova — S. Remo e la Corsica — Il duca di Modena — Trattato di matrimonio e successione estense — Riconoscimento dell'indipendenza di Ginevra. GOVERNO ECONOMICO E MILITARE. Spese della guerra della successione d'Austria — Sassi inglesi — Entrate straordinarie — Imposte straordinarie quali e in che misura — Imprestiti, ossia luoghi di monte — Biglietti di credito — Cessazione delle imposte straordinarie, in qual modo operata — Bilanci dello Stato — Bilancio attivo — Esame delle imposte elate od indirette — Cenni intorno al tributo prediale — Bilancio passivo — Descrizione delle spese — Agricoltura, commercio, industria, condizioni e leggi che ne impedivano lo sviluppo — Compagnia reale delle seta — Uscita commerciale nel 1752 — Porto di Limpio — Strade — Ferriere — Riforma delle monete — Catasto nelle province di nuovo acquisto — Abbellimenti di Torino — Le fortezze — La Brunetta — Parsimonia di Carlo Emanuele II nello spendere — L'esercito — Paghe dei graduati — Nuovi regolamenti militari — Marina — Pag. CAPITOLO DECIMOTTOVESCO</em> LA GUERRA DEI SETTE ANNI E I DIRITTI SOPRA PIACENZA. Guerra marittima tra Francia e Inghilterra — Lega di Francia ed Austria — Trattati di Versaglia — Macchinazioni di Austria, Sassonia e Russia contro la Prussia — Federico il invade la Sassonia — L'Inghilterra alleata della Prussia — Prima fase della guerra dei Sette anni — Guglielmo Pitt — Condizioni del Piemonte dopo la lega austro-francese — Carlo Emanuele III, tentato dal re Giorgio e da Maria Teresa, dichiara la sua neutralità — Malattia di Ferdinando VI di Spagna — Dichiarazioni del Re di Napoli riguardo al Piacentino — Carlo Emanuele teme di essere soverchiato e si apparecchia all’armi — Luigi XV entra come conciliatore — Accordo tra Francia e Sardegna rispetto a Piacenza — Relazioni su questo accordo — Federico il propone a Carlo Emanuele III di muovere contro l'Austria; risposta del Re — Aneddoto di G. Baretti — Carlo III re di Spagna — Pratiche per dare assetto alla vertenza piacentina da lui altraversate — Proposte fatte a Carlo Emanuele; sue domande — Patto fra la casa di Borbone — Inquietudini della Corte di Torino — Scritto di Bernardo Tanucci contro i diritti sul Piacentino; risentimento di Luigi XV — Dichiarazioni segrete di Spagna in favore di Sardegna — Carlo Emanuele si volge al gabinetto inglese — La Corte di Torino diventa mediatrice ufficiosa della pace tra Inghilterra e Francia — Negoziati del balì Solaro a Parigi e del conte di Viry a Londra — Gli interessi di Sardegna sono in pericolo — Consigli del Solaro — Riconoscimenti del Re — Nobile condotta dell'Inghilterra verso di noi — Carlo Emanuele è finalmente costretto ad accettare una somma di danaro in compenso di Piacenza, ritenendo al contempo di riversibilità — Fine della guerra dei Sette anni — Non è finita la questione piacentina; Spagna cava, Francia tentenna — Solenne protesta dell'Inghilterra — Convenzione del 1763 — Osservazioni — Morte del cavaliere Ossorio. CAPITOLO DECIMONONO LA CORTE. Ragione di questo capitolo — Ciò che i popoli chiedevano al Governo — Il Re amministratore della giustizia; suo intervento nelle facendenze dei privati; udienze pubbliche — Aneddoto del conte Bogino e di un tale — Rescritti sovrani — Il marchese di Prié e l'ambasciatore di Francia; il conte Malines e suo fratello prete — Onorificenze, impieghi — La Corte — Carlo Emanuele III; suo tenore di vita; aneddoti — Il duca di Savoia; sua natura, sua clientela — Il duca del Chiablese; suo ricco appannaggio — Le tre principesse — Il principe di Piemonte — La casa di Garignano. CAPITOLO VENTESIMO I segreti, i costumi. La nobiltà — Il clero — Casi del professore Chionio — Polizia, processi, provvidenze economiche — La monaca di Chieri — Il conte Stortiglione — Il conte Sclarandi — Il ceto medio — Il popolo — Istituti di beneficenza — L'istruzione pubblica — Collegio delle Provincie; Collegio dei Nobili; Accademia Reale — Educazione femminile — Bontà dei costumi nella famiglia reale — Cicisbei — Conversazioni — Aneddoti del marchese di Broglio — Teatri — Cenni sopra Torino — L'orso e gli studenti — Il giuoco del faraone — La battaglia; il giuoco del carro — Giudizi di uno straniero e di un concittadino sulla società piemontese — Osservazioni. CAPITOLO VENTESIMOPRIMO DEGLI STUDI E DELLE BELLE ARTI. Coltura piemontese — Università di Torino; professori; discipline teologiche, legali e mediche — II Bertrandi e il Gerdil — Giam-battista Beccaria e le scienze naturali — Luigi Lagrangia — Accademia delle Scienze — Studi storici — Carlo Denina — Poesia e Pittura — Il Beaumont e l'Oliviero — Architettura — Arte tipografica — Migrazione degli eccellenti ingegni piemontesi e per quali cause. CAPITOLO VENTESIMO SECONDO L'ISOLA DI SARDEGNA E IL CONTE BOGINO. Condizioni della Sardegna allorché venne sotto il dominio di Savoia — La popolazione — I banditi — tribunali — i baroni industri, il commercio, l'agricoltura — Il Governo — Il Parlamento — Le imposte — Le riforme di Carlo Emanuele II INDICE dei capitoli Il viceré, marchese di Rivarolo — Motivi per cui il Re non raduna il Parlamento — Il conte Bogino ministro per i negozi Sardegna — Leggi e ordini giudiziari — Le carceri — I comuni — Provvisioni amministrative — Buoni risultati che ottengono — Riordinamento degli studi— Le Università di Cagliari e Sassari. CAPITOLO VENTESIMOTERZO ED ULTIMO ULTIMI ANNI DEL RE. 1 Governi italiani nella seconda metà del secolo XVI — Contegno della Corte di Torino colla Santa Sede — Aneddoti, provisioni del Re — Costituzioni del 1770 — Il ducato di Aosta — Adunanza degli Stati nel 1760 e nel 1766 — Discorsi del controllore Morozzo — Editti che annientano i privilegi augustani — Riscatto delle servitù personali e delle rendite — Principato d'Orta, abbazia di San Giusto, vescovado Moriana — Politica esterna — Violazione delle acque territoriali di Sardegna — Cessione della Corsica alla Francia — Primo spartimento della Polonia — Trattato di matrimonio del duca del Chiablese con un’arciduchessa austriaca — Matrimonio della principessa Maria Giuseppina col conte di Provenza — Il Ministero — Attacco apoplettico del Re — Idropisia e tisi senile — Morte di Carlo Emanuele III — Considerazioni generali sopra il suo regno. Barone di Leutrum DOCUMENTO F Articolo separato e segreto alla convenzione coll'Austria del 4 Ottobre 1735 DOCUMENTI G Lettere del conte Bogino al conte Cristiani a Milano DOCUMENTI H Trattato conchiuso colla Corte di Vienna ed il Ducato di Modena coll'intervento del Re della Gran Bretagna, in forza del quale si è convenuto che, venendosi ad estinguere in Italia la linea mascolina di Casa d'Este, debba succedere ai suoi Stati e beni feudali ed allodiali l’Arciduca Leopoldo d'Austria, od uno dei suoi fratelli secondogeniti, mediante l'effettuazione del contratto di matrimonio colla nipote del detto Duca di Modena, quivi tenorizzato e stipulato l'44 del precedente maggio. DOCUMENTI I Lettera di Luigi XV a Carlo Emanuele III e risposta di Carlo Emanuele II DOCUMENTO K Parere del reggente Enrico sul punto se convenga al Governo di permettere la convocazione delle Corti. DOCUMENTO L Lettera del re Carlo Emanuele III al vicerè di Sardegna. . . » 336 Google ) CAPITOLO DECIMOTERZO Campagna del 1746. SOMMARIO prigionieri a Zucca- VII Gallo-Ispani si ritirano verso Genova nova abbandonata si sarei — Guerra in Fiandra — Spedizione Emanuele riscquisha il Nizzardo preso dal vizio- ciata degli Austri infelice della spedizione rende alle armi piemontesi — Esito D. Filippo e il campo spagnuolo a Piacenza versavano in grandi angustie, perocché gli Austriaci da ogni banda li circondavano, avvisandosi di vincerlo per fame. Giunto Maillebois, fu risoluta la giornata, e addì sedici di maggio ne seguì la celebre battaglia di Piacenza, in cui gli Austriaci ottennero gloriosa vittoria. Perdettero i Gallispani seimila combattenti, ma non per questo sarebbe facilmente riuscito al principe di Lichtenstein di snidarli dal campo trincerato, se il timore di mancar di vettovaglie, cui si aggiunse quello di aver mozzate Carlo Emanuele III. — Vol. Il ' Google un CARLO EMANUELE III le comunicazioni col Liguria, non li avesse poi recati ad uscirne. Appena Carlo Emanuele III conobbe che il maresciallo di Maillebois marciava verso Piacenza, corse sopra Novi, come quegli che aveva l'occhio alla Liguria. I cittadini di Novi gli aprirono le porte, paventosi che la città fosse destinata al sacco, secondoché credevano i soldati e i contadini dei contorni, che a tal fine seguivano l'esercito nella speranza del bottino. Ma il re bandì pena di morte contro chi offendesse la città; del che mormorarono assai le compagnie dei reggimenti svizzeri e tedeschi. Una contribuzione di duecentomila lire fu posta sulla città, ed altra uguale sopra i beni dei nobili genovesi da riscuotersi al tempo della raccolta delle messi. Prevedendo poi che nel Piacentino si apparecchiavano grosse fazioni, Carlo Emanuele si avviò a quella parte per congiungersi cogli Austriaci; giunse a Schiavetti il sedici di giugno, giorno della battaglia di Piacenza; il giorno seguente procedette verso Broni, quindi a Stradella, donde mandò ad occupare Castel S. Giovanni dalla cavalleria. Il principe di Lichtenstein, dopo la giornata di Piacenza, lasciò il comando degli imperiali al marchese Botta Adorno, di sangue genovese, nome di trista celebrità nella storia italiana. La cagionevole salute diede colore pretesto al ritiro del principe, ma vuolsi che la Corte di Vienna lo richiamasse, perché creduto troppo arrendevole ai voleri del re di Sardegna. Il marchese Botta non si macchiò di tale peccato, ed in un consiglio di guerra, tenutosi il 48 di giugno, diede i primi saggi. Pretendeva egli che l’esercito piemontese si avanzasse al di là della Trebbia per coprire la Lombardia ed impedire al nemico il passo verso Napoli; lasciandogli aperto quello della Liguria; Carlo Emanuele, dal canto suo, voleva bensì che si difendesse la Lombardia, ma allo stesso tempo voleva che si chiudesse ai Gallispagni la ritirata per gli Stati genovesi, lasciando il cammino per Napoli aperto. Seguendo il disegno del Botta, il Piemonte rimaneva sguernito ed esposto agli insulti nemici e rendendovisi impossibile il progresso delle armate collegate nella riviera occidentale; per questo, dopo varie discussioni non venendosi ad accordo, il re significò ricisamente ai Tedeschi che intraprenderebbe da solo la guerra nella riviera ligure. Questa dichiarazione ridusse il Botta a partiti conciliativi, e perciò fu statuito che ambedue gli eserciti, il sardo e l’austriaco, restrinerrebbero il blocco intorno al campo di D. Filippo, e lo sforzerebbero per tal modo a nuovo combattimento. Il maresciallo di Maillebois non diede loro il tempo di effettuare i decretali movimenti. Passò coi Francesi sulla sinistra del Po e corse il paese fra l’Adda e il Lambro; non dubitando che il Botta, veggendo perditare la Lombardia, si dispiegherebbe dai Piemontesi ed a lui porgerebbe il destro di rioccupare la posizione di Novi. Infatti a quella mossa Tedeschi e Sardi abbandonarono i contorni di Piacenza, e il capitano di Brescia, con destrezza e prestezza singolare, rivarcò il Po fra mezzo i due eserciti nemici alla foce del Lambro, e si afforzò sopra il fiume Tidone. Il conte di Gages, comandante di Piacenza, si avviò a quella volta, ma, incontrato dagli Austriaci, dovette venire a battaglia presso il Tidone (10 di agosto) e n’ebbe la peggio; onde con molta difficoltà pervenne a salvare le sue truppe ed a congiungersi con Maillebois. Nel mentre una schiera volante di Piemontesi, condotta dal marchese del Carretto di Balestrino, avversissimo ai Genovesi, gettatasi per la riviera, si impadronì di Calizzano presso il Finale. Sloggiata da alcuni soldati della repubblica, ritornò con maggior numero di armati e specialmente di milizie all'attacco, ed occupò Cisano e Zuccarello. Ma Anfran Sauli, commissario di Genova, riesce a segnarlo dagli altri corpi piemontesi, lo circondò, lo prese prigioniero con quattrocento dei suoi. Dopo il combattimento del Tidone, stavano i Francesi accampati a Tortona, gli Spagnoli a Voghera, solletticando rinforzi dalla Francia, quando per la morte di Filippo V avvenuta il 9 di luglio 1746 mutò l'andamento della guerra in Italia. Succedeva a lui sul trono di Spagna Ferdinando VI, figlio non di Elisabetta Farnese, ma di Gabriella di Savoia, prima consorte di Filippo; cessò pertanto all’Escuriale l'autorità della regina madre, e il nuovo re dimostrò prestamente alieno dall'abbracciare gli inquieti consigli della matrigna e poco incline a versare il sangue e i tesori di Spagna per procacciare stato in Italia all’infante D. Filippo, fratello suo. Ed ecco giungere a Voghera il marchese Las Casas con patente che lo creava capitano generale degli Spagnoli in cambio del conte di Gages. Apportatore delle risoluzioni di Ferdinando VI, ordinò che si levasse il campo, e si pose senza dimora in marcia per la Bocchetta, sarno deprecando il contrario i Francesi e i Genovesi. Il maresciallo di Francia, troppo indebolito per fronteggiare solo gli Austro-Sardi, dovette seguirlo; varcarono la Bocchetta, lasciandovi a guardia piccolo presidio di truppe e si sciolsero uniti in val di Polcevera. Ogni altra cosa apertamente indicava che avevano fisso di abbandonare la riviera. Si cominciarono le trepidazioni di Genova, prossima ad essere lasciata in preda alla rabbia dei nemici vittoriosi ed anelanti a vendetta. Il Senato pregò i Francesi, pregò gli Spagnoli, mostrando intimamente la ruina della repubblica, che si era alla loro fede commessa; gli risposero con buone parole e con mistificanti promesse, ma intanto e gli uni e gli altri difilavano verso ponente, e già D. Filippo era partito alla volta di Nizza. Genova fu vilmente derelitta. Il marchese Boita, che inseguiva i Borboniani, sforzò con leva fatica il varco della Bocchetta e il 4 di settembre il suo antiguardo occupò San Pier d’Arena. Allora il Senato gli mandò deputati per negoziare comprovabili condizioni di accordo; gli rammentarono essere lui Genovese di natali, non volesse condurre all’estrema miseria la comune patria. Rispose che non era Genovese, ma Tedesco; che a lui vincitore apparteneva il dettare i patti, non voler discuterli con vinti; se resistessero, raderebbe al suolo la città. Genova soggiacque al fato ineluttabile della forza e fu occupata dalle schiere tedesche. Caduta la sede della repubblica in mano dei Tedeschi, non tardò la riviera di ponente a venire in potestà dei Piemontesi, i quali sotto la condotta del re stesso ormeggiavano la ritirata dei Gallispani. Il conte della Rocca s’impadronì della città di Savona, ma il commissario genovese Agostino Adorno si ritrasse nel castello, apparecchiato a virile resistenza; Finale capitolò; Ventimiglia, dove il Maillebois aveva gettato un po’ di soldatesca francese, battuta in rovina per otto giorni, si arrendeva anch’essa. L'esercito di Spagna e Francia giunse a Nizza e di là si ritirò in Francia. Google Il maresciallo di Sassonia, capo delle truppe di Francia, aveva aperto la campagna con la presa di Bruxelles; e continuando prosperamente il corso della vittoria, prima del finire di settembre tutti i Paesi Bassi austriaci, tranne Lucemburgo e Limburgo, caddero in balia dei Francesi. Il 12 di ottobre il maresciallo vinse la battaglia di Rocoux e respingendo gli alleati al di là della Mosa. Lo sbarco del Pretendente in Scozia aveva costretto l'Inghilterra a richiamare una gran parte delle sue truppe dal continente, e quantunque la giornata di Culloden mettesse fine al tentativo di Carlo Edoardo (27 di giugno 1746), tuttavia trascorse alcuni tempo innanzi che il ristabilimento della tranquillità interna permettesse al governo di ringagliardire i suoi sforzi sul continente. Per queste ragioni Giorgio II sollecitava vivamente l’Olanda di bandire la guerra alla Francia, e, per indurla al rischiovole passo, promise che Austria e Sardegna porterebbero le armi in Provenza, la quale cosa obbligherebbe Luigi XV a richiamare parte delle sue truppe dalle Fiandre, e porrebbe così gli Stati Generali in migliori e più sicure condizioni. Questo disegno, quantunque sagace e vantaggioso, non era approvato da Carlo Emanuele III, memore di quanto era intervenuto a suo padre, e più anticamente a Carlo Emanuele I; dispiaceva del pari a Maria Teresa, la quale sempre era sollecita che contro di Napoli si volgessero le armi; ma, instando l'Inghilterra, fu necessario acconsentire. Carlo Emanuele non volle tuttavia assumere il comando dell'esercito, né trasferirsi in persona sul territorio francese; deputò quindi al governo delle sue truppe destinate all'impresa il marchese di Balbiano, ed il generale austriaco Brawn, investito del supremo comando della spedizione, passò il Varo protetto dalla flotta inglese che batteva di fianco il nemico attellato sulle rive del mare. Carlo Emanuele attese al riacquisto dei castelli di Villafranca e di Montalbano, di Nizza e di tutto il paese rapito nelle precedenti campagne. Lo accolsero i sudditi con esemplari dimostrazioni di giubilo, lieti di ritornare sotto il paterno dominio; dimostrazioni anche maggiori gli diedero i popoli della Ciuà e del marchesato di Finale, che, angariati dall'avarizia genovese, lui salutavano come liberatore ed imploravano come padre. Il re creò un'apposita Giunta per il governo economico e giudiziario del marchesato e del litorale venuto in sua dipizione. Proverbeneva intanto all’espugnazione del castello di Savona, dolendosi forte del marchese Botta e della convenzione da lui stipulata con Genova in nome suo proprio e non in quello della lega, giusta il prescritto del trattato di Worms, il quale recava che né pace, né tregua si stipulasse dall'uno dei contraenti senza partecipazione o consenso degli altri. Da ciò era derivato che il re non aveva parte alle contribuzioni levate sulla repubblica, e che, mentre gli Austriaci avevano imposto ai Genovesi la redenzione di Gavi, nulla avevano stabilito per Savona, intorno a cui spargevano il sangue piemontese. Il Botta scrive erroneamente che la spedizione di Provenza fu condotta da Carlo Emanuele, e s'inganna anche affermando che egli la desiderasse. Carlo Emanuele I Inoltre Carlo Emanuele biasimava il modo tenuto dal marchese nell’occupazione di Genova. « Perché, diceva egli, contentarsi della porta di S. Tommaso ed abbandonare la custodia delle altre alle truppe della repubblica? Perché lasciare in piedi quelle truppe? Perché confidare ad esse il presidio del molo? Perché non impadronirsi dell’arsenale e sguernirlo? Perché lasciare quegli argomenti di offesa a chi potrebbe in qualche sinistro di guerra valersene a nostro danno? Sta bene tenere i denari alla repubblica, ma preme maggiormente toglierle le armi di mano. Temeraria consigliera è talvolta la disperazione. » Queste fatidiche voci non facevano effetto alcuno sull'animo del marchese, che era crudele e imprevidente del pari. Standosi adunque il re in Nizza fra queste male soddisfazioni, fu repentinamente assalito dal vai-nolo, correndo il 18 di novembre. Toccava egli il quarantesimo quinto anno, ed il pericoloso morbo si manifestò con gravi sintomi. Rassegnato a morire, con quella imperperturbata fermezza che lo contraddistingueva chiamò a sé il duca di Savoia, che lo accompagnava anche in questa campagna e commiseli la spedizione degli affari, ordinando ai ministri ed ai generali di rivolgersi a lui solo, « Ora non devo pensare ad altro, disse egli, fuorché alla salute dell'anima e del corpo. » La famiglia reale spedì da Torino l’Alliont e il Francesetti, medici principali di quel tempo; ma Carlo Emanuele, che poco credeva alla medicina e che del resto si lodava del suo medico ordinario Marchiandi, non volle riceverli. La famiglia reale spedì da Torino l’Allioni e il Francesetti, medici principali di quel tempo; ma Carlo Emanuele, che poco credeva alla medicina e che del resto si lodava del suo medico ordinario Marchiandi, non volle riceverli. Nella malattia di Carlo Emanuele si veda D'Agziano, Memorie storiche. CAPITOLO DECIMOTERZO La malattia prese un benigno andamento; il tre dicembre il vaiuolo cominciò a seccare, il dodici l'augusto ammalato entrò in convalescenza, e in principio di gennaio si pose in viaggio per Torino, dove arrivò la sera del quattordici tra una generale luminaria e le feste voli acclamazioni della città. In questo mezzo, è per l'appunto durante l'infierire della malattia del re, memorandi avvenimenti erano sopraggiunti. Il conte della Rocca travagliavasi intorno al castello di Savona strenuamente difeso dal prode Adorno, il generale Brawn aveva posto l'assedio ad Antibes, il Botta dimoravasene a S. Pier d’Arena con poche truppe, perchè la spedizione di Provenza lo aveva privato della più gran parte delle truppe imperiali. Quindici soli battaglioni gli rimanevano, uno dei quali stanziato a Novi, gli altri a S. Pier d'Arena ed in altre terre dei contorni di Genova. Con orribile durezza avevano i Tedeschi usato la vittoria sopra la repubblica, e nello stesso tenore continuarono ad usarne. Ventidue milioni di lire di contribuzione imposero sulla città, ed il Senato, per pagare, aveva dovuto ricorrere al tesoro di San Giorgio; deposito di capitali non dello Stato, ma di privati uomini, rimasto sino a quel giorno inviolato. Il Botta chiese per soprappiù cinquantamila genovine per rinfresco dell'esercito, poi chiedeva tende, poi farine e biscotto, o navi onerarie, e nulla pagava. Siccome il re di Sardegna non partecipava alle spoglie e se ne lagnava (né pareva torto secondo le leggi di guerra), l'Inghilterra, che in qualche modo il voleva contentare, mandò nel porto una nave che i bastimenti predava a sua posta. Nella città le sfrenate soldatesche affacciavano alle botteghe, prendevano il meglio, e quando dovavano pagare determinavano essi stessi il prezzo; se i padroni facevano rimostranza, alzavano il bastone, e ogni lite con questa ragione definivano. Arrogi la ribalanza che in quell'anarchia sguazzava, non essendo trattenuta dal timore dei magistrati; insomma nessun ordine, nessuna giustizia regnava; ingordigia nei capitani, licenza nei soldati, scherni e vituperi al patriziato, al popolo, al nome della repubblica. Il pontefice Benedetto XIV si mosse a pietà di quel disonesto strazio, ed interpose suoi uffici a Vienna; ne ritraeva belle promesse di moderazione, e nessun rimedio ai mali degli oppressi cittadini. Non allentavansi le barbariche seviziole per volgere di giorni e di settimane, credendo il Botta e credendo i suoi Tedeschi di avere smorzato affatto gli spiriti e i nervi dei Genovesi. Ma questi, vedendo la diminuzione degli imperiali, cominciavano a sollevare alquanto gli animi; i più coraggiosi, e i popolani specialmente, domandavansi fra di loro fremendo perchè dovessero vivere in soggezione tanto atroce, mentre alla città rimanevano e truppe ed armi contro lo scarso numero dei nemici; non potersi dire insano il consiglio di riconoscersi dall’abbominoso giogo, perchè condizione più misera della presente non potevano aspettarsi. Agevole cosa essere il liberarsi di quella sparsa ladronaia, non dovendo temere dell'esercito ingolfatosi in Provenza; essere lontano, e già il re di Francia apparecchiarsi a fronteggiarlo poderosamente; poi, quand’anco ritornasse, Genova saprebbe difendersi ora che aveva assaggiato la clemenza e la fede del nemico. Così incitavansi gli uni e gli altri, e il desiderio della vendetta cresceva le speranze. Il residente francese, o di proprio moto, o per intelligenze avute, scriveva al ministro d'Argenson che in Genova si macchinavano nuovi vespri siciliani contro gli Austriaci, e che domandavano la cooperazione di Francia. D'Argenson rispondeva che la Francia non arrabbonirebbe la repubblica. Mancava un capo alla commossa moltitudine, mancava un’occasione. Il capo non sorse, ma l'occasione si presentò non aspettata; una scintilla caduta sull’eschia apprestata fece divampare l'incendio. Il generale Browne, che stava intorno ad Antibo, non faceva progresso; mancandogli la grossa artiglieria, chiese al marchese Botta quella di Genova. Botta ne fece domanda al governo. Risposero i magistrati che la repubblica non poteva concedere a’ danni altrui quanto era riserbato per propria difesa; se col violenza il volessero torre, sì il facessero, non avendo essi facoltà di opporsi. Il capitano austriaco mandò nei magazzini dell’arsenale a riconoscere gli attrezzi, e visitare e scegliere i cannoni e i mortai, indi cominciò a farli trasportare alla volta della Lanterna per imbarcarli al loro destino. La misura era colma; tacevano i patrizi scorati; ma negli occhi fiammeggianti, nella torva guardatura dei popolani, nelle tronche parole, nelle aperte maledizioni mostravasi la tempesta vicina a prorompere. Un fremito cupo si udìe, la folla addensavasi minacciosa intorno alle rapite artiglierie, che per le strette e ripide vie della città erano spesso costrette ad arrestarsi. Google 12 CARLO EMANUELE I La sera del cinque di dicembre un drappello tedesco trainava un mortaio a bombe nel quartiere di Portoria abitato dal minuto popolo; sfondatosi il terreno; i soldati, che di per sé non valevano a trarre il mortaio, richiedevano gli astanti di aiuto; tutti ricusarono; il caporale, inviperito, diede al solito di piglio al bastone; traboccò lo sdegno negli irosi petti; un ragazzo di pochi anni si china a terra, prende un sasso e disse: « Oh, che la rompo? » e la ruppe scagliando il sasso fatele. Il ragazzo chiamavasi Giovanni Battista Perasso, detto volgarmente il Balilla. Percosso in fronte il caporale, cade; succede un grandinare di pietre, poi l’indietreggiare degli Austriaci, e comincia la genovese sollevazione. A me non si appartiene il raccontarla, né l’ardirei dopo la meravigliosa ed insuperabile pittura che ne lasciò lo storico d’Italia; ma l'animo mio si allega almeno in pensando che mano piemontese sollevò più durevolmente che nel marmo il ricordo della magnanima riscossa con cui Genova si liberò dalla contaminazione forestiera. La sollevazione americana e la rivoluzione francese non avevano ancora mostrato al mondo quanto possa la forza popolare anche contro le ordinate schiere, né l'aveva mostrato la selvaggia ma generosissima Corsica sotto il suo Paoli; perciò l'Europa maravigliò agli eroici casi di Genova; e molto si mormorò della inettitudine del marchese Botta, che da artigiani e contadini si era lasciato sopraffare. Egli infatti, non solamente aveva dovuto sgomberare la porta di S. Tommaso, ma S. Pier d’Arena, e quindi, levandosi a stormo i montanari della Liguria, a gran fretta e con grandi perdite aveva ripassata la Bocchetta attestandosi a Novi ed a Gavi. Il nuovo governo sorto in Genova durante la rivoluzione pensò prestemente a mandare aiuti a Savona, strettamente premuta dai Piemontesi; ragunarono un nucleo di cinquecento uomini d'ordinanza e lo rafforzarono con numerose bande paesane, le quali, giunte a S. Pier d’Arena, si diedero al sacco e si disciolsero. Il conte della Rocca, conoscendo il pericolo suo, fulminava più vivamente il castello; il 14 di dicembre aprì larga breccia, ed Agostino Adorno chiese di capitolare; ma, non accordatisi intorno alle condizioni, si ritornò al cannoneggiare, fino a quando fu necessità accettare i patti del vincitore. Il conte della Rocca, che valente era e teneva in pregio il valore, consentì alla guarnigione di uscire dalle squarciate mura coi militari onori, e la mandò prigioniera in Mondovi; all'Adorno e al brigadier Cratteler, che sotto il commissario genovese comandava, permise di ritornare in Genova con promessa di non più combattere contro il re. La presa di Savona recò molto onore al conte della Rocca, e sicurò ai Piemontesi il possesso della Liguria. L'impresa di Provenza, difficilmente riuscibile per sè stessa, diventò impossibile dopo gli eventi di Genova, perocchè mancavano le munizioni, le vittuaglie e le ar- tiglierie d'assedio. La . Francia spedì grossi rinforzi; il maresciallo duca di Bellisle ne prese il comando in cambio del Maillebois, e verso la metà del gennaio 1747 avventatosi contro Brawn, battè a-Castellano un corpo di Austriaci e di Piemontesi. Il generale austriaco, fuor di speranza di fargli testa, e sollecitato anche dal Botta, ri- _ passò il Varo senza essere per altro inseguito dai Francesi, tra per la rigidezza della stagione, e perchè gl’Inglesi rimanevano tuttora padroni delle isole di Sant'Onorato Google 14 CARLO EMANUELE HIT e di Santa Margherita, oceupate fin dal principio della invasione. La cavalleria austriaca e piemontese valicò il colle di Tenda per entrare nei quartieri d'inverno. Venti batta- glioni piemontesi e dieci imperiali di fanteria rimasero nella contea di Nizza sotto il governo del barone di Leutrum; .gli altri nostri battaglioni presero stanza a Savona; gl'imperiali andarono a raggiungere il marchese Botta, che dal Milanese e dal Parmigiano adunava truppe contro Genova per lavare nel sangue lo smacco del 40 di dicembre. Se non che mentre attendeva ad ingrossarsi gli fu da Vienna ingiunto di cedere il governo degli imperiali al conte di Sellemburgo, il quale nella seguente campagna. dovea .sperimentare che non è lieve fatica il sottomettere genti ‘risolute a vincere o morire per la li- bertà della patria. CAPITOLO DECIMOQUARTO L’Assietta. SOMMARIO Accordi tra Sardegna ed Austria — Assedio di Genova nel 4747 — 1 Gallo- Jepani passano il Varo — Gli Austro-Sardi si ritirano da Genova valiere di Bellisle passa il Mo. Tribuzione delle truppe piemontesi il 49 di luglio e sconfitta dei Francesi — Il conte di Bricherasio e il conte di San Sebastiano — Piccoli fatti d'armi nella riviera fra Leutrum e il maresciallo di Bellisle, coi quali termina la campagna del 47-48. I dissapori nati fra le Corti di Torino e di Vienna si erano addolciti. Maria Teresa preparava a vendicare l’onta patita a Genova dalle sue armi, ma Carlo Emanuele III ricusava di unire le sue truppe a quelle dell'imperatrice, se prima non gli si rendeva ragione dell’onta patita dalle sue armi e non si istabilivano patti chiari per l'avvenire. Egli chiedeva come temperamento opportuno che l’Austria promettesse di adoperarsi efficacemente, quando si trattasse della pace, per conservargli il possesso della riviera di ponente da lui conquistata, ma questa promessa non si voleva dare se in pari tempo il re non rinunciava alla cessione del Piacentino. I comuni interessi e i buoni uffici dell’Inghilterra sopirono gli acerbi umori, e nel mese di maggio fu convenuto che il Piemonte concorrerebbe all'assedio di Genova con dodici battaglioni, mille cinquecento uomini di milizie e un treno di artiglieria. Maria Teresa impegnò di darci la quinta parte delle contribuzioni che si leverebbero in Genova, e di dividere gli altri proventi secondo la quantità delle truppe. Ciò fatto, Carlo Emanuele mandò il suo contingente alla volta di Genova sotto la condotta del conte della Rocca. Già verso la metà di aprile il conte di Sollevanno, spiccatosi da Novi con diciasette mila uomini, aveva sopraffatto gli Appennini cacciandone le bande paesane che li custodivano, ed era giunto in cospetto della città. La quale oggigiorno non era più sola alle difese. France, che «contro sua voglia aveva nell’antecedente campagna abbandonata, ora le veniva in soccorso, troppo bene essendo consapevole di che rilevanza fosse per essere alla guerra in Italia l'avere amica e compagna la repubblica. Il due di febbraio erano giunti in Genova sei ufficiali e due ingegneri francesi spediti dal marciale di Bellisle ad annunciare prossimi gli aiuti; portavano seco ottomila luigi d’oro. Le promesse più che il lieve sussidio rifiorirono le popolari speranze. Il 19 di marzo entravano nel porto tremila uomini parte francesi e parte spagnoli, condotti i primi dal marchese di Murica e i secondi dal marchese di Taubin. Altre truppe giungevano in seguito, e l’ultimo di aprile il duca di Boufflers ne assumeva il comando in qualità di generalissimo. Luigi XV mandava un milione e trecentomila lire al Senato, ed obbligavasi di pagarne duecento cinquantamila ogni mese per le paghe delle truppe. Ferdinando VI, poiché si deliberò a proseguire la guerra, anch'esso, sebbene con minor larghezza, sovvenne la città di moneta correndo il mese di giugno, meglio di ottomila soldati tra Francesi e Spagnoli stanziavano in Genova. Verso la metà del mese di maggio cominciarono a stringersi le opere intorno alla città; gli Austriaci investivano la città dal lato orientale e settentrionale, i Piemontesi da ponente, gl’Inglesi tenevano il mare. Ma le opere dell'assedio furono condotte mollemente; Sollemburgo, impetuoso nei primi scontri, non proseguì con sufficiente saldezza d'animo, né colà necessaria prontezza; i Piemontesi piuttosto a difesa che ad offesa parvero stare in schiera; poco diligente era la guardia degli Inglesi sul mare, onde non pervenivano ad intercettare i soccorsi d’uomini e armi che da Marsiglia e Tolone spedivansi giornalmente. In vari abbattimenti, e nelle fazioni che con varia fortuna successero cogli Austriaci, i Genovesi combattono ottimamente, le loro milizie si agguerrirono; i Francesi non fallirono al debito loro, il duca di Boufflers fu lodato di animoso e perito condottiere. Tuttavia l'esito terminativo sarebbe uscito incerto per la repubblica se il sopraggiungere dei Gallispani dalla Provenza non avesse costretti gli Austro-Sardi ad abbandonare l'impresa nei primi giorni di luglio. (Vanese, Storia di Genova, lib. rex) (MiwcroLi, Relation de la campagne de 1744). Carlo Emanuele III. — Vol. IL. 2 Infatti il tre di giugno il maresciallo di Bellisle e il marchese di Las Minas passarono il Varo. Noi non avevamo sulle rive del fiume che piccoli distaccamenti, perciò il barone di Leutrum, coi ventisei battaglioni di cui aveva il governo, si ritirò alla Turbia, fatto prima occupare dal cavaliere Demartini il colle di Brauss per chiudere la strada di Tenda. I Gallispani presero in pochi giorni Nizza, Villafranca, Montalbano e mandarono una colonna contro il colle di Brauss. Demartini ripiegò sul colle della Briga. Miravano i Borboniani a far disciogliere l'assedio di Genova, e perciò, inoltrandosi per la riviera, presero Ventimiglia e si avanzarono fino a San Remo. A quest’annunzio Carlo Emanuele ordinò al conte della Rocca di abbandonare Genova e di trasferirsi a Savona per essere in grado di rinforzare il barone di Leutrum. Il Sollemburgo, che già era caduto dalla speranza di domare la città, fece gli preparativi per la ritirata e stendette il giorno quinto di luglio. Così la sede della repubblica rimase, sostenuta quasi due mesi di assedio, libera dalle infestazioni nemiche. Leutrum dopo la capitolazione di Ventimiglia era accampato sulle alture di Oneglia, dove il re gli ingiunse di difendersi sino all’estremità; se fosse obbligato a retrocedere, si fortificasse al Finale; ivi di nuovo resistesse, insomma confrontasse passo a passo la costiera occidentale, il che portava secco la salvezza del Piemonte. Google Ma in altri luoghi doveano aver luogo i grossi avvenimenti di guerra. Discrepavano al solito i generali di Francia e di Spagna: il maresciallo di Bellisle sosteneva, nella guisa stessa de’ suoi predecessori, che prima d’ogni cosa era da saggiare il re di Sardegna, vinto il quale non rimaneva agli Austriaci altro spediente fuorché quello di ritirarsi dalla Lombardia riparando nel Tirolo. Parevagli duro l’intoppo frapposto da Leutrum ad Oneglia, forti le posizioni da lui occupate e tali da richiedere tempo e fatica a superarle; credeva poi anche a ragione che Carlo Emanuele, tutto intento alla riviera, non fosse in condizione di tenere guardati i consueti varchi. Il marchese di Las Minas, per contrario, avendo sempre l'occhio a Parma ed a Milano, pretendeva che l’esercito s’inoltrasse per la riviera, espugnando Savona, e valicati gli Appennini e sottomettendo Gavi discendesse sulle sponde della Scrivia e della Trebbia. Era la notizia, che perciò bisognava battere la città vigorosamente per indurla almeno a trattare; oppure, se volevasi levare l'assedio, doversi per la riviera di ponente andar incontro ai Gallispani, non la via della Bocchetta. Scrisse quindi al re, e Carlo Emanuele significò anch'esso per lettera la sua meraviglia di tutto ciò. Sollemburgo allora sopprimerne l'imbarco delle artiglierie e rispose al re che, se gli ordinava di continuare l'assedio, ei non si mosse. Nel frattempo Ventimiglia si arrese veramente, e Carlo Emanuele riscontrò Sollemburgo dicendogli che nel presente stato di cose non poteva dargli ordine né di levare né di continuare l'assedio, dovendo tenere le sue truppe intorno a Savona. Sollemburgo imbarcò allora artiglierie e munizioni, dopo di che il conte della Rocca partì. (Minuto di Relazione della campagna del 1747.) All'aprirsi della campagna, premendo soprattutto di liberare Genova, tutto l'esercito passò il Varo; ma, cessato il pericolo della repubblica, prevalse il partito francese, e perciò, spiccati cinquanta battaglioni sotto il comando del cavaliere di Bellisle, fratello del maresciallo, furono mandati nel Delfinato con istruzione di penetrare in Piemonte per Monginevro. Rinnovavasi il tentativo del conte di Lautrec nel 1745, ma con forze tre volte maggiori e coll'accorto consiglio di non intraprendere assedii e di evitare perciò le fortezze di quegli alpestri gioghi. Appena Carlo Emanuele conobbe questa mossa chiamò i dodici battaglioni che da Genova già erano pervenuti a Savona; spedì in pari tempo a Milano il conte Bogino per sollecitare gli imperiali in soccorso dei pericolanti confini piemontesi. Pericolanti in vero, conciosiache' insufficiente argine potevano opporre all'irrompente Bellisle. Le nostre truppe erano spartite nella seguente maniera: il barone di Leutrum stava, come si è detto, fra Oneglia e nella Briga con ventisei battaglioni, di cui dieci imperiali e sedici piemontesi; i dodici battaglioni di Savona dovevano condursi alla volta di Pinerolo, ma ne erano ancora lontani di molte marcie; la rimanente fanteria presidiava Finale, Savona, Piacenza, Modena, Demonte, Cuneo, Exilles e Susa; la cavalleria stanziava nella valle di Stura. I luoghi minacciati, cioè i monti tra Fenestrelle ed Exilles dal colle dell’Assietta a quello di Fatières, erano pertanto custoditi da soli quattordici battaglioni, di cui quattro tedeschi. Il conte di Bricherasio ne aveva il supremo comando. Il re aveva mandato l'ingegnere Vedano a fortificare i passi come meglio si poteva in quella fretta. CAPITOLO DECIMOQUARTO Il conte di Bricherasio collocò sette dei suoi battaglioni sul colle dell’Assietta; intorno ad esso erano innalzate trincee o piuttosto muricciuoli di sassi, non muniti di alcuna artiglieria, ché nessuna ne avevano i nostri colà; tali trincee, mediante opportune comunicazioni, si congiungevano col colle di Serano, che sopraggiudicava l’Assietta. Bricherasio situò due battaglioni al Serano, uno al colle dell’Orgoglio, uno al colle del Gran Lago e del valleone dei Morti, uno al posto della Valletta, uno al colle di Fatières e delle Finestre. Al colle di Albergo mandò duecento uomini di ordinanza ed alcune milizie valdesi. Le nostre posizioni erano forti per natura del sito, e la disposizione delle truppe prudente, giacché, mentre copriva Fenestrelle e manteneva le comunicazioni con Exilles, lasciava ai nostri libera la ritirata verso il celebre campo di Catinat. Il re aveva ingiunto che sino all'estremo si difendessero i posti occupati.
14,964
https://github.com/salihzeki12000/hangveroi/blob/master/resources/views/modules/cart/shipping.blade.php
Github Open Source
Open Source
MIT
2,018
hangveroi
salihzeki12000
Blade
Code
845
3,750
@extends('layouts.default') @section('content') <div class="col-md-12"> <div class="row"> <div class="first-row"> <div class="col-md-12"> <div class="breadcmenu"> <ol class="breadcrumb"> <li><a href="{{ URL::to('/') }}">Trang chủ</a></li> <li><a href="{{ URL::to('/account') }}">Tài khoản</a></li> <li class="active">Thông tin giao hàng</li> </ol> </div> </div> </div> </div> <div class="row"> <div class="second-row"> <div class="col-xs-12"> <div class="progress border-radius-0"> <div class="progress-bar progress-bar-striped progress-bar-danger active" aria-valuenow="33.3" aria-valuemin="0" aria-valuemax="100" role="progressbar" style="width:33.3%"> Giỏ hàng </div> <div class="progress-bar progress-bar-striped progress-bar-danger active" aria-valuenow="33.3" aria-valuemin="0" aria-valuemax="100" role="progressbar" style="width:33.3%"> Cập nhật giao hàng </div> <div class="progress-bar" role="progressbar" style="width:33.3%; background: #f5f6f7; color: #666"> Tiến hành đặt hàng </div> </div> </div> <div class="col-xs-12"> <div class="panel panel-info border-radius-0"> <div class="panel-heading"><b>GIAO HÀNG MIỄN PHÍ</b></div> <div class="panel-body font-size-15"> <ol> <li><a href="https://ohangveroi.com">Ohangveroi.com</a> giao hàng miễn phí toàn quốc cho đơn hàng từ <b class="font-size-18">200.000đ</b>.</li> <li>Miễn phí giao hàng nội thành TP HCM cho đơn hàng chỉ từ <b class="font-size-18">100.000đ</b>.</li> </ol> </div> </div> </div> @if(!Auth::check()) <div class="col-md-9 left-position"> <div class="wrapbox border-radius-5"> <form method="post" action="{{ URL::to('cart/getcheckout') }}"> {{ csrf_field() }} <div class="form-group"> <label for="txt_phone">Số điện thoại</label> <input id="txt_phone" class="txt-phone form-control" onkeypress='validate(event)' data-token="{{ csrf_token() }}" type="text" name="phone" value="" required> <i>(Tự động điền thông tin nếu bạn đã là khách hàng của Ohangveroi.com)</i> </div> <div class="form-group"> <label for="txt_name">Họ tên</label> <input id="txt_name" class="form-control" type="text" name="name" value="" required> </div> <div class="form-group"> <label for="txt_email">Email</label> <input id="txt_email" class="form-control" type="text" name="email" value=""> </div> <div class="form-group"> <label for="txt_address">Địa chỉ giao hàng</label> <input id="txt_address" class="form-control" type="text" name="address" value="" required> </div> <div class="form-group"> <div class="row"> <div class="col-md-6"> <select class="cmbCity selectpicker form-control border-radius-0" name="city" id="cmbCity" data-token="{{ csrf_token() }}" required> <option value="">Vui lòng chọn tỉnh/thành phố</option> @foreach($cities as $city) <option {{ $city->id == $currentCity ? 'selected' : '' }} value="{{ $city->id }}">{{ $city->type . " " . $city->name }}</option> @endforeach </select> </div> <div class="col-md-6"> <select class="cmbDistrict selectpicker form-control border-radius-0" name="district" id="cmbDistrict" data-token="{{ csrf_token() }}" required> @php $districtBelongItems = App\Models\District::where('province_id', $currentCity)->get(); @endphp @foreach($districtBelongItems as $district) <option value="{{ $district->id }}">{{ $district->type . " " . $district->name }}</option> @endforeach </select> </div> </div> </div> <div class="form-group text-right"> <input class="btn btn-danger" name="submit" type="submit" value="Giao hàng địa chỉ này"> </div> </form> </div> </div> @else <div class="col-md-9 left-position"> <div class="wrapbox border-radius-5"> <form method="post" action="{{ URL::to('cart/getcheckout') }}"> {{ csrf_field() }} <div class="form-group"> <label for="txt_phone">Số điện thoại</label> <input id="txt_phone" class="txt-phone form-control" onkeypress='validate(event)' data-token="{{ csrf_token() }}" type="text" name="phone" value="" required> <i>(Tự động điền thông tin nếu bạn đã là khách hàng của Ohangveroi.com)</i> </div> <div class="form-group"> <label for="txt_name">Họ tên</label> <input id="txt_name" class="form-control" type="text" name="name" value="{{ Auth::user()->name ? Auth::user()->name : Session::get('customername') }}" required> </div> <div class="form-group"> <label for="txt_email">Email</label> <input id="txt_email" class="form-control" type="text" name="email" value="{{ Auth::user()->name ? Auth::user()->email : Session::get('customeremail') }}"> </div> <div class="form-group"> <label for="txt_address">Địa chỉ giao hàng</label> <input id="txt_address" class="form-control" type="text" name="address" value="{{ Auth::user()->address ? Auth::user()->address : Session::get('customeraddress') }}" required> </div> <div class="form-group"> <div class="row"> <div class="col-md-6"> <select class="cmbCity selectpicker form-control border-radius-0" name="city" id="cmbCity" data-token="{{ csrf_token() }}" required> <option value="">Vui lòng chọn tỉnh/thành phố</option> @foreach($cities as $city) <option {{ $city->id == $currentCity ? 'selected' : '' }} value="{{ $city->id }}">{{ $city->type . " " . $city->name }}</option> @endforeach </select> </div> <div class="col-md-6"> <select class="cmbDistrict selectpicker form-control border-radius-0" name="district" id="cmbDistrict" data-token="{{ csrf_token() }}" required> @php $districtBelongItems = App\Models\District::where('province_id', $currentCity)->get(); @endphp @foreach($districtBelongItems as $district) <option {{ $district->id == $currentDistrict ? 'selected' : '' }} value="{{ $district->id }}">{{ $district->type . " " . $district->name }}</option> @endforeach </select> </div> </div> </div> <div class="form-group text-right"> <input class="btn btn-danger border-radius-5 font-size-20" name="submit" type="submit" value="Giao hàng địa chỉ này"> </div> </form> </div> </div> @endif <div class="col-md-3 small-right-position"> <div class="row"> <div class="col-xs-12"> Đơn hàng ({{ Cart::count() }} sản phẩm) <a class="btn btn-default pull-right" href="{{ URL::to('cart/checkout/list') }}">Sửa</a> </div> </div> <hr> @foreach(Cart::content() as $item) <div class="row"> <div class="col-md-8"> {{ $item->qty }} x <a class="linkInCard" target="_blank" href="{{ URL::to('product/'. $item->options->slug . '-' . $item->id) }}">{{ $item->name }}</a> </div> <div class="col-md-4 text-right"> {{ product_price($item->price * $item->qty) }} </div> </div> <div class="clearfix"></div> <hr> @endforeach <div class="alert alert-success border-radius-5"> Tạm tính: <span class="total_money text-right pull-right">{{ Cart::subtotal() }}đ</span><br> Phí vận chuyển: <span class="total_money shippingFee text-right pull-right">0đ</span><br> <!--get Customer--> @if ((Auth::check() && Auth::user()->id != 1) && App\Models\Setting::where('key', 'first_customers')->first()["value"] == 1) Khuyến mãi: <span class="total_money text-right pull-right">- 5%</span> @endif <!--end Get Customer--> <hr> Thành tiền: <span class="final_money text-right pull-right">0đ</span><br> </div> </div> </div> </div> </div> <script> $(document).ready(function() { var city_id = $('.cmbCity').val(); var district_id = $('.cmbDistrict').val(); var token = "{{ csrf_token() }}"; getShippingFee(city_id, district_id, token); }); $('.txt-phone').blur(function() { var phone = $(this).val(); var token = $(this).data('token'); $.ajax({ url: _base_url + "/cart/checkout/shipping/search-info", type: 'post', data: { phone: phone, _token: token } }) .done(function(result) { if (result.error == "false") { $('#txt_name').val(result.info.cus_name); $('#txt_address').val(result.info.cus_address); $('#txt_email').val(result.info.cus_email); } }) return false; }) $('.cmbCity').change(function (){ var city_id = $(this).val(); var district_id = $('.cmbDistrict').val(); var token = $(this).data('token'); getShippingFee(city_id, district_id, token); }) $('.cmbDistrict').change(function (){ var city_id = $('.cmbCity').val(); var district_id = $(this).val(); var token = $(this).data('token'); getShippingFee(city_id, district_id, token); }) function getShippingFee(city_id, district_id, token) { $.ajax({ url: _base_url + "/cart/checkout/shipping/calculatorfee", type: 'post', data: { cityId: city_id, districtId: district_id, _token: token } }) .done(function(result) { if (!result.error) { $('.shippingFee').html(result.shippingFeeFormat + 'đ'); $('.final_money').html(result.totalWithShippingFormat + 'đ'); } }) return false; } function validate(evt) { var theEvent = evt || window.event; if (theEvent.type === 'paste') { key = event.clipboardData.getData('text/plain'); } else { var key = theEvent.keyCode || theEvent.which; key = String.fromCharCode(key); } var regex = /[0-9]|\./; if( !regex.test(key) ) { theEvent.returnValue = false; if(theEvent.preventDefault) theEvent.preventDefault(); } } </script> @stop
35,861
https://github.com/whisk/ccc/blob/master/.vimrc
Github Open Source
Open Source
Apache-2.0
2,016
ccc
whisk
Vim Script
Code
32
105
set runtimepath+=$HOME/.vim set nocompatible set backspace=indent,eol,start set autoindent set smartindent set tabstop=2 set shiftwidth=2 set softtabstop=2 set expandtab set showmatch set ruler "set nohlsearch set incsearch set ignorecase set clipboard+=unnamed "set mouse=a
41,979
https://github.com/abigbug/common-cpp/blob/master/sources/src/PublicKey.cpp
Github Open Source
Open Source
MIT, LicenseRef-scancode-unknown-license-reference
2,018
common-cpp
abigbug
C++
Code
218
777
/** * Copyright (C) JoyStream - All Rights Reserved * Unauthorized copying of this file, via any medium is strictly prohibited * Proprietary and confidential * Written by Bedeho Mender <[email protected]>, August 8 2015 */ #include <common/PublicKey.hpp> #include <common/P2PKHAddress.hpp> #include <common/Signature.hpp> #include <CoinCore/hash.h> // ripemd160(sha256(pubkey)) #include <CoinCore/secp256k1_openssl.h> // CoinCrypto::secp256k1_key namespace Coin { PublicKey::PublicKey() : UCharArray<COMPRESSED_PUBLIC_KEY_BYTE_LENGTH>() { } PublicKey PublicKey::fromCompressedRawHex(const std::string &hex) { PublicKey pk; pk.setRawHex(hex); if(!valid(pk)) throw InvalidPublicKeyException(pk); return pk; } PublicKey PublicKey::fromCompressedRaw(const std::vector<unsigned char>& raw) { PublicKey pk; pk.setRaw(raw); if(!valid(pk)) throw InvalidPublicKeyException(pk); return pk; } size_t PublicKey::compressedLength() { return COMPRESSED_PUBLIC_KEY_BYTE_LENGTH; } std::vector<unsigned char> PublicKey::toCompressedRawVector() const { return getRawVector(); } PubKeyHash PublicKey::toPubKeyHash() const { return PubKeyHash(ripemd160(sha256(toCompressedRawVector()))); } bool PublicKey::verify(const uchar_vector & message, const Signature & sig) const { // Verify key validity: is required due to default constructor, // or direct access to UCharArray<> if(!valid(*this)) throw InvalidPublicKeyException(*this); // Create signature checking key for thisp public key CoinCrypto::secp256k1_key signatureCheckingKey; signatureCheckingKey.setPubKey(toCompressedRawVector()); // Check signature bool verified; try { verified = CoinCrypto::secp256k1_verify(signatureCheckingKey, message, sig.rawDER(), CoinCrypto::SignatureFlag::SIGNATURE_ENFORCE_LOW_S); } catch(const std::runtime_error & e) { // We may have error if the input was rejected by openssl return false; } return verified; } bool PublicKey::valid(const PublicKey & pk) { try { CoinCrypto::secp256k1_key checkingKey; checkingKey.setPubKey(pk.toCompressedRawVector()); return true; } catch (const std::runtime_error &) { return false; } } P2PKHAddress PublicKey::toP2PKHAddress(Network network) const{ return P2PKHAddress(network, toPubKeyHash()); } }
44,013
https://github.com/davwwwx/dotfiles/blob/master/.gdbinit
Github Open Source
Open Source
MIT, LicenseRef-scancode-warranty-disclaimer
2,020
dotfiles
davwwwx
GDB
Code
5
22
set disassembly-flavor intel source ~/apps/peda/peda.py
48,784
memoiresdesaints01sain_33
French-PD-diverse
Open Culture
Public Domain
1,879
Memoires de Saint-Simon
Saint-Simon, Louis de Rouvroy, duc de, 1675-1755 | Boislisle, Arthur André Gabriel michel de, 1835-1908 | Lecestre, Léon, 1861- | Boislisle, Jean Georges Léon Michel de, 1876-
French
Spoken
7,025
10,894
2. Lettre d'Henri Arnauld au président Barrillon, 1er avril; ms. Fr. 3778, fol. 64 v°. 3. On se rappelle que la marquise de Saint-Simon était tante du prince de Condé, et que, de plus, le premier écuyer avait failli, en 1632, faire nom mer celui-ci premier ministre, à la place de Richelieu ; voyez ci-dessus, Mé moires, p. 166-168. CLAUDE DE SAINT-SIMON. 453 vint, comme il le désirait, à faire retenir par cette juridiction supérieure la question de restitution ; on ne renvoya au Parlement que celle du remboursement des dégradations et de l'acquittement des dettes. Nous ne savons pas quel fut le résultat définitif; il y eut sans doute quelque transaction, car M. de la Vieuville avait déjà consenti à renoncer aux terres d'Arzillières et de Verigny, pourvu que le duc de Saint-Simon désinté ressât ses créanciers ; mais, quelle que fût l'issue du procès, l'effet moral ne put être que très-défavorable pour l'ancien favori de Louis XIII en étalant une fois de plus son avidité au grand jour, et en prouvant aussi que son crédit était épuisé à jamais '. De même, son frère aîné fut con damné, le 17 février 1644, « à rapporter le don qu'il avoit eu de quel ques impôts en Champagne, sur la confiscation de M. le Coigneux, avec les intérêts2. » Quoique la cour, dans ces conditions, dût être odieuse à notre duc, son service l'y retint jusqu'au mois d'août 1645 : mais il se démit de la charge de grand louvetier dès la fin de 1643, puis céda à M. de Maisons sa capitainerie de Saint-Germain et Versailles, et enfin vendit à Beringhen la charge de premier écuyer3, sans même conserver la jouissance des grandes entrées, car « on ne les gardoit point alors m quittant la charge qui les donnoit4. » Ayant ainsi rompu avec le Palais-Royal, il se consacra tout entier aux Condés, vers qui des rela tions de parenté l'avaient entraîné de tout temps, et dont il venait en core de se rapprocher en épousant la fille de sa propre belle-sœur, Mlle de Portes, cousine germaine de la princesse douairière8. Quand Monsieur le Prince mourut, en 1646, sa veuve et ses enfants, le héros, le prince de Conti et Mme de Longueville, conservèrent « les mêmes liaisons » avec leur parent, et ce fut ainsi qu'il se trouva engagé dans leur parti lorsque vint la Fronde. ^ De 1648 à 1652, le rôle politique de Claude de Saint-Simon prit une véritable importance : comme Louis XIII l'avait prédit à son favori, un jour vint où les événements de Guyenne firent du gouverneur de Blaye l'arbitre, en quelque façon, du sort de la royauté aux prises avec les princes et les parlements. Sa conduite fut douteuse, hésitante un instant. Tout dévoué au prince de Condé, il s'engagea d'abord dans la faction qui commençait la lutte contre Mazarin, et siégea parmi les oppo sants, à cette fameuse séance du 15 janvier 1648 où le Parlement délibéra 1. Journal d'Olivier d'Ormesson, tome I, p. 97, 105-107 et 162; factum im primé de M. de la Viouville, dans le ms. Dupuy 631, fol. 227-232. 2. Journal d'Olivier d'Ormesson, tome I, p. 153. 3. Ci-dessus, p. 151 et 194. 4. Addition n° 48, ci-dessus, p. 370. 5. Les fiançailles et la signature du contrat eurent lieu au Palais-Royal, le 7 septembre 1644, avec l'assistance de toute la cour; le mariage fut cé lébré le 26, au château de la Versine, que le marquis de Saint-Simon, beau père de la mariée et frère du marié, possédait depuis 1636. /,;;; APPENDICE II. sur les édits bursaux enregistrés le 13, en lit de justice1. Quelques jours plus tard, Olivier d'Ormesson le rencontrait chez Monsieur le Prince, louant fort la résistance des maîtres des requêtes, qui était le prélude de la Fronde*. Mais l'entente n'était pas encore absolument rompue entre la cour et le gouverneur de Blaye : celui-ci, qui avait tou jours à réclamer quelque arriéré pour le service de sa place, consentit, moyennant de belles promesses du premier ministre, à repartir pour la Guyenne, en se faisant, fort de « mettre le parlement et la ville de Bor deaux à la raison, en cas qu'il ne se rangeât à son devoir et abusât des bontés de Leurs Majestés5. » Il y passa l'été, renouvelant en toute occasion des demandes de crédit, entremêlées de protestations de dévoue ment. Vers la fin de l'année, revenu à Paris, nous le voyons se mêler de nouveau, sous la direction du prince de Condé et du duc d'Orléans, aux mouvements des cours souveraines. Le 16 décembre, il siège au Parlement, à côté des ducs de Joyeuse, d'Elbeuf, de Montbazon et de Brissac 4 ; il prend part aux délibérations orageuses qu'ont soulevées les prétendus manquements du gouvernement royal à la déclaration paci fique du 12 octobre. Mais c'est surtout à partir de l'année 1649 que les correspondances font connaître d'une façon suivie quel fut son rôle, et sur quels points, dans quelle mesure, ses intentions ou ses actions peuvent avoir été différentes de ce que nous lisons dans les Mémoires. Indécis encore plus que prudent, le duc était reparti pour Blaye, et, tout en entretenant avec Chavigny un commerce de lettres fort actif 8, il y demeura jusqu'à ce que la pacification de Paris lui permît de revenir à la cour, chercher soit une récompense de sa sage conduite, soit une occasion de faire valoir l'importance de son poste. Quand il se rendit à Compiègne, dans le courant du mois d'août, la lutte s'animait entre Mazarin, la vieille Fronde, Condé et les petits-maîtres. Ce fut natu rellement du côté de son cousin que Saint-Simon crut trouver l'a vantage, et il prit le rôle d'intermédiaire obligeant entre Monsieur le Prince et Chavigny, ménageant pour celui-ci les fonctions de guide et de mentor politique auprès du jeune vainqueur de Rocroy et de Lens. Mais, au moment où il croyait le succès de son plan assuré, le Cardinal saisit une occasion futile, la connivence de Condé dans l'affaire ridicule du petit maître Jarzé, et obtint de la Régente l'arrestation des Princes, le coup d'État du 18 janvier 1650. Saint-Simon avait été convoqué, avec les autres ducs, pour venir entendre au Parlement le manifeste royal qui s'expliquait sur l'emprisonnement de Condé, du prince de Conti et du 1. Cérémonial françois, tome II, p. 448. 2. Journal d'Olivier d'Ormesson, 27 janvier 1648, tome I, p. 431. 3. Bib. nationale, carnet XII de Mazarin, p. 97. 4. Journal d'Olivier d'Ormesson, tome I, p. 589 et suivantes. 5. Une partie de cette correspondance a été publiée par M. Chéruel, dans son étude sur Saint-Simon considéré comme historien de Louis XIV, p. 242 et suivantes. CLAUDE DE SAINT-SIMON. 455 duc de Longueville : il se trouva seul avec le duc de Luynes au banc des pairs '. Sa douleur, ses larmes même2, n'échappèrent à personne, au mi lieu du silence qui accueillit la déclaration, et, quand on apprit à la cour qu'il avait quitté immédiatement Paris, l'opinion commune fut qu'il allait, comme les autres partisans et serviteurs des princes prisonniers, comme Bouillon, Turenne, la Rochefoucauld, préparer une revanche. Depuis la rébellion du parlement et du peuple de Bordeaux, Blaye était devenu l'un des principaux centres des opérations de l'armée et du gou vernement royal : le duc d'Épernon, puis le maréchal du Plessis-Praslin et le comte du Dognon, y avaient établi une sorte de quartier général; et c'était précisément cette même place que convoitaient les Princes, car l'occupation d'un poste si avantageusement situé leur eût donné, en même temps que Bordeaux, toute la partie du Royaume située au sud de la Loire 5. Or on savait de bonne source que Saint-Simon, malgré son éloignement momentané, manœuvrait sous main contre le duc d'Éper non ; on l'accusait de détourner le parlement rebelle de la paix que la cour lui offrait, et de travailler pour le compte de Monsieur le Prince divers membres influents de la faction4. Tous les rapports s'accordèrent à annoncer qu'il venait aider le duc de Bouillon, et enlever au gou vernement royaliste la citadelle qui avait arrêté jusque-là les pro grès des Frondeurs s. L'esprit irrésolu de Saint-Simon ne s'était encore arrêté à aucune décision, lorsque se produisit le coup d'État du 18 janvier. C'est un chagrin des plus sincères, mêlé de quelque inquiétude pour sa sû reté personnelle, qui le poussa à quitter Paris et à se diriger, non pas directement sur Blaye, mais vers quelque autre asile, la Ferté sans doute, où il passa plusieurs semaines à attendre et à réfléchir. Au bout d'un mois, il écrivit au Cardinal une lettre d'explications, ou plutôt d'excuses, sur son « prompt départ, » lettre à laquelle Mazarin répondit le 28 février 6, sur un ton ironique, sans paraître se douter des menées dont Blaye était l'objet, ni savoir ce dont il était dûment averti par d'Épernon, par le garde des sceaux Châteauneuf et par d'autres amis, que le Parlement et la noblesse étaient allés faire leur cour au gouverneur de Blaye dès son arrivée, qu'il faisait des travaux aux for tifications, et que, s'il était « homme à entreprendre, » il pourrait devenir aussi redoutable que M. de Bouillon lui-même. 1. Suite du journal des assemblées du Parlement, p. 33. 2. Dossier Roovroy, fol. 94, au Cabinet des titres. 3. Voyez les Mémoires, ci-dessus, p. 198. A. Mazarin a noté cela sur son carnet n° XIII, p. 74. 5. Voyez les rapports tirés par M. Tamizey de Larroque de la correspon dance de Mazarin (Arch. nat., KK 1217-1221), et publiés dans les Archives historiques du département de la Gironde, tomes II et suivants. 6. Dépôt des affaires étrangères, Lettres de Mazarin, vol. 33, fol. 105; Sninl-Snium considéré comme historien, par M. Chéruel, p. 252. ',:;<; APPENDICE II. En effet, les Princes négociaient de ce côte" : Lenet, la Rochefou cauld, l'évêque d'Angoulôme et le chevalier de Taudias s'employaient à la fois auprès de Saint-Simon. Celui-ci prit-il alors un engagement formel de se déclarer pour eux? La Rochefoucauld l'affirme. Lenet ne le dit pas aussi positivement, et exprime le regret « de ce que la duchesse..., toute-puissante sur son mari et très-passionnée pour la maison de Monsieur le Prince, n'étoit pas à Blaye avec lui... '. » En fait, Saint-Simon, considérant « que M. de Turenne étoit foible, que Saumur étoit rendu, que le Cardinal s'autorisoit à Paris, que les Frondeurs étoient sincèrement unis avec lui, que Bellegarde traitoit, » n'avait pas même voulu donner sa parole de se trouver à l'assemblée de la noblesse rebelle. Mais, son frère aîné, qui était à la cour, l'ayant averti des bruits qu'on y répandait contre lui, Claude écrivit de Blaye, le 7 avril, au garde des sceaux Châteauneuf, une lettre où il protestait de ses inten tions bonnes et pures. « Nous ne sommes pas des gens fort dissi mulés, disait-il; nous aimons à vivre avec honneur, par le chemin du gentilhomme...2. » Mazarin saisit l'occasion, et lui fit défendre, au nom du Roi, s'il craignait tant de lui « déplaire et désobéir, » de recevoir la femme et le fils de Condé, dans le cas où, malgré les ordres du souverain, ils quitteraient le Berry 5. Dès lors, rappelé au devoir par cette sommation du fils de son bienfai teur, peut-être aussi, disons-le par la considération des succès de l'au torité royale en Normandie et en Bourgogne, Saint-Simon n'hésite plus un seul instant. Il répond à Leurs Majestés sur le ton le plus dévoué; il écrit en même temps au secrétaire d'État le Tellier une lettre justifi cative 4, et, vers le 28 avril, il dépêche à Madame la Princesse un gen tilhomme chargé de la prévenir qu'elle ait à ne pas bouger deMontrond, surtout à ne pas songer à Blaye. Soit qu'elle fût déjà en route, soit qu'elle voulût feindre, ce qui est plus probable, de n'avoir point reçu l'avertissement, la princesse lui envoya de Turenne le vieux Filzjean, serviteur tout dévoué à la maison de Condé 5, pour annoncer sa marche. Le duc s'affermit encore dans sa résistance : n'ayant pris aucun engage ment par lui-même ni par son frère, il menaça de charger les ducs, s'ils se présentaient aux portes, même d'arrêter la princesse, pour peu que le Roi l'ordonnât, et il renvoya Filzjean, avec une lettre où il adjurait sa cousine de renier des conseillers perfides 6. Prière d'abord, ironie 1. Mémoires de P. tenet, p. 242 et 249. 2. Musée Britannique, mss. Egerton, n° 13, fol. 167-168. 3. Correspondance de Claude de Saint-Simon, Bib. nat., ms. Fr. 8563, fol. 7. 4. Minute; ms. Fr. 8563, fol. 6 v°. 5. Etienne Filzjean (ou Fitzjean), grand maire de Donnemarie, avait, en 1635, un fils dans la compagnie de M. de Saint-Simon {Revue historique et nobiliaire, 1869, p. 105). 6. Saint-Simon considéré comme historien, p. 259. Voyez aussi les Mé moires de P. Ijenet, p. 275. CLAUDE DE SAINT-SIMON. 457 ensuite, la princesse usa de tout pour le ramener à elle. Mais rien ne pouvait plus avoir de prise sur Saint-Simon, « ni l'honneur de l'alliance si proche, ni le dépit amer contre la Reine *. » Désespérant de l'entraîner, on tenta du moins de le compromettre de telle façon qu'il ne lui restât plus de salut en dehors des Princes; la correspondance de Saint-Simon avec la cour en témoigne presque à chaque ligne2. Quand, par exemple, le 27 avril, on eut vu paraître au Parlement la princesse douairière de Condé, escortée de l'aîné des Saint-Simon, cette démarche généreuse du marquis fut exploitée contre le duc5, qui pourtant ne devait plus dévier de son devoir. Les Mé moires* racontent que l'Espagne essaya de se faire ouvrir par lui l'en trée du fleuve, qu'elle lui offrit d'abord la grandesse et beaucoup d'éta blissements, puis qu'elle envoya un second messager, avec « des pro positions encore plus fortes. » Voici ce que raconte le duc lui-même, dans une lettre adressée le 10 mai au cardinal Mazarin : « Monseigneur, une occasion fort extraordinaire et assez importante m'oblige d'envoyer ce gentilhomme, qui rendra compte à V. É. d'une effronterie espagnole en laquelle elle connoîtra de nouveau et ma fermeté dans mon devoir au service de Leurs Majestés, et l'âpreté des ennemis pour aider à brouiller et révolter cette province. Vous connoîtrez, Monseigneur, par son rapport, qu'ils ne veulent épargner ni soins ni argent pour cor rompre le monde; je suis enragé contre eux qu'ils aient pu avoir cette pensée de moi, et je n'aurai jamais de consolation de ne m'être pas trouvé en état de rendre à Leurs Majestés un très-signalé service : le mauvais temps nous empêcha tout hier de pouvoir agir sur la rivière.... Je suis au désespoir d'avoir vu une occasion pareille sans pouvoir ser vir selon ma passion. Si j'avois cent ans de vie, jamais chose semblable ne m'arrivera.... Je supplie très-humblement V. É. de me vouloir ex cuser si ma lettre est longue : la matière m'emporte un peu, par la passion que j'ai au service de Leurs Majestés et à témoigner à V. É. que je suis, etc. 5. » Ces protestations n'étaient point inutiles, car, de toutes parts, des dénonciations anonymes arrivaient en cour, donnant à supposer que l'Espagne avait fait faire des offres d'argent, et qu'elles eussent pu trouver 1. Mémoires, ci-dessus, p. 198. 2. Les minutes de lettres sont conservées dans la correspondance de Claude de Saint-Simon, ms. Fr. 8563; nous avons retrouvé l'original d'une lettre au garde des sceaux Chàteauneuf (datée du i mai) au Musée Britannique, dans le ms. Egerton 13, fol. 95. '.). Il est impossible toutefois de croire, comme le disent les Mémoires (ci-dessus, p. 221-222), qu'on put faire confusion entre l'assistance donnée par le frère aîné à sa proche parente et la prétendue promesse écrite par le duc de livrer la ville de Blaye. A. Ci-dessus, p. 198-199. 5. Archives nationales, KK 1218, fol. 249-251. 488 APPENDICE II. un bon accueil à Blaye *. En réalité, l'un des rapports que nous venons d'in diquer établit qu'un vaisseau espagnol, escorté de quatre brigantins et de quatre pinasses, sous pavillon flamand, avait paru inopinément en vue de Blaye. « M. de Saint-Simon fut ou dut être surpris, et fit mine de (sic) le vouloir connoître; mais il en fut éclairci sur le soir par le mar quis de Lusignan*, qui partit d'ici (Bordeaux), sur l'avis de l'arrivée de ce vaisseau, le dimanche à midi, après en avoir sollicité ceux de sa ca bale. Étant à Blaye, il ne trouva pas M. de Saint-Simon disposé à lui donner ce qu'il souhaitoit, qu'on dit être une permission de mettre dans sa place une somme notable d'argent. » Cette somme était destinée, non pas au gouverneur de Blaye, mais à M. de Bouillon et aux rebelles de Bordeaux; on fit courir le bruit que les brigantins, échappant à la sur veillance de la garnison royaliste, avaient pu décharger l'argent, de nuit, à la Roque-de-Tau5, tandis que, justement inquiet, M. de Saint-Simon prévenait le Parlement et faisait suivre le vaisseau jusqu'à sa sortie de la rivière. Cette démonstration de fidélité lui valut les fureurs de la Fronde bordelaise, qui « dit tout dans ses ressentiments, et le fit passer pour un ennemi de tous côtés et mal assuré de ce qu'il devait faire4. » Le mar quis de Lusignan porta les faits à la connaissance de la princesse de Condé, et se plaignit que la résistance du gouverneur de Blaye eût forcé le commandant du vaisseau espagnol de remporter à Saint-Sébastien les sept cent mille livres qu'il avait charge de faire passer à Bordeaux a. Ce fut alors que la princesse, brusquant les choses, fit savoir qu'elle se mettait en route pour Bordeaux. Saint-Simon lui répondit, le jour même, qu'elle n'avait à attendre de lui rien de contraire à l'obéissance et à la fidélité qu'il devait à Leurs Majestés, et, le lendemain, il fit tenir à la Reine la lettre de la princesse, en même temps qu'il envoyait 1. Mme de Motteville raconte qu'il refusa huit cent mille livres. (Mémoires, tome III, p. 196.) 2. C'était le principal intermédiaire du parti des Princes avec l'Espagne, et un rapport envoyé par le duc d'Épernon le désignait comme chargé de faire les offres à Saint-Simon. 3. Lenet dit au contraire (p. 265) que le débarquement ne put avoir lieu, et, dans un autre endroit (p. 293), il s'exprime ainsi, en parlant du baron de Watteville, qui représentait l'Espagne et devait commander le débarquement projeté : « Quand il avoit paru dans la rivière pour mugue ter Bordeaux et Blaye, sur ce qu'on lui avoit dit que le duc de Saint-Simon étoit dans nos intérêts, il s'en retira d'abord et sema le bruit qu'il avoit des sommes immenses, qu'il auroit déposées à Blaye, si ce duc l'y avoit voulu recevoir. Nous avons pourtant su depuis.... qu'il n'y portoit autre chose que des paroles pour l'embarquer dans le parti par les espérances d'une grande fortune. » 4. Arch. nat., KK 1218, fol. 256; pièce publiée par M. Tamizey de Larroque, dans les Archives historiques de la Gironde, tome III, p. 421-422. 5. Mémoires de P. Lenet, p. 265. CLAUDE DE SAINT-SIMON. 459 au cardinal Mazarin ' une généreuse protestation en faveur de ces pa rents mêmes, Monsieur le Prince et sa femme, qui ne cherchaient qu'à le compromettre. Ces dispositions loyales étaient toujours interprétées avec défiance des deux côtés : si, d'une part, le marquis de Lusignan reprochait à Blaye d'être « plus Mazarin que le bois de Vincennes, » d'autre part, Com minges accusait M. de Saint-Simon d'avoir « un commerce perpétuel avec tous les ennemis de Leurs Majestés, » et M. d'Épernon, dans un billet8 écrit au Cardinal le 24 mai, lui prêtait de très-singuliers discours aux jurats et aux habitants de sa ville. Les lettres du duc, accompagnant celle de sa cousine, produisirent un heureux effet, comme son frère, qui était présent à l'arrivée du courrier, se hâta de le lui écrire, le 25 mai : « .... Vous avez fait très-bien votre devoir. Cela aura possible quel ques suites.... Ils ont cru vous embarrasser, et que vous garderiez cette lettre, et qu'étant telle qu'elle est, que vous ne l'oseriez montrer; et que, ne le montrant pas, vous étiez engagé : et en effet, vous auriez été en peine. Mais ces gens-là ne savent quels sont les gens de bien et qui ont lame noble3.... » Le marquis ne parle guère de lui-même dans cette correspondance ; on continuait cependant à lui attribuer une. certaine part dans les intrigues dont Madame la Princesse, à défaut de son mari, était le centre ; on disait même qu'il y avait entraîné sa belle-sœur et belle-fille la duchesse de Saint-Simon, qui n'avait pas suivi le duc en Guyenne. Un des agents les plus actifs et les plus dévoués du duc, un certain « Saint-Paul Giscard, » que nous croyons être des Guiscard la Bourlie4, et qui se trouvait alors en cour, lui signala en termes alarmants les conséquences que pouvait avoir cet attachement trop public pour la cause des Princes5. Mais on jugea prudent de ne pas trahir la moindre inquiétude à cet endroit, et, tandis qu'une lettre signée du jeune roi allait rassurer et remercier le gouverneur de Blaye, le premier ministre ajoutait lui même à ces témoignages de confiance deux lettres chaleureuses, écrites coup sur coup, le 25 et le 26 mai. En retour, Saint-Simon offrit de s'entremettre auprès de Madame la Princesse, qui venait de s'introduire, avec son fils, dans Bordeaux 1. La minute (Bib. nat., ms. Fr. 8563, fol. 12 v°) est beaucoup moins longue que l'original (Arch. nat., KK 1218, fol. 264), qui a été publié parM. Tamizey de Larroque, tome III, p. 426. 2. Archives nationales, KK 1218, fol. 272; publié par M. Tamizey de Lar roque, tome III, p. 272. 3. Bib. nat., ms. Fr. 8564, fol. 159. Ce second volume du recueil de lettres adressée* au duc de Saint-Simon et de minutes préparées par lui se termine par un certain nombre de lettres de son frère, du plus haut intérêt; malheureu sement, 1<' déchiffrement en est des plus pénibles, et il n'y a aucun ordre (iiin^ les pièces, qui n'ont généralement pas de date, et souvent sont mutilées. 4. Voyez les Mémoires, tome IV, p. 113. 5. Bib. nat., ms. Fr. 8563, fol. 14, lettre du 25 mai. 460 APPENDICE II. (31 mai), « afin, disait-il *, de la tirer de cet embarquement où elle est en gagée par un pernicieux conseil..., puisque Votre Éminence m'assure que la Reine l'aura bien agréable. Il n'est pas encore temps, ajoutait-il, que je paroisse: j'attendrai le retour populaire, dont je ne désespère pas. L'on est maintenant en joie, et tout de chagrin contre moi; mais nous pour rons trouver un temps favorable. » En même temps, il intercédait pour ceux de son nom qui s'étaient compromis à Paris: « J'aurois, disait-il, un fort grand déplaisir si mon frère et Mme de Saint-Simon avoient déplu à Leurs Majestés en quelque chose. Cela ne sauroit arriver que par un fort grand malheur, leurs intentions étant certainement bien sincères et toutes bonnes. Je demande à Votre Éminence d'avoir agréable de prendre en mon frère toute confiance pour ce qui me regarde, et de le considérer comme un gentilhomme incapable de jamais manquer à son premier devoir. » La sincérité de ces protestations se trouva enfin confirmée par tous les rapports de ceux mêmes qui avaient montré le plus de défiance : MM. d'Épernon et de Comminges reconnurent les premiers qu'il n'y avait plus lieu de soupçonner Saint-Simon ; que, s'il s'était déclaré hautement le « très-humble serviteur de Monsieur le Prince et de Madame la Prin cesse, » c'était par pure courtoisie, et qu'il ne « ferait rien contre le service du Roi; » que, bien au contraire, ses amis et ses agents n'avaient cessé de représenter aux Rordelais l'arrivée de la princesse comme une éventualité menaçante, qu'il fallait éviter à tout prix2. Aussi une nou velle lettre du Roi partit-elle pour Blaye5, annonçant la prochaine arrivée en Guyenne de S. M., qui comptait sur le concours et la fidélité du duc Claude, et l'on joignit à cette dépêche une commission pour former un régiment d'infanterie de vingt compagnies et pour ajouter cinq com pagnies de cavalerie au régiment de Saint-Simon, qui devait servir dans l'armée du maréchal de la Meilleraye, contre Bordeaux4. Peu après, on lui accorda pour son frère, le commandeur de Malte, la petite abbaye de Saint-Sauveur de Blaye; plus tard encore, dans le courant du mois d'octobre, on augmenta de deux cents hommes la gar nison de sa place8. Le duc se hâta de profiter de ces apparences de bonne volonté pour renouveler toutes les réclamations dont il avait si longtemps et si vainement assailli les ministres; il demanda des réparations pour l'en ceinte de Blaye, de l'artillerie et des munitions pour son arsenal, qui 1. Lettre du 5 juin |1650, publiée par M. Tamirey de Larroque, tome IV, p. 456. 2. Mémoires de P. Lenet, p. 274. 3. Lettre du H juin 1650, dans le ms. 8563, fol. 19. 4. Ms. 8563, fol. 23. Il y avait six ans (Dépôt de la guerre, vol. 82, n* 603) que le duc demandait à lever un régiment d'infanterie. 5. La garnison ordinaire n'était que de cent cinquante hommes, et encore avait-on retranché deux mois de montre en 1647. CLAUDE DE SAINT-SIMON. 464 n'avait rien reçu depuis deux ans, et de l'argent surtout. « Mon crédit, disait-il, est tout épuisé, en sorte que je ne puis plus trouver d'argent pour faire subsister la garnison. J'ai avancé aussi, pour les réparations, des sommes bien grandes pour un homme comme moi. Depuis la Ré gence, je n'ai pas touché une année de mes pensions, et j'ai beaucoup perdu d'ailleurs1.... » On continua à le payer en belles paroles et en promesses vagues pour un temps meilleur. Il est vrai que l'auteur d'un ouvrage curieux, quoique apocryphe, les Mémoires de M. de Bordeaux, affirme que la cour acheva de s'assurer la place de Blaye en donnant au gouverneur une « bonne somme d'argent2, » comme elle le fit plus tard à l'égard du gouverneur de l'Aunis et de Brouage5; mais pas une des pièces que nous avons pu consulter, ne renferme trace de transaction de ce genre ; et, d'autre part, il est prouvé que les sommes avancées par Saint Simon ne lui furent remboursées ni en 1650, ni à aucune autre époque de sa vie4. Quand le Roi arriva à Libourne, le 1er août, le duc s'y rendit, suivit la cour pendant tout son séjour dans la province, la reçut à Blaye, après la reddition de Bordeaux, et l'y régala splendidement, le 15 oc tobre3. Là encore, on lui renouvela les promesses de secours et de renforts pour faire face aux éventualités qui pouvaient se produire du côté de l'Espagne. En attendant que ces promesses se réalisassent, il fit exécuter, à ses propres frais, des travaux de défense qui ne tardèrent pas à donner de l'ombrage et à susciter plus d'une dénonciation de la part des anciens frondeurs de Bordeaux. Au commencement du mois 1. Archives nationales, KK 1218, fol. 489, lettre du 1er septembre 1650, publiée par M. Tamizey de Larroque, tome IV, p. 528. 2. « Le duc de Saint-Simon avoit tiré aussi au Cardinal une bonne somme d'argent pour se ranger de son côté, et il avoit cru le pouvoir faire d'autant plutôt qu'outre que c'étoit la mode, dans ce temps-là, de se faire bien payer pour être fidèle, il n'étoit pas riche, quoique le feu roi, dont il avoit été favori, l'eût comblé d'une infinité de bienfaits, car il lui avoit donné en moins de rien la charge de premier écuyer de la petite écurie, celle de pre mier gentilhomme de la chambre, le gouvernement qu'il avoit présentement, avec quantité d'autres gratifications, sans compter la dignité de duc et pair, qu'il avoit mise encore dans sa maison. Pour récompense néanmoins de toutes ces grâces, à peine avoit-il eu les yeux fermés, qu'il avoit pris parti contre son fils : tant il est vrai qu'on ne se fait pas trop de scrupule d'être ingrat, quand on se flatte qu'on tirera quelque fruit de son ingratitude. » (Mémoires de M. de Bordeaux, par G. des Courtilz de Sandras, tome III, p. 231-232.) 3. Le comte du Dognon, qui reçut, en avril 1653, le bâton de maréchal, un brevet de duc et pair, et cinquante mille louis d'or, pour se démettre de ses gouvernements. {Mémoires de Saint-Simon, tome IX, p. 313.) 4. La preuve en est dans un état des créances actives de son fils, dressé lors du mariage de celui-ci avec Mlle de Lorge, en 1695. 5. Mémoires de Retz, tome III, p. 66 et 67. 46-2 APPENDICE II. de novembre, ils se plaignirent au Roi qu'il avait bouché une passe de la rivière, soit pour faire quelques nouvelles exactions sur les navires qui passaient « à l'ombre de son bastion, » soit même pour fortifier sa retraite et s'en assurer la possession contre tous1. Cette « affaire, » comme on l'appela alors, finit même par prendre tant d'importance aux yeux des Bordelais, qu'ils envoyèrent des dépu tés en cour. Mais le duc s'empressa de faire donner des explications par son ami Saint-Paul. « Blaye, lui écrivait-il le 29 décembre 1650, est menacé d'attaque et de siège Le dessein en est formé et au dehors et au dedans. Il y a plus de trente vaisseaux de guerre dans les ports de la Biscaye, que le roi d'Espagne fait mettre en état de faire voile, avec tous les préparatifs nécessaires pour entreprendre et atta quer.... Vous pouvez juger si, parmi tous ces avis, on est alerte (sic) ici, où les Espagnols peuvent venir en vingt-quatre heures, et ceux du dedans y peuvent fondre en même temps. Chacun sait le mauvais état de la place : la foiblesse de la garnison, notre nécessité d'argent et de toutes choses, sont ces connoissances qui font former les desseins et les entreprises sur les places. Ils savent qu'avec Blaye ils pourront tout : l'on fait entendre au roi d'Espagne que, s'il en étoit maître, il auroit de l'argent, et par le moyen de l'eau et par le moyen de la terre, suffisamment pour pousser et entretenir la guerre contre nous. Si ce malheur étoit arrivé, l'on pourroit dire adieu à la province de Guyenne.... Vous savez que l'on m'avoit accordé le payement de la garnison, pour l'année 48, sur les tailles de cette élection, que M. Jean nin avoit donné la parole du consentement; mais Messieurs de l'Épar gne se sont ravisés : ils me disputent cette affaire, la troublent et la veu lent absolument renverser. Mais j'espère que S. É. ne le souffrira pas, et qu'elle voudra qu'une chose qui m'a été si solennellement promise soit tenue. Souvenez-vous combien l'on nous a fait valoir cette jus tice comme une grâce bien extraordinaire. Je vous avoue que je suis presque au désespoir de me voir traiter de la sorte2.... » On voit que les Mémoires n'ont exagéré, sur ce point particulier, ni le dévouement absolu de notre duc 3, ni l'importance réelle du service qu'il rendit au jeune roi. D'ailleurs, comme si ce n'était pas assez que Claude de Saint-Simon fût en proie aux soucis de la chose publique, ses plus proches eux-mêmes 1. Archives nationales, KK 1219, fol. 32. A la lettre originale, publiée par M. Tamizey de Larroque (tome VI, p. 430 et 431), est joint un plan ma nuscrit de la rivière, qui explique l'importance de la position de Blaye. 2. Archives nationales, KK 1219, fol. 79. 3. Ci-dessus, p. 199 : « Il fit fondre force canon, mit cinq cents gentils hommes bien armés, habilla et paya la garnison, fut dix-huit mois comme bloqué, sans avoir jamais rien voulu prendre sur le pays; aussi contracta t-il de grandes dettes pour toujours. » Comparez les Mémoires de P. Lenct. p. 320, 323, etc. CLAUDE DE SAINT-SIMON. 463 faillirent encore le compromettre. « .... Je suis fâché, écrit le marquis au duc, et avec appréhension pour M. le commandeur1, que M. d'Or léans a menacé de la Bastille pour avoir semé et donné des billets séditieux pour se trouver à la Grève, pour avoir excité le bruit du Palais. Ce sont ses ennemis qui lui rendent ces mauvais offices. On lui impute toute sorte de discours qui ont été faits, qui sont horribles, et dont il n'est pas capable. Il est vrai que sa conduite est toujours extra ordinaire. Toutes ces choses vous sont mandées à cette fin que vous les sachiez, pour n'en parler qu'en temps et lieu, qui n'est pas encore. Ne m'en écrivez rien. Gardez, si vous voulez, ma lettre, qui vous en fera souvenir. Si vous avez fait mémoire des choses qui se sont passées, en temps et lieu vous vous en servirez....2 » Ce commandeur de Saint-Simon était en effet fort « extraordi naire » et très-compromettant pour ses proches. Plusieurs fois, son frère Claude avait eu à implorer pour lui l'indulgence de la cour, et c'est au lendemain du jour où il venait d'obtenir pour lui l'abbaye de Blaye d'une part, et d'autre part la commanderie du Piéton, qu'il atti rait sur sa tête les sévérités du prince à qui Paris avait été confié pen dant le voyage de Guyenne. Loret nous apprend3 qu'il se déroba au châtiment par une prompte retraite. Méprisable personnage d'ailleurs 4, le commandeur joua le plus triste rôle dans cette seconde partie de la Fronde, si l'on s'en rapporte au témoignage du cardinal de Retz 5. La duchesse de Saint-Simon était restée à Paris, et nous avons vu qu'elle y avait pris part aux intrigues du parti des princes prisonniers, comme tant d'autres beautés de ce cercle de Chantilly dont l'histo rien de Mme de Sevigné a décrit l'aspect séduisant 6 ; ce fut à Paris encore qu'elle accoucha, le 18 septembre, d'un fils, qui reçut le nom révéré 1. Leur frère cadet, commandeur de l'ordre de Malte. 2. La fin de la lettre du marquis est inintelligible; Bib. nat., ms. Fr. 8564, fol. 164. 3. La Muse historique, n° du 25 août 1650. On trouve dans un recueil de la Maison du Roi (Arch. nat., 01 2, fol. 15) la copie d'une lettre de cachet qui fut sans doute adressée au commandeur en cette occasion : « Votre conduite m'ayant appris que vos intentions n'étoient pas moins contraires à mon ser vice que votre séjour dans Paris, j'entends qu'incontinent cette lettre reçue, vous en partiez, et que vous vous en alliez droit à Malte. » 4. Voyez son article ci-dessus, appendice n° I, p. 416 et 426-427. 5. Une première fois (Mémoires, tome III, p. 328), Retz parle do « la misé rable fortune du commandeur de Saint-Simon, chef des criailleurs du parti des Princes. » Une seconde fois (tome IV, p. 203 et 207), il dit encore : « Pesche étoit tous les jours dans la cour de l'hôtel de Condé, et le com mandeur de Saint-Simon ne bougeoit de l'antichambre. Il faut que ce der nier ie soit mêlé d'un étrange métier, puisque je, nonobstant sa qualité, n'ai pas honte de le confondre avec un misérable criailleur de la lie du peuple. » 6. Mémoires sur Mme de Sévigné, par Walckcnacr, tome II, p. 32-35. 464 APPENDICE II. de Louis et le titre de marquis de Portes1. Malgré l'éloignement de son mari, elle prolongea un séjour qui pouvait avoir quelque utilité, puisqu'elle était rentrée en faveur. De son côté, Charles de Saint-Simon ne cessait de conseiller, de renseigner son frère Claude ; ses lettres de l'année 1651 sont pleines de détails intéressants, et le style en est parfois des plus élevés, l'accent des plus généreux. Il écrit, vers le mois de mars 2 : « Nous voyons aller la foiblesse de la cour, laquelle est générale, car tout est dans la peur et dans l'aveu glement; nul ne voit clair, ce qui nous dénote une perdition générale, et l'État en un grand et périlleux hasard. Toutes choses manquent ; l'on y voit bien des remèdes, mais personne ne se met en devoir de le[s] mettre en usage : de sorte, mon cher frère, qu'en cet état où je vois toutes choses, il m'est bien difficile de vous donner ni conseil ni mesures, sinon celui que vous avez toujours mis en pratique, qui est d'avoir pour objet Dieu et le Roi, netteté de conscience, et faire et sui vre votre devoir. Voilà en général les guides.... Pour le détail, vous devez écrire à Monsieur le Prince sur le changement ; si c'est agréable à votre respect, vous le continuerez. Vous devez aussi écrire à la Reine, et lui mander comme je vous ai fait savoir quelque chose des intentions de S. M : (sic), que vous ferez, mais que S. M. sait votre état, auquel vous la suppliez de pourvoir et vous donner ses volontés par écrit, que le pos sible sera fait. Du surplus, si l'on s'adresse à vous pour traiter de Blaye, vous devez dire que tout ce qui est à vous est en la disposition de : ; mais qu'étant un dépôt qui vous est confié, que vous ne pouvez pas qu'après la volonté de S. M: ; que quand le Roi le trouvera bon, que vous ne resterez à ce qui sera de vous, ayant toujours passion, etc. « Quand vous écrirez à la Reine, vous lui manderez, si vous plaît, comme vous croyez que j'ai assuré S. M. de votre fidélité au service, et que vous attendez que l'on vous en donne les moyens, ainsi que S. M. vous a fait dire et que M. Servien a assuré : « Ne me pouvant adresser « qu'à Votre Majesté, voulant garder le secret de Votre Majesté, et « voulant toujours servir le Roi, mon bienfaiteur, en la manière qui « vous plaira me faire savoir ou commander, » ce qui dépendra de vous sera employé avec grande joie en toutes rencontres. Vous man derez quelque chose des frontières. Voilà, à mon sens, ce qui se peut dire.... » Deux autres lettres, du 8 et du 9 mai suivant, écrites coup sur coup, exposent clairement quels dangers le ressentiment du prince de Condé, ou plutôt de ses amis, fit courir au gouverneur de Blaye. On voulait tout à la fois le perdre à jamais dans l'esprit de la Régente et lui enlever sa citadelle, sans laquelle le prince ne serait jamais maître qu'à moitié du gouvernement de Guyenne. Par bonheur pour Saint-Si 1. Il fut baptisé à l'église Saint-Sulpice de Paris. 2. Ms. Fr. 8564, loi. 170. CLAUDE DE SAINT-SIMON. 465 mon, son frère et la marquise purent parer habilement les coups. Le marquis lui écrivait, le 8 mai1 : «.... Hier, après diner, votre belle sœur fut au Palais-Royal, sur ce que la Reine avoit dit que Monsieur le Prince avoit dit à S. M. que vous lui aviez promis et donné parole. Nous crûmes qu'il ne falloit pas laisser traîner ce bon office, quoique ce soit chose qui se détruise d'elle-même ; et voyant comme la Reine a fort agréable votre belle-sœur, elle y fut. Elle la mena dans son oratoire. Là.... elle lui dit : « Mais, Madame, l'on dit que Monsieur « le Prince a dit à V. M. que mon beau-frère avoit promis et donné « parole. — Il est vrai qu'il me l'a dit. » Elle repartit qu'elle étoit assurée que cela n'étoit pas, et qu'elle savoit que cela ne se seroit pas fait sans son su, et que d'ailleurs cela ne se pouvoit faire sans avoir écrit ou quelque traité, ou du moins quelque billet en créance, mais que cela ne se trouvoit pas ; il ne se trouvoit pas même un seul homme qui dise : « Il me l'a promis et me l'a dit. » — « Enfin, « Madame, ils sont enragés contre lui de ce qu'il a servi le Roi, et vou « droient fort le détruire, s'ils pouvoient. Mais il est très-fidèle et re « connoissant. Je supplie Votre Majesté de le croire. » La Reine lui dit qu'elle en étoit très-satisfaite. Elle lui dit : « Mais, Madame, que « Votre Majesté soit à l'épreuve, si lui plaît, des mauvais offices qui « n'ont pour fondements que la fidélité des services. » La Reine lui promit fort, et qu'elle s'en souviendroit toujours, et que le Roi en témoi gnera toujours reconnoissance. La séparation en fut fort agréable pour vous, avec assurance que vous seriez assisté. Il vous est très-dange reux de mettre votre place à prix, ainsi que je vous l'ai mandé. La Reine ne consentira jamais que vous vendiez votre gouvernement, et cela vous feroit tort ; d'autant plus que ce seroient des avances inutiles et sans effet, qui feroient déplaisir au Roi et à son service.... » Le jour suivant, 9 mai, Charles de Saint-Simon reprenait la plume et écrivait à la hâte : « C'est enfin M. d'Argicourt qui portera cette lettre, lequel s'en va en Catalogne, où votre régiment a ordre d'aller. L'on me fait espérer que votre compagnie demeurera auprès de vous; j'y tiendrai la main. L'affaire du gouvernement est indécise encore. Il n'y avoit hier rien de fait, quoique chacun, et particulièrement2....] assurent qu'il ne se fera pas, et en allèguent force raisons; les autres en donnent beaucoup pour le contraire, lorsqu'il en est parlé. La principale clause que la Reine propose, c'est à condition que l'on ne pensera jamais à Blaye5. Hier, étant au Palais-Royal, S. M. m'appelle et me dit de vous assurer que l.Mi. Fr. 8564, fol. 166. 2. Lacune dans le manuscrit. 3. La Rochefoucauld (tome II, Mémoires, p. 2'>7) raconte en eiïot que « la Heine nioit d'avoir jamais écouté la proposition de Blaye, et accusoit M. Ser ■vif-n de l'avoir faite exprès pour rendre les demandes de Monsieur le Prince «■i hautes qu'il lui fut impossible de les accorder. » ■faOlBM DR SAINT-SIMON. 1 30 466 APPENDICE II.
3,382
https://it.wikipedia.org/wiki/Castello%20di%20San%20Genesio
Wikipedia
Open Web
CC-By-SA
2,023
Castello di San Genesio
https://it.wikipedia.org/w/index.php?title=Castello di San Genesio&action=history
Italian
Spoken
15
27
Castello di San Genesio – a Canneto sull'Oglio Castello di San Genesio – a Grignasco
30,664
https://en.wikipedia.org/wiki/State%20of%20the%20Coast
Wikipedia
Open Web
CC-By-SA
2,023
State of the Coast
https://en.wikipedia.org/w/index.php?title=State of the Coast&action=history
English
Spoken
213
357
The State of the Coast is a website launched by the National Oceanic and Atmospheric Administration (NOAA) in March 2010. The site contains quick facts and detailed statistics offered on communities, economy, ecology, and climate. The website aims to communicate and highlight the connections among a healthy coastal ecosystem, a robust U.S. economy, a safe population, and a sustainable quality of life for coastal residents. The Web site is periodic, and is updated on a monthly basis. Communities Topics The U.S. Population Living in Coastal Counties Swimming at Our Nation's Beaches Marine Protected Areas: Conserving our Nation's Marine Resources Economy Topics The Coast - Our Nation's Economic Engine Recreational Fishing - An American Pastime Commercial Fishing - A Cultural Tradition Ports - Crucial Coastal Infrastructure Response Topics The Overall Health of Our Nation's Coastal Waters Invasive Species Disrupt Coastal Ecosystems and Economies Coral Reef Ecosystems - Critical Coastal Habitat Nutrient Pollution and Hypoxia - Everything is Upstream of the Coast Climate Topics Vulnerability of Our Nation's Coasts to Sea Level Rise U.S. Population in the 100-year Coastal Flood Hazard Area Federally-Insured Assets along the Coast External links NOAA's State of the Coast Web Site Retired NOS State of the Coast Web Site National Oceanic and Atmospheric Administration NOAA National Oceanic and Atmospheric Administration
45,574
https://github.com/apache/rocketmq-client-cpp/blob/master/build.sh
Github Open Source
Open Source
Apache-2.0, BSD-3-Clause
2,022
rocketmq-client-cpp
apache
Shell
Code
1,719
5,566
#!/usr/bin/env bash # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. basepath=$( cd $(dirname $0) pwd ) declare down_dir="${basepath}/tmp_down_dir" declare build_dir="${basepath}/tmp_build_dir" declare packet_dir="${basepath}/tmp_packet_dir" declare install_lib_dir="${basepath}/bin" declare static_package_dir="${basepath}/tmp_static_package_dir" declare fname_openssl="openssl*.tar.gz" declare fname_libevent="libevent*.zip" declare fname_jsoncpp="jsoncpp*.zip" declare fname_boost="boost*.tar.gz" declare fname_openssl_down="openssl-1.1.1d.tar.gz" declare fname_libevent_down="release-2.1.11-stable.zip" declare fname_jsoncpp_down="0.10.7.zip" declare fname_boost_down="1.78.0/boost_1_78_0.tar.gz" PrintParams() { echo "=========================================one key build help============================================" echo "sh build.sh [no build libevent:noEvent] [no build json:noJson] [no build boost:noBoost] [ execution test:test]" echo "usage: sh build.sh noJson noEvent noBoost test" echo "=========================================one key build help============================================" echo "" } if test "$(uname)" = "Linux"; then declare cpu_num=$(cat /proc/cpuinfo | grep "processor" | wc -l) elif test "$(uname)" = "Darwin" ; then declare cpu_num=$(sysctl -n machdep.cpu.thread_count) fi declare need_build_openssl=1 declare need_build_libevent=1 declare need_build_jsoncpp=1 declare need_build_boost=1 declare enable_asan=0 declare enable_lsan=0 declare verbose=1 declare codecov=0 declare debug=0 declare test=0 pasres_arguments() { for var in "$@"; do case "$var" in noOpenSSL) need_build_openssl=0 ;; noEvent) need_build_libevent=0 ;; noJson) need_build_jsoncpp=0 ;; noBoost) need_build_boost=0 ;; asan) enable_asan=1 ;; lsan) enable_lsan=1 ;; noVerbose) verbose=0 ;; codecov) codecov=1 ;; debug) debug=1 ;; test) test=1 ;; esac done } pasres_arguments $@ PrintParams() { echo "###########################################################################" if [ $need_build_openssl -eq 0 ]; then echo "no need build openssl lib" else echo "need build openssl lib" fi if [ $need_build_jsoncpp -eq 0 ]; then echo "no need build jsoncpp lib" else echo "need build jsoncpp lib" fi if [ $need_build_libevent -eq 0 ]; then echo "no need build libevent lib" else echo "need build libevent lib" fi if [ $need_build_boost -eq 0 ]; then echo "no need build boost lib" else echo "need build boost lib" fi if [ $enable_asan -eq 1 ]; then echo "enable asan reporting" else echo "disable asan reporting" fi if [ $enable_lsan -eq 1 ]; then echo "enable lsan reporting" else echo "disable lsan reporting" fi if [ $verbose -eq 0 ]; then echo "no need print detail logs" else echo "need print detail logs" fi if [ $codecov -eq 1 ]; then echo "run unit tests with code coverage" else echo "run unit tests without code coverage" fi if [ $debug -eq 1 ]; then echo "enable debug" else echo "disable debug" fi if [ $test -eq 1 ]; then echo "build unit tests" else echo "without build unit tests" fi echo "###########################################################################" echo "" } Prepare() { if [ -e ${down_dir} ]; then echo "${down_dir} exists" #cd ${down_dir} #ls |grep -v ${fname_libevent} |grep -v ${fname_jsoncpp} | grep -v ${fname_boost} |xargs rm -rf else mkdir -p ${down_dir} fi cd ${basepath} if [ -e ${fname_openssl} ]; then mv -f ${basepath}/${fname_openssl} ${down_dir} fi if [ -e ${fname_libevent} ]; then mv -f ${basepath}/${fname_libevent} ${down_dir} fi if [ -e ${fname_jsoncpp} ]; then mv -f ${basepath}/${fname_jsoncpp} ${down_dir} fi if [ -e ${fname_boost} ]; then mv -f ${basepath}/${fname_boost} ${down_dir} fi if [ -e ${build_dir} ]; then echo "${build_dir} exists" #rm -rf ${build_dir}/* else mkdir -p ${build_dir} fi if [ -e ${packet_dir} ]; then echo "${packet_dir} exists" #rm -rf ${packet_dir}/* else mkdir -p ${packet_dir} fi if [ -e ${install_lib_dir} ]; then echo "${install_lib_dir} exists" else mkdir -p ${install_lib_dir} fi } BuildOpenSSL() { if [ $need_build_openssl -eq 0 ]; then echo "no need build openssl lib" return 0 fi cd ${down_dir} if [ -e ${fname_openssl} ]; then echo "${fname_openssl} exists" else wget https://www.openssl.org/source/old/1.1.1/${fname_openssl_down} -O ${fname_openssl_down} --no-check-certificate fi tar -zxvf ${fname_openssl} &> unzipopenssl.txt if [ $? -ne 0 ]; then exit 1 fi openssl_dir=$(ls | grep ^openssl | grep .*[^gz]$) cd ${openssl_dir} if [ $? -ne 0 ]; then exit 1 fi echo "build openssl static #####################" if [ $verbose -eq 0 ]; then ./config shared CFLAGS=-fPIC CPPFLAGS=-fPIC --prefix=${install_lib_dir} --openssldir=${install_lib_dir} &> opensslconfig.txt else ./config shared CFLAGS=-fPIC CPPFLAGS=-fPIC --prefix=${install_lib_dir} --openssldir=${install_lib_dir} fi if [ $? -ne 0 ]; then exit 1 fi if [ $verbose -eq 0 ]; then echo "build openssl without detail log." make depend &> opensslbuild.txt make -j $cpu_num &> opensslbuild.txt else make depend make -j $cpu_num fi if [ $? -ne 0 ]; then exit 1 fi make install echo "build openssl success." } BuildLibevent() { if [ $need_build_libevent -eq 0 ]; then echo "no need build libevent lib" return 0 fi cd ${down_dir} if [ -e ${fname_libevent} ]; then echo "${fname_libevent} exists" else wget https://github.com/libevent/libevent/archive/${fname_libevent_down} -O libevent-${fname_libevent_down} fi unzip -o ${fname_libevent} &> unziplibevent.txt if [ $? -ne 0 ]; then exit 1 fi libevent_dir=$(ls | grep ^libevent | grep .*[^zip^txt]$) cd ${libevent_dir} if [ $? -ne 0 ]; then exit 1 fi ./autogen.sh if [ $? -ne 0 ]; then exit 1 fi echo "build libevent static #####################" if [ $verbose -eq 0 ]; then ./configure --enable-static=yes --enable-shared=no CFLAGS="-fPIC -I${install_lib_dir}/include" CPPFLAGS="-fPIC -I${install_lib_dir}/include" LDFLAGS="-L${install_lib_dir}/lib" --prefix=${install_lib_dir} &> libeventconfig.txt else ./configure --enable-static=yes --enable-shared=no CFLAGS="-fPIC -I${install_lib_dir}/include" CPPFLAGS="-fPIC -I${install_lib_dir}/include" LDFLAGS="-L${install_lib_dir}/lib" --prefix=${install_lib_dir} fi if [ $? -ne 0 ]; then exit 1 fi if [ $verbose -eq 0 ]; then echo "build libevent without detail log." make -j $cpu_num &> libeventbuild.txt else make -j $cpu_num fi if [ $? -ne 0 ]; then exit 1 fi make install echo "build linevent success." } BuildJsonCPP() { if [ $need_build_jsoncpp -eq 0 ]; then echo "no need build jsoncpp lib" return 0 fi cd ${down_dir} if [ -e ${fname_jsoncpp} ]; then echo "${fname_jsoncpp} exists" else wget https://github.com/open-source-parsers/jsoncpp/archive/${fname_jsoncpp_down} -O jsoncpp-${fname_jsoncpp_down} fi unzip -o ${fname_jsoncpp} &> unzipjsoncpp.txt if [ $? -ne 0 ]; then exit 1 fi jsoncpp_dir=$(ls | grep ^jsoncpp | grep .*[^zip]$) cd ${jsoncpp_dir} if [ $? -ne 0 ]; then exit 1 fi mkdir build cd build echo "build jsoncpp static ######################" if [ $verbose -eq 0 ]; then echo "build jsoncpp without detail log." cmake .. -DCMAKE_CXX_FLAGS=-fPIC -DBUILD_STATIC_LIBS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_INSTALL_PREFIX=${install_lib_dir} &> jsoncppbuild.txt else cmake .. -DCMAKE_CXX_FLAGS=-fPIC -DBUILD_STATIC_LIBS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_INSTALL_PREFIX=${install_lib_dir} fi if [ $? -ne 0 ]; then exit 1 fi if [ $verbose -eq 0 ]; then make -j $cpu_num &> jsoncppbuild.txt else make -j $cpu_num fi if [ $? -ne 0 ]; then exit 1 fi make install echo "build jsoncpp success." if [ ! -f ${install_lib_dir}/lib/libjsoncpp.a ]; then echo " ./bin/lib directory is not libjsoncpp.a" cp ${install_lib_dir}/lib/x86_64-linux-gnu/libjsoncpp.a ${install_lib_dir}/lib/ fi } BuildBoost() { if [ $need_build_boost -eq 0 ]; then echo "no need build boost lib" return 0 fi cd ${down_dir} if [ -e ${fname_boost} ]; then echo "${fname_boost} exists" else wget http://sourceforge.net/projects/boost/files/boost/${fname_boost_down} --no-check-certificate fi tar -zxvf ${fname_boost} &> unzipboost.txt boost_dir=$(ls | grep ^boost | grep .*[^gz]$) cd ${boost_dir} if [ $? -ne 0 ]; then exit 1 fi ./bootstrap.sh if [ $? -ne 0 ]; then exit 1 fi echo "build boost static #####################" pwd if [ $verbose -eq 0 ]; then echo "build boost without detail log." ./b2 -j$cpu_num cflags=-fPIC cxxflags=-fPIC --with-atomic --with-thread --with-system --with-chrono --with-date_time --with-log --with-regex --with-serialization --with-filesystem --with-locale --with-iostreams threading=multi link=static release install --prefix=${install_lib_dir} &> boostbuild.txt else ./b2 -j$cpu_num cflags=-fPIC cxxflags=-fPIC --with-atomic --with-thread --with-system --with-chrono --with-date_time --with-log --with-regex --with-serialization --with-filesystem --with-locale --with-iostreams threading=multi link=static release install --prefix=${install_lib_dir} fi if [ $? -ne 0 ]; then exit 1 fi } BuildRocketMQClient() { cd ${build_dir} echo "============start to build rocketmq client cpp.=========" local ROCKETMQ_CMAKE_FLAG="" if [ $test -eq 1 ]; then if [ $codecov -eq 1 ]; then ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DRUN_UNIT_TEST=ON -DCODE_COVERAGE=ON" else ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DRUN_UNIT_TEST=ON -DCODE_COVERAGE=OFF" fi else ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DRUN_UNIT_TEST=OFF -DCODE_COVERAGE=OFF" fi if [ $enable_asan -eq 1 ]; then ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DENABLE_ASAN=ON" else ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DENABLE_ASAN=OFF" fi if [ $enable_lsan -eq 1 ]; then ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DENABLE_LSAN=ON" else ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DENABLE_LSAN=OFF" fi if [ $debug -eq 1 ]; then ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DCMAKE_BUILD_TYPE=Debug" else ROCKETMQ_CMAKE_FLAG=$ROCKETMQ_CMAKE_FLAG" -DCMAKE_BUILD_TYPE=Release" fi cmake .. $ROCKETMQ_CMAKE_FLAG if [ $verbose -eq 0 ]; then echo "build rocketmq without detail log." make -j $cpu_num &> buildclient.txt else make -j $cpu_num fi if [ $? -ne 0 ]; then echo "build error....." exit 1 fi #sudo make install PackageRocketMQStatic } BuildGoogleTest() { if [ $test -eq 0 ]; then echo "no need build google test lib" return 0 fi if [ -f ./bin/lib/libgtest.a ]; then echo "GTest already exists, no need build" return 0 fi cd ${down_dir} if [ -e release-1.8.1.tar.gz ]; then echo "${fname_boost} exists" else wget https://github.com/abseil/googletest/archive/release-1.8.1.tar.gz fi if [ ! -d "googletest-release-1.8.1" ]; then tar -zxvf release-1.8.1.tar.gz &> googletest.txt fi cd googletest-release-1.8.1 mkdir -p build cd build echo "build googletest static #####################" if [ $verbose -eq 0 ]; then echo "build googletest without detail log." cmake .. -DCMAKE_CXX_FLAGS=-fPIC -DBUILD_STATIC_LIBS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_INSTALL_PREFIX=${install_lib_dir} &> googletestbuild.txt else cmake .. -DCMAKE_CXX_FLAGS=-fPIC -DBUILD_STATIC_LIBS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_INSTALL_PREFIX=${install_lib_dir} fi if [ $? -ne 0 ]; then exit 1 fi if [ $verbose -eq 0 ]; then make -j $cpu_num &> gtestbuild.txt else make -j $cpu_num fi if [ $? -ne 0 ]; then exit 1 fi make install if [ ! -f ${install_lib_dir}/lib/libgtest.a ]; then echo " ./bin/lib directory is not libgtest.a" cp ${install_lib_dir}/lib64/lib* ${install_lib_dir}/lib fi } ExecutionTesting() { if [ $test -eq 0 ]; then echo "Build success without executing unit tests." return 0 fi echo "############# unit test start ###########" cd ${build_dir} if [ $verbose -eq 0 ]; then ctest else ctest -V fi if [ $? -ne 0 ]; then echo "############# unit test failed ###########" exit 1 fi echo "############# unit test finish ###########" } PackageRocketMQStatic() { echo "############# Start package static rocketmq library. #############" if test "$(uname)" = "Linux"; then #packet libevent,jsoncpp,boost,rocketmq,Signature to one librocketmq.a cp -f ${basepath}/libs/signature/lib/libSignature.a ${install_lib_dir}/lib ar -M <${basepath}/package_rocketmq.mri cp -f librocketmq.a ${install_lib_dir} elif test "$(uname)" = "Darwin" ; then mkdir -p ${static_package_dir} cd ${static_package_dir} cp -f ${basepath}/libs/signature/lib/libSignature.a . cp -f ${install_lib_dir}/lib/lib*.a . cp -f ${install_lib_dir}/librocketmq.a . echo "Md5 Hash RocketMQ Before:" md5sum librocketmq.a local dir=`ls *.a | grep -E 'gtest|gmock'` for i in $dir do rm -rf $i done libtool -no_warning_for_no_symbols -static -o librocketmq.a *.a echo "Md5 Hash RocketMQ After:" md5sum librocketmq.a echo "Try to copy $(pwd)/librocketmq.a to ${install_lib_dir}/" cp -f librocketmq.a ${install_lib_dir}/ cd ${basepath} rm -rf ${static_package_dir} fi echo "############# Package static rocketmq library success.#############" } PrintParams Prepare BuildOpenSSL BuildLibevent BuildJsonCPP BuildBoost BuildGoogleTest BuildRocketMQClient ExecutionTesting
42,287
https://github.com/Taylorgrohs/.NET-sports-league/blob/master/src/sports-league/Controllers/TeamsController.cs
Github Open Source
Open Source
MIT
null
.NET-sports-league
Taylorgrohs
C#
Code
153
558
using Microsoft.AspNet.Mvc; using Microsoft.AspNet.Mvc.Rendering; using Microsoft.Data.Entity; using sports_league.Models; using System; using System.Collections.Generic; using System.Linq; using System.Threading.Tasks; namespace sports_league.Controllers { public class TeamsController : Controller { private SportsLeagueContext db = new SportsLeagueContext(); public IActionResult Index() { return View(db.Teams.Include(x => x.Division).ToList()); } public IActionResult Details(int id) { var thisTeam = db.Teams.FirstOrDefault(x => x.TeamId == id); return View(thisTeam); } public IActionResult Create() { ViewBag.DivisionId = new SelectList(db.Division, "DivisionId", "Name"); return View(); } [HttpPost] public IActionResult Create(Team team) { db.Teams.Add(team); db.SaveChanges(); return RedirectToAction("Index"); } public ActionResult Edit(int id) { var thisTeam = db.Teams.FirstOrDefault(d => d.TeamId == id); ViewBag.DivisionId = new SelectList(db.Division, "DivisionId", "Name"); return View(thisTeam); } [HttpPost] public ActionResult Edit(Team team) { db.Entry(team).State = EntityState.Modified; db.SaveChanges(); return RedirectToAction("Index"); } public ActionResult Delete(int id) { var thisTeam = db.Teams.FirstOrDefault(d => d.TeamId == id); return View(thisTeam); } [HttpPost, ActionName("Delete")] public ActionResult DeleteConfirmed(int id) { var thisTeam = db.Teams.FirstOrDefault(d => d.TeamId == id); db.Teams.Remove(thisTeam); db.SaveChanges(); return RedirectToAction("Index"); } } }
49,972
https://en.wikipedia.org/wiki/Garrus%20Vakarian
Wikipedia
Open Web
CC-By-SA
2,023
Garrus Vakarian
https://en.wikipedia.org/w/index.php?title=Garrus Vakarian&action=history
English
Spoken
2,739
3,811
Garrus Vakarian is a fictional character in BioWare's Mass Effect franchise, who acts as a party member (or "squadmate") in each of the three games in the original trilogy. Garrus is a turian, one of the various alien species in Mass Effect, and is voiced by Brandon Keener. The character is initially introduced in the first game as a C-Sec officer tired of all the rules and regulations his job includes. Come Mass Effect 2, Garrus forms a vigilante group on the crime-ridden Omega, before his team is wiped out due to betrayal. Mass Effect 3 features him advising the other turians on how to defeat the Reapers. In addition to the Mass Effect game trilogy, Garrus also appears in the third issue of Homeworlds; it tells the story of how Garrus ends up on Omega and elaborates on his backstory. Garrus's design was altered throughout the series, though his blue-and-black colour scheme and visor were maintained in all his appearances. Developers were initially worried that Garrus, as well as the rest of the alien squadmates, would not prove emotionally compelling, but were surprised by positive fan feedback and added him as a romance option in the second game due to it. Since his appearance in Mass Effect, Garrus has received a very positive reception. Various merchandise has been made around Garrus, including action figures, a T-shirt and a bust. Character overview Garrus is a turian, an alien race with avian features, from a society which values discipline and possesses a strong sense of personal and collective honor. Turians resemble "humanoid birds or raptors"; they have an eagle-like head with the crest of a plumed bird, avian legs with bones jutting from their calves, and a carapace on their shoulder blades which protects them from the radiation on their homeworld Palaven. Design wise, Garrus wears a visor and has a blue-and-black theme to his armor. In Mass Effect 2, while in Omega, Garrus is seriously injured by a gunships's chain gun and rockets and so gains scars and a cracked armor. Despite initially being introduced as a C-Sec officer, Garrus despises rules and regulations, which leads him to try to join Commander Shepard's crew and leave C-Sec. In the first game, Executor Pallin describes him as a "very good" officer albeit one with a lack of patience, while Harkin describes him as a "hothead" who "still thinks he can change the world". Despite his rash decision making, Garrus will listen to what Shepard has to say. Garrus can be influenced into being more receptive of rules and regulations, telling him that they help limit abuses of authority, or he can be encouraged to continue his loose cannon style of law-enforcement, telling him that regulations get in the way of dispensing justice. Garrus's voice actor, Brandon Keener, blamed C-Sec's "demoralizing" bureaucracy for his reticence. Keener said that Garrus had warmed up over the course of the games, due to his interactions with the Normandy crew. David Kates, a composer who worked on the Mass Effect franchise, described Garrus as having a conscience and wanting "to do good", and that he ultimately desired for both healing and justice. Kates similarly pointed to the fact that Garrus's conversations often had a warm sense to them, often displaying a wry sense of humor as Garrus was desperately trying to "be that person". Creation and development Mac Walters, one of the lead writers for Mass Effect 2 and 3, acted as a senior writer for the first game and mainly focused on Garrus, as well as Wrex. Walters also wrote him in the second game, but handed him to John Dombrow for 3. Garrus did not initially have any concept art for his armor, so associate art director Matt Rhodes created several different pieces on short notice for the team to choose from. The consensus was that Garrus would have a blue and black theme and a visor, which were later decided as important visual cues to be retained by the character for Mass Effect 2. For his scars they wanted something heroic-like and did a reference on different burns; at the same time, they didn't want a lot of red in it. In part, this was to make sure he was still recognizable as Garrus. Early iterations of Garrus' head model included a medical bandage which covers up his facial injury. Alternate appearances for customization purposes include a set of undamaged armor and a slight color variation to add a touch of uniqueness, as Garrus's default appearance following his recruitment in Omega still sees him wearing the cracked armor. In 3, the blue and black remained but silver was added; the silver was to reflect his new rank. They still wanted Garrus to look familiar, but gave him heavier armor "to withstand the battles" in Mass Effect 3 and increased the detail to his armour and eyepiece. Garrus was voiced by Brandon Keener, who used his natural speaking voice but spoke slightly more formally; a reverb effect was then used on the voice. Voice direction was given by Ginny McSwain for individual lines. Although he does not remember exactly what happened when he started voicing Garrus, Keener believes he was given some background information, personality traits and character sketches before voicing the character. Garrus was not initially given a romance in the first game as the developers were unsure whether the alien characters would be emotionally compelling. However, a romance was added in the second game due to popular demand, though the developers were still surprised at its popularity once the game was released. When designing the music for 2s "Garrus level", David Kates had a fun time working with the character. Kates wanted to bring the sense of conflict he felt between his desire for healing and justice to the music, as well bring a "human element" and a bit of emotion to Garrus, giving the impression he was motivated by more than just the battle. Kates compared his chord vocabulary for Garrus' level to Wendy Carlos' language in Tron. Appearances In video games Mass Effect Garrus first appeared in the 2007 Mass Effect, as a squadmate. After the first mission, the player encounters his case against Saren being dropped by C-Sec officials, despite Garrus's objections. Garrus decides to continue working on the case anyway, and can be found in the Med Clinic after speaking to Harkin. If the player goes to the Med Clinic, they will encounter Dr. Chloe Michel being threatened by thugs, who Garrus will shoot after Shepard distracts them. If the player does not go to the Med Clinic but recruits Wrex, Garrus will appear later and ask to join the Normandy's crew; however, the player may refuse him, and thus go through the game without him. If the player does recruit him, Garrus can be found in the Normandy and be talked with after each main mission for new information about himself. If the player continues doing this, Garrus will eventually tell Shepard of Dr. Saleon, a salarian geneticist using his employees as test tubes to grow spare organs in who escaped from Garrus long ago; the player may then choose to hunt down Saleon and take him out. Mass Effect 2 Garrus then returns in Mass Effect 2, regardless of whether he was recruited in the first game. After the player arrives at Omega and begins the mission to recruit Archangel, they discover he is currently under attack by all of the mercenary groups on the station and that they must rescue him. When they reach him, Archangel takes off his helmet and reveals himself to be Garrus. At the end of the mission, Garrus is shot by the gunship's mass accelerator cannons and receives scars; Garrus can then be found in the Normandy and talked to for information, as well as brought out for missions as a squad member. If the player continues to talk with Garrus, he will reveal he has new information on Sidonis – the turian who betrayed Garrus's original team fighting the mercenaries on Omega, leading to all of their deaths. The player can then choose to help Garrus find Sidonis and help him kill him, or, after seeing that Sidonis is now immensely regretful for his actions and depressed, convince Garrus to spare his life. Alternatively, the player can just not do the mission. After this mission is completed and if the player is playing a female Shepard, they may pursue a romance with the character. During the last mission of the game, various members of the squad can end up killed, Garrus included; Garrus's likelihood of dying increases if the Sidonis mission is not done. Mass Effect 3 Unless a save was imported from 2 where Garrus died, he will appear again as a squadmate in Mass Effect 3. After the events of 2, Garrus is revealed to have contacted his father and told him about the Reaper threat; his father proceeded to lobby for more defences to be made to prepare for them, which resulted Garrus being put in charge of a "Reaper task force". After the player begins the mission on the turian planet Palaven's moon to find Primarch Fedorian, they encounter Garrus advising the turians on how to defeat the attacking Reapers. Garrus joins the squad, and can from then on be found in the Normandy talking to other crew members and interacted with. Like the second game, a female Shepard may pursue a romance with him, but the romance requires an imported save where Garrus was romanced in 2. Mass Effect: Andromeda While Garrus does not physically appear in Mass Effect: Andromeda, he is referenced briefly in passing. Through a sidequest, the player can unlock Alec Ryder's encrypted memories and observe a conversation between Alec Ryder and Castis Vakarian. During the conversation, Castis references his son's adventures with Commander Shepard and expresses his concern that the Reapers may indeed be a real threat. In other media Mass Effect: Homeworlds Garrus is the focus of Mass Effect: Homeworlds third issue, a comic series dedicated to starring a different Mass Effect 3 squadmate in each issue. Reception Garrus has received near-universal acclaim from both critics and fans. Out of all the squadmates in the Mass Effect series, he has been particularly highlighted as a fan favorite who is consistently placed at the top of several reader's polls and critic rankings. Robert Purchase observed that Garrus' character arc is firmly defined by his relationship with Shepard, and claimed that he could "write a whole character study on why Garrus is clearly your best buddy throughout the trilogy". Rowan Kaiser from Unwinnable asserted that "more than any single component of Mass Effect, Garrus embodies the tone, theme and characterization of the series." According to game statistics for Mass Effect 2, Garrus was one of the most commonly selected characters for the squad. Steven Hopper from IGN selected Garrus as his top teammate in the series. UGO's IGN's GamesRadar listed him as one of several characters that sequels vastly improved, comparing his first appearance as to a comic book character's humble origin story and noting him in his second appearance as a "total unapologetic badass". On the other hand, Jeremy Parish from 1UP.com criticised his personality shift between the first game and the second game, noting that his character suffered the most from Mass Effect 2s over-"edginess", particularly as his darkening was detriment to the Paragon choice of nudging him towards rules in the first game. Garrus has been called "iconic" and "more than just another squadmate" in US Gamer's retrospective feature in commemoration of the 10th year anniversary of Mass Effect 2. Game statistics released by BioWare for Mass Effect 3 revealed that Garrus was the second most popular Mass Effect 3 squad member with 23.8% of its player base, after Liara T'Soni. Sal Basile named him the third best squadmate in Mass Effect 3, noting that he made a good counterpart to Shepard. In a 2016 article, PC Gamer ranked Garrus the best companion of the Mass Effect series. PC Gamer staff said "Garrus is something else. He's your best pal, first and foremost, somebody whose objectives and attitude align with your own and who will always, always have your back. The journey from that first meeting between a frustrated C-Sec officer and a novice Spectre during the Saren investigation to that last charge against the Reapers as a pair of war heroes is one of the best friendship stories in gaming. Green Man Gaming included Garrus in their top 5 list of the best characters from the Mass Effect franchise. The potential romance to Garrus has generated substantial fan interest. Writing for IGN, Emma Boynes listed the relationship between a female Shepard and him as one of the best in video gaming; and noted that while he seemed an odd choice at first, he "grows on you". In a list of seven game characters who the staff "(seriously) fell in love with", Gamesradar listed him as number 1; Holland Cooper praised his calm voice, loyalty to Shepard, and "pure charisma". A reader's poll ranking the best and worst of Mass Effect games published by PC Gamer in 2015 reveal that Garrus is the sixth most popular love interest, the most popular heterosexual romance option for a female Shepard, and was overall the most popular Mass Effect character. In a 2016 article written for The Guardian, Kate Gray and Holly Nielsen reflected on the Garrus romance scene in Mass Effect 2, and concluded that "the appeal of this scene is in the way he brings wine and puts on music in an attempt to make things nice; it’s in his obvious nervousness and the way he eventually lets his guard down". Michael Graff from Screenrant dissented and ranked the Garrus romance scene as one of the Mass Effect series' most cringe-inducing moments. Outside of the Mass Effect series, Garrus is considered one of the franchise's most recognizable characters. Garrus has been listed by GamesRadar ranked 15 out of 100 of their best video gaming heroes; GamesRadar also saying they preferred him to Shepard themself. Cooper, again, listed him as their top badass in gaming for this generation. Lorenzo Veloria, also from GamesRadar, called him one of his favourite RPG party members. GamesRadar included him in a list of "11 video game characters that would take home Olympic gold", citing his shooting abilities. Writing for The Observer, Tom Chatfield listed Garrus as one of his favourite 10 video game characters. Game Informers Kimberley Wallace considered him to be one of the best BioWare characters, commenting that "Garrus has enough charisma to top all the rest of the Mass Effect cast." A reader's poll published by IGN in December 2014 for their top ultimate RPG party choices drawing from characters of several disparate RPG video game franchises, placed Garrus as the top choice. Gamestm named Garrus one of BioWare’s 8 most memorable companion characters, and Garrus topped App Trigger's list of the 10 Best BioWare Companions. Phil Savage from PC Gamer named Garrus as his personal favorite Bioware companion, commenting that Mass Effect 3 was a game with many endings, and Garrus's ending "takes place before the final battle, shooting cans with Shepard at the top of the Citadel's Presidium. It's a scene laced with humour, rivalry, sadness and, yes, friendship. The best way to remember BioWare's best companion." Promotion and merchandise As with many of the other squadmates, various merchandise has been made for Garrus. These include two action figures (one of which is designed as a "collectible"), a screenprint poster, a t-shirt, a character key, and a bust. In addition, several fans have made their own items such as plushies and T-shirts; but these are all unofficial. Keener agreed to record a voice mail message as part of a Mass Effect-themed silent auction for Child's Play. To commemorate the release of Mass Effect Legendary Edition'' in May 2021, two variant editions of a statue made with polyresin material in the likeness of Garrus were released in mid-2021. Further reading References Extraterrestrial characters in video games Fictional characters with disfigurements Fictional humanoids Fictional marksmen and snipers Fictional police detectives Fictional police officers in video games Fictional soldiers in video games Fictional sole survivors Fictional special forces personnel Male characters in video games Mass Effect characters Video game characters introduced in 2007 Video game sidekicks Vigilante characters in video games
15,045
https://www.wikidata.org/wiki/Q29573037
Wikidata
Semantic data
CC0
null
Category:Santa Fé (Paraná)
None
Multilingual
Semantic data
63
149
Category:Santa Fé (Paraná) Wikimedia category Category:Santa Fé (Paraná) instance of Wikimedia category Category:Santa Fé (Paraná) category's main topic Santa Fé Category:Santa Fé (Paraná) Commons category Santa Fé (Paraná) Categoria:Santa Fé (Paraná) categoria de um projeto da Wikimedia Categoria:Santa Fé (Paraná) instância de categoria da Wikimedia Categoria:Santa Fé (Paraná) artigo principal da categoria Santa Fé Categoria:Santa Fé (Paraná) categoria da Commons Santa Fé (Paraná)
13,630
sg042gd7341_7
GATT_library
Open Government
Various open data
1,993
Kenya : Report by the Secretariat
None
English
Spoken
7,545
10,227
Chart V.5 Tea prices and low-income CPI, local currency, 1972-91 200 150 100 50 0 Index 1985=100 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 Source: Kenya Central Bureau of Statistics, Statistical Abstract, various issues. 86UNCTAD (1991), Commodity Yearbook, United Nations, New York. 377. Government intervention in the tea sector takes place mainly trough the Kenya Tea Development Authority (KTDA) and the Tea Board. The KTDA, a non profit, self financing organization, owns approximately 40 factories to process green tea delivered by farmers. These factories operate ini competition with private processing plants, often located on the large plantations. 378. Tea growing requires a licence from the KTDA. Traditionally, the KIDA has not intervened a great deal in tea pricing, passing on the world price to farmers at the prevailing exchange rate. In this regard, the shift to foreign-exchange based tea auctions, as announced in October 1992, as well as permission for exporters to retain 50 per cent of their foreign exchange earnings, and the recent depreciation of the shilling, could benefit growers. The KTDA also provides extension services and delivers fertilizer to tea growers, at a price based on its import costs. Tea growers are also eligible for credit subsidies, both in the form of low cost seasonal loans and long-term investment credits at concessional rates. 379. The Tea Board's activities are strictly limited to a regulatory function. All tea exporters must be licensed by the Tea Board, and prior to shipment exporters are required to register their foreign sales with the Board, which verifies all export documentation. The Board, with financing from the tea industry, also funds the tea Research Foundation, which has contributed to improved crop practices and, thus, increased yields. 380. Marketed tea output is sold at auction, either in Kenya or abroad. Buyers at the local auctions are licensed by the East African Tea Trade Association. Some 60 per cent of tea output is auctioned domestically. 381. Tea imports are subject to a 60 per cent tariff, up from 45 per cent in 1988 to take into account the elimination of quantitative restrictions. Unlike the ase for unroasted coffee, tea production and imports are levied at a VAT rate of 18 per cent. (iv) Cattle the and dairy farming (Table AV.2) 382. The livestock and dairy industry is spread throughout Kenya, accounting for nearly 10 per cent of GDP. The sector provides 50 per cent of all agricultural employment, and is vital to a number of downstream export activities, including food products and leather. The number of cattle has increased steadily since 1987, in response to the rapidly growing demand for meat and dairy products. (a) Livestock 383. Livestock development is constrained by a number of factors, including certain diseases, such as foot and mouth and extensive grazing methods that place livestock in competition with food crops for available land. According to government estimates, although Kenya is currently self-sufficient in livestock, a deficit is expected on all major livestock products by the year 2000. 384. The marketing of beef, mutton and pigmeat is dominated by the public, centralized slaughter and processing units of the Kenya Meat Commission. A stated government objective is to privatize the processing and marketing of livestock products. Other objectives are the improvement of infrastructure, including water supply, land tenure and transport; intensification of productions and better marketing systems. However, the implementation of the necessary policies is hampered by limited budgets. ....* .....IS I3 . . ag ... 385. Trade policies in the sector aim both at self-sufficiency and increased value added in export products, particularly in the areas of meat and leather. As a result, exports of livestock require a licence, which is seldom granted. Tariffs on livestock imports were raised from zero to 10 per cent in 1992; imports also require prior approval from the Ministry of Livestock Development. Nevertheless, it is estimated that the sectors effective rate of production is negative, with both the relatively high duties on imported inputs, such as feed, and the constraints on exports playing a rôle. (b) Dairy farming 386. The Government has traditionally intervened in the pricing and distribution of milk and its products through the Kenya Cooperative Creameries (CC). Until 1989 the CC had exclusive rights in the pricing and distribution of milk. Subsequently the Government implemented a plan to liberalize the milk distribution system and, according to the authorities, the price of milk and its products had been decontrolled by 1992, as had the establishment of new processing plants. Nevertheless, although several privately owned processing plants exist, the CC retained a dominant position in 1992 in the distribution of milk products. 387. Kenya reports no foreign trade in fresh milk for 1990 and 1991. Imports of milk are subject to a 60 per cent tariff, up from 45 per cent in 1988, and to prior approval from the Ministry of Livestock Development. Milk is exempt from VAT. 388. High tariffs and import licensing seemingly afforded high rates of nominal protection to the sector. However, in 1985 domestic pasteurized milk prices were 20 per cent lower than duty-paid import prices.87Since then it would appear that milk prices have not kept pace with inflation and in addition input subsidies have been removed. There could thus be a certain "water in the milk tariff", and effective rates of protection are likely lower those that implied by the border barriers. (v) Forestry and logging (Table AV.2) 389. Kenya's indigenous forests cover about 800,000 hectares, equal to approximately 12 per cent of total land area. In addition there are some 170,000 hectares of lumber plantations. Forestry and logging activities account for about 2 per cent of GDP. Such activities are mostly carried out by public bodies, which also own a large share of the plantations. It is government policy to protect indigenous forests. Instead, plantations of softwood have been encouraged and these, according to the authorities, meet domestic needs for forestry products while providing a small surplus for export. 390. Trade policy supports a self-sufficiency objective. Imports of certain softwood species, including cypress, are prohibited but there are no other quantitative restrictions. Import tariffs range from 30 to 35 per cent, down from 45 per cent in 1988. Exports of wood in any form require a licence. Trade in logs is not significant. (vi) Fishing (Table AV.2) 391. The fisheries sector accounts for about 0.4 per cent of GDP. Production is diversified, with ocean and lake fishing as well as fish farming activities. In 1991, the fish catch amounted to about 198,000 tonnes worth K£41 million (US$31 million) at producer prices. Production of fish products 87Estimates based on data supplied by the Kenyan authorities. C/RM/S/39 ::.2??de:<:>z05:S «^g; :)t:: tSwSS Po<c < ev.e Mehvs in Kenya consists mainly of frozen, dried and salted fish, as well as crustaceans. A large proportion of frozen fish production is carried out by foreign fleets operating in Kenyan waters. Much of the catch is frozen and exported, with 1991 exports amounting to some US$20 million. Export markets appear to be relatively diversified, with frozen fish exports sold in European countries as well as the Middle East. Dried and salted fish is produced mainly for the domestic market. Imports in 1991 were minimal. 392. According to the authorities, the Government does not provide any input subsidies to the fish processing industry. Fresh and frozen fish exports are not eligible for export compensation. Import policy is restrictive, involving prior government approval, tariffs of 60 per cent on many products and, during the period late 1991 to early 1993, the effective non-availability of foreign exchange under Import Licensing Schedule 3B (Chapter IV (2) (iii)). 393. The Government intends to develop a local deep water fishing capacity. Once this capacity is installed, the authorities intend to renegotiate the licences for foreign fleets to fish within Kenya's territorial waters. (3) Mining and quarrying 394. Aside from limestone, fluorspar, soda ash and a few other minerals, mining of basic ores is not a significant sector of production in Kenya. In 1991, value added in the sector slightly exceeded US$24 million, representing about 0.3 per cent of GDP. Exports of soda ash and fluorspar nevertheless provide over 2 per cent of export revenue. The import penetration ratio for the sector is in the order of 90 per cent. 395. Foreign trade in minerals is limited to persons in possession of a mineral dealer's licence, issued by the Commissioner of Mines. Import tariffs on minerals range from 25 per cent to 35 per cent. Through early 1993, imports needed to be licensed, but were normally freely available, except for gold, silver, uranium and gypsum. Most mining is subject to a VAT rate of 18 per cent. In the case of gold, an export licence is required, costing US$75,000 a year. (i) Coal mining (Table AV.3) 396. All locally consumed coal is imported, with imports of some US$7 million in 1991. There are no quantitative restrictions on imports, and tariffs average 20 per cent, compared to 27 per cent in 1988. Coal imports from PTA, amounting for the bulk of such imports, receive preferential tariff treatment, with rates ranging from 8 to 10 per cent. (ii) Crude petroleum and natural gas (Table AV.3) 397. All petroleum is imported, principally as crude oil to be refined at the Kenya Petroleum Refineries Ltd (KPRL) at Mombasa. Importation is carried out by six private companies and one government-owned firm, the National Oil Corporation of Kenya, which accounts for 23 per cent of imports. The sector includes one parastatal, Kenya Drilling Limited. Imports of crude petroleum were US$316 million in 1991, approximately 17 per cent of total Kenyan imports. Imports of natural gas were some US$5 million in 1991. 398. Imports of crude petroleum are subject to a specific duty of K Sh 0.726 per litre (approximately US$ 0.01), and require prior approval from the Ministry of Energy. The specific tariff rate has not changed since 1988, while unit import prices have increased by over 100 per cent, effectively reducing input costs for the petroleum refinery (Chapter IV (4) (x)). Imports of natural gas are subject to specific import and VAT duties, which together amounted in 1992 to K Sh 3.3 per Kg. (iii) Non-ferrous ore mining (Table AV.3) 399. Goid, in very limited quantities, is the only non-ferrous metal mined in Kenya. Imports of non-ferrous ores faced average tariffs of almost 27 per cent in 1992; te rate on precious metal ores and concentrates is 60 per cent. A VAT rate of 18 per cent is applied to imports. Foreign trade in non-ferrous metals is limited. A high import penetration ratio suggests that a share of imports are re-exported. (iv) Stone quarrying and other mineral mining (Table AV.3) 400. Limestone, salt, fluorspar and soda ash are the main other minerals produced inKenya. Mineral production has been in continuous decline since 1989, reflecting both structural problems in the industry and weak external demand in the case of fluorspar. 401. Limestone production in 1991 was estimated at 32,000 tonnes, a decline of some 10 per cent relative to 1990. Most production is used for cerment manufacturing (Chapter V (4) (viii)). Limestone imports are subject to a 30 per cent tariff, and production to a VAT rate of 18 per cent. 402. Soda ash exports in 1991 provided Kenya with nearly US$31 million in export revenues, about 2 per cent of total export revenue. Although production is protected by a 35 per cent tariff on imports, it has been declining steadily. The three main companies involved in production were undergoing restructuring in 1992, and the authorities expect a significant increase in output as a result. Soda ash is not eligible for export compensation. 403. Kenya also produces fluorspar, under a 30 per cent tariff on imports. Exports of fluorspar are eligible for export compensation, a scheme which requires at least 30 per cent of value added in the production process. Export revenue from fluorspar was in the order of US$8 million in 1991. Kenya supplies the EC with nearly 8 per cent of its flourspar imports. 404. Salt production is not subject to VAT; a 35 per cent tariff applies on imports. About 72,500 tonnes of salt were produced in 1991, down from 88,000 tonnes in 1988. Production and exports are exclusive to a parastatal company. 405. The degree of protection provided co the mining sector in Kenya is extremely difficult to assess, given a lack of detailed information on the structure and cost of inputs and the level of competition. The presence of quasi-public firms operating as a joint-venture with foreign companies appears to be frequent but the total number of firms is small. The export products, soda ash and fluorspar, are subject to international prices but government intervention has limited price increases for salt. Limestone products, together with gypsum, constitute inputs to the cement industry, which is subject to important government involvement. (4) Manufacturing 406. The development of Kenya's manufacturing sector has taken place under a general policy of highly-protective import substitution, initiated in the 1970s and reinforced in the early 1980s. In the period since 1963, manufacturing activities, which were already relatively important and well diversified in Kenya, did not increase their share of GDP significantly: the share of manufacturing rose modestly from 11 per cent of GDP in 1965 to about 13 per cent in 1985. 407. In 1991, the formal manufacturing sector provided wage employment for 189,000 workers, less than 1 per cent of Kenya's population. Value added (at factor cost) was estimated at US$937 million, or 13 per cent of GDP. Food products account for the largest share of manufacturing output (about 30 per cent in 1990), followed by beverages and tobacco, and petroleum products. Other significant sectors of activity include machinery (9 per cent of output) , metal products (6.8 per cent), and textiles (6.4 per cent). Manufactured products account for about 18 per cent of Kenya's total exports. This relatively high share of manufactured products in exports masks the fact that exports of refined petroleum constitute over a quarter of manufactured exports. 408. The structure of production is dominated by large joint ventures established between the Government and multinationals during the 1960s and 1970s. These companies have in most cases been granted monopoly rights and substantial protection against potentially competing imports. Most of these companies were experiencing considerable difficulties in 1992, partly as a result of the fall in domestic demand, which could not be compensated by exports given the generally low quality of output. Other factors constraining output in 1992 were directly related to trade policies. 409. Through early 1993, trade policy toward the manufacturing sector was essentially twofold. On the one hand, products for which there exists an established domestic capacity were protected by restrictive foreign exchange and import licensing procedures combined with high tariffs on the import side, and an export compensation scheme, in which the Government provided a payment of 20 per cent of the f.o.b value of their exports to eligible manufacturers. This system effectively prevented the official importation of products competing with domestic production, as well as those the Government did not consider as priority items. On the other hand, imports of intermediate products and capital-goods for industry were encouraged by priority licensing and lower tariffs, resulting a relatively high import- dependency ratio in industry. 410. An important element of this policy was the foreign exchange licensing regime, which resulted in several periods of foreign exchange restrictions for imports, notably in the early 1990s. Until 1993, Kenya's import licensing system required importers to obtain an import licence, which if granted qualified the importer for a foreign exchange application and eventually allocation. In addition, until 1992, all exporters had to surrender their foreign exchange proceeds to the Central Bank, at the official exchange rate. As detailed in Chapters 111 and IV, the system underwent significant changes in 1993. As of May 1993, import licensing is no longer restrictive, importers have ready access to the interbank foreign exchange market and exporters are allowed to retain 50 per cent of their foreign exchange earnings, subject to the retained earnings being used or traded within 90 days 411. Kenyan industry, which had grown relatively dynamically during 1985-88, was affected by five conflicting shifts in trade policy after 1988. First, import licensing became inprinciple automatic, and was in fact considerably facilitated, leading to higher competition from manufactured imports. Also, since 1989, tariffs on imports have been progressively reduced. This trade liberalization proved to be difficult for a large number of domestic industries previously protected by quantitative restrictions on imports; the lack of external competition had often resulted in low quality standards, and consumers turned to imports despite the higher duty-paid prices. . ............. ..........::.*:*::*::***::* :~':.::.::.:*: C R / S 3 412. Second, the trade liberalization process was effectively reversed in 1991, by foreign exchange restrictions. In effect, all products classified under Import Licensing Schedule 3B were no longer considered for a foreign exchange allocation. This restriction prevented imports of finished products, as well as of goods used as inputs inthe domestic assembly industries. Hence, competition from imports had been replaced by input shortages, which in 1992 threatened the operations of a number of import dependent industries, notably machinery and transport equipment. 413. Encouraging measures were nevertheless underway in 1992. An important effort to stimulate investment came with the Investment Promotion Centre and Export Processing Zone Authority, whereby investors were provided with several assistance measures, mostly in terms of infrastructure as well as fiscal incentives. In terms of trade policy, most restrictive licensing and tariffpolicies were abolished when production and trade was carried out from the Export Processing Zones. In particular, the then obligation to surrender foreign exchange was removed and imports of inputs for export production carried out duty-free. 414. Third, the authorities in the period August 1992 to February 1993 introduced significant liberalization for traders. In particular. import licensing became automatic; access to foreign exchange was granted to private importers at the interbank, secondary rate; and, exporters were allowed to retain either 50 or 100 per cent of their export earnings in foreign currency, and convert them into shillings at a market-determined exchange rate. 415. Fourth, in March 1993, liberalization measures previously announced were cancelled, in part because of a severe foreign exchange constraint. 416. Fifth, in May 1993, the measures of August 1992 to February 1993 were reintroduced, except that the retention of foreign currency from export earnings was limited to 50 per cent (Chapter III (2)). (i) Food products (Table AV.4) 417. Food processing is the largest manufacturing sector in Kenya, representing nearly 30 per cent of manufacturing output. Value added exceeded US$260 million in 1991, or to 3.7 per cent of GDP. The expansion of this sector, despite an expected advantage resulting from the availability of domestically produced agricultural inputs, has been consistently slower than the manufacturing sector as a whole. About 3 per cent of food production is exported, consisting mostly of processed fruits and vegetables. The main imports include oils and fats, and sugar. The import penetration ratio is about 4 per cent. 418. Up to early 1993, import policy was geared towards self-sufficiency, with the use of both import and foreign exchange licensing ensuring that imports were allowed only in case of insufficient domestic production. Tariffs average nearly 48 per cent (1992), up from 45 per cent in 1988. Export compensation is available for a number of export activities, including canned fruit and vegetable products. Some food products are subject to price controls. (a) Meat and meat products 419. Kenya has a well developed meat industry producing mostly fresh products, although some canned meat is exported. Output of meat and meatproducts in 1991 amounted to approximately K£180 million, representing some 5 per cent of manufacturing output. Meat production is exempt from VATL The Government had until the late 1980s a monopoly in production, distribution, pricing and trade of meat and meat products through the Kenya Meat Commission. The price of meat has been :: .. a ~ ~ ::: :-: ::::.-...:...... ....................................... ......... . ......... ............ .................... .............. ..... ..... decontrolled since 1988 and the meat market has been fully liberalized. The supply response has been encouraging and, combined with consumer resistance, has effectively limited price increases. 420. There has also been a recent surge in meat exports, with a number of new firms entering the market. Chart V.6 shows the evolution of meat exports, with considerable volume growth since liberalization of the domestic market in 1988. Kenya's meat exports enter the European Communities duty free under the Meat Protocol of the Lomè Convention and at higher than average international prices.86 421. The protection of the Kenyan meat industry from import competition remained high in 1992. Import tariffs averaged slightly below 42 per cent in 1988, and by 1992 had increased to 47 per cent in order to counterbalance the removal of quantitative restrictions. Imports no longer require prior ministerial approval, but were classified in Import Licensing Schedule 3B for which no foreign exchange licences were available in 1992. Kenyan meat imports in 1992 were insignificant. Exports of meat do not qualify for export compensation, except in the case of ham and pork bellies, and do not require an export licence. Effective rates of protection are likely to be well in excess of nominal rates, given the low tariffs on livestock and the relatively low share of value added in output, of around 10 per cent. (Box V.2) Chart V.6 Exports of meat and meat products, 1982-91 - 6- 4 - 2 - 0 I Volume (Thousand tonnes) M Value (K£ millions) iI I I I I I 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 Source: Kenya Central Bureau of Statistics, Statistical Abstract, various issues. "In 1990, over 90 per cent of Kenya's meat exports went to the European Comnunities. . 1 5W .M ~ ~~~~~~~~~~~~~~~~~~ glf1IS3 extended to an activity, or of the trade and production effects of the protective structure. For example, ad valorem tariffs directlytarff diiëëlSrcctly importing country , or the extent to which resources are encouraged into the protected activity. For this, it is necessary to look at the combined effects tariff and other restriction on imports of the finished goods, as well as to the tariffs and other restrictions nominal rate on the finished good. The extent to which it is higher depends critically on the value added in the activity at free-trade .ne fr.... -.ad .i -x a-, :it. : - level. If the nominal rate on the finished good is higher than that on inputs, then the effective rate is generally higher than the i*dsr butfolo vauade,.gtpe cet, tx efetv rat c` ''' as lihas pr cn. ........ ........ .... ........,,,, Industries with negative or below average effective rates are in effect being taxed relative to those industries receiving higher effective rates. This is because the more highly protected industry is in a more advantageous position to bid for primary factors what they would be under free trade. Thus, protected sectors, or sectors with relatively little protection, become less in a misallocation of resources. oieo Like many quantitative tools used by economists, the concept of the effective rate of protection employs a number of simplifying for industries with significant non-traded inputs.h as ,, conducting price comparisons, where quality differences could become important and need to be taken into account. Thus the concept of effective protection, by its nature, cannot generate precise figures. It must be interpreted as reflecting broad protection on resource allocation.af f ~~~~~~~~~~~~.. .. . .. .. .. (b) Dairy products 422. Thedairy industryproduces anumber ofproducts aside fromfreshmilk (Section (2) (iv) above), including butter, ghee, and some dried milk. Cheese production is very limited. All dairy products are subject to a VAT of 18 per cent, except fresh milk and baby milk, which are exempt from VAT. Kenya Co-operative Creameries, which had a statutory monopoly in the distribution of milk until mid- 1992, also produce dairy products for the domestic market. One large multinational company produces concentrated milk, milk powder and milk products for the domestic and export markets. 423. A trade surplus is traditionally recorded for milk products in Kenya, with exports of dried milk products amounting to US$5 million in 1990. Inputs of malt and starch preparations for baby food production constitute the main imports. Export markets spread worldwide, indicating a potential area of export growth. The recent return to foreign exchange retention from exports, and the associated right to sell part of export receipts on the interbank market, could further encourage export growth. 424. The unweighted average m.f.n. tariff on dairy products was 44 per cent in 1991. All imports of dairy products are subject to prior ministerial approval by the Ministry of Livestock Development. According to the authorities, approval is given in cases of shortages on the domestic market. 425. Variable duty rates were introduced in 1992 on concentrated milk and cream. These rates are defined as the difference between the domestic price and the import price, if this difference is positive, and zero otherwise. The variable duty rate system in principle guarantees the absence of import price competition. Tariffs on other products range from 40 per cent on baby foods to 60 per cent for most other dairy products. Production of baby foods is exempt from VAT. Exports of dried milk, butter and cheese are eligible for export compensation. 426. In 1985, there were high rates of effective protection in the industry, ranging from 160 per cent for butter to over 750 per cent for dried milk (the corresponding average rate for the food industry was 111 per cent).89 Since then, the degree of competition in the sector has not increased considerably; prices of domestic milk inputs remain under price control; and the variable duty system has been introduced. Effective protection to the dairy industry may thus have increased. (c) Fruit and vegetable canning 427. Processed fruit and vegetable products constitute an important source of export revenue for Kenya. Production of processed fruits and vegetables enjoyed strong growth during the 1980s. Kenya is now the world's fifth largest exporter of tinned pineapple. Other products include canned french beans, orange, pineapple and passion fruit juices, jams and marmalade, as well as tomato purée. In 1991, the production of canned fruits and vegetables increased by over 13 per cent in volume terms, and exports accounted for 4.2 per cent of Kenya's total export earnings.90 The sector's significant expansion in recent years took place in a context of relatively liberal trade and competition policies. 89Estimates of effective rates of protection presented inthis Chapter are based on data provided by the Kenyan authorities. 90European Comnmunities' imports of fruit juices from Kenya reached nearly US$17 million in 1991, up from US$10 million in 1990. Kenyan trade data for 1990 indicates total exports of slightly over US$7 million for this product group. 428. ln te past, several of the major investments in food processing have entailed joint-ventures between this Government and multinational corporations. One such company is protected by an exclusive monopoly on the production of tinned pineapple in Kenya.91 The number of firms in the processed fruit and vegetable industry has nevertheless increased steadily to about fifteen in the mid-1980s, although there are only six large firms (fifty employees or more). According to the authorities, there was only one public firm still involved in the fruit and vegetable processing sector in 1992 (Kenya Cashew Nuts). 429. Over 90 per cent of the sector's export production is undertaken by foreign owned multinational corporations, or joint ventures with majority foreign ownership and management control.92 By contrast the majority of locally-owncd fruit and vegetable processing firms have focused on serving the domestic market. 430. Imports of canned and preserved fruit and vegetables were in 1992 subject to a 60 per cent tariff, up from an average of some 56 per cent in 1988. A lower preferential duty rate applied to certain imports from the PTA. Imports are in a few cases subject to prior ministerial approval (e.g . fruits and nuts preserved in sugar). Both imports and domestic production were in 1992 subject to an 18 per cent VAT. Most exported products are eligible for export compensation. 431. An obstacle faced by producers and exporters is the relatively high cost of intermediate inputs, which in many cases exceeds the export subsidy provided by the export compensation scheme. For example, local prices for domestically produced tins, sugar, salt and other inputs are substantially increased by domestic protection. Therefore, the effective rate of protection was estimated at 5 per cent in 1985 in the case of tinned pineapples, despite tariffs ranging between 40 and 60 per cent. (d) Fish products 432. Processed fish exports in 1991 were valued at about US$1 million dollars, consisting mostly of coral and fish waste. Imports of fish products are insignificant. 433. The tariff structure indicates the presence of negative tariff escalation. Imports of tinned fish faced import duties of 35 per cent in 1992, compared to an average rate of almost 60 per cent on fresh or frozen fish. A VAT rate of 18 per cent is levied on tinned fish but is not applied to frozen and fresh fish. All imports of fresh and frozen fish are subject to prior Ministerial approval by the Ministry of Regional Development. There are no import controls on tinned fish. 434. Taking into account the relatively high intermediate costs of production, it is possible that the negative tariff escalation translates into negative effective protection and constitutes an obstacle to the development of production and exports. (e) Oils and fats 435. Kenya's domestic production of oils and fats consists mainly of refining imported crude vegetable oils. Production falls short of domestic consumption and the import penetration rate is nearly 40 per cent. In 1991, imports of oils and fats exceeded US$40 million. These consist mainly of crude 91Information supplied by the Kenyan authorities. 92Data provided by the Kenyan authorities. C/RM/S/39; Trade Policy Review Mechanism. Page 110 .~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.... vegetable oils, including rape, colza and palm oil. A large share of imports is supplied by the European Communities. Meat-fat imports alone were US$3.3 million in 1991 Exports of oils and fats were estimated at US$9 million in 1991, mostly to neighbouring countries. 436. Domestic production of oils and fats is protected by high and escalating tariffs. Crude oil imports were in 1992 subject to average duties of 25 per cent, while refined oils were imported subject to tariffs ranging from 50 to 60 per cent. Duties on crude oil imports are nevertheless often lower than duties applied to oilseed imports. Exports of processed oils and fats are not eligible for export compensation. Effective rates of protection for edible oils and fats, estimated for 1985, reached 500 per cent. Since then, duties on crude oil imports have been lowered by 10 per cent (from 35 to 25 per cent between 1988 and 1992), while duties on refined oils have been increased from 45 to 60 per cent. Further, consumer price controls on these products under the Specific Control Act have been removed. Effective protection, in the light of these developments, may have increased. (f) Sugar and sugar products 437. The sugar and confectionery sector in Kenya represented in 1991 about 1 per cent of GDP, down from 1.6 per cent in 1988. Estimated value added in the sector was nearly US$70 million in 1991. Both raw and refined sugar are produced in Kenya, as well as a number of sugar products including molasses, glucose and dextrose. The Government is a majority shareholder in each of the seven sugar companies, and up until recently set both input and producer prices; the Government is also responsible for distribution, sales, export and import through the Kenya National Trading Corporation. Other constraints include inadequate and poor quality of cane supply (Section (2) (i) above). Self-sufficiency continues to be the major policy objective in the sector. 438. According to the authorities, the cost of producing sugar in Kenya is very high, while very low or negative returns are a serious barrier to the expansion of sugar production. Through 1992, sugar refining was mostly carried out publicly and the activity was experiencing serious losses. A study of the management and structure of the sugar sector has therefore been commissioned by the Government, with a view to rationalising production costs. However, although there were plans for deregulation, the producer price of sugar in 1992 continued to be set by the Government on an annual basis; sugar was subject to excise duty;93 and consumer prices were regulated under the Specific Price Control Order. The price of sugar was decontrolled in May 1993. The production of molasses resulting from the extraction of sugar is also highly protected, and exempt from VAT. 439. Average import duties on sugar and sugar products have decreased from 41 per cent in 1988 to 25 per cent in 1992, following a lowering of duties on refined sugar and sugar products. Imports of raw sugar, which constitutes the industry's main input, were in 1992 subject to a variable duty, equal either to the difference between the domestic and import prices, or zero if the import price is higher than the domestic price. In addition, imports of both raw and refined sugar are subject to approval by the Ministry of Agriculture. Exports of raw sugar are subject to export licensing, intended to restrain exports and ensure adequate domestic supplies. 93Raw sugar production and imports were in 1992 subject to a specific excise duty of KSh1 per Kg; revenue collected from the duty amounted to over K£19 million (US$17 million) in 1992. 440. Given the barriers to trade, exports of raw and refined sugar were relatively low in 1991 with total exports of sugar and sugar products at less than US$6 billion. Imports in 1991 were in the order of US$37 million. 441. In late 1992, there were acute shortages of sugar in Kenya, as witnessed by day-long queues of consumers awaiting distribution in Nairobi. In 1992, the authorities were reported to have awarded licences to selected importers for 80,000 tonnes of sugar imports (about 20 per cent of consumption and twice the previous year's import volume), which entered the country duty and VAT free.94 (g) Animal feeds 442. The sector's growth is central to the transition process from extensive to intensive methods of livestock grazing, and consequently for the expansion of the meat and dairy sectors as well as for downstream industries. Currently, production of animal feeds suffers from both low quality and low quantity. Crucial inputs, including proteins, vitamins, mineral premixes and oil cakes, are imported. The main component is maize, which is also Kenya's major staple food. In years of grain scarcity, production of animal feeds suffers from domestic input shortages. 443. Animal feed imports were subject to duties averaging 42 per cent in 1992, up from 35 per cent in 1988. The effective rate of protection of the sector is low, and was estimated to be negative in the case of cattle feed in 1985. In exceptional surplus years, feeds are exported; these were about US$3 million in 1991. (ii) Beverages (Table AV.4) 444. The beverage industry is an important sector of production in Kenya, accounting for over 1 per cent of GDP (Table V.2). The sector expanded by approximately 4 per cent a year on average during the 1980s, but growth has slowed down significantly in recent years. Declines in production were recorded in 1991, reflecting falls in production of mineral waters, soft drinks and beer, which constitute the main areas of production. 445. The industry also contributes significantly to government revenue, with excise duties that amounted to nearly K£55 million in 1990, or 2 per cent of total current government revenue. Import duties have been increased from an average 39 per cent in 1988 to nearly 55 per cent in 1992. Both specific and alternate import duties are in place. All imports of beverages are on Import Licensing Schedule 3B, for which foreign exchange allocations for imports were not provided in 1992. (a) Spirits 446. Imports of spirits amounted to about US$4 million in 1991. Exports consist mostly of undenatured ethyl alcohol, amounting to about US$1 million in 1991. The production and importation of spirits is subject to alternate excise duties of 55 per cent and to a VAT of 18 per cent. In addition, the import duty on whisky, gin and other similar spirits is 60 per cent, nearly twice the 1988 level. Overall the effective protection granted to the sector appears to be substantial. 94Financial Times, 16 December 1992. Imported sugar, unlike domestic sugar was not price-controlled in 1992; this report alleges that shortages were to a large extent artificial, and pushed the market price for sugar to four times the unit import value of sugar landed at Mombasa. (b) Wines 447. There is no significant production of wine in Kenya, and most of the consumed quantities are imported. Imports were US$3.5 million in 1990, but declined in 1991. A large share of imports is carried out by Kenya Wine Agencies Ltd, a parastatal company. Imports of wine face duties of close to 60 per cent, which have been increased considerably since 1988. The VAT rate on wine is 18 per cent. (c) Malt liquors and beer 448. Most Kenyan beer is produced for domestic consumption, although exports of beer and malt liquors totalled over US$7 million in 1990. Beer exports are eligible for export compensation. Imports of beer are insignificant, and are subject to a 60 per cent tariff. Excise duties on beer range from 50 to 100 per cent. Imports of malt, used in the production of beer, were USS$3.7 million in 1990. 449. After a continuous expansion of beer production since 1985, production fails in 1991 reflected a number of factors, including water shortages and rising prices of inputs. In addition, the price of beer was regulated under the Specific Price Control Act until May 1993, when it was decontrolled. Also, the doubling of excise taxes during the 1980s may have discouraged consumption. Estimates for 1985 indicated that nearly 60 per cent of value added at world prices was accounted by assistance, which was relatively low by Kenyan standards. Tariff increases on malt-beer from 35 per cent in 1988 to 60 percent in 1992, combined with a reduction in duties on imported malt would tend to have increased effective protection. (d) Soft drinks and mineral waters95 450. Both soft drinks and mineral waters are produced in Kenya, mostly for domestic consumption. In 1992, the sector consisted of one multinational company and employed 2,200 people. Available production data indicates a steady decline in production of mineral waters since 1987. This decline may partly reflect the fall in consumption following price deregulation, as well as a number of taxes affecting production and trade. 451. Production and imports of mineral waters and soft drinks are subject to an excise duty of 35 per cent. In addition, a VAT rate of 18 per cent applies and import tariffs are 60 per cent, down from 90 per cent in 1988. Exports of soft drinks in 1992 were eligible for export compensation. These amounted to less than US$2 million in 1991, and have been on a declining trend. Imports are insignificant. 452. Effective rates of protection estimated for 1985 indicated that assistance provided to the sector was iow (16 per cent of value added at unassisted prices), despite nominal tariff protection ranging between 80 and 100 per cent at the time. The decrease in import duties would suggest that effective protection has declined. 96Fruit juices production and trade is described in Chapter V (4) (i) (c), Fruit and vegetable canning. Kenya C/RM/S/39 Page 113 (iii) Tobacco (Table AV.4) 453. Tobacco products account for 0.4 per cent of Kenyan GDP, with two tobacco-producing companies, British American Tobaccos and Master Mind responsible for the bulk of supplies. According to the authorities, the Govenment does not hold any' participation in these companies, and is not involved in the production and trade of tobacco products. Production is mostly for the domestic market, but exports in 1991 slightly exceeded US$3 million. Production of cigarettes and cigars have stagnated since 1988, while the production of tobacco decreased sharply. 454. Production of cigarettes and tobacco products is subject to excise taxes, ranging between 125 and 135 per cent of excisable value. Excise duties on these products provided revenue of over K$108 million (US$96 million) in 1990. Imports of both unmanufactured and manufactured tobacco are subject to alternate tariffs, whose ad valorem component was 60 per cent in 1992. The specific rate is KSh 1000 per Kg (about 15 US cents per cigarette at 1991 exchange rates). Exports of cigarettes were in 1992 eligible for export compensation. 455. Estimates for 1985 showed an effective rate of protection of 4 per cent, despite the high nominal protection provided by import duties to the sector. Since then, tariffs on tobacco products have been more than halved, from 135 per cent to 60 per cent. On the other hand, protection given by tariffs to tobacco plantations has also decreased, from 100 to 60 per cent. In 1992, raw unmanufactured tobacco inputs were subject to the same tariffs and import licensing requirements as finished products, suggesting that effective assistance may also be low. (iv) Textiles (Table AV.5) 456. Kenya has had a long tradition of textile manufacturing, with the greatest expansion taking place in the 1960s and particularly' in the 1970s. There were in 1991 over forty medium and large scale (50 or more employees) textile firms in operation. The sector is dominated by 13 integrated textile mills, with several other factories also engaged in knitting and weaving activities. The industry concentrates mainly in cotton-textile manufactures, based largely on domestic supplies of cotton, but production of synthetic and blended fabrics has developed, relying on imports of synthetic yarns. Most of the dyes and chemicals used in the industry are imported, as well as textile producing equipment and most of the spares. 457. Ownership is spread between Governnment, local and foreign private interests. There is overall a low degree of concentration and relatively strong domestic competition. Competition from imports is limited by high tariffs, which have nevertheless decreased from nearly 69 per cent on average in 1988 to 55 per cent in 1992. 458. In the 1985-90 period, textile output expanded in line with the rest of the manufacturing sector, growing by' 5.5 per cent per annum on average. In 1990, the growth of the sector accelerated to nearly 13 per cent, partly' reflecting the lowering of tariffs and removal of non-tariff barriers on intermediate imports. This expansion was reversed by a 4.1 per cent fall in production in 1991, caused both b>' falls in global demand and by' shortages of foreign exchange, which in effect reintroduced import restrictions on both inputs and finished products. 459. In terms of manufacturing value added (MVA), textiles, as also other industries that are heavily' dependent on imported inputs, contributed substantially less to growth in the early 1980s when there was increased import stringency. The industries had showed a larger contribution to the overall growth C/RM/S/39 Page 114 Trade Policy Review Mechanism d o i y R v e e h n s of MVA during the 1975-80 period when there was a general relaxation of import controls on intermediate goods. This w;.s again the case in the textile sector between 1985 and 1990, when value added expanded dynamically :following the removal of import barriers. In 1991, value added in the textile sector represented approximately US$58 million, equivalent to 0.8 per cent of GDP. 460. About 13 per cent of Kenya's textile production was exported in 1991, up from 10 per cent in 1985, accounting for almost 3 per cent of Kenya's total export revenues. The bulk of these exports (80 per cent) go to neighboring countries, whose demand has been declining. Kenya is the second largest supplier of sisal textile fibres anA, products to the European Communities. The import substitution policy followed by the Government, coupled with shortages of foreign exchange resulted in a fall in textile imports from US$56 million in .1980 to US$25 million in 1983, and US$18.5 million in 1988. In 1991, imports of textiles totalled US$14 million. (a) Textile yarn and thread 461. Through 1992, the textile spinning and weaving industry continued to benefit from relatively low cost domestic inputs and high protection from imports, while import prices for both yarn and fabrics increased rapidly, allowing the industry to maintain relatively high prices for its output. Shortages in the supplies of raw cotton have nevertheless been a major constraint facing the basic textile industry. These led to a fall in production of ginned cotton, from 3.9 thousand tons in 1990 to 1.4 thousand tonnes in 1991. Since 1991, a new auction-based pricing system for cotton has been introduced. The cotton ginneries continuously suffer from frequent breakdown, as machinery dates back to the 1930s and 1940s. Domestic output was more expensive than imported cotton and synthetic fibres. The price and marketing liberalization was, however, expected to encourage the development of new private ginneries.
11,354
https://github.com/mjmrotek/grpc-rust/blob/master/grpc-examples/route_guide/src/lib.rs
Github Open Source
Open Source
MIT
2,020
grpc-rust
mjmrotek
Rust
Code
27
61
extern crate futures; extern crate grpc; extern crate grpc_protobuf; extern crate protobuf; pub mod route_guide; pub mod route_guide_grpc; pub mod server; pub const DEFAULT_PORT: u16 = 10000;
9,541
https://cstheory.stackexchange.com/questions/19940
StackExchange
Open Web
CC-By-SA
2,013
Stack Exchange
Carson Kern, Dafradium Davinchki, Y Z, citykid, https://cstheory.stackexchange.com/users/68628, https://cstheory.stackexchange.com/users/68629, https://cstheory.stackexchange.com/users/68630, https://cstheory.stackexchange.com/users/68638, https://cstheory.stackexchange.com/users/69351, wtfamidoing
English
Spoken
256
618
Dynamic 2-dimensional orthogonal range reporting in external memory and linear space Orthogonal 2-dimensional range reporting is the problem of storing a set of values from $U \times V$, where $U$ and $V$ are totally ordered universes, subject to queries of the form "Return all stored points in the four-sided box $[a,b] \times [c,d]$", where $a,b \in U$ and $c,d \in V$ are parameters of the query. Nekrich, in "Orthogonal range searching in linear and almost-linear space ", summarizes the best known results for linear space: $$ \begin{array}{|l|l|l|} \hline \text{Reference} & \text{Query Time} & \text{Modification Time} \\ \hline \text{Kreveld and Overmars} & O(\sqrt{n \lg n} + k) & O(\lg n)\\ \hline \text{Chazelle} & O((k+1)\lg^2 n) & O(\lg^2 n)\\ \hline \text{Nekrich} & O(\lg n + k \lg^\varepsilon n) & O(\lg^{3+\varepsilon} n) \\ \hline \end{array} $$ Kreveld and Overmars, "Divided K-d trees" Chazelle, "A functional approach to data structures and its use in multidimensional searching" Nekrich, "Orthogonal range searching in linear and almost-linear space " What are the best known extensions of these in external memory? The result from Arge et al.'s "On two-dimensional indexability and optimal range search indexing" uses superlinear space. The only generalizations I know have bounds $$ \begin{array}{|l|l|l|} \hline \text{Reference} & \text{Query Time} & \text{Modification Time} \\ \hline \text{Kanth and Singh} & O(\sqrt{n/B} + k/B) & O(\lg_B n)\\ \hline \text{Procopiuc et al.} & O(\sqrt{n/B} + k/B) & O\left(\frac{1}{B} \left( \lg_{M/B} \frac{n}{B}\right) \left(\lg \frac{n}{M}\right)\right)\\ \hline \end{array} $$ Kanth and Singh, "Optimal dynamic range searching in non-replicating index structures" Procopiuc et al., "Bkd-tree: A Dynamic Scalable kd-tree"
23,794
US-27379363-A_2
USPTO
Open Government
Public Domain
1,963
None
None
English
Spoken
5,474
6,661
2. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said wall forms of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from east concrete swimming pool walls subsequent to hardening of the concrete thereof; support members disposed above said wall forms and said excavated earthen structure and extending to a location beyond said wall forms and said excavated earthen structure; means engaging the earth and supporting said support members at said location said wall forms suspended from said support members; and lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure. 3. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said walls of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; support members disposed above and extending horizontally beyond said wall forms; said wall forms suspended from said support members; lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure portions of said support members extending beyond said wall forms; and coping forms disposed outwardly beyond said excavated earthen structure in spaced relation therewith said support members supported on said coping. 4. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the :surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said walls of said excavated earthen structure in the ground; said assembly of Wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; support members spanning and abridging said excavated earthen structure and extending horizontally beyond said wall forms; means removably connecting and suspending said wall forms from said beams; lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavation portions of said beams extending beyond said wall forms; and coping forms disposed outwardly beyond said excavated earthen structure in spaced relation therewith and coupled to said extending portions of said support members; and means supporting opposite ends of said beams on said coping forms. 5. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms inwardly of and spaced from the walls of said excavated earthen structure; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; support members extending horizontally above said wall forms; said wall forms suspended from said support members; lower edges of said Wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; coping forms connected to said support members outwardly of said wall forms, whereby coping may be cast integral with wall structures in said excavated earthen structure outwardly of said wall forms; and a plurality of stakes driven into the ground and holding said support members and said coping for-ms. 6. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms inwardly of and spaced from the walls of said excavated earthen structure; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; support members extending horizontally above said wall forms; said wall forms suspended from said support members; lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; coping for-ms connected to said support members outwardly of said Wall forms, whereby coping may be cast integral with wall structures in said excavated earthen structure outwardly of said wall forms; and a plurality of stakes driven into the ground and holding said coping forms; and a means of said coping forms and said support members for engaging stakes are driven and disposed in the ground against said support members for connecting and holding said coping forms and said support members in position relative to said excavated earthen structure in the ground. 7. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said walls of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from east concrete swimming pool walls subsequent to hardening of the concrete thereof; support members supported on the ground and above said excavated earthen structure and said wall forms; said wall forms suspended from said support members; means embedded in the ground outwardly of said excavated earthen structure and holding said support members in juxtaposition relative to said excavated earthen structure; and lower edges of said Wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; and means laterally bracing said side wall forms to resist movement thereof away from the side walls of said excavated earthen structure when concrete material is poured between said side walls and said wall forms. 8. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said walls of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; horizontally disposed support members above said excavated earthen structure and said wall forms; and means removably connecting and suspending said wall forms from said support members; means embedded in the ground outwardly of said excavated earthen structure and holding said support members in juxtaposition relative to said excavated earthen structure; and lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said Wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; and means laterally bracing said side wall forms to resist movement thereof away from the side walls of said excavated earthen structure when concrete material is poured between said side walls and said wall forms; said last mentioned means comprising braces disposed between said wall forms and said support members and extending on an incline relative to said side wall forms. 9. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of the walls of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from east concrete swimming pool walls subsequent to hardening of the concrete thereof; a center pole having a base supported in said bottom portion of said excavated earthen structure; support members connected with said center pole and extending horizontally beyond said wall for-ms; means supported by the earth and embedded therein outwardly of said excavated earthen structure, said means supporting said extending portions of said support members; means removably connecting and suspending said wall forms from said support members; and lower edges of said wall forms being thus suspended in spaced relation with the bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure. 10. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said wall forms of said excavated earthen structure in the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; horizontal beams disposed above said wall forms and said excavated earthen structure and extending beyond said wall forms and said excavated earthen structure; means supporting said beams in horizontal position; means embedded in the earth outwardly beyond said excavated earthen structure and holding said beams in juxtaposition relative thereto; means removably connecting and suspending said wall forms from said beams; and lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; said means supporting said beams in horizontal position comprising structure engaging the ground outwardly beyond said excavated earthen structure. 11. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of the walls of said excavated earthen structure in the ground and spaced therefrom; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; a center pole having a base supported in said excavated earthen structure on the bottom thereof; beams connected with said center pole and having extending portions disposed beyond the walls of said excavated earthen structure; means supported by the earth and embedded therein outwardly of said excavated earthen structure, said means supporting said extending portions of said beams; means removably connecting and suspending said wall forms from said beams; lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; and means for vertically adjusting and elongating said center pole to dispose said beams at a desired grade level. 12. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of the walls of said excavated earthen structure in the ground and spaced therefrom; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from east concrete swimming pool walls subsequent to hardening of the concrete thereof; a center pole having a base supported in said excavated earthen structure on the bottom thereof; beams connected with said center pole and having extending portions disposed beyond the walls of said excavated earthen structure; means supported by the earth outwardly of said excavated earthen structure, said means supporting said extending portions of said beams; means removably connecting and suspending said wall forms from said beams; lower edges of said wall forms being thus suspended in spaced rela tion with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; and means for vertically adjusting and elongating said center pole to dispose said beams at a desired grade level; said last mentioned means having right and left hand screwthreaded members for extending said center pole. l 13. 14. A method for monolithic casting of swimming pools or tanks comprising the preparation of an excavation in and below the surface of the ground thereby having earthen side walls and an earthen bottom; the placement of an assembly of substantially vertical wall forms in said excavation in spaced relation with the side Walls thereof; suspending said wall forms so that their lower edges are in spaced relation with the bottom of said excavation and a considerable distance below the surface of the ground; pouring concrete in the bottom of said excavation and between the side walls of said excavation and said wall forms and directly in contact with said earthen side walls and bottom whereby the material between said wall forms and the side walls of said excavation flows monolithically into the material on the bottom thereof; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 15. A method for monolithic casting of swimming pools or tanks comprising the preparation of an excavation in and below the surface of the ground thereby having earthen side walls and an earthen bottom; the placement of an assembly of reinforcing members in said excavation near the bottom and side thereof; the placing of wall forms in said excavation in spaced relationship with the side walls thereof and inwardly of said reinforcing members; suspending said wall forms so that their lower edges are in spaced relation with the bottom of said excavation; and a considerable distance below the surface of the ground; pouring concrete in the bottom of said excavation and between the side walls of said excavation and said wall forms and around said reinforcing members whereby the material between said wall forms and the side walls of said excavation flows monolithically into the material on the bottom thereof; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 16. A method for monolithic casting of swimming pools or tanks comprising the preparation of an excavation in and below the surface of the ground thereby having earthen side walls and an earthen bottom; the placement of an assembly of reinforcing members in said excavation near the bottom and side thereof; the placing of wall forms in said excavation in spaced relationship with the side walls thereof and inwardly of said reinforcing members; suspending said wall forms so that their lower edges are in spaced relation with the bottom of said excavation; and a considerable distance below the surface of the ground; pouring concrete in the bottom of said excavation and between the side walls of said excavation. and said wall forms and around said reinforcing members whereby the material between said wall forms and the side walls of said excavation-flows monolithically into the material on the bottom thereof; and vibrating said wall forms during the placement of said concrete material in said excavation; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 17. A method for monolithic casting of swimming pools or tanks comprising a preparation of an excavation in and below the surface of the ground thereby having earthen side walls and an earthen bottom; the placement of an assembly of reinforcing members in said excavation near the bottom and side walls thereof; the placing of wall forms in said excavation in spaced relationship with the side walls thereof and inwardly of said reinforcing members; suspending said wall forms so that their lower edges are in spaced relation with the bottom of said excavation; and a considerable distance below the surface of the ground; pouring concrete in the bottom of said excavation and between the side walls of said excavation and said wall forms and around said reinforcing members whereby the material between the wall forms and the side walls of said excavation flows monolithically into the material on the bottom thereof and then vibrating. the concrete material between said wall forms and said side walls of said excavation; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 18. In a means for monolithic casting of swimming pools or tanks the combination of: an excavated earthen structure in and below the surface of the earth said excavated earthen structure having earthen side walls and an earthen bottom; an assembly of wall forms disposed inwardly of and spaced relative to said walls of said excavated earthen structure on the ground; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; horizontally disposed beams above said excavated earthen structure and said wall forms; and means removably connecting and suspending said wall forms from said beams; and lower edges of said wall forms being thus suspended in spaced relation with said bottom of said excavated earthen structure; said lower edges of said wall forms being considerably below the surface of the earth adjacent said excavated earthen structure; arcuate vertically stepped curved step form walls coupled to one of said first memtioned wall forms, the concave sides of said curved step forming form sections communicating directly with the outer sides of said wall forms and disposed to face and communicate with the wall of said excavated earthen structure. 19. In a means for monolithic casting of swimming pools or concrete liners in an excavated earthen structure the combination of: an excavated earthen structure having an earthen bottom and substantially vertical earthen side walls: beam structures extending across and above said excavated earthen structure; ends of said beam structures extending beyond the sides of said. excavated earthen structure; second structures embedded in the earth outwardly of and beyond the sides of said excavated earthen structure, said second structures connected to said beam structures for holding them in juxtaposition relative to said excavated earthen structure; wall forms fixed to said beam structures and extending downwardly into said excavated earthen structure in spaced relation wi'th'the earthen side walls thereof; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; lower edges of said wall forms being considerably below said second structures and the upper surface of the ground and in spaced relation with the bottom of said excavated earthen structure said wall forms disposed near opposite sides of said excavated earthen structure and interconnected by said beam structures for holding them in juxtaposition relative to each other and to the side walls and bottom of said excavated earthen structure. 20. In a means for monolithic casting of swimming pools or concrete liners in an excavated earthen structure the combination of: an excavated earthen structure having an earthen bottom and substantially vertical earthen side walls; beam structures extending across and above said excavated earthen structure; ends of said beam structures extending beyond the sides of said excavated earthen structure; stakes embedded in the soil outwardly of and beyond the sides of said excavation, said stakes connected to said beam structures for holding them in juxtaposition relative to said excavated earthen structure; wall forms fixed to said beam structures and extending downwardly into said excavated earthen structure in spaced relation with the earthen side walls thereof; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; lower edges of said wall forms being considerably below said stakes and the upper surface of the ground and in spaced relation with the bottom of said excavated earthen structure; said wall formsdisposed near opposite sides of said excavated earthen structure and interconnected by said beam structures for holding them in juxtaposition relative to each other and to the side walls and bottom of said excavated earthen structure. 21. A method for monolithic casting of swimming pools or concrete liners in an excavation consisting of: the preparation of an excavation having an earthen bottom and substantially vertical earthen side walls; the placement of beam structures across and above said excavation with ends of said structures extending beyond the sides of said excavation; embedding stake structures in the earth beyond the sides of said excavation and connecting said ends of said beam srtuctures to said stake structures embedded in the earth to hold said beam structures in place and in juxtaposition relative to said excavation; fixedly suspending wall forms in downwardly extending disposition from said beam structures near opposite side walls of said excavation to interconnect and brace said wall forms by said beam structures thereby locating sides of said wall forms in spaced relation to the sides of said excavation and thereby locating the lower edges of said wall forms a distance considerably below the ground surface and in spaced relation with the bottom of said excavation; and then pouring and vibrating concrete between the sides of said excavation and said forms and in the bottom of said excavation whereby said concrete flows together at the sides and bottom of said excavation below the lower edges of said wall forms; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 22. A method for monolithic casting of swimming pools or concrete liners in an excavation consisting of: the preparation of an excavation having an earthen bottom and substantially vertical earthen side walls; the placement of beam structures across and above said excavation with ends of said structures extending beyond the sides of said excavation; embedding second structures in the earth beyond the sides of said excavation and connecting said ends of said beam structures to said second structures embedded in the earth to hold said beam structures in place and in juxtaposition relative to said excavation; fixedly suspending wall forms in downwardly extending dis position from said beam structures near opposite side walls of said excavation to interconnect and brace said wall forms by said beam structures, thereby locating sides of said wall forms in spaced relation to the sides of said excavation and thereby locating lower edges of said wall forms a distance considerably below the ground surface and in spaced relation with the bottom of said excavation; and then pouring concrete between the sides of said excavation and said forms and in the bottom of said excavation whereby said concrete flows together at the sides and bottom of said excavation below the lower edges of said wall forms; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. v 23. A method for monolithic casting of swimming pools or concrete liners in an excavation consisting of: the preparation of an excavation having an earthen bottom and substantially vertical earthen side walls; lining said excavation with reinforcing bars; the placement of beam structures acrossand above said excavation with ends of said structures extending beyond the sides of said excavation; embedding second structures in the earth beyond the sides of said excavation and connecting said ends of said beam structures to said second structures embedded in the earth to hold said beam structures in place and in juxtaposition relative to said excavation; fixedly suspending wall forms in downwardly extending disposition from said beam structures near opposite side walls of said excavation to interconnect and brace said wall forms by said beam structures, thereby locating sides of said Wall forms in spaced relation to the sides of said excavation and thereby locating the lower edges of said wall forms a distance considerably below the ground surface and in spaced relation with the bottom of said excavation; and then pouring concrete between the sides of said excavation and said forms and in the bottom of said excavation whereby said concrete flows together at the sides and bottom of said excavation below the lower edges of said wall forms; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. 24. In a means for monolithic casting of swimming pools or concrete liners in an excavated earthen structure the combination of an excavated earthen structure having an earthen bottom and substantially vertical earthen side walls; first beam structures extending across and above said excavated earthen structure; ends of said beam structures extending beyond the sides of said excavated earthen structure; second beam structures interconnecting said first beam structures and disposed laterally thereof; third structures embedded in the earth outwardly of and beyond the sides of said excavated earthen structure, said third structures connected to said first and second beam structures for holding them in juxtaposition relative to said excavated earthen structure; wall form structure fixed to said beam structures and extending downwardly into said excavated earthen structure in spaced relation with the earthen side walls thereof; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; lower edges of said wall form structure being considerably below said third structures and the upper surface of the ground and in spaced relation with the bottom of said excavated earthen structure; said wall form structure disposed near opposite sides of said excavated earthen structure and interconnected by said beam structures for holding them in juxtaposition relative to each other and to the side walls and bottom of said excavated earthen structure. 25. In a means for monolithic casting of swimming pools or concrete liners in an excavated earthen structure the combination of: an excavated earthen structure having an earthen bottom and substantially vertical earthen side walls; first beam structures extending across and above said excavated earthen structure; ends of said beam structures extending beyond the sides of said excavated earthen structure; second beam structures interconnecting -said first beam structures and disposed laterally thereof; third structures embedded in the earth outwardly of and beyond the sides of said excavated earthen structure, said third structures connected to said first and second beam structures for holding them in juxtaposition relative to said excavated earthen structure; wall form structure fixed to said beam structures and extending downwardly into said excavated earthen structure in spaced relation with the earthen side Walls thereof; said assembly of wall forms comprising; a plurality of form sections; and means removably connecting said sections together whereby they may be disconnected from each other and removed from cast concrete swimming pool walls subsequent to hardening of the concrete thereof; lower edges of said wall form structure being considerably below said third structures and the upper surface of the ground and in spaced relation with the bottom of said excavated earthen structure; said wall form structure disposed near opposite sides of said excavated earthen structure and interconnected by said beam structures for holding them in juxtaposition relative to each other and to the side walls and bottom of said excavated earthen structure; and telescopic extension means of said beam structures disposed to permit variation in the length thereof to accommodate addition or subtraction of said wall form structure. ' 26. A metod for monolithic casting of swimming pools or concrete liners in an excavation consisting of z the preparation of an excavation having an earthen bottom and substantially vertical earthen side Walls; forming a substantially horizontal recessed ledge in said side walls; placing beam structures across and above said excavation with ends of said structures extending beyond the sides of said excavation; embedding stake structures in the earth beyond the sides of said excavation and connecting 5 said ends of said beam structures to said stake structures embedded in the earth to hold said beam structures in place and in juxtaposition relative to said excavation; fixedly suspending wall forms in downwardly extending disposition from said beam structures near opposite side walls of said excavation to interconnect and brace said wall forms by said beam structures thereby locating sides of said wall forms in spaced relation to the sides of said excavation and thereby locating the lower edges of said wall forms a distance considerably below the ground surface and in spaced relation with the bottom of said excavation; and then pouring, vibrating and placing concrete between the sides of said excavation and said forms and placing said concrete on said ledge and causing it vertically to support concrete, and then packing concrete on said excavation side walls below said ledge and said forms and onto the bottom of said excavation; then permitting said concrete to harden and then removing said beam structures and said wall forms from the area of said excavation. References Cited UNITED STATES PATENTS 35 ROBERT F. WHITE, Primary Examiner. ALEXANDER BRODMERKEL, Examiner. J. A. FINLAYSON, Assistant Examiner. 1. IN A MEANS FOR MONOLITHIC CASTING OF SWIMMING POOLS OR TANKS THE COMBINATION OF: AN EXCAVATED EARTHEN STRUCTURE IN AND BELOW THE SURFACE OF THE EARTH SAID EXCAVATED EARTHEN STRUCTURE HAVING EARTHEN SIDE WALLS AND AN EARTHEN BOTTOM; AN ASSEMBLY OF WALL FORMS DISPOSED INWARDLY OF AND SPACED RELATIVE TO SAID WALLS OF SAID EXCAVATED EARTHEN STRUCTURE IN THE GROUND; SAID ASSEMBLY OF WALL FORMS COMPRISING; A PLURALITY OF FORM SECTIONS; AND MEANS REMOVABLY CONNECTING SAID SECTIONS TOGETHER WHEREBY THEY MAY BE DISCONNECTED FROM EACH OTHER AND REMOVED FROM CAST CONCRETE SWIMMING POOL WALLS SUBSEQUENT TO HARDENING OF THE CONCRETE THEREOF; SUPPORT MEMBERS SUPPORTED ON THE GROUND AND DISPOSED ABOVE SAID EXCAVATED EARTHEN STRUCTURE AND SAID WALL FORMS; SAID WALL FORMS SUSPENDED FROM SAID SUPPORT MEMBERS; AND LOWER EDGES OF SAID WALL FORMS BEING THUS SUSPENDED IN SPACED RELATION WITH SAID SIDE WALLS AND SAID BOTTOM OF SAID EXCAVATED EARTHEN STRUCTURE; SAID LOWER EDGES OF SAID WALL FORMS BEING CONSIDERABLY BELOW THE SURFACE OF THE EARTH ADJACENT SAID EXCAVATED EARTHEN STRUCTURE..
50,018
https://github.com/sanfusu/Sparse/blob/master/validation/bitwise-cast.c
Github Open Source
Open Source
MIT
2,022
Sparse
sanfusu
C
Code
147
405
typedef unsigned int u32; typedef u32 __attribute__((bitwise)) __be32; /* Implicit casts of 0, legal */ static __be32 foo(void) { __be32 x = 0; return 0; } /* Explicit cast of 0, legal */ static __be32 bar(void) { return (__be32)0; } /* Implicit casts of nonzero, bad */ static __be32 baz(void) { __be32 x = 0x2a; return 99; } /* Explicit cast of nonzero, bad */ static __be32 quux(void) { return (__be32)1729; } /* Explicit case of nonzero forced, legal */ static __be32 quuy(void) { return (__attribute__((force)) __be32) 1730; } /* * check-name: conversions to bitwise types * check-command: sparse -Wbitwise $file * check-error-start bitwise-cast.c:21:20: warning: incorrect type in initializer (different base types) bitwise-cast.c:21:20: expected restricted __be32 [usertype] x bitwise-cast.c:21:20: got int bitwise-cast.c:23:16: warning: incorrect type in return expression (different base types) bitwise-cast.c:23:16: expected restricted __be32 bitwise-cast.c:23:16: got int bitwise-cast.c:29:17: warning: cast to restricted __be32 * check-error-end */
17,745
https://hy.wikipedia.org/wiki/%D4%B1%D5%AC%D5%AB%D5%BD%D5%A1%D5%B6%20%D5%B0%D6%80%D5%A1%D5%B7%D6%84%D5%B6%D5%A5%D6%80%D5%AB%20%D5%A1%D5%B7%D5%AD%D5%A1%D6%80%D5%B0%D5%B8%D6%82%D5%B4%20%28%D6%86%D5%AB%D5%AC%D5%B4%2C%202010%29
Wikipedia
Open Web
CC-By-SA
2,023
Ալիսան հրաշքների աշխարհում (ֆիլմ, 2010)
https://hy.wikipedia.org/w/index.php?title=Ալիսան հրաշքների աշխարհում (ֆիլմ, 2010)&action=history
Armenian
Spoken
394
2,093
Ալիսը Հրաշքների աշխարհում (), արկածային հեքիաթ 2010 թվականի։ Ֆիլմը կարելի է համարել Լուիս Քերոլի «Ալիսը Հրաշքների աշխարհում» և «Ալիսը Հայելու աշխարհում» գրքերի շարունակությունը։ Դերերում Միա Վասիկովսկա - Ալիս Կինգսլի - Ալիս։ Կերպարը ստեղծելուց առաջ, սցենարիստ Լինդա Վուլվերտոնը ուշադիր ուսումնասիրել է Վիկտորյա թագուհու դարաշրջանի աղջիկներին և ստեղծել Ալիսին նրա բնույթի։ Վեցամյա Ալիսի դերը խաղացել է Մայրի Էլլա Չալլեն։ Ջոնի Դեփ - Տերանտ Հայտոպ - Անխելք գլխարկագործ Ալան Ռիկման - Աբսոլեմ - թրթուր Էն Հետուեյ - Միրանա Մրամորնայա - Սպիտակ թագուհի Ստիվեն Ֆրայ - Չեշիրյան կատու Մայքլ Շին - Նիվենս ՄակՏվիցպ - Սպիտակ ճագար Տիմոտի Սպոլ - Բայարդ Խամար - Բայարդ Բարբառա Վինդձոռ - Մալյամկին - Սոնյայի մկնիկ Պոլ Ուայտհաուս - Տանկերի Իրվիկետ - մարտի ճագար Մետտ Լուկաս - Տռալյալյա և Տռուլյալյա Մայքլ Գոֆ - Դոդո թռչուն Իմելդա Ստոնտոն - Բարձրահասակ ծաղիկներ Հակառակորդներ Հելենա Բոնեմ Կարտեր - Իռացիբետա Մալինովայա - Կարմիր թագուհի Կրիսպին Գլովեր - Իլոսովիչ Ստեին - սրտի խաղաքարտ զինվոր Քրիստոֆեր Լի - Բառմագլոտ Ֆրենկ Ուելկեր - Բրանդաշմիգ Կարմիր թագուհու պալատականները Լյուսի Դավենպորտ - երկարականջ Ջոել Սվետոու - հաստափոր Հոլլի Հոուկինս - կնճիթիկ Ջեսիկա Օելոուո - շիկահեր Էտան Կոն Ռիչարդ Ալոնսո - լայնաճակատ Ջիմ Կարտեր - դահիճ Ալիսի հարազատները Մարտոն Չոկաշ - Չարալզ Կինգսլի, Ալիսի հայրը Լինդսի Դունկան - Հելեն Կինգսլի, Ալիսի մայրը Ֆրենսիս դը լա Տուր - Իմոգենա, Ալիսի զառանցող մորաքույրը Ջեմմա Պաուել - Մարգարետ Մանչեստր, Ալիսի քույրը Սաունդթրեքեր Ֆիլմի երաժշտությունը գրել է կոմպոզիտոր Դեննի Էլֆմանը։ Ալբոմը թողարկվել է 2010 թվականի մարտի 2-ին և ներառում է հետևյալ կազմը՝ Շարունակություն 2012 թվականի դեկտեմբերի 7-ին «Variety» ամսագիրը հայտարարել էր ֆիլմի զարգացման մասին։ Ֆիլմի սցենարի վրա կրկին աշխատում է Լինդա Վուլվերտոնը։ Արտաքին հղումներ Պաշտոնական կայք Подземелье Тима Бертона «Алиса в стране чудес по Тиму Бертону». Журнал «Чайка» Ծանոթագրություններ 2010 ֆիլմեր Թիմ Բարթոնի ֆիլմեր Անգլերեն ֆիլմեր Ամերիկյան ֆենտեզի ֆիլմեր Գրական ստեղծագործությունների էկրանավորումներ Ֆիլմեր խոսող կենդանիների մասին Ամերիկյան ֆիլմեր IMAX ֆիլմեր Լոս Անջելեսում նկարահանված ֆիլմեր Ամերիկյան եռաչափ ֆիլմեր Walt Disney Pictures ֆիլմեր Ամերիկյան սիքվել ֆիլմեր 2010-ականների ֆենտեզի ֆիլմեր BAFTA մրցանակի դափնեկիր ֆիլմեր Ամերիկյան ֆենտեզի արկածային ֆիլմեր Բրիտանական վեպերի էկրանավորումներ Ֆիլմեր, որոնց գործողությունները տեղի են ունենում Անգլիայում Ամերիկյան ռիմեյք ֆիլմեր Դիսնեյյան ֆիլմեր 3D ֆիլմեր Ամերիկյան ընտանեկան ֆիլմեր Ամերիկյան արկածային ֆիլմեր Ֆեմինիստական ֆիլմեր Անգլիայում նկարահանված ֆիլմեր 2010-ականների արկածային ֆիլմեր Ամերիկյան կինոկատակերգություններ Ամերիկյան թրիլեր ֆիլմեր Բրիտանական ֆենտեզի ֆիլմեր Ամերիկյան ֆանտաստիկ ֆիլմեր 2010-ականների ֆիլմեր Ֆիլմերի երաժշտություն ըստ Դենի Էլֆմանի Ալիսը հրաշքների աշխարհում գրքի էկրանավորումներ Ֆիլմեր, որոնց գործողությունները տեղի են ունենում Լոնդոնում Բրիտանական ընտանեկան ֆիլմեր Բրիտանական արկածային ֆիլմեր Համակարգչային անիմացիոն ֆիլմեր Միջնադարի թեմատիկ ֆիլմեր
26,738
https://github.com/dearcode2018/auth-entire/blob/master/spring-security-simple/src/main/java/com/hua/transform/DateConverter.java
Github Open Source
Open Source
Apache-2.0
null
auth-entire
dearcode2018
Java
Code
234
830
/** * @filename DateConverter.java * @description * @version 1.0 * @author qianye.zheng */ package com.hua.transform; import java.text.DateFormat; import java.text.ParseException; import java.text.SimpleDateFormat; import java.util.Date; import java.util.GregorianCalendar; import com.thoughtworks.xstream.converters.ConversionException; import com.thoughtworks.xstream.converters.Converter; import com.thoughtworks.xstream.converters.MarshallingContext; import com.thoughtworks.xstream.converters.UnmarshallingContext; import com.thoughtworks.xstream.io.HierarchicalStreamReader; import com.thoughtworks.xstream.io.HierarchicalStreamWriter; /** * @type DateConverter * @description * @author qianye.zheng */ public class DateConverter implements Converter { /* 日期格式 */ private String dateFormat; /** * @description 构造方法 * @author qianye.zheng */ public DateConverter() { this("yyyy-MM-dd'T'HH:mm:ss"); } /** * @description 构造方法 * @param dateFormat * @author qianye.zheng */ public DateConverter(String dateFormat) { super(); this.dateFormat = dateFormat; } /** * * @description * @param type * @return * @author qianye.zheng */ @SuppressWarnings({"all"}) @Override public boolean canConvert(Class type) { return Date.class == type; } /** * * @description * @param arg0 * @param writer * @param context * @author qianye.zheng */ @Override public void marshal(Object arg0, HierarchicalStreamWriter writer, MarshallingContext context) { } /** * * @description * @param reader * @param context * @return * @author qianye.zheng */ @Override public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { final GregorianCalendar calendar = new GregorianCalendar(); // yyyy-MM-dd'T'HH:mm:ss //格式化当前系统日期 final DateFormat df = new SimpleDateFormat(dateFormat); try { calendar.setTime(df.parse(reader.getValue())); } catch (ParseException e) { throw new ConversionException(e.getMessage(), e); } return calendar.getTime(); } /** * @return the dateFormat */ public final String getDateFormat() { return dateFormat; } /** * @param dateFormat the dateFormat to set */ public final void setDateFormat(String dateFormat) { this.dateFormat = dateFormat; } }
44,964
https://github.com/x2nie/pengucapan-jam/blob/master/test_pengucapan.py
Github Open Source
Open Source
MIT
null
pengucapan-jam
x2nie
Python
Code
189
847
import unittest from pengucapan import ucapkan, eja tepat = 'tepat' satu = 'satu' dua = 'dua' tiga = 'tiga' empat = 'empat' lima = 'lima' enam = 'enam' tujuh = 'tujuh' delapan = 'delapan' sembilan = 'sembilan' sepuluh = 'sepuluh' sebelas = 'sebelas' # duabelas = 'dua belas' belas = 'belas' puluh = 'puluh' kurang = 'kurang' lebih = 'lebih' seperempat = 'seperempat' setengah = 'setengah' class TestAngka(unittest.TestCase): def test_jari(self): self.assertEqual(eja(2), [dua]) self.assertEqual(eja(20), [dua, puluh]) self.assertEqual(eja(22), [dua, puluh, dua]) self.assertEqual(eja(12), [dua, belas]) class TestJam(unittest.TestCase): def assertFewEqual(self, a, b): fewa = a[:len(b)] return self.assertEqual(fewa, b) def test_jam_menit(self): self.assertFewEqual(ucapkan(1, 0), [satu, tepat]) self.assertFewEqual(ucapkan(11, 0), [sebelas, tepat]) self.assertFewEqual(ucapkan(12, 0), [dua, belas, tepat]) def test_perempat(self): self.assertFewEqual(ucapkan(1, 15), [satu, seperempat]) self.assertFewEqual(ucapkan(11, 15), [sebelas, seperempat]) self.assertFewEqual(ucapkan(11, 30), [setengah, dua, belas]) self.assertFewEqual(ucapkan(11, 45), [dua, belas, kurang, seperempat]) def test_lebih(self): self.assertFewEqual(ucapkan(1, 5), [satu, lebih, lima]) self.assertFewEqual(ucapkan(1, 10), [satu, lebih, sepuluh]) self.assertFewEqual(ucapkan(11, 20), [sebelas, lebih, dua, puluh]) self.assertFewEqual( ucapkan(12, 25), [dua, belas, lebih, dua, puluh, lima]) # self.assertFewEqual(ucapkan(11, 45), [dua, belas, kurang, seperempat]) def test_kurang(self): self.assertFewEqual(ucapkan(10, 55), [sebelas, kurang, lima]) self.assertFewEqual(ucapkan(1, 50), [dua, kurang, sepuluh]) self.assertFewEqual(ucapkan(11, 40), [dua, belas, kurang, dua, puluh]) self.assertFewEqual(ucapkan(11, 45), [dua, belas, kurang, seperempat])
43,772
https://stackoverflow.com/questions/51508884
StackExchange
Open Web
CC-By-SA
2,018
Stack Exchange
Polish
Spoken
149
316
Is it necessary to Test the DAO classes when i already tested the Facade with Junit? im currently testing my JSF Webapplication which is based on this Tutorial. https://www.javacodegeeks.com/2012/07/full-web-application-tomcat-jsf.html the Facade controlls the Transaction with the DAO Methods. How would a DAO JUnit Test look like? Do i even have to test them when i test the Facade? This is an example how i tested the Facade Methods Thx for your help! @Test public void newUserTest() { User user = new User (); userDAO.beginTransaction(); user.setUsername("Test"); user.setPassword("123"); userDAO.save(user); User user 2 = adminDAO.findUserWithUsername(admin.getUsername()); assertEquals("Test", user2.getUsername()); userDAO.rollback(); userDAO.closeTransaction(); } Yes, you need to write the test for the DAO. It's more of integration testing with the database. Its always better to have a test for each line of code. Ideally, in Facade, it should be a unit test where you will just verify if the DAO is called with correct parameters.
19,613
https://github.com/nike4613/GoosMods.3/blob/master/HatGoos/Config.cs
Github Open Source
Open Source
BSD-3-Clause
2,021
GoosMods.3
nike4613
C#
Code
312
754
using System; using System.Collections.Generic; using System.Drawing; using System.Linq; using System.Text; using System.Threading.Tasks; using Nett; namespace HatGoos { public class Config { public enum HatType { Default, None, Custom } [TomlComment(" Valid values: \"" + nameof(HatType.Default) + "\", \"" + nameof(HatType.Custom) + "\", and \"" + nameof(HatType.None) + "\".", CommentLocation.Prepend)] [TomlComment(" \"" + nameof(HatType.Default) + "\" uses the default hat", CommentLocation.Prepend)] [TomlComment(" \"" + nameof(HatType.Custom) + "\" uses the hat file specified in \"" + nameof(CustomHatPath) + "\"", CommentLocation.Prepend)] [TomlComment(" \"" + nameof(HatType.None) + "\" shows no hat at all", CommentLocation.Prepend)] public HatType HatMode { get; set; } = HatType.Default; [TomlComment("")] [TomlComment(" This may be a path to a 'hatfile', a folder in the structure of a 'hatfile', or an image supported by System.Drawing.Bitmap.", CommentLocation.Prepend)] [TomlComment(" A 'hatfile' is a ZIP archive containing a file named \"" + HatGoosMod.HatfileMeta + "\".", CommentLocation.Prepend)] [TomlComment(" This TOML configuration file should have the following entries:", CommentLocation.Prepend)] [TomlComment(" - " + nameof(HatSettings.ImageName) + ": the name of the entry in the hatfile archive that represents the hat image", CommentLocation.Prepend)] [TomlComment(" - " + nameof(HatSettings.HorizontalSize) + ": the size of the horizonal axis of the hat in terms of head diameters", CommentLocation.Prepend)] [TomlComment(" - " + nameof(HatSettings.HatPosition) + ": the vertical position of the hat in head radii", CommentLocation.Prepend)] [TomlComment(" You may override the settings specified in the hatfile's configuration using an [" + nameof(Overrides) + "] field in the same structure.")] public string CustomHatPath { get; set; } = ""; public HatSettings Overrides { get; set; } = null; } public class HatSettings { public string ImageName { get; set; } = null; public float? HorizontalSize { get; set; } = null; public float? HatPosition { get; set; } = null; public HatSettings WithOverride(HatSettings over) => new HatSettings { HorizontalSize = over?.HorizontalSize ?? HorizontalSize, HatPosition = over?.HatPosition ?? HatPosition, ImageName = over?.ImageName ?? ImageName }; } }
4,691
https://github.com/YeFeiyangx/grownup_share/blob/master/reinforcement-learning-an-introduction-master/chapter06/maximization_bias.py
Github Open Source
Open Source
MIT
2,021
grownup_share
YeFeiyangx
Python
Code
488
1,366
####################################################################### # Copyright (C) # # 2016-2018 Shangtong Zhang([email protected]) # # 2016 Kenta Shimada([email protected]) # # Permission given to modify the code as long as you keep this # # declaration at the top # ####################################################################### import numpy as np import matplotlib matplotlib.use('Agg') import matplotlib.pyplot as plt from tqdm import tqdm import copy #%% import numpy as np # state A STATE_A = 0 # state B STATE_B = 1 # use one terminal state STATE_TERMINAL = 2 # starts from state A STATE_START = STATE_A # possible actions in A ACTION_A_RIGHT = 0 ACTION_A_LEFT = 1 # probability for exploration EPSILON = 0.1 # step size ALPHA = 0.1 # discount for max value GAMMA = 1.0 # possible actions in B, maybe 10 actions ACTIONS_B = range(0, 10) # all possible actions STATE_ACTIONS = [[ACTION_A_RIGHT, ACTION_A_LEFT], ACTIONS_B] # state action pair values, if a state is a terminal state, then the value is always 0 INITIAL_Q = [np.zeros(2), np.zeros(len(ACTIONS_B)), np.zeros(1)] # set up destination for each state and each action TRANSITION = [[STATE_TERMINAL, STATE_B], [STATE_TERMINAL] * len(ACTIONS_B)] # [[2, 1],[2]] TRANSITION #%% # choose an action based on epsilon greedy algorithm def choose_action(state, q_value): if np.random.binomial(1, EPSILON) == 1: return np.random.choice(STATE_ACTIONS[state]) else: values_ = q_value[state] return np.random.choice([action_ for action_, value_ in enumerate(values_) if value_ == np.max(values_)]) # take @action in @state, return the reward def take_action(state, action): if state == STATE_A: return 0 return np.random.normal(-0.1, 1) # if there are two state action pair value array, use double Q-Learning # otherwise use normal Q-Learning def q_learning(q1, q2=None): state = STATE_START # track the # of action left in state A left_count = 0 while state != STATE_TERMINAL: if q2 is None: action = choose_action(state, q1) else: # derive a action form Q1 and Q2 action = choose_action(state, [item1 + item2 for item1, item2 in zip(q1, q2)]) if state == STATE_A and action == ACTION_A_LEFT: left_count += 1 reward = take_action(state, action) next_state = TRANSITION[state][action] if q2 is None: active_q = q1 target = np.max(active_q[next_state]) else: if np.random.binomial(1, 0.5) == 1: active_q = q1 target_q = q2 else: active_q = q2 target_q = q1 best_action = np.random.choice([action_ for action_, value_ in enumerate(active_q[next_state]) if value_ == np.max(active_q[next_state])]) target = target_q[next_state][best_action] # Q-Learning update active_q[state][action] += ALPHA * ( reward + GAMMA * target - active_q[state][action]) state = next_state return left_count # Figure 6.7, 1,000 runs may be enough, # of actions in state B will also affect the curves def figure_6_7(): # each independent run has 300 episodes episodes = 300 runs = 1000 left_counts_q = np.zeros((runs, episodes)) left_counts_double_q = np.zeros((runs, episodes)) for run in tqdm(range(runs)): q = copy.deepcopy(INITIAL_Q) q1 = copy.deepcopy(INITIAL_Q) q2 = copy.deepcopy(INITIAL_Q) for ep in range(0, episodes): left_counts_q[run, ep] = q_learning(q) left_counts_double_q[run, ep] = q_learning(q1, q2) left_counts_q = left_counts_q.mean(axis=0) left_counts_double_q = left_counts_double_q.mean(axis=0) plt.plot(left_counts_q, label='Q-Learning') plt.plot(left_counts_double_q, label='Double Q-Learning') plt.plot(np.ones(episodes) * 0.05, label='Optimal') plt.xlabel('episodes') plt.ylabel('% left actions from A') plt.legend() plt.savefig('../images/figure_6_7.png') plt.close() if __name__ == '__main__': figure_6_7()
43,595
https://www.wikidata.org/wiki/Q2442612
Wikidata
Semantic data
CC0
null
Tony Hollings
None
Multilingual
Semantic data
1,857
4,142
Tony Hollings US-amerikanischer Footballspieler Tony Hollings Geschlecht männlich Tony Hollings Mitglied von Sportmannschaft oder -verein Houston Texans Tony Hollings Mitglied von Sportmannschaft oder -verein New York Jets Tony Hollings Geburtsdatum 1981 Tony Hollings ist ein(e) Mensch Tony Hollings Vorname Tony Tony Hollings Land der Staatsangehörigkeit Vereinigte Staaten Tony Hollings Bild Tony Hollings 2012.jpg Tony Hollings Tätigkeit Footballspieler Tony Hollings Geburtsort Macon Tony Hollings Pro-Football-Reference-Spieler-ID H/HollTo00 Tony Hollings Masse Tony Hollings Spielerposition/Spezialität Runningback Tony Hollings NFL.com-ID 2505618, Grund für die Zurückweisung defekter Weblink Tony Hollings Höhe Tony Hollings Sportart American Football Tony Hollings Freebase-Kennung /m/0fdr52 Tony Hollings Trading-Card-Database-Personen-ID 18727 Tony Hollings Familienname Hollings Tony Hollings NFL.com-ID (neues Schema) tony-hollings Tony Hollings Commons-Kategorie Tony Hollings Tony Hollings American football player Tony Hollings sex or gender male Tony Hollings member of sports team Houston Texans Tony Hollings member of sports team New York Jets Tony Hollings date of birth 1981 Tony Hollings instance of human Tony Hollings given name Tony Tony Hollings country of citizenship United States of America Tony Hollings image Tony Hollings 2012.jpg Tony Hollings occupation American football player Tony Hollings place of birth Macon Tony Hollings Pro-Football-Reference.com player ID H/HollTo00 Tony Hollings mass Tony Hollings position played on team / speciality running back Tony Hollings NFL.com ID (former scheme) 2505618, reason for deprecated rank link rot Tony Hollings height Tony Hollings sport American football Tony Hollings educated at Twiggs County School District Tony Hollings Freebase ID /m/0fdr52 Tony Hollings Trading Card Database person ID 18727 Tony Hollings family name Hollings Tony Hollings NFL.com player ID (new scheme) tony-hollings Tony Hollings Commons category Tony Hollings Tony Hollings joueur de football américain Tony Hollings sexe ou genre masculin Tony Hollings membre de l'équipe de sport Texans de Houston Tony Hollings membre de l'équipe de sport Jets de New York Tony Hollings date de naissance 1981 Tony Hollings nature de l’élément être humain Tony Hollings prénom Tony Tony Hollings pays de nationalité États-Unis Tony Hollings image Tony Hollings 2012.jpg Tony Hollings occupation joueur de football américain Tony Hollings lieu de naissance Macon Tony Hollings identifiant Pro Football Reference H/HollTo00 Tony Hollings masse Tony Hollings position de jeu ou spécialité running back Tony Hollings identifiant National Football League 2505618, cause de la dépréciation lien mort Tony Hollings hauteur Tony Hollings sport football américain Tony Hollings scolarité Twiggs County School District Tony Hollings identifiant Freebase /m/0fdr52 Tony Hollings identifiant Trading Card Database 18727 Tony Hollings nom de famille Hollings Tony Hollings identifiant National Football League (nouveau schéma) tony-hollings Tony Hollings catégorie Commons Tony Hollings Tony Hollings futbolista estadounidense Tony Hollings sexo o género masculino Tony Hollings miembro del equipo deportivo Houston Texans Tony Hollings miembro del equipo deportivo New York Jets Tony Hollings fecha de nacimiento 1981 Tony Hollings instancia de ser humano Tony Hollings nombre de pila Tony Tony Hollings país de nacionalidad Estados Unidos Tony Hollings imagen Tony Hollings 2012.jpg Tony Hollings ocupación jugador de fútbol americano Tony Hollings lugar de nacimiento Macon Tony Hollings Pro-Football-Reference.com ID de jugador H/HollTo00 Tony Hollings masa Tony Hollings posición de juego running back Tony Hollings identificador NFL.com 2505618, motivo de discontinuación enlace roto Tony Hollings altura Tony Hollings deporte fútbol americano Tony Hollings Identificador Freebase /m/0fdr52 Tony Hollings identificador Trading Card Database 18727 Tony Hollings apellido Hollings Tony Hollings NFL.com ID de jugador (nuevo esquema) tony-hollings Tony Hollings categoría en Commons Tony Hollings Tony Hollings Amerikaans Gridiron Footballspeler Tony Hollings sekse of geslacht mannelijk Tony Hollings lid van sportteam of club Houston Texans Tony Hollings lid van sportteam of club New York Jets Tony Hollings geboortedatum 1981 Tony Hollings is een mens Tony Hollings voornaam Tony Tony Hollings land van nationaliteit Verenigde Staten van Amerika Tony Hollings afbeelding Tony Hollings 2012.jpg Tony Hollings beroep Americanfootballspeler Tony Hollings geboorteplaats Macon Tony Hollings Pro Football Reference-identificatiecode voor speler H/HollTo00 Tony Hollings massa Tony Hollings positie van speler / specialiteit running back Tony Hollings NFL.com-identificatiecode 2505618, reden voor afkeuring linkrot Tony Hollings hoogte Tony Hollings sport American football Tony Hollings Freebase-identificatiecode /m/0fdr52 Tony Hollings Trading Card Database-identificatiecode voor persoon 18727 Tony Hollings familienaam Hollings Tony Hollings NFL.com-identificatiecode (nieuw schema) tony-hollings Tony Hollings Commonscategorie Tony Hollings Tony Hollings Tony Hollings spol moški Tony Hollings datum rojstva 1981 Tony Hollings primerek od človek Tony Hollings ime Tony Tony Hollings država državljanstva Združene države Amerike Tony Hollings slika Tony Hollings 2012.jpg Tony Hollings poklic igralec ameriškega nogometa Tony Hollings kraj rojstva Macon Tony Hollings masa Tony Hollings igralni položaj running back Tony Hollings višina Tony Hollings šport ameriški nogomet Tony Hollings Freebase /m/0fdr52 Tony Hollings priimek Hollings Tony Hollings kategorija v Zbirki Tony Hollings Tony Hollings Tony Hollings jenis kelamin atau gender laki-laki Tony Hollings anggota klub olahraga Houston Texans Tony Hollings anggota klub olahraga New York Jets Tony Hollings tanggal lahir 1981 Tony Hollings adalah manusia Tony Hollings nama pribadi Tony Tony Hollings kewarganegaraan Amerika Serikat Tony Hollings gambar Tony Hollings 2012.jpg Tony Hollings pekerjaan pemain sepak bola Amerika Tony Hollings tempat lahir Macon Tony Hollings massa Tony Hollings tinggi Tony Hollings olahraga futbol Tony Hollings penanda Freebase /m/0fdr52 Tony Hollings nama keluarga Hollings Tony Hollings kategori di Commons Tony Hollings Tony Hollings Tony Hollings Tony Hollings jinih kalamin laki-laki Tony Hollings tanggal lahia 1981 Tony Hollings adolah urang Tony Hollings kawarganagaroan Amerika Sarikat Tony Hollings gambar Tony Hollings 2012.jpg Tony Hollings massa Tony Hollings tinggi Tony Hollings kategori di Commons Tony Hollings Tony Hollings Tony Hollings wewadi lanang Tony Hollings tanggal lair 1981 Tony Hollings minangka manungsa Tony Hollings kawarganagaran Amérikah Sarékat Tony Hollings gambar Tony Hollings 2012.jpg Tony Hollings tetenger Freebase /m/0fdr52 Tony Hollings kategori ing Commons Tony Hollings Tony Hollings Tony Hollings nyaéta manusa Tony Hollings gambar Tony Hollings 2012.jpg Tony Hollings Tony Hollings Tony Hollings Tony Hollings futbolista estatunidenc Tony Hollings sexe o gènere masculí Tony Hollings membre de l'equip esportiu Houston Texans Tony Hollings membre de l'equip esportiu New York Jets Tony Hollings data de naixement 1981 Tony Hollings instància de ésser humà Tony Hollings prenom Tony Tony Hollings ciutadania Estats Units d'Amèrica Tony Hollings imatge Tony Hollings 2012.jpg Tony Hollings ocupació jugador de futbol americà Tony Hollings lloc de naixement Macon Tony Hollings identificador Pro-Football-Reference.com de jugador H/HollTo00 Tony Hollings massa Tony Hollings posició a l'equip running back Tony Hollings identificador NFL.com (antic esquema) 2505618, causa de la descontinuació enllaç trencat Tony Hollings alçària Tony Hollings esport futbol americà Tony Hollings identificador Freebase /m/0fdr52 Tony Hollings identificador Trading Card Database 18727 Tony Hollings cognom Hollings Tony Hollings identificador NFL.com (nou esquema) tony-hollings Tony Hollings categoria de Commons Tony Hollings Tony Hollings xugador de fútbol americanu estauxunidense Tony Hollings sexu masculín Tony Hollings miembru del equipu deportivu Houston Texans Tony Hollings miembru del equipu deportivu New York Jets Tony Hollings fecha de nacimientu 1981 Tony Hollings instancia de humanu Tony Hollings nome Tony Tony Hollings país de nacionalidá Estaos Xuníos Tony Hollings imaxe Tony Hollings 2012.jpg Tony Hollings ocupación xugador de fútbol americanu Tony Hollings llugar de nacimientu Macon Tony Hollings masa Tony Hollings altor Tony Hollings deporte fútbol americanu Tony Hollings identificador en Freebase /m/0fdr52 Tony Hollings apellíu Hollings Tony Hollings categoría de Commons Tony Hollings Tony Hollings peileadóir Meiriceánach Tony Hollings gnéas nó inscne fireann Tony Hollings dáta breithe 1981 Tony Hollings sampla de duine Tony Hollings céadainm Tony Tony Hollings tír shaoránachta Stáit Aontaithe Mheiriceá Tony Hollings íomhá Tony Hollings 2012.jpg Tony Hollings gairm imreoir peile Meiriceánaí Tony Hollings áit bhreithe Macon, Georgia Tony Hollings mais Tony Hollings ionad ar an bhfoireann / speisialtacht cúlaí reatha Tony Hollings airde Tony Hollings spórt peil Mheiriceánach Tony Hollings sloinne Hollings Tony Hollings catagóir Commons Tony Hollings Tony Hollings lojtar i futbollit amerikan Tony Hollings gjinia mashkull Tony Hollings data e lindjes 1981 Tony Hollings instancë e njeri Tony Hollings emri Tony Tony Hollings shtetësia Shtetet e Bashkuara të Amerikës Tony Hollings imazh Tony Hollings 2012.jpg Tony Hollings profesioni lojtar i futbollit amerikan Tony Hollings masa Tony Hollings lartësia Tony Hollings sport Futboll Amerikan Tony Hollings Freebase ID /m/0fdr52 Tony Hollings mbiemri Hollings Tony Hollings kategoria në Commons Tony Hollings تونى هولينجس تونى هولينجس الجنس دكر تونى هولينجس تاريخ الولاده 1981 تونى هولينجس واحد من انسان تونى هولينجس الجنسيه امريكا تونى هولينجس الصوره Tony Hollings 2012.jpg تونى هولينجس الوظيفه لعيب فوتبول امريكانى تونى هولينجس مكان الولاده ماكون تونى هولينجس معرف دوري كرة القدم الامريكانى 2505618 تونى هولينجس معرف فرى بيس /m/0fdr52 تونى هولينجس تصنيف بتاع كومونز Tony Hollings Tony Hollings Tony Hollings sex or gender male Tony Hollings date of birth 1981 Tony Hollings instance of human Tony Hollings given name Tony Tony Hollings image Tony Hollings 2012.jpg Tony Hollings mass Tony Hollings position (on team) Running back Tony Hollings NFL.com ID (former scheme) 2505618 Tony Hollings Freebase ID /m/0fdr52 Tony Hollings family name Hollings Tony Hollings Commons category Tony Hollings Tony Hollings Tony Hollings sex or gender male Tony Hollings member of sports team Houston Texans Tony Hollings member of sports team New York Jets Tony Hollings date of birth 1981 Tony Hollings instance of human Tony Hollings given name Tony Tony Hollings image Tony Hollings 2012.jpg Tony Hollings mass Tony Hollings position (on team) running back Tony Hollings NFL.com ID (former scheme) 2505618 Tony Hollings height Tony Hollings Freebase ID /m/0fdr52 Tony Hollings surname Hollings Tony Hollings Commons category Tony Hollings Tony Hollings giocatore di football americano statunitense Tony Hollings sesso o genere maschio Tony Hollings membro della squadra sportiva Houston Texans Tony Hollings membro della squadra sportiva New York Jets Tony Hollings data di nascita 1981 Tony Hollings istanza di umano Tony Hollings prenome Tony Tony Hollings paese di cittadinanza Stati Uniti d'America Tony Hollings immagine Tony Hollings 2012.jpg Tony Hollings occupazione giocatore di football americano Tony Hollings luogo di nascita Macon Tony Hollings identificativo Pro Football Reference di un giocatore H/HollTo00 Tony Hollings massa Tony Hollings ruolo (nella squadra) running back Tony Hollings identificativo NFL.com (vecchio sistema) 2505618, motivo di classificazione sconsigliata collegamento interrotto Tony Hollings altezza Tony Hollings sport football americano Tony Hollings identificativo Freebase /m/0fdr52 Tony Hollings identificativo Trading Card Database 18727 Tony Hollings cognome Hollings Tony Hollings identificativo NFL.com di un giocatore (nuovo sistema) tony-hollings Tony Hollings categoria su Commons Tony Hollings Tony Hollings jogador de futebol americano dos Estados Unidos Tony Hollings sexo ou género masculino Tony Hollings membro da equipa desportiva Houston Texans Tony Hollings membro da equipa desportiva New York Jets Tony Hollings data de nascimento 1981 Tony Hollings instância de ser humano Tony Hollings primeiro nome Tony Tony Hollings país de nacionalidade Estados Unidos Tony Hollings imagem Tony Hollings 2012.jpg Tony Hollings ocupação jogador de futebol americano Tony Hollings local de nascimento Macon Tony Hollings massa Tony Hollings posição running back Tony Hollings altura Tony Hollings desporto futebol americano Tony Hollings identificador Freebase /m/0fdr52 Tony Hollings apelido Hollings Tony Hollings categoria da Commons Tony Hollings Tony Hollings Tony Hollings sexo ou gênero masculino Tony Hollings data de nascimento 1981 Tony Hollings instância de ser humano Tony Hollings primeiro nome Tony Tony Hollings país de cidadania Estados Unidos Tony Hollings imagem Tony Hollings 2012.jpg Tony Hollings ocupação jogador de futebol americano Tony Hollings massa Tony Hollings posição Running Back Tony Hollings altura Tony Hollings sobrenome Hollings Tony Hollings categoria na Commons Tony Hollings
4,645
US-50708609-A_1
USPTO
Open Government
Public Domain
2,009
None
None
English
Spoken
4,749
7,027
Control Device for a Multi-phase DC-DC Converter and Related Multi-phase DC-DC Converter ABSTRACT A control device for a multi-phase DC-DC converter is disclosed. The multi-phase DC-DC converter includes a plurality of converting channels. The control device includes an error amplifier for comparing a feedback signal of the multi-phase DC-DC converter and a reference signal to generate a comparison result, a main comparator for comparing the comparison result and a first sawtooth signal corresponding to a first converting channel of the plurality of converting channels to generate a first PWM signal, and at least one computing module each corresponding to one of the plurality of the converting channels, for generating a PWM signal according to the comparison result, a corresponding sawtooth signal, a corresponding sensing signal, and a sensing signal corresponding to a previous converting channel of the converting channel to control the converting channel. BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention is related to a control device for a multi-phase DC-DC converter and related multi-phase DC-DC converter, and more particularly, to a control device and related multi-phase DC-DC converter device for systematically adjusting a channel current of a current converting channel by comparing a sensing signal of the current converting channel with a sensing signal of a previous converting channel to balance a channel current of each converting channel. 2. Description of the Prior Art An electronic device includes various components, each of which may operate at a different voltage level. Therefore, a DC-DC (direct current to direct current) voltage converter is definitely required to adjust (step up or step down) and stabilize the voltage level in the electronic device. With the advancement of electronic technology, various electronic devices, such as a microprocessor in a personal computer, demand ever higher operating current. Thus, a multi-phase DC-DC converter formed with a plurality of parallelized converting channels is widely adopted by circuit designers. With multiple converting channels, ripples on input and output currents of the multi-phase DC-DC converter can be dispersed over the converting channels. In other words, the circuit designers can utilize smaller, cheaper filtering capacitors in the multi-phase DC-DC converter without sacrificing filtering performance of a traditional single-phase DC-DC converter. Please refer to FIG. 1, which is a schematic diagram of a multi-phase DC-DC converter 10 of the prior art. The multi-phase DC-DC converter 10 mainly comprises a control circuit 100, a feedback module 102, current sensors 104_1, 104_2, 104_3, 104_4, and converting channels 110_1, 110_2, 110_3, 110_4. Compared to the traditional single-phase DC-DC converter, the multi-phase DC-DC converter 10 can provide a higher output current IOUT via the parallelized converting channels 110_1, 110_2, 110_3, 110_4. Note that each of the converting channels includes a power switch (112_1-112_4) and an output inductor (L_1-L_4), and a duty cycle of the power switches 112 is determined by a corresponding pulse width modulation (PWM) signal outputted by the control circuit 100, so as to produce a desired channel current (ICH[1]-ICH[4]). However, due to unpredictable manufacturing process variations or other factors, individual differences exist between the converting channels 110_1, 110_2, 110_3, 110_4, such that some of the converting channels are irrationally burdened with heavier current loadings. In other words, power components of each of the converting channels 110_1, 110_2, 110_3, 110_4 are burdened with unequal current loadings. For that reason, current bearing ability of the power components should be enhanced to ensure that the multi-phase DC-DC converter 10 can operate regularly. However, the stronger the current bearing ability, the more expensive the manufacturing cost. Even worse, if a minority of the converting channels were burdened with a majority of the overall current loading, heat would be concentrated at the minority channels, causing remarkable increases in operating temperatures of the power components of the minority channels, implying a shorter life of the power components. Therefore, the multi-phase DC-DC converter 10 has to adjust PWM signals PWM[1]-PWM[4], so as to balance current loadings of the converting channels 110_1, 110_2, 110_3, 110_4. To balance the current loadings, the prior art has developed various methods for adjusting the PWM signals PWM[1]-PWM[4]. In detail, the current sensors 104 generate sensing signals SEN[1]-SEN[4] directly proportional to the channel currents ICH[1]-ICH[4] and sent to the control circuit 100. In addition, the feedback module 102 generates a feedback signal VFB sent to the control circuit 100 according to an output voltage VOUT of the multi-phase DC-DC converter 10. As a result, the control circuit 100 can adjust duty cycles of the PWM signals PWM[1]-PWM[4] based upon the sensing signals SEN[1]-SEN[4]and the feedback signal VFB, to balance the current loading of each converting channel. Please continue to refer to FIG. 2, which is a schematic diagram of the control circuit 100 shown in FIG. 1. The control circuit 100 includes parallelized comparators 200, 202, 204, 206, a comparison module 208 and a sawtooth wave generating module 210. The comparison module 208 and the sawtooth wave generating module 210 are respectively utilized for providing comparison results COMP[1]-COMP[4] and sawtooth signals RAMP[1]-RAMP[4] as input sources of the comparators 200, 202, 204, 206 respectively corresponding to the converting channels 110_1, 110_2, 110_3, 110_4 in accordance with the sensing signals SEN[1]-SEN[4]and the feedback signal VFB. As a result, the control circuit 100 can adjust the duty cycles of the PWM signals PWM[1]-PWM[4] by modulating the comparison results COMP[1]-COMP[4] and sawtooth signals RAMP[1]-RAMP[4]. For example, in U.S. Pat. No. 6,670,794 B1, the sensing signals SEN[1]-SEN[4] are current signals, and the sawtooth wave generating module 210 modulates the sawtooth signal of each converting channel by averaging the sensing signals SEN[1]-SEN[4], i.e. RAMP[1]=RMP[1]+k×(SEN_(AVG)−SEN[1]) RAMP[2]=RMP[2]+k×(SEN_(AVG)−SEN[2]) RAMP[3]=RMP[3]+k×(SEN_(AVG)−SEN[3]) RAMP[4]=RMP[4]+k×(SEN_(AVG)−SEN[4]) where RMP[1], RMP[2], RMP[3], RMP[4] respectively represent standard sawtooth signals of the converting channels 110_1, 110_2, 110_3, 110_4, k is a constant, and SEN_(AVG)=(SEN[1]+SEN[2]+SEN[3]+SEN[4])÷4 represents an average of the sensing signals SEN[1]-SEN[4]. In addition, in U.S. Pat. No. 6,897,636 B2, the sensing signals SEN[1]-SEN[4] are voltage signals, and the comparison module 208 modulates the comparison result of each converting channel by averaging the sensing signals SEN[1]-SEN[4], i.e. COMP[1]=CMP[1]+g×(SEN_(AVG)−SEN[1]) COMP[2]=CMP[2]+g×(SEN_(AVG)−SEN[2]) COMP[3]=CMP[3]+g×(SEN_(AVG)−SEN[3]) COMP[4]=CMP[4]+g×(SEN_(AVG)−SEN[4]) where CMP[1], CMP[2], CMP[3], CMP[4] respectively represent unmodulated standard comparison results of the converting channels 110_1, 110_2, 110_3, 110_4, and g is a constant. However, regardless of whether the sensing signals SEN[1]-SEN[4] are current or voltage signals, the control circuit 100 has to include massive and complex circuits to perform the step of averaging the sensing signals SEN[1]-SEN[4], implying a remarkable increase in power consumption and circuit layout area of the multi-phase DC-DC converter 10. Therefore, balancing current loading of each converting channel in a simpler, more economical way has been a major focus of the industry. SUMMARY OF THE INVENTION It is therefore a primary objective of the claimed invention to provide a control device for a multi-phase DC-DC converter and related multi-phase DC-DC converter. The present invention discloses a control device for a multi-phase DC-DC converter. The multi-phase DC-DC converter comprises a plurality of converting channels. The control device comprises an error amplifier, a main comparator and at least one computing module. The error amplifier is utilized for comparing a feedback signal of the multi-phase DC-DC converter and a reference signal to generate a comparison result. The main comparator is coupled to the error amplifier and utilized for comparing the comparison result and a first sawtooth signal corresponding to a first converting channel of the plurality of converting channels to generate a first pulse width modulation (PWM) signal. Each computing module is corresponding to one of the plurality of converting channels and utilized for generating a PWM signal according to the comparison result, a sawtooth signal corresponding to the converting channel, a sensing signal corresponding to the converting channel, and a sensing signal corresponding to a previous converting channel of the converting channel to control the converting channel. The present invention further discloses a multi-phase DC-DC converter, which comprises an output end, a plurality of converting channels, a current sensing module, a feedback module, a reference signal generator and a control device. The output end is utilized for providing an output signal. Each converting channels comprises a power switch for adjusting a channel current of the converting channel according to a pulse width modulation (PWM) signal corresponding to the converting channel, and an output inductor coupled between the power switch and the output end. The current sensing module comprises a plurality of sensing units, each coupled to an output inductor of a corresponding converting channel to generate a feedback signal according to a channel current passing through the output inductor. The feedback module is coupled to the output end and utilized for generating a feedback signal according to the output signal. The reference signal generator is utilized for generating a reference signal. The control device comprises an error amplifier, a main comparator and at least one computing module. The error amplifier is coupled to the feedback module and the reference signal generator and utilized for comparing the feedback signal and the reference signal to generate a comparison result. The main comparator is coupled to the error amplifier and a power switch of a first converting channel of the plurality of converting channels and utilized for comparing the comparison result and a first sawtooth signal corresponding to the first converting channel to generate a first PWM signal sent to the power switch. Each computing module is corresponding to one of the plurality of converting channels and utilized for generating a PWM signal sent to a power switch of the converting channel according to the comparison result, a sawtooth signal corresponding to the converting channel, a sensing signal corresponding to the converting channel, and a sensing signal corresponding to a previous converting channel of the converting channel. These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of a multi-phase DC-DC converter of the prior art. FIG. 2 is a schematic diagram of a control circuit shown in FIG. 1. FIG. 3 is a schematic diagram of a control device according to an embodiment of the present invention. FIG. 4A-FIG. 4E are time-variant schematic diagrams of a computing result of the control device of FIG. 3 and a corresponding PWM signal. FIG. 5 is a schematic diagram of a multi-phase DC-DC converter according to an embodiment of the present invention. FIG. 6 is a schematic diagram of a control process according to an embodiment of the present invention. DETAILED DESCRIPTION Please refer to FIG. 3, which is a schematic diagram of a control device 30 according to an embodiment of the present invention. The control device 30 is designed for a multi-phase DC-DC converter including N converting channels. The control device 30 includes an error amplifier 300, a main comparator 302 and computing modules 310_2-310_N. The error amplifier 300 is utilized for comparing a feedback signal VFB of the multi-phase DC-DC converter and a reference signal VREF to generate a comparison result COMP. The main comparator 302 is utilized for comparing the comparison result COMP and a first sawtooth signal VST[1] corresponding to a first converting channel of the N converting channels to generate a first pulse width modulation (PWM) signal PWM[1] sent to the first converting channel. With respect to the computing modules 310_2-310_N, taking the computing module 310_2 for example, the computing module 310_2 corresponds to a second converting channel and is utilized for generating a PWM signal PWM[2] according to the comparison result COMP, a sawtooth signal VST[2] corresponding to the second converting channel, a sensing signal SEN[2] corresponding to the second converting channel, and a sensing signal SEN[1] corresponding to a previous converting channel (the first converting channel) of the second converting channel, to control the second converting channel. The computing modules 310_3-310_N function the same as the computing module 310_2, and differ only in corresponding converting channels. Therefore, functions and corresponding relationships of the computing modules 310_3-310_N can be analogized from the above description of the computing module 310_2, and are not further narrated herein. In general, the control device 30 replaces the control circuit 100 of the multi-phase DC-DC converter 10 of the prior art, i.e. the control device 30 is utilized for balancing a channel current of each converting channel. Note that, based upon practical requirements, the control device 30 may not only be employed in the multi-phase DC-DC converter 10 including four converting channels, but also in a multi-phase DC-DC converter including a plurality of converting channels. Besides, for each of the converting channels other than the first converting channel, the control device 30 can modulate a PWM signal PWM[x] of the converting channel according to a sensing signal SEN[x] of the converting channel and a sensing signal SEN[x−1] of a previous converting channel of the converting channel. That is, an “exclusive” computing module 310-x is installed in the control device 30 for each of the converting channels other than the first converting channel. The computing module 310-x “customizes” the PWM signal PWM[x] for the converting channel based upon the sensing signals SEN[x], SEN[x−1], so as to control the converting channel. In detail, regarding the “customization” process, please continue to refer to FIG. 3. In FIG. 3, each computing module 310 _(—) x includes a subtracter 312 _(—) x, a compensation unit 314 _(—) x, a computing unit 316 _(—) x and a parallel comparator 318 _(—) x. Taking the computing module 310_2 for example, a subtracter 312_2 subtracts the sensing signal SEN[1] of the first converting channel from the sensing signal SEN[2] of the second converting channel to generate a subtracting result SUB[2]=SEN[2]−SEN[1]. Next, the compensation unit 314_2 compensates a gain of the subtracting result SUB[2] according to the subtracting result SUB[2] to generate a compensating result CPS[2]. The computing unit 316_2 adjusts a sawtooth signal VST[2] corresponding to the second converting channel according to the compensating result CPS[2] to generate a computing result VMST[2]. Finally, the parallel comparator 318_2 compares the comparison result COMP of the error amplifier 300 and the computing result VMST[2] to generate the PWM signal PWM[2] to control the second converting channel. Certainly, “customization” processes of the computing modules 310_3-310_N can be analogized and derived from the above, and are not further narrated herein. In short, an arbitrary computing module 310 _(—) x in charge of one of the converting channels other than the first converting channel firstly acquires a difference SUB[x] between the sensing signals SEN[x], SEN[x−1] respectively corresponding to the “current” and “previous” converting channels, i.e. the computing module 310 _(—) x computes SUB[x]=SEN[x]−SEN[x−1]; next, the computing module 310 _(—) x compensates a gain of the difference SUB[x], such as by multiplying the difference SUB[x] by a constant K to acquire a compensating result CPS[x]=K×SUB[x]=K×(SEN[x]−SEN[x−1]) ; and finally, the computing module 310 _(—) x adjusts the sawtooth signal VST[x] in accordance with the compensating result CPS[x] to generate a modulated sawtooth signal VMST[x]. Note that based on the spirit of the multi-phase DC-DC converter, phases of sawtooth signals VST[1]-VST[N] preferably differ by 360/N degrees in turn, i.e. ∠ VST[x]−∠VST[x−1]=360°/N. Compared to the prior art, the present invention replaces the step of averaging all sensing signals with a step of computing differences between each two adjacent sensing signals SEN[x], SEN[x−1] corresponding to two adjacent converting channels. Therefore, practical layout complexity of the circuit can be greatly simplified to reduce power consumption and simplify the steps of balancing channel currents. In detail, the computing unit 316 _(—) x preferably shifts a DC bias V[x] of the sawtooth signal VST[x] in accordance with the magnitude of the compensating result CPS[x], i.e. ΔV[x]=CPS[x], such that the modulated sawtooth signal (computing result) VMST[x]=VST[x]+CPS[x]=VST[x]+K×(SEN[x]−SEN[x−1]). For example, please refer to FIG. 4A, FIG. 4B and FIG. 4C. FIG. 4A is a time-variant schematic diagram of the sawtooth signal VST[x] directly sent to the parallel comparator 318 _(—) x without modulation and the corresponding PWM signal PWM[x]. Assume that one of the channel currents is higher than the others by a wide margin. In such a situation, the subtracting result SUB[x] corresponding to the converting channel with the maximum channel current has SUB[x]=SEN[x]−SEN[x−1]>0, and the computing unit 316 _(—) x accordingly shifts “up” the sawtooth signal VST[x] by a margin of ΔV[x]=K×(SEN[x]−SEN[x−1]) to generate the computing result VMST[x], as illustrated in FIG. 4B. As a result, an “ON” ratio of the PWM signal PWM[x] can be reduced to decay the maximum channel current. Inversely, if one of the channel currents is lower than the others by a wide margin, the computing unit 316 _(—) x shifts “down” the DC bias V[x] of the sawtooth signal VST[x] to increase the “ON” ratio of the PWM signal PWM[x], so as to enhance the minimum channel current, as illustrated in FIG. 4C. Moreover, the computing unit 316 _(—) x can further be utilized for adjusting an amplitude A[x] (or slope) of the sawtooth signal VST[x] in accordance with the magnitude of the compensating result CPS[x], such that an amplitude Amp[x] of the computing result VMST[x] has Amp[x]=A[x]+CPS[x]=A[x]+K×(SEN[x]−SEN[x−1]). For example, please refer to FIG. 4D and FIG. 4E. Similarly, assume that one of the channel currents is higher than the others by a wide margin. In such a situation, the subtracting result SUB[x] corresponding the converting channel with the maximum channel current has SUB[x]=SEN[x]−SEN[x−1]>0, and the computing unit 316 _(—) x accordingly scales “up” the amplitude A[x] of the sawtooth signal VST[x] to the amplitude Amp[x], to generate the computing result VMST[x], as illustrated in FIG. 4D. As a result, the “ON” ratio of the corresponding PWM signal PWM[x] can be reduced to decay the maximum channel current. Inversely, if one of the channel currents is lower than the others by a wide margin, the computing unit 316 _(—) x scales “down” the amplitude A[x] of the sawtooth signal VST[x] to the amplitude Amp[x], to increase the “ON” ratio of the PWM signal PWM[x], so as to enhance the minimum channel current, as illustrated in FIG. 4E. FIG. 4B to FIG. 4E illustrate a fact that regardless of whether the DC bias V[x] or the amplitude A[x] of the sawtooth signal VST[x] is modified, the control device 30 can balance each channel current in a systematic and orderly way by means of adjusting the duty cycle of the PWM signal PWM[x]. To implement the control device 30, please refer to FIG. 5, which is a schematic diagram of a multi-phase DC-DC converter 50 according to an embodiment of the present invention. The control device 30 and the multi-phase DC-DC converter 10 of the prior art are integrated into the multi-phase DC-DC converter 50. For simplicity, in FIG. 5 and FIG. 1, similar reference numerals are utilized to denote similar units. The multi-phase DC-DC converter 50 includes N converting channels 500_1-500_N, which can be removed or added based upon practical conditions, and therefore differs from the multi-phase DC-DC converter 10, which includes a fixed number of converting channels. In addition, in the multi-phase DC-DC converter 50, the current sensors 104_1-104_N are integrated into a current sensing module 510 to generate the sensing signals SEN[1]-SEN[N] required by the control device 30. Lastly, the multi-phase DC-DC converter 50 further includes a reference signal generator 512 for generating a reference signal VREF required by the error amplifier 300 of the control device 30. Operations of the multi-phase DC-DC converter 50 and the control device 30 can be summarized into a control process 60, as illustrated in FIG. 6. The control process 60 includes the following steps: Step 600: Start. Step 602: The feedback module 102 generates the feedback signal VFB according to an output signal VOUT of the multi-phase DC-DC converter 50. Step 604: The reference signal generator 512 generates the desired reference signal VREF. Step 606: The error amplifier 300 compares the feedback signal VFB and the reference signal VREF to generate the comparison result COMP. Step 608: The main comparator 302 compares the reference signal VREF and the comparison result COMP to generate the first PWM signal PWM[1]. Step 610: The current sensing module 510 generates the sensing signal SEN[1] according to a channel current ICH[1] passing through an output inductor L_1 of the first converting channel 600_1. Step 612: Set the second converting channel 500_2 as an under-modulation converting channel CH_x. Step 614: Determine whether channel currents of all the converting channels are adjusted? If yes, proceed to Step 630; else, proceed to Step 616. Step 616: The current sensing module 510 generates the sensing signal SEN[x] according to a channel current ICH[x] passing through the output inductor L_x of the under-modulation converting channel CH_x. Step 618: The subtracter 312_x subtracts the sensing signal SEN[x−1] of a previous converting channel from the sensing signal SEN[x] to generate the subtracting result SUB[x]. Step 620: The compensating unit 314 _(—) x compensates the gain of the subtracting result SUB[x] to generate the compensating result CPS[x]. Step 622: The computing unit 316 _(—) x modulates the sawtooth signal VST[x] corresponding to the under-modulation converting channel CH_x according to the compensating result CPS[x] to generate the computing result VMST[x]. Step 624: The parallel comparator 310 _(—) x compares the comparison result COMP and the computing result VMST[x] to generate the PWM signal PWM[x] sent to the power switch 112 _(—) x of the under-modulation converting channel CH_x. Step 626: The power switch 112 _(—) x controls the channel current ICH[x] according to the PWM signal PWM[x]. Step 628: Set a next converting channel CH_x+1 of the under-modulation converting channel CH_x to be the new under-modulation channel CH_x, and proceed to Step 614. Step 630: End. Detailed description of the control process 60 can be referred from the above, and are not further narrated. In the prior art, the control circuit 100 can be utilized for balancing channel currents of the multi-phase DC-DC converter 10 including a fixed number (4) of converting channels by “averaging” all sensing signals. Thus, the control circuit 100 has to include massive and complex circuits to perform the step of averaging all sensing signals, implying a remarkable increase of power consumption and circuit layout area of the multi-phase DC-DC converter 10. In comparison, the quantity of converting channels of the multi-phase DC-DC converter 50 of the present invention is flexible and not limited to 4. Based upon the control process 60, the multi-phase DC-DC converter 50 can balance the channel current of each converting channel in a systematic and orderly way to prevent problems induced by current imbalance, such as overheating components, shorter component life, etc. In addition, the present invention replaces the steps of averaging all sensing signals with the steps of comparing sensing signals corresponding to “current” and “previous” converting channels. As a result, practical layout complexity of the circuit can be greatly simplified, such that the multi-phase DC-DC converter 50 can balance channel currents in a simpler, more economic way. To sum up, via comparing sensing signals of current and previous converting channels, the present invention can systematically adjust the channel current of each converting channel to achieve the goal of current balance. Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. 1. A control device for a multi-phase DC-DC converter, the multi-phase DC-DC converter comprising a plurality of converting channels, the control device comprising: an error amplifier for comparing a feedback signal of the multi-phase DC-DC converter and a reference signal to generate a comparison result; a main comparator coupled to the error amplifier for comparing the comparison result and a first sawtooth signal corresponding to a first converting channel of the plurality of converting channels to generate a first pulse width modulation (PWM) signal; and at least one computing module, each computing module corresponding to one of the plurality of converting channels, for generating a PWM signal according to the comparison result, a sawtooth signal corresponding to the converting channel, a sensing signal corresponding to the converting channel, and a sensing signal corresponding to a previous converting channel of the converting channel to control the converting channel. 2. The control device of claim 1, wherein each computing module comprises: a subtracter for subtracting the sensing signal corresponding to the converting channel from the sensing signal corresponding to the previous converting channel to generate a subtracting result; a compensating unit coupled to the subtracter for compensating a gain of the subtracting result according to the subtracting result to generate a compensating result; a computing unit coupled to the compensating unit for adjusting the sawtooth signal corresponding to the converting channel according to the compensating result to generate a computing result; and a parallel comparator coupled to the error amplifier and the computing unit for comparing the comparison result of the error amplifier and the computing result to generate the PWM signal corresponding to the converting channel. 3. The control device of claim 2, wherein the computing unit shifts a DC bias of the sawtooth signal according to the compensating result to generate the computing result. 4. The control device of claim 2, wherein the computing unit adjusts an amplitude of the sawtooth signal according to the compensating result to generate the computing result. 5. The control device of claim 1, wherein each computing module corresponds to one of the plurality of converting channels other than the first converting channel. 6. A multi-phase DC-DC converter comprising: an output end for providing an output signal; a plurality of converting channels, each converting channel comprising: a power switch for adjusting a channel current of the converting channel according to a pulse width modulation (PWM) signal corresponding to the converting channel; and an output inductor coupled between the power switch and the output end; a current sensing module comprising a plurality of sensing units, each coupled to an output inductor of a corresponding converting channel to generate a feedback signal according to a channel current passing through the output inductor; a feedback module coupled to the output end for generating a feedback signal according to the output signal; a reference signal generator for generating a reference signal; and a control device comprising: an error amplifier coupled to the feedback module and the reference signal generator for comparing the feedback signal and the reference signal to generate a comparison result; a main comparator coupled to the error amplifier and a power switch of a first converting channel of the plurality of converting channels for comparing the comparison result and a first sawtooth signal corresponding to the first converting channel to generate a first PWM signal sent to the power switch; and at least one computing module, each computing module corresponding to one of the plurality of converting channels for generating a PWM signal sent to a power switch of the converting channel according to the comparison result, a sawtooth signal corresponding to the converting channel, a sensing signal corresponding to the converting channel, and a sensing signal corresponding to a previous converting channel of the converting channel. 7. The multi-phase DC-DC converter of claim 6, wherein each computing module comprises: a subtracter coupled to the current sensing module for subtracting the sensing signal corresponding to the converting channel from the sensing signal corresponding to the previous converting channel to generate a subtracting result; a compensating unit coupled to the subtracter for compensating a gain of the subtracting result according to the subtracting result to generate a compensating result; a computing unit coupled to the compensating unit for adjusting the sawtooth signal corresponding to the converting channel according to the compensating result to generate a computing result; and a parallel comparator coupled to the error amplifier, the computing unit and the power switch of the converting channel for comparing the comparison result of the error amplifier and the computing result to generate the PWM signal corresponding to the converting channel. 8. The multi-phase DC-DC converter of claim 7, wherein the computing unit shifts a DC bias of the sawtooth signal according to the compensating result to generate the computing result. 9. The multi-phase DC-DC converter of claim 7, wherein the computing unit adjusts an amplitude of the sawtooth signal according to the compensating result to generate the computing result. 10. The multi-phase DC-DC converter of claim 6, wherein each computing module corresponds to one of the plurality of converting channels other than the first converting channel..
43,773