text
stringlengths 0
128k
|
---|
Thread:<IP_ADDRESS>/@comment-22439-20170615162446
Hi, welcome to ! Thanks for your edit to the Hunter Shotgun page.
Please leave me a message if I can help with anything!
|
Loop to distort a copy of a base mesh, but the loop keeps distorting the previously used mesh?
I have three functions:
make_plane(): creates a subdivided plane, applies smooth shading, adds a subsurf modifier, renames it an moves it to a collection
warp_plane(): takes a copy of a the plane from the first function, and picks a random vertex and simply moves it along the z-axis a random amount with proportional scaling
make_grid(): creates an x * y * z grid (currently I'm just testing with 3 x 3 x 1) of planes, each of which should be uniquely warped from the second function.
The Problem
What's happening however, is that the mesh from the original plane is somehow being passed from iteration to iteration, instead of it using a copy of the original. I hope that makes sense. I have been able to use this same process in other projects, but the only difference was that I wasn't dealing directly with meshes... I was only changing things like scale and rotation. Is it possible to do this without completely breaking my process? I like having things in functions to make it more modular, so if I can keep a similar structure that would be great!
def make_plane():
bpy.ops.mesh.primitive_plane_add(enter_editmode=True, align='WORLD', location=(0, 0, 0), scale=(1, 1, 1))
bpy.ops.mesh.subdivide(number_cuts=subd)
bpy.ops.object.editmode_toggle()
ob = C.object
shade_smooth(ob) #shades smooth
sub_smooth(ob) #applies subsurf modifier
rename_link(ob, 'Master_Plane', 'Base Shapes') #moves to new collection
bpy.context.active_object.select_set(False)
shapes.append(ob) #adds to list
C.collection.objects.unlink(ob)
# C.collection.children['Base Shapes'].hide_viewport = True
C.collection.children['Base Shapes'].hide_render = True
print(f'Base Shapes: {len(shapes)}')
for shape in shapes:
print(f' --{shape.name}')
def warp_plane(obj):
z = random.random() #random amount to move vertex
vertex = random.randint(0, vertices) #random vertex
prop_size = random.uniform(1.0, 2.0) #amount for proportion size
#logic to select a random vertex
bpy.ops.object.mode_set(mode='EDIT')
bpy.ops.mesh.select_all(action='DESELECT')
bpy.ops.mesh.select_mode(type = 'VERT')
me = bmesh.from_edit_mesh(obj.data)
me.verts.ensure_lookup_table()
me.verts[vertex].select = True
#moves vertex
bpy.ops.transform.translate(value=(0, 0, z), constraint_axis=(False, False, True), mirror=True, use_proportional_edit=True, proportional_size=prop_size)
bpy.ops.object.mode_set(mode='OBJECT')
bpy.context.active_object.select_set(False)
def make_grid():
print(f'\nGenerating {width}x{length}x{layers} grid - {width*length*layers} spaces...')
for x in range(width):
for y in range(length):
for z in range(layers):
loc = (x*spacing, y*spacing, z*spacing)
current = shapes[0].copy()
#currently the ob is being overridden with each successive loop
#instead of copying our "base" plane
warp_plane(current)
current.location += Vector(loc)
#change name of cube and mesh
current.name = f'Plane ({x}, {y}, {z})'
current.data.name = f'Mesh ({x}, {y}, {z})'
current.data = current.data.copy()
#assign a random material (not ready yet)
# mat = random.choices(materials, weights=mat_weights)[0]
# current.data.materials.append(mat)
# print(f'shapes[0]: {shapes[0].name}, {shapes[0].data.name}')
obs.append(current)
for ob in obs:
D.collections['Generated'].objects.link(ob)
D.objects['Master_Plane'].hide_set(True)
#deselects everything
bpy.ops.object.select_all(action='DESELECT')
The Result
You can tell that each plane in the grid essentially modified the copy before it, instead of modifying a "fresh" copy of the plane. Is the following line of code not enough to guarantee a unique copy for the warp_planes() function to work on?
current = shapes[0].copy()
Thank you for any and all advice!
Take note that when you do current = shapes[0].copy() you are only copying the object but the mesh data it is pointing to is still the same data block that is why it kept warping the same mesh because you called warp_plane too early while it still had the previous mesh.
Object.copy()
Create a copy of this data-block (not supported for all
data-blocks)
Example: bpy.context.object.copy()
Mesh.copy()
Create a copy of this data-block (not supported for all data-blocks)
Example: bpy.context.object.data.copy()
Basically you only have to do two (2) things. First, you have to call the warp_plane function after the mesh data has been set, preferably inside the for loop after it is linked into the view layer. And then you have to set the new copied object as the active object before calling warp_plane.
for ob in obs:
D.collections['Generated'].objects.link(ob)
bpy.context.view_layer.objects.active = ob
warp_plane(ob)
Or directly call these three (3) lines inside the loop that creates the objects. There is no need for a second for loop. Here's your complete working code:
import bpy
import bmesh
import time
import random
from math import radians
from mathutils import Vector
from os import system
#####################################################
#################### CONSTANTS ######################
#####################################################
#scene & object specific
obs = []
shapes = []
C = bpy.context
D = bpy.data
sce = C.view_layer
#plane specific
width = 3
length = 3
layers = 1
size = 1
subd = 7
vertices = (subd + 2) ** 2 - 1
spacing = 2
#####################################################
################## SCENE FUNCTIONS ##################
#####################################################
def clean_slate():
#used to clear system console for easier debugging
cls = lambda: system('cls')
cls()
#delete everything in 3d viewport
C.scene
for ob in D.objects:
if ob.type != 'CAMERA' and ob.type != 'LIGHT':
D.objects.remove(ob)
for mesh in D.meshes:
D.meshes.remove(mesh)
make_collections()
def make_collections():
colls_to_keep = ["Studio", "Base Shapes"]
colls_to_remake = ["Generated"]
#remakes old collections
for idx, coll in enumerate(colls_to_remake):
if coll in D.collections:
print(f'Deleting old "{coll}" collection...')
# C.scene.collection.children.unlink(bpy.data.collections[idx])
D.collections.remove(bpy.data.collections[idx])
else:
print(f'Creating new "{colls_to_remake[idx]}" collection...')
new = D.collections.new(coll)
C.scene.collection.children.link(new)
#makes collections we only need to make one time
for idx, coll in enumerate(colls_to_keep):
if coll in D.collections:
print(f'{coll} exists already!')
else:
print(f'Making new {coll} collection!')
new = D.collections.new(colls_to_keep[idx])
C.scene.collection.children.link(new)
def rename_link(ob, name, coll):
ob.name = name
ob.data.name = name
ob.data = ob.data.copy()
D.collections[coll].objects.link(ob)
def debug():
#easier way of figuring out what is what
if C.object == None:
c_name = "None"
else:
c_name = C.object.name
if C.selected_objects == []:
sel_name = "None"
sel_mesh = "None"
else:
sel_name = C.selected_objects[0].name
sel_mesh = C.selected_objects[0].data.name
if C.active_object == None:
act_name = "None"
act_mesh = "None"
else:
act_name = C.active_object.name
act_mesh = C.active_object.data.name
print(f'\n{"*"*15} DEBUG {"*"*15}')
print(f' Context Object: {c_name}')
print(f' Active Object: {act_name}')
print(f' Active Mesh: {act_mesh}')
print(f' # of Selected: {len(C.selected_objects)}')
print(f' Selected Object: {sel_name}')
print(f' Selected Mesh: {sel_mesh}')
print(f'{"*"*37}\n')
#####################################################
################ MODIFIER FUNCTIONS #################
#####################################################
def shade_smooth(ob, smooth=True):
for poly in ob.data.polygons:
poly.use_smooth = smooth
def sub_smooth(ob):
sub = ob.modifiers.new('Subsurf', 'SUBSURF')
sub.levels = 2
sub.render_levels = 2
#####################################################
################# SHAPE FUNCTIONS ###################
#####################################################
def make_plane():
bpy.ops.mesh.primitive_plane_add(enter_editmode=True, align='WORLD', location=(0, 0, 0), scale=(1, 1, 1))
bpy.ops.mesh.subdivide(number_cuts=subd)
bpy.ops.object.editmode_toggle()
ob = C.object
shade_smooth(ob) #shades smooth
sub_smooth(ob) #applies subsurf modifier
rename_link(ob, 'Master_Plane', 'Base Shapes') #moves to new collection
bpy.context.active_object.select_set(False)
shapes.append(ob) #adds to list
C.collection.objects.unlink(ob)
# C.collection.children['Base Shapes'].hide_viewport = True
C.collection.children['Base Shapes'].hide_render = True
print(f'Base Shapes: {len(shapes)}')
for shape in shapes:
print(f' --{shape.name}')
def warp_plane(obj):
bpy.context.view_layer.objects.active = obj
z = random.random() #random amount to move vertex
vertex = random.randint(0, vertices) #random vertex
prop_size = random.uniform(1.0, 2.0) #amount for proportion size
#logic to select a random vertex
bpy.ops.object.mode_set(mode='EDIT')
bpy.ops.mesh.select_all(action='DESELECT')
bpy.ops.mesh.select_mode(type = 'VERT')
me = bmesh.from_edit_mesh(obj.data)
me.verts.ensure_lookup_table()
me.verts[vertex].select = True
#moves vertex
bpy.ops.transform.translate(value=(0, 0, z), constraint_axis=(False, False, True), mirror=True, use_proportional_edit=True, proportional_size=prop_size)
bpy.ops.object.mode_set(mode='OBJECT')
bpy.context.active_object.select_set(False)
def make_grid():
print(f'\nGenerating {width}x{length}x{layers} grid - {width*length*layers} spaces...')
for x in range(width):
for y in range(length):
for z in range(layers):
loc = (x*spacing, y*spacing, z*spacing)
ob = shapes[0]
current = ob.copy()
current.name = f'Plane ({x}, {y}, {z})'
current.data = ob.data.copy()
current.data.name = f'Mesh ({x}, {y}, {z})'
D.collections['Generated'].objects.link(current)
warp_plane(current)
current.location += Vector(loc)
obs.append(current)
D.objects['Master_Plane'].hide_set(True)
bpy.ops.object.select_all(action='DESELECT')
#####################################################
####################### MAIN ########################
#####################################################
start = time.time()
clean_slate()
make_plane()
make_grid()
end = time.time()
print('\n...Done!')
print(f'Elapsed Time: {round(end-start, 3)}s')
Beautiful! Thank you so much! Your explanations were very clear, and have improved my understanding of things! :)
awesome! glad i could help :)
use
me = bmesh.from_edit_mesh(obj.data.copy())
to get a copy fo the data instead of pointing to it
|
namespace SwfLib.Utils {
/// <summary>
/// Represents utility class for calculating minimal bits count of unsigned integers.
/// </summary>
public struct UnsignedBitsCount {
private uint _positiveMask;
/// <summary>
/// Initializes a new instance of the <see cref="UnsignedBitsCount"/> struct.
/// </summary>
/// <param name="originalValue">The original value.</param>
public UnsignedBitsCount(uint originalValue) {
_positiveMask = 0x00000000;
AddValue(originalValue);
}
/// <summary>
/// Initializes a new instance of the <see cref="UnsignedBitsCount"/> struct.
/// </summary>
/// <param name="originalValue1">The original value1.</param>
/// <param name="originalValue2">The original value2.</param>
public UnsignedBitsCount(uint originalValue1, uint originalValue2) {
_positiveMask = 0x00000000;
AddValue(originalValue1);
AddValue(originalValue2);
}
/// <summary>
/// Initializes a new instance of the <see cref="UnsignedBitsCount"/> struct.
/// </summary>
/// <param name="originalValue1">The original value1.</param>
/// <param name="originalValue2">The original value2.</param>
/// <param name="originalValue3">The original value3.</param>
/// <param name="originalValue4">The original value4.</param>
public UnsignedBitsCount(uint originalValue1, uint originalValue2, uint originalValue3, uint originalValue4) {
_positiveMask = 0x00000000;
AddValue(originalValue1);
AddValue(originalValue2);
AddValue(originalValue3);
AddValue(originalValue4);
}
/// <summary>
/// Registers new value to be measured.
/// </summary>
/// <param name="val">Value to measrue.</param>
public void AddValue(uint val) {
_positiveMask |= val;
}
/// <summary>
/// Gets a value indicating whether this instance is empty.
/// </summary>
public bool IsEmpty {
get { return _positiveMask == 0; }
}
/// <summary>
/// Gets bits count.
/// </summary>
/// <returns></returns>
public uint GetBits() {
uint mask = _positiveMask;
if (mask == 0) return 0;
uint test = 0x80000000;
for (uint j = 32; j >= 1; j--) {
if ((mask & test) > 0) return j;
test >>= 1;
}
return 0;
}
}
}
|
Carolyn DANIELS, Petitioner, v. Winifred G. THOMPSON, Director, District of Columbia Department of Public Welfare, Respondent.
No. 5195.
District of Columbia Court of Appeals.
Argued May 19, 1970.
Decided Oct. 8, 1970.
Bruce J. Terris, Washington, D. C., for petitioner.
Richard W. Barton, Asst. Corp. Counsel, with whom Charles T. Duncan, Corp. Counsel, Hubert B. Pair, Principal Asst. Corp. Counsel, and Ted D. Kuemmerling, Asst. Corp. Counsel, were on the brief, for respondent.
Before HOOD, Chief Judge, and FICK-LING and NEBEKER, Associate Judges.
HOOD, Chief Judge:
Petitioner is a 17-year-old mother who is currently receiving public assistance under Aid to Families with Dependent Children (AFDC). She is a full-time student in high school and is also employed in a “stay-in-school” program. The “home” in this case comprises only the petitioner and her son.
After originally being denied any AFDC benefits, petitioner was afforded a hearing on the merits of her claim. Respondent, the Director of the District of Columbia Department of Public Welfare, issued an order retroactively applying the AFDC program to petitioner. In determining the amount of benefits to be paid petitioner, a certain portion of her income was counted as a resource available to the family unit to meet current needs. Petitioner claims that it was error not to disregard all of her income in determining the amount of benefits to which she and her son are entitled.
Our review of respondent’s order is based on D.C.Code 1967, § 1-1510 (Supp. Ill, 1970), a section of the District of Columbia Administrative Procedure Act. We are presented solely with a question of law; i. e., an interpretation of relevant statutory and regulatory provisions and the application of such to this review.
The District of Columbia AFDC program, D.C.Code 1967, § 3-202 et seq., is authorized by the Social Security Act of 1935, as amended, 42 U.S.C. § 601 et seq. (Supp. IV, 1968). The District, through its Welfare Department, participates in this “scheme of cooperative federalism.” King v. Smith, 392 U.S. 309, 316, 88 S.Ct. 2128, 20 L.Ed.2d 1118 (1968). The Welfare Department has promulgated a “Handbook of Public Assistance Policies and Procedures” (HPA-2) to administer the program.
Our review in the present case concerns the interpretation of one section in HPA-2. Petitioner urges that, by any reading of RS 3.2 III A (1), she is entitled to a total disregard of her earned income. The problem with petitioner’s argument is that she reads this one provision in a total vacuum. We cannot accept this approach. Any valid interpretation of this provision must be made in light of both the underlying Social Security Act and other regulations in HPA-2.
The income disregard regulation in question is clearly founded on 42 U.S.C. § 602 (a). Under this section, petitioner is allowed a $30 and one-third disregard (which she is currently receiving) and not a total exclusion of her income. This conclusion is further compelled when the definition of the term “dependent child” in the Social Security Act is read into the income disregard section.
Petitioner argues, however, that the “plain language” of the District of Columbia regulation cannot be altered to fit the language in the Social Security Act; that the term “child” cannot be interpreted to mean “dependent child”. Petitioner’s argument is twofold: (1) that the Social Security Act and the Supreme Court’s interpretation of that Act clearly show that the District has the right and responsibility to set the “standard of need” and the “level of benefits” applicable to its welfare recipients, and that the amount of income disregarded is a part of that function; and (2) that, even if the Department of Welfare regulation is substantially different from the Federal Act, it complies with the overall purpose of the Social Security Act.
As to the first argument, there is no doubt that in establishing the “standard of need” and determining the “level of benefits” to be paid, “Congress has always left to the States a great deal of discretion.” Rosado v. Wyman, 397 U.S. 397, 408, 90 S.Ct. 1207, 1216, 25 L.Ed.2d 442 (1970) . It is equally as obvious that the States’ or District’s discretion in this regard is limited to fixing an amount needed by variously composed recipient units and to determining how much the State or District of Columbia is able to pay. See Rosado v. Wyman, supra; Dandridge v. Williams, 397 U.S. 471, 90 S.Ct. 1153, 25 L.Ed.2d 491 (1970); see also King v. Smith, supra. Thus, at least in its role of determining standard of need and level of benefits, a determination of what income is to be regarded and what disregarded as a resource available to the recipient unit is not within the District’s discretion.
Petitioner urges, nevertheless, that the District can and has in fact broadened the language in 42 U.S.C. § 606(a), and that such action complies with the overall spirit of the AFDC program. In the initial section of the Act dealing with this program, 42 U.S.C. § 601, two of the ultimate goals are set forth as: “to help maintain and strengthen family life and to help such parents or relatives to attain or retain capability for the maximum self-support and personal independence consistent with the maintenance of continuing parental care and protection”.
We cannot dispute petitioner’s assertion that her actions, both staying in school and working part time, are the optimum course she can take to most expeditiously remove herself and her son from the welfare rolls. And, Congress has provided petitioner with some incentive to take such a course. But, Congress and not the District of Columbia has determined the precise method by which this incentive operates. The method employed allows a total income disregard to certain dependent children, while a partial disregard is allowed to others in the recipient unit. “Consequently, to the extent that Congress has dictated the terms and conditions of AFDC payments, the [District is] required to administer the program accordingly.” Williford v. Laupheimer, 311 F.Supp. 720, 722 (E.D.Pa.1969) (citations omitted).
The petitioner is a full-time student and, under District of Columbia law, she is a child. However, under the structure of the AFDC program she is a parent or “welfare mother”, especially when viewed within the context of this welfare recipient unit (petitioner and her dependent son); and, she certainly is not a “dependent child”, by definition. The distinction to be made in determining income disregard in the present case is between that incentive afforded a parent and that afforded a dependent child; not between that afforded a parent and all children. Thus, petitioner comes within the provisions of 42 U.S.C. § 602(a) (8) (A) (ii) and HPA-2, RS 3.2 III A (4), entitling her to a $30 and one-third disregard, and not within the provisions of 42 U.S.C. § 602(a) (8) (A) (i) and HPA-2, RS 3.2 III A (1), entitling her to a total disregard.
We are not faced, in the present review, with a regulation or interpretation which is even claimed to be contrary to the Social Security Act, nor are we faced with any claim of constitutional deprivation. What we are faced with is an interpretation of a regulation by the Welfare Department which complies with the precise terms and structure of the underlying Federal Statute.
There is no error, and the order of the Director of the District of Columbia Department of Public Welfare is
Affirmed.
. The first $30 of petitioner’s income and one-third of the remainder were disregarded, and the amount left was counted as an available resource.
. US 3.2 III provides in pertinent part:
A. Recipients
In determining the need of families who are receiving AFDC:
1.
Ss« # Sji jfc i|{
4. Disregard the first $30 and one-third of the remainder of the total gross monthly income earned by the family, then subtract the amount of mandatory deductions. The remainder is net income to be considered a resource in determining need of the assistance unit. Total earned family income means income earned by the parent or relative whose requirements are included in the assistance payment and of children receiving AFDC not included in items 1 and 2 [under the age of 14 years] above. This formula for disregarding earned income is also applied to the earned income of children under the age of 21 who are living in the home and not included in the assistance payment. sj: s{s sji
No challenge has been made to the validity of the promulgation of the regulation in question. See Robinson v. Washington, 302 F.Supp. 842 (D.D.C.1968).
.The statute reads in pertinent part:
(a) A State plan for aid and services to needy families with children must * * * (7) except as may be otherwise provided in clause (8), provide that the State agency shall, in determining need, take into consideration any other income and resources of any child or relative claiming aid to families with dependent children, or of any other individual (living in the same home as such child and relative) whose needs the State determines should be considered in determining the need of the child or relative claiming such aid, as well as any expenses reasonably attributable to the earning of any such income; (8) provide that, in making the determination under clause (7), the State agency—
(A) shall with respect to any month disregard—
(i) all of the earned income of each dependent child receiving aid to families with dependent children who is (as determined by the State in accordance with standards prescribed by the Secretary) a full-time student or part-time student who is not a full-time employee attending a school, college, or university, or a course of vocational or technical training designed to fit him for gainful employment, and
(ii) in the case of earned income of a dependent child not included under clause (i), a relative receiving such aid, and any other individual (living in the same home as such relative and child) whose needs are taken into account in making such determination, the first $30 of the total of such earned income for such month plus one-third of the remainder of such income for such month. * * *
(Emphasis supplied.)
. 42 U.S.C. § 606(a) provides:
The term “dependent child” means a needy child (1) who has been deprived of parental support or care by reason of the death, continued absence from the home, or physical or mental incapacity of a parent, and who is living with liis father, mother, grandfather, grandmother, brother, sister, stejifather, stepmother, stepbrother, stepsister, uncle, aunt, first cousin, nephew, or niece, in a place of residence maintained hy one or more of such relatives as his or their own home, and (2) who is (A) under the age of eighteen, or (B) under the age of twenty-one and (as determined by the State in accordance with standards prescribed by the Secretary) a student regularly attending a school, college, or university, or regularly attending a course of vocational or technical training designed to fit him for gainful employment. * * * (Emphasis supplied.)
. Under District of Columbia law, except as defined by statute, a child is anyone under 21 years of age. See, e. g., Koonin v. Hornsby, D.C.Mun.App., 140 A.2d 309 (1958).
. Citing King v. Smith, 392 U.S. 309, 318, 88 S.Ct. 2128, 20 L.Ed.2d 1118 (1968).
. For the standard of need and level of benefits in the District of Columbia see HPA-2, RQ 1.0 et seg. (requirements) ; PT 1.0 et seg. (payments).
. See n.'3 supra.
. See also HPA-2, PA 1.0 1(2), which is to the same effect.
. 42 U.S.C.- § 602(a) (8). See also S.Rep.No.744, 90th Cong., 1st Sess. (1967) contained in 1967 U.S.Code Cong. & Admin.News, pp. 2834, 2861, 2994-96.
. “As Mr. Justice Cardozo stated, speaking for the Court in Helvering v. Davis, 301 U.S. 619, 645, 57 S.Ct. 904, 81 L.Ed. 1307 (1937): ‘When [federal] money is spent to promote the general'welfare, the concept of welfare or tlie opposite is shaped by Congress, not the states.’ ” Rosado v. Wyman, 397 U.S. 397, 423, 90 S.Ct. 1207, 1223, 25 L.Ed.2d 442 (1970) (citation omitted).
. See n. 4 supra.
. This result is compelled not only by the Social Security Act, but by a total reading of the District’s welfare regulations. See, e. g., and compare HPA-2, RS 3.2 III A (4) with EL 8.1 I.
. See notes 1 & 2 supra.
. S. g., Lewis v. Martin, 397 U.S. 552, 90 S.Ct. 1282, 25 L.Ed.2d 561 (1970); Rosado v. Wyman, supra n. 11; King v. Smith, supra n. 6.
. E. g., Dandridge v. Williams, 397 U.S. 471, 90 S.Ct. 1153, 25 L.Ed.2d 491 (1970).
|
# @fastify/bearer-auth

[](https://www.npmjs.com/package/@fastify/bearer-auth)
[](https://standardjs.com/)
*@fastify/bearer-auth* provides a simple request hook for the [Fastify][fastify]
web framework.
[fastify]: https://fastify.io/
## Example
```js
'use strict'
const fastify = require('fastify')()
const bearerAuthPlugin = require('@fastify/bearer-auth')
const keys = new Set(['a-super-secret-key', 'another-super-secret-key'])
fastify.register(bearerAuthPlugin, {keys})
fastify.get('/foo', (req, reply) => {
reply.send({authenticated: true})
})
fastify.listen({port: 8000}, (err) => {
if (err) {
fastify.log.error(err.message)
process.exit(1)
}
fastify.log.info('http://<IP_ADDRESS>:8000/foo')
})
```
## API
*@fastify/bearer-auth* exports a standard [Fastify plugin][fplugin]. This allows
you to register the plugin within scoped paths. Therefore, you could have some
paths that are not protected by the plugin and others that are. See the [Fastify][fastify]
documentation and examples for more details.
When registering the plugin you must specify a configuration object:
* `keys`: A `Set` or array with valid keys of type `string` (required)
* `function errorResponse (err) {}`: method must synchronously return the content body to be
sent to the client (optional)
* `contentType`: If the content to be sent is anything other than
`application/json`, then the `contentType` property must be set (optional)
* `bearerType`: string specifying the Bearer string (optional)
* `function auth (key, req) {}` : this function will test if `key` is a valid token.
The function must return a literal `true` if the key is accepted or a literal
`false` if rejected. The function may also return a promise that resolves to
one of these values. If the function returns or resolves to any other value,
rejects, or throws, a HTTP status of `500` will be sent. `req` is the Fastify
request object. If `auth` is a function, `keys` will be ignored. If `auth` is
not a function, or `undefined`, `keys` will be used.
* `addHook`: If `false`, this plugin will not register `onRequest` hook automatically,
instead it provide two decorations `fastify.verifyBearerAuth` and
`fastify.verifyBearerAuthFactory` for you.
* `verifyErrorLogLevel`: An optional string specifying the log level when there is a verification error.
It must be a valid log level supported by fastify, otherwise an exception will be thrown
when registering the plugin. By default, this option is set to `error`.
The default configuration object is:
```js
{
keys: new Set(),
contentType: undefined,
bearerType: 'Bearer',
errorResponse: (err) => {
return {error: err.message}
},
auth: undefined,
addHook: true
}
```
Internally, the plugin registers a standard *Fastify* [preHandler hook][prehook],
which will inspect the request's headers for an `authorization` header with the
format `bearer key`. The `key` will be matched against the configured `keys`
object via a [constant time algorithm](https://en.wikipedia.org/wiki/Time_complexity#Constant_time) to prevent against [timing-attacks](https://snyk.io/blog/node-js-timing-attack-ccc-ctf/). If the `authorization` header is missing,
malformed, or the `key` does not validate then a 401 response will be sent with
a `{error: message}` body; no further request processing will be performed.
[fplugin]: https://github.com/fastify/fastify/blob/master/docs/Plugins.md
[prehook]: https://github.com/fastify/fastify/blob/master/docs/Hooks.md
## Integration with `@fastify/auth`
This plugin can integrate with `@fastify/auth` by following this example:
```js
const fastify = require('fastify')()
const auth = require('@fastify/auth')
const bearerAuthPlugin = require('@fastify/bearer-auth')
const keys = new Set(['a-super-secret-key', 'another-super-secret-key'])
async function server() {
await fastify
.register(auth)
.register(bearerAuthPlugin, { addHook: false, keys, verifyErrorLogLevel: 'debug' })
.decorate('allowAnonymous', function (req, reply, done) {
if (req.headers.authorization) {
return done(Error('not anonymous'))
}
return done()
})
fastify.route({
method: 'GET',
url: '/multiauth',
preHandler: fastify.auth([
fastify.allowAnonymous,
fastify.verifyBearerAuth
]),
handler: function (_, reply) {
reply.send({ hello: 'world' })
}
})
await fastify.listen({port: 8000})
}
server()
```
By passing `{ addHook: false }` in the options, the `verifyBearerAuth` hook, instead of
immediately replying on error (`reply.send(someError)`), invokes `done(someError)`. This
will allow `fastify.auth` to continue with the next authentication scheme in the hook list.
Note that by setting `{ verifyErrorLogLevel: 'debug' }` in the options, `@fastify/bearer-auth` will emit all verification error logs at the `debug` level. Since it is not the only authentication method here, emitting verification error logs at the `error` level may be not appropriate here.
If `verifyBearerAuth` is the last hook in the list, `fastify.auth` will reply with `Unauthorized`.
## License
[MIT License](https://jsumners.mit-license.org/)
|
Eich ard j
UNITED STATES PATENT OFFICE.
RICHARD J. PARKE AND ISAAC GOODMAN, OF NEW YORK, N. Y.
PAINT-FILLING COMPOSITION.
SPECIFICATION forming' part of Letters Patent No. 496,277, dated April 25, 1893.
Application filed June 18, 1892. Serial Ha l-37,193. (No specimens.)
To all whom it may concern:
Be it known that we,- RICHARD J. PARKE and ISAAC GOODMAN, both of the city, county, and State of New York, have invented a new and useful Composition of Matter to be Used as a Filling for Paint, of which the following is a specification.
The composition consists of cotton flock and pulverized pumice stone, applied to the wood preparatory to varnishing the same, so that the wood receives a coating of the mixt-ure, which coating is susceptible of polishing and smoothing with pumice stone or other material, after which the varnish can be applied in the usual manner.
We have found by experiments that wool or silk flock can be substituted for the cotton flock as they form good equivalents.
In preparing a gallon of the mixture, for the market we prefer to use about one half ounce of the Hook, four ounces of pumice stone, one and a half quart varnish, one quart japan, one-half pint linseed oil.
The flock is first taken and soaked for about twenty-four hours in turpentine and then the mixture of varnish, japan and linseed oil is added and finally the pumice stone is added to the mixture, all the parts being stirred and agitated so as to completely mix the same up. The mixture is then applied on the Wood-work by means of ab rush in the usual manner, so as to form a coating over the wood-work for the varnish applied after I the mixture is dried.
By treating the flock with turpentine the mixture is caused to spread evenly over the surface of the article to be coated and to ad as set forth.
- RICHARD J. PARKE.
ISAAC GOODMAN. WVitnesses:
THEO. G. HOSTER,
O. SEDGWICK.
|
[08:07] <jtaylor> where should I file bugs for the lts-yakkety from the ppa?
[08:16] <apw> jtaylor, https://bugs.launchpad.net/ubuntu/+source/linux-lts-yakkety/+filebug i guess
[08:16] <apw> jtaylor, but do tell us the bug # here
[08:27] <jtaylor> hm is launchpad broken?
[08:27] <jtaylor> get an oops on submit ...
[08:28] <apw> lovely... try fileing it against linux itself, and i'll sort it out afterwards
[08:28] <apw> jtaylor, ^
[08:31] <jtaylor> apw: bug 1631298
[08:34] <apw> jtaylor, can i assume this is installing into an existing working system ... if so could you pastebin me a lsinitamfs of the working and not working initrds please
[08:36] <jtaylor> 4.8 http://paste.ubuntu.com/23288094/
[08:36] <jtaylor> 4.4 (working) http://paste.ubuntu.com/23288095/
[08:37] <apw> thanks
[10:08] <apw> jtaylor, could you boot up this test kernel for me so we can find out what the heck the feature flags are set to ... http://people.canonical.com/~apw/lts-backport-yakkety-xenial/
[10:09] <apw> jtaylor, not expecting it to fix anything but should drop an APW: in the dmesg with some info
[10:23] <apw> jtaylor, ok naive testing of raid1s created on 4.4 and booted with 4.8 seem to assemble for me
[10:23] <jtaylor> apw: my raid is probably a lot older
[10:23] <apw> jtaylor, so we need to get that debug output to see what differs on yours to mine
[10:23] <jtaylor> maybe 3.13 or more ;)
[10:23] <apw> jtaylor, probabally and that is a little scarey :)
[10:23] <jtaylor> I'll reboot soon
[10:23] <apw> jtaylor, thanks
[10:35] <jtaylor> apw: hm all zeros http://paste.ubuntu.com/23288447/
[10:37] <apw> jtaylor, oh you are right i have the same error, and yet the lv is there, oh but is it running
[10:38] <jtaylor> it is displayed but not active
[10:38] <jtaylor> though I haven't tried activating it manually, I just figured if it puts me in an emergency shell that doesn't work
[10:38] <apw> i would doubt it will start
[10:38] <jtaylor> I actually forgot to mention that, the system doesn't boot, despite / and /boot being there
[10:38] <apw> ok i am reproducing in fact, just not seeing what it is saying
[10:46] <apw> jtaylor, i am going to assume the data you ahve in your raid1 is something you care about (given it is raid1d)
[10:46] <apw> jtaylor, ie this is not something you can trivially test :/
[10:47] <jtaylor> yes, though I have backups
[10:47] <jtaylor> but destroying it would still be inconvinient
[10:47] <apw> jtaylor, do you have a test environment at all? obviously i can test a fix here but this is pretty scarey code to change
[10:48] <apw> jtaylor, anyhow i have a theory and i am testing it, and if that works i'll ask upstream for safety
[10:49] <jtaylor> no, this is my home setup I only have this one raid1 system
[10:50] <apw> jtaylor, though i guess in theory we could pull off one of the mirrors as a backup, hrm anyho
[10:50] <apw> lets get to that once we have any idea if this is right
[10:50] <jtaylor> if you are reasonably confident in a fix I can update my backups and test it
[13:56] <om26er> jsalisbury: updated comments on the bug report. The last kernel is good, second-last is bad.
[13:59] <jsalisbury> om26er, great, I'll build the next one. Only one or two left.
[13:59] <om26er> jsalisbury: ack.
[15:38] <manjo> rtg, something going on with tangerine ? compiling arm64 Error: selected processor does not support `staddlh w0,[x1]'
[15:40] <manjo> rtg, looks like assembler messages from xenial-amd64 chroot
[15:43] <manjo> bjf, apw ^^ anyone know ? trying to build 4.8.0-21.23
[15:45] <manjo> I am also seeing ==> Error: attempt to move .org backwards
[15:47] <manjo> build works fine with yakkety-amd64 chroot.. .something broken with xenial-amd64 chroot ?
[15:56] <om26er> jsalisbury: Hi! that's a good kernel.
[15:56] <jsalisbury> om26er, ack
[15:58] <om26er> jsalisbury: how big is the diff from this stage ? (or number of commits)
[16:01] <jsalisbury> om26er, this next kernel will narrow it down between 5 sched commits:
[16:01] <jsalisbury> 55e16d3 sched/fair: Rework throttle_count sync
[16:01] <jsalisbury> 599b484 sched/core: Fix sched_getaffinity() return value kerneldoc comment
[16:01] <jsalisbury> 8663e24 sched/fair: Reorder cgroup creation code
[16:01] <jsalisbury> 3d30544 sched/fair: Apply more PELT fixes
[16:01] <jsalisbury> 7dc603c sched/fair: Fix PELT integrity for new tasks
[16:02] <om26er> jsalisbury: I am betting on the first one
[16:03] <jsalisbury> om26er, :-) We shall know shortly
[16:45] <jsalisbury> om26er, next kernel is posted
[17:24] <om26er> jsalisbury: that's a bad kernel
[17:30] <om26er> jsalisbury: do we finally have a commit blame ?
[18:20] <jsalisbury> om26er, we have to test only one more. Then I'll bulild a test kernel with the reported commit reverted. The next kernel should be done in a few moments
[18:20] <georgios> hi. i saw gresurity related utilities but no grsecurity kernel. how so?
[18:20] <om26er> jsalisbury: great
[18:42] <jsalisbury> om26er, next test kernel is posted
[18:42] <om26er> jsalisbury: thanks, testing it now.
[18:42] <jsalisbury> om26er, ack
[18:49] <om26er> jsalisbury: that's a good one.
[18:49] <jsalisbury> om26er, The bisect reports this as the offending commit:
[18:49] <jsalisbury> commit 3d30544f02120b884bba2a9466c87dba980e3be5
[18:49] <jsalisbury> Author: Peter Zijlstra<EMAIL_ADDRESS>[18:49] <jsalisbury> Date: Tue Jun 21 14:27:50 2016 +0200
[18:49] <jsalisbury> sched/fair: Apply more PELT fixes
[18:50] <jsalisbury> om26er, I'll build a test kerne with it reverted to see if it fixes the bug.
[18:51] <om26er> jsalisbury: you mean 4.8 release minus that commit ?
[18:51] <jsalisbury> om26er, I'll build a yakkety kernel, minus that commit
[18:51] <om26er> jsalisbury: great
[18:54] <om26er> feels like a small diff https://kernel.googlesource.com/pub/scm/linux/kernel/git/tip/tip/+/3d30544f02120b884bba2a9466c87dba980e3be5%5E%21/
[19:19] <jsalisbury> om26er, kernel posted. Note with this kernel, you need to install both the linux-image and linux-image-extra .deb packages.
[19:30] <om26er> jsalisbury: that's it.
[19:30] <om26er> latest kernel is good
[19:30] <jsalisbury> om26er, good news. I'm going to ping upstream and the patch author and get their feedback
[19:31] <om26er> jsalisbury: ok, the test case is `stress -c $your_total_cpu_cores`
[19:32] <jsalisbury> om26er, thanks. Can you post that in the bug? I'll be pointing upstream there.
[19:34] <om26er> done.
|
Air brake tanks
Dec. 14, 1965 J. v. HUTELMYER 3,223,118
AIR BRAKE TANKS Filed Aug. 30, 1963 2 Sheets-Sheet 1 I I. I
I I I I I I I g N I I I INVENTOR.
J. V. HUTELMYER AIR BRAKE TANKS Dec. 14, 1965 2 Sheets-Sheet 2 Filed Aug. 50, 1965 N \w \N M \w \W MN MN I I I I k a q N z r R w 2 7, M M w ATZWRZIZEK United States Patent 3,223,118 AIR BRAKE TANKS Joseph V. Hutelmyer, Meadowbrook, Pa., assignor to Cutler Meat Products Company, Camden, NJ., a corporation of New Jersey Filed Aug. 30, 1963, Ser. No. 305,620 12 Claims. (Cl. 137572) This invention relates to air brake tanks, and more particularly to compressed air tanks for use on motor vehicles, such as trucks for operating the brakes thereof.
Many trucks presently in operation use air pressure to actuate the brakes. The compressed air, which comes from the engines compressor and is stored in a tank in readiness for use as needed, is warm when it leaves the compressor and contains moisture. Conventional air brake tanks are made with two compartments or chambers. The air is admitted into one (the wet) compartment, where the moisture condenses, so that it can be blown off at intervals. Periodically, the compressed air, after removal of moisture therefrom, is transferred to the other (the dry) compartment where it is stored in readiness to be applied to the brakes when needed.
In service, the compressed air is transferred from the wet compartment to the dry compartment through piping on the outside of the tank shell. This piping includes a check valve the purpose of which is to provide a safety device in the event that air is lost from the wet compartment. In such event, the check valve goes into action to retain the air in the dry compartment so that the usefulness of the brakes will not be impaired despite the partial loss of air pressure.
Tanks with piping as described above have certain serious disadvantages. In the first place, such piping, and especially the check valves, being on the outside of the tanks, are easily subject to damage. It is not infrequent, for example, for the valves to be struck by flying stones accidentally propelled there against by the wheels of passing vehicles; and occasionally, the check valve may even be dislodged from the tank. In such case, there is nothing to restrain the braking air from being exhausted, and the brakes cannot be operated. Another disadvantage of check valves customarily used is that moisture can collect in them upon being condensed. In winter, this moisture freezes and often prevents the valve from opening. This, of course, cuts off from the dry compartment the source of air pressure in the wet compartment and gradually renders the brakes inoperable. A third disadvantage is also found in valves customarily used with air brake tanks. Occasionally, solid foreign matter may find its way into these valves and become trapped between the valve proper and its seat, so that the valve cannot close properly against the seat. There is thus created a continuing opening between the valve and the seat which permits more or less free flow of air (and moisture, to some degree) from the wet compartment to the dry compartment.
The primary object of the present invention is to provide an improved air brake tank structure for use with trucks and other vehicles having brakes operated by compressed air, which tank structure will be free from the aforementioned and other disadvantages characteristic of known compressed air brake tanks.
More particularly, it is an object of the present invention to provide an improved compressed air tank structure for use with brakes on vehicles and in which the check valve is so constructed and arranged that it will not be subject to the disadvantages previously set forth.
Another object of the present invention is to provide ree an improved compressed air tank structure of the type set forth wherein the check valve is so disposed as to be well protected and practically free from accidental damage by projectiles or the like.
Still another object of this invention is to provide an improved tank structure as aforesaid wherein the check valve is of small, compact design and can be built into the tank in such manner as to be not only well protected, but easily accessible from the exterior of the tank for replacement or servicing, as may be necessary on occasion.
A further object of this invention is to provide an improved compressed air tank structure for the purpose set forth which does not require external piping.
It is also an object of the present invention to provide an improved compressed air tank structure which is especially suitable for use with vehicle brakes, which is neat in appearance and compact in structure, which is inexpensive to manufacture, and which is highly efiicient in use.
Briefly, stated, in one form of tank structure according to this invention, the tank may comprise a single, closed shell having a partition or wall therein which divides the interior of the tank into the wet and dry compartments or sections. The external piping is entirely dispensed with, and use is made of a small, compact, ball type .check valve which is mounted on the tank in a position to communicate with both compartments in the vicinity of the aforesaid partition. When air is required in the dry compartment, the ball is blown off its seat by the air pressure in the wet compartment to permit the compressed air in the wet compartment to pass freely into the dry compartment. In the event of any reduction of the air pressure in the wet compartment, the ball immediately seats itself in response to air pressure in the dry compartment and automatically locks the air in the dry compartment. The ball is preferably rubber covered so that, notwithstanding any small particle of foreign matter that may lodge on the valve seat, the ball can still seat firmly there against. The valve is provided with a port or duct leading to the wet compartment so that moisture tending to accumulate therein will readily flow back into the wet compartment. Since the valve is disposed within the tank and can therefore be exposed to the warm air coming from the compressor, any moisture which may accumulate in the valve and, perhaps, freeze at times will readily be melted when it is subjected to the warm air.
The novel features of the invention, both as to its organization and method of operation, as well as additional objects and advantages thereof, will be understood more readily from the following description, when read in connection with the accompanying drawings in which:
FIGURE 1 is a side elevation of one form of tank structure according to the present invention,
FIGURE 2 is a fragmentary, sectional view showing a portion of the interior of the tank and also one form of check valve disposed on the tank in accordance with this invention,
FIGURES 3 and 4 are views similar to FIGURE 2 but showing different forms of valve structures and other locations therefor on the tank, and
FIGURE 5 is a fragmentary, sectional view taken on the line 5-5 of FIGURE 4 and viewed in the direction f the appended arrows.
Referring more particularly to the drawings, there is shown, in FIG. 1, a tank 1 of steel, aluminum or the like having a longitudinal cylindrical wall or shell 3 closed by opposed end walls 5, all welded together into an air tight, integral, structural unit. The shell 3 may be comprised of a single, tubular member or, as illustrated in FIG. 1, of a pair of tubular members 3a and 3b butt welded together at their proximate ends. Within the shell 3,
approximately midway of its length, is a partition 7 which is also welded to the shell 3 in air tight, integral relation therewith. For this purpose, the partition 7 may be formed with a cylindrical flange 711 over which the proximate ends of the tubular shell members 3a are fitted friction ally, and the assembly can then be welded together circumferentially there around by a suitable weld joint 9 into an integral unit.
The partition 7 divides the tank into two compartments or sections 11 and 13. The shell section 3a is provided with an inlet pipe 15 through which compressed air, usually moisture laden, is supplied to the compartment 11, commonly referred to as the wet compartment, from a suitable compressor (not shown). The shell section 3b is provided with an outlet pipe 17 through which compressed air stored in the compartment 13, usually referred to as the dry compartment, is supplied to utilization means, such as the brakes of a truck or other vehicle. The shell section 3a is also provided with a drain 19 through which moisture which may have condensed and collected in the compartment 11 can be drawn off as needed; and the shell section 3b can also be provided with a similar drain 21 if desired.
Mounted on one or the other of the shell sections 3a and 3b is a check valve 23 for controlling the passage of compressed air in a forward direction from the compartment 11 to the compartment 13 for storage in the latter to be used as needed. In the form of the invention shown in FIGS. 1 and 2, the check valve is mounted on the cylindrical wall of the shell section 3a, while in the forms shown in FIGS. 3 and 4, the check valve is mounted on the cylindrical wall of the shell section 3b. In either case, the check valve comprises a tubular body 25 which extends through the appropriate shell section wall and is welded thereto, as by a weld joint 27, in air tight relation therewith. At its outer end, the body 25 is internally threaded for reception of a threaded closure plug 29 to keep it air tight from the ambient. It will be noted that only a very short length of the body 25 and the plug 29 extends outside of the shell. Thus, the danger of damage thereto by a stone or other missile propelled there against is very greatly minimized, and especially so since there are no pipe connections to the check valve externally of the tank 1.
In the form shown in FIGS. 1 and 2, the body 25 of the check valve extends into the compartment 11 in proximity to the partition 7 and partly through an opening 31 in the partition, the body 25 being welded to the partition in air tight relation thereto around the opening 31, as by-a weld 33. The valve body 25 has a chamber 35 therein from which two ports 37 and 39 extend. The port 37 is a radial port through the body 25 and opens into the compartment 13. The port 39 is an axial port which opens downwardly into the compartment 11 and which has a ball seat 41 at its upper end. Within the chamber 35 is a pressure responsive steel ball 43 Which can be made to seat against the ball seat 41 or can be raised therefrom, depending upon the direction of forces applied thereto by the compressed air in the respective compartments 11 and 13. Preferably, the ball 43 is encased in a sheath 45 of compressible material, such as rubber, for a purpose presently to be indicated.
' When compressed, moist air from the compressor is fed through the pipe 15 into the compartment 11, the air pressure therein increases to a point above that in the compartment 13. The excess air pressure in the compartment 11 over that in the compartment 13 raises the ball 43 from its seat 41. Compressed air can then flow freely from the compartment 11, through the port 39, the chamber 35, and the port 37 into the chamber 13 where it is stored for use. As the air in the compartment 13-is used up, more air flows there into from the compartment 11. Should the air pressure in the compartment 11 fall below that in the compartment 13, the excess air pressure in the compartment 13 over that in the compartment 11 forces the ball 43 firmly back against its seat 41 to thereby block return of compressed air in the chamber 13 to the chamber 11. If, perchance, small particles of foreign matter should accumulate on the valve seat 41, the ball 43 will nevertheless still seat firmly against its seat 41 by reason of the compressibility and resilience of the sheath 45 there around.
The compressed air supplied to the compartment 11 is relatively warm and, as stated, usually contains moisture. On coming in contact with the relatively cold shell 3a and other parts of the compartment 11, this moisture condenses and falls to the bottom of the tank section 3a where it can be drained off at suitable intervals through the drain 19. If any moisture should condense and accumulate in the valve body chamber 35, it will drain off into the compartment 11 when the ball 43 is unseated. If, as sometimes may happen in extremely cold winter weather, condensed moisture in the chamber 35 or in the port 39 should freeze, the warm air from the compressor, upon striking the valve body, will melt the ice so that it can flow down into the compartment 11, so that the danger of ice blocking the valve is practically nil. This is not possible with prior art tanks which have check valves mounted externally of the tanks.
In FIGS. 4 and 5, the check valve 23 is similar to that of FIGS. 1 and 2. However, here the valve body 25 extends into the compartment 13 in proximity to the partition 7 and partly through the opening 31 in the partition. Here, again, communication between the compartment 13 and the valve chamber 35 is provided by the radial port 37. However, in this form of the invention, the lower or inner end of the valve body 25 is closed, and the port 39 has a laterally, downwardly inclined portion 39a (in a direction from the compartment 13 to the compartment 11) which opens into the chamber 11 and thus provides communication between the chamber 35 and the compartment 11. The operation of this form of the invention is similar to that described above in connection with FIGS. 1 and 2.
In the form shown in FIG. 3, the check valve body 25 again is mounted on the shell section 3b, as in FIG. 4, and extends into the compartment 13. However, here the body 25 is entirely open at the bottom or inner end for communication of the chamber 35 with the compartment 13. A tubular member 47 having a bend 49 to provide a vertical portion 51 and a downwardly inclined portion 53 in a direction from the compartment 13 to the compartment 11 is disposed in the compartment 13 and extends through an opening 55 in the partition 7 around which it is welded to the partition by an air tight weld joint 57. The upper end of the vertical portion 51 terminates in a ball seat 59 in proximity to the valve chamber 35 for cooperation with a rubber sheathed ball 61. This ball 61 is at all times at least partially within the valve chamber 35 so that it is always confined against falling to the bottom of the compartment 13. Excess air pressure in the compartment 11 forces the ball 61 off its seat 59 into the chamber 35 to permit air to flow from the compartment 11, through the tubular member 47, and into the compartment 13. On the other hand, excess air pressure in the compartment 13 forces the ball back down onto its seat 59 to thereby block return of compressed air from the compartment 13 to the compartment 11. Any moisture which may condense in the tubular member 47 will, of course, flow down along the inclined portion 53 thereof into the compartment 11 from which it can be drained off. Should any moisture con dense in the compartment 13, it can be drained off through the drain 21.
From the foregoing description, it will be apparent that there have been provided improved compressed air tank structures which are devoid of external piping, which are compact in design, and in which the danger of damage to the check valves from external sources is practically nonexistent by reason of the fact that the valve, in each case, is housed almost entirely within the tank. Furthermore, the danger of the valve becoming frozen in cold weather is also practically eliminated. Should the valve become defective and need servicing at any time, this can be accomplished easily by merely removing the plug 29 or, if necessary, by removing the various weld joints to permit facile removal of the entire valve.
Although several forms of the invention have been described herein, it will undoubtedly be apparent to those skilled in the art that other forms thereof, as well as variations in those described, all coming within the spirit of this invention, are possible. Hence, it is desired that the foregoing shall be taken merely as illustrative and not in a limiting sense.
I claim:
1. A compressed air tank structure comprising an air tight tank having a shell, a partition in said tank in air tight relation with said shell dividing said tank into two compartments, a valve having a body mounted in part on said shell in air tight relation therewith and in part on said partition and extending into one of said compartments, said valve body having a chamber therein and a pair of ports in communication with said chamber, a first of said ports opening into a first of said compartments and the other of said ports opening into the other of said compartments through said partition whereby to establish communication between said compartments through said chamber, one of said ports having a valve seat, and a pressure responsive valve member in said chamber for cooperation with said seat, said valve member being displaceable from said seat to establish said communication between said compartments and being sea table against said seat to cut off said communication between said compartments.
2. A compressed air tank structure comprising an air tight tank having a shell, a partition in said tank in air tight relation with said shell dividing said tank into two compartments, a valve having a body mounted on said shell in air tight relation therewith in proximity to said partition and extending into one of said compartments, said valve body having a chamber therein and a pair of ports in communication with said chamber, a first of said ports opening into a first of said compartments and the other of said ports opening into the other of said compartments through said partition whereby to establish communication between said compartments through said chamber, one of said ports having a valve seat, and a pressure responsive valve member in said chamber for cooperation with said seat, said valve member being displaceable from said seat to establish said communication between said compartments and being sea table against said seat to cut oif said communication between said compartments.
3. A compressed air tank structure comprising an air tight tank having a shell, a partition in said tank in air tight relation with said shell dividing said tank into first and second, adjacent compartments, a valve having a body mounted on said shell in air tight relation therewith in proximity to said partition and extending into said first compartment, said valve body having a chamber therein and a first port communicating said chamber with said first compartment, said valve body also having a second port communicating said chamber with said second compartment through said partition, said chamber and said ports thus affording communication between said first and second compartments, said first port terminating in a valve seat at said chamber, and a pressure responsive valve member in said chamber for cooperation with said seat, said valve member being displaceable from said seat in response to air pressure in said first compartment which exceeds that in said second compartment to permit flow of compressed air from said first compartment to said second compartment through said ports and said chamber, and said valve member being sea table against said seat in response to air pressure in said second 6 compartment which exceeds that in said first compartment to thereby block return of compressed air from said second compartment to said first compartment.
4. A compressed air tank structure according to claim 3 wherein said first compartment is adapted to store moisture containing air, and wherein said first port extends downwardly into said first compartment whereby moisture collecting therein can drip down into said first compartment for subsequent removal therefrom.
5. A compressed air tank structure according to claim 3 wherein said valve comprises a ball check valve.
6. A compressed air tank structure according to claim 5 wherein the ball has a compressible sheath there over whereby it can be seated firmly against said seat.
7. A compressed air tank structure comprising an air tight tank having a shell, a partition in said tank in air tight relation with said shell dividing said tank into first and second, adjacent compartments, a valve having a body mounted on said shell in air tight relation therewith in proximity to said partition and extending into said first compartment, said valve body having a chamber therein and a first port communicating said chamber with said first compartment, said valve body also having a second port communicating said chamber with said second compartment through said partition, said chamber and said ports thus affording communication between said first and second compartments, said second port terminating in a valve seat at said chamber, and a pressure responsive valve member in said chamber for cooperation with said seat, said valve member being displaceable from said seat in response to air pres-sure in said second compartment which exceeds that in said first compartment to permit flow of compressed air from said second compartment to said first compartment through said ports and said chamber, and said valve member being sea table against said seat in response to air pressure in said first compartment which exceeds that in said second compartment to thereby block return of compressed air from said first compartment to said second compartment.
8. A compressed air tank structure according to claim 7 wherein said second compartment is adapted to store moisture containing air, and wherein said second port has a portion which is inclined downwardly in a direction from said first compartment to said second compartment whereby moisture collecting therein can drip down along said portion into said second compartment for subsequent removal therefrom.
9. A compressed air tank structure according to claim 7 wherein said valve comprises a ball check valve.
10. A compressed air tank structure according to claim 9 wherein the ball has a compressible sheath there over whereby it can be seated firmly against said seat.
11. A compressed air tank structure comprising an air tight tank having a shell, a partition in said tank in air tight relation with said shell dividing said tank into first and second, adjacent compartments, a valve having a body mounted on said shell in air tight relation therewith in proximity to said partition and extending into said first compartment, said valve body having a chamber therein open at one end to said first compartment, a tubular member in said first compartment extending from a point in proximity to said chamber open end downwardly in said first compartment and through said partition into said second compartment to provide communication between said compartments, said tubular member having a valve seat at its end adjacent to said chamber, and a valve member at least partially within said chamber sea table against said seat to close off communication between said compartments, said body, said tubular member and said valve member being so constructed and arranged that the valve member is confined for movement between the body chamber and the valve seat.
12. A compressed air tank structure according to claim 11 wherein said second compartment is adapted to store moisture-containing air therein, wherein said tubular mem- 7 8 her is inclined downwardly through said partition in 8. References Cited by the Examiner direction from said first compartment to said second UNITED STATES PATENTS compartment whereby mo1sture collecting therein can drip back down into said second compartment for sub- 802,913 10/1905 h sequent removal therefrom, and wherein said valve mem- 5 2,171,266 8/1939 Cls sen 137576 X her and seat comprise a ball type check valve the ball of 2,268,086 12/1941 Sanford 137204 which has a compressible sheath there over whereby it 2,652,849 9/1953 Ebbs 137 533-11 X can be seated firmly against said seat in response to air pressure in said first compartment which is in excess of ISADOR WEIL Pr'mary Exam l'wr that in said second compartment. 10 M. CARY NELSON, Examiner.
1. A COMPRESSED AIR TANK STRUCTURE COMPRISING AN AIR TIGHT TANK HAVING A SHELL, A PARTITION IN SAID TANK IN AIR TIGHT RELATION WITH SAID SHELL DIVIDING SAID TANK INTO TWO COMPARTMENTS, A VALVE HAVING A BODY MOUNTED IN PART ON SAID SHELL IN AIR TIGHT RELATION THEREWITH AND IN PART ON SAID PARTITION AND EXTENDING INTO ONE OF SAID COMPARTMENTS, SAID VALVE BODY HAVING A CHAMBER THEREIN AND A PAIR OF PORTS IN COMMUNICATION WITH SAID CHAMBER, A FIRST OF SAID PORTS OPENING INTO A FIRST OF SAID COMPARTMENTS AND THE OTHER OF SAID PORTS OPENING INTO THE OTHER
|
Empire of Periditor
History
Leaders
* 1st leader: LordLEL
* Last leader: LordLEL
Territory
Faith
There is no information regarding religion in Periditor at this time.
Events
* N/A
Settlements
* Drabyel
|
MY NAME IF FEMI OLATUNDE MICHAEL, I AM FROM LAGOS STATE, I'M A 300 LEVEL COMPUTER SCIENCE STUDENT AT UNIVERSITY OF JOS.
|
<EMAIL_ADDRESS>
why no one uses him for double jungle,
i mean karthus+ myokai (kart spams mokai tanks, dat passive will keep ur life up all the time)
ofc with this tactic u will have only one champ bot, that should be someone who can 1v2:
galio: shield heals more then the enemy deals damage, q helps last hit and harass
nasus: last hit under the turret, ur passive heal u
...(to lazy to mention all)
the pros of double jungle:
the cons:
double jungle means half the xp for the junglers/ not every player can handle 1v2 bot lane
|
#!/bin/bash
set -o errexit -o nounset
cp $RT_DIR/Test.CoreLib/Test.CoreLib.dll .
csc Program.cs -out:AOT.CPP.dll \
-noconfig \
-nostdlib \
-r:Test.CoreLib.dll
ilc AOT.CPP.dll -o:AOT.CPP.cpp \
-r:Test.CoreLib.dll \
--cpp \
--disablereflection \
--systemmodule Test.CoreLib
indent AOT.CPP.cpp
|
/*
Easy plugin to get element index position
Author: Peerapong Pulpipatnan
http://themeforest.net/user/peerapong
*/
var $j = jQuery.noConflict();
$j.fn.getIndex = function(){
var $jp=$j(this).parent().children();
return $jp.index(this);
}
$j.fn.setNav = function(){
$j('#main_menu li ul').css({display: 'none'});
$j('#main_menu li').each(function()
{
var $jsublist = $j(this).find('ul:first');
$j(this).hover(function()
{
$jsublist.css({opacity: 1});
$jsublist.stop().css({overflow:'hidden', height:'auto', display:'none'}).fadeIn(200, function()
{
$j(this).css({overflow:'visible', height:'auto', display: 'block'});
});
},
function()
{
$jsublist.stop().css({overflow:'hidden', height:'auto', display:'none'}).fadeOut(200, function()
{
$j(this).css({overflow:'hidden', display:'none'});
});
});
});
$j('#main_menu li').each(function()
{
$j(this).hover(function()
{
$j(this).find('a:first').addClass('hover');
},
function()
{
$j(this).find('a:first').removeClass('hover');
});
});
$j('#menu_wrapper .nav ul li ul').css({display: 'none'});
$j('#menu_wrapper .nav ul li').each(function()
{
var $jsublist = $j(this).find('ul:first');
$j(this).hover(function()
{
$jsublist.css({opacity: 1});
$jsublist.stop().css({overflow:'hidden', height:'auto', display:'none'}).fadeIn(200, function()
{
$j(this).css({overflow:'visible', height:'auto', display: 'block'});
});
},
function()
{
$jsublist.stop().css({overflow:'hidden', height:'auto', display:'none'}).fadeOut(200, function()
{
$j(this).css({overflow:'hidden', display:'none'});
});
});
});
$j('#menu_wrapper .nav ul li').each(function()
{
$j(this).hover(function()
{
$j(this).find('a:first').addClass('hover');
},
function()
{
$j(this).find('a:first').removeClass('hover');
});
});
}
$j(function () {
$j('.slideshow').anythingSlider({
easing: "easeInOutExpo",
autoPlay: false,
startStopped: false,
animationTime: 600,
hashTags: false,
buildNavigation: true,
buildArrows: false,
pauseOnHover: true,
startText: "Go",
stopText: "Stop"
});
});
$j(document).ready(function(){
$j(document).setNav();
$j('.img_frame').fancybox({
padding: 10,
overlayColor: '#000',
transitionIn: 'elastic',
transitionOut: 'elastic',
overlayOpacity: .8
});
$j('.pp_gallery a').fancybox({
padding: 0,
overlayColor: '#000',
transitionIn: 'elastic',
transitionOut: 'elastic',
overlayOpacity: .8
});
$j('.flickr li a').fancybox({
padding: 0,
overlayColor: '#000',
transitionIn: 'elastic',
transitionOut: 'elastic',
overlayOpacity: .8
});
$j('.lightbox').fancybox({
padding: 0,
overlayColor: '#000',
transitionIn: 'fade',
transitionOut: 'fade',
overlayOpacity: .8
});
$j('.lightbox_youtube').fancybox({
padding: 10,
overlayColor: '#000',
transitionIn: 'fade',
transitionOut: 'fade',
overlayOpacity: .8
});
$j('.lightbox_vimeo').fancybox({
padding: 10,
overlayColor: '#000',
transitionIn: 'fade',
transitionOut: 'fade',
overlayOpacity: .8
});
$j('.lightbox_dailymotion').fancybox({
padding: 10,
overlayColor: '#000',
transitionIn: 'fade',
transitionOut: 'fade',
overlayOpacity: .8
});
$j('.lightbox_iframe').fancybox({
padding: 0,
type: 'iframe',
overlayColor: '#000',
transitionIn: 'fade',
transitionOut: 'fade',
overlayOpacity: .8,
width: 900,
height: 650
});
$j('a.one_fourth_img[rel=gallery]').fancybox({
padding: 0,
overlayColor: '#000',
overlayOpacity: .8
});
$j('#video_gallery_wrapper .one_fourth .portfolio_image .portfolio4_hover a').fancybox({
padding: 10,
overlayColor: '#000',
overlayOpacity: .8
});
$j.validator.setDefaults({
submitHandler: function() {
var actionUrl = $j('#contact_form').attr('action');
$j.ajax({
type: 'GET',
url: actionUrl,
data: $j('#contact_form').serialize(),
success: function(msg){
$j('#contact_form').hide();
$j('#reponse_msg').html(msg);
}
});
return false;
}
});
$j('#contact_form').validate({
rules: {
your_name: "required",
email: {
required: true,
email: true
},
message: "required"
},
messages: {
your_name: "Please enter your name",
email: "Please enter a valid email address",
agree: "Please enter some message"
}
});
if(BrowserDetect.browser == 'Explorer' && BrowserDetect.version < 8)
{
var zIndexNumber = 1000;
$j('div').each(function() {
$j(this).css('zIndex', zIndexNumber);
zIndexNumber -= 10;
});
$j('#thumbNav').css('zIndex', 1000);
$j('#thumbLeftNav').css('zIndex', 1000);
$j('#thumbRightNav').css('zIndex', 1000);
$j('#fancybox-wrap').css('zIndex', 1001);
$j('#fancybox-overlay').css('zIndex', 1000);
}
$j(".pp_accordion").accordion({ collapsible: true });
$j(".pp_accordion_close").find('.ui-accordion-header a').click();
$j(".tabs").tabs();
$j('.portfolio1_hover').hide();
$j('.two_third').hover(function(){
$j(this).find('.portfolio1_hover').show();
$j(this).find('img').animate({top: '10px'}, 300);
$j(this).click(function(){
$j(this).find('a').click();
});
}
, function(){
$j(this).find('img').animate({top: '20px'}, 300);
$j(this).find('.portfolio1_hover').hide();
}
);
$j('.portfolio2_hover').hide();
$j('.one_half .portfolio_image').hover(function(){
$j(this).find('.portfolio2_hover').show();
$j(this).find('img').animate({top: '11px'}, 300);
$j(this).click(function(){
$j(this).find('a').click();
});
}
, function(){
$j(this).find('img').animate({top: '21px'}, 300);
$j(this).find('.portfolio2_hover').hide();
}
);
$j('.portfolio3_hover').hide();
$j('.one_third .portfolio_image').hover(function(){
$j(this).find('.portfolio3_hover').show();
$j(this).find('img').animate({top: '13px'}, 300);
$j(this).click(function(){
$j(this).find('a').click();
});
}
, function(){
$j(this).find('img').animate({top: '20px'}, 300);
$j(this).find('.portfolio3_hover').hide();
}
);
$j('.portfolio4_hover').hide();
$j('.one_fourth .portfolio_image').hover(function(){
$j(this).find('.portfolio4_hover').show();
$j(this).find('img').animate({top: '3px'}, 300);
$j(this).click(function(){
$j(this).find('a').click();
});
}
, function(){
$j(this).find('img').animate({top: '10px'}, 300);
$j(this).find('.portfolio4_hover').hide();
}
);
$j('.post_img').hover(function(){
$j(this).find('img').animate({top: '0px'}, 300);
$j(this).click(function(){
$j(this).find('a').click();
});
}
, function(){
$j(this).find('img').animate({top: '15px'}, 300);
}
);
$j('.pp_gallery a img').hover(function(){
$j(this).animate({top: '-3px'}, 100);
}
, function(){
$j(this).animate({top: '0px'}, 100);
}
);
$j('.home_portfolio_grid').hover(function(){
$j(this).animate({top: '-5px'}, 300);
}
, function(){
$j(this).animate({top: '5px'}, 300);
}
);
$j('.card_portfolio_grid').hover(function(){
$j(this).animate({top: '-10px'}, 300);
}
, function(){
$j(this).animate({top: '0px'}, 300);
}
);
$j('.img_nofade').hover(function(){
$j(this).animate({opacity: .5}, 300);
}
, function(){
$j(this).animate({opacity: 1}, 300);
}
);
$j('.tipsy').tipsy({fade: false, gravity: 's'});
/*$j('.one_sixth_img').tipsy({fade: false, gravity: 'n'});
$j('.one_third_img').tipsy({fade: false, gravity: 'n'});
$j('.one_fourth_img').tipsy({fade: false, gravity: 'n'});*/
/*Cufon.replace('h1.cufon');
Cufon.replace('h2.cufon');
Cufon.replace('h2.widgettitle');
Cufon.replace('h3.cufon');
Cufon.replace('h4.cufon');
Cufon.replace('h5.cufon');
Cufon.replace('h6.cufon');
Cufon.replace('.tagline');
Cufon.replace('.pricing_box h2');
Cufon.replace('.pricing_box .header span');
Cufon.replace('.dropcap1');
Cufon.replace('.circle_date a');
Cufon.replace('.page_caption h1.cufon');
Cufon.replace('.tagline h2.cufon');
Cufon.replace('.tagline p');
Cufon.replace('.ui-accordion-header');*/
var footerLi = 0;
$j('#footer .sidebar_widget li.widget').each(function()
{
footerLi++;
if(footerLi%4 == 0)
{
$j(this).addClass('widget-four');
}
});
VideoJS.setupAllWhenReady({
controlsBelow: false, // Display control bar below video instead of in front of
controlsHiding: true, // Hide controls when mouse is not over the video
defaultVolume: 0.85, // Will be overridden by user's last volume if available
flashVersion: 9, // Required flash version for fallback
linksHiding: true // Hide download links when video is supported
});
$j('.home_portfolio img.frame').each(function()
{
$j(this).hover(function()
{
$j(this).animate({top: '-10px'}, 300);
},
function()
{
$j(this).animate({top: 0}, 300);
});
});
$j('.html5_wrapper').hide();
$j('input[title!=""]').hint();
$j('.portfolio_title').tipsy({fade: true, gravity: 's'});
$j('a.portfolio_image.gallery').tipsy({fade: true, gravity: 's'});
$j('.tagline').css('visibility', 'visible');
$j('#option_btn').click(
function() {
if($j('#option_wrapper').css('left') != '0px')
{
$j('#option_wrapper').animate({"left": "0px"}, { duration: 300 });
$j(this).animate({"left": "140px"}, { duration: 300 });
}
else
{
$j('#option_wrapper').animate({"left": "-145px"}, { duration: 300 });
$j('#option_btn').animate({"left": "0px"}, { duration: 300 });
}
}
);
$j('#pp_bg_pattern').change(function(){
pp_pattern = $j(this).val();
$j.ajax({
type: 'GET',
url: $j('#form_option').attr('action'),
data: 'pp_bg_pattern='+$j(this).val(),
success: function(){
if(pp_pattern == '')
{
location.href = location.href;
}
}
});
$j('#header_pattern').attr('class', '');
$j('#header_pattern').addClass($j(this).val());
});
$j('#bg_preview').ColorPicker({
color: $j('#pp_bg_color').val(),
onShow: function (colpkr) {
$j(colpkr).fadeIn(500);
return false;
},
onHide: function (colpkr) {
$j.ajax({
type: 'GET',
url: $j('#form_option').attr('action'),
data: 'pp_bg_color='+$j('#bg_preview').css('backgroundColor')
});
$j(colpkr).fadeOut(500);
return false;
},
onChange: function (hsb, hex, rgb) {
$j('#bg_preview').css('backgroundColor', '#' + hex);
$j('body #header_wrapper').css('backgroundColor', '#' + hex);
$j('body.home #header_wrapper').css('backgroundColor', '#' + hex);
}
});
});
|
Reticulate Sandgoby, Istigobius spence (Smith 1947)
Other Names: Pearl Goby, Reticulated Goby, Twin-spots Sand-goby
A Reticulate Sandgoby, Istigobius spence, in the Gold Coast Seaway, southern Queensland, April 2016. Source: debaston / iNaturalist.org. License: CC by Attribution-NonCommercial
Summary:
A pale sandgoby with a dusky line from the eye to the pectoral fin base, and wavy brown lines on the snout. Males have the darker pelvic fins and outer part of the anal fins darker than females, and some males have 3-4 vertical bars on the abdomen and 2-3 horizontal bars along the first dorsal fin.
Cite this page as:
Bray, D.J. 2018, Istigobius spence in Fishes of Australia, accessed 18 Jul 2018, http://fishesofaustralia.net.au/Home/species/3061
Reticulate Sandgoby, Istigobius spence (Smith 1947)
More Info
Photo Rights
Few spots on nape
Distribution
Cotton Island, Northern Territory, and the northern Great Barrier Reef to Kewarra Beach, Queensland. Elsewhere the species is widespread in the Indo-west-central Pacific, from the Red Sea and east Africa eastwards through the East Indian region to Papua New Guinea, Australia (Northern Territory and Great Barrier Reef), New Caledonia, Palau and Federated States of Micronesia. east Africa to Australia. Inhabits sandy and rubble areas on coastal and near shore silty reefs including turbid coastal areas near river mouths in depths to 12 m.
Features
Dorsal fin VI + I, 10-11; Anal fin I, 9-10; Longitudinal scale series 30-32; Predorsal scales (cycloid) 7-10; Vertebrae 26.
Body depth 4.9-6.1 in SL; appressed anal fin reaching within a distance of 1-2 scales of caudal fin in male, 2-4 scales in female; appressed 2nd dorsal slightly overlapping caudal in male; pectoral-fin rays entire.
Predorsal scales cycloid, scales absent from cheek and opercle, trunk scales ctenoid.
Female genital papilla truncate, ending well before origin of anal fin.
Colour
Few spots on nape; a dusky line running from eye dorsal to sensory pore path, ending at or before pectoral fin base; wavy brown lines on the snout. Pelvic and distal part of anal fins darker in males than in females. Some males with 3-4 vertical bars on abdomen and 2-3 horizontal bars in first dorsal fin.
Species Citation
Gobius spence Smith, Annals and Magazine of Natural History 11 13(77): 809. Type locality: Delagoa Bay, Mozambique.
Author
Bray, D.J. 2018
Resources
Australian Faunal Directory
Reticulate Sandgoby, Istigobius spence (Smith 1947)
References
Allen, G.R. & Erdmann, M.V. 2012. Reef fishes of the East Indies. Perth : Tropical Reef Research 3 vols, 1260 pp.
Hoese, D.F. 1986. Family No. 240: Gobiidae. pp. 774-807 figs in Smith, M.M. & Heemstra, P.C. (eds). Smith's Sea Fishes. Johannesburg : Macmillan South Africa xx + 1047 pp. 144 pls.
Hoese, D.F. & Erdmann, M.V. 2018. Description of a new species of Istigobius(Teleostei: Gobiidae) from Australia and Indonesia. Journal of the Ocean Science Foundation 30: 70–77. doi: http://dx.doi.org/10.5281/zenodo.1291469Open access
Hoese, D.F. & Winterbottom, R. 1979. A new species of Lioteres (Pisces, Gobiidae) from Kwazulu, with a revised checklist of South African gobies and comments on the generic relationships and endemism of western Indian Ocean gobioids. Royal Ontario Museum, Life Sciences Occasional Paper 31: 1-13
Kuiter R.W. & Tonozuka, T. 2001. Pictorial guide to Indonesian reef fishes. Part 3. Jawfishes - Sunfishes, Opistognathidae - Molidae. Melbourne : Zoonetics pp. 623–893.
Larson, H. 2016. Istigobius spence. The IUCN Red List of Threatened Species 2016: e.T193256A2215070. http://dx.doi.org/10.2305/IUCN.UK.2016-3.RLTS.T193256A2215070.en. Downloaded on 19 June 2018.
Larson, H.K., Williams, R.S. & Hammer, M.P. 2013. An annotated checklist of the fishes of the Northern Territory, Australia. Zootaxa 3696(1): 1-293
Murdy, E.O. & Hoese, D.F. 1985. A revision of the gobioid fish genus Istigobius. Indo-Pacific Fishes 4: 1-41 figs 1-8 pls 1-3
Myers, R.F. 1989. Micronesian Reef Fishes. Guam : Coral Graphics 298 pp.
Smith, J.L.B. 1947. New species and new records of fishes from South Africa. Annals and Magazine of Natural History 11 13(77): 793-821
Smith, J.L.B. 1959. Gobioid fishes of the families Gobiidae, Periophthalmidae, Trypauchenidae, Taenioididae and Kraemeriidae of the western Indian Ocean. Ichthyological Bulletin of the J.L.B. Smith Institute, Grahamstown 13: 185-225 figs 1-42 pls 9-13 (as Acentrogobius spencehttp://hdl.handle.net/10962/d1018774 open access
Quick Facts
CAAB Code:37428180
Conservation:IUCN Least Concern
Depth:1-12 m
Habitat:Reef associated
Max Size:8 cm SL
Species Image Gallery
Species Maps
CAAB distribution map
|
Import an SVG file using JavaScript and then animate it with CSS
I want to import a SVG file using JavaScript and animate the graphic with CSS.
I'm able to import the file but
cursor: pointer
doesn't work and I'm not able to access the SVG graphics attributes like fill or totalPathLenght.
Where is the problem and how can I solve it?
I tried importing the SVG like this:
const myGraphic = document.createElement("object");
myGraphic.data = "mySVG.svg";
document.body.appendChild(myGraphic);
I also tried the same thing using iframe and embed
You can't change styles of an <object>, <embed> or <iframe> directly. See this question How do I select an SVG inside an object tag?. As you're creating the object dynamically - why don't you append your svg as an inlined DOM element?
A good explanation on how to do this can be found here, I'll paraphrase and adapt it for what you are asking:
const svgElement = document.getElementById("svg");
const checkboxElement = document.getElementById("check");
checkboxElement.addEventListener("change", e => {
svgElement.style.fill = e.target.checked ? "PeachPuff" : "PapayaWhip";
});
#svg {
/* An example of how to set the cursor */
cursor: pointer;
}
<input type="checkbox" id="check" />
<svg id="svg" fill="AliceBlue">
<circle r="50" cx="70" cy="70" />
</svg>
Thanks for your help, but i wanted to import a already existing SVG using JavaScript.
@MarkoMiklas it's the exact same premise, I just can't give you a demo without access to your image.
|
/* @flow */
import React, { Component } from 'react'
import { StyleSheet } from 'react-native'
import HomeCollections from '../../../../storybook/stories/home/collections'
import { SERVICE_TYPES, QNetwork } from '../../../expand/services/services.js'
import { inject, observer } from 'mobx-react'
import p2d from '../../../expand/tool/p2d'
import dateFns from 'date-fns'
@inject('collectionsHotStore')
@observer
export default class HotCollectionHome extends Component {
constructor(props) {
super(props)
const { collections } = this.props.collectionsHotStore
this.state = {
collections
}
this.isLoading = false
}
UNSAFE_componentWillMount() {
this._getHotData()
}
_getHotData = () => {
if (this.isLoading) {
return
}
this.isLoading = true
const { isFinishLoading, loadingStatus } = this.props
loadingStatus.isFinishLoadingBottom = false
const name = 'hot'
QNetwork(
SERVICE_TYPES.banner.QUERY_BANNER_GROUP,
{ name },
response => {
this.hotCollections = []
const { banner_group } = response.data
banner_group.banners.map((item, index) => {
this._getHotProducts(banner_group.banners, index)
})
},
() => {
loadingStatus.isFinishLoadingBottom = true
isFinishLoading()
this.isLoading = false
}
)
}
_getHotProducts = (banners, index) => {
const item = banners[index]
const filters = {
sort: 'season_first_and_swappable_most_like',
per_page: 6,
activated_since: dateFns.format(
dateFns.subWeeks(new Date(), 6),
'YYYY-MM-DD'
)
}
const variables = {
filters
}
const { collectionsHotStore, isFinishLoading, loadingStatus } = this.props
QNetwork(
SERVICE_TYPES.products.QUERY_SEASONS_PRODUCTS,
variables,
response => {
if (!!response.data.products) {
const collection = {
full_description: item.description,
id: item.id,
banner_photo_url: item.logo,
banner_photo_wide_banner_url: item.inner_logo,
title: item.title,
activated_since: dateFns.format(
dateFns.subWeeks(new Date(), 6),
'YYYY-MM-DD'
)
}
let newHot = { ...collection, products: response.data.products }
this.hotCollections.push(newHot)
if (this.hotCollections.length === banners.length) {
collectionsHotStore.updateHot(this.hotCollections)
this.setState({
collections: this.hotCollections
})
loadingStatus.isFinishLoadingBottom = true
isFinishLoading()
this.isLoading = false
}
}
},
() => {
loadingStatus.isFinishLoadingBottom = true
isFinishLoading()
this.isLoading = false
}
)
}
render() {
const { navigation } = this.props
return (
!!this.state.collections.length && (
<HomeCollections
type={'hot'}
navigation={navigation}
showCollectionItem={true}
collections={this.state.collections}
style={styles.collections}
title={'最近热门'}
subTitle={'RECENT HOT'}
navigateName={'RecentHotCollection'}
/>
)
)
}
}
const styles = StyleSheet.create({
collections: {
width: p2d(375),
height: p2d(211)
}
})
|
Wireless communication system and method of controlling a transmission power
ABSTRACT
A base station is provided which notifies a mobile station of transmission power information for an uplink RACH, the mobile station transmits transmission delay estimation information on the RACH to the base station over the RACH at a transmission power based on the transmission power information, and the base station changes the transmission power information according to the transmission delay estimation information and notifies the mobile station of the changed transmission power information. The mobile station retransmits data or a preamble if the mobile station does not receive a notification that the base station has received the data or the preamble correctly after a predetermined time. The base station transmits the transmission power information over a BCH and a CPICH transmitted to a plurality of mobile stations.
CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a Continuation Application of U.S. application Ser. No. 15/138,308 filed Apr. 26, 2016, which is a Continuation Application of U.S. application Ser. No. 13/943,950, filed Jul. 17, 2013, issued as U.S. Pat. No. 9,369,968 on Jun. 14, 2016, which is a Continuation Application of U.S. application Ser. No. 12/092,002 filed Apr. 29, 2008, issued as U.S. Pat. No. 8,515,480 on Aug. 20, 2013, which is 371 of International Application No. PCT/JP2006/321981 filed Nov. 2, 2006, which claims priority from Japanese Patent Application No. 2005-321543 filed Nov. 4, 2005, the contents of all of which are incorporated herein by reference in their entirety.
TECHNICAL FIELD
The present invention relates to a transmission power control method for a wireless communication system transmitting data with wireless resources shared among a plurality of mobile stations.
BACKGROUND ART
In a W-CDMA system, random access channels (RAC Hs) using Slotted ALOHA are present (see, for example, Non-Patent Document 1). A RACH is a channel for transmitting not wireless resources specific to and allocated to each mobile station but common wireless resources (a frequency band, a scrambling code, and time) shared among mobile stations in one cell. The RACH is a channel used to transmit signals that are relatively small in size and that are not transmitted continuously such as a control signal for notifying of a periodic measurement result or a control signal for requesting start of a data communication.
The RACH is constituted by two parts called a “preamble part” and a “message part”, and transmitted using orthogonal bit sequences called “signatures” so that a plurality of mobile stations can simultaneously access the RACH. 16 types of signatures are prepared, and each of the mobile stations selects one from among these signatures at random and uses the selected signature for scrambling the preamble and selecting a spreading code of the message part. Accordingly, if the mobile stations accidentally select the same signature and start random accesses at the same timing, collision of the message parts occurs. However, if mobile stations select different signatures, message parts can be received. In the latter case, however, a desired signal for one of the mobile stations becomes an interference signal for the other mobile station. Therefore, if the mobile stations transmit signals at the same transmission power, a so-called near-far problem occurs. Namely, a mobile station located farther from the base station, that is, a mobile station having a greater propagation loss suffers a higher interference from the other mobile station and a power for a desired wave attenuates, resulting in a greater deterioration in a signal to interference ratio (SIR).
Considering the near-far problem, as shown in FIG. 1, an open loop transmission power control is performed using preamble parts so that transmission power is set to as small power as possible in a range in which an SIR of the message part from each mobile station satisfies a desired value at the base station. Specifically, the open loop transmission power control has the following procedures.
One mobile station transmits a preamble at a predetermined initial power value P_(init) [dBm]. At this time, a value calculated by the following equation is set to the initial power value P_(init) [dBm] (see, for example, Non-Patent Document 2).
P _(init) =P_CPICH_Tx·CPICH_RSCP+UL_Interference+Constant_Value [dBm].
In the equation, P_CPICH_Tx [dBm] is a transmission power of a common pilot signal (CPICH: Common Pilot Channel) transmitted from the base station. UL_Interference and Constant_Value [dB] are predetermined power offsets and notified to each mobile station in a cell by a broadcast channel or the like as system parameters common to the mobile stations in the cell. Further, CPICH_RSCP [dBm] is a reception power level of the CPICH measured by each mobile station in a predetermined cycle.
As can be seen, the P_(init) is decided according to the CPICH_RSCH, thereby eliminating the influence of the difference in propagation loss as much as possible and setting a reception level constant at the base station among the mobile stations.
Generally, however, a radio wave is susceptible to fading fluctuation generated by not only distance attenuation and shadowing but also movement of the mobile station in multipath environment. The fading fluctuation varies according to a carrier frequency. Due to this, in a W-CDMA FDD system using different frequency bands between an uplink and a downlink, a propagation loss measured in a downlink CPICH does not always coincide with that measured in an uplink CPICH. Moreover, because of presence of a measurement delay in the CPICH_RSCH, the propagation loss during transmission of a preamble greatly differs from that during measurement of the CPICH_RSCP depending on the movement of the mobile station, fading-caused drop or the like. Furthermore, the predetermined constants UL_Interference and Constant_Value are often set lower than optimum levels so as to suppress uplink interference. Due to such factors, a preamble reception power is insufficient and the base station is often incapable of detecting the preamble.
If the base station can receive the preamble, the base station transmits an acquisition indicator signal related to the preamble by a downlink common control channel after passage of a predetermined time ΔTack from a preamble transmission timing. At this time, if the base station permits the mobile station transmitting the preamble to transmit a message part, the base station transmits ACK to the base station. If the base station does not permit the mobile station to transmit the message part for such reasons as excess of the number of mobile stations from which the base station receives message parts, the base station transmits NACK to the mobile station.
On the other hand, the mobile station receives the downlink common control channel after passage of the predetermined time ΔTack from the preamble transmission timing and receives the acquisition indicator signal indicating ACK, the mobile station transmits the message part to the base station at a predetermined message part transmission timing. If the mobile station receives the acquisition indicator signal indicating NACK, then the mobile station notifies a higher layer of reception of the NACK and finishes the random access.
Furthermore, if the mobile station cannot receive the acquisition indicator signal at the predetermined timing, this means that the base station cannot receive the preamble. Therefore, the mobile station retransmits the preamble to the base station after a predetermined time. At this time, the mobile station retransmits the preamble at a preamble transmission power P_(pre+tx)(k+1) [dBm] that is a previous transmission power P_(pre) _(_) _(tk)(k) plus a preamble power increment step ΔP_(p) [dB], i.e., performs so-called Ramp-up, where k indicates the number of times of retransmission of the preamble (k is set to 0 (k=0) at initial transmission).
The mobile station repeats the above-stated operations until receiving the acquisition indicator signal or the number of times of retransmission reaches a maximum number of times of retransmission K designated as a system parameter.
Likewise, for an EUTRA (Evolved Universal Terrestrial Radio Access) system currently hotly debated in 3GPP, it is considered to introduce uplink random access channels (see, for example, Non-Patent Document 3).
In relation to the EUTRA system, a wireless access method based on FDMA (Frequency Division Multiple Access) has been mainly discussed and random access on the premise that only one mobile station transmits signals in one frequency band and the like are considered. In this case, differently from the case where a plurality of mobile stations are allowed to access one channel in the same frequency band, the near-far problem does not occur. Due to this, a fixed power value common to the mobile stations in one cell can be set to a transmission power of each mobile station. In this case, however, it is necessary to set the transmission power so that the channel from even a mobile station located at a cell end has a sufficiently high quality at the base station. In other words, the mobile stations located at places other than the cell end transmit signals at excessive transmission power. Such a state unfavorably and unnecessarily increases interference with the adjacent cells if two adjacent cells use the same frequency band. Moreover, this unfavorably and unnecessarily increases power consumption of the mobile stations. Therefore, in the EUTRA, similarly to the WCDMA, it is preferable to make power setting based on the CPICH reception measurement value so that a mobile station having a higher propagation loss has a higher transmission power. However, the EUTRA has a smaller demerit of causing each mobile station to transmit a signal at excessive power than the WCDMA by as much as absence of the near-far problem. Due to this, it is proposed to set the transmission power so as to be able to satisfy a desired quality from initial transmission and to reduce a transmission delay in the RACH without performing the so-called power Ramp-up of starting an initial power lower than the power that can satisfy the desired quality and of gradually increasing the power as done in the WCDMA.
[Non-Patent Document 1] 3GPP TS25.214 v6.6.0 (2005 June) 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Physical layer procedures (FDD) (Release 6)
[Non-Patent Document 2] 3GPP TS25.331 v6.6.0 (2005 June) 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Radio Resource Control (RRC); Protocol Specification (Release 6)
[Non-Patent Document 3] 3GPP TS25.814 v0.2.0 (2005 August) 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Physical Layer Aspects for Evolved UTRA (Release 7)
DISCLOSURE OF THE INVENTION Problems to be Solved
However, the RACH transmission power control exerted in the WCDMA system or the EUTRA system stated above has the following problems.
Although the RACH transmission power is decided based on the value designated by the base station (the power offset during the open loop power control or the fixed power value common to one cell), it is difficult to set the value to an optimum value. The reason is as follows. Since the interference varies depending on the situation of the cell to which the mobile station belongs or that of the adjacent cell, the transmission power necessary to obtain a desired SIR at the base station differs according to the situation. Furthermore, since the data transmission starts under the initiative of each mobile station over the random access channel, the base station cannot recognize that one mobile station tries to transmit a RACH until the base station receives the RACH correctly. The difficulty is, therefore, that the transmission power cannot be adaptively controlled according to the situation of transmission of the RACH. If the RACH transmission power is not appropriately set, the following problems occur.
1. RACH Transmission Power is too Low
The problems disadvantageously occur that the number of times of retransmission required until a RACH is correctly received increases, the transmission delay of the RACH increases, and that service quality degrades. If the power Ramp-up is not performed, in particular, the RAC Hs can be transmitted always at a constant power whether reception fails. Due to this, the RACH can be retransmitted only in a state of insufficient power, resulting in a situation in which the RACH cannot be correctly received even by as much as the maximum number of times of retransmission at worst and in communication failure.
2. RACH Transmission Power is too High
The problem occurs that an interference of one mobile station with an adjacent cell or the other users (in case of the WCDMA) in the cell to which the mobile station belongs increases. Besides, there is a problem of an increase in power consumption of each mobile station.
It is, therefore, an object of the present invention to provide a transmission power control method for a wireless communication system that enables a base station to appropriately set a power of a RACH that is common wireless resources according to a situation in the cell.
Means for Solving the Problems
To solve the problem, the present invention provides a method of controlling a transmission power, causing a base station to control a transmission power of a mobile station, comprising: causing the base station to notify of transmission power information on a RACH of an uplink; causing the mobile station to transmit transmission delay estimation information on the RACH at transmission power set based on the transmission power information over the RACH; and causing the base station to change the transmission power information on the RACH according to the transmission delay estimation information, and to notify the mobile station of the changed transmission power information on the wireless channel. Furthermore, the mobile station to retransmit data or a preamble after a predetermined time since transmitting the data or the preamble over the RACH if the mobile station does not receive an ACK which is a notification of which the base station has received the transmitted data or preamble correctly.
The mobile station notifies of the number of the transmission or the retransmission of the data or the preamble, a time elapsed since initial transmission of the data or the preamble or a timing of initial transmission of the data or the preamble by the transmission delay estimation information.
The mobile station retransmits the data or the preamble at a transmission power increased by a predetermined increase step if the mobile station does not receive the acquisition indicator information. The base station increases the transmission power of the RACH if a statistic value based on the transmission delay estimation information is greater than a predetermined target value.
The mobile station decides the transmission power of the RACH according to a reception power of a pilot signal transmitted from the base station. Further, the mobile station resets the transmission delay estimation information if the mobile station receives the acquisition indicator information.
By executing the above-stated sequence steps, the base station can appropriately set the RACH power according to a situation in the cell.
Advantages of the Invention
According to the present invention, the base station can appropriate set the RACH power. It is also possible to reduce the transmission delay of the RACH. It is also possible to reduce the interference of a mobile station with the other cell or with the other users in the cell to which the mobile station belongs. Due to this, throughput and capacity of the entire system can be improved.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an explanatory diagram of an open loop transmission power control.
FIG. 2 is a conceptual diagram of a system according to the present invention.
FIG. 3 is a sequence diagram of the system according to the present invention.
FIG. 4 is a sequence diagram of the system according to the present invention.
FIG. 5 is a configuration diagram of a mobile station according to a first embodiment.
FIG. 6 is a flowchart of the mobile station according to the first embodiment.
FIG. 7 is a flowchart of the mobile station according to the first embodiment.
FIG. 8 is a configuration diagram of a base station according to the first embodiment.
FIG. 9 is a flowchart of the base station according to the first embodiment.
FIG. 10 is a flowchart of a mobile station according to a fifth embodiment.
FIG. 11 is a flowchart of a mobile station according to a sixth embodiment.
FIG. 12 is a flowchart of a base station according to the sixth embodiment.
FIG. 13 is a configuration diagram of a mobile station according to a seventh embodiment.
FIG. 14 is a flowchart of the mobile station according to the seventh embodiment.
DESCRIPTION OF REFERENCE SYMBOLS
- 11 reception processing unit - 12 signal separation unit - 13 pilot signal measurement unit - 14 power calculation unit - 15 acquisition indicator signal determination unit - 16 number-of-transmission measurement unit - 17 buffer - 18 signal combining unit - 19 transmission processing unit - 20 preamble generation unit - 21 reception processing unit - 22 decoding unit - 23 error determination unit - 24 signal separation unit - 25 number of-transmission calculation unit - 26 power offset control unit - 27 control signal generation unit - 28 signal combining unit - 29 transmission processing unit
BEST MODE FOR CARRYING OUT THE INVENTION
Most preferred embodiments of the present invention will be described hereinafter with reference to the drawings. The embodiments will be described assuming that a system is an E-UTRA system now under consideration in the 3GPP.
FIG. 2 is a conceptual diagram of a system to which the present invention is applied. In the system, a plurality of base stations are present adjacent ly to one another, a plurality of mobile stations transmit or receive data on a downlink or an uplink to or from each of the base stations, OFDM (Orthogonal Frequency Division Multiple Access) is used for the downlink, and FDMA is used for the uplink. Furthermore, each of the mobile stations and base stations realizes functions to be described below by a control program stored in a memory of each of the mobile stations and base stations.
Each base station transmits on the downlink at least:
a broadcast channel (BCH) for transmitting broadcast information such as system information,
a common pilot channel (CPICH) for transmitting a pilot signal, and
an acquisition indicator channel (AICH) for transmitting acquisition indicator information in response to uplink data transmission.
FIG. 3 is a sequence diagram of the system. One mobile station transmits or receives data based on the system information transmitted over the BCH. Further, the mobile station receives the CPICH in a predetermined cycle to ensure synchronization and measures a reception quality of the CPICH. Moreover, if user data or a control signal (hereinafter, generically “data”) to be transmitted occurs to the mobile station, the mobile station transmits the data using a random access channel (RACH) that is one of uplink wireless channels. This corresponds to transmission of the message part in the RACH transmission described in the “BACKGROUND ART” part. A RACH transmission power at this time is decided based on a value indicated by the base station using the BCH.
If the mobile station transmits the data over the RACH, the mobile station receives an acquisition indicator signal over the AICH after a predetermined time. The mobile station retransmits data at a predetermined timing until the mobile station receives an acquisition indicator signal (ACK signal) indicating that the data transmitted from the mobile station has been correctly received or until the number of times of retransmission reaches a predetermined maximum number of times of retransmission.
FIG. 4 shows another exemplary sequence of the system. FIG. 4 differs from FIG. 3 in the following respect. Similarly to the “BACKGROUND ART” part described above, if data to be transmitted occurs to the mobile station, the mobile station transmits a preamble over the RACH first. If the base station correctly receives the preamble, the base station transmits an acquisition indicator signal (ACK signal) over the AICH after a predetermined time. After receiving the acquisition indicator signal over the AICH, the mobile station transmits data or the preamble. It is to be noted that the preamble is a bit pattern known to the base station, and that a signal unknown to the base station such as user data or a control signal is not transmitted as the preamble.
In each of these sequences, the mobile station also transmits transmission delay estimation information while adding the transmission delay estimation information to the data or the preamble over the RACH. By doing so, the base station can control information on the RACH transmission power indicated by the BCH so that a delay required until the data or preamble is correctly received can be controlled to an appropriate value. It is possible to reduce interference by setting the transmission power of the mobile station as low as possible while effectively reducing the data transmission delay.
First Embodiment
Features of a first embodiment are as follows.
- 1. A mobile station transmits the number of times of retransmission or the number of times of transmission of the RACH as the transmission delay estimation information. In this case, the relationship between the number of times of retransmission and the number of times of transmission is (the number of times of retransmission)=(the number of times of transmission)−1. Embodiments will be described hereinafter assuming that the number of times is the number of times of transmission. - 2. A base station notifies of a power offset as information on a RACH transmission power, and the mobile station decides the RACH power based on a CPICH reception power and the power offset (open loop power control). - 3. The mobile station retransmits data at the same power as that used during data transmission. - 4. The mobile station transmits data while adding the transmission delay estimation information to the data during the data transmission shown in FIG. 3. First to sixth embodiments will be described while referring to the system shown in FIG. 3.
By the above-stated features, the base station can determine whether the average number of times of transmission until each of the mobile stations in the system can correctly receive data over the RACH is kept to a desired level. If the average number of times of transmission is large, the power offset of the RACH can be controlled to be increased so as to reduce the transmission delay.
FIG. 5 shows a configuration of each of the mobile stations according to the first embodiment. The mobile station according to the first embodiment is configured to include a reception processing unit 11 receiving a downlink signal and performing a necessary reception processing such as FET (Fast Fourier Transform), a signal separation unit 12 separating signals in respective channels from the received signal, a pilot signal measurement unit 13 measuring a power intensity of a separated pilot signal, a power calculation unit 14 calculating a power of the RACH, an acquisition indicator signal determination unit 15 determining an acquisition indicator signal received over an AICH, a number-of-transmission calculation unit 16 counting the number of times of transmission of the RACH, a buffer 17, a signal combining unit 18 combining uplink data with a control signal, and a transmission processing unit 19 performing a processing necessary for signal transmission.
The signal separation unit 12 separates signals in respective channels from the signal subjected to the reception processing. The signal separation unit 12 transmits a CPICH signal to the pilot signal measurement unit 13, an AICH signal to the acquisition indicator signal determination unit 15, and a BCH signal to the power calculation unit 14.
The pilot signal measurement unit 13 measures a pilot signal average reception power in a predetermined cycle and transmits the measured average reception power to the power calculation unit.
The power calculation unit 14 calculates a RACH transmission power P_Tx from a CPICH transmission power CPICH_Tx notified by the BCH, a power offset PO, and the pilot signal average reception power CPICH_Rx, and notifies the transmission processing unit 19 of the calculated RACH transmission power P_Tx.
The acquisition indicator signal determination unit 15 determines whether an ACK signal is received as the acquisition indicator information, and notifies the number-of-transmission calculation unit 16 and the buffer 17 of a determination result.
If the mobile station receives the ACK signal, the number-of-transmission calculation unit 16 resets the number of times of transmission to 0. If the mobile station does not receive the ACK signal, the number-of-transmission calculation unit 16 increases the number of times of transmission by 1 and notifies the signal combining unit 18 of the increased number of times of transmission.
If the mobile station receives the ACK signal, the buffer 17 abandons the relevant data. If the mobile station does not receive the ACK signal, the buffer 17 transmits the relevant data to the signal combining unit 18.
The signal combining unit 18 combines the data transmitted from the buffer with the number-of-transmission information, and transmits the resultant data to the transmission processing unit 19.
FIG. 6 is a flowchart if the mobile station transmits data using the RACH according to the first embodiment.
The reception processing unit of the mobile station receives the BCH (step 11), and receives the CPICH transmission power CPICH_Tx, the power offset PO, the maximum number of times of transmission and the like transmitted as the system information. The pilot reception power measurement unit measures the pilot signal average reception power CPICH_Rx in the predetermined cycle (step 12). If transmission data is stored in the buffer (step 13), the number-of-transmission calculation unit sets the number-of-transmission information to 1 (step 14), calculates the RACH transmission power P_Tx (step 15), and transmits the number-of-transmission information as well as the data over the RACH (step 16). At this time, the power calculation unit calculates the RACH transmission power P_Tx according to the following equation.
P_Tx=CPICH_Tx−CPICH_Rx+PO [dBm]
After the predetermined time, the mobile station receives the downlink AICH (step 17). If the mobile station receives the ACK signal as the acquisition indicator information, the processing is returned to the step 11 (step 18; YES). If the mobile station does not receive the ACK signal, then the number-of-transmission calculation unit increase the number-of-transmission information by 1 (step 19), the processing is returned to the step 15, and the mobile station transmits the same data as the data transmitted previously. The mobile station repeats the operations until the mobile station receives the ACK signal over the AICH transmitted after the predetermined time since data transmission or until the number of times of transmission reaches the predetermined maximum number of times of transmission.
FIG. 7 shows another example of the data transmission control exercise by the mobile station using the RACH.
The reception processing unit of the mobile station receives the BCH (step 20), and receives the CPICH transmission power CPICH_Tx, the power offset PO, the maximum number of times of transmission and the like transmitted as the system information. The pilot reception power measurement unit measures the pilot signal average reception power CPICH_Rx in the predetermined cycle (step 21). If transmission data is stored in the buffer (step 22), the number-of-transmission calculation unit sets the number-of-transmission information to 1 (step 23), calculates the RACH transmission power P_Tx (step 24), and transmits the number-of-transmission information as well as the data using the RACH (step 25).
After the predetermined time, the mobile station receives the downlink AICH (step 26). If the mobile station receives the ACK signal as the acquisition indicator information, the processing is returned to the step 20 (step 27; YES). If the mobile station does not receive the ACK signal, the mobile station receives the BCH and CPICH again (step 28). If system information is the same as the previously received system information (step 29; YES), then the number-of-transmission calculation unit increase the number-of-transmission information by 1 (step 30), the processing is returned to the step 24, and the mobile station transmits the same data as the data transmitted previously. Thereafter, the mobile station receives the system information over the BCH. If a value of each of or one of the CPICH transmission power and the power offset included in the system information differs from the previous value (step 29; NO), the processing is returned to the step 23, where the number-of-transmission calculation unit sets the number-of-transmission information to 1, and the mobile station transmits newly received data. The mobile station repeats the operations until the mobile station receives the ACK signal over the AICH transmitted after the predetermined time since data transmission or until the number of times of transmission reaches the predetermined maximum number of times of transmission.
FIG. 8 shows a configuration of each of the base stations used in the first embodiment. The base station used in the first embodiment is configured to include a reception processing unit 21, a decoding unit 22, an error determination unit 23, a signal separation unit 24 separating a signal, a number-of-transmission calculation unit 25, a power offset control unit 26, a control signal generation unit 27, a signal combining unit 28, and a transmission processing unit 29.
The error determination unit 23 checks whether a data block including the data and the number-of-transmission information has no error by a CRC added to the data block. If the base station can receive the data block without an error, the error determination unit 23 transmits the ACK signal to the signal combining unit 28 and the data block to the signal separation unit 24.
The signal separation unit 24 transmits the number-of-transmission information to the number-of-transmission calculation unit 25, and the data to a higher layer.
The number-of-transmission calculation unit 25 collects the number-of-transmission information on the respective base stations and records the information in a memory (not shown). Further, the number-of-transmission calculation unit 25 calculates an average value of the number of times of transmission (hereinafter, “average number of times of transmission) recorded in the memory at a predetermined power offset update timing, transmits a calculation result to the power offset control unit 26, and erases the number-of-transmission information recorded in the memory
The power offset control unit 26 updates the power offset so that the average number of times of transmission nears a desired target average number of times of transmission, and transmits an update result to the signal combining unit 28.
The control signal generation unit 27 generates the common pilot signal and signals related to other system control information, and transmits the generated signals to the signal combining unit 28.
The signal combining unit 28 maps the transmitted signals on respective channels of the CPICH, the BCH, and the AICH, combines the signals, and transmits the combined signal to the transmission processing unit 29.
FIG. 9 is a flowchart if the base station updates the power offset according to the first embodiment.
The base station notifies of the power offset as the system information in a predetermined cycle over the BCH (step 31), receives an uplink RACH (step 32), and checks whether the uplink RACH is received successfully by the CRC after a reception processing (step 33). If the reception succeeds, the base station transmits the ACK signal over the AICH (step 34). Further, the base station extracts the number-of-transmission information from the successfully received data block and records the number-of-transmission information in the memory (step 35). If timing is the predetermined power offset update timing (step 36), the base station calculates the average value of the number of times of transmission of the mobile stations in one cell extracted so far (step 37), and updates the power offset so that the average number of times of transmission nears the desired target average number of times of transmission.
Assuming, for example, that the average number of times of transmission is N_ave, the target number of times of transmission is N_target, the current power offset is PO_current, the updated power offset is PO_update, a power offset increase step is Δup(Ramp-up), and a power offset decrease step is Δdown(Ramp-down), the following relationships are held.
If N_ave>N_target,
PO_update=PO_current+Δup [dB] (step 38).
If N_ave<N_target,
PO_update=PO_current·Δdown [dB] (step 39).
It is assumed herein that the relationship of Δup and Δdown is Δup>Δdown.
The base station notifies each base station in the cell of the updated PO over the BCH (step 40).
In this manner, if the average number of times of transmission is greater than the predetermined target number, the power offset can be increased. Accordingly, the RACH transmission power of each mobile station in the cell is set high and the reception quality of the RACH at the base station is improved. It is, therefore, possible to reduce the number of times of transmission before the RACH is received successfully, and reduce the transmission delay. Moreover, if the average number of times of transmission is smaller than the predetermined target number, that is, the RACH is transmitted at excessive quality, the power offset can be reduced. Accordingly, the RACH transmission power of each mobile station in the cell is set high and the interference with the other cells can be reduced.
As stated so far, according to the first embodiment, each mobile station notifies the base station of the number-of-transmission information as well as the RACH at the time of transmission of the RACH. Accordingly, if the average number of times of transmission is greater than the predetermined target value, that is, a delay before the data is received correctly over the RACH is great, then the power offset is increased so as to set the RACH transmission power high and each mobile station in the cell can be notified of the increased power offset. By doing so, the RACH transmission power of each mobile station in the cell increases and the probability that the base station can correctly receive data increases, so that the average number of times of transmission decreases and the RACH transmission delay can be reduced.
If the average number of times of transmission is smaller than the predetermined target value, this means that each mobile station transmits the RACH at excessive quality. Due to this, the power offset is decreased so that the RACH transmission power is set low, and each mobile station in the cell can be notified of the decreased power offset. It is, therefore, possible to reduce the RACH transmission power, reduce the interference with the other cells, and reduce the power consumption of each mobile station.
Furthermore, according to the first embodiment, the power offset increase step and the power offset decrease step are set asymmetric so that the power offset increase step is greater than the power offset decrease step. By so setting, if the delay is great, the power can be promptly increased. Since the subsequent reduction is made gradually, it takes longer time until the delay becomes greater (that is, the average number of times of transmission is greater than the target number of times of transmission). A target delay can be, therefore, stably satisfied. However, embodiments of the present invention are not limited to the first embodiment. Namely, the power offset increase step and the power offset decrease step may be set to an identical value, and the decrease step may be set greater than the increase step.
Second Embodiment
A second embodiment differs from the first embodiment in the following respects. Each of the base stations also notifies a RACH power increase step ΔP over the BCH. Each of the mobile stations receives information on the power increase step ΔP as well as the CPICH transmission power CPICH_Tx and the power offset PO over the BCH, calculates the RACH transmission power P_Tx according to the following equation, and retransmits the RACH with a power increased from the previous power by ΔP [dB].
P_Tx=CPICH_Tx·CPICH_Rx+PO+ΔP×((number of times of transmission)−1) [dBm]
If the number of times of retransmission is used, ((number of times of transmission)−1) is replaced by ((number of times of retransmission)−1).
At this time, if the mobile station is to transmit new data over the RACH after receiving the ACK signal over the AICH, the mobile station transmits the new data with the power returned to initial power obtained from the power offset and the CPICH reception power. The other operations are similar to those according to the first embodiment.
Third Embodiment
A third embodiment differs from the first embodiment in the following respects. In the first embodiment, the RACH power value is decided based on the CPICH reception power and the power offset. In the third embodiment, each of the base stations notifies each mobile station of a fixed transmission power value P_Tx as system information, and each of the mobile stations in the cell transmits the RACH at P_Tx. The base station increases or decreases P_Tx by a predetermined step according to the number of times of transmission notified from the mobile station. Specifically, the base station calculates P_Tx as follows.
Assuming that the average number of times of transmission is N_ave, the target number of times of transmission is N_target, the current transmission power is P_Tx_current, the updated transmission power is P_Tx_update, a power increase step is Δup, and a power decrease step is Δdown, the following relationships are held.
If N_ave>N_target,
P_Tx_update=P_Tx_current+Δup [dB].
If N_ave<N_target,
P_Tx_update=P_Tx_current−Δdown [dB].
The P_Tx updated at the base station is notified to the mobile station as the system information over the BCH. The other operations are similar to those according to the first embodiment.
Fourth Embodiment
A fourth embodiment is a combination of the second and third embodiments. In the second embodiment, the RACH initial transmission power value is decided based on the CPICH reception power and the power offset. In the fourth embodiment, each of the base stations notifies each mobile station of the fixed transmission power value P_Tx as system information, and each of the mobile stations in the cell transmits an initial RACH at P_Tx. Thereafter, in case of retransmission, the mobile station retransmits the RACH at a power obtained by adding a predetermined power increase step ΔP to P_Tx. Furthermore, the base station increases or decreases the fixed transmission power value P_Tx by a predetermined step according to the number of times of transmission from the base station in the manner described in the first embodiment, and notifies the mobile station of the resultant transmission power as the system information over the BCH. The other operations are similar to those according to the first or second embodiment.
Fifth Embodiment
In a fifth embodiment, each of the mobile stations causes a timer to operate at time of initial RACH transmission, and notifies each of the mobile stations of a value of the timer during retransmission, that is, a time elapsed from start of RACH transmission as transmission delay estimation information.
FIG. 10 is a flowchart if each of the mobile stations transmits data using the RACH according to the fifth embodiment.
The mobile station receives the BCH (step 41), receives the CPICH transmission power CPICH_Tx, the power offset PO, the maximum number of times of transmission and the like transmitted as the system information, and measures the pilot signal average reception power CPICH_Rx in the predetermined cycle (step 42). If transmission data is present (step 43), the timer is started at 0 (step 44).
The mobile station transmits timer information as well as the data over the RACH at the transmission power P_Tx (step 45). After the predetermined time, the mobile station receives the downlink AICH (step 46). If the mobile station receives the ACK signal (step 47; YES), the timer is stopped (step 48), and the processing is returned to the step 41. If the mobile station does not receive the ACK signal, then the processing is returned to the step 45, and the mobile station retransmits the timer information as well as the data transmitted previously. The mobile station repeats the operations until the mobile station receives the ACK signal over the AICH transmitted after the predetermined time since data transmission or until the number of times of transmission reaches the predetermined maximum number of times of transmission.
Sixth Embodiment
In a sixth embodiment, using system time known to base stations and mobile stations, each mobile station notifies one base station of system time that is RACH transmission start time, and the base station calculates a transmission delay by subtracting system time that is the notified transmission start time from system time at which the RACH is received successfully.
FIG. 11 is a flowchart if each of the mobile stations transmits data using the RACH according to the sixth embodiment.
The mobile station receives the BCH (step 51), receives the CPICH transmission power CPICH_Tx, the power offset PO, the maximum number of times of transmission and the like transmitted as the system information, and measures the pilot signal average reception power CPICH_Rx in the predetermined cycle (step 52). If transmission data is present (step 53), current system time T_init is recorded (step 54).
The mobile station transmits system time as well as the data over the RACH at the transmission power P_Tx (step 55). After the predetermined time, the mobile station receives the downlink AICH (step 56). If the mobile station receives the ACK signal (step 57; YES), the recorded system time is deleted (step 58), and the processing is returned to the step 51. If the mobile station does not receive the ACK signal, the processing is returned to the step 55, and the mobile station retransmits the system as well as the data transmitted previously. The mobile station repeats the operations until the mobile station receives the ACK signal over the AICH transmitted after the predetermined time since data transmission or until the number of times of transmission reaches the predetermined maximum number of times of transmission.
FIG. 12 is a flowchart if the base station updates the power offset according to the sixth embodiment.
The base station notifies of the power offset as the system information in a predetermined cycle over the BCH (step 60), receives an uplink RACH (step 61), and checks whether the uplink RACH is received successfully by the CRC after a reception processing (step 62). If the reception succeeds, the base station records current system information T_current (step 63) and transmits the ACK signal over the AICH (step 64). Further, the base station extracts system time information T_init from the received block, calculates transmission delay time T=(T_current−T_init), and records the transmission delay time T=(T_current−T_init) in the memory (step 65). If timing is the predetermined power offset update timing (step 66), the base station updates the power offset based on the transmission delay time calculated and recorded so far. By way of example, the base station calculates average transmission delay time (step 67) and updates the power offset so that the average transmission delay time nears a desire target value.
Assuming, for example, that the average transmission delay time is T_ave, the target transmission delay time is T_target, the current power offset is PO_current, the updated power offset is PO_update, the power offset increase step is Δup, and the power offset decrease step is Δdown, the following relationships are held.
If T_ave>T_target,
PO_update=PO_current+Δup [dB] (step 68).
If T_ave<T_target,
PO_update=PO_current−Δdown [dB] (step 69).
It is assumed herein that the relationship of Δup and Δdown is Δup>Δdown.
The base station notifies each base station in the cell of the updated PO over the BCH (step 70).
Seventh Embodiment
A seventh embodiment is used in a system transmitting data using the message part after transmitting the preamble as described with reference to FIG. 4. Transmission delay estimation information is not transmitted using a preamble before reception of the ACK signal, but the transmission delay estimation information is transmitted when a preamble or data after reception of the ACK signal is transmitted with the transmission delay information added to the preamble or the data.
The operations according to the first to sixth embodiment can be applied to the other operations. In the seventh embodiment, the number of times of transmission of the preamble is used as the transmission delay information, and calculation of the RACH power is decide based on the CPICH transmission power, the CPICH reception power, the predetermined power offset, and the number of times of transmission as described in the second embodiment. For example, in FIG. 1, the message part is transmitted after the preamble is transmitted three times. Therefore, “(number of times of transmission)=3” is transmitted as the transmission delay information using the message part.
FIG. 13 shows a configuration of each of the mobile stations according to the seventh embodiment. The configuration of the mobile station according to the seventh embodiment differs from that according to the first embodiment (FIG. 5) in that a preamble generation unit is additionally included in the mobile station.
If data arrives at the buffer, then the buffer notifies the preamble generation unit of data arrival, the preamble generation unit generates a predetermined bit sequence, transmits the generated bit sequence to the signal combining unit, and notifies the number-of-transmission measuring unit that the preamble is transmitted to the number-of-transmission measuring unit. The transmission processing unit performs a necessary processing on the generated bit sequence and then transmits the processed bit sequence as a preamble.
Furthermore, the acquisition indicator signal determining unit notifies the preamble generation unit whether or not the acquisition indicator signal determining unit receives the ACK signal over the AICH after predetermined time since transmission of the preamble.
If the acquisition indicator signal determining unit does not receive the ACK signal, the preamble generation unit generates the predetermined bit sequence and transmits the generated bit sequence as the preamble similarly to the above. Further, the preamble generation unit notifies the number-of-transmission measuring unit of transmission of the preamble. In response to the notification of the transmission of the preamble, the number-of-transmission measuring unit increases the recorded number of times by 1.
If the acquisition indicator signal determining unit receives the ACK signal, the preamble generation unit does not generate the preamble and notifies the number-of-transmission measuring unit that transmission of the preamble is stopped. In response to the notification of the stop of the transmission of the preamble, the number-of-transmission measuring unit transmits the recorded number of times of transmission to the signal combining unit as the number-of-transmission information. Further, the buffer is also notified that the acquisition indicator signal determining unit receives the ACK signal, and the buffer transmits a data block to the signal combining unit, accordingly
The signal combining unit combines the data block with the number-of-transmission information, and the transmission processing unit performs a necessary processing on the number-of-transmission information and then transmits the processed information.
FIG. 14 is a flowchart if each of the mobile stations transmits data using the RACH according to the seventh embodiment.
In the mobile station, the reception processing unit receives the BCH (step 71), and receives the CPICH transmission power CPICH_Tx, the power offset PO, the maximum number of times of transmission and the like transmitted as the system information. The pilot reception power measurement unit measures the pilot signal average reception power CPICH_Rx in the predetermined cycle (step 72). If transmission data is stored in the buffer (step 73), the number-of-transmission calculation unit sets the number-of-transmission information to 1 (step 74), calculates the RACH transmission power P_Tx (step 75), and transmits the preamble over the RACH (step 76). At this time, the power calculation unit calculates the RACH transmission power according to the following equation.
P_Tx=CPICH_Tx−CPICH_Rx+PO+Δp×((number of times of transmission)−1) [dBm]
After the predetermined time, the mobile station receives the downlink AICH (step 77). If the mobile station receives the ACK signal as the acquisition indicator information (steps 78 and 80; YES), then the mobile station transmits the data and the number-of-transmission information over the RACH (step 81), and the processing is returned to the step 71. If the mobile station does not receive the ACK signal and the number of times of transmission is smaller than the maximum number of times of transmission (step 78; NO), then the number-of-transmission calculation unit increases the number-of-transmission information by 1 (step 79), and the processing is returned to the step 75. Furthermore, if the mobile station does not receive the ACK signal and the number of times of transmission reaches the maximum number of times of transmission (step 80; NO), the processing is returned to the step 71.
In the first to seventh embodiments stated above, data is transmitted using the RACH. However, the data is not limited to user data. For example, a resource reservation request signal for requesting allocation of uplink wireless resources for transmitting the user data may be transmitted using the RACH. Alternatively, the transmission of data using the RACH may be applied to an instance of transmitting a control signal necessary to transmit downlink data, e.g., a signal notifying of a quality of a downlink wireless channel (CQI: Channel Quality Indicator) or the like.
In the first to seventh embodiments stated above, the OFDM and the FDMA are used for the downlink and the uplink as the wireless access methods, respectively. However, the scope of the present invention is not limited to the usage. For example, the present invention may be applied to a system using the CDMA for both the uplink and the downlink similarly to the currently available WCDMA system, a system using the OFDM for both the uplink and the downlink, or the like.
In the first to seventh embodiments stated above, the random access channel is applied to the uplink wireless channel. However, the scope of the present invention is not limited to the application. Alternatively, the present invention is applicable to any wireless channels used for causing each base station to set transmission power information to each mobile station, and for causing the mobile station to transmit uplink data at arbitrary timing at a power set based on the designated transmission power information.
In the first to seventh embodiments stated above, the base station transmits the RACH transmission power information over the BCH as the system information. However, the scope of the present invention is not limited to the transmission method. For example, the base station may notify each of the mobile stations of the RACH transmission power information using an individual control signal.
Furthermore, in the first to seventh embodiments stated above, the base station sets only one transmission power information. However, the scope of the present invention is not limited to the setting. For example, the mobile stations in one cell are divided into a plurality of groups, and the base station may set different transmission power information to the respective groups. Namely, such a setting may be considered that the base station sets a higher RACH transmission power to a user group enjoying prioritized services than those set to the other ordinary user groups. In another alternative, the base station may set the RACH transmission power to different values according to contents of data transmitted from the respective mobile stations. Namely, different values may be set to the transmission power information in case of the above-stated Reservation Request and that in case of transmission of the user data, respectively.
Moreover, in the first to seventh embodiments stated above, the base station updates the RACH transmission power or the power offset according to the transmission delay estimation information. However, the scope of the present invention is not limited to the update method. The base station may update the transmission power or the power offset using the other information. For example, one of factors for increasing the transmission delay is as follows. Because of heavy RACH traffic (because of the larger number of mobile stations intended to transmit data over the RACH), a plurality of mobile stations transmit data or a preamble over the RACH at the same timing and a collision occurs. In such a case, since the insufficient RACH transmission power does not possibly cause an increase in the transmission delay, there is no need to increase the RACH transmission power or the power offset. In other words, the base station estimates the RACH traffic from the number of mobile stations successfully transmitting the data or preamble over the RACH in a predetermined time or the like. Only if the RACH traffic is equal to or smaller than a predetermined threshold, the base station may update the transmission power or the power offset based on the transmission delay estimation information as described in the first to seventh embodiments.
1. A mobile station comprising: a receiver configured to receive first information from a base station; and a transmitter configured to: transmit, to the base station, a first RACH preamble based on the first information, wherein the first RACH preamble is transmitted without second information, the second information being related to a number of RACH preambles sent until a successful RACH completion; and transmit the second information to the base station, wherein the receiver is configured to receive third information from the base station, the third information being changed from the first information based on the second information, wherein the transmitter is configured to transmit, to the base station, a second RACH preamble based on the third information, and wherein the second RACH preamble is transmitted without fourth information, the fourth information being related to a number of RACH preambles sent until a successful RACH completion.
2. The mobile station according to claim 1, wherein the transmitter is configured to transmit the second information to the base station after transmitting the first RACH preamble.
3. The mobile station according to claim 1, wherein the receiver is configured to receive the third information after transmitting the second information.
4. The mobile station according to claim 1, wherein the transmitter is configured to transmit the second information to the base station after receiving a signal from the base station.
5. The mobile station according to claim 4, wherein the signal is a response to the first RACH preamble.
6. The mobile station according to claim 1, wherein the transmitter is configured to transmit the first RACH preamble with preamble transmission power, the preamble transmission power being determined by the mobile station using the first information.
7. The mobile station according to claim 1, wherein the transmitter is configured to transmit the second RACH preamble with preamble transmission power, the preamble transmission power being determined by the mobile station using the third information.
8. A method of a mobile station, the method comprising: receiving first information from a base station; transmitting, to the base station, a first RACH preamble based on the first information, wherein the first RACH preamble is transmitted without second information, the second information being related to a number of RACH preambles sent until a successful RACH completion, transmitting the second information to the base station; receiving third information from the base station, the third information being changed from the first information based on the second information; and transmitting, to the base station, a second RACH preamble based on the third information, wherein the second RACH preamble is transmitted without fourth information, the fourth information being related to a number of RACH preambles sent until a successful RACH completion.
9. The method according to claim 8, wherein the second information is transmitted to the base station after transmitting the first RACH preamble.
10. The method according to claim 8, wherein the third information is received after transmitting the second information.
11. The method according to claim 8, wherein the second information is transmitted to the base station after receiving a signal from the base station.
12. The method according to claim 11, wherein the signal is a response to the first RACH preamble.
13. The method according to claim 8, wherein the first RACH preamble is transmitted with preamble transmission power, the preamble transmission power being determined by the mobile station using the first information.
14. The method according to claim 13, wherein the first information is related to initial preamble power.
15. The method according to claim 8, wherein the second RACH preamble is transmitted with preamble transmission power, the preamble transmission power being determined by the mobile station using the third information.
16. A base station comprising: a transmitter configured to broadcast first information to a mobile station, the first information being configured for transmitting a first RACH preamble; and a receiver configured to: receive the first RACH preamble from the mobile station, wherein the first RACH preamble is received without second information, the second information being related to a number of RACH preambles sent until a successful RACH completion; and receive the second information from the mobile station, wherein the transmitter is configured to broadcast third information to the mobile station, the third information being configured for transmitting a second RACH preamble, the third information being changed from the first information based on the second information, wherein the receiver is configured to receive the second RACH preamble from the mobile station, and wherein the receiver is configured to receive the second RACH preamble without fourth information, the fourth information being related to a number of RACH preambles sent until a successful RACH completion.
17. The base station according to claim 16, wherein the receiver is configured to receive the second information after receiving the first RACH preamble.
18. The base station according to claim 16, wherein the transmitter is configured to broadcast the third information after receiving the second information.
19. The base station according to claim 16, wherein the receiver is configured to receive the second information after transmitting a signal to the mobile station.
20. The base station according to claim 19, wherein the signal is a response to the first RACH preamble.
21. The base station according to claim 16, wherein the first information is configured for determining transmission power of the first RACH preamble.
22. The base station according to claim 16, wherein the third information is configured for determining transmission power of the second RACH preamble.
23. A method of a base station the method comprising: broadcasting first information to a mobile station, the first information being configured for transmitting a first RACH preamble; receiving the first RACH preamble from the mobile station, wherein the first RACH preamble is received without second information, the second information being related to a number of RACH preambles sent until a successful RACH completion; receiving the second information from the mobile station; broadcasting third information to the mobile station, the third information being configured for transmitting a second RACH preamble, the third information being changed from the first information based on the second information; and receiving a second RACH preamble from the mobile station, wherein the second RACH preamble is received without fourth information, the fourth information being related to a number of RACH preambles sent until a successful RACH completion.
24. The method according to claim 23, wherein the second information is received after receiving the first RACH preamble.
25. The method according to claim 23, wherein the third information is transmitted after receiving the second information.
26. The method according to claim 23, wherein the second information is received after transmitting a signal to the mobile station.
27. The method according to claim 26, wherein the signal is a response to the first RACH preamble.
28. The method according to claim 23, wherein the first information is configured for determining transmission power of the first RACH preamble.
29. The method according to claim 28, wherein the first information is related to initial preamble power.
30. The method according to claim 23, wherein the third information is configured for determining transmission power of the second RACH preamble.
|
// This file is part of the OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) and is released under the Apache 2.0 License (http://www.apache.org/licenses/LICENSE-2.0)
using System;
using System.Collections.Generic;
using O2.DotNetWrappers.DotNet;
using O2.Interfaces.O2Findings;
namespace O2.DotNetWrappers.O2Findings.DotNet
{
public class AspNetAnalysis
{
public static List<String> getAspNetPageFromO2Findings(List<IO2Finding> o2Findings)
{
DI.log.info("in getAspNetPageFromO2Findings");
//var stringToMatch = ".*aspx";
var findings = new List<String>();
foreach (IO2Finding o2Finding in o2Findings)
{
if (o2Finding.callerName.IndexOf("aspx") > -1)
{
if (false == findings.Contains(o2Finding.callerName))
findings.Add(o2Finding.callerName);
}
}
DI.log.info("Found {0} unique calls with aspx", findings.Count);
foreach (string finding in findings)
DI.log.info(" {0}", finding);
return findings;
}
public static List<IO2Finding> findWebControlSources(List<IO2Finding> o2Findings)
{
var methodsToFind = new RegEx("System.Web.UI.WebControls.*get_Text");
//var methodsToFind = new RegEx("HttpRequest");
var results = new List<IO2Finding>();
foreach (IO2Finding o2Finding in o2Findings)
{
IO2Trace source = ((O2Finding)o2Finding).getSource();
if (source != null && methodsToFind.find(source.ToString()))
// && o2Finding.getSource.ToString() != "")
{
if (source.context.Contains("txt"))
{
// DI.log.info(source + " -> " + (o2Finding.getSink != null ? o2Finding.getSink.ToString() : ""));
string variableName = OzasmtContext.getVariableNameFromThisObject(source);
// DI.log.info(o2Finding.o2Trace + " ::: " + );// + " : " + source.context);
foreach (IO2Trace o2Trace in o2Finding.o2Traces)
{
List<string> wordsFromSignature =
OzasmtUtils.getListWithWordsFromSignature(o2Trace.signature);
foreach (string word in wordsFromSignature)
{
// var sourceO2Trace = new O2Trace("OunceLabs: " + word);
// var sinkO2Trace = new O2Trace("OunceLabs: " + variableName);
// sinkO2Trace.childTraces.Add(o2Finding.o2Trace);
// sourceO2Trace.childTraces.Add(sinkO2Trace);
var newO2Finding = new O2Finding
{
vulnType = "ASP.NET Attack Surface",
vulnName = word + "_" + variableName,
//o2Trace = sourceO2Trace
o2Traces = o2Finding.o2Traces
};
results.Add(newO2Finding);
}
}
}
// DI.log.info(" " + o2Finding.getSource + " -> " + o2Finding.getSource.context + "\n\n");
}
}
return results;
}
/*public static List<O2Finding> findMethodCalled(String sDllToLoad)
{
return CecilUtils.findInAssemblyVariable(sDllToLoad);
}*/
}
}
|
package de.uniaugsburg.isse.models.data;
import java.io.File;
import java.util.Arrays;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import org.junit.Test;
import de.uniaugsburg.isse.models.ModelSynthesiser;
import de.uniaugsburg.isse.models.data.naive.NaiveOPLOrganisationalTemplateFactory;
import de.uniaugsburg.isse.syntax.CplexModelSyntaxProvider;
public class ModelSynthesisTest {
private final String organisationalTemplateFile = "Example.mod";
@Test
public void test() {
ModelSynthesiser ms = new ModelSynthesiser();
ms.setModelSyntaxProvider(new CplexModelSyntaxProvider());
ms.setFactory(new NaiveOPLOrganisationalTemplateFactory(new File(organisationalTemplateFile)));
List<String> individualAgentModels = Arrays.asList("a.mod", "b.mod", "c.mod");
HashMap<String, String> initsA = new HashMap<String, String>();
initsA.put("production", "55");
HashMap<String, String> initsB = new HashMap<String, String>();
initsB.put("production", "17");
initsB.put("consStopping", "0");
initsB.put("consRunning", "4");
HashMap<String, String> initsC = new HashMap<String, String>();
initsC.put("production", "0");
initsC.put("consStopping", "5");
initsC.put("consRunning", "0");
initsC.put("countdown", "0");
initsC.put("powerPlantState", "0");
initsC.put("signal", "0");
// all initial states
Map<String, Map<String, String>> initStates = new HashMap<String, Map<String, String>>();
initStates.put("a", initsA);
initStates.put("b", initsB);
initStates.put("c", initsC);
ms.setInitialValues(initStates);
System.out.println(ms.synthesise(organisationalTemplateFile, individualAgentModels));
}
}
|
[House Hearing, 105 Congress]
TREASURY, POSTAL SERVICE, AND GENERAL
GOVERNMENT APPROPRIATIONS FOR
FISCAL YEAR 1998
=========================================================================
HEARINGS
BEFORE A
SUBCOMMITTEE OF THE
COMMITTEE ON APPROPRIATIONS
HOUSE OF REPRESENTATIVES
ONE HUNDRED FIFTH CONGRESS
FIRST SESSION
________
SUBCOMMITTEE ON THE TREASURY, POSTAL SERVICE, AND GENERAL GOVERNMENT
APPROPRIATIONS
JIM KOLBE, Arizona, Chairman
FRANK R. WOLF, Virginia STENY H. HOYER, Maryland
ERNEST J. ISTOOK, Jr., Oklahoma CARRIE P. MEEK, Florida
MICHAEL P. FORBES, New York DAVID E. PRICE, North Carolina
ANNE M. NORTHUP, Kentucky
ROBERT B. ADERHOLT, Alabama
NOTE: Under Committee Rules, Mr. Livingston, as Chairman of the Full
Committee, and Mr. Obey, as Ranking Minority Member of the Full
Committee, are authorized to sit as Members of all Subcommittees.
Michelle Mrdeza, Elizabeth A. Phillips, Jeff Ashford, and Melanie Marshall,
Staff Assistants
________
PART 4
INDEPENDENT AGENCIES
Page
Federal Election Commission....................................... 1
General Services Administration................................... 139
National Archives and Records Administration...................... 423
Committee for Purchase From People Who Are Blind or Severely
Disabled......................................................... 535
Federal Labor Relations Authority................................. 551
John F. Kennedy Assassination Record Review Board................. 623
Merit Systems Protection Board.................................... 629
Office of Government Ethics....................................... 659
Office of Personnel Management.................................... 699
Office of Inspector General, OPM.................................. 707
Office of Special Counsel......................................... 839
United States Tax Court........................................... 857
________
Printed for the use of the Committee on Appropriations
________
U.S. GOVERNMENT PRINTING OFFICE
40-802 O WASHINGTON : 1997
------------------------------------------------------------------------
For sale by the U.S. Government Printing Office
Superintendent of Documents, Congressional Sales Office,
Washington, DC 20402
COMMITTEE ON APPROPRIATIONS
BOB LIVINGSTON, Louisiana, Chairman
JOSEPH M. McDADE, Pennsylvania DAVID R. OBEY, Wisconsin
C. W. BILL YOUNG, Florida SIDNEY R. YATES, Illinois
RALPH REGULA, Ohio LOUIS STOKES, Ohio
JERRY LEWIS, California JOHN P. MURTHA, Pennsylvania
JOHN EDWARD PORTER, Illinois NORMAN D. DICKS, Washington
HAROLD ROGERS, Kentucky MARTIN OLAV SABO, Minnesota
JOE SKEEN, New Mexico JULIAN C. DIXON, California
FRANK R. WOLF, Virginia VIC FAZIO, California
TOM DeLAY, Texas W. G. (BILL) HEFNER, North Carolina
JIM KOLBE, Arizona STENY H. HOYER, Maryland
RON PACKARD, California ALAN B. MOLLOHAN, West Virginia
SONNY CALLAHAN, Alabama MARCY KAPTUR, Ohio
JAMES T. WALSH, New York DAVID E. SKAGGS, Colorado
CHARLES H. TAYLOR, North Carolina NANCY PELOSI, California
DAVID L. HOBSON, Ohio PETER J. VISCLOSKY, Indiana
ERNEST J. ISTOOK, Jr., Oklahoma THOMAS M. FOGLIETTA, Pennsylvania
HENRY BONILLA, Texas ESTEBAN EDWARD TORRES, California
JOE KNOLLENBERG, Michigan NITA M. LOWEY, New York
DAN MILLER, Florida JOSE E. SERRANO, New York
JAY DICKEY, Arkansas ROSA L. DeLAURO, Connecticut
JACK KINGSTON, Georgia JAMES P. MORAN, Virginia
MIKE PARKER, Mississippi JOHN W. OLVER, Massachusetts
RODNEY P. FRELINGHUYSEN, New Jersey ED PASTOR, Arizona
ROGER F. WICKER, Mississippi CARRIE P. MEEK, Florida
MICHAEL P. FORBES, New York DAVID E. PRICE, North Carolina
GEORGE R. NETHERCUTT, Jr., Washington CHET EDWARDS, Texas
MARK W. NEUMANN, Wisconsin
RANDY ``DUKE'' CUNNINGHAM, California
TODD TIAHRT, Kansas
ZACH WAMP, Tennessee
TOM LATHAM, Iowa
ANNE M. NORTHUP, Kentucky
ROBERT B. ADERHOLT, Alabama
James W. Dyer, Clerk and Staff Director
TREASURY, POSTAL SERVICE, AND GENERAL
GOVERNMENT APPROPRIATIONS FOR 1998
----------
Thursday, March 13, 1997.
FEDERAL ELECTION COMMISSION
WITNESSES
JOHN WARREN McGARRY, CHAIRMAN
JOAN D. AIKENS, VICE CHAIRMAN
SCOTT E. THOMAS, COMMISSIONER
Summary Statement of Mr. Kolbe
Mr. Kolbe. The meeting of the subcommittee on Treasury,
Postal Service, and General Government will come to order, and
I am pleased especially to welcome the chairman of the full
committee. Mr. Chairman, you should move down here.
Mr. Livingston. Here is my sign. Just go where I am
designated? Thank you, Mr. Chairman.
Mr. Kolbe. As well as Mr. Hoyer, who is suffering a little
from the flu, I understand.
Mr. Hoyer. No, just a cold. The bad news is, I have a cold;
the good news is I think it is on the way out, not on the way
in.
Mr. Kolbe. And we are also pleased to welcome the Federal
Election Commission here this afternoon. As my colleagues know,
the FEC has both a fiscal year 1997 submitted supplemental
appropriations as well as their fiscal year 1998 budget
amendment--budget and budget amendment. So we have a lot of
stuff to talk about here: Budget, budget amendment, and
supplemental.
As I have reviewed the FEC requests that are pending before
us, I do have a number of concerns. First, the FEC's budget has
grown by an astounding 100 percent since fiscal year 1991,
staffing has grown by 43 percent.
Second, the FEC work loads have also had phenomenal
increases. The number of transactions entered into the FEC
disclosure database has more than doubled the 1988 to 1992
Presidential cycles--Presidential and congressional cycles, and
FEC is estimating 2 million transactions for the 1996 cycle.
Third, FEC continues to come before Congress requesting
additional staff to address their work load increases.
Fourth, it seems FEC continues to resist efforts to
modernize its operations. I know this committee has had several
serious concerns with FEC over the years, including efforts to
achieve full modernization. I have reviewed the plan for
modernization, and I must say I am pleased to see there is not
only a strategic plan but also some milestones and schedules
for implementation, and I commend the Commissioners here today
for their attention to this crucial project.
What concerns me is, the FEC's 1998 budget proposes to slip
automation, and in fact the question is a full $1.9 million
below the original plan. Certain projects, some of them crucial
to helping FEC respond in a timely fashion to complaints and
potential violations, are being slipped by several years, and
this doesn't strike me as a very prudent course of action.
So I look forward to hearing the testimony of FEC today.
Perhaps we can clear up some of these issues. Perhaps you can
sort out exactly what resources are needed and in what form for
FEC to fulfill their statutory obligations.
I now call on both of my colleagues for opening statements.
Mr. Hoyer.
Mr. Hoyer. I will yield to the chairman.
Summary Statement of Mr. Livingston
Mr. Livingston. Thank you for yielding. I have a few
comments, but if you would like--thank you.
Thank you, Mr. Chairman, and I would like to thank the
representatives of the Federal Election Commission for coming.
And let me say at the outset, I have made my views about the
FEC known over the years, and likewise the Commission makes its
views known either through the hearing process or publicly
through the press, and I think maybe there is room for
conciliation if we just don't banter about it too much in the
press.
Let me say that I want to applaud your comments. The fact
is that the Commission has grown by 100 percent since 1991, and
the requests that are before us are for substantial increases,
7.8 FTEs and $1.78 million as a supplemental request for 1997,
a reduced performance level request of $34.3 million and 313
FTEs for 1998. That is a $6.1 million increase, or a standard
performance level request of $37.5 million and 331 FTEs at a
$9.4 million increase.
You know, FEC has grown and it has acquired additional
responsibilities as time has gone on, there is no doubt about
that. But when we read in the paper that the Federal Election
Commission members have gone to a political convention or
another, I would like to know whether or not the taxpayer has
been sent the bill for that.
When we hear that there are cash awards for incentives, I
would like to know if the taxpayer is held accountable.
When we see that there is a request for tuition assistance
for employees of the Federal Election Commission, I would like
to know if the taxpayer is held accountable for that.
When we understand that there is progressing a very fine
plan for modernization but that it has not been fully
implemented and that there seems to be a general reluctance to
implement it, I guess we have to ask, well, why? As has been
suggested by some of us in Congress, it might be wise to put
term limits on Commission members. At least that ought to be an
issue that we ought to elevate for discussion, perhaps within
the appropriations process.
Salaries and benefits up 57 percent, cash awards up 191
percent, travel up 75 percent, Audit Division up 100 percent,
and you have the general feeling among candidates for office,
whether they are incumbents or not, that the FEC is a
burdensome bureaucracy that makes running for office
andparticipating in the electoral process both complex and dangerous,
that the FEC has spun out so many regulations and conducted so many
enforcement cases that are not necessarily followed through, that drag
on for several years, that honest people become criminals and serious
offenders are not adequately dealt with, that perhaps the FEC ought to
do a better job of prioritization of the cases and dwell less on
increased numbers of people but better utilization of those people and
of the technology available to it.
I have to recall that there have been numerous suggestions
for improvement, and one was, years ago, that the ex officio
members be booted out of the Commission deliberations or that
the ex officio members' vote not be voted on.
The Court of Appeals ended up handing down a decision
directly confirming that issue, that belief, and yet it was a
year afterwards, a year after that decision, that the FEC
finally moved to move the ex officio member out.
I remember when one former Member of the House, later
former Member of the Senate, lost his race for reelection to
the Senate and was involved in a contest before the Commission,
only to find that he was appointed by the then Majority Leader
of the Senate to sit on the Commission as an ex officio member
in some capacity while the Commission was entrusted with the
deliberation of his case.
It is issues of that nature that have not added to the
confidence that the FEC truly is motivated to deal with harsh
offenders and not just to complicate the lives of the average
Member of Congress, be it House or Senate.
There is currently ongoing a House investigation in
California. I have heard of no FEC presence there. It is a very
significant race. There is a race involving the Senate in
Louisiana. I have heard of no significant presence by the FEC
there. And I guess I am asking in general whether or not the
FEC is prepared to prioritize its efforts and to go after those
cases that really deserve inspection and stop picayunish
efforts to micromanage the lives of every candidate and/or
incumbent. That concerns me.
That is an adequate opening statement, Mr. Chairman, but I
do have other concerns which I am sure I will have a chance to
express.
Mr. Kolbe. Absolutely.
Mr. Hoyer.
Summary Statement of Mr. Hoyer
Mr. Hoyer. Thank you very much, Mr. Chairman.
I want to welcome Ms. Aikens and Chairman McGarry and Mr.
Scott, to the hearing.
Mr. Chairman, the chairman of the committee, Chairman
Livingston, has started on a very positive note. I don't mean
the litany of concerns he had, but at the outset I think he
expressed the fact that we need to work together on this to
make sure that the expectations of the Congress of the United
States as expressed in statute, and the expectations of the
American public that they will have elections that are fair are
met. We need to ensure that the campaign finance laws as they
exist are carried out appropriately, and money is neither
misused or misappropriated, and that the public has an
opportunity to know who, in fact, contributes to candidates or
parties so that they can make a determination as to the
relationship between those contributions and the proposing and
implementation and adoption of policy.
We have had this discussion, Mr. Chairman, through the
years. Mr. Livingston and I have served on the House Oversight
Committee together and on the Appropriations Committee
together, so we have had a lot of opportunity to discuss this
matter.
But I want to say, that it is important that we all work
together. Currently, there is very great public concern about
campaign financing, and although the present focus is on the
White House, it is clear from the actions yesterday in the
United States, what I predict will be the inevitable result
here in the House of Representatives, that the focus on
campaign financing will be very broad indeed, certainly
incorporate Members of Congress, as it should, and may go
broader than that.
The bottom line is, it is critically important, Mr.
Chairman, that we come to grips with the fact that if this
agency is to perform its duties properly, it needs to have the
resources to do so. If it is not utilizing those resources
properly, then it is this committee's duty and responsibility
to address that, and that is what I think Chairman Livingston
is talking about, and he is right to do that.
We can differ on whether they are doing that, but you
observe, Mr. Chairman, that while the budget has doubled, the
work load has more than doubled in that same time frame. As a
matter of fact, I think you indicated from 1992 to 1997 it had
doubled, but from 1988 to 1992 the work load had doubled.
So I presume, without having analyzed the figures myself,
the work load clearly has escalated beyond the rise in the
budget. We would expect that. We would expect to have the
computer and staff capacity to deal with an increase in work
load without having a concurrent equal increase in resources,
in the words of the Vice President, doing more with less. We
need to do that because we can't simply escalate.
The modernization process is critical. I think Chairman
Livingston's focus on that is correct. He and I have differed
somewhat on the success with which the FEC was pursuing that.
We will talk about that today.
But suffice it to say that in the present day, with
campaign finance being on the front page of every newspaper in
the United States, it is very important in a bipartisan sense,
from the perspective of having the public have faith in its
democracy and in the fairness of its elections, that this
Commission be able to operate effectively so that the public
can be confident that its information is accurate and timely.
And to the extent that we do deal from time to time with little
issues, they do waste our time.
Now, my own experience with the Commission, I will tell the
big chairman, as we call him, is that I haven't always been
happy with the FEC's determinations. However, I think they have
been right, even dealing with my own campaign, and for the most
part I think my campaign since 1981 has been treated fairly.
And we have messed up a couple of times, but that was our own
fault. We corrected it and paid the price for that and went on.
But the bigger picture is, even though it may annoy us from
time to time, that if the public doesn't have the faith that
they are getting correct information and we are playing by the
rules, we are all going to suffer. I think that is in the
interest of us all to make the case.
Mr. Kolbe. Thank you.
With those openings statement, I will turn to the
Commission.
Summary Statement of Mr. McGarry
Mr. McGarry. I will make the introductions for thebenefit
of the official record, Mr. Chairman.
Mr. Kolbe. And we note that the full testimony will be
placed in the record. If you would summarize it, we would
appreciate it, so we can get to the questions.
Mr. McGarry. Good afternoon, Chairman Kolbe, Mr. Hoyer, and
Chairman Livingston. For the benefit of the official record and
the audience, let me state that I am John Warren McGarry,
current Chairman of the Federal Election Commission.
I want to thank you and the other members of this committee
for the opportunity to present testimony on behalf of the
Federal Election Commission fiscal year 1998 budget request.
Today I am joined here at the witness table by Vice
Chairman Joan Aikens and Commissioner Scott Thomas. In her
capacity as chairman of the Commission's Finance Committee,
Vice Chairman Aikens will present our testimony this afternoon.
As always, we will all be available for questions after that
presentation.
I would only make one 30-second comment, and that is that
as of January 31, this year, the Federal Election Commission
had 366 cases. Between May 1 and November 30 in this election,
214 external complaints were filed with the Commission. These
have to be in writing and under oath and state a prima facie
violation. This 214 number does not include referrals from
other agencies or referrals from our Reports Analysis Division
from the desk audits they do on the reports they file. These
are external complaints.
So I only point that out to begin, and I know that Vice
Chairman Aikens is going to give the testimony, but I think it
is critically important to put that on the table right off, and
I thank you very much.
Vice Chairman Aikens.
Ms. Aikens. Mr. Chairman.
Mr. Kolbe. Would you put the microphone over there.
Summary Statement of Ms. Aikens
Ms. Aikens. Thank you. Mr. Chairman, Mr. Big Chairman, Mr.
Hoyer, Mr. Aderholt, as chairman of the Finance Committee, I am
here today to speak in support of the Federal Election
Commission's fiscal year 1998 budget request.
Before I begin, I would like to say that some of the
figures I will give to you have been updated since our full
testimony was submitted. I don't need to tell anyone in this
room, the 1996 election period saw unprecedented amounts of
financial activity, and in our submitted testimony we have a
chart on page 16 that shows from 1976 to 1996 the increase in
the total disbursements in Federal elections.
The sheer volume of activity in violation of the FECA has
forced us to reevaluate our fiscal year 1998 budget request.
Therefore, I will present today a two-part request; first
justifying and explaining our original 1998 request which has
been approved by OMB. I will then speak to the need to augment
this request with a special multiyear discrete project budget
which we believe is necessary to address the extraordinary
issues raised in this election cycle.
Our fiscal year 1998 budget request is for $29.3 million
and 313.5 full-time equivalents. In agreeing to that figure, we
took into account the 1995 rescission, the two successive years
of cutbacks imposed by OMB and the Congress; we also considered
the request for a balanced budget by both the President and the
Congress. We do, however, believe that this $29.3 million
figure is a floor level below which we cannot responsibly go
and maintain our current level of activity.
I would point out that this budget was formulated before we
became aware of the controversies that arose in the 1996
elections and are still apparently arising. This floor level of
funding, we believe, will cover projected increases in staff
salaries, rent, and other overhead expenses, and an increase of
six staff positions, which we believe are necessary to sustain
our performance.
In our core disclosure programs, our performance is
exceeding our projections. We expect to meet the statutory
deadlines on indexing and making available to the public nearly
85,000 reports. Updated figures show that to date we have
captured 1.9 million transactions within 30 days of receipt, 47
percent faster than our last cycle. And I have a chart on page
15 in our testimony that does show the transactions.
I would also like to submit for the record a page from the
March 1997 internal newsletter that the Commission puts out,
The Slate, and we have copies for the record, if you do not
have them yet. But this is a description of what Data Systems
goes through to make sure that all of the information is
correctly placed on the public record within the allotted time
frame.
We have improved our technology by employing digital
imaging rather than microfilm. We have on-line computer access
to our database now available over the Internet, and our Web
site, www.fec.gov, began February 14 last year and, as of our
first anniversary date, has been accessed over 2 million times.
We are moving forward on our computer systems development,
though not as rapidly as in the original 5-year plan. Under
Public Law 104-79, the voluntary electronic filing program is
operational.
The audit field work of the Presidential public financing
programs is on track. About $235 million was dispersed to the 2
nominating conventions, the 11 primary candidates, and the 3
general election candidates. Our auditors are confident they
will meet the 2-year filing deadline for releasing final audit
reports for these candidates.
Disclosure reports for all other candidates and committees
are given desk audits by our analysts. These desk audits
provide for voluntary compliance to those committees that
respond to the analyst's questions in a timely fashion.
There are over 8,000 reporting committees now. Large
committees, in the category of Senate committees at $500,000
and other committees over $250,000, have more than doubled
since 1982, from 568 to 1,319 to date. Because of this
increase, we have been forced to raise the tolerance thresholds
in our review procedures.
Our enforcement and litigation staff continue to be
strained, despite the implementation of a similar threshold
process, the enforcement priority system. At the end of last
month, we had 365 matters in our docket. Because of reductions
in our general counsel's enforcement staff, we currently have
only 104 cases activated, whereas in 1995 we had over 160. This
lower level of funding will add only 2.7 FTE to the General
Counsel's Office, but at a time when the case load is growing
and many of the investigations currently underway are too
important to dismiss yet too complex for one or two staff to
handle.
For example, in calendar year 1996 there were 312complaints
on the docket, 240 related in part or entirely to 1996 election cycle
activity. However, we are still requesting this floor budget for your
consideration and urge that, given our current normal work load, this
not be reduced.
Now let me address the proposal we are requesting for
funding for the extraordinary problems that arose in the 1996
elections. For this discrete project, we are requesting a 1997
supplemental of $1.7 million and 7.8 full time equivalents, and
a fiscal year 1998 amendment of $4.9 million and 47 full-time
equivalents.
As has been reported in the media, the cases that arose
during the 1996 elections present serious potential violations,
complex factual matters, and contentious legal and
constitutional issues that involve millions of dollars and
thousands of financial transactions requiring detailed review.
The alleged abuses involved fundraising from nonresident
foreign nationals, as well as foreign governments, the use of
soft money possibly circumventing the current spending limits
on behalf of a publicly funded Presidential candidate,
coordination in assertedly independent expenditures, and
massive, but undisclosed, expenditures on issue advertisements
by labor and business interests that may have had an
electioneering message. Investigations of just these potential
abuses will take staff and resources well above our floor level
budget request.
The figures we are proposing in the supplemental request
and the amendment are based on a projected worst case scenario,
and the table on page 13 in the testimony details by object
class the expenditures that are involved.
As everyone has read about the potential abuses, we have
also all been made aware of the discussions and disagreements
concerning jurisdiction. The Commission recognizes that there
is substantial jurisdictional overlap by the various entities
which are proposing or have already initiated investigations.
The Justice Department has clear jurisdiction over the
potential criminal violations, and we already have an ongoing
relationship with the Department in a long-standing memo of
understanding concerning a unified and coordinated approach to
criminal matters that involve election law violations. So the
stage has been set for cooperation, and we have already met
with Justice to brief them on the Federal Election Campaign
Act.
But, Mr. Chairman and members of the committee, the
Commission was created 22 years ago to be the single
independent agency to administer and enforce the campaign laws.
We are the only entity with civil jurisdiction to enforce the
FECA. We admit to having administrative problems in the past
with timely enforcement. However, we feel our effectiveness has
been seriously hampered over the past several years by
inadequate resources. We are asking now for sufficient funds to
investigate these potential violations to determine just how
extensive they are.
We firmly believe that with adequate funding provided
relatively quickly, we can begin to hire additional staff of
both auditors and attorneys and we can then prove to the
Congress and the public that we are able to do the job for
which we were created.
I would stress to this committee that this is not intended
to be a permanent increase in our budget or staffing levels. It
will, rather, be applied to a discrete unit that will instead
be able to move the investigations on a fast track.
The General Counsel has already planned a structure that
will allow us to discover the extent of the violations, if any,
in the shortest possible time and to reach settlement on the
issues involved. We realize the seriousness of the allegations
and want to address them as expeditiously as possible. However,
we are reluctant to begin major investigations of these issues
if we are not going to have the resources to complete them in a
timely matter, as should be expected.
I would ask your indulgence for one more minute in order to
say a word in praise of the Commission's dedicated and loyal
staff. They are totally committed to administering and
enforcing the FECA in a fair and impartial manner to ensure
that accurate and complete information is available to the
public. Budget cuts every year, the need to cut or not hire
personnel, and the ever-increasing amount of data being
reported can be really devastating to morale. However, our
staff is constantly looking for ways to increase productivity
to get the job done. I just want to be sure that the staff gets
credit where credit is due.
In conclusion, our original budget request will, we
believe, allow us to perform our responsibilities at our
current level. The amendment will give us the necessary
resources to undertake only those major issues that arose in
1996. Those resources that are not required will be lapsed or
reprogrammed.
We thank you, Mr. Chairman. We appreciate the forbearance
of the committee in listening to a necessarily complex
authorization request. This concludes our prepared testimony,
but we would be happy to answer any of the questions you may
have at this time.
[Prepared statement of Joan D. Aikens follows:]
[Pages 9 - 26--The official Committee record contains additional material here.]
budget submission level
Mr. Kolbe. Thank you very much, Madam Vice Chairman.
Let me begin, if I might, with just a couple of questions
on the budget submission. Now, we have in front of us
documents, all kinds of documents here. We have the original
request, the concurrent request that was submitted through OMB,
we have the revised request.
First of all, can you just for the record tell me which
budget you want us to be considering here today, the original
request or the revised request? Can we dismiss, set aside, the
original request and look at the revised budget request?
Ms. Aikens. Well, the amendment to the original request is
just for the funds, the resources to look into the potential
1996 election violations. So we are asking for your
consideration of our original request of $29.3 million, plus an
amendment that asks for $4.9 million.
[Clerk's note.--The witness later clarified this to read:
``The amended budget request dated February 13, 1997, is what
we are seeking; it includes the resources to look into the 1996
potential election violations. We are asking for your
consideration of $29.3 million, which is our original request
plus an added $4.9 million for potential 1996 violations.'']
Mr. Kolbe. Based on the testimony you just gave, you said
that--so, just to clarify that, what we are really looking at
is the original request plus the supplemental--not the
supplemental, plus the amendment.
Ms. Aikens. That is right.
[Clerk's note.--The witness later clarified this to read:
``No. The amended budget request for 1998 represents our
original request for $29.3 million plus $4.9 million for
potential 1996 violations.'']
Mr. Kolbe. So that is now your base budget request; the two
of them placed together is your budget request.
Ms. Aikens. Yes.
Mr. Kolbe. You just said this was not a permanent increase,
that you have these on a fast track for asettlement and
resolution. Does that mean we can expect to see a reduction in the
request for next year?
Ms. Aikens. Probably not next year. It is probably a 2-
year.
Mr. Kolbe. Why do you say 2-year?
Ms. Aikens. Well, some of these matters are----
Mr. Kolbe. Is that because of the length of time it takes
to resolve the case?
Ms. Aikens. It involves a lot of investigation,
depositions; there may be delays in the enforcement process
through subpoena requests; and I am not sure that we could
finish them in fiscal year 1998.
Mr. Kolbe. On your budgets----
Ms. Aikens. We would try, however.
Mr. Kolbe. Well, I appreciate that. I think that is
realistic. I don't think we should assume that you would finish
them if we give them to you in a 1-year time frame. I just
wanted to be clear, because you did say this was not a
permanent increase and you would not be asking us for this in
the future, so I wanted to be clear we are looking at least 2
years of this additional funding, if not longer.
You consistently give us budget requests that compare the
actual budget to what was requested, not what was provided. In
other words, your request for this year is a comparison to what
you requested last year, not what the Congress gave you.
And I don't know of any other agency that does it that way,
where they, instead of saying here is our budget request, this
is what we had last year, this is our budget request for this
year, you are comparing it to something that was a dream in the
sense of, this was our ideal of what we wanted. You compare it
to that rather than compare it to the actual.
Could we just get you to give us a budget request that
compared, like every other agency, your budget request with
what you actually had appropriated last year?
Ms. Aikens. I think that is what we did.
[Clerk's note.--The witness later clarified this to read:
``Our request is based on actual numbers.'']
Mr. Kolbe. I don't think so. I think it is done on the
basis of what you had. You go back to compare it to your
request for last year. I think we can show you that, because
you refer to the request of last year.
Ms. Aikens. Mr. Kolbe, because----
Mr. Kolbe. Yes. Your comment in your opening statement is a
request--was determined, in other words, by the Rescission Act
of fiscal year 1995 and 2 successive years in which our
requests were rolled back by the Office of Management and
Budget. That is not what we are looking at. We are not--we are
looking at what you actually ended up getting and comparing it
now to what you are asking for this time.
Ms. Aikens. That is more of an explanation of why we are
asking for the resources, because we have not in the past been
able to hire up to the full level of every--of the resources
that we had requested. We have submitted three different
levels. Because the Congress has been asking us, why do you
submit all these levels of budget? The Congress often asks, if
you receive this amount of money, what can you do with it?
So we have been trying to make those comparisons. If we
receive the standard level, this is what we could accomplish.
Those have been the questions that have come in the past, and
we would be happy to change our budget submission not to have
to do that.
budget submission level
Mr. Kolbe. Well, I would just ask that you work with the
staff in this coming year to make sure that we have a--since it
is a concurrent budget submission, that we have a budget
request that gives us the documentation that we need in an
immediately useful fashion. I think maybe these are differences
that can be worked out if you work with the staff during this
coming year.
Ms. Aikens. I think our fiscal year 1998 budget was
compared to the actual budget appropriation we received in
1997.
Mr. Kolbe. Well, maybe I was putting too much reliance on
the statement you made in your opening statement, but I would
still ask if you would please just work with our staff to get
the documentation in a form, because it seems like it comes to
us in a very confusing manner with the supplemental request,
the amendment and so forth, and I think we can work out some of
this thing.
Ms. Aikens. We understand this year, because of the
supplemental request, it was confusing. It was very confusing
to me, too.
[Clerk's note.--The witness later added: ``We will work
with your staff.'']
fy 1995 rescission
Mr. Kolbe. I would also just note I really think three
budget cycles later is a little long to be complaining about a
rescission in 1995. A lot of other agencies have dealt with
rescission, and life goes on, and we have moved on from there.
And I think to keep going back and complaining about a
rescission in 1995 seems a little far back to me.
Ms. Aikens. We will remove the word from our vocabulary.
Mr. McGarry. Mr. Kolbe, I wonder if a brief explanation--
$29.3 million is the floor, and incidentally that is pretty
much in line with what it was last year. Below that, we just
cannot function and do the things we are virtually mandated,
and required to do under the law. The added $1.7 million in the
supplement and the $4.9 million with the increases of the FTE,
is a very discrete package which deals with the problems that
arose out of the 1996 election.
The issues--the categories we can't discuss with you
because of the confidentiality clause and the names and people
involved: But the issues are very clear, and they are in the
media day in and day out. Issue advocacy, expressed advocacy,
coordination, independent expenditures, soft money. Soft money
increased in this election 171 percent over the last
presidential election, and that is the--these are the all
discrete matters that this added money is being sought for. If
we don't get that, we can't deal with these matters that are
very active in our lives.
earmark of amended request
Mr. Kolbe. Mr. Chairman, would you have any objection,
since you say this amendment is for the 1996 budget cycle, if
it was mentioned or stated that it is to be used solely for
that purpose?
Mr. McGarry. Yes. [Clerk's note.-- The witness later
changed this to ``no''.] I think it is very clear that added
money of $1.7 million for the supplement, is a supplement to
the current fiscal year. These things are active right now, and
these arise out of the 1996 election.
As I indicated in the brief comment I made, we had 214
external complaints filed from May 1 to November 30th. We have
exclusive civil jurisdiction, and 95 percent of these matters
are under the civil law. Even the criminal law, where the
Justice Department and other agencies, Justice in particular,
will be prosecuting criminally, they will be sending the case
back for the civil disposition, because we are the only agency
that has the jurisdiction civilly.
So we will be virtually--I believe most people would agree
that just about all of what you are reading about in the paper
in dealing with these issues are FECA-related and under our
exclusive jurisdiction, but it is a very discrete package, the
add-on money. If we don't get that money, we cannot deal with
these cases.
Mr. Kolbe. Okay. I would like to try--I have gone past 5
minutes. I would like to stick to the time as closely as
possible, because we are going to have two votes here shortly.
Mr. Hoyer.
floor funding level
Mr. Hoyer. Thank you very much, Mr. Chairman.
When you say the floor budget, if we go below the floor,
which is the 29.3, what will you not do?
Ms. Aikens. Well, we probably will not get to as many of
the enforcement matters arising out of the 1996 elections as we
would like to.
Mr. Hoyer. Can you quantify that? For instance, in million-
dollar or half-million-dollar increments, how many cases are
you unable to handle at that point in time?
Ms. Aikens. That is very difficult to say specifically how
many cases we could handle, because we don't know how
complicated they are, we don't know how extensive the
investigation would have to be, and there are other areas of
the Commission where we would suffer as well as the General
Counsel's Office.
The Reports Analysis Division, if we are cut back, may get
behind in some of their reviews, and desk audits. We would hope
that the modernization would not suffer any more than it has.
But I don't think we could say specifically exactly where we
would cut until we had an idea how much we had to cut.
Mr. Thomas. If I could add, Mr. Hoyer, any time we face a
cut from what we have requested, we do have to try to decide
which part of our operations will suffer.
I just would note with regard to the enforcement program,
we are already at a point where we have reduced the capability
to handle and have active cases on the docket to the point
where only about 30 percent of our pending cases can be
activated. It used to be well above half of our pending docket
we could maintain in terms of active cases. So we are
experiencing already a fairly dramatic reduction in the
enforcement capability as a result of our having reduced just
the enforcement resources.
But I would say we are strained in other divisions. Our
Reports Analysis Division right now is struggling to keep up
with the review of the reports. We have a backlog of 24,000
unreviewed reports. Our people are working as quickly as can be
expected, but we are falling behind.
So if you reduce us below the $29.3 million, you are going
to see more backlogs. You are going to see even fewer of our
enforcement cases put on the backlog docket, [Clerk's note.--
The witness later changed this to read ``active docket''.] and
that means more are dismissed without any Commission action. So
we would urge you to take that into account and recognize that
we have to have at least a $29.3 million to have even minimally
credible enforcement and disclosure programs.
Thank you.
Mr. Hoyer. Thank you.
Now, as I understand it, $34.2 million is the figure that
you determine is necessary to do the job that you think
confronts you, is that correct?
Ms. Aikens. Yes.
Mr. Hoyer. That is a $5 million or $4.8 million difference.
amendment request
Ms. Aikens. That $4.9 million is for the discrete units,
for the problems in the 1996 elections.
Mr. McGarry. If I might just--on those issues, the 1996
election problems, alleged violations which seem very real, the
blockbuster issue of all is foreign nationals and money in the
name of another is in those categories, in that discrete
package. That if we don't get the money, we really can't get
into them. Many of those are active right now.
Mr. Hoyer. And under the statute, you perceive that to be
your responsibility.
Mr. McGarry. Absolutely. We have exclusive jurisdiction
civilly. And even if there is a criminal prosecution, it has to
be referred to the Federal Election Commission for the
disposition, which is done routinely by the Justice Department.
They have sent ones, they will do a criminal investigation,
find the evidence, get indictments and a conviction; and then
they will send it along for the civil disposition.
We will be dealing with all of them, and those criminals
are a very small part of it, ninety-five percent or more you
are talking about.
And the soft money, people say, well, soft money is beyond
the Federal Election Campaign Act. Not necessarily. If
solicitation of the soft money is done by a Federal candidate
on behalf of a Federal race, then that is a violation of our
law. You cannot solicit money that will not be--unless it is
for the Federal election, and the soft money would be a
violation of that.
That is what is happening in many cases, we all know. The
money is solicited by Federal candidates; but the people are
asked to make the check out, for example, to a State party
committee; and it goes into a nonFederal account. And the
belief is that it is massively beneficial to the Federal
candidates that are soliciting this money.
These are the allegations, and they are very real.
Mr. Hoyer. Given those allegations, you say you have
exclusive jurisdiction.
Mr. McGarry. Yes, civilly.
Mr. Hoyer. Exclusive civil jurisdiction, but not the
criminal.
Mr. McGarry. If it gets to the point of criminality, we
refer it to the Justice Department.
Mr. Hoyer. We have a vote on, so let me yield to the
Chairman.
Mr. Kolbe. Thank you. Mr. Chairman.
Mr. Livingston. I thank my friend from Maryland, and I will
be very brief.
I dare say, if soft money has gone up by 171 percent, if
the FEC stationed a person in the Lincoln Bedroom, it mighttake
care of that.
Mr. Hoyer. I want to reclaim my time.
ogc staffing
Mr. Livingston. I hear your plea for more resources and
certainly you make a case in this last series of questions from
Mr. Hoyer, but Congress provided the FEC enough funds to
support 93 FTEs in the Office of General Counsel some time ago
and yet, to date, they have only--according to my figures, they
have only 86 FTEs. So you haven't utilized the capacity that we
granted you, if that is correct.
Let me just run through these items, and then I will ask
you to respond for the record, because it looks like we are
running short of time.
workload
Secondly, the 1995 rescission that we hear about
periodically is--had an impact, as Chairman Kolbe pointed out,
had an impact on a lot of agencies and departments, but they
have gotten over it. But yet, since then, the FEC has processed
94 percent of all the documents and transactions submitted
during the 1996 election cycle, as compared to only 87 percent
during the 1994 election cycle, and also the Office of General
Counsel actually has gone up by 13 percent. So, again, it is
hard to really appreciate that there has been so much
devastation by these cuts.
Thirdly, I am not sure that the backlog is entirely due to
a lack of resources but rather the lack of utility of existing
resources and the failure to modernize. I am recalled that the
Bush administration investigation by the Federal Election
Commission took 8 years, yet the Bush administration only took
4 years. And that leads me to the conclusion that General
Motors is audited in 6 months. Why is it that presidential
campaigns take so much time?
Now, I will answer my own question, to some degree, on
that. Because they encompass 50 separate States and 50 separate
rules. And I would cosponsor immediately a statute or a bill to
provide uniformity throughout the country so that you can
eliminate a lot of the money or attorneys and accountants which
complicate the process, and I grant that that is probably one
of the principal reasons for your difficulty.
But, finally, I would make the point that last year was a
presidential and a congressional election year. Filings were up
astronomically, as your chart showed, Ms. Aikens. This year, it
is not; and filings are down precipitously from last year.
So it would seem that if you managed to increase your
handle of last year's caseload that you be all the more
prepared to handle within existing resources this year, since
there are fewer filings.
It is a lot of subjects to cover, but I will throw it to
you.
Ms. Aikens. Well, Mr. Chairman, on your last point, there
is quite a difference between the divisions in the Commission.
When you are talking about the chart showing the increased
transactions that are entered, those are our Disclosure
Divisions and our Data Systems Division. They are almost up to
speed, and they have been helped considerably by the
computerization modernization. They have been helped by the
digital imaging. And all of our disclosure divisions are
basically--have increased productivity over the years, in spite
of the fact that some of them have been cut by staff.
It is in the enforcement area in the General Counsel's
Office that we are having the most difficulty keeping things
timely.
You talked about the Bush audit. The Bush audit itself was
finished within 3 years of the election, but some of the
matters in the audit were referred to the Office of General
Counsel, and that is what has been taking so long.
So it is--our enforcement, our disclosure divisions are on
target for the internal deadlines that we have set, and they
have stayed basically up to speed, in spite of the decreases in
the resources. And we are trying, through the enforcement
priority system and other improvements in the operation of the
General Counsel's Office, to increase their productivity there.
One of the items in the supplemental and in the $4.9
million amendment will be for a case management system which we
have this year implemented in the Office of General Counsel in
litigation for one case. We have contracted with the Department
of Justice for a management system, including services,
hardware and software, to manage one massive case; and it is
mainly document handling. But we are hoping to get experience
from that. And if we get the supplemental, we will begin a case
management system for just this discrete unit, the $5 million,
$4.9 million personnel and resources that we are going to use
to undertake the investigation into these allegations.
cash awards/tuition assistance
Mr. Livingston. Okay. I would raise a few other issues; and
the last issue I would raise, I don't know how much money is
involved, but in terms of cash awards, tuition assistance and
press office, those are expenditures that we might trim down
on.
Ms. Aikens. Well, I could tell you that this year, fiscal
year 1997 through January, we have spent $617 on tuition,
training expenses.
Mr. Kolbe. My other questions, would you submit those for
the record?
Mr. Livingston. I would.
Mr. Livingston [presiding]. We have a vote, two votes. We
would ask your indulgence because we have more questions. I
have questions when we return from the votes.
[Recess.]
Mr. Kolbe [presiding]. The subcommittee will resume its
deliberations here.
Mr. Livingston had finished asking some questions, and I
have a few others that I would like to ask. We will submit some
for the record.
enforcement statistics
Mr. Kolbe. Let me--I want to ask a few questions about the
Office of General Counsel and the number of enforcement cases
that we have.
Your year end--1996 end of year management reports shows
you closed out 249 cases during the fiscal year. Relate that
number to me against the total number of enforcement cases that
were under review during the year. Or can you do that?
Ms. Aikens. Well, we have on the docket about 361
currently. In a year, in this past year, we picked up 312 and
closed 100--we had, as of January 1st, 1996, we had 251 cases
pending. During 1996, we opened 314 and closed 204, so as of
12/31/96, we had 361 pending. 104 of those are active.
Mr. Kolbe. Okay. 104 active right now.
Ms. Aikens. Currently, yes, today.
Mr. Kolbe. Because your report says 112 as of December
31st. So you have closed a few.
Ms. Aikens. Yes, we have closed a few since that time.
Mr. Kolbe. Eight in 2 months. Is that normal?
Ms. Aikens. Well, we have closed a few more than that.
Mr. Kolbe. Well, you had 112 on December 31st; and you have
104 now, active.
Ms. Aikens. Yes.
Mr. Kolbe. The testimony you submitted for your 1997
supplemental says you activated 160 in 1995, and that reduced
resources has kept the number of activated cases down. But, to
understand that, we need to know, as a percent of total
enforcement cases, how many cases were activated. Of all the
cases referred in 1995, did you activate a third, 25 percent,
50 percent? And how does that compare to what you did before
that?
Because it really isn't the number of cases that are
submitted that makes a difference. It is the number of
occasions you are able to activate and close that makes the
difference.
Ms. Aikens. Correct. Go ahead.
Mr. Thomas. If I could, Mr. Chairman, it is touching on the
response I was giving to Mr. Hoyer.
We can certainly give you the precise numbers; but since
fiscal 1995, when we had more resources available for our
Office of General Counsel, the percentage of cases that we have
been able to put on our active docket has decreased
significantly.
As I mentioned, at one point in the 1995 era, we were able
to have more than half of our docket in the active stage. Now,
because we have reduced staffing in the Counsel's office, to be
blunt, it has caused us to reduce the percentage down to about
30 percent active.
But we can give you the precise figures. There has been a
difference from the 1995 era to where we are now.
Ms. Aikens. It is really difficult, Mr. Kolbe, to just look
at the figures. Because a lot of it depends on the complexity
of the matters that we are looking at, the number of
respondents in the complaint and the length of time it takes to
do the investigation, the complexity of the real issues
involved, so that the mere numbers of cases activated and cases
closed don't tell the whole story. So some matters can be
closed very quickly because there are no complex legal issues
in them, and that brings the record--puts the record in better
perspective, but then some cases are very difficult to bring to
a conclusion.
Mr. Kolbe. You actually showed a reduction from 1995 to
1996 in the General Counsel's Office from 104 to 95, yet the
rescission didn't tell you where to take the money from, which
office.
Ms. Aikens. We didn't take it all from the General
Counsel's Office.
Mr. Kolbe. Well, apparently, you took a good chunk of it
out of there.
Ms. Aikens. Part of that was because there was a freeze on
hiring, and some of those people left, and we weren't able to
replace them.
Mr. Kolbe. Is that true today?
Ms. Aikens. We have 90 on staff today.
Mr. Kolbe. Ninety.
Ms. Aikens. In the Counsel's office.
enforcement statistics
Mr. Kolbe. And in your budget you have resources for 93.
Ms. Aikens. Yes.
Mr. Kolbe. Is that part of the general attrition rate,
vacancies and it takes time to replace people?
Ms. Aikens. It takes time to replace people.
Mr. Kolbe. So with the resources for 93, you are not going
to have more than 90. Is that what you are saying?
Ms. Aikens. No.
Mr. Kolbe. In other words, it is not reasonable to expect
you will ever have more than 90.
Ms. Aikens. No, by the end of fiscal year 1997 we will
probably be over 93, because we have been without several
months now, so we can add extra staff.
Mr. Kolbe. So you can add extra--that was going to be my
next question. If you can't--for attrition purposes you can't
get up to 93, why not take the money you have there and put
some of that in the--what you are asking for the supplemental
and put that into the modernization? Can you tell me--and then
I want to go to Mr. Aderholt--what are your estimates for the
total number of activated cases you are going to have in this
year, fiscal 1997? Do you have a number for the actual cases
you will be able to have?
Mr. Thomas. I am not sure we have a specific estimate. As
we noted, we are right now at only 104 active out of the 360 or
so.
Mr. Kolbe. Well that is 104. That is a snapshot of today.
That doesn't mean that over the course of a year you are going
to have activated only 104 cases.
Mr. Thomas. Oh, yes. In terms of the number of cases we can
bring into active status, we can give you a precise number.
Mr. Kolbe. Well, you can't give a precise number, because I
am asking for an estimate.
Mr. Thomas. Right. But we can show you what happened last
fiscal year and what happened so far this year and give you an
estimate.
Mr. Kolbe. Well, how many more cases do you believe you
would be able to activate if you had the supplemental? That is
what I am driving at.
Mr. Thomas. Right. We can estimate that for you.
As you know, with this supplemental, what we are trying to
concentrate on is some of the big, complicated cases. It may be
slightly difficult to estimate, because some of the cases we
are asking for in the supplemental are going to be so big and
complex they may not equate with the smaller cases.
Mr. Kolbe. And we understand that. Without the
supplemental, those big cases do not get activated at all. You
will continue to activate the small ones and leave the big ones
in an unactivated status.
Mr. Thomas. The chances are we would. If we don't get the
supplemental, we would do the best we could to activate some of
those big cases, to prioritize, do exactly what Chairman
Livingston was asking us to do. But the reality is some of
those are big, complicated cases; and we might have to drop
cases that particular Members of Congress might find to be
significant.
We still have lots of cases that deal with such issues as
laundering contributions from sources, and failure to disclose
huge amounts of funding. We were dealing with some cases the
other day which totaled up to millions of dollars of
undisclosed debt. So there are lots of cases like that that
seem relatively small, but they are still important, and we
would hate to see them dropped.
Mr. Kolbe. Well, if big case translates to important case,
your priorities would say some of the smaller cases aren't
going to get heard, but we are going to put our resources on
the big cases.
Ms. Aikens. The cases from the 1996 elections, there are
already complaints filed on about 30 cases. The rest of the
cases that are on the docket are what the base level budget
resources are going to be put to. Those 30 cases are what the
discrete unit resources are going to be put to with the
supplemental.
Mr. Kolbe. Have any of those 30 cases been activated so
far, of the 1996?
Ms. Aikens. Yes, some of them have.
Mr. Kolbe. Some. Can you tell me how many pending from 1996
have been placed in the active status?
Ms. Aikens. About 10, I think.
Mr. Kolbe. If you might provide for the record, rather than
say about, provide what the number would be.
Ms. Aikens. Sure.
[Clerk's note.--The witness later clarified this to read:
``As of today, March 13, there are 16 active `task force'
cases.'']
litigation status
Mr. Aderholt. Good afternoon, Ms. Aikens and Mr. McGarry
and Mr. Thomas.
I am familiar with your request for funding and
understanding you are not only seeking substantial increase for
fiscal year 1998 but also an additional amount as a supplement
for fiscal year 1997. Of course, this is a large increase in
funding; and you certainly have laid out your case for why this
increase is necessary. Of course, this subcommittee does have
oversight responsibility for that FEC; and before we
appropriate an increase in funds I think we should examine how
the funds appropriated in the past were utilized.
On July the 30th of this past year, of course, which was an
election year, the FEC filed a lawsuit in the U.S. District
Court in the District of Columbia against the Christian
Coalition. The charges were that the Christian Coalition
engaged in expressed advocacy through their voter guides.
At the same time, the FEC did not target other groups that
tended to support Democrat candidates and which have had
similar voter guides and engaged in identical activities. If
anything, there were some other groups that could be argued
went further than the Christian Coalition.
I think the effect of singling out one group that happened
to be socially conservative in a sea of more socially liberal
groups engaged in the same activity had a very chilling effect.
Of course, I not suggesting that that was the FEC's intent,
although conclusions by some people could be drawn in that
circumstance.
I understand there were pastors of churches who were
threatened with lawsuits as a result of the FEC lawsuit. The
actions of the FEC had the appearance of using taxpayers' funds
to influence the outcome of an election; and, if anything, that
undermines my faith in the Nation's political process.
Could you talk about that and what the current status
involving the Christian Coalition is at this time?
Ms. Aikens. Yes, Mr. Aderholt. The Christian Coalition case
was originally brought in 1992; it is a 1992 complaint. So it
has been 4 years to bring it to litigation.
The other groups you are talking about, to the best of my
knowledge, were 1994 and 1996 activity, and we are hopeful--we
are asking for this supplemental and the amendment so that,
hopefully, it will not take us 4 years to bring some of these
cases to fruition. We are currently in court with the Christian
Coalition. The case has not been resolved yet.
Mr. Thomas. Mr. Aderholt, also I would just hope that you
would go away with this feeling that we are balanced in our
approach. Over the years, we have brought lawsuits against
organizations that, I guess you could say, are on the other
side of the political spectrum. We were in litigation with an
organization called the Survival Education Fund on this precise
issue. We were in a lawsuit with the National Organization for
Women over this precise issue, we were in a lawsuit with the
American--AFSCME union over this issue years ago.
So if you look at the issue, we hope you will go back and
look at the history of the Commission. We have, on this precise
legal issue, express advocacy, pressed other groups in courts
as well.
express advocacy issue
Mr. Aderholt. Are there any current cases that are in the
pipeline right now that involve this whole issue of expressed
advocacy?
Ms. Aikens. Many. And it is very difficult. It is a very
difficult issue for the Commission to clearly define. Express
advocacy has taken us to court many times.
Mr. McGarry. The main thing, Mr. Aderholt, is that issue
advocacy, there has been a lot of talk in the media from time
to time that the Federal Election Commission is blocking
something and they are involved in issue advocacy, blocking
literature, dealing with nothing but issues going into
churches, so on and so forth. The courts and the Federal
Election Commission unanimously and solidly uphold and defend
pure issue advocacy. That is protected under the First
Amendment to the Constitution. And the problems arise out of
that issue where they are either disguised as issue advocacy
and it is really candidate advocacy, and the complaints are
filed and the charges are that they are not pure issue
advocacy, which is totally and completely protected under the
First Amendment as a free flow of issues and ideas and that is
what issue advocacy is about, by and between candidates and
campaigns and the public.
But the problem is that the allegations are made and the
complaints are filed that although it appears to be issue
advocacy, it is really candidate advocacy; and the Supreme
Court has found that we have a mix. There is a landmark case,
the Massachusetts Citizens for Life case was decided in 1985
[Clerk's note.--Witness later changed this to read ``1986.'']
that--it had both issue advocacy and expressed advocacy,
candidate advocacy, and the Court found there was a belief that
if it had issue advocacy that negated any finding of expressed
advocacy, and the Supreme Court says, no, issue advocacy has a
lesser protection as an encroachment on fundamental First
Amendment rights.
But the Court said, because of a compelling government
purpose to not only eliminate corruption but the appearance of
corruption, that that will be given lesser protection under the
Constitution. But the point is, there was a lot of press that
the Federal Election Commission was obstructing people engaged
in nothing but issue advocacy, and I think they were losing
sight of what the real issues in that case were. Issue advocacy
is absolutely--we unanimously, we solidly uphold and defend
people's rights to engage in that activity without any
restriction. Take soft money, they are beyond our law, outside
the Federal Election if it is pure issue advocacy, but there is
a lot of confusion from time to time in the mind of the
American public with reference to that issue.
Mr. Aderholt. Mr. Chairman, that is all I have right now.
Mr. Kolbe. Mr. Hoyer.
Mr. Hoyer. I am sorry I was late getting back. Obviously
you have been speaking to this independent expenditure issue,
which in my opinion is one of the biggest issues that confronts
us as we deal with trying to get a handle on money and politics
and the influence that money makes in politics. Because the
independent expenditures now, occur on both sides, this is not
a partisan issue in the sense that both sides suffer from or
are advantaged by very substantial amounts of so-called
``independent expenditures.''
My question, there are a number of cases in which you have
been involved in this, and litigated. The Supreme Court has
held not favorably to you in many instances, and then the
Commission has either decided not to go further on the case--if
you lost the district court, you decided not to appeal for
whatever reason.
What is--and you may have answered this and if you did,
just tell me and don't repeat it and I will just look at the
record. In terms of the six commissioners, what are your
discussions with reference to what you think is necessary if we
are going to get a handle on and give you the ability to look
at independent expenditures? From your experience--and you may
not be able to do this because you may feel this is not in your
role--what additional authorities need to try to get a handle
on independent expenditures?
express advocacy issue
Ms. Aikens. Well, Mr. Hoyer, the independent expenditures
are clearly--if they are truly independent, uncoordinated with
a candidate, in cooperation with a candidate or an agent of the
candidate's committee, they are truly independent, the Supreme
Court has said they can, they should be reportable, but they
are not--they do not have any limits. The money can be spent
without limits. If it is expresse advocacy.
Mr. Thomas. If it is not express advocacy. [Clerk's note.--
Witness later added: ``by a prohibited source.'']
Mr. Hoyer. If it is not expressed advocacy of a candidacy
of a Federal official?
Ms. Aikens. Yes. And it is reportable if it is express
advocacy. So the Commission has for the most part just been
investigating whether the matter was coordinated with a
candidate.
Mr. Hoyer. And what has been your finding?
Mr. Thomas. Well, we have, I guess you could say, mixed
results. These allegations that some of these so-called issue
ads were in fact coordinated with a candidate are very tough to
prove out. You have to depose all the people in the production
of the ad and find out if they coordinated with any of the
candidates' agents, and a lot of the time people have trouble
remembering. It is hard to prove these. But there have been
some cases where we have proven what we think is coordination.
The question of whether there is any consensus among the
commissioners about something that Congress might do through
legislation, to be honest, the legislative recommendations
where we can reach a four vote consensus don't have anything in
there on that other than we think Congress ought to try to
address the issue in a general way.
But obviously one thing that might be helpful is if
Congress wanted to try to delineate where coordination should
be found to exist. We have some regulations we think are
helpful, but Congress might be able to clarify even further the
situation where under the law it should be deemed to be
coordinated.
Apart from that, you might, if it is an issue ad, something
that doesn't contain express advocacy or defeat of a candidate,
I think given the current court rulings, you will have a very
difficult time bringing it in under campaign finance laws.
It is conceivable that under the communication laws you
might have a little bit more authority. The limited airwaves
concept, you might be able to require broadcasting stations,
even if it is an issue ad only, to provide some disclosure or
provide some equal opportunity, something like that. You might
have some flexibility there. But we, as a commission, have not
specifically put forward any particular proposal about trying
to get further disclosure about issue ads in that sense.
Mr. McGarry. I think it is probably more vivified what this
unsettled state of the law currently is with reference to
express advocacy. What is express advocacy? The First Circuit
Court of Appeals in effect has come down that if it doesn't
have the magic words ``Vote for, vote against, Hoyer for
Congress,'' very specific, it is called the magic word rule.
The Ninth Circuit disagrees with that and says it is--the
magic word goes back to the Buckley case, the landmark case,
which in effect had that as a footnote in the case that these--
and they spelled out these were the magic words. The Ninth
Circuit said this, you know, the magic words, it wouldn't take
any Rhodes scholar to fashion a political ad that would clearly
urge one to vote for or against a particular candidate and just
eliminate the magic word. And many--and the unsettled state of
that law with two circuits in sharp, very defined disagreement,
that division is reflected in the--across the board.
I mean, the unsettled state of the campaign law, generally,
you just have to look at the most recent case, the Colorado
Republican case dealing with independent expenditures by
parties, you have Justice Thomas on one end of the spectrum,
who makes it very clear in a sole dissenting opinion that he
would not enforce the Buckley case with reference to the
constitutional limits on contributions, for example. And he
feels and has expressed very clearly that he thinks the limits
and restrictions are all unconstitutional and compelling
government, he says there are bribery laws on the books and
that will take care of everything. You have on the other end of
the spectrum Stevens and Ginsburg, who solidly uphold Buckley
and all it stands for with the limits and restrictions and
prohibitions, and you have then the elements who are in
between, the other Justices on the Supreme Court, but that
division with reference to that and other issues.
Now, bear in mind, the whole issue of express advocacy, if
it is not express advocacy where it gets lesser protection
under the Supreme Court's outstanding cases, under the
Constitution, because of a compelling government purpose to
eliminate corruption, not only the reality but the appearance
of corruption. But that division, I suggest to you, is
reflected in the United States Senate, the United States
Congress, the White House, the American public, and the Federal
Election Commission. And many of these very difficult issues,
they are in a very unsettled state at the present time, and
that is the difficulty. And if they are not within the law,
that means that unlimited amounts of money can be spent, soft
money or whatever; they are totally beyond the law, and can be
without limit or restriction or prohibition of any description.
So it is a very unsettled--when people say the law is out
of whack, that is really what they have reference to, these
divisions on these critically important issues which really
trigger tremendous amounts of political activity for or against
candidates.
express advocacy issue
Mr. Hoyer. I think you mentioned, from the Congress'
standpoint, the real problem dealing with this is obviously the
state of the law and what we can and cannot do in terms of our
authority, which may be good from Thomas' standpoint or may be
bad from the standpoint of trying to reach fair limits and give
equal footing to incumbents and nonincumbents and the wealthy
and nonwealthy. This is very tough to do.
tuition assistance
The Chairman mentioned a number of specifics. You referred
to tuition assistance, which I think you came up with a figure
of $614 dollars or something.
Ms. Aikens. For fiscal 1997.
Mr. Hoyer. Did you reference any of the other items he
mentioned? I don't know if we are going to hear about it again.
Ms. Aikens. He discussed travel.
Mr. Hoyer. Convention attendance, cash awards,
modernization, travel up 73 percent, he pointed out,
prioritization of cases. Now, you have referenced that to some
degree----
Ms. Aikens. Yes, we have an enforcement priority system.
Mr. Hoyer [continuing]. And I think we would all agree,
from a management standpoint--you obviously said you agreed as
well, if you have X number of resources, you spend them on the
most compelling cases, cases that are most susceptible to being
resolved.
Ms. Aikens. And we are constantly discussing with the
General Counsel's office upgrading the priority system, making
changes in it to better address the needs.
convention travel
Mr. Hoyer. Do you want to address the other items?
Convention attendance is one of them. I presume one or more of
you attended one of the national conventions.
Ms. Aikens. I will let my colleagues answer that. I did not
attend.
Mr. Thomas. Yes, the tradition has been that Commissioners
attend conventions and in prior years commissioners from each
party have gone to one or the other convention. In 1996, as it
turned out, only three members went to the Democratic
Convention, no Republican members went, but--and we did get a
letter from Mr. Thomas, Congressman Thomas, Chairman Thomas,
about this. And we wrote back and said, yes, it followed the
tradition that if invited, Commissioners occasionally will go.
It turned out we spent about $3,500 on Commissionertravel
to the conventions, out of $8,500 spent on Commissioner travel spent
throughout the year, and that was well short of the $20,000 that had
been allocated for travel that year. So we think we were being quite
responsible in attending the conventions.
In terms of whether it was beneficial to the public, we
think as commissioners we need to get out. Part of the
criticism we receive is that sometimes we don't understand the
real word and how politics work, and the conventions are a
great way to meet people, ask them what they think about the
campaign finance laws, what they think about how the Commission
is doing its business. We think it is very helpful, at least I
do, and I think in that case it was beneficial.
We also had the opportunity to meet with some of the
officials handling the host committee. We have done that in the
past. If they can find time, we sit down with them and talk
about our process and ask them if they have any suggestions. So
we think it did serve the public, at least I do.
cash awards
Mr. Hoyer. Mr. Chairman, I know my time is up, but cash
awards, did you reference that earlier?
Ms. Aikens. Cash awards are less than 1 percent of salaries
is the answer I got from the staff. We do not give many cash
awards, but in relation to the salaries, they are very
valuable. I mean, it is a very valuable tool, we feel, to
reward the staff, and we give them very carefully.
Mr. Hoyer. Okay.
Mr. Thomas. And Mr. Hoyer, just one tiny point on that. We
work from a standard government formula and keep it within the
bounds of the standard government practice.
Mr. Hoyer. Okay.
travel
Now, travel up 73 percent, did you comment on that beyond
just the specific convention?
Ms. Aikens. Most of that is not commissioner travel. Most
is auditor travel or general counsel travel.
Mr. Hoyer. In relation to the increase in the work load?
Ms. Aikens. Yes. This was the year we had the presidential
audits and there were several not on site. There were audits,
there was one in Minnesota and there is one in Texas. So that
is what the majority of the funds have gone for.
dornan/sanchez election
Mr. Hoyer. My last question, Mr. Chairman, would be, I was
somewhat concerned that Chairman Livingston raised the
California race, I presume he is referring to the 46th
District. I happen to serve on the task force of the House
Oversight Committee dealing with the Dornan/Sanchez contest. To
my knowledge, the issues there do not relate to the FEC,
although I may be incorrect.
Has anybody requested you to involve yourself in the 46th
District?
Ms. Aikens. No. No, they have not. Our Clearinghouse does
supply vote recount manuals, and I don't know whether they have
supplied it to the two districts who are having vote recounts
or not. But in the past, they have provided manuals which they
constantly update to facilitate the vote count, recount.
Mr. Hoyer. Your Clearinghouse?
Ms. Aikens. Yes.
Mr. Hoyer. Why do you get into vote recounts?
Ms. Aikens. Well, the Clearinghouse on Election
Administration is the office that deals only with State elected
officials and not federally elected officials, and they are a
research arm of the Commission.
Mr. Hoyer. All right. Thank you.
Mr. Kolbe. Thank you, Mr. Hoyer.
automated data processing
I have just one other area of questioning, and that has to
do with automated data processing. You, in your 1998 budget
request, you had called for an investment, your original plan--
I am sorry, not your 1998 budget request, but your original
plan from prior years--called for an investment of $1,986,000
in automated data processing, ADP. You have scaled that back to
$1.17 million, a reduction of $814,000 which I calculate to be
41 percent reduction. Now you are asking for a supplemental of
$1.7 million and a revised budget request of 3.2, an increase
of 4.9 million from your original request.
Certainly with these kinds of increases that you would at
least like to have, the scaled-back automated data processing
plan can't be based on a lack of resources or a concern that
Congress won't provide the resources needed to meet FEC's
statutory responsibilities.
Let me ask why you have scaled back the modernization plan
for 1998.
Ms. Aikens. Well, I am going to let Commissioner Thomas
answer some of this, because I did not study the whole ADP
contract. But in 1996, for FY 1997, in the original budget, we
asked for $3.2 million for upgrading, for the modernization of
the ADP. We received $2.5 million that year, and some of that,
I think about $700,000, was diverted to point of entry and to
the electronic filing.
Mr. Kolbe. Diverted by whom?
Ms. Aikens. By us. When the law was passed, we had to get
point of entry in place for the 1996 election, and we had to
get the electronic filing in place by January 1st, 1997. We
diverted some of those funds so that we could do those two
things mandated by the laws, and that pushed some of the
modernization back a year or two.
Now, Commissioner Thomas is our expert on ADP.
Mr. Thomas. I would like to start first by saying we
appreciate any concern you have about whether we are moving
fast enough with ADP. We would like to try to reassure you, we
are not trying to hold back on these ADP modernizations. We
think they are great and we are pushing for them.
To be honest, part of what we encounter as we plan this
according to the 5-year or 6-year plans, is that you have to
work with this building block concept, and our contractor
advised us of that. So as we keep looking at it, taking a fresh
look at it, we find sometimes that some aspects ought better be
done maybe in a different time frame than in others. So aside
from some of the initial budget squeeze problems that we have
run into up to this point, there is also, I think, to be fair
about it, some reconsideration of at what stage particular
things can be put in place because we have to get the other
building blocks in place.
What you are specifically referring to, just quickly, is
the fact that we are going to have to delay one aspect of our
modernization, and that is ultimately to be able to use what is
called digitized imaging for documents that we have. It is a
way to have documents on a computer that you can pull up on the
computer screen instead of having to work with paper copies.
It is true, we are telling you, and we wanted to be just
up-front, that now we are probably going to delay
finalcompletion until fiscal 2002 rather than 2001, but that is really
only one aspect of that. And it is not, on the other hand, we think,
going to affect what has otherwise been noted as a very crucial
concern, and that is for our enforcement program.
We [Clerk's note.--Witness later clarified by adding
``will.''] put in place a case docket management system, and we
think we can explain to you how, in fact, we are moving quickly
on that; and we will have that in place in time to have it
serve as much benefit as the original plan would have
conceived.
Mr. Kolbe. Well, I will come back to that in a minute.
In your 1997 supplemental, how much of it is for ADP
enhancements?
Ms. Aikens. In 1997----
Mr. Kolbe. No, the 1997 supplemental.
Ms. Aikens. Supplemental, $287,000 of it is going to case
management for the one litigation case.
[Clerk's note.--Witness later clarified this to read:
``$269,000 of it is going to case document management support
for the major 1996 election cases.'']
Mr. Kolbe. That is not for the case, for the lawyers.
Ms. Aikens. It is for case management; it is a document
management program, a case management program.
Mr. Kolbe. That is for ADP?
Ms. Aikens. Yes, yes.
Mr. Kolbe. Okay. What was the amount?
Ms. Aikens. $287,000 [Clerk's note.--Witness later changed
this to read. ``269,000''] in fiscal year 1997, in the
supplemental.
automated data processing
Mr. Kolbe. Okay.
Ms. Aikens. And that is a system----
Mr. Kolbe. And that would be for the case management?
Ms. Aikens. That is a system that we are contracting with
the Justice Department, that will provide the hardware, the
software and the services. And we are doing it more or less on
a test basis so that we can really find out exactly what we
need, if this is adequate, if we need something else, before we
go Commission-wide on it.
Mr. Kolbe. Your supplemental has 219,000 for litigation
document equipment, 50,000 for litigation document equipment.
Is that considered part of your ADP plan?
Ms. Aikens. Yes. [Clerk's note.--Witness later changed this
to read: ``No.'']
Mr. Thomas. When you say part of our plan, if you are
referring to the 5-year strategic plan and performance plan,
the answer is no.
Mr. Kolbe. No?
Mr. Thomas. No, because that 5-year plan was crafted with
our base level request in mind.
When we talk about the changed circumstances and our need
to ask for what we are calling the fiscal 1997 supplemental and
the fiscal 1998 amendment, it is going to allow us, if we get
that funding, to do some additional ADP programs; and in that
sense, those numbers you were just citing referring to our
ability to get document management computerization in place to
handle these new big cases that we are asking for additional
money for out of the 1996 cycle. So if we can get that, we will
be able to use this modernization, this computerization, to
help us along dramatically in dealing with those 1996 cycle
cases. But that funding is discrete, it is separate, we have
tried to set it aside so you can see how it would add up to
help us with these 1996 matters.
Mr. Kolbe. Before--you spoke earlier of your case
management system. Before you could deploy that, there is a
couple of systems you have to have up and running, group
strategy and the imaging system, but those are both being
delayed.
Mr. Thomas. The underlying imaging system----
Mr. Kolbe. That is the one you said was going to be delayed
until 2002.
Mr. Thomas. [Clerk's note.--Witness later clarified by
adding: ``Yes, it . . .'']--is going to be delayed until 2002,
and to be honest, the part that is going to be delayed is the
part that allows us to take old, existing FEC documents and
scan them in so that they too will be accessible with imaging
technology. The last part of the imaging will not affect our
ability to have up and running a system for enforcement
litigation, to take in new documents, briefs and so on, and get
them on the system and use that to help them with the case
management.
So I am trying basically to say, it is not, I don't think,
as bad as it might otherwise sound, and the part that is
getting delayed is perhaps one of the less significant aspects
of our computer modernization.
Mr. Kolbe. My last question is, if Congress wanted to
accelerate this case management system so it could be deployed
in 1999 instead of 2000, as now planned, what specific efforts
that are not included in your 1998 budget request, revised
budget request, would we need to fund in order to accelerate it
by a year? Can you tell us that for the record, or if not,
could you tell us what you would need?
Ms. Aikens. We could supply it for the record, Mr.
Chairman, because it would have to be--we would have to work
out the numbers. But we will discuss it with our Assistant
Staff Director, who is in charge of all this, and we will
provide you with some figures.
[The information follows:]
[Page 46--The official Committee record contains additional material here.]
Mr. Kolbe. Also, with that, if there is anything that would
be needed, if the acceleration of a year would require you to
get moving in 1997, if some of that would have to come in the
1997, in the supplemental, please let us know.
Ms. Aikens. We will do that.
Mr. Kolbe. Either the 1998 dollars or the 1997
supplemental.
Mr. McGarry. Mr. Chairman it is important to point out,
there are three computer initiatives. You are talking about
point of entry for House reports, electronic filing and
automatic data processing. With the consent of the committee,
this committee, we did a 5-year plan. That 5-year plan,
involving these three computer initiatives, spells out the
amount of money we need to implement that. This committee, the
Congress, through its committees has not given us the money
that the plan calls for that we got with the committee's
sanction and approval.
Now, the point of entry that was a one-shot deal that cost
a half a million dollars, and it was a big success. It saves
the House a lot of resources and money, and it saves the
Federal Election Commission; and we have digital imaging and we
are able to eliminate the burdensome and expensive microfilm
process.
But one of the problems is that the 5-year plan, as a
result of not getting the money that is called for in
theconsultant's plan, is now a 7-year plan. So there is going to be
backup money, which we spell out in all the materials which we
submitted to you, but it is important to point that out for the record.
Mr. Kolbe. Thank you very much, Commissioner--Mr. Chairman.
Mr. Hoyer. I have no further questions.
Mr. Kolbe. We will have some other questions for the
record.
Ms. Aikens. We will be glad to respond to those.
[Questions for the Record and Selected budget justification
materials follows:]
[Pages 48 - 137--The official Committee record contains additional material here.]
Mr. Kolbe. We appreciate your coming very much.
Ms. Aikens. I would just like to point out that we do
intend to keep this--if we get the supplemental and the
amendment, we intend to keep that a discrete unit with its own
case management system, so that we can better measure how well
we are doing.
Mr. Kolbe. Thank you very much. We appreciate you all being
here.
The subcommittee stands adjourned.
Thursday, March 20, 1997.
GENERAL SERVICES ADMINISTRATION
WITNESSES
DAVID J. BARRAM, ACTING ADMINISTRATOR
THURMAN M. DAVIS, DEPUTY ADMINISTRATOR
MARTHA N. JOHNSON, CHIEF OF STAFF, ASSOCIATE ADMINISTRATOR FOR
MANAGEMENT SERVICES AND HUMAN RESOURCES
DENNIS J. FISCHER, CHIEF FINANCIAL OFFICER
WILLIAM B. EARLY, JR., DIRECTOR OF BUDGET
ROBERT R. PECK, COMMISSIONER, PUBLIC BUILDINGS SERVICE
FRANK P. PUGLIESE, JR., COMMISSIONER, FEDERAL SUPPLY SERVICE
ROBERT J. WOODS, COMMISSIONER, FEDERAL TELECOMMUNICATIONS SERVICE
JOE M. THOMPSON, CHIEF INFORMATION OFFICER
G. MARTIN WAGNER, ASSOCIATE ADMINISTRATOR FOR GOVERNMENTWIDE POLICY
WILLIAM R. BARTON, INSPECTOR GENERAL
Introduction
Mr. Kolbe. The meeting of the Subcommittee will come to
order.
My apologies. I was assured there was going to be a vote
right at 10:00, so I was waiting for that and it did not take
place. But I expect we are going to have continuous votes all
day here, which will make the hearing very difficult, so we
will try to expedite it as rapidly as possible.
Let me just say we welcome Mr. Barram here; Mr. Barram, the
Acting Administrator of the General Services Administration;
and with him Bob Peck and Mr. Woods. Bob Peck, is the
Commissioner of the Public Buildings Service, and Mr. Woods, is
the Commissioner of the Federal Telecommunications Service.
In this coming fiscal year, GSA is requesting an
appropriation of $142.8 million. Of course, the bigger part of
the story is the $4.8 billion obligational authority request
for the Federal Buildings Fund. And today I expect some of our
questions are going to focus on the Federal Buildings Fund.
There is an estimated shortfall of $680.5 million.
The administration's proposal is to replenish the shortfall
to the fund by not building new buildings or conducting major
repairs, and that should be a concern, I think, to all of us in
terms of the quality and condition of our physical
infrastructure. And I hope we can have some discussion about
its impact and possible alternatives.
Another area I think we want to address is GSA's role in
Federal downsizing efforts. GSA has helped agencies going
through downsizing efforts by properly addressing changing
space requirements and paying for the move of the affected
staff. Such efforts will help the Government more quickly
realize cost savings by reducing overhead costs.
And of course there is the issue of the FTS 2000, which
this committee does not intend to address. It is an
authorization issue. It is under the just jurisdiction of the
Government Reform and Oversight Committee. It is not on our
bill. Nonetheless, I think it is important that we at least
understand the current situation and the plans that are going
to be followed for the awarding of a contract in this area.
Before I call on Mr. Barram, let me see if Mr. Hoyer has
any opening remarks that he would like to make.
Mr. Hoyer. No, but I just want to welcome Mr. Barram, and
we will get to the hearing and see how far we get. Glad to have
you here.
Mr. Kolbe. Mr. Barram, your full statement of course will
be placed in the record. I urge you to summarize it as briefly
as possible so we can get as far as we can here before we start
getting interrupted.
Summary Statement of Mr. Barram
Mr. Barram. Thank you very much. It is good to be here with
you.
You have my statement, and I am not going to read it; that
is for sure. I want to say three things about GSA today,
though, and then I will mention, as have you, two of the
biggest issues that are on our plate.
I have said many times, ``This is not your father's GSA'',
and I also said last year in this Committee that we would be
very bold, and we have been, and we are changing the culture of
GSA dramatically.
The three things I want to mention are that our focus is on
thrilling customers, on managing smartly, and on being
committed to great work environments.
When we say thrilling customers, it is because we have no
choice. No organization that wants to be successful can succeed
inside or outside government without focusing on the customer
to the extent of thrilling that customer. The idea that we are
in many parts of our organization today, and will be in all
parts of our organization, providers of choice is essential. We
need to be so good that our customers will choose us. When we
think that way, it helps us to be good.
But we need to have, while we are doing that, a very
professional approach where we provide great service and great
value. We are not talking about giving our customers
everything, we are talking about providing best value and best
services. We are partners with our customers, not just gofers.
We get great prices on air fares, and on a lot of supplies and
services we provide. We are very responsive to FEMA, and others
when it is necessary. We have made dramatic strides in the way
we lease and do space alterations that are very good for our
customers, very professional.
The second thing: If we are managing smartly, we need to
have a clear vision, and we need to strategically improvise,
and we need to manage our business processes, change them. Too
many people, I think, today in lots of organizations focus on
doing a lot of planning and focus on getting organizations to
change. I think you have to have a totally different look at
that, which is you focus on issuing a part of the strategic
planning process in small and big ways. We are trying to do
that. It also means that we are focused on responsibility.
The President has been very articulate in the last year or
two on the subject of opportunity and responsibility going
together, and we are trying to help people to take
responsibility to manage decisions at their own level and then
be responsible for results. That is how you manage smartly.
And being committed to great work environments is the third
point. All workplaces are changing dramatically. The
technology, the availability of technology, the mobility that
we are going to have, the way workplaces look in the future are
going to be incredibly different than today. We are going to be
about model work environments, both our own and our customers',
and we will try to help spread that across the Government.
Another aspect of that is that the skills of the workforce
are changing and have to change. Almost all of us--I would not
wish it on the two of you, but the rest of us will be doing
something different in 3 years, and we need to understand that,
and we need to have the skills to be able to function that way,
so we are very focused on helping our people develop the skills
to flourish in the environment ahead.
Mr. Hoyer. Let me interject, I would wish for me to be
doing something different in 3 years, personally.
Mr. Barram. What I would wish for you is that you get to do
whatever you want.
Mr. Kolbe. Spoken like a true politician.
I was going to ask you, Mr. Hoyer, what you are wishing?
Mr. Hoyer. A perpetual minority is not it.
Mr. Barram. We are not going to talk about that today, are
we?
Mr. Kolbe. Please go ahead.
Mr. Barram. From our budget perspective--you already
mentioned it, Mr. Chairman--there are really three levels we
look at. We have a direct appropriation of a little over $200
million; we have about $13.3 billion in obligations that has
resulted from other agencies putting money into GSA, for which
we then provide services and then we have an effect on about
$43 billion of Government financial transactions that we
influence by a lot of things that we do. So we have a lot of
leverage--we get an awful lot of leverage from the direct
appropriation that you provide.
Our budgeted FTE is at 14,400 for Fiscal Year 1998, down 29
percent since 1993, and, as I said earlier, this provider of
choice idea is important to us. It makes us get better or we
lose our business, but it also helps our customers get sharper
because they now have to make some choices where maybe they
just automatically used us in the past.
The two hot items that you mentioned will take a good part
of our time together. One is the rent shortfall, and you
already know quite a bit about that. I don't know as much as
Bob Peck knows, so he is going to answer all the tough
questions on rent shortfall.
We made a mistake estimating rents for 1996 and 1997. It
was a budget error, which did not lose any money, we just erred
in estimating the amount of rent we would get. The error, as
you said, was about $680 million out of a flow-through of $10.5
billion, so that is about 6 or 7 percent, to get a perspective
on it. We want to fix it in fiscal year 1998, so we need to use
fiscal year 1998 revenue to cover newconstruction and major
maintenance that Congress had already approved, and we will talk about
that today.
We also have fixed and have continued to fix our rent
estimating ability. We are embarrassed and uncomfortable at
this. It is not good management, and we want to not let it ever
happen again.
The second issue is the telecommunications FTS 2001, and,
however much or little you know about that, you don't know
anywhere as much as Bob Woods knows and you don't ever want to.
It is the most complex subject, in my opinion, in American
commerce and probably in world commerce today.
Technology is changing fast. We have a new telecom reform
law after 60 years which we are trying to follow. We have in
the private sector a huge installed base, installed by
companies who were regulated, have been regulated, and who are
now in a more competitive environment, and this is a big
change.
In the middle of all that, we are trying to get and have
gotten the best very, very low, great prices and great services
for our Federal customers, and that is our goal in FTS 2001. We
are going to plan well and communicate extensively with all the
players in this subject.
That is all I will say to open up. I certainly would be
happy to answer any questions.
[The prepared statement of Mr. Barram follows:]
[Pages 143 - 153--The official Committee record contains additional material here.]
Opening Comments
Mr. Kolbe. Well, we can take a couple of minutes before--
Mr. Hoyer, you said you could not come back. Why don't you go
ahead and ask a couple of questions.
Mr. Hoyer. Unfortunately, I have to go right now because we
care a lot about this motion on the floor and I am supposed to
work it into my other responsibilities.
But, Mr. Chairman, I have asked Mr. Barram and perhaps
others in the GSA leadership to come by my office on Thursday
the 27th, so we could go through this because I knew I wouldn't
be able to come back here. And I thank you for your
consideration, but I need to go right now.
Thank you, and I look forward to following up.
Mr. Kolbe. All right.
Well, I will be coming back, and I am not sure whether you
will be able to, if you want to go with your questions, I will
go ahead and ask mine.
Mrs. Northup. No. I will come back.
rent shortfall
Mr. Kolbe. We are going to go for another 5 or 6 minutes
here before we have to go to catch this vote.
You show that you have a $680 million deficit in the
Federal Buildings Fund, but it is really $847 million, is it
not, and you have offsets of $167 million, which have nothing
to do with the building fund, but the real building fund
deficit is $847 million. Is that not correct?
Mr. Peck. Well, Mr. Chairman, I guess we have to start with
the fact, as you know, we operate like a business. This is
unusual for Federal agencies. We do not just get appropriations
and spend everything. We get most----
Mr. Kolbe. It is not quite like a business in the way rents
get charged and who pays rents or doesn't pay rents.
Mr. Peck. That is something which we really want to talk to
you about because we say we are running like a business and
then we are asked to do all kinds of unbusinesslike things by
the Government or Congress, and sometimes that makes it hard to
balance the books or make any kind of profit.
Here is what has happened, to answer your question, it is
true that if you add up all of the revenue that came in against
what we projected, the total shortfall becomes $847 million.
However, like a business, not getting the revenue meant that in
the years in which this has happened--this is one we are in
right now--there were certain costs which we were able to
avoid. If an agency says, we are downsizing, we don't need
space, we don't go out and obligate ourselves to pay rent. In
some cases they vacate space and we stop cleaning it to the
extent that we did before. The $167 million that we netted out
are cost that we did not immediately have to incur. So what we
have said is, we have had a net shortfall in the fund of $680
million.
So I am saying you are right, the reason we reported this
as $680 million is because that is the amount of money that we
need to make up, that is the amount of money which we could not
immediately recapture in the fiscal years in which we saw
revenues going down. We took what immediate steps we could to
make up for it.
My basic point here is, like any business, I looked at the
Wall Street Journal yesterday morning. On page 2 there were
reports of three major American corporations that reported
reduced earnings in the last quarter. It happens they are not
happy about it. I can tell you that we are not happy about our
reduced revenues. What they immediately did was cut expenses, I
am sure, to try to get their net where they wanted it to be.
That is what we have done.
confidence in rent estimate
Mr. Kolbe. Excuse me for trying to move along here with the
time constraint problem we have.
How confident are you of the $680 million estimate? It
looks like we are badly off here with this estimation. How
confident are you that that is going to be an accurate one?
Maybe it will be less, maybe more.
Mr. Peck. Well, you are right. One thing we know for
sure.Part of the year--fiscal year 1996, the books are closed; we know
that number. For fiscal year 1997, we are tracking very carefully where
we are. The total may not be $680 million, but we may be off by a very
small margin.
Mr. Kolbe. See if I understand this. This is a shortfall in
the building fund. Does that mean then that you are $680
million short of what you need to make payments for current
construction or for operating costs, or what?
Mr. Peck. No, sir, this gets complicated, but in any given
year, we are spending money that was appropriated 2 or 3 years
ago. That is why we say we will have a $1.2 billion
construction program next year on previously appropriated
funds.
What we cannot do is get new obligational authority in
fiscal year 1998 that would make up for the obligational
authority which we didn't get revenues to cover in previous
years.
So, you know, I am trying to say that is how we have to
balance our books. We have--and this is another way in which we
differ from a business--to follow Government accounting
principles. That is what we are going to do to make up this
gap.
strategy to compensate for rent shortfall
Mr. Kolbe. Your solution is to replenish the Fund by
charging rents to the Federal agencies, or some of them at
least, but not use the Fund for construction or major repairs.
Is that a correct assessment?
Mr. Peck. Yes, sir. And actually what is happening is we
know there are some funds previously appropriated that we
thought we would spend in fiscal year 1997 which we are not
going to spend in 1997. That is an immediate savings. However,
at some point this all catches up with you, and it catches up
in fiscal year 1998, such that, if we are going to continue to
spend that money that we have anticipated, we cannot obligate
new things in 1998. We can roll over certain things from this
year to next year, but then we cannot start new things next
year.
Mr. Kolbe. Did you consider other alternatives such as
raising rent to agencies?
Mr. Peck. Well, let me suggest one other option first, if I
may. One is that we could decide to make up for this deficit
over a series of years rather than all in one year. And we have
considered that but decided that, like a lot of businesses, it
is better to take the charge against losses in one year.
Raising rents poses a problem. We are required by law when
we set our rents to charge commercially equivalent rates, so we
cannot arbitrarily set the rent rates wherever we want just to
cover expenses. And just like a business, the rent rates are
pretty much given to us by the market.
Mr. Kolbe. Do you reduce rates arbitrarily across the
board, kind of reduce rates?
Mr. Peck. Yes, sir.
Mr. Kolbe. You could do that, but----
Mr. Peck. Well, we think we are right on the mark, a
previous Administrator took a look at our rent rates and
decided that our rent rates were above the market in 18 major
markets, and so he reduced our rents to what he said at the
time he thought equated to commercial markets.
That was outside of a process we have in which we actually
hire certified appraisers to figure out what the rents are in
markets, and we think our rents are what they are supposed to
be. So, you know, it is hard for us to justify raising the
rents unless an appraiser has told us we are below the market.
Mr. Barram. As you know, in a business you like to raise
your prices sometimes to cover an expense problem like this,
but you cannot or you lose market share. And now that we are in
this mode of being providers of choice, we have even more
pressure, I think, and appropriately so, to have sensible
rents.
basis for rent shortfall
Mr. Kolbe. Is it safe to say that your errors in your
estimates here were because of inaccurate, incomplete estimates
on the rental from GSA, and that it was not due to any
extraordinary event that occurred?
Mr. Peck. You know, in several years past we have gotten
more revenues than we anticipated. We have to estimate 18
months in advance, of course, of the fiscal year, to get
through OMB and the appropriations process.
One-fourth--one-third actually, of the $680 million is
because the Government has downsized and agencies are actually
telling us they don't need as much space as they needed before.
I think that our forecasters back then didn't think that
government downsizing was going to hit, at least in space, as
much as it has; that was one part of the problem.
Another part, quite honestly, was that our forecasting
methodology was just too gross, it was not bottom up; and,
finally, we made one error in carrying over the rent reduction
which we referred to into future years.
Mr. Kolbe. We will come back to this. We are going to have
to stand in recess so we can go vote, and we will come back as
quickly as we can.
[Recess.]
Mr. Kolbe. We will resume here.
Let me go from the shortfall, the specifications of how the
shortfall developed, although let me ask one other question on
the shortfall. What steps are you taking to try to ensure that
you have more accurate estimates in the future? Or is there
anything you can do? Is there anything you can do to make a
more accurate assessment?
Mr. Peck. Yes, sir.
Mr. Kolbe. Because when I look at the list of the things
which caused the shortfall, it is not just not anticipating the
size of the Federal downsizing; it is effective Government-
owned space increases, and the rent reductions. There is a
variety of different things in here. Adjustment was made to
revenue estimates based on the belief that assumptions being
used were too conservative, actual experience indicates
conservative assumptions were more accurate, and so on.
How are you going to try to avoid this in the future?
Mr. Peck. Well, the last one is the most obvious. We are
taking the most conservative assumptions we can now; I can
assure you of that. We are not taking the rosy scenario on our
revenue estimates.
Mr. Kolbe. Let me interrupt you right there. Do you have
the final say over the assumptions that you make, or does OMB
tell you what you are going to put in there?
Mr. Peck. Hold on a second. Those are our assumptions. OMB
approves the rent rates which we can charge.We do consult with
OMB, but it is finally our estimate on how much we think agencies are
going to need.
Mr. Kolbe. So those less conservative assumptions were your
assumptions?
Mr. Peck. Yes, sir, in those cases.
And the other thing I will tell you we have done--I want to
be clear--when we discovered this, we realized we had a problem
in our forecasting system. We have changed the assumptions. We
have changed the way we do estimates. We found out that
particularly in the downsizing climate, the forecasting formula
which we had used was not working anymore, and so we have
changed that. We are now doing a bottom-up forecast.
We were doing sort of national rules of thumb: take our
whole inventory, apply rule of thumb, and decide how much our
rents are going to change. We are now going down to the basic
market level in various cities in the country and saying:
``What do you see about Federal space? What do you anticipate
the rent increases or decreases to be?'' So we are building it
up from there.
We asked Ernst & Young to come in and take a look at our
forecasting methodologies, because although I don't like to
spend a lot of money on contractors, in this case we felt we
had to get an outside party to look at what we are doing. So we
are changing that.
We are also putting in place this year a new inventory
control system which we are licensing from AT&T. It is the way
they manage their real estate operations. It turns out that our
25-year-old computer has bad data. It takes a long time to get
data out of it. So we are taking a number of actions that we
think will produce more accurate estimates.
Mr. Kolbe. All right. I have a series of other questions.
We have other members here. I don't know how long it will be
before we have a vote. Mr. Price and Mrs. Northup came in at
the same time. I will go with Mr. Price and then Mrs. Northup.
parking at raleigh, north carolina federal building
Mr. Price. Thank you, Mr. Chairman.
I have one brief question having to do with something in my
district, a project of considerable importance; and then I want
to raise some more extensive questions about the post-FTS 2000
contracting procedure.
But first, I'd like to ask about parking at the Raleigh
Federal Building, the major federal facility in the Fourth
Congressional District, and there, how the planning process
works and is working for construction or expansion of Federal
facilities with respect to parking.
In the last few years, the Federal Building in Raleigh,
North Carolina, I am sure you realize, has undergone some major
changes. The main post office, which used to be on the first
floor, has moved. The vacated floor is now being converted to
additional courtrooms. Since there is no parking for the
building, there has always been a significant parking problem,
and it has been exacerbated by the new demand for parking
around the Federal Building.
I am concerned about the additional strain these new
courtrooms are going to pose for the building. I understand you
own land in the vicinity of the building, and I wonder if you
could tell me how the planning is coming for parking for this
facility and what kind of plans you have or would like to put
into effect for parking facilities for those visiting the
Federal Building for whatever purposes.
Mr. Peck. Congressman Price, the regional office that is in
charge of this, headquartered in Atlanta, is conducting a
survey in Raleigh. You are right about the land, and we are
conducting a survey to determine what the parking needs are and
how we could satisfy them.
What I would like to do is have an opportunity to consult
further with the region, on where they are on that, and come up
and brief you or your staff next week if that is acceptable.
Mr. Price. That would be good. It is important for this
process to move forward. I am eager to consult with you about
it. I just wanted, for the record, to indicate that the need is
great and that we need to give priority to this particular
situation.
Mr. Peck. Yes, sir. We are aware that there is a need, and
we are trying to figure out how to satisfy it.
post-fts 2000
Mr. Price. Good.
Let me ask you now about the status of these contracts
providing telecommunications services to the Federal
Government. As I understand it, the current contract which
provides long-distance voice and data communications services
to the Federal Government, FTS 2000, was awarded to AT&T and
Sprint in 1988. This contract is set to expire on December 6 of
next year.
In preparing for the expiration of FTS 2000, your agency
began the process of developing a subsequent procurement
strategy in 1993. That process culminated with the release of
what was reportedly the final draft of the post-FTS 2000 RFP
last fall. Your proposed RFP called for separate procurements
for long-distance, metropolitan-area, local service, and
combined local and long-distance service in areas where
traditional local and long-distance providers have infiltrated
each other's markets.
Now, as I understand it, like many other things that are
subjected to discussion and cross pressures in our democratic
system of government, no one potential provider was completely
satisfied with that strategy, but it was an approach at the
time we thought everyone could live with. That probably meant
you had done a good job in balancing the interests involved,
and I think you shared that sentiment.
In fact, in your letter to Senator Ted Stevens of November
26, you stated--I am quoting --``The strategy we have developed
is the optimal approach to address a climate of profound change
in competitive telecommunications markets.''
You also indicated some urgency in getting approval of the
proposed RFP: Again quoting, ``It is of the utmost importance
that the Government proceed with the near-term acquisition and
subsequent transition to the FTS 2001 contracts immediately.
Further delay will certainly increase costs regardless of the
strategy chosen.''
Subsequently, however, you announced a change in strategy--
at least as I understand it--which basically permits long-
distance providers who are awarded portions of the contract to
have the option of also providing local service in those areas
in lieu of the earlier plan for seeking separate, competitive
bids on local service. You then announced a 30-day delay before
the final strategy would be put out for bids in order to
accommodate additional comments on the proposed revisions.
First of all, in light of thebroad support for the November
strategy and the urgency in getting this procurement process underway,
why did you make changes in what you at that time said was the optimal
approach?
Mr. Woods. I think that is really mine to answer,
Congressman Price. What we had done last year was go forward
with the idea that we want to bring maximum competition to our
next generation services. The current program, FTS 2000, really
only provides long-distance service. It does it very
effectively.
While you are paying 17 to 20 cents a minute at home, in
spite of what you may see in advertisements, we are paying for
the Government right now about 5 to 5 and a half cents a
minute. So this current system works. Competition has worked.
We believe in it, and we are dedicated to it.
The question that arose after last fall's work was whether
or not the Telecommunications Act itself really bought into the
idea that each segment of the market would simultaneously enter
the other's market. That is basically the underpinning of last
fall's compromise and work that was done by the industry. And,
by the way, they worked hard at that compromise, and I
personally put a lot of my time into it.
When the policy was raised by a colleague of yours in the
other chamber, the issue was about the law itself, basically
saying that long-distance providers could go ahead with
providing local service and that local providers could provide
long-distance only when they had met certain checklists
outlined under the law. The policy issue is, why are you, in
essence, doing it differently, in other words, simultaneously
looking at this issue?
In addition to that, our real push from agencies and
customers was that they want end-to-end service as soon as they
can get it. The reality of the world is that the
telecommunications market is moving forward unevenly. We are
going to have long-distance providers that can provide service
in 12 cities but not the entire U.S. from end to end, and the
question is, why can't you let them go ahead and go into this
now and provide end-to-end services if the industry is ready?
And that question is a policy question about which OMB said, we
think it makes sense to go ahead and provide the end-to-end
service.
So that was why we made the change, to allow providers in
each segment to go ahead and provide service end-to-end as soon
as they could do it.
fairness of revised strategy
Mr. Price. Well, you are clearly correct that this is a
dynamic time for this industry, and the changes hold all kinds
of possibilities not only for Federal procurement but I think
for telecommunication services generally. But the development
of these capacities, has proceeded unevenly, and it is going to
take some time for the local service market to be fully
competitive. And these changes are very rarely, if ever,
neutral with respect to the various competitors.
Can you tell me if this revised strategy is going to favor
one provider or one kind of provider over another?
Mr. Woods. I think, Congressman, within the context of the
law, it does not. It follows the law very strictly. I would be
naive if I thought that some segments of the industry don't
feel like their position is not maximized in terms of
competition. But I believe it is in the Government's best
interest, and I also believe the Government is at this stage
putting itself in jeopardy by not moving ahead.
We have been living off the price decreases. We have been
driving prices down in the long-distance market roughly 20 to
25 percent a year. Agencies have been growing at that rate and
more.
If we go straight line, level prices for a couple of years,
some substantial budget increases are going to show up, because
things like the social security hotline, you don't just control
those as a flat item, they will grow because they are public
oriented. They reach out to the public, I think wonderfully.
But the down side of that is, we have got to keep driving
prices down, we have got to move on to the next generation to
keep those prices headed downward, and we believe there is
tremendous potential in the local market for those price
decreases.
Mr. Kolbe. Mr. Price, we will come back, if I may, with
some more questions and get another round here since we have
everybody here. Mrs. Northup.
excess computers
Mrs. Northup. Yes. I would like to ask, I notice that in
your presentation you said that computers are discarded as
obsolete equipment, whatever was available was donated to
schools.
You know, we have in our local office next to us a room
that is a pile of discarded, maybe out-of-date computers, and
have been trying to find a way--the department for the blind--
actually, the American Printing House for the Blind and the
Kentucky Industry for the Blind have a project where they take
discarded computers and upgrade them for the blind and disabled
community and make them available at just the cost of upgrading
them.
We have not been able to find a way to release these
computers or to--and actually, you know, the question in our
mind is, if we have a room next to us that has these computers,
how many other rooms like that are around the country and how
do we corral those? And they become increasingly more obsolete
every single day.
Mr. Barram. Let me ask you a question or two. The room next
to you, is that your office or a Federal Government agency
office?
Mrs. Northup. It is in a Federal Government office
building, and formerly, another Member of Congress had
extended--more extensive offices than we have rented, and that
was part of his office.
Mr. Barram. I could talk a lot about this. Let me say a
couple of things. One, the President's Executive order says, to
all Federal agencies, when there is excess, give them away,
particularly to schools, particularly in inner-city areas,
disadvantaged areas. We have been talking with lots of Federal
agencies to try to get them to do that, and many are responding
very well. We are coordinating it.
We have given away at GSA a thousand computers this year
already, and we will keep pushing for it. Other agencies are
doing this as well. If it were a Federal agency and you tell me
who it was, I would call them tomorrow and say, let's get
moving on this.
The second thought I have on this, I know this business of
the computer business fairly well, and schools need to have
technology. They need two kinds of technology. They need entry-
level technology to help people just get familiar and do things
like typing very simple stuff, for which you can use obsolete
equipment, and I will get back to that in a second, and the
other is that you need really good equipmentto train kids for
the future.
But on obsolete stuff, if there is an agency with computers
like you are talking about, that somebody says does not work
anymore, they are not going to fix them up and then give them
to a school, someone has to be an intermediary. So we have been
working to try to find these intermediaries, and there are a
number of them.
Mrs. Northup. Do you consider 386s obsolete?
Mr. Barram. Sure. You are talking to a guy that thinks 486
might be close to obsolete. You can cannibalize it sometimes;
you can use it for a lot of stuff.
Mrs. Northup. So, actually, if my office contacts you, you
would be interested in not only helping us clean out this room
next to us, but maybe if you have other opportunities, you
would help direct them to this institution?
Mr. Barram. Sure, absolutely.
By the way, when you contact us, if you would tell us--is
it the Kentucky what for the blind?
Mrs. Northup. Well, the meeting was with the partnership,
Kentucky Printing House for the Blind. It is where the United
States prints all the Braille printing for all the schools
across the country, and Kentucky Industries for the Blind, they
are associated.
Mr. Barram. Okay. Do they refurbish computers?
Mrs. Northup. Yes, they do. And it is actually the blind
community that does a lot of the refurbishing, and they upgrade
it so that it is able to be used by the blind community.
Mr. Barram. Great. Sure.
good neighbor program
Mrs. Northup. Okay. Let me also ask you about the Good
Neighbor Program. Can you tell me a little more about that,
what that does, and what it costs us and----
Mr. Barram. Sure. We created it last summer after working
on it for a while--here is what used to happen. In lots of
cities, cities would have business improvement districts, and
they would be private-sector people who would come together
under the auspices of the city often to keep their downtown
clean, safe, and vital. Our buildings and our agencies are
often downtown, and we would participate--we would be
cooperative, but we could never participate financially. We did
our own stuff on the side.
And it was always a bit of a bone of contention that we are
a pretty big landlord in lots of cities--that we felt we were
not as good a neighbor as we could be. So we researched it and
found a way that we could participate with these business
improvement districts through this Good Neighbor Program so
that things that we would do otherwise, we would do in
conjunction with the way they were doing it, and it has been
incredibly well-received.
We signed some memorandums of understanding with a number
of cities saying we are committed to do this. We would
participate on boards and commissions that they have set up to
work on this. So it has really worked very well so far, and we
are not spending any money that we would not otherwise spend.
Mrs. Northup. Well, where in the budget--what money would
you have spent? Is it from the rents?
Mr. Barram. It is money that we use to operate our
building's security----
Mrs. Northup. So in fact, I mean, could that help explain
the overrun?
Mr. Barram. No, unrelated. We would do this, and we will do
this same work. We are just doing it in a little different
context that works better with the downtown communities.
Mr. Kolbe. We will come back to you, Mrs. Northup.
Mrs. Meek.
post-fts 2000
Mrs. Meek. Thank you, Mr. Chairman. I welcome the agency
here this morning, particularly Mr. Barram.
I have questions and concerns very similar to my colleague
from North Carolina, Mr. Price. I have received information
from the people I serve in 10 communications areas that they
are very upset with your new policy and they feel there is
going to be quite a bit of confusion, Mr. Woods. And of course
my colleague has spoken about that, and I won't take up a lot
of time, but I do want you to know that I, too, am concerned.
And I notice from my readings that the Federal agencies have
the same concern.
So I am sure you are going to in some way deal with that,
help me to come to some closure in my mind as to how that is
going to be resolved. But I did hear you say that it is going
to be the best benefit of the Federal Government to go to your
new policy. Am I correct?
Mr. Woods. I believe that is correct. I might add that we
|
The People of the State of New York, Respondent, v Alan M. Smith, Appellant.
(Appeal No. 1.)
[741 NYS2d 476]
—Appeal from a judgment of Steuben County Court (Latham, J.), entered November 27, 2000, convicting defendant upon his plea of guilty of felony driving while intoxicated.
It is hereby ordered that the judgment so appealed from be and the same hereby is unanimously affirmed.
Memorandum: Defendant failed to preserve for our review his contention that County Court deviated from its sentencing promise by issuing an order of protection at the time of sentencing (see People v Warren, 280 AD2d 75, 77; see also People v Sanders, 163 AD2d 616, lv denied 76 NY2d 944). In any event, that contention is without merit. An order of protection may properly be issued independent of a plea agreement (see Warren, 280 AD2d at 77; People v Roman, 243 AD2d 831; People v Oliver, 182 AD2d 716). Defendant’s further contention that the court in sentencing defendant relied on prejudicial information that was improperly included in the presentence investigation report is also unpreserved for our review (see People v Young, .186 AD2d 1072; People v Walworth, 167 AD2d 622, 623) and, in any event, is without merit inasmuch as defendant received the bargained-for sentence. Present—Pigott, Jr., P.J., Hurlbutt, Kehoe, Burns and Gorski, JJ.
|
Talk:O U T L A W S/@comment-4507436-20120212013338/@comment-4911394-20120213022940
He said he was going to "Take me away" just for making a comment on "accusing our officers".
|
Shared and independent views of shared workspace for real-time collaboration
ABSTRACT
A synchronous collaboration environment that supports real-time collaboration of multiple participants, each having shared and independent views of the shared workspace. Multiple views per participant are provided. Some of the views seen by a participant can be shared views with the usual common cursor and annotation tools. The shared views need not be homogeneous, which means that for a given view, each participant can see more than just some common data in his or window for the view. What the participant sees separately from the common data can make his or her shared view different from that of other participants. The view can be different due to different data being exposed in the view. Some of the views seen by a participant can be independent views. This allows to the participant synchronous working with the shared workspace alone on his or her own. The collaboration system includes a user interface and support for aligning views including goto and overlaying. Participants can modify the workspace through their views in a synchronized manner provided the sharing and access rights of their views allow them to do so.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention generally relates to collaborative work by a plurality of participants using computers connected together via a network and, more particularly, to a real-time collaboration system in which each participant can have multiple views of the shared workspace, the views of the shared workspace of different participants are not necessarily the same or homogeneous and, further, the participants may have independent views of the workspace.
2. Background Description
Software for collaborative work, i.e., work involving many users and/or agents falls into two categories of use. One is termed asynchronous collaboration and the other, synchronous collaboration. Examples of software for asynchronous collaboration are groupware such as Lotus Notes and Microsoft Exchange. These along with other examples such as discussion groups where data is changed batch wise have the characteristic that neither do they require, nor do they particularly cater to the concurrent presence of many users and agents in the work environment. The work environment can include all users and agents that use computers that are connected to each other by networks such as the Internet or intranets. In contrast to software for asynchronous collaboration, software for synchronous collaboration is designed to cater to concurrent users and agents. It includes collaboration tools such as chat, concurrent whiteboards and the more sophisticated Same Time environment. These tools provide for real-time interaction among groups using the same shared workspace. Whatever be the workspace—document, spreadsheet, CAD drawing, etc.—it can be seen and modified by the collaborators, simultaneously. Modifications to the workspace are made available to all group members, immediately and synchronously.
Commonly available synchronous collaboration tools place significant restrictions on the kind of shared workspaces. Chat programs operate on text files and concurrent whiteboards operate of shared bitmap images. If a team of users wants to synchronously update, say, a spreadsheet using a concurrent whiteboard, then the team members have to individually update their local spreadsheet copies while staying in synchrony using images of the spreadsheet shared through the whiteboard. The ability to share a larger variety of workspaces than text files and bitmap images, and the ability to view and edit them using their native applications, i.e., collaborate by application sharing, has only recently become available. However, this ability comes with the restriction that all participants are allowed basically the same, shared view of the workspace. In some cases this commonality of view is described as WYSIWIS, i.e., What You See Is What I See. This restriction overlooks the need that effective collaboration may require individual users to have a plurality of views of widely different characteristics for both seeing and editing the synchronous, shared workspace.
SUMMARY OF THE INVENTION
Effective real-time collaboration among possibly widely dispersed participants requires making a multiplicity of different views of the shared workspace available to individual participants. In the invention disclosed herein, multiple views per participant are provided. Each view can be shared between a different subset of the participants. The subset can be a singleton set, which means that the view can be an independent view—the participant with such a view can work with the synchronous workspace, alone or on his own. Within any set of participants sharing a view, the data seen through the view need not be identical for each participant. Since the view need not be homogeneous, i.e., it can be heterogeneous, then beyond some common data each participant can see different data through the view. The invention provides a user interface for the multiple views it supports and for their control. The interface includes a separate/shared window for each view, bookmarks for views, and control buttons/inputs. The invention provides support by which participants can align their views by, say, using a “GOTO” command from one view to another, or by overlaying one view on another. Participants can modify the workspace through views in synchronized manner provided that the sharing and access rights of the views allow them to do so. Sharing and access rights, and the authority to change other's rights can be changed dynamically.
The invention provides a means for carrying out synchronous collaboration wherein collaboration participants are individually allowed a variety of views of the shared workspace. The invention includes a user interface for viewing. For simplicity, one participant per client or collaboration software frontend process running on a user's machine is assumed in this introduction section. In this invention, participants of a collaboration session can choose to have any number of shared, synchronous views of a shared workspace wherein each view has more than one viewer sharing the view and each viewer has his own separate client for accessing the workspace (see assumption above). The number of such views can be zero, which means that the participants have at most either shared, synchronous views of a solitary viewer each or only independent, synchronous views of the shared workspace.
Each individual participant can see a shared view of the workspace in a separate window in his client. The shared view can be seen by participants in a homogeneous manner. In a homogeneous presentation, each participant sees the same portion of the workspace that other participants sharing the view see. The display characteristics, e.g., scale, font syntax can be different, but the data exposed in each participant's window is the same. In a heterogeneous presentation each participant sees some data that is required to be common for all participants sharing the view. In addition, each participant can also see data that is not required to be common for all participants. The data that is required to be common can be delineated from other data by, say, a surrounding bounding box. Thus, for example, viewers can be sharing a text document in which the common data everyone is looking at is a paragraph. Some viewers can be seeing just the paragraph in their shared windows. Some viewers can be seeing the paragraph and some text lying below it. Some viewers can be seeing the paragraph and text above it. Other viewers can be seeing other combinations of the paragraph and text.
The display characteristics (syntactic characteristics) of each viewer's heterogeneous shared window can be different. Within the common region of a shared view (e.g., the delineated region of a heterogeneous shared window and the entire region lying within a homogeneous shared window), the usual tools of shared manipulation are available. For example, participants can manipulate a shared cursor in this region and annotate/select portions of the region. All such changes are synchronized as usual and are made available in the window for the shared view of each participant. The invention provides support for participants to form interest groups for carrying out synchronous collaboration in different parts of the shared workspace. The interest groups operate on the shared workspace concurrently, as a part of the total synchronous collaboration involving all participants. Participants in an interest group can form, say, one shared view for themselves, and the windows for the view are made available within the membership of the interest group only. Support for forming interest groups, for having shared views per interest group, for dynamically starting and/or discontinuing any interest group, for dynamically changing the members comprising any interest group, for dynamically blocking out dynamic changes in the membership of any interest group, for keeping interest groups anonymous, and for keeping the presence of any interest group unknown outside its membership is provided by the invention in order to increase the flexibility of synchronous collaboration.
The invention supports interest groups comprised of only one member. Support for such interest groups includes all the shared views supported for interest groups of larger memberships. One particular kind of a view supported for such interest groups is an independent view. An independent view is an unknown shared view associated with an interest group which has an unchanging membership of one participant only. Independent views of a shared workspace exist in concurrence with any other shared views of the shared workspace. This allows to a participant working on the shared workspace independently, as for example in a slide show wherein a participant may want to see something on a previous slide without dragging the entire group with him, and yet not losing the synchrony of real-time collaboration. For example, consider collaborative development wherein a specialist may be required to incorporate group suggestions into a workspace immediately, and without restricting the group to watching him work. The specialist can work using an independent view. FIG. 2 shows a collaboration containing an independent view along with a shared, heterogeneous view.
Each of the multiple independent views available to a participant can be presented to him in a separate window. As an option, the position of each view is available to him as a bookmark and he can shift from view to view within the same window. The participant can use this option in the context of shared views also to reduce the number of windows available to him at any time. Participants can generate bookmarks for the purpose of keeping track of views/positions in the shared workspace that are of interest to them.
The invention supports various ways of aligning views so as to allow the transfer of views from audience to audience. For example, in order to allow a participant to bring to the notice of a larger audience the view contained in his independent window, the invention provides support for any participant to take control of an ordinary, shared view and use a “GOTO” command to make it overlap with an independent view. The “GOTO” command can be used to make an independent view coincide with an ordinary, shared view also. Any view can be used to start off another view of the workspace. The new view can be an ordinary, shared view or an independent view. The initial value of the new view is the same as that for the view starting it off. An independent view can be overlaid on top of an ordinary, shared view. In this case, the independent view will coincide with the shared view, and shifts in the shared view will be reflected in the independent view identically until the overlaying of the independent view is turned off. Similarly, an ordinary, shared view can be overlaid on an independent view. The shared view will then reflect the independent view whenever the overlaying is on. Both the “GOTO” command and overlaying can be provided to participants as a button, icon, graphical object, keyboard input or some combination thereof.
The invention supports specific access and sharing rights for each participant. For any participant, the rights can be different for each of the workspace views/interest groups available to him. The access rights include read only, and read and write. Sharing rights of a participant for a view or interest group indicate which participants, including himself or herself, the participant can add or remove from the view or interest group. When a participant has only read rights to a shared view, then he cannot add/delete data through that view. At most he can pass his comments on the view to others by manipulating the shared cursor and/or by selecting from-the common data contained in the view. Selected data, if any, is highlighted as usual for all participants sharing the view. Access and sharing rights of any participant can be defined/changed on an individual view or interest group basis or a multiple view or interest group basis. For a participant, the rights can be changed in agreement with the participant, or independently of the participant. The authority to change the access rights of others can be vested in a subset of the collaboration participants. This subset can be changed dynamically. For example, in the case of an interest group, the authority can be delegated to the person in charge of actually running the interest group. The authority can be withdrawn when the interest group is wound up, or whenever it is necessitated earlier. Such authority can be delegated or withdrawn in agreement with the recipient(s) of the authority, or independently of the recipient(s).
It is therefore an object of the present invention to provide computer software which supports real-time collaboration of multiple participants, each having shared and independent views of the shared workspace.
According to the invention, there is provided effective real-time synchronous collaboration among possibly widely dispersed participants by making a multiplicity of different views of the shared workspace available to individual participants. Multiple views per participant are provided. Some of the views seen by a participant can be shared views with the usual common cursor and annotation tools. The shared views need not be homogeneous, which means that for a given view, each participant can see more than just some common data in his or window for the view. What the participant sees separately from the common data can make his or her shared view different from that of other participants. Of course, the participant's view can be different due to a syntactically different display of data, but more fundamentally, the view can be different due to different data being exposed in the view. Some of the views seen by a participant can be independent views. This allows to the participant synchronous working with the shared workspace alone on his or her own. Participants can modify the workspace through their views in a synchronized manner provided the sharing and access rights of their views allow them to do so.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
FIG. 1 is an illustration of the prior art in which a plurality of participants work synchronously in a shared workspace;
FIG. 2 is an illustration of a synchronous collaboration in which the participants have both shared and independent windows according to the invention;
FIG. 3 is an illustration of the process of sending a modification made by a client for serialization.
FIG. 4 is an illustration of how serialized modifications are processed by a client.
FIG. 5 is an illustration that describes the processing of a serialized modification for changing interest groups by a client.
FIG. 6A is an illustration that describes the processing of alignment among views by clients.
FIG. 6B is an illustration processing a serialized modification for overlaying alignment.
FIG. 7 is an illustration of processing effects of a serialized modification on user interface including a common region in heterogeneous views, bookmarks, and status of views.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
The invention is a real-time collaboration system that builds on conventional technology available for application-sharing-based, real-time-collaboration systems. Conventional technology for any application-sharing-based, real-time-collaboration system is generally comprised of:
1. A means for generating a set of frontend processes (clients) for any session of real-time collaboration supported by the system. In any such session, the session's clients provide synchronous access to the session's shared workspace to the participants of the session. The client processes rely on the single-user, non collaborative, software application that is ordinarily used to access the workspace in a natural (i.e., sequential, isolated, non collaborative) manner. Each client may support one or more different kinds of workspaces. The real-time-collaboration system may generate more than one kind of a client. Thus, the set of workspace kinds supported by the collaboration system is the union of the sets of workspace kinds supported by all the different kinds of clients generated by the system. When any client makes a shared workspace available to a participant, then it can make the workspace accessible through a window running the software application that is natural to the workspace.
2. A means for generating a serializing mechanism for any real-time-collaboration session supported by the system. From each client of any such collaboration session, the session's serializing mechanism takes as input a sequence of workspace modifications generated by the client. To all clients in the collaboration session, the serializing mechanism makes available one stream of serialized workspace modifications based on the input modification sequences received from the clients. The serialized modification stream comprises an interleaving of the sequences of modifications sent by the clients. The serializing mechanism can be server based, say, centralized-server based, or it can be based on peer-to-peer messaging.
3. A means for generating a communication mechanism for any real-time-collaboration session supported by the system. For any such session, each client in the session is provided with a means for communicating a sequence of modifications to the serializing mechanism of the session. The client is also provided a means for receiving serialized modifications from the serializing mechanism.
Any client as described in I above can support the formation of a modification by any participant using the client. The modification formation occurs in the context of a workspace state that can change while the modification is being formed. This can happen due to the arrival of a serialized modification. The client presents a reasonably up-to-date view of the workspace to the participant based on the serialized modifications received by the client. In modification formation, the client can let the participant see the potential effect of his modification on the workspace while the modification is in formation. The effect may not be the effect that is finally generated by the modification because unseen serialized modifications can end up preceding the modification in the serialized stream of modifications.
Our invention, a real-time collaboration system, builds on the conventional technology above by developing further the technology for clients (see 1 above). The invention supports the display of multiple views by each client. The views displayed by one client can differ from the views displayed by another client. In modifying a workspace, a view provides a context for modification, just as a file pointer does in modifying a file. Each client in our system maintains a separate copy of the synchronous workspace. The copies of the workspace, one per client, are kept in synchrony by ensuring that the initial copies of the workspace, prior to collaboration, are the same, and that the stream of serialized modifications for each workspace copy is the same. Each modification in our system is tagged by the identity of the view in which the modification was created. When a client receives the modification in the stream of serialized modifications, the client uses the tag to identify the context in which the modification changes the client's copy of the synchronous workspace. The context, just like a file pointer, is needed in order for the modification to be incorporated in the client's workspace copy. Each client thus maintains all possible contexts that can be identified by serialized modifications. Since serialized modifications can be generated by views not displayed by the client, the client may have to keep contexts corresponding to views displayed by other clients also and not just those for views displayed by itself.
Shared state corresponding to view contexts, interest groups and collaboration status is also maintained as a separate copy in each client. Synchrony among such state copies is maintained in a manner analogous to workspace copies by modifying the state copies only through the use of serialized modifications. An interest group is a set of clients, which can be implemented as a list of client identities. Each view has associated with itself exactly one interest group. The view is shared (e.g., displayed, modified through the view) by only the members of the interest group. Interest groups can be created, discontinued, changed, or made impervious to change by serialized modifications. The view associated with an interest group is changed in accordance and in synchrony with the interest group. Thus, when a member is added to an interest group, then the member also starts sharing any views associated with the interest group, when a member is removed from an interest group, then the member also stops sharing any views associated with the interest group, etc. While any view exists only in concurrence with an associated interest group, an interest group can exist without any views associated with it. Such as interest group can be changed using serialized modifications without affecting any view in the process. A view can be associated with an interest group or disassociated from an interest group dynamically by using a serialized modification. If a view is disassociated from an interest group and not associated with another interest group by the same serialized modification, then the view gets deleted by the serialized modification. A view can be created or deleted dynamically by a serialized modification. The creation of a view requires the identification of an associated interest group. Either the interest group can be in existence prior to the processing of the serialized modification which creates the view, or it has to be created by the serialized modification itself. When a view is deleted, then either the interest group associated with the view is also deleted, or the interest group is not deleted. The choice is specified as a part of the serialized modification that deletes the view. If a view is deleted along with the interest group associated with the view, then all the other views associated with the interest group also get deleted at the same time. The authorization to force an interest group deletion may not be present with a serialized modification (see also, discussion later). In this case, if the serialized modification aims at a view deletion along with an interest group deletion, then the serialized modification can only effect view deletion at most.
The entire copy of shared state corresponding to interest group and collaboration status, etc. available with a client is not made available by the client to the user(s) accessing the client. This is because interest groups support the declaration of anonymity and invisibility by their members. When an interest group is declared to be anonymous by its members, then its membership is not allowed to be displayed by clients that are not a part of the interest group. In other words, users who do not belong to an anonymous interest group are not to be told by their clients about the identity of those belonging to the interest group. When an interest group is declared to be invisible by its members, then even the existence of the interest group (e.g., status) is not allowed to be displayed by clients which are not a part of the interest group. An invisible interest group is also called an unknown interest group.
An independent view is an unknown shared view associated with an interest group which has an unchanging membership of one client only. Independent views have special support for their creation, deletion and manipulation defined in the user interface (see later) for our real-time-collaboration system. Such special support includes buttons, icons and keyboard input that enables an independent view to be handled as an entity in itself, instead of dealing with the view in terms of its definition as a certain unknown view at every time. The special support in effect provides macros or short forms for dealing with independent views. The interface also displays the status of an independent view in a separate manner in its client.
A modification tagged by a heterogeneous view also carries as part of its tag the identity of the client which generates the modification. Since a heterogeneous view varies from client to client, the identification of the context of a modification generated in a heterogeneous view can be carried out by identifying the client along with the heterogeneous view for the modification. For a homogeneous view, there is no need to tag a modification with the identity of the client from which the modification originates.
Our collaboration system supports various ways of aligning views. One way of aligning two views is to make the views overlap each other. Either view can be made to overlap with the other, say the beginning of one of the views is made to be the same as the beginning of the other, by use of a “GOTO” command. The “GOTO” command creates a modification, which after it is processed as a serialized modification by a client, makes the client overlap the view indicated in the command. A simple way of making views overlap that is relatively workspace independent is to compare bitmap or other images of the views, moving one view until it coincides with the other.
Another kind of alignment among views supported by our collaboration system is to use one view to start off another view of the workspace. At least initially, the beginning of the new view coincides with the beginning of the view starting it off. A simple way of implementing such start off is to reuse support for the “GOTO” command, by packing a “GOTO” command in the view creation modification, whereby the newly-created view is made to overlap with the view starting it off.
One view can be overlaid on top of another by which the overlaid view is made to coincide with the other view (say the beginnings of the views will coincide). The other view is called the lead view. Shifts in the lead view, e.g., scrolling, are reflected in the overlaid view identically until the overlaying is turned off. The turning on of overlaying is packed in a modification. Similarly, turning off of overlaying is packed in a modification. Serialized modifications processed by a client in between a serialized modification that only turns overlaying on and a serialized modification that only turns overlaying off such that no other conflicting, serialized overlaying on/off modification intervenes between the two are processed in a manner in which the client does not end up losing the alignment between the overlaid view and the lead view. Assuming that both the lead view and overlaid view remains defined (e.g., undeleted) during this time, this processing is equivalent in functionality to the following transform: For each serialized modification between the serialized overlaying-on modification and the serialized overlaying-off modification, a “GOTO” command modification is inserted adjacent to and after the serialized modification in the serialized stream of modifications wherein each “GOTO” command modification makes the overlaid view overlap with the lead view.
Our collaboration system supports specific sharing and access rights for each client. For any client, the rights can be different for each of the workspace views available to it. The access rights include read only, and read and write. Sharing rights of a client for a view or interest group indicate which clients, including itself, the client can add or remove from the view or interest group by sending modifications for the purpose. When a client has only read right to a shared view, then the client cannot modify the workspace through that view. At most, the client can be used to pass comments to others by manipulating the shared cursor and/or by selecting the data contained in the view. Selected data, if any, is highlighted as usual in every client sharing the view and the data after the client receives serialized modifications for highlighting data. Access and sharing rights of any client can be defined/changed on an individual view or interest group basis or a multiple view or interest group basis using serialized modifications. For a client, the rights can be changed in agreement with the client or independently of the client. The authority to change the access rights of others can be vested in a subset of the clients. This subset can be changed dynamically using serialized modifications. For example, in the case of an interest group, the authority can be delegated to the client in charge of actually running the interest group. The authority can be withdrawn when the interest group is wound up, or whenever it is necessitated, earlier. Such authority can be delegated or withdrawn in agreement with the recipient(s) of the authority, or independently of the recipient(s).
The user interface for our collaboration system supports the presentation of each view shared by a client by a separate window for the view in the client. Each window can at most be based on a separate invocation or process instantiation of the software application natural to the non-collaborative use of the workspace. Modifications made through any such window have to be intercepted as usual and sent for serialization before they can be allowed to modify the central client's copy of the shared workspace. The central copy of the workspace can be modified by only serialized modifications. A simple, comprehensive way of modifying the centralized workspace copy of a client according to a tagged serialized modification is to recreate and use the entire view identified by the tag in the client—create the window for the view in the client, and then modify the workspace using that window. For a view not shown in the client, such a window has to be kept out of the sight of the user of the client. Thus, for each serialized, tagged modification received by the client in its stream of serialized modification, the client can end up creating or retrieving from the background (foreground if the window is visible in the client) a window for the tag of the modification, updating the central workspace copy using the window and the modification, updating other shared state of the client such as interest groups, collaboration status, and view contexts, shutting down or putting in the background or elsewhere, the window for the modification, and then refreshing all windows for views visible in the client.
For heterogeneous views, the user interface includes the option of delineating the common data in the view. This can be done by selecting the common region in the view, or by drawing a bounding polygon along the perimeter of the common region by manipulating the image for the common region. The user interface supports the presentation of any view as a bookmark in a client, wherein the bookmark can be an icon for the window containing the view. The bookmark can use standard iconifying procedures used in the windowing system available to the collaboration system. Multiple bookmarks can be identified as sharing one window. In this case, all the bookmarks remain as icons with at most only one exception at any time. The exception can be available as a window at that time. When another bookmark is identified to be seen as a window, the exception is returned to an icon state in order for the other bookmark to be opened up as a window. The status of collaboration and other shared state visible in a client can be displayed on a status display bar in the client. Control of the user interface and the rest of the collaboration system including user input for workspace modifications can take the form of keyboard input, control input sequences, events over buttons, icons and graphical objects, etc.
Referring now to the drawings, and more particularly to FIG. 1, there is shown a prior art representation of a synchronous collaboration designed to cater to concurrent users and agents. The shared workspace 10 may be a document, spreadsheet, slide show, drawing, or the like. The participants may be using a variety of computers, such as a personal computer (PC) 12, a workstation 14 or a laptop computer 16. The computers may be interconnected by an intranet, such as a local area network (LAN) or wide area network (WAN), or the Internet or a combination of intranet and the Internet. For example, the PC 12 and the workstation 14 might be connected to an intranet while the laptop computer 16 is connected through the Internet.
Whatever the workspace 10, the participants in the collaborative work have a homogeneous shared view of the workspace. The shared view is represented as 121 on the screen of the PC 12, as 141 on the screen of the workstation 14 and as 161 on the screen of the laptop computer 16. The shared view is derived from the same data in the workspace, here designated as 101. This shared view of the workspace can both be seen and modified by the several collaborators, simultaneously. This is made possible by available synchronous collaboration tools such as chat programs and concurrent whiteboards which operate on text files and bitmap images, respectively.
The present invention provides a means for carrying out synchronous collaboration in which collaboration participants are individually allowed a variety of views of their shared workspace. In this invention, as generally illustrated in FIG. 2, participants of a collaboration can choose to have any number of independent and/or shared views of a shared workspace.
FIG. 2 shows the same general arrangement as in FIG. 1 in which the screens of the several computers have a heterogeneous shared view window 121, 141 and 161, all including the same data 101 of the workspace 10 as before. In this case, however, the window 161 of the laptop computer displays an extra region which presents data 102 contiguous with data 101. In the case illustrated, the data 102 precedes data 101 so, for example, if the workspace 10 is a text document, the data 102 displayed in region 162 would be text that immediately precedes the common text in window 161. Also, the screen of the PC 12 has a separate, independent window 123 which displays data 103 from the shared workspace 10. This data, however, is riot displayed on any other screen of the computers of the several participants.
Thus, in FIG. 2, each individual participant sees a shared view of the workspace in a separate window 121, 141 and 161. However, unlike the prior art illustrated in FIG. 1, this shared view is seen by participants in a heterogeneous manner. Homogeneous views are supported in a homogeneous presentation, each participant sees the same portion of the workspace that other participants see, as in the prior art. The display characteristics (e.g., scale, font syntax, etc.), can be different, but the data exposed in each participant's window is the same. In a heterogeneous presentation, each participant sees some data that is required to be common for all participants. In addition, each participant can also see data that is not required to be common for all participants. The data that is required to be common can be delineated from other data by, for example, a surrounding bounding box. Thus, for example, viewers can be sharing a text document in which the common data everyone is looking at is a paragraph. Some viewers can be seeing just the paragraph in their shared windows as represented in FIG. 2, for example, by the workstation 14. Some viewers can be seeing the paragraph and some text lying below it. Some viewers can be seeing the paragraph and text above it as represented in FIG. 2, for example, by the laptop computer 16.
FIG. 3 shows the process of sending of modifications by a client for serialization. A modification from some view is obtained in function block 18, and a determination is made whether the view is heterogeneous in decision block 20. If so, the modification is tagged with view identity and client identity in function block 26, and the modification is sent for serialization in function block 24. If the view is not heterogeneous, as determined in decision block 20, the modification is tagged with the view identity in function block 22, and then sent for serialization in function block 24.
FIG. 4 shows how serialized modifications are processed by a client. A serialized, tagged modification is received in function block 28. The view context is brought up as identified by the tag of the modification in function block 30. The context is kept invisible if the view is not one of those displayed by the client in function block 30. A test is made to determine whether the modification affects the workspace in decision block 32. If yes, then the client's workspace is modified using the view context in function block 44. Then, or if the test in decision block 32 had yielded no, a test is made to determine whether the modification affects interest groups in decision block 34. If yes, the client's copy of the state of interest groups is modified using the view context in function block 46. Then, or if the test in decision block 34 had yielded no, a test is made to determine whether the modification involves view alignment in decision block 36. If yes, then the process modification is processed for view alignment using the view context in function block 48. Then, or if the test in decision block 36 had yielded no, other effects of modification are processed in function block 38 on the client's copy of the shared state, including access and sharing rights, collaboration status, and user interface. The view context for the modification is put away in function block 42. The clients' views are then refreshed in function block 40.
FIG. 5 shows the processing of a serialized modification for changing interest groups by a client. An unprocessed interest group affected by the modification is identified in function block 50. In accordance with the modification and existing state, the interest group gets created, deleted, has its membership changed, or gets modified so that it disallows changes in its membership in function block 52. Views associated with the interest group are then modified in function block 54 corresponding to changes in the interest group such as changed membership, etc. Next, views are associated or disassociated with the interest group, in accordance with the modification and current state of the interest group in function block 56. In function block 58, views associated in function block 56 are displayed, and existing displays of views associated in function block 56 are deleted. A test is made in decision block 60 to determine if any more interest groups are affected by the modification. If yes, then the process starts over at function block 50. If no, the process returns at 62.
FIG. 6A shows how a “GOTO” command is processed. A “GOTO” command to be processed is obtained in function block 64. The view that has to go to another view and its new starting position (e.g., the beginning of the next view) is identified in function block 66. The images of both views are compared, and the view which has to be shifted so that it overlaps with the other view is moved in function block 68.
FIG. 6B shows how a serialized modification is processed for overlaying. A serialized modification to be processed for view alignment is obtained in function block 70. A determination of whether any pair of views with overlaying on such that the modification affects either of the views and the overlaying has not been processed is made in decision block 72. If the determination is yes, then for the pair of views, a “GOTO” command is processed of the overlaid view to the lead view in function block 74. Then the process loops back to make another determination in decision block 72. If the determination is no, then the process returns at 76.
FIG. 7 shows the processing of effects of a serialized modification on the user interface-on the common region in heterogeneous views, bookmarks, and states of views. A determination is made in decision block 78 as to whether the modification affects delineation of a common region of any heterogeneous views in the client. Only if the determination is yes, then for every affected view, in accordance with the modification, the common region is delineated, or delineation of the common region is stopped in function block 86. Next, a test is made in decision block 80 as to whether the modification causes the conversion of any client window to a bookmark. Only if the test yields yes, then every affected window is iconified in function block 88. A test is then made in decision block 82 as to whether the modification causes the conversion of any bookmark to a window. Only if the test yields yes, then every affected bookmark is deiconified in function block 90. A test is then made in decision block 84 as to whether the modification affects the display status of any view. Only if the test yields yes, then the status of every modified view is displayed on the display bar in function block 92. The status of independent views is not displayed unless they are specific to the client in function block 92. The process then returns at 94.
While the invention has been described in terms of a single preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.
Having thus described our invention, what we claim as new and desire to secure by Letters Patent is as follows:
1. A computer implemented process which provides a synchronous, real-time collaboration environment in which multiple and possibly independent views of a common workspace are allowed to each participant, said process comprising the steps of: establishing a set of clients for any session of real-time collaboration, wherein said clients provide synchronous access to a shared workspace of said session, support one or more said workspaces, and make one or more synchronous views of said shared workspace available to individual participants; verifying that initial copies of said workspace for each said client prior to collaboration are the same; serializing workspace modifications generated by said clients, wherein each said workspace modification is tagged by the identity of a view associated with a client interest group including a said individual participant in which said workspace modification was created and serialization is based on input modification sequences received from said clients; communicating to said clients said serialized workspace modifications, including client interest group status; updating each said client's shared workspace, wherein each said client's said workspace is a synchronous copy; and ensuring that the stream of serialized modifications for each said workspace copy is the same.
2. A method according to claim 1, which further comprises dynamically creating and deleting said views.
3. A method according to claim 1, which further comprises dynamically creating and discontinuing one or more said client interest groups, each said interest group being a subset of all said clients in said session.
4. A method according to claim 3, which further comprises dynamically adding said clients to and deleting said clients from said interest group.
5. A method according to claim 3, which further comprises blocking the addition and deletion of any said client to said interest group.
6. A method according to claim 3, which further comprises enabling membership of said interest group to remain anonymous to other said clients that are not members of said interest group.
7. A method according to claim 3, which further comprises enabling said interest group to remain unknown to other said clients that are not members of said interest group.
8. A method according to claim 3, which further comprises associating each said view with a said interest group.
9. A method according to claim 3, which further comprises enabling only one said client to belong to said interest group for the duration of said interest group.
10. A method according to claim 1, which further comprises enabling each said view for each client to contain data common to all said clients sharing the view and client-specific data.
11. A method according to claim 1, which further comprises enabling any of said views to contain the same data for all said clients that are viewing said view.
12. A method according to claim 10, which further comprises enabling each said client to align their views, by using a goto or equivalent command, from one view to another, or by overlaying one view on another.
13. A method according to claim 1, which further comprises enabling one said view to overlap with an other said view, such that when one said view is overlaid on another said view, said overlaid view follows and coincides with said view over which it is overlaid.
14. A method according to claim 2, which further comprises utilizing an existing said view as the initial position for a newly-created view.
15. A method according to claim 1, which further comprises providing specific sharing and access rights for each said view and/or interest group of each said client, said specific access rights including read-only, and read and write, said specific sharing rights including ability to add or remove any client from any said interest group.
16. A method according to claim 15, which further comprises enabling said access rights to be statically or dynamically defined or changed on an individual view basis.
17. A method according to claim 15, which further comprises enabling said sharing and said access rights to be statically or dynamically defined or changed on a multiple view and/or interest group basis.
18. A method according to claim 16, which further comprises enabling said access rights for a particular said client to be changed by said particular client, or independently of said particular client.
19. A method according to claim 17, which further comprises enabling said sharing and said access rights for a particular said client to be changed by said particular client, or independently of said particular client.
20. A method according to claim 16, which further comprises enabling a subset of said clients to change said sharing and said access rights.
21. A method according to claim 17, which further comprises enabling a subset of said clients to change said sharing and said access rights.
22. A method according to claim 20, which further comprises enabling said subset of said clients to change dynamically.
23. A method according to claim 21, which further comprises enabling said subset of said clients to change dynamically.
24. A method according to claim 10, which further comprises enabling said clients to view each said view separately.
25. A method according to claim 11, which further comprises enabling said clients to view each said view separately.
26. A method according to claim 10, which further comprises enabling said clients to explicitly delineate said common data.
27. A method according to claim 25, which further comprises enabling said clients to store said views as a bookmark associated with each said view.
28. A method according to claim 27, which further comprises enabling said clients to view said stored view by selecting a bookmark associated with said view.
29. A method according to claim 28, which further comprises enabling several said bookmarks to share a window such that only one said bookmark can be presented as its expanded view through the window at any time.
|
We study the conditions of amplitude death in a network of delay-coupled
limit cycle oscillators by including time-varying delay in the coupling and
self-feedback. By generalizing the master stability function formalism to
include variable-delay connections with high-frequency delay modulations (i.e.,
the distributed-delay limit), we analyze the regimes of amplitude death in a
ring network of Stuart-Landau oscillators and demonstrate the superiority of
the proposed method with respect to the constant delay case. The possibility of
stabilizing the steady state is restricted by the odd-number property of the
local node dynamics independently of the network topology and the coupling
parameters.
|
import React, { Component } from 'react'
import axios from 'axios'
import Size240 from '../OnGoing/Size240'
import Size360 from '../OnGoing/Size360'
import Size480 from '../OnGoing/Size480'
import Size720 from '../OnGoing/Size720'
import {withRouter} from 'react-router-dom'
class DetailOnGoing extends Component {
source = axios.CancelToken.source();
_isMounted = false;
constructor(props){
super(props)
this.state = {
anime_id : '',
name : '',
image : '',
image_detail : '',
description : '',
genre : '',
rating : '',
studio : '',
size : '240',
genre_anime : ["Action",
"Romance",
"Comedy",
"Adventure",
"Drama",
"Slice_Of_Life",
"Fantasy",
"Supernatural",
"Horor",
"Mystery",
"Psychological",
"Sci_Fi",
"Mecha",
"Harem",
"Reverse_Harem",
"Isekai",
"Reverse_Isekai",
"Demons",
"Game",
"Ecchi",
"Historical",
"Kids",
"Martial_Art",
"Josei",
"Cyberpunk",
"Post_Apocalyptic",
"Police",
"Parody",
"Music",
"School",
"Super_Power",
"Space",
"Shounen",
"Shoujo",
"Seinen",
"Sports",
"Tragedy",
"Vampire",
"Yaoi",
"Yuri",
"Magic",
"Military"
],
status_genre : [],
check_genre : 0
}
}
componentDidMount(){
this._isMounted = true;
var anime_id = this.props.anime_id;
var name = this.props.name;
if(this._isMounted){
this.check_genre(anime_id)
axios({
method : 'GET',
url : `http://localhost:5000/ongoing/check_detail_ongoing/${anime_id}/${name}`,
cancelToken : this.source.token,
})
.then(response => {
console.log(response.data)
this.setState({
anime_id : response.data.anime_id,
name : response.data.name,
image : response.data.image,
image_detail : response.data.image_detail,
description : response.data.description,
genre : response.data.genre,
rating : response.data.rating,
studio : response.data.studio
})
})
.catch(error => {
console.log(error)
})
}
}
componentWillUnmount(){
this.source.cancel();
this._isMounted = false;
}
handle240 = () => {
this.setState({
size : '240'
})
}
handle360 = () => {
this.setState({
size : '360'
})
}
handle480 = () => {
this.setState({
size : '480'
})
}
handle720 = () => {
this.setState({
size : '720'
})
}
fileSelectedHandler_image = (e) => {
const data = {
image : this.state.image
}
const data_image = new FormData()
data_image.append('image',e.target.files[0])
axios({
method : 'POST',
url : `http://localhost:5000/anime/delete_image`,
data : data,
cancelToken : this.source.token
})
.then(response => {
this.handleChange_image(data_image)
})
.catch(error => {
console.log(error)
})
}
handleChange_image = (data_image) => {
var anime_id = this.props.match.params.anime_id;
axios({
method : 'PUT',
url : `http://localhost:5000/anime/update_list_of_anime/${anime_id}`,
data : data_image,
cancelToken : this.source.token
})
.then(response => {
this.setState({
image : response.data.image
})
})
.catch(error => {
console.log(error)
})
}
fileSelectedHandler_image_detail = (e) => {
const data = {
image_detail : this.state.image_detail
}
const data_image = new FormData()
data_image.append('image_detail',e.target.files[0])
axios({
method : 'POST',
url : `http://localhost:5000/anime/delete_image_detail`,
data : data,
cancelToken : this.source.token
})
.then(response => {
this.handleChange_image_detail(data_image)
})
.catch(error => {
console.log(error)
})
}
handleChange_image_detail = (data_image) => {
var anime_id = this.props.match.params.anime_id;
axios({
method : 'PUT',
url : `http://localhost:5000/anime/update_list_of_anime/${anime_id}`,
data : data_image,
cancelToken : this.source.token
})
.then(response => {
this.setState({
image_detail : response.data.image_detail
})
})
.catch(error => {
console.log(error)
})
}
check_genre = (anime_id) => {
axios({
method : 'GET',
url : `http://localhost:5000/genre/check_genre/${anime_id}`,
cancelToken : this.source.token
})
.then(response => {
console.log(response.data)
if(response.data){
var newItem = [
response.data.action,
response.data.romance,
response.data.comedy,
response.data.adventure,
response.data.drama,
response.data.slice_of_life,
response.data.fantasy,
response.data.supernatural,
response.data.horor,
response.data.mystery,
response.data.psychological,
response.data.sci_fi,
response.data.mecha,
response.data.harem,
response.data.reverse_harem,
response.data.isekai,
response.data.reverse_isekai,
response.data.demons,
response.data.game,
response.data.ecchi,
response.data.historical,
response.data.kids,
response.data.martial_art,
response.data.josei,
response.data.cyberpunk,
response.data.post_apocalyptic,
response.data.police,
response.data.parody,
response.data.music,
response.data.super_power,
response.data.school,
response.data.space,
response.data.shounen,
response.data.shoujo,
response.data.seinen,
response.data.sports,
response.data.tragedy,
response.data.vampire,
response.data.yaoi,
response.data.yuri,
response.data.magic,
response.data.military,
]
this.setState({
status_genre : newItem,
check_genre : 1
})
}else{
this.setState({
check_genre : 0
})
}
})
.catch(error => {
console.log(error)
})
}
handleChangeGenre = (list) => {
var anime_id = this.state.anime_id;
var e = document.getElementById(list);
var strUser = e.options[e.selectedIndex].value;
console.log(list,strUser)
axios({
method : 'PUT',
url : `http://localhost:5000/genre/update_genre/${list}/${strUser}/${anime_id}`,
})
.then(response => {
console.log(response)
})
.catch(error => {
console.log(error)
})
}
handleAddGenre = () => {
var anime_id = this.state.anime_id;
axios({
method : 'POST',
url : `http://localhost:5000/genre/add_genre/${anime_id}`,
cancelToken : this.source.token,
})
.then(response => {
this.setState({
check_genre : 1
})
})
.catch(error => {
console.log(error)
})
}
handleUpdate = () => {
var anime_id = this.state.anime_id;
var name = document.getElementById("name").value;
var description = document.getElementById("description").value;
var genre = document.getElementById("genre").value;
var rating = document.getElementById("rating").value;
var studio = document.getElementById("studio").value;
const data = new FormData()
data.append('name',name)
data.append('description',description)
data.append('genre',genre)
data.append('rating',rating)
data.append('studio',studio)
axios({
method : 'PUT',
url : `http://localhost:5000/anime/update_list_of_anime/${anime_id}`,
data : data,
cancelToken : this.source.token
})
.then(response => {
this.props.history.push(`/detail_on_going/${anime_id}/${name}`)
})
.catch(error => {
console.log(error)
})
}
render() {
console.log(this.state.check_genre)
const {name,image,image_detail,description,genre,rating,studio,genre_anime,status_genre} = this.state;
const ViewSize = () => {
if(this.state.size === "240"){
return <Size240 anime_id = {this.state.anime_id} name = {this.state.name}/>
}else if(this.state.size === "360"){
return <Size360 anime_id = {this.state.anime_id} name = {this.state.name}/>
}else if(this.state.size === "480"){
return <Size480 anime_id = {this.state.anime_id} name = {this.state.name}/>
}else if(this.state.size === "720"){
return <Size720 anime_id = {this.state.anime_id} name = {this.state.name}/>
}
}
const mapGenre = genre_anime.map((list,index) => {
return <div className="col-3 mt-1 mb-1" key = {index}>
<div className = "row">
<div className = "col">
<label htmlFor="genre">{list}</label>
</div>
<div className = "col">
<select id = {list.toLowerCase()} className="form-control" onChange = {()=>this.handleChangeGenre(list.toLowerCase())}>
<option disabled>Status</option>
{
status_genre[index] ?
<React.Fragment>
<option value = "1" selected>Ya</option>
<option value = "0">Tidak</option>
</React.Fragment>
:
<React.Fragment>
<option value = "1" >Ya</option>
<option value = "0"selected>Tidak</option>
</React.Fragment>
}
</select>
</div>
</div>
</div>
})
return (
<div className = "container-fluid" style = {{marginTop : '70px'}}>
<div className = "row">
<div className = "col-12">
<h1 className = "bg bg-warning" style = {{textAlign : 'center'}}>ON GOING ANIME</h1>
</div>
{/* Data - Data Detail Anime */}
<div className = "col-12">
<div className = "row">
<div className = "col-2" style = {{textAlign : 'center'}}>
<h1>Cover</h1>
<img src = {this.state.image ? `http://localhost:5000/images/${image}` : null} alt = {image} style = {{height : '300px',width : '100%'}}/>
<input className = "mt-2 mb-2" type = "file" id = "image" onChange = {this.fileSelectedHandler_image}/>
</div>
<div className = "col-4" style = {{textAlign : 'center'}}>
<h1>Detail</h1>
<img src = {this.state.image ? `http://localhost:5000/images/${image_detail}` : null} alt = {image_detail} style = {{height : '300px',width : '100%'}}/>
<input className = "mt-2 mb-2" type = "file" id = "image_detail" onChange = {this.fileSelectedHandler_image_detail}/>
</div>
{/* Kriteria */}
<div className = "col-6" style = {{textAlign : 'left'}}>
<h1>Detail Anime</h1>
<table cellPadding = "5" style = {{width : '100%'}}>
<tbody>
<tr>
<th>Nama</th>
<td> : </td>
<td>
<input id = "name" type = "text" defaultValue = {name} className = "form-control"/>
</td>
</tr>
<tr>
<th>Deskripsi Anime</th>
<td> : </td>
<td>
<textarea id = "description" type = "text" rows = "3" defaultValue = {description} className = "form-control"/>
</td>
</tr>
<tr>
<th>Genre</th>
<td> : </td>
<td>
<input id = "genre" type = "text" defaultValue = {genre} className = "form-control"/>
</td>
</tr>
<tr>
<th>Rating</th>
<td> : </td>
<td>
<input id = "rating" type = "text" defaultValue = {rating} className = "form-control"/>
</td>
</tr>
<tr>
<th>Studio</th>
<td> : </td>
<td>
<input id = "studio" type = "text" defaultValue = {studio} className = "form-control"/>
</td>
</tr>
</tbody>
</table>
<button className = "btn btn-outline-success mx-auto" style = {{width : '100%'}} onClick = {this.handleUpdate}>Update Data</button>
</div>
</div>
</div>
<div className = "col-12">
<h1>Genre Anime</h1>
<div className="row">
{this.state.check_genre ? mapGenre :
<div className = "px-5 col-12">
<button className = "btn btn-outline-primary" style = {{width : '100%',height : '150px'}} onClick = {this.handleAddGenre}>Add Genre</button>
</div>
}
</div>
</div>
<div className = "col-12 mt-5">
<div className = "row">
<div className = "col-3 mx-auto">
<button className = "btn btn-primary" style = {{width : '100%'}} onClick = {this.handle240}>240p</button>
</div>
<div className = "col-3 mx-auto">
<button className = "btn btn-primary" style = {{width : '100%'}} onClick = {this.handle360}>360p</button>
</div>
<div className = "col-3 mx-auto">
<button className = "btn btn-primary" style = {{width : '100%'}} onClick = {this.handle480}>480p</button>
</div>
<div className = "col-3 mx-auto">
<button className = "btn btn-primary" style = {{width : '100%'}} onClick = {this.handle720}>720p</button>
</div>
</div>
</div>
</div>
<div className = "row">
<ViewSize/>
</div>
</div>
)
}
}
export default withRouter(DetailOnGoing)
|
Talk:Roding Valley tube station
The station today
The reference regarding the station of yesterday comes from me, as I travelled on the station to school and back. That's first hand local knowledge - I have no written evidence except that it came from my own eyes and memory. AsparagusTips (talk) 19:38, 22 October 2017 (UTC)
* In which case, it goes against both the policy on verifiability and the policy on original research. -- Red rose64 🌹 (talk) 20:23, 22 October 2017 (UTC)
|
# lleaves 🍃

[](https://lleaves.readthedocs.io/en/latest/?badge=latest)
[](https://pepy.tech/project/lleaves)
A LLVM-based compiler for LightGBM decision trees.
`lleaves` converts trained LightGBM models to optimized machine code, speeding-up prediction by ≥10x.
## Example
```python
lgbm_model = lightgbm.Booster(model_file="NYC_taxi/model.txt")
%timeit lgbm_model.predict(df)
# 12.77s
llvm_model = lleaves.Model(model_file="NYC_taxi/model.txt")
llvm_model.compile()
%timeit llvm_model.predict(df)
# 0.90s
```
## Why lleaves?
- Speed: Both low-latency single-row prediction and high-throughput batch-prediction.
- Drop-in replacement: The interface of `lleaves.Model` is a subset of `LightGBM.Booster`.
- Dependencies: `llvmlite` and `numpy`. LLVM comes statically linked.
## Installation
`conda install -c conda-forge lleaves` or `pip install lleaves` (Linux and MacOS only).
## Benchmarks
Ran on a dedicated Intel i7-4770 Haswell, 4 cores.
Stated runtime is the minimum over 20.000 runs.
### Dataset: [NYC-taxi](https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data.page)
mostly numerical features.
|batchsize | 1 | 10| 100 |
|---|---:|---:|---:|
|LightGBM | 52.31μs | 84.46μs | 441.15μs |
|ONNX Runtime| 11.00μs | 36.74μs | 190.87μs |
|Treelite | 28.03μs | 40.81μs | 94.14μs |
|``lleaves`` | 9.61μs | 14.06μs | 31.88μs |
### Dataset: [MTPL2](https://www.openml.org/d/41214)
mix of categorical and numerical features.
|batchsize | 10,000 | 100,000 | 678,000 |
|---|---:|---:|---:|
|LightGBM | 95.14ms | 992.47ms | 7034.65ms |
|ONNX Runtime | 38.83ms | 381.40ms | 2849.42ms |
|Treelite | 38.15ms | 414.15ms | 2854.10ms |
|``lleaves`` | 5.90ms | 56.96ms | 388.88ms |
## Advanced Usage
To avoid expensive recompilation, you can call `lleaves.Model.compile()` and pass a `cache=<filepath>` argument.
This will store an ELF (Linux) / Mach-O (macOS) file at the given path when the method is first called.
Subsequent calls of `compile(cache=<same filepath>)` will skip compilation and load the stored binary file instead.
For more info, see [docs](https://lleaves.readthedocs.io/en/latest/).
To eliminate any Python overhead during inference you can link against this generated binary.
For an example of how to do this see `benchmarks/c_bench/`.
The function signature might change between major versions.
## Development
High-level explanation of the inner workings of the lleaves compiler: [link](https://siboehm.com/articles/21/lleaves)
```bash
conda env create
conda activate lleaves
pip install -e .
pre-commit install
./benchmarks/data/setup_data.sh
pytest
```
Release:
```
git tag -a 1.0.0
git push origin 1.0.0
```
|
require 'spec_helper'
require 'rspec/bdd'
RSpec.feature 'Updating a kit' do
given(:client) { Typekit::Client.new(token: token) }
given(:kit) do
client::Kit.new(:kits, id: 'xxx', name: 'Megakit',
analytics: false, badge: true, domains: ['localhost'],
families: [{ id: 'vqgt', subset: 'all', variations: ['n4'] }])
end
options = { vcr: { cassette_name: 'update_kits_xxx_name_ok' } }
scenario 'Changing the name attribute via #save', options do
kit.name = 'Ultrakit'
kit.save!
expect(kit.name).to eq('Ultrakit')
end
scenario 'Changing the name attribute via #update', options do
kit.update!(name: 'Ultrakit')
expect(kit.name).to eq('Ultrakit')
end
options = { vcr: { cassette_name: 'update_kits_xxx_families_ok' } }
scenario 'Adding a new family', options do
kit.families << Typekit::Record::Family.new(id: 'gkmg')
kit.save!
expect(kit.families.length).to be 2
expect(kit.families.map(&:id)).to contain_exactly('gkmg', 'vqgt')
end
options = { vcr: {
cassette_name: 'show_families_yyy_update_kits_xxx_families_ok' } }
scenario 'Adding a family fetched earlier', options do
family = client::Family.find('gkmg')
expect(family).to be_complete
expect(family.libraries).not_to be_empty
expect(family.variations).not_to be_empty
kit.families << family
kit.save!
expect(kit.families.length).to be 2
expect(kit.families.map(&:id)).to contain_exactly('gkmg', 'vqgt')
end
options = { vcr: {
cassette_name: 'update_kits_xxx_families_variations_ok' } }
scenario 'Adding a new family with variations', options do
family = Typekit::Record::Family.new(id: 'gkmg')
expect { family.variations }.to raise_error(/Client is not specified/i)
family.variations = [Typekit::Record::Variation.new(id: 'n4')]
expect(kit.families).not_to be nil
kit.families << family
kit.save!
expect(kit.families.length).to be 2
expect(kit.families.map(&:id)).to contain_exactly('gkmg', 'vqgt')
i = kit.families[0].id == 'gkmg' ? 0 : 1
expect(kit.families[i].variations.map(&:id)).to eq(['n4'])
end
options = { vcr: {
cassette_name: 'update_kits_xxx_empty_families_ok' } }
scenario 'Deleting all families', options do
expect(kit.families.length).to be 1
family = kit.families.first
kit.families.delete(family)
kit.save!
expect(kit.families).to be_empty
end
end
|
<?php
declare(strict_types=1);
namespace Nip\MailModule\Console\Commands;
use Nip\Database\Query\Delete;
use Nip\Database\Result;
use Nip\MailModule\Tests\Fixtures\Models\Emails\Emails;
use Nip\Records\AbstractModels\RecordManager;
/**
* Class EmailsCleanupRecords.
*/
class EmailsCleanupRecords extends EmailsAbstract
{
/**
* @return bool|int
*/
public function handle()
{
$emailsManager = $this->emailsManager();
$types = $emailsManager::reduceEmailsByType();
$records = 0;
foreach ($types as $type => $days) {
$records += $this->deleteByType($emailsManager, $type, $days);
}
return $records;
}
/**
* @param int $days
*
* @return bool|int
*/
protected function deleteByType(RecordManager $emailsManager, string $type, $days)
{
$query = $this->deleteByTypeQuery($emailsManager, $type, $days);
$result = $query->execute();
if ($result instanceof Result && $result->isValid()) {
return $result->numRows();
}
return 0;
}
/**
* @param RecordManager $emailsManager
* @param string $type
* @param int $days
*
* @return Delete
*/
protected function deleteByTypeQuery($emailsManager, $type, $days)
{
/** @var Emails $emailsManager */
$query = $emailsManager->newDeleteQuery();
if (\is_string($type) && \strlen($type) > 1) {
$query->where('`type` = ?', $type);
}
$query->where(
'`' . $emailsManager::getSentDateField() . '` <= DATE_SUB(CURRENT_DATE(), INTERVAL ' . $days . ' DAY)'
);
$query->limit(500);
return $query;
}
}
|
Coffee-seed
__NOWYSIWYG__
This plant can be placed on a sunproduction plant to produce 100 sun.
Strategy
Use to force production on sunflowers, sun-shrooms, ETC
Suburban Almanac Entry
Coffee-Seed
Cost: 0
Recharge: Very Slow Normal
|
Long integer to 16 character Hex for Google Reader sync
Python Code
h = "%s"%("0000000000000000%x"%(i&0xffffffffffffffff))[16:]
I'd like to know how this would be done in PHP.
The application is for google reader syncronization.
An initial sync list comes with numeric values, but the actual article id hex.
Example Long Integer =<PHONE_NUMBER>044673995
Example Google Reader Article ID = tag:google.com,2005:reader/item/77f5953120daafcb
just to highlight that these ids are signed (there are negative ids) - just a head-up because I've seen some people having problems with this
sprintf("%016x",<PHONE_NUMBER>044673995);
|
Scorcher (rapper)
Tayó Grant Jarrett (born 5 April 1986), better known as Scorcher, is an English grime MC, songwriter and actor from Enfield, London. He was previously a member of the grime collective The Movement and is signed to Blue Colla Music.
2005–08: Early career
He began his career in Cold Blooded where he became known for his "shank" bars, and would regularly attend pirate radio and work his way up through the North London grime circuit. Scorcher served a short prison sentence in 2006 for driving offences, and while in jail his mixtape Simply the Best was released and was greeted with good reviews from the grime scene. After an incident with fellow Cold Blooded member Cookie, Scorcher left Cold Blooded to concentrate on a new collective known as The Movement, which featured Scorcher alongside Wretch 32, Devlin, Mercston, and Ghetts. At this point he was involved in a momentous clash that saw him and fellow movement members go up against rival grime collective Boy Better Know. Scorcher did three dubs directed at Wiley, Jammer and Frisco. Scorcher also produces beats, and Thunder Power was a release entirely his own production. He has produced beats such as 'Way Down The Road', 'Beef with T', 'Igloo Remix', 'Talk of the Ghetto' and others which have been big through the year of 2006. Scorcher won an Official Mixtape Award for best producer in 2009 and was also nominated for best Grime mixtape of 2010.
2009–10: Concrete Jungle and Geffen
Concrete Jungle is a 2009 debut album by Scorcher released independently. The album is seen as a critical success in electronic music, but a major disappointment to grime fans. The albums has spawned two singles, "I Know" and "Lipsin' Ting", neither of which charted. The albums has been widely anticipated by many in the grime scene, but disappointed many in the scene. It features collaborations with the likes of Wiley, J2K, and Wretch 32. The album was inspired by a short freestyle by Scorcher. The third single from the album is "Dark Knight". His debut single, "It's My Time", charted on the UK R&B chart at number 38. When Geffen's MD left for Sony and the bigger artist moved to other labels within Universal, Scorcher's deal was ended.
2011–2014: Blue Colla and acting career
In 2011, Scorcher began an acting career and played the major role of Kamale, in the 2011 Channel 4 drama, Top Boy. "Making the transition from music to acting hasn't really been that hard for me, as you get used to performing its just performance in a different setting." He described his character as sinister, and an all-out bad man and is working with other rappers such as Ashley Walters, Kano and other first time actors. He has also played a part in the movie Offender which was released on 24 December 2012. After being released from Geffen Records in 2011, Scorcher was signed to independent label Blue Colla Music in 2012 and his first single of the year "It's All Love" premiered on MistaJam's 1XTRA show on 3 March 2012.
2015–present: The Intent and return to music
In 2016, Scorcher signed to RU Listening Limited. He, Scorcher starred in the 2016 film The Intent in which he plays small-time criminal called Hoodz, who finds success in robbing stores and small businesses, and finally catches the jackpot by attacking a big drug dealer for his stash of money and drugs. He played the role of Diesel in the film Road (2017).
He returned to music in 2019 and released the singles "Gargoyle", "Could Be Worse", "9", "Sandpit" and was featured on the track "Hunnids" by Tizzy x Brandz. In October 2019 Scorcher attended the Christian Louboutin Palace Nights Collection Launch.
Studio albums
* 2009: Concrete Jungle
Mixtapes
* 2006: Simply The Best
* 2006: Tempo Specialists [w/The Movement]
* 2007: Leader of the New School
* 2007: Thunder Power
* 2008: Simply The Best 2
* 2010: Jungle Book
* 2011: Audio Wave
* 2012: Simply The Best 3
* 2014: 1 of 1
* 2016: Rocket x Scorcher EP [w/Rocket]
Film
* Offender (2012) - Essay
* The Intent (2016) - Hoodz
* Road (2017) - Diesel
* Mangrove (2020) - Linton
Television
* Top Boy (2011) - Kamale (season 1)
* You Don't Know Me (2021) - Spooks
Personal life
Following the Death of Mark Duggan by Police in 2011, which resulted in the 2011 England riots, Scorcher revealed via Twitter that his grandmother was Cynthia Jarret, a 49-year-old Afro-Caribbean woman who was killed by Police on 5 October 1985 during the search of her home. Together with the death of Cherry Groce the previous week (which caused the 1985 Brixton riot, her death is credited with being one of the main causes of the Broadwater Farm riot the following day.
* "[sic]25 years ago police killed my grandma in her house in Tottenham and the whole ends rioted, 25 years on and they're still keepin up fuckry. Police R here 2 uphold the law & protect us leadin by example so wen they stop upholdin the law its natural reaction 4 there 2 B lawlessness."
Scorcher is a supporter of Tottenham Hotspur F.C.
|
From NeuroLex
Jump to: navigation, search
Response inhibition
Name: Response inhibition
Description: Suppression of actions that are inappropriate in a given context and that interfere with goal-driven behavior.
Is part of: Executive control
Super-category: Executive function
*Id: nlx_145700
CAO_Id: CAO_00487
Contributor: Agatha Lenartowicz
Cognitive_Atlas_Link: http://www.cognitiveatlas.org/concept/Response_inhibition
Link to OWL / RDF: Download this content as OWL/RDF
Contributors
Ccdbuser, Yazin
*Note: Neurolex imports many terms and their ids from existing community ontologies, e.g., the Gene Ontology. Neurolex, however, is a dynamic site and any content beyond the identifier should not be presumed to reflect the content or views of the source ontology. Users should consult with the authoritative source for each ontology for current information.
Facts about Response inhibitionRDF feed
CAO IdCAO_00487 +
Cognitive Atlas Linkhttp://www.cognitiveatlas.org/concept/Response_inhibition +
ContributorReconsolidation" +
Created10 July 2009 14:06:00 +
CurationStatusuncurated +
DefinitionSuppression of actions that are inappropriate in a given context and that interfere with goal-driven behavior.
Idnlx_145700 +
Is part ofExecutive control +
LabelResponse inhibition +
ModifiedDate21 March 2015 +
SuperCategoryExecutive function +
|
Coverage is very slow on large projects
Describe the bug
Hello!
My tests run in good time, but the coverage report is very slow:
Test Files 134 passed (134)
Tests 572 passed (572)
Time 64.91s (in thread 435.65s, 14.90%)
________________________________________________________
Executed in 208.93 secs fish external
usr time 15.56 mins 0.00 micros 15.56 mins
sys time 0.66 mins 680.00 micros 0.66 mins
It took almost 3:30 minutes to finish.
Using jest with the V8 coverage provider:
Test Suites: 134 passed, 134 total
Tests: 574 passed, 574 total
Snapshots: 44 passed, 44 total
Time: 50.658 s
________________________________________________________
Executed in 51.76 secs fish external
usr time 717.91 secs 201.00 micros 717.91 secs
sys time 20.59 secs 142.00 micros 20.59 secs
The project has about 1600 source files.
Reproduction
I'm not sure how to provide a reproduction as I'm converting my company project to Vitest.
System Info
System:
OS: Linux 5.16 Fedora Linux 35 (Workstation Edition)
CPU: (16) x64 AMD Ryzen 7 5800X 8-Core Processor
Memory: 9.62 GB / 15.59 GB
Container: Yes
Shell: 3.3.1 - /usr/bin/fish
Binaries:
Node: 16.14.2 - ~/.local/share/pnpm/node
Yarn: 1.22.18 - ~/.local/share/pnpm/yarn
npm: 8.5.0 - ~/.local/share/pnpm/npm
Browsers:
Brave Browser: <IP_ADDRESS>
Firefox: 98.0
npmPackages:
@vitejs/plugin-react: 1.2.0 => 1.2.0
vite: 2.8.6 => 2.8.6
Used Package Manager
pnpm
Validations
[X] Follow our Code of Conduct
[X] Read the Contributing Guidelines.
[X] Read the docs.
[X] Check that there isn't already an issue that reports the same bug to avoid creating a duplicate.
[X] Check that this is a concrete bug. For Q&A open a GitHub Discussion or join our Discord Chat Server.
[X] The provided reproduction is a minimal reproducible example of the bug.
test-exclude which is used inside c8 was taking time with my project.
So I changed the config like below. Is it also effective for your project?
test: {
coverage: {
include: ['src/**/*'],
exclude: [],
}
}
Thanks, @sapphi-red! There was a significant performance improvement:
Before:
Tests: 64.91s
Coverage: 144.02s
After:
Tests: 66.37s
Coverage: 13.53s
As the difference was huge, I believe we should mention this issue in the documentation. What do you think?
@patak-dev we should document about configuring coverage on the vitest docs.
Improving performance of test-exclude is ideally. But IMO it is good to mention it in the document in the meantime.
We have a lot of exludes:
'coverage/**',
'packages/*/test{,s}/**',
'**/*.d.ts',
'cypress/**',
'test{,s}/**',
'test{,-*}.{js,cjs,mjs,ts,tsx,jsx}',
'**/*{.,-}test.{js,cjs,mjs,ts,tsx,jsx}',
'**/__tests__/**',
'**/{karma,rollup,webpack,vite,vitest,jest,ava,babel,nyc}.config.{js,cjs,mjs,ts}',
'**/.{eslint,mocha,prettier}rc.{js,cjs,yml}',
Maybe some of them could be removed?
Why does excluding takes so much time? It is counter-intuitive that adding to exclude is having this effect. Is it a c8 bug in the way this is handled?
Maybe one of these patterns is the issue? It could be interesting to try to remove each and check if that is the case.
I measured timings with the config below with my project.
test: {
coverage: {
all: true
}
}
bcoe/c8:/lib/report.js#L66-L78 was taking 37.878s. This is the total time for generating coverage.
bcoe/c8:/lib/report.js#L177-L184 was taking 33.341s.
Also bcoe/c8:/lib/report.js#L187-L219 was taking 3.658s.
Sum of these are 36.999s, so these two parts are taking almost all time.
After digging a bit more, I found caching this this.exclude.shouldInstrument(v8ScriptCov.url) call (bcoe/c8:/lib/report.js#L290) makes a huge improvement.
It dramastically reduced this part (bcoe/c8:/lib/report.js#L177-L184) to 2.545s (which was 33.341s).
I will create a PR to c8 for this.
But I feel it is possible to make it faster if test-exclude can be improved. (test-exclude seems not to be actively maintained.)
My PR was merged and released with c8 v7.11.2!
Much thanks, @sapphi-red! The performance is now fine with exclude:
Before:
Tests: 64.91s
Coverage: 144.02s
After:
Tests: 68.69s
Coverage: 12.87s
I think we can close the issue now, what do you think @patak-dev and @sapphi-red?
I think so.
|
Thread:<IP_ADDRESS>/@comment-22439-20160916223701
Hi! Welcome to and thank you for your edit or comment in the Vampire page!
Enjoy your time at !
Kind regards, Ulithemuli (talk) 22:37, September 16, 2016 (UTC)
P.S. this is an automated message! =)
|
error[E0658]: match is not allowed in a const fn
error[E0658]: match is not allowed in a const fn
-->/socket2-0.4.0/src/lib.rs:156:9
|
156 | / match address {
157 | | SocketAddr::V4() => Domain::IPV4,
158 | | SocketAddr::V6() => Domain::IPV6,
159 | | }
| |_________^
|
= note: see issue #49146 https://github.com/rust-lang/rust/issues/49146 for more information
Compiling time v0.1.43
error: aborting due to previous error
Socket2 v0.4 requires rustc v1.46.
Note: the readme speak about minimum supported version of rust.
For me that means that new version should works.
Except they doesn't:
can you consider making compatibility to new rust version a goal to v0.5 ?
@Thomasdezeeuw can you reopen ?
@tychota I think you're doing something wrong. socket2 rust on rustc 1.46 stable. Are you sure you're calling the same rustc?
P.S. could you also not use images of texts, it's very annoying to read.
@Thomasdezeeuw i will try to make a minimal example that reproduce and then report here.
My bad for the image, i will paste texte next time.
@tychota you're really running a different/incorrect rustc binary. Per the 1.46 blogpost: https://blog.rust-lang.org/2020/08/27/Rust-1.46.0.html#const-fn-improvements, match statements are const, which the error is about.
All clear. I indeed has an old rust binary somewhere.
Sorry for the noise.
|
Thread:<IP_ADDRESS>/@comment-22439-20130227162408
{| id="w" width="100%" style="background: transparent; "
Welcome, <IP_ADDRESS>!
* Please read our Manual of Style and other policies for guidelines on contributing.
* Internal pages:
* Things to cleanup
* Things to edit
* League of Legends Wiki's forum
* Forum:General Discussion
* Special Pages
* External Wikipedia pages:
* How to edit a page
* Contributing
* Editing, policy, conduct, and structure tutorial
* How to write a great article
* }
|
package net.yeputons.spbau.spring2016.torrent;
import java.io.IOException;
public class StateMemoryHolder<T> implements StateHolder<T> {
private final T state;
public StateMemoryHolder(T state) {
this.state = state;
}
@Override
public T getState() {
return state;
}
@Override
public void save() throws IOException {
}
}
|
#ifndef KDTREE_H_INCLUDED
#define KDTREE_H_INCLUDED
#define __OPENCL_HOST__
#include "Utilities.h"
#include "BBox.h"
#include <vector>
#include <iostream>
#undef __OPENCL_HOST__
using namespace std;
extern TriangleMesh* meshes;
extern int num_meshes;
extern Triangle* triangles;
extern int total_scene_tris;
extern float3* vertices;
extern KdNode* kdnodes;
extern int num_kdnodes;
extern int* kdsorted_tri_indices;
extern int num_kdsorted_tri_indices;
extern BBox scene_bbox;
inline
int GetTriangleID(int mesh_index, int tri_index) {
int id = 0;
for(int i = 0; i < mesh_index; i++) {
id += meshes[i].num_tris;
}
id += tri_index;
return id;
}
inline
void GetMeshAndTri(int id, int* mesh, int* tri) {
*mesh = 0; *tri = 0;
int tri_count = -1; //offset
for(int m = 0; m < num_meshes; m++) {
*mesh = m;
tri_count += meshes[m].num_tris;
if(tri_count == id) {
*tri = meshes[m].num_tris - 1;
return;
} else if(tri_count > id) {
*tri = id - (tri_count - (meshes[m].num_tris - 1));
return;
}
}
}
inline
BBox GetBBox(const Triangle& tri) {
BBox bbox = IdentityBBox();
bbox = Union(bbox, vertices[tri.vi[0]]);
bbox = Union(bbox, vertices[tri.vi[1]]);
bbox = Union(bbox, vertices[tri.vi[2]]);
return bbox;
}
inline
BBox GetSceneBBox() {
BBox root = IdentityBBox();
for(int i = 0; i < total_scene_tris; i++) {
root = Union(root, GetBBox(triangles[i]));
}
return root;
}
inline
void PrintKdTree() {
cout<<"--- [Printing Kd Tree] --- (NUM: "<<num_kdnodes<<")"<<endl;
for(int i = 0; i < num_kdnodes; i++) {
cout<<"ARRAY INDEX: "<<i<<endl;
if(kdnodes[i].is_leaf) {
cout<<"\tLEAF NODE"<<endl;
cout<<"\t\t("<<kdsorted_tri_indices[kdnodes[i].data[TRI_START_INDEX]];
int end_index = kdnodes[i].data[TRI_START_INDEX] + kdnodes[i].data[NUM_TRIS];
for(int j = kdnodes[i].data[TRI_START_INDEX] + 1; j < end_index; j++) {
cout<<", "<<kdsorted_tri_indices[j];
}
cout<<")"<<endl;
} else {
cout<<"\tINNER NODE"<<endl;
cout<<"\t\tLeft Child: "<<kdnodes[i].data[LEFT_CHILD]<<endl;
cout<<"\t\tRight Child: "<<kdnodes[i].data[RIGHT_CHILD]<<endl;
}
cout<<"\tSplit Axis "<<kdnodes[i].split_axis<<endl;
cout<<"\tSplit Posi "<<kdnodes[i].split_pos<<endl;
}
}
void BuildKdTree();
inline
void ResetKdTree() {
delete[] kdnodes;
kdnodes = NULL;
num_kdnodes = 0;
delete[] kdsorted_tri_indices;
kdsorted_tri_indices = NULL;;
num_kdsorted_tri_indices = 0;
}
#endif // KDTREE_H_INCLUDED
|
"""
Programmed by Randy Graham Junior.
ZenPaint, Just you and the colors.
"""
import pygame
import sys
import math
import json
with open("config.json", "r") as f:
jdata = json.loads(f.read())
SCREENSIZE = jdata["SCREENSIZE"]
pygame.init()
pygame.font.init()
if jdata["FULLSCREEN"] == "True":
screen = pygame.display.set_mode(SCREENSIZE, pygame.FULLSCREEN)
else:
screen = pygame.display.set_mode(SCREENSIZE)
TEXT = pygame.font.Font('freesansbold.ttf',30)
pygame.display.set_caption('ZenPaint v0.01')
def percentPos(x, y):
return SCREENSIZE[0] * (x/100), SCREENSIZE[1] * (y/100)
class button(object):
def __init__(self, posx, posy, sx, sy, text, color, highlight):
self.posx = posx
self.posy = posy
self.color = color
self.highlight = highlight
self.sx = sx
self.sy = sy
self.text = text
self.focused = False
self.surf = pygame.Surface((sx, sy))
temp = TEXT.render(text,True,(0,0,0))
self.text = pygame.transform.scale(temp, (self.sx, self.sy))
def show(self, dest):
to_render = pygame.Surface((self.sx, self.sy))
if self.focused:
self.surf.fill(self.highlight)
else:
self.surf.fill(self.color)
to_render.blit(self.surf, (0,0))
to_render.blit(self.text, (0,0))
dest.blit(to_render, (self.posx, self.posy))
def test(self, pos):
rect = pygame.Rect(self.posx, self.posy, self.sx, self.sy)
if rect.collidepoint(pos[0], pos[1]):
self.focused = True
return True
else:
self.focused = False
return False
class canvas(object):
def __init__(self, sx, sy):
self.sx = sx
self.sy = sy
self.to_do = []
self.actions = []
self.temp_store = []
self.surf = pygame.Surface((sx, sy))
self.surf.fill((0,0,0))
def update(self, posx, posy, color, brush_size):
self.temp_store.append([posx, posy, brush_size])
for x in range(0, brush_size):
for y in range(0, brush_size):
self.surf.set_at((int(posx-(brush_size/2)+x),int(posy-(brush_size/2)+y)), color)
def fl(self, x,y,t,r):
try:
n = self.surf.get_at((x,y))[:3]
except Exception:
return
if t == r:
return
if n[0] == t[0] and n[1] == t[1] and n[2] == t[2]:
pass
else:
return
self.surf.set_at((x,y), r)
self.to_do.append((x+1,y,t,r))
self.to_do.append((x-1,y,t,r))
self.to_do.append((x,y+1,t,r))
self.to_do.append((x,y-1,t,r))
return
def flood(self, posx, posy, color_t, color_r):
posx = int(posx)
posy = int(posy)
self.to_do = []
self.to_do.append((posx, posy, color_t, color_r))
"""
Flood-fill (node, target-color, replacement-color):
1. If target-color is equal to replacement-color, return.
2. If the color of node is not equal to target-color, return.
3. Set the color of node to replacement-color.
4. Perform Flood-fill (one step to the south of node, target-color, replacement-color).
Perform Flood-fill (one step to the north of node, target-color, replacement-color).
Perform Flood-fill (one step to the west of node, target-color, replacement-color).
Perform Flood-fill (one step to the east of node, target-color, replacement-color).
5. Return.
"""
while len(self.to_do) > 0:
self.fl(self.to_do[0][0],self.to_do[0][1],self.to_do[0][2],self.to_do[0][3])
del self.to_do[0]
def update_no_undo(self, posx, posy, brush_size):
for x in range(0, brush_size):
for y in range(0, brush_size):
self.surf.set_at((int(posx-(brush_size/2)+x),int(posy-(brush_size/2)+y)), (0,0,0))
def add_temp(self):
self.actions.append(self.temp_store)
self.temp_store = []
def show(self, surf, cam_rel):
surf.blit(self.surf, (cam_rel[0], cam_rel[1]))
def test(self, pos, cam_rel):
rect = pygame.Rect(cam_rel[0], cam_rel[1], self.sx, self.sy)
if rect.collidepoint(pos[0], pos[1]):
return True
else:
return False
im = canvas(jdata["CANVASSIZE"][0], jdata["CANVASSIZE"][1])
#_-_ Main Game Loop _-_
cam_pos = [SCREENSIZE[0]/2, SCREENSIZE[1]/2]
cam_pos_const = [SCREENSIZE[0]/2, SCREENSIZE[1]/2]
c_color = [255,255,255]
b_color = (25,25,25)
b_size = 5
min_zoom = 100
max_zoom = 1000
ui = False
delay = 0
mbposx, mbposy = percentPos(1,1)
SizeUp = button(mbposx, mbposy, 90, 30, " Brush Size + ", (100,100,100), (0,255,0))
mbposx, mbposy = percentPos(1,6)
SizeDown = button(mbposx, mbposy, 90, 30, " Brush Size - ", (100,100,100), (0,255,0))
mbposx, mbposy = percentPos(20,1)
R = button(mbposx, mbposy, 80, 40, " R ", (255,0,0), (100,100,100))
mbposx, mbposy = percentPos(40,1)
G = button(mbposx, mbposy, 80, 40, " G ", (0,255,0), (100,100,100))
mbposx, mbposy = percentPos(60,1)
B = button(mbposx, mbposy, 80, 40, " B ", (0,0,255), (100,100,100))
mbposx, mbposy = percentPos(1,15)
Save = button(mbposx, mbposy, 100, 40, " Save ", (100,0,0), (100,100,100))
mbposx, mbposy = percentPos(1,92)
temp = TEXT.render(f"color R:{c_color[0]} G:{c_color[1]} B:{c_color[2]}, Brush Size {b_size}",True,(0,0,0))
info = pygame.transform.scale(temp, (SCREENSIZE[0]-150, 50))
m_continuos = False
do_up = False
s_foc = False
timer = pygame.time.Clock()
running = True
while running:
delta = timer.tick()
if delta > 0:
fps = 1/(delta/1000)
else:
fps = 0
delay -= 1
ui = False
for event in pygame.event.get():
if event.type == pygame.QUIT:
pygame.quit()
sys.exit()
mouse_pos = pygame.mouse.get_pos()
mouse_left = pygame.mouse.get_pressed()[0]
mouse_right = pygame.mouse.get_pressed()[2]
mouse_middle = pygame.mouse.get_pressed()[1]
if mouse_left and not m_continuos:
m_continuos = True
if m_continuos and not mouse_left:
m_continuos = False
keys = pygame.key.get_pressed()
#""" camera scroll
if keys[pygame.K_a]:
cam_pos[0] -= 1
if keys[pygame.K_d]:
cam_pos[0] += 1
if keys[pygame.K_w]:
cam_pos[1] -= 1
if keys[pygame.K_s]:
cam_pos[1] += 1
if keys[pygame.K_z]: #UNDO (note, Is retarted.)s
if len(im.actions) > 0 and delay < 0:
delay = 20
work = im.actions[len(im.actions)-1]
im.actions.pop()
for t in work:
im.update_no_undo(t[0], t[1], t[2])
if keys[pygame.K_ESCAPE]:
pygame.quit()
cam_rel = (cam_pos_const[0] - cam_pos[0], cam_pos_const[1] - cam_pos[1])
if SizeUp.test(mouse_pos) and mouse_left and delay < 0:
b_size += 1
ui = True
if SizeDown.test(mouse_pos) and mouse_left and delay < 0:
b_size -= 1
ui = True
if R.test(mouse_pos) and mouse_left and delay < 0:
ui = True
c_color[0] += 5
if c_color[0] > 255:
c_color[0] = 0
if G.test(mouse_pos) and mouse_left and delay < 0:
ui = True
c_color[1] += 5
if c_color[1] > 255:
c_color[1] = 0
if B.test(mouse_pos) and mouse_left and delay < 0:
ui = True
c_color[2] += 5
if c_color[2] > 255:
c_color[2] = 0
if Save.test(mouse_pos) and mouse_left and delay < 0:
ui = True
pygame.image.save(im.surf, "MyZenDrawing.png")
#print(mouse_pos)
if not ui:
if mouse_right:
im.update(mouse_pos[0]-cam_rel[0], mouse_pos[1]-cam_rel[1], (0,0,0), b_size*2)
if mouse_left:
im.update(mouse_pos[0]-cam_rel[0], mouse_pos[1]-cam_rel[1], c_color, b_size)
if mouse_middle:
ap = im.surf.get_at((int(mouse_pos[0]-cam_rel[0]), int(mouse_pos[1]-cam_rel[1])))
im.flood(mouse_pos[0]-cam_rel[0], mouse_pos[1]-cam_rel[1], ap[:3], c_color)
screen.fill(b_color)
s_foc = im.test(mouse_pos, cam_rel)
im.show(screen, cam_rel)
if not m_continuos and do_up and s_foc:
im.add_temp()
if ui:
delay = 20
temp = TEXT.render(f"color R:{c_color[0]} G:{c_color[1]} B:{c_color[2]}, Brush Size {b_size}",True,(0,0,0))
info = pygame.transform.scale(temp, (SCREENSIZE[0]-150, 50))
info_widgit = pygame.Surface((20,20))
info_widgit.fill(c_color)
dummyx, dummyy = percentPos(80,1)
screen.blit(info_widgit, (dummyx, dummyy))
t = TEXT.render("{}".format(int(fps)), True, (0,0,255))
px, py = percentPos(90,1)
screen.blit(t, (px,py))
SizeUp.show(screen)
SizeDown.show(screen)
R.show(screen)
G.show(screen)
B.show(screen)
Save.show(screen)
screen.blit(info, (mbposx, mbposy))
pygame.display.flip()
if not m_continuos or delay > 0:
do_up = False
else:
do_up = True
|
Phalanx
Phalanx is a Utility skill.
In-game
Runes
Non-rune enhancements
* Eternal Union (Legendary Ring): increases the duration by 200% for Bowmen and Bodyguard runes.
Passives
* Lord Commander: increases damage by 20%.
|
require 'date'
require 'microsoft_kiota_abstractions'
require_relative '../microsoft_graph'
require_relative './models'
module MicrosoftGraph
module Models
class SecurityIncident < MicrosoftGraph::Models::Entity
include MicrosoftKiotaAbstractions::Parsable
##
# The list of related alerts. Supports $expand.
@alerts
##
# Owner of the incident, or null if no owner is assigned. Free editable text.
@assigned_to
##
# The specification for the incident. Possible values are: unknown, falsePositive, truePositive, informationalExpectedActivity, unknownFutureValue.
@classification
##
# Array of comments created by the Security Operations (SecOps) team when the incident is managed.
@comments
##
# Time when the incident was first created.
@created_date_time
##
# Array of custom tags associated with an incident.
@custom_tags
##
# Specifies the determination of the incident. Possible values are: unknown, apt, malware, securityPersonnel, securityTesting, unwantedSoftware, other, multiStagedAttack, compromisedUser, phishing, maliciousUserActivity, clean, insufficientData, confirmedUserActivity, lineOfBusinessApplication, unknownFutureValue.
@determination
##
# The incident name.
@display_name
##
# The URL for the incident page in the Microsoft 365 Defender portal.
@incident_web_url
##
# The lastModifiedBy property
@last_modified_by
##
# Time when the incident was last updated.
@last_update_date_time
##
# Only populated in case an incident is grouped together with another incident, as part of the logic that processes incidents. In such a case, the status property is redirected.
@redirect_incident_id
##
# The severity property
@severity
##
# The status property
@status
##
# The Azure Active Directory tenant in which the alert was created.
@tenant_id
##
## Gets the alerts property value. The list of related alerts. Supports $expand.
## @return a security_alert
##
def alerts
return @alerts
end
##
## Sets the alerts property value. The list of related alerts. Supports $expand.
## @param value Value to set for the alerts property.
## @return a void
##
def alerts=(value)
@alerts = value
end
##
## Gets the assignedTo property value. Owner of the incident, or null if no owner is assigned. Free editable text.
## @return a string
##
def assigned_to
return @assigned_to
end
##
## Sets the assignedTo property value. Owner of the incident, or null if no owner is assigned. Free editable text.
## @param value Value to set for the assignedTo property.
## @return a void
##
def assigned_to=(value)
@assigned_to = value
end
##
## Gets the classification property value. The specification for the incident. Possible values are: unknown, falsePositive, truePositive, informationalExpectedActivity, unknownFutureValue.
## @return a security_alert_classification
##
def classification
return @classification
end
##
## Sets the classification property value. The specification for the incident. Possible values are: unknown, falsePositive, truePositive, informationalExpectedActivity, unknownFutureValue.
## @param value Value to set for the classification property.
## @return a void
##
def classification=(value)
@classification = value
end
##
## Gets the comments property value. Array of comments created by the Security Operations (SecOps) team when the incident is managed.
## @return a security_alert_comment
##
def comments
return @comments
end
##
## Sets the comments property value. Array of comments created by the Security Operations (SecOps) team when the incident is managed.
## @param value Value to set for the comments property.
## @return a void
##
def comments=(value)
@comments = value
end
##
## Instantiates a new securityIncident and sets the default values.
## @return a void
##
def initialize()
super
end
##
## Gets the createdDateTime property value. Time when the incident was first created.
## @return a date_time
##
def created_date_time
return @created_date_time
end
##
## Sets the createdDateTime property value. Time when the incident was first created.
## @param value Value to set for the createdDateTime property.
## @return a void
##
def created_date_time=(value)
@created_date_time = value
end
##
## Creates a new instance of the appropriate class based on discriminator value
## @param parse_node The parse node to use to read the discriminator value and create the object
## @return a security_incident
##
def self.create_from_discriminator_value(parse_node)
raise StandardError, 'parse_node cannot be null' if parse_node.nil?
return SecurityIncident.new
end
##
## Gets the customTags property value. Array of custom tags associated with an incident.
## @return a string
##
def custom_tags
return @custom_tags
end
##
## Sets the customTags property value. Array of custom tags associated with an incident.
## @param value Value to set for the customTags property.
## @return a void
##
def custom_tags=(value)
@custom_tags = value
end
##
## Gets the determination property value. Specifies the determination of the incident. Possible values are: unknown, apt, malware, securityPersonnel, securityTesting, unwantedSoftware, other, multiStagedAttack, compromisedUser, phishing, maliciousUserActivity, clean, insufficientData, confirmedUserActivity, lineOfBusinessApplication, unknownFutureValue.
## @return a security_alert_determination
##
def determination
return @determination
end
##
## Sets the determination property value. Specifies the determination of the incident. Possible values are: unknown, apt, malware, securityPersonnel, securityTesting, unwantedSoftware, other, multiStagedAttack, compromisedUser, phishing, maliciousUserActivity, clean, insufficientData, confirmedUserActivity, lineOfBusinessApplication, unknownFutureValue.
## @param value Value to set for the determination property.
## @return a void
##
def determination=(value)
@determination = value
end
##
## Gets the displayName property value. The incident name.
## @return a string
##
def display_name
return @display_name
end
##
## Sets the displayName property value. The incident name.
## @param value Value to set for the displayName property.
## @return a void
##
def display_name=(value)
@display_name = value
end
##
## The deserialization information for the current model
## @return a i_dictionary
##
def get_field_deserializers()
return super.merge({
"alerts" => lambda {|n| @alerts = n.get_collection_of_object_values(lambda {|pn| MicrosoftGraph::Models::SecurityAlert.create_from_discriminator_value(pn) }) },
"assignedTo" => lambda {|n| @assigned_to = n.get_string_value() },
"classification" => lambda {|n| @classification = n.get_enum_value(MicrosoftGraph::Models::SecurityAlertClassification) },
"comments" => lambda {|n| @comments = n.get_collection_of_object_values(lambda {|pn| MicrosoftGraph::Models::SecurityAlertComment.create_from_discriminator_value(pn) }) },
"createdDateTime" => lambda {|n| @created_date_time = n.get_date_time_value() },
"customTags" => lambda {|n| @custom_tags = n.get_collection_of_primitive_values(String) },
"determination" => lambda {|n| @determination = n.get_enum_value(MicrosoftGraph::Models::SecurityAlertDetermination) },
"displayName" => lambda {|n| @display_name = n.get_string_value() },
"incidentWebUrl" => lambda {|n| @incident_web_url = n.get_string_value() },
"lastModifiedBy" => lambda {|n| @last_modified_by = n.get_string_value() },
"lastUpdateDateTime" => lambda {|n| @last_update_date_time = n.get_date_time_value() },
"redirectIncidentId" => lambda {|n| @redirect_incident_id = n.get_string_value() },
"severity" => lambda {|n| @severity = n.get_enum_value(MicrosoftGraph::Models::SecurityAlertSeverity) },
"status" => lambda {|n| @status = n.get_enum_value(MicrosoftGraph::Models::SecurityIncidentStatus) },
"tenantId" => lambda {|n| @tenant_id = n.get_string_value() },
})
end
##
## Gets the incidentWebUrl property value. The URL for the incident page in the Microsoft 365 Defender portal.
## @return a string
##
def incident_web_url
return @incident_web_url
end
##
## Sets the incidentWebUrl property value. The URL for the incident page in the Microsoft 365 Defender portal.
## @param value Value to set for the incidentWebUrl property.
## @return a void
##
def incident_web_url=(value)
@incident_web_url = value
end
##
## Gets the lastModifiedBy property value. The lastModifiedBy property
## @return a string
##
def last_modified_by
return @last_modified_by
end
##
## Sets the lastModifiedBy property value. The lastModifiedBy property
## @param value Value to set for the lastModifiedBy property.
## @return a void
##
def last_modified_by=(value)
@last_modified_by = value
end
##
## Gets the lastUpdateDateTime property value. Time when the incident was last updated.
## @return a date_time
##
def last_update_date_time
return @last_update_date_time
end
##
## Sets the lastUpdateDateTime property value. Time when the incident was last updated.
## @param value Value to set for the lastUpdateDateTime property.
## @return a void
##
def last_update_date_time=(value)
@last_update_date_time = value
end
##
## Gets the redirectIncidentId property value. Only populated in case an incident is grouped together with another incident, as part of the logic that processes incidents. In such a case, the status property is redirected.
## @return a string
##
def redirect_incident_id
return @redirect_incident_id
end
##
## Sets the redirectIncidentId property value. Only populated in case an incident is grouped together with another incident, as part of the logic that processes incidents. In such a case, the status property is redirected.
## @param value Value to set for the redirectIncidentId property.
## @return a void
##
def redirect_incident_id=(value)
@redirect_incident_id = value
end
##
## Serializes information the current object
## @param writer Serialization writer to use to serialize this model
## @return a void
##
def serialize(writer)
raise StandardError, 'writer cannot be null' if writer.nil?
super
writer.write_collection_of_object_values("alerts", @alerts)
writer.write_string_value("assignedTo", @assigned_to)
writer.write_enum_value("classification", @classification)
writer.write_collection_of_object_values("comments", @comments)
writer.write_date_time_value("createdDateTime", @created_date_time)
writer.write_collection_of_primitive_values("customTags", @custom_tags)
writer.write_enum_value("determination", @determination)
writer.write_string_value("displayName", @display_name)
writer.write_string_value("incidentWebUrl", @incident_web_url)
writer.write_string_value("lastModifiedBy", @last_modified_by)
writer.write_date_time_value("lastUpdateDateTime", @last_update_date_time)
writer.write_string_value("redirectIncidentId", @redirect_incident_id)
writer.write_enum_value("severity", @severity)
writer.write_enum_value("status", @status)
writer.write_string_value("tenantId", @tenant_id)
end
##
## Gets the severity property value. The severity property
## @return a security_alert_severity
##
def severity
return @severity
end
##
## Sets the severity property value. The severity property
## @param value Value to set for the severity property.
## @return a void
##
def severity=(value)
@severity = value
end
##
## Gets the status property value. The status property
## @return a security_incident_status
##
def status
return @status
end
##
## Sets the status property value. The status property
## @param value Value to set for the status property.
## @return a void
##
def status=(value)
@status = value
end
##
## Gets the tenantId property value. The Azure Active Directory tenant in which the alert was created.
## @return a string
##
def tenant_id
return @tenant_id
end
##
## Sets the tenantId property value. The Azure Active Directory tenant in which the alert was created.
## @param value Value to set for the tenantId property.
## @return a void
##
def tenant_id=(value)
@tenant_id = value
end
end
end
end
|
‘UK Gets Taste of Own Medicine as Iran Captures Oil Tanker’
An Iranian daily newspaper has described the capture of a British oil tanker at the Strait of Hormuz as legal tit-for-tat retaliation for the unlawful seizure of an Iranian supertanker by the UK in the international waters near Gibraltar.
In an op-ed article on Sunday, the editor-in-chief of Kayhan newspaper lauded Iran’s decision to capture a British-flagged oil tanker at the Strait of Hormuz for violating the maritime law, saying Tehran has exercised its legal right to act in retaliation for the illegitimate seizure of Iranian supertanker by the UK Navy.
Hossein Shariatmadari said Iran has captured the UK oil tanker on legal grounds, because the UK had seized Iran’s vessel illegally.
He also cited the “right of reprisal” in the international law, which recognizes a nation’s right to take retaliatory measures against another state in response to a hostile move.
“As a result, we can, and must, maintain that we have captured the British oil tanker in a retaliatory move in reprisal for the seizure of Iran’s oil tanker by the UK, not because of maritime violations,” the Iranian journalist added.
On July 19, the Islamic Revolution Guards Corps (IRGC) Navy captured British oil tanker “Stena Impero” for violating international maritime laws when crossing the high-traffic Strait of Hormuz in the Persian Gulf.
The UK vessel had switched off its GPS locator, in contravention of international regulations, and was sailing into the Strait of Hormuz in a wrong traffic pattern.
The British tanker was entering the strait from the southern route which is an exit path, increasing the risk of an accident
Moreover, Stena Impero had not heeded any of the warnings from the Iranian Ports and Maritime Organization.
Iran’s legal action against the British oil tanker came after the British Royal Marines seized Iran’s oil tanker Grace 1 in Gibraltar on July 4 for trying to take oil to Syria allegedly in violation of EU sanctions.
Tehran has made it clear that the supertanker was not bound for Syria and its seizure has taken place at the behest of the US.
Subscribe
The IFP Editorial Staff is composed of dozens of skilled journalists, news-writers, and analysts whose works are edited and published by experienced editors specialized in Iran News. The editor of each IFP Service is responsible for the report published by the Iran Front Page (IFP) news website, and can be contacted through the ways mentioned in the "IFP Editorial Staff" section.
|
ANOTHER FUNGUS PARASITE ON RUBBER.
Mr. E. Betche, Botanical Assistant at the National Herbarium, New South Wales, reports that Dr. Funk of Apia communicated a rather interesting parasitic disease which causes the death of Cocoa and Rubber Trees. The fungus has been identified as Hymenochaete noxia Henning. (Supplement to Tropical Agriculturist, May 1909, p. 502). I have no other record of this observation. However I have lately seen Para rubber roots attacked and killed by a species of Hymenochaete which is probably this pestilen tial thing. Hymenochaete is a very curious fungus, it has the appearance of a thin layer of bright brown velveteen on a tree or root, under ground it seems to hold to itself the soil, sand, etc., making a thick coat upon the root. It kills the roots slowly attacking large sized roots and causing them to dry up.
GAMBIR.
The question of improvement in the methods of manu facture of Gambir is one which has a great deal of impor tance to the Leather trade in England, and attention has been called by the Director of the Imperial Institute to the improved factories of the Dutch in Indragiri, Sumatra. Gambir was formerly grown to a very large extent in Sing apore, usually in combination with pepper. The cultivation died out almost completely somewhat suddenly in 1894 or about that time and at present few Gambir fields re main iu Singapore. With the Gambir cultivation went also the pepper gardens. The area formerly under cul tivation must have been the greater part of the island of Singapore, as is evinced by the immense area of wasted useless ground, absolutely deserted and covered with secondary scrub and lalang. The cause of the aban donment of this cultivation was due partly to a fall in the price of pepper, but mainly from the so complete destruc-
|
<P> The government refused to implement the 1926 recommendations of the Gaeltacht Commission, which included restoring Irish as the language of administration in such areas . As the role of the state grew, it therefore exerted tremendous pressure on Irish speakers to use English . This was only partly offset by measures which were supposed to support the Irish language . For instance, the state was by far the largest employer . A qualification in Irish was required to apply for state jobs . However, this did not require a high level of fluency, and few public employees were ever required to use Irish in the course of their work . On the other hand, state employees had to have perfect command of English and had to use it constantly . Because most public employees had a poor command of Irish, it was impossible to deal with them in Irish . If an Irish speaker wanted to apply for a grant, obtain electricity, or complain about being over-taxed, they would typically have had to do so in English . As late as 1986, a Bord na Gaeilge report noted "...the administrative agencies of the state have been among the strongest forces for Anglicisation in Gaeltacht areas". </P> <P> The new state also attempted to promote Irish through the school system . Some politicians claimed that the state would become predominantly Irish - speaking within a generation . In 1928, Irish was made a compulsory subject for the Intermediate Certificate exams, and for the Leaving Certificate in 1934 . However, it is generally agreed that the compulsory policy was clumsily implemented . The principal ideologue was Professor Timothy Corcoran of University College Dublin, who "did not trouble to acquire the language himself". From the mid-1940s onward the policy of teaching all subjects to English - speaking children through Irish was abandoned . In the following decades, support for the language was progressively reduced . </P> <P> It is disputed to what extent such professed language revivalists as de Valera genuinely tried to Gaelicise political life . Even in the first Dáil Éireann, few speeches were delivered in Irish, with the exception of formal proceedings . In the 1950s, An Caighdeán Oifigiúil (the Official Standard) was introduced to simplify spellings and allow easier communication by different dialect speakers . By 1965 speakers in the Dáil regretted that those taught Irish in the traditional Irish script (the Cló Gaedhealach) over the previous decades were not helped by the recent change to the Latin script, the Cló Romhánach . An ad - hoc "Language Freedom Movement" that was opposed to the compulsory teaching of Irish was started in 1966, but it had largely faded away within a decade . </P> <P> Overall, the percentage of people speaking Irish as a first language has decreased since independence, while the number of second - language speakers has increased . </P>
How did the gaelic language come to ireland
|
Page:Indian Medicinal Plants (Text Part 1).djvu/363
Rh quantity of curds, is said to be a valuable remedy in dysentery" (Dymock.)
"The resin is terebinthinate-stimulant, its action being chiefly directed to the mucous surface of the genito-urinary organs and of the large and small intestines ; and the bark is tonic and demulcent.
"The resin, particularly its first or soft variety, possesses a great control over acute dysentery and diarrhœa. In gonorrhœa, gleet, chronic bronchitis and cystitis also it proves very useful and exercises a distinct beneficial influence. As a tonic, the bark resembles calumba and quassia, and like them it is administered with the preparations of iron, since it contains no tannin and is devoid of astringency.
" Remarks. — : There are three varieties of the resin of A. malabarica, which, for the sake of convenience, may be called the first or soft, the second or flat, and the third or hard. The resin of the first variety is collected in bamboo-joints, one of which I have received from the Annamullay forests in the Coimbatore district. This variety is never found in the bazaars of Madras or any other place, as far as my knowledge extends, but is occasionally supplied by special request to exhibitions and to medical men requiring to examine or use it, by the Forest Department. When new, the resin in this variety is grey, very soft, viscid, plastic, opaque, and bears a great resemblance in its appearance to the birdlime prepared from the milky juice of Ficus glomerata. It retains its grey color internally for a long time, but every part of it which comes in contact with the atmosphere becomes reddish-brown in a few hours and then deep-brown. The resin has an agreeable aromatic or balsamic odour, and though it is not soluble in saliva, it produces a terebinthinate taste in the mouth when chewed. The resin is neither soluble nor miscible in cold or hot water. It is, however, miscible with the aid of rubbing and grinding in alcohol, ether and many fixed and essential oils, as cocoanut, olive, turpentine, cajuput, anise, &c. After the lapse of some, months, the resin, if exposed to the air, becomes much harder and feels as tough as wax ; and after a few months more, it is
|
#include <stdlib.h>
#include <stdio.h>
#include "array.h"
PointerArray* createPointerArray() {
PointerArray* arr = malloc(sizeof(PointerArray));
arr->numPointersInUse = 0;
arr->numPointersTotal = POINTERARRAY_INITIAL_LENGTH;
arr->pointers = calloc(POINTERARRAY_INITIAL_LENGTH, sizeof(void*));
#ifdef SBOL_DEBUG_STATEMENTS
int n;
for (n=0; n<POINTERARRAY_INITIAL_LENGTH; n++)
if (arr->pointers[n])
printf("PointerArray not initialized properly\n");
#endif
return arr;
}
void deletePointerArray(PointerArray* arr) {
if (arr) {
if (arr->numPointersInUse) arr->numPointersInUse = 0;
if (arr->numPointersTotal) arr->numPointersTotal = 0;
if (arr->pointers) {
free(arr->pointers);
arr->pointers = NULL;
}
#ifdef SBOL_DEBUG_STATEMENTS
if (arr->numPointersInUse ||
arr->numPointersTotal ||
arr->pointers)
printf("PointerArray deleted improperly\n");
#endif
free(arr);
arr = NULL;
}
}
int getNumPointersInArray(const PointerArray* arr) {
if (arr)
return arr->numPointersInUse;
else
return -1;
}
int indexOfPointerInArray(const PointerArray* arr, const void* ptr) {
if (arr && ptr) {
int n;
for (n=0; n < getNumPointersInArray(arr); n++)
if (getNthPointerInArray(arr, n) == ptr)
return n;
return -1;
}
else {
#ifdef SBOL_DEBUG_STATEMENTS
if (!arr)
printf("Tried to get index of pointer in NULL array\n");
else
printf("Tried to get array index of NULL pointer\n");
#endif
return -1;
}
}
int pointerContainedInArray(const PointerArray* arr, const void* ptr) {
return (int) indexOfPointerInArray(arr, ptr) >= 0;
}
static void resizePointerArray(PointerArray* arr, int capacity) {
if (arr) {
if (capacity < POINTERARRAY_INITIAL_LENGTH)
return;
arr->numPointersTotal = capacity;
arr->pointers = realloc(arr->pointers, capacity * sizeof(void*));
}
#ifdef SBOL_DEBUG_STATEMENTS
else
printf("Tried to resize NULL array\n");
#endif
}
static void expandPointerArray(PointerArray* arr) {
if (arr) {
int capacity;
if (arr->numPointersTotal < POINTERARRAY_INITIAL_LENGTH)
capacity = POINTERARRAY_INITIAL_LENGTH;
else
capacity = arr->numPointersTotal * POINTERARRAY_SCALING_FACTOR;
resizePointerArray(arr, capacity);
}
#ifdef SBOL_DEBUG_STATEMENTS
else
printf("Tried to expand NULL array\n");
#endif
}
static void shrinkPointerArray(PointerArray* arr) {
if (arr) {
if (getNumPointersInArray(arr) > POINTERARRAY_INITIAL_LENGTH * POINTERARRAY_SCALING_FACTOR)
resizePointerArray(arr, arr->numPointersTotal / POINTERARRAY_SCALING_FACTOR);
}
#ifdef SBOL_DEBUG_STATEMENTS
else
printf("Tried to shrink NULL array\n");
#endif
}
void removePointerFromArray(PointerArray* arr, int index) {
if (arr && getNumPointersInArray(arr) > index && index >= 0) {
// shift everything over, deleting array[index]
int n;
for (n=index+1; n < getNumPointersInArray(arr); n++)
arr->pointers[n-1] = arr->pointers[n];
arr->pointers[ --(arr->numPointersInUse) ] = NULL;
// if array is getting small, shrink it
if (getNumPointersInArray(arr) == arr->numPointersTotal / POINTERARRAY_SCALING_FACTOR)
shrinkPointerArray(arr);
}
#ifdef SBOL_DEBUG_STATEMENTS
else if (!arr)
printf("Tried to remove pointer from NULL array\n");
else
printf("Tried to remove pointer from invalid array index\n");
#endif
}
void insertPointerIntoArray(PointerArray* arr, void* ptr) {
if (arr && ptr) {
// if array is full, expand it
if (getNumPointersInArray(arr) == arr->numPointersTotal)
expandPointerArray(arr);
// insert ptr
arr->pointers[ getNumPointersInArray(arr) ] = ptr;
arr->numPointersInUse++;
}
#ifdef SBOL_DEBUG_STATEMENTS
else if (!arr)
printf("Tried to insert pointer into NULL array\n");
else
printf("Tried to insert NULL pointer into array\n");
#endif
}
void* getNthPointerInArray(const PointerArray* arr, int n) {
if (arr && getNumPointersInArray(arr) > n && n >= 0)
return arr->pointers[n];
else {
#ifdef SBOL_DEBUG_STATEMENTS
if (!arr)
printf("Tried to get pointer from NULL array\n");
else
printf("Tried to get pointer from invalid array index\n");
#endif
return NULL;
}
}
|
Realizing the extraordinary scientific potential of the CMB requires precise
measurements of its tiny anisotropies over a significant fraction of the sky at
very high resolution. The analysis of the resulting datasets is a serious
computational challenge. Existing algorithms require terabytes of memory and
hundreds of years of CPU time. We must therefore both maximize our resources by
moving to supercomputers and minimize our requirements by algorithmic
development. Here we will outline the nature of the challenge, present our
current optimal algorithm, and discuss its implementation as the MADCAP
software package and application to data from the North American test flight of
the joint Italian-U.S. BOOMERanG experiment on the Cray T3E at NERSC and
CINECA.
A documented beta-release of MADCAP is publicly available at
http://cfpa.berkeley.edu/~borrill/cmb/madcap.html
|
But if -cr be the angular velocity of the projectile, and h be the pitch of the rifling, we have the following relation between the velocities of translation and rotation,
cing translation and rotation.
We now proceed to determine the increment of the gaseous pressure due to the resistance, &c. offered by the rifling to the forward motion of the shot. We shall imagine a smooth-bored gun to fire a shot of the same weight as that of the rifled gun. We shall further suppose that the two projectiles are delivered with the same velocity ; and we wish to know, the same ballistic effect being produced by the two guns, what is the increased pressure which the rifled gun has had to sustain. Now the equation of motion in the case of the smooth-bored gun is
|
enh: filter tags
Will it be useful to add filter for tags, such as "[NH]>1" to filter reads of multiple hits? Will the same grammar as --input-fmt-option of samtools help?
Thank you.
I like this idea. It would be lua syntax, like read.NH > 1 or more likely tag.NH > 1.
is this or any other issue blocking for you? I probably can't implement everything right now, but would like to get the top priorities started.
Thank you @brentp, filtering by tags should be one of the prior features I wish to have.
Another two major things are:
The performance, especially for locus with extremely high sequence depth (eg, rRNA sites). I notice that the pileup would become extremely slow. If I remember clearly, the rust htslib toke more than one hour to pileup sites on a rRNA gene (~10kb). I am not sure if this problem can be solved without replacing the htslib?
filter mutation. It is not hard to filter the number of mutations based on the "ref_base" column using some "if-else" statements. But I would be great if pbr and support this one out of box.
Hi @brentp, thank you for working on this. I would like to known if filtering by tags is supported now?
No, for now, I have put this project on hold. I think there is too much overhead in calling a lua expression for each base. Maybe it's possible with using some kind of macro based expressions within rust, but I don't have plans to implement further.
I found that using pysam with custom code is faster than pbr.
|
<?php
namespace Concrete\Package\CoreStatistics\Controller\SinglePage\Dashboard\System\Environment;
use Concrete\Core\Page\Controller\DashboardPageController;
use Concrete\Package\CoreStatistics\Src\Stats;
class CoreStatistics extends DashboardPageController
{
protected $stats;
protected $tab_active = false;
public function on_before_render()
{
parent::on_before_render();
$tabs = array();
$categories = array(
'overview' => t('Overview'),
'pages' => t('Pages'),
'users' => t('Users'),
'files' => t('Files')
);
foreach ($categories as $handle => $tabName) {
$active = ($handle === $this->tab_active);
$tabs[] = array($this->action($handle), $tabName, $active);
}
$this->set('tabs', $tabs);
}
/**
* @param string|bool $handle
* @return void
*/
public function view($handle = false)
{
$this->stats = new Stats();
$this->tab_active = $handle;
$func = 'getTab' . ucfirst($handle);
if (method_exists($this, $func)) {
$this->{$func}();
} else {
$this->redirect('dashboard/system/environment/core_statistics/overview');
}
}
/**
* Tab: Overview
*
* @return void
*/
protected function getTabOverview()
{
$this->set('pages_total', $this->stats->getTotalPages());
$this->set('users_total', $this->stats->getTotalUsers());
$this->set('files_total', $this->stats->getTotalFiles());
$this->set('file_sets_total', $this->stats->getTotalFileSets());
$this->set('logs_total', $this->stats->getTotalLogs());
$this->set('stacks_total', $this->stats->getTotalStacks());
$this->set('blocks_total', $this->stats->getTotalBlocks());
$this->render('dashboard/system/environment/core_statistics/overview');
}
/**
* Tab: Pages
*
* @return void
*/
protected function getTabPages()
{
$pages_total = $this->stats->getTotalPages();
$pages_unapproved = $this->stats->getUnapprovedPages();
$pages_approved = $pages_total - count($pages_unapproved);
$this->set('pages_total', $pages_total);
$this->set('pages_approved', $pages_approved);
$this->set('pages_unapproved', $pages_unapproved);
$this->set('pages_in_trash', $this->stats->getTotalPagesInTrash());
$this->set('pages_in_drafts', $this->stats->getTotalPagesInDrafts());
$this->set('page_types', $this->stats->getTotalPagesPerPageType());
$this->set('page_templates', $this->stats->getTotalPagesPerPageTemplate());
$this->set('pages_with_most_versions', $this->stats->getPagesWithMostVersions());
$this->render('dashboard/system/environment/core_statistics/pages');
}
/**
* Tab: Users
*
* @return void
*/
protected function getTabUsers()
{
$this->set('users_total', $this->stats->getTotalUsers());
$this->set('users_active', $this->stats->getTotalActiveUsers());
$this->set('users_inactive', $this->stats->getTotalInactiveUsers());
$this->set('users_validated', $this->stats->getTotalValidatedUsers());
$this->set('users_not_validated', $this->stats->getTotalNotValidatedUsers());
$this->set('groups', $this->stats->getTotalUsersPerGroup());
$this->set('latest_active_users', $this->stats->getLatestActiveUsers());
$this->set('most_logged_in_users', $this->stats->getMostLoggedInUsers());
$this->render('dashboard/system/environment/core_statistics/users');
}
/**
* Tab: Files
*
* @return void
*/
protected function getTabFiles()
{
$this->set('files_total', $this->stats->getTotalFiles());
$this->set('file_sets_total', $this->stats->getTotalFileSets());
$this->set('file_size_total', $this->stats->getTotalFileSize());
$this->set('file_sets', $this->stats->getTotalFilesPerFileSet());
$this->set('most_downloaded_files', $this->stats->getMostDownloadedFiles());
$this->set('largest_files', $this->stats->getLargestFiles());
$this->render('dashboard/system/environment/core_statistics/files');
}
}
|
Akarca, G., Kilinç, M., & Denizkara, A. J. (2024). Quality specification of ice creams produced with different homofermentative lactic acid bacteria. Food Science & Nutrition, 12, 192--203. 10.1002/fsn3.3762
Due to its distinctive flavor qualities, cooling impact, and high nutritional content, people of all ages consume ice cream, a significant dairy product, all throughout the world (Durmaz et al., [@fsn33762-bib-0016]; Goktas et al., [@fsn33762-bib-0018]). The main ingredients in an ice cream mixture include milk, stabilizers, emulsifiers, flavorings, vegetable oils, and fruit. Moreover, ice cream occasionally contains ingredients including probiotic bacteria, pulp, dietary fibred, food colors, and artificial sweeteners (Iahtisham‐Ul‐Hag et al., [@fsn33762-bib-0023]; Marshall et al., [@fsn33762-bib-0028]; Senanayake et al., [@fsn33762-bib-0037]).
Ice cream is a food product with extremely rich nutritional value. The nutritional value of ice cream directly depends on the nutritional values of the ingredients that make up the ice cream. Ice cream also contains all the nutrients that milk has. In addition, ice cream contains 3--4 times more fat and 12%--16% more protein than milk. In addition to these, it is a product richer than milk due to the addition of additives such as fruit, nuts, and eggs (Arbuckle, [@fsn33762-bib-0009]; Mohammed et al., [@fsn33762-bib-0029]).
In recent years, consumer perception of nutritious, functional, and natural foods has led ice cream manufacturers to develop newer and healthier products (Batista et al., [@fsn33762-bib-0012]; Cruz et al., [@fsn33762-bib-0014]).
Functional foods are those whose ingredients improve the health of the consumers. The demand for functional foods and additives has dramatically expanded globally during the past 15--20 years (Goktas et al., [@fsn33762-bib-0018]; Halsted, [@fsn33762-bib-0021]). Today, functional properties can be improved with additives added to many foods product. Milk and foods produced using milk are the most used foods in terms of containing functional properties. One of these products is ice cream; it has excellent potential as a functional food because it allows adding additives with many functional properties (Ozturk et al., [@fsn33762-bib-0034]).
Fermented products are the first processed foods in human history. Many products, such as milk, meat, and fruit/vegetables, are still widely produced and consumed (Sozeri Atik et al., [@fsn33762-bib-0043]; Yilmaz et al., [@fsn33762-bib-0046]). Fermented milk products, which have an important place among fermented products, are highly nutritious, traditional, and/or universal foods consumed with pleasure around the world (Petrova et al., [@fsn33762-bib-0035]). Depending on the type of milk used during their manufacturing, they are categorized into variants; moreover, the physicochemical, microbiological, and/or production technologies used to produce them cheeses, fermented beverages, yogurt, kefir, ayran, sour cream, and acidofil milk can be counted among the main products made from fermented milk (Shiby & Mishra, [@fsn33762-bib-0041]).
Today, apart from the products obtained by freezing yoghurts obtained with the addition of different bacteria, there is no real fermented ice cream production. These products are in demand by the consumer due to the presence of probiotic bacteria and aroma difference they contain (Alamprese et al., [@fsn33762-bib-0006]; Davidson et al., [@fsn33762-bib-0015]).
In addition, in recent years, ice creams produced by using soy or sesame milk instead of cow\'s milk enriched with probiotic bacteria are also finding buyers in the market (Ghaderi et al., [@fsn33762-bib-0017]). There are also studies on the adaptation of compounds obtained from some plants and their roots to the ice cream industry by using different processing methods (Shadordizadeh et al., [@fsn33762-bib-0039]; Shahi et al., [@fsn33762-bib-0040]). However, today, there is no real ice cream produced using dairy animal\'s milk and fermented with lactic acid bacteria.
Ice cream, which is not typically thought of as a fermented dairy product, can be converted into one thanks to the lactic acid bacteria added to it, improving and altering its textural, sensory, and microbiological properties. The addition of lactic acid bacteria can also raise ice cream\'s functional and nutritional values. The characteristics of ice cream made in various methods by adding various lactic acid bacteria were highlighted and examined in this study.
MATERIALS AND METHODS {#fsn33762-sec-0002}
The study\'s ingredients, including the cream, salep, granulated sugar (beet sugar), emulsifier (E 471), and cow\'s milk, were purchased at a local shop in the province of Afyonkarahisar.
Lactic acid bacteria {#fsn33762-sec-0004}
In this research; *Lactobacillus casei* (ATCC 393), *Lactobacillus rhamnosus* (ATCC 53103), and *Lactobacillus delbrueckii* spp. *lactis* (ATCC 12315) strains were used.
Preparation of lactic acid bacteria strains {#fsn33762-sec-0005}
MRS broth (Merck, 110,661, Germany) was used to inoculate the lactic acid bacteria (*L*. *casei*, *L*. *rhamnosus*, and *L*. *lactis*) that were employed in the production process before they were cultured at 37°C for 48 h. All strains had a 10‐min incubation at 22°C following the incubation time. The mix was centrifuged at 16424 *g*, and the residue (pellet) at the bottom was separated (Goktas et al., [@fsn33762-bib-0018]).
Ice cream production {#fsn33762-sec-0006}
Procedures used to make ice cream in the study (Figure [1](#fsn33762-fig-0001){ref-type="fig"}) were modified from those Kilinc et al. ([@fsn33762-bib-0026]) and Goktas et al. ([@fsn33762-bib-0018]) had previously employed. Two different production methods were carried out: in the first one, adding lactic acid bacteria to the mixture the mixture was then matured. In the second, lactic acid bacteria were added to the mix after maturation. In this way, a total of seven different samples were produced. Subsequently, the prepared mixtures were processed into ice cream in an ice cream machine (CRM‐GEL 25C, Italy) at −5°C. Exactly 250 *g* of each mixture was placed into sterile glass containers and hardened at −24°C. The acquired samples were kept at −18°C until the analysis was finished (Kilinc et al., [@fsn33762-bib-0026]).
::: {#fsn33762-fig-0001 .fig}
Ice cream production.
Ice cream mix texture {#fsn33762-sec-0007}
Ice cream mix firmness, consistency, cohesiveness, and viscosity index values were tested using back extrusion equipment and a TA.XT Plus Texture Analyzer (Stable Micro Systems, Godalming, Surrey, UK) (Sert et al., [@fsn33762-bib-0038]).
pH value {#fsn33762-sec-0008}
A homogenizer was used to combine ice cream samples with 1/10 sterilized distilled water (Daihan Wisestir, HS‐30 T, South Korea). A pH meter was then used to measure the pH values (Hanna, HI 2215 pH/ORP).
Water activity (a~w~) {#fsn33762-sec-0009}
Using a water activity analyzer, the water activity values of the ice cream samples were determined (Novasina LabTouch‐aw, Lachen, Switzerland) (AOAC, [@fsn33762-bib-0008]).
Color values (L\*, a\*, b\*) {#fsn33762-sec-0010}
According to the hunter color measurement system, the color values of the samples were assessed using a colorimeter (Minolta Co.) (Akalın et al., [@fsn33762-bib-0003]).
Lactic acid bacteria count {#fsn33762-sec-0011}
Lactic acid bacteria counts added to ice cream mixes were performed on man rogosa sharpe agar (110,660, Merck, Germany) (MRS‐Cys‐BPB) (Ngamsomchat et al., [@fsn33762-bib-0031]) altered with 50 mg of L. casei/L Vancomycin and 50 mg of cysteine bromophenol blue for *L*. *plantarum* (LabM, UK) was added to man rogosa sharpe agar (MRS‐VanC) (Hatakka et al., [@fsn33762-bib-0022]), *L*. *delbrueckii* spp. For lactis, Man Rogosa Sharpe agar (110,660, Merck, Germany) was used (Shori et al., [@fsn33762-bib-0042]). Before analysis, serial dilutions were prepared from the samples using 0.1% buffered peptone water (107,228, Merck, Germany) using spread plate methods Anaerocult A (113,829, Merck, Germany) was added to planted petri dishes in anaerobic conditions, jars (116,387, Merck, Germany) were incubated in an oven at 37°C for 72 h (Mena & Aryana, [@fsn33762-bib-0555]).
First dripping time {#fsn33762-sec-0012}
The wire strainer on the tared glass containers was used to catch a sample of ice cream (10 *g*), which was then allowed to melt at 20°C. As the ice cream began to melt, the first drops began to fall, the stopwatch was turned on (Shahi et al., [@fsn33762-bib-0040]).
Complete melting time {#fsn33762-sec-0013}
A 500 mL glass beaker containing hard ice cream samples from the freezer (−18°C) was placed to thaw at 20°C for the time required for the ice cream to completely thaw. The exact time (minutes) the melting was complete was recorded (Guven & Karaca, [@fsn33762-bib-0019]).
Ice cream samples were poured into a tared glass measuring tape of appropriate size. A beaker was used to defrost the same sample amount of ice cream that had been put in the other container. A clean measuring cylinder was used to transfer the molten mixture to the same volume, and it was then weighed once more (Jimenez‐Florez et al., [@fsn33762-bib-0025]).
Organic acid {#fsn33762-sec-0015}
An HPLC was used to calculate the organic acid levels of the ice cream samples (Shimadzu Prominence). Subsequently, 4‐g samples were taken from the samples, 20 mL of 0.01 N H2SO4 was added. Following a 0.45‐μm filter and vortexing, it was introduced into the system (Guzel Seydim et al., [@fsn33762-bib-0020]). System features used were the following: CBM: 20ACBM; Detector: DAD (SPD‐M20A); Column Furnace: CTO‐10ASVp; Pump: LC20 AT; Autosampler: SIL 20ACHT; Computer Program: LC Solution; Column: ODS 4 (250 mm\*4.6 mm, 5 μm) (GP Sciences, Inertsil ODS‐4, Japan); and Mobile phase: orthophosphoric acid was used to bring the pH of ultrapure water to 3 (Aktas et al., [@fsn33762-bib-0004]).
Free fatty acids {#fsn33762-sec-0016}
A GC/MS was used to analyze the fatty acids of the samples (AGILENT 5975 C AGILENT 7890A GC). An MSDCHEM program and DB WAX (50\*0.20 mm, 0.20 μm) column were used in the device. The initial temperature of the furnace was determined as 80°C; after a 4‐min waiting period, at a rate of 13°C per minute, it was raised to 175°C. It was kept at this temperature for 27 min. Later, 215°C was reached with an increase of 4°C per minute. It was held there for 5 min. After that with an increase of 4°C each minute, 240°C was reached, and this temperature was maintained for 15 min. Detector and injector temperature was 240°C. The injector and detector temperatures were set to 240°C and the injection volume to 1 L. HCl at a concentration of 1.5 M was used as the derivatizer in the analyses, the derivatization temperature was 80°C, and the derivatization time was 2 h (Bardakcı & Secilmis, [@fsn33762-bib-0011]).
RESULTS AND DISCUSSION {#fsn33762-sec-0017}
Ice cream mix texture {#fsn33762-sec-0018}
Firmness, consistency, cohesiveness and index of viscosity values of ice cream mix samples differed significantly among all samples (*p* \< .05). Interaction between samples diversity was very significant on firmness, consistency, cohesiveness, and index of viscosity values; additionally, the consistency value was negative, and the cohesiveness and index of viscosity values were positively correlated on the sample type. In addition, the firmness value on the sample type revealed a negative and highly correlated effect (Table [1](#fsn33762-tbl-0001){ref-type="table"}).
::: {#fsn33762-tbl-0001 .table-wrap}
Physical analysis results of ice cream samples.
Samples First drip (s.) Meltdown (s.) Overrun
-------------------------- ------------------- ------------------- ------------------
Control 24.25 ± 1.06^ab^ 103.50 ± 2.12^ab^ 33.82 ± 0.48^e^
*Lb*. *casei* A. Ag. 25.25 ± 1.06^a^ 107.00 ± 1.41^a^ 34.47 ± 0.59^de^
*Lb*. *rhamnosus* A. Ag. 23.75 ± 1.06^abc^ 102.50 ± 0.71^bc^ 34.83 ± 0.26^de^
*Lb*. *lactis* A. Ag. 22.75 ± 0.35^bc^ 99.00 ± 1.41^cd^ 35.83 ± 0.37^cd^
*Lb*. *rhamnosus* B. Ag. 22.25 ± 0.35^cd^ 98.50 ± 0.71^de^ 36.93 ± 0.52^c^
*Lb*. *lactis* B. Ag. 19.75 ± 0.35^e^ 93.50 ± 2.12^f^ 40.88 ± 0.32^a^
*Lb*. *casei* B. Ag. 20.50 ± 0.71^de^ 95.00 ± 1.41^ef^ 38.76 ± 0.64^b^
*p* Value .02 \<.0001 \<.0001
*r* −.883\*\* −.884\*\* .885\*\*
*Note*: a--f (↓): Values with the same capital letters in the same column for each analysis differ significantly (*p* \< .05). *p* \< .0001: Statistically too much significant, *p* \< .01: Statistically too significant. \*\*Correlation is significant at the 0.01 level (2‐tailed).
Abbreviations: A. Mat, After Maturation; B. Mat, Before Maturation.
The structural characteristics of ice cream are connected to the firmness value. After the addition of lactic acid bacteria, the results for the mixed samples\' firmness and consistency fell (*p* \< .05). The degree of this decrease was more significant in the samples to which lactic acid bacteria were added before mix ripening compared to the samples to which lactic acid bacteria were added after the mix matured (*p* \< .05). The samples that had *L*. *lactis* introduced during either production procedure had the greatest decline. Firmness and consistency values varied between 15.11--16.26 (g) and 374.58--404.91 (g s), respectively, in the samples to which lactic acid bacteria were added before maturation; however, from the ice cream samples to which lactic acid bacteria were added after the mix matures, it varied in the ranges of 16.96--17.58 (g) and 421.48--438.89 (g s) (Table [1](#fsn33762-tbl-0001){ref-type="table"}). Sucrose and lactose, two common sugars, have a positive impact on the mixture\'s ability to hold water. The environment\'s carbohydrates were partially digested by the lactic acid bacteria introduced to the mixture, which reduced the mixture\'s ability to hold water and, as a result, the hardness and consistency values. The inclusion of lactic acid bacteria reduced the cohesiveness and index of viscosity values of ice cream mixtures made in two different ways (*p* \< .05). This decline was more pronounced in samples where lactic acid bacteria had been added before the mixture had fully matured (*p* \< .05).
Honey and sugar increased the ice cream\'s stickiness and viscosity. Carbohydrates also resulted in an increasing effect (Ozdemir et al., [@fsn33762-bib-0033]). Parallel to our research results, Alamprese et al. ([@fsn33762-bib-0005]) and Zhang et al. ([@fsn33762-bib-0048]) displayed that *L*. *plantarum* GG strains added to ice cream production changed all textural ice cream\'s characteristics.
The pH, a~w~, and lactic acid bacteria counts of the samples are shown in Table [1](#fsn33762-tbl-0001){ref-type="table"}. It was determined that the interaction of sample diversity was very significant on pH and lactic acid bacteria number and water activity value. Also, it was shown that the sample interaction had very negative and highly correlative effect impact on water activity (Table [2](#fsn33762-tbl-0002){ref-type="table"}).
::: {#fsn33762-tbl-0002 .table-wrap}
Textural analysis results of ice cream samples.
Samples Firmness (g) Consistency (g s) Cohesiveness (g) Index of viscosity (g s)
-------------------------- ------------------ ------------------- ------------------- --------------------------
Control 17.91 ± 0.03^a^ 445.44 ± 2.81^a^ −18.56 ± 0.24^d^ −29.37 ± 0.72^e^
*Lb*. *casei* A. Ag. 16.26 ± 0.21^cd^ 404.91 ± 2.69^c^ −16.41 ± 0.45^b^ −20.44 ± 0.91^b^
*Lb*. *rhamnosus* A. Ag. 15.11 ± 0.40^e^ 374.58 ± 7.48^d^ −14.99 ± 0.43^a^ −15.59 ± 1.91^a^
*Lb*. *lactis* A. Ag. 15.63 ± 0.66^de^ 396.23 ± 13.76^c^ −15.34 ± 0.66^a^ −14.99 ± 0.98^a^
*Lb*. *rhamnosus* B. Ag. 17.58 ± 0.18^ab^ 438.89 ± 7.14^a^ −17.92 ± 0.21^cd^ −27.06 ± 0.50^de^
*Lb*. *lactis* B. Ag. 16.96 ± 0.07^bc^ 421.48 ± 2.51^b^ −17.29 ± 0.26^bc^ −24.43 ± 0.60^c^
*Lb*. *casei* B. Ag. 17.46 ± 0.23^ab^ 433.20 ± 3.05^ab^ −17.63 ± 0.16^cd^ −26.15 ± 1.10^cd^
*p* Value \<.0001 \<.0001 \<.0001 \<.0001
*r* −.920\* −.898\*\* .940\*\* .958\*\*
*Note*: \*\*Correlation is significant at the 0.01 level (2‐tailed). \*Correlation is significant at the 0.05 level (2‐tailed), a--e (↓): Values with the same capital letters in the same column for each analysis differ significantly (*p* \< .05). *p* \< .0001: Statistically too much significant, *p* \< .01: Statistically too significant; *p* \< .05: Statistically significant; *p* \> .05: Not statistically significant; \**p* \< .05; \*\**p* \< .01.
Abbreviations: A. Mat, After Maturation, B. Mat, Before Maturation; ns, Not statistically significant.
pH and a~W~ values {#fsn33762-sec-0019}
The pH value within the sample reduced according to the added lactic acid bacteria species (*p* \< .05). It was determined that the pH values of the samples inoculated with lactic acid bacteria before mixing maturation from two different production methods decreased more than the method in which lactic acid bacteria were added after musk maturation (*p* \< .05). The samples with lactic acid bacteria introduced before mix maturation had pH values ranging from 6.39 to 6.46, while those with lactic acid bacteria added after mix maturation had pH values ranging from 6.51 to 6.54. The samples created by adding three distinct lactic acid bacteria had pH values that were lower than the control sample. This difference is caused by the organic acids formed due to the metabolization of the hexose sugars in the mix by the added lactic acid bacteria. It was determined that the pH values of the samples inoculated with lactic acid bacteria before the ripening of the mix from two different production methods decreased more compared to the method in which lactic acid bacteria was added after the musk ripening. Similar to our research results, Zhang et al. ([@fsn33762-bib-0047]), Sarwar et al. ([@fsn33762-bib-0036]), and Goktas et al. ([@fsn33762-bib-0018]) declared that the pH levels of their samples were lowered by the addition of probiotic bacteria. According to the added lactic acid bacteria species in the current investigation, the water activity values of the samples altered (*p* \< .05). The water activity value in the samples to which lactic acid bacteria were added before musk maturation was less than those in which lactic acid bacteria were added after mix maturation (*p* \< .05). Although the a~w~ values in the specimens after maturation varied between 0.726 and 0.730 (*p* \> .05), it showed a change in the range of 0.717--0.722 in the samples to which bacteria were added before maturation (*p* \< .05). The lactic acid bacteria numbers in the samples varied according to the added lactic acid bacteria (*p* \< .05). In comparison to samples added after mix maturation, the samples to which lactic acid bacteria were introduced had a greater lactic acid bacteria count (*p* \< .05). It was determined that samples containing *L. lactis* had the highest bacterial count in both production methods.
Lactic acid bacteria count {#fsn33762-sec-0020}
The optimum temperatures in order for lactic acid bacteria to develop belonging to the genus *Lactobacillus* are between 30 and 40°C. Its growth temperature range is 2--53°C (Idler et al., [@fsn33762-bib-0024]). In addition, the medium\'s pH, a~w~, O/R potential, and viscosity. The bacteria can also develop at lower temperatures if the conditions are suitable (Novak et al., [@fsn33762-bib-0032]). The generation time increases as the ambient temperature moves away from the optimum temperature (Adams & Moss, [@fsn33762-bib-0002]). At lower temperatures, the bacteria can survive even if they cannot thrive (Idler et al., [@fsn33762-bib-0024]). According to studies, it has been observed that *L*. *lactis* can grow at lower temperatures than other lactic acid bacteria (Novak et al., [@fsn33762-bib-0032]). The findings presented by the researchers agree with our research results. In ice cream production, lactic acid bacteria were inoculated into the mixes at an average of 10^8^--10^9^ log cfu/g.
Before maturation, the mixture was cooled to 37°C and infected with lactic acid bacteria. The mixtures were then allowed to mature at 4°C for 24 h. The number of lactic acid bacteria increased until the mix temperature dropped below the minimum limit at which lactic acid bacteria could grow. In the other production method, bacteria were added to the mix after the maturation process, and the mixture was then converted into ice cream. Since the time elapsed was not very long, we did not find enough time to increase the number of bacteria in this type of production. In both production methods, some of the bacteria were not affected by the very low temperature during the ice cream production stage and could not survive.
Color (L\*, a\*, and b\*) values {#fsn33762-sec-0021}
One of the most crucial food quality parameters in the eyes of the consumer is color values (L\*: Brightness, a\*: Redness, and b\*: Yellowness) (Chranioti et al., [@fsn33762-bib-0013]). The a\* value of the ice cream sample is positively and significantly correlated with the sample type.
No significant effect of the addition of lactic acid bacteria to the mix or the addition of bacteria before or after the maturation of the mixture on the L\*, a\*, and b\* values was detected (*p* \> .05). Although the a\* values of the samples to which lactic acid bacteria were added after maturation were found to be higher than the samples added before maturation, this distinction is not statistically noteworthy (*p* \> .05). The L\* values of the samples varied between 88.91 and 83.36 (Figure [2](#fsn33762-fig-0002){ref-type="fig"}), a\* values between 0.76 and 1.32 (Figure [3](#fsn33762-fig-0003){ref-type="fig"}), and b\* values between 6.57 and 8.38 (Figure [4](#fsn33762-fig-0004){ref-type="fig"}). In parallel with our findings, Kilinc and Sevik ([@fsn33762-bib-0027]) found that the L\* value of samples was found to be 91.11, means a\*; 1.39 and b\*. The authors stated that they determined it as 8.07.
::: {#fsn33762-fig-0002 .fig}
L\* values of the samples. A. Mat, After Maturation; B. Mat, Before Maturation.
::: {#fsn33762-fig-0003 .fig}
a\* Values of the samples. A. Mat, After Maturation; B. Mat, Before Maturation. \*Correlation is significant at the 0.05 level (2‐tailed).
::: {#fsn33762-fig-0004 .fig}
b\* Values of the Samples. A. Mat, After Maturation; B. Mat, Before Maturation.
Overrun, first dripping, and complete melting time {#fsn33762-sec-0022}
The relationship between the sample types was extremely important on the total melting and overrun values, as well as on the first drop, according to the findings of the variation analysis performed on the physical values of the samples. Moreover, it was revealed that the sample type had a negative effect on the first drip and complete melting and a positive and very highly correlative effect on the overrun (Table [3](#fsn33762-tbl-0003){ref-type="table"}). Ice cream\'s melting behavior is described as an empirical attribute that reflects how resistant it is to melt in warm environments and is observed to be highly correlated with the material\'s thermal conductivity, heat capacity, and microstructure (Sun‐Waterhouse et al., [@fsn33762-bib-0045]). The first dripping and full melting times of the ice cream were shortened by adding lactic acid bacteria to the mixture (*p* \< .05). This decrease was more pronounced in the samples to which lactic acid bacteria were added before the mix was matured compared to the samples added after the mix was matured (*p* \< .05). In both production processes for the two analyses, the samples with additional *L*. *lactis* showed the greatest decrease. Each starter culture may have different effects on the melting characteristics of ice cream and the degree of this effect may differ. However, starter and non‐starter cultures cannot affect ice cream\'s melting properties (Alamprese et al., [@fsn33762-bib-0005]). The amount of air in the mixture, the makeup of the mixture, the network of fat globules, and the ice crystal structure generated during ice cream production are just a few of the many variables that affect how quickly ice cream melts. Due to their ability to store more water and their ability to create micro‐viscosity, sugars and lactose added to the mixture increase the melting resistance of ice cream (Bahram Parvar & Tehrani, [@fsn33762-bib-0010]; Muse & Hartel, [@fsn33762-bib-0030]). In this investigation, lactic acid bacteria were added to the ice cream mixture, and they digested the carbs, breaking down the milk proteins and releasing lactic acid. Organic acid production increased, which led to a decline in melting resistance. Since adding bacteria before mix maturation increased the amount of metabolized sugar, dissolution resistance decreased in these samples.
::: {#fsn33762-tbl-0003 .table-wrap}
Physicochemical and microbiological properties of ice cream samples.
Samples pH a~w~ Bacteria count (log cfu/g)
-------------------------- ----------------- ------------------- ----------------------------
Control 6.56 ± 0.01^a^ 0.729 ± 0.001^a^ 0.00 ± 0.00^f^
*Lb*. *casei* A. Ag. 6.44 ± 0.01^d^ 0.726 ± 0.001^a^ 10.13 ± 0.03^b^
*Lb*. *rhamnosus* A. Ag. 6.46 ± 0.01^d^ 0.728 ± 0.001^a^ 9.82 ± 0.04^c^
*Lb*. *lactis* A. Ag. 6.39 ± 0.01^e^ 0.730 ± 0.001^a^ 11.35 ± 0.04^a^
*Lb*. *rhamnosus* B. Ag. 6.54 ± 0.01^ab^ 0.717 ± 0.003^c^ 8.44 ± 0.08^d^
*Lb*. *lactis* B. Ag. 6.51 ± 0.01^b^ 0.719 ± 0.002^bc^ 8.89 ± 0.02^c^
*Lb*. *casei* B. Ag. 6.52 ± 0.00^bc^ 0.722 ± 0.001^b^ 7.63 ± 0.02^d^
*p* Value \<.0001 .01 \<.0001
*r* .189 −.686\*\* .004
*Note*: a--f (↓): Values with the same capital letters in the same column for each analysis differ significantly (*p* \< .05). \*\*Correlation is significant at the 0.01 level (2‐tailed), *p* \< .0001: Statistically too much significant; *p* \< .01: Statistically too significant; *p* \< .05: Statistically significant; *p* \> .05: Not statistically significant.
Abbreviations: A. Ag, After Aging; B. Ag, Before Aging; ns, Not statistically significant.
Overrun is the quantity of air added to the mixture during the process of turning it into ice cream (Cruz et al., [@fsn33762-bib-0014]). In the current investigation, lactic acid bacteria were added to the ice cream mixtures to reduce overflow (*p* \< .05). This decrease occurred more in the samples to which bacteria were added before maturation than those added after maturation (*p* \< .05). It was shown that among the samples, those made with the inclusion of *L*. *lactis* had the greatest drop in overrun value.
In previous studies, Abghari et al. ([@fsn33762-bib-0001]), Sarwar et al. ([@fsn33762-bib-0036]), and Goktas et al. ([@fsn33762-bib-0018]) reported that they found similar results. In our study, the lactic acid bacteria added to the mixes metabolized the sugars in the medium, causing a decrease in the mix viscosity and, accordingly, a decrease in the amount of overrun. There are also negative effects of the decrease in pH on overrun (Allen et al., [@fsn33762-bib-0007]).
Organic acid amount of samples {#fsn33762-sec-0023}
The organic acid amounts of the samples are shown in Table [4](#fsn33762-tbl-0004){ref-type="table"}. It was determined that the interaction of sample diversity was very significant on lactic, citric, succinic, malic, oxalic, tartaric, and formic acids, which were organic acids in the ice cream samples and very significant on fumaric acid. Moreover, sample diversity had a favorable and highly correlated influence on succinic acid and a detrimental and correlated effect on citric and formic acids (Table [4](#fsn33762-tbl-0004){ref-type="table"}). The addition of lactic acid bacteria enhanced the samples\' levels of organic acids (apart from formic acid) (*p* \< .05). This rise was much higher in the samples to which lactic acid bacteria were added before mix maturation compared to the samples to which lactic acid bacteria were added after maturation (*p* \< .05). The organic acids with the highest increase were determined as tartaric, succinic, and lactic acids, while the highest gains were determined in the samples created after *L*. *lactis* was added. In addition, although malic acid was detected only in the samples to which lactic acid bacteria were added before ripening, formic acid was detected only in the control sample. The main products of lactic acid bacteria\'s metabolism of carbohydrates are organic acids. They occur when glucose in the environment is metabolized by lactic acid bacteria in homo‐ and heterofermentative ways (Sun et al., [@fsn33762-bib-0044]).
::: {#fsn33762-tbl-0004 .table-wrap}
Organic acid content of ice cream samples (mg/kg).
Samples Ascorbic acid Lactic acid Citric acid Succinic acid Malic acid
-------------------------- ------------------- -------------------- ------------------ ---------------------- -----------------
Control 30.45 ± 0.17^ab^ 942.68 ± 6.02^e^ 127.83 ± 6.34^a^ 1885.70 ± 74.88^e^ 0.00 ± 0.00^c^
*Lb*. *casei* A. Ag. 33.05 ± 8.76^a^ 564.40 ± 14.06^f^ 83.371 ± 5.73^b^ 3357.23 ± 21.35^cd^ 8.47 ± 0.17^b^
*Lb*. *rhamnosus* A. Ag. 27.92 ± 5.11^abc^ 3950.78 ± 71.48^b^ 84.827 ± 6.50^b^ 2273.74 ± 17.68^e^ 8.28 ± 0.18^b^
*Lb*. *lactis* A. Ag. 21.17 ± 0.57^bc^ 4610.02 ± 63.36^a^ 88.018 ± 4.25^b^ 2843.28 ± 84.80^d^ 10.42 ± 0.04^a^
*Lb*. *rhamnosus* B. Ag. 20.25 ± 0.33^bc^ 1138.35 ± 43.81^d^ 41.646 ± 5.10^e^ 3627.29 ± 371.86^c^ 0.00 ± 0.00^c^
*Lb*. *lactis* B. Ag. 29.87 ± 5.02^abc^ 1328.28 ± 38.13^c^ 34.897 ± 4.15^e^ 6150.31 ± 205.70^b^ 0.00 ± 0.00^c^
*Lb*. *casei* B. Ag. 18.83 ± 3.84^c^ 1259.29 ± 21.13^c^ 67.393 ± 7.85^c^ 12737.32 ± 388.90^a^ 0.00 ± 00^c^
*p* Value .78 \<.0001 \<.0001 \<.0001 \<.0001
*r* −.388 −.016 −.783\* .800\*\* −.398
Samples Oxalic acid Fumaric acid Tartaric acid Formic acid
-------------------------- ---------------- ----------------- --------------------- -------------------
Control 0.53 ± 0.04^g^ 2.06 ± 0.04^d^ 175.09 ± 6.44^g^ 455.995 ± 6.30^a^
*Lb*. *casei* A. Ag. 3.04 ± 0.10^b^ 2.48 ± 0.14^a^ 16589.74 ± 20.36^a^ 0.00 ± 0.00^b^
*Lb*. *rhamnosus* A. Ag. 1.18 ± 0.06^e^ 2.27 ± 0.06^bc^ 2497.21 ± 20.41^c^ 0.00 ± 0.00^b^
*Lb*. *lactis* A. Ag. 8.33 ± 0.03^a^ 2.53 ± 0.02^a^ 1823.76 ± 19.96^e^ 0.00 ± 0.00^b^
*Lb*. *rhamnosus* B. Ag. 0.76 ± 0.02^f^ 2.11 ± 0.07^cd^ 2066.37 ± 18.94^d^ 0.00 ± 0.00^b^
*Lb*. *lactis* B. Ag. 1.51 ± 0.02^c^ 2.39 ± 0.08^ab^ 758.56 ± 7.88^f^ 0.00 ± 0.00^b^
*Lb*. *casei* B. Ag. 1.33 ± 0.01^d^ 2.12 ± 0.04^cd^ 4394.27 ± 121.08^b^ 0.00 ± 0.00^b^
*p* Value \<.0001 .02 \<.0001 \<.0001
*r* −.031 −.063 −.263 −.612\*
*Note*: a--f (↓): Values with the same capital letters in the same column for each analysis differ significantly (*p* \< .05). \*\*Correlation is significant at the 0.01 level (2‐tailed). \*Correlation is significant at the 0.05 level (2‐tailed), *p* \< .0001: Statistically too much significant; *p* \< .01: Statistically too significant; *p* \< .05: Statistically significant; *p* \> 0.05: Not statistically significant; \**p* \< .05; \*\**p* \< .01.
Abbreviations: A. Ag, After Aging, B. Ag, Before Aging; ns, Not statistically significant.
Fatty acid distributions of ice cream samples {#fsn33762-sec-0024}
Table [5](#fsn33762-tbl-0005){ref-type="table"} displays the ice cream sample fatty acid distributions. The conclusion was made that the interaction of sample type was very significant on the amounts of all other fatty acids, except for capric, tridecanoic, eicosanoic, docosanoic, and linolenic acids. In addition, the sample type lauric, palmitic, oleic, and linoleic acids were positively correlated---excessively with respect to palmitoleic and γ‐linolenic acids and negatively correlated with capric acid (Table [5](#fsn33762-tbl-0005){ref-type="table"}). The amounts of fatty acids varied depending on the addition of lactic acid and the production method (*p* \< .05). Amount of this change was generally higher in the samples to which lactic acid bacteria were added after mix maturation. When the distribution of detected fatty acids was examined, it was revealed that the amount of saturated fatty acid was higher than the amount of unsaturated fatty acid and the amount of medium‐chain fatty acid was higher than the amount of short and long‐chain fatty acids in all samples. The highest amount of saturated fatty acid in both production forms was 66.308% and 66.984%, respectively, the samples created using the addition of *L*. *rhamnosus*. The highest amount of saturated fatty acids were detected in samples produced with the addition of *L. rhamnosus*, with 66.308% and 66.984%, respectively, in both production methods. The least saturated fatty acid is; Again, in both production methods, it was detected in samples produced with the addition of L. casei at 63.623% and 66.167%, respectively. The highest medium chain fatty acid was determined at 48.882% in the product produced with the addition of *L*. *lactis* after mix ripening.
::: {#fsn33762-tbl-0005 .table-wrap}
Distribution of % fatty acids of ice cream samples.
Saturated fatty acids
--------------------------- ----------------------- ------------------- ------------------- ----------------- -----------------
RT (s.) 6.211 10.517 18.017 28.085 38.832
Control 0.518 ± 0.006^c^ 0.886 ± 0.005^bc^ 0.728 ± 0.007^ab^ 1.77 ± 0.006 cd 2.329 ± 0.04^d^
*Lb*. *casei* A. Mat. 0.405 ± 0.006^d^ 0.721 ± 0.007^f^ 0.603 ± 0.007^d^ 1.57 ± 0.007e 2.495 ± 0.03^b^
*Lb*. *rhamnosus* A. Mat. 0.568 ± 0.004^b^ 0.867 ± 0.011^c^ 0.709 ± 0.016^bc^ 1.80 ± 0.028bc 2.463 ± 0.02^b^
*Lb*. *lactis* A. Mat. 0.334 ± 0.003^e^ 0.847 ± 0.007^d^ 0.708 ± 0.011^bc^ 1.75 ± 0.008d 2.394 ± 0.02^c^
*Lb*. *rhamnosus* B. Mat. 0.582 ± 0.003^a^ 0.896 ± 0.006^b^ 0.725 ± 0.007^ab^ 1.84 ± 0.008a 2.486 ± 0.02^b^
*Lb*. *lactis* B. Mat. 0.558 ± 0.007^b^ 0.952 ± 0.011^a^ 0.753 ± 0.018^a^ 1.81 ± 0.012ab 2.469 ± 0.02^b^
*Lb*. *casei* B. Mat. 0.409 ± 0.007^d^ 0.813 ± 0.007^e^ 0.693 ± 0.010^c^ 1.82 ± 0.011ab 2.647 ± 0.02^a^
*p* Value \<.0001 \<.0001 \<.0001 .038 \<.0001
*r* −.006 −.198 .334 −.623\* .717\*\*
Saturated fatty acids
--------------------------- ----------------------- ------------------ ------------------ ------------------- ------------------
RT (s.) 44.044 46.749 51.735 56.531 59.031
Control 0.076 ± 0.007^a^ 10.107 ± 0.05^f^ 1489 ± 0.009^a^ 0.374 ± 0.005^a^ 35.115 ± 0.03^e^
*Lb*. *casei* A. Mat. 0.063 ± 0.005^a^ 10.327 ± 0.01^c^ 1287 ± 0.004^d^ 0.302 ± 0.008^d^ 35.134 ± 0.06^e^
*Lb*. *rhamnosus* A. Mat. 0.068 ± 0.003^a^ 10.444 ± 0.02^b^ 1470 ± 0.012^ab^ 0.352 ± 0.006^b^ 35.331 ± 0.06^d^
*Lb*. *lactis* A. Mat. 0.068 ± 0.008^a^ 10.026 ± 0.02^e^ 1409 ± 0.013^c^ 0.332 ± 0.007^c^ 35.186 ± 0.10^e^
*Lb*. *rhamnosus* B. Mat. 0.071 ± 0.008^a^ 10.488 ± 0.01^b^ 1472 ± 0.008^ab^ 0.352 ± 0.003^b^ 35.693 ± 0.02^c^
*Lb*. *lactis* B. Mat. 0.069 ± 0.006^a^ 10.159 ± 0.01^d^ 1466 ± 0.005^ab^ 0.343 ± 0.010^bc^ 36.145 ± 0.04^a^
*Lb*. *casei* B. Mat. 0.070 ± 0.007^a^ 10.498 ± 0.01^a^ 1415 ± 0.009^b^ 0.344 ± 0.006^bc^ 35.798 ± 0.03^b^
*p* Value .676 \<.0001 \<.0001 \<.0001 \<.0001
*r* −.036 .517 .295 −.027 .819\*\*
Saturated fatty acids Monounsaturated fatty acids
--------------------------- ----------------------- ----------------------------- ------------------ ------------------- ------------------
RT (s.) 59.905 67.858 75.882 83.54 59.904
Control 0.767 ± 0.007^a^ 11.304 ± 0.007^a^ 0.207 ± 0.010^a^ 0.096 ± 0.003^ab^ 2476 ± 0.006^cd^
*Lb*. *casei* A. Mat. 0.644 ± 0.003^d^ 9816 ± 0.014^f^ 0.180 ± 0.028^a^ 0.076 ± 0.006^c^ 2484 ± 0.006^c^
*Lb*. *rhamnosus* A. Mat. 0.746 ± 0.004^b^ 11.197 ± 0.015^b^ 0.199 ± 0.007^a^ 0.094 ± 0.011^ab^ 2480 ± 0.007^c^
*Lb*. *lactis* A. Mat. 0.729 ± 0.006^c^ 10.537 ± 0.011^e^ 0.181 ± 0.006^a^ 0.074 ± 0.006^c^ 2449 ± 0.011^e^
*Lb*. *rhamnosus* B. Mat. 0.753 ± 0.004^b^ 11.301 ± 0.020^a^ 0.217 ± 0.004^a^ 0.108 ± 0.004^a^ 2493 ± 0.004^b^
*Lb*. *lactis* B. Mat. 0.730 ± 0.006^c^ 10.761 ± 0.005^c^ 0.187 ± 0.004^a^ 0.082 ± 0.004^bc^ 2455 ± 0.008^de^
*Lb*. *casei* B. Mat. 0.721 ± 0.007^c^ 10.677 ± 0.011^d^ 0.184 ± 0.065^a^ 0.078 ± 0.003^c^ 2647 ± 0.016^a^
*p* Value \<.0001 \<.0001 .759 .05 \<.0001
*r* .079 .089 −.113 −.160 .614\*
RT (s.) Monounsaturated fatty acids Polyunsaturated fatty acids
--------------------------- ----------------------------- ----------------------------- ----------------- ------------------ ------------------
Control 68.61 50.878 70.344 71.845 73.985
*Lb*. *casei* A. Mat. 24.854 ± 0.008^e^ 1982 ± 0.009^a^ 2152 ± 0.006^d^ 0.433 ± 0.006^e^ 0.581 ± 0.007^a^
*Lb*. *rhamnosus* A. Mat. 25.227 ± 0.014^c^ 1803 ± 0.014^c^ 2105 ± 0.011^e^ 0.510 ± 0.019^c^ 0.547 ± 0.006^b^
*Lb*. *lactis* A. Mat. 24.888 ± 0.017^e^ 1845 ± 0.017^b^ 2056 ± 0.011^f^ 0.450 ± 0.005^d^ 0.591 ± 0.008^a^
*Lb*. *rhamnosus* B. Mat. 25.018 ± 0.013^d^ 1288 ± 0.011^d^ 1979 ± 0.011^g^ 0.424 ± 0.007^e^ 0.583 ± 0.010^a^
*Lb*. *lactis* B. Mat. 25.026 ± 0.007^d^ 1852 ± 0.014^b^ 2357 ± 0.013^b^ 0.555 ± 0.010^b^ 0.592 ± 0.004^a^
*Lb*. *casei* B. Mat. 26.02 ± 0.008^a^ 1795 ± 0.013^c^ 2177 ± 0.016^c^ 0.452 ± 0.003^d^ 0.591 ± 0.007^a^
*p* Value 25.335 ± 0.32^b^ 1865 ± 0.024^b^ 2544 ± 0.024^a^ 0.852 ± 0.004^a^ 0.587 ± 0.010^a^
*r* \<.0001 \<.0001 \<.0001 \<.0001 .006
.691\*\* −.120 .669\*\* .635\* .491
Samples SFA USFA SCFA MCFA LCFA
--------------------------- -------- -------- ------ -------- --------
Control 65.766 32.478 6.23 47.161 39.627
*Lb*. *casei* A. Mat. 63.623 32.676 5.79 47.113 38.461
*Lb*. *rhamnosus* A. Mat. 66.308 32.31 6.41 47.664 39.475
*Lb*. *lactis* A. Mat. 64.575 31.741 6.03 47.021 38.796
*Lb*. *rhamnosus* B. Mat. 66.984 32.875 6.53 48.076 40.361
*Lb*. *lactis* B. Mat. 66.484 33.49 6.54 48.882 41.022
*Lb*. *casei* B. Mat. 66.167 33.83 6.38 48.576 42.357
*Note*: a--f (↓): Values with the same capital letters in the same column for each analysis differ significantly (*p* \< .05). \*\*Correlation is significant at the 0.01 level (2‐tailed). \*Correlation is significant at the 0.05 level (2‐tailed), *p* \< .0001: Statistically too much significant, *p* \< .01: Statistically too significant; *p* \< .05: Statistically significant; *p* \> .05: Not statistically significant; \**p* \< .05; \*\**p* \< 0.01.
Abbreviations: A. Mat, After Maturation; B. Mat, Before Maturation; A. Ag, After Aging; B. Ag, Before Aging; CLA, Conjugated linolenic acid; LCFA, Long chain fatty acids (≥C:18); MCFA, Medium chain fatty acids (C:14--C:16); ns, Not statistically significant; RT, Retention Time; SCFA, Short chain fatty acids (C:4--C:12); SFA, Saturated fatty acids; USFA, Unsaturated fatty acids.
This study investigated ice cream\'s physicochemical and technological properties by adding different lactic acid bacteria using two different production methods. Adding lactic acid bacteria to the mix caused a decrease in firmness, consistency, cohesiveness, index of viscosity, pH, a~w~ first drop, complete melting, and overrun values. These decreases were especially higher in the samples to which lactic acid bacteria were added before mix maturation. In addition, it was found that samples created by incorporating lactic acid bacteria had more organic acid (apart from formic acid). Also, the addition of lactic acid and the technique of manufacture affected the amount of fatty acids in the ice cream samples; the rate of change was often larger in the samples that included lactic acid bacteria following mix ripening. Particularly, in the samples with lactic acid bacteria introduced after mix maturation as compared to the control sample, the levels of short‐ and medium‐chain fatty acids increased. Consumer demand for foods with better functional qualities is increasing today. The results of this study suggest that, because of fermenting the ice cream mix with lactic acid bacteria, it becomes a product richer in terms of physicochemical properties and nutritional values. It has been demonstrated that incorporating lactic acid bacteria into two distinct industrial processes, especially after mix maturation, is more effective on the results.
The findings from this study reveal that many different combinations of bacteria and milk varieties can be used in the production of ice cream in the future. By this means, it is obvious that it will enable to obtain more functional, nutritionally rich, and useful products. In addition, it is thought that a new page will be opened in the ice cream industry with the production of these products.
AUTHOR CONTRIBUTIONS {#fsn33762-sec-0033}
**Gokhan Akarca:** Conceptualization (lead); data curation (equal); investigation (equal); methodology (lead); project administration (lead); resources (equal); writing -- original draft (lead); writing -- review and editing (equal). **Mehmet Kılınç:** Formal analysis (equal); investigation (equal); resources (equal); writing -- review and editing (equal). **Ayşe Janseli Denizkara:** Data curation (equal); formal analysis (equal); resources (equal); writing -- review and editing (equal).
FUNDING INFORMATION {#fsn33762-sec-0026}
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.
CONFLICT OF INTEREST STATEMENT {#fsn33762-sec-0027}
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this manuscript.
ETHICS STATEMENT {#fsn33762-sec-0030}
This article does not contain any studies with human participants or animals performed by any of the authors.
CONSENT TO PARTICIPATE {#fsn33762-sec-0031}
The corresponding author and all the co‐authors participated in the preparation of this manuscript.
INFORMED CONSENT {#fsn33762-sec-0032}
For this type of study, formal consent is not required.
DATA AVAILABILITY STATEMENT {#fsn33762-sec-0029}
The original data with the respective analysis corresponding to the results shown in this work are available up to reasonable requirements.
|
Wikipedia:WikiProject Spam/LinkReports/pravatilegalfunding.com
Links
* pravatilegalfunding.com resolves to [//<IP_ADDRESS> <IP_ADDRESS>]
* Link is not on the blacklist.
* Link is not on the domainredlist.
* Link is not on the Monitorlist.
* None of the mentioned users is on the blacklist.
* Link is not on the whitelist.
* Link is not on the monitor list.
* Link is not on the whitelist.
* Link is not on the monitor list.
Users
No users found.
Additions
No additions recorded.
|
Systems and methods for replication of data utilizing delta volumes
ABSTRACT
A method of data replication from a first data storage device to a second data storage device. The method may include generating, at the first data storage device, at spaced time intervals, a plurality of snapshots for a logical data volume of the first data storage device, the logical data volume being an abstraction of data blocks from one or more physical storage devices, each snapshot identifying changes of data for at least a portion of the logical data volume since a most previous snapshot. Also at the first data storage device, the method includes generating a delta volume, the delta volume indicating changes in the data of at least a portion of the logical data volume between two non-consecutive snapshots. The method further involves replicating the delta volume to the second data storage device, and replicating the changes to the data indicated therein at the second data storage device.
FIELD OF THE INVENTION
The present disclosure generally relates to systems and methods for replication of, for example, backup or historical data. Particularly, the present disclosure relates to replication processes for data utilizing delta volumes.
BACKGROUND OF THE INVENTION
Data storage on disk has been rapidly outgrowing typical means to back up data on those disks to removable storage, such as tape. At the same time, the need to provide cost effective backup copies has grown out of, for example, practical needs and trade and federal rules/legislation.
A single and simple remote replication target site may suffice for storing historical data. However, the cost to maintain every snapshot taken at the source site at the remote site could be prohibitive. Items contributing to the costs, include but are not limited to: the opportunity cost of the bandwidth used; the real dollar cost of the bandwidth; the real dollar cost of the remote site, including for example, the size of the site, the power required to operate the site, the employee cost for the site, etc.; the administrative cost for replication; and the storage cost, including the cost of the disk drives or other block store devices.
Conventional methods of replicating data to a backup storage can result in extra, unnecessary data being transferred between the source site and backup site. For example, in one example method of replicating data, consider a data storage system 100 having local storage 102 and backup or remote storage 104, as illustrated in FIG. 1. At local storage 102, which maintains active data input/output (I/O), the system is configured for local recovery snapshots at 8 hour intervals, i.e., snapshots 106, 108, 110, and 112. Each snapshot identifies the changes or delta between it and the prior snapshot. For example, snapshot 108 identifies only the changes since snapshot 106 was taken, or from 12 am to 8 am. In contrast, the backup storage 104 may, for example, be configured for only nightly backup, i.e., backup once every 24 hours, as a lengthier backup interval period for the backup data may be sufficient and more efficient in overall storage use at the backup site because the data is less active or inactive. Regardless of the 24 hour backup period at the backup storage 104, however, because the snapshots at the local storage identify only the deltas between each snapshot, in the course of a day, each snapshot will nonetheless be at least temporarily replicated to the backup storage, as illustrated in FIG. 1, in order for the backup storage system to identify the entire day's changes and appropriately create the 24-hour daily backup. To save space, any intermediate backups 114, 116 can be deleted once the 24 hour backup 118 is committed. Nonetheless, assuming an example 10 terabyte (TB) dataset and a worst case scenario where 100% of the dataset changes every 8 hours at the local storage, such conventional method would require the entire 10 TB to be transferred to the backup storage 104 every 8 hours, resulting in a total daily transfer of 30 TB.
In the above example, only 24 hour snapshots 118 and 120 are of interest, and if intermediate snapshots 112, 114 could be eliminated, even in the worst case scenario, the daily transfer of data from the local storage 102 to the backup storage 104 would be reduced from 30 TB to 10 TB. The problem may increase even more where, for example only, the dataset is much larger than 30 TB, where the local storage takes snapshots at intervals shorter than 8 hours, and/or where the backup storage takes backups at larger intervals than 1 day. However, it is recognized that systems where the dataset is much smaller than 30 TB, where the local storage takes snapshots at intervals longer than 8 hours, and/or where the backup storage takes backups at smaller intervals than 1 day would likely have the same issues.
Thus, there is a need in the art for providing more cost effective and/or more efficient replication processes for, for example, backup or historical data.
BRIEF SUMMARY OF THE INVENTION
The present disclosure, in one embodiment, relates to a method of data replication from a first data storage device to a second data storage device. The method may include generating, at the first data storage device, at spaced time intervals, a plurality of snapshots for a logical data volume of the first data storage device, the logical data volume being an abstraction of data blocks from one or more physical storage devices, and each snapshot identifying changes of data for at least a portion of the logical data volume since a most previous snapshot. In some embodiments, the spaced time intervals are predetermined time intervals. Also at the first data storage device, the method includes generating a delta volume, the delta volume indicating changes in the data of at least a portion of the logical data volume between two non-consecutive snapshots. The method further involves replicating the delta volume to the second data storage device, and replicating the changes to the data indicated therein at the second data storage device. The delta volume at the first storage device may be discarded after being replicated to the second data storage device. The method may further include generating a plurality of delta volumes at spaced time intervals.
In even further embodiments, the method may involve generating a combined delta volume, the combined delta volume indicating changes in data of at least a portion of the logical data volume between two non-consecutive delta volumes. A plurality of such combined delta volumes may also be generated at spaced time intervals. Similarly, a combined delta volume may be replicated to a third data storage device, and the changes to the data indicated therein may be thus replicated at the third data storage device.
The present disclosure, in another embodiment, also relates to a method of data replication from a first data storage device to a second data storage device. The method may include receiving a delta volume at the second data storage device, the delta volume indicating the changes in data of at least a portion of a logical data volume of the first data storage device, and replicating the changes to the data indicated therein at the second data storage device. In this regard, the first data storage device may generate a plurality of snapshots for the logical data volume, the logical data volume being an abstraction of data blocks from one or more physical storage devices, with each snapshot identifying changes of data for at least a portion of the logical data volume since a most previous snapshot. The delta volume may thus indicate changes in data of at least a portion of the logical data volume between two non-consecutive snapshots.
The present disclosure, in yet another embodiment, relates to a delta volume for a data storage system, the delta volume comprising an indication of changes in data between two non-consecutive snapshots of the data storage system, with each snapshot identifying changes of data for at least a portion of the data storage system since a most previous snapshot. Each snapshot may identify changes of data for a logical volume of the data storage system since a most previous snapshot.
While multiple embodiments are disclosed, still other embodiments of the present disclosure will become apparent to those skilled in the art from the following detailed description, which shows and describes illustrative embodiments of the invention. As will be realized, the various embodiments of the present disclosure are capable of modifications in various obvious aspects, all without departing from the spirit and scope of the present disclosure. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not restrictive.
BRIEF DESCRIPTION OF THE DRAWINGS
While the specification concludes with claims particularly pointing out and distinctly claiming the subject matter that is regarded as forming the various embodiments of the present disclosure, it is believed that the invention will be better understood from the following description taken in conjunction with the accompanying Figures, in which:
FIG. 1 is a schematic of a conventional replication process from local to backup storage.
FIG. 2 is a schematic of a disk drive system suitable with the various embodiments of the present disclosure.
FIG. 3 is a schematic of snapshot scheme according to one embodiment of the present disclosure.
FIG. 4 is a schematic of a delta volume according to one embodiment of the present disclosure.
FIG. 5 is a schematic of an example use of replication utilizing delta volumes according to one embodiment of the present disclosure.
DETAILED DESCRIPTION
The present disclosure relates to novel and advantageous systems and methods for replication of, for example, backup or historical data. Particularly, the present disclosure relates to novel and advantageous systems and methods for replication of data utilizing delta volumes.
The systems and methods of the present disclosure may be particularly useful in the context of a disk drive system, or virtual disk drive system, such as that described in U.S. Pat. No. 7,613,945, titled “Virtual Disk Drive System and Method,” issued Nov. 3, 2009, the entirety of which is hereby incorporated herein by reference. Such disk drive systems allow the efficient storage of data by dynamically allocating the data across a page pool of storage, or a matrix of disk storage blocks, and a plurality of disk drives based on RAID-to-disk mapping. They may protect data from, for example, system failures or virus attacks by automatically generating and storing snapshots or point-in-time copies of the system or matrix of disk storage blocks at, for example, predetermined time intervals, user configured dynamic time stamps, such as, every few minutes or hours, etc., or at times directed by the server. These time-stamped snapshots permit the recovery of data from a previous point in time prior to the system failure, thereby restoring the system as it existed at that time. These snapshots or point-in-time data may also be used by the system or system users for other purposes, such as but not limited to, testing, while the main storage can remain operational. Generally, using snapshot capabilities, a user may view the state of a storage system as it existed in a prior point in time.
FIG. 2 illustrates one embodiment of a disk drive or data storage system 200 in a computer environment 202, such as that disclosed in U.S. Pat. No. 7,613,945, and suitable with the various embodiments of the present disclosure. As shown in FIG. 2, the disk drive system 200 may include a data storage subsystem 204, which may include a RAID subsystem, as will be appreciated by those skilled in the art, and a disk manager 206 having at least one disk storage system controller. The data storage subsystem 204 and disk manager 206 can dynamically allocate data across disk space of a plurality of disk drives 208 based on, for example, RAID-to-disk mapping or other storage mapping technique.
As generally described above, the data storage system 204 may automatically generate a snapshot(s) or Point-in-Time Copy(ies) (PITC) of the system, or a matrix of disk storage blocks or volume(s) thereof. A snapshot may include a record of write operations to, for example, a volume so that a “view” may subsequently be created to see the contents of the volume as they existed in the past, such as for data recovery. A Logical Block Address (LBA) remapping layer may be added to a data path within the virtualization layer, and may therefore provide another layer of virtual LBA mapping within the I/O path. The snapshot or PITC need not copy all volume information, and instead, in some embodiments, may merely modify a table that the remapping layer uses. Snapshot capabilities of the data storage system 204 may include, but are not limited to, creating snapshots, managing snapshots, coalescing snapshots, and controlling I/O operations of the snapshots.
FIG. 3 illustrates one embodiment of a snapshot scheme, as described in U.S. Pat. No. 7,613,945. As illustrated in FIG. 3, a top-level snapshot or PITC for a volume, or a view volume as will be described below, may be an active snapshot or PITC (AP) 202. The AP 302 may satisfy all read and write requests to the volume. In many embodiments, the AP is the only snapshot or PITC for the volume that may accept write requests. The AP 302 may contain a summary of data page pointers for the entire volume.
The next snapshot level down from the AP 302 may be the most recently active snapshot or PITC that is no longer active. In the embodiment shown, the snapshot 304 was taken or committed at time T4. The next most recent snapshot or PITC 306 was taken or committed at time T3. The pattern may continue for snapshots or PITCs taken at times T2, T1, and T0. The number of snapshots or PITCs shown in FIG. 3 are for illustration purposes only. Of course, there could be fewer or many more snapshots than that shown.
FIG. 3 also illustrates that a view volume 308 may subsequently be created to see or view the contents of a volume as they were at some point in the past. In general, view volumes provide access to previous points-in-time and can support normal volume I/O operations. A view volume PITC may track the difference between the original PITC from which the view volume was generated, and the view volume allows the user to access the information contained within the original PITC without modifying the underlying data of the original PITC. In this sense, a view volume branches from the PITC from which it was generated and may support such actions as, but not limited to, recovery, test, backup operations, etc. In the example shown, the view volume 308 may be created from snapshot or PITC 210, which was taken at T2. Thus, the view volume 308 provides a view of the volume as it was at time T2. The view volume may initially be an active snapshot or PITC and may satisfy all read and write requests to the view volume. However, a view volume 308 may also take advantage of snapshot capabilities and have snapshots or PITCs of its own similarly generated at predetermined time intervals, user configured dynamic time stamps, such as, every few minutes or hours, etc., or at times directed by the server. In this regard, the view volume may include an active PITC 310 and one or more snapshots or PITCs, e.g., 312, that were generated at previous points in time. In many embodiments, the active PITC for the view volume is the only snapshot or PITC for the view volume that may accept write requests.
During a basic life cycle of a snapshot or PITC, the snapshot or PITC may go through a number of following states before it is committed as read-only:
1. Create page table—Upon creation of the PITC, a page table may be created.
2. Commit space for PITC to disk—This generates the storage on the disk for the PITC. By writing the table at this point, it may ensure that the required space to store the table information is allocated before the PITC is taken. At the same time, the PITC object may also committed to the disk.
3. Accept I/O—As the AP, it may now handle read and write requests for the volume. In many embodiments, this is the only state that accepts write requests to the table.
4. Commit PITC table to disk as read-only—The PITC is no longer the AP, and no longer accepts additional pages. A new AP has taken over. In some embodiments, the table will no longer change unless it is removed during a coalesce operation with one or more other snapshots or PITCs. In this sense, it is read-only.
5. Release table memory—Frees any extra memory that the table required in order to release available resources.
As described above, conventional methods of replicating data to backup storage can result in extra, unnecessary data being transferred between the source site and backup site. For example, in the example method illustrated in FIG. 1, each and every snapshot will nonetheless be, at least temporarily, replicated to the backup site.
The present disclosure improves snapshot and replication processes for historical data in a data storage system, such as but not limited to the type of data storage system described in U.S. Pat. No. 7,613,945. The disclosed improvements can provide more cost effective and/or more efficient replication processes for, by way of example, backup or historical data.
In embodiments of the present disclosure, each snapshot or PITC may be represented or understood as identifying the changes or delta between it and the prior snapshot or PITC, or some previous consecutive point in time. Generally, as will be described in more detail below, in addition to utilizing consecutive snapshots, as discussed with respect to FIG. 1, a delta volume 402, illustrated in FIG. 4, may be created at the local storage 102 that identifies the changes or delta between two non-consecutive snapshots or PITCs, such as between snapshots 106 and 112. In one embodiment, a delta volume may be created by coalescing a snapshot at the desired end point in time (e.g., snapshot 112) with any intermediate snapshots (e.g., snapshots 108, 110) between an initial point in time (e.g., snapshot 106) and the endpoint snapshot to form or create a single volume identifying the changes between data at the initial point in time and the desired end point in time. In this regard, in one embodiment, a delta volume may contain data relating to just the changes to the data of a volume between two arbitrary or non-consecutive snapshots or PITCs. A delta volume may be an abstraction of the data, identifying the changes in data over time, but may not store the actual data. Accordingly, between snapshots/PITCs and delta volumes, a manner is provided to relatively easily provide a view of the change or delta in data between any two desirable points in time. The delta volume also provides a means for local-to-backup replication without the potential of unnecessarily copying unchanged or irrelevant data deltas in the process. In this regard, the delta volume 402 may be relatively simply copied or sent to the backup storage 104 to establish a backup at desired backup intervals without requiring the replication of intermediate snapshots, e.g., 112, 114. If desired, the delta volume could then be discarded by the source or initiating site to release the storage space temporarily utilized by the delta volume.
In some embodiments, a delta volume could return relatively highly compressible data, such as zeros for example, for unchanged data blocks, thereby permitting the delta volume to be backed up very efficiently utilizing traditional backup software tools. A restoration software tool could be used to restore an original volume from such traditionally backed up delta volumes by recombining them the delta volumes, and could do so while preserving snapshot hierarchies.
As an example, the various embodiments of the present disclosure permit the use of relatively frequent non-replicating snapshots or PITCs, during, for example, active times when frequent local backup may be desired, and the use of delta volumes at relatively sparse intervals for larger or remote backups of historical data. And, while in a broad sense, a delta volume may be considered as a volume that identifies the changes or delta between any two non-consecutive points in time, or more particularly any two non-consecutive snapshots or PITCs, in further embodiments, a delta volume may also be used, and created, as a volume that identifies the changes or delta between any two non-consecutive delta volumes or other logical data structure.
As an example of replication utilizing delta volumes and the above features, which is not meant to be limiting and is provided mainly for illustration purposes, in one instance illustrated in FIG. 5, snapshots or PITCs may be taken or committed daily at hourly, bi-hourly, etc. time intervals at a local site 502. In this sense, the local site may keep record, for example, of hourly changes in the data storage system, or selected portions thereof. Being the most recently active data, it may be desirable to keep such frequent backups if, for example, disaster strikes or the data needs to be accessed for testing or other recovery. As time passes, it can become inefficient to store a lot of historical data with active data. Thus, the local site 502 may be configured to keep hourly snapshots or PITCs for only some relatively short period of time, such as but not limited to, 1 day, 2 days, 3 days, 4 days, or more depending, for example, on the desired setup, use, and industry rules and regulations.
Accordingly, a delta volume may be created at the local site 502 and may be configured to identify changes in the data on a daily basis, for example, rather than an hourly basis. More specifically, a day's worth of snapshots at the local site may be copied or coalesced into a delta volume, which would then identify the resulting changes in the data since a point in time 24 hours prior to the creation of the delta volume. The daily delta volumes may be efficiently replicated to another local or a remote site 504, which may keep a replicated copy of the data at the local site 502, but may update the replicated data only on a daily basis based on the daily delta volumes received from the local site. The local site 502 may discard the daily delta volumes once replicated to the remote site 504. In this sense, the remote site 504 may keep record, for example, of daily changes in the data storage system, or selected portions thereof. Likely being less important historical data, it may thus be sufficient to keep less frequent backups at the remote site 504. Nonetheless, as time passes, it may still be inefficient to store large amounts of long-term historical data. Thus, the remote site 504 may be configured to keep daily delta volumes for only a period of time, such as but not limited to, 1 week, 2 weeks, 3 weeks, or more depending, for example, on the desired setup, use, and industry rules and regulations.
In still further embodiments, also illustrated in FIG. 5, delta volumes may further be created at the remote site 504 and may be configured to identify changes in the data on a weekly basis, for example, rather than an hourly or daily basis. More specifically, a week's worth of daily delta volumes at the remote site 504 may be copied or coalesced into a longer term delta volume, which would then identify the resulting changes in the data since a point in time 1 week prior to the creation of the delta volume. The weekly delta volumes may be efficiently replicated to yet another site 506, which may keep a replicated copy of the data at the local 502 and remote 504 sites, but may update the replicated data only on a weekly basis based on the weekly delta volumes received from the remote site 504. The remote site 504 may discard the weekly delta volumes once replicated to site 506. In this sense, site 506 may keep record, for example, of weekly changes in the data storage system, or selected portions thereof. Likely being historical data of even lower importance, it may thus be sufficient to keep even lesser frequent backups at site 506. Nonetheless, as time passes, it may still become inefficient to store large amounts of such historical data. Thus, site 506 may be configured to keep weekly delta volumes for only a period of time, such as but not limited to, 1 month, 2 months, 3 months, or more depending, for example, on the desired setup, use, and industry rules and regulations.
Accordingly, delta volumes may further be created at site 506 and may be configured to identify changes in the data on a monthly basis, for example, rather than an hourly, daily, or weekly basis. More specifically, a month's worth of weekly delta volumes at site 506 may be copied or coalesced into a longer term delta volume, which would then identify the resulting changes in the data since a point in time 1 month prior to the creation of the delta volume. The monthly delta volumes may be replicated to yet another site 508, which may keep a replicated copy of the data at the local 502 and remote 504, 506 sites, but may update the replicated data only on a monthly basis based on the monthly delta volumes received from site 506. Site 506 may discard the monthly delta volumes once replicated to site 508. In this sense, site 508 may keep record, for example, of monthly changes in the data storage system, or selected portions thereof Because such older historical data is likely to be of low importance, it may be sufficient to keep less frequent backups at site 508. Nonetheless, as time passes, it may still become inefficient to store large amounts of such historical data. Thus, site 508 may be configured to keep monthly delta volumes for only a period of time, such as but not limited to, 1 year, 2 years, 3 years, or more depending, for example, on the desired setup, use, and industry rules and regulations.
The pattern could repeat with larger and larger delta volumes and more local or remote storage sites. Similarly, it need not be the case that the delta volume replication must be chained from site to site growing from smallest delta volume interval to largest delta volume interval in the manner described. For example only, site 508 need not receive monthly delta volumes from only site 506, but could additionally or alternately receive monthly delta volumes from any of sites 502 and 504. Additionally, it is recognized that the above examples are but a few ways in which delta volumes may be utilized, and the various embodiments of the present disclosure are not limited to the examples provided above. It is recognized that delta volumes as described herein, and replication utilizing delta volumes, can have many broad and advantageous uses in a data storage system, and delta volumes need not be used only for replication purposes.
The various embodiments of the present disclosure relating to replication of data utilizing delta volumes provide significant advantages over conventional systems and methods for data replication. For example, the various embodiments of the present disclosure may reduce cost in a variety of ways, including but not limited to: reducing I/O activity between the local storage and the backup or remote storage; reducing total bandwidth use; reducing backup time; and reducing the total amount of storage required at the backup site, for example, by eliminating the need to store temporary intermediate snapshots or PITCs.
In the foregoing description various embodiments of the present disclosure have been presented for the purpose of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obvious modifications or variations are possible in light of the above teachings. The various embodiments were chosen and described to provide the best illustration of the principals of the disclosure and their practical application, and to enable one of ordinary skill in the art to utilize the various embodiments with various modifications as are suited to the particular use contemplated. All such modifications and variations are within the scope of the present disclosure as determined by the appended claims when interpreted in accordance with the breadth they are fairly, legally, and equitably entitled.
We claim:
1. A method of data replication from a first data storage device to a second data storage device, the method comprising: at the first data storage device, generating, at spaced time intervals, a plurality of snapshots for a logical data volume of the first data storage device, the logical data volume being an abstraction of data blocks from one or more physical storage devices, each snapshot identifying changes of data for at least a portion of the logical data volume since a most previous snapshot; at the first data storage device, generating a delta volume, the delta volume indicating changes in the data of at least a portion of the logical data volume between two non-consecutive snapshots; and replicating the delta volume to the second data storage device, and replicating the changes to the data indicated therein at the second data storage device.
2. The method of claim 1, wherein the delta volume at the first storage device is discarded after being replicated to the second data storage device.
3. The method of claim 1, wherein the spaced time intervals are predetermined time intervals.
4. The method of claim 1, further comprising generating a plurality of delta volumes at spaced time intervals.
5. The method of claim 4, further comprising generating a combined delta volume, the combined delta volume indicating changes in data of at least a portion of the logical data volume between two non-consecutive delta volumes.
6. The method of claim 5, further comprising generating a plurality of combined delta volumes at spaced time intervals.
7. The method of claim 5, further comprising replicating the combined delta volume to a third data storage device, and replicating the changes to the data indicated therein at the third data storage device.
8. The method of claim 1, wherein the second data storage device is remotely located from the first data storage device.
9. The method of claim 1, wherein the first and second data storage devices are part of the same data storage subsystem.
10. A method of data replication from a first data storage device to a second data storage device, the method comprising: receiving a delta volume at the second data storage device, the delta volume indicating the changes in data of at least a portion of a logical data volume of the first data storage device; and replicating the changes to the data indicated therein at the second data storage device; wherein the first data storage device generates a plurality of snapshots for the logical data volume, the logical data volume being an abstraction of data blocks from one or more physical storage devices, each snapshot identifying changes of data for at least a portion of the logical data volume since a most previous snapshot; and wherein the delta volume indicates changes in data of at least a portion of the logical data volume between two non-consecutive snapshots.
11. The method of claim 10, wherein the snapshots are generated at predetermined time intervals.
12. The method of claim 10, wherein the delta volume is generated at the first data storage device and is discarded at the first data storage device after being sent to the second data storage device.
13. The method of claim 10, further comprising receiving a plurality of delta volumes at spaced time intervals.
14. The method of claim 13, further comprising generating a combined delta volume, the combined delta volume indicating changes in data of at least a portion of the logical data volume between two non-consecutive delta volumes.
15. The method of claim 14, further comprising generating a plurality of combined delta volumes at spaced time intervals.
16. The method of claim 14, further comprising replicating the combined delta volume to a third data storage device, and replicating the changes to the data indicated therein at the third data storage device.
17. The method of claim 10, wherein the second data storage device is remotely located from the first data storage device.
18. The method of claim 10, wherein the first and second data storage devices are part of the same data storage subsystem.
19. A delta volume for a data storage system, the delta volume comprising an indication of changes in data between two non-consecutive snapshots of the data storage system, each snapshot identifying changes of data for at least a portion of the data storage system since a most previous snapshot.
20. The delta volume of claim 19, wherein each snapshot identifies changes of data for a logical volume of the data storage system since a most previous snapshot.
|
wordpress container restarts
Bug Description
We get frequent alerts due to the wordpress container restarting. This was addressed by https://github.com/canonical/wordpress-k8s-operator/pull/135 and an upgrade to r46 of the charm, but either this didn't solve the problem or a new one has arisen.
To Reproduce
Deploy the charm.
Could you please forward this information to the maintainer of resource-centre for their input as well?
I believe the plugin is owned by the web and design team, and I've started a thread here: https://chat.canonical.com/canonical/pl/k7quc4dqipnhjgstu5xkz1mmty
I think I've taken this as far as I reasonably can: IS doesn't own the deployment, or the site being deployed, and the cloud and the k8s cluster, which we do own, appear to be working correctly. I've silenced this for a week in AlertManager so there's no rush to progress this from my perspective.
Thanks, we will follow up with the web team if this happens again.
FYI, we have this alert constantly.
We limited the alert to be fired only when a restart happens 3 times under 10 minutes (which means that the liveness probe failed enough to trigger 3 restarts).
It happened twice today, with similar log to what was described in the original bug.
I can see the liveness check is rather "aggressive":
prod-is-external-kubernetes@is-bastion-ps5:~$ kubectl -n prod-admin-insights-ubuntu-k8s describe pods wordpress-k8s-1 | grep Liveness
Liveness: http-get http://:38812/v1/health%3Flevel=alive delay=30s timeout=1s period=5s #success=1 #failure=1
Liveness: http-get http://:38813/v1/health%3Flevel=alive delay=30s timeout=1s period=5s #success=1 #failure=1
Indeed, the charm pebble layer check 0 results in this
prod-is-external-kubernetes@is-bastion-ps5:~$ kubectl -n prod-admin-insights-ubuntu-k8s get statefulset wordpress-k8s -o json | jq '.spec | .template| .spec | .containers | .[].livenessProbe'
{
"failureThreshold": 1,
"httpGet": {
"path": "/v1/health?level=alive",
"port": 38812,
"scheme": "HTTP"
},
"initialDelaySeconds": 30,
"periodSeconds": 5,
"successThreshold": 1,
"timeoutSeconds": 1
}
{
"failureThreshold": 1,
"httpGet": {
"path": "/v1/health?level=alive",
"port": 38813,
"scheme": "HTTP"
},
"initialDelaySeconds": 30,
"periodSeconds": 5,
"successThreshold": 1,
"timeoutSeconds": 1
}
This is probably a bit too aggressive.
timeoutSeconds is probably better to 3 or 5 secondes, and increasing the periodSeconds accordingly seems a goot thing.
So I would probably add a "timeout: 3" or "timeout: 5" and "period: 10".
Or make this configurable.
Also, the "threshold" setting is misleading, it's apparently only affecting the "successThreshold" and not the "failureThreshold" (undefined above) that defaults to 3.
All in all, I feel like the agressiveness of the check is probably what is causing the failures.
I'm going to silence till Friday so you have time to look at it.
FYI, we have this alert constantly.
We limited the alert to be fired only when a restart happens 3 times under 10 minutes (which means that the liveness probe failed enough to trigger 3 restarts).
It happened twice today, with similar log to what was described in the original bug.
I can see the liveness check is rather "aggressive":
prod-is-external-kubernetes@is-bastion-ps5:~$ kubectl -n prod-admin-insights-ubuntu-k8s describe pods wordpress-k8s-1 | grep Liveness
Liveness: http-get http://:38812/v1/health%3Flevel=alive delay=30s timeout=1s period=5s #success=1 #failure=1
Liveness: http-get http://:38813/v1/health%3Flevel=alive delay=30s timeout=1s period=5s #success=1 #failure=1
Indeed, the charm pebble layer check 0 results in this
prod-is-external-kubernetes@is-bastion-ps5:~$ kubectl -n prod-admin-insights-ubuntu-k8s get statefulset wordpress-k8s -o json | jq '.spec | .template| .spec | .containers | .[].livenessProbe'
{
"failureThreshold": 1,
"httpGet": {
"path": "/v1/health?level=alive",
"port": 38812,
"scheme": "HTTP"
},
"initialDelaySeconds": 30,
"periodSeconds": 5,
"successThreshold": 1,
"timeoutSeconds": 1
}
{
"failureThreshold": 1,
"httpGet": {
"path": "/v1/health?level=alive",
"port": 38813,
"scheme": "HTTP"
},
"initialDelaySeconds": 30,
"periodSeconds": 5,
"successThreshold": 1,
"timeoutSeconds": 1
}
This is probably a bit too aggressive. timeoutSeconds is probably better to 3 or 5 secondes, and increasing the periodSeconds accordingly seems a goot thing. So I would probably add a "timeout: 3" or "timeout: 5" and "period: 10". Or make this configurable.
Also, the "threshold" setting is misleading, it's apparently only affecting the "successThreshold" and not the "failureThreshold" (undefined above) that defaults to 3. All in all, I feel like the agressiveness of the check is probably what is causing the failures.
I'm going to silence till Friday so you have time to look at it.
The health checks in the k8s charms are controlled by Pebble, and the check parameters on the Kubernetes side are actually for the Pebble server. Therefore, the small failed threshold and timeout seconds are meant for Pebble health API requests, instead of WordPress health check requests. The actual health check parameters for WordPress are defined as you mentioned here, with a timeout of 5 seconds and a failure threshold of 3 (default).
Do you have any monitoring information that you can share with us? For example, there's a request duration Prometheus metric which can indicate if the WordPress server is running slowly, and perhaps any WordPress Apache logs related to the failure in Loki?
Here is an extract of a failure that happened today and the relevant apache logs around it:
on wordpress-k8s-0: https://pastebin.canonical.com/p/QSnYrbFx9Q/
on wordpress-k8s-1: https://pastebin.canonical.com/p/qgjnTHPBCS/
@weiiwang01 can you follow-up on this and/or close the issue please?
i believe this has already been addressed in higher revisions of the wordpress-k8s charm by this pull request, which adds configurable timeout values: https://github.com/canonical/wordpress-k8s-operator/pull/239.
i will close this for now; please reopen the issue if there are other problems after the upgrade.
|
#include "GAGenome.h"
#include <iostream>
GAGenome::GAGenome()
{
}
GAGenome::GAGenome(GAGenome & gen)
{
*this = gen;
}
GAGenome* GAGenome::clone()
{
GAGenome* g = new GAGenome();
g->fitness_ptr = this->fitness_ptr;
return g;
}
GAGenome::GAGenome(float (*f)(GAGenome&))
{
this->fitness_ptr = f;
}
float GAGenome::calcFit()
{
}
float GAGenome::fitness() const
{
return fit;
}
int GAGenome::gene(int i)
{
}
void GAGenome::crossover(GAGenome & p1, GAGenome & p2, GAGenome*& c1, GAGenome*& c2)
{
}
void GAGenome::mutation()
{
}
void GAGenome::init()
{
}
std::string GAGenome::genes()
{
return "";
}
void GAGenome::printGenes()
{
}
void GAGenome::setGene(std::string str)
{
}
inline bool operator> (const GAGenome &lhs, const GAGenome &rhs)
{
return lhs.fitness() > rhs.fitness();
}
GAGenome::~GAGenome()
{
}
|
This little species resembles L. Tatei, Angas (P. Z. S., 1878, p. 863;, from St. Yincent Gulf, bat differs in the style of orna ment, and somewhat in form, being particularly less incurved on the antero-dorsal margin.
Synonyms. — L. dent at a, auctores, non Wood ; L. divaricata, auctores, non Linn. ; L. eburnea, Reeve, Icon. Conch., t. 8, f. 49, 1850; L. Ctmingi, A. Adams and Angas, Proc. Zool. Soc, 1863, p. 426, t. 27, f. 20.
The fossil which I have illustrated on Plate xii., f. 3, of Part I., under the name of L. dentata, does not belong to that species, but to L. Cumingi, Adams and Reeve, which in the opinion of Mr. A. H. Cooke (Ann. and Mag. Nat. Hist., Aug., 1886, p. 98) is identical with L. quadrisulcata, D'Orbigny.
This species is the largest of the section Divaricella, is more globose in form than the other species, with the divaricating grooves rather more distant, and not denticulated at the margin. It is found living in Ceylon, South Australia, Tas mania, Port Jackson, New Zealand, Gulf: of Suez, West Columbia, Panama, and West Indies.
Shell thin, oblong-ovate, compressed ; triangular about the umbones, which are ante-median compressed and slightly curved forwards, but not incurved. Antero-dorsal line much incurved in front of the umbo ; post-dorsal margin nearly straight, sloping at an angle of about 45°, united to the antero dorsal side by a graceful curve, with a perceptible truncation posteriorly.
Surface ornamented with sixteen equidistant, erect, thin lamellae, interspaces^concentrically striated ; the lamellae more raised at the front and posterior margins, and the post-dorsal margin is somewhat serrated by them.
|
# tkalgo
This is a Java implementation of the algorithm [described here](http://redd.it/1dlwc4).
The code was written for educational purposes. The math library used can be [found here](https://github.com/SudoPlayGames/SudoMath).
# License
Copyright (C) 2014 Jason Taylor, released as open-source under the Apache License, Version 2.0.
|
PEOPLE ex rel. BALLIN, Respondent, v. SMITH, Justice of the Peace, et al., Appellants.
(Supreme Court, Appellate Division, Second Department.
June 23, 1905.)
Proceeding by the people of the state of New York, on the relation of William Ballin, against David P. Smith, justice of the peace, and another.
No opinion. Order affirmed, with $10 costs and disbursements, on the authority of People ex rel. Hess v. Inman, 74 Hun, 130, 26 N. Y. Supp. 329.
|
Manufacture of sulfur dyestuffs
Patented N... 19, 1929 PATENT OFFICE HERMANN PLAUSON, F HAMBURG, GERMANYMANUFACTURE OF SULFUR DYESTUFFS No Drawing. Original application filed June 28, 1924, Serial No. 722,954 and in Germany July 2, 1923. Divided and this application filed January 13, 1921' Serial No. 161,019.
This invention relates to the manufacture of dark or black dyes containing sulfur and is a divisional application on my copendingapplication Serial No. 7 22,954, filed June One of the objects of the invention is the production of a dye direct from acarbonaceous material by the action of sulfur in conjunction with a substance of an alkali ne na- 10 ture or having an alkali ne reaction. Other objects of the invention are the production of black brownish-black or brownish-yellow sulfur dyes directly from such raw materials as bitumen, pitches, soo ts,peat and the like and also earthy coals, lignite, cannel coal, pitch coal, anthracite and lamp black. materials are subjected to a sulfurizingprocess by heating with sulfur and a substance of an alkali ne nature or having an alkali ne reaction such-as sodium sulfid, sodium hydrate,sodium carbonate, or the like. According to one feature of the invention the carbonaceous material is heated with sulfur together with the alkali substance but the material may also first be fused with sulfur and afterwards treated with the alkali substance.
' The material may also be heated with a preformed polysulfid melt.
The raw material may be subjected to a pr treatment as described hereafter; Other features of the invention will be apparent from thefollowing description and examples.
In the following process the entire: coal is preferably converted into a finely dispersed state. The process depends upon the phenomenon that powdered materials ofthe kind referred to such as lignite or pitch coal by melting in an admixture with sulfur alone or with polysulfides give a colloidal product like a sulfur dye and the process is illustrated bythe folowing examples.
Ew ample 1 In a direct heated kettle which is best formed of Spencer metal 1000 grams of sodi-' 5 gins at about 110 C. According to the tem-The raw produced.
perature at which the process is worked, dyestuffs are obtained of different tints. If the reaction is allowed to go for example at 200 C.there is formed a dye stuff which gives cotton a light brown tone. A dark brown black is obtained if the temperature rises to 300. If a final temperature of 300 to 310 is employed there results on cooling a drycrumbly black powder which gives with water a colloidal dye bath with which cotton can be directly dyed black. The purification of the dyestuff is possible by the known methods of precipitating with acids or salts, etc., but is not however, necessary. In the dyeing process Turkey red oil can be added by which means a warm brown or black is 0'. Example2 1000 parts of sodium sulfid and 600 parts of sulfur are moulded together at 100 to 110 C.
then 500 grams of lignite are added slowly a little at a time thereto,and heated with stirtained an ash grey crumbly mass which is soluble after grinding.
Example 3 A black dye for the oil and printing trade can be obtained without the application of sodium sulfid by the following method. 500parts of powdered lignite are stirred up with 500 parts of concentratedsulfuric acid. To this are added 750 parts of sulfur, and the mass then heated in the absence of air to 130 to 150. There is formed thereby a dry mass with the evolution of sulfur dioxid which when cold can be well produced. Bywasing with boiling. weakly alkali ne Water, a good black dye is obtained which can be used as a substitute for the finest lamp black.If sodium sulfid is added to the substances, the mass can be converted to the soluble state by further heating at 300. Instead of lignite all kinds of cannel 'coal or similar pitch coal can be employed.
' Example 4 ring to 300 to 310 C. There is thereby ob dried preferably under vacuum.
finds application in the textile industry or as a filling material for plastic masses, for staining, or the manufacture of boot polish. Instead of clay other neutral earths such as ochre can be used. They must,however, always be present in a highly dispersed state or must be converted by the known method into the colloidal form for their application.
Em ample 5 100 parts of crude bitumen from lignite are reacted upon by240 parts of sodium sulfid and 100 parts of sulfur according to Example 1. -After heating for 3 to 5 hours at 200 to 250 the mass is allowed to cool and A dark brown dye stuff result-s. If the bitumen is treated with concentrated or preferably with fuming sulfuric acid and afterwards the sulfonated product treated by the before describedpolysulfid melt, a deep black dye stuff is obtained.
Useful results may be. obtained by pretreatment with sulfur chlorid. Ifthe bitumen is treated with a sulfuric acid saltpeter mixture, a brown-black tone is produced, Whereas by previous treatment with chlorine a dark green results. Instead of bitumen, lignite or pitch coal of all kinds can be treated by a sulfonation, nitration orchlorination process. The relative amount of resulting product and the operating temperature can be altered according to the shade desired. For the purpose of producing different tints a small addition of compounds of an organic or inorganic nature can be made, for example,the phenols and their derivatives, aniline or its derivatives, orhomologues, bcnzidine, chlor-di-nitro-benzene, naphthalene, indo phenol,urea etc.
100 grams of sodium sulfid, 400 grams of sulfur and 500 grams of Englishanthracite finely powdered are well mixed in a kettle and heated slowly,with stirring to 300 to 350 C. After cooling there results a blackpowder which gives a colloidal solution in water and possesses the property of dyeing cotton or artificial silk a beautiful brown black. As starting product, German or other anthracite may be employed. If the amount of sulfur and sodium sulfid in the melt and the time of heating be increased, a substantially black dye is produced. Similar products are also obtained if an addition of copper salts or chromium compounds to a small amount was made to the melt.
The proportionual amounts of sodium sulfid sulfur and coal can be altered according to the desired dyeing effect. The process can naturally be carried out according to the previous examples.
Example '1 1250 parts of sodium sulfid, 500 parts of sulfur, 500 parts of charcoal dust are treated according to example 1 at a temperature of300 to 350 C. If on account of overheating a modification insoluble in water is produced, this is converted into the soluble state by the addition of sodium sulfid.
Ewamplc 8 500 parts of lamp black, 1250 parts of sodium sulfid, and 500parts of sulfur are treated as in Examples 7 or 8, at a temperature of300 to 400 C. or at most 450. A substantially bitumen-free lamp black gives a black colloid. The pure lamp black may be mixed with 3 to 10parts or more of the bituminous extraction production of anthracite,pitch coal or such like charcoal or pitch products, and if these mixtures are acted upon by the po ysulfid melt, a fast dye results.
In the preceding examples sodium sulfid has always been employed. Now it has been found that the sodium sulfid is not absolutely necessary, but can be replaced by other alkalis, e. g. caustic alkali or alkali metal carbonate.
This way of proceeding is not obvious since sodium hydrate and especially sodium carbonate only react very slowly with sulfur and itwas not known that coal is altered by such a mixture. Experiment has shown that a sulfur melt by the action of sodium hydroxide or carbonatefurnishes directly a dyestuff. If a good result is required it is advantageous to increase the sulfur content above that indicated in the previous examples.
Example .9
date and sulfur can be altered in both direc-- tions according to the shade of dye desired. Instead of sodium hydroxide other alkali metalhydroxides can be employed. Obviousthemelt can be carried through bytheother methods of working shown in the previous examples.
The same result is reached if instead of lignite, cannel coal, turbaniteor other bituminous coal is employed. A good black dye is obtained which easily dyes cotton and artificial silk.
E w ample 10 500 grams of finely pulverized English anthracite, 820 grams sulfur and 1000 grams of caustic soda are subjected to a melt as in Example 1 at a temperature of 300-350". After cooling and powdering, a dark brown dyestuff is obtained. When heated for a longer time to 350470the product takes on a dark black tone. The solubility in this case is further improved by further addition of alkali metal sulfid. The dyeing can be carried out according to Example 10 with or without addition of fixing materials or of dye improvers.
E m ample 11 1000 parts of caustic soda, 850 parts of sulfur and 500parts of charcoal or pitch coal, produced at the lowest possible temperature, are formed into a melt and then slowly heated from350-450". The mass can, after cooling, be ground to a fine powder which on the addition of sodium sulfid can be completely brought into solution. In a similar manner different lamp blacks can also be used forthe production of dyestuffs.
E w ample 12 106 parts of calcined soda, 80 parts of sulfur and 40 top arts of lignite are heated under continual stirring to 300350. There action goes slowly and almost imperceptibly and finally a yellow Vapour is evolved and the usual deflagration takes place as is frequently to be observed in the production of sulfur dyes. A deep blackpowder is formed whose solution gives cot-ton or artificial silk a warm dark brown tone. By longer melting at the above mentioned temperature or by the addition of small amounts of inorganic or organic compounds aston ing agents to the melt or to the dye bath, a black dye shade can be obtained. Instead of calcined soda, crystallized sodium carbonate in a corresponding amount can be used. Other carbonates are also applicable;the best result is given, however, by sodium carbonate.
All the other examples may be carried out with alkali metal carbonate instead of hydroxide. if mineral coals are used as starting materials.In the using of crystalline soda it has shown itself to be profitable to carry out the melt in an autoclave, for instance, under pressure; thereis obtained in this way a particularly homogeneous end product.Naturally the process can take place with reflux condensation of the water of crystallization.
It has also been found that it is possible to simplify the production'of sulfur dyestuffs from mineral coal or the like carbonaceous material ifthe sulfur-alkali, melt is not applied directly to the mixed constituents, but
coal and sulfur are first heated together and then directly, after or before cooling and powdering, the product of the melt is subjected to'the action of a further melting with the addition of the necessary amount of caustic alkali or alkali metal sulfid. The dyestuffs obtained in this way gives a considerably deeper black, and the action of the alkali melt is more complete and simple as the frothing and similar undesirable phenomena are eliminated from the process.
E w ample 13 400 grams of lignite or the like bituminous coal is heated with 800 grams sulfur to 120150 C., preferably in the absence-of air for10 to 30 minutes. After this time the melt can be cooled and thenpulverized or directly treated further by heating with 800-1000 grams caustic soda, preferably in absence of air to 300400 C. until a homogeneous melt results, There is obtained a very good dye of deep black tone. Instead of caustic alkali a suitable amount of alkali metalsulfid such as sodium sulfid, can be taken. In the latter case the melting process can be carried out at 250-300 C. in an autoclave under pressure preferably obtained by the use of a neutral gas. By the employment of alkali metal sulfid containing water of crystallization,the melt can be undertaken also under a reflux condenser. The processes of the preceding examples can be carried out in a similar manner.
It has further been observed that it is advantageous in the melting with sulfur to add compounds of copper, iron, zinc, nickel, cobalt, tin or chromium, or the metals themselves inthe powder form in amounts of 15%as thereby the dyes possess an especially full tone. In similar manner small amounts of organic compounds suitable for altering the shades ofthe dyes can be added and the melting process undertaken.
All the dyes made according to the process of the preceding examples give brown to black dye ings on mercerized cotton or on artificial silk;on crude and non-mercerized cotton a brown-black tone can at best be produced or a very high concentration of the dye bath. or long boiling,etc., must be employed.
It has also been found that dyes which produce a deep black on different materials can be obtained, if the impure constituents are removed fromthe crude coal before the polysulfid melt in the dye synthesis. I With this object the coal is treated in a pressure autoclave or in a colloidmill or similarly acting apparatus with alkali and water and freed by filtering 0r settling from the valueless materials. The suspended material is then precipitated with a weak gaseous acid such as carbondioxid, sulfur dioxid, or by a dilute acid such as hydrochloric,sulfuric, nitric acid or the like. There is obtained in this 111311119.as starting material for the dye manufacture a purified and more or less opened up preparation.
This product is dried and can be used directly for the production of sulfur dyestuffs according to the processes of the previous examples. In certain cases it can be subjected with advantage, even in the moist state to a process of sulfonation, oxidation, chlorination, nitration,azotization or reduction according to the tint desired, or even to several of the above substitution processes in any suitable order. The product obtained by extracting coal such as crude bitumen, pitch bitumenand the like with organic solvents, can be treated in similar manner.The characteristic feature of this part of the process consists in the fact that the starting materials for the manufacture of the dyestuff,obtained by the above described method of purification or extraction are always produced without the application of dry distillation. Only these give, in fact the desired deep black dyes as resulting products while those obtained through the distillation of carbonaceous materials are of no value as they almost always sufi'er deep seated changes.
If the product obtained from coal by the above method is subjected tothe polysulfid melt, a deep black dyestufi' is obtained which is absorbed by cotton much better than the substance produced by the direct process from coal.
Example 1.4
fuging or filtration, the residue freed from soluble salt by washing with water and then dried or subjected in the known way to asulfonation, nitration, chlorination, azotization or a. reduction process. The dry product obtained from this process or from the known chemical operations is converted into a sulfur dyestulf in the manner described in the previous examples. Black dies are obtained by thechlorination or sulfonation or the like,
according to the manner of the substituents.
introduced, of different shades.
The material may be previously purified or separated into component by any'method, for example by treatment in a high speed me chanicaldisintegrator such as a colloid mill. The coal may be previously heated either alone or with any known chemical or it may be partially distilled.
Example 15 If the bitumen has been obtained according to a known process by extraction with hydrocarbons, the residue is worked as in Example 14.The product obtained by this opening up process is added to the bitumenobtained from the extraction process before the further treatment by the known process by extraction with hydrocarbons, the residue is worked asin Example 14; The product obtained by this opening up process is added to the bitumen obtained from the extraction process before the further treatment by the melting process or by a solution process.
The working of the product obtained from Examples 14 or 15, can always be carried out in two ways. Either it can be subjected directly to apolysulfid melt or first by a known method to sulfonation, chlorination,nitration, or other conversion processes customary in the production of organic dyes, such as nitrification (azotierung) condensation and the like, and these products can then be converted by a melt with alkali and sulfur to the dyestufi'. The result in both cases is a dyestuff which produces on the material a black-green tone, whereby if necessary, thechlorinationor nitration or the like which has been accomplished makes a noticeable difference in the shade of the pure product, which can also be influenced in this way if desired.
For the improvement of the tint of the dye taken up, small amounts of organic compounds can be employed which give dyes in the polysulfid melt which are suitable for altering as desired, the shade of the final product towards green-black or blue-black. Naturally the choice of these will be governed by all previously gathered experience on the action ofthe order of substitution on the shade. Such compounds, for example, aspara-nitroso-phenol and para-amidephenol', paradihydroxybenzen'e, and moreover dinitraniline, dinitrophenol and the like are suitable. For obtaining bluer tints, naphthalene derivatives, for example, substitute din the peri-position are employed with success. Halogen-indo phenol salter the shade towards the green indo phenols chlorinated in the nucleus towards the green-blue and unchlorinated indo phenols towards the pure blue.
In the appended claims by semicarbonized carbonaceous material, I mean material which by a natural process or by a heat treatment has beendecomposed to yield a residue consisting of carbon more or less loosely chemically bound with other substances and which may be a solid or liquid or semi-liquid mass.
The term coal substance comprises all coals, lignite and solid or semi-liquid carbonaceous products derived therefrom.
I declare that what I claim is 1. Process for the production of a dye inwhich a semi-carbonized carbonaceous material is pretreated with a mineral acid and is then heated with a sulfur and afterwards with an inorganic alkali ne substance.
' 2. Process for the production of a dye in which a coal substance ispretreated with a mineral acid and then is heated with sulfur, and afterwards with an inorganic alkali n substance.
3. Process for the production of a dye in which lignite is pretreatedwith a mineral acid and then is heated with sulfur, and afterwards with an'inorganic alkali ne substance.
4. Proces for the production of a dye in which a semi-carbonizedcarbonaceous material is pretreated with strong sulfuric acid, and is then heated with sulfur and with an inorganic alkali ne substance.
5. Process for the production of dyes in which a semi-carbonizedcarbonaceous material is pretreated with a mineral acid and then is heated with sulfur, with an inorganic I alkali ne substance and with water under pressure.
In witness whereof, I have hereunto signed my name this 3rd day of January, 1927.
HERMANN PLAUSON.
|
// Copyright August 2020 Maxset Worldwide Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package main
import (
"context"
"encoding/csv"
"flag"
"io"
"log"
"os"
"time"
"git.maxset.io/web/knaxim/internal/database/mongo"
)
var databaseURI = flag.String("db", "mongodb://localhost:27017", "specify address of mongodb containing acronyms")
var databaseName = flag.String("dbname", "Knaxim", "specify mongodb database name")
var collectionName = flag.String("collection", "acronym", "specify mongodb acronym collection")
var loadfile = flag.String("f", "", "specify file to upload, default reads from stdin")
var timeout = flag.Duration("dur", time.Minute, "specify the maximum time that the program should take to complete")
var initdb = flag.Bool("init", false, "init database when present")
func main() {
flag.Parse()
var err error
var file io.Reader
if len(*loadfile) > 0 {
file, err = os.Open(*loadfile)
if err != nil {
log.Fatalln("Unable to read: ", *loadfile, err)
}
defer file.(*os.File).Close()
} else {
file = os.Stdin
}
parser := csv.NewReader(file)
parser.FieldsPerRecord = 2
parser.LazyQuotes = true
parser.ReuseRecord = true
parser.TrimLeadingSpace = true
ab := new(mongo.Acronymbase)
timeoutctx, cancel := context.WithTimeout(context.Background(), *timeout)
defer cancel()
ab.URI = *databaseURI
ab.DBName = *databaseName
ab.CollNames = make(map[string]string)
ab.CollNames["acronym"] = *collectionName
err = ab.Init(timeoutctx, *initdb)
if err != nil {
log.Fatal("unable to init database ", err)
}
{
db, err := ab.Connect(timeoutctx)
if err != nil {
log.Fatal("unable to connect to database ", err)
}
defer db.Close(timeoutctx)
ab = db.Acronym().(*mongo.Acronymbase)
}
var pair []string
for pair, err = parser.Read(); err == nil; pair, err = parser.Read() {
dbErr := ab.Put(pair[0], pair[1])
if dbErr != nil {
log.Fatalln("Database Error: ", dbErr.Error())
}
}
ab.Close(timeoutctx)
if err != io.EOF {
log.Fatalln("error reading file: ", err.Error())
}
}
|
using System;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using System.Windows;
using System.Windows.Controls;
using System.Windows.Data;
using System.Windows.Documents;
using System.Windows.Input;
using System.Windows.Media;
using System.Windows.Media.Imaging;
using System.Windows.Navigation;
using System.Windows.Shapes;
using TensorFlow;
namespace Digitz
{
/// <summary>
/// Interaction logic for MainWindow.xaml
/// </summary>
public partial class MainWindow : Window
{
public MainWindow()
{
InitializeComponent();
}
private void clearButton_Click(object sender, RoutedEventArgs e)
{
inkCanvas.Strokes.Clear();
numberLabel.Text = "";
}
private string Stringify(float[] data)
{
StringBuilder sb = new StringBuilder();
for (int i = 0; i < data.Length; i++)
{
if (i == 0) sb.Append("{\r\n\t");
else if (i % 28 == 0)
sb.Append("\r\n\t");
sb.Append($"{data[i],3:##0}, ");
}
sb.Append("\r\n}\r\n");
return sb.ToString();
}
private TFTensor GetWrittenDigit(int size)
{
RenderTargetBitmap b = new RenderTargetBitmap(
(int)inkCanvas.ActualWidth, (int)inkCanvas.ActualHeight,
96d, 96d, PixelFormats.Default
);
b.Render(inkCanvas);
var bitmap = new WriteableBitmap(b)
.Resize(size, size, WriteableBitmapExtensions.Interpolation.Bilinear);
float[] data = new float[size * size];
for (int x = 0; x < bitmap.PixelWidth; x++)
{
for (int y = 0; y < bitmap.PixelHeight; y++)
{
var color = bitmap.GetPixel(x, y);
data[y * bitmap.PixelWidth + x] = 255 - ((color.R + color.G + color.B) / 3);
}
}
// sanity check
Console.Write(Stringify(data));
// normalize
for(int i = 0; i < data.Length; i++) data[i] /= 255;
return TFTensor.FromBuffer(new TFShape(1, data.Length), data, 0, data.Length);
}
private void recognizeButton_Click(object sender, RoutedEventArgs e)
{
var tensor = GetWrittenDigit(28);
const string input_node = "x";
const string output_node = "Model/prediction";
using (var graph = new TFGraph())
{
graph.Import(File.ReadAllBytes("digits.pb"));
var session = new TFSession(graph);
var runner = session.GetRunner();
runner.AddInput(graph[input_node][0], tensor);
runner.Fetch(graph[output_node][0]);
var output = runner.Run();
TFTensor result = output[0];
float[] p = ((float[][])result.GetValue(true))[0];
int guess = Array.IndexOf(p, p.Max());
numberLabel.Text = guess.ToString();
}
}
}
}
|
C. S. Sujatha
C. S. Sujatha (born 28 May 1965) is an Indian politician who was a Member of Parliament of the 14th Lok Sabha of India. She represented the Mavelikara constituency of Kerala. She is a member of the Communist Party of India (Marxist).
Political career
She became the District Panchayat President of Alappuzha in 1995 at the age of 29. She remained in the position until 2004. In 2004, Sujatha defeated Ramesh Chennithala by a margin of 7,414 votes in the Mavelikara constituency. Sujatha is the first CPI(M) candidate who has contested the elections in the party symbol to win from Mavelikara, which is considered to be a traditional UDF stronghold. She is also the first woman to represent Mavelikara in the Lok Sabha. She is now selected as CC Member of CPI(M).
She was the CPI(M) candidate for the assembly election on 13 April 2011 at Chengannur constituency.
Positions held
2004: Elected to 14th Lok Sabha Member, Committee on Labour Member, Committee on Empowerment of women
2006-onwards Member, Committee on Empowerment of Women
2007 onwards Member, Standing Committee on Labour
1995-2004 President, District Panchayat, Alappuzha
1987-1990 Member (i) Senate, Kerala University
1988-1990 Syndicate, Kerala University
1998-2004 Central Committee, AIDWA
1990-1993 District Council
|
Electro ceramic mems structure with oversized electrodes
ABSTRACT
An array apparatus has a micromachined SOI structure, such as a MEMS array, mounted directly on a class of substrate, such as low temperature co-fired ceramic, in which is embedded electrostatic actuation electrodes disposed in substantial alignment with the individual MEMS elements, where the electrostatic electrodes are configured for substantial fanout and the electrodes are oversized such that in combination with the ceramic assembly are configured to allow for placement of the vias within a tolerance of position relative to electrodes such that contact is not lost therebetween at the time of manufacturing.
BACKGROUND OF THE INVENTION
[0001] This invention relates to electro ceramic components such MEMS arrays and methods for fabricating electro ceramic components with high density interconnects and that maintain relative internal alignment. Components constructed according to the invention are MEMS arrays or other micromachined elements.
[0002] Conventional MEMS array structures comprise Silicon on Insulator (SOI) array structures in which is fabricated an integrated electrode array. One of the problems encountered is placement accuracy control from within the substrate element to the bottom surface of the electrostatic actuation electrodes due to fabrication tolerance limitations. In particular, when the substrate is a low-temperature co-fired ceramic (LTCC), shrinkage variance of the ceramic may be greater than is allowable for a particular design. What is needed is a solution that allows for achievable via alignment accuracy to the underlying actuation electrodes in such manner as to not compromise the device design of the corresponding MEMS actuatable element.
SUMMARY OF THE INVENTION
[0003] According to the invention, an array apparatus has a micromachined SOI structure, such as a MEMS array, mounted directly on a class of substrate, such as low temperature co-fired ceramic, in which is embedded electrostatic actuation electrodes disposed in substantial alignment with the individual MEMS elements, where the electrostatic electrodes are configured for substantial fanout and the electrodes are oversized such that in combination with the ceramic assembly are configured to allow for placement of the vias within a tolerance of position relative to electrodes such that contact is not lost therebetween at the time of manufacturing.
[0004] In a specific embodiment, the electrodes are sized to accommodate the entire space available between MEMS devices even though the required design of the electrodes for the MEMS device may be smaller. This allows for greater tolerance or variance in the placement of vias from the substrate to the actuation electrodes. This structural design allows for an increased density and increased overall array size that is manufacturable. A single or multiple deposition of dielectric material is deposited over the electrodes in the peripheral areas away from the SOI cavities so that the conductive SOI handle is insulated from the electrodes.
[0005] The invention will be better understood by reference to the following detailed description in connection with the accompanying illustrations.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006]FIG. 1 is a perspective view in cutaway according to the invention.
[0007]FIG. 2 is a side cross-sectional view of a single array element according to the invention.
DESCRIPTION OF SPECIFIC EMBODIMENTS
[0008] Reference is made to FIG. 1 in which is shown an element 10 of a MEMS array (not shown) according to the invention, with a MEMS-based mirror 12 fabricated in an integrated Silicon on Insulator structure 22 and mounted on a substrate 24 which is configured for fanout. According to the invention electrodes 26, 27, 28, 29 are placed on the substrate 24 with vias 36, 37 etc. to a control module (not shown). A dielectric layer 30 is disposed between the structure 22 and the substrate 24 insulating the electrodes at the periphery of the MEMS cavity 32 from the structure 22.
[0009] Referring to FIG. 2, two electrodes 26, 27 are shown in cross-section. According to the invention, the electrodes 26, 27 are larger than is required to fit within the cavity 32 and are insulated by dielectric 30 from the structure 22 where they extend beyond the boundaries of the cavity 32. The vias 36, 37 may be electrically connected with the electrodes 26, 27 at any point under the surfaces of the electrodes 26, 27 and need not be precisely within the region of the cavity 22. The dielectric 30 may terminate at the periphery of the cavity 32, or it may cover the whole electrode surface.
[0010] The invention has been explained with reference to specific embodiments. Other embodiments will be evident to those of ordinary skill in the art. Therefore, it is not intended that this invention be limited, except as indicated by the appended claims.
What is claimed is:
1. In a MEMS array apparatus, a MEMS element comprising: a substrate; a MEMS support structure defining a cavity and having an actuatable element, said MEMS support structure juxtaposed to said substrate; a plurality of electrodes disposed on said substrate in alignment with said actuatable element and extending beyond boundaries of said cavity; and vias in said substrate coupled to said electrodes within a tolerance of placement.
2. The apparatus according to claim 1 wherein a dielectric is disposed between said MEMS support structure and said electrodes for insulation.
3. The apparatus according to claim 2 wherein said dielectric insulator covers said electrodes.
4. The apparatus according to claim 2 wherein said dielectric insulator terminates adjacent the periphery of the cavity.
|
224 HENRY H. P. SEVERIN AND HARRY C. SEVERIN
difference in the number of Mediterranean fruit flies caught. Five white, three black, one blue and seven orange-colored pans were wired to the branches of orange, lemon, grapefruit and guava trees. From the results of our catches in the various pans, it was evident that the number of fruit flies captured was not influenced by the color of the pans. Moreover, it is highly probable that the sense of smell is the determining factor in attracting these insects to the kerosene.
In our second experiment we endeavored to ascertain in what particular kind of fruit-bearing tree of an orchard the pest would be captured in largest numbers with the kerosene traps. Accordingly, one pan was wired to the lower branches of a common guave tree (Psidium guayava pomiferum), nine pans were fastened in nine different navel orange trees (Citrus auran tium), and one pan was placed in a Java plum tree (Syzygium jambolana). All of the pans used in this experiment were enam eled .white, because most insects caught in the oil were more conspicuous against such a background. The following table shows the number of fruit flies taken at intervals of three to four days for a period of eighteen days in the kerosene traps attached to the three different kinds of fruit trees:
|
---
layout: default
---
# 1995-08-27 - Re: Demagnetizing
## Header Data
From<EMAIL_ADDRESS>(Tobin T Fricke)<br>
To<EMAIL_ADDRESS>Message Hash:<PHONE_NUMBER>0201282bd6d48c38faedd7179e168ea9653c0b691d5583b538833b<br>
Message ID<EMAIL_ADDRESS>Reply To: _N/A_<br>
UTC Datetime: 1995-08-27 07:45:12 UTC<br>
Raw Date: Sun, 27 Aug 95 00:45:12 PDT<br>
## Raw message
```
{% raw %}From<EMAIL_ADDRESS>(Tobin T Fricke)
Date: Sun, 27 Aug 95 00:45:12 PDT
To<EMAIL_ADDRESS>Subject: Re: Demagnetizing
Message-ID<EMAIL_ADDRESS>MIME-Version: 1.0
Content-Type: text/plain
Where exactly is the r/c circuit? Is it very small and in
a label? Book publishers don't put them in, do they?
Also, if the thing gets "burned out" by the magnet in the
pad, what do libraries and such do where materials are
reused? Just slap on another label thing?
--
=================================================================
Tobin Fricke, Alias Light Ray<EMAIL_ADDRESS>TobinTech Engineering KE6WHF Amateur Radio
The Digital Forest BBS<PHONE_NUMBER>, 28800bps
{% endraw %}
```
## Thread
+ Return to [August 1995](/archive/1995/08)
+ Return to<EMAIL_ADDRESS>(Tobin T Fricke)](/authors/dr261_at_cleveland_freenet_edu_tobin_t_fricke_)"
+ 1995-08-27 (Sun, 27 Aug 95 00:45:12 PDT) - Re: Demagnetizing -<EMAIL_ADDRESS>(Tobin T Fricke)_
|
General Distribution.
This small family, separated from the true Erycinidse by Mr. Bates, is confined to the tropical forest-districts of con tinental America. The genera are : —
This extensive family of small, but exquisitely beautiful buttei-flies, is especially characteristic of the virgin forests of the Neotropical region, only a few species of three genera ex tending into the Nearctic region. The more important genera, and those which have an exceptional distribution, can alone be here noticed. Charts extends from Brazil to New York ; Apo demia from Brazil to California, Utah, and Oregon ; Amarijnthis inhabits the Brazilian and Antillean sub-regions ; Lepricornis and Metapheles are small genera found only in the Mexican sub-region; Lymnas, Necyria, Ancyluris, Diorliina, Usthemopsis, Anteros, Emesis, Symmacliia, Cricosoma, Calydna, Lemonias, Nymphidium, Thcope,, and Aricoris are common to the Brazilian and Mexican sub-regions. All the other genera (40 in number) are only known from the Brazilian sub-region, and of these a considerable proportion are confined to the damp equatorial forests of the Amazon Valley.
|
When graphene is placed on a monolayer of semiconducting transition metal
dichalcogenide (TMD) its band structure develops rich spin textures due to
proximity spin-orbital effects with interfacial breaking of inversion symmetry.
In this work, we show that the characteristic spin winding of low-energy states
in graphene on TMD monolayer enables current-driven spin polarization known as
the inverse spin galvanic effect (ISGE). By introducing a proper figure of
merit, we quantify the efficiency of charge-to-spin conversion and show it is
close to unity when the Fermi level approaches the spin minority band.
Remarkably, at high electronic density, even though sub-bands with opposite
spin helicities are occupied, the efficiency decays only algebraically. The
giant ISGE predicted for graphene on TMD monolayer is robust against disorder
and remains large at room temperature.
|
OF VITAL PHENOMENA 127
— .198 T 2 , which means that a thermocurrent will be produced proportional to the difference in absolute temperature. Bern stein found this to be true also, the warmer end being positive.
Further proof of functional change in permeability of the plasma membrane to electrolytes was found on measuring the conductivity of sea urchin eggs by the Kohlrausch method. The conductivity increases when the eggs are stimulated to begin development (McClendon, 1910 c, e). This was confirmed by Gray (1913, a, b) who observed an increased conductivity in the first fifteen minutes of development. Just what electrolytes were affected by this increase in permeability was not ascertained, but in case of the frog's tgg, the author was able to show an in creased permeability during the first hours of development to Na, K, Mg, Ca, and CI (1914 a, 1915 a). The eggs were caused to develop in distilled water by means of electric stimulation, and the salts which diffused out analyzed and compared with those diffusing out of unstimulated controls.
A change in permeability may also accompany pathological changes. It was shown (McClendon, 1913 a, 1914 c) that the eggs of certain fish which are impermeable both to water and to salts, may be made permeable to salts by various toxic sub stances. Salts diffuse out of these poisoned fish into the distilled water in which they are placed, and (possibly as a result of in creased permeability) they develop into monstrosities. An in crease in permeability to water was shown by Loeb (1912 b).
If stimulation means increase in permeability, we should ex pect anesthetics to prevent it, since they prevent response to stimuli. It was observed that the increase in permeability of the eggs of certain fish to electrolytes could be partially inhibited by ether (McClendon, 1914 b, 1915 b).
Since Kite claims that the interior of the cell has the same permeability as the surface, it is probably worth while to empha size that the effect of temperature change on the emf of the current of injury furnishes evidence that the seat of restricted permeability is the uninjured cell surface. Furthermore, Hober (1910 a, 1912 b, 1913 b) has shown that the electric conductivity of the interior of the cell is greater than that of the whole cell, including the plasma membrane.
|
Rugrats
Premise
* List of Rugrats characters
* List of Rugrats (1991) Episodes
Production
Theatrical films
Spin Offs
Main article:All Grown Up!
Main article:Angelica and Susie's Pre-School Daze
Main article:The Carmichaels
|
"""
This algorithm (k=33) was first reported by Dan Bernstein many years ago in comp.lang.c
Another version of this algorithm (now favored by Bernstein) uses xor:
hash(i) = hash(i - 1) * 33 ^ str[i];
First Magic constant 33:
It has never been adequately explained.
It's magic because it works better than many other constants, prime or not.
Second Magic Constant 5381:
1. odd number
2. prime number
3. deficient number
4. 001/010/100/000/101 b
source: http://www.cse.yorku.ca/~oz/hash.html
"""
def djb2(s: str) -> int:
"""
Implementation of djb2 hash algorithm that
is popular because of it's magic constants.
>>> djb2('Algorithms')
3782405311
>>> djb2('scramble bits')
1609059040
"""
hash_value = 5381
for x in s:
hash_value = ((hash_value << 5) + hash_value) + ord(x)
return hash_value & 0xFFFFFFFF
|
Thread:T Mann/@comment-22439-20141025012822
Hi, welcome to ! Thanks for your edit to the UPDATE 6.2.0 AVAIABLE NOW! page.
Please leave me a message if I can help with anything!
|
Edit the Javascript code on the left and see the tests running immediately on the right. The goal is to get green everywhere. You can add, change or remove the tests. Background: http://www.nileshtrivedi.com/live-coding
|
User blog comment:District3/The 497th Annual Hunger Games/@comment-5810244-20131110165006
I'm scared. I only have a 12 year old left! Go HAZEL! You can win it!
|
Compatible polymer blends
ABSTRACT
The invention relates to compatible polymer mixtures PM comprising two different polymer components
A) 0.1 to 99.9 of a polystyrene built up from at least 20 and up to 100% by weight of styrene and from 80 to 0% by weight of further monomers which can be copolymerised with styrene (= polymer P1) and
B) 99.9 to 0.1 of a polymer built up from at least 20 and up to 100% by weight of the monomers of the formula I
<IMAGE>
in which R1 is hydrogen, methyl or a
<IMAGE>
group and in which R2 or R2' is a
<IMAGE>
group, with the proviso that n is 0, 1, 2 or 3, R3 is an optionally substituted heterocycle and R4 is hydrogen or an alkyl radical having 1 - 6 carbon atoms, and from 80 to 0% by weight of further monomers which can be copolymerised with the monomers of the formula I (= polymer P2).
This is a division of application Ser. No. 07/357,264, filed on May 26, 1989, now U.S. Pat. No. 4,985,504.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention concerns polymers which form compatible (miscible) polymer mixtures (polymer blends), specifically of a polymer P1 containing styrene as the monomer, and a polymer P2 containing a heterocyclic group with 5-8 ring atoms and at least 2 hetero atoms in the ring, and objects made of these polymers, where one of the polymers forms a coating on the other polymer or on the polymer blend, e.g. a coating on the compatible polymer mixtures.
2. Discussion of the Background
As a rule, different polymer species are considered to be incompatible with one another, i.e. different polymer species generally do not form a homogeneous phase, which would be characterized by complete miscibility of the components, down to small amounts of a component.
Certain exceptions to this rule have caused increasing interest, particularly among the experts concerned with the theoretical interpretation of the phenomena. Completely compatible mixtures of polymers demonstrate complete solubility (miscibility) in all mixture ratios.
A summary representation of miscible polymer systems can be found, for example, in D.R. Paul et al., Polymer and Engineering Science, 18 (16) 1225-34 (1978); J. Macromol. Sci. Rev. Macromol. Chem. C., 18 (1), 109-168 (1980).
As evidence of the miscibility, the glass temperature Tg or the so-called "optical method", i.e., the clarity of a film poured from a homogeneous solution of the polymer mixture, was often used as a reference. (See Brandrup-Immergut, Polymer Handbook, Ed., III, 211-2113). As a further test for the miscibility of polymers which are different from one another, the occurrence of the lower critical solution temperature (LCST) is used. (See DE-A 34 36 476.5 and DE-A 34 36 477.3). The occurrence of the LCST is based on the process which occurs during warming, where the polymer mixture, which has been clear and homogeneous until then, separates into phases and becomes optically cloudy to opaque. This behavior is a clear indication, according to the literature, that the original polymer mixture had consisted of a single homogeneous phase which was in equilibrium. Examples of existing miscibility are represented, for example, by the systems polyvinylidene fluoride with polymethyl methacrylate (PMMA) or with poly ethyl methacrylate. (U.S. Pat. Nos. 3,253,060, 3,458,391, and 3,459,843). Recent results concerning "polymer blends" and possible applications for them are reported by L.M. Robeson (Polym. Engineering & Science, 24 (8), 587-597 (1984)).
Copolymers of styrene and maleic acid anhydride, as well as of styrene and acrylonitrile are compatible with polymethyl methacrylate (PMMA) under certain conditions (DE-A 20 24 940). The improved properties of molding materials of these types are emphasized. In the same way, copolymers of styrene and monomers which contain hydroxyl groups which can form hydrogen bonds are also compatible with polymethacrylates in certain compositions, for example copolymers of styrene and p(-2-hydroxyhexafluoroisopropyl) styrene (B.Y. Min and Eli M. Pearce, Organic Coatings and Plastics Chemistry, 45, (1981) 58-64), or copolymers of styrene and allyl alcohol (F. Cangelosi and M.T. Shaw, Polymer Preprints (Am. Chem. Soc., Div. Polym. Chem.) 24, (1983), 258-259). Compatibility was also found in the system of acrylonitrile copolymers mixed with poly(tetrahydrofurfuryl methacrylate) (Goh, S.H., Siow, K.S., J. Appl. Polym. Sci., (1987), 33(5) 1949). In the same way, polytetrahydrofurfuryl methacrylate is compatible with copolymers of styrene and allyl alcohol (Goh, S.H., Polym. Bull., (1987), 17(3), 221-4). Compatibility is also found for acrylonitrile/styrene copolymers, i.e. acrylonitrile/ α-methyl styrene copolymers with polymethyl methacrylates which contain sterically hind red amino groups. For example, a methyl methacrylate/2,2,6,6-tetramethyl piperidinyl methacrylate copolymer is compatible with these styrene/acrylonitrile or α-styrene/acrylonitrile copolymers. (Goh et al., J. Appl. Polym. Sci., (1986), 31, 2055).
Compatibility is also found for mixtures of polyp-vinyl phenol and polymethacrylates. For example, poly-p-vinyl phenol is compatible with polymethyl methacrylate, poly ethyl methacrylate, polypropyl methacrylate or polytetrahydrofurfuryl methacrylate. (Goh, S.H., Siow, K.S., Polym. Bull., (1987), 17(5), 453-8).
Polystyrene itself, as well as other polymers which contain styrene, are considered to be incompatible with polymethyl methacrylate. For example, M.T. Shaw and R.H. Somani indicate a miscibility with polystyrene of only 3.4 ppm (PMMA with a molecular weight of 160,000) or 7.5 ppm (PMMA with a molecular weight of 75,000) (Adv. Chem. Ser., (1984), 206 (Polym. Blends Compos. Multiphase Syst.), 33-42; CA 101 : 73417e). Even polystyrene with a very low molecular weight has little compatibility with PMMA. For example, a mixture of 20% of a styrene oligomer with an extremely low molecular weight (MW : 3,100) already does not yield a clear product any more. At a molecular weight of 9,600, which is also still very low, even a solution of only 5 % in PMMA is only translucent. (Raymond R. Parent and Edward V. Tompson, Journal of Polymer Science: Polymer Physics Edition, Vol 16, 1829-1847 (1978)). Other polymethacrylates and polyacrylates demonstrate just as little miscibility with polystyrene to form transparent plastics. This is true, for example, for poly ethyl methacrylate, poly butyl methacrylate, polyisobutyl methacrylate, polyneopentyl methacrylate, polyhexyl methacrylate and many others. See also R.H. Somani and M.T. Shaw, Macromolecules 14, 1549-1554 (1981).
In contrast, mixtures of polystyrene and polycyclohexyl acrylate and mixtures of polystyrene and polycyclohexyl methacrylate are completely compatible. (see German patent application P 36 32 369.1 filed 9/24/86). The compatibility is so good that when these mixtures are heated, an LCST does not occur, i.e. the compatibility exists over the entire accessible temperature range. This good polystyrene compatibility no longer exists for heavily substituted cyclohexyl derivatives. Compatibility with polystyrene is found neither for poly-3,3,5-trimethylcyclohexyl methacrylate nor for polyisobornyl methacrylate. In comparison, the compatibility of poly-α-methyl styrene with polymethacrylates is better (see also German patent application P 36 32 370.5).
Mechanical mixtures of polymers (poly blends) have resulted in plastic products with improved properties in certain cases and in certain areas of the plastics industry (See Kirk-Othmer 3rd edition, Vol. 18, pp. 443-478, J. Wiley (1982)). The physical properties of such "poly blends" generally represent a compromise, which can mean an overall improvement as compared with the properties of the individual polymers. In these situations, multi-phase polymer mixture have achieved much greater commercial significance than compatible miscible mixtures (See Kirk-Othmer, loc. cit., p. 449).
Multi-phase and compatible miscible mixtures must therefore be considered separately with regard to both their physical properties and their properties which are relevant for application technology, especially their optical properties (transparency, clarity, etc.). As already explained, a lack of compatibility often sets narrow limits for mixing plastics with the goal of achieving an improved overall spectrum of properties.
SUMMARY OF THE INVENTION
Accordingly, one object of the present invention is to provide compatible miscible polymer mixtures having an improved overall spectrum of properties.
A further object is to prepare compatible miscible polymer mixtures having improved optical properties for use in optical fiber technology and other areas of optical application.
These and other objects which will become apparent from the following specification have been achieved by the present polymer mixtures and articles.
Surprisingly, it was now found that mixtures of styrene polymers and a polymer component containing a heterocyclic ring having 5-8 ring atoms and at least 2 heteroatoms in the ring are compatible. The polymer mixtures of the present invention are, therefore, prepared from a first polymer which is a styrene polymer or copolymer and a second polymer which contains monomers containing a heterocyclic ring. The articles of the present invention can be prepared by forming a coating of the first or second polymer on the second or first polymer or by forming a coating of the first or second polymer on a polymer blend (mixture) of the first and second polymers.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention concerns polymer mixtures composed of two different polymers P1 and P2, which form compatible polymer mixtures where the mixtures contain (A) 0.1-99.9 wt%, preferably 10-99 wt%, especially 50-90 wt% of the first polymer Pl which is composed of at least 20% and up to 100% by weight of styrene and 80 to 0% by weight of additional monomers which can be copolymerized with styrene, and (B) 99.1-0.1 wt%, preferably 1-90 wt%, especially 10-50 wt% of the second polymer P2 which is composed of at least 20% and up to 100% by weight of monomers with Formula I ##STR4## where R₁ stands for hydrogen, methyl or a ##STR5## group and where R₂ and R₂ stand for a ##STR6## group, with the proviso that n is 0, 1, 2 or 3, R₃ stands for a heterocyclic ring with 5-8 ring atoms and at least 2 heteroatoms in the ring, with oxygen being at least one of the heteroatoms, and R₄ is hydrogen or an alkyl group with 1-6 carbon atoms. When n=2 or 3, the individual groups R₄ can be the same or different. The second polymer P2 may also contain 80 to 0% by weight, preferably 80 to 2% by weight, of other monomers which can be copolymerized with monomers having Formula I.
To the extent that the heteroatoms in the heterocyclic do not represent oxygen atoms, they are preferably selected from the group consisting of nitrogen, sulfur, and, less preferred, phosphorus.
In general, the number of heteroatoms in the ring does not exceed four and preferably the ring contains 2 or 3 heteroatoms. Furthermore, heterocycles with 5 and 6 ring members are preferred, with at least one ring member preferably representing a --CH₂ -- group.
The heterocyclic ring may be substituted with one or two substituents on each ring member. Particularly preferred substituents are alkyl groups with 1 to 6 carbon atoms.
As is evident from the following, polymer P1 and polymer P2 are always clearly different from one another in terms of the components which determine their structure. According to the teachings in the art, therefore, compatibility could not be expected. Preferably, the sum of the amounts of polymers P1 and P2 is 100 wt% of the total polymers in the mixture, but under some circumstances, the polymer mixture can be used in place of a single polymer, i.e., in combination with other polymers.
The compatibility of the present mixtures of, for example, polystyrene (polymer P1) and heterocyclic poly(meth)acrylates (polymer P2) is all the more surprising since polystyrene s generally do not form any compatible mixtures with polymethacrylates and polyacrylates other than polycyclohexyl methacrylate and polycyclohexyl acrylate.
According to the present invention, the compatibility of the mixtures formed from polymers P1 and P2 is actually so good that at a temperature of 200° C. and above, no de-mixing occurs. Polymers P2 which are composed of at least 20% by weight and up to 100% by weight of monomers with Formula I are preferred. Preferably, the heterocyclic group R₃ does not contain any double bonds in the ring. The monomers with Formula I, therefore, do not include any aromatic groups for R₃. Polymer mixtures of polystyrene as polymer P1 and polymers P2 in which the monomers of Formula I where the heterocyclic group R₃ contains 2 oxygen atoms in the ring are particularly preferred. Heterocycles R₃ in which the two oxygen atoms are separated from one another only by a carbon atom, in other words heterocycles which represent an acetal or a ke tal, are especially preferred. Heterocycles with 5 ring atoms are preferred, with heterocycles of the 1,3-dioxolane type being especially preferred.
In an especially preferred embodiment, 20-100% by weight of polymer P2 is composed of monomers with the Formula I'. ##STR7## Here, R₄, R₅, R₆, R₇, independently, represent hydrogen or an alkyl group with 1-6 carbon atoms.
In a preferred embodiment, R₆ and R₇ each stand for alkyl group with 1-6 carbon atoms, with the following being very especially preferred: R₆ =R₇ =methyl. It is furthermore preferred that R₄ stands for hydrogen and n=1. In the especially preferred embodiment, R₅ also stands for hydrogen In this case, polymer P2 consists of 20 to 100% by weight of monomers with Formula I". ##STR8##
The excellent compatibility of these polymer mixtures permits an extensive range of variation, with regard to the mixture ratio as well as to the mixture components. This is especially true when using pure polystyrene as polymer P1. Therefore it is possible, on the one hand, to extensively vary the polymer component P2 by copolymerization with suitable monomers. On the other hand, the polymer component P1 can also be changed by copolymerization with suitable monomers, within a certain framework, without losing compatibility.
Suitable comonomers are found, for example, in the Kunststoff-Handbuch, published by R. Vieweg and G. Dau miller, Volume V, Carl Hanser Verlag (1969), p. 104 -108. Suitable comonomers for polymer P2 are acrylic or methacrylic acid esters, in general those of alcohols with 1-18 carbon atoms, especially alkanols. Alcohols with 1-12 carbon atoms are preferred. Methyl methacrylate can be particularly mentioned as a comonomer. Preferably the proportion of copolymerizable monomers containing cyclohexyl alcohol as the alkanol is limited to <9.9% by weight. In this preferred embodiment, the proportion of cyclohexyl(meth)acrylate in the polymer P2 is <9.9% by weight, preferably <1% by weight. Monomers with groups in the molecule which absorb UV light are also possible and of interest, for example those mentioned or described in U.S. Pat. No. 4,576,870 incorporated herein by reference.
The proportion of the monomer I in polymer P2 generally lies in the range of 100-20% by weight, preferably in the range of 100-30% by weight, and especially preferably in the range of 80 to 40% by weight. Replacement of the styrene in polymer P1 with alkyl-substituted, especially C₁ -C₄ -alkyl-substituted styrene s, such as m-methyl styrene, p-methyl styrene, p-tert.-butyl styrene, α-methyl styrene, is possible up to about 20%, preferably up to about 10% by weight. In the same way, the styrene can be partially replaced with esters of acrylic acid and methacrylic acid, particularly by esters of C₁ -C₁₈ alcohols, preferably of C₁ -C₈ alkanols. Furthermore, the styrene can be replaced by other vinyl compounds, especially vinyl esters of C₂₋₁₀ monocarboxylic acids, such as vinyl acetate and vinyl propionate, in smaller amounts of about 20% by weight or less.
It should be noted that the styrene content of the polymer Pl must be at least 20% by weight, preferably at least 50% by weight, especially preferably at least 90% by weight, and very especially preferably at least 99% by weight. Polymer P1 is polystyrene in the most preferred embodiment, but can be extensively modified with other hydrophobic vinyl compounds. The proportion of highly polar monomers, such as e.g., acrylonitrile, maleic acid anhydride, maleic acid imides, p-(2-hydroxyhexafluoroisopropyl) styrene or allyl alcohol in polymer P1 is very limited. The proportion of these polar monomers should amount to from 0 to less than 10% by weight, or less than 5% by weight of the polymer P1. Polymers P1 which contain less than 0.1% by weight of these polar monomers, preferably 0% by weight, are especially preferred.
In the same way as described above for polymer P1, monomer I in polymer P2 can be replaced proportionally with the comonomers described above for polymer P2. The variations will generally be guided by the requirements of the specific area of application.
Thus, the content of monomer I in a polymer P2 that is to be used in high proportions, for example to modify the index of refraction of pure polystyrene, will be higher, usually distinctly above 20 wt.%, or preferably distinctly above 30 wt.%, than the proportion of monomer I of a polymer P2 that, is only to be compatible at room temperature, but is to show phase separation (incompatibility) again at elevated temperature.
As a rule, compatibility of the polymer P1 with polymer P2 will still exist if the polymer P1 contains lesser proportions of the monomer I and/or if the polymer P2 also contains styrene. The styrene content of the polymer P1, however, is clearly higher than the styrene content of the polymer P2. As a rule, the difference in the styrene content (% by weight styrene in polymer P1 minus % by weight styrene in polymer P2) is greater than 10% by weight, preferably greater than 30% by weight, especially preferably greater than 50% by weight, and very especially preferably greater than 90% by weight. In the same way, the monomer I content of polymer P2 is clearly higher than the monomer I content of polymer P1. Therefore, as a rule, polymer P1 contains less than 5% by weight monomer with Formula I, preferably less than 0.1% by weight. In a preferred embodiment, P1 is polystyrene.
The characterization of the polymer mixtures according to the invention as compatible mixtures takes place according to the recognized criteria (See Kirkothmer, loc cit., Vol. 18, pp. 457-460; J. Brandrup, E.H. Immergut, Polymer Handbook, 2nd edition, J. Wiley (1975), pp. III-211).
a) When using optical methods, a single refractive index is observed in the polymer mixtures according to the invention, the refractive index being between those of the two polymers P1 and P2.
b) The polymer mixtures possess a single glass transition temperature Tg, which lies between that of polymers P1 and P2.
Production of the polymer P1 and P2 can take place according to the known rules of polymerization and according to known methods. The polymers of type P1 can be produced, for example, according to Houben-Weyl, Methoden der Organischen Chemie, 4th edition, Volume XIV/1, pp. 761-841, Georg Thieme Verlag (1961). Some of these polymers are also commercially available in a suitable form. Preferably, the radical polymerization method is used, but ionic polymerization methods can also be used.
The molecular weights of the polymers Pl used according to the invention are generally above 3,000, preferably in a range of 5,000-1,000,000, especially preferably in a range of 20,000-500,000 as determined by light scattering. See Kirk-Othmer, 3rd edition, Vol. 18, loc. cit., p. 211). It should be emphasized, however, that the molecular weights do not appear to have any critical influence on the suitability of a polymer as a component in the compatible polymer mixtures. This is true both for homopolymers and the copolymers of types P1 and P2.
For compatibility of polymer P1 and polymer P2, the tactic ity of the polymers has a certain significance. As a rule, a polymer P2 with a low proportion of iso tactic triads, such as one obtained by radical polymerization, for example, is preferred over polymers with a high iso tactic proportion, such as one produced by specific ionic polymerization.
The production of the homopolymers and/or copolymers P2 is generally carried out by radical polymerization. (See H. Rauch-Puntigam, Th. Volker, Acryl- und Methacrylverbindungen, Springer-Verlag, 1967). Even though production by anionic polymerization or group transfer polymerization is possible (see also O.W. Webster et al., J. Am. Chem. Soc. 105, 5706 (1983)), the preferred method of production is radical polymerization.
The molecular weights of polymers P2 are very generally above 3,000, generally in a range of 10,000 to 1,000,000, preferably 20,000 to 300,000 (by light scattering). For the selection of the monomer components which are to be used as comonomers for P2, care should be taken that the glass transition temperature Tg of the resulting polymer does not have a restrictive influence on the technical applicability of the total system.
For the production of molded objects or articles made from the polymer mixture, for example, at least one of the polymers P1 and P2 should demonstrate a glass transition temperature Tg>70° C. It is preferred for this application that the polymer mixture also has a glass transition temperature Tg>70° C. This restriction applies preferably for the production of injection-molded, pressed or extruded objects made of the polymer mixture. For other areas of application, for example for varnishes and paints, for elastomers, or for reversible thermo tropic vitrification (polymer: blend with cloud point on heating) or for use according to DE-A 34 36 477.3, however, polymer P2 with a glass temperature Tg<40° C. or especially <20° C. is preferred.
The compatible mixtures can be prepared by different procedures. For example, they can be made by intensive mechanical mixing of polymers P1 and P2 in the melt, in an extruder, etc.; or they can also be made from a common solvent as so-called "solution cast poly blends". (See Kirk-Othmer "Encyclopedia of Chemical Technology" 3rd Ed., Vol. 18, pg. 443-478, J. Wiley, 1982). The polymer P1 can also be dissolved in the mixture of monomers of the other polymer P2, and polymer P2 can then be produced in the presence of polymer P1. Conversely, polymer P1 can naturally also be produced in the presence of polymer P2. Likewise, the polymer mixture can be produced by common precipitants. There are no limits to the method of blending. As a rule, blends of polymers P1 and P2 are first made, preferably starting with solids, for example in the form of a bead polymer or a granulate, using slow mixing units such as drum mixers, gyrowheel mixters, or double-chamber plow blade mixers. The slow mixing units produce mechanical blending without the phase boundaries being eliminated. (See Ullmann's Encyklopadie der Technischen Chemie, 4th Edition, Vol. 2, pg. 282-311, Verlag Chemie). The thermoplastic treatment is then carried out by homogenous blending in the melt using heated mixing units at suitable temperatures, for example 150 to about 300° C. in kneaders or preferably extruders, for example single-screw or multiple-screw extruders, or optionally in extruders with oscillating screw and shear pins (for example, in a BUSSCO kneader).
Granulates of uniform shape can be produced by this process (for example, hot chips, cube-shaped, and round grained granulates). The particle size of the granulate is generally in the range of 2 to 5 mm. Another simple method for producing polymer blends is the blending of polymer dispersions (containing polymer P1 and polymer dispersions containing polymer P2). These dispersion-blends can be coagulated together, spray-dried together, or squeezed out using an extruder. On the other hand, the dispersion blends can also be dried together to form a film.
The existence of compatible polymer mixtures offers advantages which make the corresponding technical application possibilities obvious. "Polystyrene" is used to represent, but not to limit, the possibilities in the category of polymer P1.
1) First of all, in contrast to blends of most other poly(meth)acrylates and polystyrene s, the polymer blends (polystyrene/polymer P2) are compatible. In other words, the polymer blends pursuant to the invention are glass-clear in the unpigmented state, in contrast to incompatible polystyrene/poly(meth)acrylate blends (they show no light scattering, i.e., the "haze" is generally below 10%). However, blends that are compatible only at room temperature but show separation at elevated temperature are also considered part of the invention.
2) Blends of polystyrene s and polymer P2, like polystyrene s and polymer P2 themselves, show low water absorption.
3) The birefringence of polystyrene can be reduced by blending with polymer P2. The two aforementioned properties qualify the polymer blends pursuant to the invention as data storage materials in particular for optically readable information carriers. See J. Hennig, Kunststoffe 75, pg. 425 (1985).
4) The refractive index of polystyrene can be reduced by blending with polymer P2. For example, the refractive index of polystyrene can be modified by blending with polymer P2 so that the refractive index of the polystyrene/polymer P2 blend matches the refractive index of-an intercalated rubber phase. Transparent, impact-resistant plastics can be obtained in this way.
Also, of special interest are polymer compositions that consist of approximately 40-99 wt.%, preferably 70-95 wt.% of the polymer blend and 60-1 wt.%, preferably 30-5 wt.% of another polymer P3, chemically different from P1 and P2, with polymer P3 being incompatible with polymer P1, P2, and with the blend.
The composition of the polymer blend in this case is generally chosen so that the refractive index of the polymer P3 conforms to the refractive index of the blend. As a rule, therefore, at room temperature: ##EQU1##
In general, the polymer P3 is incompatible (immiscible) with the blend, will have a Tg<20° C., and will be covalently bonded to at least one of the constituents of the polymer blend, in other words with P1 or P2. The polymer P3 can also be crosslinked.
It is very particularly preferable for the polymer P3 to be polybutadiene or polyisoprene.
Polymer compositions made up of 40-99 wt.% of the polymer blend and 1-60 wt.% P3, particularly when P3 has a Tg<20° C., are distinguished by the fact that their impact strength is improved over that of the pure polymer blend.
In particular, polymer compositions consisting of 40-99 wt.% of the polymer blend and 60-1 wt.% P3 permit simple impact strength blending of polymer P2. Thus, P2 that may be brittle can be blended into a high impact strength, clear polymer composition by blending with commercial P1 provided with high impact strength (for example, styrene-butadiene block copolymers).
5. Production of optical fibers is possible by encasing polystyrene with polymer P2:
The following characteristics are then obtained:
______________________________________ Core: Polystyrene Refractive index n.sub.D = 1.59 Coating: Polymer P2, documented as example: n.sub.D = 1.49 In general, polymers P2 consisting of 100 wt. % monomers of Formula I will not be used for the coating, but copolymers of methyl methacrylate and monomers of Formula I. Transition: Continuous. This zone corresponds to a polymer blend. The core conforms to the definition of P1, and the coating corresponds to the definition of P2. ______________________________________
Such fibers can be used as optical waveguide cables, for example.
6) Items made of polystyrene with a thin coating of polymer P2, especially of a polymer P2 with UV-absorbers, preferably copolymerized, are feasible. In contrast to uncoated polystyrene, such objects are weather-resistant. The otherwise serious problem of recycling heterogeneously coated plastic waste is eliminated, since waste can be reincorporated because of its good compatibility. As a rule, the objects made of polystyrene or of the polymer blend can be manufactured by injection, pressing, extrusion, rolling, or casting. The coating of polymer P2 is usually applied by painting or by co extrusion.
7) Panels of polystyrene with a coating of polymer P2 can be made. Panels of such construction have transparency approximately 2% better than untreated polystyrene panels. As a rule, panels with a coating of polymer P2 also have better scratch resistance and modified corrosion resistance. 0f particular interest are multiple-frame panels such as those used for glazing greenhouses that have been made of polystyrene or a polymer blend and have a coating of a polymer P2. (DE-A 16 09 777). Polystyrene s can also be cemented with polymer P2, or preferably with monomer/initiator mixtures containing monomer I. In this case, the high rate of polymerization of acrylates can be combined with good polymer compatibility. Such objects are to be considered as solid objects included in the scope of the invention with a polymeric configuration made up of a layer of polymer P1, a second layer of polymer P2, and an interlayer of a compatible polymer blend consisting of
P1) 0.1 to 99.9 wt.% of a polystyrene that consists of 20 to 100 wt.% styrene and 80 to 0 wt.% monomers copolymerizable with styrene, and
P2) 99.9 to 0.1 wt.% of a polymer P2 that is made up of 20 to 100 wt.% monomers of Formula I and 80 to 0 wt.% monomers copolymerizable with monomers of Formula I.
Objects made of waste materials or with a content of waste material are considered similarly, for example when waste material is incorporated into a polymer P1. They conform to the definition by which a layer of the compatible polymer blend is covered over by a top coat of the second polymer.
In all of the objects mentioned above, the top coat should preferably contain 0.1 to 20 wt.% (based on the top coat) of at least one UV-absorber suitably distributed. Usable UV absorbers are mentioned, for example, in Kirk-Othmer, Encyclopedia of Chemical Technology, 3rd Ed., Vol. 23, pp. 615-627, J. Wiley (1983); R. Gaechter and H. Mueller, Taschenbuch der Kunststoff-Additive, Carl Hanser Verlag (1979), pp. 90-143; Ullmann's Encyklopadie der Techn. Chemie, 4th Edition, Volume 15, pp. 256-260, Verlag Chemie (1978); and US-A 4,576,870.
8) Processing benefits result from the use of blends consisting of >90 wt.% polystyrene and <10 wt.% polymer P2. In this case, the polymer P2 performs the function of a processing aid.
9) Transparent molded objects can be obtained from polystyrene/polymer P2 blends that have been modified on the surface by the action of energy, for example suitable irradiation, so that the polymer P2 has been degraded, but the polystyrene has not. (Molded objects with antireflective surfaces, resists, etc).
The invention therefore concerns not only polymer blends of 0.1-99.1 wt.% of a polystyrene that is made up of at least 20 and up to 100 wt.% styrene and 80-0 wt.% of other monomers copolymerizable with styrene (polymer P1) and 99.9-0.1 wt.% of a polymer that is made up of at least 20 wt.% and up to 100 wt.% of monomers of Formula I shown above (polymer P2), but also polymer compositions in which polymer P2 adheres to polymer P1. Especially preferred in this case are polymer compositions in which a molded object of polymer P1 is coated with a jacket of polymer P2. Of particular industrial importance is the fact that the polymers P2 adhere outstandingly to a molded object of P1.
The fact that the polymers P2 demonstrate excellent adhesion to a molded element made of P1 is of particular technical significance.
Other features of the invention will become apparent in the course of the following descriptions of exemplary embodiments which are given for illustration of the invention and are not intended to be limiting thereof.
The VICAT softening temperature was determined according to DIN 53460. Determination of the reduced viscosity (ηspec/c) is based on DIN 1342, DIN 51562 and DIN 7745. Determination of the light permeability can be carried out according to DIN 5036, unless otherwise specified. The cloudiness (haze) is indicated in % (ASTM D 1003).
EXAMPLES Example 1
Compatible mixtures of poly-(2,2-dimethyl-1,3-dioxolan-4-yl methyl methacrylate) and polystyrene. ##STR9## Using poly-(2,2-dimethyl-1,3-dioxolan-4-yl methyl methacrylate) as P1, produced by radical polymerization, and polystyrene as P2, films are produced in a ratio of 80/20, 50/50, 20/80. All films were glass-clear and compatible. De-mixing did not take place, even when the films were heated to 260° C.
Example 2
Polymer P2 consisted of 100 % by weight of monomers with Formula I-2. ##STR10##
Again, mixtures with polystyrene in ratios of 20/80, 50/50 and 80/20 were clear as glass and compatible. Production of the films, in each case, was performed by dissolving the polymers in toluene to form solutions of 20 % by weight, and allowing the solutions to evaporate.
Example 3 Production of the polymers
20 g 2,2-dimethyl-1,3-dioxolan-4-yl methyl methacrylate was mixed with 0.03 g t-butyl perneodecanoate and 0.06 g dodecyl mercaptan and polymerized in a glass vessel, under inert gas (argon) for 2 hours, at 60° C. The mixture was cooled, diluted with acetone and precipitated in methanol. After drying in a vacuum, a polymer with J=57 ml/g was obtained.
This polymer was mixed with polystyrene to investigate the compatibility, on the one hand (see Example 1), and used to coat polystyrene plates, according to the invention, on the other hand (see Example 4).
Example 4 Coating of polystyrene
A polystyrene plate with a thickness of 3 mm (produced from polystyrene, 168N from BASF) was coated with a solution of 15 g polymer according to Example 3 and 0.75 g 2-hydroxy-4-methoxy-benzophenone in a mixture of 17 g2-butanone and 68 g di acetone alcohol. A glass-clear plate having a protective layer with a thickness of approximately 10 microns of the polymer according to Example 3 was obtained. The adhesion of the layer to the polystyrene substrate was excellent (GTO according to DIN 53 151).
Example 5 Production of a copolymer
A mixture of 100 g 2,2-dimethyl-1,3-dioxolan-4-yl methyl methacrylate and 100 g methyl methacrylate was mixed with 0.2 g t-butyl perneodecanoate and 0.6 g dodecyl mercaptan and polymerized under inert gas for 4 hours, at 50° C. The mixture was then diluted with acetone, precipitated in methanol and dried in a vacuum (J=74 ml/g).
Example 6 Coating of polystyrene
Analogous to Example 4, polystyrene-plate with a thickness of 3 mm (produced from polystyrene 168N from BASF) was coated under the conditions stated in Example 4.
A glass-clear plastic plate was obtained with clearly improved optical properties as compared with the initial material. The adhesion of the coating to the substrate was excellent (GTS according to DIN 53 151).
What is new and desired to be secured by letters patent of the United States is:
1. An article or object, comprising (i) a core material of a first polymer P1, said first polymer comprising 20-100 wt.% styrene monomer units; a second polymer P2, said second polymer comprising 20-100 wt.% of monomers having formula I ##STR11## where R₁ stands for hydrogen, methyl or a ##STR12## group and wherein R₂ and R₂ ' are the group ##STR13## wherein n is 0-3, R₃ is a 5-8 membered heterocyclic ring having at least two heteroatoms in the ring, at least one of said heteroatoms being an oxygen, and R₄ is a hydrogen or a C₁₋₆ alkyl group, or a polymer blend consisting essentially of 0.1-99.9 wt.% of said first polymer and 99.9-0.1 wt.% of said second polymer, and(ii) a coating material on said core material, said coating material comprising said first or second polymer.
2. The article or object of claim 1, wherein said core material is said first polymer or said polymer blend and said coating material is said second polymer.
3. The article or object of claim 1, wherein said core material is said second polymer or said polymer blend and said coating material is said first polymer.
4. The article or object of claim 1, wherein said second polymer comprises 30-100 wt.% of monomers having formula (I).
5. The article or object of claim 1, wherein said second polymer comprises 40-80 wt.% of monomers having formula (I).
6. The article or object of claim 1, wherein said first polymer comprises at least 50 wt.% styrene.
7. The article or object of claim 1, wherein said first polymer comprises at least 90 wt.% styrene.
8. The article or object of claim 1, wherein said first polymer comprises at least 99 wt.% styrene.
9. The article or object of claim 1, wherein said heterocyclic ring contains one oxygen atom and 1-3 heteroatoms selected from the group consisting of oxygen, nitrogen, sulfur and phosphorus.
10. The article or object of claim 1, wherein said heterocyclic ring is a 5- or 6-membered ring containing two oxygen atoms.
11. The article or object of claim 1, wherein said heterocyclic ring is an acetal or ke tal.
12. The article or object of claim 1, wherein said second polymer comprises 20-100 wt.% of monomer units having formula (I') ##STR14## wherein R₁ is hydrogen or methyl, and R₄, R₅, R₆ and R₇, independently, are hydrogen or a C₁₋₆ alkyl group.
13. The article or object of claim 1, wherein said first polymer comprises about 20 wt.% or less of copolymerizable monomers selected from the group consisting of acrylic and methacrylic acid esters of C₁₋₁₈ alcohols and vinyl esters of C₂₋₁₀ monocarboxylic acids.
14. The article or object of claim 1, wherein said first polymer comprises less than 5 wt.% of polar monomers selected from the group consisting of (meth)acrylonitrile, maleic anhydride, maleimide, and p-(2-hydroxyhexafluoroisopropyl)styrene.
15. The article or object of claim 1, wherein said polymer blend comprises 10-99 wt.% of said first polymer and 90-1 wt.% of said second polymer.
16. The article or object of claim 1, wherein said polymer blend comprises 50-90 wt.% of said first polymer and 50-10 wt.% of said second polymer.
17. The article or object of claim 1, wherein said polymer blend comprises 20-80 wt.% of said first polymer and 80-20 wt.% of said second polymer.
18. The article or object of claim 2, wherein said second polymer contains 0.1-20 wt.% based on said second polymer of a copolymerizable UV absorbing monomer.
19. The article or object of claim 1, wherein said article or object is a data storage disk.
20. The article or object of claim 1, wherein said article or object is an optical fiber.
|
# coding: utf-8
# # Dataset boolean3: NP conjoined by and
#
# Generating sentences of the form
#
# - 1) **c has traveled to X and Y, c didn't travel to X** (contradiction)
# - 1) **c went to X and Y, c didn't go to X** (contradiction)
# - 1) **c has visited X and Y, c didn't visit X** (contradiction)
#
#
# - 2) **c has traveled to X and Y, c didn't travel to Y** (contradiction)
# - 2) **c went to X and Y, c didn't go to Y** (contradiction)
# - 2) **c has visited X and Y, c didn't visit Y** (contradiction)
#
#
# - 3) **c has traveled to X and Y, c didn't travel to W ** (non-contradiction)
# - 3) **c went to X and Y, c didn't go to W** (non-contradiction)
# - 3) **c has visited X and Y, c didn't visit W** (non-contradiction)
#
#
# - 4) **c has traveled to X and Y, d didn't travel to X (Y)** (non-contradiction)
# - 4) **c went to X and Y, d didn't go to X (Y)** (non-contradiction)
# - 4) **c has visited X and Y, d didn't visit X (Y)** (non-contradiction)
#
#
# - 5) **c and d have traveled to X, c didn't travel to X** (contradiction)
# - 5) **c and d went to X, c didn't go to X** (contradiction)
# - 5) **c and d have visited X, c didn't visit X** (contradiction)
#
#
# - 6) **c and d have traveled to X, d didn't travel to X** (contradiction)
# - 6) **c and d went to X, d didn't go to X** (contradiction)
# - 6) **c and d have visited X, d didn't visit X** (contradiction)
#
#
# - 7) **c and d have traveled to X, c didn't travel to Y ** (non-contradiction)
# - 7) **c and d went to X, c didn't go to Y** (non-contradiction)
# - 7) **c and d have visited X, c didn't visit Y** (non-contradiction)
#
#
# - 8) **c and d have traveled to X, e didn't travel to X** (non-contradiction)
# - 8) **c and d went to X, e didn't go to X** (non-contradiction)
# - 8) **c and d have visited X, e didn't visit X** (non-contradiction)
import numpy as np
import pandas as pd
try:
from word_lists import name_list, city_list
except ImportError:
from contra_qa.text_generation.word_lists import name_list, city_list
import os
import itertools
def boolean3():
template1 = itertools.product(name_list, city_list)
template1 = list(template1)
upper_bound = 11000 / 8
# ### Generating all types of sentences
# - 1) **c has traveled to X and Y, c didn't travel to X** (contradiction)
# - 1) **c went to X and Y, c didn't go to X** (contradiction)
# - 1) **c has visited X and Y, c didn't visit X** (contradiction)
np.random.shuffle(template1)
all_sentences_1 = []
for i in range(int(upper_bound)):
person, place1 = template1[i]
place2 = place1
while place2 == place1:
new_i = np.random.choice(len(template1))
_, place2 = template1[new_i]
if i % 3 == 0:
sentence = "{} has traveled to {} and {},{} didn't travel to {}".format(
person, place1, place2, person, place1)
and_A = "{} has traveled to {}".format(person, place1)
and_B = "{} has traveled to {}".format(person, place2)
elif i % 3 == 1:
sentence = "{} went to {} and {},{} didn't go to {}".format(
person, place1, place2, person, place1)
and_A = "{} went to {}".format(person, place1)
and_B = "{} went to {}".format(person, place2)
else:
sentence = "{} has visited {} and {},{} didn't visit {}".format(
person, place1, place2, person, place1)
and_A = "{} has visited {}".format(person, place1)
and_B = "{} has visited {}".format(person, place2)
all_sentences_1.append(sentence + "," + and_A + "," + and_B)
all_sentences_1 = [sentence.split(",") + [1]
for sentence in all_sentences_1]
# - 2) **c has traveled to X and Y, c didn't travel to Y** (contradiction)
# - 2) **c went to X and Y, c didn't go to Y** (contradiction)
# - 2) **c has visited X and Y, c didn't visit Y** (contradiction)
np.random.shuffle(template1)
all_sentences_2 = []
for i in range(int(upper_bound)):
person, place1 = template1[i]
place2 = place1
while place2 == place1:
new_i = np.random.choice(len(template1))
_, place2 = template1[new_i]
if i % 3 == 0:
sentence = "{} has traveled to {} and {},{} didn't travel to {}".format(
person, place1, place2, person, place2)
and_A = "{} has traveled to {}".format(person, place1)
and_B = "{} has traveled to {}".format(person, place2)
elif i % 3 == 1:
sentence = "{} went to {} and {},{} didn't go to {}".format(
person, place1, place2, person, place2)
and_A = "{} went to {}".format(person, place1)
and_B = "{} went to {}".format(person, place2)
else:
sentence = "{} has visited {} and {},{} didn't visit {}".format(
person, place1, place2, person, place2)
and_A = "{} has visited {}".format(person, place1)
and_B = "{} has visited {}".format(person, place2)
all_sentences_2.append(sentence + "," + and_A + "," + and_B)
all_sentences_2 = [sentence.split(",") + [1]
for sentence in all_sentences_2]
# - 3) **c has traveled to X and Y, c didn't travel to W ** (non-contradiction)
# - 3) **c went to X and Y, c didn't go to W** (non-contradiction)
# - 3) **c has visited X and Y, c didn't visit W** (non-contradiction)
# In[5]:
np.random.shuffle(template1)
all_sentences_3 = []
for i in range(int(upper_bound)):
person, place1 = template1[i]
place2 = place1
while place2 == place1:
new_i = np.random.choice(len(template1))
_, place2 = template1[new_i]
place3 = place1
while place3 == place1 or place3 == place2:
new_i = np.random.choice(len(template1))
_, place3 = template1[new_i]
if i % 3 == 0:
sentence = "{} has traveled to {} and {},{} didn't travel to {}".format(
person, place1, place2, person, place3)
and_A = "{} has traveled to {}".format(person, place1)
and_B = "{} has traveled to {}".format(person, place2)
elif i % 3 == 1:
sentence = "{} went to {} and {},{} didn't go to {}".format(
person, place1, place2, person, place3)
and_A = "{} went to {}".format(person, place1)
and_B = "{} went to {}".format(person, place2)
else:
sentence = "{} has visited {} and {},{} didn't visit {}".format(
person, place1, place2, person, place3)
and_A = "{} has visited {}".format(person, place1)
and_B = "{} has visited {}".format(person, place2)
all_sentences_3.append(sentence + "," + and_A + "," + and_B)
all_sentences_3 = [sentence.split(",") + [0]
for sentence in all_sentences_3]
# - 4) **c has traveled to X and Y, d didn't travel to X (Y)** (non-contradiction)
# - 4) **c went to X and Y, d didn't go to X (Y)** (non-contradiction)
# - 4) **c has visited X and Y, d didn't visit X (Y)** (non-contradiction)
np.random.shuffle(template1)
all_sentences_4 = []
for i in range(int(upper_bound)):
person1, place1 = template1[i]
place2 = place1
person2 = person1
while place2 == place1 and person2 == person1:
new_i = np.random.choice(len(template1))
person2, place2 = template1[new_i]
if i % 2 == 0:
place3 = place1
else:
place3 = place2
if i % 3 == 0:
sentence = "{} has traveled to {} and {},{} didn't travel to {}".format(
person1, place1, place2, person2, place3)
and_A = "{} has traveled to {}".format(person1, place1)
and_B = "{} has traveled to {}".format(person1, place2)
elif i % 3 == 1:
sentence = "{} went to {} and {},{} didn't go to {}".format(
person1, place1, place2, person2, place3)
and_A = "{} went to {}".format(person1, place1)
and_B = "{} went to {}".format(person1, place2)
else:
sentence = "{} has visited {} and {},{} didn't visit {}".format(
person1, place1, place2, person2, place3)
and_A = "{} has visited {}".format(person1, place1)
and_B = "{} has visited {}".format(person1, place2)
all_sentences_4.append(sentence + "," + and_A + "," + and_B)
all_sentences_4 = [sentence.split(",") + [0]
for sentence in all_sentences_4]
# - 5) **c and d have traveled to X, c didn't travel to X** (contradiction)
# - 5) **c and d went to X, c didn't go to X** (contradiction)
# - 5) **c and d have visited X, c didn't visit X** (contradiction)
template1 = itertools.product(name_list, city_list)
template1 = list(template1)
np.random.shuffle(template1)
all_sentences_5 = []
for i in range(int(upper_bound)):
person1, place = template1[i]
person2 = person1
while person2 == person1:
new_i = np.random.choice(len(template1))
person2, _ = template1[new_i]
if i % 3 == 0:
sentence = "{} and {} have traveled to {},{} didn't travel to {}".format(
person1, person2, place, person1, place)
and_A = "{} has traveled to {}".format(person1, place)
and_B = "{} has traveled to {}".format(person2, place)
elif i % 3 == 1:
sentence = "{} and {} went to {},{} didn't go to {}".format(
person1, person2, place, person1, place)
and_A = "{} went to {}".format(person1, place)
and_B = "{} went to {}".format(person2, place)
else:
sentence = "{} and {} have visited {},{} didn't visit {}".format(
person1, person2, place, person1, place)
and_A = "{} has visited {}".format(person1, place)
and_B = "{} has visited {}".format(person2, place)
all_sentences_5.append(sentence + "," + and_A + "," + and_B)
all_sentences_5 = [sentence.split(",") + [1]
for sentence in all_sentences_5]
# - 6) **c and d have traveled to X, d didn't travel to X** (contradiction)
# - 6) **c and d went to X, d didn't go to X** (contradiction)
# - 6) **c and d have visited X, d didn't visit X** (contradiction)
np.random.shuffle(template1)
all_sentences_6 = []
for i in range(int(upper_bound)):
person1, place = template1[i]
person2 = person1
while person2 == person1:
new_i = np.random.choice(len(template1))
person2, _ = template1[new_i]
if i % 3 == 0:
sentence = "{} and {} have traveled to {},{} didn't travel to {}".format(
person1, person2, place, person2, place)
and_A = "{} has traveled to {}".format(person1, place)
and_B = "{} has traveled to {}".format(person2, place)
elif i % 3 == 1:
sentence = "{} and {} went to {},{} didn't go to {}".format(
person1, person2, place, person2, place)
and_A = "{} went to {}".format(person1, place)
and_B = "{} went to {}".format(person2, place)
else:
sentence = "{} and {} have visited {},{} didn't visit {}".format(
person1, person2, place, person2, place)
and_A = "{} has visited {}".format(person1, place)
and_B = "{} has visited {}".format(person2, place)
all_sentences_6.append(sentence + "," + and_A + "," + and_B)
all_sentences_6 = [sentence.split(",") + [1]
for sentence in all_sentences_6]
# - 7) **c and d have traveled to X, c (d) didn't travel to Y ** (non-contradiction)
# - 7) **c and d went to X, c (d) didn't go to Y** (non-contradiction)
# - 7) **c and d have visited X, c (d) didn't visit Y** (non-contradiction)
np.random.shuffle(template1)
all_sentences_7 = []
for i in range(int(upper_bound)):
person1, place1 = template1[i]
person2 = person1
place2 = place1
while person2 == person1 and place2 == place1:
new_i = np.random.choice(len(template1))
person2, place2 = template1[new_i]
if i % 2 == 0:
person3 = person1
else:
person3 = person2
if i % 3 == 0:
sentence = "{} and {} have traveled to {},{} didn't travel to {}".format(
person1, person2, place1, person3, place2)
and_A = "{} has traveled to {}".format(person1, place1)
and_B = "{} has traveled to {}".format(person2, place1)
elif i % 3 == 1:
sentence = "{} and {} went to {},{} didn't go to {}".format(
person1, person2, place1, person3, place2)
and_A = "{} went to {}".format(person1, place1)
and_B = "{} went to {}".format(person2, place1)
else:
sentence = "{} and {} have visited {},{} didn't visit {}".format(
person1, person2, place1, person3, place2)
and_A = "{} has visited {}".format(person1, place1)
and_B = "{} has visited {}".format(person2, place1)
all_sentences_7.append(sentence + "," + and_A + "," + and_B)
all_sentences_7 = [sentence.split(",") + [0]
for sentence in all_sentences_7]
# - 8) **c and d have traveled to X, e didn't travel to X** (non-contradiction)
# - 8) **c and d went to X, e didn't go to X** (non-contradiction)
# - 8) **c and d have visited X, e didn't visit X** (non-contradiction)
np.random.shuffle(template1)
all_sentences_8 = []
for i in range(int(upper_bound)):
person1, place1 = template1[i]
person2 = person1
while person2 == person1:
new_i = np.random.choice(len(template1))
person2, _ = template1[new_i]
person3 = person1
while person3 == person1 or person3 == person2:
new_i = np.random.choice(len(template1))
person3, _ = template1[new_i]
if i % 3 == 0:
sentence = "{} and {} have traveled to {},{} didn't travel to {}".format(
person1, person2, place1, person3, place1)
and_A = "{} has traveled to {}".format(person1, place1)
and_B = "{} has traveled to {}".format(person2, place1)
elif i % 3 == 1:
sentence = "{} and {} went to {},{} didn't go to {}".format(
person1, person2, place1, person3, place1)
and_A = "{} went to {}".format(person1, place1)
and_B = "{} went to {}".format(person2, place1)
else:
sentence = "{} and {} have visited {},{} didn't visit {}".format(
person1, person2, place1, person3, place1)
and_A = "{} has visited {}".format(person1, place1)
and_B = "{} has visited {}".format(person2, place1)
all_sentences_8.append(sentence + "," + and_A + "," + and_B)
all_sentences_8 = [sentence.split(",") + [0]
for sentence in all_sentences_8]
np.random.shuffle(all_sentences_1)
np.random.shuffle(all_sentences_2)
np.random.shuffle(all_sentences_3)
np.random.shuffle(all_sentences_4)
np.random.shuffle(all_sentences_5)
np.random.shuffle(all_sentences_6)
np.random.shuffle(all_sentences_7)
np.random.shuffle(all_sentences_8)
size1 = len(all_sentences_1)
size2 = len(all_sentences_2)
size3 = len(all_sentences_3)
size4 = len(all_sentences_4)
size5 = len(all_sentences_5)
size6 = len(all_sentences_6)
size7 = len(all_sentences_7)
size8 = len(all_sentences_8)
all_sentences = all_sentences_1 + all_sentences_2 + \
all_sentences_3 + all_sentences_4
all_sentences += all_sentences_5 + all_sentences_6 + \
all_sentences_7 + all_sentences_8
sentence_1 = [triple[0] for triple in all_sentences]
sentence_2 = [triple[1] for triple in all_sentences]
and_A = [triple[2] for triple in all_sentences]
and_B = [triple[3] for triple in all_sentences]
label = [triple[4] for triple in all_sentences]
df_dict = {"sentence1": sentence_1,
"sentence2": sentence_2,
"and_A": and_A,
"and_B": and_B,
"label": label}
df = pd.DataFrame(df_dict)
df = df[["sentence1", "sentence2", "and_A", "and_B", "label"]]
df = df.sample(frac=1).reset_index(drop=True)
df_train = df.iloc[:10000]
df_test = df.iloc[10000:]
# ### Saving to CSV
if not os.path.exists("./data"):
os.makedirs("data/")
df_train.to_csv("data/boolean3_train.csv", index=False)
df_test.to_csv("data/boolean3_test.csv", index=False)
if __name__ == '__main__':
boolean3()
|
<?php
/**
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*
* @author Nur Wachid
* @copyright Copyright (c) Turahe 2020.
*/
use App\Models\Permission;
use App\Models\Role;
use Illuminate\Database\Seeder;
/**
* Class RolesTableSeeder.
*/
class RolesTableSeeder extends Seeder
{
/**
* Run the database seeds.
*
* @return void
*/
public function run()
{
Role::updateOrCreate([
'name' => Role::ROLE_ADMIN,
'description' => 'Hak akses super sekali',
])->syncPermissions(Permission::all());
Role::updateOrCreate([
'name' => Role::ROLE_EDITOR,
'description' => 'Edit all posts',
])->syncPermissions(Permission::all());
Role::updateOrCreate([
'name' => Role::ROLE_AUTHOR,
'description' => 'Edit all posts',
])->syncPermissions(Permission::all());
Role::updateOrCreate([
'name' => Role::ROLE_GUEST,
'description' => 'Pengguna biasa',
])->syncPermissions(['view_user', 'edit_user']);
}
}
|
Magic items do not give any visible response
I understand that magic items aren't supported right know (or if they ever will be)
I got slightly confused when I tried to price-check some magic jewels and thought it was some kind of bug as nothing happened. Not until I actually read the code I understood why nothing happened.
I suggest that a message shows up that magic items aren't supported when you try to price check them. This might reduce unnecessary bug reports in the future.
In v0.3.7, the red indicator will flash in the menu bar if an item price is unavailable or the item is not supported. I decided against showing a message when an item is unsupported, as the list could become cluttered quickly that way.
Thanks for the suggestion!
|
Board Thread:Roleplay/@comment-27356783-20180118040237/@comment-33863482-20180119004605
Plushtrap: *looks at Peter*
Jack: alright, that should be all for now, call me if you need anything, ok?
|
Indoor unit of an air conditioner
ABSTRACT
Disclosed is a heat exchanger for an indoor unit of an air conditioner being easier to make and having an improved efficiency of heat exchange by enlarging an area of the heat exchanger, which makes contact with air in a room. The heat exchanger for the indoor unit of the air conditioner comprises a first fin assembly for absorbing a heat from air in a room, a second fin assembly which is adjacent to an upper portion of the first fin assembly and spaced by a predetermined distance with respect to the first fin assembly, for absorbing a heat from air in the room, a plurality of refrigerant pipes which extend through the first fin assembly and the second fin assembly, for supplying a pathway for refrigerant, and a connecting member for connecting the first fin assembly and the second fin assembly with each other so that the second fin assembly is secured to the first fin assembly. The first fin assembly and the second fin assembly are made separately and connected by the connecting member so as to enlarge an area of heat exchange, thereby improving an efficiency of heat exchange.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to an air conditioner, and more particularly to an indoor unit of the air conditioner which has an improved heat exchanger to improve a cooling efficiency of the air conditioner.
2. Description of the Prior Art
In general, an air conditioner is a product for satisfying a desire of human beings to live in a more comfortable environment of a room, and is used for controlling and maintaining the air of the room.
The air conditioner typically includes a compressor for compressing an evaporated refrigerant, a condenser for absorbing a heat from a compressed refrigerant and discharging the heat to an atmosphere so that the refrigerant can be liquefied, an expansion valve for reducing a pressure of the liquefied refrigerant and expanding the refrigerant, and an evaporator for absorbing a heat from an air of a room and evaporating the refrigerant. The devices are connected to each other by means of pipes which create a refrigerant pathway. The refrigerant undergoes phase changes while being repeatedly circulated through the pipes connecting the devices of the air conditioner to each other, thereby absorbing the heat from the air of the room and discharging the heat to the atmosphere.
The compressor, the condenser, and the expansion valve of the air conditioner are mounted in an outdoor unit thereof, and the evaporator of the air conditioner is mounted in an indoor unit. The evaporator and condenser are used as heat exchanger for absorbing the heat by means of the refrigerant and discharging the heat from the refrigerant, wherein since the condenser is mounted in the outdoor unit of the air conditioner, the condenser is not restricted with respect to a size, whereas since the evaporator is mounted in the indoor unit of the air conditioner, the evaporator is restricted with respect to the size in consideration of the heat exchange efficiency and the aesthetic quality of the indoor unit of the air conditioner.
Accordingly, various efforts for reducing the size of the indoor unit of the air conditioner and improving the heat exchange efficiency of the heat exchanger have been recently tried. One method for reducing the size of the indoor unit is bending once a fin assembly of the heat exchanger at a predetermined angle. In this case, the height of the heat exchanger is somewhat lowered so that the total size of the indoor unit can be reduced. An other method for reducing the size of the indoor unit is bending twice a fin assembly of the heat exchanger. In this case, the fin assembly is bent to form an obtuse angle between the lower portion and the intermediate portion thereof and to form an acute angle between the intermediate portion and the upper portion thereof so as to have an upside down V shape. Accordingly, even though the heat exchange efficiency of the heat exchanger is not reduced, the total size of the indoor unit can be further reduced since bending the fin assembly twice rather than bending the fin assembly once can reduce the height of the heat exchanger.
Korean Patent laid-open publication 95-6368 filed by Kabushiki Kasha Fag ots General on May 20, 1994 discloses an indoor unit of an air conditioner which can be easily cleaned and has a compact size.
FIG. 1 is an exploded perspective view of an indoor unit of an air conditioner having a heat exchanger according to the Korean patent laid-open publication, and FIG. 2 is a cross-sectional view of the indoor unit of the air conditioner having the heat exchanger in FIG. 1. Referring to FIGS. 1 and 2, indoor unit 10 of the air conditioner according to the Korean patent laid-open publication of Fag ots General includes a frame body 11, a front cover 12 incorporated with frame body 11 and having air inlets 19 and 20 at the upper surface and the front surface, respectively and an air outlet 21 at the lower portion of the front surface, a filter 13 which is disposed at the front surface of front cover 12, for filtering dust from an air sucked through air inlets 19 and 20, a sucking grille 14 removably attached to the front surface of front cover 12, a heat exchanger 15 which is arranged in frame body 11 and is bent twice to have an upside down V shape at the upper portion, for absorbing a heat from the air sucked in frame body 11, and a blower 16 arranged between heat exchanger 15 and a side wall of frame body 15.
An air pathway chamber 18 is defined in frame 17 of frame body 11. Blower 16 sucks the air of the room through sucking grille 14, filter 13, and air inlets 19 and 20 of front cover 12, and discharges through air outlet 21 the air which passes through heat exchanger 15 and flows into air pathway chamber 18.
In indoor unit 10 of the air conditioner of Fag ots General according to the Korean Patent laid-open publication, heat exchanger 15, which is bent twice to have the upside down V shape at the upper portion thereof, is arranged in air pathway chamber 18 connecting air inlets 19 and 20 and air outlet 21 of front cover 12 to each other, and blower 16 is arranged between the fin assembly of heat exchanger 15 and the side wall of frame body 11, thereby reducing the height of indoor unit 10 of air conditioner.
However, there are problems in that since heat exchanger 15 mounted in indoor unit 10 of air conditioner of Fag ots General must be bent twice, it is difficult to make heat exchanger 15, and since heat exchanger 15 is bent in the upside down V shape at the upper portion, the bending portion at the upper portion of heat exchanger 15 is easily damaged by a small outer impact.
SUMMARY OF THE INVENTION
The present invention has been made to overcome the above described problems of the prior art. It is an object of the present invention to provide a heat exchanger of an indoor unit of an air conditioner which can be made easily and in which an area of the heat exchanger can be enlarged so that it can be possible to improve a heat exchanging efficiency thereof.
To accomplish the above object of the present invention, there is provided a heat exchanger for an indoor unit of an air conditioner comprising:
a first fin assembly which is bent at a position adjacent to a lower end, for absorbing heat from air of a room;
a second fin assembly which is adjacent to an upper end of the first fin assembly and spaced apart from the first fin assembly by a predetermined distance, for absorbing heat from air of the room;
a first refrigerant pipe for supplying a circulation pathway for refrigerant, the first refrigerant pipe extending through a lower portion of the first fin assembly and connecting fin plates of the first fin assembly to each other;
a second refrigerant pipe for supplying a circulation pathway for refrigerant, the second refrigerant pipe extending through an upper portion of the first fin assembly and connecting fin plates of the first fin assembly to each other;
a third refrigerant pipe for supplying a circulation pathway for refrigerant, the third refrigerant pipe extending through the second fin assembly and connecting fin plates of the second fin assembly to each other;
a refrigerant supplying pipe for supplying the refrigerant to the first, the second, and the third refrigerant pipe, the refrigerant supplying pipe being connected at a first end to refrigerant inlets of the first, the second, and the third refrigerant pipes and being connected at a second end to an expansion valve;
a refrigerant discharging pipe for discharging the refrigerant from the first, the second, and the third refrigerant pipes to a compressor, the refrigerant discharging pipe being connected at a first end to refrigerant outlets of the first, the second, and the third refrigerant pipes and being connected at a second end to the compressor; and
a connecting means for connecting the first fin assembly and the second assembly with each other, the connecting means being secured to both sides of the first fin assembly and the second fin assembly.
The connecting means is a steel plate having a thickness of 1 mm and a width equal to that of the fin plates of the first fin assembly and the second fin assembly.
A lower portion of the connecting means is bent at a position corresponding to a bending position of the first fin assembly, and an upper portion of the connecting means is bent at an acute angle to form an upside down V shape.
The connecting means includes a plurality of extensions expanding vertically to a surface of the connecting means from a first edge thereof and having a thruhole formed at a center portion of each extension, and the extensions are secured to the first fin assembly.
The connecting means also includes a fixing plate attached at a predetermined position on a second edge and having a thruhole formed at a center portion thereof, the fixing plate is secured by a fixing member to a body of the indoor unit so that the first fin assembly and the second fin assembly are secured to the body of the indoor unit.
The connecting means has a plurality of thruholes equal in number to a number of thruholes formed in each fin plate of the first fin assembly and the second fin assembly, and a center axis of each thruhole is coincident with a center axis of each thruhole formed in each fin plate.
The first fin assembly and the second fin assembly are comprised of a plurality of fin plates which respectively have a thickness of 0.12 mm and a width of 25 mm, and have two row of the thruholes formed in a zigzag manner, and have a cylindrical guide portion protruding at edge of each thruhole, and the guide portion guides the first, the second, and the third refrigerant pipes.
The first fin assembly and the second fin assembly are made separately, and the first fin assembly is higher in height than the second assembly.
As described above, in the heat exchanger of the indoor unit of the air conditioner according to the present invention, there is an advantage in that the first fin assembly and the second fin assembly are separately made and are connected by the connecting means to each other so that it is easy to make the heat exchanger and a length of a manufacturing process thereof is reduced with respect to a bending process according to the conventional art.
Furthermore, there is an advantage in that since a heat exchanging area of the heat exchanger is enlarged and an efficiency of the heat exchanger is increased, a total refrigerating efficiency of the air conditioner can be improved.
BRIEF DESCRIPTION OF THE DRAWINGS
The above object and other advantages of the present invention will become more apparent by describing in detail the preferred embodiment thereof with reference to the attached drawings, in which:
FIG. 1 is an exploded perspective view of an indoor unit of an air conditioner in which a heat exchanger according to an embodiment of a conventional art is mounted;
FIG. 2 is a cross-sectional view of the indoor unit of the air conditioner in which the heat exchanger according to the embodiment of the conventional art is mounted;
FIG. 3 is an exploded perspective view of an indoor unit of an air conditioner in which an heat exchanger according to an embodiment of a present invention is mounted;
FIG. 4 is a front view of the heat exchanger according to the present invention;
FIG. 5 is a side view of the heat exchanger according to the present invention; and
FIG. 6A and FIG. 6B show one of connecting members which connect a first fin assembly and a second fin assembly of the heat exchanger according to the embodiment of the present invention with each other, wherein FIG. 6A is a plan view of a connecting member and FIG. 6B is a side view of the connecting member.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Hereinafter, a preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings.
FIG. 3 is an exploded perspective view of an indoor unit of an air conditioner in which a heat exchanger according to the embodiment of the present invention is mounted. Referring to FIG. 3, the indoor unit of the air conditioner according to the present invention includes a mounting plate 110 which is used for mounting the indoor unit 100 to a wall, a frame body 120 mounted on and secured to the mounting plate 110, a heat exchanger 130 which is disposed at an air pathway chamber 122 of frame body 120, for absorbing a heat from air in a room, a blower 140 which is disposed between a first fin assembly 132 of heat exchanger 130 and a wall portion of frame body 120, for sucking the air of the room into frame body 120 and for discharging the air passing through heat exchanger 130 and air pathway chamber 122, an electric motor 150 whose shaft is connected to a shaft of blower 140, for rotating blower 140, and a grille frame 160 which is connected to frame body 120, for comprising air inlets 162 and 164 for sucking the air, an air outlet (not shown) for discharging the air, and a filter assembly 166 and a grille 168 for filtering dust from the air in the room.
The mounting plate 110 is used for mounting indoor unit 120 of the air conditioner to the wall of the room. A plurality of stud bolts are installed in the wall of the room. A plurality of thruholes are perforated in an upper portion and a lower portion of mounting plate 110. Furthermore, at least two latches are formed at an upper edge of mounting plate 110. The latches are spaced apart from each other by a predetermined distance and extend upward after the latches are extended from the upper edge of mounting plate 110 and are bent. After stud bolts are inserted into the thruholes of mounting plate 110 to extend through the thruholes, the nuts are engaged with the stud bolts so that mounting plate 110 is attached to the wall in the room. And then, the latches of mounting plate 110 are inserted into grooves formed at a rear surface of the wall portion of frame body 120 in indoor unit 100 so that indoor unit 100 can be mounted at the wall in the room.
The air pathway chamber 122 is defined at the center portion of frame body 120 of indoor unit 100 by the wall portion of frame body 120 and grille frame 160. Partitions are formed at positions adjacent to both sides of frame body 120, respectively. A semi-circular groove is formed in the center portion of each partition, and a bearing is disposed in the semi-circular groove. A receiving chamber 124 is formed at a side portion of frame body 120 to receive electric motor 150 rotating blower 140. Bearings are mounted on the opposite ends of the shaft of blower 140, respectively, and the rotating shaft of electric motor 150 is mounted on an end of the shaft of blower 140. After blower 140 is disposed at air pathway chamber 122 so that the bearings respectively mounted on the opposite ends of blower 140 are disposed in each groove formed in partitions 126 and 128 and electric motor 150 is disposed in electric motor receiving chamber 124, bearing holders 127 and 129 are engaged with partitions 126 and 128 to secure the bearings, and electric motor holder 152 is engaged with electric motor receiving chamber 124 to secure electric motor 150. A control box 170 is disposed at a front of electric motor 150 mounted on frame body 120.
Blower 140 sucks the air of the room through air inlets 162 and 164 of grille frame 160 into frame body 120, and discharges the air cooled by heat exchanger 130 through the air outlet formed at the lower portion of grille frame 160. Heat exchanger 130 is disposed over blower 140 in such a manner that blower 140 is enclosed together with first fin assembly 132, a second fin assembly 134, and the wall portion of frame body 120.
Grille frame 160 includes air inlets 162 and 164 at the upper portion and a front surface thereof, respectively. Furthermore, grille 168 is disposed at the front of grille frame 160. A filter assembly 166 is disposed between grille frame 160 and grille 168. Filter assembly 166 filters dust and alien substances from the air which is sucked through air inlets 162 and 164 formed respectively at the upper portion and grille 168 of grille frame 160 in indoor unit 100 of the air conditioner. A control panel of control box 170 is disposed at a position of the front surface of grille frame 160 and controls indoor unit 100.
FIG. 4 is a front view of heat exchanger 130 according to the embodiment of the present invention, and FIG. 5 is a side view of heat exchanger 130 of according to the embodiment of the present invention. Referring to FIGS. 4 and 5, heat exchanger 130 of indoor unit 100 of the air conditioner comprises first fin assembly 132 which is bent at a position adjacent to a lower end, for absorbing the heat from the air of the room, second fin assembly 134 which is adjacent to an upper end of first fin assembly 132 and spaced apart from first fin assembly 132 by a predetermined distance, for absorbing the heat from the air of the room, a first refrigerant pipe 135 which extends through a lower portion of first fin assembly 132 and connects fin plates of first fin assembly 132 to each other, for supplying a circulation pathway for refrigerant, a second refrigerant pipe 136 which extends through an upper portion of first fin assembly 132 and connects fin plates of first fin assembly 132 to each other, for supplying a circulation pathway for refrigerant, a third refrigerant pipe 137 which extends through second fin assembly 134 and connects fin plates of second fin assembly 134 to each other, for supplying a circulation pathway for refrigerant, a refrigerant supplying pipe 138 which is connected at a first end to refrigerant inlets of first, second, and third refrigerant pipes 135, 136, and 137, and is connected at a second end to an expansion valve, for supplying the refrigerant to first, second, and third refrigerant pipes 135, 136, and 137, a refrigerant discharging pipe 139 which is connected at a first end to refrigerant outlets of first, second, and third refrigerant pipes 135, 136, and 137, and is connected at a second end to the compressor, for discharging the refrigerant from first, second, and third refrigerant pipes 135, 136, and 137 to a compressor, and connecting members 180 and 182 which are secured at each side of first fin assembly 132 and second fin assembly 134, for connecting first fin assembly 132 and second fin assembly 134 with each other.
First fin assembly 132 and second fin assembly 134 are comprised of a plurality of fin plates, in which each fin plate is made of aluminum having a thickness of about 0.12 mm and a width of about 25 mm and has two row of thruholes formed therein in a zigzag. A cylindrical guide portion 234 extends from an edge of each thruhole to guide the refrigerant pipes, for example pipes made of copper. A plurality of fins being lower in height than the guide portions 234 are attached to the surface of each fin plate having the guide portions 234 formed thereon. When the air of the room which is sucked by blower 140 passes through heat exchanger 130, the air flows between fins attached to the fin plates. The fins attached to fin plates absorb the heat from the air and transmit the heat to the refrigerants flowing through first, second, and third refrigerant pipes 135, 136, and 137. Accordingly, the air which is sucked in air pathway chamber 122 is cooled and the refrigerants which flow through first, second, and third refrigerant pipes 135, 136, and 137 are evaporated.
First fin assembly 132 and second fin assembly 134 are separately made, and first fin assembly 132 is higher in height than second fin assembly 134. The fin plates which form first fin assembly 132 have a cut off portion where a width of about 3/5 is transversely cut at a position spaced apart from the lower end of the fin plates by a predetermined distance. In order to allow first fin assembly 132 to assemble with second fin assembly 134, the upper portion of first fin assembly 132 is bent at the cut off portion.
First, second, and third refrigerant pipes 135, 136, and 137 are made by connecting a plurality of first pipes and second pipes, which are copper pipes having a good heat transmission and bent in a U-shape. In a state that the first and second pipes are bent in the U-shape, a total length of the first pipes is larger than the width of first fin assembly 132 and second fin assembly 134. The second pipes are used for connecting the first pipes to each other.
Referring to FIGS. 6A and 6B, connecting member 180 is made of a steel plate having a thickness of about 1 mm and having a width equal to that of the fin plates of first fin assembly 132 and second fin assembly 134. The lower portion of connecting member 180 is bent at the same angle as the bending angle of first fin assembly 132 at the same position as the bent position of first fin assembly 132, and the upper portion of connecting member 180 is bent at an acute angle to form an upside-down V-shape. Connecting member 180 has a plurality of extending portions 183 extending vertically to a surface of connecting member 180 from the first edge thereof and having a thruhole formed at the center portion. The plurality of extending portions 183 are secured to first fin assembly 132 so that connecting member 180 connects first fin assembly 132 and second fin assembly 134 to each other.
Furthermore, connecting member 180 has a fixing plate 184 attached to a second edge thereof and having a thruhole formed at the center portion thereof. The fixing plate is connected by a fixing member to frame body 120 of indoor unit 100 so that first fin assembly 132 and second fin assembly 134 are connected to frame body 120 of indoor unit 100. Connecting member 182 is in the shape of a mirror image of connecting member 180.
Refrigerant supplying pipe 138 is connected to an expansion valve at one end thereof, and is connected to refrigerant inlets of first, second, and third refrigerant pipes 135, 136, and 137 at a position adjacent to the other end thereof. Refrigerant discharging pipe 139 is connected to the compressor at one end thereof, and is connected to refrigerant outlets of first, second, and third refrigerant pipes 135, 136, and 137 at the other end thereof.
In order to assemble first fin assembly 132 and second fin assembly 134 forming heat exchanger 130, bending portions of the U shaped first pipes are disposed at a side. One of connecting members 180 and 182 is inserted from both ends of the first pipes toward the bending portions of the U shaped first pipes so as to connect the first pipes. The fin plates of first and second fin assemblies 132 and 134, respectively, are arranged in one direction and the both ends of first pipes are inserted into the plurality of the fin plates of first and second fin assemblies 132 and 134, respectively. The both ends of the first pipes are inserted in the other connecting member. And then, openings of both ends of the U shaped-first pipes are enlarged. Finally, each one end of the second pipes is inserted into each opening of one end of the first pipes and each other end of the second pipes is inserted into each opening of the other end of the first pipes so as to connect the first pipes and the second pipes by means of welding.
Hereinafter, the operation of each of the elements of the indoor unit of the air conditioner according to the embodiment of the present invention will be described.
In indoor unit 100 of the air conditioner including heat exchanger according to the present invention, in a state that the refrigerant, which is cooled and liquefied by the compressor of an outdoor unit, decreases in pressure and is atomized, the refrigerant flows into one end of refrigerant supplying pipe 138 connected to the expansion valve and flows along refrigerant supplying pipe 138. The refrigerant reaches the other end of refrigerant supplying pipe 138 and flows into first, second, and third refrigerant pipes 135, 136, and 137 through inlets thereof. The refrigerant flows along first, second, and third refrigerant pipes 135, 136, and 137. The air of the room which is sucked into indoor unit 100 flows between fin plates of first fin assembly 132 and second fin assembly 134 of heat exchanger 130. At this time, first fin assembly 132 and second fin assembly 134 of heat exchanger 130 absorb the heat from the air of the room flowing between the fin plates thereof and transmits the heat to the refrigerant flowing along first, second, and third refrigerant pipes 135, 136, and 137, which extend through first fin assembly 132 and second fin assembly 134. Thus, the refrigerant is evaporated and flows through outlets of first, second, and third refrigerant pipes 135, 136, and 137 toward refrigerant discharging pipe 139. The evaporated refrigerant flows into the compressor of the outdoor unit and is compressed adiabatically. Then the compressor discharges the heat from the refrigerant so that the refrigerant is cooled again. The cycles as described above are repeated and the temperature of the room decreases, thereby achieving the cooling of the room.
As described above, in the heat exchanger of the indoor unit of the air conditioner according to the present invention, there is an advantage in that the first fin assembly and the second fin assembly are separately made and are connected by the connecting means to each other so that it is easy to make the heat exchanger and a length of the manufacturing process thereof can be reduced with respect to a bending process according to the conventional art.
Furthermore, there is an other advantage in that since a heat exchanging area of the heat exchanger is enlarged and an efficiency of the heat exchanger is increased, a total refrigerating efficiency of the air conditioner can be improved.
While the present invention has been particularly shown and described with reference to a particular embodiment thereof, it will be understood by those skilled in the art that various changes in form and detail may be effected therein without departing from the spirit and scope of the invention as defined by the appended claims.
What is claimed is:
1. A heat exchanger for an indoor unit of an air conditioner comprising:a first fin assembly which is bent at a position adjacent to a lower end thereof, for absorbing heat from air of a room; a second fin assembly which is adjacent to an upper end of the first fin assembly and spaced apart from the first fin assembly by a predetermined distance, for absorbing heat from air of the room; a first refrigerant pipe for supplying a circulation pathway for refrigerant, the first refrigerant pipe extending through a lower portion of the first fin assembly and connecting fin plates of the first fin assembly with each other; a second refrigerant pipe for supplying a circulation pathway for refrigerant, the second refrigerant pipe extending through an upper portion of the first fin assembly and connecting fin plates of the first fin assembly with each other; a third refrigerant pipe for supplying a circulation pathway for refrigerant, the third refrigerant pipe extending through the second fin assembly and connecting fin plates of the second fin assembly with each other; a refrigerant supplying pipe for supplying the refrigerant to the first, the second, and the third refrigerant pipe, the refrigerant supplying pipe being connected at a first end to refrigerant inlets of the first, the second, and the third refrigerant pipes and being connected at a second end to an expansion valve; a refrigerant discharging pipe for discharging the refrigerant from the first, the second, and the third refrigerant pipes to a compressor, the refrigerant discharging pipe being connected at a first end to refrigerant outlets of the first, the second, and the third refrigerant pipes and being connected at a second end to the compressor; and a connecting means for connecting the first fin assembly and the second fin assembly with each other, the connecting means including a steel plate having a shape identical to shapes of the first and second fin assemblies, the connecting means having a thickness of 1 mm and being secured to both sides of the first fin assembly and the second fin assembly for connecting the first and second fin assemblies to each other, wherein a lower portion of the connecting means is bent at a position corresponding to a bending position of the first fin assembly and an upper portion of the connecting means is bent at an acute angle to form an upside down V shape, and the connecting means includes a plurality of extensions extending vertically to a surface of the connecting means from a first edge thereof and having a thruhole formed at a center portion thereof, the extension being secured to the first fin assembly.
2. A heat exchanger for an indoor unit of an air conditioner as claimed in claim 1, wherein the connecting means further comprises a fixing plate attached to a predetermined position of a second edge thereof, the fixing plate having a thruhole formed at a center portion thereof, the fixing plate being secured to a body of the indoor unit so that the first fin assembly and the second fin assembly are secured to the body of the indoor unit.
3. A heat exchanger for an indoor unit of an air conditioner as claimed in claim 1, wherein the connecting means has a plurality of thruholes equal in number to a number of thruholes formed in each fin plate of the first fin assembly and the second fin assembly, and wherein a center axis of each thruhole is coincident with a center axis of each thruhole formed in each fin plate.
4. A heat exchanger for an indoor unit of an air conditioner as claimed in claim 1, wherein the first fin assembly and the second fin assembly are comprised of a plurality of fin plates which respectively have a thickness of 0.12 mm and a width of 25 mm, have two row of the thruholes formed in a zigzag manner, and have a cylindrical guide portion protruding vertically to a surface thereof from an edge of each thruhole, the guide portion guiding the first, the second, and the third refrigerant pipes.
5. A heat exchanger for an indoor unit of an air conditioner as claimed in claim 4, wherein the first fin assembly and the second fin assembly are made separately, and the first fin assembly is higher in height than the second fin assembly.
|
<P> His act worsens the situation with the Lannisters' war effort as his uncle Jaime is captured by the Starks and his uncles Renly and Stannis have challenged his claim to the Iron Throne . He frequently orders his Kingsguard to beat Sansa . His cruelty and ignorance of the commoners' suffering makes him unpopular after he orders the City Watch to kill all of his father's bastard children in King's Landing which would later lead to a riot where he is almost killed . When Stannis attacks King's Landing, Joffrey serves only as a figurehead and avoids the heavy fighting . When the battle eventually turns in Stannis' favor, Cersei calls her son into the safety of the castle, damaging the morale of his army . The battle is only won by his uncle Tyrion and his grandfather Tywin, aided by the forces of House Tyrell . To cement the alliance between their families, Joffrey's engagement to Sansa is annulled so he can marry Margaery Tyrell . </P> <P> The marriage is yet to take place, and rifts are growing between Joffrey and his uncle and grandfather, who are (in their respective ways) rebutting his cruelty . He also seems to take little interest in his bride, but is amazed and altered by her ways of winning the people's favor, in which he takes part . At Tyrion and Sansa's wedding, he humiliates his uncle and is outraged when his uncle threatens him after he commands him to consummate their marriage . Tyrion only avoids punishment when his father Tywin assures Joffrey that his uncle was drunk and had no intention of threatening the king . Later after the events of the "Red Wedding", Joffrey gleefully plans on serving Sansa her recently deceased brother's head, when Tyrion and Tywin are outraged . Tyrion threatens Joffrey once again, and later Joffrey turns on Tywin, who responds by commanding Joffrey to be sent to his room, much to Joffrey's chagrin . </P> <P> Joffrey finally marries Margaery . During his wedding feast in the gardens of the Red Keep, he presents an extremely offensive play of "The War of the Five Kings," with each of the kings played by dwarves, to humiliate his uncle . He also repeatedly torments Tyrion and Sansa, forcing the former to be his cupbearer . At the height of festivities Joffrey is suddenly overcome by poison, and he dies . His uncle Tyrion is accused and arrested . It is confirmed, however, he was poisoned by Olenna Tyrell, with assistance from Petyr Baelish and Dontos Hollard, as she wanted to protect Margaery from the physical and emotional abuse that Joffrey had very clearly inflicted on Sansa . Olenna later confides to Margaery that she would never have let her marry "that monster". Following Joffrey's funeral, his younger brother and heir, Tommen, is crowned King and proceeds to marry Joffrey's widow Margaery . </P> <P> Jack Gleeson has received positive reviews for his role as Joffrey Baratheon in the television series . In 2016, Rolling Stone ranked the character #4 in their list of the "40 Greatest TV Villains of All Time". Author Martin described Joffrey as similar to "five or six people that I went to school with...a classic bully...incredibly spoiled". </P>
Who killed king joffrey in game of thrones
|
/**
*
* Copyright (c) 2017 Fractus IT d.o.o. <http://fractus.io>
*
*/
package io.fractus.springframework.tutorial.dependency.injection.injectcollections;
import java.util.List;
import java.util.Map;
import java.util.Properties;
import java.util.Set;
public class InjectCollections {
private Map<?, ?> map;
private Properties props;
private Set<?> set;
private List<?> list;
public List<?> getList() {
return list;
}
public void setList(List<?> list) {
this.list = list;
}
public Map<?, ?> getMap() {
return map;
}
public void setMap(Map<?, ?> map) {
this.map = map;
}
public Properties getProps() {
return props;
}
public void setProps(Properties props) {
this.props = props;
}
public Set<?> getSet() {
return set;
}
public void setSet(Set<?> set) {
this.set = set;
}
}
|
Libre knowledge/FAQs
* Why not just say free knowledge?
* Why not "open knowledge"?
* Is it okay to sell libre knowledge resources?
|
# Radio host catching heat for comparing 'ok, boomer' to n-word
Published at: **2019-11-06T00:34:52+00:00**
Author: ****
Original: [ABC7 Los Angeles](https://abc7.com/society/radio-host-catching-heat-for-comparing-ok-boomer-to-n-word/5674529/)
ROCHESTER, NY -- A radio host in Rochester is being schooled by the Internet for comparing the "n-word" to the phrase "OK, Boomer."The phrase is getting more use by younger people as a way to criticize the older generation anytime they seem out-of-touch.In a since-deleted tweet, 60-year-old radio host Bob Lonsberry said Monday, "Boomer' is the n-word of ageism."Among the thousands of replies, "Jeopardy!" legend Ken Jennings tweeted, "Don't worry, I'm Mormon like this guy so it's okay: I can call him a boomer with the hard 'R'."Dictionary.com also chimed in saying in part, "Boomer is an informal noun referring to a person born during a baby boom. The n-word is one of the most offensive words in the English language."
|
from flask import Flask, render_template, url_for
app = Flask(__name__)
## Dummy data to show on home page
oldBlogs =[
{'author': 'Author self',
'date' : '27 Dec 2018',
'Topic' : 'Introduction',
'Text' : 'Introduction to oneself is a great medium to self discovery.'
},
{'author': 'Author followed 1',
'date' : '27 Dec 2018',
'Topic' : 'Daily',
'Text' : 'Wake up, dress up and show up !'
},
{'author': 'Author followed 2',
'date' : '27 Dec 2018',
'Topic' : 'Goals',
'Text' : 'Efforts without a goal is similar to wandering aimlessly. You walk a lot but don\'t go anywhere.'
}
]
@app.route('/')
@app.route('/home')
def home():
return render_template("home.html",blogStream=oldBlogs, iTitle='UBlog.com')
@app.route('/about')
def about():
return render_template("about.html", blogCount=len(oldBlogs))
if __name__ == "__main__":
app.run(debug=True)
|
Book suggestions
Is there a place on the Workplace.SE where we can get book suggestions? I am thinking of an example question at StackOverflow here in the C++ tag, which has a nice long list of good introductory/medium/advanced books; the "question" is locked (to indicate that this isn't a good question on the site normally; but does serve a purpose) and pinned to the top of the frequent tab so that newcomers can easily be directed to the appropriate place if necessary.
Would it be beneficial to do something similar on some of the Workplace.SE tags? E.g., have a locked question that contains a list of good books on workplace politics pinned to the frequent questions list on the [politics] tag?
Hmm, this is an interesting question..
@Mods: would the question suggestion violate any SE Prime Directives? I can't imagine the network encouraging the use of locked questions to bypass rules on off-topic/subjective questions.
I like the idea of more useful tag wikis, but does anyone even really use them? You first need to click on the actual tag (instead of tagging your post with one) and then need to click on the "learn more" to actually reach the full wiki page.
@Lilienthal: Isn't that what historical locks are? Locks used on questions that are off-topic/subjective/some-other-close-reason but that mods wish to keep around? Granted, this wouldn't be a "historical" lock, but I think the principle is the same.
@R_Kapp Not quite.
If it's tag-specific, the tag wiki is a good place to put this information. Historical locks are sometimes applied to questions that turned out not to be good questions; I'm not aware off-hand of a site that set out to create an off-topic locked post from the start.
Possible duplicate of Do we have a procedure for recommending good sources, or a place where we can store the links to these references?
I agree with Lilienthal.
Tag wikis are a good way to include resources about the particular tag. Asking about books and resources in the main site defeats the purpose of SE, and would result in an epic fail of the primarily opinion based reason of closure.
Even if the questions are locked, it doesn't cover up the fact that the answers are opinion based.
Even if the question is framed like one of these, it is still off-topic:
Books on _______? <-- Reason for closure: Too broad
Good books on _______? <-- Reason for closure: Opinion based
Here's an example from Stack Overflow of a comprehensive and (it appears) oft-cited tag wiki: http://stackoverflow.com/tags/java/info.
@MonicaCellio Yeah, when the wikis can be crafted so nicely, there is no reason why questions need to ask for good books or good resources. They definitely need to be closed
|
Requests for comment/Meta-wiki suffrage in regards to local elections
The following request for comments is closed. Please discuss on the talkpage, not on this page.
Rationale for request edit
This RFC concerns Meta-specific requests and elections, which include:
1. Requests for adminship on Meta, held at WM:RFA
2. Requests for bureaucratship on Meta (same)
3. Requests for other rights on Meta (same)
4. Admin confirmations on Meta, held at Meta:Administrators/confirm
5. Meta Arbcom elections, in the event one is formed
but do not include:
1. Board of Trustees elections
2. Steward elections
3. Other universal or Foundation-requested elections, except as directed otherwise.
Concerns edit
1. While administrators on Meta do not have direct administrative abilities on other wikis, there is some limited influence on the content of other projects.
2. There should be opportunities for Wikimedia Foundation sponsored projects to voice concerns regarding Meta administrators.
3. Canvassing for votes on other projects to influence Meta elections is discouraged. Commentary is welcome even if the user has no suffrage.
4. Users should have some experience with Meta and its processes instead of being able to "show up and vote", otherwise we encourage voting over discussion.
5. Non-Wikimedia Foundation wikis may be influenced in the same manner, but do so voluntarily.
6. There is ambiguity regarding if other local user rights (bureaucrat, checkuser, oversight) are influenced by confirmation, or if they require separate confirmation for those rights.
Current standards edit
The current suffrage, per local policy, is "All editors with an account on Meta, at least one active account on any Wikimedia project, and a link between the two, may participate in any request and give his/her opinion of the candidate. However, more active Meta editors' opinions may be given additional weight in controversial cases."*
Proposals edit
Please ensure that proposals are discussed and there is consensus (or at least minimal agreement) to list or delist proposals in this section. When delisting proposals, please strike them out, do not remove them from the page.
• The current standard for suffrage, as listed above. While not ideal, it's a starting point.
• A. B.'s suggestion:
1. Any editor in good standing on a Wikimedia project may comment in a meta RfA
2. To have their comments counted in the required support totals, participants must have at least 50 useful, non-trivial edits on meta and must have had an active account here for at least 3 months.
3. Canvassing here or elsewhere is forbidden. Bureaucrats have wide latitude to disregard comments from participants that may have been drawn here as a result of canvassing. As a start, I suggest looking to the en.wikipedia guideline, en:Wikipedia:Canvassing, for guidance on what is and isn't canvassing. (Note: I do not mean to imply en.wikipedia should call the shots here -- it's just a usefull document I'm familiar with).
4. The same standards apply to admin reconfirmation.
5. Except in the case of RfA irregularities, bureaucrats have some (but only limited) latitude in interpreting community consensus.
• Use the current suffrage for steward elections (Note that there is a proposal on the table to change steward to the same requirements as board, so this means using the 2007 standards: users must have a valid account on Meta with a link to at least one account on a project where the user has participated at least three months.)
• Use the current suffrage for Board elections (To be eligible to vote, a user must have been a contributor to at least one Wikimedia project for three months prior to June 1, 2007 (that is, by March 1, 2007), as indicated by the date of the user's first edit, and must have completed at least 400 edits with the same account by June 1, 2007 ... these dates get adjusted to match the election start date)
See also edit
|
import { DOCUMENT } from '@angular/common';
import { ModuleWithProviders, NgModule } from '@angular/core';
import { CookieWriterService } from './cookie-writer.service';
import { CookieOptions } from './cookie.model';
import { CookieOptionsProvider } from './cookie-options.provider';
import { cookieServiceFactory } from './cookie.factory';
import { CookieService } from './cookie.service';
import { COOKIE_OPTIONS, COOKIE_WRITER } from './tokens';
@NgModule({
providers: [CookieOptionsProvider]
})
export class CookieModule {
/**
* Use this method in your root module to provide the CookieService
*/
static withOptions(options: CookieOptions = {}): ModuleWithProviders<CookieModule> {
return {
ngModule: CookieModule,
providers: [
{provide: COOKIE_OPTIONS, useValue: options},
{provide: COOKIE_WRITER, useClass: CookieWriterService},
{provide: CookieService, useFactory: cookieServiceFactory, deps: [DOCUMENT, CookieOptionsProvider, COOKIE_WRITER]}
]
};
}
/**
* @deprecated use `CookieModule.withOptions()` instead
* Use this method in your root module to provide the CookieService
*/
static forRoot(options: CookieOptions = {}): ModuleWithProviders<CookieModule> {
return this.withOptions(options);
}
/**
* @deprecated use `CookieModule.withOptions()` instead
* Use this method in your other (non root) modules to import the directive/pipe
*/
static forChild(options: CookieOptions = {}): ModuleWithProviders<CookieModule> {
return this.withOptions(options);
}
}
|
Control valve for an engine cooling circuit
ABSTRACT
A control valve ( 10 ) for a fluid circulation circuit comprises a body ( 12 ) which is equipped with a fluid inlet ( 18 ) and at least two fluid outlets ( 20, 22 and 24 ) and which delimits a cylindrical housing for an adjusting member ( 26 ) able to rotate about an axis of rotation (XX) and to adopt various angular positions in order to control the distribution of fluid through the outlets. The body ( 12 ) comprises an end wall ( 14 ) into which the fluid inlet ( 18 ) opens and a cylindrical side wall ( 16 ) into which the fluid outlets open at axial heights and at angular positions that are chosen with respect to the axis of rotation (XX). The rotary member ( 26 ) comprises a truncated end ( 38 ) facing toward the end wall ( 14 ), this making it possible to have control over the fluid outlets using a law defined as a function of the angular position of the rotary member in the valve body.
The invention relates to a control valve for a fluid circulation circuit, and to a circuit equipped with such a valve.
It is aimed more specifically at providing a control valve intended for a motor vehicle engine cooling circuit.
Such a cooling circuit has, running through it, a coolant, usually water, to which an antifreeze is added, which flows in a closed circuit under the action of a circulation pump.
In general, such a cooling circuit comprises several branches, including a branch that contains a cooling radiator, a branch which constitutes a bypass of the cooling radiator and a branch which contains a radiator, also known as a “unit heater”, that serves to heat the cabin.
It is known practice to employ a thermostatic valve which comprises a fluid inlet connected to the outlet of the engine and two fluid outlets which correspond respectively to the branch containing the cooling radiator and to the branch forming the bypass.
When the engine is started from cold, and as long as the temperature of the coolant has not reached a certain threshold level, the valve causes the coolant to circulate through the bypass branch, short circuiting the cooling radiator. As soon as the temperature of the coolant reaches and exceeds the aforementioned threshold level, the coolant passes through the cooling radiator and avoids the bypass branch.
In general, the coolant circulates constantly through the branch containing the heating radiator, the heating of the cabin then being obtained by mixing a stream of cold air and a stream of hot air which has swept across the heating radiator. It is also known practice to provide a separate valve on the heating radiator in order to adjust the flow rate of coolant passing through it.
In existing embodiments, use is made of control valves which allow independent control over the flow rate of coolant through the various branches of the cooling circuit of an engine, so as to optimize the engine temperature and the heating of the cabin. However, the control valves do not provide the valve-control system or the engine computer with information about the state of the cooling circuit and are unable to diagnose faults or breakdowns in the cooling circuit.
It is also known practice to apply sensors external to the valve in order to monitor the operation of the heat transfer fluid. However, installing such sensors is expensive, not very reliable, and also requires recourse to be made to several connectors in order to transmit the measured values to the computer of the vehicle and to the valve control system.
The valves in current cooling circuits are therefore not equipped to detect any malfunctioning and, if appropriate, to provide a diagnosis thereof, so that operation of the valves can be altered.
The invention aims to improve the situation.
To this end, it proposes a control valve comprising built-in sensors and intended for a fluid circulation circuit which, in a preferred embodiment of the invention, constitutes a motor vehicle engine cooling circuit and is equipped with built-in sensors to slave the position of the control valve according to at least one parameter characteristic of the state of the cooling circuit and measured by the sensors, and to diagnose any malfunctioning of the cooling circuit.
In this particular application, the invention is aimed at affording a valve which allows independent control of the flow rate of cooling fluid through the various branches of the engine cooling circuit, so as to optimize the engine temperature and the heating of the cabin.
The invention is thus more particularly aimed at a control valve for a fluid circulation circuit, comprising a body which is equipped with at least one fluid inlet and at least two fluid outlets, and which delimits a housing for an adjusting member able to rotate about an axis of rotation and to adopt various angular positions in order to control the distribution of fluid through the outlets.
According to one general definition of the invention, the body comprises an end wall into which the fluid inlet opens and a side wall into which the fluid outlets open, at axial heights and at angular positions that are chosen with respect to the axis of rotation, and the adjusting member comprises a shaped part for controlling the outlets of fluids with a law defined as a function of the angular position of the rotary member in the valve body.
In an advantageous embodiment, the body delimits a cylindrical housing for the adjusting member, the side wall is a cylindrical wall, and the shaped part is a truncated end facing toward the end wall.
It is thus possible to control the flow rate of fluid through the various outlets of the valve, and to do so as a function of the angular position given to the adjusting member of the valve.
In this way, it is possible to control the distribution of fluid in accordance with a predefined law.
Such a valve may thus equip a fluid circulation circuit, particularly a motor vehicle engine cooling circuit, to provide independent control over the flow rates of cooling fluid through the various branches of the circuit.
Advantageously, the truncated end comprises a generally flat face which, with the axis of rotation, forms a chosen angle of close to 45°.
In the valve of the invention, at least one of the fluid outlets may be a radial nozzle or alternatively a tangential nozzle.
In one particular application, the valve has three fluid outlets.
In one embodiment of the invention, the adjusting member is covered with a split ring made to rotate as one with it by a projecting lug that the adjusting member has.
In this case, the split ring is advantageously made of a material with a low coefficient of friction. Such a split ring advantageously has an outside diameter slightly greater than the inside diameter of the valve body prior to mounting and an inside diameter slightly greater than the diameter of the adjusting member after mounting.
It is advantageous for the split ring to cover a region of the adjusting member which is equipped with circular grooves. These grooves actually guarantee that the split ring is pressed firmly against the interior wall of the body, thus ensuring a good seal during operation.
As an alternative or as a supplement, the truncated end of the adjusting member may comprise a duct, having a chosen shape, advantageously the shape of an arc of a circle, making it possible to optimize the progressiveness of opening.
As an alternative or as a supplement, the adjusting member may be equipped with a sealing shoe, preferably mounted on a spring, making it possible to obtain sealing, particularly on the most critical branch of the circuit.
In another embodiment, the adjusting member comprises, at the opposite end to the truncated end, two roughly diametrically opposed cylindrical wall portions for controlling one of the fluid outlets. This is particularly suitable when this fluid outlet has a large cross section and avoids increasing the diameter of the valve body. This is beneficial when there is a desire to isolate a chosen branch of the circuit.
The control valve advantageously comprises drive means able to drive the adjusting member by means of a drive wheel forming part of a reduction gearbox for bringing it into chosen angular positions with respect to the valve body.
As a supplement, the valve comprises a microprocessor for operating the drive means.
According to another aspect of the invention, the adjusting member comprises at least one internal sensor for measuring values relating to the operation of the fluid circulation circuit.
In a first embodiment, the internal sensors are sensors that sense the presence of air in the circuit.
In a particular application, the adjusting member comprises a machined duct extending over the entire length of the adjusting member, to house the sensors.
Advantageously, a first end of the sensors passes through the lower end of the adjusting member facing toward the end wall, at a chosen point, so as to be in contact with the fluid.
In a second embodiment, the sensors are temperature sensors and the machined duct comprises a lower end made of brass, in contact with the fluid, in which to house the first end of the temperature sensors.
It is advantageous for the second end of the sensors to pass through the upper end of the valve toward the outside to transmit the values measured by the sensors.
As a supplement, the second end of the sensors is connected to information transmitting means for transmitting the values measured by the sensors to the microprocessor and/or to a computer.
In one embodiment, the information transmitting means comprise circular electrical-contact tracks.
In this embodiment, the information transmitting means may also comprise plugs connected to the circular tracks for transmitting the values originating from the sensors.
The circular tracks may be situated on a moving part of the valve whereas the plugs are situated on a fixed part of the valve.
As an alternative, the circular tracks may be situated on a fixed part of the valve whereas the plugs are situated on a moving part of the valve.
In particular, the moving part of the valve is the drive wheel of the drive means.
The control valve advantageously comprises a connector, connected to the information transmitting means of the valve to transmit the measured values to the microprocessor and/or to the computer.
According to another aspect, the invention relates to a fluid circulation circuit which comprises a control valve as defined hereinabove, the fluid inlet of which is connected to a fluid source and the fluid outlets of which are connected respectively to branches of the circuit.
In one preferred application, the circuit is produced in the form of a cooling circuit for cooling the engine of a motor vehicle, through which a coolant flows under the action of a circulation pump. In this application, the control valve is a three-way valve, the fluid inlet of which is connected to a coolant inlet originating from the engine, and the three fluid outlets of which are connected respectively to a first branch of the circuit which contains a cooling radiator, to a second branch of the circuit which constitutes a bypass of the cooling radiator, and to a third branch of the circuit which contains a unit heater for heating the cabin.
In the description which follows, given solely by way of example, reference is made to the attached drawings in which:
FIG. 1 is a perspective view of a control valve, of the three-way type, according to a first embodiment of the invention;
FIG. 2 is a view from above of the valve of FIG. 1;
FIGS. 3 and 4 are side views of the valve of FIGS. 1 and 2;
FIG. 5 is a view in section on V-V of FIG. 3;
FIGS. 6 to 8 are views in section on VI-VI, VII-VII and VIII-VIII of FIG. 4 respectively;
FIG. 9 is a perspective view of an adjusting member of a control valve, according to another embodiment of the invention, which is equipped with a duct;
FIGS. 10 and 11 are two side views of the rotary member of FIG. 9;
FIGS. 12 to 15 are views in section corresponding to FIGS. 5 to 8 respectively for a control valve equipped with a rotary member according to FIGS. 9 to 11;
FIG. 16 is a perspective view of an adjusting member equipped with a sealing shoe;
FIG. 17 is a side view of the adjusting member of FIG. 16;
FIG. 18 is a view in section on XVIII-XVIII of FIG. 17;
FIGS. 19 to 22 are various views in section, corresponding respectively to FIGS. 5 to 8, of a control valve equipped with an adjusting member according to FIGS. 16 to 18;
FIGS. 23 to 30 are various views, similar to FIGS. 1 to 9 respectively, of a control valve according to another embodiment;
FIG. 31 is a perspective view of an adjusting member equipped with a split ring;
FIG. 32 is a side view corresponding to FIG. 31;
FIG. 33 is a view in section on XXXIII-XXXIII of FIG. 32;
FIG. 34 shows, in each instance, three different sectional views of the valve for angular positions of the adjusting member, these being numbered from 1 to 21, which follow on from one another in 15-degree increments in the clockwise direction;
FIG. 35 depicts a motor vehicle engine cooling circuit equipped with a control or regulating valve according to the invention;
FIG. 36 is a perspective view of a control valve, of the three-way type, according to another embodiment of the invention;
FIG. 37 is a side view of the valve of FIG. 36;
FIGS. 38, 39 and 40 are views in radial section of the valve of FIGS. 36 and 37, passing respectively through the axes of the three outlet nozzles;
FIGS. 41, 42 and 43 are views in section on XLI-XLI, XLII-XLII and XLIII-XLIII of FIG. 37;
FIG. 44 is a side view of the adjusting member of the valve of FIGS. 36 to 43;
FIG. 45 is a perspective view of the adjusting member of FIG. 44;
FIGS. 46 and 47 are views similar to FIGS. 44 and 45 respectively, the adjusting member being equipped with a split ring;
FIG. 48 shows, in each instance, three different sectional views of the valve of FIGS. 36 to 43 for angular positions of the adjusting member, numbered from 1 to 36, which follow on from one another in ten-degree increments in the clockwise direction;
FIGS. 49 and 50 depict a control valve with built-in sensors; and
FIG. 51 depicts a drive wheel comprising circular electrical contact tracks.
Reference is made first of all to FIGS. 1 to 8 which show a control valve 10 according to a first embodiment of the invention. This control valve comprises a cylindrical body 12 limited by an end wall 14 and a cylindrical side wall 16 of axis XX. A fluid inlet nozzle 18 opens axially into the end wall 14. Three fluid outlet nozzles 20, 22 and 24 open into the cylindrical side wall 16. These three outlet nozzles open at axial heights and at angular positions that are chosen with respect to the axis of rotation XX. In the example, the nozzles 20, 22 and 24 open radially into the wall 16. The nozzles 20 and 24 are diametrically opposed, while the nozzle 22 makes an angle of 90 degrees with respect to the common axis of the nozzles 20 and 24. Furthermore, the nozzles 20, 22 and 24 have successively decreasing diameters.
Housed inside the valve body 12 is an adjusting member 26, also known as the rotary member, which is produced in the form of a solid cylindrical element which may be made of plastic. The diameter of the cylindrical element more or less corresponds to the inside diameter of the valve body. The adjusting member 26 is continued by a stem 28 directed along the axis XX. This stem 28 passes through a central opening possessed by a cover 30 of circular shape screwed onto a flange 32 of the valve body by four fixing screws 34 with the interposition of a seal (not depicted). The adjusting member 26 is able to be driven in rotation about the axis XX by drive means 36 depicted schematically in FIG. 1. The drive means may for example consist of a motor of the stepping type able to bring the adjusting member 26 into a multitude of different positions, either in successive increments or continuously.
According to one essential feature of the invention, the adjusting member 26 comprises a truncated end 38 which faces toward the end wall 14 (as can be seen best in FIG. 5). In the example, this truncated end is formed of a generally flat face 40 which, with the axis of rotation XX, makes a chosen angle which, in the example, is close to 45 degrees.
In that way, the adjusting member 26 allows control over the fluid outlets 20, 22 and 24, with a law defined as a function of the angular position of said member in the valve body.
In the position depicted in FIGS. 5 to 8, the fluid which arrives through the inlet nozzle 18 can escape only through the outlet nozzle 24, the other outlet nozzles 20 and 22 being closed.
By subsequently altering the angular position of the adjusting member it is possible to adjust the flow rate of fluid through the various outlet nozzles 20, 22 and 24, and to do so progressively.
The position of the adjusting member 26 is controlled by means of a position sensor 331 placed, for example, on the drive wheel 33 of the reduction gearbox 3 of the drive means 36 (FIG. 51). This sensor 331 may be a potentiometer with a circular contact track fixed directly to the drive wheel 33.
The adjusting member 26 depicted in FIGS. 9 to 11 is similar to that of the preceding embodiment except that the truncated end 38 has a duct 42 of chosen shape which, here, is more or less in the shape of an arc of a circle centered around the axis XX. This duct in the shape of an arc of a circle extends over roughly 90 degrees, as can be seen in FIGS. 12 to 15, which correspond to FIGS. 5 to 8 respectively of the preceding embodiment.
The presence of this duct makes it possible to achieve progressiveness in the opening of the valve over two ways of this valve, namely the outlet nozzles 22 and 24.
The position of the adjusting member 26 of FIGS. 12 to 15 corresponds to that of the adjusting member 26 of FIGS. 5 to 8. However, the presence of this duct means that a small fluid flow rate can escape through the outlet nozzle 22 even though this outlet nozzle is completely closed in the case of the preceding embodiment. By contrast, here again, the outlet nozzle 20 is closed by the adjusting member 26.
Reference is now made to FIGS. 16 to 18 which show an adjusting member 26 similar to that of the embodiment of FIGS. 1 to 8. The main difference lies in the fact that this member here is equipped with a sealing shoe 44 of cylindrical shape, housed in a housing 46 formed at the periphery of the rotary member and urged by a spring 48. This shoe provides sealing at the most critical part of the circuit. The presence of the spring provides compensation for the variations in expansion of the materials, because of the variations in temperature of the fluid passing through the valve.
In FIGS. 19 to 22 which can be likened respectively to FIGS. 5 to 8, the sealing shoe 44, in the positioned depicted, seals against the nozzle 20.
Reference is now made to FIGS. 23 to 30 which can be likened to FIGS. 1 to 8 respectively, the adjusting member 26 here being equipped with a shoe 44 as in the preceding embodiment. The main difference here lies in the fact that the nozzles 20 and 24 open tangentially into the valve body 12 whereas the nozzle 22 opens radially there into.
Reference is now made to FIGS. 31 to 33 which show an adjusting member similar to that of FIGS. 1 to 8. The adjusting member is covered by a split ring 50 which comprises a slot 52 for the passage of a lug 54 formed radially projecting from the adjusting member. The result is that this split ring is made to rotate as one with the adjusting member 26. The split ring 50 is made of a material with a low coefficient of friction, for example Teflon® (polytetrafluoroethylene), PPA or PPS, with or without a surface coating.
Furthermore, this split ring has an outside diameter slightly greater than the inside diameter of the valve body prior to mounting and an inside diameter slightly greater than the diameter of the adjusting member after mounting. That makes it possible to guarantee sealed contact of the ring with the body, and for this to be the case without leading to an excessively high torque.
Reference is now made to FIG. 34 which shows various successive positions of the adjusting member, these being numbered from 1 to 21, each one respectively depicted at the three outlet nozzles 20, 22 and 24. In the example, these positions are obtained by successive rotations through 15 degrees, in the clockwise direction, of the adjusting member inside the valve body. It may thus be seen that the various outlet nozzles can be opened or closed in accordance with a defined law, and that this can be done progressively.
These various positions are obtained by the drive means 36 which are operated by an appropriate control circuit.
Reference is now made to FIG. 35 which shows a circuit 60 for cooling the engine 62 of a motor vehicle. The circuit 60 has, passing through it, a coolant, typically water to which an antifreeze is added, which flows under the action of a pump 78. The fluid is heated by the engine, leaves the latter via an outlet 64 connected to the inlet nozzle 18 of a control valve 10 of the type described hereinabove. This valve comprises three outlet nozzles 20, 22 and 24 which are connected to three branches of the circuit. This circuit comprises a first branch 66 which contains a cooling radiator 68 and an expansion vessel 70, a branch 72 which forms a bypass bypassing the cooling radiator 68 and a branch 74 which contains a unit heater 76 used to heat the cabin of the vehicle. The nozzle 20 is connected to the branch 66 (radiator), the nozzle 22 to the branch 74 (unit heater) and the nozzle 24 to the branch 72 (bypass).
The valve thus makes it possible to have independent control over the flow rates of fluid in the aforementioned branches, so as to optimize the engine temperature and the heating of the cabin.
In particular, when the engine is being started from cold, it allows the fluid to be circulated through the bypass branch 72 without passing the radiator 68. During this start phase it is also possible to cause some or all of the fluid flow rate to pass into the unit heater 76, if heating is desired.
When the temperature of the fluid has reached or exceeded a given threshold value, the fluid passes through the radiator 68 and avoids the bypass 72. Furthermore, depending on whether or not heating is desired, some of the fluid may or may not pass through the unit heater 76.
The control valve in FIGS. 36 to 47 can be likened to those described before, the common elements being denoted by the same numerical references.
The outlet nozzles 20 and 22 together form an angle of close to 90°, while the outlet nozzle 24 extends between the nozzles 20 and 22. In addition, the outlet nozzle 24, which is the one closest to the cover 30, has a diameter greater than the diameter in the preceding embodiments. As a result, it would normally be necessary to increase the diameter of the valve body. To avoid that, the adjusting member 26 comprises, at the opposite end to the truncated end 38, two roughly diametrically opposed cylindrical wall portions 78 and 80 for controlling the outlet nozzle 24.
These two wall portions 78 and 80 extend the adjusting member 26 in the direction away from the truncated end 38 and are produced in the form of two thin webs of material extending some distance from the stem 28 of the adjusting member. It can be seen, particularly from FIGS. 39 to 41, how these two wall portions allow access to the outlet nozzle 24 to be closed or opened according to the angular position of the adjusting member.
In this embodiment, the adjusting member 26 comprises a peripheral region 82 which is equipped with circular grooves 84 (see FIGS. 44 and 45 in particular). As in the preceding embodiments, the adjusting member 26 takes a split ring 50. The latter covers both the peripheral region 82 and the two wall portions 78 and 80. The function of these circular grooves 84 is to press the split ring 50 firmly against the interior wall of the valve body under a pressure difference, making it possible to ensure good sealing during operation.
The valve of FIGS. 36 to 47 finds a particular use in a circuit of the type depicted in FIG. 35. In this case, the nozzle 20 is connected to the branch 66 (radiator), the nozzle 22 to the branch 74 (unit heater) and the nozzle 24 to the branch 72 (bypass).
Reference is now made to FIG. 48 which shows various successive positions of the adjusting member, numbered from 1 to 36, each one respectively at the three outlet nozzles 20, 22 and 24. In the example, these positions are obtained by successive rotations through 10 degrees in the clockwise direction of the adjusting member within the valve body. It can thus be seen that the various outlet nozzles can be opened or closed in accordance with a defined law, and that this can be done progressively.
With reference to FIGS. 49 and 50 it is possible to incorporate sensors into the control valve according to the invention. The control valve does actually allow sensors to be incorporated into the adjusting member 26 rotating about the axis XX. All kinds of sensors capable of measuring parameters relating to the engine cooling circuit and, for example:
- - a coolant temperature sensor, - a sensor sensing the temperature of an at-risk component on the valve actuator, - a pressure sensor sensing the pressure in the cooling circuit to anticipate any overheating of the engine and to trigger a degraded mode for the valve, the fan and the pump and then of the engine if necessary, - a sensor that senses the presence of air in the coolant, etc., may be sited in the adjusting member 26.
FIG. 49 illustrates the incorporation of sensors into an adjusting member with a truncated end 38. A temperature sensor sensing the temperature of coolant 5 and a sensor sensing the presence of air in the coolant 13 are incorporated into the adjusting member 26. These sensors are made up of two electrodes. A cylindrical duct 7 is machined in the adjusting member 26 to house the sensors 13 and 5.
The cylindrical duct 7 comprises a brass end 51 in contact with the coolant, regardless of the position of the adjusting member. The temperature sensor 5 is introduced into the cylindrical duct in such a way that its lower end is housed in the brass end. Thus, the temperature sensor may measure the temperature of the coolant even when the adjusting member is rotating about the axis XX.
There are various alternative forms of embodiment for incorporating the sensors. The adjusting member 26 is shaped to be able to house the sensors, taking account in particular of the nature of the sensor and of its shape. Incorporation of the sensors 5 and 13 is given by way of non limiting example. Other forms of incorporation are possible.
For example, the sensor sensing the presence of air in the coolant 13 comprises a first part introduced into the cylindrical duct while its lower end passes through the adjusting member 26 as far as its truncated end 28, on the outside of the cylindrical duct, to be in contact with the coolant.
In all the alternative forms of embodiment, the lower ends of the sensors pass through the lower end of the adjusting member 26 which faces toward the end wall 14. In this way, the sensor 13 can also be in contact with the coolant independently of the angular position of the adjusting member. It can then measure values relating to the presence of air in the coolant.
The values measured by the sensors are then transmitted to the outside of the valve for processing intended to monitor the cooling circuit and to diagnose any malfunctions that may occur.
Reference is now made to FIG. 50 which is a view from above of the valve depicted in FIG. 49. In this figure, the drive wheel 33 of the reduction gearbox 3 comprises circular tracks 17. The circular tracks are therefore also able to move. As an alternative, the circular tracks can be arranged on another moving part of the valve separate from the drive wheel, for example on a printed circuit mounted in parallel with the drive wheel.
Advantageously, the upper ends of the sensors are connected to these circular tracks by electrical contact to allow the relative movement of the adjusting member with respect to the valve body 12 and prevent the wires from twisting. This connection allows the sensors to transmit the measured values to the circular tracks.
The circular tracks are connected to plugs of the brush type 19, placed on a fixed part of the valve, for example on the printed circuit that accommodates the microprocessor 39 that operates the valve or on the protective casing 8 protecting the external components of the valve such as the reduction gearbox 3 or the drive wheel 33. These plugs transmit the information received from the circular tracks to a single connector 37. Given the grouping of the upper ends of the sensors, there is no longer actually any need to use numerous connectors for conveying the measured values to the microprocessor and/or to the computer.
The connector 37 then transmits the information relating to the values measured by the sensors to the microprocessor which operates the valve (power supply, control and diagnostics signal) and/or to the vehicle computer, supplying it with the data needed for engine mapping, such as the coolant temperature.
As an alternative, a decision may be made to locate the circular tracks 17 on one of the fixed parts of the valve and the plugs 19 on one of the moving parts of the valve.
Furthermore, the circular tracks may be replaced by other information transmitting means capable of transmitting data from the upper ends of the sensors to the connector, such as contactless sensors for example, particularly Hall-effect, optical or magneto-resistive sensors.
Incorporating the sensors inside the valve, according to the invention, allows the operation of the cooling circuit to be monitored and breakdowns to be diagnosed as and when they occur. In a degraded mode, it also allows the operation of the valve to be adjusted. The valve can thus by itself regulate the engine temperature and diagnose any breakdowns of actuators (fan, pump, valve, leak of fluid, etc.) at the computer before the engine overheats.
Incorporating the sensors into the control valve according to the invention guarantees better prevention and gives the engine better dependability. Furthermore, it makes it possible to reduce the number of parts and the cost of the function of regulating the cooling circuit.
Of course, the valve of the invention can be embodied in many alternative forms. It is not restricted to a three-way valve as in the embodiments described above. Nor is it limited to an application to a motor vehicle engine cooling circuit.
Likewise, it is possible to conceive of an embodiment in which the inlets and the outlets are reversed on the valve body. Indeed, within the meaning of the invention, the ideas of “fluid inlet” and “fluid outlet” are defined with respect to the position of the valve in the cooling circuit. In other embodiments, for example when the valve is placed on the inlet side of the engine (62) in the cooling circuit, the ideas of “fluid inlet” and “fluid outlet” are reversed and, in this case, the nozzle 18 is a fluid outlet and the nozzles 20, 22 and 24 are fluid inlet nozzles.
1. A control valve (10) for a fluid circulation circuit, comprising: a body (12) which is equipped with at least one fluid inlet (18) and at least two fluid outlets (20, 22, 24); and an adjusting member (38) within the body able to rotate inside the body about an axis (X-X) of rotation; wherein: the body comprises an end wall (14) into which the fluid inlet opens and a side wall (16) into which the fluid outlets (20, 22, 24) open, and wherein the adjusting member (38) comprises a shaped part; the body (12) is cylindrical in shape and houses the adjusting member; the side wall (16) is a cylindrical wall, and the shaped part (40) of the adjusting member (38) is a truncated end facing toward the end wall; and wherein the adjusting member comprises, at the opposite end to the truncated end, two roughly diametrically opposed cylindrical wall portions for controlling one of the fluid outlets.
2. The control valve as claimed in claim 1, wherein the truncated end comprises a generally flat face which, forms a chosen angle of close to 45° to an axis of rotation (X-X).
3. The control valve as claimed in claim 2, wherein at least one of the fluid outlets is a radial nozzle.
4. The control valve as claimed in claim 2, wherein at least one of the fluid outlets is a tangential nozzle.
5. The control valve as claimed in claim 2 which comprises three fluid outlets.
6. The control valve as claimed in claim 1, wherein at least one of the fluid outlets is a radial nozzle.
7. The control valve as claimed in claim 6, wherein the adjusting member is equipped with a sealing shoe.
8. The control valve as claimed in claim 1, wherein at least one of the fluid outlets is a tangential nozzle.
9. The control valve as claimed in claim 8, wherein the adjusting member is equipped with a sealing shoe.
10. The control valve as claimed in claim 1 which comprises three fluid outlets.
11. The control valve as claimed in claim 10, wherein the adjusting member is equipped with a sealing shoe.
12. The control valve as claimed in claim 1, wherein the adjusting member has a projecting lug and is covered with a split ring which rotates together with the adjacent member.
13. The control valve as claimed in claim 12, wherein the split ring is made of a material with a low coefficient of friction.
14. The control valve as claimed in claim 13, wherein the split ring has an outside diameter slightly greater than the inside diameter of the valve body prior to mounting and an inside diameter slightly greater than the diameter of the adjusting member after mounting.
15. The control valve as claimed in claim 12, wherein the adjusting member is equipped with circular grooves and the split ring covers a region of the adjusting member equipped with the circular grooves.
16. The control valve as claimed in claim 12, wherein the adjusting member is equipped with a sealing shoe.
17. The control valve as claimed in claim 1, wherein the truncated end of the adjusting member comprises a duct in the shape of an arc of a circle.
18. The control valve as claimed in claim 1, wherein the adjusting member is equipped with a sealing shoe.
19. The control valve as claimed in claim 18, wherein the sealing shoe is mounted on a spring.
20. The control valve as claimed in claim 1 comprising a drive means able to drive the adjusting member into chosen angular positions with respect to the valve body.
21. The control valve as claimed in claim 20, wherein the drive means is a reduction gearbox having a drive wheel.
22. The control valve as claimed in one of claim 21, wherein circular tracks are situated on a moving part of the valve and the moving part of the valve is the drive wheel of the drive means.
23. The control valve as claimed in claim 20, wherein the valve comprises a microprocessor and/or a computer for operating the drive means.
24. The control valve as claimed in claim 23 further comprising an information transmitting means for transmitting values measured by the sensor to a microprocessor and/or a computer and a connector connected to the information transmitting means wherein the sensor has a first and a second end, and the second end of the sensor passes the upper end of the valve and is connected to the information transmitting means.
25. The control valve as claimed in claim 1, wherein the adjusting member comprises at least one internal sensor for measuring values relating to the operation of the fluid circulation circuit.
26. The control valve as claimed in claim 1, wherein the side wall (16) is a cylindrical wall, and the shaped part (40) of the adjusting member is a truncated end facing toward the end wall.
27. The control valve as claimed in claim 26, wherein the internal sensor is a sensor that senses the presence of air in the circuit.
28. The control valve as claimed in claim 26, wherein the adjusting member comprises a machined duct that extends over the entire length of the adjusting member and houses the sensor.
29. The control valve as claimed in claim 26, wherein the sensor has a first end and a second end, and the first end of the sensor passes through the lower end of the adjusting member that faces the end wall in such a way so as to be in contact with the fluid and to take measurements.
30. The control valve as claimed in claim 29, wherein there is more than one sensor and the sensors are temperature sensors.
31. The control valve as claimed in claim 30, wherein the machined duct comprises a lower end made of brass which houses the first end of the sensor and is in contact with the fluid.
32. The control valve as claimed in claim 29, wherein the second end of the sensor passes through the upper end of the valve and is connected to an information transmitting means for transmitting values measured by the sensors to a microprocessor and/or to a computer.
33. The control valve as claimed in claim 32, wherein the information transmitting means comprise circular electrical-contact tracks.
34. The control valve as claimed in claim 33, wherein the information transmitting means comprise plugs connected to the circular tracks for transmitting the values originating from the sensors.
35. The control valve as claimed in claim 34, wherein the circular tracks are situated on a moving part of the valve and wherein the plugs are situated on a fixed part of the valve.
36. The control valve as claimed in claim 34, wherein the circular tracks are situated on a fixed part of the valve and wherein the plugs are situated on a moving part of the valve.
37. A fluid circulation circuit with branches which comprises a control valve as claimed in claim 1, the fluid inlet of which is connected to a fluid source and the fluid outlets of which are connected respectively to branches of the circuit.
38. The fluid circulation circuit as claimed in claim 37, wherein the fluid used therein is a coolant and the fluid circulation circuit is a cooling circuit for cooling the engine of a motor vehicle which comprises an engine, a cooling radiator, a cabin, a unit heater for heating the cabin and a first, second and third branch of the circuit.
39. The fluid circulation circuit as claimed in claim 38, further comprising a circulating pump to pump the coolant in the circuit, wherein the control valve is a three way valve and the valve has three fluid outlets, wherein the fluid inlet is connected to a coolant inlet originating from the engine, and the three fluid outlets are connected respectively to a first branch of the circuit which contains the cooling radiator, the second branch of the circuit which constitutes a bypass of the cooling radiator, and the third branch of the circuit which contains the unit heater for heating the cabin.
|
Thread:MasterOfVideogames507/@comment-22439-20130116192204
Hi, welcome to ! Thanks for your edit to the User blog:MasterOfVideogames507 page.
Happy editing!
|
Tensorboard Instruction
Hi there,
I believe the instruction for TensorBoard in the README should be updated to:
tensorboard --logdir runs/v1t_model --port 6006
Updated thanks!
|
import React from "react"
import { graphql } from "gatsby"
import Img from "gatsby-image"
import Layout from "../components/layout"
import SEO from "../components/seo"
import "../styles/about.css"
export default function About({ data }) {
const img = data.markdownRemark.frontmatter.image.childImageSharp.fluid
const html = data.markdownRemark.html;
return (
<Layout>
<SEO title="About" />
<div className="about-content">
<div id="about-image">
<Img
fluid={img}
/>
</div>
<div
id="about-info"
dangerouslySetInnerHTML={{ __html: html }}
></div>
</div>
</Layout>
)
}
export const query = graphql`
query {
markdownRemark(frontmatter: { title: { eq: "About" } }) {
html
frontmatter {
image {
childImageSharp {
fluid(maxWidth: 700, maxHeight: 700) {
...GatsbyImageSharpFluid
}
}
}
}
}
}
`
|
Add plus/minus button
Value description
As a user
I want to add and subtract the quantity of the product I want to buy,
I also want to reset/remove the amount with one click.
Description
Acceptance Criteria
[ ] Initial amount should be zero for each product.
[ ] quantity selector should have a plus and a minus button to add and subtract quantity.
[ ] The quantity should be displayed between the plus und minus button.
[ ] The quantity display must be wide enough to show double-digit numbers.
[ ] An additional remove-button should be positioned below the quantity selector.
Tasks
[ ] Create a new branch
[ ] Create a quantity selector component
[ ] Create a remove button component
[ ] position both components in the cards component
Complexity
low
Hey Eugen, this looks great! You can use this user-story as it is, only two points that I would add:
in the acceptence criteria: the quantity should always be >= 0
if you want any hover effects, you should state them as well.
|
[No. 45377-7-I.
Division One.
September 18, 2000.]
Paul Zalud, et al., Appellants, v. James Boltz, et al., Respondents.
Appeal from a judgment of the Superior Court for Snohomish County, No. 96-2-08124-6, Thomas J. Wynne, J., entered September 27, 1999. Affirmed in part and reversed in part by unpublished opinion per Ellington, J., concurred in by Webster and Cox, JJ.
|
TOC Problems: Every pages appear word "CONTENTS"
I got the problems with TOC, by the way. When I start to put TOC in my book, after that in every pages header appear word "CONTENTS" with capitalize font. I don't know how to edit or custom it. I try to finding documentation and FAQ at Lyx.com but they explanation not enough to solving my problem. I just getting stuck after while. What should I do for solve this problem? if could I want rename these header by chapter name like "BAB I".
Thanks in advance.
FYI: I use document class: book.
Here my problem, appear words CONTENT in header:
appear words CONTENT in header http://www.zakariyasoewardi.co.uk/sandbox/img/Lyx-error-1.jpg
appear words CONTENT in header http://www.zakariyasoewardi.co.uk/sandbox/img/Lyx-error-2.jpg
I assume BAB II is a Chapter*? What would you want your headers to look like other than displaying CONTENTS?
No, BAB II is a Part*. I want custom header by chapter name like "BAB I". Depending on where the pages are still in a chapter.
Can you show us a complete document with this behaviour, please! Make it something short that only has that table of contents and then some new chapter where you don't get the header you expect.
sorry @pst I think I've enough clear to explain my issue.
The reason for CONTENTS in the header stems from the \tableofcontents macro in the book document class/book.cls:
\newcommand\tableofcontents{%
\if@twocolumn
\@restonecoltrue\onecolumn
\else
\@restonecolfalse
\fi
\chapter*{\contentsname
\@mkboth{%
\MakeUppercase\contentsname}{\MakeUppercase\contentsname}}%
\@starttoc{toc}%
\if@restonecol\twocolumn\fi
}
The above is executed when you Insert > List / TOC > Table of Contents in LyX. Note how the ToC is inserted as a \chapter*, with both the left and right marks being set in Uppercase as \contentsname (which defaults to Contents, by the way).
By default, numbered parts (\part) clear the headings, while unnumbered parts (\part*) don't. That's exactly why you see the header continuing without change from the ToC.
To adjust the headers automatically with the use of your sectional unit, switch from Part* to Chapter and use an appropriate package to adjust (in the Document > Settings... > LaTeX Preamble) the formatting to suit your needs. Alternatively, you can insert an ERT containing
\markboth{BAB I}{BAB I}
manually after a Part* to update the header accordingly.
For more specific detail about automation, you need to supply us with a minimal working example (MWE) that you exported from LyX showing at least the ToC and a single Part*.
Thanks, for temporary it's answer my problem. I appreciate for that.
I've had a similar issue with \chapter* for un-numbered chapters - this doesn't set the marks either. After reading this answer, I made this command \def\chapternotnumbered#1{\chapter*{#1}\markboth{#1}{#1}} which seems to work ok although I wouldn't be surprised if I later find I've broken something else with it :D
I don't use Lyx, but as you say you're using \part* instead of \chapter* this is probably the cause your header isn't updated correctly. The text in the headers is defined in the commands \leftmark and \rightmark, which in a book by default use the last known chapter and section title respectively.
Since the table of contents inserts a chapter header, and after that only part* commands are issued, the last known chapter title remains Contents, which is converted to CONTENTS by \leftmark. Parts are intended to group sets of chapters together, usually with only a small description that's not filed under a new chapter, and so I think it is better to use chapter commands if that is what you write.
If you don't like the way the chapter titles are typeset it is better to alter that configuration, than to misuse other commands. With TeX you should write what you mean in a document, and not use another command that seems to provide a better looking result straight away (that's more the MS Word philosophy ;) ).
Honestly, I'm getting confuse with these problem. But I got reference in some forum, where they use 'fancyhdr' so they can edit '\leftmark' and '\rightmark' manually. Should I use that too? how that's work, I'm using Lyx with GUI and I don't understand with script except ERT a little.
I don't know how to do it with LyX, but if you really want to stick with using parts as chapters I suppose you could redefine \leftmark to use the part title. To get a \parttitle/\partmark command see for example this answer. fancyhdr is mostly used (as the name suggests) to design the headers, and still should use \leftmark to get the chapter title, unless you redefine it manually.
Taking a lead from Werners answer,
"Alternatively, you can insert an ERT containing
\markboth{BAB I}{BAB I}
manually after a Part* to update the header accordingly."
I just used \markboth{}{} to get rid of the "CONTENTS" on the top left of my book. I used it right after where I inserted my TOC. Worked like magic!!
Thanks everyone ...
|
export const isBrowser = typeof window !== 'undefined';
export const setConfig = (data) => {
if (isBrowser) {
window.localStorage.setItem('config', JSON.stringify(data));
}
};
export const getConfig = () => {
if (isBrowser) {
let systemTheme = 'light';
if (
window.matchMedia &&
window.matchMedia('(prefers-color-scheme: dark)').matches
) {
systemTheme = 'dark';
}
return (
JSON.parse(window.localStorage.getItem('config')) || {
theme: systemTheme,
}
);
}
return {
theme: 'light',
};
};
|
The Tympanic Cavity
The tympanic cavity [cavum tympani], as has been stated, is an air-space, Hned with mucous membrane, situated between the external and the internal ear. It is of irregular outline, but, roughly, it is a slit-like cavity, lying in an obhque antero-posterior plane. Its transverse diameter measures only from 2-4 mm., while the vertical and antero-posterior diameters measure about 15 mm. (fig. 834).
It is narrowest at the centre, and wider superiorly than inferiorly. The bony walls have already been partly described with the temporal bone, and hence the description given here will refer to the appearance found in the fresh, or un macerated condition.
It will be noticed (see fig. 829) that the floor of the space is on very much the same horizontal plane as the floor of the external meatus, and the lower margin of the tympanic membrane. The roof, on the other hand, lies at a much
higher level than the upper margin of that membrane. Hence the cavity may be divided into two regions, a lower part, corresponding in extent to the tym panic membrane, and an upper, above the upper border of the membrane, known as the epitympanic recess. This division forms a definite chamber, and con tains the head of the malleus and the body and short process of the incus. It is on the posterior part of this chamber that the communication with the tympanic antrum is found (fig. 835).
As the shape of the tympanum is irregular, its walls are not everywhere clearly marked off from one another, but there may be recognized (figs. 829 and 835) a roof, or tegmental wall, a floor, or jugular wall, a medial or labyrin thine wall and a lateral or membranous wall, an anterior or carotid, and a pos terior or mastoid boundary or wall.
The roof, or tegmental wall, is formed by a portion of the tegmen tympani, a thin plate of bone which is continued backward to form the roof of the tj'^mpanic antrum. This plate is formed by the petrous part of the temporal bone, and at its lateral margin is the petro-squamous suture, wherfi a slight deficiency in the roof may occur.
The floor, or jugular wall is very narrow transversely, and is in intimate relation to the internal jugular vein (fig. 831). As shown in fig. 833, the surface is frequently very irregular from stalactite-like projections between which are the tympanic celluhc (air cells), while near the back there is occasionally a marked projection corresponding externally to the root of the styloid process.
The posterior or mastoid wall presents at its lower part, many additional tympanic cellulac, and higher up, an elevation, the pyramidal eminence, on whose apex is an aperture transmitting the tendon of tlie stapedius muscle. The fleshy belly of that muscle is contained in a cavity in the interior of the bony pyramid of the posterior wall. Lateral to this is an aperture, the aperlura tympanica canaliculac chords, through which the chorda tympani nerve enters the tym panum, covered by a reflexion of the mucous membrane. Between this opening and the pyra mid is a slight elevation; and ul)Ove it in a fossa, termed the sinus posterior. Above this again is a recess, where the posterior ligament of the incus is attached, known as the fossa incudis. This portion of the posterior wall forms the boundary of the epitympanic recess. Here the cavity of the tympanum is continued with that of the antrum tympanicum, or mastoid antrum,
|
John C. Graff, Respondent, v. Charles E. Hunter and Margaret Hunter, His Wife, Appellants.
Judgment unanimously affirmed, without costs. No opinion. Present — Lazansky, P. J., Young, Kapper, Carswell and Scudder, JJ.
|
the midst of an interesting series of remarks addressed to them equally with the rest of the company, turned aside their heads ; began to whisper to the person who sat next to them on an entirely different subject ; and thus diverted his attention as well as their own from the speaker. This is, undoubtedly, a gross offence against good manners. It is practically telling the speaker that you do not think him worth listening to, and is certainly calculated to embarrass, and even to interrupt him in his remarks. Surely those who are desirous of doing to others, as they would that others, in like circumstances, should do to them, will endeavour to avoid such a palpable indecorum.
10. Another radical maxim of good manners, in conversation, is to treat what is said by others re spectfully. This maxim, as well as the last, is perpetu ally disregarded. To say nothing of the practice indulged by many, of habitually withdrawing their attention from those with whom they are conversing ; there are others, who testify their want of respect for what is said to them in conversation, in a great variety of ways : by a smile of contempt ; by a halfconcealed sneer ; by a manifest unwillingness to hear the speaker to the end ; by interrupting him ; by hints that his opinions are frivolous ; in a word, by some look, tone, or gesture, not easily specified, or clothed in language, by which we may intimate to an other that we regard what he is saying as unworthy of being seriously considered. In all these ways, do proud men, impatient men, obstinate, opinionated, vulgar men, treat with disrespect many remarks which are worthy of their notice, and wound the feelings of many a modest, timid speaker.
If you so far put yourself on a level with any one, as to converse with him at all, listen respectfully to what he has to say. It is very possible that when he has finished, and before he has finished, you may be constrained to think very little of his remarks. But do not wound his feelings, by giving him to under stand, beforehand, that you expect very little from him to the purpose ; or by any thing that shall indi cate sneer or contempt. Do not practically tell him, that you have no respect for what he is saying. Not only listen to him, but give every thought and word which he may utter, its due weight. Treat him, in short, as you would wish and expect, in like circum stances, to be treated by him. In no other way will you be able, when he has done, to answer his remarks in such a manner as will be likely to be useful to him as well as worthy of yourself.
11. In conversation with an individual, look him in the face, and keep your eye generally fixed on his, as far as you can without staring, and looking him out of countenance. The power of the eye, in seconding and enforcing what is said, is incalculable. Besides, by talking to an acquaintance without looking him in the face, you forego a great advantage. You lose the opportunity of perceiving what impression your re marks make upon him ; and of deciding, by his com posure, or his sudden change of countenance, whether you are giving him pleasure or pain by your commu nication. Many a discerning speaker, by watching the countenance of him whom he addressed, has been warned, by its indications, of the delicate ground on which he was treading, and prevented from making further and perhaps very mischievous disclosures.
12. It is of great importance to a public character, and especially to a clergyman, to learn the art of opposing erroneous sentiments expressed in the course of conversation, with firmness, and, at the same time, •without offence. No discerning individual can converse many minutes together, with almost any one, with out hearing something with which he cannot entirely agree. Now, to oppose such erroneous opinions is, in most cases, a duty ; and yet to perform this duty sea sonably, delicately, and with a proper reference to time, place, and company, is one of those things which, more than most others, put in requisition our judgment, taste, good temper, and good breeding. Sometimes the best expression of your disapprobation will be by perfect silence. In other cases, this would be want of fidelity. When you find yourself con strained, however, to give utterance to your dissent, let it be done mildly, respectfully, and in a manner fitted to win, rather than to revolt, the errorist. For example ; instead of saying, to one who has been de livering sentiments in which you cannot concur — "You seem to me to talk absurdly;" — or, "Such opinions are grossly erroneous and mischievous;" — or, " A person who can speak thus, must have either a weak head, or a bad heart ;" rather say — " I can not concur in that opinion, for the following reasons, &c. ;" or, " You must pardon me for dissenting from that doctrine;" — or, "Perhaps you have not adverted to some of the consequences of the opinion which you have just expressed;" and so in other cases. We are never so likely to benefit those who broach erroneous opinions in our presence, as when we oppose them, without acrimony ; with a mild benevolence of manner ;
their pride.
13. Avoid a haughty and authoritative manner in conversation. There are, undoubtedly, many clergy men who allow themselves to feel in the parlour, very much as they do in the pulpit ; as if it were their pre rogative to dictate their sentiments ex cathedra ; and as if they expected to be heard, not as friends, but as superiors, and authorized instructors. Hence they have habitually, something in their manner in com pany, which banishes ease, which chills confidence, which represses free inquiry, and which causes them to be listened to rather with constraint --and timidity, than with affection. . Carefully shun every thing of this kind. When you are conversing with friends in a parlour, you meet them on terms of equality. You are to address them, not as a lordly dictator, but as a respectful friend : not as having authority over their consciences, but as a helper of their instruction and their innocent pleasure. Avoid, therefore, in such circumstances, all harsh, dogmatical expressions an$ tones. Do not think to convince by your ipse dixit, or to put down an opponent by your sovereign autho rity. This would be proud dictation, rather than con versing ; and ought to be carefully avoided by one who wishes to succeed, by addressing and treating men as rational beings ; by respecting the rights of conscience, and by convincing the understandings of those whom he desires to gain.
14. As far as you can, avoid controversy in con versation, especially in mixed companies. I say, as far as you can. It is not always possible to avoid it.
An impudent, rough, or vulgar attack, may compel you to take the stand and tone of a polemic, when you least desire it. When such a case occurs, it ought to be studiously met without heat or passion, and brought to a close as speedily as possible. But many good men love controversy ; or, at any rate, are easily betrayed into it. They have so little knowledge of the world, and so little discretion, that they are always ready to give battle, whenever they see the banner of a party raised. And even if they be seated in large, mixed companies, and be in danger of having all eyes and ears turned to them ; still they imagine that no disputable sentiment must be allowed to pass. This is a real infirmity. Watch and pray against it without ceasing. Never suffer the truth, if you can help it, to be trampled under feet in your presence. But there are many ways of interposing a mild, concilia tory word in its behalf, and doing it firmly, without allowing yourself to be drawn into a dispute. And in this case, the old medical maxim, obsta principiis, is of great value. Be on the watch to avoid controversy, Jrom the first moment you perceive a discrepance of opinion. A slight effort may be sufficient, in the be ginning, to avert the evil, which, after going a few steps forward, will be utterly unavailing. Before I take leave of this particular, allow me, with especial earnestness, to put you on your guard against being drawn into controversy, in company, with aged men and with females. Never dream that you will be able to convince, or by any means to effect an alteration in the opinions of a man who has passed the age of three score, or three score and ten. You do not dis pute with such a one on equal terms. If his opinions
be ever so erroneous, he is probably wedded to them by long habit, as well as by strong prejudice. He will naturally consider himself as your superior, and take for granted that you cannot instruct him. Of course, you will find it difficult to use the same free dom and scope of argument with him, that you would with one nearer to an equality with yourself in age. Many of the same considerations apply to females. In acuteness, wit, sprightliness, and delicate raillery, they often prove powerful opponents ; while the hands of a male adversary are, in a great measure, tied, so that he cannot wield with unrestrained freedom many of those weapons which he might properly, and with great effect, employ against an adversary of his own sex.
15. Closely connected with this caution against sliding into unseasonable controversy in company, is another against losing your temper in controversy, when you happen to be either unavoidably dragged, or inadvertently betrayed, into it. Perhaps clergy men may be said to be peculiarly exposed to this temptation. For, besides the various other infirmi ties, which they share in common with all good men, they are, perhaps, peculiarly liable to feel deeply, when their profession or their opinions are attacked. Always set a double guard, therefore, at this point. Kecollect not only the sin of all rash and unseason able anger ; but how much the exhibition of it lowers the dignity of a grave, official man ; and also that, in controversy, according to an old maxim, he who first gets angry will generally be considered as having the •weaker side of the argument.
ner in conversation. Not that I would have you put on the smiling, simpering countenance, which many affect, as giving them, what they think, a pleasant, social air. This is, to all discerning people, disgusting rather than attractive. But by the attractive man ner which I would recommend, I mean that frank, courteous, unaffected, benign manner, which invites freedom of intercourse, and which is adapted to place all who approach us at their ease. Such a quality in a clergyman is peculiarly precious, and if properly cultivated and employed, may become a blessing to thousands. Of course, the attainment and exercise of it ought to be studied. And I know of no means of attaining it more effectual, than habitually cultivating that genuine Christian benevolence, which the spirit and the example of the blessed Saviour so powerfully recommended. A thousand rules on this subject, ex pressed with all the point and eloquence imaginable, and day by day treasured up in the memory, are of small value when compared with this successful culture of the moral feelings, and the heart.
17. While you cultivate habitual affability, good nature, and benevolence in conversation, be not too ready to make promises of service to those with whom you converse. The inexperienced and the sanguine, who have naturally an obliging temper, are extremely apt to be betrayed into this fault. They feel much disposed to oblige ; and they hastily make promises, and excite expectations, which they cannot fulfil. Be not ready to promise, unless you are sure of your ability to perform. Be sacredly careful not to disap point the just expectations which you have excited ; and make a point, instead of doing less than you say,
to do more. I have known a number of men, and es pecially young men, in public stations, who were so ready to excite expectation of the great things they would do for individuals, or for public bodies, and so remarkably delinquent in accomplishing what they so hastily undertook, that, after a while, no confidence whatever was reposed in their undertakings.
18. It is of the utmost importance to one whose pro fession leads him much into society, that he be not ready to take offence at every trifle that occurs in the course of conversation. It is a real misfortune for any man, and especially for a clergyman, when his natural temper is jealous and suspicious, and when he is ever on the watch for some fancied design to offend him, or to wound his feelings. I have known men in the sacred office so extremely sensitive to every thing of this kind, that their best friends were obliged to converse with them with a degree of caution truly painful. The most innocent remark sometimes became matter of offence, and where no one else saw the re motest purpose of personal application, an unfortunate individual was made an offender for a word. Guard, I pray you, against this unhappy temper with the utmost vigilance. Never think of taking offence, until you are very certain offence was intended. Be sure to err rather on the side of forbearance and charity than of excessive suspicion. Nay, even if you have proof that there was an intention to wound your feelings, rather set it down to the score of temporary peevishness, than of settled malignity ; and be ready to meet the offending individual, on the next occasion, with the same serenity and good will as ever.
mate with strangers, at a first interview, and especially, committing yourself to them. This is a great mark of precipitancy and weakness. Be not ready to trust every body. Confidential friendship is a plant of slow growth. Many people appear extremely plausible, and even fascinating at first interview, who are utterly unworthy of your confidence, and will be speedily discovered to be so.
20. Never, if you can help it, put yourself in the power of any man. It is, indeed, a common maxim, that you ought never to put yourself in the power of any one but tried friends. I would go further ; never do it in any case, unless it be absolutely necessary. For example, if it be impossible for you to proceed in a delicate and highly important matter, without making a confidant of some one, submit to the necessity. Make the best choice you can. But, on no account, let your communication go further. It can do no good, and may do much harm, in ways that you never thought of anticipating. The most prudent and useful public men I have ever known, were found among those who exercised the most impenetrable reserve respecting the delicate concerns of themselves and others ; — who did not impart the knowledge of them even to their nearest relations.
21. When you are called to converse on a subject concerning which there is known to exist, or is likely to arise, a diversity of opinion, in your congregation or neighbourhood, do not be forward to deliver your opinion upon it, unless you feel imperiously called by a sense of duty to do so. And when you are called to give your opinion on such a subject, be careful to express it in a manner as little calculated as pos-
sible to mortify or irritate those who differ from you. Why should you intimate, that those who think other wise are either " weak" or " wicked ?" You will not be likely to do good by such language : and it may deeply wound, and even permanently alienate, many of your best friends.
22. Remember that a clergyman ought ever to maintain personal dignity in conversation. This is too often forgotten. Personal dignity, in this case, may be impaired, by levity, by buffoonery, by the re cital of low, vulgar anecdotes, by any thing, in short, which evinces the want of that seriousness and selfrespect, which can never be abandoned with impunity. Remember that, though it be not only lawful, but de sirable, that clergymen should be affable and cheerful : yet that they can never manifest a spirit of habitual levity and jesting, without giving pain to all correct persons who observe it. Dr. Johnson was far from being a precisian, either in his feelings or manners ; yet when he saw a couple of clergymen indulging in considerable mirth and jollity at a dinner table, he said with emotion, " This merriment of parsons is very disgusting. " And, truly, when ministers of the gospel, who ought to set an example of dignity, as well as piety, undertake to exhibit themselves for the enter tainment of company; to recite low, common-place stories ; and not only to repeat, but also to act their narratives, with all the circumstances of comedy and farce which belong to them ; it cannot fail of giving pain to every mind of correct Christian feeling, and of lowering the ministerial character.
either in speech or action. It gives pain ; and is a mark of very coarse breeding. A dignified command of the countenance is a talent of great value to one in a public station, and adapted to save him from many an embarrassing and mortifying occurrence. It is a real infirmity, and, in a minister of the gospel, an unhappy one, to be ever ready to laugh, or to be noted as a great laugher.
24. It is a great offence against good breeding to be ever ready to turn the eyes of a company on a certain individual, to whom some remark, cursorily made, is supposed to be applicable, and thus, often times, deeply to embarrass him. I have often seen this rule violated in the public assembly, as well as in the parlour. A remark is made, perhaps, which is levelled at the particular denomination or party to which an individual present belongs, or at some opinion which he holds, or some conduct with which he is known to be chargeable. In an instant, every eye is turned toward him ; and perhaps some fairly turn round in their seats, to gaze with a smirk or a sneer at the supposed delinquent. There is something so indelicate in this, that a person of truly correct feeling will by no means allow himself to practise it.
25. I have long thought that the practice of retail ing anecdotes was one by far too much indulged by many clergymen. To be able to tell a seasonable, appropriate, short and pointed anecdote, now and then, is certainly an accomplishment by no means to be despised, and very proper to be indulged by a clergy man, as well as by any other man. But to abound in them ; to be continually resorting to them ; to make the repetition of them a favourite amusement, and one
of our characteristics, is indeed unworthy of a Chris tian minister. I could name clergymen who have a set of anecdotes, which they are constantly retailing ; some of them very vulgar ; a large portion of them old and perfectly stale ; not a few relating to ludicrous citations and expositions of Scripture, and, of course, calculated to make the Scriptures ridiculous in the view of many people ; and these, perhaps, repeated the hundredth time, to the loathing of many who have heard them over and over again. A man must have a better memory, and a richer fund, than commonly fall to the lot of the retailers of anecdotes, who does not repeat the items in his list, many times over, to the same individuals. But this is not the worst. The persons in question, by the constant repetition of ludicrous stories, have insensibly cherished in their minds a habitual bias to levity, and have come at length to be expected to be the general jesters for their company.
26. This propensity to the incessant retailing of anecdotes becomes more highly exceptionable, when it leads, as it sometimes does, to the recital of those which include the repetition of profane or obscene language. It is in vain to say that he who only re peats the story, is not the author of the language, and by no means expresses his approbation of it. If the ear be polluted by the words of profaneness and obscenity, it matters little who first of all uttered them. The work of mischief is accumulating by every repetition ; and the desire of every Christian ought to be that it never be heard again.
of habitually repeating old and stale proverbs. These, from the circumstance of their having been repeated so many thousand times, have ceased to interest ; and many of them are truly vulgar, so that to be con tinually repeating them would be really to subject yourself to the charge of habitual vulgarity. The truth is, making yourself remarkable for the frequent repetition of any particular form of speech, or pro verbial expression, is alike contrary to all good taste, and good breeding.
28. And this leads me to lay it down as another fundamental principle of conversation, that nothing in the least degree bordering on the indelicate, or the coarse, ought ever to escape in conversation from the lips of a minister. If you wish to know how far I would carry this principle, I answer, if there be a thought or a word which the most delicate female would shrink from uttering in a public company ; if there be an anecdote, which the most scrupulous matron would be unwilling to relate, if all the world were her hearers ; then let no clergyman venture to give utterance, in mixed companies, either to the one or the other. His delicacy ought to be quite as scru pulous and pure as that of the most refined lady.
29. It is one of the most obvious dictates of good manners, not to interrupt another person when he is speaking ; and yet how frequently is this plain rule of decorum violated! To interrupt one in conversa tion almost always carries with it an offensive charac ter. It implies either that we are not instructed or interested by what he is saying ; that we have not patience to hear him to the end, and are anxious that he should come to a more speedy close ', or that we are
wiser than he, and more competent to give instruction on the subject on which he is speaking ; neither of which is consistent with that respect and benevolence which we owe to those with whom we converse. But, while you sacredly guard against interrupting others in conversation, be not impatient of interruption your self. Bear it with calmness, and without the least in dication of irritated feeling. Set it down to the score of inadvertence, of nervous excitement, of irascible feeling, of constitutional impatience — in short, of any thing rather than a design to give offence, unless you are compelled by unquestionable testimony to adopt this unfavourable construction.
30. Never allow yourself flatly and offensively to contradict any one with whom you are conversing, provided you mean to remain on good terms with him. It is always a breach of good manners, and to many persons peculiarly painful and embarrassing. If you suspect, or even if you are certain, that a statement made is entirely incorrect, instead of say ing bluntly, " that is false," or " that is not true ;" — or, uthe fact is not as you state it;" — how much more delicate and proper to say — " Do you not mis take ?" — "Are you not misinformed?" — "I cannot help thinking that you are deceived with respect to that matter." — But, while you never allow yourself bluntly or harshly to contradict others in conversation, always make a point of bearing it patiently when you are contradicted yourself. Remember that it much oftener arises from coarseness of the mind, and igno rance of propriety, than from any intention to wound feelings ; and, therefore, ought in common to be pitied, rather than resented or made matter of offence.
31. Guard against the indulgence of personal vanity in conversation. This is a foible, or rather a sin, which so frequently lowers the dignity, and interferes with the usefulness of men, otherwise of great excellence, that you cannot be too careful to fly from its approaches. In any man it is revolting ; but in a minister of the gospel, or in a candidate for the ministry, it is pecu liarly offensive and degrading. Let not the excessive love of praise get possession of your mind. Despise the petty and unworthy arts of those who are con stantly seeking to draw it toward themselves. Beware of seeming to court observation or attention. Always remember that the larger your demands on others for their respect and admiration, the less they will be dis posed to yield to you. No man is so likely to be both honoured and loved as he who appears never to think of soliciting or desiring either. Whereas he who in sists on often dragging into view his own excellence, and who is continually blazoning his own talents, attainments and virtues, will generally be found to lose reputation just in proportion as he takes into his own hands the task of awarding it to himself.
32. Vanity, in general, is the parent of egotism in conversation ; — another foible, against which I exhort you to guard. " Let not the idea of yourself appear to be always present to your imagination." Talk not of yourself, your plans, your doings, or your aifairs in company, if you can easily avoid it. Do not embrace every opportunity of relating something to your own advantage, or that of your family or relatives. It can scarcely be done in any shape, however ingenious, without having an unpleasant appearance, and had, therefore, better be omitted altogether. Even speak-
ing of your own defects and weaknesses, will be con sidered by many as an indirect compliment to your self; because it conveys the idea that you feel so secure in the acknowledged possession of higher and nobler qualities, that you can afford to be thought defective in those of minor importance.
33. Do not affect wit in conversation. Wit, like poetry, to be tolerable, must be very good. The greater part of what is called wit, like most of the versifying in our world, is but an humble and vapid imitation of that which it wishes to be thought. Never attempt to force nature, then, in the one case, any more than you would in the other. Few things are more undignified and paltry, than to see a man impotently struggling with attempts at wit, when the only thing really ludi crous about the matter is, the utter failure of the effort. The probability is that you have not real wit. If you have, it will occasionally disclose itself in spite of your efforts to repress it. If you have not, affecting it, and trying to excite it, will only make you an object of ridicule. And, after all, it is not a very de sirable accomplishment for a minister of the gospel. It has been commonly found to be a snare rather than a treasure to those who really possessed it.
34. Do not indulge pedantry in conversation. By this you will understand me to mean a formal and un seasonable ostentation of learning ; a fault into which men of superficial knowledge, more particularly pro fessional men, are extremely apt to fall, and with which some clergymen, and especially young clergymen, are frequently chargeable. If you have ever so much
learning, there is littleness in making a parade of it ; and if you have but a small portion, there is something bordering on dishonesty in vaunting it as if you had much. The best rule in the world on this subject is, to get as much knowledge of every valuable kind as you can ; and never to make any further display of it than the discharge of your duty necessarily demands. If you were to hear a physician or lawyer holding forth, in mixed company, on the technicalities and the recondite lore of his profession, would you not be dis posed to smile ? And ought you not to guard against exciting a smile in others by similar conduct on your own part ?
35. Both the spirit and the language of flattery in conversation, are utterly unworthy an ambassador of Christ. In any man it is base ; but in him who ought to be a pattern and a leader in all that is good, it is pre-eminently base. Yet there are clergymen who are by no means free from this charge. Their opinions of so many persons and things are either openly so licited, or indirectly required ; and their temptations to gratify the feelings of many different classes of people, are so powerful, that they are not always able to resist them. I will not suppose any one who bears the sacred office, to be so unprincipled as to indulge in the habit of indiscriminate flattery, which, as it must defeat its own purpose, is as foolish and contemptible, as it is wicked. But what I warn you against is that delicate flattery, to which many good men are prone ; which frequently disguises itself under the name of benevolence ; and of which, perhaps, the poison is the more deleterious, because it is so delicately and sparingly administered. Never flatter any one. Never
make your praise cheap. It is not sinful, indeed, to commend another, where commendation is really de served ; but let it be bestowed at a proper time and place ; and be conscientious in falling short of what is due, rather than going beyond it. Remember how inflammable a thing human vanity is ; and guard against the risk of kindling it into a flame. " He that flattereth his neighbour," says the wise man, "spreadeth a net for his feet."
36. And as I would warn you against flattering others, so I would warn you, with no less solemnity, against inviting commendation and flattery from others to yourself. Nothing is more common, than what is most expressively called "fishing for praise." Some times it is almost extorted ; and what is it then worth ? Despise the littleness, as well as abhor the sin of this miserable beggary. I have known ministers who were in the constant habit, immediately after descending from the pulpit, if they fell in with a brother clergy man, of asking him his opinion of the sermon which he had just heard. Where such inquiries are confined to very intimate friends, they are, perhaps, not to be wholly blamed; although even then, they are in a greater or less degree, indications of vanity, and spread a snare for the honesty of our friends, and had better be omitted. But when addressed, as I have known them to be, to strangers as well as friends, there is a littleness about them truly contemptible. The same general remark may be applied to those cases in which, though there be not a direct solicitation to praise, a discourse, there is evidently a door opened for that purpose. I once knew a clergyman, who, so far as I had an opportunity of observing, never failed of say-
ing, to every hearer whom he fell in with, for half an hour or an hour after the close of his own sermon, sabbath after sabbath, "We've had a very solemn subject to-day." This I have heard him repeat and repeat until it became perfectly nauseating ; and have observed him to bow and smile with much complacency, when his own indirect compliment to his sermon, drew from one good-natured auditor after another, a dose of flattery.
37. Do not speak of your own performances at all, after they are brought to a close, if you can, con sistently with duty, avoid it. If you appear satisfied with them, it will be thought vanity. If you profess yourself dissatisfied, it will be considered as an indi rect method of inviting praise. If you merely make the general subject on which you have been discoursing, the subject of conversation in company afterwards, even with the purest motives, it will be apt to be mis construed as an ingenious device to extort commenda tion for what you have done. Never boast, on the one hand, of the length of time, or the care which you have bestowed on your discourses ; or, on the other, of the expedition and ease with which you prepare them. Never allow yourself to talk at all on such subjects, unless you are compelled to do it. A thousand other subjects, more likely in those circumstances to be useful, lie before you. If a discourse which you have delivered be commended in your presence, do not ap pear either to be too much gratified with the commenda tion, or to despise it. Receive the compliment either with respectful silence, with a slight bow, or with the shortest possible expression of thanks ; and, as soon as is consistent with courtesy, change the subject.
38. Some persons, under the notion of avoiding for mality and flattery, give way to a rude familiarity, which they call, indeed, by some favourable name ; but which deserves to be severely reprobated. I have often known young preachers, when they had become a little familiar with their companions, in the habit when addressing them, of calling them by their Chris tian names only, or by their surnames only ; and in dulging habitually, not merely in the freedom, but also in all the coarseness of unbridled raillery. Rely upon it, this is, in general, not wise. Mutual dignity, and mutual respect, are indispensable to the continued existence of Christian friendship, in its most pure, delicate and profitable form. If you wish to maintain such friendship, be free and unconstrained ; but never indulge in rude and coarse familiarity. Those who are worthy of your love, will certainly be repelled rather than attracted by it.
39. When I remind you of the importance of main taining a constant regard to truth in conversation, you will consider me as enforcing a plain point in ethics, which no one can dispute. But I wish to go further than this language will be popularly considered as im porting. I mean much more than that a minister of the gospel ought to avoid downright lying in company, whether the object of the lie be to flatter or to injure. It ought to be his object, in making every statement, in repeating the most trivial narrative, to guard as carefully against misrepresenting, or exaggerating any fact, as if he were on oath ; to give no false colouring, no over-colouring, and not, even in jest, to misstate the smallest circumstance. I have had the happiness to be acquainted with a few men whose habits were
of this kind ; and it was delightful to observe what weight it imparted to their word ; and how completely they were delivered from all those troublesome expla nations and retractions, to which the less scrupulous were constantly exposed.
40. Be strictly attentive to the circumstances of time, place, and company in conversation. Look round the room, before you introduce a particular new topic, and ask yourself, whether it is a suitable one for that company ; or, whether there be any individuals pre sent to whom it may be peculiarly unwelcome or em barrassing. There is an old French proverb, the im port of which is — " Be careful never to mention a rope in the family of a man who has been hanged." It is a proverb full of good sense, and social delicacy. Yet nothing is more common than to see persons of absent or coarse minds, violating this rule. They introduce subjects, or indulge remarks, calculated to wound the feelings of some of the most estimable individuals present ; and this, not for the laudable purpose of benefiting the individuals in question, or of bearing an honest testimony against vice ; but from mere inad vertence or want of feeling. Think, therefore, before you speak, not only what you are about to say, but also to whom you are about to address it. It is said, that Bishop Burnet was so apt to wound the feelings of those with whom he was conversing, by an infraction of this rule, from mere absence of mind, that some of his best friends were afraid of introducing him to dis tinguished strangers, lest he should embarrass them as well as himself by an infirmity, which, if its effects had not been sometimes so painful, would have been often unspeakably ludicrous. Direct particular attcn-
tion to this object ; and it will soon become as much a fixed habit of your mind to advert to the persons addressed in every conversation, as to any other cir cumstance attending the communication.
41. When any persons impart to you a knowledge of facts in confidence, make a point of being delicately faithful to the trust committed to you. It not unfrequently happens that the sick and the dying ; persons in difficulty and distress ; and persons under anxiety of mind respecting their eternal state, make commu nications in confidence to ministers of the gospel ; under the impression that they, of all men, may be most safely trusted. In every such case, preserve the most inviolable secrecy. But there are many other cases, in which, though no formal injunction of secrecy is expressed, still it ought by all means to be under stood, by every delicately prudent mind. We all know how frequently, and with what strict honour, profes sional secrets are kept by lawyers and physicians ; and I have long been of the opinion that habits of more strict reserve than have commonly been thought need ful, ought to be maintained by clergymen, with regard to all communications made to them as such, whether formally confidential or not; and that even after an ordinary conversation on any delicate or important subject, it is always best to avoid repeating what has been communicated. No one can tell how many things may occur which may render it peculiarly im portant that he should have kept it to himself. You may publish your own secrets, if you choose to be weak enough to do so ; but you have no right to publish those of others. In general, a public man ought to repeat very little of what is communicated to him. It
while the mischiefs of disclosing it may be endless.
42. It is the fault of many to be loud, and even boisterous in conversation. If the company be ever so large, the moment they become a little engaged and animated, they speak loud enough not only to be heard in every part of the room, but so as to attract and even force the attention of the whole company ; and that, perhaps, when conversing on a subject which ought not to be a matter of such public proclamation. There is no little indelicacy in this. When you are publicly addressed across a room, in such a manner as plainly evinces a desire that the whole company should hear your answer, let your reply be audible, but not loud. Let mildness and dignity mark every word you utter.
43. Guard against the too frequent use of superla tives in your social intercourse. Persons of ardent, impetuous minds, and especially the young, are apt to manifest an undue fondness for the superlative degree in conversation. If they praise any person or thing, they seem to think of using no epithets but those which indicate the highest grade of excellence. If they commend any one's talents, they are sure to represent them as of "the highest order." If they would speak well of a sermon, they pronounce it "incomparably excellent." On the contrary, if they undertake to express an unfavourable opinion, the terms, "con temptible," "execrable," "detestable," are the softest which they think of employing. In short, the more high-wrought their figures, and the more intense and ardent their whole style of expression, the more in teresting they suppose their conversation to be. Let me entreat you to guard against the habitual use of
this vehemence and intensity of language. It is sel dom called for. Men of sense and good taste rarely permit themselves to employ it. A strict regard to truth generally forbids it. And with respect to those who are in the habit of employing it, both their praise and their blame soon become cheap, and, at length, worthless. He who wishes his approbation or his cen sure to go for much, must not be very lavish of either.
44. Seek all convenient opportunities of conversing with the eminently wise and good, and of listening to their conversation. Especially when you are engaged in investigating an important subject, endeavour, if possible, to enjoy the privilege of conversing on that subject with some individual, and even with more than one, of profound views, and extensive reading. You may often learn more in an hour, by conversing with such an one, than by the solitary reading or meditation, of a month. Dr. Franklin once told a friend that some of his most original thoughts were suggested by the collision of conversation ; and that, too, very often upon subjects foreign to those on which he was con versing. And Mr. Fox, the far-famed parliamentary orator, declared in the British House of Commons, that he had learned more from Mr. Burke's conver sation than from all the books he had ever read in his life.*
45. Finally, be constantly and vigilantly observant of the habits in conversation of those persons who are considered as most pleasant and acceptable in this de partment of social intercourse. In every community there are those who are universally allowed to excel
in colloquial accomplishments. Now it will be very unwise to be humble imitators of such persons ; but it will, undoubtedly, be the part of wisdom to take notice of the means by which they attain success ; and to make use of what you see, as your own particular habits and character may render proper. I doubt whether any man ever acquired much excellence in this important art, without the happy talent of close observation, and, in this way as well as by his own good sense, making himself master of the proprieties and delicacies which become the social circle.
MY DEAR YOUNG FRIEND : — To be able to introduce the great subject of religion, in an easy, seasonable, and acceptable manner, in the daily intercourse of society, is a most precious talent, the uses of which are more various, more rich, more numerous, and more im portant, than almost any that can be mentioned.
That this ability, when it exists in a high degree, is, in part, a natural talent, cannot be doubted. The physical temperament of some men is much more favourable to the ready and unconstrained performance of the duty in question, than that of many others. More stress, however, I apprehend, has been some times laid on this fact, than there ought to have been. Not a few allege that they have "no gift" of this kind, and, therefore, content themselves in the habitual neglect of the duty. At any rate, they rarely attempt it, and think that they cannot perform it, even tolera bly. But it would be just as reasonable to plead, be cause an easy, pleasant, and attractive elocution is natural, in a peculiar degree, to some, that therefore others who cannot attain equal excellence in this re(107)
spect, ought not to attempt to speak at all. The fact is, the power of introducing and maintaining religious conversation well, though to a certain extent a natural gift, is yet capable of great improvement, nay, it may be said, of unlimited improvement ; and the true reason, no doubt, -why some persons of plain talents, and with even striking disadvantages of physical temperament, yet excel in this happy art, is that they have taken pains to cultivate a talent so peculiarly precious to the pious mind, and so manifestly useful in all the inter course of life. To what appear to me some of the best means of carrying on this cultivation, I shall advert before closing the present letter.
My first object shall be to point out some errors, in relation to this subject, which appear to me to be pre valent ; and this will prepare the way for a few general counsels for conducting religious conversation, and also for cultivating a happy talent for the discharge of this part of Christian and ministerial duty.
1. It is an error to suppose that religious conversa tion must be introduced on all occasions, and in all companies, indiscriminately, whether the time, the character of the persons present, and the circum stances, favour it or not. No doubt many who have but little taste for such conversation, omit to intro duce it, under the plea that there is " no good oppor tunity," when it is really otherwise. But there can be as little doubt, that there are many occasions, in which no suitable opening for it is presented. On such occasions, to drag forward the subject, in a formal manner, and, as it were, "by main force," is never judicious, and often very revolting. It frequently has the appearance of being done as a kind of official
RELIGIOUS CONVERSATION. 109
task, which is never likely to do good. Be always on the watch for opportunities of saying something for the honour of your Master, and for the welfare of the souls of men ; but do not think it your duty to com pel people to listen to you on this most sacred, im portant and delicate of all subjects, when their char acter, their situation and their employment evidently close up every suitable avenue of approach.
2. It is an error to imagine that the same methods of introducing and maintaining religious conversation, are equally adapted to all persons, and all occasions. If I am not deceived, many adopt the notion that the very same plan of approach will answer in all cases, for the rich and the poor, the learned and the illiterate, the occupant of high office, and the most unpretend ing, obscure citizen. This is to set at nought all the principles of human nature, and to forget that the circumstances of men have much effect in modifying their feelings and character. If we open the Bible, we shall see ample warrant for addressing some per sons on this subject unceremoniously and directly; and others in a more cautious and circuitous manner. In this sense, we ought, with the apostle, to " become all things to all men, that we may gain some;" not by flattering their prejudices, or countenancing their corruptions; but by endeavouring skilfully to adapt our instructions and exhortations to their several habits, attainments, circumstances, and tastes. Those who are most intelligent, and whose pride would be most apt to be offended by an abrupt address, might be approached, and perhaps won, in an indirect and gradual manner. There are thousands to whom I might safely say, " Pray, sir, do you cherish the hope
that you are a real Christian ?" But there are many others, to whom if I were to address such a question, I should expect to be shut out from all opportunity of approaching or benefiting them afterwards. Yet the very same people might, by a little address, be insensibly drawn into a free conversation on the same subject, and to answer that very question without the least offence. This is one of the many cases in which some knowledge of human nature and of the world is essential to a wise discharge of duty. Nor is it a valid objection to this counsel to say, that, if we follow it, we may be tempted to defer too much to human rank, and corrupt refinement. There is, no doubt, danger on this quarter, against which we ought to guard. But the abuse of a thing is not a legitimate argument against its use. Counterfeits do not prove that there is no true money, but rather the reverse.
3. Another very common error in religious conver sation, is to say too much. A man may be " too full of talk" on this, as well as on any other subject. That is, he may talk so much and so long, as to become " a weariness" even to his pious hearers, and much more to those who are not pious. This is far from being a rare occurrence ; and it becomes especially an evil, when the pious sentiments uttered, are all of the most common-place sort ; and, not only so, but dealt out in that common-place, task-like manner, which very sel dom makes a favourable impression among discerning people. Guard, then, against excessive talkative ness, even here. Let what you say on this subject be a real "conversation." Let one object of your address be, to induce others to talk, and disclose their sentiments and feelings, that you may know how to
answer them. Let your part of tKe discussion be as lively, pointed, and short as you can make it. Never allow it to degenerate into formal, tedious preaching, or rather prosing.
4. Once more, it is the error of some to imagine that religious conversation is to be carried on with a tone of voice, and an aspect of countenance, peculiar to itself. Hence, while these persons converse on all other subjects in a simple, easy, natural manner, the moment they pass to the subject of religion, their whole manner is changed. This is a fault as unreasonable as it is repulsive. Why should men cease to speak naturally, when they come to speak on a subject the most interesting and delightful in the world ? Shun this fault with the utmost care. Do not, indeed, allow yourself to fall into the opposite extreme ; I mean talking on the subject of religion with levity. But, at the same time, let all grimace, all sanctimoniousness of manner, all affected solemnity, all lofty dictation, be carefully avoided. The more simple, affable, and entirely inartificial your manner, the more you will gratify all classes ; nor is this all ; the more easy will you always find it to slide insensi bly into religious conversation, without alarming the fears of the most thoughtless ; and the more easy to recur to it again, after a little interruption from other topics.
But, to guard against these errors, is not all that is incumbent upon you in privately conversing with men on their eternal interests. My next object, then, shall
may not be altogether useless. And,
1. My first counsel is, that you make a point of introducing religious conversation, whenever you have a good opportunity, and that you abound in it wherever you go.
It is melancholy to think how many hours ministers spend in company, without saying a word to recom mend either the service or kingdom of their Master. Nay, some of these hours are spent in the company of the truly pious, with whom there is no obstacle to religious conversation ; who expect it ; who desire it ; and who are disappointed at not finding it introduced. To be backward in introducing it in such company is unpardonable. But this is not all. In every com pany and in every situation, be on the watch for op portunities to speak a word for Christ. And when you do not find opportunities, by a little address, you may make them : and you will often do so, if you have as eager, and incessant desire to do good, as the miser has to turn everything into the channel of gain, and the ambitious man to gather laurels from all quarters. I have often been struck with that passage, in which the apostle Paul, when writing to the Hebrews con cerning ministers, says — "They watch for souls." And, truly, the minister who acts on the principles of enlightened fidelity will thus " watch," not only in the pulpit, but daily, and in all the walks of private in tercourse. Let me entreat you, then, to lose no good opportunity of conversing on the most precious of all subjects. Let your conversation continually be "with grace, seasoned with salt, that it may minister grace to the hearers." You may say a thousand useful
things in private conversation, which you never could utter in the pulpit. You may answer questions, solve scruples, obviate objections, reprove faults, and com municate knowledge in the parlour, which could by no means be brought into the sanctuary. Above all, in many cases of private discourse you may come near to the heart and the conscience, and adapt your in structions to individual exigencies, in a way altogether impracticable in addressing a public assembly. It has, therefore, often occurred to me as a fact equally won derful and humiliating, that Christian ministers are not commonly more vigilant in availing themselves of this advantage, and more unceasing in the use of it : that their minds are not found teeming with good thoughts, pious hints, and instructive, weighty senti ments, as well as direct addresses, wherever they go.
2. Cultivate the important art of introducing con versation on the subject of religion in an easy and happy manner. One of the greatest difficulties attending this whole subject is to begin well. A formal introduction of the subject ; an introduction which, as it were, announces beforehand the intention of talking piously; and which, of course, excites the fears of those who have no taste for such conversation, ought certainly, in ordinary cases, to be avoided. No less undesirable is an abrupt commencement of this species of conversation, that is, suddenly entering upon it, when something very different had been, the instant before, the subject of discourse. But why should we ever do either of these ? What subject can possibly be started, by any individual, or in any company, which a man of good sense, and whose heart is filled with pious and benevolent emotions, may not soon, 10*
and without violence, convert into a medium of some useful suggestions on the subject of religion ? The state of the weather ; the prospects of the husband man ; the news of the day ; an ordinary domestic occurrence ; the return of spring ; the approach of autumn ; or an accident on the road ; — these, or any analogous topics which may be hinted at, furnish ample occasions for the introduction of pious senti ments ; insomuch that a social circle might, by a per son of tolerable address, and of the proper spirit, be translated from the region of perfect levity, to the region of serious and devout reflection, before they were aware that the transition was intended. This is a happy art. All may learn it who will be vigilant enough, and take pains enough for the purpose. With a moderate knowledge of human nature ; a tolerable address ; a little attention to incidents as they arise ; and a heart glowing with a desire to do good, the task is easy. " Covet earnestly this gift ;" labour without ceasing to gain it ; and you will not labour in vain.
3. Let your conversation be adapted to the charac ter of the company into which you may happen to be thrown. If the company with which you are called to converse, be all professors of religion, there will, ordinarily, be little difficulty in adapting your dis course to them ; for you may speak directly and pointedly on any topic which occurs as important. Especially, you may enter with freedom into all the refreshing richness of conversation on Christian ex perience. If, on the contrary, the company consist altogether of gay and worldly people, your utmost ingenuity will often be put to the test in leading them on to instructive and edifying, as well as pleasant
discourse. Yet even this may be done, if you take them by the right handle. When the circle in which you are seated, as mil be apt more frequently to happen, is made up partly of professors of religion, and partly of those who are not so, a very happy use may be made of the former, as a medium of conveying instruction to the latter. As it is oftentimes one of the most effectual modes of addressing parents, to do it through the medium of their children ; so we may frequently speak to the worldly and thoughtless most impressively through the medium of the pious, who are seated in their presence. In short, study diligently the different tastes and habits of the aged and the young, the polished and the rough, the learned and the illiterate, the fashionable and the plain, in whose society you may find yourself; and endeavour to have "a word in season," a set of topics, and a mode of treating them, adapted to their several characters.
4. Guard against giving your remarks on religion, in the social circle, an air of dictation and authority. This caution, which was mentioned before in reference to common conversation, is no less important in refer ence to the subject of religion. Ministers, from the circumstance of their being so much accustomed to speak with authority from the pulpit, are apt, spon taneously, and even insensibly, to fall into a similar manner of speaking in private ; to be impatient of contradiction ; and to feel, when their opinions are in any measure controverted, as if their official dignity were invaded. Let no spirit or feeling of this kind intrude into your social intercourse. The more en tirely you can divest yourself of it, and sit down with your friends and associates on terms of perfect
equality, as a friend and brother, who claims no authority over their consciences, but is actuated su premely by a regard to their temporal and eternal interest, the more easy and affectionate will your con versation be, and the more likely will you be to make a favourable impression on their minds,
5. In conducting religious conversation, as much as possible avoid theological controversy. I before cau tioned you against the habit of falling into controversy on any subject in company. But I would now warn you that religious controversy, when you are con versing with persons with a view to their spiritual benefit, is peculiarly undesirable, and ought to be avoided as much as possible. I say, as much as pos sible ; for there are doubtless cases in which it is not possible to avoid it, without shrinking from the defence of the truth. You will sometimes fall in with persons, who, from a love of disputation, from ill manners, from enmity to the truth, or from a desire to put your in genuity to the test, will compel you either to be silent, or to defend your opinions. When you meet with such persons, you must manage them in the best way you can. Do not, however, even with such, allow a dispute to be much protracted. Draw it to a close as soon as practicable. Carry it on, while it lasts, with all the "meekness and gentleness of Christ." And let them see that you take no personal offence at having your opinions questioned ; but simply desiro to defend what you deem truth, and to guard them from injurious error.
But in all cases in which controversy can properly be avoided, by all means decline engaging in it. Theo logical disputes, in the social circle, are seldom profit-
able, and often highly mischievous. They sour the temper ; but commonly leave each party confirmed in his original opinion. In your ordinary religious con versation, then, keep as clear of what are called dis puted points in theology, as possible, consistently with conveying sound and useful instruction in divine truth. When you are compelled to touch on them, let it be under a practical rather than a polemical aspect, and in terms as little adapted to give offence as possible. When you perceive the most distant symptom of ap proaching controversy, take measures to avert the impending storm. This may commonly be done by a few kind words, or by giving a practical turn to the argument. It may be easy to prevent the evil ; but by no means so easy to cure it when we have once fallen under its power.
6. You will sometimes fall in company with infidels, who totally reject revelation. Conversation with them is always a delicate, and often a difficult task. Make a point of treating them respectfully, as long as they maintain decorum on their part; and even if they scoff and blaspheme, do not suffer yourself to be so far borne away by irascible feeling, as to address them in opprobrious language. As long as their deport ment admits of your continuing to argue with them, do it in the spirit of meekness and benevolence. In addressing them, do not permit yourself to call them by hard names, or to impute to them base motives. Endeavour to convince them that you are actuated, not by a spirit of personal resentment, or wounded pride ; but by a regard to the cause of God, and their own eternal welfare. In arguing with them, however, do not merely stand on the defensive ; but show them,
on the plan of Butler's " Analogy," and similar books, that most of the objections which they urge against Revelation, lie with equal force against natural religion, which they commonly profess to believe. I have sel dom seen an unbeliever who was able to stand five minutes before the argumentum ad hominem plan of treatment. Above all, in addressing them, while you appeal to their understandings, never fail, in a mild and respectful manner, to appeal to their consciences and their hearts. All my experience tells me that nothing is so likely to impress them as this.
7. In conversing with persons of a different religious denomination from your own, there is need of much vigilance both as to the matter and manner of your conversation. In all such conversations, guard against either manifesting or feeling a proselyting spirit. Be much more anxious to see them Christians, than to see them Presbyterians. Dwell, therefore, much more on the fundamental and precious points of our com mon Christianity, than on the peculiarities of either their or your church. While they see that you are deeply serious, and anxious to promote their eternal welfare, let them perceive that you are not anxious to win them to your party. Agree with them as far as you can. Treat them with pointed respect and atten tion ; if they appear pious, with as much affection as if they belonged to your particular denomination ; and even if they make overtures for joining your own church, do not be ready to catch at their proposal. Manifest no eagerness to receive them. On the con trary, rather show, in all their extent, the difficulties which lie in the way of transferring their religious connection. However unworthily, in relation to this
never allow yourself to imitate their pernicious example.
8. The introduction of religious conversation among entire strangers, is often very desirable and important ; and yet, frequently, requires no little address. I said that it is often very desirable and important; for more than once have I known a minister to be in company a whole afternoon, or longer, with a circle of strangers, several of whom, though unknown to him, were earnestly desirous of hearing him engage in religious conversation ; and were not a little dis appointed to find the interview at an end, without his having introduced it. Many a precious opportunity of instructing the ignorant, of directing the perplexed and inquiring, and of comforting the sorrowful, has been thus lost. Guard against all such omissions. Never allow yourself to be half an hour in company, even with the most perfect strangers, without endea vouring to ascertain whether any of them have a taste for serious conversation. There are many ways of ascertaining this, without intrusion or indelicacy. A cursory remark, or an apparently incidental inquiry, may, and probably will, elicit enough to solve your doubt. Many a precious conversation has resulted from such an exploring remark or inquiry. Like the discovery of a refreshing spring in a parched and dreary wilderness, not unfrequently has a minister of the gospel, as well as a private Christian, met with a spiritual feast himself, and been the means of impart ing a feast to others, when he least of all expected such a pleasure ; when, perhaps, he was ready to say within himself, " there is no fear of God in this place."
tion with persons of wealth, and high station in society, is a peculiarly important, and, at the same time, a very delicate and difficult duty. Peculiarly important, because any good impression made on them, will bo likely to extend itself more widely ; and in many re spects, delicate and difficult, because this class of per sons are more in the habit of being approached with deference, and, for various reasons, more apt to be nice, and even fastidious in their feelings, than many others. At the same time, I have no doubt that the difficulties of this duty have been, by some, greatly overrated ; and that plain, good sense, with a heart overflowing with piety and benevolence, will be found, humanly speaking, a safe and adequate guide, in all ordinary cases. My advice on this point shall Ibe short. Never, on any account, court or aifect the company of the wealthy and great. Never take pains to be much with them ; and never boast of their ac quaintance. When you are providentially thrown in their way, sacredly avoid every thing that approaches to a supple, sycophantic spirit of accommodation to their errors or vices. Never accost them with that timid, embarrassed diffidence, which may lead them to suppose that you have more veneration for them, than for your duty or your God. At the same time, let nothing of the unmannerly, the sullen, or the morose mark your deportment toward them. An old divine was accustomed to say, " Please all men in the truth ; but wound not the truth to please any." Let them see that Christian duty is not inconsistent with the most perfect politeness. Introduce pious thoughts, and divine truth, to their view, in a gentle and some times in an indirect manner ; and let them see that
you are much more intent on doing them good, than gaining their favour. When you have occasion to oppose them, let it be done mildly and meekly, but firmly ; with the air of one who dislikes to oppose, but feels constrained to " obey God rather than man." In a word, I believe that a minister of the gospel never appears to more advantage in the view of those who are considered as the great ones of this world, and is never more likely to make a deep impression upon them, than when he makes them to feel, not by ostentation, sanctimoniousness or austerity; not even by importunately soliciting their attention to his own views of truth and duty, but by exhibiting meek de cision of spiritual character, that they are in the pre sence of a man, who regards the authority and favour of God above all things, and whose supreme and habi tual object is to promote the everlasting welfare of his fellow-men.
10. Never imagine that it is your duty to violate good manners, either in introducing or continuing religious conversation. This is never proper, because never necessary. If you cannot persuade an indi vidual, by a mild and respectful mode of address, to listen to you, it is better to forbear. An attempt to force what you have to say, on one who steadfastly or profanely resists you, is "casting pearls before swine." And violating the respect which is due to any person, under the notion of promoting, in this way, his spiritual interest, is, usually, of all delusions one of the greatest. If you watch for the mollia tempora fandi, you will have an opportunity of ap proaching him, if he be accessible at all. If you wait, with a proper temper, and with humble prayer, for a
bably, riot wait in vain.
11. When you are called to converse with persons under religious impressions, address yourself to the duty with much seriousness and prayer. Remember that what you say, may influence their eternal condi tion ; and, therefore, that every word is important ; important to them, to yourself, and to the church of God. Remember, too, that the task of instructing and guiding those who are " asking the way to Zion," is as delicate and difficult as it is important. It re quires much knowledge of the human heart, and of human nature, and much acquaintance with the gospel as a practical system. Study to qualify yourself for this interesting and momentous duty, by much converse with your own heart ; by much intercourse with those whose ministry God has eminently blessed ; by reading the best books which tend to throw light on Christian character and experience ; and, above all, by humble importunate prayer for that wisdom which is adapted to "win souls," and to guide "them in the way of peace." He who allows himself to enter on this duty without much consideration, and humbly looking to heaven for aid ; or to perform it in a slight and careless manner, must make a miserable estimate both of minis terial fidelity, and of the worth of immortal souls.
12. Before you enter on the duty of conversing with any one on this most important of all subjects, en deavour, if possible, to learn something of the peculiar character and temperament of the individual. There are peculiarities of this kind, which frequently exert an immediate and important influence on religious exercises. Some persons have a remarkably sanguine
temperament, and buoyant animal spirits, which are apt to impart ardour to their feelings on all subjects, and, of course, to confer on their religious impressions the appearance of more decision and intensity of char acter than they really possess. Others labour under a constitutional depression of mind, which is ever dis posed to look on the dark side of things, and some times borders on melancholy, and even despondency ; and which always prevents them from doing justice to the evidence in their own favour ; while a third class are affected with some bodily disease, which not unfrequently benumbs or agitates the mind, and creates no small difficulty in judging of its real state. Now in conversing with an individual who is anxious re specting his eternal interest, it is of great importance to know whether he is under the special influence of any of these physical difficulties, or temperamental predispositions. For, by the result of this inquiry, the course to be pursued must be in some measure modified. The undue confidence of some ought to be firmly repressed ; and the precipitancy of others restrained or cautioned. The backwardness of the timid should be stimulated, and the trembling appre hensions of the melancholy and desponding, if possible, removed, by affectionate encouragement. The wise physician of the body is always careful to inquire about the presence of disturbing forces in the mind, and prescribes accordingly. In like manner, the wis'e physician of the soul will endeavour to explore every physical idiosyncrasy which distinguishes the spiritual patient to whom he may be called, and address him in a corresponding manner. If you have not already a particular acquaintance with him, make such inquiries
respecting his habits, life, temperament, and other peculiarities, as may put you in possession of all the requisite information. And instead of making your conversation, if such it may be called, to consist chiefly of continued address on your part, which is the favourite manner of some, resort much more to the plan of affable and affectionate interrogation, which will lead the individual, at every step, to dis close the state of his own mind, and thus furnish you with some of the best indications for adapting your addresses to his case.
18. Be careful to give clear doctrinal instruction concerning the plan of salvation to those who are anxious and inquiring. I have observed* it to be the manner of some in conversing with such persons, to deal chiefly in tender and solemn exhortation ; under the belief that the grand object aimed at ought to be to impress the conscience and the heart, rather than to impart doctrinal knowledge. But it ought to be remembered that neither the conscience nor the heart can ever be suitably impressed but through the medium of truth. It is only as far as gospel truth is appre hended, that any genuine scriptural exercises with re gard to it can exist. Carefully study, then, to impart to every anxious mind clear views of the fundamental doctrines of the gospel. Not that, in conversing with such persons, you are ever to perplex them with the metaphysical refinements of theology, which ought ever to be, as far as possible, avoided. But the course which I deem of so much importance is, that you con stantly endeavour to fill their minds with plain, simple, connected Bible truth ; that you dwell on the scriptural character of God ; the nature arid requisitions of his
holy law ; the pollution, guilt and danger of all men in their natural state ; the divinity of the Saviour ; the efficacy of his atoning sacrifice ; the unsearchable riches and freeness of his grace ; the work of the Holy Spirit in regenerating and sanctifying the heart ; and the utter helplessness, and, at the same time, perfect responsibility and blameworthiness of man. Just as far as these great doctrines are fastened on the con science, and impressed on the heart, and no further, may we hope to become the instruments of saving benefit to those whom we address.
14. Be not too ready to speak peace or to administer consolation to those who are in a serious, anxious state of mind. It is, undoubtedly, painful to see any one in distress ; and the spiritual physician will be often strongly tempted by false benevolence, to encourage, and administer comfort, where he ought not. Beware of this. It is far better that an anxious inquirer after salvation should pass a few more weeks or months in a state of deep mental solicitude, arid even anguish, than that he should be prematurely comforted, and led to repose in a false hope, from which he may never awake. Be not afraid, then, to be perfectly faithful : to lay open every wound to the very bottom, before you attempt to heal it. Be slow in administering comfort, while the least doubt remains with regard to the real state of the individual. Indeed I have often thought that it is very seldom proper for a minister, or any other pious man, in conversing with an anxious person, to be forward to pronounce a favourable judg ment with respect to his state. You may be deceived in your opinion, and you may be the means of de ceiving him fatally. It is, in general, much safer 11*
and better for him to be brought to a favourable con clusion concerning himself, by that heavenly teaching, which cannot deceive ; and which, though sometimes more tardy in exhibiting its results than earthly wisdom expects and desires, always furnishes the safest and best testimony.
15. Be not hasty in publishing the exercises or situation of those whom you know to be anxiously inquiring. It ^ deeply painful to observe the fre quency and injudiciousness with which this rule is in fringed. A person, perhaps, has scarcely become conscious to himself of deep solicitude respecting his spiritual interest, and given a hint of it to his minister, or to some pious friend, before it is blazed abroad ; becomes matter of public speculation ; and leads a number of persons immediately to crowd around him, and offer their services as his instructors and guides. The consequences of this method of proceeding are often extremely unhappy. Some are puffed up, by becoming objects of so much unexpected attention and conversation. Others are revolted, and, perhaps, deeply disgusted, at being addressed by so many on the subject of their exercises, and by some, it may be, very injudiciously. While a third class, whose im pressions are slight and transient, are mortified at being held up to view as awakened persons, and after wards lying under the odium of having gone back ; and, possibly, in some cases so much mortified, as to withdraw from those individuals and opportunities, which might have been essentially useful. Besides all this, it has often happened, that the number of serious persons who have immediately clustered around an individual thus publicly announced as under religious
impressions, has been so great, and their talents, knowledge, experience, and capacity for giving sound instruction so extremely various, that they have per plexed, confounded, and most unhappily retarded, the object of their well-meant attention, instead of really helping him. With almost as much propriety might a physician of the body, when he found a patient ill of a dubious disease, throw open his apartment to every intruder, and invite every medical practitioner within twenty miles of him, however discordant their theories, to come in and prescribe at pleasure for the sufferer.
My advice is, that, when you ascertain that any one is becoming seriously thoughtful on the subject of religion, you keep it, for a short time, to yourself: indeed, that you thus keep the fact, until his exercises begin to assume a definite shape and character ; being careful, in the meanwhile, to attend to the case with conscientious diligence yourself. When you judge the wray to be open, communicate a knowledge of the situation of the individual to one or two of those per sons in whose knowledge, piety and prudence you have most confidence, and whom you know to have the pe culiar confidence of the individual in question. The case of the spiritual seed is a little like that of the natural. When we place a seed in the ground, we allow it a little time to vegetate under the conceal ment of the soil. He who should go every few hours to the spot, where it was deposited, and drag it forth, in order to see how the process of vegetation was going on, would be considered as a very unwise culti vator. So he who, in regard to seed of a much more important and delicate nature, will not give it time to
shoot and grow a little, before it is forced on the public gaze, acts a part, I must think, by no means adapted to promote the best interests either of the individual immediately concerned, or of the church. If he would consent to wait a short time, the view taken would probably soon be found much more pleasant and edifying, or to assume a character which ought not to be made public at all.
16. Guard against conversing too much at one time, with those who are under serious impressions. I am deeply persuaded, that, in many cases, the minds of such persons, in consequence of being incessantly plied with conversation, even though of good quality, yet excessive as to quantity, have been kept in a state of agitation and conflict, longer than they would probably otherwise have been. And the evil has been, no doubt, increased, as I just hinted, when a number of individuals, of different degrees of knowledge, piety and judgment have undertaken to inculcate, each his peculiar views, on the persons in question. I am con fident that although persons in this deeply interesting state of mind, ought to be frequently instructed and exhorted, by competent counsellors, yet few things aro more injurious to them than to be annoyed by incessant, common-place conversation. It is an utter mistake to suppose that they are benefited by being always in society, even of the best kind. They need much time for retirement, self-examination and prayer, and ought to be referred much to the word of God, arid the teaching of the Holy Spirit. A few thoughts at a time, from a pious friend., clear, seasonable, instructive, and to the point, will be most likely to be useful. After receiving these, at suitable intervals, they ought
to be left much in their closets, with their Bibles and their God ; and to be frequently told to look rather to the Saviour than to man for help.
17. If, after becoming a pastor, you should be so happy as to know of any considerable number of in dividuals in your congregation who are beginning to think seriously on the subject of religion, it may be come desirable to convene them weekly, or as often as convenient, for the subject of receiving instruction and exhortation together. This practice has been much recommended by experience, and is attended with several very important advantages. It enables a faithful pastor to accomplish more in the indispensable duty of conversing with the serious and anxious, in a single afternoon, or evening, than would be practicable in a week, in the ordinary method of visiting from house to house. The appointment of such a meeting, too, may induce many persons who are really in some degree serious, to come forward and put themselves in the way of conversation on the subject of experimental religion, who, if no such opportunity were presented, might conceal the state of their minds, and lose the advantage of being personally and pointedly addressed. I am also inclined to think that every pastor, even when there is not sufficient attention excited among his people to keep up such a weekly meeting of in quirers as I have described, ought to have a stated time, occurring as often, at least, as once a fortnight, and distinctly made known to his people, when he will make a point of being at home, and ready to attend to any, whether professors of religion or not, who may wish to converse with him on their spiritual state. And some will go, perhaps, and be happily led to the Saviour, who, but for such an appointment, would, humanly speaking, have lost their serious impressions, and hardened themselves in sin. Who does not know that, when the mind begins to be exercised on the subject of religion, the merest trifles will, in some cases, serve as excuses for conceal ing the fact ? The inquirer will feel, it may be, that he ought to converse with his minister ; but he cannot summon resolution to venture on the interview. He fears, perhaps, that he will not be at home ; or that he will have company ; or be otherwise engaged ; or that it will be difficult to disclose to him his feelings. But if he knew that his minister, on a certain day, would be at home ; that he would have no other engagement ; that he would be hoping and desiring to see persons in his state of mind ; and that his very appearance at the house of his pastor on that day would itself disclose the object of his visit, and furnish an introduction to a free conversation ; his excuses would probably all vanish, and he would avail himself of the precious privilege.
If you should ever make such an appointment as I have last mentioned, and, if on the recurrence of the day, for several times, you should have no visitors, be not discouraged. Continue the appointment; and give public intimations, from time to time, in the manner that you may judge most suitable, that it is made in vain. No one can tell how far such intimations may serve to rouse up the pious, arid excite them to prayer and exertion.
18. Be not too hasty in encouraging those of whose seriousness you have a favourable opinion, to go forward and make a profession of religion. This is undoubt edly often done with very undue precipitation. Per sons of very tender age, and others, previously of very equivocal character, have been, literally, hurried to the Lord's table in less than a week after the com mencement of their serious thoughtfulness ; without allowing them time fully to "count the cost;" and before they were able to put their exercises to such a test as might be satisfactory to themselves or others. Hence many young persons, of both sexes, in a few months or even weeks, after making this solemn pro fession, have found themselves unexpectedly bereft of all comfortable hope ; their evidences of Christian character gone ; their interest in the subject in a great measure lost ; and their minds filled with regret that they had been so hasty. It was now, however, diffi cult to retreat, and their whole lives, perhaps, have been spent in a heartless, and of course, a comfortless profession.
It is readily granted that neither scripture nor rea son fixes any precise period, during which candidates for church communion are bound to wait, in order to put the stability of their religious character to the test. And it is equally evident, that extraordinary cases ought to prescribe rules for themselves. But, in general, it is evident that there ought to be a few months, at least, of serious and prayerful deliberation, before taking a step so solemn, so momentous, so irrevocable ; a step likely to be followed with so many interesting consequences to those who take it, and to the sacred family with which they propose to become
connected. Let no desire to see the rapid multiplica tion of professors, ever lead you to depart from this principle. I have more than once repented having given what afterwards appeared to be premature en couragement to come to a sacramental table ; but never did I repent advising to a few months' deliberation and delay, when the preparation was doubtful.
19. In conversing on the subject of practical religion, especially with those who are not well informed on the subject, be sparing in the use of that technical lan guage, which many continually employ. I refer to a number of phrases, of standing use in many pious circles, which, although the meaning intended to be conveyed by them is undoubtedly correct and important, are yet so remote from the language of ordinary social intercourse, that they sound strangely, not to say un intelligibly, out of the circles to which I allude. Many pious ministers and others are in the habit of using this language in a manner, and to an extent, which I know render their conversation not a little re volting to those who are unaccustomed to it, and fre quently present a serious obstacle in the way of their acceptance and usefulness.
As it is desirable not to be misunderstood on a sub ject so important, I think it proper to give a specimen of the phrases to which I refer. Thus it is by no means uncommon to hear it stated, that " a great re vival has broken out" in such a place ; that there is "a great religious stir" in this or that congregation; that such an individual, or such a number of individ uals, have been "struck under conviction;" that a particular person appears to be " in the pangs of the new birth;" that a person whose anxiety on the sub-
ject of religion is very great, "has been roughly handled, but is likely to be brought through ;" that such another "has been happily brought through;" that so many, in a certain place, are " brought under conviction," and so many "have obtained hopes," &c. Now, although I am confident I need not assure you, that I am a warm friend to revivals of religion ; although the ideas intended to be expressed by the phrases in question are, in my view, perfectly sound and scriptural, and infinitely momentous ; and although any one who is capable of ridiculing these ideas, " knows nothing yet as he ought to know ;" yet I can not think that the use of these phrases, especially in mixed companies, is advisable. My objections to them are several. Some of them are, in a great measure, if not altogether, unintelligible to many to whom they are addressed. Others are derided as vulgar cant, as terms expressive of the appearance of a plague or pestilence, rather than of a rich blessing, and which rather repel, than instruct or conciliate. While a third class are regarded as a presumptuous invasion of the prerogative of Him who alone can know the heart, and tell the number of those who have become reconciled to him. Would it not be better to use language which all seriously disposed persons understand and approve ? Would it not be quite as expressive, and more intelli gible to many, if you were to say, that " a revival has commenced," or "a work of divine grace appears to have commenced," in such a place : that a particular individual is "under serious impressions," or is "deeply anxious on the subject of religion," or "appears to be convinced of sin," or is "in great distress of mind ;" that " many appear to be awakened from a state of
I presume, if you had occasion to interrogate an intelligent stranger, who you had reason to fear was destitute of piety, in relation to the state of his mind, on the subject of religion, you would hardly think it wise to begin by saying "Pray, sir, are you born again? or, are you yet carnal?" Yet, why not, as both the principal phrases in this question are taken from the Bible, and as you and I fully believe these phrases to be expressive of important realities ? Your reason, I suppose, for not thinking it wise, would be, that this language is very imperfectly, if at all, under stood by many who are well informed on other subjects ; and that such persons, because they have frequently heard it bandied about by the ignorant and fanatical, and cannot enter into its precious meaning, are gene rally revolted by it.
I am far from agreeing with Mr. Foster, the pious and eloquent English essayist, in his proposal to dis card what he calls, the " theological dialect," the " technical terms of evangelical religion." I am afraid that, if these terms were dismissed, the things intended by them would soon disappear also. I do not wish a single Bible phrase to be banished either from the pulpit or the parlour. Yet, I can easily conceive that there are even Bible phrases, which may be advanta geously exchanged for others, more familiar to those who are ignorant of the Bible, and better adapted, until they become enlightened, to convey spiritual ideas to their minds. It is, evidently, on this principle that ministers, every Sabbath, in the pulpit, explain scrip-
ture, by using more common language, and that which is better understood, to express its heavenly doctrines. But the language which I advise you to avoid, is not, as commonly employed, Bible language at all. And I see no advantage, but rather the contrary, in the use of terms, against which many are strongly prejudiced ; and which, if they do not deserve the name of cant, will certainly, by many, be considered as bearing that character. Let your general rule be, in conversing on the great and precious subjects of revivals of re ligion, and Christian experience, to employ terms which are warranted by scripture, and the most en lightened practical writers, and adapted to make the best impression on those whom we address.
20. Take pains to prepare yourself for conducting religious conversation in an easy and edifying manner. For this purpose, be familiar with practical books, and especially with the lives of eminently pious men. Take a few minutes to premeditate before you expect to go into the company of any person or persons on this important errand. Adjust in your own mind topics and thoughts for discourse, adapted to the cases of those whom you expect to meet. Study some variety in this matter. If you go over the same common-place, narrow, little round of remark, in all companies, for thirty or forty years together, you will soon entirely cease to interest any one, unless, per haps, a stranger, who happened to hear it for the first time. Above all, let every attempt to perform the service in question, be preceded by humbly asking for divine help. Remember that God " will be inquired of" to grant us his aid; and that "he will not give his glory to another." Remember that he can render
the feeblest sentence that ever escaped the lips of simple piety, richly and eternally beneficial : while the most able and well conducted conversation, if admin istered without imploring a blessing upon it, may, and probably will, prove useless to all concerned.
21. If you desire to gain an easy, natural and attractive manner of introducing and maintaining re ligious conversation, let the foundation of all your efforts at improvement in this respect, be laid in the culture of the heart. Study daily to grow in vital piety. Perhaps there is nothing more indispensable to the happy discharge of the duty under consideration than that the heart continually prompt and speak ; that heart-felt emotion and affection dictate every •word, and tone, and look, while engaged in addressing a fellow-creature on the most important of all subjects. Truly, without active, fervent love to God, and to the souls of men, it will be vain to hope for the attainment of this happy art, in any considerable degree. But if your heart habitually glow with interest in this subject ; if the "love of Christ constrain you ;" if you daily cherish a tender concern for the salvation of your perishing fellow-mortals ; if your mind be con stantly teeming with desires and plans to do them good ; then religious conversation will be as natural as to breathe. Then your lips will be opened season ably, unaffectedly, and profitably to all around you. Then, instead of being at a loss what to say ; or being timidly backward to say it ; or saying it in an em barrassed, awkward, pompous, or unnatural manner ; there will be a simplicity, a touching tenderness, a penetrating skill, a native gracefulness, an unction in your mode of conversing, which no spurious feelings
can successfully imitate. The true reason, I have no doubt, why religious conversation is so often what it ought not to be, and so often useless, is that it is so seldom the offspring of that unaffected, warm, spiritual feeling, which piety of an elevated characted alone can give.
22. Finally, it will be a stimulus to diligence, and an auxiliary to improvement, in the precious art of religious conversation, if you daily and faithfully call yourself to an account for the manner in which you have performed this duty. We stand in need of some thing of this kind to quicken us in every department of our Christian work ; and in none more than those which consist in frequently recurring details, rather than in single great acts. Never retire from any com pany, then, without asking yourself, " What have I said for the honour of my Master, and for promoting the everlasting welfare of those with whom I conversed ? What was the tenor of my conversation ? What op portunity of recommending religion have I neglected to improve ? From what motives did I speak, or keep silence ? In what manner did I converse ? With gentleness, modesty, humility, and yet with affectionate fidelity ; or with harshness, with formality, with osten tation, with vanity, and from a desire to avoid censure, or to court popular applause?" Few things, I be lieve, would have a more powerful tendency to promote watchfulness, diligence, and unremitting perseverance in this important duty, than the constant inspection and trial of ourselves here recommended.
VISITING.
MY DEAR YOUNG FRIEND : — Ministers are visitors by profession. It is a large and essential part of their official duty to teach and exhort " from house to house." Of course, every thing which tends to give this part of their work a better direction, and a more happy influence, is highly important to them, and to the cause of religion. Yet I have been constrained seriously to doubt, whether any thing, in the whole circle of ministerial, activity is, commonly, less appre ciated, or worse managed. Accordingly, that which might be made a most powerful instrument for con ciliating the good will, and promoting, in various ways, the best interests of those who are committed to their charge, many ministers are too apt, from indolence, or want of skill, so to conduct, as to make it of little value, as a source either of pleasure or profit. Allow me, then, with the same freedom with which I have offered you my counsel on other subjects, to suggest a few thoughts on this. My own experience convinces me that there is need of such suggestions, and that they may often dp much good. For although I am
conscious of not having accomplished, while I was a pastor, all that I might and ought to have done, in reference to this part of my duty ; yet, if I had known as much at the commencement of my ministry, as I now do, of its importance, and of the means of con ducting it, I should have pursued, if I do not deceive myself, a very different course.
styled social.
I. By the pastoral visits of a clergyman, I mean those visits, of a formal character, which, in his clerical capacity, he pays to the families and individuals under his pastoral care. Of these visits, as distinguished from others, it is desirable that you should have just and appropriate views. In reference to such visits, I offer the following advices.
1. My first advice is, that you by no means neglect them ; nay, that you be constant and diligent in making them. If you desire to gain the love and confidence of your people ; if you wish to instruct and edify them in a great variety of ways which the nature of pulpit address does not admit; if you deem it im portant to be well acquainted with their situation, views, feelings, difficulties, and wants ; then visit every family belonging to your congregation frequently, systematically, and faithfully. I say frequently. How often, must, of course, depend on the number of families belonging to your charge, arid on the number of your avocations. But I should say, in the largest congregation, at least once a year ; in one of medium size, at least twice ; and, in all cases in which it is practicable, still more frequently. In short, the
in a proper manner.
2. Attend to this duty systematically. Do not leave it to the caprice or the convenience of the mo ment. If you do, but little will be accomplished. Company, trifles, languor, procrastination, and a host of other obstacles, will incessantly stand in the way of performing what you really wish and resolve to perform. Have your fixed days in the week' for visiting; and address yourself to it with the same fixedness of purpose, and the same inflexible perseve rance, which you employ in preparation for the pulpit. In most situations a pastor may visit, on an average, from twelve to fifteen, or twenty families in a week ; and, where the population is unusually dense, even more. If such an average, or anything like it, were carried through a year, what an interesting result would be obtained ! The truth is, it is almost incredible what patient industry will accomplish. If any imagine that this is a drudgery to which a man of active mind can hardly submit, and that the time would be better employed in enriching and polishing discourses for the sacred desk, I can only say, all scripture is against them ; all experience is against them ; nay, all reason is against them. To say nothing of other considera tions, one of the best auxiliaries in studying sermons, of which a minister can avail himself, is an intimato and deep acquaintance with the people of his charge. Rely on it, he who hopes to discharge the duties of the pulpit, ably, appropriately, seasonably, and to the greatest advantage of his flock, without being much among them, entertains a hope which is perfectly un reasonable, and will certainly be disappointed.
3. Let every official visit be preceded by prayer. If we believe in the doctrine of a particular Provi dence ; if we believe that the Lord whom we serve, and in whose name we go forth, has all hearts, and all events, even the most minute, in his hands ; is it not manifest that we ought to preface every attempt to do good to others, by humble, importunate prayer, that both they and we may be so enlightened, influ enced, and guided, and that every thing may be so ordered, as that our effort may be crowned with a blessing ? That minister who does not distinctly and earnestly ask for a blessing upon all his labours, has no reason to expect that he shall receive it.
4. With a rigorous adherence to system in perform ing this duty, unite habitual, persevering faithfulness. Let it be your study, in the fear of God, to render your visit, however short, as useful as possible to the individual, or the family, of which it is the object. For this purpose, consider, before you enter their dwelling, their situation, their character, their circum stances, their temptations, their wants : and look up to the Giver of all grace for wisdom and strength to perform your duty aright. As to the precise manner in which each interview shall be conducted, I appre hend that no uniform rule can be laid down, which will suit all cases equally well. I would only say, let a word be dropped in season to young and old ; parents and children ; masters and servants ; those who are in the communion of the church, and those who are not. In short, let no time be voluntarily lost in vain conversation. Let there be as much of heavenly wisdom, of solid instruction, and of solemn impressive exhortation, as you can possibly crowd into the time
allowed you ; and, in all cases in which circumstances allow of it, close with prayer. For the rest, your own piety and good sense must direct.
5. In attending to this duty, guard against a formal, task-like mode of performing it. Few things are more repulsive than to see a man going from house to house, running over a round of common-place expressions, however pious ; not from feeling, but from habit ; putting on a constrained, sanctimonious countenance and in a measured voice and manner, reciting, not what the company or the case before him demands ; but what, from the frequency of its repetition, falls most readily from his lips. Never will the discharge of the duty in question, by any man, be either profit able to others or pleasant to himself, unless, with a feeling sense of its importance, and an anxious con cern for the welfare of souls, he enters into the spirit of it, and applies his mind to each case as it arises, with a tender interest. The physician of the body, if he be called to fifty patients in a day, examines the symptoms of each, and inquires into his minutest sensations, with the most scrupulous exactness. If he fail to do this, his practice will be without success, and his character without confidence. Let the physician of the soul be at least as vigilant, and as anxious to adapt his ministrations to each particular case. Let him sit down with affectionate simplicity in the family or circle which he wishes to benefit; and, without erecting any of the barriers of official formality be tween himself and them, endeavour to learn the real character and wants of each, and to have " a word in season" for each. An appropriate word. A word uttered with a countenance, tone and general manner
meek and benevolent religion.
6. Be careful to extend the visits in question to the poor as well as the rich. Nay, if you make any dif ference, let it be in favour of the former, rather than of the latter. Your Master directed special attention to the poor. The gospel is peculiarly adapted to them. And they are more apt to receive evangelical atten tions with gratitude than the rich. Of course, the probability is, that you will find more fruit of your labour among the poor. And, you may rely upon it, the rich themselves will never esteem or love you the less, for observing that you pay particular attention to the indigent and afflicted.
7. Study to make your visits as instructive and in teresting as possible. Many excellent ministers man age their visits, and especially those in which religion makes a prominent figure, so unskilfully, that those who have not a pious taste, and more particularly the younger members of families, not unfrequently dislike to see them. This is a difficulty which it is certainly worth while to take some pains to overcome ; and I know of no way of overcoming it, but by taking care that your deportment be conciliatory, and attractive to all classes of persons ; and that your conversation so abound in instruction and entertainment, as to make your visits more welcome than those of almost any other person. I have known some ministers who had this happy talent in a remarkable degree. And it is far more within the reach of a man of ordinary powers of mind than would, at first view, be imagined. Never go to a house, without having, if possible,
something interesting to communicate ; an appropriate little book, for more than one member of the family ; an instructive pointed anecdote to repeat, from one of the periodicals of the preceding week ; some popu lar, precious maxims to impress on the minds of the children and youth of the household ; or a notice of some recent publication, of a valuable and pleasing character. The truth is, were ministers as intent on winning the hearts of all the domestic circles which they enter, as the active man of the world is to pro mote his object wherever he goes, they would enter no dwelling without being received with that smile of pleasure which indicates the most respectful and cordial welcome.
8. In all your visits be particularly attentive to children and young people. This is implied in the preceding particular ; but it is so important as to de mand separate and most pointed consideration. I have often wondered that a duty so obvious, and re commended by so many considerations, should be so much overlooked by discerning ministers.
Can any thinking man fail to remember, that chil dren are the hope of the church? — that enlightened attention and labour bestowed on them, is more likely, humanly speaking, to be productive of the best fruits, than those which are bestowed upon persons of more advanced age ? — that impressions made in the morn ing of life, are generally among the most permanent and ultimately beneficial ? — that instructions then given, and sentiments then imbibed, though they may long lie dormant in the mind, often rise into life and fruitfulness, when he who gave them has gone to his eternal rest ?
Can it be forgotten, also, that all experience testi fies the importance to a minister himself, of paying particular attention to the youth of his charge ? It forms a bond of union between him and them which time, instead of severing, will rather strengthen. We can scarcely conceive of a richer gratification in this life, than that likely to be enjoyed by a faithful minister, growing old in his work, when he sees rising around him a train of youthful members, whose parents he loved and edified ; whom he baptized and blessed ; whom, in their tender years, he watched over, cate chized, instructed, entertained and encouraged ; and who, in his declining age, gather round him, and honour him as their father in Christ. 0, if ministers could fully anticipate the sweetness of this reward, a regard to their own happiness would unite with the purest benevolence, in impelling them to unwearied care in watching over the children of their charge, and in embracing every opportunity to enlighten their minds, and to win their hearts in favour of all that is good.
Nor is this all. Assiduous attentions to children, are among the most direct and sure avenues to the hearts of parents. It often happens, indeed, that parents are more deeply gratified by kind efforts to promote the welfare of their children, and are more lastingly thankful for them, than for the same kind ness bestowed on themselves. Nay, many parents who have no piety themselves, and who would not perhaps be willing to be very closely questioned on the subject in reference to their own hearts, will take it well, and even gratefully, to have their children carefully instructed, and pointedly questioned on the
same subject, and that even in their own presence. And, let me add, that very striking instances have been known in which inquiries and exhortations addressed to children, in the presence of their parents, have been to all appearance blessed in the happiest manner to the benefit of those parents themselves. Indeed, I have sometimes doubted whether in many cases, ungodly parents might not be most easily and successfully approached through the medium of an address to their children, conducted in their presence. On the other hand, it frequently happens that children will lend a favourable ear to their minister, when their parents, though both pious and intelligent, have ad dressed them in vain.
On all these accounts, then, as well as others which might be mentioned, you ought, in all your pastoral visitation, to direct the most pointed regard to the children and young people of every family. En deavour to gain their attention, to win their hearts, and to take every opportunity of putting in their way those notices, hints, books, and information of every valuable kind, which may tend to promote their best interest. Give them striking texts of scripture to commit to memory. Reward them, when they do well, with interesting tracts, of which every minister should always carry with him a small store. Take notice of them when you meet them in the street. Call them by their names with parental kindness. And to enable you to do this, keep a list, as far as you can, of the children and servants of every family ; make a business of keeping up your acquaintance with them, and of recognizing and addressing them on all suitable occasions. There is no doubt that doing
this, and especially doing it thoroughly, will require no little additional labour. But I hardly know of any species of ministerial labour more pleasant in itself, more promising, or more generally rewarded by the richest fruits.
9. What I have incidentally recommended with respect to children, I would recommend in general, as a concomitant of all your pastoral visitation ; viz. that you carefully keep a record of persons and events, to aid your memory. The names, number, character, situation, and wants of many families, would utterly pass from your mind, if you did not secure to your self the advantage of such a systematic series of memoranda as I have proposed. In this record, you ought to insert in a very brief form not only in formation as to the points which I have hinted at, but also to every other point important for a pastor to know concerning his people. The fact is, that the habit of keeping such a record will constrain a pastor to make inquiries in the course of his parochial visits, which might not otherwise occur to his recollection, but which ought never to be forgotten by one who is entrusted with the care of souls ; such as, what mem bers of each family are in full communion with the church; whether any who are not communicants cherish a hope of an interest in the Saviour ; whether any, not of this character, are under serious impres sions ; whether any of them are unbaptized ; whether they are all furnished with Bibles ; whether they are all able to read ; whether they are all punctual in going to the house of God; whether they make conscience of secret prayer; whether they are well supplied with orthodox and pious books, adapted to
promote their instruction and edification ; &c. These, and various other matters, important to be remembered, ought to find a place in the record recommended ; and the record, in order fully to answer its proper pur pose, ought to be frequently reviewed, corrected, and modified, as new facts arise ; and its contents ought to lead to daily and importunate prayer for divine direction in attending to them aright.
10. In some cases, several families may assemble together, at a house where you have appointed to be present. This may bring a larger number within the influence of the same visit, prayer and address ; and it may tend also to nourish affectionate Christian feelings between the members of the same church. This is a plan of visiting especially convenient for young ministers, as it will enable them to accomplish more of this part of their work in a given time, and enable them to be more in their studies. There are, however, some disadvantages incurred by this mode of conducting parochial visits. A pastor cannot be so entirely unreserved where several families are to gether, as he may be in the bosom of a single family ; nor will the persons present feel so perfectly free in their communications to him. The greatest advantage will be likely to result from the adoption of this plan, when the families brought together are not only ac quainted, but intimate with each other.
11. In paying pastoral visits, it is very desirable, in many cases, to be accompanied by an Elder, and sometimes there may be an advantage in having with you more than one. This practice tends to make the Elders of the church better known to the private members ; and also, at the same time, to render the
Elders themselves better informed concerning the state of the church over which they are called to pre side, and to give them a deeper interest in its affairs. There can be no doubt, too, that the hands of a minister are, in many cases, strengthened by the pre sence of one or more of those who are appointed to "bear rule" with him in the church. And while it strengthens his hands, it is certainly adapted to make a deeper impression on the minds of those who are thus officially visited.
But I am persuaded, that in a large number of cases, it is better for a pastor to visit alone. Some families, and some individuals in other families, can be better approached without the presence of an Elder. To many conversations, which have for their object the removal of offences, it is essential to their prospect of success, that they be private and confidential. To call official witnesses to witness the rebuke and expos tulation which it may become necessary to administer, would often be to rouse the feelings of wounded pride, and to harden the heart. Many persons have bowed with penitence and thanks to an admonition given in private, who would probably have received with rage, if not with violence, the very same admonition offered in public, or before even a single witness. Of the proper course of proceeding, therefore, in reference to this point, the conscientious and prudent minister must judge in each particular case.
12. It will be a very important part of your duty, when you become a minister, to visit the sick. Whether you are called to act as a pastor or a mis sionary, in either case this most important and deli cate duty will frequently devolve upon you. That the 13*
faculty of discharging it with faithfulness, and, at the same time, with prudence and tenderness, is of great value, is too evident to be doubted. Dr. Doddridge somewhere quotes Augustine, as expressing deep wonder and regret, that ministers should take so much pains to prepare their sermons, and bestow so little apparent thought on what they say to sick people, and on the best methods of conducting their visits. He who does not feel that the task of administering in struction and consolation to the sick and the dying, is one calculated to put in requisition all the wisdom, piety, benevolence, and knowledge of human nature which can be devoted to it, knows but little either of nature or of grace. It is, indeed, an office of awful responsibility to undertake to be, if I may so express it, the pilot of the soul, in passing " the valley of the shadow of death ;" to awaken and alarm the unpre pared ; to counsel the perplexed and doubting ; to calm the agitation of the timid believer ; and to pour the oil of consolation into the wounded spirit.
Be always ready to visit the sick. Do not wait to be sent for. And visit them as frequently as your circumstances will admit. If they be numerous at any one time, keep a list of them, that none may be overlooked. Before each visit, lift a word of prayer to the throne of grace, that you may be directed and aided in the solemn interview. Sometimes the rela tives of the sick are unwilling that they should be seen and conversed with by a clergyman. It is, ob viously, no part of his duty to force his way into a patient's chamber. Yet he ought in general to bear testimony against a repugnance at once so heathenish and foolish.
If you do not previously know the character of the sick person whom you visit, make some inquiries on the subject, and as to his history, and opinions, and the state of his mind. But, besides this, commence your conversation with him, (after a few kind inter rogatories respecting his bodily feelings, &c.) with queries and suggestions which may tend to draw from himself the degree of his knowledge, and his views, hopes, &c.
Let nothing be
said calculated to jar or agitate, excepting what fidelity to the soul renders necessary. Be plain, simple, and studiously faithful in your exhibitions of truth. That is not a time for any nice distinctions, or for extended reasoning. Neither is it a time for unfaithful soothing, or for saying, "peace, peace, when there is no peace." Where there is evidently no well-founded hope, guard against driving to despair ; but guard, no less sacredly, against bolstering up a hope which will be likely to "make ashamed." Let your conversations and visits be short. The effort of even a few minutes in speak ing, or in listening to a speaker, is often very oppres sive to the sick. Do not, ordinarily, allow yourself to be seated by the bed-side of one who is really ill, longer than a quarter of an hour at any one time, unless the case be very peculiar, or you have very con clusive evidence that your presence is not burdensome.
Let your prayers in the apartment of the sick, be tender, sympathetic, appropriate from beginning to end ; short, and as much calculated as possible to fix, calm, and enlighten the mind of the sufferer, and to direct his meditations. It is very injudicious to make
prayers in a sick chamber, that are pointless, tedious, general, inapplicable in the greater part of their structure, or loud and harsh in their manner. Many topics proper for social prayer, on other occasions, ought to be left out here ; and every tone should bo adapted to the stillness and sympathy of a sick chamber.
In many cases it is desirable to converse with the sick alone. In this situation, they will sometimes be more free and confidential with you ; and you will often feel at liberty to converse more faithfully and unre servedly with them. But every thing of this kind ought to be avoided in those cases in which you might be exposed to the charge of tampering with the mind of the patient, in reference to the disposition of his property, or with regard to any other worldly or deli cate concern.
One of the most judicious and excellent clergymen that I ever knew, once informed me that he was accus tomed to make a point of visiting the females of his congregation, as soon as propriety admitted, after the births of their children ; and that he generally found them, on such occasions, in a state of greater tender ness of moral feeling, more ready to listen to serious remarks, and more deeply sensible of parental responsi bility than usual.
Not only continue to visit the sick, as far as you may be able, during the whole course of their con finement ; but if they recover, continue to visit them while convalescent, and afterwards. This may be the happy means of fastening on their minds serious im pressions which might otherwise have vanished with their disease. If they die, visit their surviving rela tives, with respectful attention, more than once after-
promoting their spiritual interest.
13. Be very attentive in visiting families, which, by the loss of friends or property, or by any other dispensation of Providence, are in depressed circum stances. Such families are very apt to be neglected by their former acquaintances ; and they are no less apt to be very sensitive to such neglect, and deeply wounded by it. Instead of diminishing the frequency of your visits to families in this situation, rather in crease it. And be especially careful to improve the opportunity which visits in such cases afford to recom mend religion. The minds of men are seldom moro open to religious impressions, than when humbled and softened by calamity.
II. But besides visits which are strictly official in their character, and in which ministers ought to abound ; they will often find it advantageous, and in deed necessary, to pay some which are merely social and friendly. Let these by no means be neglected. Their uses are more numerous and valuable than can be recited in a short compass. Yet in reference to them also, there are some cautions and counsels which are worthy of your notice.
1. And, in the first place, let even your shortest social visits be made with prayer. One of the most eminent private Christians I ever knew, I had good reason to believe, never went out to make the slightest call on a friend, without spending, at least a minute or two, in prayer for a blessing on the visit. And why is not this always proper ? He who controls and directs all things may, for aught we know, make the most common visit, from which we expected no special
result, productive of rich and permanent blessings, either to ourselves or to others. And is it not worth while to ask for such a blessing ? To do this, in all cases, will, I know, by some be accounted drudgery ; but it will not be so regarded by the spiritual man.
2. Do not make your social visits so numerous as to interfere with those which are more important. Pastoral visits are, in general, far more useful, and ought to occupy a large portion of the time which a minister can spare from his other official avocations. It would be unhappy, therefore, to allow mere social calls to be so multiplied as materially to interfere with those of a more serious and valuable kind, and espe cially to shut them out altogether. Let the latter, then, be the main object of your attention ; but, at the same time, embrace every opportunity which the occurrences of each day may afford, to "drop in" at the house of one and another of your parishioners, if it be only for five minutes, for the purpose of mutual salutations and friendly inquiries. Visits of this transient and unceremonious kind may often be paid, when there is no time for those of a more formal and extended character ; and they are adapted in various ways to attach your people to your person, and to extend your influence among them. They will be apt to consider your pastoral visits as an official matter; but your social calls, as a more immediate expression of friendly feeling, and, therefore, in this respect, peculiarly gratifying. If you could possibly find time enough to pay one pastoral, and one social visit every year, to each family in your congregation, you would execute a plan approaching as nearly what appears to me desirable in this respect, as one minister
the power of many ministers.
3. Do not make your social calls too frequent in particular families. Nothing is more common than for ministers to select a few families in their respective charges, the society of which they find peculiarly agreeable, and in which, on this account, they visit very frequently. They are seen, perhaps, going to those houses ten or a dozen times, where they go to others once. This is not, in common, judicious. For, although ministers, like other men, will have, and ought to be allowed to have, their particular friends ; yet, to a certain extent, they ought to deny themselves the gratification of this feeling, for the sake of pro moting their usefulness among all classes of those committed to their care. And this remark will apply the more strongly, if the particular friends in question happen to be among the most wealthy and polished of their congregation. It has an ill aspect, which no preference or explanation can fully remove, when ministers are found every week, or oftener, in the houses of such individuals, while, perhaps, for a year together, they are not found in the dwellings of many others equally worthy, and, perhaps, far more devoted to the cause of Christ. But there is another con sideration worthy of notice here. By visiting very frequently in particular families, rely on it, you will not raise yourself in the estimation even of those families themselves, but rather the reverse. There is such a thing as rendering your visits cheap by too frequent repetition. However they may love your company, they will venerate you the more, as a
gospel minister, for seeing you withdrawing your attention, in part, from themselves, to bestow it on others, especially on the poor, the afflicted, and the friendless. Besides, when a clergyman is seen lounging about almost daily, in particular families, it cannot fail of being considered as ominous of neglect in his study, as well as in other departments of official duty. Indeed, I hold it disreputable for a clergyman, at any time, and in any families, to be in the habit of making long and lounging visits. They exhibit him as an idle man ; — a miserable character for one who has been set to " watch for souls as he who must give an account."
4. While you indulge, in a moderate and well-regu lated manner, the feelings and habits of private friend ship among the people of your charge, let it be mani fest that, even in your social visits, you are quite as able to find the hovel of the poorest and meanest, as the mansion of the most wealthy. And if you make a social call at the latter more frequently than at theformer, let it be seen that your object is, not to solicit favours for yourself, but to obtain aid for the indigent, the sick, and the forsaken. It has an ill aspect, indeed, when a minister of the gospel is found begging for his own emolument, or even indirectly endeavouring to attract presents to himself; but it is an honour rather than a discredit to him, when he often appears as a beggar for others ; as the advocate of the poor, the almoner of the widow and the orphan.
5. The length of your visits is a point well worthy of notice. It may be readily granted, indeed, that in reference to this point no rules either absolute or universal can be laid down. Long and short are
relative terms ; and are often understood very differ ently in the country, and in large towns. But this is one of the cases in which it is better to err on the side of excessive brevity than excessive length. It appears to me, then, that, on ordinary occasions, in stead of spending four or five hours in one visit, it is preferable to divide that time into four, five, or even more visits, especially if they be merely of the social kind ; — and in populous places, several visits of the social kind may be easily despatched within an hour. Here, as in preaching, it is better to rise and take your leave, while all are interested, and wishing you to stay longer, than to hang on until conversation flags ; until some members of the circle become im patient at their detention ; and, perhaps, all begin to wish you gone.
Nor ought you to suppose that this is a matter which will claim your attention only by and by, when you become a minister. It is worthy of your attention now. While you are a student, you should aim to form such habits, in reference to this, as well as other subjects, as will be suitable to go with you through life. Let me say then that now, and at all times, if you wish your visits to be welcome, you should make them short. He who sits several hours in. a single visit, ought nofc only to be very much at leisure himself; but he ought also to be very sure that those whose time he is occu pying, have nothing to do. Young and inexperienced persons are apt to feel as if they were the only visitors in the circles to which they resort. They forget to calculate what the consequence must be to the order and employments going on in those circles respectively, when perhaps the same encroachments on their time
are made by other visitors five or six times every week. More than this, endeavour early to learn the art of discovering, by the appearance of things, at a glance, whether the members of the family in which you visit, are at leisure to attend upon you, or very busy, and desirous of being occupied. If you have reason to suppose that the latter is the case ; if you know that they have been called from some urgent employment to receive you ; or, if you perceive, that, by coming in, you have interfered with a projected walk or ride, it is always better immediately to with draw.
Let this principle more especially guide you in your visits abroad, as well as at home, to clergymen, and other professional men, who, from their occupying public stations, are less masters of their own time than most others ; and more incommoded, of course, by frequent and tedious intrusions on their time. There is indeed an old French proverb, which says, "that it is never any interruption for one literary man to visit another." I protest against the unquali fied application of this proverb, as a dreadful nuisance. Lord Bacon was accustomed, with emphasis, to say, "Temporis fures amid." Cotton Mather, and after him Dr. Watts, caused to be inscribed in large letters over his study door, these words, " BE SHORT." When an acquaintance, who was rather prone to be tedious, called once on the the venerable Dr. Doddridge, and said, after seating himself, " I hope, sir, I do not interrupt you," — that excellent and laborious divine replied with characteristic frankness, " To be sure you do." Clergymen, if those of no other station do so, ought to sympathize with one another on this
|
Surfin’ Bird
"Surfin' Bird" by The Trashmen is featured on.
In the remake, his skin and outfit are more realistic and he is given a pink outline.
Just Dance
Remake
Shake Moves
Trivia
* The dancer has the darkest color scheme compared to all the neon on the other dancers.
* As with the other remakes from Just Dance, the remade coach has a bad flickering effect.
Site Navigation
Surfin' Bird
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.