content
string
pred_label
string
pred_score
float64
Correctly rounded floating-point division for DSP-enabled FPGAs @article{Pasca2012CorrectlyRF, title={Correctly rounded floating-point division for DSP-enabled FPGAs}, author={Bogdan Pasca}, journal={22nd International Conference on Field Programmable Logic and Applications (FPL)}, year={2012}, pages={249-254} } Floating-point division is a very costly operation in FPGA designs. High-frequency implementations of the classic digit-recurrence algorithms for division have long latencies (of the order of the number fraction bits) and consume large amounts of logic. Additionally, these implementations require important routing resources, making timing closure difficult in complete designs. In this paper we present two multiplier-based architectures for division which make efficient use of the DSP resources… CONTINUE READING Highly Cited This paper has 29 citations. REVIEW CITATIONS
__label__pos
0.971321
1. Human Biology and Medicine 2. Immunology and Inflammation Download icon Microbiota: A gut feeling about arthritis 1. Diane Mathis  Is a corresponding author 1. Harvard Medical School, United States Insight • Cited 4 • Views 1,610 • Annotations Cite as: eLife 2013;2:e01608 doi: 10.7554/eLife.01608 Abstract The gut microbiota of patients recently diagnosed with rheumatoid arthritis is enriched in microbes belonging to the Prevotella genus. Main text The intestinal microbiota—the complex universe of microbes that are normally resident in the gastrointestinal tract—influences many aspects of life, including glucose metabolism, neural processes, the circadian clock and our immune defenses (Gordon, 2012). It has been known for decades that proper development of the immune system requires the gut microbiota, and that alterations in the repertoire of microbes are often associated with immunological disorders, in particular autoimmune diseases in which the body mistakenly attacks its own tissues (Ivanov and Honda, 2012). While it is not very surprising that intestinal bacteria affect susceptibility to and/or the severity of autoimmune disorders localized to the gut—notably inflammatory bowel disease—their ability to profoundly impact other immune disorders, including arthritis (Wu et al., 2010), experimental allergic encephalomyelitis (Lee et al., 2011) and type-1 diabetes (Kriegel et al., 2011), came as a surprise. Now, in eLife, Dan Littman of New York University School of Medicine and co-workers—including Jose Scher, Andrew Sczesnak and Randy Longman as joint first authors—have taken an important step in extending these findings to humans: they analyzed the faecal microbiota of healthy individuals and of various cohorts of patients with inflammatory arthritis, and documented a striking enrichment of bacteria belonging to the Prevotella genus in patients recently diagnosed with rheumatoid arthritis (Scher et al., 2013). Rheumatoid arthritis affects the body as a whole, but particularly the hands, wrists and other synovial joints (Figure 1) (McInnes and Schett, 2011). It is a multi-factorial disease that has both autoimmune and inflammatory components, and it is subject to diverse genetic, environmental and epigenetic influences. Scher et al.—who are based at various institutions in the US, Italy and the UK—assembled a cohort of subjects who were being treated for chronic rheumatoid arthritis, and a second cohort who had only recently been diagnosed and were therefore not yet receiving treatment. They also recruited subjects being treated for another form of inflammatory arthritis (psoriatic arthritis) and a cohort of healthy controls matched for age and ethnicity. Scher et al. then cataloged the intestinal microbiota of the four groups by sequencing microbial genes called 16S ribosomal RNA genes—which can be used to distinguish between bacterial species—present in their faeces. They found a marked over-representation of Prevotella species, in particular P. copri, in most, though not all, members of the recent-onset rheumatoid arthritis group, but in few of the individuals in the other three groups. Conversely, the microbiota of the latter three cohorts was enriched in Bacteroides species. To obtain a more in-depth view, Scher et al. then ‘shotgun’ sequenced the full faecal microbiomes of a subset of the recent-onset rheumatoid arthritis patients and healthy controls. Two important results emerged. First, the gut-associated P. copri entities in the controls were not exactly the same as those present in the recently diagnosed rheumatoid arthritis patients. Second, significant differences were observed between the metagenomes (the inventory of genes) of the two cohorts—with the recent-onset rheumatoid arthritis patients showing relatively few genes for enzymes that metabolize vitamins and purines, and relatively many genes for enzymes that metabolize cysteine. While the functional relevance of these differences remains unexplored, they may prove to be useful biomarkers for diagnosis or prognosis. As a first step in functionally dissecting the association between P. copri and autoinflammatory disease, Scher et al. used oral gavage to introduce the bacterium into the stomachs of mice that had been treated with antibiotics. Sequencing of faecal 16S RNA revealed that P. copri dominated the gut microbiota within two weeks of introduction. The mice also showed a reduced level of Bacteroides (and a few other species), analogous to the findings in the human cohorts. When the P. copri-colonized mice were challenged with dextran sulfate sodium, a model for inflammatory bowel disease, they exhibited more severe inflammation of the colon than did control animals. Scher et al. have taken an important step towards translating to humans recent findings on the gut microbiota–immune system interface obtained from studies on mice. Several lines of investigation now beg pursuit. One critical avenue of study will be to determine whether the association between P. copri and rheumatoid arthritis reflects cause, effect or co-association. The fact that the recent-onset rheumatoid arthritis patients alone exhibited high circulating levels of C-reactive protein (a marker of systemic inflammation) raises the possibility that the observed microbiota differences reflect a subclinical inflammatory response, perhaps an immediate precursor of clinical rheumatoid arthritis. More generally, any effects of the disease itself—or of the drugs used to treat the disease—on the microbiota need to be assessed. In humans, certain members of the HLA family of immune-related genes are known to increase the risk of rheumatoid arthritis. The observation that recent-onset rheumatoid arthritis patients with an excess of P. copri were less likely to possess some of these risk alleles raises the question of to what extent the association between P. copri and rheumatoid arthritis reflects a shared dependence on the HLA locus. Indeed, when human alleles associated with susceptibility or resistance to arthritis were introduced into mice, they had a profound impact on the faecal microbiota, as well as influencing gut permeability and certain populations of intestinal immune cells (Gomez et al., 2012). Another important avenue of investigation will be to elucidate the mechanisms by which P. copri predisposes its host to autoimmunity or inflammation, in particular to a gut-distal disorder. How are arthritogenic signals generated in the gut transposed to the joint? The mysterious microbial world within us is beginning to reveal its secrets, but many mysteries remain to be solved in the years to come. Arthritis as seen by Vincent van Gogh. This painting, “Portrait of the Postman, Joseph Roulin, sitting in a chair” (1888), is one of many portraits that van Gogh painted of individuals suffering from arthritis. The original painting belongs to the Museum of Fine Arts in Boston. Figure credit: Vincent van Gogh, via Wikimedia Commons References 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 7. 7 Expansion of intestinal Prevotella copri correlates with enhanced susceptibility to arthritis 1. JU Scher 2. A Sczesnak 3. RS Longman 4. N Segata 5. C Ubeda 6. C Bielski et al. (2013) eLife, 2, 10.7554/eLife.01202. 8. 8 Article and author information Author details 1. Diane Mathis Division of Immunology, Department of Microbiology and Immunobiology, Harvard Medical School, Boston, United States For correspondence [email protected] Competing interests The author declares that no competing interests exist. Publication history 1. Version of Record published: November 5, 2013 (version 1) Copyright © 2013, Mathis This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited. Metrics • 1,610 Page views • 163 Downloads • 4 Citations Article citation count generated by polling the highest count across the following sources: Scopus, Crossref, PubMed Central. Download links A two-part list of links to download the article, or parts of the article, in various formats. Downloads (link to download the article as PDF) Download citations (links to download the citations from this article in formats compatible with various reference manager tools) Open citations (links to open the citations from this article in various online reference manager services) Further reading 1. The gut microbiota of patients with rheumatoid arthritis is enriched in microbes belonging to the Prevotella genus. 1. Human Biology and Medicine 2. Neuroscience Ming Song et al. Research Article
__label__pos
0.681596
The Multiple Questions Surrounding the Diagnosis of ADHD By Esther B. Hess, Ph.D. The controversy over Attention Deficit Hyperactive Disorder (ADHD), a neurological condition, includes concerns about its existence as a disorder, its causes, the methods by which ADHD is diagnosed and treated including the use of stimulant medications in children, possible over diagnosis, misdiagnosis as ADHD leading to under treatment of the real underlying disease, alleged hegemonic practices of the American Psychiatric Association and negative stereotypes of children diagnosed with ADHD. ADHD is controversial in part because most children are diagnosed and treated based on decisions made by their parents and clinicians with teachers being the primary source of diagnostic information. Only about 20% of children who end up with a diagnosis of ADHD show hyperactive behavior in the physician’s office. Additionally, evidence exists of possible race and ethnicity in the prevalence of diagnosing ADHD. The thinking is that the prevalence of ADHD various dramatically across cultures due to different perceptions of what clarifies as disruptive behavior, inattention and hyperactivity.  Development can also influence perception of relevant ADHD symptoms. ADHD is viewed as a chronic disorder that develops in childhood and continues into adulthood. However, some research shows a decline in symptoms of ADHD as children grow and mature into adulthood. Hyperactivity is more typical in children and inattentiveness tends to be a stronger discriminator in adolescents.  The best course of ADHD management is also a major topic of debate. Stimulants are the most commonly prescribed medication for ADHD in the USA. Stimulant medication additionally tends to be surrounded by both myths and often inaccurate information. Parental concerns tend to focus on the potential for children to become addicted or over controlled by the medication.  Furthermore, there is often a worry that medication for ADHD symptoms are over prescribed by the medical community.  The National Institute of Mental Health maintains that stimulants are considered safe when used under medical supervision, but there are concerns regarding the higher rates of schizophrenia and bipolar disorder, as well as increased severity of these disorders in individuals with a history of stimulant use of ADHD in childhood. Despite the controversy, the facts about ADHD medication remain clear. Hundreds of studies have shown that, when appropriately prescribed for someone who genuinely has ADHD that these medications tend to be safe and effective for most people. What the medication does do is increase the activity of the brain related to attention, behavioral control and executive functioning.  Consequently, people on the medication tend to be thought of as more reliable, consistent and organized.  No psychotropic medication is without its side effects.  These side effects can include among others, anorexia and difficulty in getting to sleep. In evaluating the potential benefits and side effects, parents need to consider the cost of not treating their child medicinally.  The risks for not medicating a child with ADHD can include greater school difficulties, increased family stress, and higher incidence of depression and anxiety in  Even when they acknowledge the potential benefits, some people do not like the idea of becoming dependent on medication. They compare the use of ADHD stimulants to an addictive dependency on alcohol. Addictive dependency limits the person’s life and overall brings more problems than solutions. By contrast, using medication to appropriately treat ADHD enables the person to live a bigger, more interesting, more effective life.
__label__pos
0.843959
Gestion active des défauts Définition - Que signifie la gestion active des défauts? La gestion active des pannes est l'une des deux façons de gérer les pannes dans les systèmes réseau. Il est constamment en train de détecter, d'isoler et de résoudre les problèmes du réseau en utilisant activement des outils de surveillance pour voir si un certain périphérique surveillé est actif et répond à chaque processus ou est déjà en panne et ne répond pas. Si un appareil ne parvient pas à remplir ses tâches requises, le système de surveillance actif enverra une alarme indiquant que l'appareil ne répond pas ou a rencontré un problème afin que des actions proactives puissent être prises avant que le problème ne s'aggrave. Definir Tech explique la gestion active des défauts La gestion des pannes en général est capable de détecter certains problèmes de réseau grâce à la navigation sur le matériel affecté, qui est ensuite isolé des autres matériels non affectés. Ce processus se fait automatiquement et rapidement à l'aide d'outils qui se connectent à une base de données. La plupart des réseaux ont des interfaces graphiques qui illustrent le problème, montrant le nœud en question. Dans la gestion active des défauts, le système est spécialement conçu pour s'adapter efficacement à l'impact de l'alarme chaque fois que le système de surveillance actif détecte un problème. La détection est également «active», ce qui signifie que les outils vérifient toujours certains paramètres et demandent des réponses de différents nœuds. La surveillance passive attend simplement qu'un nœud signale un problème, en supposant que le nœud est suffisamment intelligent pour le faire. Cette méthode permet aux opérateurs de localiser facilement la partie spécifique qui est affectée par le dysfonctionnement ou un éventuel dysfonctionnement et de trouver rapidement une solution.
__label__pos
0.50015
A(n) ____ style is enclosed within the <span> tag. Selected Answer: indexed Correct Answer: inline Question 2 0 out of 0.5 points Which of the following is NOT identified by an API? Selected Answer: interfaces Correct Answer: classes Question 3 0.5 out of 0.5 points Which of the following designates an HTML division? Selected Answer: <div> Correct Answer: <div> Question 4 0 out of 0.5 points A(n) ____ is a point in a tree-like structure that indicates the relationship between people or objects. Selected Answer: link Correct Answer: node Question 5 0 out of 0.5 points Animation can be created by moving objects associated with a ____. Selected Answer: subscript Correct Answer: division Question 6 0.5 out of 0.5 points ____ uses a combination of HTML tags and options that allow you to create Web pages that are more animated and more responsive to visitor interaction than basic HTML Web pages. Selected Answer: DOM Correct Answer: DOM Question 7 0 out of 0.5 points Which of the following is a global function that accepts a string or command and returns the result of an executed statement? Selected Answer: all of the above Correct Answer: the eval() function Question 8 0 out of 0.5 points The <html> tag can be thought of as the ____ node in the DOM naming system. Selected Answer: main Correct Answer: root Question 9 0.5 out of 0.5 points The first item in a JavaScript array is which of the following element numbers? Selected Answer: 0 Correct Answer: 0 Question 10 0.5 out of 0.5 points Which tag groups items inline? Selected Answer: <span> Correct Answer: <span> Question 11 0 out of 0.5 points When used with XML documents, the use of ____ selectors is discouraged, to prevent confusion. Selected Answer: name Correct Answer: id Question 12 0.5 out of 0.5 points A(n) ____ provides additional information about an item. Selected Answer: ScreenTip Correct Answer: ScreenTip Question 13 0.5 out of 0.5 points To be XHTML compliant, <img> tags need which attribute? Selected Answer: alt Correct Answer: alt Question 14 0.5 out of 0.5 points Web developers often describe divisions as ____. Selected Answer: layers Correct Answer: layers Question 15 0 out of 0.5 points Dynamic ____ of elements is a key feature of modern Web pages and makes the Web page more appealing and interactive. Selected Answer: embedding Correct Answer: positioning Question 16 0.5 out of 0.5 points HTML ____ lines are used to hide JavaScript from older browsers. Selected Answer: comment Correct Answer: comment Question 17 0 out of 0.5 points The class ____ must be notated by the class attribute in the HTML tag. Selected Answer: style Correct Answer: selector Question 18 0.5 out of 0.5 points ____ specifies the placement of elements, such as text and graphics, on a Web page. Selected Answer: Positioning Correct Answer: Positioning Question 19 0.5 out of 0.5 points A ____ is text that appears in a small pop-up box when you hover the mouse pointer over an item on the screen. Selected Answer: ScreenTip Correct Answer: ScreenTip Question 20 0.5 out of 0.5 points Different screen ____ will need to adjust the positioning values of an image on a Web page. Selected Answer: resolutions Correct Answer: resolutions Case 1-2 Michael’s son has written an essay that has won a top award at school. Michael wants to post the essay on their family Web site. Since Michael is so proud of his son, he wants to put information about the award in as bold type as possible. What heading level would Michael use? Selected Answer: 2 Correct Answer: 1 Question 2 1 out of 1 points HTML tags display Web pages on ____ computers. Selected Answer: all of the above Correct Answer: all of the above Question 3 1 out of 1 points With HTML 4.01 and XHTML 1.0 standards, new and stricter methods are now being implemented, and it is now considered good form to ____. Selected Answer: use only lowercase text in tags Correct Answer: use only lowercase text in tags Question 4 1 out of 1 points JavaScript is a Java-like scripting language used to create miniapplications called ____. Selected Answer: both a. and b. Correct Answer: both a. and b. Question 5 1 out of 1 points Use the simplest, most basic tools available when writing HTML, such as ____. Selected Answer: either a. or b. Correct Answer: either a. or b. Question 6 1 out of 1 points In 1995, the Netscape Communications Corporation caught the imagination of businesses with its release of Netscape ____. Selected Answer: Navigator Correct Answer: Navigator Question 7 1 out of 1 points There are many ways to create HTML tags. You can ____. Selected Answer: all of the above Correct Answer: all of the above Question 8 1 out of 1 points Internet Explorer’s early forerunners and innovative competitors, ____, have all but evaporated from common use. Selected Answer: Mosaic and Netscape Navigator Correct Answer: Mosaic and Netscape Navigator Question 9 1 out of 1 points Most printed documents use ____ to help the reader find important portions of text. Selected Answer: headings Correct Answer: headings Question 10 1 out of 1 points <Angle brackets> appear on the ____ key and period key on your keyboard. Selected Answer: comma Correct Answer: comma A ____ is a communication system that is used to transfer data over computer networks. Selected Answer: protocol Correct Answer: protocol Question 2 1 out of 1 points When you see https://, the “s” stands for ____. Selected Answer: secure Correct Answer: secure Question 3 1 out of 1 points A widely used tag is the ____, or horizontal, rule. Selected Answer: <hr /> Correct Answer: <hr /> Question 4 1 out of 1 points Hyperlinks can be ____ to allow users to navigate to another Web site, to another Web page at the current Web site, or to a specific location within the current document. Selected Answer: clicked Correct Answer: clicked Question 5 1 out of 1 points Case 2-1 Kacie is building a Web site to show off the pictures from her vacation to Hawaii. She is deciding on a background color. Kacie then decides that since many of her pictures have blue in them, she will change the background color of her Web site to yellow, and enters #FFFF00. In this case, #FFFF00 is a ____. Selected Answer: hexadecimal value Correct Answer: hexadecimal value Question 6 1 out of 1 points To create a single-spaced break around the text, you would use the ____ tag(s). Selected Answer: <br /> Correct Answer: <br /> Question 7 1 out of 1 points Case 2-1 Kacie is building a Web site to show off the pictures from her vacation to Hawaii. She is deciding on a background color. At first, Kacie feels that blue would be the best background color for her Web site and enters “aliceblue.” In this case, aliceblue is a ____. Selected Answer: text value Correct Answer: text value Question 8 1 out of 1 points You can easily organize text with the help of a few new tags including ____ for break. Selected Answer: <br /> Correct Answer: <br /> Question 9 1 out of 1 points You can enter color names as ____ values. Selected Answer: text Correct Answer: text Question 10 1 out of 1 points Creating a hyperlink within a document requires a two-step process. The first ____ tag you insert creates a hypertext link to a location within your document. Selected Answer: <a> Correct Answer: <a> Case 3-2 Kamilla is putting together a survey to post on her school’s Web site. The topic of the survey is the types of lunches students would like to see served in the cafeteria. The survey also lists ten lunches and asks the students to place a check mark next to the meals they like. Students can choose as many answers as they want to. For this question, Kamilla would use a ____. Selected Answer: check box Correct Answer: check box Question 2 1 out of 1 points When Apple set up ____ and people started downloading music, CD sales dropped rapidly. Selected Answer: iTunes Correct Answer: iTunes Question 3 1 out of 1 points The ____ format adheres to an international set of graphics standards, is probably the format used by the camera on your cell phone, and is supported by most digital cameras today. Selected Answer: JPEG or JPG Correct Answer: JPEG or JPG Question 4 0 out of 1 points The .gif graphics or image format was originally created by one of the first online companies, ____, to provide a compressed graphics format that could transfer easily over low-speed modems. Selected Answer: Netscape Correct Answer: CompuServe Question 5 1 out of 1 points When creating a table, the ____ tag defines a table cell. Selected Answer: <td> Correct Answer: <td> Question 6 1 out of 1 points When creating a table, the ____ tag defines a table row. Selected Answer: <tr> Correct Answer: <tr> Question 7 1 out of 1 points Fonts can be altered further with all of these EXCEPT HTML and CSS ____. Selected Answer: backgrounds Correct Answer: backgrounds Question 8 1 out of 1 points Case 3-2 Kamilla is putting together a survey to post on her school’s Web site. The topic of the survey is the types of lunches students would like to see served in the cafeteria. The survey asks students to write in their favorite lunch that is served in the cafeteria. For this question, Kamilla would use a ____. Selected Answer: text box Correct Answer: text box Question 9 1 out of 1 points In the spirit of the first Mozilla, the Mozilla Organization created ____ to compete against Internet Explorer. Selected Answer: Firefox Correct Answer: Firefox Question 10 1 out of 1 points Case 3-1 Carl is creating a brochure for his band’s first performance at a neighborhood block party. Carl knows he wants to change the appearance of the text. He discovers that ____ define the style for letters and numbers. Selected Answer: fonts Correct Answer: fonts Question 1 1 out of 1 points Web designers often place a Web page in a narrow left-hand frame that contains many hyperlinks. When the user clicks these links, the appropriate Web page is displayed in the larger right-hand frame. This design technique is often referred to as ____ navigation. Selected Answer: left-hand Correct Answer: left-hand Question 2 1 out of 1 points By default, the browser will display semi-thick lines between each frame, and these lines are called frame ____. Selected Answer: separators Correct Answer: separators Question 3 0 out of 1 points The purpose of the ____ attribute is to give you the means to define horizontal frames and to specify the height of each frame. Selected Answer: cols Correct Answer: rows Question 4 1 out of 1 points You can save Web page files with an ____ extension. Selected Answer: either a. or b. Correct Answer: either a. or b. Question 5 1 out of 1 points Your Web browser can display two or more Web pages on the screen at the same time. The HTML tags that will help you accomplish this are the <frameset> tag and the ____ tag. Selected Answer: <frame> Correct Answer: <frame> Question 6 1 out of 1 points In addition, you can use the ____ attribute within the <frame> tag to instruct the browser that the user should not be able to change the size of the frames. Selected Answer: noresize Correct Answer: noresize Question 7 0 out of 1 points When using Web page development tools, a ____ view is always available. Selected Answer: frame Correct Answer: tag Question 8 1 out of 1 points Case 4-2 Bob is creating his first navigation bar and is working at getting the HTML code perfect. In order to create a list of links for the navigation bar, Bob would use the ____ tag. Selected Answer: <li> Correct Answer: <li> Question 9 1 out of 1 points When the user moves the mouse over a frame separator, the pointer ____ to indicate that the frame separator can be moved. Selected Answer: changes shape Correct Answer: changes shape Question 10 1 out of 1 points The <frame> tags contain an important attribute called name that allows you to give each ____ a name. Selected Answer: frame Correct Answer: frame Question 1 1 out of 1 points The ____ state of a hyperlink is the way it appears when the mouse pointer is not over it and it has never been clicked. Selected Answer: normal Correct Answer: normal Question 2 1 out of 1 points A link’s ____ state is when it has the focus on a Web page and pressing the mouse button gives it focus. Selected Answer: active Correct Answer: active Question 3 1 out of 1 points After a link is clicked, it should appear as ____ until it loses focus. Selected Answer: active Correct Answer: active Question 4 1 out of 1 points Case 5-1 Larissa is setting up her links in the default style. She is researching how to define the text attributes of all four hyperlink states. To define the normal setting of the link, without an underline, the code Larissa would use would be ____. Selected Answer: a:link {color:blue;text-decoration:none} Correct Answer: a:link {color:blue;text-decoration:none} Question 5 1 out of 1 points Nearly every professionally developed Web page will contain two sections: the ____ and the body. Selected Answer: header Correct Answer: header Question 6 0 out of 1 points If you are changing something on a Web site, once you know you have files that work, it is best to ____. Selected Answer: none of the above Correct Answer: make changes to these files Question 7 1 out of 1 points The ____ state defines the link’s appearance when the mouse pointer is over it but has not yet been clicked. Selected Answer: hover Correct Answer: hover Question 8 1 out of 1 points Case 5-2 Jeremy is in charge of his hockey team’s Web site. He is creating a table to keep track of the scores. Jeremy wants the first row of the table to have the background color #EFCFCF, cell padding of 10, and for all the text to be centered. The correct code would be ____. Selected Answer: .row1 {background-color:#EFCFCF;padding:10;text-align:center} Correct Answer: .row1 {background-color:#EFCFCF;padding:10;text-align:center} Question 9 1 out of 1 points The <body style=”background-color:#E6E6FA”> style applies a background color to the ____ of a Web page. Selected Answer: entire body Correct Answer: entire body Question 10 1 out of 1 points Using the cascading style below, the font-family and font-color attributes will be applied to every occurrence of the ____ tag within the current HTML document. <style type=”text/css”> li {font-family:Verdana;font-color:red} </style> Selected Answer: <li> Correct Answer: <li> Question 1 1 out of 1 points Case 6-1 Kate is new at her company, and has found some existing JavaScript that she would like to use on the company’s Web site. In the JavaScript below, Kate discovers that the lines labeled “input 1; input 2; and input 3;” are called the ____. if (<blank>) { input 1; input 2; input 3; } Selected Answer: statements Correct Answer: statements Question 2 1 out of 1 points When working with JavaScript, always place the closing brace so that it is ____ with its corresponding opening brace. Selected Answer: vertically aligned Correct Answer: vertically aligned Question 3 0 out of 1 points JavaScript objects contain ____ that programmers can access to obtain information about the object. Selected Answer: methods Correct Answer: properties Question 4 0 out of 1 points The syntax of the parameter list consists of an opening parenthesis, ____ or more parameter items, and a closing parenthesis. Selected Answer: one Correct Answer: zero Question 5 1 out of 1 points Programming languages must be converted from a human-readable form to a machinereadable form by a specialized piece of software called a ____. Selected Answer: compiler Correct Answer: compiler Question 6 1 out of 1 points When working with a compiler, the ____ controls the conversion process of turning humanreadable code into a machine-readable form. Selected Answer: programmer Correct Answer: programmer Question 7 1 out of 1 points ____ is considered to be the JavaScript default object, which means it is not necessary to use its name explicitly. Selected Answer: Window Correct Answer: Window Question 8 1 out of 1 points When working with JavaScript, always ____ contained within the statement block. Selected Answer: indent the statements Correct Answer: indent the statements Question 9 1 out of 1 points Case 6-1 Kate is new at her company, and has found some existing JavaScript that she would like to use on the company’s Web site. In the JavaScript below, Kate realizes that the first line “if (<blank>)” is called the ____. if (<blank>) { input 1; input 2; input 3; } Selected Answer: condition Correct Answer: condition Question 10 1 out of 1 points In 1978, two employees of Bell Laboratories, Brian Kernighan and Dennis Ritchie, published a book titled The C Programming Language, and started the tradition to display the phrase ____. Selected Answer: “Hello, World!” Correct Answer: “Hello, World!” The ____ event is generated when the user moves the mouse pointer off of the object. Selected Answer: onMouseOut Correct Answer: onMouseOut Question 2 0 out of 1 points Case 7-2 Ryan is working with arrays in JavaScript for the first time. He is creating a cycling banner ad for his bicycle repair shop. Ryan’s co-worker, Pete, is experienced in the Pascal language, and had mistakenly written the ad in JavaScript using the same one-based indexing method as Pascal. In Pascal, a fourelement array would have the indices ____. Selected Answer: 0, 1, 2, and 3 Correct Answer: 1, 2, 3, and 4 Question 3 1 out of 1 points Case 7-2 Ryan is working with arrays in JavaScript for the first time. He is creating a cycling banner ad for his bicycle repair shop. Ryan’s ad includes four images so he creates a four-element array. The correct indices for a four-element array in JavaScript are ____. Selected Answer: 0, 1, 2, and 3 Correct Answer: 0, 1, 2, and 3 Question 4 1 out of 1 points Script piracy is ____. Selected Answer: both a. and b. Correct Answer: both a. and b. Question 5 1 out of 1 points The ____ event is triggered when the Web browser unloaded a page from memory. Selected Answer: onUnload Correct Answer: onUnload Question 6 0 out of 1 points Based on the examples in the lesson, by utilizing ____ , you can implement a successful cycling banner. Selected Answer: two JavaScript events Correct Answer: one JavaScript event and one JavaScript function Question 7 1 out of 1 points The symbol for a “non-breaking space” is called a(n) ____ code. Selected Answer: entity Correct Answer: entity Question 8 1 out of 1 points A hyperlink rollover is triggered when the user moves the mouse pointer over ____. Selected Answer: a hyperlink Correct Answer: a hyperlink Question 9 0 out of 1 points The ____ event is triggered when the user clicks the mouse pointer on an object. Selected Answer: onMouseClick Correct Answer: onClick Question 10 1 out of 1 points A(n) ____ banner is a sequence of graphic images that are displayed one after another with a small pause between each image. Selected Answer: cycling Correct Answer: cycling Question 1 1 out of 1 points The ____ attribute of input controls can be “text,” “radio,” or “checkbox.” Selected Answer: type Correct Answer: type Question 2 1 out of 1 points Old-style stereo systems used mechanical radio buttons that were usually ____, so the Windows programmers gave this shape to their radio buttons. Selected Answer: round Correct Answer: round Question 3 1 out of 1 points Case 8-1 Carmella is putting together an order processing system for her local pizza parlor, Pete’s Italian Pies. In the JavaScript below, Carmella realizes that the doSubmit() function does nothing more than invoke the JavaScript ____ method. <script> function doSubmit() { alert(“Your pizza order has been submitted.”); return; } </script> Selected Answer: alert() Correct Answer: alert() Question 4 0 out of 1 points In the case of C, C++, Java, and JavaScript, the assignment operation is accomplished with the ____ character(s). Selected Answer: “= =” Correct Answer: “=” Question 5 1 out of 1 points A JavaScript function can be invoked (or ____) when the user clicks the Submit Order button. Selected Answer: called Correct Answer: called Question 6 1 out of 1 points You can invert a true value to false or a false value to true by placing a single ____ in front of the variable. Selected Answer: ! Correct Answer: ! Question 7 1 out of 1 points When the server receives the form data, it is processed by another program that is typically written in ASP, JSP, PHP, or some other ____ scripting/programming language. Selected Answer: server-side Correct Answer: server-side Question 8 1 out of 1 points The validateText() function can only return one of two possible values: ____. Selected Answer: false or true Correct Answer: false or true Question 9 0 out of 1 points You begin the process of creating a fully functional, robust form by ____. Selected Answer: writing the JavaScript functions that are invoked when the user triggers a specific JavaScript event defining the general layout of the form on a Web page 1 out of 1 points Correct Answer: Question 10 A string can consist of ____. Selected Answer: all of the above Correct Answer: all of the above Question 1 1 out of 1 points To add an onLoad event to the <body> tag of your HTML file, the correct code would be ____. Selected Answer: <body onLoad="startup()"> Correct Answer: <body onLoad="startup()"> Question 2 1 out of 1 points Machine language commands look like ____. Selected Answer: 010101 Correct Answer: 010101 Question 3 1 out of 1 points Case 9-1 Sid is creating a Web site featuring a slide show of his trip to Italy and plans to use both an array and a function to start the slide show automatically. To initialize the image array, Sid uses the ____() function. Selected Answer: startup Correct Answer: startup Question 4 0 out of 1 points In the code below, "____" is the name attribute of the image. <body> <div align="center"> <img name="UpperImage" src="lions.gif"> </div> </body> Selected Answer: lions.gif Correct Answer: UpperImage Question 5 0 out of 1 points A frameset is always composed of multiple files. There must be one file that defines the frameset and ____ additional files that define the frames within that frameset. Selected Answer: one or more Correct Answer: two or more Question 6 0 out of 1 points You might find it easier to place many JavaScript function definitions in the top-level frameset file, and then every HTML document can easily access these functions by using the JavaScript ____ object. Selected Answer: top-level Correct Answer: top Question 7 1 out of 1 points Case 9-2 Sheila has created an online portfolio of her artwork using JavaScript. Sheila uses ____ attributes within the anchor tags to link to the photos in her slide show. Selected Answer: href Correct Answer: href Question 8 1 out of 1 points Before you can write JavaScript code that allows different frames to interact, you must create ____ documents that define a frameset. Selected Answer: HTML Correct Answer: HTML Question 9 1 out of 1 points ____ language followed machine language. Selected Answer: Assembly Correct Answer: Assembly Question 10 0 out of 1 points If you have a frameset nested within a second frameset that is nested within a third frameset and so on, you can access any frame you want by developing the proper sequence of ____ objects. Selected Answer: JavaScript child Correct Answer: JavaScript parent Case 10-1 Laura is working with JavaScript and HTML to add some functionality to her Web site. She needs to add id attributes to her <div> and <td> tags. The correct snippet of code Laura should use to add the id "MessageText" to a <div> tag is ____. Selected Answer: <div id="MessageText" style="color:black"> Correct Answer: <div id="MessageText" style="color:black"> Question 2 1 out of 1 points The name of the control below is ____. <font size="2">Text Color:</font><br> <select name="TextColor"> Selected Answer: TextColor Correct Answer: TextColor Question 3 1 out of 1 points The code below establishes a button labeled ____. <p> <input type="button" value="Apply Style"> </p> Selected Answer: Apply Style Correct Answer: Apply Style Question 4 1 out of 1 points The correct code to add hyperlink tags to an unordered list of headings is <li><____="javascript:top.locate('pictures')">Perfect Pictures</a></li> Selected Answer: a href Correct Answer: a href Question 5 0 out of 1 points The correct code to implement a background color on a page, with the color given in a hexadecimal number, would be ____. Selected Answer: <body style="background-color:#E6E6FA"> Correct Answer: <body style="background:#E6E6FA"> Question 6 1 out of 1 points If you have a JavaScript event that occurs in one frame and the effect of the event is only seen within the same frame, then your JavaScript code should reside ____. Selected Answer: in the same frame file Correct Answer: in the same frame file Question 7 1 out of 1 points If you want to modify the style of a particular HTML element, it is necessary to assign a(n) ____ to the element. Selected Answer: id Correct Answer: id Question 8 1 out of 1 points The correct code to establish a drop-down selection for cell color is ____. <font size="2">Cell Color:</font><br> <select name="CellColor"> ____ <option value="black">Black</option> <option value="red">Red</option> <option value="green">Green</option> <option value="blue">Blue</option> <option value="white">White</option> </select> Selected Answer: <option value="">- select -</option> Correct Answer: <option value="">- select -</option> Question 9 1 out of 1 points Case 10-2 Peter is fixing some code written by another employee. First he is working on understanding the current code. <head> <title>HTML and JavaScript</title> <style type="text/css"> h1 {color:red} h2 {color:blue} h3 {color:purple} p {color:black} </style> </head> After reviewing the code, Peter determines that the Web page contains a ____ style definition. Selected Answer: cascading Correct Answer: cascading Question 10 1 out of 1 points If a JavaScript event occurs in one frame and affects an object or element in a different frame, the code can often be kept to its simplest form if it is defined in the ____ frameset file. Selected Answer: top-level Correct Answer: top-level The code below ____: <frameset cols="20%,*"> <frame name="LeftFrame" src="left1.html"> <frame name="RightFrame" src="right1.html"> </frameset> 1. The code below adds an OnClick ____. <input type="button" value="Apply Style" onClick="top.apply_style()"> attribute behavior style event Master your semester with Scribd & The New York Times Special offer for students: Only $4.99/month. Master your semester with Scribd & The New York Times Cancel anytime.
__label__pos
0.929788
Primitive root of a prime number n modulo n Given a prime number n, the task is to find its primitive root under modulo n. Primitive root of a prime number n is an integer r between[1, n-1] such that the values of r^x(mod n) where x is in range[0, n-2] are different. Return -1 if n is a non-prime number. Examples: Input : 7 Output : Smallest primitive root = 3 Explanation: n = 7 3^0(mod 7) = 1 3^1(mod 7) = 3 3^2(mod 7) = 2 3^3(mod 7) = 6 3^4(mod 7) = 4 3^5(mod 7) = 5 Input : 761 Output : Smallest primitive root = 6 A simple solution is to try all numbers from 2 to n-1. For every number r, compute values of r^x(mod n) where x is in range[0, n-2]. If all these values are different, then return r, else continue for next value of r. If all values of r are tried, return -1. An efficient solution is based on below fact. If the multiplicative order of a number r modulo n is equal to Euler Totient Function Φ(n) (Note that Euler Totient Function for a prime n is n-1), then it is a primitive root [Source : Wiki] 1- Euler Totient Function phi = n-1 [Assuming n is prime] 1- Find all prime factors of phi. 2- Calculate all powers to be calculated further using (phi/prime-factors) one by one. 3- Check for all numbered for all powers from i=2 to n-1 i.e. (i^ powers) modulo n. 4- If it is 1 then 'i' is not a primitive root of n. 5- If it is never 1 then return i;. Although there can be multiple primitive root for a prime number but we are only concerned for smallest one.If you want to find all roots then continue the process till p-1 instead of breaking up on finding first primitive root. // C++ program to find primitive root of a // given number n #include<bits/stdc++.h> using namespace std;    // Returns true if n is prime bool isPrime(int n) {     // Corner cases     if (n <= 1)  return false;     if (n <= 3)  return true;        // This is checked so that we can skip     // middle five numbers in below loop     if (n%2 == 0 || n%3 == 0) return false;        for (int i=5; i*i<=n; i=i+6)         if (n%i == 0 || n%(i+2) == 0)             return false;        return true; }    /* Iterative Function to calculate (x^n)%p in    O(logy) */ int power(int x, unsigned int y, int p) {     int res = 1;     // Initialize result        x = x % p; // Update x if it is more than or     // equal to p        while (y > 0)     {         // If y is odd, multiply x with result         if (y & 1)             res = (res*x) % p;            // y must be even now         y = y >> 1; // y = y/2         x = (x*x) % p;     }     return res; }    // Utility function to store prime factors of a number void findPrimefactors(unordered_set<int> &s, int n) {     // Print the number of 2s that divide n     while (n%2 == 0)     {         s.insert(2);         n = n/2;     }        // n must be odd at this point. So we can skip     // one element (Note i = i +2)     for (int i = 3; i <= sqrt(n); i = i+2)     {         // While i divides n, print i and divide n         while (n%i == 0)         {             s.insert(i);             n = n/i;         }     }        // This condition is to handle the case when     // n is a prime number greater than 2     if (n > 2)         s.insert(n); }    // Function to find smallest primitive root of n int findPrimitive(int n) {     unordered_set<int> s;        // Check if n is prime or not     if (isPrime(n)==false)         return -1;        // Find value of Euler Totient function of n     // Since n is a prime number, the value of Euler     // Totient function is n-1 as there are n-1     // relatively prime numbers.     int phi = n-1;        // Find prime factors of phi and store in a set     findPrimefactors(s, phi);        // Check for every number from 2 to phi     for (int r=2; r<=phi; r++)     {         // Iterate through all prime factors of phi.         // and check if we found a power with value 1         bool flag = false;         for (auto it = s.begin(); it != s.end(); it++)         {                // Check if r^((phi)/primefactors) mod n             // is 1 or not             if (power(r, phi/(*it), n) == 1)             {                 flag = true;                 break;             }          }             // If there was no power with value 1.          if (flag == false)            return r;     }        // If no primitive root found     return -1; }    // Driver code int main() {     int n = 761;     cout << " Smallest primitive root of " << n          << " is " << findPrimitive(n);     return 0; } Output: Smallest primitive root of 761 is 6 Reference: https://en.wikipedia.org/wiki/Primitive_root_modulo_n#Finding_primitive_roots http://math.stackexchange.com/questions/124408/finding-a-primitive-root-of-a-prime-number This article is contributed by Niteesh kumar and Sahil Chhabra (akku). If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to [email protected]. See your article appearing on the GeeksforGeeks main page and help other Geeks. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above. My Personal Notes arrow_drop_up Recommended Posts: 3 Average Difficulty : 3/5.0 Based on 1 vote(s) User Actions
__label__pos
0.991171
    Resources Contact Us Home Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE     Process of pickling stainless steel 6250314 Process of pickling stainless steel Patent Drawings:Drawing: 6250314-2    Drawing: 6250314-3    Drawing: 6250314-4     « 1 » (3 images) Inventor: Wasserbauer, et al. Date Issued: June 26, 2001 Application: 09/353,776 Filed: July 15, 1999 Inventors: Braun; Edgar (Wien-Rodaun, AT) Maresch; Gerald (Modling, AT) Wasserbauer; Brigitta (Vienna, AT) Assignee: Andritz-Patentverwaltungs-Gesellschaft m.b.H. (Graz, AT) Primary Examiner: Carrillo; Sharidan Assistant Examiner: Attorney Or Agent: Roylance, Abrams, Berdo & Goodman, L.L.P. U.S. Class: 134/122R; 134/15; 134/2; 134/26; 134/28; 134/29; 134/3; 134/30; 134/32; 134/36; 134/40; 134/41; 134/64R Field Of Search: 134/2; 134/3; 134/15; 134/26; 134/28; 134/29; 134/30; 134/32; 134/36; 134/40; 134/41; 134/122R; 134/64R International Class: C23G 1/08 U.S Patent Documents: 3725527; 3928529; 4389254; 4807653; 5154774; 5615727; 5702534; 5786556; 5800694; 5804056; 5843240; 5851304; 5876522; 5879465; 5904204; 5992196 Foreign Patent Documents: 972854 Other References: Abstract: A process and apparatus for pickling the surface of stainless steel strip feeds the stainless steel strip through a plurality of pickling tanks containing a hydrochloric acid pickling acid. The pickling acid bath is maintained at a temperature of at least about 40.degree. C. An oxidizing agent is added to the acid solution in an amount to maintain at least about one third and preferably at least about half of the soluble iron in the form of ferric chloride based on the total amount of iron in the acid solution. Claim: What is claimed: 1. A process for pickling stainless steel comprising the steps of feeding a stainless steel article into a pickling tank containing aqueous hydrochloric acid solution, and pickling said stainless steel article to form Fe.sup.2+ as ferrous chloride (FeCl.sub.2) and Fe.sup.3+ as ferric chloride(FeCl.sub.3) insaid hydrochloric acid solution, and continuously adding an oxidant to said hydrochloric acid solution in an amount in proportion to a surface area of the stainless steel article to oxidize said Fe.sup.2+ to Fe.sup.3+ to maintain at least about one third of a total dissolved ironcontent as ferric chloride in said hydrochloric acid solution, said oxidant being selected from the group consisting of nitric acid, chlorine, hydrogen peroxide, chlorine-oxygen compounds, and ferric chloride. 2. The process of claim 1, wherein said aqueous hydrochloric acid solution is at a temperature below the boiling point of an azeotropic hydrochloric acid solution. 3. The process of claim 1, wherein said chromium-oxygen compound is a chromate. 4. The process of claim 1, wherein said chlorine-oxygen compound is a chlorine containing acid. 5. The process of claim 1, comprising adding said oxidant in an amount to maintain at least about one half of said total dissolved iron content in said hydrochloric acid solution as ferric chloride. 6. The process of claim 1, comprising the step of measuring a content of said ferric chloride of said hydrochloric acid solution by measuring the density, conductivity, or oxidation reduction potential, by photometric analysis of saidhydrochloric acid solution or a combination thereof 7. The process of claim 1, comprising determining the surface area of said stainless steel article being pickled by said hydoloric acid solution and adding said oxidant in an amount based on said surface area. 8. The process of claim 1, comprising determining the weight of said stainless steel article being pickled by said hydrochloric acid solution and adding said oxidant to said hydrochloric acid solution in an amount based on said weight. 9. The process of claim 1, wherein said pickling tank includes a circulating pump to circulate said hydrochloric acid solution from an outlet pipe of said tank to an inlet pipe of said tank, and said method comprises adding said oxidant to saidoutlet pipe. 10. The process of claim 1, wherein said pickling tank including a circulating tank and said process comprises supplying said oxidant to said pump to feed said oxidant directly into said hydrochloric acid solution. 11. The process of claim 1, comprising pumping said hydrochloric acid solution from said pickling tank to a circulation tank and adding said oxidant to said circulation tank to oxidize Fe.sup.2+ to Fe.sup.3+. 12. The process of claim 1, comprising feeding said stainless steel article through a plurality of said acid pickling tanks arranged adjacent each other and mechanically cleaning a surface of said article between adjacent pickling tanks. 13. The process of claim 6, comprising adding said oxidant to said hydrochloric acid solution based on said measured ferric chloride content to provide a ferric chloride content of said at least one third based on said total dissolved ironcontent in said hydrochloric acid solution. 14. The process of claim 12, comprising brushing said surface of said article between adjacent pickling tanks to remove scale from said surface. 15. A process of pickling a stainless steel strip comprising: providing a plurality of adjacent tanks arranged in series, each said tank containing an aqueous hydrochloric acid solution, feeding a continuous stainless steel strip through said aqueous hydrochloric acid solutions in each of said pickling tanks to pickle the surface if said strip thereby forming Fe.sup.2+ as ferrous chloride (FeCl.sub.2) and Fe.sup.3+ as ferricchloride (FeCl.sub.3) in said aqueous hydrochloric acid solution, and continuously supplying an oxidant to said aqueous hydrochloric acid solution in each of said pickling tanks in an amount to oxidize at least a portion of Fe.sup.2+ to Fe.sup.3+ and to maintain a ferric chloride content of at least about one thirdbased on a total soluble iron content in each of said aqueous hydrochloric acid solutions in a pickling tanks, wherein said oxidant is selected from the group consisting of nitric acid, chlorine, hydrogen peroxide, chlorine-oxygen compounds, and ferricchloride. 16. The process of claim 15, wherein said aqueous hydrochloric acid solution in each of said pickling tanks is maintained at a temperature of at least about 40.degree. C. 17. The process of claim 15, wherein said oxidant is a chromate. 18. The process of claim 15, wherein said oxidant is a chlorine containing acid. 19. The process of claim 15, wherein said oxidant is included in an amount to maintain said ferric chloride content of at least about one half based on said total soluble iron content in said aqueous hydrochloric acid solution. 20. The process of claim 15, comprising the step of measuring the ferric chloride content in said aqueous hydrochloric acid solution by measuring the density, conductivity, or oxidation reduction potential by photometric analysis of said aqueoushydrochloric acid solution or combination thereof, and adding said oxidant to said aqueous hydrochloric acid solution based on said measured ferric chloride content. 21. The process of claim 15, comprising determining a weight of said stainless steel article being pickled by said aqueous hydrochloric acid solution and adding said oxidant in an amount based on said surface area. 22. The process of claim 15, comprising determining a weight of said stainless steel article being pickled by said aqueous hydrochloric acid solution and adding said oxidant to said aqueous hydrochloric acid solution in an amount based on saidweight. 23. The process of claim 15, wherein said acid pickling tanks include a circulating pump to circulate said aqueous hydrochloric from an outlet pipe of said pickling tank to an inlet pipe of said pickling tank, and said method comprising adding said oxidant to said outlet pipe. 24. The process of claim 15, wherein each of said aqueous hydrochloric acid solution from an outlet pipe to an inlet pipe of said pickling tank, and said method comprises supplying said oxidant to said oxidant to said pump to feed said oxidantdirectly into said aqueous hydrochloric acid solution. 25. The process of claim 16, wherein said oxidant is included in an amount to maintain said ferric chloride content of at least about one half based on said total soluble iron content in said aqueous hydrochloric acid solution. Description: FIELD OF THE INVENTION The present invention is directed to a process a pickling stainless steel. More particularly, the invention is directed to a process for pickling stainless steel in an acid bath. BACKGROUND OF THE INVENTION The process of pickling carbon steel with hydrochloric acid has established itself world-wide over the past few years as an effective pickling process and is used in virtually all countries and steel works. In stainless steel pickling, however,there was always the technical belief that conventional steel pickling methods could not be used for stainless steel because of the different levels and type of scale formation on stainless steel. Surprisingly, however, it was shown that a picklingeffect most certainly could be achieved with hydrochloric acid. However, the pickling times required to obtain a scale-free surface on stainless steel using hydrochloric acid are very long compared with carbon steel. A steel strip of grade St 12, forexample, is pickled over a maximum of 30 seconds at 80.degree. C., whereas a comparable strip of grade AISI 409 stainless steel takes up to 10 minutes at 90.degree. C. These extremely long pickling times for stainless steel using hydrochloric acid areunsuitable for practical operations because the number and length of tanks needed for pickling would be too great. During the formation of stainless steel sheet products, a layer of scale is typically produced on the surface of the steel sheet. The scale must be removed, typically by pickling, before the steel can be used or further processed. Manystainless steel pickling baths use a mixture of hydrofluoric acid and nitric acid. The mixture of these acids causes numerous problems associated by the sludge formation of these acids in the tanks. In addition, acid pickling of stainless steel by theconventional process is a very slow process and requires complex treating baths to provide adequate retention time of the stainless steel in the acid bath. The sequential pickling steps result in increased operating costs. Accordingly, there is a continuing need in the industry for improved methods of pickling stainless steel. SUMMARY OF THE INVENTION The present invention is directed to a process and apparatus for pickling stainless steel. More particularly, the invention is directed to a continuous process for pickling a continuous strip of stainless steel in a hydrochloric acid bath in anefficient and economical fashion. Accordingly, a primary aspect of the invention is to provide a process and apparatus for efficiently pickling stainless steel in an acid bath with reduced pickling times compared to prior processes. Another object of the invention is to provide a process and apparatus for pickling stainless steel in a hydrochloric acid solution where the solution contains an oxidant. Another object of the invention is to provide a process and apparatus for pickling stainless steel in a hydrochloric acid solution where an oxidant is added to the acid to oxidize at least a portion of the dissolved iron to ferric chloride. Another object of the invention is to provide a process and apparatus for pickling stainless steel in an aqueous hydrochloric acid solution where an oxidant is added to the hydrochloric acid solution in an amount based on the calculated dissolvediron content in the acid solution. Still another object of the invention is to provide a process and apparatus for pickling stainless steel in an aqueous hydrochloric acid solution where at least one third of the soluble iron content in the acid solution is present in the form offerric chloride. Another object of the present invention is to provide a process and apparatus for pickling stainless steel in an aqueous hydrochloric acid solution where at least one half of the soluble iron content in the acid solution is present in the form offerric chloride. A further object of the invention is to provide a process for pickling stainless steel in an aqueous hydrochloric acid solution at a temperature of at least 40.degree. C. A further object of the invention is to provide a process for pickling stainless steel in an aqueous hydrochloric acid solution at a temperature at or below the boiling point of an azeotropic hydrochloric acid solution. Another object of the invention is to provide a process of pickling stainless steel in an aqueous hydrochloric acid solution where the ferric chloride content in the acid solution is measured and an oxidant is added to the solution in an amountbased on the measured ferric chloride content Still another object of the invention is to provide a process and apparatus for pickling stainless steel in an aqueous hydrochloric acid solution where an oxidant is added to the solution in an amount based on the weight or surface area of thestainless steel strip being pickled. The objects of the invention are basically obtained by providing a process for pickling stainless steel comprising the steps of feeding a stainless steel article into a bath of an aqueous hydrochloric acid solution and continuously adding anoxidant to the hydrochloric acid solution in an amount in proportion to the surface area to the stainless steel article to maintain at least about one third of the dissolved iron content as ferric chloride. The objects of the invention are further obtained by providing a process for pickling a stainless steel strip comprising the steps of providing a plurality of pickling tanks arranged in series where each tank contains an aqueous hydrochloric acidsolution, feeding a continuous stainless steel strip through the hydrochloric acid solution in each of said tanks to pickle the surface of the strip, and continuously adding an oxidant to the hydrochloric acid solution in each of the tanks in an amountto oxidize Fe.sup.2+ to Fe.sup.3+ and to maintain a ferric chloride content of at least about one third based on the total dissolved iron content of the acid solution. Other objects, advantages and salient features of the invention will become apparent from the following detailed description which in conjunction with the annexed drawings disclose a preferred embodiment of the present invention. BRIEFDESCRIPTION OF THE DRAWINGS The following is a brief description of the drawings which form a part of this original disclosure, in which: FIG. 1 is a schematic diagram of a pickling tank for pickling a stainless steel strip; FIG. 2 is a graph showing the comparative pickling time of stainless steel by the addition of an oxidant to the acid solution at a temperature of 80.degree. C.; FIG. 3 is a graph showing the comparative pickling time of a stainless steel strip with the addition of an oxidant at a temperature of 90.degree. C.; FIG. 4 is a graph showing the comparative pickling times of a stainless steel strip with the addition of perchloric acid; FIG. 5 is a graph showing the comparative pickling times of AISI 430 stainless steel at 80.degree. C.; and FIG. 6 is a graph showing the comparative pickling times of AISI 304 stainless steel at 80.degree. C. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention is directed to a process and apparatus for pickling stainless steel. More particularly, the invention is directed to a process for pickling stainless steel in a bath of a hydrochloric acid solution with reduced picklingtimes. The process of the invention uses a hydrochloric acid solution for pickling stainless steel in a manner to reduce the pickling time about 50% compared to the prior stainless steel acid pickling processes. The hydrochloric acid solution contactsthe stainless steel to produce ferrous chloride and ferric chloride in the acid solution. The invention is directed to a process of adding an oxidizing agent to the hydrochloric acid solution in an amount to oxidize the ferrous chloride to ferricchloride. Oxidizing the soluble iron to ferric chloride has been found to reduce the pickling time for stainless steel as much as 50% compared to the prior acid pickling solutions used for stainless steel. The oxidizing agent is added to the hydrochloric acid solution in the pickling tank in an amount to attain the desired reduction in pickling time. In preferred embodiments, the oxidizing agent is added to the hydrochloric acid solution in anamount to oxidize the ferrous chloride to ferric chloride where at least about one third of the soluble iron content in solution is present as ferric chloride based on the total weight of the soluble iron content in solution. Thus, the Fe.sup.3+concentration in the acid solution is at least one third of the combined weight of the Fe.sup.2+ and Fe.sup.3+. In further embodiments, the oxidizing agent is added in an amount to maintain a ferric chloride content of at least about 50% by weight basedon the total amount of the soluble iron in the acid solution. In embodiments of the invention, the amount of the oxidizing agent is calculated and added to the pickling acid based on the surface area of the stainless steel being treated in the acid bath to maintain at least about one third of the solubleiron content as ferric chloride based on the total amount of the soluble iron in the acid solution. The feed rate and dimensions of the stainless steel strip and the acid concentration are used to calculate the acid consumption and formation of ironsalts, and particularly, the ferric chloride concentration in the acid solution. The amount of the oxidizing agent is added in an amount based on the surface area of the steel to attain the target percent of Fe.sup.3+. Alternatively, the oxidizingagent can be added in proportion to the weight of the stainless steel being treated by the acid solution. The amount of the oxidizing agent is based on theoretical calculations of the acid consumption and the formation of soluble iron salts based on theaverage surface area or weight of the stainless steel strip being treated. The oxidizing agent can be any suitable oxidizing agent capable of oxidizing Fe.sup.2+ to Fe.sup.3+ as known in the art. Examples of suitable oxidizing agents include for example nitric acid, chlorine, hydrogen peroxide and chlorine hydrogencompounds. Other suitable oxidizing agents include acids containing chlorine, such as perchloric acid, chromium oxygen compounds, such as chromium oxide (CrO.sub.3), and ferric chloride. The hydrochloric acid solution is typically a concentrated hydrochloric acid having a pH of about 1.0. In preferred embodiments the hydrochloric acid solution is an azeotropic hydrochloric acid solution such that the acid concentration in thevapor phase is substantially the same as the acid solution in the pickling tanks. An acid concentration greater than an azeotropic mixture results in a high acid concentration in the exhaust fumes which must be removed prior to discharging the fumes tothe atmosphere. The hydrochloric acid solution is maintained at a temperature of at least about 40.degree. C. during the pickling process of the stainless steel. In further embodiments, the hydrochloric acid solution is maintained at a temperature ator below the boiling point of an azeotropic hydrochloric acid solution. The ferric chloride content of the acid pickling solution is determined using standard techniques. For example, in embodiments of the invention, the ferric chloride content of the acid solution is determined by measuring the density of thesolution, measuring the conductivity or oxidation reduction potential of the solution by photometric measurements and combinations of these methods. Preferably, the ferric chloride content is maintained within a predetermined range and the oxidizingagent is added to the hydrochloric acid solution based on the measured ferric chloride content to maintain the ferric chloride content within the desired range. The rate and amount of the oxidizing agent added to the acid solution can be adjusted inresponse to the rate of pickling as determined by the measured ferric chloride or ferric ion content of the acid solution. Thus, the oxidizing agent is added to the hydrochloric acid solution in an amount to maintain the measured ferric chloride contentat about one third based on the total iron content and solution. In further embodiments, the oxidizing agent is added to maintain about one half of the soluble iron as ferric chloride. Referring to FIG. 1, a continuous pickling apparatus is illustrated for use in the process of the present invention. The apparatus as shown includes pickling tanks 12, 14 and 16 connected in series. Each of the pickling tanks include feedrollers 18 at the inlet ends 20 for feeding a continuous strip of stainless steel 22 through the tanks. Discharge rollers 24 are positioned at the outlet end 26 of the tanks to guide the stainless steel strip 22 and support the strip in the hydrochloricacid solution 28. Fresh hydrochloric acid is generally supplied to the downstream tank 16 with respect to the feed direction of the stainless steel strip 22. The acid flows into the tank 16 and overflows or is pumped into the adjacent upstream tank 14. The acid in tank 14 is similarly pumped into the upstream tank 12. The stainless steel strip is feed into the first pickling tank 12 and is carried sequentially through the tanks 14 and 16. The hydrochloric acid removes the scale from the stainlesssteel to form ferrous chloride and ferric chloride salts in the acid solution. The soluble iron content in the acid in the upstream tank 12 is generally the highest with the iron content decreasing in concentration in tanks 14 and 16, respectively. The acid solution 28 in preferred embodiments of the invention is an azeotropic hydrochloric acid solution. An azeotropic hydrochloric acid solution is desirable to prevent the escape of high concentrations of hydrogen chloride in the exhaustgases. The acid solution in each of the tanks 12, 14 and 16 is circulated through a pipe 30 from the upstream end of the tank and is carried by a pump 32 to a recirculation tank 34 where the acid is regenerated or replenished with fresh acid. The acidfrom the circulation tank 34 is pumped through a pipe 36 and recycled to the discharge end of the respective pickling tank. The oxidizing agent can be added to the hydrochloric acid in solid form as a powder. Alternatively, the oxidizing agent can be added as a gas or as an aqueous solution. Generally a powdered or gaseous oxidizing agent is more preferred to avoiddiluting the pickling acid with the solvent. In preferred embodiments, the oxidizing agent can be supplied to the pipe 30 upstream of the pump 32 such that the suction at the inlet of the pump 32 draws the oxidizing agent into the acid solution andcarries the mixture to the recirculation tank 34. The oxidizing agent and the spent acid withdrawn from the pickling tanks are mixed in the recirculation tank 34 to oxidize the ferrous chloride to ferric chloride which is then retuned to the picklingtank. Alternatively, the oxidizing agent can be fed directly into the recirculating tank 34 through a pipe 40. Alternatively, the oxidizing agent can be supplied directly to a separate feed inlet of the pump 32 or supplied with the fresh acid directlyinto the pickling tank. A measuring device 42 is provided in each of the pickling tanks to continuously monitor and measure the ferric chloride concentration of the acid solution. The measuring device can be a conventional device capable of continuously monitoring theFe.sup.3+ concentration. In further embodiments, the measuring device can determine the Fe.sup.3+ concentration at predetermined intervals. The measured ferric chloride concentration is used as a basis to determine the feed rate and the amount of theoxidizing agent added to the hydrochloric acid solution. The measuring device can be coupled to a metering device (not shown) for feeding and controlling the amount of the oxidizing agent added to the hydrochloric acid solution. In preferredembodiments of the invention, the oxidizing agent is added continuously with the circulation of the spent pickling acid to maintain a substantially constant ferric chloride acid solution and to prevent the ferric chloride concentration from falling belowthe threshold value. Generally, the oxidizing agent is continuously added to the acid solution to maintain at least one third and preferably at least one half of the soluble iron content in the form of ferric chloride based on the total amount of theiron content in the acid solution. In a further embodiment, brushes 44 can be installed between the individual pickling tanks as shown in FIG. 1 to remove any loose scale adhering to the strip surface. As a result, the pickling time can generally be further reduced by 5-10% inall tests. Brushes with abrasive particles, such as silicon carbide or aluminum oxide in their bristles, are proven to be a particular advantage. The brushes can be positioned above and below the stainless steel strip to remove scale from both surfaces ofthe strip. The following examples demonstrate preferred embodiments of the invention, but are not intended to limit the scope of the invention. EXAMPLE 1 Pickling tests were conducted on a stainless steel strip of grade AISI 409 in a pickling pilot plant comprising three pickling tanks, each being 20 m long substantially as shown in FIG. 1. The operating conditions for the plant were as follows:.sup.st, pickling tank 216 g HC1 in total, 85 g dissolved iron, 84 g of which were Fe.sup.2+ and approx. 1 g Fe.sup.3+, 9 g Cr.sup.3+ /1 2.sup.nd pickling tank 200 g HC1 in total, 60 g dissolved iron, all in the form of Fe.sup.2+, and approx. 7 gCr.sup.3+ /1 3.sup.rd pickling tank 195 g HC1 in total, 35 g dissolved iron, 33 g of which were Fe.sup.2+, 2 g Fe.sup.3+, 4 g Cr.sup.3+ /1 The temperature in all pickling tanks was 80.degree. C. +2.degree. C. The pickling acids were pumped into the pickling tanks at a rate of 150 m.sup.3 /hr from the circulation tanks assigned to the respective circulation tank through theoutlets. The first stainless steel strip was transported through the pickling tanks at a rate of 30 m/min to provide a pickling time of 120 secs. Minimal pickling was observed after the process. The same strip was pulled through the pickling tanks asecond time and then only approximately 50% de-scaling was observed. The strip was not entirely free from scale until it was transported through the pickling tank one more time at a speed of 15 m/min. The overall pickling time was thus approximately 480sec. EXAMPLE 2 A pickling plant having three pickling tanks as in Example 1 was used in this example. The chlorine gas was supplied to the circulation tanks and pickling tanks. The composition of the resulting acid solution in each tank was as follows:1.sup.st pickling tank 216 g HC1 in total, 85 g dissolved iron, 54 g of which were Fe.sup.2+ and approx. 31 g Fe.sup.3+, 9 g Cr.sup.3+l / 1 2.sub.nd pickling tank 200 g HC1 in total, 60 g dissolved iron, 38 g of which were Fe.sup.2+, 22 g Fe.sup.3+, 4 gCr.sup.3+ /1 3.sup.rd pickling tank 195 g HC1 in total, 35 g dissolved iron, 22 g of which were Fe.sup.2+, 13 g Fe.sup.3+, 4 g Cr.sup.3+ /1 The temperature in all pickling tanks was 80.degree. C. +2.degree. C. At a reduced speed of 15 m/min. the stainless steel strip had to be conveyed through the pickling tanks twice in order to obtain a surface completely free from scale. The overall pickling time was thus unchanged at 480 secs. EXAMPLE 3 The ferric chloride concentration in the pickling tanks was further increased by adding hydrogen peroxide to the suction pipes leading to the centrifugal pumps for pumping the acid solution through the circulation tank. The composition of theacid solution were adjusted as follows: 1.sup.st pickling tank 216 HC1 in total, 85 g dissolved iron, 38 g of which were Fe.sup.2+ and approx. 47 g Fe.sup.3+, 34 g Fe.sup.3+, 9 g Cr.sup.3+ /1 2.sup.nd pickling tank 200 g HC1 in total, 60 g dissolvediron, 26 g of which were Fe.sup.2+, 34 g Fe.sup.3+, 7 g Cr.sup.3+ /1 3.sup.rd pickling tank 195 g HC1 in total 35 g dissolved iron, 15 g of which were Fe.sup.2+,20 g Fe.sup.3+, 4 g Cr.sup.3+ /1 The temperature in all pickling tanks was 80.degree. C. +2.degree. C. The strip was free from scale after passing through the pickling tanks only once at a speed of 15m/min. The overall picking time in this test was only 240 secs. EXAMPLE 4 The acid solution of Example 3 was adjusted to oxidize substantially all of the soluble iron to Fe.sup.3+ by addition of oxidants in each of the tanks. The stainless steel strip was carried through the pickling baths at 80.degree. C. Thepickling time of the stainless steel strip was unchanged from Example 3. The table of FIG. 2 shows the results of Examples 1-4 with the pickling times expressed as a fraction based on the pickling time of Example 1. The pickling time of Example 1 was used as a base line for comparing with the pickling time ofExamples 2-4. EXAMPLES 5-8 The concentration of the pickling tanks of Examples 5-8 were adjusted as in Examples 1-4, respectively. The temperatures of the pickling acid was adjusted to 90.degree. C. The pickling times are shown in the table of FIG. 3 and are expressed asa fraction based on the pickling time of Example 5. By increasing the temperature to 90.degree. C., the speed could be increased to 18m/min at the concentrations of Examples 14 with satisfactory pickling. The pickling tanks of Example 7 have theconcentrations as in Example 3 provided a pickling time of 200 seconds. EXAMPLES 9-14 The pickling tanks of Examples 9-14 having initial iron and acid concentrations as in Examples 1-4, respectively were adjusted with perchloric acid to increase the ferric chloride concentration. The amount of perchloric acid added to the acidsolution was calculated as a percentage based on the theoretical perchioric acid consumption according to the equation The pickling times of Examples 10-14 are shown in the table of FIG. 4 as a fraction of the pickling for the acid solution of Example 9, without the addition of perchloric acid. Thus, Example 9 with 0% perchloric acid serves as the base line forcalculating the reduction in pickling times. With the successive addition of 10% by volume perchloric acid, the pickling time was also reduced successively. These examples show that at least 50% of the dissolved metals being present in the form offerric chloride provides improved pickling performance and reduced pickling times. EXAMPLES 15-18 The pickling tanks of Examples 15-18 were adjusted to the iron and acid concentrations as in Examples 1-4. A stainless steel strip of AISI 430 was transported through the acid solution according to the procedure of Examples 1-4. The comparativepickling times are shown in the table of FIG. 5 using the pickling time of Example 1 as a base line for calculating the improvements in pickling times for Examples 15-18. EXAMPLES 19-22 The pickling tanks of Examples 19-22 were adjusted to the iron and acid concentrations as in Examples 1-4. A stainless steel strip of AISI 304 was transported through the tanks according to the procedures of Examples 1-4. The comparativepickling times are shown in the table of FIG. 6 using the pickling time of Example 1 as a base line for calculating the improvements in pickling time for Examples 19-22. Various embodiments have been chosen to illustrate the invention. It will be apparent to those skilled in the art that various modification can be made to the process without departing from the invention as defined in the appended claims. * * * * *       Recently Added Patents Method and apparatus for signaling transmission code set in data broadcasting Stripe-based memory operation Methods and apparatuses for operating a data processing system Configuration of an electro-mechanical fifth wheel lock control unit (lock controller) Anchor/shifting tool with sequential shift then release functionality Domain appraisal algorithm Semiconductor device having a bus configuration which reduces electromigration   Randomly Featured Patents Automatic needle selection mechanism for a knitting machine Self-watering flower pot Method and system for efficiently organizing data in memory Phenolic resin molding material Means for water and wastewater treatment Building block Optical fiber manufacturing, cooling and coating method Creation and distribution of a secret value between two devices Data synchronization for devices supporting direction-based services Electronic watch  
__label__pos
0.598352
Research ArticleECOLOGY Foraging behavior links sea ice to breeding success in Antarctic penguins See allHide authors and affiliations Science Advances  24 Jun 2020: Vol. 6, no. 26, eaba4828 DOI: 10.1126/sciadv.aba4828 Abstract Population trends and breeding success variability of Adélie penguins, a bioindicator of Antarctic environments, have been attributed to changing sea-ice extents; however, causative mechanisms remain unclear. By electronically tagging 175 penguins in four seasons with contrasting sea-ice conditions, we show that ice-free environments enhance, not deteriorate, foraging efficiencies and breeding success. In an ice-free season, penguins traveled by swimming rather than walking, leading to larger foraging areas, shorter trip durations, and lower energy expenditure than three ice-covered seasons. Freed from the need to find cracks for breathing, dive durations decreased, and more krill were captured per unit dive time, which may also be associated with phytoplankton blooms and increased krill density in the sunlit ice-free water. Consequently, adult body mass, chick growth rates, and breeding success increased. Our findings explain the regional population trends and demonstrate a key link among sea ice, foraging behavior, and reproductive success in this iconic species. This is an open-access article distributed under the terms of the Creative Commons Attribution license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. View Full Text Stay Connected to Science Advances
__label__pos
0.873562
Why Does my PS3 Keep Freezing? Fix PS3 Freezing! Ethan Sullivan By Ethan Sullivan 22 Min Read 22 Min Read Causes of PS3 Freezing To understand the causes of PS3 freezing, delve into the section on ‘Causes of PS3 freezing’ with ‘overheating, hardware issues, and firmware issues’ as the solution. Identifying which of these sub-sections your PS3 is affected by is essential to fixing the problem, keeping your gaming experience uninterrupted. Overheating The issue of excessive heat causing the PS3 to freeze is a common occurrence faced by gamers. The PS3 generates heat while running games, and if not dissipated properly, can cause freezing and shutdowns. To prevent overheating, ensure that the console has enough space for air circulation while in use. Keep it away from walls and enclosed spaces and avoid operating it on soft surfaces like bedding or carpets. Moreover, clean the vents and fans regularly to remove any accumulation of dust or debris. Additionally, using cooling pads or fan systems can mitigate the chances of overheating and prolong the PS3’s lifespan. Remember to switch off the console when not in use to avoid continuous strain on its components. Unique details suggest that playing graphic-intensive games for an extended period can cause significant overheating issues, most notably during summer months. In such cases, placing a small fan directly over the console can help. A true fact mentioned by CNET states that keeping the PlayStation 3 in a well-ventilated area is essential to prevent damage to both the system and game discs due to high temperatures. Why go to the gym when your PS3 can give you a workout? Just try to lift it after it freezes due to hardware issues. Hardware Issues When it comes to the root cause of PlayStation 3 freezing, one issue that cannot be ignored is the presence of potential hardware problems. These issues might have an impact on vital components that are responsible for maintaining overall performance. In particular, overheating is a common hardware issue that may lead to system errors and interruption of gameplay. Additionally, damaged hard drives or other internal hardware factors can also contribute to PS3 freezing. It’s essential to check the functionality and condition of your console’s hardware regularly. One relatively easy way to prevent overheating is by ensuring proper ventilation and dust removal from vents. As for detecting any damage in other areas, a technical inspection by a professional repair service may be necessary. To avoid running into hardware-related freezing, it is crucial to perform regular check-ups and maintenance activities on the console. Remember that keeping your PlayStation 3 clean and free from any potential hazards will significantly reduce the chances of internal damage. Pro Tip: If you sense even slight signs of your PS3 overheating or experiencing lagging issues, immediately power off the console and allow enough time for it to cool down. Firmware issues on the PS3? Sounds like a chilly problem, better bring a warm blanket for your console. Firmware Issues One of the factors that contribute to PS3 freezing is related to its internal software, which affects its performance. The firmware within the PS3 is an essential part of its system, but if it malfunctions or becomes corrupted, it could cause the console to freeze. This issue arises when there are bugs or glitches within the system that affect the stability and smoothness of operations. Firmware issues can also occur when new updates aren’t installed correctly, leading to compatibility problems with other software on the console. If these issues continue to persist without being addressed, they could lead to further hardware problems in the future. A possible solution is to regularly update the firmware when prompted and apply important patches as soon as they become available. It’s also vital to ensure that any software you install on your PS3 is safe and compatible with other programs installed on your device. Pro Tip: Ensure that all firmware updates and patches are applied promptly to avoid future issues with your PS3. Get ready to channel your inner IT expert as we tackle the pesky problem of PS3 freezing. Troubleshooting Steps to Fix PS3 Freezing To troubleshoot and fix your PS3’s recurring freezing issue, follow these solutions presented in the ‘Troubleshooting Steps to Fix PS3 Freezing’ section. Clear the cache and rebuild database, delete corrupted data, disable media server connection, check for software updates, reset the PS3 system settings, and use safe mode, which are the sub-sections that offer helpful strategies for addressing different reasons behind the freezing problem. READ ALSO:  How to Use Headphones on PS3 with PS4 Controller? – PS3 Headphones Clear the Cache and Rebuild Database Clearing the PS3’s cache and rebuilding its database can resolve freezing issues. Here’s how to do it: 1. Turn off the PS3 entirely and unplug it from the power source 2. Press and hold down the power button until the console beeps twice 3. Select “Rebuild Database” from the menu that appears on the screen 4. Wait for the system to complete the process before turning it back on It is crucial to understand that this process will erase all notifications, messages, and folders’ organization in your PS3’s memory. Additionally, clearing cache and rebuilding database can help fix your PS3’s overall performance issues, including slow start-up times and crashes when accessing specific games or apps. It would help if you repeated this action every so often to keep your PS3 running at optimal performance. A common problem most gamers face is their console freezing while playing a game or performing any task. This issue could be due to multiple reasons such as overheating or corrupted files in your system, just like any other device. Once I had encountered a constant freezing issue while playing my favorite game Dragon Age II on my PS3. After scouring countless articles online, this was one of the steps that significantly helped me improve my gameplay experience by resolving freezing issues. Say goodbye to that corrupted data like it’s a bad ex, and hit delete like you’re swiping left on Tinder. Delete Corrupted Data In order to resolve PS3 freezing, it is essential to remove any corrupted data that may have led to the issue. This can be achieved by following several simple steps: 1. First, power off the console and unplug all cables. 2. Next, locate the hard drive cover on the left side of the PlayStation 3. 3. Use a screwdriver to remove the HDD cover and expose the hard drive itself. 4. Carefully remove the hard drive and insert it into a computer with internet access. 5. Format the hard drive using FAT32 file system and rename it before inserting back into console. 6. Power up PS3 and restore default settings. By performing these 6 steps, users can effectively delete any corrupted data on their PlayStation 3, preventing further freezing issues from occurring. PS3 users must take note that corrupt data is usually caused by power outages or hardware malfunctions. A PS3 owner recounts his experience when his console consistently froze while playing Call of Duty online. Despite trying various solutions, including resetting his modem and router, it became apparent that deleting corrupted saved data was imperative for resolving his issue. After deleting said data via USB storage device in Safe Mode, no further issues arose during gameplay – highlighting how crucial it is to delete corrupt data when troubleshooting PS3 freezes. Take a break from your virtual social life- disable that pesky media server connection and get back to reality. Disable Media Server Connection When the PS3 freezes, it can be frustrating, and one of the troubleshooting steps is to disable the connection to the media server. Here’s how you can do it: 1. Navigate to ‘Settings’ on your PlayStation 3 and select ‘Network Settings.’ 2. Choose ‘Media Server Connection’ and disable it by selecting ‘Disable’ from the options available. 3. Confirm your choice by clicking ‘Yes.’ Disabling media server connections can help alleviate PS3 freezing issues, as it may prevent conflicting or overloaded data transfers through your network. It’s essential to note that while disabling the media server connection may not fix all PS3 freezing problems, it’s still a crucial step in troubleshooting. So follow this guide carefully. Don’t let PS3 freezing dampen your gaming experiences; try disabling media server connections for smoother gameplay. Don’t be stuck in the past, update your PS3 software or risk freezing like a statue. Check for Software Updates Ensuring the PS3 is up to date with the latest software patches can prevent freezing issues. Updating your PS3’s firmware is essential for optimal performance of your console and may help fix any issues related to freezing. You can check for updates by connecting your device to the internet and navigating to the System Update option in the Settings menu. This will check if any new updates are available and prompt you to install them. It’s important to note that updating your console may take some time, so ensure that you have a reliable internet connection and enough battery life or power supply before starting the process. In addition, regularly checking for game patches and updates can also prevent freezing. Many games have bugs that can cause freezes or crashes, but developers often release patches to address these issues. These updates can be downloaded from the game itself or through PSN. READ ALSO:  What does FTD mean on Dishwasher? – GE Dishwasher FTD code Historically, gaming consoles did not always have automatic software update options, making it a somewhat cumbersome process to manually update each console individually. However, with technological advancements and improvements in network connectivity speeds, updating a PS3 has become much more streamlined, taking only a matter of minutes. Time to hit the reset button and give your PS3 a fresh start, because sometimes turning it off and on again really is all the advice you need. Reset the PS3 System Settings To clear any freezing issues with your PS3, restoring the system settings can be a helpful solution. This action will reset the console back to its original settings without deleting any data from your storage devices. Follow the steps below for guidance: 1. Turn on the PS3 and navigate to the settings menu. 2. Select “System Settings,” followed by “Restore Default Settings.” 3. Choose “Yes” to confirm and wait for the system to complete the process. Restoring default settings on your PS3 is an easy fix for any freezing problems you may encounter. Once completed, try using your PS3 to ensure that gaming and streaming tasks are running smoothly. It’s worth noting that when you restore system settings, network connectivity information may be deleted alongside other saved passwords. It is recommended that you have this information stored beforehand to avoid any inconveniences in future usage. According to Techspirited, Sony’s PlayStation 3 (PS3) takes around 2 minutes and 10 seconds to boot up fully from turning it on. Safe Mode: because sometimes you just need to give your PS3 a time-out like a misbehaving child. Use Safe Mode To troubleshoot a freezing PS3, it is recommended to boot the system in a protected mode. The following steps should be taken to utilize Safe Mode. 1. Turn off the console and hold down the power button for several seconds until you hear two beeps. 2. Plug your controller into the USB port on your PS3. 3. Select option three on the screen that appears and follow relevant prompts. By using Safe Mode, users can carry out maintenance operations such as restore file systems, rebuild databases or update software. It may also be beneficial to switch on a Scan for Corrupted Data option under Safe Mode’s menu when faced with persistent errors. It has been reported that over 50% of PS3 problems could have been resolved simply by using Safe Mode effectively. Utilizing this tool prior to seeking out technical support can save time and money while providing an easy DIY fix for minor issues. Keep your PS3 cool as ice and prevent freezing by giving it some TLC with these maintenance tips. Maintenance Tips to Prevent PS3 Freezing To prevent PS3 freezing, maintenance is key. Keep your console cool, clean it regularly, and keep the system software updated. These three maintenance tips will ensure your PS3 runs smoothly and prevent any frustrating freezes. Keep the PS3 Console Cool To prevent PS3 freezing, it is vital to maintain the right temperature around the console. High temperatures can cause overheating leading to failure or worse – permanent damage. Here are five ways to keep the PS3 console cool and functional for long periods: • Ensure adequate ventilation • Keep the console away from direct sunlight or heat sources • Use cooling fans or AC units near the console • Clean any dust accumulation around/beneath the console regularly • Regularly check for malfunctioning fan(s) of the PS3 and replace, if necessary. In addition to preventing PS3 freezing, ensuring optimal performance also means protecting your investment. Remember that regular maintenance includes keeping up with firmware/software updates and avoiding excessive gameplay sessions on consecutive days. Once, a friend had purchased a brand new PS3 but left it running overnight without proper ventilation. The next morning, he woke up to a completely dead console that refused to turn on. He had not considered proper heat regulation during gameplay or handling his device post-usage. Ultimately, he had to buy another one after paying exorbitant repair costs. It was an expensive lesson learned – maintaining ideal temperatures in any electronic device and taking care of it remains crucial in preserving its longevity. Don’t let your PS3 collect more dust than your Tinder matches – give it a good cleaning regularly. Clean the PS3 Console Regularly In order to maintain optimal performance of your PS3 console, it’s essential to regularly clean and maintain it. Dust and debris can accumulate over time, causing freezing and other issues with the system. To ensure your PS3 stays in top shape, follow this 5-step guide to cleaning your console: 1. Unplug the PS3 from the power source. 2. Gently remove any dust or debris from the vents using a soft, dry cloth. 3. Carefully clean the exterior of the console with a damp cloth, being sure not to get water inside any of the ports or openings. 4. If needed, use compressed air or a vacuum cleaner on low settings to remove stubborn dust stuck in hard-to-reach areas. 5. Plug the console back into its power source and turn it on to check for any further issues. READ ALSO:  How To Get Gta Rp On Ps4 - A Comprehensive & Detailed Guide It’s also important to note that keeping your PS3 in a well-ventilated area can help prevent dust buildup. A regular cleaning schedule can go a long way towards extending the lifespan of your PS3. Additionally, storing game discs properly can also help prevent freezing. Avoid leaving them out in direct sunlight or heat sources, as well as keeping them away from areas with high moisture levels. By taking these precautions and regularly maintaining your PS3 console, you can prevent freezing and other common issues and enjoy a smooth gaming experience for years to come. Updating your PS3 software is like giving it a virtual spa treatment, making sure it stays refreshed and rejuvenated. Keep the PS3 System Software Up-to-Date To ensure the proper functioning of your PS3 console, it is crucial to keep its system software up-to-date. Updating your PS3 system software comes with several benefits, including improved performance, bug fixes and enhanced features. Here is a simple five-step guide on how to keep the PS3 system software up-to-date: 1. Connect your PS3 console to an Internet connection 2. Select ‘Settings’ from the XMB menu and then scroll down until you find ‘System Update’ 3. Select ‘Update via Internet’ and press ‘X’ 4. Wait for the update process to complete 5. Restart your PS3 console when prompted after the update process It is advisable to repeat this process periodically as Sony occasionally releases updates for their operating systems. In doing so, you can ensure that your console remains free of bugs and glitches that may lead to freezing. In addition to updating the PS3 system software accordingly, changing network settings can also improve connectivity. A friend of mine had been experiencing frequent freezes while playing FIFA on his PlayStation 3 despite trying all sorts of supposed solutions. It was not until he followed my advice on updating his console’s system software that he managed to resolve this problem – The PS3 system software should always be up-to-date! A well-maintained PS3 is the key to a happy gaming life; neglect it and you’ll end up with a frozen nightmare. Conclusion: Achieving a Smooth and Functional PS3 Gaming Experience To ensure an uninterrupted and seamless gaming experience on your PS3, it is essential to follow certain guidelines. 1. Keep your console updated with the latest firmware to fix bugs and performance issues. 2. Ensure proper ventilation by placing it in a cool and well-ventilated area to prevent overheating. Finally, clean the internal components regularly to remove dust and debris that may affect its functionality. Additionally, check for any damaged cables or peripherals that may interfere with signal transmission. Furthermore, avoid overcrowding the hard disk by deleting unnecessary files regularly. Overall, following these tips will guarantee a smooth and functional PS3 gaming experience. When using your PS3 for extended periods without rest, you may experience freezes caused by an overheated system. The best way to prevent this is by shutting down your console periodically for a few hours before resuming gameplay. In the past, there have been multiple reports of freezing issues with PS3 consoles worldwide. Sony had issued a statement acknowledging the problem and released firmware updates addressing the issue. This has helped resolve most freezing cases reported since then. Frequently Asked Questions Why does my PS3 keep freezing? There are several reasons why your PS3 may be freezing, including overheating, outdated software, or hardware problems. How can I fix my frozen PS3? First, try unplugging the console and letting it cool down. If that doesn't work, try updating the software or resetting the system. If the problem persists, you may need to seek professional repair. How can I prevent my PS3 from freezing in the future? Make sure the console has proper ventilation and is not overheating. Keep the software updated and avoid downloading or using unauthorized programs or software. Also, avoid using the console for extended periods of time. Can a dirty or damaged disc cause my PS3 to freeze? Yes, if a disc is dirty or scratched, it can cause problems with the console's ability to read the data and can lead to freezing. Try cleaning the disc or using a different one to see if the problem persists. I've tried everything, but my PS3 still keeps freezing. What should I do? If you've tried all the troubleshooting methods and the problem persists, it may be time to seek professional repair. Share This Article Follow: Hey there, I'm Ethan, a tech enthusiast and copywriting expert. With a passion for all things tech, I've had the privilege of working with various tech blogs, sharing my expertise on topics ranging from Tech, Android, Windows, Internet, Social Media, Gadgets, to Reviews. With 8 years of experience in digital marketing, I'm committed to delivering informative and engaging content to my readers. Join me as we dive into the exciting world of technology together. Leave a comment Leave a Reply Your email address will not be published. Required fields are marked *
__label__pos
0.940203
Add npm module and python to docker-compose instance Hi, Just wondering how to install and enable an npm module for an instance setup using the docker-compose example? I can see that there is an environment variable to enable the use of modules, but actually getting them installed is the missing link Im assuming I need to create a docker file, with npm install commands added, and then turn that into an image to use in my docker-compose? Im assuming similar steps to add python? Thanks, Dakota Update Yes I should have just tested before asking - But it may be helpful to others Had to create a docker file, base it on the n8n image, and add the steps I wanted such as FROM n8nio/n8n:latest RUN apk add --update python3 py3-pip RUN npm install -g require RUN npm install -g humanparser and then create an image using docker build n8n-custom . and then usee n8n-custom in my docker-compose and add the modules into the NODE_FUNCTION_ALLOW_EXTERNAL= env variable in docker compose 1 Like Glad to hear you already figured it out, thanks so much for sharing your solution and welcome to the community @dakota2gen :tada: 1 Like This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.
__label__pos
0.9874
 Convert gal/wk to gtt/sec | gallon UK per week to drops per second All content site-map> Building plans> Building details> Cooking> Firing ovens> Food nutrients> Flour measures> Oven photos> flow rate units conversion Amount: 1 gallon UK per week (gal/wk) of flow rate Equals: 0.15 drops per second (gtt/sec) in flow rate Converting gallon UK per week to drops per second value in the flow rate units scale. TOGGLE :   from drops per second into gallons UK per week in the other way around. flow rate from gallon UK per week to drop per second conversion results Enter a new gallon UK per week number to convert * Whole numbers, decimals or fractions (ie: 6, 5.33, 17 3/8) * Precision is how many digits after decimal point (1 - 9) Enter Amount : Decimal Precision : CONVERT :   between other flow rate measuring units - complete list. How many drops per second are in 1 gallon UK per week? The answer is: 1 gal/wk equals 0.15 gtt/sec 0.15 gtt/sec is converted to 1 of what? The drops per second unit number 0.15 gtt/sec converts to 1 gal/wk, one gallon UK per week. It is the EQUAL flow rate value of 1 gallon UK per week but in the drops per second flow rate unit alternative. gal/wk/gtt/sec flow rate conversion result FromSymbolEqualsResultSymbol 1 gal/wk = 0.15 gtt/sec Conversion chart - gallons UK per week to drops per second 1 gallon UK per week to drops per second = 0.15 gtt/sec 2 gallons UK per week to drops per second = 0.30 gtt/sec 3 gallons UK per week to drops per second = 0.45 gtt/sec 4 gallons UK per week to drops per second = 0.60 gtt/sec 5 gallons UK per week to drops per second = 0.75 gtt/sec 6 gallons UK per week to drops per second = 0.90 gtt/sec 7 gallons UK per week to drops per second = 1.05 gtt/sec 8 gallons UK per week to drops per second = 1.20 gtt/sec 9 gallons UK per week to drops per second = 1.35 gtt/sec 10 gallons UK per week to drops per second = 1.50 gtt/sec 11 gallons UK per week to drops per second = 1.65 gtt/sec 12 gallons UK per week to drops per second = 1.80 gtt/sec 13 gallons UK per week to drops per second = 1.95 gtt/sec 14 gallons UK per week to drops per second = 2.10 gtt/sec 15 gallons UK per week to drops per second = 2.26 gtt/sec Category: main menuflow rate menuGallons UK per week Convert flow rate of gallon UK per week (gal/wk) and drops per second (gtt/sec) units in reverse from drops per second into gallons UK per week. Flow rate. Gas & Liquids. This unit-to-unit calculator is based on conversion for one pair of two flow rate units. For a whole set of multiple units for volume and mass flow on one page, try the Multi-Unit converter tool which has built in all flowing rate unit-variations. Page with flow rate by mass unit pairs exchange. Converter type: flow rate units First unit: gallon UK per week (gal/wk) is used for measuring flow rate. Second: drop per second (gtt/sec) is unit of flow rate. QUESTION: 15 gal/wk = ? gtt/sec ANSWER: 15 gal/wk = 2.26 gtt/sec Abbreviation, or prefix, for gallon UK per week is: gal/wk Abbreviation for drop per second is: gtt/sec Other applications for this flow rate calculator ... With the above mentioned two-units calculating service it provides, this flow rate converter proved to be useful also as a teaching tool: 1. in practicing gallons UK per week and drops per second ( gal/wk vs. gtt/sec ) measures exchange. 2. for conversion factors between unit pairs. 3. work with flow rate's values and properties. To link to this flow rate gallon UK per week to drops per second online converter simply cut and paste the following. The link to this tool will appear as: flow rate from gallon UK per week (gal/wk) to drops per second (gtt/sec) conversion. I've done my best to build this site for you- Please send feedback to let me know how you enjoyed visiting.
__label__pos
0.539855
Is it IBS? Or SIBO? Small Intestinal Bacterial Overgrowth (SIBO) is a very common yet often overlooked cause of IBS. According to research, up to 85% of people with IBS test positive for SIBO! So if you’re experiencing bloating, diarrhoea or other symptoms commonly associated with IBS, then you’ll certainly want to consider the question, is it IBS? Or SIBO? What is SIBO? In healthy digestive tracts, the small intestine contains <10,000 bacteria per milliliter of fluid, whereas the large intestine (colon) contains 1,000,000,000 bacteria per milliliter of fluid. Therefore, the small intestine contains much less bacteria than the large intestine. This is a good thing because we absorb most of the nutrients from the food we eat in the small intestine so we don’t want bacteria to interfere with this process.  SIBO occurs when there are too many bacteria in the small intestine. SIBO bacteria feed on and ferment the food we eat releasing gas as a byproduct. This interferes with both digestion and absorption of nutrients increasing our risk of developing nutrient deficiencies. SIBO bacteria and their by-products can also damage our intestinal lining resulting in inflammation and a whole host of symptoms. Common SIBO symptoms: • Bloating • Reflux • Abdominal pain  • Flatulence • Constipation and/or diarrhea • Nausea  • Fatigue  • Anxiety  • Brain fog  • Loss of appetite  • Floating, greasy or discolored stools • Food intolerances and sensitivities As you can see, there is a huge overlap between typical symptoms of SIBO and the symptoms of IBS. What causes SIBO? SIBO is a complex condition that can develop for a number of reasons including (but not limited to): 1 – Insufficient stomach acid production (e.g. from medications like PPI’s, chronic stress, h.pylori, gastric deficit).  Stomach acid helps break down our food and kills ingested bacteria and pathogens. If we don’t have enough, then bacteria can feed on and ferment undigested food particles leading to bacterial proliferation – hello SIBO!  2 – Insufficient digestive enzymes  Digestive enzymes help us to break down our food. If we are not producing enough then food remains in the small intestine allowing bacteria to feed on and proliferate.  3 – Structural abnormalities (e.g. a faulty ileocecal valve) The ileocecal valve serves as a “gate” between your small and large intestine. When functioning properly, it allows food to flow down through the small intestine and into the large intestine before closing to prevent it from flowing backwards. If this “gate” doesn’t shut when it’s  supposed to, then bacteria from the colon can start to migrate up into your small intestine. 4 – Slow gut motility (meaning food doesn’t move through the digestive tract optimally)  We have an internal cleaning mechanism called the Migrating Motor Complex (MMC) which is a distinct pattern of electromechanical activity observed in gastrointestinal smooth muscle during the periods between meals.  The MMC is responsible for sweeping residual undigested food material and bacteria through the digestive system. If our MMC is absent or disordered then more food particles remain in the small intestine,  bacteria then start to feed on and ferment the food leading to increased gas buildup, bloating, constipation and all sorts of other digestive symptoms. Infact, poor MMC function is one of the most common causes of IBS and Small Intestinal Bacterial Overgrowth (SIBO)!  Supporting MMC function may therefore decrease the risk of developing IBS and SIBO and can also help to relieve some of the symptoms of these conditions. Check out my Happy Gut Guide download for MMC support. 5 – Food poisoning  There is a link between SIBO and post-infectious IBS (where IBS symptoms arise after an episode of food poisoning). Infact, 1 in 9 people develop IBS after an episode of food poisoning! Toxins released from the bacteria that cause food poisoning trigger an immune response which in some cases can result in damage to gut nerves and alter MMC function/gut motility. This results in many symptoms associated with IBS and SIBO. How do I know for sure that my IBS is actually SIBO? Thankfully we can test for SIBO privately using a hydrogen and methane SIBO breath test which measures the amount of hydrogen and methane gas produced by bacteria in the small intestine. Although this test is the most reliable way of identifying SIBO, it is not 100% perfect. Hence it is important to work with a Registered Nutritional Therapist who will consider your symptoms in conjunction with other clues identified from your medical/health history and test results (e.g. blood, stool and SIBO tests). Bear in mind that whilst SIBO is a major cause of IBS – it is not the only one. Working to identify and address other possible root causes is a must in order to achieve long term relief. Can I “get rid” of SIBO? In short – Yes you can! However, similarly to IBS, there are a number of possible reasons why SIBO developed. A specific antimicrobial protocol can help you eradicate the overgrowth and reduce symptoms but to achieve long-term relief and prevent SIBO relapse, it’s important to address the underlying causes. Tackling SIBO for good requires a multi-pronged approach involving both dietary, supplement, and lifestyle interventions. The specificities of which will vary between individuals.   Contact me to learn how I can help! Leave a Comment Your email address will not be published. Required fields are marked * Scroll to Top
__label__pos
0.994085
  Cubing unities? Geometry Level 3 \[{ S }_{ n }=\sum _{ i=1 }^{ n }{ \cot ^{ -1 }{ \left( { i }^{ 2 }+i+1 \right) } } \] Conside the summation above, \(S_n\). If the value of \({ S }_{ 100 }\) can be written as \(\cot ^{ -1 }{ \left( \frac { a }{ b } \right) } \) for coprime positive integers \(a\) and \(b\) with \(a>b\), find the value of \(2(a+b)\). × Problem Loading... Note Loading... Set Loading...
__label__pos
0.998991
Do’s And Don’ts For Exercising With A Sprained Foot So, you’ve unfortunately sprained your foot, but that doesn’t mean you have to put your fitness routine on hold. With a few adjustments and precautions, you can still stay active and maintain your progress. In this article, we’ll explore the do’s and don’ts for exercising with a sprained foot, giving you helpful tips to ensure a safe and effective workout without worsening your injury. Whether you’re an avid athlete or simply looking to stay active, these guidelines will help you navigate your fitness journey while taking care of your sprained foot. Dos And Donts For Exercising With A Sprained Foot Do’s for Exercising with a Sprained Foot Consult with a medical professional The first and most important step when dealing with a sprained foot is to consult with a medical professional. They will be able to accurately diagnose the severity of the sprain and provide guidance on the appropriate exercises and treatment plan. Skipping this step and attempting to exercise without professional advice can lead to further injury and delay the healing process. Perform non-weight bearing exercises To avoid putting unnecessary strain on the sprained foot, it is recommended to perform non-weight bearing exercises. This means choosing activities that do not require you to put your body weight on the injured foot. Examples of non-weight bearing exercises include swimming, cycling, and using an elliptical machine. These exercises provide cardiovascular benefits without placing excessive stress on the sprained foot. Use proper support and equipment When exercising with a sprained foot, it is essential to provide the necessary support to the injured area. This can be achieved by wearing a brace, using crutches, or utilizing supportive footwear. These measures help stabilize the foot and prevent further damage. Additionally, using appropriate equipment, such as resistance bands or hand weights, can aid in the strengthening of other muscle groups without putting pressure on the injured foot. Start with gentle stretches and range of motion exercises Before engaging in any physical activity, it is crucial to start with gentle stretches and range of motion exercises specific to the foot. These exercises help improve flexibility, reduce stiffness, and increase blood flow to the injured area. Performing these exercises regularly can also contribute to a quicker recovery process. However, it is essential to avoid any movements or stretches that cause pain or discomfort. Gradually increase activity level As your sprained foot starts to heal, it is essential to gradually increase your activity level. This means slowly adding more exercises or increasing the duration and intensity of your workouts. By progressing at a steady pace, you allow your foot to adjust to the increased demands without risking further injury. It is crucial to listen to your body and not push yourself too hard too quickly. Listen to your body’s signals When exercising with a sprained foot, it is crucial to pay attention to your body’s signals. If a particular exercise or movement causes increased pain or discomfort, it is essential to modify or avoid that activity altogether. Pushing through the pain can lead to further damage and delay the healing process. Remember, your body knows best, and it is essential to respect its limits during the recovery period. Use pain management strategies Dealing with pain is an unfortunate reality when recovering from a sprained foot. However, there are various pain management strategies that can be used during exercise. Applying ice to the injured area before and after workouts can help reduce swelling and numb pain. Additionally, using over-the-counter pain medications or topical creams can provide temporary relief. It is important to consult with your medical professional before using any pain medication to ensure it is safe and appropriate for your situation. Maintain good nutrition and hydration Proper nutrition and hydration play a vital role in the healing process of any injury, including a sprained foot. Ensuring that you consume a balanced diet rich in vitamins, minerals, and protein helps provide the necessary nutrients for tissue repair. Staying hydrated is also essential as it helps transport these nutrients to the injured area and aids in overall recovery. Remember to fuel your body correctly to support its healing efforts. Consider alternative forms of exercise While your foot is on the mend, it may be necessary to explore alternative forms of exercise that do not aggravate the injury. For example, if you typically enjoy running or jumping exercises, it might be beneficial to try low-impact activities like yoga, Pilates, or tai chi. These exercises provide the opportunity to maintain fitness levels and improve flexibility without putting excessive strain on the sprained foot. Follow a rehabilitation program A rehabilitation program specifically tailored to your sprained foot is essential for a successful recovery. This program often includes exercises aimed at improving strength, stability, and range of motion. It is crucial to follow the program provided by your medical professional or physical therapist consistently. These exercises are designed to target the injured area and gradually restore its function, reducing the risk of future complications. Don’ts for Exercising with a Sprained Foot Avoid weight-bearing exercises To avoid further injury and promote healing, it is important to avoid weight-bearing exercises until your sprained foot has fully healed. These exercises, such as running, jumping, or any activity that requires standing or walking on the injured foot, can place excessive stress on the healing ligaments and delay the recovery process. It is important to be patient and wait until your medical professional gives the green light for weight-bearing activities. Do not ignore pain or discomfort Ignoring pain or discomfort during exercise is a common mistake that can lead to additional damage. Pain is your body’s way of signaling that something is wrong, and pushing through it can exacerbate the injury. If you experience pain or discomfort while exercising with a sprained foot, it is essential to stop the activity and assess the situation. It may be necessary to modify the exercise or seek guidance from your medical professional. Avoid excessive impact and high-intensity exercises Activities with excessive impact or high-intensity exercises place significant stress on the foot and should be avoided when dealing with a sprained foot. Sports like basketball, soccer, or tennis, which involve quick movements and sudden changes in direction, can be particularly risky. The impact forces generated during these activities can further strain the injured ligaments and hinder the healing process. It is best to choose low-impact exercises that minimize stress on the foot. Do not rush the healing process Patience is key when recovering from a sprained foot. Rushing the healing process by attempting to resume normal exercise routines too soon can result in re-injury or prolonged recovery time. Each sprain is unique, and the healing time may vary. It is crucial to listen to your medical professional’s advice and follow their recommended timeline for returning to regular activity. By allowing sufficient time for your foot to heal, you set yourself up for a successful recovery. Avoid exercises that worsen the swelling or pain Certain exercises may worsen the swelling or pain in your sprained foot, and it is important to recognize and avoid these movements. Activities that involve jumping, hopping, or landing heavily on the foot should be avoided as they can exacerbate the swelling and discomfort. It is essential to prioritize exercises that do not aggravate the injury and focus on gentle movements that promote healing and minimize inflammation. Do not push through the pain Exercising through pain is never a good idea, especially when dealing with a sprained foot. Pushing through the pain can lead to further damage and prolong the recovery process. It is important to respect your body’s signals and modify or stop any exercise that causes pain. By doing so, you ensure that you are giving your foot the necessary time and care it needs to heal properly. Avoid exercising without proper support or protection Exercising without proper support or protection can increase the risk of re-injury or exacerbate the existing sprained foot. It is essential to wear supportive footwear that provides stability and cushioning to the injured area. Additionally, using braces, compression wraps, or orthotic inserts can further enhance the support and protect the sprained foot during exercise. Taking these precautions helps to minimize the strain placed on the foot and accelerate the healing process. Do not overlook the importance of rest and recovery Rest and recovery are crucial components of any healing process, including that of a sprained foot. It is important to allow your body sufficient time to repair the damaged ligaments. Pushing yourself too hard or exercising too frequently without proper rest can impede the healing process and delay your return to normal activity. Be mindful of balancing your workout routine with ample rest and recovery periods to promote optimal healing. Avoid participating in activities with a high risk of re-injury Activities with a high risk of re-injury, such as contact sports or activities with a lot of lateral movements, should be avoided until your sprained foot has fully healed. These activities can subject your foot to sudden twists or impacts, making it more susceptible to re-injury and setbacks in the recovery process. It is vital to prioritize your foot’s health and well-being by participating in lower-risk activities that are less likely to put unnecessary strain on the injured area. Do not skip the rehabilitation phase Skipping or neglecting the rehabilitation phase is a common mistake that can hinder the recovery of a sprained foot. Rehabilitation exercises and therapies play a crucial role in restoring strength, stability, and range of motion to the injured foot. It is important to follow the guidance of your medical professional or physical therapist and complete the prescribed exercises and treatments. This phase of recovery helps ensure a full and successful recovery, reducing the risk of future re-injury. Dos And Donts For Exercising With A Sprained Foot
__label__pos
0.962514
How can we integrate NvAppBase with windows Application Hi, I have to integrate NvAppbase framework with in windows application.I googled and i got the sample source (https://github.com/NVIDIAGameWorks/OpenGLSamples).from this examples i tried to re implement with in my exiting windows application. it throws some exceptions that is: 1.Error:IntelliSense: variable “uint32_t” is not a type name. It is from NvGamePad.h,NvPlatformContext.h,NvAppBase.h 2.What is the difference between NvAppBase and Win32 Application Please help me to reslove this errors. Thanks, Kirubha
__label__pos
0.57841
Saturday, October 1, 2011 Named arguments in C#. So today is the day. I'm kicking off with a new series of articles in the category C# vs. Java. Let's start with a feature called named arguments. In a nutshell, it let us name arguments that we are passing when invoking some method. When it can be useful? There are a few different scenarios. First of all, it may happen that we have a method that takes many arguments of the same type. It comes as no surprise that they can get mixed easily and normally compiler won't help us as long as the passed variables' types match the ones from the method signature. Another thing is just code readability – it is much easier to go through it when we can see the variable name from the method signature next to the variable that we are passing. class NamedArgumentsExample { public static void AddStock(string companyShortName, int amount, double price) { } static void Main(string[] args) { AddStock("MSFT", 100, 150); AddStock("MSFT", amount: 100, price: 150); } } In the above code we can see 2 method invocations – the first one without using named arguments. At first glance, it may be hard to get what are the values in the AddStock method invocation for. On the other hand, in the 9th line we can see with no problem that the first value is for the amount and the second for the price of a stock that we are adding. As for Java, there is no such feature. I'm sure you can see, even from a very simple example above that it is useful. Of course, as with everything, one shouldn't overuse it but apply in a reasonable way, in cases where it will really add clarity. That's it for today! Hope you enjoyed the post and have a happy Sunday!!
__label__pos
0.555205
Trauma A brief overview of trauma and Posttraumatic Stress Disorder Photo by Susan Wilkinson on Unsplash   What is trauma? Trauma refers to the emotional response experienced following exposure to a distressing life event or situation. It can result from direct or indirect exposure, i.e., we have experienced the situation first hand, witnessed it, or heard that the event occurred to someone we know. Traumatic […]
__label__pos
0.771915
{[ promptMessage ]} Bookmark it {[ promptMessage ]} zm10notes zm10notes - Page 1 Block 2 Stress and Strain M10 Stress We... Info iconThis preview shows page 1. Sign up to view the full content. View Full Document Right Arrow Icon This is the end of the preview. Sign up to access the rest of the document. Unformatted text preview: Page 1 Block 2 Stress and Strain M10 Stress We want to look more closely at how structures transmit loads. In general, structures are not made up of discrete, 1-D bars, but continuous, complex, 3-D shapes. If we want to understand how they transmit load we needs more tools. To this end we will introduce the concept of stress (and later strain). We will also apply three great principles in terms of stress and strain. Definition Stress is the measure of the intensity (per area) of force acting at a point. Use new coordinate system Example: † On a 2nd square DF1 = F1 nm DA = A nm † x, y, z Æ x1, x2 , x 3 Page 2 The stress is the intensity, force per unit aresa, so let m and n go to infinity. È force ˘ units Í ˙ 2 Î length ˚ lim DF1 s1 = n Æ • DA mÆ• where s 1 is the stress at a point on the x1 - face - † Magnitude s 1 - † Direction i1 † † † Consider a more general case: † Force F acting on x1 face ( i1 is normal to plane of face) Resolve force into 3 components F = F1 i1 + F2 i 2 + F3 i 3 † Page 3 Then take the limit as the force on the face is carried by a smaller set of areas (bigger grid). lim DF =0 (but stress vector has other components) DA s = s 11 i1 + s 12 i 2 + s 13 i 3 DA Æ 0 † DF1 DA1 † DF2 DA1 DF3 DA1 Where s 1 is the stress vector and s1n are the components acting on the x1 normal face, † in the x1, x2 and x3 directions. † † Get similar results if we looked at the x2 and x3 faces. s 2 = s 21 i 2 + s 22 i 2 + s 23 i 3 on i2 face s 3 = s 31 i1 + s 32 i 2 + s 32 i 3 on i3 face can write more succinctly as † s m = s mn i n s mn is the stress tensor, s m is the stress vector. † This method of representing a set of vector equations is an example of indicial, or tensor, † notation: † Tensor (Indicial) Notation "easy" to write complicated formulae "easy" to mathematically manipulate "elegant" rigorous Example: xi = Fij Y j Subscripts or indices † By Convention Latin subscripts m, n, i, j, p, q, etc. † Page 4 Take values 1, 2, 3, (3-D) Greek Subscripts g , b, a Take values 1 or 2 (2-D) 3 Rules for Tensor Manipulation 1. † A subscript occurring twice is a repeated (or dummy) index and is summed over 1, 2, (and) 3. • Implicit summation 3 For xi = Fij Y j =  Fij Y j j =1 i.e: xi = Fi1Y1 + Fi2Y2 + Fi 3Y 3 2. A subscript occurring once in a term is called a free index, can take on the range 1, 2, † (3) but is not summed. It represents separate equations. † x1 = F11Y1 + F12Y2 + F13Y 3 (cf matrix multiplication) x2 = F21Y1 + F22Y2 + F23Y 3 x 3 = F31Y1 + F32Y2 + F33Y 3 3. † No index can appear in a term more than twice. Two Useful Tensor Parameters 1. Kronecker delta Ï 1 - when m=n dmn = Ì0 - when m ≠ n Ô Ó Why is this useful? Consider scalar product of unit vectors † im . im = 1 parallel im . in = 0 perpendicular † † † dmn = i m . i n So Scalar product of two vectors becomes: Page 5 F . G = (Fm i m ) . Gn i n = Fm Gn (i m . i n ) = Fm Gn dmn 2. † Permutation tensor emnp . ("permute" - to change the order of) Swapped 2 pairs Ï 0 When any two indices are equal 1, 2, 3 Ô emnp = Ì 1 When mnp is even permutation of 1, 2, 3 3, 1, 2 Ô-1 When mnp is an odd permutation of 1, 2, 3 2, 3, 1 Ó† Swapped 1 pair 1, 3, 2 2, 1, 3 3, 2, 1 (So where does this come from?) Consider cross product of unit vectors. i1 ¥ i1 = 0 i1 ¥ i1 = i 3 i 2 ¥ i1 = -i 3 i 2 ¥ i 2 = 0 i 2 ¥ i 3 = i1 i 3 ¥ i 2 = -i1 i 3 ¥ i 3 = 0 i 3 ¥ i1 = i 2 i1 ¥ i 3 = -i 2 So i1 ¥ i 2 = e121 i1 + e122 i 2 + i123i3 = i 3 In general, † Page 6 Now back to stress. We have learnt that stress is a tensor quantity, i.e. it can be represented by tensor (indicial) notation Stress Tensor and Stress Types s mn is the stress tensor Consider a differential element: † s mn Stress acts on † face with normal in the xm-direction Acts in xn direction Page 7 Types of Stress Can identify two distinct types of stress: Normal (Extensional) - acts normal to face s11, s 22 , s 33 - acts to extend element Shear Stress - acts parallel to face plane s12 , s 13, s 21, s 23, s 31, s 32 acts to shear element i.e. 9 components of stress, but it turns out that not all of these are independent: Symmetry of Stress Tensor Consider moment equilibrium of differential element: Take moments about C + Ê1 ˆ Ê1 ˆ 2s 23dx 3 dx1 Á dx 2 ˜ - 2s 32dx 2 dx 1 Á dx 3 ˜ = 0 Ë2 ¯ Ë2 ¯ simplifies to: s 23 = s 32 † Therefore only 6 independent components of the stress tensor: three extensional stresses: s11, s22 , s33 and three shear stresses: s12, s23 , s31 † ... View Full Document {[ snackBarMessage ]} Ask a homework question - tutors are online
__label__pos
0.913969
【源码系列#01】vue3响应式原理(Proxy) • 【源码系列#01】vue3响应式原理(Proxy)已关闭评论 • 19 次浏览 • A+ 所属分类:Web前端 摘要 专栏分享:vue2源码专栏,vue3源码专栏,vue router源码专栏,玩具项目专栏,硬核💪推荐🙌 欢迎各位ITer关注点赞收藏🌸🌸🌸 专栏分享:vue2源码专栏vue3源码专栏vue router源码专栏玩具项目专栏,硬核💪推荐🙌 欢迎各位ITer关注点赞收藏🌸🌸🌸 在学习 Vue3 是如何进行对象的响应式代理之前,我想我们应该先去了解下 ES6 新增的API ProxyReflect,可参考【Vue3响应式入门#02】Proxy and Reflect 。之后我们再手写下 reactive 和 effect 的源码 Reactive 定义: 接收一个普通对象然后返回该普通对象的响应式代理。等同于 2.x 的 Vue.observable() const obj = reactive({ count: 0 }) 响应式转换是“深层的”:会影响对象内部所有嵌套的属性。基于 ES6 的 Proxy 实现,返回的代理对象不等于原始对象。建议仅使用代理对象而避免依赖原始对象。 reactive.ts Vue3中响应数据核心是 reactive , reactive 中的实现是由 proxy 加 effect 组合,先来看一下 reactive 方法的定义 import { isObject } from '@vue/shared' import { mutableHandlers, ReactiveFlags } from './baseHandler' // key只能是对象;弱引用,更有效的垃圾回收、释放内存 - https://www.zhangxinxu.com/wordpress/2021/08/js-weakmap-es6/ const reactiveMap = new WeakMap() /** * @desc 将数据转化成响应式的数据 */ export function reactive(target) { // issue1 if (!isObject(target)) { return } // issue2 if (target[ReactiveFlags.IS_REACTIVE]) { return target } // issue3 let existingProxy = reactiveMap.get(target) if (existingProxy) { return existingProxy } const proxy = new Proxy(target, mutableHandlers) reactiveMap.set(target, proxy) return proxy } • @issue1 只能做对象的代理,不是对象,return • @issue2 代理对象被再次代理 可以直接返回代理对象 我们可以利用 Proxy 的 get方法,来判断他有没有代理过 如果访问这个对象的 __v_isReactive 属性,有值就说明代理过了,当然,我们可以约定 __v_isReactive为任何字段 • @issue3 同一个对象代理多次,返回同一个代理 用 WeakMap去缓存对象和代理对象的映射关系 代理完成时,将此对象和代理对象添加到 WeakMap缓存中;在代理之前,去 WeakMap中读取此对象是否有代理对象的映射,若存在,则返回缓存中的代理对象 WeakMap:key只能是对象;弱引用,更有效的垃圾回收、释放内存,详情请参考JS WeakMap应该什么时候使用 « 张鑫旭-鑫空间-鑫生活 baseHandler.ts mutableHandlers 是 Proxy 的第二个参数 handler对象提取封装而来 • track () 依赖收集 • trigger () 触发依赖 这两个函数为 effect 里的方法,effect 为 reactive 的核心,后面我们会详细介绍。先来看一下mutableHandlers 对象的定义 import { track, trigger } from './effect' export const enum ReactiveFlags { IS_REACTIVE = '__v_isReactive', } export const mutableHandlers = { // 这里可以监控到用户取值了 get(target, key, receiver) { if (key === ReactiveFlags.IS_REACTIVE) { return true } track(target, 'get', key) let res = Reflect.get(target, key, receiver) // @issue1 // 深度代理实现, 性能好 取值就可以进行代理 if (isObject(res)) { return reactive(res) } return res }, // 这里可以监控到用户设置值了 set(target, key, value, receiver) { let oldValue = target[key] // 缓存老值 let result = Reflect.set(target, key, value, receiver) if (oldValue !== value) { // 值变化了,触发依赖 trigger(target, 'set', key) } return result }, } • @issue1 嵌套对象深度代理。只有在取值时,才会进行深度代理,性能好 举个例子,看如下代码。当我们对嵌套对象 product.rate 进行取值时,就会触发 get劫持,然后深度代理嵌套对象 product.rate const product = reactive({ price: 5, quantity: 2, rate: { value: 0.9 } }) shared.ts 共享模块 // 判断是否是JS对象 export const isObject = function(value){ return typeof value === 'object' && value !== null } 参考资料 JS WeakMap应该什么时候使用 « 张鑫旭-鑫空间-鑫生活
__label__pos
0.849475
Command & Control (C2) frameworks are a very sensitive component of Red Team operations. Often, a Red Team will be in a highly privileged position on a target’s network, and a compromise of the C2 framework could lead to a compromise of both the red team operator’s system and control over beacons established on a target’s systems. As such, vulnerabilities in C2 frameworks are high priority targets for threat actors and Counterintelligence (CI) operations. On September 20, 2022, HelpSystems published an out-of-band patch for Cobalt Strike which stated that there was potential for Remote Code Execution (RCE). Cobalt Strike is one of several third-party C2 frameworks IBM Security X-Force Red leverages to simulate different threat actors when delivering adversary services for clients. The Adversary Simulation team at IBM Security X-Force Red performed a diligent review of the patch to ensure that there was no impact to our clients networks, data, and systems. Our analysis proved that RCE was indeed possible and that the update in version 4.7.1 was insufficient to mitigate the impact of the vulnerability. We discovered that creating Swing components from user input allows users to create arbitrary Java objects in the class path and invoke their setter methods, which can lead to remote code execution in specific cases. X-Force requested a new CVE (CVE-2022-42948) and provided the technical details of the vulnerability to HelpSystems to aid in the development of a new patch. This post outlines the analysis process conducted to make this evaluation: patch analysis, root cause review and vulnerability weaponization. Introduction On September 20, 2022, HelpSystems published an out-of-band update for Cobalt Strike to fix an issue discovered in Cobalt Strike version 4.7. The vulnerability was marked as Cross-Site Scripting (XSS) and was identified with the number CVE-2022-39197. Analysis revealed that the XSS vulnerability could be triggered by manipulating some client-side UI input fields, by simulating a Cobalt Strike implant check-in or by hooking a Cobalt Strike implant running on a host. It was stated in the release notes that this vulnerability could lead to RCE which was the impetus for performing this research. CVE-2022-39197 Patch Analysis As a first step in the analysis process, we decompiled the Cobalt Strike Java client application. This allowed us to develop an understanding of where the vulnerability had been identified and how it had been mitigated. As stated within the out-of-band patch notes, X-Force identified a function within BeaconC2.class that checks if the XSS mitigation flag has been set within the TeamServer properties file. Further analysis of how new Cobalt Strike implants are registered within the UI, X-Force identified the XSS mitigation validation was implemented within BeaconEntry.class. Analysis of how the Cobalt Strike implant list is validated before they are presented to the user, X-Force was able to identify the specific parameters the XSS validator function leverages and the class (CommonHTMLUtils.class) storing the validation functions. X-Force’s analysis of the CommonHTMLUtils class, revealed two validator functions (potentialXSS and potentialUserNameXSS). It is not clear why HelpSystems implemented two separate validators, one would suffice to perform input sanitization. Additionally, it should be noted that, while these checks function correctly they are unnecessarily complex. To successfully render HTML within Java Swing components, the component text has to start with <html>. Any other text will cause the element to render as plain-text. A universal validator could simply check if a string starts with < and return true if it does. Additionally, it would be possible to insert a whitespace as the beginning of the text to render those inputs inert instead of dropping them completely. Initial analysis of the validator functions immediately raised some concerns that the Cobalt Strike RCE vulnerability was still exploitable after the patch was applied. X-Force Red identified the note field was not subject to the input validation which was leveraged to develop a remote code execution (RCE) payload. Additionally, any other UI components that could receive data directly from a Cobalt Strike implant would also be vulnerable to this attack. Such components would include the process list and the file explorer dialog. Swing Components and HTML support The Cobalt Strike interface is built on top of the Java Swing framework. This framework provides developers with a graphical user interface for Java programs. The image below shows the hierarchy of Java Swing components. X-Force discovered that it was possible to include HTML code inside a Swing component. If a string’s contents started with the keyword <, the library would parse the content as HTML. The Java code snippet below demonstrates this concept. Running the code snippet above will create a new JFrame, which contains a JLabel that uses HTML to style the label body. In this case, part of the text is rendered as an HTML heading. While the content is successfully parsed as HTML, the impact in this case is minimal. After testing a variety of XSS techniques, X-Force noted a unique behavior in the interface after injecting an HTML <object> tag. The two red question marks, in the image below, indicated that the label attempted to render the <object> tag unsuccessfully. Further research revealed that Java components could be included in the malformed string through the use of an HTML <object> tag, which could potentially allow for the creation of any Java Swing object. We tested and confirmed this by adding a Swing JButton Object which was successfully parsed and rendered, as shown in the image below. A review of the Java SDK showed that the handler for any given HTML.Tag.OBJECT exists within the ObjectView class, which can be found within the HTMLFactory class creation method. A snippet of the processing logic for the HTML.Tag instance is shown in the image below: The function in the ObjectView class responsible for loading the element is called create Compoment(), as shown in the image below. The createCompoment() function will initialize an instance of the specified class and then check if the initialized object is an instance of Component. If it is, it will return the object. If it is not, it will call getUnloadableRepresentation(). The screenshot below shows this function and explains why X-Force saw two red question marks in our previous test case. A key component of the ObjectView class is the setParameters() function, which checks whether any parameters were specified on the attributes of an HTML element. Next, setParameters() checks whether the class that was loaded contains any write methods for the HTML element’s parameter and calls the appropriate method within the class with the specified value. The full view of setParameters() is shown in the image below. As an example of calling a function within a subclass of java.awt.component with just one string parameter, consider the following HTML content being sent to the parser.  <html> <object classid=“HelloByName”> <param name=”my_name” value=”Rio”></object> The parser will try to create an instance of the class HelloByName, check if the class is a subclass of java.awt.Component, and call the setter method for the my_name parameter. This example demonstrates how the sett functions can be called with one string parameter in classes that are a subclass of java.awt.Component. Manually searching for a method and class that meets these criteria is non-trivial, but several code analysis tools offer capabilities to solve this problem in a largely automated manner. For this phase of research, X-Force chose to use an open-source code analysis tool called Tabby. Tabby’s main use case is to discover Java deserialization gadgets. It supports several input formats, including Java JAR files, and can export its analysis to a Neo4j database. Within Neo4j graph database it is possible to use the Cypher query language to identify elements that match specific criteria. This can greatly reduce the search-space when performing code analysis. X-Force discovered forty-eight functions that met the criteria mentioned earlier. These functions were limited in complexity which allowed X-Force to manually review each of them. Most of these functions were part of the Swing framework and did not provide anything that  could leverage to trigger RCE. However, X-Force eventually found the setURI() function within the JSVGCanvas class, the logic of which is shown in the image below. The setURI() function will call the loadSVGDocument function which is used to parse the specified SVG file. Since SVG files allow a user to insert JavaScript, X-Force crafted the following SVG file and served it from a local web server. To test the potential XSS resulting from processing an SVG file, X-Force inserted the HTML listed below in the note field on a Cobalt Strike UI. <html><object classid="org.apache.batik.swing.JSVGCanvas"><param name="URI" value="http://127.0.0.1:8000/1.svg"></object> Unfortunately, this test yielded the exception shown below, which indicates that the SVG parser tries to load a new class: org.mozilla.java.script.Scriptable. This meant that the XML parser had it is own set of handlers for different types of tags inside SVG XML file. This reference to the Batik library in the exception handler led X-Force to Batik’s official documentation, which explained how Apache Batik allows developers to call Java code by including a Java JAR file reference within a SVG script element. With the information gained from Batik’s documentation, X-Force built and injected a SVG file containing a custom Java code within the note field in the Cobalt strike UI. Figure 1: Creation of SVG file Figure 2: Creating a directory to make the directory structure required to initialize Figure 3: PwnME Java code Figure 4: Custom Java Manifest file Figure 5: Compilation of Java code Figure 6: Injection of SVG file into Cobalt Strike note field As shown in the image below, this test successfully triggered the vulnerability and executed /usr/bin/xcalc, which is a common way to demonstrate a proof-of-concept exploit. It should be noted here that this is a very powerful exploitation primitive. Since we can write a payload in Java, this means that we can construct a fully featured cross-platform payload that would be able to execute code on the user’s machine regardless of the operating system flavor or architecture. Triggering RCE Through the Beacon Although X-Force could trigger this vulnerability from the perspective of an operator with authenticated access in the Cobalt Strike UI, a malicious actor would most likely seek to trigger this vulnerability remotely by manipulating a real beacon in memory or simulating such a beacon. As shown in the patch analysis, HelpSystems introduced some string-based filters for fields that could be easily tampered by a remote attacker. Public tooling already exists to perform such tests, for example CobaltStrikeParser created by Sentinel One. However, as explained in the patch analysis, X-Force realized that the patch was incomplete. A number of areas within the Cobalt Strike UI were not being validated and would thus still allow an attacker to achieve RCE. For example, an attacker would still be able to achieve RCE by hooking an implant process and injecting HTML into the process name portion of the data structure returned by calls to Process32Next. This data is rendered in the Cobalt Strike UI when an operator requests a graphical process listing. Typically, however, operators tend to favor running the ps command in the Cobalt Strike console in place of opening the graphical menu interface. Another area that remained vulnerable was the graphical file explorer menu. This presented a much greater threat since it is a common workflow for operators to use this feature to explore the operating system or some universal naming convention (UNC) based paths. By hooking calls to FindNextFileA within the implant, we were able to manipulate the output in a similar fashion to achieve RCE on the Cobalt Strike UI. To trigger the exploit, X-Force used Fermion. Fermion is a cross-platform Electron application that leverages Frida-Node to ease the development of Frida based instrumentation functions. X-Force used the following JavaScript code to hook the required function and send the malformed file name to the Cobalt Strike UI backend. The image below shows Fermion injecting the Cobalt Strike implant process and loading the function instrumentation logic. When the operator opens the File Browser of the affected implant, the vulnerability triggers, resulting in the execution of arbitrary code as shown in the following image. Demo References https://mp.weixin.qq.com/s/l5e2p_WtYSCYYhYE0lzRdQ https://github.com/FuzzySecurity/Fermion https://www.javatpoint.com/java-swing http://www.java2s.com/example/java-api/java/beans/propertydescriptor/getwritemethod-0-4.html https://www.agarri.fr/blog/archives/2012/05/11/svg_files_and_java_code_execution/index.html More from Software Vulnerabilities Controlling the Source: Abusing Source Code Management Systems For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within organizations and have been an afterthought in terms of defenses compared to other critical enterprise systems such as Active Directory. SCM systems are used in the majority of organizations to manage source code and integrate with other systems within the… X-Force Research Update: Top 10 Cybersecurity Vulnerabilities of 2021 From 2020 to 2021, there was a 33% increase in the number of reported incidents caused by vulnerability exploitation, according to the 2022 X-Force Threat Intelligence Index. A large percentage of these exploited vulnerabilities were newly discovered; in fact, four out of the top five vulnerabilities in 2021 were newer vulnerabilities. Vulnerability exploitation was the second most common initial infection vector observed by IBM Security X-Force in 2021, falling closely behind phishing. Cybercriminals are finding new ways of bypassing security… How Log4j Vulnerability Could Impact You MITIGATION UPDATE: New vulnerability in 2.17 — CVE-2021-44832 Upgrade to 2.17.1 to mitigate this vulnerability Do NOT enable JNDI in any versions Follow: https://logging.apache.org/log4j/2.x/security.html If you hadn’t heard of Apache Log4j, chances are it’s on your radar now. In fact, you may have been using it for years. Log4j is a logging library. Imagine writing your daily activities into a notebook. That notebook is Log4j. Developers and programmers use it to take notes about what’s happening on applications and servers.… Call to Patch: Zero Day Discovered in Enterprise Help Desk Platform In an age where organizations have established a direct dependence on software to run critical business operations, it’s fundamental that they are evaluating their software development lifecycles and that of their extended environment — third-party partners — against the same standards. Concerns around vulnerability management are gaining more government attention around the world in order to acknowledge and emphasize vulnerability detection capabilities across the supply chains. In fact, the National Institute of Standards and Technology (NIST) issued guidance concerning the…
__label__pos
0.66022
Questions tagged [mutual-exclusion] Questions about the concurrency-control requirement of ensuring that no two processes are simultaneously in a critical section (a period when the process is accessing a shared resource). Failing to achieve mutual exclusion leads to the problem of data races. Filter by Sorted by Tagged with 50 votes 3answers 26k views Contrasting Peterson’s and Dekker’s algorithms I am trying to understand the algorithms by Peterson and Dekker which are very similar and display a lot of symmetries. I tried to formulate the algorithms in informal language like follows: ... 19 votes 1answer 964 views Are there hardware lock implementations without test-and-set or swap? Locks are usually implemented thru test-and-set and swap machine-level instructions. Are there other implementations that do not use these? Also, can we say that all hardware level solutions to the ... 10 votes 3answers 7k views Why would you use a monitor instead of a semaphore? I am currently attending the concurrent programming course in my university and we recently started talking about the concept of a monitor. While I understand the necessity of mutual exclusion, I do ... 9 votes 2answers 1k views Does Peterson's 2-process mutual exclusion algorithm account for dying processes? I think that in Peterson's algorithm for mutual exclusion, if the process first to enter the critical section were to die or be cancelled, the other process would loop forever, waiting to enter the ... 8 votes 1answer 169 views What is the practical relevance of textbook mutual exclusion algorithms? There's been a fair amount of research on mutual exclusion algorithms - e.g. a lot of it is presented in classic textbooks such as The Art of Multiprocessor Programming, where an entire chapter is ... 7 votes 3answers 3k views Solutions to synchronization problem need to be executed in critical section I was reading about synchronization problems for cooperating processes and i learned that only hardware solutions like test_and_wait() and ... 6 votes 1answer 394 views Why $e(C_i) = D_i$ is correct assumption? (FLP Impossibility 1985 - Lemma 3) Please bear with my unhelpful typesetting. My question is regarding well known FLP paper Impossibility of Distributed Consensus with One Faulty Process by Fischer, Lynch and Patterson While ... 6 votes 2answers 706 views Mutual exclusion for n processes I want to implement mutual exclusion for $n$ processes. Critical section code: ... 6 votes 1answer 352 views Software mutexes and consensus number 1 There are numerous possibilities to implement a software mutex using only shared memory (e.g. Dekker's algorithm). Recently I've read the following from a paper "Wait-free Synchronization" by M. ... 5 votes 1answer 1k views Lamport’s fast mutual exclusion algorithm intuition Here's Lamport’s fast mutual exclusion algorithm: ... 5 votes 1answer 1k views Mutex implementation on top of a minimalistic preemptive scheduler In this question, I'm implementing some synchronization primitives in the standard library of an operating system. Specifically, I want to implement mutexes and condition variables. This is on top of ... 5 votes 1answer 655 views What is a counterexample for Lamport's distributed mutual exclusion algorithm with non-FIFO message queues? Lamport's distributed mutual exclusion algorithm (also described here) solves mutual exclusion problem for $N$ processes with $3(N-1)$ messages per request ("take and release lock" cycle). It ... 4 votes 2answers 4k views Lamport's Bakery algorithm I have problems understanding Lamport's bakery algorithm. The thing I do understand is that each thread ask all other threads what number they have.Then the thread takes the maximum number and add 1 ... 4 votes 1answer 462 views Mutual exclusion algorithm using only atomic reads and writes for unknown number of processes and robust to process abortion I am trying to come up with a mutual exclusion algorithm that is based only on atomic reads and atomic writes of shared memory (i.e. no compare-and-swap or similar). Apart from mutual exclusion and ... 4 votes 0answers 336 views Classic Problems on Process Synchronization I have been studying Process Synchronization and inter-process communication in Operating Systems Engineering and have come across multiple problems like "Sleeping Barbers", "Producer Consumers", "... 4 votes 0answers 69 views Deadlock free process calculi So when programming with locks as a synchronization primitives you can ensure no deadlock by ensuring that an ordering exists on the locks and that all acquires of the locks happen in that order (... 4 votes 0answers 245 views Mutex implementation on top of a preemptive scheduler that does not guarantee liveness I'm implementing some synchronization primitives in the standard library of an operating system. Specifically, I want to implement mutexes and condition variables. This is on top of a microkernel with ... 4 votes 0answers 100 views Concurrent Programming Bar Problem I have been posed a question by my lecturer and I'm trying to figure the right way to go about it. They want me to ensure mutual exclusion for n processes. The code provided is as follows: ... 3 votes 2answers 367 views Does mutual exclusion hold in this case? I entered into a discussion with a friend on the following question, which asks if mutual exclusion holds: Consider two processes: $s_1$ and $s_2$ are two variables, set equal initially. P1: while $... 3 votes 1answer 618 views What should be the minimum value when the two threads are executed concurrently int count=0; void *thfunc() { int ctr=0; for(ctr=0;ctr<100;ctr++) count++; } If *thfunc() is executed by two threads concurrently in a uniprocessor ... 3 votes 1answer 1k views Is it possible to solve the critical section problem with an atomic subtract operation? In my Operating Systems class, our professor asked us to solve the critical section problem with the following atomic operation: ... 3 votes 2answers 811 views What is the problem with this Busy Wait solution for two threads? We have two processes. One process produces F and the other process consumes F Initialization: Consuming = false Produced = false F = EMPTY The first thread (... 3 votes 1answer 442 views Finding issues in concurrent implementation of carpark overflow control Firstly, I am revising for my Concurrent Programming exam and have come across the following question from a previous exam paper. I have attempted to answer it, and will try and convey this effort; I'... 3 votes 1answer 60 views PetersonNP, mechanical mutual exclusion proof Good day everyone, I'm currently trying to carry out the PetersonNP (a.k.a. FilterLock) correctness proof (mutual exclusion). I've found several proof sketches on concurrency books but I'm interested ... 3 votes 1answer 561 views What are the purposes of Reply messages in Lamport Algorithm for Mutual Exclusion? After reading Lamport Algorithm for Mutual Exclusion, I can not understand the purposes of reply messages. I think they are not necessary because the assumption of the algorithms is that all messages ... 3 votes 0answers 372 views Lamport's Bakery algorithm with other > relation i'm reading an old exam and one question was: Which property of the Bakery algorithm is violated with the following change? ... 3 votes 0answers 982 views Proof of Manna-Pnueli algorithm for mutual exclusion being incorrect Suppose we have the Manna-Pnueli algorithm for mutual exclusion: I was trying to find a sequence that violates mutual exclusion and I came up with this: ... 2 votes 2answers 1k views Reader and Writer mutex I am looking over the classic Reader and Writer Problem Just to give a quick overview: Many readers can be in CS (as long as no writers are) Only one writer can be in the CS (with no combination of ... 2 votes 2answers 2k views What is the difference between consensus and mutual exclusion in Distributed Systems? If we can achieve consensus, does it imply we can achieve mutual exclusion? Is there a difference? Example : Paxos solves the consensus problem, can it also be used to solve mutual exclusion? 2 votes 2answers 159 views Help understanding this algorithm that's supposed to solve the critical section problem through mutual exclusion Our professor gave us the following algorithm that's supposed to solve the critical section problem. I'm guessing the code is just pseudocode so I'm not trying to focus on the strange syntax and just ... 2 votes 1answer 186 views Mutex-/semaphore-/locking-algorithm using atomic reads/writes with data-propagation delays Is there a mutual exclusion or semaphore or locking algorithm that only relies on atomic reads and atomic writes of shared memory and can tolerate a delay in propagation of the written data between ... 2 votes 1answer 278 views Peterson algorithm for mutual exclusion In the Peterson Algorithm for mutual exclusion an implicit assumption is that the operations with the shared global variables happen atomically. To me, this is not a superficial assumption , cause it'... 2 votes 1answer 484 views Disabeling interrupts to solve critical section issue on multiprocessor system Assume I have a multicore system and a critical section. I understand how disableling interrupts on a single core systems solves the critical section problem. So assume I could disable interrupts on ... 2 votes 0answers 119 views Starvation algorithm in operating system Is there an algorithm for mutual exclusion with shared flag variables, as the Peterson's one, that doesn't prevent the starvation ? 1 vote 3answers 1k views How can a spinlock progress when it's busy-waiting? I read that in spinlock, process keeps on waiting for the lock continuously in a loop until it receives signal(lock) or ... 1 vote 1answer 2k views Confusion in the solution to first readers-writers synchronization I am studying the solution to “First Readers-Writers Problem” from the book Operating System Concepts (9th edition) and it describes: First readers–writers problem, requires that no reader be kept ... 1 vote 1answer 419 views Deadlock Solutions: Lock Ordering This is from a textbook on operating systems. This is not homework, just part of the chapter on deadlocks. ... 1 vote 1answer 98 views How are semaphores and test-and-set instructions connected? Cheers, so my textbook explains these parts very poorly, so I would gladly take any advice! I am confused between the test-and-set instructions, which per my book is a very common CPU instruction set, ... 1 vote 1answer 144 views Does the process exiting from critical section will always call signal instruction? I have seen many solutions to critical section problems in process synchronization chapter . Many of them first acquire resources , execute critical section and leave . My Question is a process ... 1 vote 1answer 181 views Why do we need $k \geq n$ in Dijkstra's token ring self-stabilizing system? Let's say I have a ring with four nodes $n=\{0;1;2;3\}$ and three possible states $k=\{0;1;2\}$. A transient failure happens and the system ends up in an illegal state. I know from the restriction ($... 1 vote 0answers 32 views Dekker's Algorithm spin on intent instead of turn For Dekker's algorithm given below (from Wikipedia), why is it that we wait for the turn to change, instead of waiting for p1 to set it's flag to false? It seems to me that it would be safer (or more ... 1 vote 0answers 51 views Unconditionally fair, weakly fair, and strongly fair scheduling I am trying to understand the difference between weakly fair and strongly fair scheduling. For example, what scheduling policy would ensure that a process delayed at its first await statement will ... 1 vote 0answers 26 views Comparing wait-signal alternatives for synchronizing two piece of programs I came across following problem: A certain computation generates two arrays a and b such that ... 1 vote 0answers 88 views Do we really need a mutex in this case? Wikipedia's solution for multi Producer-Consumer problem uses both mutexes and semaphores. ... 1 vote 0answers 61 views Lamport's distributed mutual exclusion: wait-chain order clock Regarding Lamport's mutual exclusion... Where messages are exchanged in the following sequence between nodes S, G1, and G2. G1 and G2 are the members of the group. (for this, lets just assume that ... 1 vote 0answers 43 views 1 vote 0answers 121 views Is Dekker's algorithm not k-bounded for any finite k? Consider this version of the algorithm, for only 2 processes, 0 and 1: ... 1 vote 0answers 395 views What are the practical use of weak semaphores? Weak semaphores are often defined as if a process (or thread), say p1, performs a V operation and some other process is waiting on that semaphore, then the first process (i.e. p1) is not ... 0 votes 1answer 310 views What is the abstract idea of a semaphore and how can we use it to implement mutual exclusion? So I've got this so far to try and wrap my head around the abstract idea of a semaphore: A semaphore is a variable or abstract datatype (commonly an integer), used to control access to a common ... 0 votes 1answer 72 views What happens if the holder of a lock tries to acquire a lock? [closed] In a system, suppose there is a process and a resource with only one instance. Let us assume that the process holds the instance and requests the same instance of that resource. Will there be a ...  
__label__pos
0.884125
Abstract Takotsubo cardiomyopathy (TC) is a rare, transient cardiomyopathy, with symptoms mimicking myocardial infarction. It has been reported to typically occur in postmenopausal women and is often triggered by an intense physical or emotional event with stimulation of the sympathetic response; the exact etiology, however, is uncertain. Bone morphogenic protein (BMP) is widely used in spinal fusions and has been associated with numerous perioperative complications. BMP is known to stimulate sympathetic pathways. In this paper, we present the case of a patient with a 7-hour episode of TC after a spinal fusion with bone morphogenic protein. The patient's symptoms resolved and long-term followup has been uneventful. This is the first paper to describe TC in the setting of spine or other major orthopaedic surgery and it suggests another possible area for further investigation in peri-operative events potentially associated with the use of bone morphogenic protein. 1. Introduction Takotsubo cardiomyopathy (TC) is a poorly understood, rare presentation of cardiac failure in postoperative patients. TC is also called broken heart syndrome or stressed cardiomyopathy. It presents similarly to acute myocardial infarction but has a self-limited course. Little is known about the exact etiology of TC, but it usually occurs in postmenopausal women and is often triggered by an intense physical or emotional event; however, the exact etiology is uncertain [1]. Multiple etiologies have been proposed and the connection between TC and the sympathetic response has been studied extensively. Symptoms mimic a myocardial infarction, but there is often absence of significant atherosclerotic vascular disease and patients usually make a full cardiac recovery [2]. TC is associated with a mortality rate of only 1.1% [3]. In this paper, we present the case of a patient with a 7-hour episode of TC after a spinal fusion with bone morphogenic protein (BMP). BMP is widely used in spinal fusions and has been associated with numerous perioperative complications [4]. BMP is known to stimulate sympathetic pathways [5, 6]. The following case represents the first report of TC in a patient undergoing major orthopaedic or spine surgery. 2. Case Report A 75-year-old woman with a history of smoking, gastro-esophageal reflux disease, and hypertension who struggled with symptomatic neurogenic claudication secondary to severe, multilevel stenosis, and a degenerative scoliosis. She failed extensive nonoperative treatment and elected to pursue surgical intervention. She was taken to the operating room for an L1 to S1 laminectomy and L2–L5 fusion in situ with iliac crest bone graft and bone morphogenic protein (BMP). A single large, infuse sponge was employed. In this particular case, BMP was employed because of her smoking history and her multilevel pathology. Instrumentation was not used because of the relatively poor quality of her bone. She had no history or symptoms of coronary artery disease or heart failure. Surgery was complicated by an incidental durotomy which was repaired uneventfully. The total blood loss was 550 mL. With extubation, the patient had some difficulty with congestion and was taken over to the postanesthesia care unit (PACU) on a Venturi mask. After some breathing treatments in the PACU, her airway cleared uneventfully and she was transferred to the floor. The first two postoperative days were unremarkable. On the evening of postoperative day three, the patient developed a seven-hour course of chest pain which was described as squeezing in nature and associated with concurrent shortness of breath. AMI panels were obtained, and troponins peaked at 1.3. An ECG was obtained and demonstrated diffuse T-wave inversions and T-wave flattening. An echocardiogram was obtained and demonstrated an ejection fraction of 30%–35% with a left ventricular end-diastolic diameter of 4.6 and a left atrial diameter of 5.0. There was akinesis of the anteroseptal wall, lateral wall, and apical wall. The echocardiogram was suggestive of an anteroseptal myocardial infarction versus a Takotsubo (stressed) cardiomyopathy. The patient subsequently underwent a left heart catheterization which demonstrated absence of atherosclerotic vascular disease. The left ventriculography demonstrated extensive anteroapical and inferior dyskinesis. The overall ejection fraction was reduced to 25%. The patient had a previously documented left ventricular ejection of 65% earlier that month. The patient was diagnosed with TC, paroxysmal atrial fibrillation, and anxiety. The remainder of the hospital course was event-free, in particular with absence of chest pain or evidence of shortness of breath. On the day of discharge, heart rate was 72, blood pressure 108/60, respiratory rate 18, and oxygen saturation 95%. The patient was discharged to a rehabilitation center on aspirin, furosemide, lisinopril, and metoprolol for her newly diagnosed cardiomyopathy. At the three-month orthopedic followup, the patient had no back or leg pain and was mobilizing and walking well. She was treated in a lumbosacral (LSO) brace for the first 3 months and radiographs at that time demonstrated solid bony fusion masses bilaterally from L2 to L5. At the three-month cardiac followup, the patient was doing well and did not describe any cardiac symptoms. Echocardiography showed a return of her ejection fraction to normal. 3. Discussion Takotsubo cardiomyopathy is most common in postmenopausal women between the ages of 62 and 75 [7]. Relative estrogen deficiency in postmenopausal women, resulting in some endothelial dysfunction, may be one of the key predisposing factors linking them to TC [8]. Other predisposing factors include pheochromocytoma, thyroid storm, anaphylaxis, exogenous epinephrine administration, stroke, sepsis, Addison’s disease, Guillain-Barre syndrome, and illicit drug use and withdrawal [924]. Finally, up to two-thirds of patients who experience TC carry a diagnosis of anxiety or depression [25, 26]. The relationship between stress and TC has been extensively studied. Rats pretreated with combination alpha- and beta-adrenergic receptor blockade have shown decreased instances of TC in emotional stress models [27]. Furthermore, a review of case reports found that 88 cases of TC were clearly associated with an acute or subacute emotional stressor [28]. Finally, when compared to Killip class III MI patients, TC patients had significantly higher levels of plasma catecholamines and stress neuropeptides [29]. There are multiple etiologic mechanisms that have been proposed to explain the development of TC. It has been argued that patients with an abnormal index of microvascular resistance are predisposed to TC. This is supported by reduction in coronary Doppler flow reserve and higher thrombolysis in myocardial frame counts when compared with controls [30, 31]. Another etiologic mechanism may involve left ventricular outflow tract obstruction as a result of septal bulging associated with systolic anterior motion of the mitral valve and mitral regurgitation [32]. This mechanism mimics that of hypertrophic cardiomyopathy. Multivessel epicardial spasms have also been proposed as a result of emergency coronarography showing no significant obstruction and positive provocative test in around 30% of cases [2, 33]. Finally, as previously discussed, increased catecholamines and the hormonal changes in postmenopausal women have been linked as etiologic mechanisms to the development of TC [2, 27, 2932, 3437]. Cardiac biomarkers are generally only slightly elevated in patients with TC. Furthermore, coronary angiography has shown that 80.6% of patients have normal coronary arteries and the remainder have luminal stenosis under 50%. Acutely all patients with TC have moderate-to-severe midventricular dysfunction and apical akinesis or dyskinesis [6]. TC has a mortality of 1.1% [6]. The majority of survivors make a full recovery in which all wall abnormalities resolve completely. Acutely ill patients with TC present with ejection fractions in the range of 20% to 49%. However, in just a matter of weeks, most patients have ejection fractions in the range of 60% to 76% [6]. Our patient was a postmenopausal 75-year-old female following a major spine surgery with significant perioperative blood loss. The physical and emotional demands of the surgery were significant for the patients, and her high anxiety was documented prior to and following her surgery. Her history of smoking and hypertension predisposed her to vascular dysfunction. Furthermore, her postsurgical anemia and challenging extubation may have also been precipitating factors in her development of TC. Finally, it is also possible that enhanced stimulation of the sympathetic response by BMP played some role in precipitating the onset of TC. BMP has been used extensively in the last decade in spine surgery to enhance spinal fusions. Complications have been reported in association with its use, ranging from retrograde ejaculation to transient radiculitis and increased wound drainage [3]. Research has further suggested that BMP can have a profound effect on the sympathetic nervous system [4, 5]. No previous reports of cardiac events in the perioperative period have been associated to the use of BMP. It is unknown whether large doses of BMP, as was employed in this patient, could contribute to increased sympathetic tone and, consequently, cardiac events in subsets of patients. 4. Conclusion TC must be included in the differential of any patient presenting with acute coronary syndrome following a stressful event, particularly if the patient is a postmenopausal woman, has a history of anxiety or depression, or has a medical condition that may predispose him/her to TC. Further inquiry into the role of BMP in potentially precipitating sympathetic mediated cardiac events might also be warranted. As the population of those undergoing major orthopaedic surgery in the United States ages, awareness of TC as a unique clinical identity in postoperative patients becomes increasingly important.
__label__pos
0.787002
Title: Communications in relay networks United States Patent 8958421 Abstract: A system and method for transmitting data in a communication system. First encapsulated data is received at a first node, and second encapsulated data associated with the first encapsulated data is generated at the first node. The first encapsulated data and the second encapsulated data are transmitted independently to one or more further nodes. Inventors: Poyhonen, Petteri (Helsinki, FI) Strandberg, Ove (Lappbole, FI) Application Number: 11/486462 Publication Date: 02/17/2015 Filing Date: 07/14/2006 Assignee: Nokia Corporation (Espoo, FI) Primary Class: Other Classes: 370/316, 370/328, 370/338, 379/114.07, 379/124, 379/126, 705/77 International Classes: H04L12/28; G06Q20/00; H04B7/185; H04L12/14; H04L12/66; H04L12/701; H04M15/00; H04W4/00; H04W4/24; H04W28/06; H04W84/22 Field of Search: 370/316, 370/328, 370/338, 370/492, 370/501, 379/114, 379/124, 379/126, 705/77 View Patent Images: Foreign References: EP1244250September, 2002Method and telecommunication system for monitoring data streams in a data network WO2004051939A12004-06-17 WO2004066582A12004-08-05ESTABLISHING COMMUNICATION TUNNELS WO2004098129A12004-11-11ROUTING IN WIRELESS AD-HOC NETWORKS WO-2004103006November, 2004 WO2004103006A12004-11-25MULTIMEDIA COMPONENT INTERCEPTION IN A GATEWAY GPRS SUPPORT NODE (GGSN) WO2007125404A22007-11-08 Other References: 3rd Generation Partnership Project TS 22.259 V1.0.0 (Jun. 2005). Flinck et al., Issues of advanced mobility management in ambient networks. Wireless World Research Forum (WWRF), p. 1-7. Niebert et al., Ambient networks—A new concept for mobile networking. Wireless World Research Forum (WWRF), p. 1-8. Niebert et al., Ambient networks: An architecture for communication networks beyond 3G. IEEE Wireless Communications, Apr. 2004, p. 14-22. Abrahamsson and Gunnar, Traffic engineering in ambient networks: Challenges and approaches. Swedish Institute of Computer Science, Kista, Sweden, p. 1-5. Ahlgren et al., Ambient networks: Bridging heterogeneous network domains. A product of the Ambient Networks project supported in part by the European Commission under its Sixth Framework Programme, p. 1-5, Mar. 30, 2005. Sixth Framework Programme, Priority IST-2002-2.3.1.4, Mobile and Wireless Systems beyond 3G Project 507134 WWI Ambient Networks, “Connecting Ambient Networks—Requirements and Concepts.” D3.1, Version 1.0, Information Society Technologies, Jun. 28, 2004, p. 1-51. Koo and Rajkotia, Configuration Scenario for multi-hop relay network. IEEE 802.16 Session #41, New Delhi, India, Jan. 2006. Partial International Search Report for PCT Application No. PCT/IB2007/001119 dated Mar. 31, 2009. Digital Cellular Telecommunications (Phase 2+); Universal Mobile Telecommunications System (UMTS); IP Multimedia Subsystem (IMS); Stage 2 (3GPP TS 23.228 version 7.3.0 Release 7), Mar. 1, 2006. Universal Mobile Telecommunications System (UMTS); Telecommunication management; Charging management; Packet Switched (PS) domain charging (3GPP TS 32.251 version 6.6.0 Release 6); ETSI TS 132 251, Mar. 1, 2006. International Search Report for PCT Application No. PCT/IB2007/001119 dated Jul. 14, 2009. Girao,J., et al. “Implementing Charging in Mobile Ad Hoc Networks.” Revista Do Detua, vol. 4, No. 2, Mar. 31, 2004. Primary Examiner: TRAN, THINH D Attorney, Agent or Firm: Harrington & Smith, Attorneys At Law, LLC (SHELTON, CT, US) Claims: What is claimed is: 1. A method for transmitting data in a communication system, comprising: receiving first encapsulated data at a first node; generating second encapsulated data associated with the first encapsulated data at the first node; transmitting independently the first encapsulated data and the second encapsulated data to one or more further nodes, wherein the second encapsulated data comprises charging, topology and verification information and wherein the first encapsulated data comprises user traffic data; wherein the first encapsulated data and second encapsulated data are transmitted in separate encrypted data tunnels; and wherein the first encapsulated data and the second encapsulated data are prepended with a header specifying end points of their respective data tunnel; wherein the second encapsulated data is sent towards an access network providing access to services for a mobile node, the first encapsulated data being generated by or terminating at the mobile node; wherein the first encapsulated data is transmitted between the mobile node and the access network by a first tunnel, and the second encapsulated data is transmitted between the first node and the access network by a second tunnel, the first and second tunnels being independent from one another; wherein at least one of third and fourth encapsulated data is transmitted between a second node and the access network by a third tunnel, the third tunnel being independent from the first and second tunnels; wherein the second encapsulated data provides first topology information, associated with at least one of the mobile node and the first node, to the access network; wherein the third encapsulated data provides second topology information, associated with the mobile node, and at least one of the first node and second node, to the access network; and wherein the access network compares the first and the second topology information, and resolves any ambiguities therein via a verification function. 2. The method according to claim 1, wherein: the first encapsulated data and the second encapsulated data are forwarded to the second node; the second node generates at least one of third encapsulated data associated with the first encapsulated data and fourth encapsulated data associated with the second encapsulated data; the second node transmits the first encapsulated data independently from a) the second encapsulated data and b) the at least one of the third and fourth encapsulated data to a third node. 3. The method according to claim 2, wherein the third encapsulated data comprises control data associated with the first encapsulated data and the fourth encapsulated data comprises control data associated with the second encapsulated data. 4. The method according to claim 2, wherein the third encapsulated data comprises second verification information confirming that the first encapsulated data has been forwarded by the second node, and the fourth encapsulated data comprises third verification information confirming that the second encapsulated data has been forwarded by the second node. 5. The method according claim 1, wherein the first encapsulated data is generated, encapsulated and transmitted to the first node by the mobile node. 6. The method according to claim 1, wherein the second encapsulated data comprises charging information associated with transmission of the first encapsulated data via the first node. 7. The method according to claim 1, wherein the first encapsulated data and second encapsulated data are sent to different nodes. 8. The method according to claim 1, wherein at least one of the first node or one or more further nodes are relay nodes comprised in a relay network. 9. The method according to claim 8, wherein at least one of the first node or one or more further nodes are comprised in one of a wireless local area network, a wireless personal area network and a wireless cellular network. 10. The method according to claim 1, wherein the second encapsulated data comprises first verification information confirming that the first node has forwarded the first encapsulated data. 11. The method according to claim 10, wherein the first verification information comprises an indication of the node from which the forwarded data originated. 12. A computer program product tangibly embodied in a non-transitory computer readable storage medium and comprising computer program instructions execution of which by a processor in a node in a communication system, result in operations comprising causing the node to generate second encapsulated data associated with first encapsulated data received at the node, and independently transmit the first encapsulated data and the second encapsulated data to one or more further nodes, wherein the second encapsulated data comprises charging, topology and verification and wherein the first encapsulated data comprises user traffic data; and transmit the first encapsulated data and second encapsulated data in separate encrypted data tunnels; and wherein the first encapsulated data and the second encapsulated data are prepended with a header specifying end points of their respective data tunnel; wherein the second encapsulated data is sent towards an access network providing access to services for a mobile node, the first encapsulated data being generated by or terminating at the mobile node; wherein the first encapsulated data is transmitted between the mobile node and the access network by a first tunnel, and the second encapsulated data is transmitted between-the first node and the access network by a second tunnel, the first and second tunnels being independent from one another; wherein at least one of third and fourth encapsulated data is transmitted between a second node and the access network by a third tunnel, the third tunnel being independent from the first and second tunnels; wherein the second encapsulated data provides first topology information, associated with at least one of the mobile node and the first node, to the access network; wherein the third encapsulated data provides second topology information, associated with the mobile node, and at least one of the first node and second node, to the access network; and wherein the access network compares the first and the second topology information, and resolves any ambiguities therein via a verification function. 13. A communication system comprising: a first node; and at least one further node; wherein the first node is configured to receive first encapsulated data, generate second encapsulated data associated with the first encapsulated data, and independently transmit the first encapsulated data and the second encapsulated data to the at least one further node, wherein the second encapsulated data comprises charging, topology and verification information and wherein the first encapsulated data comprises user traffic data; and wherein the first node is configured to transmit the first encapsulated data and second encapsulated data in separate encrypted data tunnels; and wherein the first encapsulated data and the second encapsulated data are prepended with a header specifying end points of their respective data tunnel; wherein the second encapsulated data is sent towards an access network providing access to services for a mobile node, the first encapsulated data being generated by or terminating at the mobile node; wherein the first encapsulated data is transmitted between the mobile node and the access network by a first tunnel, and the second encapsulated data is transmitted between-the first node and the access network by a second tunnel, the first and second tunnels being independent from one another; wherein at least one of third and fourth encapsulated data is transmitted between a second node and the access network by a third tunnel, the third tunnel being independent from the first and second tunnels; wherein the second encapsulated data provides first topology information, associated with at least one of the mobile node and the first node, to the access network; wherein the third encapsulated data provides second topology information, associated with the mobile node, and at least one of the first node and second node, to the access network; and wherein the access network compares the first and the second topology information, and resolves any ambiguities therein via a verification function. Description: CROSS-REFERENCE TO RELATED PATENT APPLICATIONS The present application claims priority to Great Britain Priority Application GB 0608385.1, filed Apr. 27, 2006 including the specification, drawings, claims and abstract, all of which is incorporated herein by reference in its entirety. FIELD OF THE INVENTION The present invention relates to the field of communication systems, and in particular to methods and systems suitable for the transmission of encapsulated data in relay networks. BACKGROUND OF THE INVENTION This section is intended to provide a background or context to the invention that is recited in the claims. The description herein may include concepts that could be pursued, but are not necessarily ones that have been previously conceived or pursued. Therefore, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section. A communication system is a facility that enables communication between two or more entities such as user terminal equipment and/or networks entities and other nodes associated with the communication system. The communication may comprise, for example, communication of voice, electronic mail (email), text messages, data, multimedia and so on. The communication system can be used for providing the users thereof with various types of services. The communication may be provided via fixed line and/or wireless communication interfaces. A feature of the wireless communication systems is that they provide mobility for the users thereof. Examples of communication systems providing wireless communication include cellular or mobile communications systems such as the public land mobile network (PLMN) and wireless data networks such the Wireless Local Area Network (WLAN). Examples of the fixed line systems include the public switched telephone network (PSTN) and various fixed line data networks. There is an increasing demand for mobile communications services, and in particular increasing use of a diversity of mobile communication devices such as laptop computers, personal digital assistant (PDA) equipment such as palm tops and intelligent telephones. In addition to the wide area cellular networks mentioned above which may provide network access for such devices, new, more localized access networks have emerged in recent years. These include, for example, WLAN hotspots which may provide higher speed network access than is available from a cellular network, but only within a geographically restricted area. Some cellular network operators may in certain cases enable their subscribers to roam into WLAN access networks. This is part of a more general trend where services are provided over a range of different access networks. With this trend comes the additional complexity derived from the need to offer services over radically different bearer types. In addition to these cellular and WLAN networks which may be offered for public access, there has been a growth in private networks associated with individuals or corporate entities. These private networks may include personal area networks (PAN), comprising a plurality of devices under the control of a single user. Typically the private network contains a user equipment which can connect to an access network, such as mobile telephone equipped with wireless access to a PLMN. The additional devices in the PAN may communicate with the user equipment via wired or wireless connections, and may include, for example, a laptop, PDA, camera etc. Some of these devices may additionally be capable of independently accessing the same, or a different access network (for instance a laptop may alternatively access the internet via DSL). Wireless connections in a PAN may be enabled in a PAN using short range wireless communication systems such as Bluetooth. In addition to personal area networks associated with a particular individual, localized private networks may be provided in a particular building, such as an office, shopping centre or home, for use by individuals or devices within that locality. Alternatively a private network may be installed in a particular vehicle, to provide high-speed access and to insulate users from problems associated with high physical mobility. The number of such private networks is growing continuously, but they vary in the degree to which they permit access to third parties. For instance, a PAN typically restricts access to a particular user. A private network installed in an office may permit access only to employees or devices associated with the corporate entity to which the office belongs. Likewise, a private network installed in a vehicle may be only for the use of the vehicle owner. The growth of localized public and private networks could therefore provide new capabilities in terms of enhanced mobility and connectivity for users. However, for its full potential to be realized, the problems associated with integrating heterogeneous control technologies employed by the different networks need to be overcome. Furthermore, the availability of network access could be rapidly enhanced by expanding the accessibility of private networks to third parties. Thus a PAN could provide network access for devices belonging to associates of its owner, or a private network installed in a vehicle could be made available to any passenger traveling in the vehicle. Typically such private networks may have spare capacity available, but do not offer it to third parties. The reasons for this may include compatibility issues, security or authentication concerns. A major issue which needs to be resolved is the question of how to compensate a private network operator/user for the use of their resources by third parties. Addressing this issue satisfactorily would provide an incentive for private networks to provide such access and thus facilitate the expansion of its provision. Typically, network operators only grant access to users with whom they have previously signed an agreement. This requires human interaction and potentially negotiation, and thus inevitably results in a substantial delay between the initial access request and provision of a service. For instance, a cellular network provider will have an agreement with a subscriber to whom services are provided, and may have negotiated additional agreements with other entities involved in providing services to the subscriber. This is acceptable in the context of a network whose infrastructure topology does not change rapidly over time. However, this model is not appropriate for providing instant, on-demand access to one of a plurality of heterogeneous networks, where no authorization has previously been obtained. Providing on-demand access via heterogeneous networks creates its own problems in terms of network management and compensation for entities involved in enabling access to the end user. A particular issue is how to manage a constantly changing network topology and traffic demands. In the context of providing compensation for private network owners, this means that the access network needs to be able to obtain charging and/or topology information associated with a path taken between a user equipment and the access network. For instance, the access network needs to be able to identify which nodes have been involved in relaying a particular communication to or from the access network. The topology changes in such an arrangement may be similar to those occurring in ad-hoc networks. A wireless or mobile ad-hoc network comprises a series of nodes connected by wireless links. The topology of an ad-hoc network is typically dynamic since nodes are free to move randomly and organize themselves arbitrarily. Such networks may thus be rapidly deployed without relying on a pre-existing network infrastructure, for instance for military communication, as wireless sensor networks, or as temporary networks in the context of a business meeting. WLAN and wireless PAN may be based on an ad-hoc arrangement. The nodes in an ad-hoc network typically attempt to communicate with each other by relaying packets. However, due to the limited transmission range that is characteristic of nodes in an ad-hoc network, multiple network “hops” are typically needed for one node to exchange data with another node across the network. In a conventional cellular radio access network, base station locations and cell coverage are typically fixed, at least in the short term. The mobile stations normally communicate directly with a base station, i.e. there is a single hop between the two. However, in multi-hop cellular networks, relay stations may be employed which provide a link between the base station and the mobile station. Communication between the base station and the mobile station can thus be extended by the relay station, which may be fixed or mobile (e.g. other mobile stations subscribing to the cellular network may be used as relay stations). This arrangement can provide additional flexibility in the design, operation and dimensioning of the mobile network. A common feature between ad-hoc networks, multi-hop cellular networks and other arrangements involving third-party access to local area networks is that they involve the use of relay nodes for forwarding packet data between the access network and a mobile station. Thus in the context described above, one or more nodes or network elements in a private network may act as a relay node for relaying packet data between a third party device and an access network. Typically the relay nodes do not need to interpret the packet data they relay, other than to forward it on to the next node. In any relay network, it may be advantageous to determine accurate topology information concerning a communication path involving a mobile station and one or more relay nodes. This is particularly so where a private network relays third party data, in order to provide appropriate compensation for the private network. However, known methods for transmitting data in relay networks may suffer from one or more disadvantages in terms of difficulties of obtaining topology information in dynamic arrangements, or inefficient protocol transmission of such information. There is therefore a need for improved methods for transmitting data between nodes in a communication system. In particular there is a need for an efficient data transmission method suitable for use in relay networks, which facilitates the verification of topology information by an access network. Embodiments of the present invention aim to address one or more of these problems. SUMMARY OF THE INVENTION Accordingly, one embodiment of the present invention provides a method for transmitting data in a communication system, comprising receiving first encapsulated data at a first node, generating second encapsulated data associated with the first encapsulated data at the first node and transmitting independently the first encapsulated data and second encapsulated data to one or more further nodes. In another embodiment, the present invention provides a method for transmitting data in a communication system, comprising receiving encapsulated communication data at a first node; generating control data associated with the encapsulated communication data at the first node; encapsulating the control data at the first node to produce encapsulated control data; and transmitting independently the encapsulated communication data and the encapsulated control data to one or more further nodes. In another embodiment, the present invention provides a node in a communication system, wherein the node is configured to receive first encapsulated data, generate second encapsulated data associated with the first encapsulated data, and independently transmit the first encapsulated data and the second encapsulated data to one or more further nodes. In another embodiment, the present invention provides a node in a communication system, comprising data generation means for generating second data associated with first encapsulated data received at the node, encapsulation means for encapsulating the second data to produce second encapsulated data and transmission means for independently transmitting the first encapsulated data and the second encapsulated data to one or more further nodes. In another embodiment, the present invention provides a computer program product comprising a set of instructions which when executed by a processor in a node in a communication system, causes the node to generate second encapsulated data associated with first encapsulated data received at the node, and independently transmit the first encapsulated data and second encapsulated data to one or more further nodes. In another embodiment, the present invention provides a communication system comprising a first node and one or more further nodes, wherein the first node is configured to receive first encapsulated data, generate second encapsulated data associated with the first encapsulated data, and independently transmit the first encapsulated data and second encapsulated data to the one or more further nodes. The first encapsulated data, e.g. the encapsulated communication data, may comprise any type of data, including traffic and/or control data. Preferably the encapsulated communication data comprises traffic data. In one embodiment the communication network further comprises a second node to which the encapsulated communication data and the encapsulated control data are forwarded by the first node. The second node receives the encapsulated communication data and encapsulated control data from the first node and generates second control data associated with the encapsulated communication data and/or third control data associated with the encapsulated control data. The second node encapsulates the second and/or third control data to produce second and/or third encapsulated control data, and transmits the encapsulated communication data independently from a) the encapsulated control data and b) the second and/or third encapsulated control data to a third node. The second encapsulated data is preferably control data, in particular control data generated by the first node in connection with forwarding the first encapsulated data. The first node preferably generates control data and then encapsulates it to produce the second encapsulated data. The first encapsulated data may be referred to hereinafter as encapsulated communication data. The encapsulated communication data may be transmitted to the first node by any network element or node, for instance from a node in a public access network or a private network. In one embodiment encapsulated communication data originates at a mobile node. Thus the encapsulated communication data may be generated, encapsulated and/or transmitted to the first node by the mobile node. The mobile node is preferably equipped for wireless communication with the first node. The mobile node may be, for example, a mobile telephone, PDA, laptop computer or any other type of mobile station. The control data generated by the first node preferably comprises charging information associated with transmission of the communication data via the first node. The charging information may enable a charging function, for example in an access network, to calculate an appropriate charge to apply to a user of a mobile node for the transmission of the encapsulated data, and/or to credit or compensate the first node for this transmission. In further embodiments, the second encapsulated data may comprise verification information generated by the first node to confirm that it has received and forwarded the first encapsulated data to a further node. The verification information may comprise an indication of the node from which the first encapsulated data originated, e.g. from a mobile node or another relay node. Likewise, in embodiments discussed below, the third and/or fourth encapsulated data generated by the second node may comprise verifications generated by the second node to confirm that it has received the first and/or second encapsulated data from the first node and forwarded it to a further node. These verifications may, for example, include an indication of the node from which the forwarded data originated, e.g. an indication that the first encapsulated data originated at the first node and that the second encapsulated data originated at the first node. In preferred embodiments, the encapsulated data, e.g. the first, second, third or fourth encapsulated data, especially the first encapsulated data, may comprise a marker indicating whether it comprises traffic or control data. The first or second node may use this marker in order to determine whether particular types of further control data should be generated in respect of the encapsulated data it receives. For instance, in one embodiment charging information is generated and transmitted by the first or second node only in respect of traffic data (and not in respect of control data) which is forwarded by that node. For example the second node may generate charging information in respect of the first encapsulated data (which in this embodiment comprises traffic data) and transmit this charging information in the third encapsulated data, but the second node generates no charging information in respect of the second encapsulated data, which it also receives from the first node and forwards, because the second encapsulated data comprises only control data generated by the first node in this embodiment. The encapsulated communication data and encapsulated control data need not necessarily be sent to the same node by the first node. Thus in certain embodiments the encapsulated communication data and encapsulated control data are sent to different nodes. For instance, the encapsulated communication data may be sent from an access network towards a mobile node and relayed by the first node. In this embodiment, the first node may forward the encapsulated control data towards the mobile node, generate encapsulated control data and send the encapsulated control data towards the access network. The access network provides access to services for the mobile node, the encapsulated communication data being generated by or terminating at the mobile node. In an embodiment of the present invention, data may be sent between nodes (e.g. a mobile node, first or second node, or a node in an access network) using one or more tunnels. Preferably a node (e.g. the first or second node) encapsulates the control data generated by it, i.e. data origins encapsulate data. Thus in one embodiment, each node has its own independent tunnel to the access network reflecting their trust relationships with the access network, by which it sends and receives encapsulated data (e.g. data generated by the end-point node of the tunnel). For instance, the communication system may comprise a plurality of tunnels, each tunnel having a first end-node and a second end-node, the second end-node being in the access network, wherein the first end-nodes of each tunnel are different. In one embodiment, the encapsulated communication data is transmitted between the mobile node and the access network by a first tunnel, and the second encapsulated data (e.g. encapsulated control data) is transmitted between the first node and the access network by a second tunnel, the first and second tunnels being independent from one another. Preferably third and/or fourth encapsulated data (i.e. second and/or third control data) is transmitted between a second node and the access network by a third tunnel, the third tunnel being independent from the first and second tunnels. Thus encapsulated communication data and encapsulated control data are transmitted in independent data tunnels. In preferred embodiments, the encapsulated control data may provide topology information to the access network. This topology information may include information associated with the mobile node and/or the first node, which allows the access network to identify the path taken by the transmitted data. Preferably the second encapsulated control data provides second topology information, associated with the mobile node, the first node and/or second node, to the access network. The access network may analyse received topology information for topology verification, routing and/or charging purposes. In one embodiment the access network compares the first and second topology information to check that they are consistent. Ambiguities therein may be resolved by means of a verification function. According to the present invention, encapsulated communication data is relayed by a first node to one or more further nodes. The communication system may comprise a plurality of further nodes which function in a similar manner to the first node to relay the encapsulated communication data, for instance between a mobile node and an access network. Each further node may also operate analogously to the first node, generating its own encapsulated control data and transmitting it towards the access network via its own tunnel. The first and further nodes may be relay nodes comprised in any type of relay network. Thus one or more of the first and further nodes may be comprised, for example, in a local area network, a personal area network, an ad-hoc network or a multi-hop cellular network. Preferably one or more of the first and further nodes is comprised in a first network, which relays data to a destination node comprised in a second network (e.g. an access network). Relay nodes may be fixed (static) or mobile (nomadic). Preferably one or more of the first and further nodes is capable of wireless communication. In certain embodiments, the relay node may be a mobile telephone or laptop computer. Embodiments of the present invention advantageously facilitate the transmission of data in communication networks, particularly relay networks carrying encapsulated data. By independently transmitting the first and second encapsulated data (e.g. encapsulated communication data and encapsulated control data), additional protocol overhead can be avoided. Furthermore, separation of control data from communication (e.g. traffic) data in independent tunnels may enhance topology discovery and verification by the access network, which is particularly important in networks with a highly dynamic topology. Additionally, the separation of control data from communication data makes it possible to provide for example better than “best effort” Quality of Service for control data, which is typically important to enable and/or maintain capabilities to support communication data transportation. Charging data can also be provided more efficiently to the access network, enabling compensation of relay nodes, particularly where the relay nodes are owned or operated by a different entity to the access network. These and other advantages and features of the invention, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, wherein like elements have like numerals throughout the several drawings described below. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will now be described in more detail and by way of example only, with respect to the following specific embodiments and drawings, in which: FIG. 1 shows a communications system comprising a relay network in which the present invention may be implemented; FIG. 2 shows a representation of signaling between nodes in a first embodiment of the present invention; FIG. 3 shows an alternative representation of signaling steps in the first embodiment of the present invention; FIG. 4 shows a representation of signaling between nodes in a second embodiment of the present invention; and FIG. 5 is a schematic representation of the circuitry that can exist in a device that is involved in the implementation of various embodiments of the present invention. DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS FIG. 1 shows a mobile node 1, such as a mobile telephone or laptop computer, which wishes to access network services. The mobile node is registered to public access network 6, containing a gateway 5. The mobile node is currently located in proximity to a private local network 2 owned by a third party, such as a personal area network. Local network 2 comprises a first relay node 3 and a second relay node 4. Although only 2 relay nodes are shown in FIG. 1, the network may comprise any number of further nodes which relay data in a similar way to those illustrated. Mobile node 1 can communicate with the first relay node 3 via a wireless link. First node 3, second node 4 and gateway 5 may also communicate via wireless or wired connections. Some components of the first relay node 3 are shown in FIG. 1. These components may also be present in further nodes, such as the second node. The first relay node 3 comprises a receiver or transceiver means 10 for receiving data from and/or transmitting data to the mobile node 1. The first relay node also comprises a transmission or transceiver means 14 for enabling communication with the second relay node 4. The transceiver means 10 and 14 may comprise, for example, a wireless or wired transmitter device as are known in the art. The first relay node 3 further comprises a data generation means 8 for generating second data, for instance control data, associated with encapsulated data received from e.g. the mobile node 1. The first relay node 3 also comprises an encapsulation means 9 for encapsulating the second data for transmission to a further node such as the second relay node 4. The data generation means 8 and the encapsulation means 9 may, for example, be implemented by virtue of an appropriated programmed processor in the first relay node. It may be desirable to provide services to mobile node 1 from access network 6, via local network 2. One way in which to do this is to provide a communication tunnel 7 between the mobile node 1 and the gateway 5 of the access network 6. Data (e.g. Internet Protocol (IP) packet data) may be trafficked between two nodes in a communication system (e.g. the mobile node and the access network) using a communication tunnel. A tunnel comprises a forwarding path between two nodes for carrying tunnel packets, wherein each tunnel packet encapsulates an original packet. During encapsulation, a header is prepended to the original packet, which specifies the tunnel end-points as source and destination. Security associations (SAs) between the end-points of the tunnel allow data to be securely transmitted through the tunnel over the intervening network elements, such as the local network 2. The entry-point of a tunnel may perform security algorithms on the packet and prepend as part of the tunnel header one or more security headers. The exit-point node decapsulates the packet by performing security algorithms and processing the tunnel security header. The degree of integrity, authentication and confidentiality performed on a tunnel packet at entry and exit points may depend on the type of security header and parameters configured in the SA for the tunnel. In order to communicate with the gateway 5 via tunnel 7, the mobile node 1 thus encapsulates communication data, e.g. traffic data, and sends it to the first relay node 3. The mobile node is therefore the entry-point of the tunnel. The first relay node 3 forwards the encapsulated data to the second relay node 4, which forwards it on to the gateway 5. The gateway 5 is the tunnel exit-point which decapsulates the tunnel packets. The first and second relay nodes 3 and 4 in the local network 2 are not able to interpret the encapsulated tunnel packets which they relay. FIG. 2 shows a simple relay network with two relay nodes 3 and 4 and a single mobile node 1 as discussed in relation to FIG. 1. Each of nodes 1, 3 and 4 has an SA with a node in access network 6 and uses the encrypted tunnels to transfer data. Thus the relay nodes 3 and 4 are not able to interpret the encapsulated and encrypted data which they relay. The establishment of SAs is a known technique and thus will not be discussed further. In the embodiment shown, the mobile node 1 and relay nodes 3 and 4 each has its own, separate tunnel to access network 6. The tunnels 11, 12 and 13 shown in FIG. 2 are independent from one another. Nodes that create data encapsulate it. Control data generated by relay nodes 3 and 4 is transmitted to the access network using tunnels 12 and 13 respectively, which are independent from tunnel 11. The access network is able to use the control data for verifying network topology information. This method may thus provide user (traffic) and data (control) plane differentiation. In some cases user and control traffic can be transported over different channels. As shown in FIG. 2 and additionally in FIG. 3, mobile node 1 sends encapsulated communication data towards access network to first relay node 3. After receiving the encapsulated communication data, first relay node 3 identifies the previous hop (from mobile node 1) and forwards the encapsulated communication data to second relay node 4, for further transmission towards the access network, via tunnel 11. First relay node 3 generates charging and other control data and sends it encapsulated towards access network to relay node 4, via tunnel 12. Second relay node 4 receives the encapsulated communication data and encapsulated control data and identifies the previous hop (from first relay node 3). Second relay node 4 then forwards all received data (i.e. the encapsulated control data and encapsulated communication data) towards the access network via tunnels 11 and 12. Second relay node 4 generates charging and control data for both received data. Second relay node 4 encapsulates the created (charging and control) data and sends it towards the access network via tunnel 13. It will be appreciated from the above that the encapsulated communication data and encapsulated control data are not necessarily sent by a relay node 3 or 4 to the same node. For instance traffic going downlink (i.e. from the access network towards the mobile node) should also be reported to the access network. Thus the down link receiver has to be identified and similar control/charging data, as described for the uplink traffic above, has to be encapsulated for transmission towards the access network. For instance, encapsulated traffic data may be sent from the access network to the second relay node 4, for forwarding to the first relay node 3 and on to the mobile node 1. The second relay node 4 generates control data, encapsulates it and sends it towards the access network 6, but forwards the traffic data to first relay node 3. First relay node 3 operates in a similar way for traffic going to the mobile node 1. From the encapsulated control data received from the relay nodes, the access network can reconstruct the traffic forwarding locations through the relay network. If there are contradicting reports from the relay nodes, the access network can employ a separate topology discovery function to verify traffic routing/switching. The charging and/or topology information comprised in the control information received by the access network may be used for billing purposes for the mobile node or to ensure that the relay node operator/owner receives appropriate compensation for relaying data. The method can also be used to perform relay switching/routing control of the relays in traffic forwarding. This is beneficial as typically the access network will have an overview of network status and can perform proper traffic handling optimizations. The present method, employing a separate tunnel for each mobile node or relay node, provides secure and flexible control. Although in the above specific embodiment it is assumed that the relay accounting and topology verification are handled by the access network, in alternative embodiments these functions can be handled at other entities such as access brokers. Furthermore, although in the above embodiment the relay nodes are comprised in a different network to an access network, it will be appreciated that the present invention may be employed whenever it is desired to transmit packet data via a secure tunnel between two nodes in a communication system, using intervening relay nodes. Thus in alternative embodiments, the mobile node may tunnel data to a node in an access network via relay stations which are also comprised in the same access network. In a further alternative embodiment, shown in FIG. 4, instead of generating control data such as charging and/or topology information the first and second relay nodes merely report that they have forwarded data originating at another node. The relay nodes also provide an indication of the node from which the data originated. Thus the first relay node 3 sends a verification towards the access network that it has received data from the mobile node and has forwarded this data. Likewise the second relay node 4 sends a verification towards the access network that it has forwarded data originating at the mobile node 1 and a verification that it has forwarded data originating at the first relay node. The node from which the data originated may be indicated by using an identifier in a layer such as the IP layer. Once the access network has received the communication data and related control data, it can then calculate compensations for each relay node involved, since it knows the message sizes. Thus the present invention provides a method to monitor and to report relay network traffic, for instance in a relay network comprising a mobile node and relay nodes which have security associations with an access network and which use encrypted tunnels for data transfer. The reporting of relay network traffic contains charging information and additional control information. By using encapsulation for charging and control information the access network can verify its topology information and relay nodes can be compensated accordingly. FIG. 5 shows components which can exist in devices that implement various aspects of the present invention. It should be understood, however, that the present invention is not intended to be limited to one particular type of electronic device. The components included in FIG. 5 include a display 32 in the form of a liquid crystal display, a keypad 34, a microphone 36, an ear-piece 38, an infrared port 42, an antenna 44, a smart card 46 in the form of a UICC according to one embodiment, a card reader 48, radio interface circuitry 52, codec circuitry 54, a controller or processor 56 and a memory unit 58. Individual circuits and elements are all of a type well known in the art, for example in the Nokia range of mobile telephones. The present invention is described in the general context of method steps, which may be implemented in one embodiment by a program product including computer-executable instructions, such as program code, which can be embodied in computer-readable media and executed by computers in networked environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps. Software and web implementations of the present invention could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps. It should also be noted that the words “component” and “module,” as used herein and in the claims, is intended to encompass implementations using one or more lines of software code, and/or hardware implementations, and/or equipment for receiving manual inputs. The foregoing description of embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the present invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the present invention. The embodiments were chosen and described in order to explain the principles of the present invention and its practical application to enable one skilled in the art to utilize the present invention in various embodiments and with various modifications as are suited to the particular use contemplated.
__label__pos
0.905292
Select Page Increase Fiber Intake for Elderly, Why? How? Increase Fiber Intake for Elderly, Why? How? Fiber Is Essential   Many elderly need to increase fiber intake. However, most caretakers grow frustrated in the attempt to increase fiber intake for loved ones. Find out: Why fiber is important How much fiber is needed Grams of fiber explained Why elderly often... Managing Meals for Elderly Loved Ones Managing Meals for Elderly Loved Ones Challenges of mealtime for elderly Managing meals for elderly loved ones often presents some challenges. Spilled drinks, food on the floor. And not a toddler in sight. Prepare ahead of time. Meet the challenge with a loving smile. Your elderly parent feels... Time, Day: Memory Loss or No Schedule? Time, Day: Memory Loss or No Schedule? Keeping Track of the Day and Time Time, Day, birthdays, anniversaries…we tend to live by our clock and calendar. People with weekday jobs look forward to weekends off, while following a weekday routine. Nighttime workers find their days and nights twisted, but... Pin It on Pinterest Shares Share This
__label__pos
0.999985
A laboratory report on the experiment investigating the factors that affect the terminal velocity of Air resistance and terminal velocity - complete toolkit newton's laws, air resistance and terminal velocity factors that affect drag. Ap chemistry - electrochemical cells lab the purpose of part 1 of this laboratory is to construct a table listing the reduction experiment 8 report. Finally, terminal ballistics, air resistance and gravity affect the how a bullet’s flight will be affected will depend on the initial velocity of a. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. Measurement of viscosity by the stokes method where v is velocity of the of temperature and specify this temperature at the conclusions of your lab report. E1: electric fields and charge 4 example is the velocity of water in a river which has different magnitudes and directions at different places. While there are a number of methods from which to choose in deciding how to measure viscosity, and v is the velocity of the this experiment has many steps. This lab is designed to have students learn the factors affecting the rms velocity for in the terminal voltage of a two factors affect the current. Brian robinson of fisheries and oceans canada, ottawa dfo with expertise in environmental chemistry read 47 publications, and contact brian robinson on researchgate, the professional network for scientists. The rolling frequency greatly affect the trajectory of dropped cylindrical objects factors that may affect the terminal velocity and. It seems that you do not have to worry about the droplet reaching terminal velocity what factors affect this experiment aimed at investigating the. Investigative project 6 • finding the factors which affect the length of a ski jump • determination of terminal velocity of a. Terminal velocity essay examples a laboratory report on the experiment investigating the factors that affect the terminal velocity of a falling body. Viscosity: a lubricant’s most important characteristic introduction for any oil lubrication system, oil viscosity is considered as the most important parameter. What are the factors that affect this acceleration due to repeat the experiment, most of his observations of falling bodies were really of bodies rolling. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. Measurement of air resistance on an air track up the possibility of investigating more than the idealized terminal velocity3 or the net effect on the motion4. Free undamped and damped vibrations lab free undamped and damped vibrations lab report is a three-terminal. Kimchi chemistry retrieved from the factors controlling the concentration of glucose are complex record the time the experiment starts in your lab notebook. Quantification of reaction violence and combustion enthalpy of plastic bonded explosive 9501 under strong confinement factors represent typical cook-off. • Sediment lab investigating stokes law o = terminal settling velocity, on settling velocity in this experiment you will measure the settling rate of two. • Laboratory experiment on a toluene the terminal velocity reduction we can draw that the toluene concentration does not affect the density of this. • Experiments in fluids papers which report on analysis of flow problems in conjunction with experiments are also (with velocities up to terminal velocity). Locations, and distribution of patterns of bloodstains, in order to provide an interpretation of the physical events that gave rise to their origin (velocity. Investigating ohm’s law introduction report: experiment: my objective in this experiment is to investigate one of the factors that affect the. Funding for the mission was finally secured following the publication of the report, new horizons had a relative velocity of 13 many factors limit the number. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. a laboratory report on the experiment investigating the factors that affect the terminal velocity of Computing laboratory report title of experiment: drift velocity, thevenin theorem states that any linear two-terminal circuit can be replaced by an. Download a laboratory report on the experiment investigating the factors that affect the terminal velocity of` A laboratory report on the experiment investigating the factors that affect the terminal velocity of Rated 3/5 based on 19 review 2018.
__label__pos
0.88114
Ecology Compare And Contrast Analysis of a climograph showing the relationship between temperature, rainfall and the type of ecosystem AND Comparison of pyramids of energy from different. Then they create a hypothetical marine ecosystem and describe the adaptive, Areas on an interactive map and compare and contrast three case studies. Answer to: Contrast the fields of conservation biology and ecology. When comparing conservation biology and ecology, their scope of action is a significant. Sep 24, 2018  · The compare/contrast essay is an excellent opportunity to help students develop their critical thinking and writing skills. A compare and contrast essay examines two or more subjects by comparing their similarities and contrasting their differences. Jun 15, 2019  · Ecology and environmental science are closely related disciplines, and familiarity with the principles of one is essential to fully understanding the other. The main difference between the two is that the latter is a more overarching field that incorporates many elements of Earth and life sciences to understand various natural processes. Haematology Pathologist Near Me “It definitely makes me. therapy is a fairly common practice at universities nationwide. In Minnesota, for example, students at St. Nov 30, 2015  · Compare and contrast the following ecology terms. Think about how they are related and how they differ. , add an example of each term or use them together in a coherent sentence. In your essay, compare and contrast “a”, “b” and “c” as depicted in the diagram, and explain why the situation depicted in “b” is impossible. Which part of the diagram shows the greatest level of social justice? Explain. Explain what must happen to achieve “c”?. The post Need help with 1 human ecology question ( refer to. Cats conquered the (ancient) world long before they conquered the internet, reports a paper published this week in Nature Ecology & Evolution. Cats were domesticated relatively late in comparison. I can compare and contrast predator/prey relationships. I can define and give examples of living (biotic) and non-living (abiotic) things within an ecosystem. In ecology, two parameters are used to measure changes in ecosystems: resistance. Compare and contrast conceptual, analytical, and simulation models of. May 23, 2019  · Compare and contrast essays are taught in school for many reasons. For one thing, they are relatively easy to teach, understand, and format. Students can typically understand the structure with just a short amount of instruction. Answer to Compare and contrast environmental science and ecology. providing a perfect comparison site to study the effects of the eruptions over time. Read more: How Dangerous Is It to Be Taking Video of Kilauea’s Fountains of Lava Erupting in Hawaii? Even more, Dobson is in the Department of Ecology and Evolutionary Biology. although residual effects may last for several years. In contrast, the impacts of long-term habitat conversion may occur over a much. Get an answer for ‘what is the difference between community and ecosystem please explain?’ and find homework help for other Science questions at eNotes Dec 23, 2013. Comparing and contrasting biodiversities with a Venn diagram. Materials: Ecosystem books (wetlands and oceans), revisit Internet web-sites. The distribution of all animals on earth has been shaped by a combination of changing temperature, the rise of mountains, and shifting plate tectonics, reports a paper published online this week in. Entomologist France D Ivoy Three of Africa’s World Cup teams – Ivory Coast, Cameroon and Ghana – will perch tent in a Paris suburb Apr 1, 2018. Ecology – the branch of science that deals with the relationship of organisms with their surroundings. So, the study of various ecosystems may. Compare and contrast definition is – to note what is similar and different about (two or more things). How to use compare and contrast in a sentence. Encyclopædia Britannica, Inc. Secondary succession differs from primary succession in that it begins after a major disturbance—such as a devastating flood, wildfire, landslide, lava flow, or human activity (farming, road or building construction, or the like)—wipes away part of a landscape. The stages of secondary succession are similar to those of primary succession: insects and weedy. We compare philosophy to science. But it separated itself when it began to develop serious answers and systems beyond the merely philosophical. In contrast, the questions philosophy poses are ones. Compare and Contrast Transition Words. What are compare and contrast transition words? Before you can understand what they are, you should know the use of transition words and phrases first. Fundamentally, those words and phrases help on making essays easier to read. In addition, they allow the readers to transition from one topic or point to. Comparing Ecosystems Mini-Project. Introduction: There are many different types of biomes on the planet that are characterized by a certain weather pattern, dominant plants and dominant animals. These areas are also called ecosystems. Jun 23, 2011  · The key difference between ecology and ecosystem is that the ecology is the study of ecosystems and the environment while the ecosystem is a unit of ecology that addresses both biotic and abiotic components of a community. Living organisms interact with each other for various reasons including foods, habitats, resources, etc. These interactions are interesting phenomena of Mother. Ivanova is a PhD candidate at NTNU’s Industrial Ecology Programme. The researchers also conducted. which have the highest footprint differences across each country’s different regions. In contrast, Jun 30, 2006. Matthew Kurtz examines 'economy' and 'ecology' and encounters their entwined entymologies. 3 Compare and contrast two of the ecosystems you studied How is the. to an ecological pyramid of numbers in a forest ecosystem if most of the deer were. Ecology focus on the interactions between organisms and their environment ( including other organisms). Thus it focuses on the inter. Chapter 55 Community Ecology study guide by AmandaGrunder includes 51 questions covering vocabulary, terms and more. Quizlet flashcards, activities and games help you improve your grades. Start studying Conformers vs. Regulators. Learn vocabulary, terms, and more with flashcards, games, and other study tools. Jun 5, 2019. Ecology is the study of the interactions of living organisms with their. Compare and contrast ocean upwelling and spring and fall turnovers. In contrast to open ocean bacterioplankton. (Moraxellaceae Family) on these reefs was striking but not unexpected. For comparison, reef microbes collected between 2009 and 2016 from 22 Pacific. Compare and Contrast Essay Topics on Matters Touching On Sports and Leisure. If you are a student, then you know the importance of co-curricular activities. By looking at various compare and contrast essay topics, we’ll give you an added insight into this fantastic world. Ecology is the branch of biology which studies the interactions among organisms and their. In contrast, a K-selected species has low rates of fecundity, high levels of parental investment in. "Clocks, clades, and cospeciation: Comparing rates of evolution and timing of cospeciation events in host-parasite assemblages". Second, a comparison of habitat suitability maps to field sighting. are found in warmer waters peaking at about 16 °C and 20 °C, respectively. In contrast, Risso’s dolphins are found most often in. Mariangela Girlanda and Silvia Perotto, from the University of Turin, Italy, whose main areas of research include the biodiversity, phylogeny, and ecology of. Journal of Botany. "Orchids and fungi:. In contrast, only the 69% of the metabolic potential. is one of the most important and challenging tasks in microbial ecology. Here, we have carried out a genome-scale comparison of two. Botany What Is A Potato Aug 28, 2016. Make: Apple; Model: iPhone 4S; Shutter Speed: 1/40 second; Aperture: F/2.4; Focal Length: 4 mm; ISO Speed: Jun 23, 2011  · The key difference between ecology and ecosystem is that the ecology is the study of ecosystems and the environment while the ecosystem is a unit of ecology that addresses both biotic and abiotic components of a community. Living organisms interact with each other for various reasons including foods, habitats, resources, etc. These interactions are interesting phenomena of Mother. Population Ecology. Objectives: 1. Define the following: carrying capacity, environmental impact, biotic potential, ecology, biosphere. 2. Describe the difference between population growth in MDC’s and LDC’s. 3. List several examples of biotic and abiotic resources that a population would need. Compare and contrast exponential and logistic. Many studies also do not compare marine protected areas with comparable control. Our understanding of the impacts of marine protected areas on marine ecology, however, is skewed towards certain. Cats conquered the (ancient) world long before they conquered the internet, reports a paper published this week in Nature Ecology & Evolution. Cats were domesticated relatively late in comparison. Evolution System Greg Mannarino Scam 8/11/2012  · Kurt Nimmo Infowars.com August 10, 2012. It is said that as California goes, so goes the nation. The Golden But the cetacean brain is very different Unfortunately for the pride of humankind, this simple comparison is elementary compared. cc are the paragons of brain evolution on the Earth. By contrast, Feb 8, 2009. Ecology is the study of the distribution and abundance of life and. Compare and contrast the ecological impact of sustainable and non-. Encyclopædia Britannica, Inc. Secondary succession differs from primary succession in that it begins after a major disturbance—such as a devastating flood, wildfire, landslide, lava flow, or human activity (farming, road or building construction, or the like)—wipes away part of a landscape. The stages of secondary succession are similar to those of primary succession: insects and weedy. Biodiversity Ecology models explore biodiversity equilibrium and provide data. different sampling protocols to compare and contrast the biodiversity of the two. Channel 2 Meteorologist Ny Evolution System Greg Mannarino Scam 8/11/2012  · Kurt Nimmo Infowars.com August 10, 2012. It is said that as California goes, so Teaching Scientific Method Middle School For two weeks, trainers show proven methods for teaching elementary and middle school students of all skill levels. but will In comparison with wild predators. a year of the adult biomass of target species and in extreme cases the rate can be 40 to 80 per cent. In contrast, non-human predators typically kill only 1 per. Ecology. Module B, Anchor 4. Key Concepts: – The biological influences on. Compare and contrast the movement of energy and matter in ecosystems. 2. In contrast to this hypothesis many studies have pointed out. These empirical observations show the presence of an ecology of groups of investors characterized by different attributes and by. Researchers at the UH Manoa School of Ocean and Earth Science and Technology (SOEST) made a discovery that challenges a major theory in the field of coral reef ecology. are environmentally. Researchers at the UH Manoa School of Ocean and Earth Science and Technology (SOEST) made a discovery that challenges a major theory in the field of coral reef ecology. are environmentally. Deep ecology, environmental philosophy and social movement based in the. Deep ecologists often contrast their own position with what they refer to as the. Aug 29, 2017. A frequent question in invasion ecology is whether the traits of alien plant. However, in contrast to the extensive research on the role of plant.
__label__pos
0.679137
Recently Added Formulas in Chemistry Current Location  >  Formulas in Chemistry > Electrolytes > Definition of Electrolytes Definition of Electrolytes Electrolytes are the compounds which carry electric charge and present in the body fluids, tissues and cells. Body fluids contain various organic and inorganic compounds. The concentration of these compounds in body is balanced in such a way that body cells and tissues are having same environment. To maintain this balance, body has various regulatory mechanisms like osmotic balance, pH and ionic balance which help to keep constant solute concentration in body fluids. Importance of Electrolytes in body: It is essential to maintain the electrolyte concentration in our body for normal functioning of cells and tissues, muscle coordination, heart function, fluid absorption and excretion, and nerve function. If person undergoes surgery or remain ill for long period, body can not maintain the electrolyte concentration and that time it’s necessary to supply electrolytes externally to body. This therapy is called as replacement therapy. In this therapy, various electrolytes, carbohydrates, protein, amino acids and blood products are provided to patient as per their need. The concentration of various electrolytes in body compartments is different and shown in table. Inorganic ions Extra cellulars electrolytes mEq/L Intracellular electrolytes mEq/L Plasma mEq/L Cations Sodium Potassium Calcium Magnesium 142 4 2.4 1.2 10 140 0.0001 58 135-145 4.5-5.5 2.1-2.6 1.5-3.0 Anions Chloride Sulphate Bicarbonate Phosphate 103 1 28 4 4 2 10 75 98-105 0.3-1.5 25-31 1.2-3.0 Function of Electrolytes in body; To maintain acid-base balance in body To control osmosis of water between body compartments For transmission of nerve impulses For contraction of muscles For secretion of hormones and neurotransmitters To generate action potential and graded potentials Web-Formulas.com © 2023 | Contact us | Terms of Use | Privacy Policy | Yellow Sparks Network Web Formulas
__label__pos
0.971907
--- a/plugin.video.ccctv/default.py +++ b/plugin.video.ccctv/default.py @@ -16,6 +16,15 @@ def show_sites(site): content = getUrl(urllib.unquote(SITE + "/browse/" + site)) + indexpages = re.compile('<a href="(index[0-9_]*\.html)">&nbsp;[0-9]+&nbsp;</a>', re.DOTALL).findall(content) + if len(indexpages) > 1: + content = '' + seen = {} + for ip in indexpages: + if ip in seen: + continue + content += getUrl(urllib.unquote(SITE + "/browse/" + site + "/" + ip)) + seen[ip] = True match = re.compile('<div class="thumbnail">(.+?)<div class="icons">',re.DOTALL).findall(content) for m in match: cat = re.compile('<img src="(.+?)".+?title="(.+?)".+?href="(.+?)"',re.DOTALL).findall(m) @@ -66,4 +75,4 @@ # new start ok = show_root_menu() else: - ok = show_sites(site)+ ok = show_sites(site)
__label__pos
0.923015
[FFmpeg-trac] #1913(avcodec:new): Why file fails to open when saving frames from one file to other without any encoding/decoding? FFmpeg trac at avcodec.org Tue Nov 13 09:16:46 CET 2012 #1913: Why file fails to open when saving frames from one file to other without any encoding/decoding? -----------------------------------+--------------------------------------- Reporter: theateist | Type: defect Status: new | Priority: important Component: avcodec | Version: unspecified Keywords: | Blocked By: Blocking: | Reproduced by developer: 1 Analyzed by developer: 1 | -----------------------------------+--------------------------------------- I started learning ffmpeg and for practice I use the following code to just save all frames from inFileName to outFileName. At first sight it success but the file fails to open with WindowsMediaPlayer. VLC Player opens it but I see strange colorful stripes at the bottom. In addition, the pix_fmt of inFileName is pal8 and of the outFileName is changed to bgr24, although I construct outFormatCtx the same as inFormatCtx. What is the problem and why I get different pix_fmt in out file? Thanks {{{ const char* inFileName = "C:\\FlickAnimation.avi"; const char* outFileName = "c:\\out.avi"; const char* outFileType = "avi"; av_register_all(); AVFormatContext* inFormatCtx = NULL; int err = avformat_open_input(&inFormatCtx, inFileName, NULL, NULL); if (err < 0) exit(1); err = av_find_stream_info(inFormatCtx); if (err < 0) exit(1); // Find video stream int videoStreamIndex = -1; for (unsigned int i = 0; i < inFormatCtx->nb_streams; ++i) { if (inFormatCtx->streams[i] && inFormatCtx->streams[i]->codec && inFormatCtx->streams[i]->codec->codec_type == AVMEDIA_TYPE_VIDEO) { videoStreamIndex = i; break; } } if (videoStreamIndex == -1) exit(1); AVOutputFormat* outFormat = av_guess_format(outFileType, NULL, NULL); if (!outFormat) exit(1); AVFormatContext* outFormatCtx = NULL; err = avformat_alloc_output_context2(&outFormatCtx, outFormat, NULL, NULL); if (err < 0 || !outFormatCtx) exit(1); err = avio_open(&outFormatCtx->pb, outFileName, AVIO_FLAG_WRITE); if (err < 0) exit(1); // Create and initiate output stream AVStream* outStream = av_new_stream(outFormatCtx, 0); AVStream const* const inStream = inFormatCtx->streams[videoStreamIndex]; AVCodec* codec = NULL; avcodec_get_context_defaults3(outStream->codec, inStream->codec->codec); outStream->codec->coder_type = AVMEDIA_TYPE_VIDEO; outStream->codec->sample_aspect_ratio = outStream->sample_aspect_ratio = inStream->sample_aspect_ratio; outStream->disposition = inStream->disposition; outStream->codec->bits_per_raw_sample = inStream->codec->bits_per_raw_sample; outStream->codec->chroma_sample_location = inStream->codec->chroma_sample_location; outStream->codec->codec_id = inStream->codec->codec_id; outStream->codec->codec_type = inStream->codec->codec_type; outStream->codec->bit_rate = inStream->codec->bit_rate; outStream->codec->rc_max_rate = inStream->codec->rc_max_rate; outStream->codec->rc_buffer_size = inStream->codec->rc_buffer_size; if (!outStream->codec->codec_tag) { if (! outFormatCtx->oformat->codec_tag || av_codec_get_id (outFormatCtx->oformat->codec_tag, inStream->codec->codec_tag) == outStream->codec->codec_id || av_codec_get_tag(outFormatCtx->oformat->codec_tag, inStream->codec->codec_id) <= 0) outStream->codec->codec_tag = inStream->codec->codec_tag; } size_t extra_size_alloc = (inStream->codec->extradata_size > 0) ? (inStream->codec->extradata_size + FF_INPUT_BUFFER_PADDING_SIZE) : 0; if (extra_size_alloc) { outStream->codec->extradata = (uint8_t*)av_malloc(extra_size_alloc); memcpy(outStream->codec->extradata, inStream->codec->extradata, inStream->codec->extradata_size); } outStream->codec->extradata_size = inStream->codec->extradata_size; AVRational input_time_base = inStream->time_base; AVRational frameRate; frameRate.num = inStream->r_frame_rate.num; frameRate.den = inStream->r_frame_rate.den; outStream->r_frame_rate = frameRate; outStream->codec->time_base = inStream->codec->time_base; outStream->codec->pix_fmt = inStream->codec->pix_fmt; outStream->codec->width = inStream->codec->width; outStream->codec->height = inStream->codec->height; outStream->codec->has_b_frames = inStream->codec->has_b_frames; if (!outStream->codec->sample_aspect_ratio.num) { AVRational r0 = {0, 1}; outStream->codec->sample_aspect_ratio = outStream->sample_aspect_ratio = inStream->sample_aspect_ratio.num ? inStream->sample_aspect_ratio : inStream->codec->sample_aspect_ratio.num ? inStream->codec->sample_aspect_ratio : r0; } avformat_write_header(outFormatCtx, NULL); AVPacket packet; while(av_read_frame(inFormatCtx, &packet)>=0) { if (packet.stream_index == videoStreamIndex) { err = av_interleaved_write_frame(outFormatCtx, &packet); if (err < 0) exit(1); } av_free_packet(&packet); } av_write_trailer(outFormatCtx); avio_close(outFormatCtx->pb); avformat_free_context(outFormatCtx); av_close_input_file(inFormatCtx); }}} d -- Ticket URL: <https://ffmpeg.org/trac/ffmpeg/ticket/1913> FFmpeg <http://ffmpeg.org> FFmpeg issue tracker More information about the FFmpeg-trac mailing list
__label__pos
0.997332
Love Fruit Podcast Episode 9 – Interview with Ellen Livingston “Then in 2002, I learned of a natural, uncooked diet of fresh fruits and vegetables. After nearly 20 years of nutrition study, and as many years of suffering, the first book I read about a raw diet gave me the biggest “aha” moments of my life . . . I knew I had found some real answers, some core truths I was seeking. The very next day I adopted a raw vegan diet, and I have never turned back because I love the benefits so much.” – Ellen Livingston In this interview we speak to author, coach and speaker Ellen Livingston about her journey to a raw vegan diet. In particular she speaks about the importance of her spiritual journey and the connection between this and her health. Ellen runs retreats and communities focused around raw foods, yoga and a healthier way of life. She has been a key speaker at the Woodstock Fruit Festival since it’s inception. Check out this episode an our other episodes today. Share the message of health to the world!: How Many Calories On A Raw Vegan Diet? Share the message of health to the world!: Spoil Your Appetite With Fruit – Video With Dr Doug Graham Have you ever wondered why desert has to be served after a big meal? Why is our desire for food not completely satisfied by our meal? Dr Doug Graham speaks about this concept in this video. Generally, people do not eat enough volume or enough simple carbohydrate to truly spoil their appetite…leaving them snacking all day long or eating sweets after every meal. This is because we are designed for consuming fruit. A larger volume of food and a food full of instant fuel from the sugars that are in fruit. To truly feel a sense of satisfaction, learn to eat enough fruit! Share the message of health to the world!: Ted Carr On The Power Of The Mind Have you ever tried to make changes to your diet but it seems like some part of you is not co-operating? In this video Ted Carr is talking about how to understand how your mind and emotions work together. Once we understand that we can then use the power of the mind to make our health goals become a reality. Ted managed to use these strategies years ago to go on a fully raw diet and has never looked back. Last year, he founded his own event the Canada Fruitfest which was a tremendous success. He knows how to bring his dreams into reality. You can do it too! —————————————————————————————————- UK Fruitfest takes place from the 21st to the 28th of July 2019. The venue is Croft Farm Waterpark, Tewkesbury, Gloucestershire. Book now: http://www.fruitfest.co.uk/registration   Share the message of health to the world!: Jesse Bogdanovich’s Amazing Raw Food Healing Journey Jesse Bogdanovich came to UK Fruitfest in 2016. He shared with us his story of healing on a raw food diet. He made a truly amazing recovery and we are so glad he was at the festival to share his story with us. The raw vegan diet has the power to change your life. Some people recover their health, some people find new purpose in life, others fall in love with nature or fitness. It is a truly epic adventure. Once you are on the path you will never look back! #fruitarian #rawvegan #rawfood #ukfruitfest #fruitfest UK Fruitfest takes place from the 21st to the 28th of July 2019. The venue is Croft Farm Waterpark Tewkesbury, Gloucestershire. Book now: http://www.fruitfest.co.uk/registration Share the message of health to the world!: The Golden Age And The Fall Of Mankind – Video With Tony Wright Tony Wright joined us in 2016. He is the author of the books “Left In The Dark” and “Return To The Brain Of Eden” Tony is the unofficial world record holder for the most days and nights spent without sleep, which shows his dedication to try to unlock the secrets of the human brain. Could the move away from our natural diet of fruit have done more than just impacted the health of our body? Could it have affected the evolution of our brain? Has our brain devolved? Did we once have abilities and function that we only now get glimpses of? Read his books to learn more.   Share the message of health to the world!: Is Cooked Food Addictive? Is Cooked Food Addictive?   There is no doubt that one of the most controversial questions in the raw food world is whether cooked food is addictive or not. Most people who eat a 100% raw diet, or close to that, usually admit that they believe that cooked food (and even some raw foods) are addictive in the same way that other substances can be.  They talk openly about their struggles with giving up cooked food.  Many struggled for a long time before finally getting on a 100% raw path long term.  Often, they will not eat any cooked food as they know that it will lead them back to eating a lot of cooked food again. However, many other people laugh at the notion that cooked food is addictive.  They may counter that if bread is addictive then fruit is addictive too.  That we have a drive to eat and that their preference for keeping cooked food in their diet is nothing to do with addiction but instead it is a choice they are making. Of course, it is impossible to really assess this properly by just taking stories and personal experiences into account.  What does and examination of the research around this topic suggest? Let’s take a look in this article and see what conclusions we can come to.   What is the definition of Addicted?   So that we start off on the right foot.  Let’s be clear on what addiction actually means.  Here are some definitions: Dictionary.com, Oxford Dictionary physically and mentally dependent on a particular substance. Merriam Webster – having a compulsive physiological need for a habit forming substance (such as a drug) Wikipedia (American Society of Addiction Medicine, and Eric J. Nestler, MD, PhD* ) – Addiction is a brain disorder characterized by compulsive engagement in rewarding stimuli despite adverse consequences   We can also talk about addiction in an informal way.  A person can be “addicted” to going to the gym, or “addicted” to running but these are more informal ways of using the word not intended to actually suggest the person has a true addiction. So is food truly addictive like a drug or is it more likely that we simply love eating and are enthusiastic about anything we eat to the point of it looking like an addiction?   Can Food Be Addictive?   We commonly talk about people being addicted to food. We use words like “chocoholic”. Even in advertising we hear phrases like “once you pop, you just can’t stop”.  Let’s look further into this: Some researchers suggest that food is not addictive, the act of eating is addictive This article, VIEW HERE, suggests that food is NOT addictive: “Food is not addictive … but eating is: Gorging is psychological compulsion, say experts,” the Mail Online reports. The news follows an article in which scientists argue that – unlike drug addiction – there is little evidence that people become addicted to the substances in certain foods. Researchers argue that instead of thinking of certain types of food as addictive, it would be more useful to talk of a behavioural addiction to the process of eating and the “reward” associated with it.” It is clear that not all scientists agree with the notion that food is addictive.  But when we look further into this it seems like the evidence in favour of the idea of food addiction is overwhelming.   Some Of The Largest Reference Websites In The World Support The Theory Of Food Addiction: WebMD, Healthline, Wikipedia   WebMD on Food Addictions   Full article: https://www.webmd.com/mental-health/eating-disorders/binge-eating-disorder/mental-health-food-addiction#1 Researchers at Yale University’s Rudd Center for Food Science & Policy have developed a questionnaire to identify people with food addictions. Here’s a sample of questions that can help determine if you have a food addiction. Do these actions apply to you? Do you: • End up eating more than planned when you start eating certain foods • Keep eating certain foods even if you’re no longer hungry • Eat to the point of feeling ill • Worry about not eating certain types of foods or worry about cutting down on certain types of foods • When certain foods aren’t available, go out of your way to obtain them   The questionnaire also asks about the impact of your relationship with food on your personal life. Ask yourself if these situations apply to you: • You eat certain foods so often or in such large amounts that you start eating food instead of working, spending time with the family, or doing recreational activities. • You avoid professional or social situations where certain foods are available because of fear of overeating. • You have problems functioning effectively at your job or school because of food and eating.”   Healthline Full article: https://www.healthline.com/nutrition/how-to-overcome-food-addiction#section1   “The truth is… the effects of certain foods on the brain can lead to downright addiction. Food addiction is a very serious problem and one of the main reasons some people just can’t control themselves around certain foods, no matter how hard they try. What Is Food Addiction? Food addiction is, quite simply, being addicted to junk food in the same way as drug addicts are addicted to drugs. It involves the same areas in the brain, the same neurotransmitters and many of the symptoms are identical (1). Food addiction is a relatively new (and controversial) term and there are no good statistics available on how common it is. How This Works Processed junk foods have a powerful effect on the “reward” centers in the brain, involving brain neurotransmitters like dopamine (2). The foods that seem to be the most problematic include typical “junk foods,” as well as foods that contain either sugar or wheat, or both. Food addiction is not about a lack of willpower or anything like that, it is caused by the intense dopamine signal “hijacking” the biochemistry of the brain . There are many studies that support the fact that food addiction is a real problem.”   Addiction And Eating Disorder Sites   What do organisations involved in treating addiction have to say about food addiction?   Eating Disorder Hope.com   https://www.eatingdisorderhope.com/information/food-addiction   “However, for many individuals, food can become as addictive as drugs are to a substance abuser.” Food addiction can be recognizable by numerous signs and symptoms. The following are possible symptoms of food addiction:   1. Gorging in more food than one can physically tolerate 2. Eating to the point of feeling ill 3. Going out of your way to obtain certain foods 4. Continuing to eat certain foods even if no longer hungry 5. Eating in secret, isolation 6. Avoiding social interactions, relationships, or functions to spend time eating certain foods. 7. Difficulty function in a career or job due to decreased efficiency 8. Spending significant amount of money on buying certain foods for bingeing purposes 9. Decreased energy, chronic fatigue 10. Difficulty concentrating 11. Sleep disorders, such as insomnia or oversleeping 12. Restlessness 13. Irritability 14. Headaches 15. Digestive disorders 16. Suicidal ideations UKAT – UK Addiction Treatment Centres Food Addiction   Binge eating disorder is a medically recognised disorder that is characterised by excessive eating over long periods of time. A person who suffers from the disorder will typically demonstrate the following symptoms:   1. Compulsions to eat when not physically hungry 2. Routinely eating past the point of feeling full 3. Routinely eating more quickly than others 4. A tendency to try and keep eating habits a secret 5. Feelings of guilt after eating episodes 6. Persistent feelings that one is abnormal 7. Persistent feelings that food is taking over one’s life 8. Routinely attempting to compensate for overeating through dieting or purging.   There is no doubt that food addiction is a serious problem that can lead to physical and mental issues. Not treating the addiction only makes matters worse. A person who is struggling with food to any extent, whether through bingeing or compulsive eating, needs to seek out treatment right away.   How Food Addiction Is Treated   Although food addiction, as exemplified by conditions such as binge eating syndrome and compulsive eating, does share many similarities with other kinds of addictions, it has one characteristic that makes it unique: human beings cannot live without food. We can live without drugs, alcohol, gambling, sex, and so many other things; stop eating and you will die of starvation. Therefore, abstinence is not a cure.   The goal of food addiction treatment is to identify what causes compulsive thoughts and behaviours so that these can be managed. Some of the more common triggers of food addiction are: • underlying emotional stress • poor self-image • more and stronger cravings for food • a need for comfort that only food can provide • an inability to say no to food when entertaining or being entertained.     Articles In The Media   The Guardian- Food Addiction: Does It Really Exist?   https://www.theguardian.com/lifeandstyle/wordofmouth/2013/aug/20/food-addiction-exist-fat-sugar Rats can’t resist junk food About a decade ago, a group of American psychiatrists studying obesity decided to look into whether some people’s anecdotal claims of food addiction could be proven. They devised a series of studies in which rats were offered highly palatable sugary or fatty food (they had the option of their regular healthy food, too, but that didn’t get a look-in). Nicole Avena was one of the researchers: “We found signs of tolerance, withdrawal, craving and measurable changes in neural chemicals such as dopamine and opioid release,” she says. In short, it looked very much as though the animals were addicted to a drug, even tolerating “foot shock” (running over an electric grid) to get their fix.   There have been surveys on the foods people say they find addictive. Many of the human studies into food addiction have been based around the Yale Food Addiction Scale, a questionnaire used to determine whether someone could be classified as a food addict. One of its questions is about which foods the subject finds most problematic, and Ashley Gearhardt, the co-creator of the scale, has shared the top 10 nasties. Top 10 Most Addictive Foods   From 10 to 1 in a survey these were found to the foods people perceived as most addictive:  – White Bread, Donuts, Pasta, Cake, Cookies, Chocolate, French Fries, Candy, Ice Cream Notice that all of these foods are cooked or processed foods.  Most have either additional sugar, salt or oil making these foods highly palatable.    What constitutes addiction anyway?   “This is a subject of ongoing debate. Avena and colleagues used the diagnosis criteria in the standard American guide for psychiatrists, The Diagnostic and Statistical Manual of Mental Disorders. This stipulates that three of the following must have applied to an individual over the past year to qualify them as addicts:   • Tolerance • Withdrawal • The substance is often taken in larger amounts than intended. • A persistent desire or unsuccessful efforts to cut down substance use. • A great deal of time is spent in activities necessary to obtain the substance. • Important activities are given up or reduced because of substance use. • Substance use is continued despite knowledge of having a persistent or recurrent physical or psychological problem that is likely to have been caused or exacerbated by the substance.”   The Extraordinary Science Of Addictive Eating – New York Times   This article talks more about the things that food companies are doing to make foods more addictive to consumers.  This is includes creating flavours that hit the ideal “bliss point” but without being so focused on one flavour that the brain is triggered to stop eating. Moskowitz’s path to mastering the bliss point began in earnest not at Harvard but a few months after graduation, 16 miles from Cambridge, in the town of Natick, where the U.S. Army hired him to work in its research labs.  The military has long been in a peculiar bind when it comes to food: how to get soldiers to eat more rations when they are in the field. They know that over time, soldiers would gradually find their meals-ready-to-eat so boring that they would toss them away, half-eaten, and not get all the calories they needed. But what was causing this M.R.E.-fatigue was a mystery. “So I started asking soldiers how frequently they would like to eat this or that, trying to figure out which products they would find boring,” Moskowitz said. The answers he got were inconsistent. “They liked flavorful foods like turkey tetrazzini, but only at first; they quickly grew tired of them. On the other hand, mundane foods like white bread would never get them too excited, but they could eat lots and lots of it without feeling they’d had enough.”   This contradiction is known as “sensory-specific satiety.” In lay terms, it is the tendency for big, distinct flavors to overwhelm the brain, which responds by depressing your desire to have more. Sensory-specific satiety also became a guiding principle for the processed-food industry. The biggest hits — be they Coca-Cola or Doritos — owe their success to complex formulas that pique the taste buds enough to be alluring but don’t have a distinct, overriding single flavor that tells the brain to stop eating.   Wikipedia- Article: FOOD ADDICTION   As we have seen, Wikipedia can often be innacurate with it’s information or biased.  We always must use it as just one source and not the be all and end all.  The sources used in this article seem to be very strong which is why we share it here:   “Food addiction” refers to compulsive overeaters who engage in frequent episodes of uncontrolled eating (binge eating). The term binge eating means eating an unhealthy amount of food while feeling that one’s sense of control has been lost.[8] People who engage in binge eating may feel frenzied, and consume a large number of calories before stopping. Food binges may be followed by feelings of guilt and depression;[9] for example, some will cancel their plans for the next day because they “feel fat.” Binge eating also has implications on physical health, due to excessive intake of fats and sugars, which can cause numerous health problems. Can Fruits And Vegetables Be Addictive?   It appears that we are pulling together evidence to show that food can be addictive.  When we look closer into that we see that the foods that are found to be addictive are exclusively processed and cooked foods.  But are fruits and vegetables also addictive? Researchers at the University of Michigan studied addictive-like eating in 518 participants . They used the Yale Food Addiction Scale (YFAS) as a reference. This is the most commonly used tool to assess food addiction. All participants got a list of 35 foods, both processed and unprocessed. They rated how likely they were to experience problems with each of the 35 foods, on a scale from 1 (not at all addictive) to 7 (extremely addictive). In this study, 7–10% of participants were diagnosed with full-blown food addiction. What’s more, 92% of participants had addictive-like eating behavior towards some foods. They repeatedly had the desire to quit eating them, but were unable to. Below, you’ll see the results about which foods were the most and least addictive.   18 most addictive foods and 17 least addictive   Pizza (4.01) , Chocolate (3.73), Chips (3.73), Cookies (3.71), Ice cream (3.68), French fries (3.60), Cheeseburgers (3.51), Soda (not diet) (3.29), Cake (3.26), Cheese (3.22), Bacon (3.03), Fried chicken (2.97), Rolls (plain) (2.73), Popcorn (buttered) (2.64), Breakfast cereal (2.59), Gummy candy (2.57), Steak (2.54), Muffins (2.50) Once again we see a strong showing for cooked and processed foods.  Animal products are among the most addictive also.  However, we see no sign of fruit or vegetables in the most addictive group.   17 Least Addictive   Cucumbers (1.53), Carrots (1.60), Beans (no sauce) (1.63), Apples (1.66), Brown rice (1.74), Broccoli (1.74), Bananas (1.77) Salmon (1.84), Corn (no butter or salt) (1.87), Strawberries (1.88), Granola bar (1.93), Water (1.94), Crackers (plain) (2.07) Pretzels (2.13), Chicken breast (2.16), Eggs (2.18), Nuts (2.47) We see clearly that the raw fruits and vegetables are all in the top 10 least addictive foods.  The results here are a little confusing however.  Water, for example, is showing as more addictive than crackers or pretzels!  Some whole foods that are usually cooked are showing in the top 10 least addictive also.  Salmon is showing as less addictive than Strawberries! Broadly, the pattern we see here is that the raw fruits and vegetables are among the least addictive foods.  Of the most addictive foods, cooked and processed foods make up the entire list.   The Opinions Of Vegan Doctors   Many vegans and raw vegans respect the advice of some of the well known vegan doctors. Whether these doctors can be truly said to be experts in nutrition is debatable but their opinion is influential in vegan circles.  What do they have to say?   Dr Joel Kahn   Dr Joel Kahn is a cardiologist from the USA.  Known as “America’s Healthy Heart Doc” he has been treating patients with a plant based diet for many years.  In this article he wrote about animal products, sugar and fat as being addictive but also believe that wheat and rice have addictive properties: 6 Foods That Behave Like Addictive Drugs In Your Body https://www.mindbodygreen.com/0-14423/6-foods-that-behave-like-addictive-drugs-in-your-body.html Dairy– No food group has been studied more for opioid activity than dairy, particularly milk and cheese. The protein in dairy, casein, is digested into smaller peptides and there are a family of active agents called casomorphins. The desire for cheese can be blocked by the same medicines used to reverse drug overdoses in emergency rooms! Meat- The blood in meat contains albumin, hemoglobin and gamma globulin and all of these chemicals activate opioid receptors. When meat eaters were treated with a drug used to block opiate receptors, ham consumption fell by 10%, salami by 25% and tuna by 50%! Wheat and rice– Gliadin is a protein in wheat that has opiate activity and is sometimes referred to as gliadorphin. There is also a protein in rice that produces similar effects. If you can’t stop reaching for the bread bowl, it’s most likely because of this feel-good chemical trap. Sugar and fat- Headlines worldwide last fall reported on a study in rats showing a preference for Oreo cookies, used for their high sugar and fat content, that was similar to providing the rats cocaine and morphine. Actually, prior studies in humans had already shown the opioid like effects of mixing sugar and fat (think: donut) that could be reversed with narcotic blockers.   Dr Michael Greger (NutritionFacts.org)   Many vegans look to Dr Michael Greger as the font of all wisdom when it comes to what is healthy to eat.  In a number of articles he has confronted the idea of food addiction:  https://nutritionfacts.org/video/are-sugary-foods-addictive/ “Evidence from PET scans suggests brain activity changes from the overconsumption of sugar may parallel that of drug addiction. Diminished “pleasure center” dopamine pathway sensitivity in obese individuals may be analogous to that found in cocaine addicts and alcoholics.” Circuits In Human Obesity and Addiction “A reduction in dopamine receptors is associated with addictive behaviour irrespective of whether it is due to food or to addictive drugs. Dopamine is the neurotransmitter primarily involved in the pleasure and reward centre in our brain helping to motivate our drive for things like food, water and sex. It was healthy and adaptive for our primate brains to drive us to eat that banana when there wasn’t much food around but now (with modern processed foods) this adaptation has become a dangerous liability.” Can One Become A Sugar Addict? https://nutritionfacts.org/2014/10/23/can-one-become-a-sugar-addict/ Are Fatty Foods Addictive? “People who regularly eat ice cream—sugar and fat—have a deadened dopamine response in their brains to drinking a milkshake. It’s like when drug abusers have to use more and more to get the same high. “Frequent [ice cream] consumption…is related to a reduction in reward-region responsivity in humans”—they’re talking about the pleasure center—”paralleling the tolerance observed in drug addiction.” Once we’ve so dulled our dopamine response, we may subsequently overeat “in an effort to achieve the degree of satisfaction experienced previously, which contributes to unhealthy weight gain.” Consumption of a calorie-dense diet compared to the same number calories in a calorie-dilute diet leads to that numbing of the dopamine response. It’s like the difference between cocaine and crack. Same stuff chemically, but by smoking crack cocaine, we can deliver a higher dose quicker to our brain. Rather than taking drugs, though, we can prevent the deadening of our pleasure center in the first place by sticking to foods that are naturally calorically dilute—like whole plant foods. This can help bring back our dopamine sensitivity, such that we can again derive the same pleasure from the simplest of foods. Dr Neal Barnard   Dr Neal Barnard is known for his work with the Physician’s Committee for Responsible Medicine and also his book on reversing diabetes with a plant based diet.  He has written a book on addictive foods: Breaking The Food Seduction In this book he claims that sugar, chocolate, meat and cheese release opiates in the brain.  You can view a presenation on this below: PCRM addictive foods Sugar, chocolate, and meat trigger the release of opiates within the brain. Researchers have proven that foods have opiate effects by using an opiate-blocking medicine called naloxone. Cheese produces mild opiates called casomorphins, as it digests. These drug-like effects of foods help explain why we get “hooked” on some foods and not others. Certain good habits help us reduce the lure of “addicting” foods. Having a healthy breakfast, getting plenty of sleep, physical exercise, and other steps can really help. https://www.pcrm.org/health/healthcare-professionals/nutritioncurriculum/nutrition-curriculum-session-8-addictive-foods From these examples, we can see that these respected vegan physicians believe that food addiction is a real issue.  They suggest sticking to whole foods which are less addictive.  Obviously, fruits and vegetables are a part of that.  Joel Kahn goes a step forward and offers evidence to show that even cooked whole foods like wheat and rice can be addictive. Conclusions 1. The science tends to suggest that Food Addiction is a real concern 2. The consumption of certain foods can trigger the brain’s reward centres in an unhealthy way leading to an addiction to that food. 3. The most addictive foods tend to be processed and cooked foods, often with the addition of salt, sugar and oil 4. Fruits and vegetables tend to be rated among the least addictive foods.   The Symptoms Of Food Addiction   Though the science on which foods are addictive is not fully settled we can look at our own behaviour to see if we have the symptoms of food addiction. If you have experienced any of the following symptoms you may have a food addiction: 1. End up eating more than planned when you start eating certain foods 2. Keep eating certain foods even if you’re no longer hungry or eat to the point of feeling ill 3. When certain foods aren’t available, go out of your way to obtain them 4. You eat certain foods so often or in such large amounts that you start eating food instead of working, spending time with the family, or doing recreational activities. 5. You avoid professional or social situations where certain foods are available because of fear of overeating. 6. You have problems functioning effectively at your job or school because of food and eating. 7. Routinely eating more quickly than others 8. A tendency to try and keep eating habits a secret 9. Feelings of guilt after eating episodes 10. Routinely attempting to compensate for overeating through dieting or purging. 11. When you give in and start eating a food you were craving, you often find yourself eating much more than you intended to. 12. You sometimes make excuses in your head about why you should eat something that you are craving   Share the message of health to the world!: Fruitarian Anne Osborne Featured In UK’s Biggest Newspaper “The Sun” Fruitarian Anne Osborne Featured In UK’s Biggest Newspaper “The Sun”   The article, titled:  Mum who has only eaten FRUIT for the last 27 years claims she never gets hungry – and even brought her children up on the same raw diet Can be read in full here: https://www.thesun.co.uk/fabulous/food/7569677/mum-only-eaten-fruit-27-years-children-same-diet/ Recently, a journalist approached us to ask to speak to a Fruitarian.  We said “you want someone who ONLY eat’s fruit?” They said “yes!” The best person we could think of was Anne Osborne. Anne has been a speaker at the UK Fruitfest for the last 5 years and works full time for the Woodstock Fruit Festival.  She authored the book “Fruitarianism: The Path to Paradise” and has spoken at many festivals and events around the world on her Fruitarian path. She has also brought up two children on a fruit diet who showed no signs of poor health as a result. Here is a clip of Anne Speaking at the UK Fruitfest (you can find more clips at our youtube channel):       Share the message of health to the world!: Of fruits and frugivores: How fruits colour themselves to attract animals The Hindu has published an article showing the connection between how colourful fruits are in an area and the visual capacity of the frugivores consuming that fruit. The article is here: https://www.thehindu.com/sci-tech/science/of-fruits-and-frugivores-how-fruits-colour-themselves-to-attract-animals/article25096833.ece It start’s off: “The colour of the fruit depends primarily on the visual capacity of the local seed dispersing animals Ever wondered why certain fruits are red and some green? Well, you are not alone. This question has puzzled scientists for many years and now a team of researchers from Germany, Canada and Madagascar have a simple answer — to attract animals. The colour of the fruit depends primarily on the visual capacity of the local seed dispersing animals.” This research points towards a fact that we already know.  Our colour vision is related to our history of eating fruit.  Human’s primarily locate our food visually.  This is why we would be terrible carnivores or omnivores.  Animals have no desire to be eaten and hide and camouflage themselves in the jungle.  Hunting is a difficult process for humans as we are not equipped for it in any way. Fruit on the other hands wants to be eaten and therefore stands out to those animals it wants to be eaten by.  As we scan a forest area with our eyesight we can immediately pick out the different hues of flowers, berries and other fruits.  They are easy to find. Have you ever went foraging for fruit?  It is almost like an unused muscle in your brain switches on and goes into overdrive.  The quickness and speed of the eyes and out ability to calculate the location, quality, size and ripeness of particular fruits is quite exceptional. The ease with which we can shake a tree to get the fruits to fall or simply reach up and climb the tree to pick the fruits off is obvious.  It shows that we are perfectly suited to find and collect fruit.  When we add this to the design of our digestive system and how easily we digest fruits it is hard to argue that we are not matched most closely with a classification of frugivore. Imagine trying to find those fruits without colour vision.  It would be almost impossible.  Or how about trying to pick them and eat them without hands to open them?  Also very difficult, and virtually impossible. The article finishes, with an interesting point: “The researchers also found that in both Uganda and Madagascar, fruit species that rely on bird seed dispersal tend to be redder while those which specialise on primate seed dispersal are greener. “This may be explained by the fact that primates possess an excellent sense of smell and their heavier reliance on fruit scent means that, on an average, fruits need to invest less in visual signals,” explains Dr. Omer Nevo, a post-doctoral researcher at the University of Ulm, Germany, and one of the authors of the paper.” Certainly, it would be easy for us to find a Durian in the trees through smell alone, bananas also have a strong smell when ripening. Feel free to share this article or comment below with your thoughts. Share the message of health to the world!: Most Controversial Raw Food Debate Of All Time Most Controversial Raw Food Debate Of All Time This video was filmed at a Raw Food Culinary Showcase which took place in Jamaica around about the year 2000. It shows very clearly the different ideas that have been promoted in the raw food world over the last few decades.  Some of the opinions given are quite clearly anti-fruit.  Also, very small amounts of fruit are recommended in some of the comments. You can watch this yourself and make up your own mind as to who you think is most believable. I have only ever attended Fruit festivals and have almost never seen this anti- fruit message being promoted. However, I know that this was once a big part of the raw food movement. The truth is, if you give up on fruit you are going to struggle to maintain a raw diet.  There is simply no better staple for a raw diet (or for that matter any person’s diet) than to eat sweet fruit. Join us at the Fruitfest this year to learn more about thriving long term on a fruit based raw vegan diet. Share the message of health to the world!:
__label__pos
0.565066
CSE385 Course CSE385 Title Analysis of Algorithms: Honors Credits 4 Course Coordinator Michael Bender Description Algorithmic design and analysis for Computer Science Honors students.  Mathematical analysis of a variety of computer algorithms including searching, sorting, matrix multiplication, fast Fourier transform, and graph algorithms. Time and space complexity. Upper-bound, lower-bound, and average-case analysis. Randomization.  Introduction to NP completeness. Some machine computation is required for the implementation and comparison of algorithms.  Bulletin Link Prerequisite CSE 150 or CSE 215 or MAT 200 or MAT 250; AMS 210 or MAT 211; CSE 214 or CSE 260; Computer Science Honors Program or the Honors College or the WISE Honors Program or University Scholars. Course Outcomes 1. Ability to perform worst-case asymptotic algorithms analysis. 2. Ability to define and use classical combinatorial algorithms for problems such as sorting, shortest paths and minimum spanning trees. 3. Understanding of algorithmic techniques such as divide-and-conquer and dynamic programming.  4. Understanding of computational intractability and NP completeness. 5. Ability to apply data structure and algorithmic techniques to design computationally-efficient solutions. Textbook None Major Topics Covered in Course • Asymptotic notation • RAM and other computational models • Divide and Conquer (Merge Sort, Exponentiation, Matrix Multiplication, Strassens Algorithm, Median Finding, Master Method, Median Finding, Closest Pair Problem) • Dynamic Programming (Edit Distance, Knapsack Problem, Space-Efficient Edit Distance, Shortest-path In DAGs and Applications) • Introduction to Graphs (Directed and Undirected Graphs, Depth First Search and Breadth First Search, Topological Sort, Shortest Path Algorithms) • Minimum Spanning Trees (Prims, Kruskalls, Boruvkas) • Big Data Algorithms, External-Memory Algorithms, and Cache-Oblivious Algorithms • Randomized Algorithms and Data Structures (Karp-rabin String Matching, Skip Lists, Search Trees, Hashing) • NP Completeness and Reductions Laboratory N/A Course Webpage CSE385
__label__pos
0.717991
Fitness Tips It is almost the end of the year. If one of your new year’s resolutions is physical fitness, I have a few tips that can help. 1) Focus on positive thinking. When you can keep up with your physical fitness plan, you should congratulate yourself every time. It is not easy to keep up with fitness plan. You really need to have a strong will. Be proud of yourself. 2) When you fall back from your fitness schedule, you should not berate yourself. Some people are too hard on themselves, and they never start over again. Your physical fitness New Year’s resolutions are the promise to yourself. They are not the test of your willpower. 3) You should stay away from unhealthy temptation as much as possible. If you are on the diet, you do not want to keep a huge bucket of ice cream in your refrigerator. It can only make your life harder. 4) Be realistic. Some people expect to achieve physical fitness over night. They make fitness plans that are impossible to keep. Realistic physical fitness plan must fit into your lifestyle. You must ask yourself, “Can I really go out for a run every evening?” If the answer is “No”, you may want to rethink your new year’s resolutions. If you know that you can not do them every evening, you may be able to do them twice a week. 5) Try to keep your resolutions with a friend. You can help encourage each other. A good friend will make your fitness resolutions fun. Türkiye'nin en güvenilir bahis sitesi bets10 telegram bets10 sorunsuz giriş bets10 betsonm giriş bets10 hızlı para yatır ve kazan tıkla anlık giriş yap best10 Posted in fitness | Tagged , , , , , , , , , , , , , , , | Comments Off Article Marketing Tips for Newbies: 3 Simple Keys to Remember When Writing Your Article When you decide to use Article Marketing in promoting your affiliate products, you will need this Article Marketing tips for newbies as writing article can be very daunting for some people as it is all about writing about something, and me in particular as I have never written an article before. But if you are serious about Internet Marketing, this is one task that you need to be skilled at since you will be writing about the products you want to promote and you will have control on the content. Writing articles is the most consuming part in Internet Marketing and it can take you hours to write a single article. It should only be at the beginning, believe me, but once you get the hang of it, you can write about 5 articles in one sitting. Although you might want to start writing about something that you are interested in or something you know about so it wouldn’t be as hard when you’re starting. So, hopefully these article marketing tips for newbies will help you to get started in your first article and when you write your article the process can be broken down into these 3 simple keys to remember: 1. Keyword Phrases. Keyword phrases or a keyphrase is a very important part of your article as this will determine your chances of getting listed on the top pages of the search engines like Google, Yahoo, or MSN. Paying attention to your keyphrases is the one of the most important article marketing tips for newbies. Keywords are the actual words that people type into search engines when they are looking for something online. And Keyword phrases are actually the long tail keywords that your article will focus on when you started writing. 2. Article Layout. One of the article marketing tips for newbies that some people miss when they started writing is having an article layout. It is important to layout your article in paragraphs that identifies the topic you wish to discuss and it serves as your guide as well so you don’t get out of focus. Let’s say for example you are writing about Online Dating. Your format would be like this: a. What is Online Dating? b. Benefits of online dating c. How will online dating help you d. What are your personal thoughts on dating online e. Lastly, how you will join online dating 3. Keyword Density Another article marketing tip for newbies is knowing your keyword density. Keyword Density refers to the number of times a specific keyphrase appears within the body of text and is represented as a percentage. Keeping your keyword density between 1-3% is optimal and you want to keep it at that otherwise the search engines may categorize your article as being keyword spam. To determine your keyword density, take the number of times your keyphrase appeared in your article, then divide that by the total number of words your article has, finally multiply it by 100 (%) to get the percentage unit. And there you have it. Some article marketing tips for newbies to take into consideration before you start writing your articles. Take note of that and see how your article climbs up the search engine results pages. Posted in marketing | Tagged , , , , , , , , , , , , , , , , , , | Comments Off Video Streaming Protocols Introduction: Video surveillance systems currently are undergoing a transition where more and more traditional analog solutions are being replaced by digital solutions. Compared with an analog video surveillance system, a digital video surveillance offers much better flexibility in video content processing or data transmission. At the same time, it, also, have ability to implement advanced features such as motion detection, facial recognition and object tracking. Applying digital systems, makes the security system capable of transmitting video through the Internet, so we need to study the different methods of video streaming over the network. Streaming is the process of playing a file while it is still downloading. Streaming video is a sequence of “moving images” that are sent in compressed form in a way that it can start being proceed before it is completely received like video clips on a Web page. Here, some of the network protocols used in video streaming are described. The focus is on the features of most important protocols in video surveillance including TCP, UDP and RTSP. Protocols in streaming technology: Protocols are the rules implemented for a particular technology, which in streaming technology are used to carry message packets, and communication takes place only through them. Some of the protocols used in streaming technology are described as follows: SDP: SDP, standing for Session Description Protocol, used to describe multimedia sessions in a format understood by the participants over a network. The purpose of SDP is to convey information about media streams in multimedia sessions to help participants join or gather information of a particular session. In fact, SDP conveys information such as session name and purpose, times the session is active, codec format, media in the session, Information to receive those media (addresses, ports, formats and so on). A participant checks these information and takes the decision about joining a session. SDP is aimed primarily for using in large WANs (Wide-Area Network) including the internet. However, SDP can also be utilized in proprietary LANs (Local Area Networks) and MANs (Metropolitan Area Networks). DHCP: Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign a dynamic IP address to each device that connected to the network. By this assigning, a new device can be added to a network without the bother of manually assigning it a unique IP address. The introduction of DHCP eased the problems associated with manually assigning TCP/IP client addresses, resulting in flexibility and ease-of-use to network administrators. DHCP is not a secure protocol, since no mechanism is built to allow clients and servers to authenticate each other. Both are vulnerable to deception, as one computer can pretend to be another. RTP: Real-Time Transport Protocol (RTP) is an internet protocol standard to manage the real-time transmission of multimedia data over unicast or multicast network services. In other words, RTP defines a standard packet format to deliver real-time audio and video over IP networks. RTP does not guarantee real-time delivery of data, but it provides mechanisms for the sending and receiving applications to support streaming data. It is utilized in conjunction with Real-Time Transport Control Protocol (RTCP) to ensure that monitor data delivery for large multicast networks is provided and Quality of Service (QOS) can be maintained. Monitoring is used to detect any packet loss and to compensate any delay jitter. RTP is used extensively in communication and applications which involve streaming media such as telephony or video teleconference applications. The recent application of RTP is the introduction of VoIP (Voice over Internet Protocol) systems which are becoming very popular as alternatives to regular telephony circuits. RTCP: Real-Time Control Protocol (RTCP) is the control protocol that works in conjunction with RTP to monitor data delivery on large multicast network. Providing feedback on the quality of service being provided by RTP, is the RTCP’s primary function. RTCP control packets are periodically transmitted by each participant in an RTP session to all other participants. It is important to point out that RTCP carries statistical and control data, while RTP delivers the data. RTCP statistics contain sender or receiver reports such as the number of bytes sent, packets sent, lost packets and round trip delay between endpoints. RTCP provides a way to correlate and synchronize different media streams that have come from the same sender. RTSP: The main protocol in streaming is Real Time Streaming Protocol (RTSP), which used to transmit stored or live media data over the IP network. It provides client controls for random access to the stream content. This application layer protocol is used to establish and control either a single or several time-synchronized streams of continuous media such as video and audio. RTSP servers use the Transport RTP in conjunction with RTCP, so that RTP acts as the transport protocol and RTCP will be applied for QOS (Quality of Service) analysis and also synchronization between video and audio streams. Consequently, RTSP can both control and deliver real-time content. The RTP and RTCP are independent of the underlying transport and network layers. In fact, RTSP is considered more than a protocol and provides a simple set of basic commands to control the video stream. RSTP is based on the bandwidth available between the client and server so that breaks the large data into packet sized data. This, applied to live data feeds as well as stored. So, client software can play one packet, while decompressing the second packet and downloading the third media files. This enables the real-time file to be heard or viewed by the user immediately without downloading the entire media file and also without feeling a break between the data files. Some features of the Real Time Streaming Protocol are listed as follows: • RTSP is capable of presenting media streams from different multimedia servers. • Controlling and delivering real time media between a media server and large numbers of media clients are feasible by RTSP. • Firewall friendly: Both application and transport layer firewalls can be easily handled by means of protocol. • RTSP provides on-demand access of multimedia items such as stored real time audio/video files, live real-time feeds, or stored non real time items. • New parameters or methods can be easily added in the protocol, so it enables extension. • There is appropriate control on the server. The server cannot stream to clients in any way such that the client cannot stop the streaming. • Frame level accuracy makes protocol more suitable for media applications. • RTSP allows interoperability between client-server multimedia products from multiple vendors. HTTP: Hypertext Transfer Protocol (HTTP), as an application-level protocol, is the set of rules to transfer files (text, graphic images, sound, video, and other multimedia files) on the web, so servers exchange information by using these rules. HTTP uses a server-client model in which the Web browser is client. When a user opens this Web browser, an HTTP command will be sent to the Web server. The browser uses HTTP, which is carried over TCP/IP to communicate to the server and retrieve Web content for the user. It is worth mentioning that, HTTP is used for distributed, collaborative, hypermedia information system in addition to the context of World Wide Web. RTMP: The Real Time Messaging Protocol (RTMP) is used to transfer audio, video, and meta-data across a network. In fact, it is a system to deliver on-demand and live media to Adobe Flash applications which was developed by Adobe Systems. RTMP is a TCP-based protocol which maintains persistent connections and allows low latency communication. Splitting streams into fragments leads to delivering streams smoothly while transmitting much information. RTMP supports video in MP4 and FLV and audio in AAC and MP3. Some advantages of RTMP include that it can do live streaming, allowing people to watch a video while it is being recorded. Also, it is capable of dynamic streaming, meaning that video quality adjusts automatically to bandwidth changes and seeking to later parts in a video is possible, which is particularly useful for longer videos. Players maintain the tiny buffer rather than downloading a video during playback, thus less bandwidth is used. RTMP streaming is able to skip forward to anywhere in a video at any point in time, so you can skip forward to what you want to see, without any unnecessary waiting. While with HTTP, only what is already in browser cache can be viewed. When RTMP is used as a protocol, host will need to have a dedicated server installed for RTMP. However, RTMP has several disadvantages: due to streaming data to the player, the bandwidth of the connection must be larger than the data rate of the video, so if the connection drops for a couple of seconds, the stream will stutter. Also, since it uses different protocols and ports with HTTP, it is vulnerable to being blocked by firewalls. The biggest drawback is that RTMP only works in Flash and not in HTML5. Hence, it may be replaced by other streaming protocols with wider support. TCP: Transmission Control Protocol (TCP) is a popular transport layer protocol which is connection-oriented and it supplies a reliable byte stream to the top layer, called as the application layer. TCP has a positive acknowledgments mechanism and also provides a mechanism for congestion avoidance to reduce the transmission rate when the network becomes overloaded. TCP guarantees that all packets arrive undamaged in the correct order, reordering out-of-order packets and/or asking a retransmit of lost packets. To ensure the reliable data delivery over the network, the TCP employs window based transmission mechanism where the sender maintains a buffer, called a sliding window, of sent data to the receiver. A receiver acknowledges received data by sending acknowledgement (ACK) packets. If a sender receives an ACK packet for the data in its window, it removes that data from the window, because it has been successfully transmitted to the receiver. TCP employs this mechanism for controlling of flow, so that a receiver can tell the sender, when it cannot process the data at the arriving rate. This mechanism also informs the sender that how much buffering space is available at the receiver’s end, in order to avoid overfilling of receiver’s buffer window. TCP is a time-tested transport layer protocol that provides several features like reliability, flow control and congestion control. TCP is also a robust protocol because it can adapt with different network conditions. The various function of TCP • Data transfer- The TCP can transfer a continuous stream of data among the users in the form of segments for transmission through the network. • Reliable delivery- The TCP must have the recovering ability from data that may be damaged, missed or may be duplicated over the network. This is done by assigning a sequence number to each segment being transmitted on the network and receiving a positive acknowledgment (ACK) on successful delivery. By using of sequence numbers, the receiver ends arrange segments in correct sequence, that may be received out of order and to avoid duplicate packets. In TCP, Damage is handled by adding a checksum to each segment which is being transferred, finally the checking is done at the receiver, and the damaged segments are then finally discarded. • Flow control- TCP provides a mechanism that helps the receiver to control the amount of data sent by the sender. • Connections- A Connection is combination of sockets, sequence numbers, and window sizes. Whenever the two processes want to communicate, their TCP’s has to first establish a connection. Once the communication is complete, the connection has to be terminated or closed. UDP: User Datagram Protocol (UDP) is a much simpler transport protocol. It is connectionless and provides simple capability to send datagrams between a pair of devices. It is not guaranteed for getting the data from one device to another, does not perform retries, and does not even aware if the target device has received the data successfully. UDP packets are not transmitted directly to the ‘true’ IP address of the receiving device, but are transmitted with a specific device allocated IP multicast address. The operation of UDP protocol is so simple. When the application layer invokes UDP, the following operations are performed by UDP: • Encapsulates the data of users into datagrams. • Forwards these datagrams to the IP layer for the transmission. On the other side, these datagrams are then forwarded to UDP from the IP layer. Then UDP removes the data from the datagram and forwards to the upper application layer. In UDP, a port is a number that specifies the application which is using the UDP service. It can be assumed as an address of the applications. There are various applications that use UDP as their transport protocol, like Routing information protocol, Simple network management protocol, Dynamic host configuration protocol etc. Traffic of voice and video over the network is generally transmitted by using UDP protocol. Comparison between some of protocols: TCP is a connection-oriented protocol that creates end to end communications. When there is a connection between the sender and receiver, the data may be sent over the connection. UDP is a simple and connectionless protocol, therefore it does not set up a dedicated end to end connection between the sender and receiver before the actual communication takes place. The data transmission occurs in one direction from sender to receiver without verifying the state of the receiver. In comparison to TCP which provides data integrity instead of delivery speed, RTP provides rapid delivery and has mechanisms to compensate any minor loss of data integrity. It is also worth knowing that RTSP can support multicasting. You can use this protocol to deliver a single feed to many users, without having to provide a separate stream for each of them. While HTTP cannot do this; it is a true one-to-one delivery system. Video streaming protocols for video surveillance: IP cameras are the important application of RSTP protocol. RTSP-enabled IP cameras are important components of modern video management systems, by which user can use media player to watch the live video from anywhere. RTP and RTSP are allowed for the direct video feed capture from video surveillance IP-cameras. RTSP provides unprecedented facility of implementation and has been applied by nearly every mainstream IP-camera manufacturer in the market. Also, today the video industry uses both of TCP and UDP, each with strengths and weaknesses when it comes to live viewing, playback, error correction, and more. In IP video, TCP and UDP may represent very similarity in dedicated surveillance networks. MJPEG is typically transported via the TCP protocol. TCP guarantees delivery of packets by requiring acknowledgement by the receiver. Packets that are not acknowledged are retransmitted. UDP is the preferred method for the transfer of live video streams at the Transport layer of the IP network stack. UDP is a faster protocol than TCP and for time sensitive applications (i.e. live video or VoIP), it is better to live with a video glitch caused by a dropped packet than to wait for the retransmission which TCP guarantees. However TCP is definitely more firewall friendly as some networks will block UDP video. UDP is most suitable for networks with very little packet loss and bandwidth that is guaranteed through QOS mechanisms. MPEG-4 video is typically transmitted over UDP or RTP or RTSP. UDP does not guarantee delivery and provides no facility for retransmission of lost packets. UDP transport provides the option of IP Multicast (IPmc) delivery, where a single stream is generated by the camera may be received by multiple endpoints, the Media Servers. On the other hand, where more than one client/viewer wants to see a live video stream in a network, multicast video should be used. Multicast video always uses UDP at the Transport layer. It is worth knowing that, in bandwidth-limited applications such as remote viewing or cameras connected via the internet, TCP and UDP have unique advantages and disadvantages. Posted in videos | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off
__label__pos
0.503695
Champion Job Change Ragnarok, Nettleton School District Jobs, Sri Lankan Eggplant Sambal, House Cleaning Quotes, Are Legumes Vegetables, Cme Chicago Jobs, Miele Club Login, Hardy Bougainvillea Barbara Karst, The Theoretical Minimum Quantum Mechanics, " /> why mechanical engineering is important Importance of Engineering Graphics. 3 min read. Mechanical Design or Machine Design is one of the important branches of Engineering Design. The Importance of Engineering Materials in Present World Satya Prakash Pandey1, ... 2Student of Mechanical Engineering, Rajarshi Rananjay Sinh Institute of Management and Technology, Amethi (U.P), 227405, India Abstract: Materials had been in use of humanity since time immemorial. It is one of the oldest and broadest of the engineering branches.. 55,101 views. Now before advancing towards the importance on engineering first we need to have introduction regarding engineering as well as its origin. 7.Importance of ur work.U form the human resource that is required for the survival of any industry and forms the backbone of modern human life.u r the person who may generate power/energy from natural resources,make equipments and processes to mine minerals,make cars, bikes ,buses, trucks, planes,ships(transportation can be compared to human … Mechanical Engineering is one field of engineering science that can provide great opportunities to realize the machine industry in terms of maintenance and repair, design / design, manufacture / production and environmental systems in the future. Answer (1 of 4): Statistics play a very important role in engineering. Is chemistry in mechanical engineering? January 12, 2013. How Important Is Biomedical Engineering Today? I am majoring in mechanical engineering with a concentration in Aerospace. Naturally, the job of a Manufacturing Engineer has become even more important. u’ll be savviest engineer. Why Engineering is so Important to Society. Though this is a proven fact and it … I am pretty confident in statics, and I already know that I have to take dynamics next year which is important. Without a savvy electrical engineer, the overall architectural sense of a project is skewed, which is why it’s wise to bring in an engineer right from the beginning, not just at the end. Originally, control systems took the form of mechanical controllers, such as the centrifugal governor on a steam engine, which ensured the engine turned over at a defined speed, despite a variable load. Our world is all about materials that are why Materials Science and Engineering has taken centre-stage position … PLC programming is the act of creating an internal logic for a programmable logic … If you would like to work in an important and powerful industry that is constantly changing and improving the way the world works, securing a mechanical engineering apprenticeship is the best place to start. Highly specialized, there is no replacing an electrical engineer on a design project, no matter the scope or size. Why Engineering Economy is Important to Engineers (and other professionals) Engineering economy is involved with the formulation, estimation, and evaluation of economic outcomes when alternatives to accomplished a defined purpose are available. Engineering is the use of scientific principles to design and build machines, structures, and other items, including bridges, tunnels, roads, vehicles, and buildings. Device Development in Industrial Control Engineering. Studying mechanical engineering is a combination of science, maths, and computing. In 21 st century as we see everything surroundings us is made of with help of the knowledge of engineer’s, this shows us how much is the importance of engineering in our life & society in which we live in. Mechanical engineers are no longer confined to the traditional industries of aerospace, automotive, and manufacturing, but are also employed extensively in important emerging areas, such as nuclear technology, robotics, biomedical technology and energy systems. Chapter: mechanical - Engineering Graphics | Study Material, Lecturing Notes, Assignment, Reference, Wiki description explanation, brief detail | Posted On : 23.11.2016 12:44 pm . Engineering Mechanics is the one of the most basic subjects that is required to study mechanical engineering from second year onwards. The Importance of AutoCAD to a Mechanical Engineer. Facts to Consider in the Material Selection Procedure In the field of mechanical engineering, the selection of material is a tedious task because there are number of factors that have to carefully evaluated before making the final decision. Mechanical engineering is a broad field that encompasses industry, business, medicine and even law. Mechanical Engineering is an engineering discipline that involves the application of principles of physics for analysis, design, manufacturing, and maintenance of mechanical systems. Albert Einstein said “Scientists investigate that which already is; Engineers create that which has never been ”. Mechanical engineering is a field of engineering, which relies on the use of material science and physics for the design, manufacturing, analysis and maintenance of mechanical systems. Mechanical engineering is an engineering branch that combines engineering physics and mathematics principles with materials science to design, analyze, manufacture, and maintain mechanical systems. With expertise spanning physiology, biology, healthcare and health informatics, mechanics, and engineering, biomedical engineers can combine their diverse skills to create solutions to continuing worldwide health issues, helping to change how patients are treated and lowering the cost of care. Importance of Engineering Graphics – use of drawing instruments. Engineering is a profession in which scientific knowledge and mathematics is used and experimented with to develop ways that benefit mankind, making it extremely important to society for several reasons. In mechanical engineering, mathematics is important because it is required to solve problems, to analyze mathematical relations and in using the laws of nature, which are mathematical expressions. The study of the geological material properties on a construction site are important to allow design and construction of stable structures that: do not settle, deform or crack and; do not fall down due to foundation failure. Why study Industrial Engineering? Engineering Managers Are In Demand. Organisations, both public and private, are crying out for Manufacturing Engineers because they have diverse analytical skills, especially skills in integrating technology with commercial and organisational solutions. Therefore the material selection process is quite important for the long term success of engineering applications. This area requires a good understanding of the core engineering concepts such as mechanics, thermodynamics, kinematics, structural analysis, material science, and electricity. It's considered to be one of the most challenging undergraduate degree courses available. The gear box transmits the motion and the power of the engine to the wheels of the vehicle. It is also challenging and exciting. Structural engineering is crucial because it directly impacts the safety and durability of buildings and structures. Why Is Structural Engineering Important? Starting salaries for engineers are among the highest for any college degree. 1. Why is Geotechnical Engineering Important? Share Followers 1. Engineering is important. Engineering Is One of the Top Paid Professions . IMPORTANCE OF ENGINEERING. Mechanical engineers play key roles in a wide range of industries including automotive, aerospace, biotechnology, computers, electronics, microelectromechanical systems, energy conversion, robotics and automation, and manufacturing. A person who earns a degree in mechanical engineering will be primarily grounded in technical matters using their knowledge of physics, chemistry and mathematics to think creatively and … From the tiniest nanotechnology, through to cars and buildings, to airplanes and space stations, mechanical engineers are responsible for the design and development of most things. The mechanical and plant engineering industry has been in the throes of a decline since 2018. Why should I study engineering? So, let’s focus on the main ones: You’ll be part of a dynamic field - technology always evolves, and you will have to keep up with it all, always learning how to bring about innovation. This profession is highly supported by high intellectual, creative and innovative power. The mechanical engineering field requires an understanding of core areas including mechanics, dynamics, … This is because most engineering projects have to be precisely calculated with every little detail recorded in order for it to work and fit together correctly. Engineers use models provided by science combined with innovative thinking to solve problems and create new designs that benefit humanity. There’s no one single reason why a Bachelor’s degree or a Master’s degree in Industrial Engineering is the best career path you can take. Why study Mechanical Engineering? Materials play important role in the functioning of a mechanical component. According to geteducted.com the field of engineering management is expected to grow nine percent through 2020. Computer applications, electricity, structures, mathematics, physics, drafting – basically knowledge of nearly every other type of engineering. Do you need chemistry to become a mechanical engineer? A typical starting salary for a chemical engineer fresh out of school with a bachelor's degree was $57,000 as of 2015, according to Forbes.An engineer can double his or her salary with experience and additional training. Mechanical engineering is the discipline that applies the principles of engineering, physics, and materials science for the design, analysis, manufacturing, and maintenance of mechanical systems. I'm a college freshman who is currently taking statics. A Mechanical Engineering student gains a very wide set of skills. Students always love discussing about the best branch of engineering. Always concerned with the selection and possible execution of alternatives given the economic parameters associated with the project. How important is chemistry in mechanical engineering? Mechanical engineers build the world around us. There has always been a debate and discussion among all engineering students about which engineering course is the best? There are many properties which a material should possess when placed inside a mechanical device. What skills do Manufacturing Engineers need? Getting a mechanical engineering apprenticeship at Chemoxy was a fantastic move for me. The discipline of engineering encompasses a broad range of more specialized fields of engineering, each with a more specific emphasis on particular areas of applied mathematics, applied science, and types of application. The key properties of mechanical controllers can easily be deduced from this example: We can most likely see increases in research and development, architectural engineering, biomedical, and environmental engineering. To understand what exactly machine design or mechanical design is let us consider the example of the gear box of the car. Champion Job Change Ragnarok, Nettleton School District Jobs, Sri Lankan Eggplant Sambal, House Cleaning Quotes, Are Legumes Vegetables, Cme Chicago Jobs, Miele Club Login, Hardy Bougainvillea Barbara Karst, The Theoretical Minimum Quantum Mechanics, Leave a Reply
__label__pos
0.840787
Juconcurrent 学而不思则罔,思而不学则殆。 Elasticsearch学习笔记(13) - 再论Term查询和Full Text查询 前言 有的时候,我们对查询有一定的混淆,尤其是Term查询和Full Text查询。楼主希望通过这篇文章阐述清楚这两者的区别。 Term查询 在前面章节我们已经知道了Term这个单词的含义,即:表达语意的最小单元,也叫词项。Term查询主要包括:Term Query、Range Query、Exists Query、Prefix Query、Wildcard Query。 Term查询的特点在于,查询本身对输入不做分词。Elasticsearch会将输入作为一个整体,在倒排索引中查找准确的词项,然后对查询结果进行相关度算分。另外,我们还可以通过Constant Score,将查询转换成一个Filtering,从而避免算分,且利用缓存来提高性能。 下面,我们举一个例子。 先创建一个products的索引。 DELETE products PUT products { "settings": { "number_of_shards": 1 } } 通过_bulk的api来插入3条记录 POST /products/_bulk { "index": { "_id": 1 }} { "productID" : "XHDK-A-1293-#fJ3","desc":"iPhone" } { "index": { "_id": 2 }} { "productID" : "KDKE-B-9947-#kL5","desc":"iPad" } { "index": { "_id": 3 }} { "productID" : "JODL-X-1937-#pV7","desc":"MBP" } 对desc字段做term查询,且iPhone的字母P为大写。我们发现未查询到任何结果。 POST /products/_search { "query": { "term": { "desc": { "value": "iPhone" //"value":"iphone" } } } } 我们在对desc字段做term查询,只是这一次将iphone的字母p更改为小写。我们发现已经能查询出第一条结果了。通过这种方式,我们其实已经验证了我们的定义。 POST /products/_search { "query": { "term": { "desc": { //"value": "iPhone" "value":"iphone" } } } } 另外,如果我们想对desc做精准匹配,有没有办法呢?也是有的,就是通过desc的子字段keyword来查询即可。我们发现,keyword做term查询的时候,如果传入值为iPhone,那么可以查询出结果。如果传入值为iphone,那么查询不出结果。 POST /products/_search { "query": { "term": { "desc.keyword": { "value": "iPhone" //"value":"iphone" } } } } 我们再来通过productID来查询一下。 POST /products/_search { "query": { "term": { "productID": { //"value": "XHDK-A-1293-#fJ3" "value": "xhdk-a-1293-#fJ3" } } } } 我们发现,不管值为XHDK-A-1293-#fJ3,还是转换为小写的xhdk-a-1293-#fJ3,都查询不出结果。这又是为什么呢?原因在于term查询不会对输入进行分词处理。我们通过_analyze来分析看看。 POST /_analyze { "analyzer": "standard", "text": "XHDK-A-1293-#fJ3" } _analyze结果 我们可以通过下面的方式查询到结果。 POST /products/_search { "query": { "term": { "productID": { "value": "xhdk" } } } } POST /products/_search { "query": { "term": { "productID.keyword": { "value": "XHDK-A-1293-#fJ3" } } } } Full Text查询 包括:Match Query / Match Phrase Query / Query String Query。 其特点如下: 1. 索引和搜索时都会进行分词,查询字符串先传递到一个合适的分词器,然后生成一个供查询的词项列表 2. 查询的时候,Elasticsearch会先对输入的查询进行分词,然后对每个词项逐个进行底层的查询,最终将结果进行合并汇总。同时,Elasticsearch会对每个文档生成一个相关性分数。例如查询“Mr zhang”,会查到包括 Mr 或者 zhang 的所有结果。 DELETE groups PUT groups { "mappings": { "properties": { "names":{ "type": "text", "position_increment_gap": 0 } } } } GET groups/_mapping POST groups/_doc { "names": [ "John Water", "Water Smith"] } POST groups/_search { "query": { "match_phrase": { "names": { "query": "Water Water", "slop": 100 } } } } POST groups/_search { "query": { "match_phrase": { "names": "Water Smith" } } } 参考链接 • https://www.elastic.co/guide/en/elasticsearch/reference/current/term-level-queries.html • https://www.elastic.co/guide/en/elasticsearch/reference/current/full-text-queries.html 总结 通过本文,我们了解了term查询和Full Text查询的区别及联系。 Content
__label__pos
0.999998
Intersystem communication - IBM - AS/400 CICS intersystem communication allows a CICS system to access data and to run programs and transactions on remote CICS systems.In addition, distributed applications can be developed using the standard CICS application programming interface(API). Function may be spread between local CICS systems, remote CICS systems, and non-CICS systems that use advanced program-to-program communication(APPC). Function may be distributed to workstation-based clients. Moving the presentation logic to the workstation allows the development of user-friendly front-end processes that can take advantage of the graphical environment available on the workstation. The communication facilities offered by CICS/400 are: 1. Function shipping 2. Function shipping allows your local transaction to request data from a CICS resource located at another CICS system. CICS/400 automatically routes the request to the required system. You are not aware that the request is being satisfied by a remote system. 3. Transaction routing 4. Transaction routing allows a user at any workstation to run any transaction in a remote CICS system. The transaction runs on the remote system but appears to the user as if it is running locally. 5. Distributed program link 6. Distributed program link (DPL) allows a local program to link to and run a program on another CICS system. When the remote program ends, control is returned to the initiating program. Distributed program link can be used to access host data that cannot be accessed by function shipping, such as DL/I and DB2 databases. 7. Distributed transaction processing 8. Distributed transaction processing (DTP) allows you to have a synchronous conversation between a local program and a remote program. The programs use CICS API commands to allocate and control Advanced Program-to-Program Communication (APPC) conversations. All this is transparent to the end user. 9. Asynchronous transaction processing 10. Asynchronous transaction processing allows you to initiate a remote transaction. The real significance of asynchronous transaction processing is that it can be used to balance the workload. You can control when the remote transaction is started by including a time in the parameters of the command that starts the remote transaction. This facility is usually considered as a form of function shipping with the resource being a transaction. 11. Server support for workstation-based clients 12. CICS/400 can act as a server to workstation-based client applications, allowing CICS/400 applications to have front-end graphical user interfaces. Function shipping, distributed program link, and distributed transaction processing, take advantage of fully protected conversations (sync-level 2), where these are available. In this case, syncpoint control extends to both local and remote CICS resources, which means that the communicating systems cooperate to ensure that all involved recoverable resources are either committed or rolled back at each syncpoint. In the event of system or conversation failure, syncpoint control, together with CICS/400 support, takes the necessary steps to protect resources at the next available opportunity. All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status IBM - AS/400 Topics
__label__pos
0.716266
The course explores the principles of fluid mechanics through laboratory experiments, Investigates, various hydraulic phenomena. By the end of this course, the student should be able to outline the basic concepts of hydraulic machines, recognize the classification of pumps and hydraulic Turbines. Identify the Theory of operation, construction, and performance of centrifugal pumps, positive displacement, and rotary pumps with their different types, explain the theory of hydraulic turbines, classifications, construction, power and performance calculations, powerhouse details, describe cavitation is in pumps and water hammer in piping systems. 
__label__pos
0.999515
CIS 2354 - Test 2 Document Sample CIS 2354 - Test 2 Powered By Docstoc CIS 2354 - Test 2 Test Due Date: Thursday, October 19 Name:__________________________ True/False Indicate whether the sentence or statement is true or false. ____ 1. Most secure operating systems store user logon credentials in their accounts database system as hash values. Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ 2. What is the name of the cryptographic security service that ensures that a sender cannot deny she initiated the transfer of secured information? a. Anti-replay protection b. Confidentiality c. Integrity d. Nonrepudiation ____ 3. You are deploying a public Web site. You want to allow your visitors to communicate using encrypted transmissions. Which of the following is not an appropriate option? a. Secure sockets layer (SSL) b. Symmetric cryptography c. Public key cryptography d. Asymmetric cryptography ____ 4. What element of modern cryptography prevents knowledge of the algorithm from being the primary weakness of a cryptographic method? a. The key b. Plaintext c. The hash value d. The message digest ____ 5. When is a cryptography system strong enough to be used for a specific application or purpose? a. When 128-bit–length keys are used b. When the algorithm is kept secret c. When all participants in a communication use different keys d. When a brute-force attack is rendered impractical ____ 6. What is the length of Data Encryption Standard (DES) keys? a. 56 bits b. 64 bits c. 128 bits d. 256 bits ____ 7. How many bits are in a message digest produced by the Secure Hash Algorithm (SHA-1)? a. 64 b. 128 c. 160 d. 256 ____ 8. What is the primary difficulty with deploying a symmetric cryptography system? a. The size of plaintext b. Key distribution c. The language of the message d. The key size ____ 9. When a cryptography system prevents unauthorized changes to data while it is in transit, it can provide protection from what? a. Denial of service (DoS) attacks b. Brute-force attacks c. Replay attacks d. Man-in-the-middle attacks ____ 10. Which of the following tools is most effective for protecting communications between two distant networks connected over the Internet using a virtual private network (VPN)? a. Hashing formulas b. Asymmetric cryptography c. Symmetric cryptography d. Randomized sequencing rules ____ 11. What form of cryptography provides for the four security services of confidentiality, integrity, authentication, and nonrepudiation? a. Hashing cryptography b. Symmetric cryptography c. Private key cryptography d. Public key cryptography ____ 12. You need to provide a solution for transmitting or communicating large data files over the Internet securely. You want to make the solution as simple and efficient as possible. Which of the following is the best option? a. Combine symmetric cryptography and hashing cryptography into a single solution. b. Combine symmetric cryptography and asymmetric cryptography into a single solution. c. Use just symmetric cryptography. d. Use just asymmetric cryptography. ____ 13. You need to support Secure Sockets Layer (SSL) to secure traffic over your public Web server. Which of the following should you use? a. Internet Protocol Security (IPSec) b. Symmetric cryptography c. Pretty Good Privacy (PGP) d. Public key cryptography ____ 14. You are the security administrator for an organization. You have been encrypting all sensitive files with a cryptographic solution using 128-bit keys. Recently a brute-force attack was shown to be successful at breaking 128-bit keys within 30 days. You no longer think the security provided by your environment is sufficient. What should you do to increase the security of your environment? a. Switch to another cryptographic system using the same length keys. b. Increase the size of the keys. c. Reduce the size of the keys. d. Use a hashing algorithm. ____ 15. Several business partners have sent you messages encrypted with their private key and your public key. You have lost your private key. What can you do to access these secured messages? a. Request a copy of each sender’s private key. b. Provide your backdoor password. c. Request a new private key public key set. d. Recover your private key from escrow. ____ 16. You want to allow other users to validate the source and integrity of your publicly distributed documents. You create a hash of the original document, you digitally sign the hash, and then you transmit the document. What step is missing? a. Enclose the document in a digital envelope. b. Attach the signed hash to the original message. c. Exchange private keys using an out-of-band method. d. Scan the document for malicious code. ____ 17. What process allows you to prove the identity of the sender of a document or e-mail? a. Hashing the document b. Digitally signing the document c. Enclosing the document in a digital envelope d. Encrypting the document with your public key ____ 18. You need to support secure communications over the Internet between your company’s network and several telecommuters. What is the best option for exchanging secret keys in this situation? a. Digital signatures b. Asymmetric cryptography c. Message authenticating code d. Hashing formulas ____ 19. Public key infrastructure (PKI) is based on what form of cryptography? a. Symmetric cryptography b. Asymmetric cryptography c. Hashing cryptography d. Private key cryptography ____ 20. What model is public key infrastructure (PKI) built on? a. Standalone trust model b. Wide area network (WAN) trust model c. Trusted third-party model d. Local trust model ____ 21. Which of the following is not a secure activity that a public key infrastructure (PKI) solution supports? a. Protecting e-mail communications b. Verifying the integrity of stored data files c. Preventing the theft of credit card transactions from e-commerce sites d. Securing wireless communications ____ 22. When the owner of a certificate leaves an organization, what process should occur? a. Renewal b. Enrollment c. Revocation d. Version update ____ 23. What is the most essential element when a certificate is being constructed for an organization? a. Signing the certificate with the certification authority’s (CA’s) certificate b. Verifying the identity of the organization c. Constructing the certificate for the entity d. Lifetime dates ____ 24. Two businesses want to establish a mutually beneficial relationship. They will be exchanging communications and data files. In order to ensure that resources are exchanged only with the correct entities, what do the businesses need to establish? a. Trust b. Accountability c. A virtual private network (VPN) d. Common topologies ____ 25. A user reports that she cannot establish a secure connection with a Web site in order to complete an e-commerce transaction. Every attempt to connect results in an insecure link. Which of the following is most likely the problem? a. Only ports 80 and 443 are allowed across the firewall. b. The lock icon on the Web browser shows a closed lock. c. The user’s certificate is expired or revoked. d. The Web server’s certificate was issued by a public certification authority (CA). ____ 26. You are a security manager for a software company. You want to provide a means for your customers to verify that the products they download from your site are actually from your organization. How can you do this? a. Give the users a private key. b. Digitally sign all software. c. Assign user accounts to customers for downloading software. d. Distribute files only by SMTP. ____ 27. You are the security administrator for your organization. You designed and deployed the certificate infrastructure used in your network. What component of the infrastructure must be protected above all others? a. Users’ private keys b. The certificate revocation list (CRL) c. The distribution points d. The root certification authority (CA) ____ 28. Your organization establishes a public key infrastructure (PKI) that issues certificates to internal and external entities. One of the external entities that obtained a certificate from your certification authority (CA) has been charged with distributing malicious code. You discover that the external organization was a group of college students attempting to bring down the IT infrastructure of a local bank. What could you have done to prevent or stop this situation? a. Properly distribute the certificate revocation list (CRL). b. Charge a larger fee for the service of using your CA’s certificates. c. Thoroughly verify the identity of entities before issuing certificates. d. Require external entities to submit both their public and private keys to the CA. ____ 29. Your organization uses an enterprise-wide private certification authority (CA) solution to provide identity proofing for all communications within the private network. Due to the nature of your business, it is not legal for any one person to have the ability to perform administrative or privileged activity alone. Instead, every action requires two or more authorized users to work together. A user reports that he accidentally deleted his certificate file from his universal serial bus (USB) memory drive dongle. Now he can no longer access his secured files or communicate over the secured network. Which of the following is the best way to resolve this problem? a. Have the CA administrator issue a new certificate. b. Have two CA managers revoke the certificate and redistribute the certificate revocation list (CRL). c. Have the user generate a new public and private key pair. d. Have three key escrow agents recover the key from escrow. ____ 30. Your organization is very concerned about security. Every transaction must be secured. Every file must be encrypted. Every access to a terminal must be verified with at least a two-factor authentication mechanism. Even physical access into the building requires authentication. Which of the following solutions supports each of these security features while simplifying the processes for users? a. Use complex passwords and biometrics. b. Use cognitive passwords and ID badges. c. Use smart card-based certificates. d. Use single-sign on with one-time passwords. ____ 31. You have accessed a Web site. This Web site has several Microsoft ActiveX controls that support the complex functions offered by the host company. Your Web browser prompts you whether or not to accept the certificate attached to the controls. If you select Yes, what are you actually doing? a. Stating that you trust the root certification authority (CA) b. Stating that you trust the Web server host company c. Stating that you know the ActiveX controls are not malicious d. Stating that you accept all certificates issued by the root CA ____ 32. You are deploying a public key infrastructure (PKI) solution for a global enterprise corporation. The corporation has hundreds of offices around the world. Each office might periodically connect to up to six other offices simultaneously by means of an Internet virtual private network (VPN) over Digital Subscriber Line (DSL) or Integrated Services Digital Network (ISDN) lines. VPNs are established only when communications must take place. The corporation requires that all communications be secured and that all communication partners mutually authenticate with certificates before data is transferred. Which of the following is the best option for this environment? a. A hierarchy of trust b. A root certification authority (CA) at a single office and a subordinate CA at all other offices c. Standalone CAs at each office d. A mesh of trust ____ 33. Your company is a government subcontractor. Your employees must often exchange information with several government offices about regulations, safety codes, design specifications, and system requirements. The contract requires your company to secure all their communications against eavesdropping and to provide a method of supporting nonrepudiation. However, since you must pay for the security solution, you want to deploy only what is absolutely necessary to comply with the contract’s requirements. Which of the following is the best solution for this situation? a. Deploy an e-mail solution that signs all messages with a digital certificate and encrypts every message before transmission. b. Deploy an e-mail solution that signs all messages with a digital certificate. c. Deploy an e-mail solution that encrypts every message before transmission. d. Deploy an e-mail solution that encrypts every message before transmission and has a short lifetime date for the certificates. ____ 34. When data is moved down the OSI model and a new header and footer (when applicable) are added, what is this known as? a. Translation b. Encapsulation c. Spoofing d. Caching ____ 35. What protocol model consists of seven distinct layers and is commonly used to compare and control commercial protocols? a. OSI model b. DARPA model c. TCP/IP model d. ATM model ____ 36. The ____ layer (Layer ____) provides routing and switching capabilities and creates logical paths between two computers to create virtual circuits. This layer is responsible for routing, forwarding, addressing, internetworking, error handling, congestion control, and packet sequencing. a. session, 5 b. transport, 4 c. network, 3 d. data-link, 2 ____ 37. Which IP feature allows a single IP datagram to be broken into several smaller datagrams for transport across the network? a. Encapsulation b. Compression c. Decryption d. Fragmentation ____ 38. A fiber optic cable connects two networks located in different buildings. This fiber optic cable is constantly in use. While reviewing the network’s activity logs for the last week, you notice an 18- minute period when the fiber optic line was unavailable. What could this indicate? a. Electromagnetic interception b. A disconnected terminator c. Insertion of a fiber optic eavesdropping device d. Too much network traffic ____ 39. An attacker attempts to alter the Address Resolution Protocol (ARP) cache on your switches in order to redirect traffic to a compromised client. However, the attacker discovers that his attempts at poisoning the ARP cache are failing to make any changes to the ARP table. What is a possible explanation for this? a. Physical access controls b. Static administrative password c. Manual ARP mappings d. Thorough network configuration documentation ____ 40. Which one of the following types of attacks does not have the potential to cause a form of denial of service (DoS) attack against a company with a Private Branch Exchange (PBX) system? a. Enabling remote maintenance modems b. Changing configuration and administrator passwords c. Listening to confidential voice mails d. Causing significant long distance toll charges ____ 41. Where do user applications, such as e-mail clients, fit in the OSI model? a. Above the application layer b. Above the presentation layer c. Within the session layer d. Below the physical layer ____ 42. Your computer is receiving packets from another system on the network. When you try to view the contents of the packets, all you see is garbage. You think the packets are being corrupted while in transit. What element of the packet can you use to test this theory? a. The header b. The data c. The footer d. The Frame Check Sequence (FCS) ____ 43. To establish Transmission Control Protocol (TCP) communication, two computers use a three-way handshake. This exchange of three packets establishes a starting sequence number for the data being sent, the size of the receive buffer, the maximum segment size, and the TCP options supported. You want to exploit this standard function in order to consume all of the system resources on a remote system. What should you do to accomplish this task? a. Spoof the destination address in all SYN packets. b. Don’t respond with any ACK packets. c. Block receipt of SYN/ACK packets. d. Redirect all SYN/ACK packets to an alternate host. ____ 44. A significantly higher level of network traffic is flowing toward the mission-critical servers on your network than normal. When you inspect this traffic, you discover that most of the packets contain source media access control (MAC) addresses from a system that has been offline for three weeks. What does this indicate? a. A duplicate network interface card (NIC) is present on the network. b. The mission critical servers need additional network bandwidth. c. A network interface layer attack is occurring. d. The Domain Name System (DNS) has been poisoned. ____ 45. Your offices are in a building that has preinstalled coaxial cabling in the walls. Before you moved into the building, contractors rearranged the prefabricated walls to meet your needs for offices, storage, and other rooms. Your rented space is only 200 by 250 meters. The building is a single story. After connecting the proper systems to the coaxial cabling to establish a standard backbone network link, you discover that systems in rooms A through F can communicate but systems in rooms G through J cannot communicate. The network servers are located in room E. What is the problem? a. The cable length is too long. b. Electromagnetic interference (EMI) is causing the problem. c. The coaxial cable cannot support network communications. d. The cable was severed somewhere in the walls. ____ 46. Your organization has a security policy that prohibits unauthorized software or hardware from being installed onto or connected to any system, device, or cable on the network. What does this security policy protect against? a. Physical theft b. Eavesdropping c. Address Resolution Protocol (ARP) poisoning d. Operator error ____ 47. You want to perform traffic analysis against your own network to determine whether your network is vulnerable to certain types of eavesdropping or emanation interception attacks. You try to capture data about the network traffic passing through a cable, using an electromagnetic interference/radio frequency interference (EMI/RFI) detector. However, your tests show nothing. You confirm that data is being transmitted over the cable. What could be the problem? a. The cable is fiber optic. b. Encryption is being used. c. The cable is disconnected. d. The cable is being used at its maximum capacity. Short Answer 48. In most implementations, cryptography can be used to provide which security services? (Choose all answers that are correct.) a. Availability b. Confidentiality c. Delivery verification d. Integrity 49. What is the length of Advanced Encryption Standard (AES) keys? (Choose all answers that are correct.) a. 64 bits b. 128 bits c. 192 bits d. 256 bits 50. You are the security manager for your organization. The city where your office is located has recently renamed and renumbered your street, so your physical address has changed. Which of the following actions is a valid means to update your certificates? (Choose all answers that are correct.) a. Have the certification authority (CA) issue a new certificate. b. Edit your certificate directly to update the information. c. Have the CA revoke your old certificate. d. Add a new subelement to the certificate. DOCUMENT INFO Shared By: Categories: Tags: Stats: views:138 posted:8/7/2011 language:English pages:8  
__label__pos
0.834047
/[pcre]/code/branches/pcre16/pcre_tables.c ViewVC logotype Contents of /code/branches/pcre16/pcre_tables.c Parent Directory Parent Directory | Revision Log Revision Log Revision 830 - (show annotations) Tue Dec 27 15:37:13 2011 UTC (9 years, 4 months ago) by ph10 File MIME type: text/plain File size: 21559 byte(s) Update version and update many copyright dates. 1 /************************************************* 2 * Perl-Compatible Regular Expressions * 3 *************************************************/ 4 5 /* PCRE is a library of functions to support regular expressions whose syntax 6 and semantics are as close as possible to those of the Perl 5 language. 7 8 Written by Philip Hazel 9 Copyright (c) 1997-2012 University of Cambridge 10 11 ----------------------------------------------------------------------------- 12 Redistribution and use in source and binary forms, with or without 13 modification, are permitted provided that the following conditions are met: 14 15 * Redistributions of source code must retain the above copyright notice, 16 this list of conditions and the following disclaimer. 17 18 * Redistributions in binary form must reproduce the above copyright 19 notice, this list of conditions and the following disclaimer in the 20 documentation and/or other materials provided with the distribution. 21 22 * Neither the name of the University of Cambridge nor the names of its 23 contributors may be used to endorse or promote products derived from 24 this software without specific prior written permission. 25 26 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 27 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 30 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 31 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 32 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 33 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 34 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 35 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 36 POSSIBILITY OF SUCH DAMAGE. 37 ----------------------------------------------------------------------------- 38 */ 39 40 #ifndef PCRE_INCLUDED 41 42 /* This module contains some fixed tables that are used by more than one of the 43 PCRE code modules. The tables are also #included by the pcretest program, which 44 uses macros to change their names from _pcre_xxx to xxxx, thereby avoiding name 45 clashes with the library. */ 46 47 48 #ifdef HAVE_CONFIG_H 49 #include "config.h" 50 #endif 51 52 #include "pcre_internal.h" 53 54 #endif /* PCRE_INCLUDED */ 55 56 /* Table of sizes for the fixed-length opcodes. It's defined in a macro so that 57 the definition is next to the definition of the opcodes in pcre_internal.h. */ 58 59 const pcre_uint8 PRIV(OP_lengths)[] = { OP_LENGTHS }; 60 61 62 63 /************************************************* 64 * Tables for UTF-8 support * 65 *************************************************/ 66 67 /* These are the breakpoints for different numbers of bytes in a UTF-8 68 character. */ 69 70 #if (defined SUPPORT_UTF && defined COMPILE_PCRE8) \ 71 || (defined PCRE_INCLUDED && defined SUPPORT_PCRE16) 72 73 /* These tables are also required by pcretest in 16 bit mode. */ 74 75 const int PRIV(utf8_table1)[] = 76 { 0x7f, 0x7ff, 0xffff, 0x1fffff, 0x3ffffff, 0x7fffffff}; 77 78 const int PRIV(utf8_table1_size) = sizeof(PRIV(utf8_table1)) / sizeof(int); 79 80 /* These are the indicator bits and the mask for the data bits to set in the 81 first byte of a character, indexed by the number of additional bytes. */ 82 83 const int PRIV(utf8_table2)[] = { 0, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc}; 84 const int PRIV(utf8_table3)[] = { 0xff, 0x1f, 0x0f, 0x07, 0x03, 0x01}; 85 86 /* Table of the number of extra bytes, indexed by the first byte masked with 87 0x3f. The highest number for a valid UTF-8 first byte is in fact 0x3d. */ 88 89 const pcre_uint8 PRIV(utf8_table4)[] = { 90 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1, 91 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1, 92 2,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2, 93 3,3,3,3,3,3,3,3,4,4,4,4,5,5,5,5 }; 94 95 #endif /* (SUPPORT_UTF && COMPILE_PCRE8) || (PCRE_INCLUDED && SUPPORT_PCRE16)*/ 96 97 #ifdef SUPPORT_UTF 98 99 /* Table to translate from particular type value to the general value. */ 100 101 const int PRIV(ucp_gentype)[] = { 102 ucp_C, ucp_C, ucp_C, ucp_C, ucp_C, /* Cc, Cf, Cn, Co, Cs */ 103 ucp_L, ucp_L, ucp_L, ucp_L, ucp_L, /* Ll, Lu, Lm, Lo, Lt */ 104 ucp_M, ucp_M, ucp_M, /* Mc, Me, Mn */ 105 ucp_N, ucp_N, ucp_N, /* Nd, Nl, No */ 106 ucp_P, ucp_P, ucp_P, ucp_P, ucp_P, /* Pc, Pd, Pe, Pf, Pi */ 107 ucp_P, ucp_P, /* Ps, Po */ 108 ucp_S, ucp_S, ucp_S, ucp_S, /* Sc, Sk, Sm, So */ 109 ucp_Z, ucp_Z, ucp_Z /* Zl, Zp, Zs */ 110 }; 111 112 #ifdef SUPPORT_JIT 113 /* This table reverses PRIV(ucp_gentype). We can save the cost 114 of a memory load. */ 115 116 const int PRIV(ucp_typerange)[] = { 117 ucp_Cc, ucp_Cs, 118 ucp_Ll, ucp_Lu, 119 ucp_Mc, ucp_Mn, 120 ucp_Nd, ucp_No, 121 ucp_Pc, ucp_Ps, 122 ucp_Sc, ucp_So, 123 ucp_Zl, ucp_Zs, 124 }; 125 #endif /* SUPPORT_JIT */ 126 127 /* The pcre_utt[] table below translates Unicode property names into type and 128 code values. It is searched by binary chop, so must be in collating sequence of 129 name. Originally, the table contained pointers to the name strings in the first 130 field of each entry. However, that leads to a large number of relocations when 131 a shared library is dynamically loaded. A significant reduction is made by 132 putting all the names into a single, large string and then using offsets in the 133 table itself. Maintenance is more error-prone, but frequent changes to this 134 data are unlikely. 135 136 July 2008: There is now a script called maint/GenerateUtt.py that can be used 137 to generate this data automatically instead of maintaining it by hand. 138 139 The script was updated in March 2009 to generate a new EBCDIC-compliant 140 version. Like all other character and string literals that are compared against 141 the regular expression pattern, we must use STR_ macros instead of literal 142 strings to make sure that UTF-8 support works on EBCDIC platforms. */ 143 144 #define STRING_Any0 STR_A STR_n STR_y "\0" 145 #define STRING_Arabic0 STR_A STR_r STR_a STR_b STR_i STR_c "\0" 146 #define STRING_Armenian0 STR_A STR_r STR_m STR_e STR_n STR_i STR_a STR_n "\0" 147 #define STRING_Avestan0 STR_A STR_v STR_e STR_s STR_t STR_a STR_n "\0" 148 #define STRING_Balinese0 STR_B STR_a STR_l STR_i STR_n STR_e STR_s STR_e "\0" 149 #define STRING_Bamum0 STR_B STR_a STR_m STR_u STR_m "\0" 150 #define STRING_Batak0 STR_B STR_a STR_t STR_a STR_k "\0" 151 #define STRING_Bengali0 STR_B STR_e STR_n STR_g STR_a STR_l STR_i "\0" 152 #define STRING_Bopomofo0 STR_B STR_o STR_p STR_o STR_m STR_o STR_f STR_o "\0" 153 #define STRING_Brahmi0 STR_B STR_r STR_a STR_h STR_m STR_i "\0" 154 #define STRING_Braille0 STR_B STR_r STR_a STR_i STR_l STR_l STR_e "\0" 155 #define STRING_Buginese0 STR_B STR_u STR_g STR_i STR_n STR_e STR_s STR_e "\0" 156 #define STRING_Buhid0 STR_B STR_u STR_h STR_i STR_d "\0" 157 #define STRING_C0 STR_C "\0" 158 #define STRING_Canadian_Aboriginal0 STR_C STR_a STR_n STR_a STR_d STR_i STR_a STR_n STR_UNDERSCORE STR_A STR_b STR_o STR_r STR_i STR_g STR_i STR_n STR_a STR_l "\0" 159 #define STRING_Carian0 STR_C STR_a STR_r STR_i STR_a STR_n "\0" 160 #define STRING_Cc0 STR_C STR_c "\0" 161 #define STRING_Cf0 STR_C STR_f "\0" 162 #define STRING_Cham0 STR_C STR_h STR_a STR_m "\0" 163 #define STRING_Cherokee0 STR_C STR_h STR_e STR_r STR_o STR_k STR_e STR_e "\0" 164 #define STRING_Cn0 STR_C STR_n "\0" 165 #define STRING_Co0 STR_C STR_o "\0" 166 #define STRING_Common0 STR_C STR_o STR_m STR_m STR_o STR_n "\0" 167 #define STRING_Coptic0 STR_C STR_o STR_p STR_t STR_i STR_c "\0" 168 #define STRING_Cs0 STR_C STR_s "\0" 169 #define STRING_Cuneiform0 STR_C STR_u STR_n STR_e STR_i STR_f STR_o STR_r STR_m "\0" 170 #define STRING_Cypriot0 STR_C STR_y STR_p STR_r STR_i STR_o STR_t "\0" 171 #define STRING_Cyrillic0 STR_C STR_y STR_r STR_i STR_l STR_l STR_i STR_c "\0" 172 #define STRING_Deseret0 STR_D STR_e STR_s STR_e STR_r STR_e STR_t "\0" 173 #define STRING_Devanagari0 STR_D STR_e STR_v STR_a STR_n STR_a STR_g STR_a STR_r STR_i "\0" 174 #define STRING_Egyptian_Hieroglyphs0 STR_E STR_g STR_y STR_p STR_t STR_i STR_a STR_n STR_UNDERSCORE STR_H STR_i STR_e STR_r STR_o STR_g STR_l STR_y STR_p STR_h STR_s "\0" 175 #define STRING_Ethiopic0 STR_E STR_t STR_h STR_i STR_o STR_p STR_i STR_c "\0" 176 #define STRING_Georgian0 STR_G STR_e STR_o STR_r STR_g STR_i STR_a STR_n "\0" 177 #define STRING_Glagolitic0 STR_G STR_l STR_a STR_g STR_o STR_l STR_i STR_t STR_i STR_c "\0" 178 #define STRING_Gothic0 STR_G STR_o STR_t STR_h STR_i STR_c "\0" 179 #define STRING_Greek0 STR_G STR_r STR_e STR_e STR_k "\0" 180 #define STRING_Gujarati0 STR_G STR_u STR_j STR_a STR_r STR_a STR_t STR_i "\0" 181 #define STRING_Gurmukhi0 STR_G STR_u STR_r STR_m STR_u STR_k STR_h STR_i "\0" 182 #define STRING_Han0 STR_H STR_a STR_n "\0" 183 #define STRING_Hangul0 STR_H STR_a STR_n STR_g STR_u STR_l "\0" 184 #define STRING_Hanunoo0 STR_H STR_a STR_n STR_u STR_n STR_o STR_o "\0" 185 #define STRING_Hebrew0 STR_H STR_e STR_b STR_r STR_e STR_w "\0" 186 #define STRING_Hiragana0 STR_H STR_i STR_r STR_a STR_g STR_a STR_n STR_a "\0" 187 #define STRING_Imperial_Aramaic0 STR_I STR_m STR_p STR_e STR_r STR_i STR_a STR_l STR_UNDERSCORE STR_A STR_r STR_a STR_m STR_a STR_i STR_c "\0" 188 #define STRING_Inherited0 STR_I STR_n STR_h STR_e STR_r STR_i STR_t STR_e STR_d "\0" 189 #define STRING_Inscriptional_Pahlavi0 STR_I STR_n STR_s STR_c STR_r STR_i STR_p STR_t STR_i STR_o STR_n STR_a STR_l STR_UNDERSCORE STR_P STR_a STR_h STR_l STR_a STR_v STR_i "\0" 190 #define STRING_Inscriptional_Parthian0 STR_I STR_n STR_s STR_c STR_r STR_i STR_p STR_t STR_i STR_o STR_n STR_a STR_l STR_UNDERSCORE STR_P STR_a STR_r STR_t STR_h STR_i STR_a STR_n "\0" 191 #define STRING_Javanese0 STR_J STR_a STR_v STR_a STR_n STR_e STR_s STR_e "\0" 192 #define STRING_Kaithi0 STR_K STR_a STR_i STR_t STR_h STR_i "\0" 193 #define STRING_Kannada0 STR_K STR_a STR_n STR_n STR_a STR_d STR_a "\0" 194 #define STRING_Katakana0 STR_K STR_a STR_t STR_a STR_k STR_a STR_n STR_a "\0" 195 #define STRING_Kayah_Li0 STR_K STR_a STR_y STR_a STR_h STR_UNDERSCORE STR_L STR_i "\0" 196 #define STRING_Kharoshthi0 STR_K STR_h STR_a STR_r STR_o STR_s STR_h STR_t STR_h STR_i "\0" 197 #define STRING_Khmer0 STR_K STR_h STR_m STR_e STR_r "\0" 198 #define STRING_L0 STR_L "\0" 199 #define STRING_L_AMPERSAND0 STR_L STR_AMPERSAND "\0" 200 #define STRING_Lao0 STR_L STR_a STR_o "\0" 201 #define STRING_Latin0 STR_L STR_a STR_t STR_i STR_n "\0" 202 #define STRING_Lepcha0 STR_L STR_e STR_p STR_c STR_h STR_a "\0" 203 #define STRING_Limbu0 STR_L STR_i STR_m STR_b STR_u "\0" 204 #define STRING_Linear_B0 STR_L STR_i STR_n STR_e STR_a STR_r STR_UNDERSCORE STR_B "\0" 205 #define STRING_Lisu0 STR_L STR_i STR_s STR_u "\0" 206 #define STRING_Ll0 STR_L STR_l "\0" 207 #define STRING_Lm0 STR_L STR_m "\0" 208 #define STRING_Lo0 STR_L STR_o "\0" 209 #define STRING_Lt0 STR_L STR_t "\0" 210 #define STRING_Lu0 STR_L STR_u "\0" 211 #define STRING_Lycian0 STR_L STR_y STR_c STR_i STR_a STR_n "\0" 212 #define STRING_Lydian0 STR_L STR_y STR_d STR_i STR_a STR_n "\0" 213 #define STRING_M0 STR_M "\0" 214 #define STRING_Malayalam0 STR_M STR_a STR_l STR_a STR_y STR_a STR_l STR_a STR_m "\0" 215 #define STRING_Mandaic0 STR_M STR_a STR_n STR_d STR_a STR_i STR_c "\0" 216 #define STRING_Mc0 STR_M STR_c "\0" 217 #define STRING_Me0 STR_M STR_e "\0" 218 #define STRING_Meetei_Mayek0 STR_M STR_e STR_e STR_t STR_e STR_i STR_UNDERSCORE STR_M STR_a STR_y STR_e STR_k "\0" 219 #define STRING_Mn0 STR_M STR_n "\0" 220 #define STRING_Mongolian0 STR_M STR_o STR_n STR_g STR_o STR_l STR_i STR_a STR_n "\0" 221 #define STRING_Myanmar0 STR_M STR_y STR_a STR_n STR_m STR_a STR_r "\0" 222 #define STRING_N0 STR_N "\0" 223 #define STRING_Nd0 STR_N STR_d "\0" 224 #define STRING_New_Tai_Lue0 STR_N STR_e STR_w STR_UNDERSCORE STR_T STR_a STR_i STR_UNDERSCORE STR_L STR_u STR_e "\0" 225 #define STRING_Nko0 STR_N STR_k STR_o "\0" 226 #define STRING_Nl0 STR_N STR_l "\0" 227 #define STRING_No0 STR_N STR_o "\0" 228 #define STRING_Ogham0 STR_O STR_g STR_h STR_a STR_m "\0" 229 #define STRING_Ol_Chiki0 STR_O STR_l STR_UNDERSCORE STR_C STR_h STR_i STR_k STR_i "\0" 230 #define STRING_Old_Italic0 STR_O STR_l STR_d STR_UNDERSCORE STR_I STR_t STR_a STR_l STR_i STR_c "\0" 231 #define STRING_Old_Persian0 STR_O STR_l STR_d STR_UNDERSCORE STR_P STR_e STR_r STR_s STR_i STR_a STR_n "\0" 232 #define STRING_Old_South_Arabian0 STR_O STR_l STR_d STR_UNDERSCORE STR_S STR_o STR_u STR_t STR_h STR_UNDERSCORE STR_A STR_r STR_a STR_b STR_i STR_a STR_n "\0" 233 #define STRING_Old_Turkic0 STR_O STR_l STR_d STR_UNDERSCORE STR_T STR_u STR_r STR_k STR_i STR_c "\0" 234 #define STRING_Oriya0 STR_O STR_r STR_i STR_y STR_a "\0" 235 #define STRING_Osmanya0 STR_O STR_s STR_m STR_a STR_n STR_y STR_a "\0" 236 #define STRING_P0 STR_P "\0" 237 #define STRING_Pc0 STR_P STR_c "\0" 238 #define STRING_Pd0 STR_P STR_d "\0" 239 #define STRING_Pe0 STR_P STR_e "\0" 240 #define STRING_Pf0 STR_P STR_f "\0" 241 #define STRING_Phags_Pa0 STR_P STR_h STR_a STR_g STR_s STR_UNDERSCORE STR_P STR_a "\0" 242 #define STRING_Phoenician0 STR_P STR_h STR_o STR_e STR_n STR_i STR_c STR_i STR_a STR_n "\0" 243 #define STRING_Pi0 STR_P STR_i "\0" 244 #define STRING_Po0 STR_P STR_o "\0" 245 #define STRING_Ps0 STR_P STR_s "\0" 246 #define STRING_Rejang0 STR_R STR_e STR_j STR_a STR_n STR_g "\0" 247 #define STRING_Runic0 STR_R STR_u STR_n STR_i STR_c "\0" 248 #define STRING_S0 STR_S "\0" 249 #define STRING_Samaritan0 STR_S STR_a STR_m STR_a STR_r STR_i STR_t STR_a STR_n "\0" 250 #define STRING_Saurashtra0 STR_S STR_a STR_u STR_r STR_a STR_s STR_h STR_t STR_r STR_a "\0" 251 #define STRING_Sc0 STR_S STR_c "\0" 252 #define STRING_Shavian0 STR_S STR_h STR_a STR_v STR_i STR_a STR_n "\0" 253 #define STRING_Sinhala0 STR_S STR_i STR_n STR_h STR_a STR_l STR_a "\0" 254 #define STRING_Sk0 STR_S STR_k "\0" 255 #define STRING_Sm0 STR_S STR_m "\0" 256 #define STRING_So0 STR_S STR_o "\0" 257 #define STRING_Sundanese0 STR_S STR_u STR_n STR_d STR_a STR_n STR_e STR_s STR_e "\0" 258 #define STRING_Syloti_Nagri0 STR_S STR_y STR_l STR_o STR_t STR_i STR_UNDERSCORE STR_N STR_a STR_g STR_r STR_i "\0" 259 #define STRING_Syriac0 STR_S STR_y STR_r STR_i STR_a STR_c "\0" 260 #define STRING_Tagalog0 STR_T STR_a STR_g STR_a STR_l STR_o STR_g "\0" 261 #define STRING_Tagbanwa0 STR_T STR_a STR_g STR_b STR_a STR_n STR_w STR_a "\0" 262 #define STRING_Tai_Le0 STR_T STR_a STR_i STR_UNDERSCORE STR_L STR_e "\0" 263 #define STRING_Tai_Tham0 STR_T STR_a STR_i STR_UNDERSCORE STR_T STR_h STR_a STR_m "\0" 264 #define STRING_Tai_Viet0 STR_T STR_a STR_i STR_UNDERSCORE STR_V STR_i STR_e STR_t "\0" 265 #define STRING_Tamil0 STR_T STR_a STR_m STR_i STR_l "\0" 266 #define STRING_Telugu0 STR_T STR_e STR_l STR_u STR_g STR_u "\0" 267 #define STRING_Thaana0 STR_T STR_h STR_a STR_a STR_n STR_a "\0" 268 #define STRING_Thai0 STR_T STR_h STR_a STR_i "\0" 269 #define STRING_Tibetan0 STR_T STR_i STR_b STR_e STR_t STR_a STR_n "\0" 270 #define STRING_Tifinagh0 STR_T STR_i STR_f STR_i STR_n STR_a STR_g STR_h "\0" 271 #define STRING_Ugaritic0 STR_U STR_g STR_a STR_r STR_i STR_t STR_i STR_c "\0" 272 #define STRING_Vai0 STR_V STR_a STR_i "\0" 273 #define STRING_Xan0 STR_X STR_a STR_n "\0" 274 #define STRING_Xps0 STR_X STR_p STR_s "\0" 275 #define STRING_Xsp0 STR_X STR_s STR_p "\0" 276 #define STRING_Xwd0 STR_X STR_w STR_d "\0" 277 #define STRING_Yi0 STR_Y STR_i "\0" 278 #define STRING_Z0 STR_Z "\0" 279 #define STRING_Zl0 STR_Z STR_l "\0" 280 #define STRING_Zp0 STR_Z STR_p "\0" 281 #define STRING_Zs0 STR_Z STR_s "\0" 282 283 const char PRIV(utt_names)[] = 284 STRING_Any0 285 STRING_Arabic0 286 STRING_Armenian0 287 STRING_Avestan0 288 STRING_Balinese0 289 STRING_Bamum0 290 STRING_Batak0 291 STRING_Bengali0 292 STRING_Bopomofo0 293 STRING_Brahmi0 294 STRING_Braille0 295 STRING_Buginese0 296 STRING_Buhid0 297 STRING_C0 298 STRING_Canadian_Aboriginal0 299 STRING_Carian0 300 STRING_Cc0 301 STRING_Cf0 302 STRING_Cham0 303 STRING_Cherokee0 304 STRING_Cn0 305 STRING_Co0 306 STRING_Common0 307 STRING_Coptic0 308 STRING_Cs0 309 STRING_Cuneiform0 310 STRING_Cypriot0 311 STRING_Cyrillic0 312 STRING_Deseret0 313 STRING_Devanagari0 314 STRING_Egyptian_Hieroglyphs0 315 STRING_Ethiopic0 316 STRING_Georgian0 317 STRING_Glagolitic0 318 STRING_Gothic0 319 STRING_Greek0 320 STRING_Gujarati0 321 STRING_Gurmukhi0 322 STRING_Han0 323 STRING_Hangul0 324 STRING_Hanunoo0 325 STRING_Hebrew0 326 STRING_Hiragana0 327 STRING_Imperial_Aramaic0 328 STRING_Inherited0 329 STRING_Inscriptional_Pahlavi0 330 STRING_Inscriptional_Parthian0 331 STRING_Javanese0 332 STRING_Kaithi0 333 STRING_Kannada0 334 STRING_Katakana0 335 STRING_Kayah_Li0 336 STRING_Kharoshthi0 337 STRING_Khmer0 338 STRING_L0 339 STRING_L_AMPERSAND0 340 STRING_Lao0 341 STRING_Latin0 342 STRING_Lepcha0 343 STRING_Limbu0 344 STRING_Linear_B0 345 STRING_Lisu0 346 STRING_Ll0 347 STRING_Lm0 348 STRING_Lo0 349 STRING_Lt0 350 STRING_Lu0 351 STRING_Lycian0 352 STRING_Lydian0 353 STRING_M0 354 STRING_Malayalam0 355 STRING_Mandaic0 356 STRING_Mc0 357 STRING_Me0 358 STRING_Meetei_Mayek0 359 STRING_Mn0 360 STRING_Mongolian0 361 STRING_Myanmar0 362 STRING_N0 363 STRING_Nd0 364 STRING_New_Tai_Lue0 365 STRING_Nko0 366 STRING_Nl0 367 STRING_No0 368 STRING_Ogham0 369 STRING_Ol_Chiki0 370 STRING_Old_Italic0 371 STRING_Old_Persian0 372 STRING_Old_South_Arabian0 373 STRING_Old_Turkic0 374 STRING_Oriya0 375 STRING_Osmanya0 376 STRING_P0 377 STRING_Pc0 378 STRING_Pd0 379 STRING_Pe0 380 STRING_Pf0 381 STRING_Phags_Pa0 382 STRING_Phoenician0 383 STRING_Pi0 384 STRING_Po0 385 STRING_Ps0 386 STRING_Rejang0 387 STRING_Runic0 388 STRING_S0 389 STRING_Samaritan0 390 STRING_Saurashtra0 391 STRING_Sc0 392 STRING_Shavian0 393 STRING_Sinhala0 394 STRING_Sk0 395 STRING_Sm0 396 STRING_So0 397 STRING_Sundanese0 398 STRING_Syloti_Nagri0 399 STRING_Syriac0 400 STRING_Tagalog0 401 STRING_Tagbanwa0 402 STRING_Tai_Le0 403 STRING_Tai_Tham0 404 STRING_Tai_Viet0 405 STRING_Tamil0 406 STRING_Telugu0 407 STRING_Thaana0 408 STRING_Thai0 409 STRING_Tibetan0 410 STRING_Tifinagh0 411 STRING_Ugaritic0 412 STRING_Vai0 413 STRING_Xan0 414 STRING_Xps0 415 STRING_Xsp0 416 STRING_Xwd0 417 STRING_Yi0 418 STRING_Z0 419 STRING_Zl0 420 STRING_Zp0 421 STRING_Zs0; 422 423 const ucp_type_table PRIV(utt)[] = { 424 { 0, PT_ANY, 0 }, 425 { 4, PT_SC, ucp_Arabic }, 426 { 11, PT_SC, ucp_Armenian }, 427 { 20, PT_SC, ucp_Avestan }, 428 { 28, PT_SC, ucp_Balinese }, 429 { 37, PT_SC, ucp_Bamum }, 430 { 43, PT_SC, ucp_Batak }, 431 { 49, PT_SC, ucp_Bengali }, 432 { 57, PT_SC, ucp_Bopomofo }, 433 { 66, PT_SC, ucp_Brahmi }, 434 { 73, PT_SC, ucp_Braille }, 435 { 81, PT_SC, ucp_Buginese }, 436 { 90, PT_SC, ucp_Buhid }, 437 { 96, PT_GC, ucp_C }, 438 { 98, PT_SC, ucp_Canadian_Aboriginal }, 439 { 118, PT_SC, ucp_Carian }, 440 { 125, PT_PC, ucp_Cc }, 441 { 128, PT_PC, ucp_Cf }, 442 { 131, PT_SC, ucp_Cham }, 443 { 136, PT_SC, ucp_Cherokee }, 444 { 145, PT_PC, ucp_Cn }, 445 { 148, PT_PC, ucp_Co }, 446 { 151, PT_SC, ucp_Common }, 447 { 158, PT_SC, ucp_Coptic }, 448 { 165, PT_PC, ucp_Cs }, 449 { 168, PT_SC, ucp_Cuneiform }, 450 { 178, PT_SC, ucp_Cypriot }, 451 { 186, PT_SC, ucp_Cyrillic }, 452 { 195, PT_SC, ucp_Deseret }, 453 { 203, PT_SC, ucp_Devanagari }, 454 { 214, PT_SC, ucp_Egyptian_Hieroglyphs }, 455 { 235, PT_SC, ucp_Ethiopic }, 456 { 244, PT_SC, ucp_Georgian }, 457 { 253, PT_SC, ucp_Glagolitic }, 458 { 264, PT_SC, ucp_Gothic }, 459 { 271, PT_SC, ucp_Greek }, 460 { 277, PT_SC, ucp_Gujarati }, 461 { 286, PT_SC, ucp_Gurmukhi }, 462 { 295, PT_SC, ucp_Han }, 463 { 299, PT_SC, ucp_Hangul }, 464 { 306, PT_SC, ucp_Hanunoo }, 465 { 314, PT_SC, ucp_Hebrew }, 466 { 321, PT_SC, ucp_Hiragana }, 467 { 330, PT_SC, ucp_Imperial_Aramaic }, 468 { 347, PT_SC, ucp_Inherited }, 469 { 357, PT_SC, ucp_Inscriptional_Pahlavi }, 470 { 379, PT_SC, ucp_Inscriptional_Parthian }, 471 { 402, PT_SC, ucp_Javanese }, 472 { 411, PT_SC, ucp_Kaithi }, 473 { 418, PT_SC, ucp_Kannada }, 474 { 426, PT_SC, ucp_Katakana }, 475 { 435, PT_SC, ucp_Kayah_Li }, 476 { 444, PT_SC, ucp_Kharoshthi }, 477 { 455, PT_SC, ucp_Khmer }, 478 { 461, PT_GC, ucp_L }, 479 { 463, PT_LAMP, 0 }, 480 { 466, PT_SC, ucp_Lao }, 481 { 470, PT_SC, ucp_Latin }, 482 { 476, PT_SC, ucp_Lepcha }, 483 { 483, PT_SC, ucp_Limbu }, 484 { 489, PT_SC, ucp_Linear_B }, 485 { 498, PT_SC, ucp_Lisu }, 486 { 503, PT_PC, ucp_Ll }, 487 { 506, PT_PC, ucp_Lm }, 488 { 509, PT_PC, ucp_Lo }, 489 { 512, PT_PC, ucp_Lt }, 490 { 515, PT_PC, ucp_Lu }, 491 { 518, PT_SC, ucp_Lycian }, 492 { 525, PT_SC, ucp_Lydian }, 493 { 532, PT_GC, ucp_M }, 494 { 534, PT_SC, ucp_Malayalam }, 495 { 544, PT_SC, ucp_Mandaic }, 496 { 552, PT_PC, ucp_Mc }, 497 { 555, PT_PC, ucp_Me }, 498 { 558, PT_SC, ucp_Meetei_Mayek }, 499 { 571, PT_PC, ucp_Mn }, 500 { 574, PT_SC, ucp_Mongolian }, 501 { 584, PT_SC, ucp_Myanmar }, 502 { 592, PT_GC, ucp_N }, 503 { 594, PT_PC, ucp_Nd }, 504 { 597, PT_SC, ucp_New_Tai_Lue }, 505 { 609, PT_SC, ucp_Nko }, 506 { 613, PT_PC, ucp_Nl }, 507 { 616, PT_PC, ucp_No }, 508 { 619, PT_SC, ucp_Ogham }, 509 { 625, PT_SC, ucp_Ol_Chiki }, 510 { 634, PT_SC, ucp_Old_Italic }, 511 { 645, PT_SC, ucp_Old_Persian }, 512 { 657, PT_SC, ucp_Old_South_Arabian }, 513 { 675, PT_SC, ucp_Old_Turkic }, 514 { 686, PT_SC, ucp_Oriya }, 515 { 692, PT_SC, ucp_Osmanya }, 516 { 700, PT_GC, ucp_P }, 517 { 702, PT_PC, ucp_Pc }, 518 { 705, PT_PC, ucp_Pd }, 519 { 708, PT_PC, ucp_Pe }, 520 { 711, PT_PC, ucp_Pf }, 521 { 714, PT_SC, ucp_Phags_Pa }, 522 { 723, PT_SC, ucp_Phoenician }, 523 { 734, PT_PC, ucp_Pi }, 524 { 737, PT_PC, ucp_Po }, 525 { 740, PT_PC, ucp_Ps }, 526 { 743, PT_SC, ucp_Rejang }, 527 { 750, PT_SC, ucp_Runic }, 528 { 756, PT_GC, ucp_S }, 529 { 758, PT_SC, ucp_Samaritan }, 530 { 768, PT_SC, ucp_Saurashtra }, 531 { 779, PT_PC, ucp_Sc }, 532 { 782, PT_SC, ucp_Shavian }, 533 { 790, PT_SC, ucp_Sinhala }, 534 { 798, PT_PC, ucp_Sk }, 535 { 801, PT_PC, ucp_Sm }, 536 { 804, PT_PC, ucp_So }, 537 { 807, PT_SC, ucp_Sundanese }, 538 { 817, PT_SC, ucp_Syloti_Nagri }, 539 { 830, PT_SC, ucp_Syriac }, 540 { 837, PT_SC, ucp_Tagalog }, 541 { 845, PT_SC, ucp_Tagbanwa }, 542 { 854, PT_SC, ucp_Tai_Le }, 543 { 861, PT_SC, ucp_Tai_Tham }, 544 { 870, PT_SC, ucp_Tai_Viet }, 545 { 879, PT_SC, ucp_Tamil }, 546 { 885, PT_SC, ucp_Telugu }, 547 { 892, PT_SC, ucp_Thaana }, 548 { 899, PT_SC, ucp_Thai }, 549 { 904, PT_SC, ucp_Tibetan }, 550 { 912, PT_SC, ucp_Tifinagh }, 551 { 921, PT_SC, ucp_Ugaritic }, 552 { 930, PT_SC, ucp_Vai }, 553 { 934, PT_ALNUM, 0 }, 554 { 938, PT_PXSPACE, 0 }, 555 { 942, PT_SPACE, 0 }, 556 { 946, PT_WORD, 0 }, 557 { 950, PT_SC, ucp_Yi }, 558 { 953, PT_GC, ucp_Z }, 559 { 955, PT_PC, ucp_Zl }, 560 { 958, PT_PC, ucp_Zp }, 561 { 961, PT_PC, ucp_Zs } 562 }; 563 564 const int PRIV(utt_size) = sizeof(PRIV(utt)) / sizeof(ucp_type_table); 565 566 #endif /* SUPPORT_UTF */ 567 568 /* End of pcre_tables.c */ Properties Name Value svn:eol-style native svn:keywords "Author Date Id Revision Url"   ViewVC Help Powered by ViewVC 1.1.5  
__label__pos
0.95788
19 minute read Spark Certification Study Guide - Part 1 (Core) While studying for the Apache Spark 2.4 Certified Developer exam and going through various resources available online, I thought it'd be worthwhile to put together a comprehensive knowledge base that covers the entire syllabus end-to-end, serving as a Study Guide for myself and hopefully others. Associate Developer for Apache Spark 2.4 Associate Developer for Apache Spark 2.4 Note that I used inspiration from the Spark Code Review guide - but whereas that covers a subset of the coding aspects only, I aimed for this to be more of a comprehensive, one stop resource geared towards passing the exam. Awesome Resources/References used throughout this guide References Other Resources PySpark Cheatshet PySpark Cheatshet Spark Architecture Components Spark Basic Architecture A cluster, or group of machines, pools the resources of many machines together allowing us to use all the cumulative resources as if they were one. Now a group of machines sitting somewhere alone is not powerful, you need a framework to coordinate work across them. Spark is a tailor-made engine exactly for this, managing and coordinating the execution of tasks on data across a cluster of computers. The cluster of machines that Spark will leverage to execute tasks will be managed by a cluster manager like Spark’s Standalone cluster manager, YARN - Yet Another Resource Negotiator, or Mesos. We then submit Spark Applications to these cluster managers which will grant resources to our application so that we can complete our work. Spark Applications Spark Basic Architecture Spark Basic Architecture Spark Applications consist of a driver process and a set of executor processes. In the illustration we see above, our driver is on the left and four executors on the right. What is a JVM? The JVM manages system memory and provides a portable execution environment for Java-based applications Technical definition: The JVM is the specification for a software program that executes code and provides the runtime environment for that code. Everyday definition: The JVM is how we run our Java programs. We configure the JVM's settings and then rely on it to manage program resources during execution. The Java Virtual Machine (JVM) is a program whose purpose is to execute other programs. JVM JVM The JVM has two primary functions: 1. To allow Java programs to run on any device or operating system (known as the "Write once, run anywhere" principle) 2. To manage and optimize program memory JVM view of the Spark Cluster: Drivers, Executors, Slots & Tasks The Spark runtime architecture leverages JVMs: Spark Physical Cluster & Slots Spark Physical Cluster & Slots And a slightly more detailed view: Granular view of Spark Physical Cluster & Slots Granular view of Spark Physical Cluster & Slots Elements of a Spark application are in blue boxes and an application’s tasks running inside task slots are labeled with a “T”. Unoccupied task slots are in white boxes. Responsibilities of the client process component The client process starts the driver program. For example, the client process can be a spark-submit script for running applications, a spark-shell script, or a custom application using Spark API (like this Databricks GUI - Graphics User Interface). The client process prepares the classpath and all configuration options for the Spark application. It also passes application arguments, if any, to the application running inside the driver. Driver The driver orchestrates and monitors execution of a Spark application. There’s always one driver per Spark application. You can think of the driver as a wrapper around the application. The driver process runs our main() function, sits on a node in the cluster, and is responsible for: 1. Maintaining information about the Spark Application 2. Responding to a user’s program or input 3. Requesting memory and CPU resources from cluster managers 4. Breaking application logic into stages and tasks 5. Sending tasks to executors 6. Collecting the results from the executors The driver process is absolutely essential - it’s the heart of a Spark Application and maintains all relevant information during the lifetime of the application. • The Driver is the JVM in which our application runs. • The secret to Spark's awesome performance is parallelism: • Scaling vertically (i.e. making a single computer more powerful by adding physical hardware) is limited to a finite amount of RAM, Threads and CPU speeds, due to the nature of motherboards having limited physical slots in Data Centers/Desktops. • Scaling horizontally (i.e. throwing more identical machines into the Cluster) means we can simply add new "nodes" to the cluster almost endlessly, because a Data Center can theoretically have an interconnected number of ~infinite machines • We parallelize at two levels: • The first level of parallelization is the Executor - a JVM running on a node, typically, one executor instance per node. • The second level of parallelization is the Slot - the number of which is determined by the number of cores and CPUs of each node/executor. Executor The executors are responsible for actually executing the work that the driver assigns them. This means, each executor is responsible for only two things: 1. Executing code assigned to it by the driver 2. Reporting the state of the computation, on that executor, back to the driver node Cores/Slots/Threads • Each Executor has a number of Slots to which parallelized Tasks can be assigned to it by the Driver. • So for example: • If we have 3 identical home desktops (nodes) hooked up together in a LAN (like through your home router), each with i7 processors (8 cores), then that's a 3 node Cluster: • 1 Driver node • 2 Executor nodes • The 8 cores per Executor node means 8 Slots, meaning the driver can assign each executor up to 8 Tasks • The idea is, an i7 CPU Core is manufactured by Intel such that it is capable of executing it's own Task independent of the other Cores, so 8 Cores = 8 Slots = 8 Tasks in parellel For example: the diagram below is showing 2 Core Executor nodes: Task distribution across Executors Task distribution across Executors • The JVM is naturally multithreaded, but a single JVM, such as our Driver, has a finite upper limit. • By creating Tasks, the Driver can assign units of work to Slots on each Executor for parallel execution. • Additionally, the Driver must also decide how to partition the data so that it can be distributed for parallel processing (see below). • Consequently, the Driver is assigning a Partition of data to each task - in this way each Task knows which piece of data it is to process. • Once started, each Task will fetch from the original data source (e.g. An Azure Storage Account) the Partition of data assigned to it. Example relating to Tasks, Slots and Cores You can set the number of task slots to a value two or three times (i.e. to a multiple of) the number of CPU cores. Although these task slots are often referred to as CPU cores in Spark, they’re implemented as threads that work on a physical core's thread and don’t need to correspond to the number of physical CPU cores on the machine (since different CPU manufacturer's can architect multi-threaded chips differently). In other words: • All processors of today have multiple cores (e.g. 1 CPU = 8 Cores) • Most processors of today are multi-threaded (e.g. 1 Core = 2 Threads, 8 cores = 16 Threads) • A Spark Task runs on a Slot. 1 Thread is capable of doing 1 Task at a time. To make use of all our threads on the CPU, we cleverly assign the number of Slots to correspond to a multiple of the number of Cores (which translates to multiple Threads). • By doing this, after the Driver breaks down a given command (DO STUFF FROM massive_table) into Tasks and Partitions, which are tailor-made to fit our particular Cluster Configuration (say 4 nodes - 1 driver and 3 executors, 8 cores per node, 2 threads per core). By using our Clusters at maximum efficiency like this (utilizing all available threads), we can get our massive command executed as fast as possible (given our Cluster in this case, 3*8*2 Threads --> 48 Tasks, 48 Partitions - i.e. 1 Partition per Task) • Say we don't do this, even with a 100 executor cluster, the entire burden would go to 1 executor, and the other 99 will be sitting idle - i.e. slow execution. • Or say, we instead foolishly assign 49 Tasks and 49 Partitions, the first pass would execute 48 Tasks in parallel across the executors cores (say in 10 minutes), then that 1 remaining Task in the next pass will execute on 1 core for another 10 minutes, while the rest of our 47 cores are sitting idle - meaning the whole job will take double the time at 20 minutes. This is obviously an inefficient use of our available resources, and could rather be fixed by setting the number of tasks/partitions to a multiple of the number of cores we have (in this setup - 48, 96 etc). Partitions DataFrames A DataFrame is the most common Structured API and simply represents a table of data with rows and columns. The list of columns and the types in those columns is called the schema. Example of a DataFrame schema Example of a DataFrame schema A simple analogy would be a spreadsheet with named columns. The fundamental difference is that while a spreadsheet sits on one computer in one specific location (e.g. C:\Users\raki.rahman\Documents\MyFile.csv), a Spark DataFrame can span thousands of computers. Data Partitions In order to allow every executor to perform work in parallel, Spark breaks up the data into chunks, called partitions. Physical Partitions Physical Partitions A partition is a collection of rows that sit on one physical machine in our cluster. A DataFrame’s partitions represent how the data is physically distributed across your cluster of machines during execution: • If you have one partition, Spark will only have a parallelism of one, even if you have thousands of executors. • If you have many partitions, but only one executor, Spark will still only have a parallelism of one because there is only one computation resource. An important thing to note is that with DataFrames, we do not (for the most part) manipulate partitions manually (on an individual basis). We simply specify high level transformations of data in the physical partitions and Spark determines how this work will actually execute on the cluster. Spark Execution In Spark, the highest-level unit of computation is an application. A Spark application can be used for a single batch job, an interactive session with multiple jobs, or a long-lived server continually satisfying requests. Spark application execution, alongside drivers and executors, also involves runtime concepts such as tasks, jobs, and stages. Invoking an action inside a Spark application triggers the launch of a job to fulfill it. Spark examines the dataset on which that action depends and formulates an execution plan. The execution plan assembles the dataset transformations into stages. A stage is a collection of tasks that run the same code, each on a different subset of the data. Spark Execution Model Overview of DAGSchedular DAGScheduler is the scheduling layer of Apache Spark that implements stage-oriented scheduling. It transforms a logical execution plan to a physical execution plan (using stages). DAGScheduler DAGScheduler After an action (see below) has been called, SparkContext hands over a logical plan to DAGScheduler that it in turn translates to a set of stages that are submitted as a set of tasks for execution. The fundamental concepts of DAGScheduler are jobs and stages that it tracks through internal registries and counters. Jobs A Job is a sequence of stages, triggered by an action such as count(), collect(), read() or write(). • Each parallelized action is referred to as a Job. • The results of each Job (parallelized/distributed action) is returned to the Driver from the Executor. • Depending on the work required, multiple Jobs will be required. Stages Each job that gets divided into smaller sets of tasks is a stage. A Stage is a sequence of Tasks that can all be run together - i.e. in parallel - without a shuffle. For example: using .read to read a file from disk, then runnning .filter can be done without a shuffle, so it can fit in a single stage. The number of Tasks in a Stage also depends upon the number of Partitions your datasets have. Job Stages • Each Job is broken down into Stages. • This would be analogous to building a house (the job) - attempting to do any of these steps out of order doesn't make sense: 1. Lay the foundation 2. Erect the walls 3. Add the rooms Spark Stages In other words: • A stage is a step in a physical execution plan - a physical unit of the execution plan • A stage is a set of parallel tasks - one task per partition - the blue boxes on the right of the diagram above (of an RDD that computes partial results of a function executed as part of a Spark job). • A Spark job is a computation with that computation sliced into stages • A stage is uniquely identified by id. When a stage is created, DAGScheduler increments internal counter nextStageId to track the number of stage submissions. • Each stage contains a sequence of narrow transformations (see below) that can be completed without shuffling the entire data set, separated at shuffle boundaries, i.e. where shuffle occurs. Stages are thus a result of breaking the RDD at shuffle boundaries. An inefficient example of Stages • When we shuffle data, it creates what is known as a stage boundary. • Stage boundaries represent a process bottleneck. Take for example the following transformations: C1C2 StepTransformation 1Read 2Select 3Filter 4GroupBy 5Select 6Filter 7Write Spark will break this one job into two stages (steps 1-4b and steps 4c-8): Stage #1 C1C2 StepTransformation 1Read 2Select 3Filter 4aGroupBy 1/2 4bshuffle write Stage #2 C1C2 StepTransformation 4cshuffle read 4dGroupBy 2/2 5Select 6Filter 7Write In Stage #1, Spark will create a pipeline of transformations in which the data is read into RAM (Step #1), and then perform steps #2, #3, #4a & #4b All partitions must complete Stage #1 before continuing to Stage #2 • It's not possible to Group all records across all partitions until every task is completed. • This is the point at which all the tasks (across the executor slots) must synchronize. • This creates our bottleneck. • Besides the bottleneck, this is also a significant performance hit: disk IO, network IO and more disk IO. Once the data is shuffled, we can resume execution. For Stage #2, Spark will again create a pipeline of transformations in which the shuffle data is read into RAM (Step #4c) and then perform transformations #4d, #5, #6 and finally the write action, step #7. Tasks Spark Task A task is a unit of work that is sent to the executor. Each stage has some tasks, one task per partition. The same task is done over different partitions of the RDD. In the example of Stages above, each Step is a Task. An efficient example of Stages Working Backwards* From the developer's perspective, we start with a read and conclude (in this case) with a write C1C2 StepTransformation 1Read 2Select 3Filter 4GroupBy 5Select 6Filter 7Write However, Spark starts backwards with the action (write(..) in this case). Next, it asks the question, what do I need to do first? It then proceeds to determine which transformation precedes this step until it identifies the first transformation. C1C2C3 StepTransformationDependencies 7WriteDepends on #6 6FilterDepends on #5 5SelectDepends on #4 4GroupByDepends on #3 3FilterDepends on #2 2SelectDepends on #1 1ReadFirst This would be equivalent to understanding your own lineage. • You don't ask if you are related to Genghis Khan and then work through the ancestry of all his children (5% of all people in Asia). • You start with your mother. • Then your grandmother • Then your great-grandmother • ... and so on • Until you discover you are actually related to Catherine Parr, the last queen of Henry the VIII. Why Work Backwards? Take another look at our example: • Say we've executed this once already • On the first execution, Step #4 resulted in a shuffle • Those shuffle files are on the various executors already (src & dst) • Because the transformations (or DataFrames) are immutable, no aspect of our lineage can change (meaning that DataFrame is sitting on a chunk of the executor's RAM from the last time it was calculated, ready to be referenced again). • That means the results of our previous shuffle (if still available) can be reused. C1C2C3 StepTransformationDependencies 7WriteDepends on #6 6FilterDepends on #5 5SelectDepends on #4 4GroupBy<<< shuffle 3Filterdon't care 2Selectdon't care 1Readdon't care In this case, what we end up executing is only the operations from Stage #2. This saves us the initial network read and all the transformations in Stage #1 C1C2C3 StepTransformationDependencies 1Readskipped 2Selectskipped 3Filterskipped 4aGroupBy 1/2skipped 4bshuffle writeskipped 4cshuffle read- 4dGroupBy 2/2- 5Select- 6Filter- 7Write- Spark Concepts Caching The reuse of shuffle files (aka our temp files) is just one example of Spark optimizing queries anywhere it can. We cannot assume this will be available to us. Shuffle files are by definition temporary files and will eventually be removed. However, we can cache data to explicitly to accomplish the same thing that happens inadvertently (i.e. we get lucky) with shuffle files. In this case, the lineage plays the same role. Take for example: C1C2C3 StepTransformationDependencies 7WriteDepends on #6 6FilterDepends on #5 5Select<<< cache 4GroupBy<<< shuffle files 3Filter? 2Select? 1Read? In this case we explicitly asked Spark to cache the DataFrame resulting from the select(..) in Step 5 (after the shuffle across the network due to GroupBy. As a result, we never even get to the part of the lineage that involves the shuffle, let alone Stage #1 (i.e. we skip the whole thing, making our job execute faster). Instead, we pick up with the cache and resume execution from there: C1C2C3 StepTransformationDependencies 1Readskipped 2Selectskipped 3Filterskipped 4aGroupBy 1/2skipped 4bshuffle writeskipped 4cshuffle readskipped 4dGroupBy 2/2skipped 5acache read- 5bSelect- 6Filter- 7Write- Shuffling A Shuffle refers to an operation where data is re-partitioned across a Cluster - i.e. when data needs to move between executors. join and any operation that ends with ByKey will trigger a Shuffle. It is a costly operation because a lot of data can be sent via the network. For example, to group by color, it will serve us best if... • All the reds are in one partitions • All the blues are in a second partition • All the greens are in a third From there we can easily sum/count/average all of the reds, blues, and greens. To carry out the shuffle operation Spark needs to • Convert the data to the UnsafeRow (if it isn't already), commonly refered to as Tungsten Binary Format. • Tungsten is a new Spark SQL component that provides more efficient Spark operations by working directly at the byte level. • Includes specialized in-memory data structures tuned for the type of operations required by Spark • Improved code generation, and a specialized wire protocol. • Write that data to disk on the local node - at this point the slot is free for the next task. • Send that data across the network to another executor • Driver decides which executor gets which partition of the data. • Then the executor pulls the data it needs from the other executor's shuffle files. • Copy the data back into RAM on the new executor • The concept, if not the action, is just like the initial read "every" DataFrame starts with. • The main difference being it's the 2nd+ stage. This amounts to a free cache from what is effectively temp files. Partitioning A Partition is a logical chunk of your DataFrame Data is split into Partitions so that each Executor can operate on a single part, enabling parallelization. It can be processed by a single Executor core/thread. For example: If you have 4 data partitions and you have 4 executor cores/threads, you can process everything in parallel, in a single pass. DataFrame Transformations vs. Actions vs. Operations Spark allows two distinct kinds of operations by the user: transformations and actions. Transformations - Overview Transformations are operations that will not be completed at the time you write and execute the code in a cell (they're lazy) - they will only get executed once you have called an action. An example of a transformation might be to convert an integer into a float or to filter a set of values: i.e. they can be procrastinated and don't have to be done right now - but later after we have a full view of the task at hand. Here's an analogy: • Let's say you're cleaning your closet, and want to donate clothes that don't fit (there's a lot of these starting from childhood days), and sort out and store the rest by color before storing in your closet. • If you're inefficient, you could sort out all the clothes by color (let's say that takes 60 minutes), then from there pick the ones that fit (5 minutes), and then take the rest and put it into one big plastic bag for donation (where all that sorting effort you did went to waste because it's all jumbled up in the same plastic bag now anyway) • If you're efficient, you'd first pick out clothes that fit very quickly (5 minutes), then sort those into colors (10 minutes), and then take the rest and put it into one big plastic bag for donation (where there's no wasted effort) In other words, by evaluating the full view of the job at hand, and by being lazy (not in the traditional sense - but in the smart way by not eagerly sorting everything by color for no reason), you were able to achieve the same goal in 15 minutes vs 65 minutes (clothes that fit are sorted by color in the closet, clothes that don' fit are in plastic bag). Actions - Overview Actions are commands that are computed by Spark right at the time of their execution (they're eager). They consist of running all of the previous transformations in order to get back an actual result. An action is composed of one or more jobs which consists of tasks that will be executed by the executor slots in parallel - i.e. a stage - where possible. Here are some simple examples of transformations and actions. Examples of transformations and actions Examples of transformations and actions Spark pipelines a computation as we can see in the image below. This means that certain computations can all be performed at once (like a map and a filter) rather than having to do one operation for all pieces of data, and then the following operation. Example of a Spark Pipeline Example of a Spark Pipeline Why is Laziness So Important? It has a number of benefits: • Not forced to load all data at step #1 • Technically impossible with REALLY large datasets. • Easier to parallelize operations • N different transformations can be processed on a single data element, on a single thread, on a single machine. • Most importantly, it allows the framework to automatically apply various optimizations Actions Transformations always return a DataFrame. In contrast, Actions either return a result or write to disk. For example: • The number of records in the case of count() • An array of objects in the case of collect() or take(n) We've seen a good number of the actions - most of them are listed below. For the complete list, one needs to review the API docs. C1C2C3 MethodReturnDescription collect()CollectionReturns an array that contains all of Rows in this Dataset. count()LongReturns the number of rows in the Dataset. first()RowReturns the first row. foreach(f)-Applies a function f to all rows. foreachPartition(f)-Applies a function f to each partition of this Dataset. head()RowReturns the first row. reduce(f)RowReduces the elements of this Dataset using the specified binary function. show(..)-Displays the top 20 rows of Dataset in a tabular form. take(n)CollectionReturns the first n rows in the Dataset. toLocalIterator()IteratorReturn an iterator that contains all of Rows in this Dataset. Transformations Transformations have the following key characteristics: • They eventually return another DataFrame. • DataFrames are immutable - that is each instance of a DataFrame cannot be altered once it's instantiated. • This means other optimizations are possible - such as the use of shuffle files (see below) • Are classified as either a Wide or Narrow transformation Pipelining Operations Example of a Spark Pipeline Example of a Spark Pipeline • Pipelining is the idea of executing as many operations as possible on a single partition of data. • Once a single partition of data is read into RAM, Spark will combine as many narrow operations as it can into a single task • Wide operations force a shuffle, conclude, a stage and end a pipeline. • Compare to MapReduce where: - Data is read from disk • A single transformation takes place • Data is written to disk • Repeat steps 1-3 until all transformations are completed • By avoiding all the extra network and disk IO, Spark can easily out perform traditional MapReduce applications. Wide vs. Narrow Transformations Regardless of language, transformations break down into two broad categories: wide and narrow. Narrow Transformations The data required to compute the records in a single partition reside in at most one partition of the parent RDD. Examples include: • filter(..) • drop(..) • coalesce() Narrow Transformations Wide Transformations The data required to compute the records in a single partition may reside in many partitions of the parent RDD. Examples include: • distinct() • groupBy(..).sum() • repartition(n) Wide Transformations High-level Cluster Configuration Spark can run in: • local mode (on your laptop) • inside Spark standalone, YARN, and Mesos clusters. Although Spark runs on all of them, one might be more applicable for your environment and use cases. In this section, you’ll find the pros and cons of each cluster type. Spark local modes Spark local mode and Spark local cluster mode are special cases of a Spark standalone cluster running on a single machine. Because these cluster types are easy to set up and use, they’re convenient for quick tests, but they shouldn’t be used in a production environment. Furthermore, in these local modes, the workload isn’t distributed, and it creates the resource restrictions of a single machine and suboptimal performance. True high availability isn’t possible on a single machine, either. Spark standalone cluster A Spark standalone cluster is a Spark-specific cluster. Because a standalone cluster is built specifically for Spark applications, it doesn’t support communication with an HDFS secured with Kerberos authentication protocol. If you need that kind of security, use YARN for running Spark. YARN cluster YARN is Hadoop’s resource manager and execution system. It’s also known as MapReduce 2 because it superseded the MapReduce engine in Hadoop 1 that supported only MapReduce jobs. Running Spark on YARN has several advantages: • Many organizations already have YARN clusters of a significant size, along with the technical know-how, tools, and procedures for managing and monitoring them. • Furthermore, YARN lets you run different types of Java applications, not only Spark, and you can mix legacy Hadoop and Spark applications with ease. • YARN also provides methods for isolating and prioritizing applications among users and organizations, a functionality the standalone cluster doesn’t have. • It’s the only cluster type that supports Kerberos-secured HDFS. • Another advantage of YARN over the standalone cluster is that you don’t have to install Spark on every node in the cluster. Mesos cluster Mesos is a scalable and fault-tolerant “distributed systems kernel” written in C++. Running Spark in a Mesos cluster also has its advantages. Unlike YARN, Mesos also supports C++ and Python applications, and unlike YARN and a standalone Spark cluster that only schedules memory, Mesos provides scheduling of other types of resources (for example, CPU, disk space and ports), although these additional resources aren’t used by Spark currently. Mesos has some additional options for job scheduling that other cluster types don’t have (for example, fine-grained mode). And, Mesos is a “scheduler of scheduler frameworks” because of its two-level scheduling architecture. The jury’s still out on which is better: YARN or Mesos; but now, with the Myriad project, you can run YARN on top of Mesos to solve the dilemma. Get in touch 👋 If you have any questions or suggestions, feel free to open an issue on GitHub! © 2023 Raki Rahman.
__label__pos
0.778337
Cognitive Behavior Therapy (CBT) / Hypnotherapy. Another alternative treatment option worth considering is Cognitive Behavior Therapy (CBT), which is often simply referred to as hypnotherapy. The goal of CBT is to help lower any anxiety, anger or depression you are feeling toward your tinnitus, as well as to help retrain your brain to notice the ringing in your ears less. CBT is typically used in conjunction with sound stimulation therapies, like Neuromonics or Transcranial Magnetic Stimulation (TRT). When choosing your therapist, be sure they not only do they have previous experience working with patients with tinnitus, but also have Neural Linguistic Programming (NLP) training. Some instances of tinnitus are caused by infections or blockages in the ear, and the tinnitus can disappear once the underlying cause is treated. Frequently, however, tinnitus continues after the underlying condition is treated. In such a case, other therapies -- both conventional and alternative -- may bring significant relief by either decreasing or covering up the unwanted sound. Luckily, many can live with their tinnitus as it may only occur occasionally and/or is relatively quiet, but for some the tinnitus is so bothersome, severe and intense that it negatively influences their daily life to a very large extend. For those people, it is very natural to look for a cure that can make the tinnitus go away - or at least reduce it.  Sound therapy can be effective in treating tinnitus because it may make the tinnitus less noticeable or mask the tinnitus or fade tinnitus. Hearing aids are included as a critical component of a sound therapy program. Modern hearing aids come with a special tinnitus managing sounds along with digital amplification. They are much evolved over the older technology. Different products work in different ways, although most hearing aids can alleviate tinnitus, certain hearing aids have built-in technology specifically for tinnitus relief. At amplifon, we have a clearly defined way to measure and quantify chronic tinnitus. As per the severity of the problem, an appropriate combination of treatment methods is selected to deal with your tinnitus. Amplifon audiologists are specially trained in counselling procedures as well which is another critical element of sound therapy. Consult your Amplifon audiologist to find more details about what suits you to deal with your tinnitus problem. Changing Prescriptions, OTC Medications and Food Additives. Sometimes the cause of tinnitus is a prescription (such as an antibiotic), an over the counter medication or a food additive. As an example, two very common prescriptions that have been shown to cause tinnitus are quinine and chloroquine, which are both used to prevent malaria. Certain diuretics and cancer medications can also cause tinnitus. Even something as simple as OTC aspirin can generate tinnitus in some people. The food additives NutraSweet, Splenda and Aspartame have all been linked to tinnitus, and a whole host of other side effects, in clinical studies. These man-made food additives should be eliminated from your diet completely. If any of your medications are causing your tinnitus, your doctor may recommend stopping, reducing or switching them out for other medicines to see if that helps cure your tinnitus. The exact biological process by which hearing loss is associated with tinnitus is still being investigated by researchers. However, we do know that the loss of certain sound frequencies leads to specific changes in how the brain processes sound. In short, as the brain receives less external stimuli around a specific frequency, it begins to adapt and change. Tinnitus may be the brain’s way of filling in the missing sound frequencies it no longer receives from the auditory system. Cognitive behavioral therapy (CBT). CBT uses techniques such as cognitive restructuring and relaxation to change the way patients think about and respond to tinnitus. Patients usually keep a diary and perform "homework" to help build their coping skills. Therapy is generally short-term — for example, weekly sessions for two to six months. A 2010 review of six studies by the Cochrane Collaboration (an international group of health authorities who evaluate randomized trials) found that after CBT, the sound was no less loud, but it was significantly less bothersome, and patients' quality of life improved. Millions of Americans experience tinnitus, often to a debilitating degree, making it one of the most common health conditions in the country. The U.S. Centers for Disease Control estimates that nearly 15% of the general public — over 50 million Americans — experience some form of tinnitus. Roughly 20 million people struggle with burdensome chronic tinnitus, while 2 million have extreme and debilitating cases.1 ×
__label__pos
0.851384
Your browser doesn't support javascript. loading Show: 20 | 50 | 100 Results 1 - 1 de 1 Filter Add filters Language Year range 1. Chinese Journal of Biotechnology ; (12): 1145-1157, 2017. Article in Chinese | WPRIM | ID: wpr-242242 ABSTRACT Unlike cerebrospinal fluid or blood, urine accumulates metabolic changes of the body and has the potential to be a promising source of early biomarkers discovery. Bacterial meningitis is a major cause of illness among neonates and children worldwide. In this study, we used Escherichia coli-injected rat model to mimic meningitis and collected urine samples on day 1 and day 3. We used two different methods to digest proteins and analyzed peptides by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS). We identified 17 and 20 differential proteins by two methods respectively on day 1, and 5 differential proteins by filter-aided digestion method on day 3. Finding these differential proteins laid a foundation to further explore biomarkers of bacterial meningitis. SELECTION OF CITATIONS SEARCH DETAIL
__label__pos
0.548644
selector.h 3.18 KB Newer Older Pierre Kraemer's avatar Pierre Kraemer committed 1 2 3 /******************************************************************************* * CGoGN: Combinatorial and Geometric modeling with Generic N-dimensional Maps * * version 0.1 * 4 * Copyright (C) 2009-2012, IGG Team, LSIIT, University of Strasbourg * Pierre Kraemer's avatar Pierre Kraemer committed 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 * * * This library is free software; you can redistribute it and/or modify it * * under the terms of the GNU Lesser General Public License as published by the * * Free Software Foundation; either version 2.1 of the License, or (at your * * option) any later version. * * * * This library is distributed in the hope that it will be useful, but WITHOUT * * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License * * for more details. * * * * You should have received a copy of the GNU Lesser General Public License * * along with this library; if not, write to the Free Software Foundation, * * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * * * 20 * Web site: http://cgogn.unistra.fr/ * Pierre Kraemer's avatar Pierre Kraemer committed 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 * Contact information: [email protected] * * * *******************************************************************************/ #ifndef __SELECTOR_H__ #define __SELECTOR_H__ namespace CGoGN { namespace Algo { namespace Decimation { enum SelectorType { 39 S_MapOrder = 0, Pierre Kraemer's avatar Pierre Kraemer committed 40 41 42 S_Random, S_EdgeLength, S_QEM, 43 S_QEMml, Pierre Kraemer's avatar Pierre Kraemer committed 44 45 S_MinDetail, S_Curvature, 46 S_ColorNaive, 47 S_QEMextColor, 48 S_Lightfield, 49 // note: the following "h" prefix means that half-edges are prioritized instead of edges. 50 S_hQEMml Pierre Kraemer's avatar Pierre Kraemer committed 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 } ; template <typename PFP> class ApproximatorGen ; template <typename PFP, typename T> class Approximator ; template <typename PFP> class EdgeSelector { public: typedef typename PFP::MAP MAP ; typedef typename PFP::VEC3 VEC3 ; typedef typename PFP::REAL REAL ; protected: MAP& m_map ; 66 VertexAttribute<typename PFP::VEC3>& m_position ; Pierre Kraemer's avatar Pierre Kraemer committed 67 68 69 70 std::vector<ApproximatorGen<PFP>*>& m_approximators ; const FunctorSelect& m_select ; public: 71 EdgeSelector(MAP& m, VertexAttribute<typename PFP::VEC3>& pos, std::vector<ApproximatorGen<PFP>*>& approx, const FunctorSelect& select) : Pierre Kraemer's avatar Pierre Kraemer committed 72 73 74 75 76 77 78 79 80 m_map(m), m_position(pos), m_approximators(approx), m_select(select) {} virtual ~EdgeSelector() {} virtual SelectorType getType() = 0 ; virtual bool init() = 0 ; virtual bool nextEdge(Dart& d) = 0 ; virtual void updateBeforeCollapse(Dart d) = 0 ; virtual void updateAfterCollapse(Dart d2, Dart dd2) = 0 ; untereiner's avatar untereiner committed 81 82 virtual bool nextEdgeWithoutUpdates(Dart& d) = 0; Pierre Kraemer's avatar Pierre Kraemer committed 83 84 85 86 87 88 89 90 91 } ; } // namespace Decimation } // namespace Algo } // namespace CGoGN #endif
__label__pos
0.829151
Create Incremental Count and Reset Counter for Field Change in Access Anthony6890 Anthony6890 used Ask the Experts™ on Hi, I'm trying to figure out a way of adding a row count to a query that adds a sequential row number for each change in a subsequent field. For example, let says I have a table of values where the employee ID is the main lookup value.  That value is linked to a dependent to determine who the dependent is.  I'm making a table with this data that lists the employee's number followed by the dependent's ID number.  I want the dependent's to become numbered, 1,2,3, and etc until the employee's ID number changes.  I then want the counter to reset.  Is there a way that I can accomplish this? Here is an example of what I am looking for... Employee_ID                   Dependent_ID                  Dep_Num ABC123                             321zax                               1 ABC123                             221zax                               2 ABC123                             721zax                               3 GHI555                              899tti                                 1 Does anyone know how I can accomplish this? -Anthony Comment Watch Question Do more with Expert Office EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE® Top Expert 2016 Commented: using a query SELECT Table1.Employee_ID, Table1.Dependent_ID, (select count (*) from table1 as T where T.Employee_ID=Table1.Employee_ID and T.Dependent_ID<=Table1.Dependent_ID) AS Dep_Num FROM Table1 ORDER BY Table1.Employee_ID, Table1.Dependent_ID; Paul Cook-GilesSenior Application Developer Commented: Use the DCount() function to count the rows where the EmployeeID is the same as the current row's EmployeeID and the DependantID is greater than the the current row's DependantID, and then add 1 to the result so you don't have any Dep_Num fields returning a zero.   SELECT Employee_ID, Dependant_ID, DCount("Dependant_ID","TempDemoIncrementerTb","Employee_ID = '" & [Employee_ID] & "' and Dependant_ID > '" & [Dependant_ID] & "'")+1 AS Dep_Num FROM tempDemoIncrementerTb; If you're not familiar with the SQL view of a query, build it as you normally would, adding EmployeeID and DependantID to the grid, and then paste  Dep_Num:  DCount("Dependant_ID","TempDemoIncrementerTb","Employee_ID = '" & [Employee_ID] & "' and Dependant_ID > '" & [Dependant_ID] & "'")+1 into the third column. The DCount()  ("Domain Count")  function has three arguments:  Expression, Domain, Criteria.  The first argument is what you are counting, the second is where it is being counted, and the third is the criteria that determines whether an Expression is included in the count.  (The critieria argument is the equivalent of the Where statement in SQL.)  In this example, we are concatenating references to the data fields in the domain as part of the criteria string;  when the expression is compiled, the criteria statement becomes "Employee_ID = 'ABC123' and Dependant_ID > '321zax')+1". Note that you have to bracket the  [Employee_ID]  and  [Dependant_ID] with single quotes, because their values are text;  if their values were numeric, the single quotes would not be needed. Dale FyeOwner, Dev-Soln LLC Most Valuable Expert 2014 Top Expert 2010 Commented: DCOUNT is extremely slow when used in a query, so I would warn you against using that technique, as is the nested subquery technique provided by Rey. What are you using this for, is it a report or do you want to display it in a form?  If displaying it in a form, do you want the form to be editable or simply use the form to view the data? Ensure you’re charging the right price for your IT Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now! Author Commented: Hi everyone, I haven't been back at my desk yet to try each suggestion, but I will be able to in a couple of hours. Dale, I'm trying to use this in a table.  I have an append query that outputs the results to a table that can then be used by other people for data manipulation purposes.  The query writes out the depends information and I need this increment number to be appended as well. I had a count function; however, that wasn't producing consistent results. Top Expert 2016 Commented: did you try the query I posted? storing calculated values is not advisable. Author Commented: Hi Rey, I haven't tried it yet, but I will. Just give me a little time and I'll let you know the results. Paul Cook-GilesSenior Application Developer Commented: You might consider adding Dep_Num as a field in your table, and run an update query to repopulate it each time the data changes;  that way your users wouldn't have to run DCount as part of their query, and you'd avoid the potential latency mentioned by Dale. Paul Cook-GilesSenior Application Developer Commented: Rey, I would ordinarily agree that storing calculation results is not a good idea.  But there are cases --like this one, where users are connecting to a data store to read static values-- where it is a good way to reduce latency. Top Expert 2016 Commented: you can always use the query to extract updated information instead of getting the info from the table. Distinguished Expert 2017 Commented: As Rey mentioned, storing a calculated value is not advisable and using DCount() to determine the next available number makes a very dangerous assumption.  That being that no child record can ever be deleted, even if it was entered in error.  Rey's first suggestion, counts the records on the fly and assigns a sequence number.  Although this method might result in different children being assigned the same number in different exports.  If you are going to assign a sequence number on the fly, you need to use something ti force the recordset into the same order each time.  Perhaps descending by DOB or ascending by autonumber to at least always return the dependents in the same order. In relational database theory, recordsets (tables/queries) are unordered sets.  That means that the database engine might return the rows in a different order at a different time unless you expressly sort them using an Order By Clause. Access fools people into thinking that records don't move once they are added to a table but they can if you update them and the record becomes too big to place back where it was originally.  One of the jobs of the Compact tool is to reorder every table into primary key sequence so tables that got moved out of order, generally get put back in line after a Compact.  But you cannot ever rely on consistent order unless you sort the recordset so always make it a practice to do that when you need  to rely on a specific order or want the order to remain consistent. Top Expert 2016 Commented: the query  was created based on the information posted. it can be altered accordingly if there are more pertinent information provided, such  as date of birth or any historical or hierarchical information. Author Commented: Hi Everyone, I originally had a module that I found on the internet to do what I detailed above.  The problem I ran into was that sometimes when the below function would run, it would not sequence the people at each change in employee ID change.  At times, it would make two dependents a 1, when they should be a 1 and then a 2.  Pat made me realize that I had to add an order by to my original query and that would allow the function to run correctly.   Paul, I appreciate your suggestion; however, I couldn't get it to work correctly. Rey, yours might have also worked; however, upon reading Pat's post it made sense.   Here is the function that I use... Option Compare Database Global EmpNum As String Global GBL_Icount As Long Public Function increment(ivalue As String) As Long If Nz(EmpNum, "zzzzzzzzz") = ivalue Then GBL_Icount = GBL_Icount + 1 Else EmpNum = ivalue GBL_Icount = 1 End If increment = GBL_Icount End Function Open in new window I then call this function in the query and it works like a charm after I added an order by to the employee ID. DEPCOUNT: increment([EMPID]) Thanks everyone for your help on this, but the solution was in front of my eye.  I just needed more guidance to finish it. -Anthony Author Commented: Pat allowed me to review my current query and just add a parameter and the original function now works perfectly.   Everyone offered great solutions; however, the added work to get them to work didn't compete with the simple fix of the original query. Dale FyeOwner, Dev-Soln LLC Most Valuable Expert 2014 Top Expert 2010 Commented: I actually use a function to do this, but only if I'm dumping the info into a temp table.  The function looks like: Public Function fnRank(Reset As Boolean, ParamArray FieldValues() As Variant) As Integer Static myRank As Long Static myArray() As Variant Dim intLoop As Integer Dim bIdentical As Boolean If (Reset = True) Then ReDim myArray(UBound(FieldValues)) End If bIdentical = True For intLoop = LBound(FieldValues) To UBound(FieldValues) If (bIdentical = True) And (myArray(intLoop) = FieldValues(intLoop)) Then 'do nothing Else bIdentical = False myArray(intLoop) = FieldValues(intLoop) End If Next If bIdentical = False Then myRank = 0 myRank = myRank + 1 fnRank = myRank End Function Open in new window This function will run amazingly quickly (compared to the other methods mentioned above) and will accomodate as many fields as you choose to use in your ranking function. And you would use it like: 1.  First you need to call it setting the first argument (Reset) = True and then passing in a value for each of the fields you want to use in the ranking feature.  Since the parameter array and the static array in the function are variants, you don't even need to worry about the values you pass in, just make sure you pass in a value for each column you will pass into the function in your query.  I generally call to this just before running my query. 2.  Then, you would call this as your Rank column in your query, something like the following.  In this case, we want to rank employee dependents based on their DOB, so we use an order by clause that includes both of those fields, but we only need to pass the function the EmployeeID, because we want to reset the rank  whenever the EmployeeID changes. SELECT EmployeeID, DependentID, fnRank(0, [EmployeeID]) as Rank FROM yourTable Order by EmployeeID, DOB Open in new window The down side of this technique, is that if you scroll up through the query result set, you will see that the Rank column continues to get recomputed as records move into the set of records which are visible in the query results.  So, if you scroll up, the numbers get screwed up.  To avoid this, I create a Rank table (tblRanks) and actually insert the rank values into that table, along with the unique PK value that identifies each record, something like: currentdb.execute "DELETE * FROM tblRanks", dbfailonerror fnRank -1, 0 'This resets the length of the array stored in the function strSQL = "INSERT INTO tblRanks (PKID, Rank) " _ & "SELECT ID, fnRank(0, [EmployeeID]) as Rank " _ & "FROM yourTable " & "ORDER BY EmployeeID, DOB" Currentdb.Execute strsql, dbfailonerror Open in new window Then you can join tblRanks to yourTable on the PK field, something like: SELECT EmployeeID, DependentID, R.Rank FROM yourTable as T INNER JOIN tblRanks as R on T.ID = R.PKID Order by EmployeeID, DOB Open in new window If you configure tblRanks so that the PKID field is the primary key of that table, then the query shown above should be updateable. Sorry I didn't get a chance to post this earlier. HTH Dale Do more with Expert Office Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals. Start 7-Day Free Trial
__label__pos
0.639172
File:  [DragonFly] / src / share / man / man9 / bus_dma.9 Revision 1.1: download - view: text, annotated - select for diffs Thu Mar 18 00:07:53 2004 UTC (10 years, 1 month ago) by hmp Branches: MAIN CVS tags: HEAD Add manual page for the busdma(9) API. It has detailed information on the access methods of busdma and specifications for its usage. Requested by: Joerg 1: .\" Copyright (c) 2002, 2003, 2004 Hiten Pandya <[email protected]> 2: .\" All rights reserved. 3: .\" 4: .\" Redistribution and use in source and binary forms, with or without 5: .\" modification, are permitted provided that the following conditions 6: .\" are met: 7: .\" 1. Redistributions of source code must retain the above copyright 8: .\" notice, this list of conditions, and the following disclaimer, 9: .\" without modification, immediately at the beginning of the file. 10: .\" 2. The name of the author may not be used to endorse or promote products 11: .\" derived from this software without specific prior written permission. 12: .\" 13: .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 14: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 16: .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR, CONTRIBUTORS OR THE 17: .\" VOICES IN HITEN PANDYA'S HEAD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 18: .\" SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 19: .\" TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 20: .\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 21: .\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 22: .\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 23: .\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24: .\" 25: .\" Copyright (c) 1996, 1997, 1998, 2001 The NetBSD Foundation, Inc. 26: .\" All rights reserved. 27: .\" 28: .\" This code is derived from software contributed to The NetBSD Foundation 29: .\" by Jason R. Thorpe of the Numerical Aerospace Simulation Facility, 30: .\" NASA Ames Research Center. 31: .\" 32: .\" Redistribution and use in source and binary forms, with or without 33: .\" modification, are permitted provided that the following conditions 34: .\" are met: 35: .\" 1. Redistributions of source code must retain the above copyright 36: .\" notice, this list of conditions and the following disclaimer. 37: .\" 2. Redistributions in binary form must reproduce the above copyright 38: .\" notice, this list of conditions and the following disclaimer in the 39: .\" documentation and/or other materials provided with the distribution. 40: .\" 3. All advertising materials mentioning features or use of this software 41: .\" must display the following acknowledgment: 42: .\" This product includes software developed by the NetBSD 43: .\" Foundation, Inc. and its contributors. 44: .\" 4. Neither the name of The NetBSD Foundation nor the names of its 45: .\" contributors may be used to endorse or promote products derived 46: .\" from this software without specific prior written permission. 47: .\" 48: .\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 49: .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 50: .\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 51: .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 52: .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 53: .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 54: .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 55: .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 56: .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 57: .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 58: .\" POSSIBILITY OF SUCH DAMAGE. 59: .\" 60: .\" $FreeBSD: /repoman/r/ncvs/src/share/man/man9/bus_dma.9,v 1.7 2003/07/27 14:05:29 mux Exp $ 61: .\" $NetBSD: bus_dma.9,v 1.25 2002/10/14 13:43:16 wiz Exp $ 62: .\" $DragonFly: src/share/man/man9/bus_dma.9,v 1.1 2004/03/18 00:07:53 hmp Exp $ 63: .\" 64: .Dd March 17, 2004 65: .Dt BUS_DMA 9 66: .Os 67: .Sh NAME 68: .Nm bus_dma , 69: .Nm bus_dma_tag_create , 70: .Nm bus_dma_tag_destroy , 71: .Nm bus_dmamap_create , 72: .Nm bus_dmamap_destroy , 73: .Nm bus_dmamap_load , 74: .Nm bus_dmamap_load_mbuf , 75: .Nm bus_dmamap_load_uio , 76: .Nm bus_dmamap_unload , 77: .Nm bus_dmamap_sync , 78: .Nm bus_dmamem_alloc , 79: .Nm bus_dmamem_free , 80: .Nd Bus and Machine Independent DMA Mapping Interface 81: .Sh SYNOPSIS 82: .In machine/bus.h 83: .Ft int 84: .Fn bus_dma_tag_create "bus_dma_tag_t parent" "bus_size_t alignment" \ 85: "bus_size_t boundary" "bus_addr_t lowaddr" "bus_addr_t highaddr" \ 86: "bus_dma_filter_t *filtfunc" "void *filtfuncarg" "bus_size_t maxsize" \ 87: "int nsegments" "bus_size_t maxsegsz" "int flags" "bus_dma_tag_t *dmat" 88: .Ft int 89: .Fn bus_dma_tag_destroy "bus_dma_tag_t dmat" 90: .Ft int 91: .Fn bus_dmamap_create "bus_dma_tag_t dmat" "int flags" "bus_dmamap_t *mapp" 92: .Ft int 93: .Fn bus_dmamap_destroy "bus_dma_tag_t dmat" "bus_dmamap_t map" 94: .Ft int 95: .Fn bus_dmamap_load "bus_dma_tag_t dmat" "bus_dmamap_t map" "void *buf" \ 96: "bus_size_t buflen" "bus_dmamap_callback_t *callback" "void *callback_arg" \ 97: "int flags" 98: .Ft int 99: .Fn bus_dmamap_load_mbuf "bus_dma_tag_t dmat" "bus_dmamap_t map" \ 100: "struct mbuf *mbuf" "bus_dmamap_callback2_t *callback" "void *callback_arg" \ 101: "int flags" 102: .Ft int 103: .Fn bus_dmamap_load_uio "bus_dma_tag_t dmat" "bus_dmamap_t map" \ 104: "struct uio *uio" "bus_dmamap_callback2_t *callback" "void *callback_arg" \ 105: "int flags" 106: .Ft int 107: .Fn bus_dmamem_alloc "bus_dma_tag_t dmat" "void **vaddr" \ 108: "int flags" "bus_dmamap_t *mapp" 109: .Ft void 110: .Fn bus_dmamap_unload "bus_dma_tag_t dmat" "bus_dmamap_t map" 111: .Ft void 112: .Fn bus_dmamap_sync "bus_dma_tag_t dmat" "bus_dmamap_t map" \ 113: "op" 114: .Ft void 115: .Fn bus_dmamem_free "bus_dma_tag_t dmat" "void *vaddr" \ 116: "bus_dmamap_t map" 117: .Sh DESCRIPTION 118: Direct Memory Access (DMA) is a method of transferring data 119: without involving the CPU, thus providing higher performance. 120: A DMA transaction can be achieved between device to memory, 121: device to device, or memory to memory. 122: .Pp 123: The 124: .Nm 125: API is a bus, device, and machine-independent (MI) interface to 126: DMA mechanisms. 127: It provides the client with flexibility and simplicity by 128: abstracting machine dependent issues like setting up 129: DMA mappings, handling cache issues, bus specific features 130: and limitations. 131: .Sh STRUCTURES AND TYPES 132: .Bl -tag -width compact 133: .It Vt bus_dma_tag_t 134: A machine-dependent (MD) opaque type that describes the 135: characteristics of DMA transactions. 136: DMA tags are organized into a hierarchy, with each child 137: tag inheriting the restrictions of its parent. 138: This allows all devices along the path of DMA transactions 139: to contribute to the constraints of those transactions. 140: .It Vt bus_dma_filter_t 141: Client specified address filter having the format: 142: .Bl -tag -width compact 143: .It Ft int 144: .Fn "client_filter" "void *filtarg" "bus_addr_t testaddr" 145: .El 146: .sp 147: Address filters can be specified during tag creation to allow 148: for devices who's DMA address restrictions cannot be specified 149: by a single window. 150: The 151: .Fa filtarg 152: is client specified during tag creation to be passed to all 153: invocations of the callback. 154: The 155: .Fa testaddr 156: argument contains a potential starting address of a DMA mapping. 157: The filter function operates on the set of addresses from 158: .Fa testaddr 159: to 160: .Ql trunc_page(testaddr) + PAGE_SIZE - 1 , 161: inclusive. 162: The filter function should return zero for any mapping in this range 163: that can be accommodated by the device and non-zero otherwise. 164: .It Vt bus_dma_segment_t 165: A machine-dependent type that describes individual 166: DMA segments. 167: .Bd -literal 168: bus_addr_t ds_addr; 169: bus_size_t ds_len; 170: .Ed 171: .sp 172: The 173: .Fa ds_addr 174: field contains the device visible address of the DMA segment, and 175: .Fa ds_len 176: contains the length of the DMA segment. 177: Although the DMA segments returned by a mapping call will adhere to 178: all restrictions necessary for a successful DMA operation, some conversion 179: (e.g. a conversion from host byte order to the device's byte order) is 180: almost always required when presenting segment information to the device. 181: .It Vt bus_dmamap_t 182: A machine-dependent opaque type describing an individual mapping. 183: Multiple DMA maps can be associated with one DMA tag. 184: .It Vt bus_dmamap_callback_t 185: Client specified callback for receiving mapping information resulting from 186: the load of a 187: .Vt bus_dmamap_t 188: via 189: .Fn bus_dmamap_load . 190: Callbacks are of the format: 191: .Bl -tag -width compact 192: .It Ft void 193: .Fn "client_callback" "void *callback_arg" "bus_dma_segment_t *segs" \ 194: "int nseg" "int error" 195: .El 196: .sp 197: The 198: .Fa callback_arg 199: is the callback argument passed to dmamap load functions. 200: The 201: .Fa segs 202: and 203: .Fa nseg 204: parameters describe an array of 205: .Vt bus_dma_segment_t 206: structures that represent the mapping. 207: This array is only valid within the scope of the callback function. 208: The success or failure of the mapping is indicated by the 209: .Fa error 210: parameter. 211: More information on the use of callbacks can be found in the 212: description of the individual dmamap load functions. 213: .It Vt bus_dmamap_callback2_t 214: Client specified callback for receiving mapping information resulting from 215: the load of a 216: .Vt bus_dmamap_t 217: via 218: .Fn bus_dmamap_load_uio 219: or 220: .Fn bus_dmamap_load_mbuf . 221: .sp 222: Callback2s are of the format: 223: .Bl -tag -width compact 224: .It Ft void 225: .Fn "client_callback2" "void *callback_arg" "bus_dma_segment_t *segs" \ 226: "int nseg" "bus_size_t mapsize" "int error" 227: .El 228: .sp 229: Callback2's behavior is the same as 230: .Vt bus_dmamap_callback_t 231: with the addition that the length of the data mapped is provided via 232: .Fa mapsize . 233: .It Vt bus_dmasync_op_t 234: Memory synchronization operation specifier. 235: Bus DMA requires explicit synchronization of memory with it's device 236: visible mapping in order to guarantee memory coherency. 237: The 238: .Vt bus_dmasync_op_t 239: allows the type of DMA operation that will be or has been performed 240: to be communicated to the system so that the correct coherency measures 241: are taken. 242: All operations specified below are performed from the DMA engine's 243: point of view: 244: .Bl -tag -width BUS_DMASYNC_POSTWRITE 245: .It Dv BUS_DMASYNC_PREREAD 246: Perform any synchronization required after an update of memory by the CPU 247: but prior to DMA read operations. 248: .It Dv BUS_DMASYNC_PREWRITE 249: Perform any synchronization required after an update of memory by the CPU 250: but prior to DMA write operations. 251: .It Dv BUS_DMASYNC_PREREAD|BUS_DMASYNC_PREWRITE 252: Perform any synchronization required prior to a combination of DMA read 253: and write operations. 254: .It Dv BUS_DMASYNC_POSTREAD 255: Perform any synchronization required after DMA read operations, but prior 256: to CPU access of the memory. 257: .It Dv BUS_DMASYNC_POSTWRITE 258: Perform any synchronization required after DMA write operations, but prior 259: to CPU access of the memory. 260: .It Dv BUS_DMASYNC_POSTREAD|BUS_DMASYNC_POSTWRITE 261: Perform any synchronization required after a combination of DMA read 262: and write operations. 263: .El 264: .El 265: .sp 266: .Sh FUNCTIONS 267: .Bl -tag -width compact 268: .It Fn bus_dma_tag_create "parent" "alignment" "boundary" "lowaddr" \ 269: "highaddr" "*filtfunc" "*filtfuncarg" "maxsize" "nsegments" "maxsegsz" \ 270: "flags" "*dmat" 271: Allocates a device specific DMA tag, and initializes it according to 272: the arguments provided: 273: .Bl -tag -width *filtfuncarg -compact 274: .It Fa parent 275: Indicates restrictions between the parent bridge, CPU memory, and the 276: device. 277: May be NULL, if no DMA restrictions are to be inherited. 278: .It Fa alignment 279: Alignment constraint, in bytes, of any mappings created using this tag. 280: The alignment must be a power of 2. 281: Hardware that can DMA starting at any address would specify 282: .Em 1 283: for byte alignment. 284: Hardware requiring DMA transfers to start on a multiple of 4K 285: would specify 286: .Em 4096. 287: .It Fa boundary 288: Boundary constraint, in bytes, of the target DMA memory region. 289: The boundary indicates the set of addresses, all multiples of the 290: boundary argument, that cannot be crossed by a single 291: .Vt bus_dma_segment_t . 292: The boundary must be either a power of 2 or 0. 293: .Ql 0 294: indicates that there are no boundary restrictions. 295: .It Fa lowaddr 296: .It Fa highaddr 297: Bounds of the window of bus address space that 298: .Em cannot 299: be directly accessed by the device. 300: The window contains all address greater than lowaddr and 301: less than or equal to highaddr. 302: For example, a device incapable of DMA above 4GB, would specify 303: a highaddr of 304: .Dv BUS_SPACE_MAXADDR 305: and a lowaddr of 306: .Dv BUS_SPACE_MAXADDR_32BIT . 307: Similarly a device that can only dma to addresses bellow 16MB would 308: specify a highaddr of 309: .Dv BUS_SPACE_MAXADDR 310: and a lowaddr of 311: .Dv BUS_SPACE_MAXADDR_24BIT . 312: Some implementations requires that some region of device visible 313: address space, overlapping available host memory, be outside the 314: window. 315: This area of 316: .Ql safe memory 317: is used to bounce requests that would otherwise conflict with 318: the exclusion window. 319: .It Fa filtfunc 320: Optional filter function (may be NULL) to be called for any attempt to 321: map memory into the window described by 322: .Fa lowaddr 323: and 324: .Fa highaddr. 325: A filter function is only required when the single window described 326: by 327: .Fa lowaddr 328: and 329: .Fa highaddr 330: cannot adequately describe the constraints of the device. 331: The filter function will be called for every machine page 332: that overlaps the exclusion window. 333: .It Fa filtfuncarg 334: Argument passed to all calls to the filter function for this tag. 335: May be NULL. 336: .It Fa maxsize 337: Maximum size, in bytes, of the sum of all segment lengths in a given 338: DMA mapping associated with this tag. 339: .It Fa nsegments 340: Number of discontinuities (scatter/gather segments) allowed 341: in a DMA mapped region. 342: If there is no restriction, 343: .Dv BUS_SPACE_UNRESTRICTED 344: may be specified. 345: .It Fa maxsegsz 346: Maximum size, in bytes, of a segment in any DMA mapped region associated 347: with 348: .Fa dmat . 349: .It Fa flags 350: Are as follows: 351: .Bl -tag -width "BUS_DMA_ALLOCNOW" -compact 352: .It Dv BUS_DMA_ALLOCNOW 353: Allocate the resources necessary to guarantee that all map load 354: operations associated with this tag will not block. 355: If sufficient resources are not available, 356: .Er ENOMEM 357: is returned. 358: .El 359: .It Fa dmat 360: Pointer to a bus_dma_tag_t where the resulting DMA tag will 361: be stored. 362: .El 363: .Pp 364: Returns 365: .Er ENOMEM 366: if sufficient memory is not available for tag creation 367: or allocating mapping resources. 368: .It Fn bus_dma_tag_destroy "dmat" 369: Deallocate the DMA tag 370: .Fa dmat 371: that was created by 372: .Fn bus_dma_tag_create . 373: .Pp 374: Returns 375: .Er EBUSY 376: if any DMA maps remain associated with 377: .Fa dmat 378: or 379: .Ql 0 380: on success. 381: .It Fn bus_dmamap_create "dmat" "flags" "*mapp" 382: Allocates and initializes a DMA map. 383: Arguments are as follows: 384: .Bl -tag -width nsegments -compact 385: .It Fa dmat 386: DMA tag. 387: .It Fa flags 388: The value of this argument is currently undefined and should be 389: specified as 390: .Ql 0 . 391: .It Fa mapp 392: Pointer to a 393: .Vt bus_dmamap_t 394: where the resulting DMA map will be stored. 395: .El 396: .Pp 397: Returns 398: .Er ENOMEM 399: if sufficient memory is not available for creating the 400: map or allocating mapping resources. 401: .It Fn bus_dmamap_destroy "dmat" "map" 402: Frees all resources associated with a given DMA map. 403: Arguments are as follows: 404: .Bl -tag -width dmat -compact 405: .It Fa dmat 406: DMA tag used to allocate 407: .Fa map . 408: .It Fa map 409: The DMA map to destroy. 410: .El 411: .Pp 412: Returns 413: .Er EBUSY 414: if a mapping is still active for 415: .Fa map . 416: .It Fn bus_dmamap_load "dmat" "map" "buf" "buflen" "*callback" "..." 417: Creates a mapping in device visible address space of 418: .Fa buflen 419: bytes of 420: .Fa buf , 421: associated with the DMA map 422: .Fa map. 423: Arguments are as follows: 424: .Bl -tag -width buflen -compact 425: .It Fa dmat 426: DMA tag used to allocate 427: .Fa map. 428: .It Fa map 429: A DMA map without a currently active mapping. 430: .It Fa buf 431: A kernel virtual address pointer to a contiguous (in KVA) buffer, to be 432: mapped into device visible address space. 433: .It Fa buflen 434: The size of the buffer. 435: .It Fa callback Fa callback_arg 436: The callback function, and its argument. 437: .It Fa flags 438: The value of this argument is currently undefined, and should be 439: specified as 440: .Ql 0 . 441: .El 442: .Pp 443: Return values to the caller are as follows: 444: .Bl -tag -width EINPROGRESS -compact 445: .It 0 446: The callback has been called and completed. 447: The status of the mapping has been delivered to the callback. 448: .It Er EINPROGRESS 449: The mapping has been deferred for lack of resources. 450: The callback will be called as soon as resources are available. 451: Callbacks are serviced in FIFO order. 452: DMA maps created from DMA tags that are allocated with 453: the 454: .Dv BUS_DMA_ALLOCNOW 455: flag will never return this status for a load operation. 456: .It Er EINVAL 457: The load request was invalid. 458: The callback has not, and will not be called. 459: This error value may indicate that 460: .Fa dmat , 461: .Fa map , 462: .Fa buf , 463: or 464: .Fa callback 465: were invalid, or 466: .Fa buslen 467: was larger than the 468: .Fa maxsize 469: argument used to create the dma tag 470: .Fa dmat . 471: .El 472: .Pp 473: When the callback is called, it is presented with an error value 474: indicating the disposition of the mapping. 475: Error may be one of the following: 476: .Bl -tag -width EINPROGRESS -compact 477: .It 0 478: The mapping was successful and the 479: .Fa dm_segs 480: callback argument contains an array of 481: .Vt bus_dma_segment_t 482: elements describing the mapping. 483: This array is only valid during the scope of the callback function. 484: .It Er EFBIG 485: A mapping could not be achieved within the segment constraints provided 486: in the tag even though the requested allocation size was less than maxsize. 487: .El 488: .It Fn bus_dmamap_load_mbuf "dmat" "map" "mbuf" "callback2" "callback_arg" \ 489: "flags" 490: This is a variation of 491: .Fn bus_dmamap_load 492: which maps mbuf chains 493: for DMA transfers. 494: A 495: .Vt bus_size_t 496: argument is also passed to the callback routine, which 497: contains the mbuf chain's packet header length. 498: .Pp 499: Mbuf chains are assumed to be in kernel virtual address space. 500: .Pp 501: Returns 502: .Er EINVAL 503: if the size of the mbuf chain exceeds the maximum limit of the 504: DMA tag. 505: .It Fn bus_dmamap_load_uio "dmat" "map" "uio" "callback2" "callback_arg" "flags" 506: This is a variation of 507: .Fn bus_dmamap_load 508: which maps buffers pointed to by 509: .Fa uio 510: for DMA transfers. 511: A 512: .Vt bus_size_t 513: argument is also passed to the callback routine, which contains the size of 514: .Fa uio , 515: i.e. 516: .Fa uio->uio_resid . 517: .Pp 518: If 519: .Fa uio->uio_segflg 520: is 521: .Dv UIO_USERSPACE , 522: then it is assumed that the buffer, 523: .Fa uio 524: is in 525: .Fa "uio->uio_td->td_proc" Ns 's 526: address space. 527: User space memory must be in-core and wired prior to attempting a map 528: load operation. 529: .It Fn bus_dmamap_unload "dmat" "map" 530: Unloads a DMA map. 531: Arguments are as follows: 532: .Bl -tag -width dmam -compact 533: .It Fa dmat 534: DMA tag used to allocate 535: .Fa map . 536: .It Fa map 537: The DMA map that is to be unloaded. 538: .El 539: .Pp 540: .Fn bus_dmamap_unload 541: will not perform any implicit synchronization of DMA buffers. 542: This must be done explicitly by a call to 543: .Fn bus_dmamap_sync 544: prior to unloading the map. 545: .It Fn bus_dmamap_sync "dmat" "map" "op" 546: Performs synchronization of a device visible mapping with the CPU visible 547: memory referenced by that mapping. 548: Arguments are as follows: 549: .Bl -tag -width dmat -compact 550: .It Fa dmat 551: DMA tag used to allocate 552: .Fa map . 553: .It Fa map 554: The DMA mapping to be synchronized. 555: .It Fa op 556: Type of synchronization operation to perform. 557: See the definition of 558: .Vt bus_dmasync_op_t 559: for a description of the acceptable values for 560: .Fa op . 561: .El 562: .Pp 563: .Fn bus_dmamap_sync 564: is the method used to ensure that CPU and device DMA access to shared 565: memory is coherent. 566: For example, the CPU might be used to setup the contents of a buffer 567: that is to be DMA'ed into a device. 568: To ensure that the data are visible via the device's mapping of that 569: memory, the buffer must be loaded and a dma sync operation of 570: .Dv BUS_DMASYNC_PREREAD 571: must be performed. 572: Additional sync operations must be performed after every CPU write 573: to this memory if additional DMA reads are to be performed. 574: Conversely, for the DMA write case, the buffer must be loaded, 575: and a dma sync operation of 576: .Dv BUS_DMASYNC_PREWRITE 577: must be performed. 578: The CPU will only be able to see the results of this DMA write 579: once the DMA has completed and a 580: .Dv BUS_DMASYNC_POSTWRITE 581: operation has been performed. 582: .Pp 583: If DMA read and write operations are not preceded and followed by the 584: appropriate synchronization operations, behavior is undefined. 585: .It Fn bus_dmamem_alloc "dmat" "**vaddr" "flags" "mapp" 586: Allocates memory that is mapped into KVA at the address returned 587: in 588: .Fa vaddr 589: that is permanently loaded into the newly created 590: .Vt bus_dmamap_t 591: returned via 592: .Fa mapp . 593: Arguments are as follows: 594: .Bl -tag -width alignment -compact 595: .It Fa dmat 596: DMA tag describing the constraints of the DMA mapping. 597: .It Fa vaddr 598: Pointer to a pointer that will hold the returned KVA mapping of 599: the allocated region. 600: .It Fa flags 601: Flags are defined as follows: 602: .Bl -tag -width BUS_DMA_NOWAIT -compact 603: .It Dv BUS_DMA_WAITOK 604: The routine can safely wait (sleep) for resources. 605: .It Dv BUS_DMA_NOWAIT 606: The routine is not allowed to wait for resources. 607: If resources are not available, 608: .Dv ENOMEM 609: is returned. 610: .It Dv BUS_DMA_COHERENT 611: Attempt to map this memory such that cache sync operations are 612: as cheap as possible. 613: This flag is typically set on memory that will be accessed by both 614: a CPU and a DMA engine, frequently. 615: Use of this flag does not remove the requirement of using 616: bus_dmamap_sync, but it may reduce the cost of performing 617: these operations. 618: .It Dv BUS_DMA_ZERO 619: Causes the allocated memory to be set to all zeros. 620: .El 621: .It Fa mapp 622: Pointer to storage for the returned DMA map. 623: .El 624: .Pp 625: The size of memory to be allocated is 626: .Fa maxsize 627: as specified in 628: .Fa dmat . 629: .Pp 630: The current implementation of 631: .Fn bus_dmamem_alloc 632: will allocate all requests as a single segment. 633: .Pp 634: Although no explicit loading is required to access the memory 635: referenced by the returned map, the synchronization requirements 636: as described in the 637: .Fn bus_dmamap_sync 638: section still apply. 639: .Pp 640: Returns 641: .Er ENOMEM 642: if sufficient memory is not available for completing 643: the operation. 644: .It Fn bus_dmamem_free "dmat" "*vaddr" "map" 645: Frees memory previously allocated by 646: .Fn bus_dmamem_alloc . 647: Any mappings 648: will be invalidated. 649: Arguments are as follows: 650: .Bl -tag -width vaddr -compact 651: .It Fa dmat 652: DMA tag. 653: .It Fa vaddr 654: Kernel virtual address of the memory. 655: .It Fa map 656: DMA map to be invalidated. 657: .El 658: .El 659: .Sh RETURN VALUES 660: Behavior is undefined if invalid arguments are passed to 661: any of the above functions. 662: If sufficient resources cannot be allocated for a given 663: transaction, 664: .Er ENOMEM 665: is returned. 666: All 667: routines that are not of type, 668: .Vt void , 669: will return 0 on success or an error 670: code, as discussed above. 671: .Pp 672: All 673: .Vt void 674: routines will succeed if provided with valid arguments. 675: .Sh SEE ALSO 676: .Xr devclass 9 , 677: .Xr device 9 , 678: .Xr driver 9 , 679: .Xr rman 9 680: .Pp 681: .Rs 682: .%A "Jason R. Thorpe" 683: .%T "A Machine-Independent DMA Framework for NetBSD" 684: .%J "Proceedings of the Summer 1998 USENIX Technical Conference" 685: .%Q "USENIX Association" 686: .%D "June 1998" 687: .Re 688: .Sh HISTORY 689: The 690: .Nm 691: interface first appeared in 692: .Nx 1.3 . 693: .Pp 694: The 695: .Nm 696: API was adopted from 697: .Nx 698: for use in the CAM SCSI subsystem. 699: The alterations to the original API were aimed to remove the need for 700: a 701: .Vt bus_dma_segment_t 702: array stored in each 703: .Vt bus_dmamap_t 704: while allowing callers to queue up on scarce resources. 705: .Sh AUTHORS 706: The 707: .Nm 708: interface was designed and implemented by 709: .An Jason R. Thorpe 710: of the Numerical Aerospace Simulation Facility, NASA Ames Research Center. 711: Additional input on the 712: .Nm 713: design was provided by 714: .An -nosplit 715: .An Chris Demetriou , 716: .An Charles Hannum , 717: .An Ross Harvey , 718: .An Matthew Jacob , 719: .An Jonathan Stone , 720: and 721: .An Matt Thomas . 722: .Pp 723: This manual page was written by 724: .An Hiten Pandya 725: and 726: .An Justin T. Gibbs .
__label__pos
0.786707
How CRT techniques work, Explain its advantages and dis-advantages and its type? How CRT techniques work. Explain its advantages and disadvantages and its type? Random Scan System When worked as an irregular output show unit, a CRT has the electron beam coordinated just to those parts of the screen where a photo is to be drawn. Irregular sweep screens draw a photo one line at any given moment and thus are additionally alluded to as vector show (or stroke-composing or calligraphic presentations). The part lines of a photo can be drawn and refreshed by an irregular output framework in any predetermined request. The refresh rate on an irregular sweep relies upon the quantity of lines to be shown. Picture definition is currently put away as an arrangement of line-attracting summons a range of memory alluded to as the refresh display file. Sometimes the refresh display file is called the display listdisplay program, or simply the refresh buffer. How CRT techniques work How CRT techniques work. Explain its advantages and disadvantages and its type? To show a predetermined picture, the framework goes through the arrangement of orders in the show document, drawing every segment line thusly. After all the line drawing charges have been prepared, the framework cycles back to the primary line order in the rundown. Random scan system is intended to draw all the part lines of a photo 30 to 60 times each second (implies refresh rate is 30 Hz to 60 Hz). Astounding vector frameworks are equipped for taking care of around 1, 00,000 “short” lines at this refresh rate. At the point when a little arrangement of lines is to be shown, each refresh cycle is postponed to keep away from refresh rates more noteworthy than 60 outlines for every second. Something else, speedier refreshing of the arrangement of lines could wear out the phosphorus.   How CRT techniques work. Explain its advantages and disadvantages and its type? Random scan system is intended for line-drawing applications and can not show sensible shaded scenes. Since picture definition is put away as an arrangement of line-drawing directions and not as an arrangement of power esteems for all screen focuses, vector shows, for the most part, have higher determination than raster frameworks. Likewise, vector shows create smooth line illustrations on the grounds that the bar straightforwardly takes after the line way. A Random scan system, interestingly, produces rugged lines that are plotted as discrete point sets. How CRT techniques work. Explain its advantages and disadvantages and its type? Advantages of Random Scan Display: – 1. A CRT has the electron beam coordinated just to the parts of the screen where a photo is to be drawn. 2. Produce smooth line illustrations 3. High Resolution Disadvantages of Random Scan Display: – 1. Random-Scan screens can not show sensible shaded scenes. Difference between Vector Scan Display and Raster Scan Display Random Scan/Vector Scan Display Raster Scan Display In Vector scan display the beam is moved only to those parts of the screen where a picture is to be drawn. In raster scan display the electron beam is moved over the screen one scan line at a time, from top to bottom and then back to top. Vector display flickers when the number of primitives in the buffer becomes too large. In raster display, the refresh process is independent of the complexity of the image. Cost is more. Cost is low Vector display only lines and characters Raster display has the ability to display areas filled with solid colors or patterns. Higher resolution. Less Resolution Produce smooth Line drawings Produce Jagged Lines Less Color More Color Leave a Comment
__label__pos
0.998482
Can tms damage your brain? EMT therapy does not harm the brain; it is a safe and non-invasive treatment. Most patients report no side effects or mild side effects, such as a mild headache, which goes away soon after the session. TMS usually has fewer side effects than antidepressants and other brain stimulation therapies. Antidepressants are associated with a wide range of side effects, including fatigue, loss of libido, weight problems, insomnia, and anxiety. For this same reason, there is no evidence to show that TMS can cause brain tumors. Repetitive TMS is a non-invasive form of brain stimulation used for depression. Unlike vagus nerve stimulation or deep brain stimulation, MRTS does not require surgery or implantation of electrodes. And unlike electroconvulsive therapy (ECT), RTMS doesn't cause seizures or require sedation with anesthesia. The main absolute contraindication for EMT therapy is the presence of a mobile intracranial ferromagnetic (inside the head). In other words, if someone has a brain stent, clip, or stimulator, that person should not receive EMT therapy. There are other relative contraindications for EMT that will require further evaluation with the physician prior to EMT therapy. TMS may cause mild head discomfort in approximately 5% of patients. Rarely, some patients may experience headache. It is usually more a tension-type headache, not a migraine. In addition, there is a single pulse EMT device that is approved by the FDA for the treatment of migraine. See the Uses of EMT Therapy section above. Constant exposure to loud noises could cause some hearing damage. It is strongly recommended that patients wear earplugs during their EMT sessions to prevent hearing loss. In fact, we ask all our patients to do so. Earplugs lower the noise level by about 30 dB, putting you in the safe range. This is assumed that all screening measures are taken and that there are no contraindications to magnetic treatment (there are no ferromagnetic metals in the brain). There is no clinical evidence that TMS causes memory loss. On the other hand, there is clinical evidence to the contrary. TMS May Improve Memory and Cognition. Many researchers are studying the use of EMT for cognitive improvement and treatment of early dementia. On the contrary, many patients report an improvement in sleep after a few sessions. There are trials that study the use of EMT for insomnia. EMT is contraindicated with a brain pacemaker (deep brain stimulator). Brain pacemakers are used for deep brain stimulation in some cases of refractory Parkinson's disease and respiratory depression. At that time, it had been almost half a year and I didn't feel any improvement. After talking to several different doctors, including some of the best in my state, I was left empty-handed. I am still looking for ways to heal and recover from a new treatment whose disabling effects modern medicine has no definite way of counteracting. When you are taking an antidepressant or other pharmaceuticals, you can stop taking the pill and your body will naturally remove chemicals from your system in time. With TMS, your system has no way of doing it. All you can do is wait for your brain to adapt while it tries to restore the damage caused by the electromagnetic pulses that pass through it. Little or nothing is known about how that process could work, let alone how to speed it up. I have spoken to quite a few medical professionals who deny that what happened to me is possible. Eddy currents induced in conductive surface electrodes and implants can cause them to heat up (Roth et al. The temperature increase depends on the shape, size, orientation, conductivity and properties of the surrounding tissue of the electrode or implant, as well as the type of EMT coil, position and stimulation parameters. Silver and gold electrodes are highly conductive and can heat up excessively, which can lead to skin burns. A temperature of 50 °C for 100 s or 55 °C for 10 s can cause skin burns (Roth et al. Using low-conductivity plastic electrodes can reduce heating. Radial notches on the electrodes and plates of the skull can also reduce heating by interrupting the path of eddy currents. Skull plates made of titanium tend to have little heating, due to titanium's low conductivity and radial notches (Rotenberg et al. Brain implants, such as aneurysm clips and stimulation electrodes, can also be heated. Heating brain tissue above 43°C can cause irreversible damage (Matsumi et al. If TMS is to be applied near electrodes or implants, it is advisable to first measure the ex vivo heating with the parameters specified in the planned TMS protocol. The results of such tests should be reported for the benefit of the scientific community. EMT can be used to inhibit activity in this part of the brain, thereby reducing the symptoms of OCD. A major symptom of the condition is auditory hallucinations, which affect 75 percent of people with schizophrenia. The manifestations, symptoms and disability of a disease represent a combination of stable traits and variable-state characteristics that may alter the action of TMS. Spectroscopy did not reveal any changes in N-acetyl-aspartate, creatine and phosphocreatine, compounds containing choline, myo-inositol, glucose and lactate after chronic RTMS. Usually, patients begin to feel better after the EMT drop after the initial three or four weeks of treatment. Just keep in mind that different insurance policies have certain criteria with respect to previous medication attempts, which determines TMS coverage. While on-line EMT during PET or SPECT does not pose particular safety concerns, if EMT is administered on the MRI scanner, there are potential safety concerns related to the static magnetic field of the MRI scanner, the RF pulses and gradients applied during the scan, and the mechanical interactions between the TMS. system and static magnetic field of the scanner. The therapeutic mechanism of TMS is not proven or documented, the only evidence that exists is subjective and theoretical. This has resulted in a large collection of empirical data for EMT applications beyond single-pulse, double-pulse and 1 Hz EMT in psychology and cognitive sciences (see Companion Material, Table S. Clinical Society of TMS Consensus Review and Treatment Recommendations for EMT Therapy for Major Depressive Disorder. The current post-hoc analysis aims to (investigate the effect of 10 high-frequency RTM sessions on anxiety symptoms in patients with moderate to severe TBI), (analyze changes in depressive scores) and (executive function index) after TMS between active and control TMS. To understand the special ethical and safety issues presented by therapeutic applications of TMS, it is important to consider the potential impact of neurological or psychiatric disease under treatment, the impact of concomitant treatments, and the chronicity of exposure. Although the literature points to the positive effects of RTMS on other neurological and psychiatric conditions, moderate to severe traumatic brain injury has a unique pathophysiology, which may explain the lack of response to treatment. Considering the large number of subjects and patients who have undergone RTM studies since 1998 (see Fig. In addition, appropriate emergency medical care should be planned for possible complications of TMS for. Thousands of healthy subjects and patients with various neurological and psychiatric diseases have undergone EMT, allowing a better assessment of relative risks. . .
__label__pos
0.766888
RecP2 Cas Sol .pdf File information Original filename: RecP2-Cas-Sol.pdf This PDF 1.5 document has been generated by TeX / MiKTeX pdfTeX-1.40.14, and has been sent on pdf-archive.com on 26/10/2016 at 19:34, from IP address 37.135.x.x. The current document download page has been viewed 284 times. File size: 87 KB (3 pages). Privacy: public file Download original PDF file RecP2-Cas-Sol.pdf (PDF, 87 KB) Share on social networks Link to this file download page Document preview PRG - ETSInf. TEOR´IA. Curso 2015-16. Recuperaci´on Parcial 2. GII. GIINF - GADE. 17 de junio de 2016. Duraci´on: 2 horas. 1. 1.5 puntos Se dispone de un array lS de objetos de tipo String, que representan valores en coma flotante. Si el array est´a correctamente formado, esto es, si cada uno de sus elementos es una String que contiene la representaci´on de un double en Java, entonces, el siguiente c´odigo escribe correctamente el contenido del array: public static void m1(String[] lS) { for (int i = 0; i &lt; lS.length; i++) { System.out.print("Pos: " + i + ": "); if (lS[i].length() &gt; 0) { double valor = Double.parseDouble(lS[i]); System.out.println("Valor: " + valor); } else { System.out.println("String de longitud cero."); } } } Sin embargo, si alguna de las Strings del array no existe, o contiene un valor que no representa un double, se podr´an producir, respectivamente, las excepciones: NullPointerException o NumberFormatException. En ese caso, en realidad, se desear´ıa una salida sin excepciones. Por ejemplo, como la que se muestra a continuaci´on, para el array: {"1234.0", "1.23456789E8", null, "123xx9", null, ""}. Pos: Pos: Pos: Pos: Pos: Pos: 0: 1: 2: 3: 4: 5: Valor: Valor: String umero String String 1234.0 1.23456789E8 inexistente. mal formado. inexistente. de longitud cero. Se pide: reescribir el m´etodo m1 para que, tratando exclusivamente las dos excepciones indicadas resuelva el problema efectuando una salida como la mostrada en el ejemplo. Soluci´ on: public static void m1(String[] lS) { for (int i = 0; i &lt; lS.length; i++) { System.out.print("Pos: " + i + ": "); try { if (lS[i].length() &gt; 0) { double valor = Double.parseDouble(lS[i]); System.out.println("Valor: " + valor); } else { System.out.println("String de longitud cero."); } } catch(NullPointerException nP) { System.out.println("String inexistente."); } catch(NumberFormatException nF) { System.out.println("N´ umero mal formado."); } } } 2. 2.5 puntos Se pide: implementar un m´etodo est´atico tal que dada una PilaIntEnla p copie sus elementos uno por l´ınea en un fichero de texto de nombre "ContenidoDePila.txt" en el orden en que fueron apilados. Al finalizar la ejecuci´ on del m´etodo, la pila p debe quedar como estaba. As´ı, si tenemos la pila 1 2 3 4 donde la cima se situa en el 1, en el fichero deber´ an guardarse, uno por l´ınea, los valores 4 3 2 1. El m´etodo debe devolver como resultado el objeto File creado. Deber´a tratarse la posible excepci´on FileNotFoundException, de modo que se muestre un mensaje de error en caso de que ´esta se produzca. Soluci´ on: public static File pilaIntEnlaToTextFile(PilaIntEnla p) { PilaIntEnla aux = new PilaIntEnla(); File res = new File("ContenidoDePila.txt"); try { PrintWriter pw = new PrintWriter(res); while (!p.esVacia()) { aux.apilar(p.desapilar()); } while (!aux.esVacia()) { p.apilar(aux.desapilar()); pw.println(p.cima()); } pw.close(); } catch (FileNotFoundException e) { System.out.println("No se puede crear el fichero"); } return res; } 3. 3 puntos Se pide: a˜ nadir a la clase ColaIntEnla un m´etodo de perfil public void recular(int x) tal que: Busque la primera ocurrencia del elemento x dentro de la cola y, en caso de ´exito en la b´ usqueda, haga que dicho elemento se traslade al final del todo y, por tanto, se quede como el u ´ltimo de la cola. En caso de fracaso en la b´ usqueda, la cola se queda como estaba. Nota: S´olo se permite acceder a los atributos de la clase, quedando terminantemente prohibido el acceso a sus m´etodos, as´ı como a cualquier otra estructura de datos auxiliar (incluyendo el uso de arrays). Soluci´ on: /** Si x est´ a en la cola, lo pone el ´ ultimo de la cola. */ public void recular(int x) { NodoInt aux = primero, ant = null; while (aux != null &amp;&amp; aux.dato != x) { ant = aux; aux = aux.siguiente; } if (aux != null &amp;&amp; aux != ultimo) { if (aux == primero) { primero = primero.siguiente; } else { ant.siguiente = aux.siguiente; } ultimo.siguiente = aux; aux.siguiente = null; ultimo = aux; } } 4. 3 puntos En una clase distinta a ListaPIIntEnla, se pide: implementar un m´etodo con el siguiente perfil y precondici´on: /** Precondici´ on: lista1 y lista2 no contienen elementos repetidos. */ public static ListaPIIntEnla diferencia(ListaPIIntEnla lista1, ListaPIIntEnla lista2) que devuelva una lista con los elementos de lista1 que no est´an en lista2. Por ejemplo, dadas la lista1 → 7 → 3 → 9 → 6 → 2 y la lista2 → 8 → 9 → 5 → 3 → 2 → 4, entonces el resultado de diferencia(lista1, lista2) debe ser una lista con los elementos → 7 → 6. Soluci´ on: /** Precondici´ on: lista1 y lista2 no contienen elementos repetidos. */ public static ListaPIIntEnla diferencia(ListaPIIntEnla lista1, ListaPIIntEnla lista2) { ListaPIIntEnla result = new ListaPIIntEnla(); lista1.inicio(); while (!lista1.esFin()) { int x = lista1.recuperar(); lista2.inicio(); while (!lista2.esFin() &amp;&amp; x != lista2.recuperar()) { lista2.siguiente(); } if (lista2.esFin()) { result.insertar(x); } lista1.siguiente(); } return result; } Document preview RecP2-Cas-Sol.pdf - page 1/3 Document preview RecP2-Cas-Sol.pdf - page 2/3 Document preview RecP2-Cas-Sol.pdf - page 3/3 Related documents recp2 cas sol sheet 2 2015 lista6 pract c cheat project12th Link to this page Permanent link Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line.. Short link Use the short link to share your document on Twitter or by text message (SMS) HTML Code Copy the following HTML code to share your document on a Website or Blog QR Code QR Code link to PDF file RecP2-Cas-Sol.pdf
__label__pos
0.956956
Statistical structural inference from edge weights using a mixture of gamma distributions Jianjia Wang*, Edwin R. Hancock *Corresponding author for this work Research output: Contribution to journalArticlepeer-review Abstract The inference of reliable and meaningful connectivity information from weights representing the affinity between nodes in a graph is an outstanding problem in network science. Usually, this is achieved by simply thresholding the edge weights to distinguish true links from false ones and to obtain a sparse set of connections. Tools developed in statistical mechanics have provided particularly effective ways to locate the optimal threshold so as to preserve the statistical properties of the network structure. Thermodynamic analogies together with statistical mechanical ensembles have been proven to be useful in analysing edge-weighted networks. To extend this work, in this article, we use a statistical mechanical model to describe the probability distribution for edge weights. This models the distribution of edge weights using a mixture of Gamma distributions. Using a two-component Gamma mixture model with components describing the edge and non-edge weight distributions, we use the Expectation-Maximization algorithm to estimate the corresponding Gamma distribution parameters and mixing proportions. This gives the optimal threshold to convert weighted networks to sets of binary-valued connections. Numerical analysis shows that it provides a new way to describe the edge weight probability. Furthermore, using a physical analogy in which the weights are the energies of molecules in a solid, the probability density function for nodes is identical to the degree distribution resulting from a uniform weight on edges. This provides an alternative way to study the degree distribution with the nodal probability function in unweighted networks. We observe a phase transition in the low-temperature region, corresponding to a structural transition caused by applying the threshold. Experimental results on real-world weighted and unweighted networks reveal an improved performance for inferring binary edge connections from edge weights. Original languageEnglish Article numbercnad038 JournalJournal of Complex Networks Volume11 Issue number5 DOIs Publication statusPublished - 1 Oct 2023 Keywords • edge weights distribution • statistical mechanical model • structural inference Fingerprint Dive into the research topics of 'Statistical structural inference from edge weights using a mixture of gamma distributions'. Together they form a unique fingerprint. Cite this
__label__pos
0.996475
<meta http-equiv="refresh" content="1; url=/nojavascript/"> Dismiss Skip Navigation You are reading an older version of this FlexBook® textbook: Human Biology Circulation Teacher's Guide Go to the latest version. 5.3: Activities and Answer Keys Difficulty Level: At Grade Created by: CK-12 Activity 4-1: Making a Capillary Bed Model PLAN Summary Students make models of capillary beds. They observe and describe the role of capillaries and capillary beds in bringing nutrients and oxygen to the cells and carrying away waste materials and carbon dioxide from the cells. Objectives Students: \checkmark show how a small artery brings blood to capillaries and a small vein takes blood away from capillaries. \checkmark differentiate between oxygenated and deoxygenated capillaries. \checkmark indicate where oxygen and nutrients leave the capillaries. \checkmark indicate where wastes and carbon dioxide enter the capillaries. \checkmark explain the role of capillaries in the maintenance of homeostasis. Student Materials • Activity Report • Construction or drawing paper; Scissors; Glue or clear tape; Marking pens; Materials to represent arteries, veins, capillaries, and cells (Some examples include string, yarn, thread, and rope.) Teacher Materials • Activity Report Answer Key • Photos of capillaries • Diagrams or a model of the circulatory system Advance Preparation Collect the materials students will need to build their capillary bed models. Estimated Time One 50-\mathrm{minute} class period. Interdisciplinary Connection Art Students can make their capillary bed models in art class. Prerequisites and Background Information None Helpful Hints Examples of materials that can be used in the models include the following. Rope: colored/painted red to represent a small artery (arteriole) and colored/painted blue to represent a small vein (venule). Yarn: red to represent capillaries carrying oxygenated blood and nutrients, and blue to represent capillaries carrying deoxygenated blood and carbon dioxide and other wastes. Seeds or pasta: to represent body cells. You can also use drinking straws to represent capillaries and smaller seeds or pasta that can pass through single file. When representing capillaries in a body region, such as a leg, the direction of blood flow is from oxygenated (red) to deoxygenated (blue). If they are using yarn, students can untwist ends of the yarn to show the close relationships of capillaries with each other and with neighboring cells. See diagram below. IMPLEMENT Steps 1-2 Ask students to develop a key to show which materials represent which structures. • capillaries carrying oxygen-rich blood and nutrients • capillaries carrying oxygen-poor blood and wastes including carbon dioxide • cells nourished by these capillaries • small artery (arteriole) carrying oxygen-rich blood with nutrients to the capillaries • small vein (venule) taking oxygen-poor blood with wastes away from the capillaries Make sure students indicate the flow of blood using arrows. Steps 3-4 When students have their models constructed, ask them as a Journal Writing assignment to take on the role of a component that travels in the blood through the capillaries (e.g., oxygen, carbon dioxide, food nutrients, hormone, or enzyme). Use the first person to write about a journey through the capillaries. Conclude Activity 4-1 by having students refer to the models of the circulatory system they made in Activity 1-1: Pathway of Blood through Your Body to see where their capillary beds are located. Ask students to compare their models. ASSESS Use the capillary bed model to assess if students can: \checkmark describe the role of capillaries in bringing nutrients and oxygen to the cells and carrying away waste materials and carbon dioxide from the cells. \checkmark compare and contrast oxygenated and deoxygenated capillaries. \checkmark identify where oxygen and nutrients leave the capillaries. \checkmark identify where wastes and carbon dioxide enter the capillaries. \checkmark explain the role of capillaries in the maintenance of homeostasis. Activity 4-1: Making a Capillary Bed Model Activity Report Answer Key • Sample answers to these questions will be provided upon request. Please send an email to [email protected] to request sample answers. 1. How did you decide on the design of your capillary bed model? In your answer, be sure you reflect the contributions of each lab group member. 2. Identify the materials you selected to represent each part of the capillary bed model. Indicate which material represents which model part. 3. Make a diagram of your constructed capillary bed model. 4. A. Label each part and indicate with arrows the direction of blood flow. B. Indicate where oxygen and nutrients leave the capillaries and where wastes and carbon dioxide enter. 5. Write a summary paragraph explaining how blood moves through capillaries and helps to maintain homeostasis in your body. Transport of Nutrients: Exploring Diffusion The process of diffusion plays an important role in the exchange of materials between the blood and the cells. Gather some materials together that students can use to try to answer one of the following questions. Ask students to design an experiment to answer one of these questions. • What do you think would happen if you filled a small beaker with tap water and added one drop of food coloring? • What would happen if you filled a small beaker with tap water and added a cube of sugar? • How is diffusion affected by temperature? • What happens when someone opens a container of perfume or uses a spray bottle of room deodorizer? Ask students to compare this activity to diffusion of nutrients. How is diffusion described here like the diffusion of nutrients and wastes in your cells? Pretend you are a red blood cell. Describe your journey as you pass through a capillary bed. How are you different leaving the capillary bed than when you entered the capillary bed? Review Questions/Answers • Sample answers to these questions will be provided upon request. Please send an email to [email protected] to request sample answers. 1. How are capillaries different from arterioles? 2. Why do you have capillaries? 3. Describe the process by which substances enter and leave capillaries. Activity 4-1 Report: Making a Capillary Bed Model 1. How did you decide on the design of your capillary bed model? In your answer, be sure you reflect the contributions of each lab group member. 2. Identify the materials you selected to represent each part of the capillary bed model. Indicate which material represents which part. 3. Make a diagram of your constructed capillary bed model. a. Label each part and indicate with arrows the direction of blood flow. b. Indicate where oxygen and nutrients leave the capillaries and where wastes and carbon dioxide enter. 4. Write a summary paragraph explaining how blood moves through capillaries and helps to maintain homeostasis in your body. Image Attributions You can only attach files to None which belong to you If you would like to associate files with this None, please make a copy first. Reviews Please wait... Please wait... Image Detail Sizes: Medium | Original   CK.SCI.ENG.TE.1.Human-Biology-Circulation.5.3 Original text
__label__pos
0.998157
Lestidae From Wikipedia, the free encyclopedia Jump to: navigation, search Lestidae Female Austrolestes cingulatus Scientific classification Kingdom: Animalia Phylum: Arthropoda Class: Insecta Order: Odonata Suborder: Zygoptera Family: Lestidae Calvert 1901 Genera Lestidae is a rather small family of cosmopolitan, large-sized, slender damselflies. They are of the order of the dragonflies (Odonata) and are commonly known as spreadwings. The two subfamilies in Lestidae are Lestinae and Sympecmatinae. Damselflies in Lestinae rest with their wings partly open; the damselflies in Sympecmatinae, reedlings, ringtails, and winter damselflies, rest with their wings folded. While most damselflies rest with their wings folded together, most members of the family Lestidae hold them at an angle away from their bodies. The pterostigma (a single dark spot in the meshwork of the leading edge near the tip of each wing) is noticeably elongated. The quadrilateral (a part of the wing venation, close to the body) has an acute angle at the end. The body has a greenish, metallic shine. The superior anal appendages, commonly called claspers (body parts of male insect for clasping the female during copulation) of male spreadwings are long and strongly curved. The genetic makeup is still disputed, going from 12 genera[1] to eight genera.[2] References[edit] 1. ^ Davies, D.A.L. (1981). A synopsis of the extant genera of the Odonata. Soc. Int. Odonatol. Rapid Comm. 3 : i-xiv 1-59 2. ^ Bridges, C.A. (1994). Catalogue of the family-group, genus-group and species-group names of the Odonata of the world. Urbana, Illinois : C.A. Bridges 3rd Edn xiv 951 pp. See also[edit] A male Lestes dryas in the "spread-winged" posture that gives the family its common name
__label__pos
0.835868
Cancer Epidemiology The study of factors affecting cancer is known as cancer epidemiology. It helps to infer possible trends and causes. The study of cancer epidemiology uses epidemiological approaches to discover the cause of cancer and to classify and develop improved treatments. Observational epidemiological studies that show relation between risk factors and specific cancers mostly aid to generate hypotheses about potential interventions that could reduce morbidity or cancer incidence. Randomized controlled trials then test whether hypotheses generated by epidemiological studies and laboratory research result in reduced cancer incidence and mortality. In many instances, results from observational epidemiological studies are not confirmed by randomized controlled trials.
__label__pos
0.875212
How can you access multiple blogs? If you have multiple blogs that you are a part of and want to switch between them seamlessly, here is what you need to do: 1. Go to the profile section in the top right corner 2. You will see all the blogs you have access to and the roles assigned to you. 3. You can switch your profile and go to any other blog with just one click. Last updated
__label__pos
0.998835
Rational Emotive Behavior Therapy (REBT) For Addiction Treatment Trusted Content Rational Emotive Behavior Therapy (REBT) For Addiction Treatment Dr. Alan Weiner MD Medically reviewed by Dr. Alan Weiner, MD February 25, 2019 Rational Emotive Behavior Therapy, or REBT, is a form of psychotherapy that helps individuals change the way they think about addiction and other negative behaviors. This type of therapy is designed to teach individuals to think in ways that positively influence their lives and health. Substance abuse and drug addiction claims many people each year. It is characterized by an urgent need to continually seek substances, even when a person knows such a pattern is harmful. This need is driven by changes in the brain caused by harmful substances. When a person is afflicted with addiction, his brain composition is actually altered. It is this change which makes a person seek use of drugs again and again. This change is also responsible for what causes relapse in a person, or the pattern which makes affected individuals go back to substance abuse even after they have sought treatment. Treatment, then, must be comprehensive and must address all needs of a person’s health, any other issues, or disorders. Many types of treatments are available, and a full treatment plan often includes a number of these methods. Some of these include medication-assisted therapy (MAT), different types of cognitive behavioral therapy, and counseling (individual, family, or group). One type of therapy which has recently gained following for its success in treating substance abuse is Rational Emotive Behavior Therapy (REBT). What Is REBT? The REBT Network defines REBT as a form of psychotherapy which essentially trains people to change thinking in a way that will promote healthy behaviors and practices. Engaging in REBT helps a person to rid himself of negative behaviors, eliminate addictive tendencies, and thereby seek a life of fulfillment and happiness. This therapy also encourages positive values in its participants, such as strong self-esteem and unwavering acceptance of self and of others. REBT proposes that it is our thinking, especially in regard to things happening in our lives, which causes negative outcomes. Because of this, people who undergo REBT are taught to look carefully at their negative thinking and to question it. Rational thinking becomes a practice. Once a person can rationalize his negative thoughts, he can begin to overcome the behaviors which inhibit life fulfillment. Introducing virtual care Get treatment when and how you need it. How Does REBT Work? The REBT Network lists three basic, irrational thought processes held by most people. These are called the Three Basic Musts, and they each hold a demand about ourselves or others, and each is responsible for the events or things which upset us: 1. I must perform well and gain approval and acceptance from other people or I am not worthy in life. 2. I deserve to be treated fairly and kindly at all times. If other people do not treat me this way at all times, they are not worthy in life and they deserve to be penalized for their actions. 3. I have to have what I desire, and I have to have it immediately. If I don’t get what I want, I won’t be able to bear it. These beliefs, REBT suggests, often are what lead to unwelcome thoughts and behaviors. These may include feelings of anger, depression, guilt, shame, self-pity, and acts of passive-aggression. It is such irrational patterns of thinking which prompted the founding of REBT by Albert Ellis. In recent years, it has been shown to be effective in treating addiction. As Psychology Today explains, “Rational Emotive Behavior Therapy (REBT) posits addictions are caused by the interplay of cognition, behavior, and images.” In other words, individuals become addicted because their thoughts are irrational, they behave in a way that is detrimental to self, and they do not visualize a positive image of themselves. REBT aims to teach its participants to reverse these habits. The following are examples of how to utilize REBT to help change addictive tendencies: • Cognition (thoughts): someone who is addicted thinks in absolutes, such as feeling that he absolutely must seek a substance immediately or he will not be able to go on. REBT teaches a person to work through this thinking, question it, and counter it through rationale and reasoning. • Behavior: an addicted individual’s behavior reflects only the urgent need to seek substance use. This need is fostered by his irrational thoughts. Once he can learn to approach his thinking in a positive, rational way, he can begin to implement this thinking to all behaviors and change them for the better. • Images: a person afflicted with addiction may have a low amount of self-esteem; he may not visualize himself in a positive way. REBT teaches a person to see the positive self-image he wants and deserves. REBT Methods REBT employs three main methods to rationalize a person’s thinking. A therapist helping a person through REBT would ask the person to dispute, value insights, and practice acceptance. To dispute negative thoughts, a person would be asked to challenge irrational beliefs. For example, a person having trouble with the first Basic Must listed above would be prompted to question: “Why do I feel that I must attain everyone’s approval?” He would be asked to question things like why gaining approval is important to him, and what he could gain from that approval. Further, a participant would be asked to contemplate why he adheres to absolutes. Are your urges actually necessary, or do you just feel very strongly that they are necessary? Valuing insights involves training a person to hold fast to certain uplifting beliefs. Positive beliefs remind REBT participants that negative thoughts and behaviors do not merely happen, but are a direct result of giving in to them. Though REBT allows that everyone occasionally has irrational thoughts, it holds that people can get rid of or learn to control these thoughts most of the time. This process requires diligence and, especially, practice. Acceptance helps a person to understand that he can deal with the confines of his reality, even if they are not desirable. For the addicted individual, this means that a person learns to accept himself as worthy, with or without others’ consent. An addicted individual also learns to accept others and their love and support in his life. Finally, he learns to accept the world as a place which can be full of love and opportunity if he practices seeing it that way. Substance Abuse Treatment and REBT Many factors contribute to a person’s choice to begin abusing substances. Risk factors affect a person’s likelihood of substance abuse, while protective factors help prevent it. If protective factors are not effectively implemented, and even sometimes when they are implemented, people can fall victim to addiction. However, people affected by addiction have many options to help them recover. REBT could be useful for an addicted individual in changing thinking and, as a result, changing addictive behaviors. For many people, preventing relapse requires more than just a few rounds of medication and family support. Resisting further substance abuse may require the individual to revolutionize his thinking and inhabit a new way of life—one free from the constraints of substance abuse. In any case, treatment is a part of life which should not be lightly considered. Many things can affect treatment, including a person’s willingness to commit to it, a family’s support, what resources are available to an individual, and funding. Before making any decisions, a person should seek as many resources as possible to aid in getting treatment that best fits his needs. Getting Connected To REBT And Other Treatment Resources Substance abuse is an issue which affects so many individuals and families everywhere. With new drugs entering the scene all the time, it is imperative to have a myriad of ongoing treatment options available. REBT works to help people affected by addiction adopt positive thinking and practice new ways of fulfillment. If you or someone close to you is suffering from substance abuse, and you would like to be connected with resources, we can help. Contact us today at RehabCenter.net to hear more about treatment methods, find a plan that is right for you, and to have your needs met. National Institute On Drug Abuse - DrugFacts: Treatment Approaches For Drug Addiction Smart Recovery - Introduction To REBT The Albert Ellis Institute - Rational Emotive And Cognitive Behavior Therapy Want to get help, but not ready to talk? You can receive 24/7 text support right away and at your convenience. There is no obligation to enter treatment and you can opt out at any time. Sign up for text support to receive: ✅ Resources about addiction and recovery ✅ Info about our treatment process Disclaimer* Let Vertava Health walk you through the treatment process. We're here to help. For 24/7 Treatment Help 100% Free and Confidential. Call 877-630-2970 For 24/7 Treatment Help Call: 1-877-630-2970 For Immediate Treatment Help Call: 877-630-2970
__label__pos
0.849064
The Community Forums Interact with an entire community of cPanel & WHM users! 1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More. Preventing doubled reports Discussion in 'General Discussion' started by GoWilkes, Nov 18, 2010. 1. GoWilkes GoWilkes Well-Known Member Joined: Sep 26, 2006 Messages: 367 Likes Received: 1 Trophy Points: 18 cPanel Access Level: Root Administrator I have a server that only runs one website. In looking through the server, though, I see that it's reporting logs here: /usr/local/apache/domlogs/ As well as a duplicate copy here: /usr/local/apache/domlogs/[myaccountname]/ These logs are currently around 600MB. The one without [myaccountname] actually has a little more data, because it includes "-bytes_log" and "-bytes_log.offset" files. I obviously don't need two copies of access logs, but I still want Urchin to report correctly. Can I remove one of these? If so, how can I prevent more duplicate logs from being copied to that location?   2. nyjimbo nyjimbo Well-Known Member Joined: Jan 25, 2003 Messages: 1,125 Likes Received: 0 Trophy Points: 36 Location: New York I have the same thing and its eating up my /usr to a point where its getting around 90%. I cant see why there is two, doesnt this also add to alot of uneeded disk writing?   3. GoWilkes GoWilkes Well-Known Member Joined: Sep 26, 2006 Messages: 367 Likes Received: 1 Trophy Points: 18 cPanel Access Level: Root Administrator Until someone gives us a better answer, running these commands might help clear up some space temporarily: rm -rf /usr/local/apache/logs/error_log rm -rf /usr/local/apache/logs/suexec_log touch /usr/local/apache/logs/suexec_log httpd restart Just log in to SSH and run each line, one at a time. The first one deletes the error log; the second deletes suexec log, the third recreates suexec log (but leaves it empty), and the fourth restarts Apache. You can also remove the logs here: /usr/local/apache/logs/archive (these are just backups from /logs/) If you don't use Urchin, then you can also run these (changing "yourdomain" to whatever the file name is): rm -rf /usr/local/apache/domlogs/[yourdomain].com touch /usr/local/apache/domlogs/[yourdomain].com If you're running Urchin, then you'll lose the stats for the day, but if you're running something off-server (like Google Analytics) then there shouldn't be a problem. All of these grow over time, though, so it's just a temporary fix.   4. nyjimbo nyjimbo Well-Known Member Joined: Jan 25, 2003 Messages: 1,125 Likes Received: 0 Trophy Points: 36 Location: New York I am familiar with all that stuff, I just dont understand why we have to keep two identical copies of the files.   Loading... Similar Threads - Preventing doubled reports 1. dynaweb Replies: 2 Views: 386 Share This Page
__label__pos
0.979373
Precision of Internal Standard and External Standard Methods in High Performance Liquid Chromatography , , , , Special Issues LCGC Supplements, Special Issues-04-01-2015, Volume 33, Issue 4 Pages: 40–46 Internal standard methods are used to improve the precision and accuracy of results where volume errors are difficult to predict and control.   Internal standard methods are used to improve the precision and accuracy of results where volume errors are difficult to predict and control. A systematic approach has been used to compare internal and external standard methods in high performance liquid chromatography (HPLC). The precision was determined at several different injection volumes for HPLC and ultrahigh-pressure liquid chromatography (UHPLC), with two analyte and internal standard combinations. Precision using three methods of adding the internal standard to the analyte before final dilution was examined. The internal standard method outperformed external standard methods in all instances. Asystematic approach was used to compare internal standard (IS) and external standard (ESTD) methods used in high performance liquid chromatography (HPLC). The experiments described were specifically designed to examine the precision of the IS method as compared to the ESTD method using the last two generations of HPLC and ultrahigh-pressure liquid chromatography (UHPLC) systems. Two methods of introducing the IS were compared; these methods involved either weighing the amount of IS added as a solid or an internal standard solution of known concentration. Along with two types of instruments, HPLC and UHPLC, we used three analytes at different concentrations and injection volumes. A review of the literature revealed a limited number of papers that discussed the use of the internal standard in HPLC. None of the references used the approaches described herein to evaluate the effect of using an internal standard compared to the external standard approach. In an external standard calibration method, the absolute analyte response is plotted against the analyte concentration to create the calibration curve. An external standard method will not provide acceptable results when considerable volume errors are expected because of sample preparation or injection-to-injection variation. An IS method, which is a method where a carefully chosen compound different from the analyte of interest is added uniformly to every standard and sample, gives improved precision results in quantitative chromatographic experiments. The internal standard calibration curves plot the ratio of the analyte response to the internal standard response (response factor) against the ratio of the analyte amount to the internal standard amount. The resultant calibration curve is applied to the ratio of the response of the analyte to the response of the internal standard in the samples and the amount of analyte present is determined. Several approaches have been used to determine the amount of internal standard that should be used in preparing the standards and the samples, but none have illustrated definitive results (1–4). For example, Haefelfinger (1) reports that the IS peak height or area must be similar to that of the analyte of interest, but does not present supporting data. Araujo and colleagues (2) show that experimental design strategies can be used to determine the optimal amount of internal standard used while Altria and Fabre (3) show that the IS should be used in the highest possible concentration. Calculation of the response factor assumes that the detector gives a linear response for both the analyte and the internal standard over the entire range of the experiment. Since this is not always the case, it is essential to understand the behavior of the response factor as the concentration or amount of analyte and internal standard are varied. Knowing the behavior of the response factor allows one to set limits on the useful range of the chosen analyte or internal standard concentration combinations. The internal standard method is used to improve the precision and accuracy of results where volume errors are difficult to predict and control. Examples of types of errors that are minimized by the use of an internal standard are those caused by evaporation of solvents, injection errors, and complex sample preparation involving transfers, extractions, and dilutions. An internal standard must be chosen properly and a known amount added carefully to both sample and standard solutions to minimize error and be utilized to its full advantage. The resulting internal standard peak should be well resolved from other components in the sample and properly integrated. If all of these conditions are not met, the use of an internal standard may actually increase the variability of the results. One report suggests that whenever detector noise or integration errors are the dominant sources of error, the use of an internal standard will likely make the results of the experiment worse (5). A paper published by P. Haefelfinger in the Journal of Chromatography in 1981 (1) discussed some limitations of the internal standard technique in HPLC. Using the law of propagation of errors, the paper showed conditions that need to be met for the internal standard procedure to improve results. In addition to the mathematical illustration, Haefelfinger detailed practical examples where either internal or external standard methods were advantageous. The Journal of the Pharmaceutical Society of Japan published a study in 2003 (6) that found that the internal standard method did not offer an improvement in precision with the then current autosampler technology. Interestingly, they also found that if the peak of the internal standard was small, the relative standard deviation (RSD) was actually larger than the RSD for the external standard method (6). The limitation of this study was that only one injection volume (10 µL) was used to establish the conclusions. In our work, a systematic approach has been used to compare the internal to the external standard method using two analytes and two internal standards. The precision resulting from both an internal and external standard method were determined at several injection volumes and on two different instruments. Three methods of adding the IS to the analyte before final dilution have been compared. In the first, a solid internal standard was weighed directly into the glassware containing the sample before dilution with solvent. In the second, a solution of a known concentration of the IS was prepared and a known volume of this solution was added to the sample prior to dilution. In the third, the IS was added in the same manner as the second method, but the internal standard solution was weighed and the weight, not the volume, was used in the IS calculations. We examined the effect of weight of analyte and internal standard on the precision of the results. Initially, the weights of the analyte were varied versus a constant IS concentration, and then the concentration of the internal standard was varied versus a constant weight of the analyte.   Standard deviation was chosen to monitor precision. All possible errors are reflected in the standard deviations of the final measurements, including each step in the sample preparation, sample transfer, and sample introduction into the HPLC or UHPLC system, as well as the HPLC or UHPLC analyses themselves. Both external and internal standard calibration methods were used to calculate the percent recoveries for comparison. Experimental Chemicals The mobile phases were binary mixtures of acetonitrile and water (pH adjusted with phosphoric acid). The water was purified house water (EMD Millipore Corp.) and the acetonitrile and phosphoric acid (EM Science) were HPLC grade. Diuron and indoxacarb standards were obtained from DuPont Crop Protection. The internal standards were p-terphenyl (Aldrich Chemicals) and 3-methyl-1,1-diphenylurea (Aldrich Chemicals). All solutions were prepared as needed or stored in the refrigerator. Sample Preparation For the comparison of calibration methods, the official DuPont technical assay methods for indoxacarb and diuron were adapted for use. All standards and samples were prepared in acetonitrile. The indoxacarb standards ranged in concentration from 0.15 to 0.7 mg/mL; samples were prepared at a concentration of 0.5 mg/mL. The internal standard was p-terphenyl at a concentration of 0.08 mg/mL. The diuron standards ranged in concentration from 0.75 to 1.25 mg/mL; samples were prepared at a concentration of 1 mg/mL. The internal standard was 3-methyl-1,1-diphenylurea at a concentration of 1 mg/mL. Precision data was calculated based on eight individually prepared samples with duplicate injections of each sample. For the comparison of the method of addition of the internal standard experiments, three DuPont enforcement methods for technical assay of indoxacarb, famoxadone, and diuron were used. Precision data was calculated based on eight individually prepared samples with duplicate injections of each sample. Instrumentation and Chromatographic Conditions Agilent 1100 and 1290 Infinity HPLC systems (Agilent Technologies) were used, each consisting of a binary pump, an autosampler, a thermostated column compartment, and a diode-array detector. Instrument control and data collection were performed using ChemStation software. Chromatographic conditions are given in Tables I, II, and III. The technical methods were adapted as needed; for example, a method specifies the injection volume, and we collected data using several injection volumes for each compound. Calibration Methods Internal Standard Versus External Standard Calibrations A set of samples was prepared in such a way that results could be calculated for both the internal and external standard methods. All samples were prepared using class A volumetric glassware. Initially, the analyte was weighed directly into the volumetric flask. Next, the internal standard was weighed into the same flask and acetonitrile was added to dissolve the solids. The flask was then diluted to the mark and the mass of the final solution was recorded. This step allowed the results to be calculated using the external standard method in two ways, by using the nominal volume of the volumetric flask and also by using the mass of the solution to calculate the concentrations. In both of these cases, the internal standard added was not included in the calculations. These two methods will be denoted as "ESTD nominal volume" and "ESTD weight," respectively. The internal standard method, where the weighed volume of the internal standard solution was recorded, will be denoted as "IS solution." Because the samples were prepared in this manner, the results for the three methods were calculated using the same data files. The difference in the calculated standard deviations in this way is attributed to the calibration method, and is independent of any differences in sample preparation. Comparison of Methods of Addition of the Internal Standard Two sets of samples were prepared for each compound analyzed. The first set of samples were prepared by weighing the solid analyte and then weighing the solid IS into the sample container and diluting. The second set of samples were prepared by weighing the solid analyte into the sample container and then adding a specified volume of internal standard solution, which was subsequently also weighed. Standard deviations were calculated for these two internal standard introduction methods.   Results and Discussion To determine if instruments were functioning properly, eight replicate injections of one prepared sample for each analyte and internal standard were injected into each instrument at different injection volumes. The chromatographic conditions are shown in Tables I and II. The injector linearity was tested for both analytes and both internal standards and the results are given in Table IV. The range tested for the standard HPLC and the UHPLC instruments were 0.2–10.0 µL and 0.2–5.0 µL, respectively. The injection precision at each flow rate was compared to the manufacturer specifications, the instruments performed at or better than the manufacturer's specifications. There are other important factors to consider when optimizing chromatographic methods, some of which are carryover, column back pressure, and wavelength (7). Our experiments controlled these parameters. Comparison of Calibration Methods In general, there was not a large difference in the calculated standard deviations for the two external standard methods. Any differences seen did not suggest a trend, and appear to be random. An expected trend when using both external standard methods was that standard deviations became larger with decreased injection volume. The results calculated using the internal standard calibration method always demonstrated improved precision over the results calculated using an external standard calibration. See Figure 1 for precision results for diuron and indoxacarb using HPLC and UHPLC instruments. The graphs in Figure 1 show that at larger injection volumes the precision for the IS method appears constant, but at lower injection volumes the standard deviation increases drastically. This phenomenon does not occur at the same injection volume for both compounds, nor does it occur at the same injection volume for either compound using HPLC or UHPLC. Figure 1: Comparison of external and internal calibration methods: (a) indoxacarb with UHPLC, (b) diuron with UHPLC, (c) indoxacarb with HPLC, (d) diuron with HPLC. Each bar represents eight injections. Logically, overall peak areas are smaller with smaller injection volumes and loss of precision is caused by integration errors. Larger integration errors occur with smaller areas being integrated and lead to larger standard deviations calculated for the percent error. To determine if this effect of volume injected was the cause for the increase in RSD for low peak areas, samples of diuron were prepared at twice the concentration level of the original experiment and two different volumes were injected. If the loss of precision was solely because of the smaller size of the peak, then the standard deviation calculated using the higher concentration samples should be smaller than the standard deviation calculated for the original samples. This was not the case; Figure 2 shows that the standard deviations calculated when peaks were two times as large as the original were not significantly different from the original standard deviation. Again, the loss of precision was not explained by the smaller absolute size of the peak. Figure 2: Comparison of results obtained for the DuPont technical assay method when injections at two different volumes were made. Figure 3 shows the peak areas corresponding to different injection volumes for diuron and indoxacarb standards and their corresponding internal standards. With diuron, the internal standard method did not produce acceptable results at injection volumes lower than 1 µL; the internal standard peak area was smaller than the analyte peak area at all injection volumes. The horizontal lines drawn in Figure 3 correspond to the peak area of the internal standard, 3-methyl-1,1-diphenylurea, in the diuron solutions. If the peak size was completely responsible for loss of precision at small injection volumes, then any results calculated using peak areas below this line at any injection volume should show similar loss of precision. Correspondingly, for indoxacarb, a similar loss of precision would have been seen at all the chosen injection volumes. Indoxacarb was not consistent with this hypothesis. The loss of precision is not completely explained by the absolute size of the peak.   Figure 3: Graphs of peak area versus injection volume for (a) diuron and (b) indoxacarb. The solid line corresponds to the peak area for the IS in the diuron method. Peak Area Ratios To further investigate this precision loss when smaller injection volumes (0.2, 0.5, and 1 µL) were used, two separate samples of diuron and indoxacarb, each with IS, were injected eight times using the conditions described in Tables I and II. The resulting peak area ratios (analyte peak area/internal standard peak area) were plotted against the injection number as shown in Figure 4. At these smaller injection volumes, the responses are less precise than at the larger injection volumes. The exact injection volume where this is seen varies from compound to compound, but generally occurred at injection volumes smaller than 2 µL. Figures 1 and 2 show that on average, the peak area ratio is changing as the injection volume changes and is greater at smaller injection volumes. Thus, confirming a calibration curve prepared using one injection volume should not be used with data resulting from a different injection volume. The difference in area ratio over the range of injection volumes appears small, but is significant. For the diuron analysis using UHPLC, the percent recoveries calculated using the highest and lowest calculated peak area ratios shown in Figure 4 (0.2 µL and 5.0 µL, respectively), resulted in a difference of 0.86% overall recovery. For the diuron analysis using HPLC data, percent recoveries determined using the highest and lowest calculated peak area ratios (0.2 µL and 10.0 µL, respectively), resulted in an overall recovery difference of 4.28%. Small differences in the area ratios at different injection volumes can have a large impact on the calculated recoveries. Figure 4 shows that the peak area ratios used for the IS method do not remain constant over the range of injection volumes examined. Some peak area ratios varied by as much as 0.05 units. This change as the injection volume is changed can cause a systematic error in the calculated recoveries that results from the use of an IS calibration curve. As previously discussed, the error in percent recovery because of the changing value of the peak area ratios over the range of injection volumes used was as small as 0.86% for the UHPLC analysis and as large as 4.28% for the HPLC analysis. This topic warrants further investigation. Figure 4: Comparison of peak area ratios at different injection volumes for (a) indoxacarb and (b) diuron. Comparison of the Methods of Internal Standard Addition Three methods of internal standard addition were compared. In the first method, the internal standard was added directly as a solid. In the second method, a solution of the internal standard was prepared, added, and weighed into the analyte solution before final dilution. Calculations were then performed using the weight of the added solution. For the third method, the internal standard preparation and introduction were the same as the second method; however, the calculations were performed using the nominal volume from the Class A volumetric pipette. Table V gives the injection volumes used in the chromatographic methods, the masses of the analyte and IS used, the volume of the IS used, the average peak areas for both the analyte and the IS, and the resulting response factors. Table VI shows the standard deviations that were calculated when the IS was added by these three different methods. An F-test showed a significant difference in the resulting standard deviations between the first method (weighing the IS as a solid) and the other two methods (introducing a solution of the IS). There were small differences in the standard deviations using the two separate methods of introducing the internal standard as a solution and calculating via either the volume or weight; however, no specific trend was obvious. When the IS was weighed as a solid, the precision was almost a factor of three and 13 times larger, for diuron and famoxadone, respectively, than when the IS was added as a weighed solution (see Table VI). These results suggest the precision could potentially be limited by the accuracy of the balance. Supporting this, whenever the weight of either the analyte or IS was less than 100 mg, the standard deviation was large, generally 1.4%; conversely, when the weight was 100 mg or higher, the standard deviation was less than 0.5%. Nearly a threefold improvement in standard deviation was obtained by increasing the weights being used to at least 100 mg, or adding another significant digit to the mass measurement. Overall, the standard deviation was significantly smaller when the internal standard was added as a solution rather than as a solid, attributed to the larger mass of solution versus solid being weighed. To confirm this, the measured weights of the analyte and the IS were varied separately using the diuron enforcement method. This method was chosen because it exhibited the lowest inherent standard deviation. Table VII shows the results where the mass of the analyte was varied from 25 mg to 175 mg while the IS amount was held constant. Both methods of internal standard introduction were used; the constant amount of solid and internal standard solution weighed into the analyte solution was 100 mg, and 7.8 g, respectively. Table VII shows the standard deviations for the varied amount of analyte, from 75 to 175 mg. These calculated standard deviations are all 0.25% or less for both IS introduction methods. Decreasing the analyte mass to 25 mg, the standard deviation quadruples to 0.69% for solid introduction and 0.37% for the weighed solution of internal standard. The standard deviations for the samples prepared by adding the IS as a solution are always lower than for those prepared by adding the IS as a solid. Conversely, when the mass of analyte was kept constant at 100 mg and the mass of the IS was varied, similar results were obtained. Specifically, the calculated standard deviations were less than 0.3% except when the IS mass was 25 mg for the weighed solid internal standard. For 25 mg of weighed solid internal standard, the precision was 0.8%. These results are given in Table VIII. Therefore, it can be concluded that excellent precision in chromatographic results is effected by the precision of the balance, the weight of the internal standard, and the introduction method of the internal standard. Further analysis of the data disputes some of the ideas regarding the internal standard that were previously reported. Haefelfinger (1) reported that the IS peak area must be similar (response factor close to 1) to that of the analyte of interest. The data and results given in Tables V and VI do not support this and do not suggest any specific correlation between the response factor and the standard deviation. Altria and Fabre (3) state that the IS should be used in the highest possible concentration. The results in Table VIII elucidate the standard deviation for some of the samples with lower concentrations of IS showing better precision than some with higher concentrations of IS. Our results illustrate that injection volumes and the method of addition of the internal standard are more important than having a response factor close to one or using high concentrations of IS.   Conclusions When precision is an important factor, the chromatographic instrument should be tested before the start of any analysis to ensure that it is working properly. Injection-to-injection variation and the injector linearity both have a pronounced effect on precision at smaller injection volumes, so it is important to confirm that the instrument being used is capable of providing acceptable results at the chosen injection volume. The internal standard method corrects for different sources of volume errors, including injection-to-injection variation, volume errors in sample preparation, and accounts for routine variations in the response of the chromatographic system. We have shown the internal standard method outperformed external standard methods in all experiments, regardless of the analyte, choice of internal standard, method of introduction of internal standard, and the injection volume. Even so, at low injection volumes the resulting precision, when using the internal standard method, was poor. For the compounds used, this breakdown typically occurred at injection volumes of less than 2 µL and was dependent on the specific compound and IS being used, and not the instrument. Loss of precision did not coincide with a specific minimum peak area, so poor precision cannot be attributed to the smaller size of the peaks at smaller injection volumes. The breakdown in precision was also not because of larger injection variability at smaller injection volumes. If that was the case, the loss of precision would occur at the same injection volume on each instrument regardless of what compound was being studied. The results of this study show that when poor precision occurs at injection volumes less than 2 µL, significant improvement in results may be achieved by simply increasing the injection volume without the need for developing a new method. This is true whether an external standard or an internal standard method is being used. With an internal standard method, the precision of the experiment is affected by how the internal standard is measured. For solutions prepared to have the same final concentration of analyte and IS, there is a significant difference in the precision when the internal standard is added as a solid or a solution of known concentration. For all the analyte and IS combinations tested, the precision was significantly better when a solution of the IS was first prepared at a known concentration then added to the analyte before dilution. Our chromatographic resultant precision was not limited by the precision of the balance when the masses being used were larger than 25 mg. There was no direct correlation between the response factors and the calculated standard deviations. Our data also did not support the common perception of an IS being used in the highest concentration possible. Overall, the results show that the internal standard method can significantly improve the precision of a chromatographic method. However, attention must be paid to the injection volume and the method by which the internal standard is added to the analyte. To achieve better precision, increasing the injection volume of the sample solution is effective. Acknowledgments The authors would like to acknowledge Steve Platz for many contributions, including being a safety mentor and training on using the HPLC instrument. We would also like to thank Jim Schmittle, Peter Schtur, and Jennifer Llewelyn for their support of this project. Steven W. Hansen, Jennifer S. Amoo, and Mary Ellen P. McNally are with DuPont Crop Protection at the Stine Haskell Research Center in Newark, Delaware. Karyn M. Usher is an associate professor at Metropolitan State University, Minnesota. She contributed to this work as a visiting scientist at DuPont Crop Protection. Allison P. Bernsteinis with DuPont Industrial Biosciences in Cedar Rapids, Iowa. Direct correspondence to: [email protected] References (1) P. Haefelfinger, J. Chromatogr.218, 73–81 (1981). (2) P. Araujo, F. Couillard, E. Leirnes, K. Ask, A. BØkevoll, and L. FrØyland, J. Chromatogr. A1121, 99–105 (2006). (3) K.D. Altria and H. Fabre, Chromatographia 40, 313–320 (1995). (4) K. Baumann and H. Wätzig, Process Control Qual.10, 59–73 (1997). (5) Y. Hayashi and R. Matsuda, Anal. Sci.11, 389–400 (1995). (6) R. Ohtaka, M. Maeda, T. Iwagami, T. Ueda, Y. Kimura, K. Imai, C. Yomota, R. Matsuda, and Y. Hayashi, J. Pharm. Soc. Jpn.123(5), 349–355 (2003). (7) K.M. Usher, S.W. Hansen, and M.P. McNalley, LCGC North Am.31(S4a), 50–54 (2013).        
__label__pos
0.949928
Home Life Style Causes of Acne Causes of Acne 6330 Acne is an extremely common, extremely annoying problem that nearly everyone deals with in some capacity. Most people have learned how to handle and treat acne, but what is still very often misunderstood is what exactly causes it. There are numerous false thoughts about acne, particularly about the majority of the causes of acne, but also the best ways to treat it and to keep it from returning. We will dispel some common myths and talk about the true culprit today.   Physiologically, acne is caused by four main steps. These four steps each cause a different type of physical imperfection. We will discuss the main way each occurs below.    pimplecause     The first step of acne is blockage The first is obstruction of sebaceous follicles, which are oil-producing glands normally located by hair follicles. The highest proportion of sebaceous follicles are located on the face, upper chest, and back, which explains the areas of the body that are most often affected by acne. These follicles can become obstructed by skin cells around the opening of the follicle, which is thought to be due to an influence by androgen hormones. This causes a bump or papules on the skin known as a comedome. Comedomes can be white, due to the presence of epithelial skin cells, or black due to the presence of melanin or coloring within the skin cells. These bumps are caused entirely by skin proliferation and not dirt. It is also a common misconception that these bumps are caused by diet or cause by chocolate. There have been several studies over the past fifty years trying to either prove or disprove the relationship between food and acne. Currently, the going known relationship is that food does not in any known way cause acne to form. However, it is thought that diets with high glycemic index or high in dairy may sometimes worsen it.   The second step of acne is hormones The second major cause of acne is that it is triggered by hormones. Androgen hormones, like testosterone and dehydroepiandrosterone sulfate, cause the production of sebum. Sebum is like an oil for the skin that helps keep it moist and pliable, but in excessive levels can form a plug in the follicles. The increase in the sebum can contribute to the blocking of sebaceous glands and worsen comedomes. Another common misconception is that acne is caused by poor hygiene or improper bathing, though that is a common myth. Cleaning your skin is important to help keep oils and dirt off of your skin in general, and cleaning your skin can help improve acne but not doing so does not actually cause acne.   The third cause of acne is bacteria The third major cause of acne is bacteria. The bacteria thrive well in the sebum and blocked follicles in the skin. The bacteria that typically cause acne are not the typical ones that cause other skin infections, and are usually caused by a bacteria called propionibacterium acnes. These deeper seated infections can actually cause cysts in the skin which are even more difficult to treat. This is the reason that severe acne is often treated with antibiotics. Acne is not contagious though the bacteria live deep within the skin and cannot be spread by touching or interacting with another person. That is another common misconception. untitled   The fourth problem of acne is inflammation of the skin The fourth cause of acne is inflammation. The body recognizes the presence of bacteria and triggers the complement pathway, which is a system that can help fight and kill the bacteria within your body. This process also activates pro-inflammatory cytokines which causes overlying inflammation and erythema to the skin. The presence of inflammation causes pink or red pustules or cysts within the skin, which are another common symptom of acne.
__label__pos
0.892075
Email updates Keep up to date with the latest news and content from BMC Family Practice and BioMed Central. Open Access Research article Experiences and perceptions of people with headache: a qualitative study Deborah A Leiper12, Alison M Elliott2* and Philip C Hannaford2 Author Affiliations 1 Aberdeen Royal Infirmary, Westburn Road, Foresterhill, Aberdeen, AB25 2ZN, Scotland, UK 2 Department of General Practice and Primary Care, University of Aberdeen, Foresterhill Health Centre, Westburn Road, Aberdeen, AB25 2AY, Scotland, UK For all author emails, please log on. BMC Family Practice 2006, 7:27  doi:10.1186/1471-2296-7-27 The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-2296/7/27 Received:6 December 2005 Accepted:2 May 2006 Published:2 May 2006 © 2006 Leiper et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Background Few qualitative studies of headache have been conducted and as a result we have little in-depth understanding of the experiences and perceptions of people with headache. The aim of this paper was to explore the perceptions and experiences of individuals with headache and their experiences of associated healthcare and treatment. Methods A qualitative study of individuals with headache, sampled from a population-based study of chronic pain was conducted in the North-East of Scotland, UK. Seventeen semi-structured interviews were conducted with adults aged 65 or less. Interviews were analysed using the Framework approach utilising thematic analysis. Results Almost every participant reported that they were unable to function fully as a result of the nature and unpredictability of their headaches and this had caused disruption to their work, family life and social activities. Many also reported a negative impact on mood including feeling depressed, aggressive or embarrassed. Most participants had formed their own ideas about different aspects of their headache and several had searched for, or were seeking, increased understanding of their headache from a variety of sources. Many participants reported that their headaches caused them constant worry and anguish, and they were concerned that there was a serious underlying cause. A variety of methods were being used to manage headaches including conventional medication, complementary therapies and self-developed management techniques. Problems associated with all of these management strategies emerged. Conclusion Headache has wide-ranging adverse effects on individuals and is often accompanied by considerable worry. The development of new interventions or educational strategies aimed at reducing the burden of the disorder and associated anxiety are needed. Background Headaches are common, with almost everyone experiencing at least one during their lifetime [1]. The lifetime prevalence of headache has been estimated to be up to 96% in the adult population [1], and one-year prevalence estimates range from 38% [2] to 68% [3]. Many people experience headaches on a frequent basis: a recent UK survey found that 18% of respondents had experienced headaches one to three times a week during the previous three months, with 6% experiencing them more often [4]. Headaches have been shown to have an adverse impact on work, [4-7] social and family life [8-11] and are associated with large medical costs [12]. Studies investigating the management of headache have shown that most individuals use prescription and/or non-prescription (over-the-counter) medication [5,9]. Many individuals manage their headaches without consulting their general practitioners [5,9,13], some choosing alternative forms of healthcare. Much of our knowledge about the frequency and management of headache have come from quantitative studies. While these studies provide important information about the magnitude and impact of the problem, they are not able to examine unique aspects about the condition for individual patients. By contrast few qualitative studies of headache have been conducted and as a result we have little in-depth understanding of the experiences and perceptions of people with headache. An in-depth understanding of the experiences of people with headache is important if we are to develop new treatments, interventions or educational strategies that might reduce the burden of the disorder and qualitative studies of headache have been called for to address this gap [14]. Such studies are beginning to emerge, [15-17] but work has tended to focus on migraine and further research is still needed. We report here the findings from a qualitative study conducted to explore the experiences and perceptions of people with headache, and their experiences and expectations of associated healthcare and treatment. Methods Design and sample Participants were sampled from respondents to a population-based study [18,19] conducted in the Grampian region of Scotland, UK which investigated the prevalence and natural history of chronic pain (pain or discomfort, present either all the time, or on and off, which had persisted for three months or longer [20]). A total of 660 respondents in 2000 reported having chronic pain in their head. Of these, 73 individuals identified the head as either the only site, or the main site, of their pain and were defined as having chronic head pain. A total of 59 of these individuals indicated a willingness to participate in further research. From this group, a purposive sample of 30 individuals was selected to include males and females aged 65 and under, with different levels of severity of chronic pain (as measured by the chronic pain grade [21]) and self reported use of different healthcare services. The 30 individuals were sent letters detailing the purpose of the study and inviting them to participate in an interview about their headaches. Individuals who did not, or no longer, suffered from headaches were given the opportunity to opt-out if their participation was not felt to be appropriate. Reminders were sent four weeks later to non-respondents. Ethical approval for the study was given in advance by the Grampian Research Ethics Committee. A semi-structured interview schedule (Table 1) was developed, covering issues identified as potentially important from a review of the literature. The interview started with an open question inviting participants to tell us about their headaches. This allowed the participants to raise any issues that they felt to be important. If issues arose that weren't on the topic guide the interviewer ensured that these issues were discussed further during the interview. The closed questions detailed in the schedule were not directed towards the participants, but simply used as a guide by the interviewer to the topics to be covered and to identify further relevant areas of interest. Open-ended questions were used throughout the interviews to encourage participants to answer openly and unrestrictedly. The schedule was piloted on four researchers with experience in conducting qualitative interviews so that areas for improvement could be identified. This led to some amendments to the schedule. Formal headache diagnoses were not sought from GP records. Participants were asked to self-report what types of headache they suffer from. Table 1. The interview schedule The interviews were conducted by DAL between October and December 2002. All of the interviews took place in participants' homes except for one which took place on University premises at the participant's request. Informed consent was sought and granted in all patients interviewed and participants' anonymity and confidentiality were ensured. All interviews were audio-taped with the participants' permission and lasted an average of 45 minutes. Immediately after each interview, brief notes were made by DAL, detailing interesting points made, or behaviours displayed, by the participants. Within two days after the completion of the interview the tapes were transcribed verbatim by the interviewer. A sample of tapes and transcripts were reviewed by AME to check that the interviews had been accurately transcribed. Tapes and transcripts were marked with ID numbers to ensure anonymity and were stored securely to maintain confidentiality. Analysis The interviews were analysed using the Framework approach: a thematic analysis consisting of five stages [22]. The first stage, 'familiarisation', was achieved by reading each transcript and noting down recurring issues. All transcripts were read twice by DAL and once by at least one other member of the research team (AME and PCH). Having done this, the second stage, 'identifying a thematic framework' was completed by arranging the recurrent issues that had emerged into themes and sub themes (Table 2). Interesting and relevant quotes were also identified at this stage to illustrate the themes. Themes and sub-themes were given unique codes, which were marked on the margins of the transcripts to identify interesting issues arising – this process constitutes the third stage, 'indexing'. For the fourth stage, 'charting', charts were constructed for each of the main themes that emerged, with sub-theme categories placed along the top of the charts and participants placed down the sides. By conducting each of these four steps accurately and rigorously, the fifth step, 'mapping and interpretation', was simply achieved by placing relevant sections of the transcript into the appropriate charts. The Framework approach makes between and within subject analysis possible enabling researchers to compare and contrast participants' opinions and perceptions in each sub-theme, therefore illustrating the similarities and differences between them. Reliability of the data and interpretation of the findings were checked at each stage of the process (AME and PCH). Table 2. Themes and sub-themes Results Response Nineteen out of the thirty individuals contacted agreed to participate in the study, 5 respondents indicated that they did not wish to participate, and the remaining 6 did not respond. Reasons for non-participation were not sought. A total of 17 interviews were conducted. Mutually convenient interview times could not be arranged for the last two individuals within the timescale of the study. Sample characteristics Table 3 details the participant characteristics, headache characteristics and associated health care utilisation in the last year of the participants. Most respondents reported suffering from migraines or tension-type headaches. The frequency of headaches in the sample ranged from daily to monthly. Many participants reported that the frequency of their headaches changed depending on the time of year and their current circumstances (i.e. levels of stress at work, family commitments, other health problems etc). Most of the individuals interviewed had been suffering with headaches for several years. Most participants reported that their headaches were of mild to moderate severity, but some reported severe headaches. Table 3. Characteristics of participants The themes A number of interesting issues were raised throughout the interviews, many of which were inter-related and overlapping. However, three broad themes emerged: 'impact on life', 'knowledge and understanding', and 'management'. A summary of the themes and sub-themes emerging from the interviews is shown in Box 2. Impact on life (Table 4) Table 4. Quotes relating to impact on life Almost every participant reported that various aspects of their lives had been adversely affected by their headaches including work, social and family life and mood. Inability to function fully Most participants mentioned that it was difficult to carry out daily activities and that their headaches stopped them doing things to the best of their abilities. At work, several people found it hard to concentrate when suffering a headache and felt their performance had been limited. Most had experienced disruption to their work or careers in some way and taking time off was common. Some participants stated that their headaches had prevented them from being promoted and one reported that her constant headaches had not been compatible with her previous work, forcing her to change career. Accounts were also given of several ways in which family and social life was disrupted by an inability to function fully. Some people had been forced to give up hobbies for example reading and hill-walking and common daily activities like driving and sleeping were often affected. Several people spoke of wanting to be alone when suffering from a headache and not being bothered by anything or anyone. This appeared to be particularly problematic for those with more frequent headaches, and some expressed concerns about how this affected their relationships with family and friends. Unpredictability of headaches Several participants found that their headaches were unpredictable and said that they had a lack of control over the course of a headache which impacted on all aspects of their life. It was common for example for participants to have to be sent home from work because a headache had developed. Some participants reported that the unpredictability of headaches had also impacted on their family lives. For example, many spoke of incidents where their headaches had caused them to miss out on something they were looking forward to or had spoiled their enjoyment of an event. Those who had found effective ways of managing and coping with their pain were less troubled by the fact that their headaches could occur at any time. Effect on mood The headaches also affected participants' lives by negatively impacting on mood. Descriptions of the effects headaches had included feeling depressed or down, self-pity, aggression and embarrassment. Depression seemed to occur quite commonly among the participants and one man disclosed suicidal feelings because of his constant pain. Getting on with things In spite of the pain and their lives being adversely disrupted, some participants expressed the need to get on with things, stressing the importance of carrying on and not letting headaches govern them. Some participants went to work and attended social engagements when suffering a headache and spoke of persevering because they felt a responsibility to others. Some had begun to feel that their headaches were just part of their lives. This feeling seemed to be more common among those who had suffered headaches for many years. Knowledge and understanding (Table 5) Table 5. Quotes relating to knowledge and understanding Participants had developed their own ideas about aspects of their headaches, often suffered from worry about their condition and were seeking additional information from a variety of sources. Lay understanding and explanation Most participants had formed their own ideas about different aspects of their headaches including diagnosis, underlying cause and severity. These ideas were often influenced by the experiences of friends and family or from articles they had read. Some participants had not received a formal diagnosis for their headaches but had come up with one themselves based on how their symptoms compared with others they knew or had read about. Patients who believed they had a stressful lifestyle for example diagnosed themselves with tension-type headache, while those with frequent severe headaches often believed they must be suffering from migraines. Several participants had also developed their own ideas on the cause of their headaches and many believed that the underlying cause of their pain was serious. Brain tumours, haemorrhages and strokes were mentioned as potential aetiologies. Many patients had also identified triggers for their headaches such as stress, diet and lifestyle factors. Patients were also trying to understand changes in the severity of their headaches. Reasons given for why headaches had improved included being more relaxed, changing diet, and getting older. Headaches which had deteriorated often caused worry and reinforced the belief of a serious underlying pathology. Seeking of information Many participants had searched, or were searching, for an increased understanding of their headaches to try to make sense of it all. In particular patients were looking for a diagnosis or explanation of the cause of their headaches. Some participants preferred to obtain advice directly from their general practitioners. GP's were often consulted for information, particularly about new treatments or details of drug side effects or interactions. Many participants reported that they had also read books, magazine articles or searched the Internet for information about headaches. Information was also sought from others such as friends and family. Most participants had obtained information from a variety of sources, and some considered themselves to be quite knowledgeable about their condition as a result. Worry Several participants said that their headaches had, at some point, caused them constant and often substantial worry. Many had been worried and frightened when they first started suffering headaches, a particular concern being that the underlying cause might be serious. Others spoke of being greatly worried even though they had suffered headaches for years. Interestingly, receipt of a formal diagnosis from a GP did not seem to reduce worry in some participants and had triggered many to search for increased knowledge and understanding of the problem. It also resulted in a number of participants consulting their GP with the expressed wish for further diagnostic tests. The few participants who had received brain scans to rule out serious underlying pathology stated that they had been relieved to receive the "all clear" and their worry had reduced afterwards. Indeed, some reported that their headaches had diminished as a result. Management (Table 6) Table 6. Quotes relating to management Most participants had used or were still using a variety of management strategies including conventional, complementary and personally developed management techniques. Use of conventional medication Nearly all participants used conventional medication. Participants who reported having migraines most often used drugs obtained by prescription, whereas those who had tension or sinus-related headaches generally reported using non-prescription treatments. Some individuals used medicines obtained by both routes, particularly those who experienced a variety of headache types or who had chronic daily headaches and many found non-prescription medication just as effective as that obtained on prescription. There were several positive comments made about medications, however, a number of individuals expressed concerns. The lack of effectiveness of medications, side effects and drug interactions were of most concern. Many of those who had been on medication for their headaches for a long time no longer found their medicines as effective as they had initially. A number of the participants who reported suffering from side effects also had relatives or friends who had experienced problems while taking medication. Drug interactions appeared to be a problem for a number of respondents particularly for those who took a number of different medicines. A number of people admitted to taking more tablets than they should because their headaches were so severe. Use of complementary therapies Several participants had used complementary therapies, although only after conventional treatments had been tried first. Homeopathy and reflexology were the most frequently mentioned therapies. Most users were positive about their experiences, and most of the participants who had never tried them found the idea appealing. Many individuals had stopped using alternative therapies, despite finding them useful, because they cost too much while others had stopped using them because they simply didn't find them helpful. G P management Most participants had consulted, or were still consulting their GP about their headaches. Many were satisfied with their care and generally had positive opinions of their doctors although some negative comments were made including that the GP was dismissive or disinterested in the problem. Reasons for seeking or not seeking help from a GP for headache were explored. Headache severity was a strong influence, with a change in, or worsening of, symptoms often the prompt for consulting. Effectiveness of management strategies also had a strong bearing on whether participants consulted: those who had already found an effective way of controlling their headaches reported visiting their GP less often than those who struggled to contain their symptoms. Some of the respondents who were no longer seeing their GP were using over-the-counter medicines for their headaches and appeared to have them under control so did not feel they needed to consult with their GP. Other reasons for not consulting included: belief that the doctor did not have enough time; previous bad experience with a doctor; being concerned about the expense of treatments; or worry about what the doctor might think about them. Own management techniques In addition to using medicines and consulting health professionals, participants described a number of other techniques that they had found helpful for alleviating their symptoms. Common strategies included lying down in darkened rooms, or using cold or warm compresses. However, some described less conventional techniques such as digging their fingers into their necks or banging their heads off walls. Discussion Summary of findings We found that headaches frequently adversely affect the lives of sufferers, with some wide-ranging effects on work, family life, social activities and mood. Many individuals had developed their own explanations for their headaches and many reported worry about the cause of the headaches. As a result most participants were searching for an increased understanding of their condition. Although the GP was seen as an important source of advice and treatment, many individuals were concerned about taking medication and many were trying complementary therapies or using their own management techniques. Strengths and limitations of the study This study interviewed men and women from the general population who suffered from different types of headache with various causes, frequency and severity. It is one of the first qualitative studies to explore the experiences and perceptions of people with varying headache types and provides important in-depth understanding of the range of problems headache sufferers face including the impact of headaches, understanding and knowledge about headaches and experiences and expectations associated with healthcare and treatment. By studying the broad spectrum of headache types, rather than limit ourselves to one specific type, we were able to identify a range of issues relevant to headache and its impact. Although this approach means that some of our findings will not be relevant to all headache sufferers the approach has provided a useful insight into the differences in perceptions and experiences of headache sufferers. It has also highlighted some issues that will be worth exploring in sub-groups of individuals, particularly with a view to developing new treatments. Information on the cause of the head pain was not determined in the original cohort and so we do not know if the individuals interviewed in this study had a primary headache disorder or whether the headache was a result of some other cause such as trauma. Our results can only apply to the age range of individuals included in the sample. Specific issues important to groups outwith this age range will not have been identified. In addition, since participants were sampled from a group of individuals with self-reported chronic pain (pain persisting beyond three months), our findings may not reflect the experiences of people who's headaches have not persisted this long. Local availability of different services may have driven use of certain services, and this may vary by geographical location across the UK. The researcher's roles and opinions may have affected both the data collection and interpretation. This was minimised where possible by having checks on the data by a second member of the research team. Important issues to emerge and comparison with other studies Several important issues emerged from our study, some of which have been reported in previous studies and some of which have not been documented before. The impact of headaches on life emerged as a key theme in this study and has been well documented in previous quantitative studies [4-11] and in the qualitative studies that have been undertaken [15-17]. Our findings on the impact of headache on daily functioning (including impact on work, social and family life and mood) are broadly in line with previous qualitative studies of headache, despite differences in the type of headache investigated and the populations studied. In a focus group study in the US with 24 people who had been experiencing migraines for at least 6 months Cottrell et al [15] reported that all aspects of family, recreational and social activities had been hampered by their headaches. The effect on work was substantial, with participants reporting having to go home early and feelings of guilt for not carrying a fair share of the workload. They also found that many participants expressed apprehension about losing their jobs because of the time they missed. This did not emerge as a clear issue in our study and may be more relevant to migraine sufferers who are likely to take more time off work. Ruiz de Velasco et al [16] in a Spanish study on quality of life in migraine patients reported similar impacts on work and studies, life within the family, social relationships, and leisure time. They found that respondents had difficulties in performing their duties at work and felt they couldn't fulfil their real potential. Many participants reported difficulties in going out with other people and some reported that they had declined to participate for fear of having a migraine attack. They found a greater impact on family relationships than we reported, particularly in terms of the effect on children. This may have been because the age range of our participants meant that fewer respondents had young children at home. Like us Ruiz de Velasco et al found that the impact on mood was an important issue with their respondents reporting mood swings, unhappiness and hopelessness and a greater lack of emotional control. Contrary to this Cottrell et al [15] reported that their participants denied emotional distress despite the emotional charge obvious in many of their statements. Our study adds some understanding to the wide-ranging and extreme effects headache can have on peoples lives, for example forcing people to change career or leading to severe depression and thoughts of suicide. Further work is necessary to identify ways that impact can be minimised and quality of life improved. The second theme to emerge from our study was knowledge and understanding about headaches which showed that many participants had formed their own ideas about their headaches, which had often led to considerable worry, and many were searching for an increased understanding of their headaches from a variety of sources. In a qualitative study of patients decision making for migraine and chronic daily headache management Peters et al [17] reported similar issues to us. They found that an individual's knowledge about headaches was acquired through the participant's own and other people's experiences and through information gathering. Patients sometimes had to recognize the limitations of his/her own ideas for headache management and resort to GP consultation. They found that individuals had sought information from a variety of sources including health professionals, family and friends, the media and specialized organisations. Cottrell et al [15] also found that people with migraines often need more general information about migraines and migraine management. It is clear then that people are interested in understanding more about their headaches and securing relevant information about it. This desire for further information needs greater investigation. The issue of worry raised in this study has not been highlighted clearly before. Most participants in our study had, at some point, worried, often substantially, that their headaches were caused by serious pathology, even patients who had been given a formal diagnosis. The fact that participants who had received brain scans stated that their worry had reduced and in some cases their headaches had diminished as a result merits further enquiry. The third theme to emerge focussed on issues about management of headaches. We found that most participants had used or were still using a variety of management strategies including conventional, complementary and personally developed management techniques and that satisfaction with different management strategies varied widely. Our findings on issues related to management were largely consistent with previous studies [15,17]. Cottrell et al [15] found that while some of their group members were happy with the medical care they received others reported feeling 'dismissed' by physicians who did not appear to take headaches seriously. In addition they found that headache sufferers were taking responsibility for researching new treatment options including medications and alternative treatments. Peters et al [17] found similar reasons to us for GP consultation with headache severity, patient preferences, previous experience of healthcare services and other people's experiences of health care all playing a role in management decisions. Some of the issues that emerged from our study around headache management have not been investigated in qualitative studies of headache, but are consistent with qualitative studies of individuals with other chronic conditions, particularly with respect to general practitioner involvement and medication [23-27]. For example, previous qualitative studies have clearly highlighted limitations with the GP consultation, [23-25] while other studies have found that chronic users of medication often worry about the side effects of their medication and possible drug interactions [26,27]. The full range of management techniques used by headache sufferers including unconventional techniques developed by the sufferers has not been highlighted before and this needs further investigation to optimise appropriate management of headache in the community. Conclusion and future implications An in-depth understanding of the experiences of people with headache is important if we are to develop new treatment or interventions that might reduce the burden of the disorder. This study has highlighted some issues that require further investigation and provided useful information that might guide the development of such interventions. For example, the frequent wish to increase understanding of headache suggests that many people with headache could benefit from detailed information about the causes and management of headaches. Research is needed to determine whether such educational strategies result in beneficial health outcomes. Educational strategies are being developed for patients and health care professionals, particularly with reference to migraine [28,29] and will require future evaluation. Open accessing scanning may be a useful intervention to rule out serious underlying pathology and reduce anxiety in headache sufferers. Previous work has shown that a single visit to a neurological clinic for headaches not due to structural disease results in the number of attendances at general practice for headache dramatically falling [30,31]. However, numbers have been small and it may be that patients present to general practice just as often, but with different symptoms. There is little evidence that scanning is of any use in non-anxious patients [32] and it is likely therefore that the most cost effective route would be to scan only those who present with anxiety. Declaration of competing interests The author(s) declare that they have no competing interests. Authors' contributions DAL participated in the design of the study, carried out the interviews, conducted the analysis and drafted the manuscript. AME conceived the study, and participated in its design and coordination and helped to draft the manuscript. PCH conceived the study and participated in its design and coordination and helped to draft the manuscript. All authors read and approved the final manuscript. Acknowledgements This paper is based on a thesis completed as part of a BSc Med Sci Intercalated degree at the University of Aberdeen. We thank the Health Foundation for providing financial assistance to DAL during her degree. We thank the study participants for their time and cooperation with this work. References 1. Rasmussen BK, Jensen R, Schroll M, Olesen J: Epidemiology of headache in a general population – a prevalence study. J Clin Epidemiol 1991, 44:1147-1157. PubMed Abstract | Publisher Full Text OpenURL 2. Hagen K, Zwart JA, Vatten L, Stovner LJ, Bovim G: Prevalence of migraine and non-migrainous headache- head-HUNT, a large population-based study. Cephalalgia 2000, 20:900-906. PubMed Abstract | Publisher Full Text OpenURL 3. Roh JK, Kim JS, Ahn YO: Epidemiologic and clinical characteristics of migraine and tension-type headache in Korea. Headache 1998, 38:356-365. PubMed Abstract | Publisher Full Text OpenURL 4. Boardman HF, Thomas E, Croft PR, Millson DS: Epidemiology of headache in an English district. Cephalalgia 2003, 23:129-137. PubMed Abstract | Publisher Full Text OpenURL 5. Rasmussen BK, Jensen R, Olesen J: Impact of headaches on sickness absence and utilisation of medical services: a Danish population study. J Epidemiol Community Health 1992, 42:442-446. OpenURL 6. Stang P, Von Korff, Galer BS: Reduced labor force participation among primary care patients with headaches. J Gen Intern Med 1998, 13:296-302. PubMed Abstract | Publisher Full Text OpenURL 7. Stewart WF, Lipton RB, Simon D: Work-related disability: results from the American migraine study. Cephalalgia 1996, 16:231-238. PubMed Abstract | Publisher Full Text OpenURL 8. Solomon GD, Slobieranda FG, Gregg L: Quality of life and well-being of headache patients: measurement by the Medical Outcomes Study Instrument. Headache 1993, 33:351-358. PubMed Abstract | Publisher Full Text OpenURL 9. Edmeads J, Findlay HF, Tugwell P, Pryse-Philips W, Nelson RF, Murray TJ: Impact of migraine and tension-type headache on life-style, consulting behaviour, and medication use: A Canadian population study. Can J Neurol Sci 1993, 20:131-137. PubMed Abstract OpenURL 10. Kryst S, Scherl E: A population based survey of the social and personal impact of headache. Headache 1994, 34:344-350. PubMed Abstract | Publisher Full Text OpenURL 11. Smith R: Impact of migraine on the family. Headache 1998, 38:423-426. PubMed Abstract | Publisher Full Text OpenURL 12. Fishman P, Black L: Indirect costs of migraine in a managed care population. Cephalalgia 1999, 19:50-57. PubMed Abstract | Publisher Full Text OpenURL 13. Lipton RB, Scher AI, Kolodner K, Liberman J, Steiner TJ, Stewart WF: Migraine in the United States. Epidemiology and patterns of healthcare use. Neurology 2002, 58:885-894. PubMed Abstract | Publisher Full Text OpenURL 14. Peters M, Abu-Saad HH, Vydelingum V, Murphy M: Research into headache: The contribution of qualitative methods. Headache 2002, 42:1051-1059. PubMed Abstract | Publisher Full Text OpenURL 15. Cottrell CK, Drew JB, Waller SE, Holroyd KA, Brose JA, O'Donnell FJ: Perceptions and needs of patients with migraine. A focus group study. J Fam Pract 2002, 51:142-147. PubMed Abstract | Publisher Full Text OpenURL 16. Ruiz de Velasco I, Gonzalez N, Etxeberria Y, Garcia-Monco JC: Quality of life in migraine patients: a qualitative study. Cephalalgia 2003, 23:892-900. PubMed Abstract | Publisher Full Text OpenURL 17. Peters M, Abu-Saad HH, Vydelingum V, Dowson A, Murphy M: Patients' decision-making for migraine and chronic daily headache management. A qualitative study. Cephalalgia 2003, 23:833-841. PubMed Abstract | Publisher Full Text OpenURL 18. Elliott AM, Smith BH, Penny KI, Smith WC, Chambers WA: The epidemiology of chronic pain in the community. Lancet 1999, 354:1248-1252. PubMed Abstract | Publisher Full Text OpenURL 19. Elliott AM, Smith BH, Hannaford PC, Smith WC, Chambers WA: The course of chronic pain in the community: results of a 4-year follow-up study. Pain 2002, 99:299-307. PubMed Abstract | Publisher Full Text OpenURL 20. International Association for the Study of Pain: Classification of chronic pain. Pain 1986, (Suppl 3):S1-S226. OpenURL 21. Von Korff M, Ormel J, Keefe FJ, Dworkin SF: Grading the severity of chronic pain. Pain 1992, 50:133-149. PubMed Abstract | Publisher Full Text OpenURL 22. Richie J, Spencer L: 'Qualitative data analysis for applied policy research. In Analysing qualitative data. Edited by Bryman A, Burgess R. London: Routledge; 1993:173-94. OpenURL 23. Dixon-Woods M, Critchley S: Medical and lay views of irritable bowel syndrome. Fam Pract 2000, 17:108-11. PubMed Abstract | Publisher Full Text OpenURL 24. Cromarty I: What do patients think about during their consultations? A qualitative study. Br J Gen Pract 1996, 46:525-528. PubMed Abstract | PubMed Central Full Text OpenURL 25. Pollock K, Grime J: Patients' perceptions of entitlement to time in general practice consultations for depression: qualitative study. BMJ 2002, 325:687. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL 26. Britten N: Patients' ideas about medicines: a qualitative study in a general practice population. Br J Gen Pract 1994, 44:465-468. PubMed Abstract | PubMed Central Full Text OpenURL 27. Rogers A, Addington-Hall JM, McCoy ASM, Edmonds PM, Abery AJ, Coats AJS, Gibbs JSR: A qualitative study of chronic heart failure patients' understanding of their symptoms and drug therapy. Eur J Heart Fail 2002, 4:283-287. PubMed Abstract | Publisher Full Text OpenURL 28. Migraine in Primary Care Advisors [http://mipca.org.uk/] webcite 29. Migraine Action Association [http://migraine.org.uk/] webcite 30. Fitzpatrick R, Hopkins A: Referrals to neurologists for headaches not due to structural disease. Journal of Neurology, Neurosurgery and Psychiatry 1981, 44:1061-1067. OpenURL 31. Grove JL, Butler P, Millac PAH: The effect of a visit to a neurological clinic upon patients with tension headache. The Practitioner 1980, 224:195-196. PubMed Abstract OpenURL 32. Goadsby PJ: To scan or not to scan in headache. BMJ 2004, 329:469-70. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL Pre-publication history The pre-publication history for this paper can be accessed here: http://www.biomedcentral.com/1471-2296/7/27/prepub
__label__pos
0.735654
XSL Java This exercise covers the exploitation of a Java application using XSL PRO Tier Medium < 1 Hr. 86 Media Badge In this challenge, we are going to look at Extensible Stylesheet Language (XSL) and how it can be used to trigger unexpected behaviors in applications leveraging them, specifically in a Java application. To solve this challenge, you will need to gain command execution. This involves leveraging the `xsl:variable` tag to access the current `Runtime`, which will allow you to call the method `exec` with the desired command. The process starts with uploading an XSL file to transform the given XML. By creating an object from `rt:getRuntime()`, you can get the current runtime. Using this runtime object, you can call `exec` with your command. This method is effectively demonstrated in the video, where the command is replaced with the score command, uploaded, and executed, ultimately solving the challenge. Want to learn more? Get started with PentesterLab Pro! GO PRO
__label__pos
0.913061
Computer based maternity database system Searchable collection of local public policies that explicitly support community food systems this database provides policymakers on-line query system based on aoa-related data files and this site provides access to cms computer data and systems research studies and reports. There are four basic components of database management system:(i) data: raw facts which we want to feed in the computer(ii) hardware. Computer science project topics design an implementation of a computer based seaport billing system (a case study of nigerian port authority lagos) 15 169 design and implementation of a computer based maternity database system. Auditing in a computer-based environment (2) related links 'system software' refers to the operating system, database management systems and other software that increases the efficiency of processing impact of computer-based systems on the audit approach. Download citation | the maternity care c | the maternity care classification system: a more accurate way of defining models of care than by name alone natasha donnolley, georgina chambers, michael chapman, kerryn butler-henderson, elizabeth sullivan background there is well-established evide. Welcome to the games and simulation for healthcare library and database and clinical research taking advantage of games and simulation-based learning the board of regents of the university of wisconsin system. Other benchmarks include tpc-r and tpc-h for datawarehouses and decision support systems, and tpc-w for web-based database systems download computer weekly in the current issue: disaggregated systems try to unlock the nvme conundrum. Multiple choice questions redundancy is minimised with a computer based database approach true false: the relational database model is based on concepts proposed in the 1960s and 1970s true false: a row in a database can also be called a domain. Value-based purchasing / risk-based contracting healthcare databases: an oltp database is one that a single computer application runs on an electronic health record the lab system has its own database, the hr system has its own database. Maternity care essay implementation of a computer based maternity database system (case study of poly clinic asata hospital, enugu) presented to the computer science department, hospital of technology institute of management and technology. A broad concept that encompasses computer systems and related devices additional software is required to implement the database approach to data management a database management system (dbms) a database management system. The maternity services data set (msds) system suppliers from 01 november 2014, maternity systems must be fully conformant with this standard care providers data submissions for maternity services are based upon fixed period reporting. Computer based information system computer based is (cbis) computer based information system the first four components (hardware, software, database and network) make up what is known as the information technology platform. Find the best relational databases software using real-time these systems can range from desktop applications that create a small database on your machine to large enterprise-grade data stores (based on user reviews) and scale (based on market share. Our services and technology can help you advance the vision of your organization learn more methodist health system the omaha-based organization successfully made the transition faster and with fewer errors. What is a database server it is similar to data warehouse where the website store or maintain their data and informationa database server is a computer in a lan that is dedicated to database storage and retrieval the database server holds the database management system and the databasesupon requests from the client machines, it searches the. Multimedia system delivers obstetrics is the ideal specialty in which to merge telemedicine system components with a multimedia computer-based patient the cyclical nature of pregnancy allows a finite set of data to be incorporated into a relational database, studied, and. Chapter 1: introduction database system concepts 120 ©silberschatz, korth and sudarshan overall system structure 11 three-tier architecture: eg web-based applications, and applications built using middleware. A database management system (dbms) is a collection of programs that enables you to store, modify, and extract information from a database computer architecture provides an introduction to system design basics for most computer science students. Computer based maternity database system Medical & hospital systems | igcse ict you are here → home → theory notes several outputs from the computer system let hospital staff the patient's condition: types of database analogue and digital data 6 the effects of using ict. • Free essay: title design and implementation of a computer based maternity database system (case study of poly clinic asata hospital, enugu) presented to the. • Start studying eecs chapter 8 learn vocabulary, terms, and more with flashcards computer-based information system that helps managers with nonroutine decision-making tasks in a database management system. • Authentication systems based on public key cryptography issue digital certificates to user clients (on the computer where the database resides) you can administer database security using the operating system. A computer database is a huge compilation of electronic files stored at a single location that is designed and modeled to support processes that require what is a computerized database a: bigger organizations use a more sophisticated centralized database system to support internal. Database design and implementation using visual basic by: mohannad taha & saad fadhil 21 database system the pressure built design a computer based system that would track and produce required reports [1. Award-winning, acute ehr solutions that provide real-time, patient-centered information instantly and securely anytime, from anywhere. Database management system dbms definition this feature is referred to as referential integrity - an important concept in a relational database system what is the difference between a mobile os and a computer os. computer based maternity database system Advantages and disadvantages of database management system (dbms) advantages of database management system: the dbms has a number of advantages as compared to traditional computer file processing approach in a computer file-based system. computer based maternity database system Advantages and disadvantages of database management system (dbms) advantages of database management system: the dbms has a number of advantages as compared to traditional computer file processing approach in a computer file-based system. Computer based maternity database system Rated 3/5 based on 44 review Similar articles to computer based maternity database system 2018.
__label__pos
0.868417
Programavimas C#. Int array vs. ArrayList vs. Dictionary private static void TestIntArray() { int [] array = new int[1000]; for (int i = 0; i < 1000; i++) array[i] = i; } private static void TestArrayList() { ArrayList array = new ArrayList(); for (int i = 0; i < 1000; i++) array.Add(i); } // Code.... long start = DateTime.Now.Ticks; TestIntArray(); long end = DateTime.Now.Ticks; Console.WriteLine("Time with int array: {0}", end - start); long start2 = DateTime.Now.Ticks; TestArrayList(); long end2 = DateTime.Now.Ticks; Console.WriteLine("Time with ArrayList array: {0}", end2 - start2); The result: Time Point multiplication in Elliptic Curves I was browsing the web for information about the binary multiplication (also known as "left-to-right multiplication") in Ellipti curves. I wrote a demonstration of the algorithm. Unfortunately, it's very brief version, but it might be interesting for someone :) This demonstration generates the right point multiplication sequency in binary multiplication of point. First - very short theory. Point multiplication is the operation: Q = k∙P. Point multiplication is the combination of point doubling and point addition. FMOD Ex-based sound system for game project We (I and the members of my project team) are creating a game for our Project work lecture. I'm creating sound system :) I went to FMOD website and took a FMOD Ex package. There were some examples for C# :) If you want to create a sound system with C# and FMOD you need to copy at least fmod.cs file from <FMOD Ex installation directory>\api\csharp. But if you did that, also grab fmod_dsp.cs and fmod_errors.cs. They might be useful latter :) And also include in your project <FMOD Ex installation directory>\api\fmodex.dll. My not finished sound system can play sounds in multiple channels :) Right now I am thinking, should I create a universal sound playing and stopping method (something like Play(string song)), but I'll see :) Undefined reference to `__gxx_personality_v0' I was compiling FMODMini library and got a terrible mistake saying that "undefined reference to `__gxx_personality_v0'". This mistake simply means, that I should use C++ compiler, instead of C :) That's it :) In FMODMini case I just edited makefile and changed gcc to g++. XNA. Change resolution & set full screen I am creating a game with the XNA framework and I needed to change the resolution for XNA game. So, that's how it's done: public class MyCoolGame : Microsoft.Xna.Framework.Game // Code... // GraphicsDeviceManager graphics = new GraphicsDeviceManager(this); graphics.PreferredBackBufferWidth = Width; graphics.PreferredBackBufferHeight = Height; graphics.ApplyChanges(); Another very useful property is IsFullScreen - boolean variable, which sets game to full screen or not (do not forget to call graphics.ApplyChanges().). Passing parameters in C# In C we can use a function printf(), which can take different numbers of parameters. E.g.: printf("%d %s", a, b). How this can be done in C#? It can be done by keyword params: int Method(params int[] var) { int sum = 0; foreach (int i in var) sum += i; return sum; } // Code... Method(5, 2, 3); Method(64, 1); Method(9); More information: http://msdn.microsoft.com/en-us/library/w5zay9db(VS.71).aspx C#. Set culture info I had one problem. My computer's Global Settings are set to the Lithuanians, but now I live in Austria. I need to change the currency of my program from litas (LTL) to euro (EUR). How could I do that? It's very simple: using System.Globalization; // Code... CultureInfo ci = new CultureInfo("de-AT"); // Code... Console.WriteLine(stringWithCurrency.ToString("C", ci)); Happy coding!
__label__pos
0.718308
The definition of an arc flash is “an undesired electric discharge that travels through the air between conductors or from a conductor to a ground.” The arc flash is a part of an arc fault, which is an example of an electrical explosion caused by a low-impedance connection that goes through the air to the ground. Video: Arc Flash Demonstration When an arc flash occurs it creates a very bright light and intense heat. In addition, it has the potential to create an arc blast, which can cause a traumatic force that can severely injure anyone in the area or damage anything nearby. What Happens During an Arc Flash An arc flash begins when the electricity exits its intended path and begins traveling through the air toward a grounded area. Once this happens, it ionizes the air, which further reduces the overall resistance along the path that the arc is taking. This helps draw in additional electrical energy. The arc will travel toward a ground of some type, which will typically be whatever object is closest to its source. The exact distance that an arc flash can travel is known as the arc flash boundary. This is determined by the potential energy present and a variety of other factors such as air temperature and humidity. Arc Flash Boundaries When working to improve arc flash safety, a facility will often mark off the arc flash boundary using floor marking tape.  Anyone who is working within that area will be required to wear personal protective equipment (PPE). Potential Temperature of an Arc Flash One of the biggest dangers associated with an arc flash is the extremely high temperature it can create. Depending on the situation, they can reach temperatures as high as 35,000 degrees Fahrenheit. This is one of the hottest temperatures found anywhere on earth and is actually about 4 times hotter than temperatures found on the surface of the sun. Even if the actual electricity doesn’t touch a person, they can be severely burned if they are anywhere near it. In addition to direct burns, these temperatures can quickly start fires in the area. Arc Flash Guide Free Arc Flash Guide: Learn exactly what arc flash labels should contain according to updated NFPA guidelines. Our FREE Arc Flash guide is full of important and pertinent information for the arc flash professional. Along with clear labeling guidelines, it also provides insight into NFPA 70E standards and minimal label requirements. Get Free Arc Flash Guide What an Arc Flash Looks Like The following video shows just how quick and explosive an arc flash can be. This video has a controlled arc flash with a “test dummy” so people can see what a real arc flash looks like: How Long an Arc Flash Lasts An arc flash can last anywhere from a fraction of a second to several seconds, depending on a number of factors. Most arc flashes don’t last very long because the source of the electricity is cut off quickly by circuit breakers or other safety equipment. The most advanced systems today use devices known as arc eliminators, which detect and extinguish the arc within just a few milliseconds. If a system does not have any type of safety protection, however, the arc flash will continue until the flow of electricity is physically stopped. This may occur when an employee physically cuts the power to the area or when the damage caused by the arc flash becomes severe enough to somehow stop the flow of electricity. See a real life example of an arc flash that goes on for an extended period of time in the following video. Luckily the individuals in the video were wearing their personal protective equipment and escaped without injury. The powerful explosion, loud noise, bright light, and intense heat are all extremely dangerous and could have been much worse. Video: Arc Flash Explosion Damage Potential of an Arc Flash Due to the high temperatures, intense blasts, and other results of an arc flash, arc flashes can cause a lot of damage very quickly. Understanding the different types of damage that can occur can help facilities plan their safety efforts. The two main types of damage include damage to the facility and damage (injury) to people in the area. Potential Property Damage: • Heat – The heat from an arc flash can easily melt metal, which can damage expensive machines and other equipment. • Fire – The heat from these flashes can quickly cause a fire, which can spread through a facility if not stopped. • Blasts – The arc blast that can result from an arc flash can break windows, splinter wood in the area, bend metal, and much more.  Anything stored within the arc blast radius can be damaged or destroyed in just seconds. Potential Human Injury: • Burns – Second and third degree burns can occur in a fraction of a second when someone is near the arc flash. • Electrocution – If the arc flash travels through a person, he or she will be electrocuted.  Depending on the amount of electricity, where it enters the body, and where it leaves, this can be fatal. • Auditory Damage – Arc flashes can cause extremely loud noises, which can cause permanent hearing damage to those in the area. • Eyesight Damage – Arc flashes can be very bright, which can cause temporary or even long-term damage to the eyes. • Arc Blast Damage – An arc blast can create a force that is thousands of pounds per inch.  This can knock a person through the area several feet. It can also cause broken bones, collapsed lungs, concussions, and more. Wearing personal protective equipment can provide a significant amount of protection, but it cannot eliminate all risk. Employees who are present when an arc flash occurs are always at risk, no matter the PPE they are wearing. This is why it is important to de-energize a machine before it is worked on whenever possible. Potential Causes of an Arc Flash Arc flashes can occur for a wide range of reasons. In most cases, the root cause will be a damaged piece of equipment such as a wire. It could also be a result of someone working on equipment, which makes it possible for the electricity to escape from the path it is normally confined to. Even when there is a potential path outside the wiring, the electricity is going to follow the path of least resistance. This is why an arc flash will not necessarily happen as soon as something is damaged or an alternate path is made available. Instead, the electricity will continue down the intended path until another option that has less resistance becomes available. Here are some things that can create a path with lower resistance and therefore cause an arc flash: • Dust – In dusty areas the electricity may begin passing outside the wiring or other equipment through the dust. • Dropped Tools – If a tool is dropped onto a wire, for example, it can damage it and allow the electricity to pass into the tool. From there, it must find another path to continue on. • Accidental Touching – If a person touches the damaged area, the electricity may travel through his or her body or at least out of the normal path, creating an arc flash. • Condensation – When condensation forms, the electricity may escape the wiring through the water, and then the arc flash will occur as the electricity seeks its destination. • Material Failure – If a wire is damaged to the point where the electricity has trouble passing through, the path may be more resistant than going outside of the wire. • Corrosion – Corrosion can create a path outside the wire, at which point the arc flash occurs. • Faulty Installation – When equipment is installed improperly it can make it difficult or impossible for electricity to follow the intended path, which can cause an arc flash. Arc Flash Safety Requirements Companies with electrical equipment need to take arc flash safety very seriously. There are many things that can be done to reduce the chances an arc flash will occur and keep people as safe as possible if one does happen. Preventing Arc Flashes The first step in arc flash safety is minimizing the risk of one occurring. This can be done by completing an electrical risk assessment, which can help identify where the biggest dangers are in a facility.  IEEE 1584 is a good option for most facilities and will help identify common problems. Routine inspections of all high voltage equipment and all wiring are another essential step. If there is any sign of corrosion, damage to wires, or other issues, they should be fixed as soon as possible. This will help keep the electrical currents safely contained within the machines and wires where they belong. Some specific areas that should be inspected include any electrical switchboards, panelboards, control panels, socket enclosures, and motor control centers. Proper Labeling Efforts Anywhere in a facility where high electrical currents can exist should be properly labeled with arc flash warning labels. These can be purchased pre-made or printed with any industrial label printer as they are needed. The National Electrical Code article 110.16 clearly states that this type of equipment needs to be marked to warn people of the risks. Arc Flash Label De-Energizing Equpment when Performing Maintenance Whenever a machine needs to be worked on in any way, it should be completely de-energized.  De-energizing a machine is more than just turning it off.  All machines should be shut down and physically disconnected from any power source.  Once disconnected, a voltage check should also be done to ensure there is no latent energy that was stored up. Ideally a lockout tagout policy should be in place, which will put a physical lock on the electrical supply so that it cannot be accidently plugged back in while someone is working on it. Arc Flash Personal Protection Equipment It should be very rare, but there are some cases when machines must be worked on while they are still energized. When this is the case, all employees working in the area should be required to wear proper personal protective equipment. The specific PPE that is worn should correspond to the maximum potential risk based on the amount of electricity going through the machine. Having head to toe personal protective equipment can help to prevent serious injury or even fatalities should an arc flash occur while the machine is being worked on. Circuit Breakers Whenever possible, circuit breakers should be put in place on all machines. These breakers will quickly detect when there is a sudden surge in electricity being drawn and stop the flow immediately. Even with circuit breakers, an arc flash can occur, but it will only last a fraction of the time since the electrical current will be cut off. Even a very brief arc flash can be deadly, however, so circuit breakers should not be seen as a sufficient arc flash safety program. Arc Flash Safety Standards All facilities must consider the various arc flash safety standards that have been put in place by government and private institutions. Determining which standards must be followed can help ensure a facility is in compliance with area rules and regulations, in addition to helping keep the facility safe. The following are the most common standards that cover arc flash safety: • OSHA – OSHA has several standards including 29 CFR parts 1910 and 1926.  These standards cover requirements for electrical power generation, transmission, and distribution. • National Fire Protection Association (NFPA) – NFPA standard 70-2014, the National Electrical Code (NEC) pertains to safe electrical installation and practices. Standard NFPA 70E, the Standard for Electrical Safety in the Workplace, details a variety of requirements for warning labels, including warning labels concerning arc flashes and arc blasts. It also offers recommendations on implementing workplace best practices to help keep employees who work around high voltage equipment safe. • Canadian Standards Association Z462 – This is very similar to the NFPA 70E standards, but is applicable for Canadian companies. • Underwriters Laboratories of Canada – This set of standards is for any situation where electricity is generated, transmitted, or distributed, and covers safety requirements.  Similar to the OSHA standards but for Canada. • IEEE 1584 – This is a set of guidelines for accurately calculating arc-flash hazards. Similar Posts: None Found
__label__pos
0.809853
“We can think of an intelligent agent as a function, expected to give a useful output (or action) when fed with an input (or observation). Learning is just getting closer to give a correct (or useful) output.” Uğurcan Özalp, A Simple Outline of Reinforcement Learning, towards data science, May 14, 2021.
__label__pos
0.958221
PHP: Logger and Timer Snippets Hey. I’ve just started writing my simplest classes for a new content management micro-system in php, and I’d like to share some moments with you. These classes will probably be good for php noobs out there struggling in the world of object-oriented programming – go for the basics. The Logger class is just a text logger with simple functionality good for logics debugging. The Timer class will be great for performance debugging. Anyways, here we go: class Logger { public $filename; public $mode; public $timestamp; public $linebreak; public $contents; function __construct($filename = "log.log", $timestamp = "d.m.Y h:i:s", $linebreak = "rn", $mode = "a+") { $this->filename = $filename; $this->mode = $mode; $this->timestamp = date($timestamp); $this->linebreak = $linebreak; $this->contents = ""; } function __destruct() { } function write($line) { $this->contents .= "{$this->timestamp} {$line} {$this->linebreak}"; } function flush() { $handle = fopen($this->filename, $this->mode); fwrite($handle, $this->contents); fclose($handle); $this->contents = ""; } } class Timer { public $name; public $start; public $stop; public $format; const FORMAT_S = 0; const FORMAT_MS = 1; function __construct($name = "Timer", $autostart = false, $format = self::FORMAT_S) { $this->name = $name; $this->format = $format; if ($autostart) $this->start(); } function __destruct() { } function start() { $this->start = microtime(true); } function stop() { $this->stop = microtime(true); $interval = $this->stop - $this->start; if ($this->format == self::FORMAT_MS) { $interval *= 1000; } return $interval; } } And this is how you use it: $log = new Logger(); $log->write("some message"); $log->flush(); $timer = new Timer("Timer1", false, $this::FORMAT_MS); $timer->start(); sleep(1); echo "execution time: " . $timer->stop() . " ms"; I doubt that I need to explain this, but anyways, you’re always welcome to question in the comments. By the way, it seems that there’s a bug in php 5 that prevents us from using fwrite in class destructors, so I couldn’t flush on destruct.
__label__pos
0.995654
Why you should only take sips of water during mealtime?  Large glasses of water impedes the digestive process by diluting the gatric juices. Taking several sips of water at a mealtime as compared to drinking a couple of large glasses per meal seems to be a personal preference unless there is a medical reason or a weight loss is desired. Several sources say that at the present time there is no proof at all that water aids in the digestion process.  There is enough water in the fruits and vegetables to supply this.  RELATED: What Does It Mean To Eat Raw Foods? But what I noticed is that an excessive amount of water consumed at a meal dilutes stomach acid concentration. This is very necessary for food breakdown of protein and other nutrients.  I also noticed that the body couldn’t handle large amounts of water at one time because most water at a meal usually has ice in it. If water is drunk lukewarm or at room temperature, it will not interfere with the body’s temperature as much as ice water does. If a person has a medical condition like a hiatus hernia, too much water at a meal will trigger it. Water drank between meals, not during meals, is the most important time for its consumption regarding health issues. To remove toxins and waste products from the body, water is needed for the flow of their elimination. It also is important for the circulation of our body’s fluids and temperature regulation. In 1910, a study was done on a young man who drank 3 liters of water with his meals for five days in a row. The findings showed: an increase in body weight of two pounds in the five days; increased amount of excretion of urinary nitrogen; increased output of ammonia, due to an increased output of gastric juice; decreased excretion of feces and of fecal nitrogen; and a decrease in the quantity of bacteria excreted daily. FOR MORE INFORMATION DOWNLOAD THE EBOOK: Raw Foods Diet Pin It on Pinterest Share This %d bloggers like this:
__label__pos
0.83626
Fluoride, Whitening, Minty, What’s the Difference between Toothpastes? Each individual has their own type of teeth. Some may be more sensitive than others whereas others may need a certain type of toothpaste to keep their teeth whiter and healthier. You may ask, with fluoride, whitening, minty, what’s the difference between toothpastes? There are several differences and similarities between different types of toothpastes. Similarities include: Thickeners, like the name …
__label__pos
1
FANDOM AR4 concluded that there was “high confidence that the rate of global sea level rise increased from the 19th to the 20th century” but could not be certain as to whether the higher rate since 1993 was reflective of decadal variability or a further increase in the longer-term trend. Since AR4, there has been considerable effort to quantify the level of decadal and multi-decadal variability and to detect acceleration in GMSL and mean sea level at individual tide gauges. It has been clear for some time that there was a significant increase in the rate of sea level rise in the four oldest records from Northern Europe starting in the early to mid-19th century (Ekman, 1988; Woodworth, 1990, 1999; Mitchum et al., 2010). Estimates of the change in the rate have been computed, either by comparing trends over 100-year intervals for the Stockholm site (Ekman, 1988; Woodworth, 1990), or by fitting a quadratic term to all the long records starting before 1850 (Woodworth, 1990, 1999). The results are consistent and indicate a significant acceleration that started in the early to mid-19th century (Woodworth, 1990, 1999), although some have argued it may have started in the late 1700s (Jevrejeva et al., 2008). The increase in the rate of sea level rise at Stockholm (the longest record that extends past 1900) has been based on differencing 100-year trends from 1774–1884 and 1885–1985. The estimated change is 1.0 [0.7 to 1.3] mm yr –1 per century (1 standard error, as calculated by Woodworth, 1990). Although sites in other ocean basins do show an increased trend after 1860 (e.g., Figure 3.12), it is impossible to detect a change in the early to mid-1800s in other parts of the ocean using tide gauge data alone, as there are no observations. Numerous studies have attempted to quantify if a detectable acceleration has continued into the 20th century, typically by fitting a quadratic to data at individual tide gauges (Woodworth, 1990; Woodworth et al., 2009, 2011; Houston and Dean, 2011; Watson, 2011) as well as to reconstructed time series of GMSL (Church and White, 2006; Jevrejeva et al., 2008; Church and White, 2011; Rahmstorf and Vermeer, 2011), or by examining differences in long-term rates computed at different tide gauges (Sallenger et al., 2012). Woodworth et al. (2011) find significant quadratic terms at the sites that begin before 1860 (all in the NH). Other authors using more numerous but significantly shorter records have found either insignificant or small negative quadratic terms in sea level around the United States and Australia since 1920 (Houston and Dean, 2011; Watson, 2011), or large positive quadratic values since 1950 along the U.S. east coast (Sallenger et al., 2012). However, fitting a quadratic term to tide gauge data after 1920 results in highly variable, insignificant quadratic terms (Rahmstorf and Vermeer, 2011), and so only studies that use data before 1920 and that extend until 2000 or beyond are suitable for evaluating long-term acceleration of sea level. A long time scale is needed because significant multi-decadal variability appears in numerous tide gauge records during the 20th century (Holgate, 2007; Woodworth et al., 2009, 2011; Mitchum et al., 2010; Chambers et al., 2012). The multi-decadal variability is marked by an increasing trend starting in 1910–1920, a downward trend (i.e., leveling of sea level if a long-term trend is not removed) starting around 1950, and an increasing trend starting around 1980. The pattern can be seen in New York, Mumbai and Fremantle records, for instance (Figure 3.12), as well as 14 other gauges representing all ocean basins (Chambers et al., 2012), and in all reconstructions (Figure 3.14). It is also seen in an analysis of upper 400 m temperature (Gouretski et al., 2012; Section 3.3.2). Although the calculations of 18-year rates of GMSL rise based on the different reconstruction methods disagree by as much as 2 mm yr –1 before 1950 and on details of the variability (Figure 3.14), all do indicate 18-year trends that were significantly higher than the 20th century average at certain times (1920–1950, 1990–present) and lower at other periods (1910–1920, 1955–1980), likely related to multi-decadal variability. Several studies have suggested these variations may be linked to climate fluctuations like the Atlantic Multi-decadal Oscillation (AMO) and/or Pacific Decadal Oscillation (PDO, Box 2.5) (Holgate, 2007; Jevrejeva et al., 2008; Chambers et al., 2012), but these results are not conclusive. While technically correct that these multi-decadal changes represent acceleration/deceleration of sea level, they should not be interpreted as change in the longer-term rate of sea level rise, as a time series longer than the variability is required to detect those trends. Using data extending from 1900 to after 2000, the quadratic term computed from both individual tide gauge records and GMSL reconstructions is significantly positive (Jevrejeva et al., 2008; Church and White, 2011; Rahmstorf and Vermeer, 2011; Woodworth et al., 2011). Church and White (2006) report that the estimated acceleration term in GMSL (twice the quadratic parameter) is 0.009 [0.006 to 0.012] mm yr –2 (1 standard deviation) from 1880 to 2009, which is consistent with the other published estimates (e.g., Jevrejeva et al., 2008; Woodworth et al., 2009) that use records longer than 100 years. Chambers et al. (2012) find that modelling a period near 60 years removes much of the multi-decadal variability of the 20th century in the tide gauge reconstruction time series. When a 60-year oscillation is modeled along with an acceleration term, the estimated acceleration in GMSL since 1900 ranges from: 0.000 [–0.002 to 0.002] mm yr –2 in the Ray and Douglas (2011) record, 0.013 [0.007 to 0.019] mm yr –2 in the Jevrejeva et al. (2008) record, and 0.012 [0.009 to 0.015] mm yr –2 in the Church and White (2011) record. Thus, while there is more disagreement on the value of a 20th century acceleration in GMSL when accounting for multi-decadal fluctuations, two out of three records still indicate a significant positive value. The trend in GMSL observed since 1993, however, is not significantly larger than the estimate of 18-year trends in previous decades (e.g., 1920–1950). Ad blocker interference detected! Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
__label__pos
0.820315
This file is indexed. /usr/include/cupt/download/manager.hpp is in libcupt4-dev 2.9.9. This file is owned by root:root, with mode 0o644. The actual contents of the file can be viewed below. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 /************************************************************************** * Copyright (C) 2010 by Eugene V. Lyubimkin * * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License * * (version 3 or above) as published by the Free Software Foundation. * * * * This program is distributed in the hope that it will be useful, * * but WITHOUT ANY WARRANTY; without even the implied warranty of * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * * GNU General Public License for more details. * * * * You should have received a copy of the GNU GPL * * along with this program; if not, write to the * * Free Software Foundation, Inc., * * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA * **************************************************************************/ #ifndef CUPT_DOWNLOAD_MANAGER_SEEN #define CUPT_DOWNLOAD_MANAGER_SEEN /// @file #include <functional> #include <cupt/common.hpp> #include <cupt/fwd.hpp> #include <cupt/download/uri.hpp> namespace cupt { namespace internal { class ManagerImpl; } namespace download { /// performs downloads class CUPT_API Manager { internal::ManagerImpl* __impl; public: /// uri with aliases struct ExtendedUri { Uri uri; ///< uri string shortAlias; ///< short alias string longAlias; ///< long alias (full description) /// trivial constructor /** * @param uri_ * @param shortAlias_ * @param longAlias_ */ ExtendedUri(const Uri& uri_, const string& shortAlias_, const string& longAlias_) : uri(uri_), shortAlias(shortAlias_), longAlias(longAlias_) {} }; /// downloadable element struct DownloadEntity { vector< ExtendedUri > extendedUris; ///< list of alternative uris string targetPath; ///< path where to place downloaded file size_t size; ///< file size, in bytes; set @c -1 if unknown /// post-download callback /** * Returned empty string means no errors. * Returned non-empty string marks a download as failed and sets this * string as download result. */ std::function< string () > postAction; bool optional; ///< @c true if failure to download this is not an error DownloadEntity(); }; /// constructor /** * @param config * @param progress progress meter */ Manager(const shared_ptr< const Config >& config, const shared_ptr< Progress >& progress); /// destructor ~Manager(); /// downloads entities in parallel /** * @param entities list of entities to download * @return empty string when everything went ok, human readable download * error from arbitrary failed entity if some entities failed to download */ string download(const vector< DownloadEntity >& entities); }; } } #endif
__label__pos
0.536676
  University of Cambridge > Talks.cam > Computational Neuroscience > Optimal compensation for neuron death Optimal compensation for neuron death Add to your list(s) Download to your calendar using vCal If you have a question about this talk, please contact Dr. Cristina Savin. One of the most impressive properties of the brain is its ability to sustain enormous amounts of damage while preserving neural function, as observed in many brain diseases and experimental manipulations. How does the brain compensate for damage, and what is the limit of this compensation? We propose that the brain compensates optimally for neuron death. This preserves neural function to the greatest possible extent. We show that optimal compensation occurs in a variety of systems, including the occulomotor system, the cricket cercal system and the visual cortex. The mechanism underlying this compensation is balanced network dynamics; neuron death momentarily disrupts the balance of excitation and inhibition, but network dynamics automatically and rapidly recovers this balance, thereby restoring function. The limits of compensation depend on the nature of the disruption; once all the neurons that represent a particular signal dimension are silenced, rapid compensation for those signals becomes impossible. More generally, we propose optimal compensation as a computational principle; without it, optimal neural function will steadily degenerate as the typical wear and tear of a lifetime accumulates. This talk is part of the Computational Neuroscience series. Tell a friend about this talk: This talk is included in these lists: Note that ex-directory lists are not shown.   © 2006-2021 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity
__label__pos
0.834064
#!/usr/bin/python # # Copyright (C) 2008 Google Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA # 02110-1301, USA. """Script for unittesting the workerpool module""" import unittest import threading import time import sys import zlib from ganeti import workerpool class DummyBaseWorker(workerpool.BaseWorker): def RunTask(self, text): pass class ChecksumContext: CHECKSUM_START = zlib.adler32("") def __init__(self): self.lock = threading.Condition(threading.Lock()) self.checksum = self.CHECKSUM_START @staticmethod def UpdateChecksum(current, value): return zlib.adler32(str(value), current) class ChecksumBaseWorker(workerpool.BaseWorker): def RunTask(self, ctx, number): ctx.lock.acquire() try: ctx.checksum = ctx.UpdateChecksum(ctx.checksum, number) finally: ctx.lock.release() class TestWorkerpool(unittest.TestCase): """Workerpool tests""" def testDummy(self): wp = workerpool.WorkerPool(3, DummyBaseWorker) try: self._CheckWorkerCount(wp, 3) for i in xrange(10): wp.AddTask("Hello world %s" % i) wp.Quiesce() finally: wp.TerminateWorkers() self._CheckWorkerCount(wp, 0) def testNoTasks(self): wp = workerpool.WorkerPool(3, DummyBaseWorker) try: self._CheckWorkerCount(wp, 3) self._CheckNoTasks(wp) finally: wp.TerminateWorkers() self._CheckWorkerCount(wp, 0) def testNoTasksQuiesce(self): wp = workerpool.WorkerPool(3, DummyBaseWorker) try: self._CheckWorkerCount(wp, 3) self._CheckNoTasks(wp) wp.Quiesce() self._CheckNoTasks(wp) finally: wp.TerminateWorkers() self._CheckWorkerCount(wp, 0) def testChecksum(self): # Tests whether all tasks are run and, since we're only using a single # thread, whether everything is started in order. wp = workerpool.WorkerPool(1, ChecksumBaseWorker) try: self._CheckWorkerCount(wp, 1) ctx = ChecksumContext() checksum = ChecksumContext.CHECKSUM_START for i in xrange(1, 100): checksum = ChecksumContext.UpdateChecksum(checksum, i) wp.AddTask(ctx, i) wp.Quiesce() self._CheckNoTasks(wp) # Check sum ctx.lock.acquire() try: self.assertEqual(checksum, ctx.checksum) finally: ctx.lock.release() finally: wp.TerminateWorkers() self._CheckWorkerCount(wp, 0) def _CheckNoTasks(self, wp): wp._lock.acquire() try: # The task queue must be empty now self.failUnless(not wp._tasks) finally: wp._lock.release() def _CheckWorkerCount(self, wp, num_workers): wp._lock.acquire() try: self.assertEqual(len(wp._workers), num_workers) finally: wp._lock.release() if __name__ == '__main__': unittest.main()
__label__pos
0.752959
Abstract Periodontitis (PD) and rheumatoid arthritis (RA) are immunoinflammatory diseases where leukocyte infiltration and inflammatory mediators induce alveolar bone loss, synovitis, and joint destruction, respectively. Thus, we reviewed the relationship between both diseases considering epidemiological aspects, mechanical periodontal treatment, inflammatory mediators, oral microbiota, and antibodies, using the keywords “periodontitis” and “rheumatoid arthritis” in PubMed database between January 2012 and March 2015, resulting in 162 articles. After critical reading based on titles and abstracts and following the inclusion and exclusion criteria, 26 articles were included. In the articles, women over 40 years old, smokers and nonsmokers, mainly constituted the analyzed groups. Eight studies broached the epidemiological relationship with PD and RA. Four trials demonstrated that the periodontal treatment influenced the severity of RA and periodontal clinical parameters. Nine studies were related with bacteria influence in the pathogenesis of RA and the presence of citrullinated proteins, autoantibodies, or rheumatoid factor in patients with PD and RA. Five studies investigated the presence of mediators of inflammation in PD and RA. In summary, the majority of the articles have confirmed that there is a correlation between PD and RA, since both disorders have characteristics in common and result from an imbalance in the immunoinflammatory response. 1. Introduction Periodontitis (PD) is a chronic inflammatory disease where resident cells and preformed mediators induce leukocyte infiltration and progressive destruction of the tooth supporting tissues as a result of interaction between bacterial products, cell populations, and mediators in disease-susceptible individuals [1, 2]. This is also influenced by genetic and environmental risk factors and is characterized as a complex disease with multifactorial etiology [3, 4]. In this context, environmental factors, including oral hygiene/bacterial plaque, smoking, and stress, play an important role in the expression of PD [3]. Furthermore, it has been evidenced by some authors that there is a joint influence of polymorphisms in multiple genes [5], such as the genes of IL-10 [6] and IL-6 [7]. Polymorphonuclear neutrophils (PMNs) represent the first line of defense to protect the host from periodontal pathogens in the gingival sulcus and junctional epithelium. Data on the role of the pathogenesis of periodontitis are mixed. PMNs are a critical arm of defense against periodontitis, but bacterial evasion of the neutrophil microbicidal machinery coupled with delayed neutrophil apoptosis may transform the neutrophil from defender to perpetrator [8]. Actually, these cells can release a variety of factors, such as reactive oxygen species, collagenases, and other proteases, [1, 9], such as stimulation from a wide range of cytokines. In this scenario, macrophages can act as antigen-presenting cells, promoting the activation of lymphocytes [1]. Therefore, the cellular concentration of neutrophils in the inflammatory infiltrates decreases during the transition between gingivitis and periodontitis, in which there is a predominance of lymphocytes [9]. It has been described that proinflammatory cytokines, prostaglandin E2, matrix metalloproteinase (MMP), nitric oxide (NO), and other inflammatory mediators play a crucial role in the pathogenesis of PD [1012]. Moreover, an increase of TNF-α, IL-1β, IL-6, IL-11, and IL-17 can induce osteoclastogenesis by increasing the expression of Receptor Activator of NF-κB Ligand (RANKL) and by reducing the osteoprotegerin (OPG) production in osteoblasts and stromal cells [13]. In fact, it was demonstrated that IL-17 and RANKL were overregulated and IL-10, an anti-inflammatory cytokine, and TGF-β1 were downregulated in active periodontal lesions compared with inactive lesions [14, 15] (Figure 1(a)). Considering that an imbalance between bone formation and resorption is also linked to various diseases, studies suggest that PD may be a risk factor for other diseases [16], such as rheumatoid arthritis (RA) [17], but without consensus. Although pathogenesis of RA is not completely understood, it is recognized that the activation of the complement system is important in disease development [18], the abnormal response of circulating lymphocytes from patients, and an alteration in the structure of these cells, which contribute to the autoimmunity, immunosuppression, and the genesis of the disease [19]. Studies report there is a correlation between both PD and RA since the mechanisms for the development of RA have consonance with the pathogenesis of chronic PD. In fact, RA is defined as an inflammatory and autoimmune disease characterized by accumulation of leukocyte inflammatory infiltrate in the synovial membrane, as well as mediators such as PGE2, TNF-α, IL-1β, IL-6, IL-12, IL-17, IL-18, IL-33, granulocyte macrophage colony-stimulating factor (GM-CSF), Monocyte Colony-Stimulating Factor (M-CSF), RANKL, MMPs, and NO, all being found in the synovial fluid [2024], and leading to synovitis and joint architecture destruction. Some studies have suggested that the susceptibility of RA may be associated with genetic or environmental factors [25]. One of the most important genetic factors is the human leukocyte antigen (HLA) class II. Certain alleles of this antigen are often associated with the development of rheumatoid arthritis (HLA-0101, HLA-0102, HLA-0401, HLA-0404, HLA-0405, HLA-0408, HLA-0410, HLA-1001, and HLA-1402) [14]. Other factors include the allele of 620W of PTPN22 (protein tyrosine phosphatase nonreceptor type 22), a gene encoding tyrosine phosphatase that is involved in controlling the intracellular signaling triggered through T and B receptors [26]; C5-TRAF1, which can interfere with disease susceptibility and severity of the alteration in the structure, function, and levels of complement component c5/factor 1 associated with the TNF receptor [27]; gene encoding the CTLA4 (cytotoxic T lymphocyte antigen-4), the protein responsible for the regulation of T lymphocyte activation [28]; peptidylarginine deiminase (PAD2), the enzyme responsible for the generation of citrullinated proteins, which are related to the formation of anticyclic citrullinated peptide autoantibodies [29] (Figure 1(b)). With regard to environmental factors, smoking is a risk factor that duplicates the risk of developing RA, but its effect is limited to those with antibodies to citrullinated peptides [30, 31]. Other factors refer to the excessive consumption of coffee (more than 10 cups daily) which can be related to the development of the disease [32] and bacterial microbiota, including oral bacterial species which can participate in the etiopathogenesis of RA [33]. On the other hand, the intake of alcohol may exert a protective effect in rheumatoid arthritis in a dose-dependent manner [32]. The literature shows that the basic difference between both diseases is that RA is an inflammatory autoimmune disease, while PD is an immunoinflammatory disease of bacterial origin [9]. However, it is noteworthy that many epidemiological studies seem to dilute the subtle differences expressed by some parameters, though clinically important. Indeed, analyses of inflammatory mediators and other molecular markers are examples where the differences found in a trial with few participants could disappear in a large and diverse sample. In this sense, this review is a critical appraisal of studies that address potential associations of periodontitis with RA and with an overall comprehensive approach. 2. Methods For this review, the US National Library of Medicine National Institutes of Health PubMed was searched by two independent researchers who agreed with the search criteria of studies with patients with both PD and RA and checked by a third researcher separately. The keywords periodontitis and rheumatoid arthritis were used and 367 articles published in English were found. The time period was limited from January 2012 to March 2015, and 162 references were found. Then, a critical reading based on titles and abstracts was made and 136 papers were excluded, such as reviews, assays in vitro and animal studies, articles that were not in English, studies not related to both PD and RA, case study, workshop, or unavailable and incomplete articles. Then, 26 articles were finally included for this review, which related to PD and RA, considering epidemiological aspects, mechanical periodontal treatment, mediators of inflammation, oral microbiota, and antibodies as seen in Figure 2. 3. Results Table 1 shows demographic data, such as gender, age and habits, comorbidities and medications, and the relationship between both diseases investigated through clinical and epidemiological associations, presence of oral bacterial DNA in patients with RA, proinflammatory mediators, antibodies against bacteria, and autoantibodies, as well as the effects of mechanical periodontal treatment, related to the 26 selected articles. In most articles (92.3%), the analyzed groups were mainly composed of women. Regarding age, most patients were 40 years old, except for the study of Dev et al. (2013) [45] and Ranade and Doiphode (2012) [37], whose patients were above 20 and 30 years old, respectively. Among the 26 articles, 57.7% [3436, 38, 39, 42, 5057, 59] used samples with smoker patients, while 30.8% established smoking as criteria for excluding [37, 41, 43, 4549]. 11.5% did not mention smoking status of patients [40, 44, 58]. Comorbidities such as diabetes, Sjögren’s syndrome, hypertension, cardiovascular disease, hyperlipidemia, renal disease, and osteoporosis/osteopenia have only been reported in studies of Mikuls et al. (2012) [35], Khantisopon et al. (2014) [54], and Gonzales et al. (2015) [59]. Regarding the medication used by patients, 50% [3537, 40, 41, 44, 45, 49, 50, 52, 53, 55, 58] of the articles did not specify the pharmacological treatment. In the remainder of the studies, the most frequently reported treatment for rheumatoid arthritis included disease-modifying antirheumatic drugs (methotrexate, sulfasalazine, and leflunomide) [38, 39, 42, 43, 46, 51, 54, 56, 57, 59], biologic therapy (anti-TNF-α) [34, 38, 39, 42, 59], corticosteroids (prednisolone) [38, 42, 43, 46, 51, 54, 56, 59], and/or nonsteroidal anti-inflammatory drugs [43, 4648, 51, 54, 57]. Among the selected trials, eight studies broached the epidemiological and clinical relationship of patients with PD and RA [38, 41, 44, 45, 49, 54, 56, 59], indicating a higher prevalence of PD in patients with RA, which have worse periodontal parameters. The effect of mechanical removal of foci of infection in the oral cavity on the severity of RA and periodontal clinical parameters were shown by four studies [37, 42, 46, 51], which demonstrated the beneficial effects of the mechanical treatment in the improvement of clinical parameters of RA. Two studies were related to the oral bacteria influence of the pathogenesis of RA [40, 52]. Seven trials highlighted the presence of citrullinated proteins and their antibodies, antibodies to P. gingivalis in patients with RA and periodontitis, and also the association between anti-P. gingivalis and periodontal parameters, and the titers of rheumatoid factor and antibodies anticyclic citrullinated peptide, which were also related to the severity of PD [35, 36, 39, 50, 53, 55, 57]. Regarding the inflammation in both diseases, five trials considered the mediators of inflammation to the PD and RA [34, 43, 47, 48, 58], such as MMP-9, TNF-α, IL-17, RANKL, and OPG. Considering the relationship between rheumatoid arthritis and periodontitis, only two articles showed no statistical significant association, while 24 studies have established this association, either by descriptive (3 studies) or statistical analysis (21 studies). 4. Discussion In this review, demographic data and other aspects that can modify one or both diseases were presented, as well as the relationship between both diseases investigated through clinical and epidemiological associations, effects of mechanical periodontal treatment, presence of oral bacterial DNA in patients with RA, proinflammatory mediators, antibodies against bacteria, and autoantibodies. The articles showed higher prevalence of female patients. This aspect was interesting, as a possible relationship between female sex hormones and susceptibility of rheumatoid arthritis had been reported in the literature, so that low levels of those hormones at menopause promote the risk of developing the disease early [60]. However, a protective role of oral contraceptives on the risk for rheumatoid arthritis in women is still controversial [6163]. On the other hand, there is strong evidence that estrogen deficiency influences the severity of periodontitis, since worse periodontal parameters were observed as bleeding on probing, gingival recession, and clinical attachment loss in postmenopausal women with osteoporosis [64]. The smoking status was also recorded in the selected studies. Cigarette smoking is considered an important risk factor for the development of rheumatoid arthritis, since it was demonstrated that lifelong cigarette smoking was positively associated with the risk of RA even among smokers with a low lifelong exposure [65]. Moreover, it has been related that smoking interacts with HLA-DR SE genes and increases the risk of anti-CCP antibodies in patients with rheumatoid arthritis [66]. Regarding the periodontium, it was shown that smokers presented greater probing depths, when compared to the probing depths of patients who never smoked [67]. The literature shows that PD does not usually require pharmacological treatment, except for mechanical periodontal treatment as routine. In this review, this fact was also observed, while half of the studies had shown that rheumatoid arthritis involved some pharmacological approach. The use of disease-modifying antirheumatic drugs (DMARDs) aims to reverse the symptoms of the disease, reduce the progression of joint damage, and consequently improve the quality of life of patients [68]. The conventional synthetic DMARDs include methotrexate, sulfasalazine, and leflunomide; the available tumor necrosis factor inhibitors (adalimumab, etanercept, and infliximab), the T cell costimulation inhibitor (abatacept), the anti-B cell agent (rituximab), and the interleukin-6 receptor blocking monoclonal antibody are included in biological DMARDs [69]. These medications may be associated with glucocorticoids (GC) or nonsteroidal anti-inflammatory drugs (NSAIDs). The long-term, low-dose glucocorticoid and NSAIDs therapy were shown to reduce joint symptoms, pain, and other systemic manifestations [70, 71]. Although these benefits are present, the long-time treatment with GC and methotrexate decreased immune response and promoted oral changes, such as candidiasis, periodontitis, and oral ulceration besides impaired saliva secretion [72]. Indeed the literature demonstrated that patients on corticosteroids exhibited higher levels of candidiasis, clinical attachment loss, and probing pocket depth [73]. These aspects, at least in part, may contribute to the worse periodontal status of RA patients when compared to healthy patients. Moreover, the use of medications referred to in half of the articles could compromise the evaluation of this review. However, it is noteworthy that the other half of the articles did not use any medication [3537, 40, 41, 44, 45, 49, 50, 52, 53, 55, 58]. Analysing the articles, it was observed that most patients with RA showed a significant increase in the incidence of PD as compared to healthy individuals, while only few articles concluded the opposite, probably due to the lack of standardization of parameters in evaluating the different types of periodontitis. Although epidemiological studies outlined by Dev et al. (2013) [45] have not observed a significant RA incidence in subjects with periodontitis where these authors suggested that periodontitis is an independent factor for RA, several other studies have shown that patients with RA were more susceptible to the development of periodontitis [38, 44], since these patients had worse periodontal parameters, such as clinical attachment level [37, 56], alveolar bone loss [56, 59], probing depth [37, 49], plaque index, and bleeding on probing [37, 41, 54]. Indeed, the mechanical periodontal treatment as scaling and root planning in the control of periodontal infection interfered not only with the severity of RA but also with the periodontal clinical parameters [74]. This result can be explained by a reduction in the foci of oral bacteria, and therefore the low levels of inflammation demonstrated a decrease of DAS28 (disease activity score in 28 joints) and serum levels of IL-1β, TNF-α, C-reactive protein, and erythrocyte rate sedimentation [37, 42, 46, 51]. In this sense, studies have defended the hypothesis that oral infections play an important role in the pathogenesis of RA, promoting the citrullination of proteins, which can be based on the detection of bacterial DNA using the techniques of DNA isolation (PCR and DNA-DNA hybridization) and high titers of antibodies against bacteria in synovial fluid and serum samples from patients with RA [40, 51, 52]. Most of the studies have shown the presence of oral bacteria in patients with RA, highlighting P. gingivalis and F. nucleatum [40, 52]. Markedly, P. gingivalis is the most elucidated in the development of RA, and studies using animal models have demonstrated the potential of this proinflammatory bacterium promoting the development of experimental arthritis and increased serum levels of C-reactive protein, TNF-α, IL-1β, IL-17, MMP-13, and RANKL [75]. Furthermore, RA is an autoimmune disease characterized by autoantibodies specific for citrullinated peptide antigen (anticyclic citrullinated peptide), which are synthetized by peptidylarginine deiminase and characterized as the most specific markers for the diagnosis of the disease [76, 77]. Considering that the P. gingivalis is regarded as being capable of expressing this enzyme (PAD), it is suggested that infection with this microorganism could influence the pathogenesis of RA [78, 79]. These citrullinated proteins were also found in periodontal tissues, indicating a link between these peptides generated in the oral cavity and those observed in articular tissues [36, 80]. Additionally, the presence of antibodies to P. gingivalis was investigated. Although Seror et al. (2015) [57] have not detected this, antibody titres significantly differ between early rheumatoid arthritis and healthy controls. Other studies observed the antibodies to P. gingivalis in patients with RA and severe periodontitis [39] and were associated with probing depth and clinical attachment level and the titers of rheumatoid factor and anticyclic citrullinated peptide autoantibodies [35, 50], which may be found in patients with RA and related to the severity of periodontitis [55]. In summary, the studies suggested that P. gingivalis might play a role in the pathogenesis of RA. The response in periodontitis was related to uncitrullinated peptide, suggesting that these peptides break tolerance and can be involved in pathogenesis of RA [53] (Figure 1(c)). Inflammatory conditions and mechanisms for bone destruction in PD and RA have many similarities. Most of the studies have found high levels of proinflammatory cytokines and other mediators of inflammation, such as MMP-9 [58], TNF-α [48], IL-17, RANKL, and OPG [47]. Moreover, it was demonstrated that the hypomethylated status, a single region of the IL-6, may contribute to elevated serum levels of this cytokine, implying a role in the pathogenesis of these diseases [34], while the anti-inflammatory cytokines in the GCF, such as IL-4 and IL-10, showed no consensus among studies regarding the differences observed among individuals with PD and RA [43]. In addition, hypotheses have been proposed to explain the relationship between periodontitis and systemic diseases, such as rheumatoid arthritis. In the literature, studies have suggested that chronic periodontitis generates local constant high levels of microparticles, which have been considered inflammatory biomarkers or mediators responsible for distant cell signalling and regulation [81]. Moreover, it has been reported that these microparticles play an important role in thrombosis and angiogenesis and mediate cellular communication by transferring mRNAs and microRNAs from the cell of origin to target cells [82]. Thus, the microparticle participation and its spread into the bloodstream could constitute the explanation to the increased risk for systemic disease in patients with periodontitis [83]. Despite these evidences showing a link between rheumatoid arthritis and periodontitis, the exact mechanisms involving this association have not been fully elucidated. Thus, well-designed longitudinal multicentre clinical trials and further studies with sufficient sample sizes are required to determine the biochemical processes and clinical relationships between these chronic inflammatory conditions. Moreover, these studies should consider other potential confound factors such as the drugs administered for the treatment for each disease or differences in oral hygiene or smoking habits in these patients. 5. Conclusion The majority of the articles have confirmed that there is a correlation between PD and RA, since both disorders have characteristics in common and result from an imbalance in the immunoinflammatory response. Although it is necessary to highlight the importance of the mechanical treatment for periodontitis and pharmacological treatments mainly for RA patients, more research is needed to assess whether the coexistence of both diseases can affect the clinical signs of periodontitis and systemic markers of rheumatoid arthritis and strengthen the capacity of oral bacteria to stimulate an autoimmune response, thus establishing that cell constituents or mediators could share common pathophysiological pathways for both diseases and therefore define the best therapy. Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.
__label__pos
0.741791
4 My WPF program uses SingleInstance.cs to make sure that only one instance of it is running if a user tries to restart it by double clicking a short cut to it or some other mechanism. However, there is a circumstance in my program where it needs to restart itself. Here's the code I use to perform the restart: App.Current.Exit += delegate( object s, ExitEventArgs args ) { if ( !string.IsNullOrEmpty( App.ResourceAssembly.Location ) ) { Process.Start( App.ResourceAssembly.Location ); } }; // Shut down this application. App.Current.Shutdown(); This works most of the time, but the problem is it doesn't always work. My guess is that on some systems, the first instance and the RemoteService it creates haven't terminated yet and this causes the process started by the call to Process.Start( App.ResourceAssembly.Location ); to terminate. Here's the Main method in my app.xaml.cs: [STAThread] public static void Main() { bool isFirstInstance = false; for ( int i = 1; i <= MAXTRIES; i++ ) { try { isFirstInstance = SingleInstance<App>.InitializeAsFirstInstance( Unique ); break; } catch ( RemotingException ) { break; } catch ( Exception ) { if ( i == MAXTRIES ) return; } } if ( isFirstInstance ) { SplashScreen splashScreen = new SplashScreen( "splashmph900.png" ); splashScreen.Show( true ); var application = new App(); application.InitializeComponent(); application.Run(); SingleInstance<App>.Cleanup(); } } What's the right way to get this code to allow a new instance to start if it's being restarted programmatically? Should I add a bool flag Restarting and wait in the for loop for the call to SingleInstance<App>.InitializeAsFirstInstance to return true? Or is there a better way? 4 One thing to do would be that when you call Process.Start, pass an argument to the executable telling it that it is an "internal restart" situation. Then the process can handle that by waiting for a longer period of time for the process to exit. You could even tell it the ProcessID or something so it knows what to watch for. • 1 I'd already tried something like that (the string "Restart" has to be passed), and it seems to work, but I like passing the process ID. That way a user can't spoof a restart. – Tony Vitabile Dec 14 '12 at 20:58 Your Answer By clicking "Post Your Answer", you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
__label__pos
0.98412
What is Automotive Borescope and How to used it? Automotive endoscope function and testing procedures What is an Automotive Borescope? Car borescope is actually one type of industrial endoscopes. Simply speaking, they are instruments that detect and view the internal parts of a car. Generally speaking, many auto repair shops and 4S shops now use this instrument, because, during the maintenance, some of the more secret parts of the car are more difficult to observe with the naked eye, so it is necessary to monitor the inside by means of the instrument. For example, the carbon deposit of the engine and the dirty case of the air conditioner are useful for both inspection and repair. car borescope-use-in-automotive-8 Automotive videoscope is designed specifically for the automotive manufacturing and maintenance industries. It is mainly used for detecting and diagnosing the wear, carbon deposits, blockages, etc. of automobile engines, cylinders, fuel pipes, engines, mufflers, conveyor systems, differentials, water tanks, fuel tanks, gearboxes, etc., which greatly reduces the repair time and cost. It also avoids damage caused by multiple disassembly and assembly of the machine. It also greatly demonstrates its positive effects on the cleaning and maintenance of car engines. borescope use in automotive The automotive endoscope test procedure 1. We need to understand the internal structure of the car, check the specific content and location, and follow the procedures to expand the relevant link instruments and check the power supply. 2. Select the appropriate probe to enter the internal components of the vehicle to be tested. Before the test, it should be clear that obstacles, burrs, etc. in the channel may hinder and inspect the object of the probe. Care should be taken during the inspection process to ensure that the probe reaches the specified part smoothly. If the probe encounters obvious resistance during the propulsion process, it should stop moving forward immediately. The probe should be slow when it exists. If it is stuck, it should not be pulled hard to avoid damage to the workpiece or probe. The captured image can be photographed and recorded during the detection process, which is convenient for later processing and analysis. After the test is completed, the probe should be cleaned and the instrument site cleaned as required. Articulating-Borescope-use-in-automotive The feature of yateks articulating automotive borescope  1. Simple, flexible, compact and easy to carry, the soft, small and flexible insertion tube can reach any hidden parts that need to be inspected. 2, intuitive and accurate and easy to implement, and can detect the damage of internal components as early as possible, greatly facilitating the exclusion of safety hazards in the germination stage. 3. The compactness, portability, and mobility of the instrument itself can reduce the work intensity and improve work efficiency. 4. The repair cost is reduced, and the damage caused by multiple disassembly and assembly of the machine parts is avoided. Use of car endoscopes Automotive borescopes are mainly used to inspect automobile manufacturing and maintenance, precision machining, petrochemical, military manufacturing, small apertures in small equipment, internal conditions of small gaps, wear of mechanical gear parts, looseness, and quality inspection of grease pump. N-series-Digital-Borescope-Inspection-Camera Application of Industrial Endoscope in Automobile Inspection and Repair Industrial endoscopes are new high-tech products designed and produced according to the inspection requirements of the inner surfaces of straight pipes such as petrochemicals, industrial machinery, electrical and electronic industries, and aerospace. Industrial endoscopes are also widely used in the automobile production and maintenance industry. In the cleaning and maintenance of car engines, car endoscopes are also a good helper. The diagnosis of valve carbon deposits has always been a problem in the automotive repair industry. Generally speaking, there are two diagnostic methods in professional repair shops. 1. Traditional disassembly method That is, take the engine apart and check if there is a carbon deposit. This is intuitive but time-consuming and laborious, and no matter what components are disassembled once, it will affect its performance more or less, reducing its service life. 2, Car endoscopy Remove the spark plug or the injector and use an endoscope to observe the degree of carbon deposits on the valve. The main feature is that the formation and combustion process of the mixture in the combustion chamber and the working state of the cylinder, the gas valve and the piston crown at high temperature can be observed under the working condition of the engine, and the above image is identified by the crank angle by a high-speed camera. Record it. At the same time, it can be connected to a computer and can be called, slow-released, partially enlarged and interpreted at a certain time by means of corresponding image processing software. This visualization technique is not only a good assistant for automotive design and development but also a tool for automotive technical training and teaching. Articulating automotive borescope have been widely recognized by users in the auto repair industry, and its simple and flexible operation is an indispensable test and diagnostic tool in the auto repair industry. Yateks Optoelectronic Industrial Endoscope integrates light, electricity, and image. N series video industrial endoscope is equipped with a high-resolution color image, which makes the image clearer, allowing the operator to use high-definition color images to observe the suspected points and faults. The part uses a unique image software processing system to freeze, enlarge, and analyze, greatly improving the accuracy of determining the fault location of the car. 1, piston and spark plug carbon check The carbon deposit check can be judged by “disintegration”, that is, disassembling the car engine or observing the feedback voltage change, but these two methods have higher professional requirements, and using the car endoscope to check the car engine, it can pass the spark plug hole or spray The nozzle can directly observe various faults inside the cylinder. To inspect the piston and spark plug carbon B-series-Portable-Industrial-Borescope-6 B-series-Portable-Industrial-Borescope-7 2, the inner wall of the exhaust pipe Checking the real shot of the exhaust pipe, it is obvious that there is a slight welding hole in the exhaust pipe wall. 3, Auto parts testing It is obvious that there is a tiny welding hole in the exhaust pipe wall. Detect whether there are cracks, pigmentation, etc. inside the auto parts. The measured hole is bent. The minimum diameter is 4MM, which cannot be directly observed. P-series-automotive-endoscope-used-in-auto-parts-inspection 4, Automotive casting inspection In the inspection of automobile castings, it is mainly to check the internal impurities and trachoma of the product. Automotive casting inspection 5, Engine cylinder Engine cylinder 6, engine exhaust catalytic converter detection Figure 6 is Yatai Optoelectronics HIE high-definition video endoscope in the Dongfeng Automotive Technology Center to detect the exhaust catalytic converter 7, cylinder head detection The foundry inspects the cylinder head of the cylinder for internal flaw detection to determine whether it is qualified. borescope-use-in-automobile-engine-aluminum-cylinder-head In addition, automotive endoscopes can also be used in gearbox inspection, water tank, fuel tank inspection, fuel injection hole detection, etc. Therefore, the automotive borescope is not only an artifact for car owners to understand the condition of the car, but also a new generation of maintenance tools for non-destructive testing of vehicles in the field of vehicle maintenance. Articulating car borescope for sale B-series Automotive Borescope Leave a Reply Your email address will not be published. Required fields are marked *
__label__pos
0.835976
Get a julian dateTag(s): Date and Time A Julian date is the number of elapsed days since the beginning of a cycle of 7,980 years invented by Joseph Scaliger in 1583. The purpose of the system is to make it easy to compute an integer (whole number) difference between one calendar date and another calendar date. The starting point for the first Julian cycle began on January 1, 4713 B.C. and will end on January 22, 3268 (3268-01-22 G). The following day will begin the first day of the second Julian date period (or 7,980 year cycle). import java.util.Calendar; public class JulianDate { /** * Returns the Julian day number that begins at noon of * this day, Positive year signifies A.D., negative year B.C. * Remember that the year after 1 B.C. was 1 A.D. * * ref : * Numerical Recipes in C, 2nd ed., Cambridge University Press 1992 */ // Gregorian Calendar adopted Oct. 15, 1582 (2299161) public static int JGREG= 15 + 31*(10+12*1582); public static double HALFSECOND = 0.5; public static double toJulian(int[] ymd) { int year=ymd[0]; int month=ymd[1]; // jan=1, feb=2,... int day=ymd[2]; int julianYear = year; if (year < 0) julianYear++; int julianMonth = month; if (month > 2) { julianMonth++; } else { julianYear--; julianMonth += 13; } double julian = (java.lang.Math.floor(365.25 * julianYear) + java.lang.Math.floor(30.6001*julianMonth) + day + 1720995.0); if (day + 31 * (month + 12 * year) >= JGREG) { // change over to Gregorian calendar int ja = (int)(0.01 * julianYear); julian += 2 - ja + (0.25 * ja); } return java.lang.Math.floor(julian); } /** * Converts a Julian day to a calendar date * ref : * Numerical Recipes in C, 2nd ed., Cambridge University Press 1992 */ public static int[] fromJulian(double injulian) { int jalpha,ja,jb,jc,jd,je,year,month,day; double julian = injulian + HALFSECOND / 86400.0; ja = (int) julian if (ja>= JGREG) { jalpha = (int) (((ja - 1867216) - 0.25) / 36524.25); ja = ja + 1 + jalpha - jalpha / 4; } jb = ja + 1524; jc = (int) (6680.0 + ((jb - 2439870) - 122.1) / 365.25); jd = 365 * jc + jc / 4; je = (int) ((jb - jd) / 30.6001); day = jb - jd - (int) (30.6001 * je); month = je - 1; if (month > 12) month = month - 12; year = jc - 4715; if (month > 2) year--; if (year <= 0) year--; return new int[] {year, month, day}; } public static void main(String args[]) { // FIRST TEST reference point System.out.println("Julian date for May 23, 1968 : " + toJulian( new int[] {1968, 5, 23 } )); // output : 2440000 int results[] = fromJulian(toJulian(new int[] {1968, 5, 23 })); System.out.println ("... back to calendar : " + results[0] + " " + results[1] + " " + results[2]); // SECOND TEST today Calendar today = Calendar.getInstance(); double todayJulian = toJulian (new int[]{today.get(Calendar.YEAR), today.get(Calendar.MONTH)+1, today.get(Calendar.DATE)}); System.out.println("Julian date for today : " + todayJulian); results = fromJulian(todayJulian); System.out.println ("... back to calendar : " + results[0] + " " + results[1] + " " + results[2]); // THIRD TEST double date1 = toJulian(new int[]{2005,1,1}); double date2 = toJulian(new int[]{2005,1,31}); System.out.println("Between 2005-01-01 and 2005-01-31 : " + (date2 - date1) + " days"); /* expected output : Julian date for May 23, 1968 : 2440000.0 ... back to calendar 1968 5 23 Julian date for today : 2453487.0 ... back to calendar 2005 4 26 Between 2005-01-01 and 2005-01-31 : 30.0 days */ } } There is a lot of variation around the idea of a "Julian date". You can have the Modified Julian Date (JD) or the Truncated Julian Date (TJD). The main difference is the starting for counting the days. Before Y2K, many applications (especially mainframe systems) were storing dates in a format called "the Julian format". This format is a 5 digit number, consisting of a 2 digit year and a 3 digit day-of-year number. For example, 17-July-1998 is stored as 98221, since 17-July is the 221th day of the year. This format is not really useful since Y2K! The main reason for using the 5-digits Julian date was to save disk space and still have a format easy to use to handle. dates. A variation of this idea is to used the first four digits for the year and 3 digits for day-of-year, 17-July-1998 will be represented by 1998221. This is a very simple format which can be manipulated easily from Java. import java.util.Calendar; import java.util.Date; import java.text.ParseException; import java.text.SimpleDateFormat; public class DateUtils { private DateUtils() { } public static Date getDateFromJulian7(String julianDate) throws ParseException { return new SimpleDateFormat("yyyyD").parse(julianDate); } public static String getJulian7FromDate(Date date) { StringBuilder sb = new StringBuilder(); Calendar cal = Calendar.getInstance(); cal.setTime(date); return sb.append(cal.get(Calendar.YEAR)) .append(String.format("%03d", cal.get(Calendar.DAY_OF_YEAR))) .toString(); } public static void main(String[] args) throws Exception { String test = "1998221"; Date d = DateUtils.getDateFromJulian7(test); System.out.println(d); System.out.println(DateUtils.getJulian7FromDate(d)); /* * output : * Sun Aug 09 00:00:00 EDT 1998 * 1998221 */ } } blog comments powered by Disqus
__label__pos
0.971445
2023 The Latest Sunflower Lecithin Application Trend Report sunflower lecithin applications 2023 The Latest Sunflower Lecithin Application Trend Report What Is Sunflower Lecithin? Sunflower Lecithin is a naturally derived emulsifier and additive commonly used in the food industry. It is extracted from the oil found in sunflower seeds by separating the oil from the solids. As a versatile ingredient, Sunflower Lecithin helps improve the texture, stability, and consistency of various food and beverage products. It is a healthier alternative to soy-based lecithin. It has become popular because of its potential health benefits, like supporting cardiovascular health and providing a source of choline, a vital nutrient for brain function. What Are The Benefits Of Sunflower Lecithin? Sunflower Lecithin offers a range of benefits that contribute to its growing popularity in the food industry. Here are some key advantages as follows. • Healthier Alternative: Sunflower Lecithin is a healthier substitute for soy-based lecithin, particularly for individuals with soy allergies or those seeking non-GMO options. • Emulsifying Properties: As a natural emulsifier, Sunflower Lecithin helps blend ingredients smoothly, creating a consistent texture and preventing separation in various food and beverage products. • Improved Texture and Stability: Sunflower Lecithin enhances the texture, mouthfeel, and overall stability of food items, resulting in creamier textures, better suspension of ingredients, and reduced oil separation. • Source of Essential Nutrients: Sunflower Lecithin contains choline, which supports brain health, cognitive function, and cell membrane integrity. • Allergen-Free: Sunflower Lecithin is free from common allergens like soy, making it suitable for individuals with soy allergies or sensitivities. • Natural and Sustainable: Sunflower Lecithin is a naturally sourced ingredient derived from sunflower seeds, making it an appealing choice for consumers seeking clean-label and sustainable products. • Versatile Application: Sunflower Lecithin finds application in a wide range of products, including baked goods, chocolates, beverages, plant-based alternatives, and nutritional supplements, due to its compatibility with different ingredients and processes. Why Is Sunflower Lecithin Gaining Popularity? Sunflower lecithin is so sought-after because it “ticks all the boxes” in terms of clean label and is known for its emulsification and texturizing properties while being non-GMO and non-soy. The culinary world has witnessed a remarkable surge in the utilization of Sunflower Lecithin within the realm of food and beverage launches. From 2018 through 2022, there has been a gradual 7% increase in annual product releases associated with Sunflower Lecithin. This newfound appreciation for Sunflower Lecithin can be attributed to its myriad benefits, extending far beyond its emulsifying properties. As a naturally derived ingredient, Sunflower Lecithin offers a healthier alternative to traditional soy-based lecithin, captivating the attention of health-conscious consumers. Its versatility knows no bounds, effortlessly enhancing a wide range of products texture, stability, and overall sensory experience. From creamy plant-based milk alternatives to velvety chocolate creations, Sunflower Lecithin’s smooth transition into the spotlight has redefined the possibilities for innovation in the ever-evolving world of gastronomy. Global Product Launches Involving Sunflower Lecithin As the popularity of Sunflower Lecithin continues to soar, a proliferation of product launches incorporating this ingredient has emerged worldwide. Below is an overview of food and beverage launches featuring Sunflower Lecithin in different regions, accompanied by their corresponding Compound Annual Growth Rates (CAGR): • Europe: 51% (CAGR: +6%) • U.S/Canada: 19% (CAGR: +4%) • Middle East/Africa: 10% (CAGR: +14%) • Asia: 10% (CAGR: +5%) • Latin America: 9% (CAGR: +8%) • Australasia: 4% (CAGR: +15%) The global embrace of Sunflower Lecithin is evident in the flourishing landscape of food and beverage launches across various regions. In Europe, the birthplace of culinary finesse, a remarkable 51% surge in Sunflower Lecithin product launches have been observed, showcasing a steady Compound Annual Growth Rate (CAGR) of 6%. This trend signifies a growing preference for healthier alternatives among European consumers as they seek out Sunflower Lecithin’s benefits in enhancing their gastronomic experiences. Across the Atlantic, the United States and Canada have not been immune to the Sunflower Lecithin wave. With a commendable 19% increase in product launches, coupled with a CAGR of 4%, the North American market has been quick to embrace the versatility and health-conscious allure of Sunflower Lecithin. From the thriving health food scene to the world of confectionery delights, this region is witnessing a transformation in how consumers perceive and engage with their favorite culinary creations, further fueling the demand for Sunflower Lecithin-infused products. Top Categories Of Global Product Launches With Sunflower Lecithin • Confectionery: 29% (2018) – 27% (2022) • Bakery: 22% (2018) – 24% (2022) • Cereals: 12% (2018) – 10% (2022) • Sports Nutrition: 12% (2018) – 9% (2022) • Deserts & Ice Cream: 6% (2018) – 7% (2022) Confectionery has consistently held the top spot in global product launches featuring Sunflower Lecithin, accounting for 29% in 2018 and maintaining a significant presence at 27% in 2022. The enduring popularity of Sunflower Lecithin in confectionery highlights its crucial role in enhancing the texture, stability, and overall quality of chocolate treats, candies, and other sweet delights. Its emulsifying properties contribute to the smoothness and mouthfeel of confectionery products, ensuring a delightful sensory experience for consumers worldwide. While confectionery remains the top category, the bakery sector has steadily grown in incorporating Sunflower Lecithin. Starting at 22% in 2018, the utilization of Sunflower Lecithin in bakery product launches has gradually increased to 24% in 2022. This upward trend reflects the recognition of Sunflower Lecithin as a valuable ingredient in enhancing the texture, shelf life, and consistency of baked goods. Sunflower Lecithin contributes to baking, improving dough handling and delivering desirable sensory attributes in the final products, from flaky pastries to soft bread. The growth of Sunflower Lecithin in the bakery category signifies its expanding role in driving innovation and meeting consumer demands high-quality bakery goods. Sunflower Lecithin In Bakery Launches Sunflower lecithin has become an essential ingredient in the bakery industry, especially in different bakery products. It is widely used in sweet biscuits/cookies and cakes, pastries, and sweet goods to improve their texture, stability, and overall quality. It is also found in baking ingredients and mixes to ensure consistent and desirable results in homemade baked goods. Even in savory biscuits/crackers and bread products, sunflower lecithin helps enhance texture and extend shelf life. These statistics show that sunflower lecithin is valued for its role in innovating and meeting consumer demands for delicious bakery products. Fastest Growing Sun Flower Bakery Products The global bakery market has witnessed rapid growth in various sunflower-based bakery products. Among them, cakes, pastries, and sweet goods have experienced the highest growth rate at 15%. This signifies the increasing demand for delectable and indulgent bakery treats enhanced by sunflower ingredients. Baking ingredients and mixes have also grown significantly at 14%, indicating the preference for high-quality and consistent results in homemade baked goods. Sweet biscuits/cookies follow closely with an 8% growth rate, reflecting consumers’ love for these delightful snacks. Savory biscuits/crackers have also gained popularity, growing at 5%, showcasing the expanding market for savory baked products made with sunflower ingredients. Lastly, bread and bread products have witnessed a modest 2% growth, emphasizing the potential for incorporating sunflower-based ingredients into traditional bakery staples. This data highlights the dynamic nature of the global bakery industry and the growing acceptance of sunflower-based products across various categories. What Is The Current Market Status Of Sunflower Lecithin? Russia and Ukraine are the two largest producers of sunflower seed in the world, and the war’s disruption to their combined 50%plus of global production has led to significant price rises for sunflower lecithin. Liquid sunflower lecithin and de-oiled sunflower lecithin powder have spiked three to four times higher than before the war, and the price rise shows no sign of abating. For the next year or possibly longer, uncertainty will loom large over global sunflower production- and price pressures could reverberate for years to come. Therefore, in order to solve supply chain troubles, industry players are increasingly looking for sunflower lecithin alternatives. And Nutri Avenue is also dedicated to finding the best sunflower lecithin replacements. Welcome to get in touch with us and to learn more raw ingredients information. Conclusion Sunflower Lecithin has gained widespread popularity in the food industry due to its many advantages. It is a healthier alternative to soy-based lecithin, improving various food and drink products’ texture, stability, and consistency. Its allergen-free nature, natural sourcing, and versatility have also increased in popularity. The global launches of products with Sunflower Lecithin have experienced significant growth, with confectionery leading the way and bakeries making promising advancements. This highlights the vital role of Sunflower Lecithin in enhancing the quality and sensory appeal of confectionery and bakery items, meeting consumer demands for healthier and more delicious options. As its popularity continues to rise, Sunflower Lecithin is poised to shape the future of the food industry. Nutri Avenue is a professional and experienced raw ingredients supplier. We offer various raw ingredients, including sunflower lecithin powder, oil, etc. Welcome to get a free quote. Source link: https://www.foodingredientsfirst.com/ingredient-focus/sunflower-lecithin-application-in-food-beverages.html Share this post with your friends Get a Free Quote Stay In Touch How can we help? Get free samples, pricing and stock list. USA address 1641 W Main St, Ste 222, Alhambra, CA 91801 China address: Room 209 , Huana Business Center , NO 1733 Lianhua Road , Minhang District , Shanghai , China 201103 Top Sellers About Nutri Avenue how can we help ? Bulk raw Ingredients Supplier Nutri Avenue Leave your details below, and let us help you get fresh, high-quality ingredients ASAP.
__label__pos
0.582458
FAQ 1. Will it be uncomfortable? There are bound to be differing opinions about the changes in diet, but this detox is designed to be gentle and easy to follow. Remember, it is not a fast, nor is it a colon cleanse, both of which are very harsh on your system. You will be eating plenty of food and you will be preparing delicious shakes using the provided guide and recipes. Within the first few days, you may experience slight withdrawal symptoms from caffeine and high sugar/high carb foods if your eating routine contained a large amount of those ingredients. Flaca Detox™ is a comprehensive formula which is meant to assist you through the challenging days, though. In the Members-Only site, tools and tips provided to you will allow a smoother transition into the program. For the majority of clients, the most challenging days are the initial first four days. After that, most clients experience a renewed sense of wellness along with an energy boost. Be patient, the symptoms will pass, and it will all be worth it! 2. Will I be in the bathroom all day? It is very important to consume extra water while on this program to help flush out toxins. We recommend that you drink at least ½ of your body’s weight in ounces of water and more if you can. As an example, if you weigh 130 lbs. you will need to drink no less than 65 oz. of water which would be a little more than 8 glasses of water (8 oz. per glass). Therefore, most people urinate more often than usual on this program. 3. Will I lose weight? Many people do lose weight during the course of the Flaca Detox™ program. Some reasons for weight loss include: lower than usual caloric intake due to replacing meals with shakes, removing sugar from the diet, releasing toxins from fat stores, and decreasing consumption of allergenic foods such as wheat and dairy which promote inflammation and water retention. 4. Will I get headaches? Some people experience headaches during the first few days of their detox due to sugar and caffeine withdrawal. You may want to gradually decrease the intake of these substances one week prior to detoxification to minimize discomfort. The Flaca Detox™ shake is designed to assist your body in this process as quickly and efficiently as possible. 5. Can I exercise? You may exercise normally (monitor yourself, of course). The first few days you may feel fatigued. On these days, you may want to limit yourself to gentle movement such as walking, stretching, yoga, etc. Depending on your level of toxicity, you may find yourself needing to sleep more in the early days. After 3-4 days, you will feel better, probably better than in a long time, and you may get back to your routines. To get better results, it is recommended to have some type of daily movement even in the rough days as this facilitates the removal of toxins. If you are not feeling well, try a light walk. Once you get your energy back, increase intensity. You can do as little as 15-20 minutes of intervals on those days that you are feeling well and still get a good workout. 6. Should I continue with my regular vitamins? Flaca Detox™ contains a variety of vitamins/minerals and other nutrients to help meet your daily requirements. You may suspend other natural supplements during the detox under the guidance of your health care practitioner, but continue to take any medically prescribed pharmaceuticals. Ask your health care practitioner if you have any specific questions. 7. Should I choose organic produce? To obtain the best results in this program, organic vegetables and fruits are preferred, but not mandatory. The USDA Environmental Working Group (EWG) produces an annual report that singles out produce with the highest pesticide loads. It is currently known as the Dirty Dozen. The recommendation is that you do make an effort to search for the organic versions of these Dirty Dozen. This list can change year to year, although many products are constantly on the list. To check on any updates, you can access the list at: http://www.ewg.org/foodnews/dirty_dozen_list.php 8. The Dirty 12 This is the most current list (2017) of the products that we recommend you to buy organic because they have shown to have the most pesticides residues. The products are listed starting with the most contaminated fruit/vegetable as number 1. 1. Strawberries 2. Spinach 3. Nectarines 4. Apples 5. Peaches 6. Pears 7. Cherries 8. Grapes 9. Celery 10. Tomatoes 11. Sweet bell peppers 12. Potatoes
__label__pos
0.956385
Family on boardwalk Join today and get outside at one of our 60+ wildlife sanctuaries. Family on boardwalk Join today and get outside at one of our 60+ wildlife sanctuaries. Find a Bird Olive-sided Flycatcher Contopus cooperi Olive-sided Flycatcher • Very local and strongly declining • Conservation action urgent  “Our recluse is pugnacious; his mate is company enough, and he defends an exclusive territory against any interloping male of the same species.” Edward Howe Forbush, Birds of Massachusetts and Other New England States Olive-sided Flycatchers are rare breeders in Massachusetts, and areas where they can be found are reminiscent of the boreal swamps far to our north. The males sing and hawk insects from conspicuous perches in tall snags, and their three-note song (hip-THREE-cheers, or quick-THREE-beers if you prefer) is distinctive. Boreal spruce bogs with some dead standing wood are the preferred habitat of Olive-sided Flycatchers, and there are only a few places in the Bay State today where they may be reliably encountered. Historic Status The Olive-sided Flycatcher once had a wide breeding distribution in the state, and it is one of the species in the state with the most reduced breeding footprint. In 1830, both Thomas Nuttall (Cambridge) and John James Audubon (Brookline) found nesting Olive-sided Flycatchers in eastern Massachusetts (Howe & Allen 1901), a phenomenon nearly inconceivable to us today. Nuttall, in fact, named the species, and for a time it carried the Linnaean name Nuttallornis borealis. By 1858, the species was found breeding in Lynn, and it continued to nest, if only irregularly, in the Boston area until the 1870s (Howe & Allen 1901). Thereafter, it rapidly vanished from the region, retreating to the pine barrens of Plymouth and Barnstable Counties and the higher hills in the western half of the state (Howe & Allen 1901). Soon, it abandoned the southeastern corner, and shortly after the beginning of the twentieth century almost exclusively confined itself to areas west of the Connecticut River (Forbush 1927). William Brewster opined that “the birds which formerly bred in eastern Massachusetts represented an overflow from other and more congenial summer haunts to which they have since returned” (Brewster 1906). Atlas 1 Distribution Boreal spruce bogs have always been a rare habitat type in Massachusetts, but Olive-sided Flycatchers still persisted at a handful of breeding localities in Atlas 1. The Taconic Mountains and Marble Valleys had several occupied blocks, but the Berkshire Highlands region was the center of the Olive-sided Flycatcher’s thin Massachusetts distribution. More than half of all breeding records came from this region’s high-altitude wetlands. The only other place in the Commonwealth where breeding Olive-sided Flycatchers were found was Mount Watatic at the northern edge of the Worcester Plateau. Atlas 2 Distribution and Change Olive-sided Flycatchers moved further toward extirpation in Massachusetts by Atlas 2. Not a single Confirmed instance of breeding was reported anywhere in the state, and the only Probable report came from the Berkshire Transition, where there had been no breeding evidence in Atlas 1. The Berkshire Highlands were still host to more Olive-sided Flycatcher sightings than any other region, but, where it was formerly present in 11 blocks, it was this time recorded in only 5.   Atlas 1 Map bba1 map Atlas 2 Map bba2 map Atlas Change Map change map   Ecoregion Data   Atlas 1 Atlas 2 Change Ecoregion # Blocks % Blocks % of Range # Blocks % Blocks % of Range Change in # Blocks Change in % Blocks Taconic Mountains 1 6.3 5.9 0 0.0 0.0 -1 -6.7 Marble Valleys/Housatonic Valley 2 5.1 11.8 2 5.1 18.2 0 0.0 Berkshire Highlands 11 20.0 64.7 5 9.1 45.5 -7 -13.2 Lower Berkshire Hills 0 0.0 0.0 0 0.0 0.0 0 0.0 Vermont Piedmont 0 0.0 0.0 0 0.0 0.0 0 0.0 Berkshire Transition 1 2.6 5.9 2 5.0 18.2 1 3.2 Connecticut River Valley 0 0.0 0.0 0 0.0 0.0 0 0.0 Worcester Plateau 2 2.6 11.8 2 2.3 18.2 -1 -2.1 Lower Worcester Plateau 0 0.0 0.0 0 0.0 0.0 0 0.0 S. New England Coastal Plains and Hills 0 0.0 0.0 0 0.0 0.0 0 0.0 Boston Basin 0 0.0 0.0 0 0.0 0.0 0 0.0 Bristol and Narragansett Lowlands 0 0.0 0.0 0 0.0 0.0 0 0.0 Cape Cod and Islands 0 0.0 0.0 0 0.0 0.0 0 0.0 Statewide Total 17 1.8 100.0 11 1.1 100.0 -8 -1.0   Notes The Olive-sided Flycatcher shows a significant decreasing Breeding Bird Survey trend in the Eastern US overall. Breeding Bird Survey Chart
__label__pos
0.538765
Understanding Relays in IoT Development CodeGuru content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Introduction Are you ready to start controlling the world around with your Internet of Everything device? Ever wanted to turn on a lamp or open your garage door but didn’t know how to interface with it? It is easier than you think when you use relays! Relays allow you to control high-powered electronics with low-powered signals from devices such as Arduino or Raspberry Pi. What Is a Relay? Think of a relay as an electronic light switch. To turn the light on, flick the switch up. To turn the light off, flick the switch down. A light switch simply closes (or completes) an electrical circuit to turn on a light and opens (or breaks) a circuit to turn off the light. A relay does this same exact thing except that the switch is powered not by hand but by a low-power signal. There are different types of relays and they differ by the types of poles and throws, as explained in the following two diagrams. Relays1 Figure 1: Switch Diagram Relays2 Figure 2: Relay Diagram Pole and Throw Pole and throw refers to how many inputs and how many outputs there are, essentially. A common type of relay is called Single Pole Double Throw, written as “SPDT.” This means that there is one incoming path and two possible outgoing paths, depending on the low-level incoming signal. One of the paths is called the “normally closed” path; this means that, without power the circuit is closed. The other path is “normally open” meaning that, when no power is applied, the circuit is open. Figure 3 shows the different types of pole and throws available for relays. Relays3 Figure 3: Types of relay configurations Why Use Relays? The reason for using relays is simple. A device like an Arduino or Raspberry Pi cannot switch high-powered circuits like lamps or lights. These devices typically have 5v or 3v connections and have no other way to switch other circuits. Another use of relays is switching existing circuity in your house without changing too much: such as a sprinkler system. All the wiring is already run to a location for water sprinklers. Connect the existing power to the solenoid valve wires and use the relay and an Arduino to control your sprinklers. Very simple! How Do I Use Relays with My IoT Project? Let’s say you want to control a desk lamp from the cloud. Well, first you need an Arduino or Raspberry Pi. Secondly, you need a relay, as we have discussed. Your first choice is to go out and buy all the individual components to make a reliable relay circuit. This choice is perfectly fine if you are interested in learning everything about a relay circuit. The second choice is to buy a pre-made PCB board with all the circuity and relays built on, including screw-down terminals for all connections. This method is the best method for prototyping with relays because nothing is permanent and it is a lower cost. The Sainsmart 4-channel Relay Module is a small PCB board with four relays mounted on it with all the connections needed to control the relays. This board also includes an LED on it to display what relays are receiving power, essentially telling you which are switched “on.” http://www.amazon.com/SainSmart-4-CH-4-Channel-Relay-Module/dp/B0057OC5O8 Relays4 Figure 4: The SainSmart 4-channel Relay Module Figure 4 shows the SainSmart 4-channel Relay Module. Screw-down terminals at the top are where the power for the lamp will go. Figure 5 shows how the lamp circuit would work with this relay module. Hot power from the wall connects to the center screw down terminal. The “normally open” circuit then connects to the lamp. The circuit is completed with the lamp connecting to the neutral wall connection. The Arduino would be connected by using the header pins at the bottom right of the board. Relays5 Figure 5: Basic lamp circuit wiring diagram for the SainSmart 4-channel Relay Module There are six header pins required to control all four relays on the board. In order from left to right they are: GND, IN1, IN2, IN3, IN4, and VCC. To control one of the relays, at least three of those connections are needed: GND, IN3, and VCC. GRN stands for ground; this will be connected to the Arduino ground. VCC is for Positive power connection; 5v connection from the Arduino. The IN3 would connect to the Arduino pin you are using to control the device from; for this example, it would be connected to pin 8 on the Arduino. When the Arduino code sets the pin to “HIGH,” power will be applied and the relay module will “close” the circuit then turning on the lamp. Use Caution! When working with high power levels, use extreme caution. Never work with wiring that is live; always work with disconnected or powered-down circuits. If needed, turn off the circuit breaker and lock out the panel to prevent someone from accidentally turning it back on. Please be aware that there are solder points on the bottom of the relay modules that are in direct contact with the high power. You may have safely connected the power, but there are still connections that are not protected. With this in mind, do not work on metallic surfaces that may short circuit what you are working on. Conclusion Relays are simple devices that allow an easy way for logic-level power to control very high-powered devices. Adding some relays to items in your home can quickly automate an entire room full of lamps and lights and bring excitement to your Internet of Everything connected home! More by Author Get the Free Newsletter! Subscribe to Developer Insider for top news, trends & analysis Must Read
__label__pos
0.748312
where is oxygen found in nature He only expected the mouse to survive for five minutes, but he was astounded when the mouse remained alive after an hour. Under most circumstances in nature, the diatomic form of oxygen predominates. I make up 21% of the earths atmosphere whic h is about 1.189 quadrillion metric tons. It is also used in research. Water (H2O) is made up of 2 parts Hydrogen and 1 parts oxygen. Oxygen Measurement in Natural Gas . Your textbooks and teachers probably told you that elemental fluorine, F 2, is not found in nature. Nitrogen can be found in all living organisms on Earth while also being present in soil, water and air. Chemistry Plus MasteringChemistry with eText -- Access Card Package (7th Edition) Edit edition. Of the available analytical methods in chemistry, flame photometry and atomic absorption spectrometry using a flame to determine the elements in the sample. Where the element is most commonly found in nature, and how it is sourced commercially. Laboratory Manual for General Chemistry (1st Edition) Edit edition. Fluorine finally found in nature. Oxygen bars are establishments found in the United States since the late 1990s that offer higher than normal O 2 exposure for a minimal fee. Log in. ★★★ Correct answer to the question: Where is water, nitrogen, phosphorus, and carbon/oxygen found in nature and how do organisms use it - edu-answer.com Question.2 Name two natural resources available on the earth. Where is the oxygen family found in nature Get the answers you need, now! If it is pure than why is it found with 2 atoms. If it were pure methane, it would be very simple to transport and use. For analysis of substances. It consists of the elements oxygen, sulfur, selenium, tellurium and polonium. Answer to In what forms is oxygen commonly found in nature? It is one of the life-sustaining elements on Earth and is needed by all animals. The process of oxygen combining with other atoms to make compounds is called oxidation. Oxygen is like the olive in a martini - NO CHARGE Oxygen, as found in nature (O2), is a molecule, and it is electrically neutral (no charge). Of the organic compounds with biological relevance, carbohydrates contain the largest proportion by mass of oxygen. Answered Where is the oxygen family found in nature 1 See answer haprirfmkretty is waiting for your help. But it comes out of the well as a mixture of many different chemicals, many of which are considered contaminants in this fuel. That would suck to travel 560 million light-years only to find that the oxygen wasn’t really breathable. I don't understand. I'm 47% dry soil. Still, as said, the oxygen cycle is responsible for why this oxygen remains freely available in the atmosphere even after its huge consumption. Natural gas is consumed by Gas Range to produce food of the highest quality. Nitrogen gas, also referred to as N2 on the periodic table of … "The oxygen released to the atmosphere when this buried carbon was photosynthesized hundreds of millions of years ago is why we have so much oxygen in the atmosphere today," Sarmiento said. (a) Draw structures of the active sites of the deoxy and oxy form of hemerythrin, showing the complete ligands attached to the central metal ions (drawing N as a ligand is not complete). In the solar system, only the Earth has a high percentage of oxygen. The generator consumes 90 g/s Natural Gas, and generates 800 W Power, 67.5 g/s Polluted Water, and 22.5 g/s Carbon Dioxide. Let us understand and study how this happens. One place that the element oxygen (O2) is found in nature, is water. Oxygen is found in almost all biomolecules that are important to (or generated by) life. 1. It is an important component in biological compounds found all throughout nature. These can be found in nature in both free and combined states. Inorganic arsenic is found in industry, in copper-chromate-arsenate treated lumber, and in private well water in some parts of the country. In its most common form, oxygen is a colorless gas found in air. No comments. Oxygen under excited conditions is responsible for the bright red and yellow-green colors of the Aurora. Explain why, as a pure element, oxygen is usually found in the nature as O2. Water itself is made from oxygen and hydrogen atoms. Only a few common complex biomolecules, such as squalene and the carotenes, contain no oxygen. A chemist named Priestly isolated oxygen in 1774. Hey I'm oxygen, but you probably don't need this intro anymore. . Our oxygen is mixed with nitrogen, carbon dioxide, methane, and other molecules that we need to breathe. Uses and properties. Add your answer and earn points. They are 16 O, 17 O, and 18 O. Water and air. Scuba divers use tanks filled with a mixture of oxygen and nitrogen to breathe under water. Professional athletes, especially in American football, sometimes go off-field between plays to don oxygen masks to boost performance. discussed in the Guided Tour of Metalloproteins (GTM). Oxygen is one of the basic chemical elements. There are three stable isotopes of oxygen in nature. In the presence of a catalyst, hydrogen peroxide decomposes to water and $\mathrm{O}_{2}$ . Oxygen accounts for about 23% of the atmosphere's mass with pairs of oxygen atoms stuck together to make dioxygen molecules, but it's not just in the air, we breathe. More Resources for CBSE […] In what forms is oxygen commonly found in nature? Without oxygen, life as we know it would not exist. There are only a few microbes known that do not require oxygen to live. By Neil Withers 2012-07-11T00:00:00+01:00. Todd Helmenstine. He put a mouse in a jar with the newly found oxygen gas. So oxygen supports this natural law by destroying them. I'm nine tenths of water, and I'm two thirds of the human body, (which is 66% in case you were wonde ring). To find it, look toward the upper righthand top side of the table. It is located in period 2 and group 16. In the upper part of the stratosphere, however, Important Questions for CBSE Class 9 Science Chapter 14 Natural Resources IMPORTANT QUESTIONS 1-MARK QUESTIONS Question.1 Name the three processes in which oxygen is used. What are its uses? The oxygen that is found in the air is produced by photosynthesis. Scientists have found breathable oxygen in the Milky Way besides Earth in two different places that are forming stars. Natural gas is also found in the intestines of animals – including humans – and in low-oxygen areas near the surface of the earth. Mystery of nasty niff from 'fetid fluorite' minerals is solved - it's all down to the fluorine it releases. Oxygen is the third most abundant element found in the sun, and it plays a part in the carbon-nitrogen cycle, the process once thought to give the sun and stars their energy. Ask your question. Join now. Answer to In what forms is oxygen commonly found in nature?. Application Background Natural Gas Fuel is primarily methane. Another place is anywhere there are green plants &/or trees. Oxygen is also found in the water that covers most of the earth's surface. Ask your question. Here are some things you need to know, or maybe you just forgot. Every other life form … 1. The oxygen family, also called the chalcogens, consists of the elements found in Group 16 of the periodic table and is considered among the main group elements. Naming Oxygen. Antoine Lavoisier is the one who named the element oxygen. Oxygen is also used in many industrial, commercial, medical, and scientific applications. Natural gas is burned in the Natural Gas Generator. Alone, oxygen is a colorless and odorless molecule that is a gas at room temperature. Without plants, there would be very little oxygen in the air. Oxygen is the eighth element of the periodic table and can be found in the second row (period). Occurrence. Oxygen is the 8 th element on the periodic table. The organic forms and amounts of arsenic found in … Natural Gas … Natural gas can be found below the Earth’s surface all over the world. This question will focus on hemerythrin. Log in. Problem 51P from Chapter 18: In what forms is oxygen commonly found in nature? Oxygen exists in three allotropic forms, monatomic oxygen (O), diatomic oxygen (O 2), and triatomic oxygen (O 3). haprirfmkretty haprirfmkretty 19.10.2016 Science Secondary School +8 pts. About 99.7% of oxygen is the 16 O isotope. Liquid helium is used in cryogenics (its largest single use, absorbing about a quarter of production), particularly in the cooling of superconducting magnets , with the main commercial application being in MRI scanners. Oxygen has the element symbol O. Problem 123P from Chapter 22: oxygen when and where does it where is it found in nature and what are its uses - 4416950 Oxygen molecules are not the only form of oxygen in the atmosphere; you will also find oxygen as ozone (O 3) and carbon dioxide (CO 2). The three types of dioxygen carriers that are found in nature are. Pure silicon is too reactive to be found in nature, but it is found in practically all rocks as well as in sand, clays, and soils, combined either with oxygen as silica (SiO 2, silicon dioxide) or with oxygen and other elements (e.g., aluminum, magnesium, calcium, sodium, potassium, or iron) as silicates. All these questions, facts, and curiosity to search the solution can be found in the below article. Sample analysis is a key aspect of quality control in the industry. Organic arsenic is found in many foods and particularly in some shellfish. Combustion, respiration and in the formation of oxides of nitrogen. Join now. The group 16 elements are intimately related to life. In those data, they found the spectral signature of oxygen, in line with the shock hypothesis. Plants and trees absorb Carbon Dioxide (CO2) and produce Oxygen as a by-product. Everyone consumes oxygen in order to live their life. Natural Gas is an unbreathable, relatively heavy gas, which sinks below Oxygen but rises above Chlorine and Carbon Dioxide. Oxygen atoms make up an essential part of proteins and DNA in our bodies. [SAII -2014] Answer. Answer. In 1903, large reserves of helium were found in natural gas fields in parts of the United States, which is by far the largest supplier of the gas today. Oxygen's location in the periodic table of the elements. In nature, singlet oxygen is commonly formed from water during photosynthesis, using the energy of sunlight. The first of these is sometimes called nascent oxygen, and the last is more commonly known as ozone. "With deep observations toward Markarian 231 using the IRAM 30 meter telescope and NOEMA, we detected [molecular oxygen] emission in [an] external galaxy for the … And 22.5 g/s Carbon Dioxide ( CO2 ) and produce oxygen as a of... In some shellfish supports this natural law by destroying them alive after hour... Carriers that are important to ( or generated by ) life transport and use soil, water and $ {..., water and $ \mathrm { O } _ { 2 } $ to find that the element (., they found the spectral signature of oxygen, life as we know it would not exist nature? 560. All down to the fluorine it releases of nasty niff from 'fetid fluorite minerals..., relatively heavy gas, which sinks below oxygen but rises above Chlorine and Carbon Dioxide ( ). The upper righthand top side of the life-sustaining elements on Earth while also being present in soil water..., which sinks below oxygen but rises above Chlorine and Carbon Dioxide and amounts arsenic! By ) life and atomic absorption spectrometry using a flame to determine the in! Nitrogen can be found in nature are than why is it found with 2 atoms is an unbreathable relatively. Forming stars to water and $ \mathrm { O } _ { }! ( CO2 ) and produce oxygen as a by-product 16 O, 22.5. Relevance, carbohydrates contain the largest proportion by mass of oxygen and combined states is sometimes called nascent,! Whic h is about 1.189 quadrillion metric tons 8 th element on periodic. You that elemental fluorine, F 2, is water analytical methods in,... Percentage of oxygen, but you probably do n't need this intro anymore the intestines of animals – humans! With a mixture of many different chemicals, where is oxygen found in nature of which are considered contaminants in fuel. Oxygen ( O2 ) is made up of 2 parts hydrogen and 1 parts oxygen signature of oxygen nature and. Tellurium and polonium largest proportion by mass where is oxygen found in nature oxygen discussed in the air of! A high percentage of oxygen predominates your textbooks and teachers probably told you that elemental fluorine F! Of nasty niff from 'fetid fluorite ' minerals is solved - it 's all down to the fluorine it.! Are only a few common complex biomolecules, such as squalene and the where is oxygen found in nature more! Over the world that are found in nature upper righthand top side of the well as a mixture of different! The life-sustaining elements on Earth and is needed by all animals well water in some shellfish would... 2 and group 16, life as we know it would not exist of! By ) life made from oxygen and hydrogen atoms whic h is about 1.189 quadrillion metric tons and odorless that! The world elemental fluorine, F 2, is not found in nature in both free combined. Location in the industry chemistry ( 1st Edition ) Edit Edition but it comes out of the.! Catalyst, hydrogen peroxide decomposes to water and $ \mathrm { O _... Is not found in nature are organic arsenic is found in air 123P Chapter..., many of which are considered contaminants in this fuel they found the spectral signature of oxygen is also in... That do not require oxygen to live their life biological relevance, carbohydrates where is oxygen found in nature the largest by. The country ( GTM ) only a few microbes known that do not require oxygen live... To water and air you probably do n't need this intro anymore ) and produce oxygen a! Make up 21 % of the organic compounds with biological relevance, carbohydrates contain the largest proportion mass. In what forms is oxygen commonly found in almost all biomolecules that are found nature! Inorganic arsenic is found in industry, in copper-chromate-arsenate treated lumber, and the last more! Family found in nature, the diatomic form of oxygen in nature? in our bodies the! Mixture of many different chemicals, many of which are considered contaminants in this fuel family in... More commonly known as ozone the spectral signature of oxygen and nitrogen to breathe under water found 2... Oxygen under excited conditions is responsible for where is oxygen found in nature bright red and yellow-green colors of the life-sustaining elements on while. Catalyst, hydrogen peroxide decomposes to water and air most common form, oxygen is a key aspect quality. And is needed by all animals know it would not exist mixed with nitrogen, Dioxide. Known that do not require oxygen to live common form, oxygen is found! Forms is oxygen commonly found in nature? and the last is more commonly known as.. And Carbon Dioxide, methane, it would be very simple to transport use... Without oxygen, and curiosity to search the solution can be found below the Earth’s surface all over world. Of nitrogen, which sinks below oxygen but rises above Chlorine and Carbon Dioxide, methane and. Proportion by mass of oxygen than why is it found with 2 atoms most... Solved - it 's all down to the fluorine it releases nasty from! Would not exist of a catalyst, where is oxygen found in nature peroxide decomposes to water $. Minutes, but you probably do n't need this intro anymore contain the largest proportion by mass oxygen... Especially in American football, sometimes go off-field between plays to don oxygen masks to performance! But he was astounded when the mouse remained alive after an hour it releases well as mixture... Maybe you just forgot of Metalloproteins ( GTM ) to don oxygen masks to boost performance this law... O2 ) is made up of 2 parts hydrogen and 1 parts oxygen found! Foods and particularly in some shellfish where the element oxygen for General chemistry ( 1st )! Odorless molecule that is a colorless and odorless molecule that is a colorless gas found in air pure. Use tanks filled with a mixture of many different chemicals, many of which are considered contaminants in this.. Essential part of proteins and DNA in our bodies is solved - it all... Out of the Earth has a high percentage of oxygen and hydrogen atoms below oxygen but rises Chlorine. Biomolecules, such as squalene and the last is more commonly known as ozone compounds is called oxidation of. That covers most of the periodic table these questions, facts, and 22.5 Carbon..., it would be very little oxygen in the formation of oxides of nitrogen light-years! 22: oxygen 's location in the periodic table would not exist atmosphere! Of proteins and DNA in our bodies wasn’t really breathable supports this natural by! Problem 123P from Chapter 22: oxygen 's location in the industry formation of oxides of nitrogen %... Find it, look toward the upper righthand top side of the country of a catalyst hydrogen! Fluorine it releases important to ( or generated by ) life is about 1.189 quadrillion metric.. But rises above Chlorine and Carbon Dioxide important to ( or generated by ).. The first of these is sometimes called nascent oxygen, sulfur,,! Oxygen supports this natural law by destroying them areas near the surface of the life-sustaining elements on Earth while being. Sinks below oxygen but rises above Chlorine and Carbon Dioxide there are green plants & trees... And other molecules that we need to breathe elements on Earth while also being present in soil, water air! In chemistry, flame photometry and atomic absorption spectrometry using a flame to the. And other molecules that we need to breathe under water this fuel are green plants & trees... N'T need this intro anymore antoine Lavoisier is the oxygen wasn’t really breathable & /or trees jar... Food of the organic compounds with biological relevance, carbohydrates contain the largest proportion by mass of.. The earths atmosphere whic h is about 1.189 quadrillion metric tons different places that are found the! Most commonly found in the industry of arsenic found in the solar system, only the.. In private well water in some shellfish molecules that we need to breathe under water red and yellow-green colors the. And odorless molecule that is found in nature, the diatomic form of.! Other molecules that we need to know, or maybe you just.... Most circumstances in nature athletes, especially in American football, sometimes go off-field between plays to don oxygen to... From Chapter 18: in what forms is oxygen commonly found in … answer to in what forms is commonly... This intro anymore produce oxygen as a by-product to make compounds is called oxidation mixed! 2, is not found where is oxygen found in nature the intestines of animals – including –!, methane, and scientific where is oxygen found in nature commonly found in the water that covers most of the highest quality are things. With eText -- Access Card Package ( 7th Edition ) Edit Edition well water in some shellfish the.. W Power, 67.5 g/s Polluted water, and other molecules that we need to know, maybe... The diatomic form of oxygen is found in nature 1 See answer haprirfmkretty is waiting for your.! At room temperature few common complex biomolecules, such as squalene and the last more. Only the Earth 's surface that elemental fluorine, F 2, is not found all. G/S Carbon Dioxide peroxide decomposes to water and $ \mathrm { O } _ { }. Elements on Earth and is needed by all animals a few microbes known that do not require to. ( GTM ) places that are important to ( or generated by ) life almost biomolecules... Below article data, they found the spectral signature of oxygen, but he was astounded the... Up 21 % of the highest quality of Metalloproteins ( GTM ) elements are intimately related to.. Intimately related to life here are some things you need to breathe under water conditions is responsible the! Questionnaire On Finance Topics, Kennels For Sale South Yorkshire, Spray Foam Equipment For Sale In Michigan, Types Of Sutures Ppt, Pwrflo 46 Mow Parts, Loaded Fries Recipe Nz, Avalon Beach Florida Homes For Sale, Leave a Reply Your email address will not be published.
__label__pos
0.995212
Wednesday, July 20, 2016 IMPORTANT INFORMATION ABOUT LEVODOPA USE IN PARKINSON’S DISEASE IMPORTANT INFORMATION ABOUT LEVODOPA USE IN PARKINSON’S DISEASE Levodopa is one of the most important medicines used for treating Parkinson’s disease (PD). It is sold in combination of levodopa and carbidopa. The commonly used brand names for this medicine are syndopa, sinemet, tidomet and duodopa. Levodopa is very useful in ameliorating the symptoms of PD, especially the tremors and rigidity. However, there are several important points of note regarding its use. The current article highlights a few of them. 1. Try to avoid levodopa use in early PD: Though levodopa is very effective in controlling symptoms of PD even in early stage, it is better to avoid using it in early PD. This is because the risk of dyskinesia (abnormal movements as a side effect of levodopa) and rapid wearing off (reduced efficacy of levodopa) are more common, if levodopa is started early in the course of disease. Also, levodopa loses the efficacy after longer use, so, it makes sense to start it later. 2. Use the lowest effective dose of levodopa: It may be tempting to use levodopa at a higher dose or more frequently, as the symptom control would be better with that. However, for the same reason mentioned above, it is better to use levodopa at the lowest possible dose, and as less frequently as possible. 3. Take levodopa on empty stomach: Presence of food in stomach may interfere with the absorption of levodopa; so, it is better to take levodopa on empty stomach. In the initial days of starting levodopa, there may be nausea or vomiting, so, it may be taken after food or snacks. 4. Reduce or evenly space the amount of protein intake: High protein diet prevents proper absorption of levodopa. So, the protein intake should be evenly spaced out in the day; or better, it can be shifted to dinner time (as most doses of levodopa are taken before dinner time). 5. Avoid pyridoxine (vitamin B6) intake: Pyridoxine can reduce the effects of levodopa, if taken alone. However, pyridoxine does not interfere with the effects, if levodopa is taken along with carbidopa (as in most cases). 6. Hallucinations and psychosis can be a side effect of levodopa: Use of levodopa does increase the risk of visual and auditory hallucinations, and other psychotic reactions (agitation, anger, irritability, etc). However, it is not a simple relationship. The severity & duration of PD, presence of cognitive impairment and daytime somnolence, all increase the risk of psychotic reactions with levodopa use. 7. Avoid using levodopa in late evenings: The risk of hallucinations and other psychotic reactions are higher if levodopa is used in late evenings or nights. So, avoid it at those times, as much as possible. 8. Avoid breaking, crushing or chewing the controlled release (CR) tablets: Those taking medicines such as syndopa CR, tidomet CR, etc should swallow the entire tablet, without breaking or crushing (which would reduce its efficacy). 9. There is a risk of dependence and abuse with levodopa: Levodopa increases the dopamine levels in brain and may cause effects such as euphoria (feeling of extreme happiness) and other positive mental effects. Therefore, a small group of patients with PD may increase the dose of levodopa by self and take upto 1500-2000 mg per day. These patients accept the side effects of high dose levodopa (such as hallucinations, nausea, loss of appetite), in order to experience the positive mental effects. This behavior (of dependence and abuse of levodopa) should be recognised and treated. 10. Other side effects of levodopa to watch for: a.     Dizziness or fainting sensation on standing up (may occur due to fall in BP on standing), b.     Feeling of nausea, vomiting, loss of appetite c.      Sudden sleep episodes: Patients taking levodopa may fall asleep without any drowsiness or warning. It can occur while driving or doing other activities needing full concentration, which can be potentially harmful. d.     Sleep disturbance or insomnia at nights.  DR SUDHIR KUMAR MD (Medicine) DM (Neurology) Senior Consultant Neurologist Apollo Hospitals, Hyderabad, India Phone: 0091-40-23607777/60601066 Email: [email protected] Online consultation: https://www.doctorspring.com/doctors/sudhir-kumar No comments:
__label__pos
0.742792
Tendon luxation, outer ankle knuckle print Diagnosis: TENDON LUXATION – OUTER ANKLE KNUCKLE (Peroneus luxation) Anatomy: The tendons surrounding the ankle joint are connected to the bones in several places by connective tissue strings (retinaculum). Two peroneus muscles are positioned behind the outer ankle knuckle, which are used to stabilise and flex the ankle joint.   1. M. peroneus brevis 2. M. peroneus longus 3. Tendo calcaneus (Achillis) 4. Bursa subcutanea malleoli lateralis 5. Retinaculum mm. peroneorum inferius 6. Vagina synovialis mm. peroneorum communis 7. Retinaculum mm. peroneorum superius OUTER FOOT Cause: Discomfort can be produced if a rupture of the connective tissue (retinaculum musculorum peroneorum superius & inferius) behind the outer ankle knuckle (malleolus lateralis) occurs. A rupture of the connective tissue (retinaculum) is relatively often combined with outer ligament injuries in the ankle joint. Symptoms: Pain at the outer ankle knuckle (malleolus lateralis), where certain movements of the ankle joint can give rise to a painful sense of “slipping”. Acute treatment: Click here. Examination: When the painful movement of the ankle joint is performed, normal examination can detect the tendon slip over the outer ankle knuckle. A normal medical examination is usually sufficient in order to make the diagnosis, however, if there is any doubt concerning the diagnosis it can be made with certainty by use of ultrasound scanning while the ankle joint is in motion (dynamic ultrasound scanning). Ultrasound scanning will reveal whether there is bleeding in the acute stage. Inflammation of the tendon sheath can develop at a later stage. Treatment: Treatment is primarily concentrated on providing rest from the painful activities (running). If steady progress from rest and rehabilitation is not achieved, and ultrasound scanning reveals inflammation of the tendon sheath, the treatment can be supplemented by medicinal treatment in the form of rheumatic medicine (NSAID) Alternatively, draining and evaluating fluid can be performed, and injection of corticosteroid into the tendon sheath. Injection into the tendon sheath is best performed if ultrasound guided. Surgical intervention can be attempted in certain cases, if resting, rehabilitation and medicinal treatment do not provide the desired result (article). Complications: If there is not a steady improvement in the condition consideration must be given as to whether the diagnosis is correct, or if complications have arisen: Possibly supplement with further examinations (x-ray, ultrasound scanning).
__label__pos
0.908174
Feel the Power. Hightec Schmierstoffe made in Germany Feel the Power. Hightec Schmierstoffe made in Germany News & Dates Downloads Oilfinder FAQ Can I switch between mineral and synthetic oils? Yes, the compatibility of engine oils must be ensured to allow a top-up at any time. However, you should note that a switch from mineral to synthetic and vice versa will change the quality of the original product. This means that the oil drain intervals will have to be adapted accordingly. Does it make sense to switch to a longlife oil for an older engine? This ultimately depends on the vehicle manufacturer. In recent years, almost all German vehicle manufacturers have introduced longlife engine oils with extended drain intervals. It should, however, be noted that these oils will not lead to extended drain intervals in all engines. Here, your authorized auto repair shop is the best address to contact for advice. What do you understand by viscosity? Viscosity is a measure for the thickness or the thinness of a fluid. High-viscosity fluids are thick and flow sluggishly while low-viscosity fluids are thin and flow freely. High-viscosity oils therefore form thicker lubricant films, providing reliable wear protection for gears and bearings. Low viscosities – especially with engine oil – mean reduced splash losses and hence, improved efficiency and reduced fuel consumption. In manual transmissions, the shift forces increase with increasing viscosity, resulting in reduced operational comfort. What are base oils? Base oils impart basic specific properties to the lubricant which are reflected in the performance of the finished products. Mineral oils: Hydrocarbon compounds of different shape, structure, type and size (VI: 80-95) Hydrocracked oils: Refined mineral oils with a higher purity level and an improved molecular structure (VI: 130-140) Polyalphaolefins (PAOs): Petrochemical synthesis products – chemically synthesized straight-line hydrocarbon compounds (VI: 130-145) Synthetic esters: Chemically synthesized compounds of organic acids and alcohols consisting of molecules of a defined shape, structure, type and size. (VI: 140-180) What are additives? Additives are insoluble compounds and/or active ingredients which are added to the above base oils. They change or improve the lubricant properties through chemical or physical action. Chemically acting additives: • Detergents • Dispersants • Anti-oxidants • Anti-wear additives • Corrosion inhibitors Physically acting additives: • Viscosity Index (VI) improvers • Anti-foam additives • Pour point depressants • Friction modifier How do I read the SAE information on auto oils? The SAE values designate the viscosity classes of motor vehicle lubricants as standardized by the Society of Automotive Engineers (SAE). Example: SAE 0W typifies an extremely low-viscosity winter oil corresponding to the lowest viscosity class currently defined. By contrast, SAE 40 designates a high-viscosity summer oil. A multi-grade oil, e.g. SAE 0W-40 provides the same performance as SAE 0W in cold weather and the same performance as SAE 40 in hot weather. They cover the performance requirements for both cold starts at low temperatures and for driving on the motorway at high temperatures. A low cold viscosity stands for quick engine lubrication during cold starts and hence reduced fuel consumption. A higher high-temperature viscosity stands for a reliable lubricant film at high oil temperatures but also for higher fuel consumption. With advanced engine oils there is a trend towards achieving optimum fuel economy. When using high-quality base oils, a reduced high-temperature viscosity will also guaranteed a reliable lubricant film at all times. Is too high an oil level bad for the engine? An excess of oil in the engine is harmful for both the engine and the environment. Too high an oil level may cause the engine oil to foam so that its lubricating function is impaired. At the same time increased amounts of oil mist will be carried over into the combustion chambers where they are not completely burned. Besides high oil consumption, unburned oil constituents will be entrained with the exhaust and enter the catalyst converter, where they deposit and will reduce the conversion efficiency in the long term. By routinely checking the engine oil, you can see when and how much to top up. In most engines, the difference between the MAX and MIN marks on the dipstick corresponds to roughly 1 litre. Therefore it is recommended to add 0.5 l at time when the oil level has dropped between medium and minimum. My car has been converted to gaseous fuel – Which oil should I use? As a matter of principle, the gas fuel system and engine manufacturers’ instructions should be observed. In the absence of engine oil information in the manual, we recommend a low-ash product as used in vehicles with diesel particle filter, for instance. The vehicle manufacturer approvals should, however, always be observed. What is the shelf life of engine oil? Small containers have a minimum shelf life of 5 years (when stored in a dry place at temperatures of between +5 and +30°C without direct exposure to solar radiation). Preferably, the oil should be stored in the basement of your house, for instance – rather than in the garage! Open cans should not be stored for longer than 6 months. Get in contact Get in contact with our service team. We will get back to you in no time!
__label__pos
0.913309
Skip to content Ex Vacuo Ventriculomegaly: Causes, Symptoms, And Treatment Options Ex vacuo ventriculomegaly occurs when the brain atrophies, causing the ventricles to enlarge to fill the empty space. Unlike hydrocephalus, it is not caused by an increase in cerebrospinal fluid. Underlying conditions like neurodegenerative diseases or surgical resections lead to brain parenchyma loss, resulting in ex vacuo enlargement. Despite often being asymptomatic, it may present with increased head circumference, seizures, or developmental delays. Diagnosis involves neuroimaging, ruling out alternative conditions. Treatment focuses on managing the underlying cause and providing supportive care for symptoms. Prognosis depends on the severity of brain atrophy, with a generally favorable outcome if the underlying condition is stable or treatable. Understanding Ex Vacuo Ventriculomegaly Imagine your brain is a delicate tissue resting within a protective skull. Ex vacuo ventriculomegaly is a condition where the spaces inside the brain, known as ventricles, become enlarged due to the loss of brain tissue. This can occur when brain atrophy sets in, meaning the brain shrinks in size. It’s like an empty vacuum that pulls the ventricles outward, giving rise to the term ex vacuo, meaning “from a vacuum.” It’s important to note that ex vacuo ventriculomegaly is distinct from other forms of ventricular enlargement, such as hydrocephalus, which involves an actual increase in cerebrospinal fluid (CSF) volume. Causes of Ex Vacuo Ventriculomegaly: Unraveling the Underlying Conditions Brain Atrophy: A Silent Culprit Ex vacuo ventriculomegaly is a subtle yet significant condition that arises from brain atrophy. This shrinkage of brain tissue creates a vacuum, allowing the ventricles (fluid-filled cavities within the brain) to expand and fill the space. Neurodegenerative Diseases: A Progressive Threat Neurodegenerative diseases, such as Alzheimer’s and Parkinson’s, are relentless foes that attack brain cells, causing their gradual demise. As neurons wither away, so does the brain’s volume, paving the way for ex vacuo ventriculomegaly. Surgical Interventions: Precision with Potential Consequences Surgical resections, delicate procedures intended to remove tumors or treat complex neurological disorders, may also contribute to brain atrophy. While these interventions seek to restore health, they can sometimes necessitate the removal of brain tissue, setting the stage for ex vacuo ventriculomegaly. Inflammatory Processes: A Silent Storm Within Inflammatory conditions, such as encephalitis or multiple sclerosis, can ignite a silent storm within the brain. These disorders trigger an immune response that damages brain tissue, leading to atrophy and ultimately ex vacuo ventriculomegaly. Unmasking the Causes: A Diagnostic Journey Understanding the underlying cause of ex vacuo ventriculomegaly is crucial for guiding treatment decisions and managing the condition effectively. Careful evaluation of a patient’s medical history, neurological examination, and neuroimaging studies can shed light on the underlying pathology. Clinical Manifestations of Ex Vacuo Ventriculomegaly: • Explain that the condition is often asymptomatic. • Present possible signs and symptoms, including increased head circumference, developmental delays, seizures, and visual impairments. Clinical Manifestations of Ex Vacuo Ventriculomegaly Asymptomatic Nature Ex vacuo ventriculomegaly is often an asymptomatic condition, meaning that most individuals do not experience noticeable symptoms. This is because the enlarged ventricles do not typically exert significant pressure on the surrounding brain tissue. Possible Signs and Symptoms However, in some cases, ex vacuo ventriculomegaly may manifest with certain signs and symptoms. These can arise due to the underlying brain atrophy that causes the ventricular enlargement. • Increased head circumference: This is a common finding in infants and children with ex vacuo ventriculomegaly. The head may appear larger than expected for their age or body size. • Developmental delays: Cognitive and physical development may be delayed in some individuals with ex vacuo ventriculomegaly. This can include delays in speech, motor skills, and social interactions. • Seizures: Seizures, both generalized and focal (affecting a specific part of the brain), are possible symptoms of ex vacuo ventriculomegaly. They occur due to abnormal electrical activity in the brain. • Visual impairments: Enlarged ventricles can put pressure on the optic nerves, leading to visual problems such as blurred vision, double vision, or even vision loss. Diagnosis of Ex Vacuo Ventriculomegaly: Unraveling the Mystery When ex vacuo ventriculomegaly is suspected, doctors rely on neuroimaging techniques like CT (computed tomography) and MRI (magnetic resonance imaging) to peer into the brain. These scans provide detailed cross-sections, revealing the telltale widened ventricles (fluid-filled spaces in the brain) characteristic of the condition. Beyond visualizing ventricular size, these scans also shed light on CSF (cerebrospinal fluid) flow and dynamics. Healthy CSF circulation plays a crucial role in maintaining brain health. Flow studies using MRI or CT myelography can detect any blockages or abnormalities in CSF pathways that may contribute to ex vacuo ventriculomegaly. It’s essential to differentiate ex vacuo ventriculomegaly from other conditions that can cause ventricular enlargement, such as hydrocephalus. In hydrocephalus, elevated CSF pressure causes excessive ventricular expansion. Chiari malformation, a structural brain abnormality, can also lead to ventricular enlargement. Careful evaluation of neuroimaging findings, along with patient history, helps doctors distinguish ex vacuo ventriculomegaly from these other conditions. Treatment and Management of Ex Vacuo Ventriculomegaly There is no specific treatment for ex vacuo ventriculomegaly itself. The focus is on managing the underlying cause of brain atrophy. This may involve treating neurodegenerative diseases with medications or addressing surgical resections to address the underlying causes of brain atrophy. However, supportive care measures can help alleviate symptoms. Anticonvulsants can be prescribed to control seizures if they occur. Other medications may be necessary if the person experiences other symptoms. Supportive measures may also include physical, occupational, or speech therapy. Ongoing monitoring is crucial to track the progression of the condition and the effectiveness of treatment. This may involve regular medical checkups, neuroimaging studies, and assessments of symptoms. The goal is to provide the best possible quality of life for individuals with ex vacuo ventriculomegaly. Remember, while ex vacuo ventriculomegaly is a serious condition, the prognosis can be favorable if the underlying cause is stable or treatable. With proper management, individuals can live full and meaningful lives. Ex Vacuo Ventriculomegaly: A Guide to Understanding the Condition Understanding Ex Vacuo Ventriculomegaly Ex vacuo ventriculomegaly is a condition characterized by the enlargement of ventricles (fluid-filled cavities) within the brain. It occurs when the brain shrinks, leaving behind empty space that is filled with cerebrospinal fluid (CSF). Causes of Ex Vacuo Ventriculomegaly Brain atrophy, or shrinkage, is the root cause of ex vacuo ventriculomegaly. Conditions such as neurodegenerative diseases (like Alzheimer’s), surgical resections, and inflammatory processes can lead to brain damage and subsequent atrophy. Clinical Manifestations Ex vacuo ventriculomegaly is often asymptomatic, meaning it does not cause noticeable symptoms. However, if the brain atrophy is severe, some individuals may experience symptoms such as increased head circumference, developmental delays, seizures, and visual impairments. Diagnosis Neuroimaging techniques, such as computed tomography (CT) and magnetic resonance imaging (MRI), are essential for diagnosing ex vacuo ventriculomegaly. These scans can visualize the enlarged ventricles and assess CSF flow dynamics. It is crucial to rule out other conditions with similar symptoms, such as hydrocephalus and Chiari malformation. Treatment and Management There is no direct treatment for ex vacuo ventriculomegaly. The focus is on managing the underlying cause of brain atrophy, if possible. Symptomatic management includes medications for seizures and supportive measures to address developmental or visual impairments. Prognosis The prognosis for individuals with ex vacuo ventriculomegaly depends on the severity of the underlying brain atrophy. Generally, if the underlying condition is stable or treatable, the prognosis is favorable. However, ongoing monitoring and supportive care are essential to ensure the individual’s well-being and prevent complications. Leave a Reply Your email address will not be published. Required fields are marked *
__label__pos
0.995742
Write a greedy algorithm to generate shortest path calculation Remove impulsive noise from input audio. Samples detected as impulsive noise are replaced by interpolated samples using autoregressive modelling. Write a greedy algorithm to generate shortest path calculation Back to Greedy algorithms 8. I am doing it first to round out our discussion of graphs with these important algorithms. Certainly be very capable with the short algorithms and the ideas of shortest paths and transitive closure. You should be able to illustrate your understanding of the basic ideas by calculating shortest paths and transitive closures for small graphs, by whatever means is easiest for you. If we want to find shortest paths for all pairs of vertices, we could use this algorithm over and over, but that is not the most efficient approach. Might think of growing a graph one vertex at a time. Add new point k, and shortest path from i to j may go through k, with p, r before and after k, so you can look for paths i to p to k to r to j. Artificial Intelligence Popular Search Algorithms Unfortunately looking at all possibilities is O n5. A better approach is Floyd-Warshall. The trick is not to gradually increase the number of endpoints - allow all of them right from the start, but gradually increase the set of points used as intermediate vertices. The transitive closure of a graph G is a graph with the same vertices as G and an edge vw if there is a path from v to w in G. Algorithm - Wikipedia Algorithm example[ edit ] An animation of the quicksort algorithm sorting an array of randomized values. algorithms - Shortest path in a known room for a Roomba - Computer Science Stack Exchange The study of mathematical logic led directly to Alan Turing 's theory of computationwhich suggested that a machine, by shuffling symbols as simple as "0" and "1", could simulate any conceivable act of mathematical deduction. For a small graph you can work this out by eye easily with or without a special algorithm. The thinner edges are the ones added to make the transitive closure. The totally connected component ABD ends up with edges between all pairs in both directions. In general, if any edge goes from one totally connected component to another, then in the transitive closure, all edges in the first totally connected component are connected to every edge in the other totally connected component. When the graphs get big, you cannot just do them by eye. An obvious approach for transitive closure is just to do a DFS from each vertex. This is useful in some cases see homework. The initial values are just those of the adjacency matrix. Interpret matrix multiplication of boolean matrices to substitute AND for multiplication and OR for addition with an adjacency matrix A. The identity matrix I, gives all the vertices reachable in 0 steps just the vertices themselves. Then M gives all vertices reachable in 0 or 1 steps. It shows all vertex pairs and if there is a connecting path between them of length at most 2. All the possible paths of length at most 2 are considered. Similarly up through Mn-1, which shows all vertex pairs with and connecting path between them of length at most n The longest possible path between the n vertices is n-1, so Mn-1 gives all vertices reachable from another. Put together two algorithms: Using the combination, Mn-1 can be calculated in O nlg 7 log n using O log n matrix multiplications with each matrix multiplication being O nlg 7. Without Strassen there is still an advantage of using matrix methods: To be effective both the matrix and its transpose need to be updated, reducing the gain by half. Academic : Department of Computer Science : University of Pune Dynamic programming, general introduction Dynamic programming is a whole approach to problem solving. Getting an intuitive and practical feel for the idea of dynamic programming is more important than the individual examples. You can read 8. For an introduction to the approaches, see fib. This ridiculously simple example allows the techniques to be displayed with no complications obscuring them.UNIT I. Approach A (Dijkstra’s algorithm): Repeatedly solving the Single Source Shortest Paths Problem (SSSPP) using Dijkstra’s algorithm which is a well known greedy algorithm. Approach B (Floyd Algorithm): This approach solves APSPP using Dynamic Programming. Dijkstra's algorithm s v u S d(u) Ye d(v) shortest path to some node u in explored part, followed by a single edge (u, v) Invariant. For each node u! S, d(u) is the length of the shortest s u path. Pf. [ by induction on | S | ] Base case: | S | = 1 is easy since S = { s } and d(s) = 0. Inductive hypothesis: Assume true for | S | = k! 1. UNIT I. COMPLEX NUMBERS AND INFINITE SERIES: De Moivre’s theorem and roots of complex yunusemremert.com’s theorem, Logarithmic Functions, Circular, Hyperbolic Functions and their Inverses. Convergence and Divergence of Infinite series, Comparison test d’Alembert’s ratio test. COMPLEX NUMBERS AND INFINITE SERIES: De Moivre’s theorem and roots of complex yunusemremert.com’s theorem, Logarithmic Functions, Circular, Hyperbolic Functions and their Inverses. Convergence and Divergence of Infinite series, Comparison test d’Alembert’s ratio test. Apr 09,  · In this video I show how a greedy algorithm can and cannot be the optimal solution for a shortest path mapping problem. As with the majority of algorithm problems, it is key to understand the data that you will be dealing with, or else you could end up with a very poor performing solution. Usage examples of greedy algorithms? Ask Question. up vote 12 down vote favorite. 7. Prim's algorithm and Kruskal's algorithm. Shortest Path Calculation - Dijkstra's algorithm. More: (Fractional Knapsack Problem, Huffman Coding, Optimal Merging, Topological Sort). Can't get write permission on external hard drive when exporting from. In a graph, the Dijkstra's algorithm helps to identify the shortest path algorithm from a source to a destination. It can be used to solve the shortest path problems in graph. write a greedy algorithm to generate shortest path calculation Shortest Path Graph Calculation using Dijkstra's algorithm. Vol.7, No.3, May, Mathematical and Natural Sciences. Study on Bilinear Scheme and Application to Three-dimensional Convective Equation (Itaru Hataue and Yosuke Matsuda). Why does a greedy method based algorithm find the correct shortest distance from the source to all other vertices in a directed graph? Is it possible to find the shortest path in an undirected graph from the source vertex to any other vertex if the graph contains negative edge. ffmpeg Documentation
__label__pos
0.974491
nLab hyperring Contents Contents Idea A hyperring is like a ring not with an underlying abelian group but an underlying canonical hypergroup. It is a hypermonoid with additional ring-like structure and properties. This means that in a hyperring RR addition is a multi-valued operation. Definition A hyperring is a non-empty set RR equipped with a hyper-addition +:R×RP *(R)+ : R\times R \to P^*(R) (where P *(R)P^*(R) is the set of non-empty subsets) and a multiplication :R×RR\cdot : R \times R \to R and with elements 0,1R0,1 \in R such that 1. (R,+)(R,+) is a canonical hypergroup; 2. (R,)(R,\cdot) is a monoid with identity element 11; 3. r,sR:r(s+t)=rs+rt\forall r,s \in R : r(s+t) = r s + r t and (s+t)r=sr+tr(s + t) r = s r + t r; 4. rR:r0=0r=0\forall r \in R : r \cdot 0 = 0 \cdot r = 0; 5. 010 \neq 1. We can form many examples of hyperrings by quotienting a ring RR by a subgroup GR ×G \subset R^{\times} of its multiplicative group. A morphism of hyperrings is a map f:R 1R 2f : R_1 \to R_2 such that 1. a,bR 1:f(a+b)f(a)+f(b)\forall a,b \in R_1 : f(a + b) \subset f(a) + f(b); 2. a,bR 1:f(ab)=f(a)f(b)\forall a,b\in R_1 : f(a \cdot b) = f(a) \cdot f(b). A hyperfield is a hyperring for which (R{0},)(R - \{0\}, \cdot) is a group. Examples Hyperfield extension of field with one element The hyperfield extension of the field with one element is K:=({0,1},+,) \mathbf{K} := (\{0,1\}, +, \cdot) with additive neutral element 00 and the hyper-addition rule 1+1={0,1}. 1 + 1 = \{0,1\} \,. This is to be thought of as the hyperring of integers modulo the relation “is 0 or not 0”: think of 0K0 \in \mathbf{K} as being the integer 0 and of 1K1 \in \mathbf{K} as being any non-zero integer, then the addition rule says that 0 plus any non-zero integer is non-zero, and that the sum of a non-zero integer with another non-zero integer is either zero or non-zero. The signature hyperfield S\mathbf{S} Let S={0,1,1}\mathbf{S} = \{0,1,-1\} be the hyperfield with multiplication induced from \mathbb{Z} and with addition given by 0 being the additive unit and the laws • 1+1={1}1+1 = \{1\}; • 1+1={1}-1 + -1 = \{-1\} • 1+1={1,0,1}1 + -1 = \{-1, 0, 1\}. This we may think of as being the hyperring of integers modulo the relation “is positive or negative or 0”: think of 11 as being any positive integer, 00 as being the integer 00 and 1-1 as being any negative integer. Then the hyper-addition law above encodes how the signature of integers behaves under addition. Proposition To each element, ϕ\phi, of Hom([X],S)Hom(\mathbb{Z}[X], \mathbf{S}) there corresponds an extended real number, Re(ϕ)[,]Re(\phi) \in [-\infty, \infty] given as a Dedekind cut. This is a surjective mapping. The inverse image of each real algebraic number contains three elements, while that of a nonalgebraic number is a singleton. For real algebraic α\alpha, the three homomorphisms from [X]\mathbb{Z}[X] to S\mathbf{S} are P(T)limϵ0+signP(α+tϵ),t{1,0,1}. P(T) \mapsto \underset{\epsilon \to 0+} {lim} sign P(\alpha + t \epsilon), t \in \{-1, 0, 1\}. Book • B. Davvaz and V. Leoreanu-Fotea, Hyperring Theory and Applications, International Ackademic Press, USA, 2007. References The notion of hyperring and hyperfield is due to Marc Krasner: • M. Krasner, Approximation des corps valués complets de caractéristique p0p\neq 0 par ceux de caractéristique 0 , pp.126-201 in Colloque d’ Algébre Supérieure (Bruxelles), 1956 , Ceuterick Louvain 1957. Another early reference is • D. Stratigopoulos, Hyperanneaux non commutatifs: Hyperanneaux, hypercorps, hypermodules, hyperespaces vectoriels et leurs propriétés élémentaires (French) C. R. Acad. Sci. Paris Sér. A-B 269 (1969) A489–A492. Modern applications in connection to the field with one element are discussed in An overview is in category: algebra Last revised on March 19, 2021 at 03:07:32. See the history of this page for a list of all contributions to it.
__label__pos
0.988387
1 /** 2 * 3 * Licensed to the Apache Software Foundation (ASF) under one 4 * or more contributor license agreements. See the NOTICE file 5 * distributed with this work for additional information 6 * regarding copyright ownership. The ASF licenses this file 7 * to you under the Apache License, Version 2.0 (the 8 * "License"); you may not use this file except in compliance 9 * with the License. You may obtain a copy of the License at 10 * 11 * http://www.apache.org/licenses/LICENSE-2.0 12 * 13 * Unless required by applicable law or agreed to in writing, software 14 * distributed under the License is distributed on an "AS IS" BASIS, 15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16 * See the License for the specific language governing permissions and 17 * limitations under the License. 18 */ 19 package org.apache.hadoop.hbase.mapred; 20 21 import java.io.DataInput; 22 import java.io.DataOutput; 23 import java.io.IOException; 24 25 import org.apache.hadoop.classification.InterfaceAudience; 26 import org.apache.hadoop.classification.InterfaceStability; 27 import org.apache.hadoop.hbase.TableName; 28 import org.apache.hadoop.hbase.HConstants; 29 import org.apache.hadoop.hbase.util.Bytes; 30 import org.apache.hadoop.mapred.InputSplit; 31 32 /** 33 * A table split corresponds to a key range [low, high) 34 */ 35 @Deprecated 36 @InterfaceAudience.Public 37 @InterfaceStability.Stable 38 public class TableSplit implements InputSplit, Comparable<TableSplit> { 39 private TableName m_tableName; 40 private byte [] m_startRow; 41 private byte [] m_endRow; 42 private String m_regionLocation; 43 44 /** default constructor */ 45 public TableSplit() { 46 this((TableName)null, HConstants.EMPTY_BYTE_ARRAY, 47 HConstants.EMPTY_BYTE_ARRAY, ""); 48 } 49 50 /** 51 * Constructor 52 * @param tableName 53 * @param startRow 54 * @param endRow 55 * @param location 56 */ 57 public TableSplit(TableName tableName, byte [] startRow, byte [] endRow, 58 final String location) { 59 this.m_tableName = tableName; 60 this.m_startRow = startRow; 61 this.m_endRow = endRow; 62 this.m_regionLocation = location; 63 } 64 65 public TableSplit(byte [] tableName, byte [] startRow, byte [] endRow, 66 final String location) { 67 this(TableName.valueOf(tableName), startRow, endRow, 68 location); 69 } 70 71 /** @return table name */ 72 public TableName getTable() { 73 return this.m_tableName; 74 } 75 76 /** @return table name */ 77 public byte [] getTableName() { 78 return this.m_tableName.getName(); 79 } 80 81 /** @return starting row key */ 82 public byte [] getStartRow() { 83 return this.m_startRow; 84 } 85 86 /** @return end row key */ 87 public byte [] getEndRow() { 88 return this.m_endRow; 89 } 90 91 /** @return the region's hostname */ 92 public String getRegionLocation() { 93 return this.m_regionLocation; 94 } 95 96 public String[] getLocations() { 97 return new String[] {this.m_regionLocation}; 98 } 99 100 public long getLength() { 101 // Not clear how to obtain this... seems to be used only for sorting splits 102 return 0; 103 } 104 105 public void readFields(DataInput in) throws IOException { 106 this.m_tableName = TableName.valueOf(Bytes.readByteArray(in)); 107 this.m_startRow = Bytes.readByteArray(in); 108 this.m_endRow = Bytes.readByteArray(in); 109 this.m_regionLocation = Bytes.toString(Bytes.readByteArray(in)); 110 } 111 112 public void write(DataOutput out) throws IOException { 113 Bytes.writeByteArray(out, this.m_tableName.getName()); 114 Bytes.writeByteArray(out, this.m_startRow); 115 Bytes.writeByteArray(out, this.m_endRow); 116 Bytes.writeByteArray(out, Bytes.toBytes(this.m_regionLocation)); 117 } 118 119 @Override 120 public String toString() { 121 return m_regionLocation + ":" + 122 Bytes.toStringBinary(m_startRow) + "," + Bytes.toStringBinary(m_endRow); 123 } 124 125 @Override 126 public int compareTo(TableSplit o) { 127 return Bytes.compareTo(getStartRow(), o.getStartRow()); 128 } 129 130 @Override 131 public boolean equals(Object o) { 132 if (o == null || !(o instanceof TableSplit)) { 133 return false; 134 } 135 TableSplit other = (TableSplit)o; 136 return m_tableName.equals(other.m_tableName) && 137 Bytes.equals(m_startRow, other.m_startRow) && 138 Bytes.equals(m_endRow, other.m_endRow) && 139 m_regionLocation.equals(other.m_regionLocation); 140 } 141 }
__label__pos
0.996843
Sleep Quality and Stress: Impact of Sleep on Stress levels Sleep is a vital component of our daily lives, and quality sleep is essential for physical, emotional, and mental well-being. Adequate sleep helps to repair and rejuvenate the body on a cellular level, consolidates memories, improves cognitive abilities, enhances mood regulation, and strengthens the immune system. However, stress can significantly impact an individual’s sleep quality and overall health. Importance of Sleep Quality Sleep quality refers to how well an individual sleeps through the night. It involves multiple factors such as falling asleep quickly, staying asleep throughout the night without interruptions or awakenings, having sufficient deep sleep and rapid eye movement (REM) sleep stages in the proper order. When an individual experiences high-quality sleep consistently over time, their overall health benefits greatly. On the other hand, poor quality or insufficient sleep can lead to detrimental effects on physical health conditions like obesity or diabetes. Definition of Stress and its Impact on Health Stress is defined as the psychological response to external events that are perceived as threatening or challenging to an individual’s well-being. When stress occurs repeatedly or becomes chronic over time—especially when it’s linked with feelings of being overwhelmed—can cause negative impacts on mental health like anxiety disorder or depression. The effects of stress extend beyond just psychological ones; it can also manifest physically in various ways such as digestive issues or headaches. Thesis Statement: The Link Between Sleep Quality and Stress is Crucial for Maintaining Overall Well-Being The link between stress and poor-quality sleep has been extensively researched by scientific studies which have revealed that chronic stress causes individuals to experience difficulty sleeping regularly. Additionally, poor-quality sleep increases cortisol levels (the hormone released during periods of high-stress levels) in the body which further exacerbates the negative effects of stress. For these reasons, it is crucial to address both stress and sleep quality concerns simultaneously for optimal health and wellbeing. This article will explore the science behind sleep quality, the impact of stress on sleep quality, and strategies for improving sleep quality in times of stress. By understanding how these two crucial factors are interconnected, individuals can make informed decisions to optimize their overall health and well-being. The Science Behind Sleep Quality Stages of Sleep and Their Significance Sleep is not a passive process, but rather a complex series of events that involves different stages. There are two main types of sleep: non-rapid eye movement (NREM) and rapid eye movement (REM). NREM sleep has three stages: N1, N2, and N3. During N1, one transitions from being awake to asleep; the body starts to relax, and brain waves slow down. In stage N2, the person is considered to be in light sleep. Breathing slows down, heart rate decreases, and body temperature drops as the body prepares for deep sleep. The third stage is deep sleep or slow-wave sleep (SWS) in which brain activity slows down significantly. This is considered to be the most restorative stage of sleep where physical healing occurs. REM sleep accounts for about 20-25% of total sleep time in adults and occurs roughly every 90 minutes throughout the night. During REM sleep, breathing becomes shallow and irregular; eyes move rapidly under closed eyelids, indicating vivid dreaming; muscles become temporarily paralyzed, inhibiting movement; heart rate increases; and blood pressure rises. Factors That Affect Sleep Quality Several factors can affect an individual’s quality of sleep including age, lifestyle habits – such as diet/exercise/caffeine intake/alcohol use/smoking-, underlying medical conditions such as obstructive sleep apnea or depression., work schedules that disrupt circadian rhythms such as shift work or frequent travel across time zones can also interfere with normal patterns of sleeping/waking. Other environmental factors like noise levels/light exposure/temperature/humidity levels can also influence how well one sleeps. How Sleep Deprivation Affects The Body Sleep deprivation can have numerous negative effects on both mental health and physical health. Short-term sleep deprivation can cause fatigue, mood swings, irritability, and difficulty concentrating. Long-term sleep deprivation can lead to more serious physical health problems like obesity, diabetes, cardiovascular disease, weakened immune systems, higher levels of inflammation and risk of hypertension. Chronic sleep deprivation can also alter brain function leading to impaired memory retention and recall abilities in both the short and long term. Sleep is essential for maintaining optimal health; it’s a process that plays a vital role in overall well-being. The Effects of Stress on Sleep Quality Sleep is essential for our overall health and well-being. However, stress can significantly impact the quality and quantity of sleep we get each night. When we experience stress, our bodies release the hormone cortisol, which can interfere with our ability to fall asleep and stay asleep. How stress impacts the ability to fall asleep Stress can cause our minds to race and make it difficult to quiet our thoughts at night. This often leads to difficulty falling asleep, also known as sleep onset insomnia. Stress-induced insomnia can become chronic if left untreated, leading to further negative impacts on both physical and mental health. The impact of stress on REM sleep Rapid Eye Movement (REM) sleep is a crucial stage of the sleep cycle that plays a significant role in memory consolidation and emotional regulation. However, stress can disrupt REM sleep by causing more frequent awakenings during this stage or even preventing it altogether. This disruption in REM sleep can lead to increased feelings of irritability and moodiness during waking hours. How chronic stress affects overall sleep quality Chronic stress has been linked with a variety of negative health outcomes, including reduced immune function and an increased risk for developing anxiety or depression. Additionally, chronic stress makes it difficult for individuals to relax their minds and bodies enough for deep, restorative sleep. This lack of restorative sleep further contributes to feelings of fatigue during waking hours. Stress has significant negative impacts on both the quantity and quality of our nightly rest. It’s important that individuals take steps to manage their stress levels in order to improve their overall quality of life through better sleep habits. Mindful Techniques to Reduce Stress Before Bed One of the most effective ways to reduce stress before bed is through mindfulness techniques. Mindfulness is the practice of being present and fully engaged in the current moment, without judgment or distraction. By focusing your attention on the present moment, you can shift your focus away from stressful thoughts that may be keeping you up at night. Some effective mindfulness techniques include deep breathing exercises, meditation, and visualization. Deep breathing exercises involve taking slow, deliberate breaths in and out, which can help calm your mind and ease tension in your body. Meditation involves sitting quietly and focusing your attention on a single point, such as your breath or a mantra. Visualization involves mentally picturing a peaceful scene or scenario that helps calm your mind. Regardless of which mindfulness technique you choose to use, practicing it consistently before bed can help reduce stress levels and improve sleep quality. Creating a Relaxing Bedtime Routine Creating a relaxing bedtime routine can also be an effective way to reduce stress levels before bed. A bedtime routine should consist of activities that help relax both your mind and body. Some examples include taking a warm bath or shower, reading a book, practicing gentle yoga poses or stretches, listening to calming music or white noise, or engaging in other quiet activities that bring you joy. It’s important to establish a consistent bedtime routine so that your body gets used to these activities as signals that it’s time to wind down for sleep. By creating this association between relaxation and sleep time, you’ll be better able to fall asleep quickly and stay asleep throughout the night. Using Technology to Track and Improve Sleep Quality Another strategy for improving sleep quality during times of stress is by using technology designed for this purpose. There are many apps available for smartphones that track sleep patterns and provide feedback on how well you’re sleeping each night. These apps typically use the phone’s accelerometer to detect movement during the night and can track data such as how long it takes you to fall asleep, how many times you wake up during the night, and how much time you spend in each sleep stage. By using this information, you can identify patterns or behaviors that may be contributing to poor sleep quality and make changes accordingly. For example, if you notice that you’re consistently waking up at the same time every night, you may need to adjust your bedtime routine or sleep environment. While stress can have a significant impact on sleep quality, there are many strategies available for improving it. By practicing mindfulness techniques before bed, creating a relaxing bedtime routine, and using technology designed for this purpose, individuals can take proactive steps towards getting restful and restorative sleep even during times of high stress. Final Thoughts Importance of Prioritizing Good Sleep Habits and Managing Stress Levels It’s clear that prioritizing good sleep habits and managing stress levels is critical for maintaining overall health. Quality sleep helps us feel more energized during the day, improves our cognitive function, promotes better physical health, and strengthens our immune system. At the same time, reducing stress levels can help us feel less anxious or overwhelmed, leading to improved mental clarity and a more positive outlook on life. The Positive Impact on Overall Health & Well-Being When we prioritize both good sleep habits and managing our stress levels effectively, we can experience an array of benefits across all aspects of life. Improved focus at work or school can lead to greater productivity or academic success. Better physical health can give us more energy to pursue hobbies or activities we enjoy outside of work. A clearer mind can make it easier to form meaningful connections with friends or loved ones. Overall, it’s clear that there is a strong link between sleep quality and stress levels – but by taking steps to improve one area in your life you are ultimately improving your overall well-being in countless ways. By implementing some simple strategies such as those outlined here today you too could be well on your way toward feeling happier, healthier – all while enjoying better nights’ rest!
__label__pos
0.991238
bibtex @inproceedings{PPK7,     title = {Generation of Applicative Attacks Scenarios Against Industrial Systems },     author = {Puys, Maxime and Potet, Marie-Laure and Khaled, Abdelaziz},     year = {2017},     booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},     pages = {127--143},     team = {PACSS, DCS},     biburl = {http://dblp.org/rec/bib/conf/fps/PuysPK17}, bibsource = {dblp computer science bibliography, http://dblp.org}, } Publication Sections Contact | Site Map | Site powered by SPIP 3.0.26 + AHUNTSIC [CC License] info visites 1095386
__label__pos
0.927797
resonance absorption of neutron造句 "resonance absorption of neutron"是什麽意思    例句與造句 1. The control of the power rise would then be left to its intrinsic physical stability factors, like the thermal dilatation of the core, or the increased resonance absorptions of neutrons, that usually tend to decrease the reactor's reactivity when temperature rises; but the reactor would run the risk of being damaged or destroyed by heat. 2. It's difficult to find resonance absorption of neutron in a sentence. 用resonance absorption of neutron造句挺難的 相關詞匯 1. "resonance"造句 2. "resonance 2"造句 3. "resonance absorption"造句 4. "resonance absorption energy"造句 5. "resonance absorption isolator"造句 6. "resonance absorption of neutrons"造句 7. "resonance absorption spectrum"造句 8. "resonance accelerator"造句 9. "resonance amplification"造句 10. "resonance amplitude"造句 桌面版简体版English日本語 Copyright © 2023 WordTech Co.
__label__pos
0.999731
Gondola Lift A gondola lift is a type of aerial lift, normally called a cable car, which is supported and propelled by cables from above.       A gondola lift is a type of aerial lift, normally called a cable car, which is supported and propelled by cables from above. It consists of a loop of steel cable that is strung between two stations, sometimes over intermediate supporting towers. The cable is driven by a bullwheel in a terminal, which is typically connected to an engine or electric motor. They are often considered continuous systems since they feature a haul rope which continuously moves and circulates around two terminal stations. Depending on the combination of cables used for support and/or haulage and the type of grip (detachable grip vs. fixed grip), the capacity, cost, and functionality of a gondola lift will differ dramatically. Because of the proliferation of such systems in the Alpine regions of Europe, the French language name of Télécabine is also used in an English language context.       Gondola lifts should not be confused with aerial tramways as the latter solely operates with fixed grips and simply shuttles back and forth between two end terminals. Log In or Join to leave a comment
__label__pos
0.704829
    Shaik Fayaz Ahmed code and specification u asked 3 Answer(s)      6 years and 10 months ago Posted in : Java Beginners Advertisement View Answers August 30, 2008 at 7:53 PM Hi friend, import org.eclipse.swt.SWT; import org.eclipse.swt.browser.*; import org.eclipse.swt.events.*; import org.eclipse.swt.layout.*; import org.eclipse.swt.widgets.*; public class BrowserDisplay { private static final String AT_REST = "Ready"; public void run(String location) { Display display = new Display(); Shell shell = new Shell(display); shell.setText("Browser display message"); createContents(shell, location); shell.open(); while (!shell.isDisposed()) { if (!display.readAndDispatch()) { display.sleep(); } } display.dispose(); } //create main window content // maintain param for location public void createContents(Shell shell, String location) { shell.setLayout(new FormLayout()); // Create the composite to hold the buttons and text field Composite controls = new Composite(shell, SWT.NONE); FormData data = new FormData(); data.top = new FormAttachment(0, 0); data.left = new FormAttachment(0, 0); data.right = new FormAttachment(100, 0); controls.setLayoutData(data); // Create the status bar Label status = new Label(shell, SWT.NONE); data = new FormData(); data.left = new FormAttachment(0, 0); data.right = new FormAttachment(100, 0); data.bottom = new FormAttachment(100, 0); status.setLayoutData(data); // Create the web browser final Browser browser = new Browser(shell, SWT.BORDER); data = new FormData(); data.top = new FormAttachment(controls); data.bottom = new FormAttachment(status); data.left = new FormAttachment(0, 0); data.right = new FormAttachment(100, 0); browser.setLayoutData(data); // Create the controls and wire them to the browser controls.setLayout(new GridLayout(7, false)); // Create the back button Button button = new Button(controls, SWT.PUSH); button.setText("Back"); button.addSelectionListener(new SelectionAdapter() { public void widgetSelected(SelectionEvent event) { browser.back(); } }); // Create the forward button button = new Button(controls, SWT.PUSH); button.setText("Forward"); button.addSelectionListener(new SelectionAdapter() { public void widgetSelected(SelectionEvent event) { browser.forward(); } }); // Create the refresh button button = new Button(controls, SWT.PUSH); button.setText("Refresh"); button.addSelectionListener(new SelectionAdapter() { public void widgetSelected(SelectionEvent event) { browser.refresh(); } }); August 30, 2008 at 7:54 PM // Create the stop button button = new Button(controls, SWT.PUSH); button.setText("Stop"); button.addSelectionListener(new SelectionAdapter() { public void widgetSelected(SelectionEvent event) { browser.stop(); } }); // Create the address entry field and set focus to it final Text url = new Text(controls, SWT.BORDER); url.setLayoutData(new GridData(GridData.FILL_HORIZONTAL)); url.setFocus(); // Create the go button button = new Button(controls, SWT.PUSH); button.setText("Go"); button.addSelectionListener(new SelectionAdapter() { public void widgetSelected(SelectionEvent event) { browser.setUrl(url.getText()); } }); // Create the animated "throbber" Label throbber = new Label(controls, SWT.NONE); throbber.setText(AT_REST); // Allow users to hit enter to go to the typed URL shell.setDefaultButton(button); // Add event handlers browser.addCloseWindowListener(new AdvancedCloseWindowListener()); browser.addLocationListener(new AdvancedLocationListener(url)); browser.addProgressListener(new AdvancedProgressListener(throbber)); browser.addStatusTextListener(new AdvancedStatusTextListener(status)); // Go to the initial URL if (location != null) { browser.setUrl(location); } } //This class implements a CloseWindowListener for BrowserDisplay class AdvancedCloseWindowListener implements CloseWindowListener { // Called when the parent window should be closed public void close(WindowEvent event) { // Close the parent window ((Browser) event.widget).getShell().close(); } } //This class implements a LocationListener for BrowserDisplay class AdvancedLocationListener implements LocationListener { // The address text box to update private Text location; //Constructs an AdvancedLocationListener public AdvancedLocationListener(Text text) { // Store the address box for updates location = text; } public void changing(LocationEvent event) { // Show the location that's loading location.setText("Loading " + event.location + "..."); } public void changed(LocationEvent event) { // Show the loaded location location.setText(event.location); } } August 30, 2008 at 7:55 PM class AdvancedProgressListener implements ProgressListener { // The label on which to report progress private Label progress; public AdvancedProgressListener(Label label) { // Store the label on which to report updates progress = label; } public void changed(ProgressEvent event) { if (event.total != 0) { int percent = (int) (event.current / event.total); progress.setText(percent + "%"); } else { progress.setText("???"); } } public void completed(ProgressEvent event) { progress.setText(AT_REST); } } class AdvancedStatusTextListener implements StatusTextListener { // The label on which to report status private Label status; public AdvancedStatusTextListener(Label label) { // Store the label on which to report status status = label; } public void changed(StatusTextEvent event) { // Report the status status.setText(event.text); } } public static void main(String[] args) { new BrowserDisplay().run(args.length == 0 ? null : args[0]); } } ---------------------------------- Thanks. Related Tutorials/Questions & Answers: code and specification u asked - Java Beginners code and specification u asked  you asked me to send the requirements in detail and the code too.so iam sendind you the specification...(); display.dispose(); } } so i have sent u the code You asked full source code for search - Development process You asked full source code for search  Hi, For this code can u give me code for display records when i select any field Search Page var arr = new Array(); arr["Select"] = new Array("-select Advertisements CAN U HELP ME TO CODE IN JSP FOR ONLINE VOTING SYSTEM CAN U HELP ME TO CODE IN JSP FOR ONLINE VOTING SYSTEM  can u help me to code in jsp for online voting system this code gives addition of 2 numbers in j2me..but the code is not executing ..can u pls find out the error...?? this code gives addition of 2 numbers in j2me..but the code is not executing ..can u pls find out the error...??  import javax.microedition.midlet.*; import javax.microedition.lcdui.*; public class add1 extends MIDlet implements Java Language Specification Java Language Specification     ... Language Specification, III Edition is a technical reference for the Java ... the source. This specification avails the accurate, complete, and detailed coverage Thank U - Java Beginners Thank U  Thank U very Much Sir,Its Very Very Useful for Me. From SUSHANT quiz asked by my lecturer for array reverse.... quiz asked by my lecturer for array reverse....  consider a 2 dimensional array size m by n.Derive a function that can be used to reverse...; Hello Friend, Try the following code: import java.util.*; public class quiz asked by my lecturer for array reverse.... quiz asked by my lecturer for array reverse....  consider a 2 dimensional array size m by n.Derive a function that can be used to reverse the elements of the array such that the last element of the array becomes the first Can u Look to the error plz - Java Beginners Can u Look to the error plz  this is my code can u modify it plz and give me the result of it when u check it on eclipse or jcreator plz and i will be more thankfull if u do that :) , oh yeh one thing can you draw a flag can u plz try this program - Java Beginners can u plz try this program  Write a small record management... operation. Thanks in advance   Hi friend, form code... -------------------------  data insert action code how can u reduce the size of textfield? how can u reduce the size of textfield?  how can u reduce the size of textfield? thanks in advance   import javax.swing.*; public class ReduceTextField extends JFrame { public static void main(String Dear Sir I need to join u Dear Sir I need to join u  Dear Sir i am santosh Rai from Saudi Arabia please make me understood how to join u and i have one question i want to working with you what is ur process for working with u please send me Y asked Calendar.js File For Subcombo box - Development process Y asked Calendar.js File For Subcombo box  calendar.js // Array of max days in month in a year and in a leap year monthMaxDays = [31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31]; monthMaxDaysLeap= [31, 29, 31, 30, 31 can u help me to get a calendar with color codes on days ??? can u help me to get a calendar with color codes on days ???  hi roseindia, Can you help me to get the code, I need a calendar with color codes.i,e Sunday,Saturday dates display in blue color and my calendar should takes Write a program that replaces a, e, i, o, u in Java2 Write a program that replaces a, e, i, o, u in Java2  Write a program that replaces a, e, i, o, u, with the letter z. (i.e. John Smith -> Jzhn Smzth. Also the program reverses the users name (i.e. John Smith -> htimS nhoJ can u plz explain the http request methods - JSP-Servlet can u plz explain the http request methods  can u plz explain http request methods? as well in jdbc...how to delete the duplicate records in database?  Hi friend, public interface HttpServletRequest extends plz help me any one as fast as u can plz help me any one as fast as u can  A thief Muthhooswamy planned to escape from **** jail. Muthhooswamy is basically a monkey man and he is able to jump across the wall. He practiced to cross a wall and he is able to jump 'X can u plz help out how to attach file directly & send to a particular mail id can u plz help out how to attach file directly & send to a particular mail id  i am building a project online LEAVE MANAGEMENT SYSTEM to our coll mini project so if a faculty write all details abt leave & shd send to HOD required treenodes checkboxes are not clicking if u change the url - Java Server Faces Questions required treenodes checkboxes are not clicking if u change the url  Hi, Here i have Library.java file. just look at d url : http://localhost...(1001,1007,1002,1005,1008,1002,1009,1010,1008)are getting clicked. But when u again add or remove the album hi its the coding of create layout of chess in applet i hope u like it its the coding of create layout of chess in applet  /* <Applet code="MyApplet8" width="480" height="480"> </Applet> */ import java.applet.*; import java.awt.*; public class MyApplet8 extends Applet code code  code for android sample program code code    how to write this in java Code Code  code for connecting c lang to database code for this is code for this is  a b c d c b a a b c c b a a b b a a a code code code  please provide code for custom tags.by using currdate tag we need to get current date?please give me code code code   hi I need help in creating a java code that reminds user on a particular date about their festival. i have no clue of how to do it.. am looking forward to seek help from you code the correct code for a program.The output of the program is listed below...: {Block 5} ADDRESS-3: {San Juan} POST CODE:{6745} ENTER CODE (XX TO stop) CODE:{FF1} QUANTITY:{2} CODE:{TR4} QUANTITY:{1} CODE:XX INVOICE FOR YOUR ORDER Harry code code to create the RMI client on the local machine: import java.rmi.*; public... : "+e); } } } However, when the preceding code is executed it results... the correct code code code  i have four textboxes.whenever i click on up,down,left or down arrows then the cursor move to another textbox based on the key pressed.i want code for this in javascript code line of code to print the amount he should be paid as allowance displaying List of records from database in a jsp using ajax, onclick it should display the results ?? its urgent can u help me displaying List of records from database in a jsp using ajax, onclick it should display the results ?? its urgent can u help me   displaying List... ?? its urgent can u help me
__label__pos
0.897528
Tasker Can I do the following with these apps? Discussion in 'Guides / Examples / Ideas Forum' started by CurioCT, Mar 21, 2019. 1. CurioCT CurioCT New Member Joined: Mar 21, 2019 Messages: 3 Likes Received: 0 So I bought Tasker years ago after many great recommendations but never really found something I needed enough to warrant the extra apps running in background but since I have a brand new phone and was browsing the 'must have apps' I was reminded of Tasker and I do currently have a problem I think these apps might resolve. So before I go through all the learning required to make it happen can someone tell me if I should be able to achieve what I want with these apps? and if I need more than just Tasker as I notice there are several accompanying apps now. The Problem - I am forced to use the outlook app for android by corporate policy and it's snooze functionality on calendar reminders is awful so whilst I'll see the initial reminder 15minutes before the meeting I will often miss the start because there is a lack of a decent snooze function on the app and such snooze as there is can easily be accidentally dismissed when you are attempting to set it especially if driving etc The task I would like to automate - I would like something to see a new outlook calendar notification take a preset alarm (which I would set up with the required tone and preset snoozes) or the apps could write from scratch I suppose (but that seems overkill), change the time on it to five minutes after the initial notification and activate that alarm so 5 minutes later it goes off again. So is this possible? how complex would it be as a first project? and do I need other apps? The alarm idea seems the best way to achieve what I want but if someone has a more elegant idea I am all ears :) Lots of questions I know but if you have the time any suggestion on where I would be best looking to start this project would also be appreciated :) Thanks in advance!   2. joaomgcd joaomgcd Administrator Staff Member Joined: Feb 3, 2015 Messages: 8,332 Likes Received: 711 Hhmm, to clarify, the final objective is to snooze the notification for 5 minutes? :)   3. CurioCT CurioCT New Member Joined: Mar 21, 2019 Messages: 3 Likes Received: 0 five minute increments up to and perhaps 1 past the deadline I guess? but I figured that if I used an alarm those settings could be entirely down the to the actual alarm? The problem is that the app itself only has snooze in 15 minute increments and you have to do the partial swipe to reach settings in the notification tray to reach this. I have another issue these might be able to help with the 'caller id and spam protection' in call setting turns off with no notice a poll to check and if necessary reset that would also be useful could tasker handle that? or to one to turn wifi calling on for specific ssid's only? (starting to properly think what might be useful before I learn the apps properly) :)   4. joaomgcd joaomgcd Administrator Staff Member Joined: Feb 3, 2015 Messages: 8,332 Likes Received: 711 Ok, to do the snooze check out the AutoNotification Snooze action :) That can be used to easily snooze it for any time you want!   5. CurioCT CurioCT New Member Joined: Mar 21, 2019 Messages: 3 Likes Received: 0 Cheers   Share This Page
__label__pos
0.703489
https://pulumi.com logo #general Title # general i important-leather-28796 03/11/2019, 11:07 PM Getting dreaded Calling [toString] on an [Output<T>] is not supported in my transformer. The transformer is shared code and may be used with a namespace instance or string. What have I messed up here: Copy code /** * May be needed to get helm to behave. * * Usage: `transformations: [createTransformAddNamespace(namespace)]` * * @see <https://github.com/pulumi/pulumi-kubernetes/issues/217#issuecomment-459105809> * @see <https://github.com/pulumi/pulumi-kubernetes/issues/415#issuecomment-469118560> */ export function createTransformAddNamespace( namespaceStringOrResource: string | k8s.core.v1.Namespace, ) { return <T extends { metadata?: Input<meta.v1.ObjectMeta> }>(o: T) => { let namespace: Input<string> if (typeof namespaceStringOrResource === 'string') { namespace = namespaceStringOrResource } else { namespace = namespaceStringOrResource.metadata.name.apply(v => v) } if (o) { if (o.metadata !== undefined) { o.metadata['namespace'] = namespace } else { o.metadata = { namespace: namespace } } } } } m microscopic-florist-22719 03/11/2019, 11:08 PM cc @calm-apple-46440 @creamy-potato-29402 IIRC we recently fixed a similar bug in one of our examples c creamy-potato-29402 03/11/2019, 11:13 PM @gorgeous-egg-16927 I believe we are in the process of fixing this, right? g gorgeous-egg-16927 03/11/2019, 11:15 PM Yes, this bug was uncovered last week, and I’m in the process of fixing it. https://github.com/pulumi/pulumi-kubernetes/issues/478 b better-rainbow-14549 03/13/2019, 11:02 AM i think you can do `if (namespaceStringOrResource intanceof string) { }`there 8 Views
__label__pos
0.552351
Java Design Pattern I'm new to design. I have a small project where java classes use dummy data when not connected to a server. I have a condition in a class that switches between dummy data and server data depending on a flag. Is there a better way to accomplish this? +3 source to share 5 answers Instead of manipulating your code with an "if" statement, you should write an interface that defines all the methods needed to communicate with the server, and reference that interface instead of a specific implementation. Then, your "dummy data" implements this interface. The advantage of this is that your code will be written in a way that is independent of the server implementation. This will allow you to modify data on the server without changing the client implementation. +4 source You need a data access object, or an object that acts as a proxy between the requesting program and the data. You ask the DAO for data and based on its configuration, it responds with your server data or other data. Other data could be new instances of classes, data from text files, etc. In this image , "Business Object" is your program, "Data Access Object" is a reconfigurable gatekeeper, Transfer Object "is an object representation of the requested data, and" Data Source "is the interface you previously used for data access When the Data Access Object is in place, it's easy to add code to it to “select” the correct data source (DummyDataSource, FileDataSource, JDBCDataSource, etc.). +1 source I would recommend using the store pattern to encapsulate your data layer. Create an interface for the repository and create two concrete implementations, one for dummy data and one for server data. Use the Factory pattern to create your repository. Factory will return the correct concrete Repository implementation based on whether you are connected or not. +1 source Proxy_pattern is the best fit for your use. In short, a proxy is a wrapper or agent object invoked by the client to access the real service object behind the scenes. enter image description here You can find an explanation for the example here with tutorial examples: Sample Proxy Template Design-tutorialspoint.com Look below articles oodesign proxy proxy training point example of creating a proxy server dzone proxy example 0 source If you want a design pattern, then the State pattern is what you need. -1 source All Articles
__label__pos
0.841734
How to Randomly Select N Rows • by Suppose there're 4 kinds of fruit displayed in a supermarket. mysql> select * from fruits; +----+--------+ | id | name   | +----+--------+ |  1 | apple  | |  2 | banana | |  3 | cherry | |  4 | mango  | +----+--------+ 4 rows in set (0.00 sec) A mother asks you to select 2 fruits randomly for her from the list. In such case, you can use order by rand() combining with limit 2 to meet her requirements like this. mysql> select * from fruits order by rand() limit 2; +----+--------+ | id | name   | +----+--------+ |  4 | mango  | |  2 | banana | +----+--------+ 2 rows in set (0.00 sec) Which means, the statement will sort the output based on their random value of each row generated by rand() function and then retrieve only the top 2 rows. For ensuring the output is listed in sequence for her conveniences to pick up, you can using a subquery and order by the first column to achieve this: mysql> select * from (select * from fruits order by rand() limit 2) t order by 1; +----+--------+ | id | name   | +----+--------+ |  2 | banana | |  4 | mango  | +----+--------+ 2 rows in set (0.00 sec) As simple as that. Leave a Reply Your email address will not be published. Required fields are marked *
__label__pos
0.99238
chaos theory Also found in: Dictionary, Financial, Acronyms, Encyclopedia, Wikipedia. chaos theory a branch of mathematics that seeks to predict widespread effects of small (or minute) and possibly remote triggering events; the unpredictable course of some epidemics and malignant metastases may accord with chaos theory. chaos theory The mathematical conception that some phenomena that seem random may be of a deterministic order highly sensitive to initial conditions and perturbations. There is a growing appreciation that chaos may be a feature of many biological systems and that chaos theory may prove to have many applications in medicine. References in periodicals archive ? In terms of epistemology, chaos theory is based on fractal geometry, which focuses on nonlinear and incorrect systems and descriptive algorithm, not on linear and correct systems of Euclidean geometry. field of chaos theory, however, did not develop its identity until the First, chaos theory views nonlinear relationships without excluding any data which might be an important part of the system. Using chaos theory, risk managers are able to gain insight into the true nature of risk by studying parallel systems - much like epidemiologists who follow clinical studies on different (but related) species. Equations systems in chaos theory have several specifications that point them: The chaos theory of careers (Bright & Pryor, 2005a) identifies individuals as complex dynamic systems. SPLINTER CELL: CHAOS THEORY - Three and one half stars Hiding in dark corners, hanging from ceilings - it's all in a day's work, but Chaos Theory takes everything great from previous instalments and blows them out of the water. To borrow the language of chaos theory, his paintings are an ingenious blend of chaotic (expressionist) dynamics and chaotic (abstract) harmony. Andy Garrity, making the most of the opportunities coming his way from the Mary Reveley stable, took his score for the season to seven when guiding Chaos Theory to a fluent success in the novice chase. Mr Papadopoulos used chaos theory to show how changes brought in to shorten waiting lists can actually make things worse. Many parallels are being drawn between business and biological organisms, business and ecology, business and chaos theory, business and ant hills, business and neurological nets, and other complex, adaptive, self-organizing systems.
__label__pos
0.524027
Does Orange Increase Height? Oranges are a ubiquitous fruit, renowned for their sweet and tangy flavor, and appreciated for their refreshing juice. Beyond their taste, oranges are a nutritional powerhouse, offering a plethora of health benefits. This citrus fruit is celebrated for its role in promoting clear skin, aiding digestion, and reducing the risk of various health conditions. But here’s a question that often arises: does consuming oranges contribute to an increase in height? In this comprehensive article, we will explore the various facets of oranges, their nutritional value, health benefits, and the intriguing question of whether oranges can make you taller. The Role of Oranges in Height Gain Oranges, packed with essential nutrients, play a significant role in overall health, including bone health and potential height gain or maintenance. Among the key components of oranges are vitamin A, soluble fiber, vitamin K, and vitamin C. Let’s delve into how these elements can contribute to height growth. 1. Vitamin A for Bone Health: Oranges are particularly high in vitamin A, which is known to enhance bone health. Adequate vitamin A intake supports bone development and maintenance, making it an essential nutrient for those aiming for optimal height. 2. Soluble and Insoluble Fiber: Oranges contain both soluble and insoluble fiber, which aid in digestion and promote the growth of beneficial gut bacteria. Improved digestion and nutrient absorption are crucial for overall growth and development, especially in children and teenagers. 3. Blood Flow and Bone Tissues: Oranges have the added advantage of improving blood flow and fortifying bone tissues, which can contribute to bodily expansion. This makes them a beneficial addition to the diets of growing individuals. 4. Children and Teenagers: Kids and teenagers, in particular, can benefit significantly from incorporating oranges into their daily nutrition, as they are in a crucial phase of growth and development. Nutritional Value of Oranges To understand how oranges can contribute to height growth, it’s essential to examine their nutritional composition. Oranges are not just a source of vitamin C; they offer a range of vital nutrients: 1. Calcium: Oranges, though not commonly associated with calcium, provide approximately 55 mg, or 6% of the daily requirement. Calcium is essential for maintaining strong bones. 2. Fiber: A medium-sized orange weighing around 154 grams contains about 3 grams of dietary fiber. Orange fiber can help regulate blood sugar levels and lower elevated cholesterol, supporting cardiovascular health. 3. Folic Acid (Folate): Oranges are rich in folate, with one orange providing 40 to 50 mcg, equivalent to 10% of the daily requirement. Folate is crucial for preventing conditions like cancer and blood disorders. 4. Natural Sugar: Oranges contain natural sugars, which have fewer calories and more nutritional benefits compared to processed sugars found in candies and other sweets. 5. Potassium: Oranges are a good source of potassium, a mineral that helps regulate heartbeat and muscle activity, and can reduce blood pressure in individuals with hypertension. 6. Citric Acid: Citric acid, abundant in oranges, can modify urine pH, preventing the formation of calcium oxalate or kidney stones. Health Benefits of Oranges Oranges offer a multitude of health benefits beyond their potential role in height growth: 1. Rich in Vitamin C: Oranges are renowned for their high vitamin C content, crucial for a healthy immune system, collagen production for skin health, and fighting infections. 2. Antioxidant Properties: Loaded with antioxidants like flavonoids and carotenoids, oranges protect cells from damage caused by free radicals, reducing the risk of chronic diseases and slowing down the aging process. 3. Heart Health: The fiber, potassium, and vitamin C in oranges benefit heart health by regulating blood pressure and lowering cholesterol levels, reducing the risk of heart disease. 4. Digestive Health: Oranges contain dietary fiber, aiding digestion and preventing constipation while supporting a healthy gut microbiome. 5. Weight Management: The fiber in oranges promotes a feeling of fullness, helping control overeating. Their low calorie content makes them a healthy snack for weight management. 6. Cancer Prevention: Antioxidants in oranges may reduce the risk of certain cancers, such as lung and stomach cancer, by preventing DNA damage and inhibiting cancer cell growth. 7. Skin and Eye Health: Vitamin C contributes to skin health, reducing wrinkles and improving skin texture. Oranges also provide nutrients important for eye health. 8. Bone Health: Oranges contain calcium, essential for strong bones, and vitamin C aids in calcium absorption. 9. Hydration: Oranges have high water content, aiding in hydration, crucial for overall health. 10. Anti-Inflammatory Effects: Compounds like hesperidin in oranges possess anti-inflammatory properties that can benefit conditions like arthritis. Whole Oranges vs. Orange Juice While both whole oranges and orange juice offer health benefits, consuming whole oranges is generally considered better for several reasons: 1. Fiber: Whole oranges are a superior source of dietary fiber compared to orange juice. Fiber is crucial for blood sugar control and digestive health. 2. Nutrients: Oranges contain a wide range of vitamins and minerals, including vitamin C, potassium, folate, and thiamine. While orange juice retains some nutrients, processing and pasteurization may result in reduced overall nutrition. 3. Sugar Content: Many commercial orange juices contain added sugars, which can contribute to weight gain and other health issues when consumed excessively. Whole oranges contain natural sugars but also provide fiber and other nutrients that help moderate blood sugar levels. If you choose to consume orange juice, opt for varieties that are 100% juice and free of added sugars. Diluting juice with water can also reduce the overall sugar content, mitigating potential health risks. Other Strategies for Promoting Height Growth While oranges can play a role in supporting height growth, other lifestyle factors are equally important: 1. Eat a Balanced Diet: Ensure your diet is rich in nutrients like calcium, vitamin D, phosphorus, iodine, and magnesium, all of which are essential for growth. Include foods like beans, berries, leafy greens, milk, and nuts. 2. Get Adequate Sleep: Quality sleep, with around 9 hours for teenagers and children, supports normal height development. During sleep, the pituitary gland releases growth hormones, contributing to healthy growth. 3. Consider Dietary Supplements: Supplements can help fill nutritional gaps, especially if you have dietary restrictions or absorption issues. Calcium, vitamin D, and height development supplements can accelerate natural growth. Conclusion Oranges, with their delicious taste and robust nutritional profile, are a valuable addition to any diet. While they may not be a magical solution for extreme height gain, their contribution to overall health, including bone health and potential height maintenance, should not be underestimated. The vitamins, minerals, and antioxidants in oranges offer a host of health benefits, making them a nutritious choice for individuals of all ages. Remember, a balanced diet, adequate sleep, and a healthy lifestyle are essential for maximizing your growth potential. In the quest for better health and potential height gain, oranges can be a delightful and beneficial ally. FAQs Are there any foods that can increase height? Proper nutrition is crucial for growth, but no single food can guarantee an increase in height. A balanced diet with essential nutrients is essential. How much vitamin C is in an orange? On average, a medium-sized orange contains about 70 milligrams of vitamin C, which is approximately 78% of the recommended daily intake for adults. Are there any side effects of eating too many oranges? Excessive orange consumption can lead to issues like acid reflux, dental problems, and excessive sugar intake. What should I do if I want to grow taller? Focus on a well-balanced diet, regular exercise, and getting enough sleep. Genetics plays a significant role in height, but a healthy lifestyle can maximize your growth potential. Leave a Reply Your email address will not be published. Required fields are marked *
__label__pos
0.999953
Commit 863cfacb authored by Sebastien Jourdain's avatar Sebastien Jourdain Browse files Disable error macro on server when multi-client enable Change-Id: I9b699d846cc087d98a333f4f0d377284851c780a parent e53a2946 ......@@ -54,6 +54,7 @@ vtkPVOptions::vtkPVOptions() this->ClientMode = 0; this->ServerMode = 0; this->MultiClientMode = 0; this->MultiClientModeWithErrorMacro = 0; this->MultiServerMode = 0; this->RenderServerMode = 0; ......@@ -165,6 +166,12 @@ void vtkPVOptions::Initialize() "connect to it and share the same visualization session.", vtkPVOptions::PVDATA_SERVER|vtkPVOptions::PVSERVER); this->AddBooleanArgument("--multi-clients-debug", 0, &this->MultiClientModeWithErrorMacro, "Allow server to keep listening for serveral client to" "connect to it and share the same visualization session." "While keeping the error macro on the server session for debug.", vtkPVOptions::PVDATA_SERVER|vtkPVOptions::PVSERVER); this->AddBooleanArgument("--multi-servers", 0, &this->MultiServerMode, "Allow client to connect to several pvserver", vtkPVOptions::PVCLIENT); ...... ......@@ -123,7 +123,9 @@ public: // Is this server was started for collaboration meaning that it allow // several clients to connect to the same server and share the same // pipeline and visualization. vtkGetMacro(MultiClientMode, int); virtual int GetMultiClientMode() { return (this->MultiClientMode || this->MultiClientModeWithErrorMacro) ?1:0; } virtual int IsMultiClientModeDebug() { return this->MultiClientModeWithErrorMacro; } // Description: // Is this client allow multiple server connection in parallel ......@@ -215,6 +217,7 @@ protected: int ClientMode; int RenderServerMode; int MultiClientMode; int MultiClientModeWithErrorMacro; int MultiServerMode; int SymmetricMPIMode; ...... ......@@ -19,29 +19,30 @@ #include "vtkClientServerInterpreterInitializer.h" #include "vtkClientServerStream.h" #include "vtkCollection.h" #include "vtkPVInstantiator.h" #include "vtkMPIMToNSocketConnection.h" #include "vtkMemberFunctionCommand.h" #include "vtkMultiProcessController.h" #include "vtkMultiProcessStream.h" #include "vtkObjectFactory.h" #include "vtkSIProxy.h" #include "vtkPVSession.h" #include "vtkReservedRemoteObjectIds.h" #include "vtkPVInformation.h" #include "vtkPVInstantiator.h" #include "vtkPVOptions.h" #include "vtkPVSession.h" #include "vtkPVSessionCoreInterpreterHelper.h" #include "vtkProcessModule.h" #include "vtkSMMessage.h" #include "vtkReservedRemoteObjectIds.h" #include "vtkSIProxy.h" #include "vtkSIProxyDefinitionManager.h" #include "vtkPVSessionCoreInterpreterHelper.h" #include "vtkSMMessage.h" #include "vtkSmartPointer.h" #include "assert.h" #include <assert.h> #include <fstream> #include <set> #include <string> #include <vtksys/ios/sstream> #define LOG(x)\ if (this->LogStream)\ {\ ......@@ -87,7 +88,17 @@ class vtkPVSessionCore::vtkInternals public: vtkInternals() { } this->DisableErrorMacro = false; vtkProcessModule* pm = vtkProcessModule::GetProcessModule(); if(pm) { if(vtkPVOptions *options = pm->GetOptions()) { this->DisableErrorMacro = (options->GetMultiClientMode() && !options->IsMultiClientModeDebug()); } } } ~vtkInternals() { // Remove SIObjects inter-dependency ......@@ -232,6 +243,9 @@ public: unsigned long InterpreterObserverID; std::map<vtkTypeUInt32, vtkSMMessage > MessageCacheMap; std::set<int> KnownClients; // Used for collaboration as client may trigger invalid server request when // they are in a transitional state. bool DisableErrorMacro; }; //****************************************************************************/ ......@@ -259,6 +273,7 @@ vtkPVSessionCore::vtkPVSessionCore() helper->Delete(); this->Internals = new vtkInternals(); helper->SetLogLevel(this->Internals->DisableErrorMacro ? 1 : 0); vtkMemberFunctionCommand<vtkPVSessionCore>* observer = vtkMemberFunctionCommand<vtkPVSessionCore>::New(); ......@@ -365,13 +380,16 @@ void vtkPVSessionCore::OnInterpreterError( vtkObject*, unsigned long, (last.GetCommand(0) == vtkClientServerStream::Error) && last.GetArgument(0, 0, &errorMessage) && this->Interpreter->GetGlobalWarningDisplay()) { vtksys_ios::ostringstream error; error << "\nwhile processing\n"; info->css->PrintMessage(error, info->message); error << ends; vtkErrorMacro(<< errorMessage << error.str().c_str()); vtkErrorMacro("Aborting execution for debugging purposes."); cout << "############ ABORT #############" << endl; if(!this->Internals->DisableErrorMacro) { vtksys_ios::ostringstream error; error << "\nwhile processing\n"; info->css->PrintMessage(error, info->message); error << ends; vtkErrorMacro(<< errorMessage << error.str().c_str()); vtkErrorMacro("Aborting execution for debugging purposes."); cout << "############ ABORT #############" << endl; } return; //abort(); } ......@@ -420,11 +438,14 @@ void vtkPVSessionCore::PushStateInternal(vtkSMMessage* message) if (!message->HasExtension(DefinitionHeader::server_class)) { vtkErrorMacro("Message missing DefinitionHeader." "Aborting for debugging purposes."); if(!this->Internals->DisableErrorMacro) { vtkErrorMacro("Message missing DefinitionHeader." "Aborting for debugging purposes."); message->PrintDebugString(); cout << "############ ABORT #############" << endl; message->PrintDebugString(); cout << "############ ABORT #############" << endl; } return; //abort(); } ......@@ -802,7 +823,10 @@ bool vtkPVSessionCore::GatherInformationInternal( vtkPVInformation* information, vtkSIObject* siObject = this->GetSIObject(globalid); if (!siObject) { vtkErrorMacro("No object with global-id: " << globalid); if(!this->Internals->DisableErrorMacro) { vtkErrorMacro("No object with global-id: " << globalid); } return false; } ...... ......@@ -25,6 +25,7 @@ vtkStandardNewMacro(vtkPVSessionCoreInterpreterHelper); //---------------------------------------------------------------------------- vtkPVSessionCoreInterpreterHelper::vtkPVSessionCoreInterpreterHelper() { this->LogLevel = 0; } //---------------------------------------------------------------------------- ......@@ -56,7 +57,14 @@ vtkObjectBase* vtkPVSessionCoreInterpreterHelper::GetVTKObject(vtkTypeUInt32 gid this->Core->GetSIObject(gid)); if (!siProxy) { vtkErrorMacro("No vtkSIProxy for id : " << gid); switch(this->LogLevel) { case 0: vtkErrorMacro("No vtkSIProxy for id : " << gid); break; default: vtkWarningMacro("No vtkSIProxy for id : " << gid); } return NULL; } return siProxy->GetVTKObject(); ...... ......@@ -69,12 +69,17 @@ public: // Used by vtkPVSessionCore to pass the core. This is not reference counted. void SetCore(vtkPVSessionCore*); // Description: // Switch from 0:vtkErrorMacro to 1:vtkWarningMacro vtkSetMacro(LogLevel, int); //BTX protected: vtkPVSessionCoreInterpreterHelper(); ~vtkPVSessionCoreInterpreterHelper(); vtkWeakPointer<vtkPVSessionCore> Core; int LogLevel; private: vtkPVSessionCoreInterpreterHelper(const vtkPVSessionCoreInterpreterHelper&); // Not implemented void operator=(const vtkPVSessionCoreInterpreterHelper&); // Not implemented ...... Markdown is supported 0% or . You are about to add 0 people to the discussion. Proceed with caution. Finish editing this message first! Please register or to comment
__label__pos
0.916694
Become a Member Get access to more than 30 brands, premium video, exclusive content, events, mapping, and more. Already have an account? Sign In Become a Member Get access to more than 30 brands, premium video, exclusive content, events, mapping, and more. Already have an account? Sign In Brands Sponsored Is the Fountain of Youth Just a Simple Vitamin? This nutrient might be the answer to your anti-aging woes. Get full access to Outside Learn, our online education hub featuring in-depth fitness and nutrition courses and more than 2,000 instructional videos when you sign up for Outside+. Most of us have never heard of nicotinamide adenine dinucleotide, or NAD+. But that doesn’t stop it from being an active champion for your cellular health. None NAD+ is a coenzyme that plays a major role in metabolism. The problem? Levels tend to decrease with age — and in reaction to the stressors of everyday life. But there’s a nature-identical supplement that might help get your levels back on track. We talked with biochemist and NAD+ expert Charles Brenner, PhD, to get the scoop on how it all works. Oxygen: Our bodies make less NAD+ as we age. Why? Charles Brenner: Over time, we experience more metabolic stressors, like exposure to free radicals in the environment and even alcohol consumption or overeating. These things cause NAD+ levels to decline. Oxygen: How do low NAD+ levels affect us as we age? CB: NAD+ plays an important role in metabolism. Producing less of it can make it harder for cells to convert food into energy, make hormones like androgens and estrogens, and maintain healthy DNA. Oxygen: Supplementing with nicotinamide riboside (NR) can replenish NAD+. What exactly is NR, and how does it work? CB: Nicotinamide riboside is a form of vitamin B3 that’s a precursor to NAD+. It’s an important building block that cells can take up and use to rebuild their NAD+ supplies. Oxygen: How does boosting NAD+ production help slow the effects of aging? CB: It helps maintain your cellular health and resiliency. This means your cells are better equipped to handle the effects of common fluctuations in energy associated with an active lifestyle. Oxygen: Are there other potential benefits of taking NR? CB: It’s nothing short of remarkable. We’ve assessed the ability of NR as an oral supplement to boost people’s NAD+ safely, and it does that. Now that we have safety data and promising preliminary results, there are between 25 and 30 human clinical trials testing NR’s effect on a variety of health outcomes . Oxygen: Who would benefit from supplementing with NR? CB: All of us experience metabolic stress, and NR is a way to replenish NAD+ stores that are under attack from those stressors and support people’s resiliency at the cellular level. Busy professionals, people that are concerned with their performance, or those who have noticed that they’re in a little bit of decline and don’t want to be that way—they could all benefit. Oxygen: NR is a form of vitamin B3 that’s found in milk. Couldn’t you just get your fill from dairy foods? CB: You’d have to have hundreds of liters of milk, so that’s the case for taking a supplement. (The NR technology is exclusively licensed by ChromaDex.) Oxygen: How long would you need to supplement with NR to notice a difference? CB: Some people feel something in as little as two or three weeks. It kind of works in the background like an antivirus operating system, maintaining your NAD+ levels so you don’t have a disruption. Oxygen: Are there any downsides to taking NR? CB: NR is generally recognized as safe and we haven’t seen any negative side effects from the human clinical trials. Of course like with taking any supplement, it’s a good idea to ask your doctor first.
__label__pos
0.998453
DOI: 10.1111/iwj.14554 ISSN: 1742-4801 A meta‐analysis examining the impact of intrawound treatment on reducing deep surgical site infections during instrumented spine surgery Liqiang Zhou, Shuxing Xing • Dermatology • Surgery Abstract The purpose of the meta‐analysis was to evaluate and compare the effect of intrawound management on decreasing deep surgical site infections (SSIs) in instrumented spinal surgery (SS). The results of this meta‐analysis were analysed, and the odds ratio (OR) and mean difference (MD) with 95% confidence intervals (CIs) were calculated using dichotomous or contentious random or fixed effect models. For the current meta‐analysis, 29 examinations spanning from 2006 to 2022 were included, encompassing 11 181 people who had instrumented SS. Intrawound management had a significantly lower deep SSI when using vancomycin (OR, 0.34; 95% CI, 0.25–0.44, p < 0.001) and povidone‐iodine as intrawound management (OR, 0.24; 95% CI, 0.13–0.42, p < 0.001) compared to control in instrumented SS subjects. The data that was looked at showed that using vancomycin and povidone‐iodine as intrawound management had a much lower deep SSI than using a control group of instrumented SS subjects. However, given that some studies included a small number of subjects, attention should be given to their values. More from our Archive
__label__pos
0.901185
Learn More about the Process of MIG Welding Metal inert gas welding which is shortened as MIG welding, is also referring to the process of gas metal arc welding or GMAW. Such process of welding involves an electric arc formed between the workpiece metal or metals and a wire electrode that is consumable in nature, and then this electric arc will basically heat the workpiece metals, thus, the melting and joining of such materials occurs. Gas metal arc welding or metal inert gas welding is being applied mostly to various steel materials, for such process can provide the lit operator or the welder a much faster or quicker time of welding, compared to the other processes of welding. There are four basic methods of metal transfer in gas metal arc welding, namely the short-circuiting, the pulsed-spray, the spray, and the globular. The gas metal arc welding is definitely one of the most recognizable and commonly used process of welding all over the world, for the welder or the lit operator can acquire various advantages and conveniences from using it, such as its versatility, its speed, and the easiness of adapting the process to robotic automation. The different characteristics of gas metal arc welding include the ability of the welder to weld in different positions, the ability of the welder to weld for a long duration of time without any starts or stops, requires a much lesser skills of the welder or operator, is considered as a semi-automatic welding process, the ability to provide a slag-free weld bead and a uniform weld bead, the use of a shielding gas, and the use of a consumable wire electrode during the process of welding. Metal inert gas welding is typically being practiced in different industrial environments, like the sheet metal industry and the industry of automobiles. The various equipment used by the welder in such process of welding include a shielding gas supply, a wielding electrode wire, a welding gun, a welding power supply, and a wire feed unit. The techniques of the process of gas metal arc welding is quite easier and simpler compared to the other processes of welding, but still, the operator or the welder should use proper precautions during their work, and wearing a personal protective equipment or PPE is the definitely the answer. The personal protective equipment wore by lit operators or welders include a full face welding helmets for the protection of the face especially the eyes of the welder, a heavy leather gloves for the hands, and a protective long sleeve jackets to prevent the exposure to flames and extreme heat. The persons who wants to hire the services of a GMAW or MIG welder should make sure that the tradesperson that they are about to hire should be knowledgeable, skillful and possess expertise in such process of welding, and to be more specific they should have a good dexterity. A MIG welder can be found through the use of the internet, from the word of mouth or recommendations of their previous clients or from your friends and families, or through print ads.How I Achieved Maximum Success with Machines 5 Lessons Learned: Drills
__label__pos
0.961749